blob: a8fb4623b637a4bb174e7c678b3e0b2646c52738 [file] [log] [blame]
Sean Silva709c44d2012-12-12 23:44:55 +00001=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6 :local:
Sean Silva13d43fe2013-01-02 21:09:58 +00007 :depth: 1
Sean Silva709c44d2012-12-12 23:44:55 +00008
Sean Silvaf380e0e2013-01-02 21:03:11 +00009.. toctree::
10 :hidden:
11
12 ObjectiveCLiterals
13 BlockLanguageSpec
Michael Gottesman6fd58462013-01-07 22:24:45 +000014 Block-ABI-Apple
DeLesley Hutchinsc51e08c2014-02-18 19:42:01 +000015 AutomaticReferenceCounting
Sean Silvaf380e0e2013-01-02 21:03:11 +000016
Sean Silva709c44d2012-12-12 23:44:55 +000017Introduction
18============
19
20This document describes the language extensions provided by Clang. In addition
21to the language extensions listed here, Clang aims to support a broad range of
22GCC extensions. Please see the `GCC manual
23<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
24these extensions.
25
26.. _langext-feature_check:
27
28Feature Checking Macros
29=======================
30
31Language extensions can be very useful, but only if you know you can depend on
32them. In order to allow fine-grain features checks, we support three builtin
33function-like macros. This allows you to directly test for a feature in your
34code without having to resort to something like autoconf or fragile "compiler
35version checks".
36
37``__has_builtin``
38-----------------
39
40This function-like macro takes a single identifier argument that is the name of
41a builtin function. It evaluates to 1 if the builtin is supported or 0 if not.
42It can be used like this:
43
44.. code-block:: c++
45
46 #ifndef __has_builtin // Optional of course.
47 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
48 #endif
49
50 ...
51 #if __has_builtin(__builtin_trap)
52 __builtin_trap();
53 #else
54 abort();
55 #endif
56 ...
57
58.. _langext-__has_feature-__has_extension:
59
60``__has_feature`` and ``__has_extension``
61-----------------------------------------
62
63These function-like macros take a single identifier argument that is the name
64of a feature. ``__has_feature`` evaluates to 1 if the feature is both
65supported by Clang and standardized in the current language standard or 0 if
66not (but see :ref:`below <langext-has-feature-back-compat>`), while
67``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
68current language (either as a language extension or a standard language
69feature) or 0 if not. They can be used like this:
70
71.. code-block:: c++
72
73 #ifndef __has_feature // Optional of course.
74 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
75 #endif
76 #ifndef __has_extension
77 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
78 #endif
79
80 ...
81 #if __has_feature(cxx_rvalue_references)
82 // This code will only be compiled with the -std=c++11 and -std=gnu++11
83 // options, because rvalue references are only standardized in C++11.
84 #endif
85
86 #if __has_extension(cxx_rvalue_references)
87 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
88 // and -std=gnu++98 options, because rvalue references are supported as a
89 // language extension in C++98.
90 #endif
91
92.. _langext-has-feature-back-compat:
93
Alp Toker958027b2014-07-14 19:42:55 +000094For backward compatibility, ``__has_feature`` can also be used to test
Sean Silva709c44d2012-12-12 23:44:55 +000095for support for non-standardized features, i.e. features not prefixed ``c_``,
96``cxx_`` or ``objc_``.
97
98Another use of ``__has_feature`` is to check for compiler features not related
Sean Silva173d2522013-01-02 13:07:47 +000099to the language standard, such as e.g. :doc:`AddressSanitizer
100<AddressSanitizer>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000101
102If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
103to ``__has_feature``.
104
105The feature tag is described along with the language feature below.
106
107The feature name or extension name can also be specified with a preceding and
108following ``__`` (double underscore) to avoid interference from a macro with
109the same name. For instance, ``__cxx_rvalue_references__`` can be used instead
110of ``cxx_rvalue_references``.
111
Aaron Ballmana0344c52014-11-14 13:44:02 +0000112``__has_cpp_attribute``
Aaron Ballman631bd7b2014-11-14 14:01:55 +0000113-----------------------
Aaron Ballmana0344c52014-11-14 13:44:02 +0000114
115This function-like macro takes a single argument that is the name of a
116C++11-style attribute. The argument can either be a single identifier, or a
117scoped identifier. If the attribute is supported, a nonzero value is returned.
118If the attribute is a standards-based attribute, this macro returns a nonzero
119value based on the year and month in which the attribute was voted into the
120working draft. If the attribute is not supported by the current compliation
121target, this macro evaluates to 0. It can be used like this:
122
123.. code-block:: c++
124
125 #ifndef __has_cpp_attribute // Optional of course.
126 #define __has_cpp_attribute(x) 0 // Compatibility with non-clang compilers.
127 #endif
128
129 ...
130 #if __has_cpp_attribute(clang::fallthrough)
131 #define FALLTHROUGH [[clang::fallthrough]]
132 #else
133 #define FALLTHROUGH
134 #endif
135 ...
136
137The attribute identifier (but not scope) can also be specified with a preceding
138and following ``__`` (double underscore) to avoid interference from a macro with
139the same name. For instance, ``gnu::__const__`` can be used instead of
140``gnu::const``.
141
Sean Silva709c44d2012-12-12 23:44:55 +0000142``__has_attribute``
143-------------------
144
145This function-like macro takes a single identifier argument that is the name of
Aaron Ballman4bfaeba2014-12-05 17:11:49 +0000146a GNU-style attribute. It evaluates to 1 if the attribute is supported by the
147current compilation target, or 0 if not. It can be used like this:
Sean Silva709c44d2012-12-12 23:44:55 +0000148
149.. code-block:: c++
150
151 #ifndef __has_attribute // Optional of course.
152 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
153 #endif
154
155 ...
156 #if __has_attribute(always_inline)
157 #define ALWAYS_INLINE __attribute__((always_inline))
158 #else
159 #define ALWAYS_INLINE
160 #endif
161 ...
162
163The attribute name can also be specified with a preceding and following ``__``
164(double underscore) to avoid interference from a macro with the same name. For
165instance, ``__always_inline__`` can be used instead of ``always_inline``.
166
Aaron Ballman3c0f9b42014-12-05 15:05:29 +0000167
168``__has_declspec_attribute``
169----------------------------
170
171This function-like macro takes a single identifier argument that is the name of
172an attribute implemented as a Microsoft-style ``__declspec`` attribute. It
173evaluates to 1 if the attribute is supported by the current compilation target,
174or 0 if not. It can be used like this:
175
176.. code-block:: c++
177
178 #ifndef __has_declspec_attribute // Optional of course.
179 #define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers.
180 #endif
181
182 ...
183 #if __has_declspec_attribute(dllexport)
184 #define DLLEXPORT __declspec(dllexport)
185 #else
186 #define DLLEXPORT
187 #endif
188 ...
189
190The attribute name can also be specified with a preceding and following ``__``
191(double underscore) to avoid interference from a macro with the same name. For
192instance, ``__dllexport__`` can be used instead of ``dllexport``.
193
Yunzhong Gaoa8c45c92014-04-12 02:25:32 +0000194``__is_identifier``
195-------------------
196
197This function-like macro takes a single identifier argument that might be either
198a reserved word or a regular identifier. It evaluates to 1 if the argument is just
199a regular identifier and not a reserved word, in the sense that it can then be
200used as the name of a user-defined function or variable. Otherwise it evaluates
201to 0. It can be used like this:
202
203.. code-block:: c++
204
205 ...
206 #ifdef __is_identifier // Compatibility with non-clang compilers.
207 #if __is_identifier(__wchar_t)
208 typedef wchar_t __wchar_t;
209 #endif
210 #endif
211
212 __wchar_t WideCharacter;
213 ...
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000214
Sean Silva709c44d2012-12-12 23:44:55 +0000215Include File Checking Macros
216============================
217
218Not all developments systems have the same include files. The
219:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
220you to check for the existence of an include file before doing a possibly
Dmitri Gribenko764ea242013-01-17 17:04:54 +0000221failing ``#include`` directive. Include file checking macros must be used
222as expressions in ``#if`` or ``#elif`` preprocessing directives.
Sean Silva709c44d2012-12-12 23:44:55 +0000223
224.. _langext-__has_include:
225
226``__has_include``
227-----------------
228
229This function-like macro takes a single file name string argument that is the
230name of an include file. It evaluates to 1 if the file can be found using the
231include paths, or 0 otherwise:
232
233.. code-block:: c++
234
235 // Note the two possible file name string formats.
236 #if __has_include("myinclude.h") && __has_include(<stdint.h>)
237 # include "myinclude.h"
238 #endif
239
Richard Smithccfc9ff2013-07-11 00:27:05 +0000240To test for this feature, use ``#if defined(__has_include)``:
241
242.. code-block:: c++
243
Sean Silva709c44d2012-12-12 23:44:55 +0000244 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000245 #if defined(__has_include)
246 #if __has_include("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000247 # include "myinclude.h"
248 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000249 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000250
251.. _langext-__has_include_next:
252
253``__has_include_next``
254----------------------
255
256This function-like macro takes a single file name string argument that is the
257name of an include file. It is like ``__has_include`` except that it looks for
258the second instance of the given file found in the include paths. It evaluates
259to 1 if the second instance of the file can be found using the include paths,
260or 0 otherwise:
261
262.. code-block:: c++
263
264 // Note the two possible file name string formats.
265 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
266 # include_next "myinclude.h"
267 #endif
268
269 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000270 #if defined(__has_include_next)
271 #if __has_include_next("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000272 # include_next "myinclude.h"
273 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000274 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000275
276Note that ``__has_include_next``, like the GNU extension ``#include_next``
277directive, is intended for use in headers only, and will issue a warning if
278used in the top-level compilation file. A warning will also be issued if an
279absolute path is used in the file argument.
280
281``__has_warning``
282-----------------
283
284This function-like macro takes a string literal that represents a command line
285option for a warning and returns true if that is a valid warning option.
286
287.. code-block:: c++
288
289 #if __has_warning("-Wformat")
290 ...
291 #endif
292
293Builtin Macros
294==============
295
296``__BASE_FILE__``
297 Defined to a string that contains the name of the main input file passed to
298 Clang.
299
300``__COUNTER__``
301 Defined to an integer value that starts at zero and is incremented each time
302 the ``__COUNTER__`` macro is expanded.
303
304``__INCLUDE_LEVEL__``
305 Defined to an integral value that is the include depth of the file currently
306 being translated. For the main file, this value is zero.
307
308``__TIMESTAMP__``
309 Defined to the date and time of the last modification of the current source
310 file.
311
312``__clang__``
313 Defined when compiling with Clang
314
315``__clang_major__``
316 Defined to the major marketing version number of Clang (e.g., the 2 in
317 2.0.1). Note that marketing version numbers should not be used to check for
318 language features, as different vendors use different numbering schemes.
