blob: 41f161302f2b0d452c09998285a3b80bfefd472b [file] [log] [blame]
Sean Silva709c44d2012-12-12 23:44:55 +00001=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6 :local:
Sean Silva13d43fe2013-01-02 21:09:58 +00007 :depth: 1
Sean Silva709c44d2012-12-12 23:44:55 +00008
Sean Silvaf380e0e2013-01-02 21:03:11 +00009.. toctree::
10 :hidden:
11
12 ObjectiveCLiterals
13 BlockLanguageSpec
Michael Gottesman6fd58462013-01-07 22:24:45 +000014 Block-ABI-Apple
DeLesley Hutchinsc51e08c2014-02-18 19:42:01 +000015 AutomaticReferenceCounting
Sean Silvaf380e0e2013-01-02 21:03:11 +000016
Sean Silva709c44d2012-12-12 23:44:55 +000017Introduction
18============
19
20This document describes the language extensions provided by Clang. In addition
21to the language extensions listed here, Clang aims to support a broad range of
22GCC extensions. Please see the `GCC manual
23<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
24these extensions.
25
26.. _langext-feature_check:
27
28Feature Checking Macros
29=======================
30
31Language extensions can be very useful, but only if you know you can depend on
32them. In order to allow fine-grain features checks, we support three builtin
33function-like macros. This allows you to directly test for a feature in your
34code without having to resort to something like autoconf or fragile "compiler
35version checks".
36
37``__has_builtin``
38-----------------
39
40This function-like macro takes a single identifier argument that is the name of
41a builtin function. It evaluates to 1 if the builtin is supported or 0 if not.
42It can be used like this:
43
44.. code-block:: c++
45
46 #ifndef __has_builtin // Optional of course.
47 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
48 #endif
49
50 ...
51 #if __has_builtin(__builtin_trap)
52 __builtin_trap();
53 #else
54 abort();
55 #endif
56 ...
57
58.. _langext-__has_feature-__has_extension:
59
60``__has_feature`` and ``__has_extension``
61-----------------------------------------
62
63These function-like macros take a single identifier argument that is the name
64of a feature. ``__has_feature`` evaluates to 1 if the feature is both
65supported by Clang and standardized in the current language standard or 0 if
66not (but see :ref:`below <langext-has-feature-back-compat>`), while
67``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
68current language (either as a language extension or a standard language
69feature) or 0 if not. They can be used like this:
70
71.. code-block:: c++
72
73 #ifndef __has_feature // Optional of course.
74 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
75 #endif
76 #ifndef __has_extension
77 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
78 #endif
79
80 ...
81 #if __has_feature(cxx_rvalue_references)
82 // This code will only be compiled with the -std=c++11 and -std=gnu++11
83 // options, because rvalue references are only standardized in C++11.
84 #endif
85
86 #if __has_extension(cxx_rvalue_references)
87 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
88 // and -std=gnu++98 options, because rvalue references are supported as a
89 // language extension in C++98.
90 #endif
91
92.. _langext-has-feature-back-compat:
93
Alp Toker958027b2014-07-14 19:42:55 +000094For backward compatibility, ``__has_feature`` can also be used to test
Sean Silva709c44d2012-12-12 23:44:55 +000095for support for non-standardized features, i.e. features not prefixed ``c_``,
96``cxx_`` or ``objc_``.
97
98Another use of ``__has_feature`` is to check for compiler features not related
Sean Silva173d2522013-01-02 13:07:47 +000099to the language standard, such as e.g. :doc:`AddressSanitizer
100<AddressSanitizer>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000101
102If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
103to ``__has_feature``.
104
105The feature tag is described along with the language feature below.
106
107The feature name or extension name can also be specified with a preceding and
108following ``__`` (double underscore) to avoid interference from a macro with
109the same name. For instance, ``__cxx_rvalue_references__`` can be used instead
110of ``cxx_rvalue_references``.
111
Aaron Ballmana0344c52014-11-14 13:44:02 +0000112``__has_cpp_attribute``
Aaron Ballman631bd7b2014-11-14 14:01:55 +0000113-----------------------
Aaron Ballmana0344c52014-11-14 13:44:02 +0000114
115This function-like macro takes a single argument that is the name of a
116C++11-style attribute. The argument can either be a single identifier, or a
117scoped identifier. If the attribute is supported, a nonzero value is returned.
118If the attribute is a standards-based attribute, this macro returns a nonzero
119value based on the year and month in which the attribute was voted into the
120working draft. If the attribute is not supported by the current compliation
121target, this macro evaluates to 0. It can be used like this:
122
123.. code-block:: c++
124
125 #ifndef __has_cpp_attribute // Optional of course.
126 #define __has_cpp_attribute(x) 0 // Compatibility with non-clang compilers.
127 #endif
128
129 ...
130 #if __has_cpp_attribute(clang::fallthrough)
131 #define FALLTHROUGH [[clang::fallthrough]]
132 #else
133 #define FALLTHROUGH
134 #endif
135 ...
136
137The attribute identifier (but not scope) can also be specified with a preceding
138and following ``__`` (double underscore) to avoid interference from a macro with
139the same name. For instance, ``gnu::__const__`` can be used instead of
140``gnu::const``.
141
Aaron Ballman48f5f4d2017-12-07 21:37:49 +0000142``__has_c_attribute``
143---------------------
144
145This function-like macro takes a single argument that is the name of an
146attribute exposed with the double square-bracket syntax in C mode. The argument
147can either be a single identifier or a scoped identifier. If the attribute is
148supported, a nonzero value is returned. If the attribute is not supported by the
149current compilation target, this macro evaluates to 0. It can be used like this:
150
151.. code-block:: c
152
153 #ifndef __has_c_attribute // Optional of course.
154 #define __has_c_attribute(x) 0 // Compatibility with non-clang compilers.
155 #endif
156
157 ...
158 #if __has_c_attribute(fallthrough)
159 #define FALLTHROUGH [[fallthrough]]
160 #else
161 #define FALLTHROUGH
162 #endif
163 ...
164
165The attribute identifier (but not scope) can also be specified with a preceding
166and following ``__`` (double underscore) to avoid interference from a macro with
167the same name. For instance, ``gnu::__const__`` can be used instead of
168``gnu::const``.
169
170
Sean Silva709c44d2012-12-12 23:44:55 +0000171``__has_attribute``
172-------------------
173
174This function-like macro takes a single identifier argument that is the name of
Aaron Ballman4bfaeba2014-12-05 17:11:49 +0000175a GNU-style attribute. It evaluates to 1 if the attribute is supported by the
176current compilation target, or 0 if not. It can be used like this:
Sean Silva709c44d2012-12-12 23:44:55 +0000177
178.. code-block:: c++
179
180 #ifndef __has_attribute // Optional of course.
181 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
182 #endif
183
184 ...
185 #if __has_attribute(always_inline)
186 #define ALWAYS_INLINE __attribute__((always_inline))
187 #else
188 #define ALWAYS_INLINE
189 #endif
190 ...
191
192The attribute name can also be specified with a preceding and following ``__``
193(double underscore) to avoid interference from a macro with the same name. For
194instance, ``__always_inline__`` can be used instead of ``always_inline``.
195
Aaron Ballman3c0f9b42014-12-05 15:05:29 +0000196
197``__has_declspec_attribute``
198----------------------------
199
200This function-like macro takes a single identifier argument that is the name of
201an attribute implemented as a Microsoft-style ``__declspec`` attribute. It
202evaluates to 1 if the attribute is supported by the current compilation target,
203or 0 if not. It can be used like this:
204
205.. code-block:: c++
206
207 #ifndef __has_declspec_attribute // Optional of course.
208 #define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers.
209 #endif
210
211 ...
212 #if __has_declspec_attribute(dllexport)
213 #define DLLEXPORT __declspec(dllexport)
214 #else
215 #define DLLEXPORT
216 #endif
217 ...
218
219The attribute name can also be specified with a preceding and following ``__``
220(double underscore) to avoid interference from a macro with the same name. For
221instance, ``__dllexport__`` can be used instead of ``dllexport``.
222
Yunzhong Gaoa8c45c92014-04-12 02:25:32 +0000223``__is_identifier``
224-------------------
225
226This function-like macro takes a single identifier argument that might be either
227a reserved word or a regular identifier. It evaluates to 1 if the argument is just
228a regular identifier and not a reserved word, in the sense that it can then be
229used as the name of a user-defined function or variable. Otherwise it evaluates
230to 0. It can be used like this:
231
232.. code-block:: c++
233
234 ...
235 #ifdef __is_identifier // Compatibility with non-clang compilers.
236 #if __is_identifier(__wchar_t)
237 typedef wchar_t __wchar_t;
238 #endif
239 #endif
240
241 __wchar_t WideCharacter;
242 ...
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000243
Sean Silva709c44d2012-12-12 23:44:55 +0000244Include File Checking Macros
245============================
246
247Not all developments systems have the same include files. The
248:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
249you to check for the existence of an include file before doing a possibly
Dmitri Gribenko764ea242013-01-17 17:04:54 +0000250failing ``#include`` directive. Include file checking macros must be used
251as expressions in ``#if`` or ``#elif`` preprocessing directives.
Sean Silva709c44d2012-12-12 23:44:55 +0000252
253.. _langext-__has_include:
254
255``__has_include``
256-----------------
257
258This function-like macro takes a single file name string argument that is the
259name of an include file. It evaluates to 1 if the file can be found using the
260include paths, or 0 otherwise:
261
262.. code-block:: c++
263
264 // Note the two possible file name string formats.
265 #if __has_include("myinclude.h") && __has_include(<stdint.h>)
266 # include "myinclude.h"
267 #endif
268
Richard Smithccfc9ff2013-07-11 00:27:05 +0000269To test for this feature, use ``#if defined(__has_include)``:
270
271.. code-block:: c++
272
Sean Silva709c44d2012-12-12 23:44:55 +0000273 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000274 #if defined(__has_include)
275 #if __has_include("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000276 # include "myinclude.h"
277 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000278 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000279
280.. _langext-__has_include_next:
281
282``__has_include_next``
283----------------------
284
285This function-like macro takes a single file name string argument that is the
286name of an include file. It is like ``__has_include`` except that it looks for
287the second instance of the given file found in the include paths. It evaluates
288to 1 if the second instance of the file can be found using the include paths,
289or 0 otherwise:
290
291.. code-block:: c++
292
293 // Note the two possible file name string formats.
294 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
295 # include_next "myinclude.h"
296 #endif
297
298 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000299 #if defined(__has_include_next)
300 #if __has_include_next("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000301 # include_next "myinclude.h"
302 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000303 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000304
305Note that ``__has_include_next``, like the GNU extension ``#include_next``
306directive, is intended for use in headers only, and will issue a warning if
307used in the top-level compilation file. A warning will also be issued if an
308absolute path is used in the file argument.
309
310``__has_warning``
311-----------------
312
313This function-like macro takes a string literal that represents a command line
314option for a warning and returns true if that is a valid warning option.
315
316.. code-block:: c++
317
318 #if __has_warning("-Wformat")
319 ...
320 #endif
321
322Builtin Macros
323==============
324
325``__BASE_FILE__``
326 Defined to a string that contains the name of the main input file passed to
327 Clang.
328
329``__COUNTER__``
330 Defined to an integer value that starts at zero and is incremented each time
331 the ``__COUNTER__`` macro is expanded.
