blob: ae9ebfa394b9fdf441a06d630725589bea9df7cc [file] [log] [blame]
Benjamin Kramer665a8dc2012-01-15 15:26:07 +00001<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
2 "http://www.w3.org/TR/html4/strict.dtd">
Chris Lattnercf17d9d2009-04-20 04:23:09 +00003<html>
4<head>
5<title>Clang Compiler User's Manual</title>
Benjamin Kramer665a8dc2012-01-15 15:26:07 +00006<link type="text/css" rel="stylesheet" href="../menu.css">
7<link type="text/css" rel="stylesheet" href="../content.css">
Chris Lattnercf17d9d2009-04-20 04:23:09 +00008<style type="text/css">
9td {
10 vertical-align: top;
11}
12</style>
13</head>
14<body>
15
16<!--#include virtual="../menu.html.incl"-->
17
18<div id="content">
19
20<h1>Clang Compiler User's Manual</h1>
21
22<ul>
23<li><a href="#intro">Introduction</a>
24 <ul>
25 <li><a href="#terminology">Terminology</a></li>
26 <li><a href="#basicusage">Basic Usage</a></li>
27 </ul>
28</li>
Chris Lattner65a795b2009-04-20 06:00:23 +000029<li><a href="#commandline">Command Line Options</a>
30 <ul>
31 <li><a href="#cl_diagnostics">Options to Control Error and Warning
32 Messages</a></li>
Chad Rosierb211a4b2012-02-22 19:14:46 +000033 <li><a href="#cl_crash_diagnostics">Options to Control Clang Crash
34 Diagnostics</a></li>
Chris Lattner65a795b2009-04-20 06:00:23 +000035 </ul>
36</li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000037<li><a href="#general_features">Language and Target-Independent Features</a>
38 <ul>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +000039 <li><a href="#diagnostics">Controlling Errors and Warnings</a>
Chris Lattner3401cf82009-07-12 21:22:10 +000040 <ul>
41 <li><a href="#diagnostics_display">Controlling How Clang Displays Diagnostics</a></li>
42 <li><a href="#diagnostics_mappings">Diagnostic Mappings</a></li>
Chris Lattner67db8cd2010-05-30 23:42:51 +000043 <li><a href="#diagnostics_categories">Diagnostic Categories</a></li>
Chris Lattner3401cf82009-07-12 21:22:10 +000044 <li><a href="#diagnostics_commandline">Controlling Diagnostics via Command Line Flags</a></li>
45 <li><a href="#diagnostics_pragmas">Controlling Diagnostics via Pragmas</a></li>
Richard Smithf122a132012-06-13 20:27:03 +000046 <li><a href="#diagnostics_systemheader">Controlling Diagnostics in System Headers</a></li>
Ted Kremenekf391fa72011-08-18 01:17:05 +000047 <li><a href="#diagnostics_enable_everything">Enabling All Warnings</a></li>
Ted Kremenek2fb11eb2010-08-24 18:12:35 +000048 <li><a href="#analyzer_diagnositics">Controlling Static Analyzer Diagnostics</a></li>
Chris Lattner3401cf82009-07-12 21:22:10 +000049 </ul>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +000050 </li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000051 <li><a href="#precompiledheaders">Precompiled Headers</a></li>
Mike Stump53664ca2009-12-14 23:53:10 +000052 <li><a href="#codegen">Controlling Code Generation</a></li>
Alexey Samsonov5ab52492012-05-30 06:55:10 +000053 <li><a href="#debuginfosize">Controlling Size of Debug Information</a></li>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +000054 </ul>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000055</li>
56<li><a href="#c">C Language Features</a>
57 <ul>
Eli Friedman660a5ac2009-04-28 18:48:34 +000058 <li><a href="#c_ext">Extensions supported by clang</a></li>
59 <li><a href="#c_modes">Differences between various standard modes</a></li>
60 <li><a href="#c_unimpl_gcc">GCC extensions not implemented yet</a></li>
61 <li><a href="#c_unsupp_gcc">Intentionally unsupported GCC extensions</a></li>
62 <li><a href="#c_ms">Microsoft extensions</a></li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000063 </ul>
64</li>
Richard Smithbdb10182011-11-21 20:54:59 +000065<li><a href="#cxx">C++ Language Features</a>
66 <ul>
67 <li><a href="#cxx_implimits">Controlling implementation limits</a></li>
68 </ul>
69</li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000070<li><a href="#target_features">Target-Specific Features and Limitations</a>
71 <ul>
72 <li><a href="#target_arch">CPU Architectures Features and Limitations</a>
73 <ul>
74 <li><a href="#target_arch_x86">X86</a></li>
Eli Friedman3b658d32009-06-08 05:12:39 +000075 <li><a href="#target_arch_arm">ARM</a></li>
76 <li><a href="#target_arch_other">Other platforms</a></li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000077 </ul>
78 </li>
79 <li><a href="#target_os">Operating System Features and Limitations</a>
80 <ul>
81 <li><a href="#target_os_darwin">Darwin (Mac OS/X)</a></li>
82 <li>Linux, etc.</li>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +000083 <li><a href="#target_os_win32">Windows</a></li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000084 </ul>
Chris Lattnercf17d9d2009-04-20 04:23:09 +000085 </li>
86 </ul>
87</li>
88</ul>
89
90
91<!-- ======================================================================= -->
92<h2 id="intro">Introduction</h2>
93<!-- ======================================================================= -->
94
95<p>The Clang Compiler is an open-source compiler for the C family of programming
96languages, aiming to be the best in class implementation of these languages.
97Clang builds on the LLVM optimizer and code generator, allowing it to provide
98high-quality optimization and code generation support for many targets. For
99more general information, please see the <a href="http://clang.llvm.org">Clang
100Web Site</a> or the <a href="http://llvm.org">LLVM Web Site</a>.</p>
101
102<p>This document describes important notes about using Clang as a compiler for
103an end-user, documenting the supported features, command line options, etc. If
104you are interested in using Clang to build a tool that processes code, please
105see <a href="InternalsManual.html">the Clang Internals Manual</a>. If you are
Michael J. Spencer8275fc02012-02-12 09:11:39 +0000106interested in the <a href="http://clang-analyzer.llvm.org">Clang
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000107Static Analyzer</a>, please see its web page.</p>
108
109<p>Clang is designed to support the C family of programming languages, which
110includes <a href="#c">C</a>, <a href="#objc">Objective-C</a>, <a
111href="#cxx">C++</a>, and <a href="#objcxx">Objective-C++</a> as well as many
112dialects of those. For language-specific information, please see the
113corresponding language specific section:</p>
114
115<ul>
116<li><a href="#c">C Language</a>: K&amp;R C, ANSI C89, ISO C90, ISO C94
117 (C89+AMD1), ISO C99 (+TC1, TC2, TC3). </li>
118<li><a href="#objc">Objective-C Language</a>: ObjC 1, ObjC 2, ObjC 2.1, plus
119 variants depending on base language.</li>
Richard Smithbdb10182011-11-21 20:54:59 +0000120<li><a href="#cxx">C++ Language</a></li>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000121<li><a href="#objcxx">Objective C++ Language</a></li>
122</ul>
123
124<p>In addition to these base languages and their dialects, Clang supports a
125broad variety of language extensions, which are documented in the corresponding
126language section. These extensions are provided to be compatible with the GCC,
127Microsoft, and other popular compilers as well as to improve functionality
128through Clang-specific features. The Clang driver and language features are
129intentionally designed to be as compatible with the GNU GCC compiler as
130reasonably possible, easing migration from GCC to Clang. In most cases, code
131"just works".</p>
132
133<p>In addition to language specific features, Clang has a variety of features
134that depend on what CPU architecture or operating system is being compiled for.