319 Instead, use the :ref:`langext-feature_check`.
320
321``__clang_minor__``
322 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note
323 that marketing version numbers should not be used to check for language
324 features, as different vendors use different numbering schemes. Instead, use
325 the :ref:`langext-feature_check`.
326
327``__clang_patchlevel__``
328 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
329
330``__clang_version__``
331 Defined to a string that captures the Clang marketing version, including the
332 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
333
334.. _langext-vectors:
335
336Vectors and Extended Vectors
337============================
338
339Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
340
341OpenCL vector types are created using ``ext_vector_type`` attribute. It
342support for ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example
343is:
344
345.. code-block:: c++
346
347 typedef float float4 __attribute__((ext_vector_type(4)));
348 typedef float float2 __attribute__((ext_vector_type(2)));
349
350 float4 foo(float2 a, float2 b) {
351 float4 c;
352 c.xz = a;
353 c.yw = b;
354 return c;
355 }
356
357Query for this feature with ``__has_extension(attribute_ext_vector_type)``.
358
Eric Christopher758aad72017-03-21 22:06:18 +0000359Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax
Sean Silva709c44d2012-12-12 23:44:55 +0000360and functions. For example:
361
362.. code-block:: c++
363
364 vector float foo(vector int a) {
365 vector int b;
366 b = vec_add(a, a) + a;
367 return (vector float)b;
368 }
369
370NEON vector types are created using ``neon_vector_type`` and
371``neon_polyvector_type`` attributes. For example:
372
373.. code-block:: c++
374
375 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
376 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
377
378 int8x8_t foo(int8x8_t a) {
379 int8x8_t v;
380 v = a;
381 return v;
382 }
383
384Vector Literals
385---------------
386
387Vector literals can be used to create vectors from a set of scalars, or
388vectors. Either parentheses or braces form can be used. In the parentheses
389form the number of literal values specified must be one, i.e. referring to a
390scalar value, or must match the size of the vector type being created. If a
391single scalar literal value is specified, the scalar literal value will be
392replicated to all the components of the vector type. In the brackets form any
393number of literals can be specified. For example:
394
395.. code-block:: c++
396
397 typedef int v4si __attribute__((__vector_size__(16)));
398 typedef float float4 __attribute__((ext_vector_type(4)));
399 typedef float float2 __attribute__((ext_vector_type(2)));
400
401 v4si vsi = (v4si){1, 2, 3, 4};
402 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
403 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
404 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
405 vector int vi3 = (vector int)(1, 2); // error
406 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
407 vector int vi5 = (vector int)(1, 2, 3, 4);
408 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
409
410Vector Operations
411-----------------
412
413The table below shows the support for each operation by vector extension. A
414dash indicates that an operation is not accepted according to a corresponding
415specification.
416
Anton Yartsev94e46f32014-09-03 17:59:21 +0000417============================== ======= ======= ======= =======
Nick Lewycky00a5d212015-08-10 19:54:11 +0000418 Operator OpenCL AltiVec GCC NEON
Anton Yartsev94e46f32014-09-03 17:59:21 +0000419============================== ======= ======= ======= =======
420[] yes yes yes --
421unary operators +, -- yes yes yes --
422++, -- -- yes yes yes --
423+,--,*,/,% yes yes yes --
424bitwise operators &,|,^,~ yes yes yes --
425>>,<< yes yes yes --
426!, &&, || yes -- -- --
427==, !=, >, <, >=, <= yes yes -- --
428= yes yes yes yes
429:? yes -- -- --
430sizeof yes yes yes yes
431C-style cast yes yes yes no
432reinterpret_cast yes no yes no
433static_cast yes no yes no
434const_cast no no no no
435============================== ======= ======= ======= =======
Sean Silva709c44d2012-12-12 23:44:55 +0000436
Anton Yartsev94e46f32014-09-03 17:59:21 +0000437See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
Sean Silva709c44d2012-12-12 23:44:55 +0000438
439Messages on ``deprecated`` and ``unavailable`` Attributes
440=========================================================
441
442An optional string message can be added to the ``deprecated`` and
443``unavailable`` attributes. For example:
444
445.. code-block:: c++
446
447 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
448
449If the deprecated or unavailable declaration is used, the message will be
450incorporated into the appropriate diagnostic:
451
George Burgess IV61e43272016-06-21 00:16:23 +0000452.. code-block:: none
Sean Silva709c44d2012-12-12 23:44:55 +0000453
454 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
455 [-Wdeprecated-declarations]
456 explode();
457 ^
458
459Query for this feature with
460``__has_extension(attribute_deprecated_with_message)`` and
461``__has_extension(attribute_unavailable_with_message)``.
462
463Attributes on Enumerators
464=========================
465
466Clang allows attributes to be written on individual enumerators. This allows
467enumerators to be deprecated, made unavailable, etc. The attribute must appear
468after the enumerator name and before any initializer, like so:
469
470.. code-block:: c++
471
472 enum OperationMode {
473 OM_Invalid,
474 OM_Normal,
475 OM_Terrified __attribute__((deprecated)),
476 OM_AbortOnError __attribute__((deprecated)) = 4
477 };
478
479Attributes on the ``enum`` declaration do not apply to individual enumerators.
480
481Query for this feature with ``__has_extension(enumerator_attributes)``.
482
483'User-Specified' System Frameworks
484==================================
485
486Clang provides a mechanism by which frameworks can be built in such a way that
487they will always be treated as being "system frameworks", even if they are not
488present in a system framework directory. This can be useful to system
489framework developers who want to be able to test building other applications
490with development builds of their framework, including the manner in which the
491compiler changes warning behavior for system headers.
492
493Framework developers can opt-in to this mechanism by creating a
494"``.system_framework``" file at the top-level of their framework. That is, the
495framework should have contents like:
496
497.. code-block:: none
498
499 .../TestFramework.framework
500 .../TestFramework.framework/.system_framework
501 .../TestFramework.framework/Headers
502 .../TestFramework.framework/Headers/TestFramework.h
503 ...
504
505Clang will treat the presence of this file as an indicator that the framework
506should be treated as a system framework, regardless of how it was found in the
507framework search path. For consistency, we recommend that such files never be
508included in installed versions of the framework.
509
Sean Silva709c44d2012-12-12 23:44:55 +0000510Checks for Standard Language Features
511=====================================
512
513The ``__has_feature`` macro can be used to query if certain standard language
514features are enabled. The ``__has_extension`` macro can be used to query if
515language features are available as an extension when compiling for a standard
516which does not provide them. The features which can be tested are listed here.
517
Richard Smith38af8562014-11-12 21:16:38 +0000518Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
519These are macros with names of the form ``__cpp_<feature_name>``, and are
520intended to be a portable way to query the supported features of the compiler.
521See `the C++ status page <http://clang.llvm.org/cxx_status.html#ts>`_ for
522information on the version of SD-6 supported by each Clang release, and the
523macros provided by that revision of the recommendations.
524
Sean Silva709c44d2012-12-12 23:44:55 +0000525C++98
526-----
527
528The features listed below are part of the C++98 standard. These features are
529enabled by default when compiling C++ code.
530
531C++ exceptions
532^^^^^^^^^^^^^^
533
534Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
535enabled. For example, compiling code with ``-fno-exceptions`` disables C++
536exceptions.
537
538C++ RTTI
539^^^^^^^^
540
541Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For
542example, compiling code with ``-fno-rtti`` disables the use of RTTI.
543
544C++11
545-----
546
547The features listed below are part of the C++11 standard. As a result, all
548these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
549when compiling C++ code.
550
551C++11 SFINAE includes access control
552^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
553
554Use ``__has_feature(cxx_access_control_sfinae)`` or
555``__has_extension(cxx_access_control_sfinae)`` to determine whether
556access-control errors (e.g., calling a private constructor) are considered to
557be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
558<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
559
560C++11 alias templates
561^^^^^^^^^^^^^^^^^^^^^
562
563Use ``__has_feature(cxx_alias_templates)`` or
564``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
565alias declarations and alias templates is enabled.
566
567C++11 alignment specifiers
568^^^^^^^^^^^^^^^^^^^^^^^^^^
569
570Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
571determine if support for alignment specifiers using ``alignas`` is enabled.
572
Nico Weber736a9932014-12-03 01:25:49 +0000573Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to
574determine if support for the ``alignof`` keyword is enabled.
575
Sean Silva709c44d2012-12-12 23:44:55 +0000576C++11 attributes
577^^^^^^^^^^^^^^^^
578
579Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
580determine if support for attribute parsing with C++11's square bracket notation
581is enabled.
582
583C++11 generalized constant expressions
584^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
585
586Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
587constant expressions (e.g., ``constexpr``) is enabled.
588
589C++11 ``decltype()``
590^^^^^^^^^^^^^^^^^^^^
591
592Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
593determine if support for the ``decltype()`` specifier is enabled. C++11's
594``decltype`` does not require type-completeness of a function call expression.
595Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
596``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
597support for this feature is enabled.
598
599C++11 default template arguments in function templates
600^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
601
602Use ``__has_feature(cxx_default_function_template_args)`` or
603``__has_extension(cxx_default_function_template_args)`` to determine if support
604for default template arguments in function templates is enabled.
605
606C++11 ``default``\ ed functions
607^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
608
609Use ``__has_feature(cxx_defaulted_functions)`` or
610``__has_extension(cxx_defaulted_functions)`` to determine if support for
611defaulted function definitions (with ``= default``) is enabled.
612
613C++11 delegating constructors
614^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
615
616Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
617delegating constructors is enabled.
618
619C++11 ``deleted`` functions
620^^^^^^^^^^^^^^^^^^^^^^^^^^^
621
622Use ``__has_feature(cxx_deleted_functions)`` or
623``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
624function definitions (with ``= delete``) is enabled.
625
626C++11 explicit conversion functions
627^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
628
629Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
630``explicit`` conversion functions is enabled.
631
632C++11 generalized initializers
633^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
634
635Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
636generalized initializers (using braced lists and ``std::initializer_list``) is
637enabled.
638
639C++11 implicit move constructors/assignment operators
640^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
641
642Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
643generate move constructors and move assignment operators where needed.
644
645C++11 inheriting constructors
646^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
647
648Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
Richard Smith25b555a2013-04-19 17:00:31 +0000649inheriting constructors is enabled.
Sean Silva709c44d2012-12-12 23:44:55 +0000650
651C++11 inline namespaces
652^^^^^^^^^^^^^^^^^^^^^^^
653
654Use ``__has_feature(cxx_inline_namespaces)`` or
655``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
656namespaces is enabled.
657
658C++11 lambdas
659^^^^^^^^^^^^^
660
661Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
662determine if support for lambdas is enabled.
663
664C++11 local and unnamed types as template arguments
665^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
666
667Use ``__has_feature(cxx_local_type_template_args)`` or
668``__has_extension(cxx_local_type_template_args)`` to determine if support for
669local and unnamed types as template arguments is enabled.