332
333``__INCLUDE_LEVEL__``
334 Defined to an integral value that is the include depth of the file currently
335 being translated. For the main file, this value is zero.
336
337``__TIMESTAMP__``
338 Defined to the date and time of the last modification of the current source
339 file.
340
341``__clang__``
342 Defined when compiling with Clang
343
344``__clang_major__``
345 Defined to the major marketing version number of Clang (e.g., the 2 in
346 2.0.1). Note that marketing version numbers should not be used to check for
347 language features, as different vendors use different numbering schemes.
348 Instead, use the :ref:`langext-feature_check`.
349
350``__clang_minor__``
351 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note
352 that marketing version numbers should not be used to check for language
353 features, as different vendors use different numbering schemes. Instead, use
354 the :ref:`langext-feature_check`.
355
356``__clang_patchlevel__``
357 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
358
359``__clang_version__``
360 Defined to a string that captures the Clang marketing version, including the
361 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
362
363.. _langext-vectors:
364
365Vectors and Extended Vectors
366============================
367
368Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
369
370OpenCL vector types are created using ``ext_vector_type`` attribute. It
371support for ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example
372is:
373
374.. code-block:: c++
375
376 typedef float float4 __attribute__((ext_vector_type(4)));
377 typedef float float2 __attribute__((ext_vector_type(2)));
378
379 float4 foo(float2 a, float2 b) {
380 float4 c;
381 c.xz = a;
382 c.yw = b;
383 return c;
384 }
385
386Query for this feature with ``__has_extension(attribute_ext_vector_type)``.
387
Eric Christopher758aad72017-03-21 22:06:18 +0000388Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax
Sean Silva709c44d2012-12-12 23:44:55 +0000389and functions. For example:
390
391.. code-block:: c++
392
393 vector float foo(vector int a) {
394 vector int b;
395 b = vec_add(a, a) + a;
396 return (vector float)b;
397 }
398
399NEON vector types are created using ``neon_vector_type`` and
400``neon_polyvector_type`` attributes. For example:
401
402.. code-block:: c++
403
404 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
405 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
406
407 int8x8_t foo(int8x8_t a) {
408 int8x8_t v;
409 v = a;
410 return v;
411 }
412
413Vector Literals
414---------------
415
416Vector literals can be used to create vectors from a set of scalars, or
417vectors. Either parentheses or braces form can be used. In the parentheses
418form the number of literal values specified must be one, i.e. referring to a
419scalar value, or must match the size of the vector type being created. If a
420single scalar literal value is specified, the scalar literal value will be
421replicated to all the components of the vector type. In the brackets form any
422number of literals can be specified. For example:
423
424.. code-block:: c++
425
426 typedef int v4si __attribute__((__vector_size__(16)));
427 typedef float float4 __attribute__((ext_vector_type(4)));
428 typedef float float2 __attribute__((ext_vector_type(2)));
429
430 v4si vsi = (v4si){1, 2, 3, 4};
431 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
432 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
433 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
434 vector int vi3 = (vector int)(1, 2); // error
435 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
436 vector int vi5 = (vector int)(1, 2, 3, 4);
437 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
438
439Vector Operations
440-----------------
441
442The table below shows the support for each operation by vector extension. A
443dash indicates that an operation is not accepted according to a corresponding
444specification.
445
Anton Yartsev94e46f32014-09-03 17:59:21 +0000446============================== ======= ======= ======= =======
Nick Lewycky00a5d212015-08-10 19:54:11 +0000447 Operator OpenCL AltiVec GCC NEON
Anton Yartsev94e46f32014-09-03 17:59:21 +0000448============================== ======= ======= ======= =======
449[] yes yes yes --
450unary operators +, -- yes yes yes --
451++, -- -- yes yes yes --
452+,--,*,/,% yes yes yes --
453bitwise operators &,|,^,~ yes yes yes --
454>>,<< yes yes yes --
455!, &&, || yes -- -- --
456==, !=, >, <, >=, <= yes yes -- --
457= yes yes yes yes
458:? yes -- -- --
459sizeof yes yes yes yes
460C-style cast yes yes yes no
461reinterpret_cast yes no yes no
462static_cast yes no yes no
463const_cast no no no no
464============================== ======= ======= ======= =======
Sean Silva709c44d2012-12-12 23:44:55 +0000465
Anton Yartsev94e46f32014-09-03 17:59:21 +0000466See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
Sean Silva709c44d2012-12-12 23:44:55 +0000467
Sjoerd Meijer167f2e32017-11-07 10:09:45 +0000468Half-Precision Floating Point
469=============================
470
471Clang supports two half-precision (16-bit) floating point types: ``__fp16`` and
472``_Float16``. ``__fp16`` is defined in the ARM C Language Extensions (`ACLE
473<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_)
474and ``_Float16`` in ISO/IEC TS 18661-3:2015.
475
476``__fp16`` is a storage and interchange format only. This means that values of
477``__fp16`` promote to (at least) float when used in arithmetic operations.
478There are two ``__fp16`` formats. Clang supports the IEEE 754-2008 format and
479not the ARM alternative format.
480
481ISO/IEC TS 18661-3:2015 defines C support for additional floating point types.
482``_FloatN`` is defined as a binary floating type, where the N suffix denotes
483the number of bits and is 16, 32, 64, or greater and equal to 128 and a
484multiple of 32. Clang supports ``_Float16``. The difference from ``__fp16`` is
485that arithmetic on ``_Float16`` is performed in half-precision, thus it is not
486a storage-only format. ``_Float16`` is available as a source language type in
487both C and C++ mode.
488
489It is recommended that portable code use the ``_Float16`` type because
490``__fp16`` is an ARM C-Language Extension (ACLE), whereas ``_Float16`` is
491defined by the C standards committee, so using ``_Float16`` will not prevent
492code from being ported to architectures other than Arm. Also, ``_Float16``
493arithmetic and operations will directly map on half-precision instructions when
494they are available (e.g. Armv8.2-A), avoiding conversions to/from
495single-precision, and thus will result in more performant code. If
496half-precision instructions are unavailable, values will be promoted to
497single-precision, similar to the semantics of ``__fp16`` except that the
498results will be stored in single-precision.
499
500In an arithmetic operation where one operand is of ``__fp16`` type and the
501other is of ``_Float16`` type, the ``_Float16`` type is first converted to
502``__fp16`` type and then the operation is completed as if both operands were of
503``__fp16`` type.
504
505To define a ``_Float16`` literal, suffix ``f16`` can be appended to the compile-time
506constant declaration. There is no default argument promotion for ``_Float16``; this
507applies to the standard floating types only. As a consequence, for example, an
508explicit cast is required for printing a ``_Float16`` value (there is no string
509format specifier for ``_Float16``).
510
Sean Silva709c44d2012-12-12 23:44:55 +0000511Messages on ``deprecated`` and ``unavailable`` Attributes
512=========================================================
513
514An optional string message can be added to the ``deprecated`` and
515``unavailable`` attributes. For example:
516
517.. code-block:: c++
518
519 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
520
521If the deprecated or unavailable declaration is used, the message will be
522incorporated into the appropriate diagnostic:
523
George Burgess IV61e43272016-06-21 00:16:23 +0000524.. code-block:: none
Sean Silva709c44d2012-12-12 23:44:55 +0000525
526 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
527 [-Wdeprecated-declarations]
528 explode();
529 ^
530
531Query for this feature with
532``__has_extension(attribute_deprecated_with_message)`` and
533``__has_extension(attribute_unavailable_with_message)``.
534
535Attributes on Enumerators
536=========================
537
538Clang allows attributes to be written on individual enumerators. This allows
539enumerators to be deprecated, made unavailable, etc. The attribute must appear
540after the enumerator name and before any initializer, like so:
541
542.. code-block:: c++
543
544 enum OperationMode {
545 OM_Invalid,
546 OM_Normal,
547 OM_Terrified __attribute__((deprecated)),
548 OM_AbortOnError __attribute__((deprecated)) = 4
549 };
550
551Attributes on the ``enum`` declaration do not apply to individual enumerators.
552
553Query for this feature with ``__has_extension(enumerator_attributes)``.
554
555'User-Specified' System Frameworks
556==================================
557
558Clang provides a mechanism by which frameworks can be built in such a way that
559they will always be treated as being "system frameworks", even if they are not
560present in a system framework directory. This can be useful to system
561framework developers who want to be able to test building other applications
562with development builds of their framework, including the manner in which the
563compiler changes warning behavior for system headers.
564
565Framework developers can opt-in to this mechanism by creating a
566"``.system_framework``" file at the top-level of their framework. That is, the
567framework should have contents like:
568
569.. code-block:: none
570
571 .../TestFramework.framework
572 .../TestFramework.framework/.system_framework
573 .../TestFramework.framework/Headers
574 .../TestFramework.framework/Headers/TestFramework.h
575 ...
576
577Clang will treat the presence of this file as an indicator that the framework
578should be treated as a system framework, regardless of how it was found in the
579framework search path. For consistency, we recommend that such files never be
580included in installed versions of the framework.
581
Sean Silva709c44d2012-12-12 23:44:55 +0000582Checks for Standard Language Features
583=====================================
584
585The ``__has_feature`` macro can be used to query if certain standard language
586features are enabled. The ``__has_extension`` macro can be used to query if
587language features are available as an extension when compiling for a standard
588which does not provide them. The features which can be tested are listed here.
589
Richard Smith38af8562014-11-12 21:16:38 +0000590Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
591These are macros with names of the form ``__cpp_<feature_name>``, and are
592intended to be a portable way to query the supported features of the compiler.
593See `the C++ status page <http://clang.llvm.org/cxx_status.html#ts>`_ for
594information on the version of SD-6 supported by each Clang release, and the
595macros provided by that revision of the recommendations.
596
Sean Silva709c44d2012-12-12 23:44:55 +0000597C++98
598-----
599
600The features listed below are part of the C++98 standard. These features are
601enabled by default when compiling C++ code.
602
603C++ exceptions
604^^^^^^^^^^^^^^
605
606Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
607enabled. For example, compiling code with ``-fno-exceptions`` disables C++
608exceptions.
609
610C++ RTTI
611^^^^^^^^
612
613Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For
614example, compiling code with ``-fno-rtti`` disables the use of RTTI.
615
616C++11
617-----
618
619The features listed below are part of the C++11 standard. As a result, all
620these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
621when compiling C++ code.
622
623C++11 SFINAE includes access control
624^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
625
626Use ``__has_feature(cxx_access_control_sfinae)`` or
627``__has_extension(cxx_access_control_sfinae)`` to determine whether
628access-control errors (e.g., calling a private constructor) are considered to
629be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
630<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
631
632C++11 alias templates
633^^^^^^^^^^^^^^^^^^^^^
634
635Use ``__has_feature(cxx_alias_templates)`` or
636``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
637alias declarations and alias templates is enabled.
638
639C++11 alignment specifiers
640^^^^^^^^^^^^^^^^^^^^^^^^^^
641
642Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
643determine if support for alignment specifiers using ``alignas`` is enabled.
644
Nico Weber736a9932014-12-03 01:25:49 +0000645Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to
646determine if support for the ``alignof`` keyword is enabled.
647
Sean Silva709c44d2012-12-12 23:44:55 +0000648C++11 attributes
649^^^^^^^^^^^^^^^^
650
651Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
652determine if support for attribute parsing with C++11's square bracket notation
653is enabled.
654
655C++11 generalized constant expressions
656^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
657
658Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
659constant expressions (e.g., ``constexpr``) is enabled.