Douglas Gregorcd5a5052009-11-09 15:15:41 +0000135Please see the <a href="#target_features">Target-Specific Features and
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000136Limitations</a> section for more details.</p>
137
138<p>The rest of the introduction introduces some basic <a
139href="#terminology">compiler terminology</a> that is used throughout this manual
140and contains a basic <a href="#basicusage">introduction to using Clang</a>
141as a command line compiler.</p>
142
143<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
144<h3 id="terminology">Terminology</h3>
145<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
146
147<p>Front end, parser, backend, preprocessor, undefined behavior, diagnostic,
148 optimizer</p>
149
150<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
151<h3 id="basicusage">Basic Usage</h3>
152<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
153
154<p>Intro to how to use a C compiler for newbies.</p>
155<p>
156compile + link
157
158compile then link
159
160debug info
161
162enabling optimizations
163
164picking a language to use, defaults to C99 by default. Autosenses based on
165extension.
166
167using a makefile
168</p>
169
170
171<!-- ======================================================================= -->
172<h2 id="commandline">Command Line Options</h2>
173<!-- ======================================================================= -->
174
175<p>
176This section is generally an index into other sections. It does not go into
Chris Lattner65a795b2009-04-20 06:00:23 +0000177depth on the ones that are covered by other sections. However, the first part
178introduces the language selection and other high level options like -c, -g, etc.
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000179</p>
180
Chris Lattner65a795b2009-04-20 06:00:23 +0000181
182<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
183<h3 id="cl_diagnostics">Options to Control Error and Warning Messages</h3>
184<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
185
186<p><b>-Werror</b>: Turn warnings into errors.</p>
187<p><b>-Werror=foo</b>: Turn warning "foo" into an error.</p>
188<p><b>-Wno-error=foo</b>: Turn warning "foo" into an warning even if -Werror is
189 specified.</p>
190<p><b>-Wfoo</b>: Enable warning foo</p>
191<p><b>-Wno-foo</b>: Disable warning foo</p>
192<p><b>-w</b>: Disable all warnings.</p>
193<p><b>-pedantic</b>: Warn on language extensions.</p>
194<p><b>-pedantic-errors</b>: Error on language extensions.</p>
195<p><b>-Wsystem-headers</b>: Enable warnings from system headers.</p>
196
Chris Lattner0f0c9632010-04-07 20:49:23 +0000197<p><b>-ferror-limit=123</b>: Stop emitting diagnostics after 123 errors have
198 been produced. The default is 20, and the error limit can be disabled with
199 -ferror-limit=0.</p>
200
Douglas Gregor575cf372010-04-20 07:18:24 +0000201<p><b>-ftemplate-backtrace-limit=123</b>: Only emit up to 123 template instantiation notes within the template instantiation backtrace for a single warning or error. The default is 10, and the limit can be disabled with -ftemplate-backtrace-limit=0.</p>
202
Chris Lattner65a795b2009-04-20 06:00:23 +0000203<!-- ================================================= -->
204<h4 id="cl_diag_formatting">Formatting of Diagnostics</h4>
205<!-- ================================================= -->
206
207<p>Clang aims to produce beautiful diagnostics by default, particularly for new
208users that first come to Clang. However, different people have different
Chris Lattner8217f4e2009-04-20 06:26:18 +0000209preferences, and sometimes Clang is driven by another program that wants to
210parse simple and consistent output, not a person. For these cases, Clang
211provides a wide range of options to control the exact output format of the
212diagnostics that it generates.</p>
Chris Lattner65a795b2009-04-20 06:00:23 +0000213
214<dl>
215
216<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
217<dt id="opt_fshow-column"><b>-f[no-]show-column</b>: Print column number in
218diagnostic.</dt>
219<dd>This option, which defaults to on, controls whether or not Clang prints the
220column number of a diagnostic. For example, when this is enabled, Clang will
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000221print something like:
Chris Lattner65a795b2009-04-20 06:00:23 +0000222
223<pre>
224 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
225 #endif bad
226 ^
227 //
228</pre>
229
230<p>When this is disabled, Clang will print "test.c:28: warning..." with no
231column number.</p>
232</dd>
233
234<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
235<dt id="opt_fshow-source-location"><b>-f[no-]show-source-location</b>: Print
236source file/line/column information in diagnostic.</dt>
237<dd>This option, which defaults to on, controls whether or not Clang prints the
238filename, line number and column number of a diagnostic. For example,
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000239when this is enabled, Clang will print something like:
Chris Lattner65a795b2009-04-20 06:00:23 +0000240
241<pre>
242 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
243 #endif bad
244 ^
245 //
246</pre>
247
248<p>When this is disabled, Clang will not print the "test.c:28:8: " part.</p>
249</dd>
250
251<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
252<dt id="opt_fcaret-diagnostics"><b>-f[no-]caret-diagnostics</b>: Print source
253line and ranges from source code in diagnostic.</dt>
254<dd>This option, which defaults to on, controls whether or not Clang prints the
255source line, source ranges, and caret when emitting a diagnostic. For example,
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000256when this is enabled, Clang will print something like:
Chris Lattner65a795b2009-04-20 06:00:23 +0000257
258<pre>
259 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
260 #endif bad
261 ^
262 //
263</pre>
Chris Lattner65a795b2009-04-20 06:00:23 +0000264</dd>
Chris Lattner65a795b2009-04-20 06:00:23 +0000265<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
Douglas Gregore8d44dd2010-07-09 16:31:58 +0000266<dt id="opt_fcolor_diagnostics"><b>-f[no-]color-diagnostics</b>: </dt>
267<dd>This option, which defaults to on when a color-capable terminal is
268 detected, controls whether or not Clang prints diagnostics in color.
269 When this option is enabled, Clang will use colors to highlight
270 specific parts of the diagnostic, e.g.,
Chris Lattner4e1c53d2011-01-24 03:47:34 +0000271 <pre>
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000272 <b><span style="color:black">test.c:28:8: <span style="color:magenta">warning</span>: extra tokens at end of #endif directive [-Wextra-tokens]</span></b>
Chris Lattner4e1c53d2011-01-24 03:47:34 +0000273 #endif bad
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000274 <span style="color:green">^</span>
275 <span style="color:green">//</span>
Douglas Gregore8d44dd2010-07-09 16:31:58 +0000276</pre>
Chris Lattner4e1c53d2011-01-24 03:47:34 +0000277
278<p>When this is disabled, Clang will just print:</p>
279
280<pre>
281 test.c:2:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
282 #endif bad
283 ^
284 //
285</pre>
286</dd>
Douglas Gregore8d44dd2010-07-09 16:31:58 +0000287<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
Douglas Gregorc9471b02011-05-21 17:07:29 +0000288<dt id="opt_fdiagnostics-format"><b>-fdiagnostics-format=clang/msvc/vi</b>:
289Changes diagnostic output format to better match IDEs and command line tools.</dt>
290<dd>This option controls the output format of the filename, line number, and column printed in diagnostic messages. The options, and their affect on formatting a simple conversion diagnostic, follow:
291
292 <dl>
293 <dt><b>clang</b> (default)</dt>
294 <dd>
295 <pre>t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int'</pre>
296 </dd>
297
298 <dt><b>msvc</b></dt>
299 <dd>
300 <pre>t.c(3,11) : warning: conversion specifies type 'char *' but the argument has type 'int'</pre>
301 </dd>
302
303 <dt><b>vi</b></dt>
304 <dd>
305 <pre>t.c +3:11: warning: conversion specifies type 'char *' but the argument has type 'int'</pre>
306 </dd>
307 </dl>
308</dd>
309
310<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
Argyrios Kyrtzidis477aab62011-05-25 05:05:01 +0000311<dt id="opt_fdiagnostics-show-name"><b>-f[no-]diagnostics-show-name</b>:
312Enable the display of the diagnostic name.</dt>
313<dd>This option, which defaults to off, controls whether or not
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000314Clang prints the associated name.<p></p></dd>
Argyrios Kyrtzidis477aab62011-05-25 05:05:01 +0000315<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
Chris Lattner65a795b2009-04-20 06:00:23 +0000316<dt id="opt_fdiagnostics-show-option"><b>-f[no-]diagnostics-show-option</b>:
317Enable <tt>[-Woption]</tt> information in diagnostic line.</dt>
318<dd>This option, which defaults to on,
319controls whether or not Clang prints the associated <A
320href="#cl_diag_warning_groups">warning group</a> option name when outputting
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000321a warning diagnostic. For example, in this output:
Chris Lattner65a795b2009-04-20 06:00:23 +0000322
323<pre>
324 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
325 #endif bad
326 ^
327 //
328</pre>
329
330<p>Passing <b>-fno-diagnostics-show-option</b> will prevent Clang from printing
331the [<a href="#opt_Wextra-tokens">-Wextra-tokens</a>] information in the
332diagnostic. This information tells you the flag needed to enable or disable the
333diagnostic, either from the command line or through <a
334href="#pragma_GCC_diagnostic">#pragma GCC diagnostic</a>.</dd>
335
Chris Lattner28a43a42010-05-05 01:35:28 +0000336<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
337<dt id="opt_fdiagnostics-show-category"><b>-fdiagnostics-show-category=none/id/name</b>:
338Enable printing category information in diagnostic line.</dt>
339<dd>This option, which defaults to "none",
340controls whether or not Clang prints the category associated with a diagnostic
341when emitting it. Each diagnostic may or many not have an associated category,
342if it has one, it is listed in the diagnostic categorization field of the
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000343diagnostic line (in the []'s).