670
671C++11 noexcept
672^^^^^^^^^^^^^^
673
674Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
675determine if support for noexcept exception specifications is enabled.
676
677C++11 in-class non-static data member initialization
678^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
679
680Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
681initialization of non-static data members is enabled.
682
683C++11 ``nullptr``
684^^^^^^^^^^^^^^^^^
685
686Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
687determine if support for ``nullptr`` is enabled.
688
689C++11 ``override control``
690^^^^^^^^^^^^^^^^^^^^^^^^^^
691
692Use ``__has_feature(cxx_override_control)`` or
693``__has_extension(cxx_override_control)`` to determine if support for the
694override control keywords is enabled.
695
696C++11 reference-qualified functions
697^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
698
699Use ``__has_feature(cxx_reference_qualified_functions)`` or
700``__has_extension(cxx_reference_qualified_functions)`` to determine if support
701for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
702applied to ``*this``) is enabled.
703
704C++11 range-based ``for`` loop
705^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
706
707Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
708determine if support for the range-based for loop is enabled.
709
710C++11 raw string literals
711^^^^^^^^^^^^^^^^^^^^^^^^^
712
713Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
714string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
715
716C++11 rvalue references
717^^^^^^^^^^^^^^^^^^^^^^^
718
719Use ``__has_feature(cxx_rvalue_references)`` or
720``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
721references is enabled.
722
723C++11 ``static_assert()``
724^^^^^^^^^^^^^^^^^^^^^^^^^
725
726Use ``__has_feature(cxx_static_assert)`` or
727``__has_extension(cxx_static_assert)`` to determine if support for compile-time
728assertions using ``static_assert`` is enabled.
729
Richard Smith25b555a2013-04-19 17:00:31 +0000730C++11 ``thread_local``
731^^^^^^^^^^^^^^^^^^^^^^
732
733Use ``__has_feature(cxx_thread_local)`` to determine if support for
734``thread_local`` variables is enabled.
735
Sean Silva709c44d2012-12-12 23:44:55 +0000736C++11 type inference
737^^^^^^^^^^^^^^^^^^^^
738
739Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
740determine C++11 type inference is supported using the ``auto`` specifier. If
741this is disabled, ``auto`` will instead be a storage class specifier, as in C
742or C++98.
743
744C++11 strongly typed enumerations
745^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
746
747Use ``__has_feature(cxx_strong_enums)`` or
748``__has_extension(cxx_strong_enums)`` to determine if support for strongly
749typed, scoped enumerations is enabled.
750
751C++11 trailing return type
752^^^^^^^^^^^^^^^^^^^^^^^^^^
753
754Use ``__has_feature(cxx_trailing_return)`` or
755``__has_extension(cxx_trailing_return)`` to determine if support for the
756alternate function declaration syntax with trailing return type is enabled.
757
758C++11 Unicode string literals
759^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
760
761Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
762string literals is enabled.
763
764C++11 unrestricted unions
765^^^^^^^^^^^^^^^^^^^^^^^^^
766
767Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
768unrestricted unions is enabled.
769
770C++11 user-defined literals
771^^^^^^^^^^^^^^^^^^^^^^^^^^^
772
773Use ``__has_feature(cxx_user_literals)`` to determine if support for
774user-defined literals is enabled.
775
776C++11 variadic templates
777^^^^^^^^^^^^^^^^^^^^^^^^
778
779Use ``__has_feature(cxx_variadic_templates)`` or
780``__has_extension(cxx_variadic_templates)`` to determine if support for
781variadic templates is enabled.
782
Richard Smith0a715422013-05-07 19:32:56 +0000783C++1y
784-----
785
786The features listed below are part of the committee draft for the C++1y
787standard. As a result, all these features are enabled with the ``-std=c++1y``
788or ``-std=gnu++1y`` option when compiling C++ code.
789
790C++1y binary literals
791^^^^^^^^^^^^^^^^^^^^^
792
793Use ``__has_feature(cxx_binary_literals)`` or
794``__has_extension(cxx_binary_literals)`` to determine whether
795binary literals (for instance, ``0b10010``) are recognized. Clang supports this
796feature as an extension in all language modes.
797
798C++1y contextual conversions
799^^^^^^^^^^^^^^^^^^^^^^^^^^^^
800
801Use ``__has_feature(cxx_contextual_conversions)`` or
802``__has_extension(cxx_contextual_conversions)`` to determine if the C++1y rules
803are used when performing an implicit conversion for an array bound in a
804*new-expression*, the operand of a *delete-expression*, an integral constant
Richard Smithc0f7b812013-07-24 17:41:31 +0000805expression, or a condition in a ``switch`` statement.
Richard Smith0a715422013-05-07 19:32:56 +0000806
807C++1y decltype(auto)
808^^^^^^^^^^^^^^^^^^^^
809
810Use ``__has_feature(cxx_decltype_auto)`` or
811``__has_extension(cxx_decltype_auto)`` to determine if support
812for the ``decltype(auto)`` placeholder type is enabled.
813
814C++1y default initializers for aggregates
815^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
816
817Use ``__has_feature(cxx_aggregate_nsdmi)`` or
818``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
819for default initializers in aggregate members is enabled.
820
Richard Smith38af8562014-11-12 21:16:38 +0000821C++1y digit separators
822^^^^^^^^^^^^^^^^^^^^^^
823
824Use ``__cpp_digit_separators`` to determine if support for digit separators
825using single quotes (for instance, ``10'000``) is enabled. At this time, there
826is no corresponding ``__has_feature`` name
827
Richard Smith0a715422013-05-07 19:32:56 +0000828C++1y generalized lambda capture
829^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
830
Richard Smith6d540142014-05-09 21:08:59 +0000831Use ``__has_feature(cxx_init_captures)`` or
832``__has_extension(cxx_init_captures)`` to determine if support for
Richard Smith4fb09722013-07-24 17:51:13 +0000833lambda captures with explicit initializers is enabled
Richard Smith0a715422013-05-07 19:32:56 +0000834(for instance, ``[n(0)] { return ++n; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000835
836C++1y generic lambdas
837^^^^^^^^^^^^^^^^^^^^^
838
Richard Smith6d540142014-05-09 21:08:59 +0000839Use ``__has_feature(cxx_generic_lambdas)`` or
840``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
Richard Smith0a715422013-05-07 19:32:56 +0000841(polymorphic) lambdas is enabled
842(for instance, ``[] (auto x) { return x + 1; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000843
844C++1y relaxed constexpr
845^^^^^^^^^^^^^^^^^^^^^^^
846
847Use ``__has_feature(cxx_relaxed_constexpr)`` or
848``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
849declarations, local variable modification, and control flow constructs
850are permitted in ``constexpr`` functions.
Richard Smith0a715422013-05-07 19:32:56 +0000851
852C++1y return type deduction
853^^^^^^^^^^^^^^^^^^^^^^^^^^^
854
855Use ``__has_feature(cxx_return_type_deduction)`` or
856``__has_extension(cxx_return_type_deduction)`` to determine if support
857for return type deduction for functions (using ``auto`` as a return type)
858is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000859
860C++1y runtime-sized arrays
861^^^^^^^^^^^^^^^^^^^^^^^^^^
862
863Use ``__has_feature(cxx_runtime_array)`` or
864``__has_extension(cxx_runtime_array)`` to determine if support
865for arrays of runtime bound (a restricted form of variable-length arrays)
866is enabled.
867Clang's implementation of this feature is incomplete.
868
869C++1y variable templates
870^^^^^^^^^^^^^^^^^^^^^^^^
871
872Use ``__has_feature(cxx_variable_templates)`` or
873``__has_extension(cxx_variable_templates)`` to determine if support for
874templated variable declarations is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000875
Sean Silva709c44d2012-12-12 23:44:55 +0000876C11
877---
878
879The features listed below are part of the C11 standard. As a result, all these
880features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
881compiling C code. Additionally, because these features are all
882backward-compatible, they are available as extensions in all language modes.
883
884C11 alignment specifiers
885^^^^^^^^^^^^^^^^^^^^^^^^
886
887Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
888if support for alignment specifiers using ``_Alignas`` is enabled.
889
Nico Weber736a9932014-12-03 01:25:49 +0000890Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine
891if support for the ``_Alignof`` keyword is enabled.
892
Sean Silva709c44d2012-12-12 23:44:55 +0000893C11 atomic operations
894^^^^^^^^^^^^^^^^^^^^^
895
896Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
897if support for atomic types using ``_Atomic`` is enabled. Clang also provides
898:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
Hal Finkel6970ac82014-10-03 04:29:40 +0000899the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
900``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
901is available.
902
903Clang will use the system's ``<stdatomic.h>`` header when one is available, and
904will otherwise use its own. When using its own, implementations of the atomic
905operations are provided as macros. In the cases where C11 also requires a real
906function, this header provides only the declaration of that function (along
907with a shadowing macro implementation), and you must link to a library which
908provides a definition of the function if you use it instead of the macro.
Sean Silva709c44d2012-12-12 23:44:55 +0000909
910C11 generic selections
911^^^^^^^^^^^^^^^^^^^^^^
912
913Use ``__has_feature(c_generic_selections)`` or
914``__has_extension(c_generic_selections)`` to determine if support for generic
915selections is enabled.
916
917As an extension, the C11 generic selection expression is available in all
918languages supported by Clang. The syntax is the same as that given in the C11
919standard.
920
921In C, type compatibility is decided according to the rules given in the
922appropriate standard, but in C++, which lacks the type compatibility rules used
923in C, types are considered compatible only if they are equivalent.
924
925C11 ``_Static_assert()``
926^^^^^^^^^^^^^^^^^^^^^^^^
927
928Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
929to determine if support for compile-time assertions using ``_Static_assert`` is
930enabled.
931
Richard Smith25b555a2013-04-19 17:00:31 +0000932C11 ``_Thread_local``
933^^^^^^^^^^^^^^^^^^^^^
934
Ed Schouten401aeba2013-09-14 16:17:20 +0000935Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
936to determine if support for ``_Thread_local`` variables is enabled.
Richard Smith25b555a2013-04-19 17:00:31 +0000937
Ben Langmuir921f2e62015-03-10 14:39:26 +0000938Modules
939-------
940
941Use ``__has_feature(modules)`` to determine if Modules have been enabled.
942For example, compiling code with ``-fmodules`` enables the use of Modules.
943
944More information could be found `here <http://clang.llvm.org/docs/Modules.html>`_.
945
Alp Toker64197b92014-01-18 21:49:02 +0000946Checks for Type Trait Primitives
947================================
948
949Type trait primitives are special builtin constant expressions that can be used
950by the standard C++ library to facilitate or simplify the implementation of
951user-facing type traits in the <type_traits> header.