660
661C++11 ``decltype()``
662^^^^^^^^^^^^^^^^^^^^
663
664Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
665determine if support for the ``decltype()`` specifier is enabled. C++11's
666``decltype`` does not require type-completeness of a function call expression.
667Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
668``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
669support for this feature is enabled.
670
671C++11 default template arguments in function templates
672^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
673
674Use ``__has_feature(cxx_default_function_template_args)`` or
675``__has_extension(cxx_default_function_template_args)`` to determine if support
676for default template arguments in function templates is enabled.
677
678C++11 ``default``\ ed functions
679^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
680
681Use ``__has_feature(cxx_defaulted_functions)`` or
682``__has_extension(cxx_defaulted_functions)`` to determine if support for
683defaulted function definitions (with ``= default``) is enabled.
684
685C++11 delegating constructors
686^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
687
688Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
689delegating constructors is enabled.
690
691C++11 ``deleted`` functions
692^^^^^^^^^^^^^^^^^^^^^^^^^^^
693
694Use ``__has_feature(cxx_deleted_functions)`` or
695``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
696function definitions (with ``= delete``) is enabled.
697
698C++11 explicit conversion functions
699^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
700
701Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
702``explicit`` conversion functions is enabled.
703
704C++11 generalized initializers
705^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
706
707Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
708generalized initializers (using braced lists and ``std::initializer_list``) is
709enabled.
710
711C++11 implicit move constructors/assignment operators
712^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
713
714Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
715generate move constructors and move assignment operators where needed.
716
717C++11 inheriting constructors
718^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
719
720Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
Richard Smith25b555a2013-04-19 17:00:31 +0000721inheriting constructors is enabled.
Sean Silva709c44d2012-12-12 23:44:55 +0000722
723C++11 inline namespaces
724^^^^^^^^^^^^^^^^^^^^^^^
725
726Use ``__has_feature(cxx_inline_namespaces)`` or
727``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
728namespaces is enabled.
729
730C++11 lambdas
731^^^^^^^^^^^^^
732
733Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
734determine if support for lambdas is enabled.
735
736C++11 local and unnamed types as template arguments
737^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
738
739Use ``__has_feature(cxx_local_type_template_args)`` or
740``__has_extension(cxx_local_type_template_args)`` to determine if support for
741local and unnamed types as template arguments is enabled.
742
743C++11 noexcept
744^^^^^^^^^^^^^^
745
746Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
747determine if support for noexcept exception specifications is enabled.
748
749C++11 in-class non-static data member initialization
750^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
751
752Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
753initialization of non-static data members is enabled.
754
755C++11 ``nullptr``
756^^^^^^^^^^^^^^^^^
757
758Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
759determine if support for ``nullptr`` is enabled.
760
761C++11 ``override control``
762^^^^^^^^^^^^^^^^^^^^^^^^^^
763
764Use ``__has_feature(cxx_override_control)`` or
765``__has_extension(cxx_override_control)`` to determine if support for the
766override control keywords is enabled.
767
768C++11 reference-qualified functions
769^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
770
771Use ``__has_feature(cxx_reference_qualified_functions)`` or
772``__has_extension(cxx_reference_qualified_functions)`` to determine if support
773for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
774applied to ``*this``) is enabled.
775
776C++11 range-based ``for`` loop
777^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
778
779Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
780determine if support for the range-based for loop is enabled.
781
782C++11 raw string literals
783^^^^^^^^^^^^^^^^^^^^^^^^^
784
785Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
786string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
787
788C++11 rvalue references
789^^^^^^^^^^^^^^^^^^^^^^^
790
791Use ``__has_feature(cxx_rvalue_references)`` or
792``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
793references is enabled.
794
795C++11 ``static_assert()``
796^^^^^^^^^^^^^^^^^^^^^^^^^
797
798Use ``__has_feature(cxx_static_assert)`` or
799``__has_extension(cxx_static_assert)`` to determine if support for compile-time
800assertions using ``static_assert`` is enabled.
801
Richard Smith25b555a2013-04-19 17:00:31 +0000802C++11 ``thread_local``
803^^^^^^^^^^^^^^^^^^^^^^
804
805Use ``__has_feature(cxx_thread_local)`` to determine if support for
806``thread_local`` variables is enabled.
807
Sean Silva709c44d2012-12-12 23:44:55 +0000808C++11 type inference
809^^^^^^^^^^^^^^^^^^^^
810
811Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
812determine C++11 type inference is supported using the ``auto`` specifier. If
813this is disabled, ``auto`` will instead be a storage class specifier, as in C
814or C++98.
815
816C++11 strongly typed enumerations
817^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
818
819Use ``__has_feature(cxx_strong_enums)`` or
820``__has_extension(cxx_strong_enums)`` to determine if support for strongly
821typed, scoped enumerations is enabled.
822
823C++11 trailing return type
824^^^^^^^^^^^^^^^^^^^^^^^^^^
825
826Use ``__has_feature(cxx_trailing_return)`` or
827``__has_extension(cxx_trailing_return)`` to determine if support for the
828alternate function declaration syntax with trailing return type is enabled.
829
830C++11 Unicode string literals
831^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
832
833Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
834string literals is enabled.
835
836C++11 unrestricted unions
837^^^^^^^^^^^^^^^^^^^^^^^^^
838
839Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
840unrestricted unions is enabled.
841
842C++11 user-defined literals
843^^^^^^^^^^^^^^^^^^^^^^^^^^^
844
845Use ``__has_feature(cxx_user_literals)`` to determine if support for
846user-defined literals is enabled.
847
848C++11 variadic templates
849^^^^^^^^^^^^^^^^^^^^^^^^
850
851Use ``__has_feature(cxx_variadic_templates)`` or
852``__has_extension(cxx_variadic_templates)`` to determine if support for
853variadic templates is enabled.
854
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000855C++14
Richard Smith0a715422013-05-07 19:32:56 +0000856-----
857
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000858The features listed below are part of the C++14 standard. As a result, all
859these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option
860when compiling C++ code.
Richard Smith0a715422013-05-07 19:32:56 +0000861
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000862C++14 binary literals
Richard Smith0a715422013-05-07 19:32:56 +0000863^^^^^^^^^^^^^^^^^^^^^
864
865Use ``__has_feature(cxx_binary_literals)`` or
866``__has_extension(cxx_binary_literals)`` to determine whether
867binary literals (for instance, ``0b10010``) are recognized. Clang supports this
868feature as an extension in all language modes.
869
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000870C++14 contextual conversions
Richard Smith0a715422013-05-07 19:32:56 +0000871^^^^^^^^^^^^^^^^^^^^^^^^^^^^
872
873Use ``__has_feature(cxx_contextual_conversions)`` or
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000874``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules
Richard Smith0a715422013-05-07 19:32:56 +0000875are used when performing an implicit conversion for an array bound in a
876*new-expression*, the operand of a *delete-expression*, an integral constant
Richard Smithc0f7b812013-07-24 17:41:31 +0000877expression, or a condition in a ``switch`` statement.
Richard Smith0a715422013-05-07 19:32:56 +0000878
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000879C++14 decltype(auto)
Richard Smith0a715422013-05-07 19:32:56 +0000880^^^^^^^^^^^^^^^^^^^^
881
882Use ``__has_feature(cxx_decltype_auto)`` or
883``__has_extension(cxx_decltype_auto)`` to determine if support
884for the ``decltype(auto)`` placeholder type is enabled.
885
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000886C++14 default initializers for aggregates
Richard Smith0a715422013-05-07 19:32:56 +0000887^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
888
889Use ``__has_feature(cxx_aggregate_nsdmi)`` or
890``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
891for default initializers in aggregate members is enabled.
892
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000893C++14 digit separators
Richard Smith38af8562014-11-12 21:16:38 +0000894^^^^^^^^^^^^^^^^^^^^^^
895
896Use ``__cpp_digit_separators`` to determine if support for digit separators
897using single quotes (for instance, ``10'000``) is enabled. At this time, there
898is no corresponding ``__has_feature`` name
899
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000900C++14 generalized lambda capture
Richard Smith0a715422013-05-07 19:32:56 +0000901^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
902
Richard Smith6d540142014-05-09 21:08:59 +0000903Use ``__has_feature(cxx_init_captures)`` or
904``__has_extension(cxx_init_captures)`` to determine if support for
Richard Smith4fb09722013-07-24 17:51:13 +0000905lambda captures with explicit initializers is enabled
Richard Smith0a715422013-05-07 19:32:56 +0000906(for instance, ``[n(0)] { return ++n; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000907
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000908C++14 generic lambdas
Richard Smith0a715422013-05-07 19:32:56 +0000909^^^^^^^^^^^^^^^^^^^^^
910
Richard Smith6d540142014-05-09 21:08:59 +0000911Use ``__has_feature(cxx_generic_lambdas)`` or
912``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
Richard Smith0a715422013-05-07 19:32:56 +0000913(polymorphic) lambdas is enabled
914(for instance, ``[] (auto x) { return x + 1; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000915
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000916C++14 relaxed constexpr
Richard Smith0a715422013-05-07 19:32:56 +0000917^^^^^^^^^^^^^^^^^^^^^^^
918
919Use ``__has_feature(cxx_relaxed_constexpr)`` or
920``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
921declarations, local variable modification, and control flow constructs
922are permitted in ``constexpr`` functions.
Richard Smith0a715422013-05-07 19:32:56 +0000923
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000924C++14 return type deduction
Richard Smith0a715422013-05-07 19:32:56 +0000925^^^^^^^^^^^^^^^^^^^^^^^^^^^
926
927Use ``__has_feature(cxx_return_type_deduction)`` or
928``__has_extension(cxx_return_type_deduction)`` to determine if support
929for return type deduction for functions (using ``auto`` as a return type)
930is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000931
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000932C++14 runtime-sized arrays
Richard Smith0a715422013-05-07 19:32:56 +0000933^^^^^^^^^^^^^^^^^^^^^^^^^^
934
935Use ``__has_feature(cxx_runtime_array)`` or
936``__has_extension(cxx_runtime_array)`` to determine if support
937for arrays of runtime bound (a restricted form of variable-length arrays)
938is enabled.
939Clang's implementation of this feature is incomplete.
940
Eric Fiselierd3ff21c2017-05-06 23:26:04 +0000941C++14 variable templates
Richard Smith0a715422013-05-07 19:32:56 +0000942^^^^^^^^^^^^^^^^^^^^^^^^
943
944Use ``__has_feature(cxx_variable_templates)`` or
945``__has_extension(cxx_variable_templates)`` to determine if support for
946templated variable declarations is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000947
Sean Silva709c44d2012-12-12 23:44:55 +0000948C11
949---
950
951The features listed below are part of the C11 standard. As a result, all these
952features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
953compiling C code. Additionally, because these features are all
954backward-compatible, they are available as extensions in all language modes.
955
956C11 alignment specifiers
957^^^^^^^^^^^^^^^^^^^^^^^^
958
959Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
960if support for alignment specifiers using ``_Alignas`` is enabled.
961
Nico Weber736a9932014-12-03 01:25:49 +0000962Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine
963if support for the ``_Alignof`` keyword is enabled.
964
Sean Silva709c44d2012-12-12 23:44:55 +0000965C11 atomic operations
966^^^^^^^^^^^^^^^^^^^^^
967
968Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
969if support for atomic types using ``_Atomic`` is enabled. Clang also provides
970:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
Hal Finkel6970ac82014-10-03 04:29:40 +0000971the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
972``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
973is available.