Chris Lattner28a43a42010-05-05 01:35:28 +0000344
345<p>For example, a format string warning will produce these three renditions
346based on the setting of this option:</p>
347
348<pre>
349 t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat]
350 t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat<b>,1</b>]
351 t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat<b>,Format String</b>]
352</pre>
353
354<p>This category can be used by clients that want to group diagnostics by
355category, so it should be a high level category. We want dozens of these, not
356hundreds or thousands of them.</p>
357</dd>
358
359
Chris Lattner65a795b2009-04-20 06:00:23 +0000360
361<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
362<dt id="opt_fdiagnostics-fixit-info"><b>-f[no-]diagnostics-fixit-info</b>:
363Enable "FixIt" information in the diagnostics output.</dt>
364<dd>This option, which defaults to on, controls whether or not Clang prints the
365information on how to fix a specific diagnostic underneath it when it knows.
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000366For example, in this output:
Chris Lattner65a795b2009-04-20 06:00:23 +0000367
368<pre>
369 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
370 #endif bad
371 ^
372 //
373</pre>
374
375<p>Passing <b>-fno-diagnostics-fixit-info</b> will prevent Clang from printing
376the "//" line at the end of the message. This information is useful for users
377who may not understand what is wrong, but can be confusing for machine
378parsing.</p>
379</dd>
380
381<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
Chris Lattner2a9cc232009-04-21 05:35:32 +0000382<dt id="opt_fdiagnostics-print-source-range-info">
383<b>-f[no-]diagnostics-print-source-range-info</b>:
Chris Lattner65a795b2009-04-20 06:00:23 +0000384Print machine parsable information about source ranges.</dt>
385<dd>This option, which defaults to off, controls whether or not Clang prints
386information about source ranges in a machine parsable format after the
387file/line/column number information. The information is a simple sequence of
388brace enclosed ranges, where each range lists the start and end line/column
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000389locations. For example, in this output:
Chris Lattner65a795b2009-04-20 06:00:23 +0000390
391<pre>
392exprs.c:47:15:{47:8-47:14}{47:17-47:24}: error: invalid operands to binary expression ('int *' and '_Complex float')
393 P = (P-42) + Gamma*4;
394 ~~~~~~ ^ ~~~~~~~
395</pre>
396
Chris Lattner2a9cc232009-04-21 05:35:32 +0000397<p>The {}'s are generated by -fdiagnostics-print-source-range-info.</p>
Chris Lattner65a795b2009-04-20 06:00:23 +0000398</dd>
399
Douglas Gregor4786c152010-08-19 20:24:43 +0000400<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
401<dt id="opt_fdiagnostics-parseable-fixits">
402<b>-fdiagnostics-parseable-fixits</b>:
403Print Fix-Its in a machine parseable form.</dt>
404<dd><p>This option makes Clang print available Fix-Its in a machine parseable format at the end of diagnostics. The following example illustrates the format:</p>
405
406<pre>
Douglas Gregorbf5e09d2010-08-20 03:17:33 +0000407 fix-it:"t.cpp":{7:25-7:29}:"Gamma"
Douglas Gregor4786c152010-08-19 20:24:43 +0000408</pre>
409
NAKAMURA Takumi44626362011-04-05 00:57:02 +0000410<p>The range printed is a half-open range, so in this example the characters at
411column 25 up to but not including column 29 on line 7 in t.cpp should be
412replaced with the string &quot;Gamma&quot;. Either the range or the replacement
413string may be empty (representing strict insertions and strict erasures,
414respectively). Both the file name and the insertion string escape backslash (as
415&quot;\\&quot;), tabs (as &quot;\t&quot;), newlines (as &quot;\n&quot;), double
416quotes(as &quot;\&quot;&quot;) and non-printable characters (as octal
417&quot;\xxx&quot;).</p>
Douglas Gregor4786c152010-08-19 20:24:43 +0000418</dd>
Chris Lattner65a795b2009-04-20 06:00:23 +0000419
420</dl>
421
Chris Lattner65a795b2009-04-20 06:00:23 +0000422
423
424<!-- ===================================================== -->
425<h4 id="cl_diag_warning_groups">Individual Warning Groups</h4>
426<!-- ===================================================== -->
427
428<p>TODO: Generate this from tblgen. Define one anchor per warning group.</p>
429
430
431<dl>
432
433
434<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
435<dt id="opt_Wextra-tokens"><b>-Wextra-tokens</b>: Warn about excess tokens at
436 the end of a preprocessor directive.</dt>
437<dd>This option, which defaults to on, enables warnings about extra tokens at
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000438the end of preprocessor directives. For example:
Chris Lattner65a795b2009-04-20 06:00:23 +0000439
440<pre>
441 test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens]
442 #endif bad
443 ^
444</pre>
445
446<p>These extra tokens are not strictly conforming, and are usually best handled
447by commenting them out.</p>
448
449<p>This option is also enabled by <a href="">-Wfoo</a>, <a href="">-Wbar</a>,
450 and <a href="">-Wbaz</a>.</p>
451</dd>
452
Jeffrey Yasskin21d07e42010-06-05 01:39:57 +0000453<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
454<dt id="opt_Wambiguous-member-template"><b>-Wambiguous-member-template</b>:
455Warn about unqualified uses of a member template whose name resolves
456to another template at the location of the use.</dt>
457<dd>This option, which defaults to on, enables a warning in the
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000458following code:
Jeffrey Yasskin21d07e42010-06-05 01:39:57 +0000459
460<pre>
461template&lt;typename T> struct set{};
462template&lt;typename T> struct trait { typedef const T& type; };
463struct Value {
464 template&lt;typename T> void set(typename trait&lt;T>::type value) {}
465};
466void foo() {
467 Value v;
468 v.set&lt;double>(3.2);
469}
470</pre>
471
472<p>C++ [basic.lookup.classref] requires this to be an error, but,
473because it's hard to work around, Clang downgrades it to a warning as
474an extension.</p>
475</dd>
476
Jeffrey Yasskin57d12fd2010-06-07 15:58:05 +0000477<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
478<dt id="opt_Wbind-to-temporary-copy"><b>-Wbind-to-temporary-copy</b>: Warn about
479an unusable copy constructor when binding a reference to a temporary.</dt>
480<dd>This option, which defaults to on, enables warnings about binding a
481reference to a temporary when the temporary doesn't have a usable copy
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000482constructor. For example:
Jeffrey Yasskin57d12fd2010-06-07 15:58:05 +0000483
484<pre>
485 struct NonCopyable {
486 NonCopyable();
487 private:
488 NonCopyable(const NonCopyable&);
489 };
490 void foo(const NonCopyable&);
491 void bar() {
David Blaikie5090e9f2011-10-18 05:49:30 +0000492 foo(NonCopyable()); // Disallowed in C++98; allowed in C++11.