952
953They are not intended to be used directly by user code because they are
954implementation-defined and subject to change -- as such they're tied closely to
955the supported set of system headers, currently:
956
957* LLVM's own libc++
958* GNU libstdc++
959* The Microsoft standard C++ library
Sean Silva709c44d2012-12-12 23:44:55 +0000960
961Clang supports the `GNU C++ type traits
962<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
963`Microsoft Visual C++ Type traits
Alp Toker64197b92014-01-18 21:49:02 +0000964<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_.
965
966Feature detection is supported only for some of the primitives at present. User
967code should not use these checks because they bear no direct relation to the
968actual set of type traits supported by the C++ standard library.
969
970For type trait ``__X``, ``__has_extension(X)`` indicates the presence of the
971type trait primitive in the compiler. A simplistic usage example as might be
972seen in standard C++ headers follows:
Sean Silva709c44d2012-12-12 23:44:55 +0000973
974.. code-block:: c++
975
976 #if __has_extension(is_convertible_to)
977 template<typename From, typename To>
978 struct is_convertible_to {
979 static const bool value = __is_convertible_to(From, To);
980 };
981 #else
Alp Toker64197b92014-01-18 21:49:02 +0000982 // Emulate type trait for compatibility with other compilers.
Sean Silva709c44d2012-12-12 23:44:55 +0000983 #endif
984
Alp Toker64197b92014-01-18 21:49:02 +0000985The following type trait primitives are supported by Clang:
Sean Silva709c44d2012-12-12 23:44:55 +0000986
987* ``__has_nothrow_assign`` (GNU, Microsoft)
988* ``__has_nothrow_copy`` (GNU, Microsoft)
989* ``__has_nothrow_constructor`` (GNU, Microsoft)
990* ``__has_trivial_assign`` (GNU, Microsoft)
991* ``__has_trivial_copy`` (GNU, Microsoft)
992* ``__has_trivial_constructor`` (GNU, Microsoft)
993* ``__has_trivial_destructor`` (GNU, Microsoft)
994* ``__has_virtual_destructor`` (GNU, Microsoft)
995* ``__is_abstract`` (GNU, Microsoft)
Eric Fiselier07360662017-04-12 22:12:15 +0000996* ``__is_aggregate`` (GNU, Microsoft)
Sean Silva709c44d2012-12-12 23:44:55 +0000997* ``__is_base_of`` (GNU, Microsoft)
998* ``__is_class`` (GNU, Microsoft)
999* ``__is_convertible_to`` (Microsoft)
1000* ``__is_empty`` (GNU, Microsoft)
1001* ``__is_enum`` (GNU, Microsoft)
1002* ``__is_interface_class`` (Microsoft)
1003* ``__is_pod`` (GNU, Microsoft)
1004* ``__is_polymorphic`` (GNU, Microsoft)
1005* ``__is_union`` (GNU, Microsoft)
1006* ``__is_literal(type)``: Determines whether the given type is a literal type
1007* ``__is_final``: Determines whether the given type is declared with a
1008 ``final`` class-virt-specifier.
1009* ``__underlying_type(type)``: Retrieves the underlying type for a given
1010 ``enum`` type. This trait is required to implement the C++11 standard
1011 library.
1012* ``__is_trivially_assignable(totype, fromtype)``: Determines whether a value
1013 of type ``totype`` can be assigned to from a value of type ``fromtype`` such
1014 that no non-trivial functions are called as part of that assignment. This
1015 trait is required to implement the C++11 standard library.
1016* ``__is_trivially_constructible(type, argtypes...)``: Determines whether a
1017 value of type ``type`` can be direct-initialized with arguments of types
1018 ``argtypes...`` such that no non-trivial functions are called as part of
1019 that initialization. This trait is required to implement the C++11 standard
1020 library.
David Majnemer55cf2522015-11-14 07:21:35 +00001021* ``__is_destructible`` (MSVC 2013)
1022* ``__is_nothrow_destructible`` (MSVC 2013)
Alp Toker73287bf2014-01-20 00:24:09 +00001023* ``__is_nothrow_assignable`` (MSVC 2013, clang)
1024* ``__is_constructible`` (MSVC 2013, clang)
1025* ``__is_nothrow_constructible`` (MSVC 2013, clang)
David Majnemerb3d96882016-05-23 17:21:55 +00001026* ``__is_assignable`` (MSVC 2015, clang)
Sean Silva709c44d2012-12-12 23:44:55 +00001027
1028Blocks
1029======
1030
1031The syntax and high level language feature description is in
Michael Gottesman6fd58462013-01-07 22:24:45 +00001032:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
1033the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
Sean Silva709c44d2012-12-12 23:44:55 +00001034
1035Query for this feature with ``__has_extension(blocks)``.
1036
1037Objective-C Features
1038====================
1039
1040Related result types
1041--------------------
1042
1043According to Cocoa conventions, Objective-C methods with certain names
1044("``init``", "``alloc``", etc.) always return objects that are an instance of
1045the receiving class's type. Such methods are said to have a "related result
1046type", meaning that a message send to one of these methods will have the same
1047static type as an instance of the receiver class. For example, given the
1048following classes:
1049
1050.. code-block:: objc
1051
1052 @interface NSObject
1053 + (id)alloc;
1054 - (id)init;
1055 @end
1056
1057 @interface NSArray : NSObject
1058 @end
1059
1060and this common initialization pattern
1061
1062.. code-block:: objc
1063
1064 NSArray *array = [[NSArray alloc] init];
1065
1066the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1067``alloc`` implicitly has a related result type. Similarly, the type of the
1068expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1069related result type and its receiver is known to have the type ``NSArray *``.
1070If neither ``alloc`` nor ``init`` had a related result type, the expressions
1071would have had type ``id``, as declared in the method signature.
1072
1073A method with a related result type can be declared by using the type
1074``instancetype`` as its result type. ``instancetype`` is a contextual keyword
1075that is only permitted in the result type of an Objective-C method, e.g.
1076
1077.. code-block:: objc
1078
1079 @interface A
1080 + (instancetype)constructAnA;
1081 @end
1082
1083The related result type can also be inferred for some methods. To determine
1084whether a method has an inferred related result type, the first word in the
1085camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1086and the method will have a related result type if its return type is compatible
1087with the type of its class and if:
1088
1089* the first word is "``alloc``" or "``new``", and the method is a class method,
1090 or
1091
1092* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1093 and the method is an instance method.
1094
1095If a method with a related result type is overridden by a subclass method, the
1096subclass method must also return a type that is compatible with the subclass
1097type. For example:
1098
1099.. code-block:: objc
1100
1101 @interface NSString : NSObject
1102 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1103 @end
1104
1105Related result types only affect the type of a message send or property access
1106via the given method. In all other respects, a method with a related result
1107type is treated the same way as method that returns ``id``.
1108
1109Use ``__has_feature(objc_instancetype)`` to determine whether the
1110``instancetype`` contextual keyword is available.
1111
1112Automatic reference counting
1113----------------------------
1114
Sean Silva173d2522013-01-02 13:07:47 +00001115Clang provides support for :doc:`automated reference counting
1116<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
Sean Silva709c44d2012-12-12 23:44:55 +00001117for manual ``retain``/``release``/``autorelease`` message sends. There are two
1118feature macros associated with automatic reference counting:
1119``__has_feature(objc_arc)`` indicates the availability of automated reference
1120counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1121automated reference counting also includes support for ``__weak`` pointers to
1122Objective-C objects.
1123
Sean Silva173d2522013-01-02 13:07:47 +00001124.. _objc-fixed-enum:
1125
Sean Silva709c44d2012-12-12 23:44:55 +00001126Enumerations with a fixed underlying type
1127-----------------------------------------
1128
1129Clang provides support for C++11 enumerations with a fixed underlying type
1130within Objective-C. For example, one can write an enumeration type as:
1131
1132.. code-block:: c++
1133
1134 typedef enum : unsigned char { Red, Green, Blue } Color;
1135
1136This specifies that the underlying type, which is used to store the enumeration
1137value, is ``unsigned char``.
1138
1139Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1140underlying types is available in Objective-C.
1141
1142Interoperability with C++11 lambdas
1143-----------------------------------
1144
1145Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1146permitting a lambda to be implicitly converted to a block pointer with the
1147corresponding signature. For example, consider an API such as ``NSArray``'s
1148array-sorting method:
1149
1150.. code-block:: objc
1151
1152 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1153
1154``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1155(^)(id, id)``, and parameters of this type are generally provided with block
1156literals as arguments. However, one can also use a C++11 lambda so long as it
1157provides the same signature (in this case, accepting two parameters of type
1158``id`` and returning an ``NSComparisonResult``):
1159
1160.. code-block:: objc
1161
1162 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1163 @"String 02"];
1164 const NSStringCompareOptions comparisonOptions
1165 = NSCaseInsensitiveSearch | NSNumericSearch |
1166 NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1167 NSLocale *currentLocale = [NSLocale currentLocale];
1168 NSArray *sorted
1169 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1170 NSRange string1Range = NSMakeRange(0, [s1 length]);
1171 return [s1 compare:s2 options:comparisonOptions
1172 range:string1Range locale:currentLocale];
1173 }];
1174 NSLog(@"sorted: %@", sorted);
1175
1176This code relies on an implicit conversion from the type of the lambda
1177expression (an unnamed, local class type called the *closure type*) to the
1178corresponding block pointer type. The conversion itself is expressed by a
1179conversion operator in that closure type that produces a block pointer with the
1180same signature as the lambda itself, e.g.,
1181
1182.. code-block:: objc
1183
1184 operator NSComparisonResult (^)(id, id)() const;
1185
1186This conversion function returns a new block that simply forwards the two
1187parameters to the lambda object (which it captures by copy), then returns the
1188result. The returned block is first copied (with ``Block_copy``) and then
1189autoreleased. As an optimization, if a lambda expression is immediately
1190converted to a block pointer (as in the first example, above), then the block
1191is not copied and autoreleased: rather, it is given the same lifetime as a
1192block literal written at that point in the program, which avoids the overhead
1193of copying a block to the heap in the common case.
1194
1195The conversion from a lambda to a block pointer is only available in
1196Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1197management (autorelease).
1198
1199Object Literals and Subscripting
1200--------------------------------
1201
Sean Silva173d2522013-01-02 13:07:47 +00001202Clang provides support for :doc:`Object Literals and Subscripting
1203<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
Sean Silva709c44d2012-12-12 23:44:55 +00001204programming patterns, makes programs more concise, and improves the safety of
1205container creation. There are several feature macros associated with object
1206literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1207availability of array literals; ``__has_feature(objc_dictionary_literals)``
1208tests the availability of dictionary literals;
1209``__has_feature(objc_subscripting)`` tests the availability of object
1210subscripting.
1211
1212Objective-C Autosynthesis of Properties
1213---------------------------------------
1214
1215Clang provides support for autosynthesis of declared properties. Using this
1216feature, clang provides default synthesis of those properties not declared
1217@dynamic and not having user provided backing getter and setter methods.