974
975Clang will use the system's ``<stdatomic.h>`` header when one is available, and
976will otherwise use its own. When using its own, implementations of the atomic
977operations are provided as macros. In the cases where C11 also requires a real
978function, this header provides only the declaration of that function (along
979with a shadowing macro implementation), and you must link to a library which
980provides a definition of the function if you use it instead of the macro.
Sean Silva709c44d2012-12-12 23:44:55 +0000981
982C11 generic selections
983^^^^^^^^^^^^^^^^^^^^^^
984
985Use ``__has_feature(c_generic_selections)`` or
986``__has_extension(c_generic_selections)`` to determine if support for generic
987selections is enabled.
988
989As an extension, the C11 generic selection expression is available in all
990languages supported by Clang. The syntax is the same as that given in the C11
991standard.
992
993In C, type compatibility is decided according to the rules given in the
994appropriate standard, but in C++, which lacks the type compatibility rules used
995in C, types are considered compatible only if they are equivalent.
996
997C11 ``_Static_assert()``
998^^^^^^^^^^^^^^^^^^^^^^^^
999
1000Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
1001to determine if support for compile-time assertions using ``_Static_assert`` is
1002enabled.
1003
Richard Smith25b555a2013-04-19 17:00:31 +00001004C11 ``_Thread_local``
1005^^^^^^^^^^^^^^^^^^^^^
1006
Ed Schouten401aeba2013-09-14 16:17:20 +00001007Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
1008to determine if support for ``_Thread_local`` variables is enabled.
Richard Smith25b555a2013-04-19 17:00:31 +00001009
Ben Langmuir921f2e62015-03-10 14:39:26 +00001010Modules
1011-------
1012
1013Use ``__has_feature(modules)`` to determine if Modules have been enabled.
1014For example, compiling code with ``-fmodules`` enables the use of Modules.
1015
1016More information could be found `here <http://clang.llvm.org/docs/Modules.html>`_.
1017
Alp Toker64197b92014-01-18 21:49:02 +00001018Checks for Type Trait Primitives
1019================================
1020
1021Type trait primitives are special builtin constant expressions that can be used
1022by the standard C++ library to facilitate or simplify the implementation of
1023user-facing type traits in the <type_traits> header.
1024
1025They are not intended to be used directly by user code because they are
1026implementation-defined and subject to change -- as such they're tied closely to
1027the supported set of system headers, currently:
1028
1029* LLVM's own libc++
1030* GNU libstdc++
1031* The Microsoft standard C++ library
Sean Silva709c44d2012-12-12 23:44:55 +00001032
1033Clang supports the `GNU C++ type traits
1034<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
1035`Microsoft Visual C++ Type traits
Alp Toker64197b92014-01-18 21:49:02 +00001036<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_.
1037
1038Feature detection is supported only for some of the primitives at present. User
1039code should not use these checks because they bear no direct relation to the
1040actual set of type traits supported by the C++ standard library.
1041
1042For type trait ``__X``, ``__has_extension(X)`` indicates the presence of the
1043type trait primitive in the compiler. A simplistic usage example as might be
1044seen in standard C++ headers follows:
Sean Silva709c44d2012-12-12 23:44:55 +00001045
1046.. code-block:: c++
1047
1048 #if __has_extension(is_convertible_to)
1049 template<typename From, typename To>
1050 struct is_convertible_to {
1051 static const bool value = __is_convertible_to(From, To);
1052 };
1053 #else
Alp Toker64197b92014-01-18 21:49:02 +00001054 // Emulate type trait for compatibility with other compilers.
Sean Silva709c44d2012-12-12 23:44:55 +00001055 #endif
1056
Alp Toker64197b92014-01-18 21:49:02 +00001057The following type trait primitives are supported by Clang:
Sean Silva709c44d2012-12-12 23:44:55 +00001058
1059* ``__has_nothrow_assign`` (GNU, Microsoft)
1060* ``__has_nothrow_copy`` (GNU, Microsoft)
1061* ``__has_nothrow_constructor`` (GNU, Microsoft)
1062* ``__has_trivial_assign`` (GNU, Microsoft)
1063* ``__has_trivial_copy`` (GNU, Microsoft)
1064* ``__has_trivial_constructor`` (GNU, Microsoft)
1065* ``__has_trivial_destructor`` (GNU, Microsoft)
1066* ``__has_virtual_destructor`` (GNU, Microsoft)
1067* ``__is_abstract`` (GNU, Microsoft)
Eric Fiselier07360662017-04-12 22:12:15 +00001068* ``__is_aggregate`` (GNU, Microsoft)
Sean Silva709c44d2012-12-12 23:44:55 +00001069* ``__is_base_of`` (GNU, Microsoft)
1070* ``__is_class`` (GNU, Microsoft)
1071* ``__is_convertible_to`` (Microsoft)
1072* ``__is_empty`` (GNU, Microsoft)
1073* ``__is_enum`` (GNU, Microsoft)
1074* ``__is_interface_class`` (Microsoft)
1075* ``__is_pod`` (GNU, Microsoft)
1076* ``__is_polymorphic`` (GNU, Microsoft)
1077* ``__is_union`` (GNU, Microsoft)
1078* ``__is_literal(type)``: Determines whether the given type is a literal type
1079* ``__is_final``: Determines whether the given type is declared with a
1080 ``final`` class-virt-specifier.
1081* ``__underlying_type(type)``: Retrieves the underlying type for a given
1082 ``enum`` type. This trait is required to implement the C++11 standard
1083 library.
1084* ``__is_trivially_assignable(totype, fromtype)``: Determines whether a value
1085 of type ``totype`` can be assigned to from a value of type ``fromtype`` such
1086 that no non-trivial functions are called as part of that assignment. This
1087 trait is required to implement the C++11 standard library.
1088* ``__is_trivially_constructible(type, argtypes...)``: Determines whether a
1089 value of type ``type`` can be direct-initialized with arguments of types
1090 ``argtypes...`` such that no non-trivial functions are called as part of
1091 that initialization. This trait is required to implement the C++11 standard
1092 library.
David Majnemer55cf2522015-11-14 07:21:35 +00001093* ``__is_destructible`` (MSVC 2013)
1094* ``__is_nothrow_destructible`` (MSVC 2013)
Alp Toker73287bf2014-01-20 00:24:09 +00001095* ``__is_nothrow_assignable`` (MSVC 2013, clang)
1096* ``__is_constructible`` (MSVC 2013, clang)
1097* ``__is_nothrow_constructible`` (MSVC 2013, clang)
David Majnemerb3d96882016-05-23 17:21:55 +00001098* ``__is_assignable`` (MSVC 2015, clang)
Eric Fiselier1af6c112018-01-12 00:09:37 +00001099* ``__reference_binds_to_temporary(T, U)`` (Clang): Determines whether a
1100 reference of type ``T`` bound to an expression of type ``U`` would bind to a
1101 materialized temporary object. If ``T`` is not a reference type the result
1102 is false. Note this trait will also return false when the initialization of
1103 ``T`` from ``U`` is ill-formed.
Sean Silva709c44d2012-12-12 23:44:55 +00001104
1105Blocks
1106======
1107
1108The syntax and high level language feature description is in
Michael Gottesman6fd58462013-01-07 22:24:45 +00001109:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
1110the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
Sean Silva709c44d2012-12-12 23:44:55 +00001111
1112Query for this feature with ``__has_extension(blocks)``.
1113
1114Objective-C Features
1115====================
1116
1117Related result types
1118--------------------
1119
1120According to Cocoa conventions, Objective-C methods with certain names
1121("``init``", "``alloc``", etc.) always return objects that are an instance of
1122the receiving class's type. Such methods are said to have a "related result
1123type", meaning that a message send to one of these methods will have the same
1124static type as an instance of the receiver class. For example, given the
1125following classes:
1126
1127.. code-block:: objc
1128
1129 @interface NSObject
1130 + (id)alloc;
1131 - (id)init;
1132 @end
1133
1134 @interface NSArray : NSObject
1135 @end
1136
1137and this common initialization pattern
1138
1139.. code-block:: objc
1140
1141 NSArray *array = [[NSArray alloc] init];
1142
1143the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1144``alloc`` implicitly has a related result type. Similarly, the type of the
1145expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1146related result type and its receiver is known to have the type ``NSArray *``.
1147If neither ``alloc`` nor ``init`` had a related result type, the expressions
1148would have had type ``id``, as declared in the method signature.
1149
1150A method with a related result type can be declared by using the type
1151``instancetype`` as its result type. ``instancetype`` is a contextual keyword
1152that is only permitted in the result type of an Objective-C method, e.g.
1153
1154.. code-block:: objc
1155
1156 @interface A
1157 + (instancetype)constructAnA;
1158 @end
1159
1160The related result type can also be inferred for some methods. To determine
1161whether a method has an inferred related result type, the first word in the
1162camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1163and the method will have a related result type if its return type is compatible
1164with the type of its class and if:
1165
1166* the first word is "``alloc``" or "``new``", and the method is a class method,
1167 or
1168
1169* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1170 and the method is an instance method.
1171
1172If a method with a related result type is overridden by a subclass method, the
1173subclass method must also return a type that is compatible with the subclass
1174type. For example:
1175
1176.. code-block:: objc
1177
1178 @interface NSString : NSObject
1179 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1180 @end
1181
1182Related result types only affect the type of a message send or property access
1183via the given method. In all other respects, a method with a related result
1184type is treated the same way as method that returns ``id``.
1185
1186Use ``__has_feature(objc_instancetype)`` to determine whether the
1187``instancetype`` contextual keyword is available.
1188
1189Automatic reference counting
1190----------------------------
1191
Sean Silva173d2522013-01-02 13:07:47 +00001192Clang provides support for :doc:`automated reference counting
1193<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
Sean Silva709c44d2012-12-12 23:44:55 +00001194for manual ``retain``/``release``/``autorelease`` message sends. There are two
1195feature macros associated with automatic reference counting:
1196``__has_feature(objc_arc)`` indicates the availability of automated reference
1197counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1198automated reference counting also includes support for ``__weak`` pointers to
1199Objective-C objects.
1200
Sean Silva173d2522013-01-02 13:07:47 +00001201.. _objc-fixed-enum:
1202
Sean Silva709c44d2012-12-12 23:44:55 +00001203Enumerations with a fixed underlying type
1204-----------------------------------------
1205
1206Clang provides support for C++11 enumerations with a fixed underlying type
1207within Objective-C. For example, one can write an enumeration type as:
1208
1209.. code-block:: c++
1210
1211 typedef enum : unsigned char { Red, Green, Blue } Color;
1212
1213This specifies that the underlying type, which is used to store the enumeration
1214value, is ``unsigned char``.
1215
1216Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1217underlying types is available in Objective-C.