Jeffrey Yasskin57d12fd2010-06-07 15:58:05 +0000493 }
494</pre>
495<pre>
496 struct NonCopyable2 {
497 NonCopyable2();
498 NonCopyable2(NonCopyable2&);
499 };
500 void foo(const NonCopyable2&);
501 void bar() {
David Blaikie5090e9f2011-10-18 05:49:30 +0000502 foo(NonCopyable2()); // Disallowed in C++98; allowed in C++11.
Jeffrey Yasskin57d12fd2010-06-07 15:58:05 +0000503 }
504</pre>
505
506<p>Note that if <tt>NonCopyable2::NonCopyable2()</tt> has a default
507argument whose instantiation produces a compile error, that error will
508still be a hard error in C++98 mode even if this warning is turned
509off.</p>
510
511</dd>
512
Chris Lattner65a795b2009-04-20 06:00:23 +0000513</dl>
514
Chad Rosiercd376a12012-02-22 20:26:10 +0000515<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
516<h3 id="cl_crash_diagnostics">Options to Control Clang Crash Diagnostics</h3>
517<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
518
519<p>As unbelievable as it may sound, Clang does crash from time to time.
520Generally, this only occurs to those living on the
521<a href="http://llvm.org/releases/download.html#svn">bleeding edge</a>. Clang
522goes to great lengths to assist you in filing a bug report. Specifically, Clang
523generates preprocessed source file(s) and associated run script(s) upon a
524crash. These files should be attached to a bug report to ease reproducibility
525of the failure. Below are the command line options to control the crash
526diagnostics.
527</p>
528
529<p><b>-fno-crash-diagnostics</b>: Disable auto-generation of preprocessed
530source files during a clang crash.</p>
531
532<p>The -fno-crash-diagnostics flag can be helpful for speeding the process of
533generating a delta reduced test case.</p>
534
535
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000536<!-- ======================================================================= -->
537<h2 id="general_features">Language and Target-Independent Features</h2>
538<!-- ======================================================================= -->
539
540
541<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
542<h3 id="diagnostics">Controlling Errors and Warnings</h3>
543<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
544
Chris Lattner65a795b2009-04-20 06:00:23 +0000545<p>Clang provides a number of ways to control which code constructs cause it to
Chris Lattner8217f4e2009-04-20 06:26:18 +0000546emit errors and warning messages, and how they are displayed to the console.</p>
Chris Lattner65a795b2009-04-20 06:00:23 +0000547
Chris Lattner3401cf82009-07-12 21:22:10 +0000548<h4 id="diagnostics_display">Controlling How Clang Displays Diagnostics</h4>
Chris Lattner65a795b2009-04-20 06:00:23 +0000549
Chris Lattner8217f4e2009-04-20 06:26:18 +0000550<p>When Clang emits a diagnostic, it includes rich information in the output,
551and gives you fine-grain control over which information is printed. Clang has
552the ability to print this information, and these are the options that control
553it:</p>
554
Chris Lattner8217f4e2009-04-20 06:26:18 +0000555<ol>
556<li>A file/line/column indicator that shows exactly where the diagnostic occurs
557 in your code [<a href="#opt_fshow-column">-fshow-column</a>, <a
558 href="#opt_fshow-source-location">-fshow-source-location</a>].</li>
559<li>A categorization of the diagnostic as a note, warning, error, or fatal
560 error.</li>
561<li>A text string that describes what the problem is.</li>
562<li>An option that indicates how to control the diagnostic (for diagnostics that
563 support it) [<a
564 href="#opt_fdiagnostics-show-option">-fdiagnostics-show-option</a>].</li>
Chris Lattner3f145382010-05-24 21:35:18 +0000565<li>A <a href="#diagnostics_categories">high-level category</a> for the
566 diagnostic for clients that want to group diagnostics by class (for
567 diagnostics that support it) [<a
Chris Lattner28a43a42010-05-05 01:35:28 +0000568 href="#opt_fdiagnostics-show-category">-fdiagnostics-show-category</a>].</li>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000569<li>The line of source code that the issue occurs on, along with a caret and
570 ranges that indicate the important locations [<a
571 href="opt_fcaret-diagnostics">-fcaret-diagnostics</a>].</li>
572<li>"FixIt" information, which is a concise explanation of how to fix the
573 problem (when Clang is certain it knows) [<a
574 href="opt_fdiagnostics-fixit-info">-fdiagnostics-fixit-info</a>].</li>
575<li>A machine-parsable representation of the ranges involved (off by
576 default) [<a
Chris Lattner2a9cc232009-04-21 05:35:32 +0000577 href="opt_fdiagnostics-print-source-range-info">-fdiagnostics-print-source-range-info</a>].</li>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000578</ol>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000579
580<p>For more information please see <a href="#cl_diag_formatting">Formatting of
581Diagnostics</a>.</p>
582
Chris Lattner3f145382010-05-24 21:35:18 +0000583
Chris Lattner3401cf82009-07-12 21:22:10 +0000584<h4 id="diagnostics_mappings">Diagnostic Mappings</h4>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000585
Chris Lattner3401cf82009-07-12 21:22:10 +0000586<p>All diagnostics are mapped into one of these 5 classes:</p>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000587
Chris Lattner3401cf82009-07-12 21:22:10 +0000588<ul>
589<li>Ignored</li>
590<li>Note</li>
591<li>Warning</li>
592<li>Error</li>
593<li>Fatal</li>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000594</ul>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000595
Chris Lattner3f145382010-05-24 21:35:18 +0000596<h4 id="diagnostics_categories">Diagnostic Categories</h4>
597
598<p>Though not shown by default, diagnostics may each be associated with a
599 high-level category. This category is intended to make it possible to triage
600 builds that produce a large number of errors or warnings in a grouped way.
601</p>
602
603<p>Categories are not shown by default, but they can be turned on with the
604<a href="#opt_fdiagnostics-show-category">-fdiagnostics-show-category</a> option.
605When set to "<tt>name</tt>", the category is printed textually in the diagnostic
606output. When it is set to "<tt>id</tt>", a category number is printed. The
607mapping of category names to category id's can be obtained by running '<tt>clang
608 --print-diagnostic-categories</tt>'.
609</p>
610
611<h4 id="diagnostics_commandline">Controlling Diagnostics via Command Line
612 Flags</h4>
Chris Lattner8217f4e2009-04-20 06:26:18 +0000613
614<p>-W flags, -pedantic, etc</p>
615
Chris Lattner3401cf82009-07-12 21:22:10 +0000616<h4 id="diagnostics_pragmas">Controlling Diagnostics via Pragmas</h4>
617
618<p>Clang can also control what diagnostics are enabled through the use of
619pragmas in the source code. This is useful for turning off specific warnings
620in a section of source code. Clang supports GCC's pragma for compatibility
621with existing source code, as well as several extensions. </p>
622
623<p>The pragma may control any warning that can be used from the command line.
624Warnings may be set to ignored, warning, error, or fatal. The following
625example code will tell Clang or GCC to ignore the -Wall warnings:</p>
626
627<pre>
628#pragma GCC diagnostic ignored "-Wall"
629</pre>
630
Chris Lattnerd462b6a2011-01-24 03:47:59 +0000631<p>In addition to all of the functionality provided by GCC's pragma, Clang
Chris Lattner3401cf82009-07-12 21:22:10 +0000632also allows you to push and pop the current warning state. This is particularly
633useful when writing a header file that will be compiled by other people, because
634you don't know what warning flags they build with.</p>
635
636<p>In the below example
637-Wmultichar is ignored for only a single line of code, after which the
638diagnostics return to whatever state had previously existed.</p>
639
640<pre>
641#pragma clang diagnostic push
642#pragma clang diagnostic ignored "-Wmultichar"
643
644char b = 'df'; // no warning.