1218``__has_feature(objc_default_synthesize_properties)`` checks for availability
1219of this feature in version of clang being used.
1220
Jordan Rose32e94892012-12-15 00:37:01 +00001221.. _langext-objc-retain-release:
1222
1223Objective-C retaining behavior attributes
1224-----------------------------------------
1225
1226In Objective-C, functions and methods are generally assumed to follow the
1227`Cocoa Memory Management
1228<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1229conventions for ownership of object arguments and
1230return values. However, there are exceptions, and so Clang provides attributes
1231to allow these exceptions to be documented. This are used by ARC and the
1232`static analyzer <http://clang-analyzer.llvm.org>`_ Some exceptions may be
Aaron Ballman840cef32014-02-19 15:45:13 +00001233better described using the ``objc_method_family`` attribute instead.
Jordan Rose32e94892012-12-15 00:37:01 +00001234
1235**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1236``ns_returns_autoreleased``, ``cf_returns_retained``, and
1237``cf_returns_not_retained`` attributes can be placed on methods and functions
1238that return Objective-C or CoreFoundation objects. They are commonly placed at
1239the end of a function prototype or method declaration:
1240
1241.. code-block:: objc
1242
1243 id foo() __attribute__((ns_returns_retained));
1244
1245 - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1246
1247The ``*_returns_retained`` attributes specify that the returned object has a +1
1248retain count. The ``*_returns_not_retained`` attributes specify that the return
1249object has a +0 retain count, even if the normal convention for its selector
1250would be +1. ``ns_returns_autoreleased`` specifies that the returned object is
1251+0, but is guaranteed to live at least as long as the next flush of an
1252autorelease pool.
1253
1254**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1255an parameter declaration; they specify that the argument is expected to have a
1256+1 retain count, which will be balanced in some way by the function or method.
1257The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1258method; it specifies that the method expects its ``self`` parameter to have a
1259+1 retain count, which it will balance in some way.
1260
1261.. code-block:: objc
1262
1263 void foo(__attribute__((ns_consumed)) NSString *string);
1264
1265 - (void) bar __attribute__((ns_consumes_self));
1266 - (void) baz:(id) __attribute__((ns_consumed)) x;
1267
1268Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1269<http://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1270
1271Query for these features with ``__has_attribute(ns_consumed)``,
1272``__has_attribute(ns_returns_retained)``, etc.
1273
1274
Ted Kremenek84342d62013-10-15 04:28:42 +00001275Objective-C++ ABI: protocol-qualifier mangling of parameters
1276------------------------------------------------------------
1277
1278Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1279type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such
1280parameters to be differentiated from those with the regular unqualified ``id``
1281type.
1282
1283This was a non-backward compatible mangling change to the ABI. This change
1284allows proper overloading, and also prevents mangling conflicts with template
1285parameters of protocol-qualified type.
1286
1287Query the presence of this new mangling with
1288``__has_feature(objc_protocol_qualifier_mangling)``.
1289
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001290.. _langext-overloading:
1291
Sean Silva709c44d2012-12-12 23:44:55 +00001292Initializer lists for complex numbers in C
1293==========================================
1294
1295clang supports an extension which allows the following in C:
1296
1297.. code-block:: c++
1298
1299 #include <math.h>
1300 #include <complex.h>
1301 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1302
1303This construct is useful because there is no way to separately initialize the
1304real and imaginary parts of a complex variable in standard C, given that clang
1305does not support ``_Imaginary``. (Clang also supports the ``__real__`` and
1306``__imag__`` extensions from gcc, which help in some cases, but are not usable
1307in static initializers.)
1308
1309Note that this extension does not allow eliding the braces; the meaning of the
1310following two lines is different:
1311
1312.. code-block:: c++
1313
1314 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1315 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1316
1317This extension also works in C++ mode, as far as that goes, but does not apply
1318to the C++ ``std::complex``. (In C++11, list initialization allows the same
1319syntax to be used with ``std::complex`` with the same meaning.)
1320
1321Builtin Functions
1322=================
1323
1324Clang supports a number of builtin library functions with the same syntax as
1325GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
1326``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
Hal Finkelbcc06082014-09-07 22:58:14 +00001327``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to
1328the GCC builtins, Clang supports a number of builtins that GCC does not, which
1329are listed here.
Sean Silva709c44d2012-12-12 23:44:55 +00001330
1331Please note that Clang does not and will not support all of the GCC builtins
1332for vector operations. Instead of using builtins, you should use the functions
1333defined in target-specific header files like ``<xmmintrin.h>``, which define
1334portable wrappers for these. Many of the Clang versions of these functions are
1335implemented directly in terms of :ref:`extended vector support
1336<langext-vectors>` instead of builtins, in order to reduce the number of
1337builtins that we need to implement.
1338
Hal Finkelbcc06082014-09-07 22:58:14 +00001339``__builtin_assume``
1340------------------------------
1341
1342``__builtin_assume`` is used to provide the optimizer with a boolean
1343invariant that is defined to be true.
1344
1345**Syntax**:
1346
1347.. code-block:: c++
1348
1349 __builtin_assume(bool)
1350
1351**Example of Use**:
1352
1353.. code-block:: c++
1354
1355 int foo(int x) {
1356 __builtin_assume(x != 0);
1357
1358 // The optimizer may short-circuit this check using the invariant.
1359 if (x == 0)
1360 return do_something();
1361
1362 return do_something_else();
1363 }
1364
1365**Description**:
1366
1367The boolean argument to this function is defined to be true. The optimizer may
1368analyze the form of the expression provided as the argument and deduce from
1369that information used to optimize the program. If the condition is violated
1370during execution, the behavior is undefined. The argument itself is never
1371evaluated, so any side effects of the expression will be discarded.
1372
1373Query for this feature with ``__has_builtin(__builtin_assume)``.
1374
Sean Silva709c44d2012-12-12 23:44:55 +00001375``__builtin_readcyclecounter``
1376------------------------------
1377
1378``__builtin_readcyclecounter`` is used to access the cycle counter register (or
1379a similar low-latency, high-accuracy clock) on those targets that support it.
1380
1381**Syntax**:
1382
1383.. code-block:: c++
1384
1385 __builtin_readcyclecounter()
1386
1387**Example of Use**:
1388
1389.. code-block:: c++
1390
1391 unsigned long long t0 = __builtin_readcyclecounter();
1392 do_something();
1393 unsigned long long t1 = __builtin_readcyclecounter();
1394 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
1395
1396**Description**:
1397
1398The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
1399which may be either global or process/thread-specific depending on the target.
1400As the backing counters often overflow quickly (on the order of seconds) this
1401should only be used for timing small intervals. When not supported by the
1402target, the return value is always zero. This builtin takes no arguments and
1403produces an unsigned long long result.
1404
Tim Northoverbfe2e5f72013-05-23 19:14:12 +00001405Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
1406that even if present, its use may depend on run-time privilege or other OS
1407controlled state.
Sean Silva709c44d2012-12-12 23:44:55 +00001408
1409.. _langext-__builtin_shufflevector:
1410
1411``__builtin_shufflevector``
1412---------------------------
1413
1414``__builtin_shufflevector`` is used to express generic vector
1415permutation/shuffle/swizzle operations. This builtin is also very important
1416for the implementation of various target-specific header files like
1417``<xmmintrin.h>``.
1418
1419**Syntax**:
1420
1421.. code-block:: c++
1422
1423 __builtin_shufflevector(vec1, vec2, index1, index2, ...)
1424
1425**Examples**:
1426
1427.. code-block:: c++
1428
Craig Topper50ad5b72013-08-03 17:40:38 +00001429 // identity operation - return 4-element vector v1.
1430 __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
Sean Silva709c44d2012-12-12 23:44:55 +00001431
1432 // "Splat" element 0 of V1 into a 4-element result.
1433 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1434
1435 // Reverse 4-element vector V1.
1436 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1437
1438 // Concatenate every other element of 4-element vectors V1 and V2.
1439 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1440
1441 // Concatenate every other element of 8-element vectors V1 and V2.
1442 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
1443
Craig Topper50ad5b72013-08-03 17:40:38 +00001444 // Shuffle v1 with some elements being undefined
1445 __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
1446
Sean Silva709c44d2012-12-12 23:44:55 +00001447**Description**:
1448
1449The first two arguments to ``__builtin_shufflevector`` are vectors that have
1450the same element type. The remaining arguments are a list of integers that
1451specify the elements indices of the first two vectors that should be extracted
1452and returned in a new vector. These element indices are numbered sequentially
1453starting with the first vector, continuing into the second vector. Thus, if
1454``vec1`` is a 4-element vector, index 5 would refer to the second element of
Craig Topper50ad5b72013-08-03 17:40:38 +00001455``vec2``. An index of -1 can be used to indicate that the corresponding element
1456in the returned vector is a don't care and can be optimized by the backend.
Sean Silva709c44d2012-12-12 23:44:55 +00001457
1458The result of ``__builtin_shufflevector`` is a vector with the same element
1459type as ``vec1``/``vec2`` but that has an element count equal to the number of
1460indices specified.
1461
1462Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
1463
Anton Yartsev94e46f32014-09-03 17:59:21 +00001464.. _langext-__builtin_convertvector:
1465
Hal Finkelc4d7c822013-09-18 03:29:45 +00001466``__builtin_convertvector``
1467---------------------------
1468
1469``__builtin_convertvector`` is used to express generic vector
1470type-conversion operations. The input vector and the output vector
1471type must have the same number of elements.
1472
1473**Syntax**:
1474
1475.. code-block:: c++
1476
1477 __builtin_convertvector(src_vec, dst_vec_type)
1478
1479**Examples**:
1480
1481.. code-block:: c++
1482
1483 typedef double vector4double __attribute__((__vector_size__(32)));
1484 typedef float vector4float __attribute__((__vector_size__(16)));
1485 typedef short vector4short __attribute__((__vector_size__(8)));
1486 vector4float vf; vector4short vs;
1487
1488 // convert from a vector of 4 floats to a vector of 4 doubles.
1489 __builtin_convertvector(vf, vector4double)
1490 // equivalent to:
1491 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
1492
1493 // convert from a vector of 4 shorts to a vector of 4 floats.
1494 __builtin_convertvector(vs, vector4float)
1495 // equivalent to:
Yunzhong Gao637cb90b2014-09-02 19:24:14 +00001496 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
Hal Finkelc4d7c822013-09-18 03:29:45 +00001497
1498**Description**:
1499
1500The first argument to ``__builtin_convertvector`` is a vector, and the second
1501argument is a vector type with the same number of elements as the first
1502argument.
1503
1504The result of ``__builtin_convertvector`` is a vector with the same element
1505type as the second argument, with a value defined in terms of the action of a
1506C-style cast applied to each element of the first argument.