1218
1219Interoperability with C++11 lambdas
1220-----------------------------------
1221
1222Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1223permitting a lambda to be implicitly converted to a block pointer with the
1224corresponding signature. For example, consider an API such as ``NSArray``'s
1225array-sorting method:
1226
1227.. code-block:: objc
1228
1229 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1230
1231``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1232(^)(id, id)``, and parameters of this type are generally provided with block
1233literals as arguments. However, one can also use a C++11 lambda so long as it
1234provides the same signature (in this case, accepting two parameters of type
1235``id`` and returning an ``NSComparisonResult``):
1236
1237.. code-block:: objc
1238
1239 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1240 @"String 02"];
1241 const NSStringCompareOptions comparisonOptions
1242 = NSCaseInsensitiveSearch | NSNumericSearch |
1243 NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1244 NSLocale *currentLocale = [NSLocale currentLocale];
1245 NSArray *sorted
1246 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1247 NSRange string1Range = NSMakeRange(0, [s1 length]);
1248 return [s1 compare:s2 options:comparisonOptions
1249 range:string1Range locale:currentLocale];
1250 }];
1251 NSLog(@"sorted: %@", sorted);
1252
1253This code relies on an implicit conversion from the type of the lambda
1254expression (an unnamed, local class type called the *closure type*) to the
1255corresponding block pointer type. The conversion itself is expressed by a
1256conversion operator in that closure type that produces a block pointer with the
1257same signature as the lambda itself, e.g.,
1258
1259.. code-block:: objc
1260
1261 operator NSComparisonResult (^)(id, id)() const;
1262
1263This conversion function returns a new block that simply forwards the two
1264parameters to the lambda object (which it captures by copy), then returns the
1265result. The returned block is first copied (with ``Block_copy``) and then
1266autoreleased. As an optimization, if a lambda expression is immediately
1267converted to a block pointer (as in the first example, above), then the block
1268is not copied and autoreleased: rather, it is given the same lifetime as a
1269block literal written at that point in the program, which avoids the overhead
1270of copying a block to the heap in the common case.
1271
1272The conversion from a lambda to a block pointer is only available in
1273Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1274management (autorelease).
1275
1276Object Literals and Subscripting
1277--------------------------------
1278
Sean Silva173d2522013-01-02 13:07:47 +00001279Clang provides support for :doc:`Object Literals and Subscripting
1280<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
Sean Silva709c44d2012-12-12 23:44:55 +00001281programming patterns, makes programs more concise, and improves the safety of
1282container creation. There are several feature macros associated with object
1283literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1284availability of array literals; ``__has_feature(objc_dictionary_literals)``
1285tests the availability of dictionary literals;
1286``__has_feature(objc_subscripting)`` tests the availability of object
1287subscripting.
1288
1289Objective-C Autosynthesis of Properties
1290---------------------------------------
1291
1292Clang provides support for autosynthesis of declared properties. Using this
1293feature, clang provides default synthesis of those properties not declared
1294@dynamic and not having user provided backing getter and setter methods.
1295``__has_feature(objc_default_synthesize_properties)`` checks for availability
1296of this feature in version of clang being used.
1297
Jordan Rose32e94892012-12-15 00:37:01 +00001298.. _langext-objc-retain-release:
1299
1300Objective-C retaining behavior attributes
1301-----------------------------------------
1302
1303In Objective-C, functions and methods are generally assumed to follow the
1304`Cocoa Memory Management
1305<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1306conventions for ownership of object arguments and
1307return values. However, there are exceptions, and so Clang provides attributes
1308to allow these exceptions to be documented. This are used by ARC and the
1309`static analyzer <http://clang-analyzer.llvm.org>`_ Some exceptions may be
Aaron Ballman840cef32014-02-19 15:45:13 +00001310better described using the ``objc_method_family`` attribute instead.
Jordan Rose32e94892012-12-15 00:37:01 +00001311
1312**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1313``ns_returns_autoreleased``, ``cf_returns_retained``, and
1314``cf_returns_not_retained`` attributes can be placed on methods and functions
1315that return Objective-C or CoreFoundation objects. They are commonly placed at
1316the end of a function prototype or method declaration:
1317
1318.. code-block:: objc
1319
1320 id foo() __attribute__((ns_returns_retained));
1321
1322 - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1323
1324The ``*_returns_retained`` attributes specify that the returned object has a +1
1325retain count. The ``*_returns_not_retained`` attributes specify that the return
1326object has a +0 retain count, even if the normal convention for its selector
1327would be +1. ``ns_returns_autoreleased`` specifies that the returned object is
1328+0, but is guaranteed to live at least as long as the next flush of an
1329autorelease pool.
1330
1331**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1332an parameter declaration; they specify that the argument is expected to have a
1333+1 retain count, which will be balanced in some way by the function or method.
1334The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1335method; it specifies that the method expects its ``self`` parameter to have a
1336+1 retain count, which it will balance in some way.
1337
1338.. code-block:: objc
1339
1340 void foo(__attribute__((ns_consumed)) NSString *string);
1341
1342 - (void) bar __attribute__((ns_consumes_self));
1343 - (void) baz:(id) __attribute__((ns_consumed)) x;
1344
1345Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1346<http://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1347
1348Query for these features with ``__has_attribute(ns_consumed)``,
1349``__has_attribute(ns_returns_retained)``, etc.
1350
Nico Weber11cafc82017-07-14 18:40:52 +00001351Objective-C @available
1352----------------------
1353
1354It is possible to use the newest SDK but still build a program that can run on
Nico Weber564004a2017-07-14 18:52:30 +00001355older versions of macOS and iOS by passing ``-mmacosx-version-min=`` /
1356``-miphoneos-version-min=``.
Nico Weber11cafc82017-07-14 18:40:52 +00001357
1358Before LLVM 5.0, when calling a function that exists only in the OS that's
1359newer than the target OS (as determined by the minimum deployment version),
1360programmers had to carefully check if the function exists at runtime, using
1361null checks for weakly-linked C functions, ``+class`` for Objective-C classes,
1362and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for
1363Objective-C methods. If such a check was missed, the program would compile
1364fine, run fine on newer systems, but crash on older systems.
1365
1366As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes
1367<http://clang.llvm.org/docs/AttributeReference.html#availability>`_ together
1368with the new ``@available()`` keyword to assist with this issue.
1369When a method that's introduced in the OS newer than the target OS is called, a
1370-Wunguarded-availability warning is emitted if that call is not guarded:
1371
1372.. code-block:: objc
1373
1374 void my_fun(NSSomeClass* var) {
1375 // If fancyNewMethod was added in e.g. macOS 10.12, but the code is
1376 // built with -mmacosx-version-min=10.11, then this unconditional call
1377 // will emit a -Wunguarded-availability warning:
1378 [var fancyNewMethod];
1379 }
1380
1381To fix the warning and to avoid the crash on macOS 10.11, wrap it in
1382``if(@available())``:
1383
1384.. code-block:: objc
1385
1386 void my_fun(NSSomeClass* var) {
1387 if (@available(macOS 10.12, *)) {
1388 [var fancyNewMethod];
1389 } else {
1390 // Put fallback behavior for old macOS versions (and for non-mac
1391 // platforms) here.
1392 }
1393 }
1394
1395The ``*`` is required and means that platforms not explicitly listed will take
1396the true branch, and the compiler will emit ``-Wunguarded-availability``
1397warnings for unlisted platforms based on those platform's deployment target.
1398More than one platform can be listed in ``@available()``:
1399
1400.. code-block:: objc
1401
1402 void my_fun(NSSomeClass* var) {
1403 if (@available(macOS 10.12, iOS 10, *)) {
1404 [var fancyNewMethod];
1405 }
1406 }
1407
1408If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called
1409on 10.12, then add an `availability attribute
1410<http://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it,
1411which will also suppress the warning and require that calls to my_fun() are
1412checked:
1413
1414.. code-block:: objc
1415
1416 API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) {
1417 [var fancyNewMethod]; // Now ok.
1418 }
1419
1420``@available()`` is only available in Objective-C code. To use the feature
1421in C and C++ code, use the ``__builtin_available()`` spelling instead.
1422
1423If existing code uses null checks or ``-respondsToSelector:``, it should
1424be changed to use ``@available()`` (or ``__builtin_available``) instead.
1425
1426``-Wunguarded-availability`` is disabled by default, but
1427``-Wunguarded-availability-new``, which only emits this warning for APIs
1428that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and
1429tvOS >= 11, is enabled by default.
1430
1431.. _langext-overloading:
Jordan Rose32e94892012-12-15 00:37:01 +00001432
Ted Kremenek84342d62013-10-15 04:28:42 +00001433Objective-C++ ABI: protocol-qualifier mangling of parameters
1434------------------------------------------------------------
1435
1436Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1437type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such
1438parameters to be differentiated from those with the regular unqualified ``id``
1439type.
1440
1441This was a non-backward compatible mangling change to the ABI. This change
1442allows proper overloading, and also prevents mangling conflicts with template
1443parameters of protocol-qualified type.
1444
1445Query the presence of this new mangling with
1446``__has_feature(objc_protocol_qualifier_mangling)``.
1447
Sean Silva709c44d2012-12-12 23:44:55 +00001448Initializer lists for complex numbers in C
1449==========================================
1450
1451clang supports an extension which allows the following in C:
1452
1453.. code-block:: c++
1454
1455 #include <math.h>
1456 #include <complex.h>
1457 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1458
1459This construct is useful because there is no way to separately initialize the
1460real and imaginary parts of a complex variable in standard C, given that clang
1461does not support ``_Imaginary``. (Clang also supports the ``__real__`` and
1462``__imag__`` extensions from gcc, which help in some cases, but are not usable
1463in static initializers.)
1464
1465Note that this extension does not allow eliding the braces; the meaning of the
1466following two lines is different:
1467
1468.. code-block:: c++
1469
1470 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1471 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1472
1473This extension also works in C++ mode, as far as that goes, but does not apply
1474to the C++ ``std::complex``. (In C++11, list initialization allows the same
1475syntax to be used with ``std::complex`` with the same meaning.)
1476
1477Builtin Functions
1478=================
1479
1480Clang supports a number of builtin library functions with the same syntax as
1481GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
1482``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
Hal Finkelbcc06082014-09-07 22:58:14 +00001483``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to
1484the GCC builtins, Clang supports a number of builtins that GCC does not, which
1485are listed here.
Sean Silva709c44d2012-12-12 23:44:55 +00001486
1487Please note that Clang does not and will not support all of the GCC builtins
1488for vector operations. Instead of using builtins, you should use the functions
1489defined in target-specific header files like ``<xmmintrin.h>``, which define
1490portable wrappers for these. Many of the Clang versions of these functions are
1491implemented directly in terms of :ref:`extended vector support
1492<langext-vectors>` instead of builtins, in order to reduce the number of
1493builtins that we need to implement.
1494
Hal Finkelbcc06082014-09-07 22:58:14 +00001495``__builtin_assume``
1496------------------------------
1497
1498``__builtin_assume`` is used to provide the optimizer with a boolean
1499invariant that is defined to be true.
1500
1501**Syntax**:
1502
1503.. code-block:: c++
1504
1505 __builtin_assume(bool)
1506
1507**Example of Use**:
1508
1509.. code-block:: c++
1510
1511 int foo(int x) {
1512 __builtin_assume(x != 0);
1513
1514 // The optimizer may short-circuit this check using the invariant.
1515 if (x == 0)
1516 return do_something();
1517
1518 return do_something_else();
1519 }
1520
1521**Description**:
1522
1523The boolean argument to this function is defined to be true. The optimizer may
1524analyze the form of the expression provided as the argument and deduce from
1525that information used to optimize the program. If the condition is violated
1526during execution, the behavior is undefined. The argument itself is never
1527evaluated, so any side effects of the expression will be discarded.
1528
1529Query for this feature with ``__has_builtin(__builtin_assume)``.
1530
Sean Silva709c44d2012-12-12 23:44:55 +00001531``__builtin_readcyclecounter``
1532------------------------------
1533
1534``__builtin_readcyclecounter`` is used to access the cycle counter register (or
1535a similar low-latency, high-accuracy clock) on those targets that support it.