645
646#pragma clang diagnostic pop
647</pre>
648
649<p>The push and pop pragmas will save and restore the full diagnostic state of
650the compiler, regardless of how it was set. That means that it is possible to
651use push and pop around GCC compatible diagnostics and Clang will push and pop
652them appropriately, while GCC will ignore the pushes and pops as unknown
653pragmas. It should be noted that while Clang supports the GCC pragma, Clang and
654GCC do not support the exact same set of warnings, so even when using GCC
655compatible #pragmas there is no guarantee that they will have identical behaviour
656on both compilers. </p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000657
Richard Smithf122a132012-06-13 20:27:03 +0000658<h4 id="diagnostics_systemheader">Controlling Diagnostics in System Headers</h4>
659
660<p>Warnings are suppressed when they occur in system headers. By default, an
661included file is treated as a system header if it is found in an include path
662specified by <tt>-isystem</tt>, but this can be overridden in several ways.</p>
663
664<p>The <tt>system_header</tt> pragma can be used to mark the current file as
665being a system header. No warnings will be produced from the location of the
666pragma onwards within the same file.</p>
667
668<pre>
669char a = 'xy'; // warning
670
671#pragma clang system_header
672
673char b = 'ab'; // no warning
674</pre>
675
676<p>The <tt>-isystem-prefix</tt> and <tt>-ino-system-prefix</tt> command-line
677arguments can be used to override whether subsets of an include path are treated
678as system headers. When the name in a <tt>#include</tt> directive is found
679within a header search path and starts with a system prefix, the header is
680treated as a system header. The last prefix on the command-line which matches
681the specified header name takes precedence. For instance:</p>
682
683<pre>
684clang -Ifoo -isystem bar -isystem-prefix x/ -ino-system-prefix x/y/
685</pre>
686
687<p>Here, <tt>#include "x/a.h"</tt> is treated as including a system header, even
688if the header is found in <tt>foo</tt>, and <tt>#include "x/y/b.h"</tt> is
689treated as not including a system header, even if the header is found in
690<tt>bar</tt>.
691</p>
692
693<p>A <tt>#include</tt> directive which finds a file relative to the current
694directory is treated as including a system header if the including file is
695treated as a system header.</p>
696
Ted Kremenekf391fa72011-08-18 01:17:05 +0000697<h4 id="diagnostics_enable_everything">Enabling All Warnings</h4>
698
699<p>In addition to the traditional <tt>-W</tt> flags, one can enable <b>all</b>
700 warnings by passing <tt>-Weverything</tt>.
701 This works as expected with <tt>-Werror</tt>,
702 and also includes the warnings from <tt>-pedantic</tt>.</p>
703
704<p>Note that when combined with <tt>-w</tt> (which disables all warnings), that
705 flag wins.</p>
706
Ted Kremenek2fb11eb2010-08-24 18:12:35 +0000707<h4 id="analyzer_diagnositics">Controlling Static Analyzer Diagnostics</h4>
708
709<p>While not strictly part of the compiler, the diagnostics from Clang's <a
710href="http://clang-analyzer.llvm.org">static analyzer</a> can also be influenced
Anna Zaks843f0e82012-06-16 00:30:21 +0000711by the user via changes to the source code. See the avaliable
712<a href = "http://clang-analyzer.llvm.org/annotations.html" >annotations</a> and
713the analyzer's
714<a href= "http://clang-analyzer.llvm.org/faq.html#exclude_code" >FAQ page</a> for
715more information.
Ted Kremenek2fb11eb2010-08-24 18:12:35 +0000716</ul>
717
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000718<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
719<h3 id="precompiledheaders">Precompiled Headers</h3>
720<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
721
Chris Lattner5c3074f2009-04-20 04:37:38 +0000722<p><a href="http://en.wikipedia.org/wiki/Precompiled_header">Precompiled
723headers</a> are a general approach employed by many compilers to reduce
724compilation time. The underlying motivation of the approach is that it is
725common for the same (and often large) header files to be included by
726multiple source files. Consequently, compile times can often be greatly improved
727by caching some of the (redundant) work done by a compiler to process headers.
728Precompiled header files, which represent one of many ways to implement
729this optimization, are literally files that represent an on-disk cache that
730contains the vital information necessary to reduce some of the work
731needed to process a corresponding header file. While details of precompiled
Chris Lattnerd462b6a2011-01-24 03:47:59 +0000732headers vary between compilers, precompiled headers have been shown to be
Chris Lattner5c3074f2009-04-20 04:37:38 +0000733highly effective at speeding up program compilation on systems with very large
734system headers (e.g., Mac OS/X).</p>
735
Douglas Gregorf4d59532009-06-03 22:37:00 +0000736<h4>Generating a PCH File</h4>
Chris Lattner5c3074f2009-04-20 04:37:38 +0000737
Douglas Gregorf4d59532009-06-03 22:37:00 +0000738<p>To generate a PCH file using Clang, one invokes Clang with
Chris Lattner5c3074f2009-04-20 04:37:38 +0000739the <b><tt>-x <i>&lt;language&gt;</i>-header</tt></b> option. This mirrors the
740interface in GCC for generating PCH files:</p>
741
742<pre>
743 $ gcc -x c-header test.h -o test.h.gch
Douglas Gregorf4d59532009-06-03 22:37:00 +0000744 $ clang -x c-header test.h -o test.h.pch
Chris Lattner5c3074f2009-04-20 04:37:38 +0000745</pre>
746
Douglas Gregorf4d59532009-06-03 22:37:00 +0000747<h4>Using a PCH File</h4>
Chris Lattner5c3074f2009-04-20 04:37:38 +0000748
Douglas Gregorf4d59532009-06-03 22:37:00 +0000749<p>A PCH file can then be used as a prefix header when a
Chris Lattner5c3074f2009-04-20 04:37:38 +0000750<b><tt>-include</tt></b> option is passed to <tt>clang</tt>:</p>
751
752<pre>
753 $ clang -include test.h test.c -o test
754</pre>
755
Douglas Gregorf4d59532009-06-03 22:37:00 +0000756<p>The <tt>clang</tt> driver will first check if a PCH file for <tt>test.h</tt>
Chris Lattner5c3074f2009-04-20 04:37:38 +0000757is available; if so, the contents of <tt>test.h</tt> (and the files it includes)
Douglas Gregorf4d59532009-06-03 22:37:00 +0000758will be processed from the PCH file. Otherwise, Clang falls back to
Chris Lattner5c3074f2009-04-20 04:37:38 +0000759directly processing the content of <tt>test.h</tt>. This mirrors the behavior of
760GCC.</p>
761
Douglas Gregorf4d59532009-06-03 22:37:00 +0000762<p><b>NOTE:</b> Clang does <em>not</em> automatically use PCH files
Chris Lattner5c3074f2009-04-20 04:37:38 +0000763for headers that are directly included within a source file. For example:</p>
764
765<pre>
Chris Lattnere42ec542009-06-13 20:35:58 +0000766 $ clang -x c-header test.h -o test.h.pch
Chris Lattner5c3074f2009-04-20 04:37:38 +0000767 $ cat test.c
768 #include "test.h"
769 $ clang test.c -o test
770</pre>
771
Douglas Gregorf4d59532009-06-03 22:37:00 +0000772<p>In this example, <tt>clang</tt> will not automatically use the PCH file for
Chris Lattner5c3074f2009-04-20 04:37:38 +0000773<tt>test.h</tt> since <tt>test.h</tt> was included directly in the source file
774and not specified on the command line using <tt>-include</tt>.</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000775
Douglas Gregore650c8c2009-07-07 00:12:59 +0000776<h4>Relocatable PCH Files</h4>
777<p>It is sometimes necessary to build a precompiled header from headers that
778are not yet in their final, installed locations. For example, one might build a
779precompiled header within the build tree that is then meant to be installed
780alongside the headers. Clang permits the creation of "relocatable" precompiled
781headers, which are built with a given path (into the build directory) and can
782later be used from an installed location.</p>
783
784<p>To build a relocatable precompiled header, place your headers into a
785subdirectory whose structure mimics the installed location. For example, if you
786want to build a precompiled header for the header <code>mylib.h</code> that
787will be installed into <code>/usr/include</code>, create a subdirectory
788<code>build/usr/include</code> and place the header <code>mylib.h</code> into
789that subdirectory. If <code>mylib.h</code> depends on other headers, then
790they can be stored within <code>build/usr/include</code> in a way that mimics
791the installed location.</p>
792
793<p>Building a relocatable precompiled header requires two additional arguments.
