blob: cf61e9d92bede7c92861a4aa1a9b334a05f0333c [file] [log] [blame]
Sean Hunt7e98b472011-06-23 01:21:01 +00001<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
2 "http://www.w3.org/TR/html4/strict.dtd">
3<!-- Material used from: HTML 4.01 specs: http://www.w3.org/TR/html401/ -->
Chris Lattner5ce933f2009-02-09 08:46:11 +00004<html>
5<head>
Sean Hunt7e98b472011-06-23 01:21:01 +00006 <META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
Eli Friedman0c706c22011-09-19 23:17:44 +00007 <title>Clang Language Extensions</title>
Sean Hunt64f857b2011-06-23 01:22:53 +00008 <link type="text/css" rel="stylesheet" href="../menu.css">
9 <link type="text/css" rel="stylesheet" href="../content.css">
Sean Hunt7e98b472011-06-23 01:21:01 +000010 <style type="text/css">
11 td {
12 vertical-align: top;
13 }
Benjamin Kramer3419d7c2012-01-15 16:42:14 +000014 th { background-color: #ffddaa; }
Sean Hunt7e98b472011-06-23 01:21:01 +000015 </style>
Chris Lattner5ce933f2009-02-09 08:46:11 +000016</head>
17<body>
18
19<!--#include virtual="../menu.html.incl"-->
20
21<div id="content">
22
23<h1>Clang Language Extensions</h1>
24
25<ul>
26<li><a href="#intro">Introduction</a></li>
Chris Lattner148772a2009-06-13 07:13:28 +000027<li><a href="#feature_check">Feature Checking Macros</a></li>
John Thompson92bd8c72009-11-02 22:28:12 +000028<li><a href="#has_include">Include File Checking Macros</a></li>
Chris Lattner81edc9f2009-04-13 02:45:46 +000029<li><a href="#builtinmacros">Builtin Macros</a></li>
Chris Lattner5ce933f2009-02-09 08:46:11 +000030<li><a href="#vectors">Vectors and Extended Vectors</a></li>
John McCall48209082010-11-08 19:48:17 +000031<li><a href="#deprecated">Messages on <tt>deprecated</tt> and <tt>unavailable</tt> attributes</a></li>
32<li><a href="#attributes-on-enumerators">Attributes on enumerators</a></li>
Sean Hunt7e98b472011-06-23 01:21:01 +000033<li><a href="#checking_language_features">Checks for Standard Language Features</a>
Ted Kremenek22c34102009-12-03 02:05:57 +000034 <ul>
35 <li><a href="#cxx_exceptions">C++ exceptions</a></li>
36 <li><a href="#cxx_rtti">C++ RTTI</a></li>
Sean Hunt7e98b472011-06-23 01:21:01 +000037 </ul></li>
38<li><a href="#checking_upcoming_features">Checks for Upcoming Standard Language Features</a>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +000039 <ul>
David Blaikie5090e9f2011-10-18 05:49:30 +000040 <li><a href="#cxx0x">C++11</a>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +000041 <ul>
David Blaikie5090e9f2011-10-18 05:49:30 +000042 <li><a href="#cxx_access_control_sfinae">C++11 SFINAE includes
43 access control</a></li>
44 <li><a href="#cxx_alias_templates">C++11 alias templates</a></li>
45 <li><a href="#cxx_alignas">C++11 alignment specifiers</a></li>
46 <li><a href="#cxx_attributes">C++11 attributes</a></li>
47 <li><a href="#cxx_constexpr">C++11 generalized constant expressions</a></li>
48 <li><a href="#cxx_decltype">C++11 <tt>decltype()</tt></a></li>
49 <li><a href="#cxx_default_function_template_args">C++11 default template arguments in function templates</a></li>
Douglas Gregorf695a692011-11-01 01:19:34 +000050 <li><a href="#cxx_defaulted_functions">C++11 defaulted functions</a></li>
David Blaikie5090e9f2011-10-18 05:49:30 +000051 <li><a href="#cxx_delegating_constructor">C++11 delegating constructors</a></li>
52 <li><a href="#cxx_deleted_functions">C++11 deleted functions</a></li>
53 <li><a href="#cxx_explicit_conversions">C++11 explicit conversion functions</a></li>
54 <li><a href="#cxx_generalized_initializers">C++11 generalized initializers</a></li>
55 <li><a href="#cxx_implicit_moves">C++11 implicit move constructors/assignment operators</a></li>
56 <li><a href="#cxx_inheriting_constructors">C++11 inheriting constructors</a></li>
57 <li><a href="#cxx_inline_namespaces">C++11 inline namespaces</a></li>
58 <li><a href="#cxx_lambdas">C++11 lambdas</a></li>
59 <li><a href="#cxx_noexcept">C++11 noexcept specification</a></li>
60 <li><a href="#cxx_nonstatic_member_init">C++11 in-class non-static data member initialization</a></li>
61 <li><a href="#cxx_nullptr">C++11 nullptr</a></li>
62 <li><a href="#cxx_override_control">C++11 override control</a></li>
63 <li><a href="#cxx_range_for">C++11 range-based for loop</a></li>
64 <li><a href="#cxx_raw_string_literals">C++11 raw string literals</a></li>
65 <li><a href="#cxx_rvalue_references">C++11 rvalue references</a></li>
66 <li><a href="#cxx_reference_qualified_functions">C++11 reference-qualified functions</a></li>
67 <li><a href="#cxx_static_assert">C++11 <tt>static_assert()</tt></a></li>
68 <li><a href="#cxx_auto_type">C++11 type inference</a></li>
69 <li><a href="#cxx_strong_enums">C++11 strongly-typed enumerations</a></li>
70 <li><a href="#cxx_trailing_return">C++11 trailing return type</a></li>
71 <li><a href="#cxx_unicode_literals">C++11 Unicode string literals</a></li>
72 <li><a href="#cxx_unrestricted_unions">C++11 unrestricted unions</a></li>
73 <li><a href="#cxx_user_literals">C++11 user-defined literals</a></li>
74 <li><a href="#cxx_variadic_templates">C++11 variadic templates</a></li>
Douglas Gregorece38942011-08-29 17:28:38 +000075 </ul></li>
Benjamin Kramerffbe9b92011-12-23 17:00:35 +000076 <li><a href="#c11">C11</a>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +000077 <ul>
Benjamin Kramerffbe9b92011-12-23 17:00:35 +000078 <li><a href="#c_alignas">C11 alignment specifiers</a></li>
79 <li><a href="#c_generic_selections">C11 generic selections</a></li>
80 <li><a href="#c_static_assert">C11 <tt>_Static_assert()</tt></a></li>
Sean Hunt7e98b472011-06-23 01:21:01 +000081 </ul></li>
82 </ul> </li>
Douglas Gregorafdf1372011-02-03 21:57:35 +000083<li><a href="#checking_type_traits">Checks for Type Traits</a></li>
Chris Lattner5ce933f2009-02-09 08:46:11 +000084<li><a href="#blocks">Blocks</a></li>
Douglas Gregor926df6c2011-06-11 01:09:30 +000085<li><a href="#objc_features">Objective-C Features</a>
86 <ul>
87 <li><a href="#objc_instancetype">Related result types</a></li>
John McCallf85e1932011-06-15 23:02:42 +000088 <li><a href="#objc_arc">Automatic reference counting</a></li>
Douglas Gregor5471bc82011-09-08 17:18:35 +000089 <li><a href="#objc_fixed_enum">Enumerations with a fixed underlying type</a></li>
Douglas Gregor926df6c2011-06-11 01:09:30 +000090 </ul>
91</li>
Douglas Gregorcb54d432009-02-13 00:57:04 +000092<li><a href="#overloading-in-c">Function Overloading in C</a></li>
Eli Friedman0c706c22011-09-19 23:17:44 +000093<li><a href="#complex-list-init">Initializer lists for complex numbers in C</a></li>
Chris Lattner5ce933f2009-02-09 08:46:11 +000094<li><a href="#builtins">Builtin Functions</a>
95 <ul>
Chris Lattner5ce933f2009-02-09 08:46:11 +000096 <li><a href="#__builtin_shufflevector">__builtin_shufflevector</a></li>
Chris Lattner21190d52009-09-21 03:09:59 +000097 <li><a href="#__builtin_unreachable">__builtin_unreachable</a></li>
Chris Lattner23aa9c82011-04-09 03:57:26 +000098 <li><a href="#__sync_swap">__sync_swap</a></li>
Douglas Gregorafdf1372011-02-03 21:57:35 +000099 </ul>
Chris Lattner5ce933f2009-02-09 08:46:11 +0000100</li>
Chris Lattner1177f912009-04-09 19:58:15 +0000101<li><a href="#targetspecific">Target-Specific Extensions</a>
102 <ul>
103 <li><a href="#x86-specific">X86/X86-64 Language Extensions</a></li>
104 </ul>
105</li>
John McCall87494012011-03-18 03:51:49 +0000106<li><a href="#analyzerspecific">Static Analysis-Specific Extensions</a></li>
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000107<li><a href="#dynamicanalyzerspecific">Dynamic Analysis-Specific Extensions</a>
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000108 <ul>
109 <li><a href="#address_sanitizer">AddressSanitizer</a></li>
110 </ul>
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000111</li>
112<li><a href="#threadsafety">Thread Safety Annotation Checking</a>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +0000113 <ul>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +0000114 <li><a href="#ts_noanal"><tt>no_thread_safety_analysis</tt></a></li>
115 <li><a href="#ts_lockable"><tt>lockable</tt></a></li>
116 <li><a href="#ts_scopedlockable"><tt>scoped_lockable</tt></a></li>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +0000117 <li><a href="#ts_guardedvar"><tt>guarded_var</tt></a></li>
118 <li><a href="#ts_ptguardedvar"><tt>pt_guarded_var</tt></a></li>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +0000119 <li><a href="#ts_guardedby"><tt>guarded_by(l)</tt></a></li>
120 <li><a href="#ts_ptguardedby"><tt>pt_guarded_by(l)</tt></a></li>
121 <li><a href="#ts_acquiredbefore"><tt>acquired_before(...)</tt></a></li>
122 <li><a href="#ts_acquiredafter"><tt>acquired_after(...)</tt></a></li>
123 <li><a href="#ts_elf"><tt>exclusive_lock_function(...)</tt></a></li>
124 <li><a href="#ts_slf"><tt>shared_lock_function(...)</tt></a></li>
125 <li><a href="#ts_etf"><tt>exclusive_trylock_function(...)</tt></a></li>
126 <li><a href="#ts_stf"><tt>shared_trylock_function(...)</tt></a></li>
127 <li><a href="#ts_uf"><tt>unlock_function(...)</tt></a></li>
128 <li><a href="#ts_lr"><tt>lock_returned(l)</tt></a></li>
129 <li><a href="#ts_le"><tt>locks_excluded(...)</tt></a></li>
130 <li><a href="#ts_elr"><tt>exclusive_locks_required(...)</tt></a></li>
131 <li><a href="#ts_slr"><tt>shared_locks_required(...)</tt></a></li>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +0000132 </ul>
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000133</li>
Chris Lattner5ce933f2009-02-09 08:46:11 +0000134</ul>
135
Chris Lattner5ce933f2009-02-09 08:46:11 +0000136<!-- ======================================================================= -->
137<h2 id="intro">Introduction</h2>
138<!-- ======================================================================= -->
139
140<p>This document describes the language extensions provided by Clang. In
Chris Lattner148772a2009-06-13 07:13:28 +0000141addition to the language extensions listed here, Clang aims to support a broad
Chris Lattner5ce933f2009-02-09 08:46:11 +0000142range of GCC extensions. Please see the <a
143href="http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html">GCC manual</a> for
144more information on these extensions.</p>
145
146<!-- ======================================================================= -->
Chris Lattner148772a2009-06-13 07:13:28 +0000147<h2 id="feature_check">Feature Checking Macros</h2>
148<!-- ======================================================================= -->
149
150<p>Language extensions can be very useful, but only if you know you can depend
Chris Lattnerc70e1932011-03-21 16:25:11 +0000151on them. In order to allow fine-grain features checks, we support three builtin
Chris Lattner148772a2009-06-13 07:13:28 +0000152function-like macros. This allows you to directly test for a feature in your
153code without having to resort to something like autoconf or fragile "compiler
154version checks".</p>
155
156<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +0000157<h3><a name="__has_builtin">__has_builtin</a></h3>
Chris Lattner148772a2009-06-13 07:13:28 +0000158<!-- ======================================================================= -->
159
160<p>This function-like macro takes a single identifier argument that is the name
161of a builtin function. It evaluates to 1 if the builtin is supported or 0 if
162not. It can be used like this:</p>
163
164<blockquote>
165<pre>
166#ifndef __has_builtin // Optional of course.