1507
1508Query for this feature with ``__has_builtin(__builtin_convertvector)``.
1509
Matt Arsenault08087c52016-03-23 22:14:43 +00001510``__builtin_bitreverse``
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001511------------------------
Matt Arsenault08087c52016-03-23 22:14:43 +00001512
1513* ``__builtin_bitreverse8``
1514* ``__builtin_bitreverse16``
1515* ``__builtin_bitreverse32``
1516* ``__builtin_bitreverse64``
1517
1518**Syntax**:
1519
1520.. code-block:: c++
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001521
Matt Arsenault08087c52016-03-23 22:14:43 +00001522 __builtin_bitreverse32(x)
1523
1524**Examples**:
1525
1526.. code-block:: c++
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001527
Matt Arsenault08087c52016-03-23 22:14:43 +00001528 uint8_t rev_x = __builtin_bitreverse8(x);
1529 uint16_t rev_x = __builtin_bitreverse16(x);
1530 uint32_t rev_y = __builtin_bitreverse32(y);
1531 uint64_t rev_z = __builtin_bitreverse64(z);
1532
1533**Description**:
1534
1535The '``__builtin_bitreverse``' family of builtins is used to reverse
1536the bitpattern of an integer value; for example ``0b10110110`` becomes
1537``0b01101101``.
1538
Sean Silva709c44d2012-12-12 23:44:55 +00001539``__builtin_unreachable``
1540-------------------------
1541
1542``__builtin_unreachable`` is used to indicate that a specific point in the
1543program cannot be reached, even if the compiler might otherwise think it can.
1544This is useful to improve optimization and eliminates certain warnings. For
1545example, without the ``__builtin_unreachable`` in the example below, the
1546compiler assumes that the inline asm can fall through and prints a "function
1547declared '``noreturn``' should not return" warning.
1548
1549**Syntax**:
1550
1551.. code-block:: c++
1552
1553 __builtin_unreachable()
1554
1555**Example of use**:
1556
1557.. code-block:: c++
1558
1559 void myabort(void) __attribute__((noreturn));
1560 void myabort(void) {
1561 asm("int3");
1562 __builtin_unreachable();
1563 }
1564
1565**Description**:
1566
1567The ``__builtin_unreachable()`` builtin has completely undefined behavior.
1568Since it has undefined behavior, it is a statement that it is never reached and
1569the optimizer can take advantage of this to produce better code. This builtin
1570takes no arguments and produces a void result.
1571
1572Query for this feature with ``__has_builtin(__builtin_unreachable)``.
1573
Sanjay Patela24296b2015-09-02 20:01:30 +00001574``__builtin_unpredictable``
1575---------------------------
1576
1577``__builtin_unpredictable`` is used to indicate that a branch condition is
1578unpredictable by hardware mechanisms such as branch prediction logic.
1579
1580**Syntax**:
1581
1582.. code-block:: c++
1583
1584 __builtin_unpredictable(long long)
1585
1586**Example of use**:
1587
1588.. code-block:: c++
1589
1590 if (__builtin_unpredictable(x > 0)) {
1591 foo();
1592 }
1593
1594**Description**:
1595
1596The ``__builtin_unpredictable()`` builtin is expected to be used with control
1597flow conditions such as in ``if`` and ``switch`` statements.
1598
1599Query for this feature with ``__has_builtin(__builtin_unpredictable)``.
1600
Sean Silva709c44d2012-12-12 23:44:55 +00001601``__sync_swap``
1602---------------
1603
1604``__sync_swap`` is used to atomically swap integers or pointers in memory.
1605
1606**Syntax**:
1607
1608.. code-block:: c++
1609
1610 type __sync_swap(type *ptr, type value, ...)
1611
1612**Example of Use**:
1613
1614.. code-block:: c++
1615
1616 int old_value = __sync_swap(&value, new_value);
1617
1618**Description**:
1619
1620The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
1621atomic intrinsics to allow code to atomically swap the current value with the
1622new value. More importantly, it helps developers write more efficient and
1623correct code by avoiding expensive loops around
1624``__sync_bool_compare_and_swap()`` or relying on the platform specific
1625implementation details of ``__sync_lock_test_and_set()``. The
1626``__sync_swap()`` builtin is a full barrier.
1627
Richard Smith6cbd65d2013-07-11 02:27:57 +00001628``__builtin_addressof``
1629-----------------------
1630
1631``__builtin_addressof`` performs the functionality of the built-in ``&``
1632operator, ignoring any ``operator&`` overload. This is useful in constant
1633expressions in C++11, where there is no other way to take the address of an
1634object that overloads ``operator&``.
1635
1636**Example of use**:
1637
1638.. code-block:: c++
1639
1640 template<typename T> constexpr T *addressof(T &value) {
1641 return __builtin_addressof(value);
1642 }
1643
Richard Smith760520b2014-06-03 23:27:44 +00001644``__builtin_operator_new`` and ``__builtin_operator_delete``
1645------------------------------------------------------------
1646
1647``__builtin_operator_new`` allocates memory just like a non-placement non-class
1648*new-expression*. This is exactly like directly calling the normal
1649non-placement ``::operator new``, except that it allows certain optimizations
1650that the C++ standard does not permit for a direct function call to
1651``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
1652merging allocations).
1653
1654Likewise, ``__builtin_operator_delete`` deallocates memory just like a
1655non-class *delete-expression*, and is exactly like directly calling the normal
1656``::operator delete``, except that it permits optimizations. Only the unsized
1657form of ``__builtin_operator_delete`` is currently available.
1658
1659These builtins are intended for use in the implementation of ``std::allocator``
1660and other similar allocation libraries, and are only available in C++.
1661
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001662Multiprecision Arithmetic Builtins
1663----------------------------------
1664
1665Clang provides a set of builtins which expose multiprecision arithmetic in a
1666manner amenable to C. They all have the following form:
1667
1668.. code-block:: c
1669
1670 unsigned x = ..., y = ..., carryin = ..., carryout;
1671 unsigned sum = __builtin_addc(x, y, carryin, &carryout);
1672
1673Thus one can form a multiprecision addition chain in the following manner:
1674
1675.. code-block:: c
1676
1677 unsigned *x, *y, *z, carryin=0, carryout;
1678 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
1679 carryin = carryout;
1680 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
1681 carryin = carryout;
1682 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
1683 carryin = carryout;
1684 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
1685
1686The complete list of builtins are:
1687
1688.. code-block:: c
1689
Michael Gottesman15343992013-06-18 20:40:40 +00001690 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001691 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1692 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1693 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1694 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
Michael Gottesman15343992013-06-18 20:40:40 +00001695 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001696 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1697 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1698 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1699 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
1700
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001701Checked Arithmetic Builtins
1702---------------------------
1703
1704Clang provides a set of builtins that implement checked arithmetic for security
1705critical applications in a manner that is fast and easily expressable in C. As
1706an example of their usage:
1707
1708.. code-block:: c
1709
1710 errorcode_t security_critical_application(...) {
1711 unsigned x, y, result;
1712 ...
John McCall03107a42015-10-29 20:48:01 +00001713 if (__builtin_mul_overflow(x, y, &result))
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001714 return kErrorCodeHackers;
1715 ...
1716 use_multiply(result);
1717 ...
1718 }
1719
John McCall03107a42015-10-29 20:48:01 +00001720Clang provides the following checked arithmetic builtins:
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001721
1722.. code-block:: c
1723
John McCall03107a42015-10-29 20:48:01 +00001724 bool __builtin_add_overflow (type1 x, type2 y, type3 *sum);
1725 bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff);
1726 bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod);
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001727 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
1728 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
1729 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
1730 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
1731 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
1732 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
1733 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
1734 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
1735 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
1736 bool __builtin_sadd_overflow (int x, int y, int *sum);
1737 bool __builtin_saddl_overflow (long x, long y, long *sum);
1738 bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
1739 bool __builtin_ssub_overflow (int x, int y, int *diff);
1740 bool __builtin_ssubl_overflow (long x, long y, long *diff);
1741 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
1742 bool __builtin_smul_overflow (int x, int y, int *prod);
1743 bool __builtin_smull_overflow (long x, long y, long *prod);
1744 bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
1745
John McCall03107a42015-10-29 20:48:01 +00001746Each builtin performs the specified mathematical operation on the
1747first two arguments and stores the result in the third argument. If
1748possible, the result will be equal to mathematically-correct result
1749and the builtin will return 0. Otherwise, the builtin will return
17501 and the result will be equal to the unique value that is equivalent
1751to the mathematically-correct result modulo two raised to the *k*
1752power, where *k* is the number of bits in the result type. The
1753behavior of these builtins is well-defined for all argument values.
1754
1755The first three builtins work generically for operands of any integer type,
1756including boolean types. The operands need not have the same type as each
1757other, or as the result. The other builtins may implicitly promote or
1758convert their operands before performing the operation.
1759
1760Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc.
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001761
Matt Arsenault2d933982016-02-27 09:06:18 +00001762Floating point builtins
1763---------------------------------------
1764
1765``__builtin_canonicalize``
1766--------------------------
1767
1768.. code-block:: c
1769
1770 double __builtin_canonicalize(double);
1771 float __builtin_canonicalizef(float);
1772 long double__builtin_canonicalizel(long double);
1773
1774Returns the platform specific canonical encoding of a floating point
1775number. This canonicalization is useful for implementing certain
1776numeric primitives such as frexp. See `LLVM canonicalize intrinsic
1777<http://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for
1778more information on the semantics.
1779
Richard Smith67d484b2017-01-20 00:57:59 +00001780String builtins
1781---------------
1782
1783Clang provides constant expression evaluation support for builtins forms of
Richard Smith0abb11c2017-01-23 18:17:46 +00001784the following functions from the C standard library ``<string.h>`` header:
Richard Smith67d484b2017-01-20 00:57:59 +00001785
1786* ``memchr``
1787* ``memcmp``
1788* ``strchr``
1789* ``strcmp``
1790* ``strlen``
1791* ``strncmp``
1792* ``wcschr``
1793* ``wcscmp``
1794* ``wcslen``
1795* ``wcsncmp``
1796* ``wmemchr``
1797* ``wmemcmp``
1798
1799In each case, the builtin form has the name of the C library function prefixed
Richard Smith90854c42017-01-20 01:08:15 +00001800by ``__builtin_``. Example:
Richard Smith67d484b2017-01-20 00:57:59 +00001801
1802.. code-block:: c
1803
1804 void *p = __builtin_memchr("foobar", 'b', 5);
1805
1806In addition to the above, one further builtin is provided:
1807
1808.. code-block:: c
1809
1810 char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
1811
1812``__builtin_char_memchr(a, b, c)`` is identical to
1813``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within
1814constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*``
1815is disallowed in general).
1816
1817Support for constant expression evaluation for the above builtins be detected
1818with ``__has_feature(cxx_constexpr_string_builtins)``.