794First, pass the <code>--relocatable-pch</code> flag to indicate that the
795resulting PCH file should be relocatable. Second, pass
796<code>-isysroot /path/to/build</code>, which makes all includes for your
797library relative to the build directory. For example:</p>
798
799<pre>
800 # clang -x c-header --relocatable-pch -isysroot /path/to/build /path/to/build/mylib.h mylib.h.pch
801</pre>
802
803<p>When loading the relocatable PCH file, the various headers used in the PCH
804file are found from the system header root. For example, <code>mylib.h</code>
805can be found in <code>/usr/include/mylib.h</code>. If the headers are installed
806in some other system root, the <code>-isysroot</code> option can be used provide
807a different system root from which the headers will be based. For example,
808<code>-isysroot /Developer/SDKs/MacOSX10.4u.sdk</code> will look for
809<code>mylib.h</code> in
810<code>/Developer/SDKs/MacOSX10.4u.sdk/usr/include/mylib.h</code>.</p>
811
812<p>Relocatable precompiled headers are intended to be used in a limited number
813of cases where the compilation environment is tightly controlled and the
814precompiled header cannot be generated after headers have been installed.
815Relocatable precompiled headers also have some performance impact, because
816the difference in location between the header locations at PCH build time vs.
817at the time of PCH use requires one of the PCH optimizations,
818<code>stat()</code> caching, to be disabled. However, this change is only
819likely to affect PCH files that reference a large number of headers.</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000820
Mike Stump53664ca2009-12-14 23:53:10 +0000821<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
822<h3 id="codegen">Controlling Code Generation</h3>
823<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
824
825<p>Clang provides a number of ways to control code generation. The options are listed below.</p>
826
827<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000828<dl>
Mike Stump53664ca2009-12-14 23:53:10 +0000829<dt id="opt_fcatch-undefined-behavior"><b>-fcatch-undefined-behavior</b>: Turn
830on runtime code generation to check for undefined behavior.</dt>
831
832<dd>This option, which defaults to off, controls whether or not Clang
Chris Lattnerd462b6a2011-01-24 03:47:59 +0000833adds runtime checks for undefined runtime behavior. If a check fails,
Mike Stump53664ca2009-12-14 23:53:10 +0000834<tt>__builtin_trap()</tt> is used to indicate failure.
835The checks are:
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000836<ul>
Chris Lattnerd462b6a2011-01-24 03:47:59 +0000837<li>Subscripting where the static type of one operand is a variable
Mike Stump88b2a172009-12-16 03:25:12 +0000838 which is decayed from an array type and the other operand is
839 greater than the size of the array or less than zero.</li>
Mike Stump53664ca2009-12-14 23:53:10 +0000840<li>Shift operators where the amount shifted is greater or equal to the
841 promoted bit-width of the left-hand-side or less than zero.</li>
Mike Stump8f6a3ed2009-12-16 03:18:14 +0000842<li>If control flow reaches __builtin_unreachable.
843<li>When llvm implements more __builtin_object_size support, reads and
844 writes for objects that __builtin_object_size indicates we aren't
845 accessing valid memory. Bit-fields and vectors are not yet checked.
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000846</ul>
Mike Stump53664ca2009-12-14 23:53:10 +0000847</dd>
848
Kostya Serebryany48a8cd92012-03-01 23:14:19 +0000849<dt id="opt_faddress-sanitizer"><b>-f[no-]address-sanitizer</b>:
850Turn on <a href="AddressSanitizer.html">AddressSanitizer</a>,
851a memory error detector.
852
853<dt id="opt_fthread-sanitizer"><b>-f[no-]thread-sanitizer</b>:
854Turn on ThreadSanitizer, an <em>experimental</em> data race detector.
855Not ready for widespread use.
856
Nuno Lopesaa526242009-12-17 10:00:52 +0000857<dt id="opt_fno-assume-sane-operator-new"><b>-fno-assume-sane-operator-new</b>:
858Don't assume that the C++'s new operator is sane.</dt>
Nuno Lopesb23f20d2009-12-17 10:15:49 +0000859<dd>This option tells the compiler to do not assume that C++'s global new
Chris Lattnerd462b6a2011-01-24 03:47:59 +0000860operator will always return a pointer that does not
Nuno Lopesaa526242009-12-17 10:00:52 +0000861alias any other pointer when the function returns.</dd>
Evan Chengfda026b2011-04-08 22:18:01 +0000862
Evan Cheng4cf4b592011-04-08 22:34:21 +0000863<dt id="opt_ftrap-function"><b>-ftrap-function=[name]</b>: Instruct code
Evan Chengfda026b2011-04-08 22:18:01 +0000864generator to emit a function call to the specified function name for
865<tt>__builtin_trap()</tt>.</dt>
866
867<dd>LLVM code generator translates <tt>__builtin_trap()</tt> to a trap
868instruction if it is supported by the target ISA. Otherwise, the builtin is
869translated into a call to <tt>abort</tt>. If this option is set, then the code
870generator will always lower the builtin to a call to the specified function
871regardless of whether the target ISA has a trap instruction. This option is
Chris Lattner02e266b2011-04-08 22:58:43 +0000872useful for environments (e.g. deeply embedded) where a trap cannot be properly
873handled, or when some custom behavior is desired.</dd>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +0000874</dl>
Nuno Lopesaa526242009-12-17 10:00:52 +0000875
Alexey Samsonov5ab52492012-05-30 06:55:10 +0000876<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
877<h3 id="debuginfosize">Controlling Size of Debug Information</h3>
878<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
879
880<p>Debug info kind generated by Clang can be set by one of the flags listed
881below. If multiple flags are present, the last one is used.</p>
882
883<!-- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -->
884<dl>
885<dt id="opt_g0"><b>-g0</b>: Don't generate any debug info (default).
886
887<dt id="opt_gline-tables-only"><b>-gline-tables-only</b>:
888Generate line number tables only.
889<dd>
890This kind of debug info allows to obtain stack traces with function
891names, file names and line numbers (by such tools as
892gdb or addr2line). It doesn't contain any other data (e.g.
893description of local variables or function parameters).
894</dd>
895
896<dt id="opt_g"><b>-g</b>: Generate complete debug info.
897</dl>
898
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000899<!-- ======================================================================= -->
900<h2 id="c">C Language Features</h2>
901<!-- ======================================================================= -->
902
Eli Friedman660a5ac2009-04-28 18:48:34 +0000903<p>The support for standard C in clang is feature-complete except for the C99
904floating-point pragmas.</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000905
906<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
Eli Friedman660a5ac2009-04-28 18:48:34 +0000907<h3 id="c_ext">Extensions supported by clang</h3>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000908<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
909
Eli Friedman660a5ac2009-04-28 18:48:34 +0000910<p>See <a href="LanguageExtensions.html">clang language extensions</a>.</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000911
Eli Friedman660a5ac2009-04-28 18:48:34 +0000912<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
913<h3 id="c_modes">Differences between various standard modes</h3>
914<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000915
Eli Friedman660a5ac2009-04-28 18:48:34 +0000916<p>clang supports the -std option, which changes what language mode clang uses.
917The supported modes for C are c89, gnu89, c94, c99, gnu99 and various aliases
918for those modes. If no -std option is specified, clang defaults to gnu99 mode.