167 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
168#endif
169
170...
171#if __has_builtin(__builtin_trap)
172 __builtin_trap();
173#else
174 abort();
175#endif
176...
177</pre>
178</blockquote>
179
180
181<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +0000182<h3><a name="__has_feature_extension"> __has_feature and __has_extension</a></h3>
Chris Lattner148772a2009-06-13 07:13:28 +0000183<!-- ======================================================================= -->
184
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000185<p>These function-like macros take a single identifier argument that is the
186name of a feature. <code>__has_feature</code> evaluates to 1 if the feature
187is both supported by Clang and standardized in the current language standard
188or 0 if not (but see <a href="#has_feature_back_compat">below</a>), while
189<code>__has_extension</code> evaluates to 1 if the feature is supported by
190Clang in the current language (either as a language extension or a standard
191language feature) or 0 if not. They can be used like this:</p>
Chris Lattner148772a2009-06-13 07:13:28 +0000192
193<blockquote>
194<pre>
195#ifndef __has_feature // Optional of course.
196 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
197#endif
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000198#ifndef __has_extension
199 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
200#endif
Chris Lattner148772a2009-06-13 07:13:28 +0000201
202...
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000203#if __has_feature(cxx_rvalue_references)
David Blaikie5090e9f2011-10-18 05:49:30 +0000204// This code will only be compiled with the -std=c++11 and -std=gnu++11
205// options, because rvalue references are only standardized in C++11.
Chris Lattner148772a2009-06-13 07:13:28 +0000206#endif
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000207
208#if __has_extension(cxx_rvalue_references)
David Blaikie5090e9f2011-10-18 05:49:30 +0000209// This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000210// and -std=gnu++98 options, because rvalue references are supported as a
211// language extension in C++98.
212#endif
Chris Lattner148772a2009-06-13 07:13:28 +0000213</pre>
214</blockquote>
215
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000216<p id="has_feature_back_compat">For backwards compatibility reasons,
217<code>__has_feature</code> can also be used to test for support for
218non-standardized features, i.e. features not prefixed <code>c_</code>,
219<code>cxx_</code> or <code>objc_</code>.</p>
220
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000221<p id="has_feature_for_non_language_features">
222Another use of <code>__has_feature</code> is to check for compiler features
223not related to the language standard, such as e.g.
224<a href="AddressSanitizer.html">AddressSanitizer</a>.
225
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000226<p>If the <code>-pedantic-errors</code> option is given,
227<code>__has_extension</code> is equivalent to <code>__has_feature</code>.</p>
228
Chris Lattner148772a2009-06-13 07:13:28 +0000229<p>The feature tag is described along with the language feature below.</p>
230
Richard Smith5297d712012-02-25 10:41:10 +0000231<p>The feature name or extension name can also be specified with a preceding and
232following <code>__</code> (double underscore) to avoid interference from a macro
Richard Smith1d9f4c12012-03-01 02:12:07 +0000233with the same name. For instance, <code>__cxx_rvalue_references__</code> can be
234used instead of <code>cxx_rvalue_references</code>.</p>
Richard Smith5297d712012-02-25 10:41:10 +0000235
John Thompson92bd8c72009-11-02 22:28:12 +0000236<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +0000237<h3><a name="__has_attribute">__has_attribute</a></h3>
Anders Carlssoncae50952010-10-20 02:31:43 +0000238<!-- ======================================================================= -->
239
240<p>This function-like macro takes a single identifier argument that is the name
241of an attribute. It evaluates to 1 if the attribute is supported or 0 if not. It
242can be used like this:</p>
243
244<blockquote>
245<pre>
246#ifndef __has_attribute // Optional of course.
247 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
248#endif
249
250...
Anders Carlsson961003d2011-01-24 03:54:51 +0000251#if __has_attribute(always_inline)
252#define ALWAYS_INLINE __attribute__((always_inline))
Anders Carlssoncae50952010-10-20 02:31:43 +0000253#else
Anders Carlsson961003d2011-01-24 03:54:51 +0000254#define ALWAYS_INLINE
Anders Carlssoncae50952010-10-20 02:31:43 +0000255#endif
256...
257</pre>
258</blockquote>
259
Jean-Daniel Dupas8a5e7fd2012-03-01 14:53:16 +0000260<p>The attribute name can also be specified with a preceding and
261following <code>__</code> (double underscore) to avoid interference from a macro
262with the same name. For instance, <code>__always_inline__</code> can be used
263instead of <code>always_inline</code>.</p>
264
Anders Carlssoncae50952010-10-20 02:31:43 +0000265<!-- ======================================================================= -->
John Thompson92bd8c72009-11-02 22:28:12 +0000266<h2 id="has_include">Include File Checking Macros</h2>
267<!-- ======================================================================= -->
268
269<p>Not all developments systems have the same include files.
270The <a href="#__has_include">__has_include</a> and
271<a href="#__has_include_next">__has_include_next</a> macros allow you to
272check for the existence of an include file before doing
273a possibly failing #include directive.</p>
274
275<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +0000276<h3><a name="__has_include">__has_include</a></h3>
John Thompson92bd8c72009-11-02 22:28:12 +0000277<!-- ======================================================================= -->
278
279<p>This function-like macro takes a single file name string argument that
280is the name of an include file. It evaluates to 1 if the file can
281be found using the include paths, or 0 otherwise:</p>
282
283<blockquote>
284<pre>
285// Note the two possible file name string formats.
Sean Hunt7e98b472011-06-23 01:21:01 +0000286#if __has_include("myinclude.h") &amp;&amp; __has_include(&lt;stdint.h&gt;)
John Thompson92bd8c72009-11-02 22:28:12 +0000287# include "myinclude.h"
288#endif
289
290// To avoid problem with non-clang compilers not having this macro.
Sean Hunt7e98b472011-06-23 01:21:01 +0000291#if defined(__has_include) &amp;&amp; __has_include("myinclude.h")
John Thompson92bd8c72009-11-02 22:28:12 +0000292# include "myinclude.h"
293#endif
294</pre>
295</blockquote>
296
297<p>To test for this feature, use #if defined(__has_include).</p>
298
299<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +0000300<h3><a name="__has_include_next">__has_include_next</a></h3>
John Thompson92bd8c72009-11-02 22:28:12 +0000301<!-- ======================================================================= -->
302
303<p>This function-like macro takes a single file name string argument that
304is the name of an include file. It is like __has_include except that it
305looks for the second instance of the given file found in the include
306paths. It evaluates to 1 if the second instance of the file can
307be found using the include paths, or 0 otherwise:</p>
308
309<blockquote>
310<pre>
311// Note the two possible file name string formats.
Sean Hunt7e98b472011-06-23 01:21:01 +0000312#if __has_include_next("myinclude.h") &amp;&amp; __has_include_next(&lt;stdint.h&gt;)
John Thompson92bd8c72009-11-02 22:28:12 +0000313# include_next "myinclude.h"
314#endif
315
316// To avoid problem with non-clang compilers not having this macro.
Sean Hunt7e98b472011-06-23 01:21:01 +0000317#if defined(__has_include_next) &amp;&amp; __has_include_next("myinclude.h")
John Thompson92bd8c72009-11-02 22:28:12 +0000318# include_next "myinclude.h"
319#endif
320</pre>
321</blockquote>
322
323<p>Note that __has_include_next, like the GNU extension
324#include_next directive, is intended for use in headers only,
325and will issue a warning if used in the top-level compilation
326file. A warning will also be issued if an absolute path
327is used in the file argument.</p>
Chris Lattner148772a2009-06-13 07:13:28 +0000328
Ted Kremenekd7681502011-10-12 19:46:30 +0000329
330<!-- ======================================================================= -->
331<h3><a name="__has_warning">__has_warning</a></h3>
332<!-- ======================================================================= -->
333
334<p>This function-like macro takes a string literal that represents a command
335 line option for a warning and returns true if that is a valid warning
336 option.</p>
337
338<blockquote>
339<pre>
340#if __has_warning("-Wformat")
341...