1536
1537**Syntax**:
1538
1539.. code-block:: c++
1540
1541 __builtin_readcyclecounter()
1542
1543**Example of Use**:
1544
1545.. code-block:: c++
1546
1547 unsigned long long t0 = __builtin_readcyclecounter();
1548 do_something();
1549 unsigned long long t1 = __builtin_readcyclecounter();
1550 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
1551
1552**Description**:
1553
1554The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
1555which may be either global or process/thread-specific depending on the target.
1556As the backing counters often overflow quickly (on the order of seconds) this
1557should only be used for timing small intervals. When not supported by the
1558target, the return value is always zero. This builtin takes no arguments and
1559produces an unsigned long long result.
1560
Tim Northoverbfe2e5f72013-05-23 19:14:12 +00001561Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
1562that even if present, its use may depend on run-time privilege or other OS
1563controlled state.
Sean Silva709c44d2012-12-12 23:44:55 +00001564
1565.. _langext-__builtin_shufflevector:
1566
1567``__builtin_shufflevector``
1568---------------------------
1569
1570``__builtin_shufflevector`` is used to express generic vector
1571permutation/shuffle/swizzle operations. This builtin is also very important
1572for the implementation of various target-specific header files like
1573``<xmmintrin.h>``.
1574
1575**Syntax**:
1576
1577.. code-block:: c++
1578
1579 __builtin_shufflevector(vec1, vec2, index1, index2, ...)
1580
1581**Examples**:
1582
1583.. code-block:: c++
1584
Craig Topper50ad5b72013-08-03 17:40:38 +00001585 // identity operation - return 4-element vector v1.
1586 __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
Sean Silva709c44d2012-12-12 23:44:55 +00001587
1588 // "Splat" element 0 of V1 into a 4-element result.
1589 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1590
1591 // Reverse 4-element vector V1.
1592 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1593
1594 // Concatenate every other element of 4-element vectors V1 and V2.
1595 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1596
1597 // Concatenate every other element of 8-element vectors V1 and V2.
1598 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
1599
Craig Topper50ad5b72013-08-03 17:40:38 +00001600 // Shuffle v1 with some elements being undefined
1601 __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
1602
Sean Silva709c44d2012-12-12 23:44:55 +00001603**Description**:
1604
1605The first two arguments to ``__builtin_shufflevector`` are vectors that have
1606the same element type. The remaining arguments are a list of integers that
1607specify the elements indices of the first two vectors that should be extracted
1608and returned in a new vector. These element indices are numbered sequentially
1609starting with the first vector, continuing into the second vector. Thus, if
1610``vec1`` is a 4-element vector, index 5 would refer to the second element of
Craig Topper50ad5b72013-08-03 17:40:38 +00001611``vec2``. An index of -1 can be used to indicate that the corresponding element
1612in the returned vector is a don't care and can be optimized by the backend.
Sean Silva709c44d2012-12-12 23:44:55 +00001613
1614The result of ``__builtin_shufflevector`` is a vector with the same element
1615type as ``vec1``/``vec2`` but that has an element count equal to the number of
1616indices specified.
1617
1618Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
1619
Anton Yartsev94e46f32014-09-03 17:59:21 +00001620.. _langext-__builtin_convertvector:
1621
Hal Finkelc4d7c822013-09-18 03:29:45 +00001622``__builtin_convertvector``
1623---------------------------
1624
1625``__builtin_convertvector`` is used to express generic vector
1626type-conversion operations. The input vector and the output vector
1627type must have the same number of elements.
1628
1629**Syntax**:
1630
1631.. code-block:: c++
1632
1633 __builtin_convertvector(src_vec, dst_vec_type)
1634
1635**Examples**:
1636
1637.. code-block:: c++
1638
1639 typedef double vector4double __attribute__((__vector_size__(32)));
1640 typedef float vector4float __attribute__((__vector_size__(16)));
1641 typedef short vector4short __attribute__((__vector_size__(8)));
1642 vector4float vf; vector4short vs;
1643
1644 // convert from a vector of 4 floats to a vector of 4 doubles.
1645 __builtin_convertvector(vf, vector4double)
1646 // equivalent to:
1647 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
1648
1649 // convert from a vector of 4 shorts to a vector of 4 floats.
1650 __builtin_convertvector(vs, vector4float)
1651 // equivalent to:
Yunzhong Gao637cb90b2014-09-02 19:24:14 +00001652 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
Hal Finkelc4d7c822013-09-18 03:29:45 +00001653
1654**Description**:
1655
1656The first argument to ``__builtin_convertvector`` is a vector, and the second
1657argument is a vector type with the same number of elements as the first
1658argument.
1659
1660The result of ``__builtin_convertvector`` is a vector with the same element
1661type as the second argument, with a value defined in terms of the action of a
1662C-style cast applied to each element of the first argument.
1663
1664Query for this feature with ``__has_builtin(__builtin_convertvector)``.
1665
Matt Arsenault08087c52016-03-23 22:14:43 +00001666``__builtin_bitreverse``
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001667------------------------
Matt Arsenault08087c52016-03-23 22:14:43 +00001668
1669* ``__builtin_bitreverse8``
1670* ``__builtin_bitreverse16``
1671* ``__builtin_bitreverse32``
1672* ``__builtin_bitreverse64``
1673
1674**Syntax**:
1675
1676.. code-block:: c++
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001677
Matt Arsenault08087c52016-03-23 22:14:43 +00001678 __builtin_bitreverse32(x)
1679
1680**Examples**:
1681
1682.. code-block:: c++
Aaron Ballmanbcf13da2016-03-24 12:34:44 +00001683
Matt Arsenault08087c52016-03-23 22:14:43 +00001684 uint8_t rev_x = __builtin_bitreverse8(x);
1685 uint16_t rev_x = __builtin_bitreverse16(x);
1686 uint32_t rev_y = __builtin_bitreverse32(y);
1687 uint64_t rev_z = __builtin_bitreverse64(z);
1688
1689**Description**:
1690
1691The '``__builtin_bitreverse``' family of builtins is used to reverse
1692the bitpattern of an integer value; for example ``0b10110110`` becomes
1693``0b01101101``.
1694
Sean Silva709c44d2012-12-12 23:44:55 +00001695``__builtin_unreachable``
1696-------------------------
1697
1698``__builtin_unreachable`` is used to indicate that a specific point in the
1699program cannot be reached, even if the compiler might otherwise think it can.
1700This is useful to improve optimization and eliminates certain warnings. For
1701example, without the ``__builtin_unreachable`` in the example below, the
1702compiler assumes that the inline asm can fall through and prints a "function
1703declared '``noreturn``' should not return" warning.
1704
1705**Syntax**:
1706
1707.. code-block:: c++
1708
1709 __builtin_unreachable()
1710
1711**Example of use**:
1712
1713.. code-block:: c++
1714
1715 void myabort(void) __attribute__((noreturn));
1716 void myabort(void) {
1717 asm("int3");
1718 __builtin_unreachable();
1719 }
1720
1721**Description**:
1722
1723The ``__builtin_unreachable()`` builtin has completely undefined behavior.
1724Since it has undefined behavior, it is a statement that it is never reached and
1725the optimizer can take advantage of this to produce better code. This builtin
1726takes no arguments and produces a void result.
1727
1728Query for this feature with ``__has_builtin(__builtin_unreachable)``.
1729
Sanjay Patela24296b2015-09-02 20:01:30 +00001730``__builtin_unpredictable``
1731---------------------------
1732
1733``__builtin_unpredictable`` is used to indicate that a branch condition is
1734unpredictable by hardware mechanisms such as branch prediction logic.
1735
1736**Syntax**:
1737
1738.. code-block:: c++
1739
1740 __builtin_unpredictable(long long)
1741
1742**Example of use**:
1743
1744.. code-block:: c++
1745
1746 if (__builtin_unpredictable(x > 0)) {
1747 foo();
1748 }
1749
1750**Description**:
1751
1752The ``__builtin_unpredictable()`` builtin is expected to be used with control
1753flow conditions such as in ``if`` and ``switch`` statements.
1754
1755Query for this feature with ``__has_builtin(__builtin_unpredictable)``.
1756
Sean Silva709c44d2012-12-12 23:44:55 +00001757``__sync_swap``
1758---------------
1759
1760``__sync_swap`` is used to atomically swap integers or pointers in memory.
1761
1762**Syntax**:
1763
1764.. code-block:: c++
1765
1766 type __sync_swap(type *ptr, type value, ...)
1767
1768**Example of Use**:
1769
1770.. code-block:: c++
1771
1772 int old_value = __sync_swap(&value, new_value);
1773
1774**Description**:
1775
1776The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
1777atomic intrinsics to allow code to atomically swap the current value with the
1778new value. More importantly, it helps developers write more efficient and
1779correct code by avoiding expensive loops around
1780``__sync_bool_compare_and_swap()`` or relying on the platform specific
1781implementation details of ``__sync_lock_test_and_set()``. The
1782``__sync_swap()`` builtin is a full barrier.
1783
Richard Smith6cbd65d2013-07-11 02:27:57 +00001784``__builtin_addressof``
1785-----------------------
1786
1787``__builtin_addressof`` performs the functionality of the built-in ``&``
1788operator, ignoring any ``operator&`` overload. This is useful in constant
1789expressions in C++11, where there is no other way to take the address of an
1790object that overloads ``operator&``.
1791
1792**Example of use**:
1793
1794.. code-block:: c++
1795
1796 template<typename T> constexpr T *addressof(T &value) {
1797 return __builtin_addressof(value);
1798 }
1799
Richard Smith760520b2014-06-03 23:27:44 +00001800``__builtin_operator_new`` and ``__builtin_operator_delete``
1801------------------------------------------------------------
1802
1803``__builtin_operator_new`` allocates memory just like a non-placement non-class
1804*new-expression*. This is exactly like directly calling the normal
1805non-placement ``::operator new``, except that it allows certain optimizations
1806that the C++ standard does not permit for a direct function call to
1807``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
1808merging allocations).
1809
1810Likewise, ``__builtin_operator_delete`` deallocates memory just like a
1811non-class *delete-expression*, and is exactly like directly calling the normal
1812``::operator delete``, except that it permits optimizations. Only the unsized
1813form of ``__builtin_operator_delete`` is currently available.
1814
1815These builtins are intended for use in the implementation of ``std::allocator``
1816and other similar allocation libraries, and are only available in C++.
1817
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001818Multiprecision Arithmetic Builtins
1819----------------------------------
1820
1821Clang provides a set of builtins which expose multiprecision arithmetic in a
1822manner amenable to C. They all have the following form:
1823
1824.. code-block:: c
1825
1826 unsigned x = ..., y = ..., carryin = ..., carryout;
1827 unsigned sum = __builtin_addc(x, y, carryin, &carryout);
1828
1829Thus one can form a multiprecision addition chain in the following manner:
1830
1831.. code-block:: c
1832
1833 unsigned *x, *y, *z, carryin=0, carryout;
1834 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
1835 carryin = carryout;
1836 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
1837 carryin = carryout;
1838 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
1839 carryin = carryout;
1840 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
1841
1842The complete list of builtins are:
1843
1844.. code-block:: c
1845
Michael Gottesman15343992013-06-18 20:40:40 +00001846 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001847 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1848 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1849 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1850 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
Michael Gottesman15343992013-06-18 20:40:40 +00001851 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001852 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1853 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1854 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1855 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
1856
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001857Checked Arithmetic Builtins
1858---------------------------
1859
1860Clang provides a set of builtins that implement checked arithmetic for security
1861critical applications in a manner that is fast and easily expressable in C. As
1862an example of their usage:
1863
1864.. code-block:: c
1865
1866 errorcode_t security_critical_application(...) {
1867 unsigned x, y, result;
1868 ...