919</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +0000920
Eli Friedman660a5ac2009-04-28 18:48:34 +0000921<p>Differences between all c* and gnu* modes:</p>
922<ul>
923<li>c* modes define "__STRICT_ANSI__".</li>
Eli Friedman26fa0ed2009-05-27 23:02:57 +0000924<li>Target-specific defines not prefixed by underscores, like "linux", are
925defined in gnu* modes.</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000926<li>Trigraphs default to being off in gnu* modes; they can be enabled by the
927-trigraphs option.</li>
928<li>The parser recognizes "asm" and "typeof" as keywords in gnu* modes; the
929variants "__asm__" and "__typeof__" are recognized in all modes.</li>
Eli Friedmanb0ac5452009-05-16 23:17:30 +0000930<li>The Apple "blocks" extension is recognized by default in gnu* modes
931on some platforms; it can be enabled in any mode with the "-fblocks"
932option.</li>
Chris Lattner741be6a2011-06-15 00:41:40 +0000933<li>Arrays that are VLA's according to the standard, but which can be constant
934 folded by the frontend are treated as fixed size arrays. This occurs for
935 things like "int X[(1, 2)];", which is technically a VLA. c* modes are
936 strictly compliant and treat these as VLAs.</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000937</ul>
938
939<p>Differences between *89 and *99 modes:</p>
940<ul>
941<li>The *99 modes default to implementing "inline" as specified in C99, while
942the *89 modes implement the GNU version. This can be overridden for individual
943functions with the __gnu_inline__ attribute.</li>
Eli Friedman26fa0ed2009-05-27 23:02:57 +0000944<li>Digraphs are not recognized in c89 mode.</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000945<li>The scope of names defined inside a "for", "if", "switch", "while", or "do"
946statement is different. (example: "if ((struct x {int x;}*)0) {}".)</li>
947<li>__STDC_VERSION__ is not defined in *89 modes.</li>
Eli Friedman26fa0ed2009-05-27 23:02:57 +0000948<li>"inline" is not recognized as a keyword in c89 mode.</li>
949<li>"restrict" is not recognized as a keyword in *89 modes.</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000950<li>Commas are allowed in integer constant expressions in *99 modes.</li>
951<li>Arrays which are not lvalues are not implicitly promoted to pointers in
952*89 modes.</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000953<li>Some warnings are different.</li>
954</ul>
955
956<p>c94 mode is identical to c89 mode except that digraphs are enabled in
957c94 mode (FIXME: And __STDC_VERSION__ should be defined!).</p>
958
959<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
960<h3 id="c_unimpl_gcc">GCC extensions not implemented yet</h3>
961<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
962
963<p>clang tries to be compatible with gcc as much as possible, but some gcc
964extensions are not implemented yet:</p>
965
966<ul>
Eli Friedman660a5ac2009-04-28 18:48:34 +0000967
Eli Friedman660a5ac2009-04-28 18:48:34 +0000968<li>clang does not support #pragma weak
Eli Friedman4da92552009-06-02 08:21:31 +0000969(<a href="http://llvm.org/bugs/show_bug.cgi?id=3679">bug 3679</a>). Due to
Eli Friedman660a5ac2009-04-28 18:48:34 +0000970the uses described in the bug, this is likely to be implemented at some
971point, at least partially.</li>
972
Eli Friedman660a5ac2009-04-28 18:48:34 +0000973<li>clang does not support decimal floating point types (_Decimal32 and
974friends) or fixed-point types (_Fract and friends); nobody has expressed
975interest in these features yet, so it's hard to say when they will be
976implemented.</li>
977
978<li>clang does not support nested functions; this is a complex feature which
979is infrequently used, so it is unlikely to be implemented anytime soon.</li>
980
Daniel Dunbar05fa6292009-05-12 23:12:07 +0000981<li>clang does not support global register variables, this is unlikely
Eli Friedmanca130bd2009-06-12 20:04:25 +0000982to be implemented soon because it requires additional LLVM backend support.
983</li>
Daniel Dunbar05fa6292009-05-12 23:12:07 +0000984
985<li>clang does not support static initialization of flexible array
986members. This appears to be a rarely used extension, but could be
987implemented pending user demand.</li>
988
Eli Friedmanca130bd2009-06-12 20:04:25 +0000989<li>clang does not support __builtin_va_arg_pack/__builtin_va_arg_pack_len.
990This is used rarely, but in some potentially interesting places, like the
991glibc headers, so it may be implemented pending user demand. Note that
992because clang pretends to be like GCC 4.2, and this extension was introduced
993in 4.3, the glibc headers will not try to use this extension with clang at
994the moment.</li>
995
996<li>clang does not support the gcc extension for forward-declaring function
997parameters; this has not showed up in any real-world code yet, though, so it
998might never be implemented.</li>
999
Eli Friedman660a5ac2009-04-28 18:48:34 +00001000</ul>
1001
1002<p>This is not a complete list; if you find an unsupported extension
1003missing from this list, please send an e-mail to cfe-dev. This list
1004currently excludes C++; see <a href="#cxx">C++ Language Features</a>.
1005Also, this list does not include bugs in mostly-implemented features; please
1006see the <a href="http://llvm.org/bugs/buglist.cgi?quicksearch=product%3Aclang+component%3A-New%2BBugs%2CAST%2CBasic%2CDriver%2CHeaders%2CLLVM%2BCodeGen%2Cparser%2Cpreprocessor%2CSemantic%2BAnalyzer">
1007bug tracker</a> for known existing bugs (FIXME: Is there a section for
1008bug-reporting guidelines somewhere?).</p>
1009
1010<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1011<h3 id="c_unsupp_gcc">Intentionally unsupported GCC extensions</h3>
1012<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1013
Eli Friedman0b326002009-06-12 20:11:05 +00001014<ul>
1015
Eli Friedman2f3fca02009-06-12 20:08:48 +00001016<li>clang does not support the gcc extension that allows variable-length arrays
Chris Lattnerd462b6a2011-01-24 03:47:59 +00001017in structures. This is for a few reasons: one, it is tricky
Eli Friedman660a5ac2009-04-28 18:48:34 +00001018to implement, two, the extension is completely undocumented, and three, the
Chris Lattnerb9d511c2010-10-28 02:20:32 +00001019extension appears to be rarely used. Note that clang <em>does</em> support
1020flexible array members (arrays with a zero or unspecified size at the end of
1021a structure).</li>
Eli Friedman660a5ac2009-04-28 18:48:34 +00001022
Eli Friedmanca130bd2009-06-12 20:04:25 +00001023<li>clang does not have an equivalent to gcc's "fold"; this means that
1024clang doesn't accept some constructs gcc might accept in contexts where a
Eli Friedman248f9732011-06-13 23:12:01 +00001025constant expression is required, like "x-x" where x is a variable.</li>
Eli Friedmanca130bd2009-06-12 20:04:25 +00001026
Eli Friedmanca130bd2009-06-12 20:04:25 +00001027<li>clang does not support __builtin_apply and friends; this extension is
1028extremely obscure and difficult to implement reliably.</li>
1029
Eli Friedman0b326002009-06-12 20:11:05 +00001030</ul>
1031
Eli Friedman660a5ac2009-04-28 18:48:34 +00001032<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1033<h3 id="c_ms">Microsoft extensions</h3>
1034<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1035
1036<p>clang has some experimental support for extensions from
1037Microsoft Visual C++; to enable it, use the -fms-extensions command-line
Eli Friedmana1821b52009-06-08 06:21:03 +00001038option. This is the default for Windows targets. Note that the
1039support is incomplete; enabling Microsoft extensions will silently drop
1040certain constructs (including __declspec and Microsoft-style asm statements).