342#endif
343</pre>
344</blockquote>
345
Chris Lattner148772a2009-06-13 07:13:28 +0000346<!-- ======================================================================= -->
Chris Lattner81edc9f2009-04-13 02:45:46 +0000347<h2 id="builtinmacros">Builtin Macros</h2>
348<!-- ======================================================================= -->
349
Douglas Gregor4290fbd2010-04-30 02:51:06 +0000350<dl>
351 <dt><code>__BASE_FILE__</code></dt>
352 <dd>Defined to a string that contains the name of the main input
353 file passed to Clang.</dd>
354
355 <dt><code>__COUNTER__</code></dt>
356 <dd>Defined to an integer value that starts at zero and is
357 incremented each time the <code>__COUNTER__</code> macro is
358 expanded.</dd>
359
360 <dt><code>__INCLUDE_LEVEL__</code></dt>
361 <dd>Defined to an integral value that is the include depth of the
362 file currently being translated. For the main file, this value is
363 zero.</dd>
364
365 <dt><code>__TIMESTAMP__</code></dt>
366 <dd>Defined to the date and time of the last modification of the
367 current source file.</dd>
368
369 <dt><code>__clang__</code></dt>
370 <dd>Defined when compiling with Clang</dd>
371
372 <dt><code>__clang_major__</code></dt>
Chris Lattnerd4b66b92011-12-15 19:06:36 +0000373 <dd>Defined to the major marketing version number of Clang (e.g., the
374 2 in 2.0.1). Note that marketing version numbers should not be used to
375 check for language features, as different vendors use different numbering
376 schemes. Instead, use the <a href="#feature_check">feature checking
377 macros</a>.</dd>
Douglas Gregor4290fbd2010-04-30 02:51:06 +0000378
379 <dt><code>__clang_minor__</code></dt>
380 <dd>Defined to the minor version number of Clang (e.g., the 0 in
Chris Lattnerd4b66b92011-12-15 19:06:36 +0000381 2.0.1). Note that marketing version numbers should not be used to
382 check for language features, as different vendors use different numbering
383 schemes. Instead, use the <a href="#feature_check">feature checking
384 macros</a>.</dd>
Douglas Gregor4290fbd2010-04-30 02:51:06 +0000385
386 <dt><code>__clang_patchlevel__</code></dt>
Chris Lattnerd4b66b92011-12-15 19:06:36 +0000387 <dd>Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).</dd>
Douglas Gregor4290fbd2010-04-30 02:51:06 +0000388
389 <dt><code>__clang_version__</code></dt>
Chris Lattnerd4b66b92011-12-15 19:06:36 +0000390 <dd>Defined to a string that captures the Clang marketing version, including
391 the Subversion tag or revision number, e.g., "1.5 (trunk 102332)".</dd>
Douglas Gregor4290fbd2010-04-30 02:51:06 +0000392</dl>
Chris Lattner81edc9f2009-04-13 02:45:46 +0000393
394<!-- ======================================================================= -->
Chris Lattner5ce933f2009-02-09 08:46:11 +0000395<h2 id="vectors">Vectors and Extended Vectors</h2>
396<!-- ======================================================================= -->
397
Anton Yartsevda90c772012-01-15 16:22:24 +0000398<p>Supports the GCC, OpenCL, AltiVec and NEON vector extensions.</p>
Owen Andersond2bf0cd2010-01-27 01:22:36 +0000399
Benjamin Kramer3419d7c2012-01-15 16:42:14 +0000400<p>OpenCL vector types are created using <tt>ext_vector_type</tt> attribute. It
401support for <tt>V.xyzw</tt> syntax and other tidbits as seen in OpenCL. An
402example is:</p>
Owen Andersond2bf0cd2010-01-27 01:22:36 +0000403
404<blockquote>
405<pre>
406typedef float float4 <b>__attribute__((ext_vector_type(4)))</b>;
407typedef float float2 <b>__attribute__((ext_vector_type(2)))</b>;
408
409float4 foo(float2 a, float2 b) {
410 float4 c;
411 c.xz = a;
412 c.yw = b;
413 return c;
414}
John McCall48209082010-11-08 19:48:17 +0000415</pre>
Owen Andersond2bf0cd2010-01-27 01:22:36 +0000416</blockquote>
Chris Lattner5ce933f2009-02-09 08:46:11 +0000417
Benjamin Kramer3419d7c2012-01-15 16:42:14 +0000418<p>Query for this feature with
419<tt>__has_extension(attribute_ext_vector_type)</tt>.</p>
Chris Lattner148772a2009-06-13 07:13:28 +0000420
Benjamin Kramer3419d7c2012-01-15 16:42:14 +0000421<p>Giving <tt>-faltivec</tt> option to clang enables support for AltiVec vector
422syntax and functions. For example:</p>
Anton Yartsevda90c772012-01-15 16:22:24 +0000423
424<blockquote>
425<pre>
426vector float foo(vector int a) {
427 vector int b;
428 b = vec_add(a, a) + a;
429 return (vector float)b;
430}
431</pre>
432</blockquote>
433
434<p>NEON vector types are created using <tt>neon_vector_type</tt> and
435<tt>neon_polyvector_type</tt> attributes. For example:</p>
436
437<blockquote>
438<pre>
439typedef <b>__attribute__((neon_vector_type(8)))</b> int8_t int8x8_t;
440typedef <b>__attribute__((neon_polyvector_type(16)))</b> poly8_t poly8x16_t;
441
442int8x8_t foo(int8x8_t a) {
443 int8x8_t v;
444 v = a;
445 return v;
446}
447</pre>
448</blockquote>
449
450<!-- ======================================================================= -->
451<h3><a name="vector_literals">Vector Literals</a></h3>
452<!-- ======================================================================= -->
453
454<p>Vector literals can be used to create vectors from a set of scalars, or
455vectors. Either parentheses or braces form can be used. In the parentheses form
456the number of literal values specified must be one, i.e. referring to a scalar
457value, or must match the size of the vector type being created. If a single
458scalar literal value is specified, the scalar literal value will be replicated
459to all the components of the vector type. In the brackets form any number of
460literals can be specified. For example:</p>
461
462<blockquote>
463<pre>
464typedef int v4si __attribute__((__vector_size__(16)));
465typedef float float4 __attribute__((ext_vector_type(4)));
466typedef float float2 __attribute__((ext_vector_type(2)));
467
468v4si vsi = (v4si){1, 2, 3, 4};
469float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
470vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
471vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
472vector int vi3 = (vector int)(1, 2); // error
473vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
474vector int vi5 = (vector int)(1, 2, 3, 4);
475float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
476</pre>
477</blockquote>
478
479<!-- ======================================================================= -->
480<h3><a name="vector_operations">Vector Operations</a></h3>
481<!-- ======================================================================= -->
482
483<p>The table below shows the support for each operation by vector extension.
484A dash indicates that an operation is not accepted according to a corresponding
485specification.</p>
486
487<table width="500" border="1" cellspacing="0">
488 <tr>
Benjamin Kramer3419d7c2012-01-15 16:42:14 +0000489 <th>Operator</th>
490 <th>OpenCL</th>
491 <th>AltiVec</th>
492 <th>GCC</th>
493 <th>NEON</th>
Anton Yartsevda90c772012-01-15 16:22:24 +0000494 </tr>
495 <tr>
496 <td>[]</td>
497 <td align="center">yes</td>
498 <td align="center">yes</td>
499 <td align="center">yes</td>
500 <td align="center">-</td>
501 </tr>
502 <tr>
503 <td>unary operators +, -</td>
504 <td align="center">yes</td>
505 <td align="center">yes</td>
506 <td align="center">yes</td>
507 <td align="center">-</td>
508 </tr>
509 <tr>
510 <td>++, --</td>
511 <td align="center">yes</td>
512 <td align="center">yes</td>
513 <td align="center">-</td>
514 <td align="center">-</td>
515 </tr>
516 <tr>
517 <td>+, -, *, /, %</td>
518 <td align="center">yes</td>
519 <td align="center">yes</td>
520 <td align="center">yes</td>
521 <td align="center">-</td>
522 </tr>
523 <tr>
524 <td>bitwise operators &, |, ^, ~</td>
525 <td align="center">yes</td>
526 <td align="center">yes</td>
527 <td align="center">yes</td>
528 <td align="center">-</td>
529 </tr>
530 <tr>
531 <td>&gt&gt, &lt&lt</td>
532 <td align="center">yes</td>
533 <td align="center">yes</td>
534 <td align="center">yes</td>
535 <td align="center">-</td>
536 </tr>
537 <tr>
538 <td>!, &&,||</td>
539 <td align="center">no</td>
540 <td align="center">-</td>
541 <td align="center">-</td>
542 <td align="center">-</td>
543 </tr>
544 <tr>
545 <td>==,!=, >, <, >=, <=</td>
546 <td align="center">yes</td>
547 <td align="center">yes</td>
548 <td align="center">-</td>
549 <td align="center">-</td>
550 </tr>
551 <tr>
552 <td>=</td>
553 <td align="center">yes</td>
554 <td align="center">yes</td>
555 <td align="center">yes</td>
556 <td align="center">yes</td>
557 </tr>
558 <tr>
559 <td>:?</td>
560 <td align="center">yes</td>
561 <td align="center">-</td>
562 <td align="center">-</td>
563 <td align="center">-</td>
564 </tr>
565 <tr>
566 <td>sizeof</td>
567 <td align="center">yes</td>
568 <td align="center">yes</td>
569 <td align="center">yes</td>
570 <td align="center">yes</td>
571 </tr>
572</table>
573
Owen Andersond2bf0cd2010-01-27 01:22:36 +0000574<p>See also <a href="#__builtin_shufflevector">__builtin_shufflevector</a>.</p>
575
Chris Lattner5ce933f2009-02-09 08:46:11 +0000576<!-- ======================================================================= -->
John McCall48209082010-11-08 19:48:17 +0000577<h2 id="deprecated">Messages on <tt>deprecated</tt> and <tt>unavailable</tt> Attributes</h2>
Fariborz Jahanianc784dc12010-10-06 23:12:32 +0000578<!-- ======================================================================= -->
579
John McCall48209082010-11-08 19:48:17 +0000580<p>An optional string message can be added to the <tt>deprecated</tt>
581and <tt>unavailable</tt> attributes. For example:</p>
Fariborz Jahanianc784dc12010-10-06 23:12:32 +0000582
John McCall48209082010-11-08 19:48:17 +0000583<blockquote>
Chris Lattner4836d6a2010-11-09 19:43:35 +0000584<pre>void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));</pre>
John McCall48209082010-11-08 19:48:17 +0000585</blockquote>
586
587<p>If the deprecated or unavailable declaration is used, the message
588will be incorporated into the appropriate diagnostic:</p>
589
590<blockquote>
Chris Lattner4836d6a2010-11-09 19:43:35 +0000591<pre>harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!! [-Wdeprecated-declarations]
John McCall48209082010-11-08 19:48:17 +0000592 explode();
593 ^</pre>
594</blockquote>
595
596<p>Query for this feature
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000597with <tt>__has_extension(attribute_deprecated_with_message)</tt>
598and <tt>__has_extension(attribute_unavailable_with_message)</tt>.</p>
John McCall48209082010-11-08 19:48:17 +0000599
600<!-- ======================================================================= -->
601<h2 id="attributes-on-enumerators">Attributes on Enumerators</h2>
602<!-- ======================================================================= -->
603
604<p>Clang allows attributes to be written on individual enumerators.