John McCall03107a42015-10-29 20:48:01 +00001869 if (__builtin_mul_overflow(x, y, &result))
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001870 return kErrorCodeHackers;
1871 ...
1872 use_multiply(result);
1873 ...
1874 }
1875
John McCall03107a42015-10-29 20:48:01 +00001876Clang provides the following checked arithmetic builtins:
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001877
1878.. code-block:: c
1879
John McCall03107a42015-10-29 20:48:01 +00001880 bool __builtin_add_overflow (type1 x, type2 y, type3 *sum);
1881 bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff);
1882 bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod);
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001883 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
1884 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
1885 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
1886 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
1887 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
1888 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
1889 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
1890 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
1891 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
1892 bool __builtin_sadd_overflow (int x, int y, int *sum);
1893 bool __builtin_saddl_overflow (long x, long y, long *sum);
1894 bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
1895 bool __builtin_ssub_overflow (int x, int y, int *diff);
1896 bool __builtin_ssubl_overflow (long x, long y, long *diff);
1897 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
1898 bool __builtin_smul_overflow (int x, int y, int *prod);
1899 bool __builtin_smull_overflow (long x, long y, long *prod);
1900 bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
1901
John McCall03107a42015-10-29 20:48:01 +00001902Each builtin performs the specified mathematical operation on the
1903first two arguments and stores the result in the third argument. If
1904possible, the result will be equal to mathematically-correct result
1905and the builtin will return 0. Otherwise, the builtin will return
19061 and the result will be equal to the unique value that is equivalent
1907to the mathematically-correct result modulo two raised to the *k*
1908power, where *k* is the number of bits in the result type. The
1909behavior of these builtins is well-defined for all argument values.
1910
1911The first three builtins work generically for operands of any integer type,
1912including boolean types. The operands need not have the same type as each
1913other, or as the result. The other builtins may implicitly promote or
1914convert their operands before performing the operation.
1915
1916Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc.
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001917
Matt Arsenault2d933982016-02-27 09:06:18 +00001918Floating point builtins
1919---------------------------------------
1920
1921``__builtin_canonicalize``
1922--------------------------
1923
1924.. code-block:: c
1925
1926 double __builtin_canonicalize(double);
1927 float __builtin_canonicalizef(float);
1928 long double__builtin_canonicalizel(long double);
1929
1930Returns the platform specific canonical encoding of a floating point
1931number. This canonicalization is useful for implementing certain
1932numeric primitives such as frexp. See `LLVM canonicalize intrinsic
1933<http://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for
1934more information on the semantics.
1935
Richard Smith67d484b2017-01-20 00:57:59 +00001936String builtins
1937---------------
1938
1939Clang provides constant expression evaluation support for builtins forms of
Richard Smith0abb11c2017-01-23 18:17:46 +00001940the following functions from the C standard library ``<string.h>`` header:
Richard Smith67d484b2017-01-20 00:57:59 +00001941
1942* ``memchr``
1943* ``memcmp``
1944* ``strchr``
1945* ``strcmp``
1946* ``strlen``
1947* ``strncmp``
1948* ``wcschr``
1949* ``wcscmp``
1950* ``wcslen``
1951* ``wcsncmp``
1952* ``wmemchr``
1953* ``wmemcmp``
1954
1955In each case, the builtin form has the name of the C library function prefixed
Richard Smith90854c42017-01-20 01:08:15 +00001956by ``__builtin_``. Example:
Richard Smith67d484b2017-01-20 00:57:59 +00001957
1958.. code-block:: c
1959
1960 void *p = __builtin_memchr("foobar", 'b', 5);
1961
1962In addition to the above, one further builtin is provided:
1963
1964.. code-block:: c
1965
1966 char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
1967
1968``__builtin_char_memchr(a, b, c)`` is identical to
1969``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within
1970constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*``
1971is disallowed in general).
1972
1973Support for constant expression evaluation for the above builtins be detected
1974with ``__has_feature(cxx_constexpr_string_builtins)``.
1975
Sean Silva709c44d2012-12-12 23:44:55 +00001976.. _langext-__c11_atomic:
1977
1978__c11_atomic builtins
1979---------------------
1980
1981Clang provides a set of builtins which are intended to be used to implement
1982C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the
1983``_explicit`` form of the corresponding C11 operation, and are named with a
Hal Finkel6970ac82014-10-03 04:29:40 +00001984``__c11_`` prefix. The supported operations, and the differences from
1985the corresponding C11 operations, are:
Sean Silva709c44d2012-12-12 23:44:55 +00001986
1987* ``__c11_atomic_init``
1988* ``__c11_atomic_thread_fence``
1989* ``__c11_atomic_signal_fence``
Hal Finkel6970ac82014-10-03 04:29:40 +00001990* ``__c11_atomic_is_lock_free`` (The argument is the size of the
Dan Liewfe726862014-10-03 12:36:20 +00001991 ``_Atomic(...)`` object, instead of its address)
Sean Silva709c44d2012-12-12 23:44:55 +00001992* ``__c11_atomic_store``
1993* ``__c11_atomic_load``
1994* ``__c11_atomic_exchange``
1995* ``__c11_atomic_compare_exchange_strong``
1996* ``__c11_atomic_compare_exchange_weak``
1997* ``__c11_atomic_fetch_add``
1998* ``__c11_atomic_fetch_sub``
1999* ``__c11_atomic_fetch_and``
2000* ``__c11_atomic_fetch_or``
2001* ``__c11_atomic_fetch_xor``
2002
Hal Finkel6970ac82014-10-03 04:29:40 +00002003The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
JF Bastiene6ccacf2014-10-10 16:09:48 +00002004``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
Hal Finkel6970ac82014-10-03 04:29:40 +00002005provided, with values corresponding to the enumerators of C11's
2006``memory_order`` enumeration.
2007
James Y Knight81167fb2015-08-05 16:57:36 +00002008(Note that Clang additionally provides GCC-compatible ``__atomic_*``
Yaxun Liu39195062017-08-04 18:16:31 +00002009builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0
2010atomic builtins are an explicit form of the corresponding OpenCL 2.0
2011builtin function, and are named with a ``__opencl_`` prefix. The macros
2012``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``,
2013``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``,
2014and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values
2015corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.)
James Y Knight81167fb2015-08-05 16:57:36 +00002016
Tim Northover6aacd492013-07-16 09:47:53 +00002017Low-level ARM exclusive memory builtins
2018---------------------------------------
2019
2020Clang provides overloaded builtins giving direct access to the three key ARM
2021instructions for implementing atomic operations.
2022
2023.. code-block:: c
Sean Silvaa928c242013-09-09 19:50:40 +00002024
Tim Northover6aacd492013-07-16 09:47:53 +00002025 T __builtin_arm_ldrex(const volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00002026 T __builtin_arm_ldaex(const volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00002027 int __builtin_arm_strex(T val, volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00002028 int __builtin_arm_stlex(T val, volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00002029 void __builtin_arm_clrex(void);
2030
2031The types ``T`` currently supported are:
Michael Zolotukhinc3f09ff2015-09-10 23:56:10 +00002032
Tim Northover573cbee2014-05-24 12:52:07 +00002033* Integer types with width at most 64 bits (or 128 bits on AArch64).
Tim Northover6aacd492013-07-16 09:47:53 +00002034* Floating-point types
2035* Pointer types.
2036
2037Note that the compiler does not guarantee it will not insert stores which clear
Tim Northover3acd6bd2014-07-02 12:56:02 +00002038the exclusive monitor in between an ``ldrex`` type operation and its paired
2039``strex``. In practice this is only usually a risk when the extra store is on
2040the same cache line as the variable being modified and Clang will only insert
2041stack stores on its own, so it is best not to use these operations on variables
2042with automatic storage duration.
Tim Northover6aacd492013-07-16 09:47:53 +00002043
2044Also, loads and stores may be implicit in code written between the ``ldrex`` and
2045``strex``. Clang will not necessarily mitigate the effects of these either, so
2046care should be exercised.
2047
2048For these reasons the higher level atomic primitives should be preferred where
2049possible.
2050
Michael Zolotukhin59d72b12015-09-11 02:01:15 +00002051Non-temporal load/store builtins
2052--------------------------------
2053
2054Clang provides overloaded builtins allowing generation of non-temporal memory
2055accesses.
2056
2057.. code-block:: c
2058
2059 T __builtin_nontemporal_load(T *addr);
2060 void __builtin_nontemporal_store(T value, T *addr);
2061
2062The types ``T`` currently supported are:
2063
2064* Integer types.
2065* Floating-point types.
2066* Vector types.
2067
2068Note that the compiler does not guarantee that non-temporal loads or stores
2069will be used.
2070
Gor Nishanov97e3b6d2016-10-03 22:44:48 +00002071C++ Coroutines support builtins
2072--------------------------------
2073
2074.. warning::
2075 This is a work in progress. Compatibility across Clang/LLVM releases is not
2076 guaranteed.
2077
2078Clang provides experimental builtins to support C++ Coroutines as defined by
2079http://wg21.link/P0057. The following four are intended to be used by the
2080standard library to implement `std::experimental::coroutine_handle` type.
2081
2082**Syntax**:
2083
2084.. code-block:: c
2085
2086 void __builtin_coro_resume(void *addr);
2087 void __builtin_coro_destroy(void *addr);
2088 bool __builtin_coro_done(void *addr);
2089 void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
2090
2091**Example of use**:
2092
2093.. code-block:: c++
2094
2095 template <> struct coroutine_handle<void> {
2096 void resume() const { __builtin_coro_resume(ptr); }
2097 void destroy() const { __builtin_coro_destroy(ptr); }
2098 bool done() const { return __builtin_coro_done(ptr); }
2099 // ...
2100 protected:
2101 void *ptr;
2102 };
2103
2104 template <typename Promise> struct coroutine_handle : coroutine_handle<> {
2105 // ...
2106 Promise &promise() const {
2107 return *reinterpret_cast<Promise *>(
2108 __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
2109 }
2110 static coroutine_handle from_promise(Promise &promise) {
2111 coroutine_handle p;
2112 p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
2113 /*from-promise=*/true);
2114 return p;
2115 }
2116 };
2117
2118
2119Other coroutine builtins are either for internal clang use or for use during
2120development of the coroutine feature. See `Coroutines in LLVM
2121<http://llvm.org/docs/Coroutines.html#intrinsics>`_ for
2122more information on their semantics. Note that builtins matching the intrinsics
2123that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,
2124llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to
2125an appropriate value during the emission.
2126
2127**Syntax**:
2128
2129.. code-block:: c
2130
2131 size_t __builtin_coro_size()
2132 void *__builtin_coro_frame()
2133 void *__builtin_coro_free(void *coro_frame)
2134
2135 void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
2136 bool __builtin_coro_alloc()
2137 void *__builtin_coro_begin(void *memory)
2138 void __builtin_coro_end(void *coro_frame, bool unwind)
2139 char __builtin_coro_suspend(bool final)
2140 bool __builtin_coro_param(void *original, void *copy)
2141
2142Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM
2143automatically will insert one if the first argument to `llvm.coro.suspend` is
2144token `none`. If a user calls `__builin_suspend`, clang will insert `token none`
2145as the first argument to the intrinsic.