1041</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001042
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +00001043<ul>
Douglas Gregord3b227d2010-12-14 16:21:49 +00001044<li>clang allows setting _MSC_VER with -fmsc-version=. It defaults to 1300 which
Michael J. Spencerdae4ac42010-10-21 05:21:48 +00001045is the same as Visual C/C++ 2003. Any number is supported and can greatly affect
1046what Windows SDK and c++stdlib headers clang can compile. This option will be
1047removed when clang supports the full set of MS extensions required for these
1048headers.</li>
1049
Daniel Dunbar05fa6292009-05-12 23:12:07 +00001050<li>clang does not support the Microsoft extension where anonymous
Daniel Dunbar869e0542009-05-13 00:23:53 +00001051record members can be declared using user defined typedefs.</li>
Daniel Dunbar05fa6292009-05-12 23:12:07 +00001052
Daniel Dunbar9375ed12009-05-13 21:40:49 +00001053<li>clang supports the Microsoft "#pragma pack" feature for
1054controlling record layout. GCC also contains support for this feature,
1055however where MSVC and GCC are incompatible clang follows the MSVC
1056definition.</li>
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +00001057</ul>
Daniel Dunbar9375ed12009-05-13 21:40:49 +00001058
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001059<!-- ======================================================================= -->
Richard Smithbdb10182011-11-21 20:54:59 +00001060<h2 id="cxx">C++ Language Features</h2>
1061<!-- ======================================================================= -->
1062
1063<p>clang fully implements all of standard C++98 except for exported templates
1064(which were removed in C++11), and
1065<a href="http://clang.llvm.org/cxx_status.html">many C++11 features</a> are also
1066implemented.</p>
1067
1068<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1069<h3 id="cxx_implimits">Controlling implementation limits</h3>
1070<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1071
1072<p><b>-fconstexpr-depth=N</b>: Sets the limit for recursive constexpr function
1073invocations to N. The default is 512.</p>
1074
1075<p><b>-ftemplate-depth=N</b>: Sets the limit for recursively nested template
1076instantiations to N. The default is 1024.</p>
1077
1078<!-- ======================================================================= -->
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001079<h2 id="target_features">Target-Specific Features and Limitations</h2>
1080<!-- ======================================================================= -->
1081
1082
1083<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1084<h3 id="target_arch">CPU Architectures Features and Limitations</h3>
1085<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1086
1087<!-- ======================== -->
1088<h4 id="target_arch_x86">X86</h4>
1089<!-- ======================== -->
Daniel Dunbarbcaf7aa2010-09-19 19:26:59 +00001090
1091<p>The support for X86 (both 32-bit and 64-bit) is considered stable on Darwin
1092(Mac OS/X), Linux, FreeBSD, and Dragonfly BSD: it has been tested to correctly
1093compile many large C, C++, Objective-C, and Objective-C++ codebases.</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001094
NAKAMURA Takumiddf68ff2011-04-05 04:31:31 +00001095<p>On x86_64-mingw32, passing i128(by value) is incompatible to Microsoft x64
1096calling conversion. You might need to tweak WinX86_64ABIInfo::classify()
1097in lib/CodeGen/TargetInfo.cpp.</p>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001098
Eli Friedman3b658d32009-06-08 05:12:39 +00001099<!-- ======================== -->
1100<h4 id="target_arch_arm">ARM</h4>
1101<!-- ======================== -->
Daniel Dunbarbcaf7aa2010-09-19 19:26:59 +00001102
1103<p>The support for ARM (specifically ARMv6 and ARMv7) is considered stable on
1104Darwin (iOS): it has been tested to correctly compile many large C, C++,
Bob Wilson4ea8dfa2011-01-10 17:55:14 +00001105Objective-C, and Objective-C++ codebases. Clang only supports a limited number
1106of ARM architectures. It does not yet fully support ARMv5, for example.</p>
Eli Friedman3b658d32009-06-08 05:12:39 +00001107
1108<!-- ======================== -->
1109<h4 id="target_arch_other">Other platforms</h4>
1110<!-- ======================== -->
1111clang currently contains some support for PPC and Sparc; however, significant
1112pieces of code generation are still missing, and they haven't undergone
1113significant testing.
1114
Eli Friedman3b658d32009-06-08 05:12:39 +00001115<p>clang contains limited support for the MSP430 embedded processor, but both
1116the clang support and the LLVM backend support are highly experimental.
1117
1118<p>Other platforms are completely unsupported at the moment. Adding the
1119minimal support needed for parsing and semantic analysis on a new platform
1120is quite easy; see lib/Basic/Targets.cpp in the clang source tree. This level
1121of support is also sufficient for conversion to LLVM IR for simple programs.
1122Proper support for conversion to LLVM IR requires adding code to
1123lib/CodeGen/CGCall.cpp at the moment; this is likely to change soon, though.
1124Generating assembly requires a suitable LLVM backend.
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001125
1126<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1127<h3 id="target_os">Operating System Features and Limitations</h3>
1128<!-- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = -->
1129
1130<!-- ======================================= -->
1131<h4 id="target_os_darwin">Darwin (Mac OS/X)</h4>
1132<!-- ======================================= -->
1133
Chris Lattner396663b2012-05-04 21:11:08 +00001134<p>None</p>
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001135
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001136<!-- ======================================= -->
1137<h4 id="target_os_win32">Windows</h4>
1138<!-- ======================================= -->
1139
1140<p>Experimental supports are on Cygming.</p>
1141
1142<h5>Cygwin</h5>
1143
1144<p>Clang works on Cygwin-1.7.</p>
1145
1146<h5>MinGW32</h5>
1147
1148<p>Clang works on some mingw32 distributions.
1149Clang assumes directories as below;</p>
1150
1151<ul>
1152<li><tt>C:/mingw/include</tt></li>
1153<li><tt>C:/mingw/lib</tt></li>
1154<li><tt>C:/mingw/lib/gcc/mingw32/4.[3-5].0/include/c++</tt></li>
1155</ul>
1156
NAKAMURA Takumi0e53df62011-11-17 07:54:13 +00001157<p>On MSYS, a few tests might fail.</p>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001158
1159<h5>MinGW-w64</h5>
1160
Douglas Gregordad879a2011-08-30 00:40:12 +00001161<p>For 32-bit (i686-w64-mingw32), and 64-bit (x86_64-w64-mingw32), Clang assumes as below;<p>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001162
1163<ul>
Douglas Gregordad879a2011-08-30 00:40:12 +00001164<li><tt>GCC versions 4.5.0 to 4.5.3, 4.6.0 to 4.6.2, or 4.7.0 (for the C++ header search path)</tt></li>
1165<li><tt>some_directory/bin/gcc.exe</tt></li>
1166<li><tt>some_directory/bin/clang.exe</tt></li>
1167<li><tt>some_directory/bin/clang++.exe</tt></li>
1168<li><tt>some_directory/bin/../include/c++/GCC_version</tt></li>
1169<li><tt>some_directory/bin/../include/c++/GCC_version/x86_64-w64-mingw32</tt></li>
1170<li><tt>some_directory/bin/../include/c++/GCC_version/i686-w64-mingw32</tt></li>
1171<li><tt>some_directory/bin/../include/c++/GCC_version/backward</tt></li>
1172<li><tt>some_directory/bin/../x86_64-w64-mingw32/include</tt></li>
1173<li><tt>some_directory/bin/../i686-w64-mingw32/include</tt></li>
1174<li><tt>some_directory/bin/../include</tt></li>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001175</ul>
1176
David Blaikiea9639622012-04-19 17:21:46 +00001177<p>This directory layout is standard for any toolchain you will find on the official <a href="http://mingw-w64.sourceforge.net">MinGW-w64 website</a>.
Douglas Gregordad879a2011-08-30 00:40:12 +00001178
1179<p>Clang expects the GCC executable &quot;gcc.exe&quot; compiled for i686-w64-mingw32 (or x86_64-w64-mingw32) to be present on PATH.</p>
1180
1181<p><a href="http://llvm.org/bugs/show_bug.cgi?id=9072">Some tests might fail</a>
1182on x86_64-w64-mingw32.</p>
NAKAMURA Takumia75fdb22011-04-04 15:02:41 +00001183
Chris Lattnercf17d9d2009-04-20 04:23:09 +00001184</div>
1185</body>
1186</html>