605This allows enumerators to be deprecated, made unavailable, etc. The
606attribute must appear after the enumerator name and before any
607initializer, like so:</p>
608
609<blockquote>
610<pre>enum OperationMode {
611 OM_Invalid,
612 OM_Normal,
613 OM_Terrified __attribute__((deprecated)),
614 OM_AbortOnError __attribute__((deprecated)) = 4
615};</pre>
616</blockquote>
617
618<p>Attributes on the <tt>enum</tt> declaration do not apply to
619individual enumerators.</p>
620
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000621<p>Query for this feature with <tt>__has_extension(enumerator_attributes)</tt>.</p>
Fariborz Jahanianc784dc12010-10-06 23:12:32 +0000622
623<!-- ======================================================================= -->
Ted Kremenek87774fd2009-12-03 02:04:01 +0000624<h2 id="checking_language_features">Checks for Standard Language Features</h2>
625<!-- ======================================================================= -->
626
627<p>The <tt>__has_feature</tt> macro can be used to query if certain standard language features are
628enabled. Those features are listed here.</p>
629
Ted Kremenek22c34102009-12-03 02:05:57 +0000630<h3 id="cxx_exceptions">C++ exceptions</h3>
Ted Kremenek87774fd2009-12-03 02:04:01 +0000631
Ted Kremenek22c34102009-12-03 02:05:57 +0000632<p>Use <tt>__has_feature(cxx_exceptions)</tt> to determine if C++ exceptions have been enabled. For
Sean Hunt647ba1b2011-06-23 00:42:53 +0000633example, compiling code with <tt>-fexceptions</tt> enables C++ exceptions.</p>
Ted Kremenek87774fd2009-12-03 02:04:01 +0000634
Ted Kremenek22c34102009-12-03 02:05:57 +0000635<h3 id="cxx_rtti">C++ RTTI</h3>
Ted Kremenek87774fd2009-12-03 02:04:01 +0000636
Ted Kremenek0eb95602009-12-03 02:06:43 +0000637<p>Use <tt>__has_feature(cxx_rtti)</tt> to determine if C++ RTTI has been enabled. For example,
Ted Kremenek22c34102009-12-03 02:05:57 +0000638compiling code with <tt>-fno-rtti</tt> disables the use of RTTI.</p>
Ted Kremenek87774fd2009-12-03 02:04:01 +0000639
640<!-- ======================================================================= -->
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000641<h2 id="checking_upcoming_features">Checks for Upcoming Standard Language Features</h2>
642<!-- ======================================================================= -->
643
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000644<p>The <tt>__has_feature</tt> or <tt>__has_extension</tt> macros can be used
645to query if certain upcoming standard language features are enabled. Those
646features are listed here. Features that are not yet implemented will be
647noted.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000648
David Blaikie5090e9f2011-10-18 05:49:30 +0000649<h3 id="cxx0x">C++11</h3>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000650
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000651<p>The features listed below are slated for inclusion in the upcoming
David Blaikie5090e9f2011-10-18 05:49:30 +0000652C++11 standard. As a result, all these features are enabled
653with the <tt>-std=c++11</tt> option when compiling C++ code.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000654
David Blaikie5090e9f2011-10-18 05:49:30 +0000655<h4 id="cxx_access_control_sfinae">C++11 SFINAE includes access control</h4>
Douglas Gregor7822ee32011-05-11 23:45:11 +0000656
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000657<p>Use <tt>__has_feature(cxx_access_control_sfinae)</tt> or <tt>__has_extension(cxx_access_control_sfinae)</tt> to determine whether access-control errors (e.g., calling a private constructor) are considered to be template argument deduction errors (aka SFINAE errors), per <a href="http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170">C++ DR1170</a>.</p>
Douglas Gregor7822ee32011-05-11 23:45:11 +0000658
David Blaikie5090e9f2011-10-18 05:49:30 +0000659<h4 id="cxx_alias_templates">C++11 alias templates</h4>
Richard Smith3e4c6c42011-05-05 21:57:07 +0000660
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000661<p>Use <tt>__has_feature(cxx_alias_templates)</tt> or
662<tt>__has_extension(cxx_alias_templates)</tt> to determine if support for
David Blaikie5090e9f2011-10-18 05:49:30 +0000663C++11's alias declarations and alias templates is enabled.</p>
Richard Smith3e4c6c42011-05-05 21:57:07 +0000664
David Blaikie5090e9f2011-10-18 05:49:30 +0000665<h4 id="cxx_alignas">C++11 alignment specifiers</h4>
Peter Collingbournefd5f6862011-10-14 23:44:46 +0000666
667<p>Use <tt>__has_feature(cxx_alignas)</tt> or
668<tt>__has_extension(cxx_alignas)</tt> to determine if support for alignment
669specifiers using <tt>alignas</tt> is enabled.</p>
670
David Blaikie5090e9f2011-10-18 05:49:30 +0000671<h4 id="cxx_attributes">C++11 attributes</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000672
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000673<p>Use <tt>__has_feature(cxx_attributes)</tt> or
674<tt>__has_extension(cxx_attributes)</tt> to determine if support for attribute
David Blaikie5090e9f2011-10-18 05:49:30 +0000675parsing with C++11's square bracket notation is enabled.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000676
David Blaikie5090e9f2011-10-18 05:49:30 +0000677<h4 id="cxx_constexpr">C++11 generalized constant expressions</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000678
679<p>Use <tt>__has_feature(cxx_constexpr)</tt> to determine if support
680for generalized constant expressions (e.g., <tt>constexpr</tt>) is
Richard Smithb5216aa2012-02-14 22:56:17 +0000681enabled.</p>
Douglas Gregorece38942011-08-29 17:28:38 +0000682
David Blaikie5090e9f2011-10-18 05:49:30 +0000683<h4 id="cxx_decltype">C++11 <tt>decltype()</tt></h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000684
685<p>Use <tt>__has_feature(cxx_decltype)</tt> or
686<tt>__has_extension(cxx_decltype)</tt> to determine if support for the
687<tt>decltype()</tt> specifier is enabled.</p>
688
David Blaikie5090e9f2011-10-18 05:49:30 +0000689<h4 id="cxx_default_function_template_args">C++11 default template arguments in function templates</h4>
Douglas Gregor07508002011-02-05 20:35:30 +0000690
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000691<p>Use <tt>__has_feature(cxx_default_function_template_args)</tt> or
692<tt>__has_extension(cxx_default_function_template_args)</tt> to determine
693if support for default template arguments in function templates is enabled.</p>
Douglas Gregor07508002011-02-05 20:35:30 +0000694
Douglas Gregorf695a692011-11-01 01:19:34 +0000695<h4 id="cxx_defaulted_functions">C++11 <tt>default</tt>ed functions</h4>
696
697<p>Use <tt>__has_feature(cxx_defaulted_functions)</tt> or
698<tt>__has_extension(cxx_defaulted_functions)</tt> to determine if support for
699defaulted function definitions (with <tt>= default</tt>) is enabled.</p>
700
David Blaikie5090e9f2011-10-18 05:49:30 +0000701<h4 id="cxx_delegating_constructors">C++11 delegating constructors</h4>
Sean Huntd9624992011-06-23 06:11:37 +0000702
703<p>Use <tt>__has_feature(cxx_delegating_constructors)</tt> to determine if
704support for delegating constructors is enabled.</p>
705
David Blaikie5090e9f2011-10-18 05:49:30 +0000706<h4 id="cxx_deleted_functions">C++11 <tt>delete</tt>d functions</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000707
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000708<p>Use <tt>__has_feature(cxx_deleted_functions)</tt> or
709<tt>__has_extension(cxx_deleted_functions)</tt> to determine if support for
Sebastian Redlf6c09772010-08-31 23:28:47 +0000710deleted function definitions (with <tt>= delete</tt>) is enabled.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000711
Benjamin Kramer665a8dc2012-01-15 15:26:07 +0000712<h4 id="cxx_explicit_conversions">C++11 explicit conversion functions</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000713<p>Use <tt>__has_feature(cxx_explicit_conversions)</tt> to determine if support for <tt>explicit</tt> conversion functions is enabled.</p>
714
David Blaikie5090e9f2011-10-18 05:49:30 +0000715<h4 id="cxx_generalized_initializers">C++11 generalized initializers</h4>
Sean Hunte1f6dea2011-08-07 00:34:32 +0000716
717<p>Use <tt>__has_feature(cxx_generalized_initializers)</tt> to determine if
718support for generalized initializers (using braced lists and
Richard Smith88189552012-02-26 07:09:21 +0000719<tt>std::initializer_list</tt>) is enabled.</p>
Douglas Gregorece38942011-08-29 17:28:38 +0000720
David Blaikie5090e9f2011-10-18 05:49:30 +0000721<h4 id="cxx_implicit_moves">C++11 implicit move constructors/assignment operators</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000722
Sebastian Redl72a81d22011-10-10 18:10:00 +0000723<p>Use <tt>__has_feature(cxx_implicit_moves)</tt> to determine if Clang will
724implicitly generate move constructors and move assignment operators where needed.</p>
Douglas Gregorece38942011-08-29 17:28:38 +0000725
David Blaikie5090e9f2011-10-18 05:49:30 +0000726<h4 id="cxx_inheriting_constructors">C++11 inheriting constructors</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000727
728<p>Use <tt>__has_feature(cxx_inheriting_constructors)</tt> to determine if support for inheriting constructors is enabled. Clang does not currently implement this feature.</p>
729
David Blaikie5090e9f2011-10-18 05:49:30 +0000730<h4 id="cxx_inline_namespaces">C++11 inline namespaces</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000731
732<p>Use <tt>__has_feature(cxx_inline_namespaces)</tt> or
733<tt>__has_extension(cxx_inline_namespaces)</tt> to determine if support for
734inline namespaces is enabled.</p>
Sean Hunte1f6dea2011-08-07 00:34:32 +0000735
David Blaikie5090e9f2011-10-18 05:49:30 +0000736<h4 id="cxx_lambdas">C++11 lambdas</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000737
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000738<p>Use <tt>__has_feature(cxx_lambdas)</tt> or
739<tt>__has_extension(cxx_lambdas)</tt> to determine if support for lambdas
Douglas Gregor46e021e2012-02-23 05:44:09 +0000740is enabled. </p>
Douglas Gregorece38942011-08-29 17:28:38 +0000741
David Blaikie5090e9f2011-10-18 05:49:30 +0000742<h4 id="cxx_noexcept">C++11 noexcept</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000743
744<p>Use <tt>__has_feature(cxx_noexcept)</tt> or
745<tt>__has_extension(cxx_noexcept)</tt> to determine if support for noexcept
746exception specifications is enabled.</p>
747
David Blaikie5090e9f2011-10-18 05:49:30 +0000748<h4 id="cxx_nonstatic_member_init">C++11 in-class non-static data member initialization</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000749
750<p>Use <tt>__has_feature(cxx_nonstatic_member_init)</tt> to determine whether in-class initialization of non-static data members is enabled.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000751
David Blaikie5090e9f2011-10-18 05:49:30 +0000752<h4 id="cxx_nullptr">C++11 <tt>nullptr</tt></h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000753
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000754<p>Use <tt>__has_feature(cxx_nullptr)</tt> or
755<tt>__has_extension(cxx_nullptr)</tt> to determine if support for
Douglas Gregor84ee2ee2011-05-21 23:15:46 +0000756<tt>nullptr</tt> is enabled.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000757
David Blaikie5090e9f2011-10-18 05:49:30 +0000758<h4 id="cxx_override_control">C++11 <tt>override control</tt></h4>
Anders Carlssonc8b9f792011-03-25 15:04:23 +0000759
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000760<p>Use <tt>__has_feature(cxx_override_control)</tt> or
761<tt>__has_extension(cxx_override_control)</tt> to determine if support for
Anders Carlssonc8b9f792011-03-25 15:04:23 +0000762the override control keywords is enabled.</p>
763
David Blaikie5090e9f2011-10-18 05:49:30 +0000764<h4 id="cxx_reference_qualified_functions">C++11 reference-qualified functions</h4>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000765<p>Use <tt>__has_feature(cxx_reference_qualified_functions)</tt> or
766<tt>__has_extension(cxx_reference_qualified_functions)</tt> to determine
767if support for reference-qualified functions (e.g., member functions with
768<code>&amp;</code> or <code>&amp;&amp;</code> applied to <code>*this</code>)
769is enabled.</p>
Douglas Gregor56209ff2011-01-26 21:25:54 +0000770
David Blaikie5090e9f2011-10-18 05:49:30 +0000771<h4 id="cxx_range_for">C++11 range-based <tt>for</tt> loop</h4>
Richard Smitha391a462011-04-15 15:14:40 +0000772
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000773<p>Use <tt>__has_feature(cxx_range_for)</tt> or
774<tt>__has_extension(cxx_range_for)</tt> to determine if support for the
775range-based for loop is enabled. </p>
Richard Smitha391a462011-04-15 15:14:40 +0000776
David Blaikie5090e9f2011-10-18 05:49:30 +0000777<h4 id="cxx_raw_string_literals">C++11 raw string literals</h4>
Richard Smith80134582012-03-07 08:57:31 +0000778<p>Use <tt>__has_feature(cxx_raw_string_literals)</tt> to determine if support