1819
Sean Silva709c44d2012-12-12 23:44:55 +00001820.. _langext-__c11_atomic:
1821
1822__c11_atomic builtins
1823---------------------
1824
1825Clang provides a set of builtins which are intended to be used to implement
1826C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the
1827``_explicit`` form of the corresponding C11 operation, and are named with a
Hal Finkel6970ac82014-10-03 04:29:40 +00001828``__c11_`` prefix. The supported operations, and the differences from
1829the corresponding C11 operations, are:
Sean Silva709c44d2012-12-12 23:44:55 +00001830
1831* ``__c11_atomic_init``
1832* ``__c11_atomic_thread_fence``
1833* ``__c11_atomic_signal_fence``
Hal Finkel6970ac82014-10-03 04:29:40 +00001834* ``__c11_atomic_is_lock_free`` (The argument is the size of the
Dan Liewfe726862014-10-03 12:36:20 +00001835 ``_Atomic(...)`` object, instead of its address)
Sean Silva709c44d2012-12-12 23:44:55 +00001836* ``__c11_atomic_store``
1837* ``__c11_atomic_load``
1838* ``__c11_atomic_exchange``
1839* ``__c11_atomic_compare_exchange_strong``
1840* ``__c11_atomic_compare_exchange_weak``
1841* ``__c11_atomic_fetch_add``
1842* ``__c11_atomic_fetch_sub``
1843* ``__c11_atomic_fetch_and``
1844* ``__c11_atomic_fetch_or``
1845* ``__c11_atomic_fetch_xor``
1846
Hal Finkel6970ac82014-10-03 04:29:40 +00001847The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
JF Bastiene6ccacf2014-10-10 16:09:48 +00001848``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
Hal Finkel6970ac82014-10-03 04:29:40 +00001849provided, with values corresponding to the enumerators of C11's
1850``memory_order`` enumeration.
1851
James Y Knight81167fb2015-08-05 16:57:36 +00001852(Note that Clang additionally provides GCC-compatible ``__atomic_*``
1853builtins)
1854
Tim Northover6aacd492013-07-16 09:47:53 +00001855Low-level ARM exclusive memory builtins
1856---------------------------------------
1857
1858Clang provides overloaded builtins giving direct access to the three key ARM
1859instructions for implementing atomic operations.
1860
1861.. code-block:: c
Sean Silvaa928c242013-09-09 19:50:40 +00001862
Tim Northover6aacd492013-07-16 09:47:53 +00001863 T __builtin_arm_ldrex(const volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00001864 T __builtin_arm_ldaex(const volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00001865 int __builtin_arm_strex(T val, volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00001866 int __builtin_arm_stlex(T val, volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00001867 void __builtin_arm_clrex(void);
1868
1869The types ``T`` currently supported are:
Michael Zolotukhinc3f09ff2015-09-10 23:56:10 +00001870
Tim Northover573cbee2014-05-24 12:52:07 +00001871* Integer types with width at most 64 bits (or 128 bits on AArch64).
Tim Northover6aacd492013-07-16 09:47:53 +00001872* Floating-point types
1873* Pointer types.
1874
1875Note that the compiler does not guarantee it will not insert stores which clear
Tim Northover3acd6bd2014-07-02 12:56:02 +00001876the exclusive monitor in between an ``ldrex`` type operation and its paired
1877``strex``. In practice this is only usually a risk when the extra store is on
1878the same cache line as the variable being modified and Clang will only insert
1879stack stores on its own, so it is best not to use these operations on variables
1880with automatic storage duration.
Tim Northover6aacd492013-07-16 09:47:53 +00001881
1882Also, loads and stores may be implicit in code written between the ``ldrex`` and
1883``strex``. Clang will not necessarily mitigate the effects of these either, so
1884care should be exercised.
1885
1886For these reasons the higher level atomic primitives should be preferred where
1887possible.
1888
Michael Zolotukhin59d72b12015-09-11 02:01:15 +00001889Non-temporal load/store builtins
1890--------------------------------
1891
1892Clang provides overloaded builtins allowing generation of non-temporal memory
1893accesses.
1894
1895.. code-block:: c
1896
1897 T __builtin_nontemporal_load(T *addr);
1898 void __builtin_nontemporal_store(T value, T *addr);
1899
1900The types ``T`` currently supported are:
1901
1902* Integer types.
1903* Floating-point types.
1904* Vector types.
1905
1906Note that the compiler does not guarantee that non-temporal loads or stores
1907will be used.
1908
Gor Nishanov97e3b6d2016-10-03 22:44:48 +00001909C++ Coroutines support builtins
1910--------------------------------
1911
1912.. warning::
1913 This is a work in progress. Compatibility across Clang/LLVM releases is not
1914 guaranteed.
1915
1916Clang provides experimental builtins to support C++ Coroutines as defined by
1917http://wg21.link/P0057. The following four are intended to be used by the
1918standard library to implement `std::experimental::coroutine_handle` type.
1919
1920**Syntax**:
1921
1922.. code-block:: c
1923
1924 void __builtin_coro_resume(void *addr);
1925 void __builtin_coro_destroy(void *addr);
1926 bool __builtin_coro_done(void *addr);
1927 void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
1928
1929**Example of use**:
1930
1931.. code-block:: c++
1932
1933 template <> struct coroutine_handle<void> {
1934 void resume() const { __builtin_coro_resume(ptr); }
1935 void destroy() const { __builtin_coro_destroy(ptr); }
1936 bool done() const { return __builtin_coro_done(ptr); }
1937 // ...
1938 protected:
1939 void *ptr;
1940 };
1941
1942 template <typename Promise> struct coroutine_handle : coroutine_handle<> {
1943 // ...
1944 Promise &promise() const {
1945 return *reinterpret_cast<Promise *>(
1946 __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
1947 }
1948 static coroutine_handle from_promise(Promise &promise) {
1949 coroutine_handle p;
1950 p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
1951 /*from-promise=*/true);
1952 return p;
1953 }
1954 };
1955
1956
1957Other coroutine builtins are either for internal clang use or for use during
1958development of the coroutine feature. See `Coroutines in LLVM
1959<http://llvm.org/docs/Coroutines.html#intrinsics>`_ for
1960more information on their semantics. Note that builtins matching the intrinsics
1961that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,
1962llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to
1963an appropriate value during the emission.
1964
1965**Syntax**:
1966
1967.. code-block:: c
1968
1969 size_t __builtin_coro_size()
1970 void *__builtin_coro_frame()
1971 void *__builtin_coro_free(void *coro_frame)
1972
1973 void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
1974 bool __builtin_coro_alloc()
1975 void *__builtin_coro_begin(void *memory)
1976 void __builtin_coro_end(void *coro_frame, bool unwind)
1977 char __builtin_coro_suspend(bool final)
1978 bool __builtin_coro_param(void *original, void *copy)
1979
1980Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM
1981automatically will insert one if the first argument to `llvm.coro.suspend` is
1982token `none`. If a user calls `__builin_suspend`, clang will insert `token none`
1983as the first argument to the intrinsic.
1984
Sean Silva709c44d2012-12-12 23:44:55 +00001985Non-standard C++11 Attributes
1986=============================
1987
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001988Clang's non-standard C++11 attributes live in the ``clang`` attribute
1989namespace.
Sean Silva709c44d2012-12-12 23:44:55 +00001990
Aaron Ballman68893db2014-02-19 23:21:40 +00001991Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001992are accepted with the ``__attribute__((foo))`` syntax are also accepted as
1993``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
1994(see the list of `GCC function attributes
1995<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
1996attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
1997`GCC type attributes
Richard Smithccfc9ff2013-07-11 00:27:05 +00001998<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001999implementation, these attributes must appertain to the *declarator-id* in a
2000declaration, which means they must go either at the start of the declaration or
2001immediately after the name being declared.
2002
2003For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
2004also applies the GNU ``noreturn`` attribute to ``f``.
2005
2006.. code-block:: c++
2007
2008 [[gnu::unused]] int a, f [[gnu::noreturn]] ();
2009
Sean Silva709c44d2012-12-12 23:44:55 +00002010Target-Specific Extensions
2011==========================
2012
2013Clang supports some language features conditionally on some targets.
2014
Yi Kong4de26fb2014-07-23 09:25:02 +00002015ARM/AArch64 Language Extensions
2016-------------------------------
2017
2018Memory Barrier Intrinsics
2019^^^^^^^^^^^^^^^^^^^^^^^^^
2020Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
2021in the `ARM C Language Extensions Release 2.0
2022<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
2023Note that these intrinsics are implemented as motion barriers that block
2024reordering of memory accesses and side effect instructions. Other instructions
Sylvestre Ledrube8f3962016-02-14 20:20:58 +00002025like simple arithmetic may be reordered around the intrinsic. If you expect to
Yi Kong4de26fb2014-07-23 09:25:02 +00002026have no reordering at all, use inline assembly instead.
2027
Sean Silva709c44d2012-12-12 23:44:55 +00002028X86/X86-64 Language Extensions
2029------------------------------
2030
2031The X86 backend has these language extensions:
2032
David L Kreitzerd8984102016-05-03 20:20:59 +00002033Memory references to specified segments
2034^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sean Silva709c44d2012-12-12 23:44:55 +00002035
2036Annotating a pointer with address space #256 causes it to be code generated
David L Kreitzerd8984102016-05-03 20:20:59 +00002037relative to the X86 GS segment register, address space #257 causes it to be
2038relative to the X86 FS segment, and address space #258 causes it to be
2039relative to the X86 SS segment. Note that this is a very very low-level
Sean Silva709c44d2012-12-12 23:44:55 +00002040feature that should only be used if you know what you're doing (for example in
2041an OS kernel).
2042
2043Here is an example:
2044
2045.. code-block:: c++
2046
2047 #define GS_RELATIVE __attribute__((address_space(256)))
2048 int foo(int GS_RELATIVE *P) {
2049 return *P;
2050 }
2051
2052Which compiles to (on X86-32):
2053
2054.. code-block:: gas
2055
2056 _foo:
2057 movl 4(%esp), %eax
2058 movl %gs:(%eax), %eax
2059 ret
2060
Jordan Rose32e94892012-12-15 00:37:01 +00002061Extensions for Static Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002062==============================
Sean Silva709c44d2012-12-12 23:44:55 +00002063
2064Clang supports additional attributes that are useful for documenting program
Jordan Rose32e94892012-12-15 00:37:01 +00002065invariants and rules for static analysis tools, such as the `Clang Static
2066Analyzer <http://clang-analyzer.llvm.org/>`_. These attributes are documented
2067in the analyzer's `list of source-level annotations
2068<http://clang-analyzer.llvm.org/annotations.html>`_.