779for raw string literals (e.g., <tt>R"x(foo\bar)x"</tt>) is enabled.</p>
Douglas Gregorece38942011-08-29 17:28:38 +0000780
David Blaikie5090e9f2011-10-18 05:49:30 +0000781<h4 id="cxx_rvalue_references">C++11 rvalue references</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000782
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000783<p>Use <tt>__has_feature(cxx_rvalue_references)</tt> or
784<tt>__has_extension(cxx_rvalue_references)</tt> to determine if support for
Douglas Gregor56209ff2011-01-26 21:25:54 +0000785rvalue references is enabled. </p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000786
David Blaikie5090e9f2011-10-18 05:49:30 +0000787<h4 id="cxx_static_assert">C++11 <tt>static_assert()</tt></h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000788
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000789<p>Use <tt>__has_feature(cxx_static_assert)</tt> or
790<tt>__has_extension(cxx_static_assert)</tt> to determine if support for
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000791compile-time assertions using <tt>static_assert</tt> is enabled.</p>
792
David Blaikie5090e9f2011-10-18 05:49:30 +0000793<h4 id="cxx_auto_type">C++11 type inference</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000794
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000795<p>Use <tt>__has_feature(cxx_auto_type)</tt> or
David Blaikie5090e9f2011-10-18 05:49:30 +0000796<tt>__has_extension(cxx_auto_type)</tt> to determine C++11 type inference is
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000797supported using the <tt>auto</tt> specifier. If this is disabled, <tt>auto</tt>
798will instead be a storage class specifier, as in C or C++98.</p>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000799
David Blaikie5090e9f2011-10-18 05:49:30 +0000800<h4 id="cxx_strong_enums">C++11 strongly typed enumerations</h4>
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000801
Douglas Gregorece38942011-08-29 17:28:38 +0000802<p>Use <tt>__has_feature(cxx_strong_enums)</tt> or
803<tt>__has_extension(cxx_strong_enums)</tt> to determine if support for
804strongly typed, scoped enumerations is enabled.</p>
Sebastian Redlf6c09772010-08-31 23:28:47 +0000805
David Blaikie5090e9f2011-10-18 05:49:30 +0000806<h4 id="cxx_trailing_return">C++11 trailing return type</h4>
Douglas Gregordab60ad2010-10-01 18:44:50 +0000807
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000808<p>Use <tt>__has_feature(cxx_trailing_return)</tt> or
809<tt>__has_extension(cxx_trailing_return)</tt> to determine if support for the
810alternate function declaration syntax with trailing return type is enabled.</p>
Douglas Gregordab60ad2010-10-01 18:44:50 +0000811
David Blaikie5090e9f2011-10-18 05:49:30 +0000812<h4 id="cxx_unicode_literals">C++11 Unicode string literals</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000813<p>Use <tt>__has_feature(cxx_unicode_literals)</tt> to determine if
814support for Unicode string literals is enabled.</p>
Sebastian Redl4561ecd2011-03-15 21:17:12 +0000815
David Blaikie5090e9f2011-10-18 05:49:30 +0000816<h4 id="cxx_unrestricted_unions">C++11 unrestricted unions</h4>
Sebastian Redl4561ecd2011-03-15 21:17:12 +0000817
Richard Smithec92bc72012-03-03 23:51:05 +0000818<p>Use <tt>__has_feature(cxx_unrestricted_unions)</tt> to determine if support for unrestricted unions is enabled.</p>
Douglas Gregor1274ccd2010-10-08 23:50:27 +0000819
David Blaikie5090e9f2011-10-18 05:49:30 +0000820<h4 id="cxx_user_literals">C++11 user-defined literals</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000821
Richard Smith9c1dda72012-03-09 08:41:27 +0000822<p>Use <tt>__has_feature(cxx_user_literals)</tt> to determine if support for user-defined literals is enabled.</p>
Douglas Gregorece38942011-08-29 17:28:38 +0000823
David Blaikie5090e9f2011-10-18 05:49:30 +0000824<h4 id="cxx_variadic_templates">C++11 variadic templates</h4>
Douglas Gregorece38942011-08-29 17:28:38 +0000825
826<p>Use <tt>__has_feature(cxx_variadic_templates)</tt> or
827<tt>__has_extension(cxx_variadic_templates)</tt> to determine if support
828for variadic templates is enabled.</p>
Douglas Gregor1274ccd2010-10-08 23:50:27 +0000829
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000830<h3 id="c11">C11</h3>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000831
832<p>The features listed below are slated for inclusion in the upcoming
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000833C11 standard. As a result, all these features are enabled
834with the <tt>-std=c11</tt> option when compiling C code.</p>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000835
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000836<h4 id="c_alignas">C11 alignment specifiers</h4>
Peter Collingbournefd5f6862011-10-14 23:44:46 +0000837
838<p>Use <tt>__has_feature(c_alignas)</tt> or <tt>__has_extension(c_alignas)</tt>
839to determine if support for alignment specifiers using <tt>_Alignas</tt>
840is enabled.</p>
841
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000842<h4 id="c_generic_selections">C11 generic selections</h4>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000843
844<p>Use <tt>__has_feature(c_generic_selections)</tt> or
845<tt>__has_extension(c_generic_selections)</tt> to determine if support for
846generic selections is enabled.</p>
847
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000848<p>As an extension, the C11 generic selection expression is available in all
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000849languages supported by Clang. The syntax is the same as that given in the
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000850C11 standard.</p>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000851
852<p>In C, type compatibility is decided according to the rules given in the
853appropriate standard, but in C++, which lacks the type compatibility rules
854used in C, types are considered compatible only if they are equivalent.</p>
855
Benjamin Kramerffbe9b92011-12-23 17:00:35 +0000856<h4 id="c_static_assert">C11 <tt>_Static_assert()</tt></h4>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000857
858<p>Use <tt>__has_feature(c_static_assert)</tt> or
859<tt>__has_extension(c_static_assert)</tt> to determine if support for
860compile-time assertions using <tt>_Static_assert</tt> is enabled.</p>
861
Sean Hunt4ef4c6b2010-01-13 08:31:49 +0000862<!-- ======================================================================= -->
Douglas Gregorafdf1372011-02-03 21:57:35 +0000863<h2 id="checking_type_traits">Checks for Type Traits</h2>
864<!-- ======================================================================= -->
865
Sean Hunt7e98b472011-06-23 01:21:01 +0000866<p>Clang supports the <a href="http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html">GNU C++ type traits</a> and a subset of the <a href="http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx">Microsoft Visual C++ Type traits</a>. For each supported type trait <code>__X</code>, <code>__has_extension(X)</code> indicates the presence of the type trait. For example:
Douglas Gregorafdf1372011-02-03 21:57:35 +0000867<blockquote>
868<pre>
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000869#if __has_extension(is_convertible_to)
Douglas Gregorafdf1372011-02-03 21:57:35 +0000870template&lt;typename From, typename To&gt;
871struct is_convertible_to {
872 static const bool value = __is_convertible_to(From, To);
873};
874#else
875// Emulate type trait
876#endif
877</pre>
878</blockquote>
879
880<p>The following type traits are supported by Clang:</p>
881<ul>
882 <li><code>__has_nothrow_assign</code> (GNU, Microsoft)</li>
883 <li><code>__has_nothrow_copy</code> (GNU, Microsoft)</li>
884 <li><code>__has_nothrow_constructor</code> (GNU, Microsoft)</li>
885 <li><code>__has_trivial_assign</code> (GNU, Microsoft)</li>
886 <li><code>__has_trivial_copy</code> (GNU, Microsoft)</li>
887 <li><code>__has_trivial_constructor</code> (GNU, Microsoft)</li>
888 <li><code>__has_trivial_destructor</code> (GNU, Microsoft)</li>
889 <li><code>__has_virtual_destructor</code> (GNU, Microsoft)</li>
890 <li><code>__is_abstract</code> (GNU, Microsoft)</li>
891 <li><code>__is_base_of</code> (GNU, Microsoft)</li>
892 <li><code>__is_class</code> (GNU, Microsoft)</li>
893 <li><code>__is_convertible_to</code> (Microsoft)</li>
894 <li><code>__is_empty</code> (GNU, Microsoft)</li>
895 <li><code>__is_enum</code> (GNU, Microsoft)</li>
896 <li><code>__is_pod</code> (GNU, Microsoft)</li>
897 <li><code>__is_polymorphic</code> (GNU, Microsoft)</li>
898 <li><code>__is_union</code> (GNU, Microsoft)</li>
899 <li><code>__is_literal(type)</code>: Determines whether the given type is a literal type</li>
Douglas Gregor5e9392b2011-12-03 18:14:24 +0000900 <li><code>__is_final</code>: Determines whether the given type is declared with a <code>final</code> class-virt-specifier.</li>
David Blaikie5090e9f2011-10-18 05:49:30 +0000901 <li><code>__underlying_type(type)</code>: Retrieves the underlying type for a given <code>enum</code> type. This trait is required to implement the C++11 standard library.</li>
Douglas Gregor4ca8ac22012-02-24 07:38:34 +0000902 <li><code>__is_trivially_assignable(totype, fromtype)</code>: Determines whether a value of type <tt>totype</tt> can be assigned to from a value of type <tt>fromtype</tt> such that no non-trivial functions are called as part of that assignment. This trait is required to implement the C++11 standard library.</li>
903 <li><code>__is_trivially_constructible(type, argtypes...)</code>: Determines whether a value of type <tt>type</tt> can be direct-initialized with arguments of types <tt>argtypes...</tt> such that no non-trivial functions are called as part of that initialization. This trait is required to implement the C++11 standard library.</li>
Douglas Gregorafdf1372011-02-03 21:57:35 +0000904</ul>
905
906<!-- ======================================================================= -->
Chris Lattner5ce933f2009-02-09 08:46:11 +0000907<h2 id="blocks">Blocks</h2>
908<!-- ======================================================================= -->
909
Chris Lattnera7dbdf52009-03-09 07:03:22 +0000910<p>The syntax and high level language feature description is in <a
911href="BlockLanguageSpec.txt">BlockLanguageSpec.txt</a>. Implementation and ABI
912details for the clang implementation are in <a
Chris Lattner5d7650b2010-03-16 21:43:03 +0000913href="Block-ABI-Apple.txt">Block-ABI-Apple.txt</a>.</p>
Chris Lattner5ce933f2009-02-09 08:46:11 +0000914
Chris Lattner148772a2009-06-13 07:13:28 +0000915
Peter Collingbournec1b5fa42011-05-13 20:54:45 +0000916<p>Query for this feature with __has_extension(blocks).</p>
Chris Lattner148772a2009-06-13 07:13:28 +0000917
Chris Lattner5ce933f2009-02-09 08:46:11 +0000918<!-- ======================================================================= -->
Douglas Gregor926df6c2011-06-11 01:09:30 +0000919<h2 id="objc_features">Objective-C Features</h2>
920<!-- ======================================================================= -->
921
922<h3 id="objc_instancetype">Related result types</h3>
923
924<p>According to Cocoa conventions, Objective-C methods with certain names ("init", "alloc", etc.) always return objects that are an instance of the receiving class's type. Such methods are said to have a "related result type", meaning that a message send to one of these methods will have the same static type as an instance of the receiver class. For example, given the following classes:</p>
925
926<blockquote>
927<pre>
928@interface NSObject
929+ (id)alloc;
930- (id)init;
931@end
932
933@interface NSArray : NSObject
934@end
935</pre>
936</blockquote>
937
938<p>and this common initialization pattern</p>
939
940<blockquote>
941<pre>
942NSArray *array = [[NSArray alloc] init];
943</pre>
944</blockquote>
945
946<p>the type of the expression <code>[NSArray alloc]</code> is
947<code>NSArray*</code> because <code>alloc</code> implicitly has a
948related result type. Similarly, the type of the expression
949<code>[[NSArray alloc] init]</code> is <code>NSArray*</code>, since
950<code>init</code> has a related result type and its receiver is known
951to have the type <code>NSArray *</code>. If neither <code>alloc</code> nor <code>init</code> had a related result type, the expressions would have had type <code>id</code>, as declared in the method signature.</p>
952
Douglas Gregore97179c2011-09-08 01:46:34 +0000953<p>A method with a related result type can be declared by using the
954type <tt>instancetype</tt> as its result type. <tt>instancetype</tt>
955is a contextual keyword that is only permitted in the result type of
956an Objective-C method, e.g.</p>
957
958<pre>
959@interface A
960+ (<b>instancetype</b>)constructAnA;
961@end
962</pre>
963
964<p>The related result type can also be inferred for some methods.
965To determine whether a method has an inferred related result type, the first
Douglas Gregor926df6c2011-06-11 01:09:30 +0000966word in the camel-case selector (e.g., "init" in "initWithObjects") is
Douglas Gregor8a0ace62011-11-03 18:33:01 +0000967considered, and the method will have a related result type if its return
Sean Hunt7e98b472011-06-23 01:21:01 +0000968type is compatible with the type of its class and if</p>
Douglas Gregor926df6c2011-06-11 01:09:30 +0000969
970<ul>
971
972 <li>the first word is "alloc" or "new", and the method is a class
973 method, or</li>
974
975 <li>the first word is "autorelease", "init", "retain", or "self",
976 and the method is an instance method.</li>
977
Sean Hunt7e98b472011-06-23 01:21:01 +0000978</ul>
Douglas Gregor926df6c2011-06-11 01:09:30 +0000979
980<p>If a method with a related result type is overridden by a subclass
981method, the subclass method must also return a type that is compatible
982with the subclass type. For example:</p>
983
984<blockquote>
985<pre>
986@interface NSString : NSObject
987- (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
988@end
989</pre>
990</blockquote>
991
992<p>Related result types only affect the type of a message send or
993property access via the given method. In all other respects, a method
Douglas Gregore97179c2011-09-08 01:46:34 +0000994with a related result type is treated the same way as method that
995returns <tt>id</tt>.</p>
Douglas Gregor926df6c2011-06-11 01:09:30 +0000996
Douglas Gregoraebb6532011-09-08 17:19:31 +0000997<p>Use <tt>__has_feature(objc_instancetype)</tt> to determine whether
998the <tt>instancetype</tt> contextual keyword is available.</p>
999
Douglas Gregor926df6c2011-06-11 01:09:30 +00001000<!-- ======================================================================= -->
John McCallf85e1932011-06-15 23:02:42 +00001001<h2 id="objc_arc">Automatic reference counting </h2>
1002<!-- ======================================================================= -->
1003
1004<p>Clang provides support for <a href="AutomaticReferenceCounting.html">automated reference counting</a> in Objective-C, which eliminates the need for manual retain/release/autorelease message sends. There are two feature macros associated with automatic reference counting: <code>__has_feature(objc_arc)</code> indicates the availability of automated reference counting in general, while <code>__has_feature(objc_arc_weak)</code> indicates that automated reference counting also includes support for <code>__weak</code> pointers to Objective-C objects.</p>
1005
1006<!-- ======================================================================= -->
Douglas Gregor5471bc82011-09-08 17:18:35 +00001007<h2 id="objc_fixed_enum">Enumerations with a fixed underlying type</h2>
1008<!-- ======================================================================= -->
1009
David Blaikie5090e9f2011-10-18 05:49:30 +00001010<p>Clang provides support for C++11 enumerations with a fixed
Douglas Gregor5471bc82011-09-08 17:18:35 +00001011underlying type within Objective-C. For example, one can write an
1012enumeration type as:</p>
1013
1014<pre>
1015typedef enum : unsigned char { Red, Green, Blue } Color;
1016</pre>
1017
1018<p>This specifies that the underlying type, which is used to store the
1019enumeration value, is <tt>unsigned char</tt>.</p>
1020
1021<p>Use <tt>__has_feature(objc_fixed_enum)</tt> to determine whether
1022support for fixed underlying types is available in Objective-C.</p>
1023
1024<!-- ======================================================================= -->
Douglas Gregorcb54d432009-02-13 00:57:04 +00001025<h2 id="overloading-in-c">Function Overloading in C</h2>
1026<!-- ======================================================================= -->
1027
Chris Lattnerf161d412009-02-13 21:51:45 +00001028<p>Clang provides support for C++ function overloading in C. Function
1029overloading in C is introduced using the <tt>overloadable</tt> attribute. For
1030example, one might provide several overloaded versions of a <tt>tgsin</tt>
1031function that invokes the appropriate standard function computing the sine of a
1032value with <tt>float</tt>, <tt>double</tt>, or <tt>long double</tt>
1033precision:</p>
Douglas Gregorcb54d432009-02-13 00:57:04 +00001034
1035<blockquote>
1036<pre>
1037#include &lt;math.h&gt;
1038float <b>__attribute__((overloadable))</b> tgsin(float x) { return sinf(x); }
1039double <b>__attribute__((overloadable))</b> tgsin(double x) { return sin(x); }
1040long double <b>__attribute__((overloadable))</b> tgsin(long double x) { return sinl(x); }
1041</pre>
1042</blockquote>
1043
1044<p>Given these declarations, one can call <tt>tgsin</tt> with a
1045<tt>float</tt> value to receive a <tt>float</tt> result, with a
1046<tt>double</tt> to receive a <tt>double</tt> result, etc. Function
1047overloading in C follows the rules of C++ function overloading to pick
1048the best overload given the call arguments, with a few C-specific
1049semantics:</p>
1050<ul>
1051 <li>Conversion from <tt>float</tt> or <tt>double</tt> to <tt>long
1052 double</tt> is ranked as a floating-point promotion (per C99) rather
1053 than as a floating-point conversion (as in C++).</li>
1054
1055 <li>A conversion from a pointer of type <tt>T*</tt> to a pointer of type
1056 <tt>U*</tt> is considered a pointer conversion (with conversion
1057 rank) if <tt>T</tt> and <tt>U</tt> are compatible types.</li>
1058
1059 <li>A conversion from type <tt>T</tt> to a value of type <tt>U</tt>
1060 is permitted if <tt>T</tt> and <tt>U</tt> are compatible types. This
1061 conversion is given "conversion" rank.</li>
1062</ul>
1063
1064<p>The declaration of <tt>overloadable</tt> functions is restricted to
1065function declarations and definitions. Most importantly, if any
1066function with a given name is given the <tt>overloadable</tt>
1067attribute, then all function declarations and definitions with that
1068name (and in that scope) must have the <tt>overloadable</tt>
Chris Lattnerf161d412009-02-13 21:51:45 +00001069attribute. This rule even applies to redeclarations of functions whose original
1070declaration had the <tt>overloadable</tt> attribute, e.g.,</p>
Douglas Gregorcb54d432009-02-13 00:57:04 +00001071
1072<blockquote>
1073<pre>
1074int f(int) __attribute__((overloadable));
1075float f(float); <i>// error: declaration of "f" must have the "overloadable" attribute</i>
1076
1077int g(int) __attribute__((overloadable));
1078int g(int) { } <i>// error: redeclaration of "g" must also have the "overloadable" attribute</i>
1079</pre>
1080</blockquote>
1081
Douglas Gregor965acbb2009-02-18 07:07:28 +00001082<p>Functions marked <tt>overloadable</tt> must have
1083prototypes. Therefore, the following code is ill-formed:</p>
1084
1085<blockquote>
1086<pre>
1087int h() __attribute__((overloadable)); <i>// error: h does not have a prototype</i>
1088</pre>
1089</blockquote>
1090
1091<p>However, <tt>overloadable</tt> functions are allowed to use a
1092ellipsis even if there are no named parameters (as is permitted in C++). This feature is particularly useful when combined with the <tt>unavailable</tt> attribute:</p>
1093
1094<blockquote>
1095<pre>
Chris Lattner02246802009-02-18 22:27:46 +00001096void honeypot(...) __attribute__((overloadable, unavailable)); <i>// calling me is an error</i>
Douglas Gregor965acbb2009-02-18 07:07:28 +00001097</pre>
1098</blockquote>
1099
Douglas Gregorcb54d432009-02-13 00:57:04 +00001100<p>Functions declared with the <tt>overloadable</tt> attribute have
1101their names mangled according to the same rules as C++ function
1102names. For example, the three <tt>tgsin</tt> functions in our
1103motivating example get the mangled names <tt>_Z5tgsinf</tt>,
Chris Lattner71b48d62010-11-28 18:19:13 +00001104<tt>_Z5tgsind</tt>, and <tt>_Z5tgsine</tt>, respectively. There are two
Douglas Gregorcb54d432009-02-13 00:57:04 +00001105caveats to this use of name mangling:</p>
1106
1107<ul>
1108
1109 <li>Future versions of Clang may change the name mangling of
1110 functions overloaded in C, so you should not depend on an specific
1111 mangling. To be completely safe, we strongly urge the use of
1112 <tt>static inline</tt> with <tt>overloadable</tt> functions.</li>
1113
1114 <li>The <tt>overloadable</tt> attribute has almost no meaning when
1115 used in C++, because names will already be mangled and functions are
1116 already overloadable. However, when an <tt>overloadable</tt>
1117 function occurs within an <tt>extern "C"</tt> linkage specification,
1118 it's name <i>will</i> be mangled in the same way as it would in
1119 C.</li>
1120</ul>
1121
Peter Collingbournec1b5fa42011-05-13 20:54:45 +00001122<p>Query for this feature with __has_extension(attribute_overloadable).</p>
Chris Lattner148772a2009-06-13 07:13:28 +00001123
Eli Friedman0c706c22011-09-19 23:17:44 +00001124<!-- ======================================================================= -->
1125<h2 id="complex-list-init">Initializer lists for complex numbers in C</h2>
1126<!-- ======================================================================= -->
1127
1128<p>clang supports an extension which allows the following in C:</p>
1129
1130<blockquote>
1131<pre>
1132#include &lt;math.h&gt;
1133#include &lt;complex.h&gt;
1134complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1135</pre>
1136</blockquote>
1137
1138<p>This construct is useful because there is no way to separately
1139initialize the real and imaginary parts of a complex variable in
1140standard C, given that clang does not support <code>_Imaginary</code>.
1141(clang also supports the <code>__real__</code> and <code>__imag__</code>
1142extensions from gcc, which help in some cases, but are not usable in
1143static initializers.)
1144
1145<p>Note that this extension does not allow eliding the braces; the
1146meaning of the following two lines is different:</p>
1147
1148<blockquote>
1149<pre>
1150complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1151complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1152</pre>
1153</blockquote>
1154
1155<p>This extension also works in C++ mode, as far as that goes, but does not
1156 apply to the C++ <code>std::complex</code>. (In C++11, list
1157 initialization allows the same syntax to be used with
1158 <code>std::complex</code> with the same meaning.)