Sean Silva709c44d2012-12-12 23:44:55 +00002069
Sean Silva709c44d2012-12-12 23:44:55 +00002070
Jordan Rose32e94892012-12-15 00:37:01 +00002071Extensions for Dynamic Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002072===============================
Sean Silva709c44d2012-12-12 23:44:55 +00002073
Sean Silva709c44d2012-12-12 23:44:55 +00002074Use ``__has_feature(address_sanitizer)`` to check if the code is being built
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002075with :doc:`AddressSanitizer`.
Sean Silva709c44d2012-12-12 23:44:55 +00002076
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002077Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
2078with :doc:`ThreadSanitizer`.
2079
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002080Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
2081with :doc:`MemorySanitizer`.
Dario Domizioli33c17872014-05-28 14:06:38 +00002082
Peter Collingbournec4122c12015-06-15 21:08:13 +00002083Use ``__has_feature(safe_stack)`` to check if the code is being built
2084with :doc:`SafeStack`.
2085
Dario Domizioli33c17872014-05-28 14:06:38 +00002086
2087Extensions for selectively disabling optimization
2088=================================================
2089
2090Clang provides a mechanism for selectively disabling optimizations in functions
2091and methods.
2092
2093To disable optimizations in a single function definition, the GNU-style or C++11
2094non-standard attribute ``optnone`` can be used.
2095
2096.. code-block:: c++
2097
2098 // The following functions will not be optimized.
2099 // GNU-style attribute
2100 __attribute__((optnone)) int foo() {
2101 // ... code
2102 }
2103 // C++11 attribute
2104 [[clang::optnone]] int bar() {
2105 // ... code
2106 }
2107
2108To facilitate disabling optimization for a range of function definitions, a
2109range-based pragma is provided. Its syntax is ``#pragma clang optimize``
2110followed by ``off`` or ``on``.
2111
2112All function definitions in the region between an ``off`` and the following
2113``on`` will be decorated with the ``optnone`` attribute unless doing so would
2114conflict with explicit attributes already present on the function (e.g. the
2115ones that control inlining).
2116
2117.. code-block:: c++
2118
2119 #pragma clang optimize off
2120 // This function will be decorated with optnone.
2121 int foo() {
2122 // ... code
2123 }
2124
2125 // optnone conflicts with always_inline, so bar() will not be decorated.
2126 __attribute__((always_inline)) int bar() {
2127 // ... code
2128 }
2129 #pragma clang optimize on
2130
2131If no ``on`` is found to close an ``off`` region, the end of the region is the
2132end of the compilation unit.
2133
2134Note that a stray ``#pragma clang optimize on`` does not selectively enable
2135additional optimizations when compiling at low optimization levels. This feature
2136can only be used to selectively disable optimizations.
2137
2138The pragma has an effect on functions only at the point of their definition; for
2139function templates, this means that the state of the pragma at the point of an
2140instantiation is not necessarily relevant. Consider the following example:
2141
2142.. code-block:: c++
2143
2144 template<typename T> T twice(T t) {
2145 return 2 * t;
2146 }
2147
2148 #pragma clang optimize off
2149 template<typename T> T thrice(T t) {
2150 return 3 * t;
2151 }
2152
2153 int container(int a, int b) {
2154 return twice(a) + thrice(b);
2155 }
2156 #pragma clang optimize on
2157
2158In this example, the definition of the template function ``twice`` is outside
2159the pragma region, whereas the definition of ``thrice`` is inside the region.
2160The ``container`` function is also in the region and will not be optimized, but
2161it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
2162these two instantiations, ``twice`` will be optimized (because its definition
2163was outside the region) and ``thrice`` will not be optimized.
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002164
2165Extensions for loop hint optimizations
2166======================================
2167
2168The ``#pragma clang loop`` directive is used to specify hints for optimizing the
2169subsequent for, while, do-while, or c++11 range-based for loop. The directive
Adam Nemet2de463e2016-06-14 12:04:26 +00002170provides options for vectorization, interleaving, unrolling and
2171distribution. Loop hints can be specified before any loop and will be ignored if
2172the optimization is not safe to apply.
Eli Bendersky778268d2014-06-19 18:12:44 +00002173
2174Vectorization and Interleaving
2175------------------------------
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002176
2177A vectorized loop performs multiple iterations of the original loop
2178in parallel using vector instructions. The instruction set of the target
2179processor determines which vector instructions are available and their vector
2180widths. This restricts the types of loops that can be vectorized. The vectorizer
2181automatically determines if the loop is safe and profitable to vectorize. A
2182vector instruction cost model is used to select the vector width.
2183
2184Interleaving multiple loop iterations allows modern processors to further
2185improve instruction-level parallelism (ILP) using advanced hardware features,
2186such as multiple execution units and out-of-order execution. The vectorizer uses
2187a cost model that depends on the register pressure and generated code size to
2188select the interleaving count.
2189
2190Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
2191by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
2192manually enable vectorization or interleaving.
2193
2194.. code-block:: c++
2195
2196 #pragma clang loop vectorize(enable)
2197 #pragma clang loop interleave(enable)
2198 for(...) {
2199 ...
2200 }
2201
2202The vector width is specified by ``vectorize_width(_value_)`` and the interleave
2203count is specified by ``interleave_count(_value_)``, where
2204_value_ is a positive integer. This is useful for specifying the optimal
2205width/count of the set of target architectures supported by your application.
2206
2207.. code-block:: c++
2208
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002209 #pragma clang loop vectorize_width(2)
2210 #pragma clang loop interleave_count(2)
2211 for(...) {
2212 ...
2213 }
2214
2215Specifying a width/count of 1 disables the optimization, and is equivalent to
2216``vectorize(disable)`` or ``interleave(disable)``.
2217
Eli Bendersky778268d2014-06-19 18:12:44 +00002218Loop Unrolling
2219--------------
2220
2221Unrolling a loop reduces the loop control overhead and exposes more
2222opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
2223eliminates the loop and replaces it with an enumerated sequence of loop
2224iterations. Full unrolling is only possible if the loop trip count is known at
2225compile time. Partial unrolling replicates the loop body within the loop and
2226reduces the trip count.
2227
Mark Heffernan397a98d2015-08-10 17:29:39 +00002228If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the
Mark Heffernan7ccb5e22015-07-13 18:31:37 +00002229loop if the trip count is known at compile time. If the fully unrolled code size
2230is greater than an internal limit the loop will be partially unrolled up to this
Mark Heffernan397a98d2015-08-10 17:29:39 +00002231limit. If the trip count is not known at compile time the loop will be partially
2232unrolled with a heuristically chosen unroll factor.
2233
2234.. code-block:: c++
2235
2236 #pragma clang loop unroll(enable)
2237 for(...) {
2238 ...
2239 }
2240
2241If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
2242loop if the trip count is known at compile time identically to
2243``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled
2244if the loop count is not known at compile time.
Eli Bendersky778268d2014-06-19 18:12:44 +00002245
2246.. code-block:: c++
2247
Mark Heffernan450c2382014-07-23 17:31:31 +00002248 #pragma clang loop unroll(full)
Eli Bendersky778268d2014-06-19 18:12:44 +00002249 for(...) {
2250 ...
2251 }
2252
2253The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
2254_value_ is a positive integer. If this value is greater than the trip count the
2255loop will be fully unrolled. Otherwise the loop is partially unrolled subject
Mark Heffernan397a98d2015-08-10 17:29:39 +00002256to the same code size limit as with ``unroll(enable)``.
Eli Bendersky778268d2014-06-19 18:12:44 +00002257
2258.. code-block:: c++
2259
2260 #pragma clang loop unroll_count(8)
2261 for(...) {
2262 ...
2263 }
2264
2265Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
2266
Adam Nemet2de463e2016-06-14 12:04:26 +00002267Loop Distribution
2268-----------------
2269
2270Loop Distribution allows splitting a loop into multiple loops. This is
2271beneficial for example when the entire loop cannot be vectorized but some of the
2272resulting loops can.
2273
Adam Nemet0c58eb72016-06-14 19:33:16 +00002274If ``distribute(enable))`` is specified and the loop has memory dependencies
Adam Nemet2de463e2016-06-14 12:04:26 +00002275that inhibit vectorization, the compiler will attempt to isolate the offending
2276operations into a new loop. This optimization is not enabled by default, only
2277loops marked with the pragma are considered.
2278
2279.. code-block:: c++
2280
2281 #pragma clang loop distribute(enable)
2282 for (i = 0; i < N; ++i) {
2283 S1: A[i + 1] = A[i] + B[i];
2284 S2: C[i] = D[i] * E[i];
2285 }
2286
2287This loop will be split into two loops between statements S1 and S2. The
2288second loop containing S2 will be vectorized.
2289
2290Loop Distribution is currently not enabled by default in the optimizer because
2291it can hurt performance in some cases. For example, instruction-level
2292parallelism could be reduced by sequentializing the execution of the
2293statements S1 and S2 above.
2294
2295If Loop Distribution is turned on globally with
2296``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can
2297be used the disable it on a per-loop basis.
2298
Eli Bendersky778268d2014-06-19 18:12:44 +00002299Additional Information
2300----------------------
2301
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002302For convenience multiple loop hints can be specified on a single line.
2303
2304.. code-block:: c++
2305
2306 #pragma clang loop vectorize_width(4) interleave_count(8)
2307 for(...) {
2308 ...
2309 }
2310
2311If an optimization cannot be applied any hints that apply to it will be ignored.
2312For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
2313proven safe to vectorize. To identify and diagnose optimization issues use
2314`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
2315user guide for details.
Adam Nemet60d32642017-04-04 21:18:36 +00002316
2317Extensions to specify floating-point flags
2318====================================================
2319
2320The ``#pragma clang fp`` pragma allows floating-point options to be specified
2321for a section of the source code. This pragma can only appear at file scope or
2322at the start of a compound statement (excluding comments). When using within a
2323compound statement, the pragma is active within the scope of the compound
2324statement.
2325
2326Currently, only FP contraction can be controlled with the pragma. ``#pragma
2327clang fp contract`` specifies whether the compiler should contract a multiply
2328and an addition (or subtraction) into a fused FMA operation when supported by
2329the target.
2330
2331The pragma can take three values: ``on``, ``fast`` and ``off``. The ``on``
2332option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows
2333fusion as specified the language standard. The ``fast`` option allows fusiong
2334in cases when the language standard does not make this possible (e.g. across
2335statements in C)
2336
2337.. code-block:: c++
2338
2339 for(...) {
2340 #pragma clang fp contract(fast)
2341 a = b[i] * c[i];
2342 d[i] += a;
2343 }
2344
2345
Adam Nemete73e00c2017-04-04 22:45:20 +00002346The pragma can also be used with ``off`` which turns FP contraction off for a
Adam Nemet60d32642017-04-04 21:18:36 +00002347section of the code. This can be useful when fast contraction is otherwise
Adam Nemetd7f95112017-04-04 23:46:34 +00002348enabled for the translation unit with the ``-ffp-contract=fast`` flag.