Chris Lattner148772a2009-06-13 07:13:28 +00001159
Douglas Gregorcb54d432009-02-13 00:57:04 +00001160<!-- ======================================================================= -->
Chris Lattner5ce933f2009-02-09 08:46:11 +00001161<h2 id="builtins">Builtin Functions</h2>
1162<!-- ======================================================================= -->
1163
1164<p>Clang supports a number of builtin library functions with the same syntax as
1165GCC, including things like <tt>__builtin_nan</tt>,
1166<tt>__builtin_constant_p</tt>, <tt>__builtin_choose_expr</tt>,
1167<tt>__builtin_types_compatible_p</tt>, <tt>__sync_fetch_and_add</tt>, etc. In
1168addition to the GCC builtins, Clang supports a number of builtins that GCC does
1169not, which are listed here.</p>
1170
1171<p>Please note that Clang does not and will not support all of the GCC builtins
1172for vector operations. Instead of using builtins, you should use the functions
1173defined in target-specific header files like <tt>&lt;xmmintrin.h&gt;</tt>, which
1174define portable wrappers for these. Many of the Clang versions of these
1175functions are implemented directly in terms of <a href="#vectors">extended
1176vector support</a> instead of builtins, in order to reduce the number of
1177builtins that we need to implement.</p>
1178
Chris Lattner5ce933f2009-02-09 08:46:11 +00001179<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +00001180<h3><a name="__builtin_shufflevector">__builtin_shufflevector</a></h3>
Chris Lattner5ce933f2009-02-09 08:46:11 +00001181<!-- ======================================================================= -->
1182
Chris Lattneraad826b2009-09-16 18:56:12 +00001183<p><tt>__builtin_shufflevector</tt> is used to express generic vector
Chris Lattner6f72da52009-02-13 20:00:20 +00001184permutation/shuffle/swizzle operations. This builtin is also very important for
1185the implementation of various target-specific header files like
1186<tt>&lt;xmmintrin.h&gt;</tt>.
Chris Lattner5ce933f2009-02-09 08:46:11 +00001187</p>
1188
1189<p><b>Syntax:</b></p>
1190
1191<pre>
Chris Lattner6f72da52009-02-13 20:00:20 +00001192__builtin_shufflevector(vec1, vec2, index1, index2, ...)
Chris Lattner5ce933f2009-02-09 08:46:11 +00001193</pre>
1194
1195<p><b>Examples:</b></p>
1196
1197<pre>
Chris Lattner6f72da52009-02-13 20:00:20 +00001198 // Identity operation - return 4-element vector V1.
1199 __builtin_shufflevector(V1, V1, 0, 1, 2, 3)
1200
1201 // "Splat" element 0 of V1 into a 4-element result.
1202 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1203
1204 // Reverse 4-element vector V1.
1205 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1206
1207 // Concatenate every other element of 4-element vectors V1 and V2.
1208 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1209
1210 // Concatenate every other element of 8-element vectors V1 and V2.
1211 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
Chris Lattner5ce933f2009-02-09 08:46:11 +00001212</pre>
1213
1214<p><b>Description:</b></p>
1215
Chris Lattner6f72da52009-02-13 20:00:20 +00001216<p>The first two arguments to __builtin_shufflevector are vectors that have the
1217same element type. The remaining arguments are a list of integers that specify
1218the elements indices of the first two vectors that should be extracted and
1219returned in a new vector. These element indices are numbered sequentially
1220starting with the first vector, continuing into the second vector. Thus, if
1221vec1 is a 4-element vector, index 5 would refer to the second element of vec2.
Chris Lattner5ce933f2009-02-09 08:46:11 +00001222</p>
1223
Chris Lattner6f72da52009-02-13 20:00:20 +00001224<p>The result of __builtin_shufflevector is a vector
1225with the same element type as vec1/vec2 but that has an element count equal to
1226the number of indices specified.
1227</p>
Chris Lattner5ce933f2009-02-09 08:46:11 +00001228
Chris Lattner21190d52009-09-21 03:09:59 +00001229<p>Query for this feature with __has_builtin(__builtin_shufflevector).</p>
1230
1231<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +00001232<h3><a name="__builtin_unreachable">__builtin_unreachable</a></h3>
Chris Lattner21190d52009-09-21 03:09:59 +00001233<!-- ======================================================================= -->
1234
1235<p><tt>__builtin_unreachable</tt> is used to indicate that a specific point in
1236the program cannot be reached, even if the compiler might otherwise think it
1237can. This is useful to improve optimization and eliminates certain warnings.
1238For example, without the <tt>__builtin_unreachable</tt> in the example below,
1239the compiler assumes that the inline asm can fall through and prints a "function
1240declared 'noreturn' should not return" warning.
1241</p>
1242
1243<p><b>Syntax:</b></p>
1244
1245<pre>
1246__builtin_unreachable()
1247</pre>
1248
1249<p><b>Example of Use:</b></p>
1250
1251<pre>
1252void myabort(void) __attribute__((noreturn));
1253void myabort(void) {
1254 asm("int3");
1255 __builtin_unreachable();
1256}
1257</pre>
1258
1259<p><b>Description:</b></p>
1260
1261<p>The __builtin_unreachable() builtin has completely undefined behavior. Since
1262it has undefined behavior, it is a statement that it is never reached and the
1263optimizer can take advantage of this to produce better code. This builtin takes
1264no arguments and produces a void result.
1265</p>
1266
1267<p>Query for this feature with __has_builtin(__builtin_unreachable).</p>
1268
Chris Lattner23aa9c82011-04-09 03:57:26 +00001269<!-- ======================================================================= -->
Sean Hunt7e98b472011-06-23 01:21:01 +00001270<h3><a name="__sync_swap">__sync_swap</a></h3>
Chris Lattner23aa9c82011-04-09 03:57:26 +00001271<!-- ======================================================================= -->
1272
1273<p><tt>__sync_swap</tt> is used to atomically swap integers or pointers in
1274memory.
1275</p>
1276
1277<p><b>Syntax:</b></p>
1278
1279<pre>
1280<i>type</i> __sync_swap(<i>type</i> *ptr, <i>type</i> value, ...)
1281</pre>
1282
1283<p><b>Example of Use:</b></p>
1284
1285<pre>
Sean Hunt7e98b472011-06-23 01:21:01 +00001286int old_value = __sync_swap(&amp;value, new_value);
Chris Lattner23aa9c82011-04-09 03:57:26 +00001287</pre>
1288
1289<p><b>Description:</b></p>
1290
1291<p>The __sync_swap() builtin extends the existing __sync_*() family of atomic
1292intrinsics to allow code to atomically swap the current value with the new
1293value. More importantly, it helps developers write more efficient and correct
1294code by avoiding expensive loops around __sync_bool_compare_and_swap() or
1295relying on the platform specific implementation details of
1296__sync_lock_test_and_set(). The __sync_swap() builtin is a full barrier.
1297</p>
1298
Chris Lattner21190d52009-09-21 03:09:59 +00001299
Chris Lattner1177f912009-04-09 19:58:15 +00001300<!-- ======================================================================= -->
1301<h2 id="targetspecific">Target-Specific Extensions</h2>
1302<!-- ======================================================================= -->
1303
1304<p>Clang supports some language features conditionally on some targets.</p>
1305
1306<!-- ======================================================================= -->
1307<h3 id="x86-specific">X86/X86-64 Language Extensions</h3>
1308<!-- ======================================================================= -->
1309
1310<p>The X86 backend has these language extensions:</p>
1311
1312<!-- ======================================================================= -->
1313<h4 id="x86-gs-segment">Memory references off the GS segment</h4>
1314<!-- ======================================================================= -->
1315
1316<p>Annotating a pointer with address space #256 causes it to be code generated
Chris Lattnera021e7c2009-05-05 18:54:47 +00001317relative to the X86 GS segment register, and address space #257 causes it to be
1318relative to the X86 FS segment. Note that this is a very very low-level
1319feature that should only be used if you know what you're doing (for example in
1320an OS kernel).</p>
Chris Lattner1177f912009-04-09 19:58:15 +00001321
1322<p>Here is an example:</p>
1323
1324<pre>
1325#define GS_RELATIVE __attribute__((address_space(256)))
1326int foo(int GS_RELATIVE *P) {
1327 return *P;
1328}
1329</pre>
1330
1331<p>Which compiles to (on X86-32):</p>
1332
1333<pre>
1334_foo:
1335 movl 4(%esp), %eax
1336 movl %gs:(%eax), %eax
1337 ret
1338</pre>
1339
Ted Kremeneked869312009-04-10 05:03:33 +00001340<!-- ======================================================================= -->
1341<h2 id="analyzerspecific">Static Analysis-Specific Extensions</h2>
1342<!-- ======================================================================= -->
1343
1344<p>Clang supports additional attributes that are useful for documenting program
1345invariants and rules for static analysis tools. The extensions documented here
1346are used by the <a
1347href="http://clang.llvm.org/StaticAnalysis.html">path-sensitive static analyzer
1348engine</a> that is part of Clang's Analysis library.</p>
1349
John McCall87494012011-03-18 03:51:49 +00001350<h3 id="attr_analyzer_noreturn">The <tt>analyzer_noreturn</tt> attribute</h3>
Ted Kremeneked869312009-04-10 05:03:33 +00001351
1352<p>Clang's static analysis engine understands the standard <tt>noreturn</tt>
Ted Kremenek4df21142009-04-10 05:04:22 +00001353attribute. This attribute, which is typically affixed to a function prototype,
1354indicates that a call to a given function never returns. Function prototypes for
1355common functions like <tt>exit</tt> are typically annotated with this attribute,
1356as well as a variety of common assertion handlers. Users can educate the static
1357analyzer about their own custom assertion handles (thus cutting down on false
1358positives due to false paths) by marking their own &quot;panic&quot; functions
1359with this attribute.</p>
Ted Kremeneked869312009-04-10 05:03:33 +00001360
1361<p>While useful, <tt>noreturn</tt> is not applicable in all cases. Sometimes
Nick Lewycky625b5862009-06-14 04:08:08 +00001362there are special functions that for all intents and purposes should be
1363considered panic functions (i.e., they are only called when an internal program
1364error occurs) but may actually return so that the program can fail gracefully.
1365The <tt>analyzer_noreturn</tt> attribute allows one to annotate such functions
1366as being interpreted as &quot;no return&quot; functions by the analyzer (thus
Chris Lattner28935892009-04-10 05:54:56 +00001367pruning bogus paths) but will not affect compilation (as in the case of
Ted Kremeneked869312009-04-10 05:03:33 +00001368<tt>noreturn</tt>).</p>
1369
1370<p><b>Usage</b>: The <tt>analyzer_noreturn</tt> attribute can be placed in the
Chris Lattner28935892009-04-10 05:54:56 +00001371same places where the <tt>noreturn</tt> attribute can be placed. It is commonly
Ted Kremeneked869312009-04-10 05:03:33 +00001372placed at the end of function prototypes:</p>
1373
1374<pre>
1375 void foo() <b>__attribute__((analyzer_noreturn))</b>;
Chris Lattner148772a2009-06-13 07:13:28 +00001376</pre>
1377
John McCall87494012011-03-18 03:51:49 +00001378<p>Query for this feature with
1379<tt>__has_attribute(analyzer_noreturn)</tt>.</p>
Chris Lattner148772a2009-06-13 07:13:28 +00001380
John McCall87494012011-03-18 03:51:49 +00001381<h3 id="attr_method_family">The <tt>objc_method_family</tt> attribute</h3>
1382
1383<p>Many methods in Objective-C have conventional meanings determined
1384by their selectors. For the purposes of static analysis, it is
1385sometimes useful to be able to mark a method as having a particular
1386conventional meaning despite not having the right selector, or as not
1387having the conventional meaning that its selector would suggest.
1388For these use cases, we provide an attribute to specifically describe
1389the <q>method family</q> that a method belongs to.</p>
1390
1391<p><b>Usage</b>: <tt>__attribute__((objc_method_family(X)))</tt>,
1392where <tt>X</tt> is one of <tt>none</tt>, <tt>alloc</tt>, <tt>copy</tt>,
1393<tt>init</tt>, <tt>mutableCopy</tt>, or <tt>new</tt>. This attribute
1394can only be placed at the end of a method declaration:</p>
1395
1396<pre>
1397 - (NSString*) initMyStringValue <b>__attribute__((objc_method_family(none)))</b>;
1398</pre>
1399
1400<p>Users who do not wish to change the conventional meaning of a
1401method, and who merely want to document its non-standard retain and
1402release semantics, should use the
1403<a href="#attr_retain_release">retaining behavior attributes</a>
1404described below.</p>
1405
1406<p>Query for this feature with
1407<tt>__has_attribute(objc_method_family)</tt>.</p>
1408
1409<h3 id="attr_retain_release">Objective-C retaining behavior attributes</h3>
John McCall630b7ae2011-01-25 04:26:21 +00001410
1411<p>In Objective-C, functions and methods are generally assumed to take
1412and return objects with +0 retain counts, with some exceptions for
1413special methods like <tt>+alloc</tt> and <tt>init</tt>. However,
1414there are exceptions, and so Clang provides attributes to allow these
1415exceptions to be documented, which helps the analyzer find leaks (and
John McCall87494012011-03-18 03:51:49 +00001416ignore non-leaks). Some exceptions may be better described using
1417the <a href="#attr_method_family"><tt>objc_method_family</tt></a>
1418attribute instead.</p>
John McCall630b7ae2011-01-25 04:26:21 +00001419
1420<p><b>Usage</b>: The <tt>ns_returns_retained</tt>, <tt>ns_returns_not_retained</tt>,
1421<tt>ns_returns_autoreleased</tt>, <tt>cf_returns_retained</tt>,
1422and <tt>cf_returns_not_retained</tt> attributes can be placed on
1423methods and functions that return Objective-C or CoreFoundation
1424objects. They are commonly placed at the end of a function prototype
1425or method declaration:</p>
1426
1427<pre>
1428 id foo() <b>__attribute__((ns_returns_retained))</b>;
1429
1430 - (NSString*) bar: (int) x <b>__attribute__((ns_returns_retained))</b>;
1431</pre>
1432
1433<p>The <tt>*_returns_retained</tt> attributes specify that the
1434returned object has a +1 retain count.
1435The <tt>*_returns_not_retained</tt> attributes specify that the return
1436object has a +0 retain count, even if the normal convention for its
1437selector would be +1. <tt>ns_returns_autoreleased</tt> specifies that the
1438returned object is +0, but is guaranteed to live at least as long as the
1439next flush of an autorelease pool.</p>
1440
1441<p><b>Usage</b>: The <tt>ns_consumed</tt> and <tt>cf_consumed</tt>
1442attributes can be placed on an parameter declaration; they specify
1443that the argument is expected to have a +1 retain count, which will be
1444balanced in some way by the function or method.
1445The <tt>ns_consumes_self</tt> attribute can only be placed on an
1446Objective-C method; it specifies that the method expects
1447its <tt>self</tt> parameter to have a +1 retain count, which it will
1448balance in some way.</p>
1449
1450<pre>
1451 void <b>foo(__attribute__((ns_consumed))</b> NSString *string);
1452
1453 - (void) bar <b>__attribute__((ns_consumes_self))</b>;
1454 - (void) baz: (id) <b>__attribute__((ns_consumed))</b> x;
1455</pre>
Ted Kremeneked869312009-04-10 05:03:33 +00001456
John McCall87494012011-03-18 03:51:49 +00001457<p>Query for these features with <tt>__has_attribute(ns_consumed)</tt>,
1458<tt>__has_attribute(ns_returns_retained)</tt>, etc.</p>
1459
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +00001460<!-- ======================================================================= -->
1461<h2 id="dynamicanalyzerspecific">Dynamic Analysis-Specific Extensions</h2>
1462<!-- ======================================================================= -->
1463<h3 id="address_sanitizer">AddressSanitizer</h3>
1464<p> Use <code>__has_feature(address_sanitizer)</code>
1465to check if the code is being built with <a
1466 href="AddressSanitizer.html">AddressSanitizer</a>.
1467</p>
Kostya Serebryany71efba02012-01-24 19:25:38 +00001468<p>Use <tt>__attribute__((no_address_safety_analysis))</tt> on a function
1469declaration to specify that address safety instrumentation (e.g.
1470AddressSanitizer) should not be applied to that function.
1471</p>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001472
1473<!-- ======================================================================= -->
Caitlin Sadowski73cbbc82011-07-28 18:38:36 +00001474<h2 id="threadsafety">Thread-Safety Annotation Checking</h2>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001475<!-- ======================================================================= -->
1476
1477<p>Clang supports additional attributes for checking basic locking policies in
1478multithreaded programs.
1479Clang currently parses the following list of attributes, although
1480<b>the implementation for these annotations is currently in development.</b>
1481For more details, see the
1482<a href="http://gcc.gnu.org/wiki/ThreadSafetyAnnotation">GCC implementation</a>.
1483</p>
1484
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001485<h4 id="ts_noanal">no_thread_safety_analysis</h4>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001486
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001487<p>Use <tt>__attribute__((no_thread_safety_analysis))</tt> on a function
1488declaration to specify that the thread safety analysis should not be run on that
1489function. This attribute provides an escape hatch (e.g. for situations when it
1490is difficult to annotate the locking policy). </p>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001491
1492<h4 id="ts_lockable">lockable</h4>
1493
1494<p>Use <tt>__attribute__((lockable))</tt> on a class definition to specify
1495that it has a lockable type (e.g. a Mutex class). This annotation is primarily
1496used to check consistency.</p>
1497
1498<h4 id="ts_scopedlockable">scoped_lockable</h4>
1499
1500<p>Use <tt>__attribute__((scoped_lockable))</tt> on a class definition to
1501specify that it has a "scoped" lockable type. Objects of this type will acquire
1502the lock upon construction and release it upon going out of scope.
1503 This annotation is primarily used to check
1504consistency.</p>
1505
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001506<h4 id="ts_guardedvar">guarded_var</h4>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001507
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001508<p>Use <tt>__attribute__((guarded_var))</tt> on a variable declaration to
1509specify that the variable must be accessed while holding some lock.</p>
1510
1511<h4 id="ts_ptguardedvar">pt_guarded_var</h4>
1512
1513<p>Use <tt>__attribute__((pt_guarded_var))</tt> on a pointer declaration to
1514specify that the pointer must be dereferenced while holding some lock.</p>
1515
1516<h4 id="ts_guardedby">guarded_by(l)</h4>
1517
1518<p>Use <tt>__attribute__((guarded_by(l)))</tt> on a variable declaration to
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001519specify that the variable must be accessed while holding lock <tt>l</tt>.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001520
1521<h4 id="ts_ptguardedby">pt_guarded_by(l)</h4>
1522
1523<p>Use <tt>__attribute__((pt_guarded_by(l)))</tt> on a pointer declaration to
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001524specify that the pointer must be dereferenced while holding lock <tt>l</tt>.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001525
1526<h4 id="ts_acquiredbefore">acquired_before(...)</h4>
1527
1528<p>Use <tt>__attribute__((acquired_before(...)))</tt> on a declaration
1529of a lockable variable to specify that the lock must be acquired before all
1530attribute arguments. Arguments must be lockable type, and there must be at
1531least one argument.</p>
1532
1533<h4 id="ts_acquiredafter">acquired_after(...)</h4>
1534
1535<p>Use <tt>__attribute__((acquired_after(...)))</tt> on a declaration
1536of a lockable variable to specify that the lock must be acquired after all
1537attribute arguments. Arguments must be lockable type, and there must be at
1538least one argument.</p>
1539
1540<h4 id="ts_elf">exclusive_lock_function(...)</h4>
1541
1542<p>Use <tt>__attribute__((exclusive_lock_function(...)))</tt> on a function
1543declaration to specify that the function acquires all listed locks
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001544exclusively. This attribute takes zero or more arguments: either of lockable
1545type or integers indexing into function parameters of lockable type. If no
1546arguments are given, the acquired lock is implicitly <tt>this</tt> of the
1547enclosing object.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001548
1549<h4 id="ts_slf">shared_lock_function(...)</h4>
1550
1551<p>Use <tt>__attribute__((shared_lock_function(...)))</tt> on a function
1552declaration to specify that the function acquires all listed locks, although
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001553 the locks may be shared (e.g. read locks). This attribute takes zero or more
1554arguments: either of lockable type or integers indexing into function
1555parameters of lockable type. If no arguments are given, the acquired lock is
1556implicitly <tt>this</tt> of the enclosing object.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001557
1558<h4 id="ts_etf">exclusive_trylock_function(...)</h4>
1559
1560<p>Use <tt>__attribute__((exclusive_lock_function(...)))</tt> on a function
1561declaration to specify that the function will try (without blocking) to acquire
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001562all listed locks exclusively. This attribute takes one or more arguments. The
1563first argument is an integer or boolean value specifying the return value of a
1564successful lock acquisition. The remaining arugments are either of lockable type
1565or integers indexing into function parameters of lockable type. If only one
1566argument is given, the acquired lock is implicitly <tt>this</tt> of the
1567enclosing object.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001568
1569<h4 id="ts_stf">shared_trylock_function(...)</h4>
1570
1571<p>Use <tt>__attribute__((shared_lock_function(...)))</tt> on a function
1572declaration to specify that the function will try (without blocking) to acquire
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001573all listed locks, although the locks may be shared (e.g. read locks). This
1574attribute takes one or more arguments. The first argument is an integer or
1575boolean value specifying the return value of a successful lock acquisition. The
1576remaining arugments are either of lockable type or integers indexing into
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001577function parameters of lockable type. If only one argument is given, the
1578acquired lock is implicitly <tt>this</tt> of the enclosing object.</p>
1579
1580<h4 id="ts_uf">unlock_function(...)</h4>
1581
1582<p>Use <tt>__attribute__((unlock_function(...)))</tt> on a function
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001583declaration to specify that the function release all listed locks. This
1584attribute takes zero or more arguments: either of lockable type or integers
1585indexing into function parameters of lockable type. If no arguments are given,
1586the acquired lock is implicitly <tt>this</tt> of the enclosing object.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001587
1588<h4 id="ts_lr">lock_returned(l)</h4>
1589
1590<p>Use <tt>__attribute__((lock_returned(l)))</tt> on a function
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001591declaration to specify that the function returns lock <tt>l</tt> (<tt>l</tt>
1592must be of lockable type). This annotation is used to aid in resolving lock
1593expressions.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001594
1595<h4 id="ts_le">locks_excluded(...)</h4>
1596
1597<p>Use <tt>__attribute__((locks_excluded(...)))</tt> on a function declaration
Caitlin Sadowskib51e0312011-08-09 17:59:31 +00001598to specify that the function must not be called with the listed locks. Arguments
1599must be lockable type, and there must be at least one argument.</p>
Caitlin Sadowskidb33e142011-07-28 20:12:35 +00001600
1601<h4 id="ts_elr">exclusive_locks_required(...)</h4>
1602
1603<p>Use <tt>__attribute__((exclusive_locks_required(...)))</tt> on a function
1604declaration to specify that the function must be called while holding the listed
1605exclusive locks. Arguments must be lockable type, and there must be at
1606least one argument.</p>
1607
1608<h4 id="ts_slr">shared_locks_required(...)</h4>
1609
1610<p>Use <tt>__attribute__((shared_locks_required(...)))</tt> on a function
1611declaration to specify that the function must be called while holding the listed
1612shared locks. Arguments must be lockable type, and there must be at
1613least one argument.</p>
Caitlin Sadowskifdde9e72011-07-28 17:21:07 +00001614
Chris Lattner5ce933f2009-02-09 08:46:11 +00001615</div>
1616</body>
1617</html>