2146
Sean Silva709c44d2012-12-12 23:44:55 +00002147Non-standard C++11 Attributes
2148=============================
2149
Richard Smithf6d2d3b2013-02-14 00:13:34 +00002150Clang's non-standard C++11 attributes live in the ``clang`` attribute
2151namespace.
Sean Silva709c44d2012-12-12 23:44:55 +00002152
Aaron Ballman68893db2014-02-19 23:21:40 +00002153Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
Richard Smithf6d2d3b2013-02-14 00:13:34 +00002154are accepted with the ``__attribute__((foo))`` syntax are also accepted as
2155``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
2156(see the list of `GCC function attributes
2157<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
2158attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
2159`GCC type attributes
Richard Smithccfc9ff2013-07-11 00:27:05 +00002160<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
Richard Smithf6d2d3b2013-02-14 00:13:34 +00002161implementation, these attributes must appertain to the *declarator-id* in a
2162declaration, which means they must go either at the start of the declaration or
2163immediately after the name being declared.
2164
2165For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
2166also applies the GNU ``noreturn`` attribute to ``f``.
2167
2168.. code-block:: c++
2169
2170 [[gnu::unused]] int a, f [[gnu::noreturn]] ();
2171
Sean Silva709c44d2012-12-12 23:44:55 +00002172Target-Specific Extensions
2173==========================
2174
2175Clang supports some language features conditionally on some targets.
2176
Yi Kong4de26fb2014-07-23 09:25:02 +00002177ARM/AArch64 Language Extensions
2178-------------------------------
2179
2180Memory Barrier Intrinsics
2181^^^^^^^^^^^^^^^^^^^^^^^^^
2182Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
2183in the `ARM C Language Extensions Release 2.0
2184<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
2185Note that these intrinsics are implemented as motion barriers that block
2186reordering of memory accesses and side effect instructions. Other instructions
Sylvestre Ledrube8f3962016-02-14 20:20:58 +00002187like simple arithmetic may be reordered around the intrinsic. If you expect to
Yi Kong4de26fb2014-07-23 09:25:02 +00002188have no reordering at all, use inline assembly instead.
2189
Sean Silva709c44d2012-12-12 23:44:55 +00002190X86/X86-64 Language Extensions
2191------------------------------
2192
2193The X86 backend has these language extensions:
2194
David L Kreitzerd8984102016-05-03 20:20:59 +00002195Memory references to specified segments
2196^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sean Silva709c44d2012-12-12 23:44:55 +00002197
2198Annotating a pointer with address space #256 causes it to be code generated
David L Kreitzerd8984102016-05-03 20:20:59 +00002199relative to the X86 GS segment register, address space #257 causes it to be
2200relative to the X86 FS segment, and address space #258 causes it to be
2201relative to the X86 SS segment. Note that this is a very very low-level
Sean Silva709c44d2012-12-12 23:44:55 +00002202feature that should only be used if you know what you're doing (for example in
2203an OS kernel).
2204
2205Here is an example:
2206
2207.. code-block:: c++
2208
2209 #define GS_RELATIVE __attribute__((address_space(256)))
2210 int foo(int GS_RELATIVE *P) {
2211 return *P;
2212 }
2213
2214Which compiles to (on X86-32):
2215
2216.. code-block:: gas
2217
2218 _foo:
2219 movl 4(%esp), %eax
2220 movl %gs:(%eax), %eax
2221 ret
2222
Jordan Rose32e94892012-12-15 00:37:01 +00002223Extensions for Static Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002224==============================
Sean Silva709c44d2012-12-12 23:44:55 +00002225
2226Clang supports additional attributes that are useful for documenting program
Jordan Rose32e94892012-12-15 00:37:01 +00002227invariants and rules for static analysis tools, such as the `Clang Static
2228Analyzer <http://clang-analyzer.llvm.org/>`_. These attributes are documented
2229in the analyzer's `list of source-level annotations
2230<http://clang-analyzer.llvm.org/annotations.html>`_.
Sean Silva709c44d2012-12-12 23:44:55 +00002231
Sean Silva709c44d2012-12-12 23:44:55 +00002232
Jordan Rose32e94892012-12-15 00:37:01 +00002233Extensions for Dynamic Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002234===============================
Sean Silva709c44d2012-12-12 23:44:55 +00002235
Sean Silva709c44d2012-12-12 23:44:55 +00002236Use ``__has_feature(address_sanitizer)`` to check if the code is being built
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002237with :doc:`AddressSanitizer`.
Sean Silva709c44d2012-12-12 23:44:55 +00002238
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002239Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
2240with :doc:`ThreadSanitizer`.
2241
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002242Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
2243with :doc:`MemorySanitizer`.
Dario Domizioli33c17872014-05-28 14:06:38 +00002244
Peter Collingbournec4122c12015-06-15 21:08:13 +00002245Use ``__has_feature(safe_stack)`` to check if the code is being built
2246with :doc:`SafeStack`.
2247
Dario Domizioli33c17872014-05-28 14:06:38 +00002248
2249Extensions for selectively disabling optimization
2250=================================================
2251
2252Clang provides a mechanism for selectively disabling optimizations in functions
2253and methods.
2254
2255To disable optimizations in a single function definition, the GNU-style or C++11
2256non-standard attribute ``optnone`` can be used.
2257
2258.. code-block:: c++
2259
2260 // The following functions will not be optimized.
2261 // GNU-style attribute
2262 __attribute__((optnone)) int foo() {
2263 // ... code
2264 }
2265 // C++11 attribute
2266 [[clang::optnone]] int bar() {
2267 // ... code
2268 }
2269
2270To facilitate disabling optimization for a range of function definitions, a
2271range-based pragma is provided. Its syntax is ``#pragma clang optimize``
2272followed by ``off`` or ``on``.
2273
2274All function definitions in the region between an ``off`` and the following
2275``on`` will be decorated with the ``optnone`` attribute unless doing so would
2276conflict with explicit attributes already present on the function (e.g. the
2277ones that control inlining).
2278
2279.. code-block:: c++
2280
2281 #pragma clang optimize off
2282 // This function will be decorated with optnone.
2283 int foo() {
2284 // ... code
2285 }
2286
2287 // optnone conflicts with always_inline, so bar() will not be decorated.
2288 __attribute__((always_inline)) int bar() {
2289 // ... code
2290 }
2291 #pragma clang optimize on
2292
2293If no ``on`` is found to close an ``off`` region, the end of the region is the
2294end of the compilation unit.
2295
2296Note that a stray ``#pragma clang optimize on`` does not selectively enable
2297additional optimizations when compiling at low optimization levels. This feature
2298can only be used to selectively disable optimizations.
2299
2300The pragma has an effect on functions only at the point of their definition; for
2301function templates, this means that the state of the pragma at the point of an
2302instantiation is not necessarily relevant. Consider the following example:
2303
2304.. code-block:: c++
2305
2306 template<typename T> T twice(T t) {
2307 return 2 * t;
2308 }
2309
2310 #pragma clang optimize off
2311 template<typename T> T thrice(T t) {
2312 return 3 * t;
2313 }
2314
2315 int container(int a, int b) {
2316 return twice(a) + thrice(b);
2317 }
2318 #pragma clang optimize on
2319
2320In this example, the definition of the template function ``twice`` is outside
2321the pragma region, whereas the definition of ``thrice`` is inside the region.
2322The ``container`` function is also in the region and will not be optimized, but
2323it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
2324these two instantiations, ``twice`` will be optimized (because its definition
2325was outside the region) and ``thrice`` will not be optimized.
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002326
2327Extensions for loop hint optimizations
2328======================================
2329
2330The ``#pragma clang loop`` directive is used to specify hints for optimizing the
2331subsequent for, while, do-while, or c++11 range-based for loop. The directive
Adam Nemet2de463e2016-06-14 12:04:26 +00002332provides options for vectorization, interleaving, unrolling and
2333distribution. Loop hints can be specified before any loop and will be ignored if
2334the optimization is not safe to apply.
Eli Bendersky778268d2014-06-19 18:12:44 +00002335
2336Vectorization and Interleaving
2337------------------------------
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002338
2339A vectorized loop performs multiple iterations of the original loop
2340in parallel using vector instructions. The instruction set of the target
2341processor determines which vector instructions are available and their vector
2342widths. This restricts the types of loops that can be vectorized. The vectorizer
2343automatically determines if the loop is safe and profitable to vectorize. A
2344vector instruction cost model is used to select the vector width.
2345
2346Interleaving multiple loop iterations allows modern processors to further
2347improve instruction-level parallelism (ILP) using advanced hardware features,
2348such as multiple execution units and out-of-order execution. The vectorizer uses
2349a cost model that depends on the register pressure and generated code size to
2350select the interleaving count.
2351
2352Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
2353by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
2354manually enable vectorization or interleaving.
2355
2356.. code-block:: c++
2357
2358 #pragma clang loop vectorize(enable)
2359 #pragma clang loop interleave(enable)
2360 for(...) {
2361 ...
2362 }
2363
2364The vector width is specified by ``vectorize_width(_value_)`` and the interleave
2365count is specified by ``interleave_count(_value_)``, where
2366_value_ is a positive integer. This is useful for specifying the optimal
2367width/count of the set of target architectures supported by your application.
2368
2369.. code-block:: c++
2370
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002371 #pragma clang loop vectorize_width(2)
2372 #pragma clang loop interleave_count(2)
2373 for(...) {
2374 ...
2375 }
2376
2377Specifying a width/count of 1 disables the optimization, and is equivalent to
2378``vectorize(disable)`` or ``interleave(disable)``.
2379
Eli Bendersky778268d2014-06-19 18:12:44 +00002380Loop Unrolling
2381--------------
2382
2383Unrolling a loop reduces the loop control overhead and exposes more
2384opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
2385eliminates the loop and replaces it with an enumerated sequence of loop
2386iterations. Full unrolling is only possible if the loop trip count is known at
2387compile time. Partial unrolling replicates the loop body within the loop and
2388reduces the trip count.
2389
Mark Heffernan397a98d2015-08-10 17:29:39 +00002390If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the
Mark Heffernan7ccb5e22015-07-13 18:31:37 +00002391loop if the trip count is known at compile time. If the fully unrolled code size
2392is greater than an internal limit the loop will be partially unrolled up to this
Mark Heffernan397a98d2015-08-10 17:29:39 +00002393limit. If the trip count is not known at compile time the loop will be partially
2394unrolled with a heuristically chosen unroll factor.
2395
2396.. code-block:: c++
2397
2398 #pragma clang loop unroll(enable)
2399 for(...) {
2400 ...
2401 }
2402
2403If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
2404loop if the trip count is known at compile time identically to
2405``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled
2406if the loop count is not known at compile time.
Eli Bendersky778268d2014-06-19 18:12:44 +00002407
2408.. code-block:: c++
2409
Mark Heffernan450c2382014-07-23 17:31:31 +00002410 #pragma clang loop unroll(full)
Eli Bendersky778268d2014-06-19 18:12:44 +00002411 for(...) {
2412 ...
2413 }
2414
2415The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
2416_value_ is a positive integer. If this value is greater than the trip count the
2417loop will be fully unrolled. Otherwise the loop is partially unrolled subject
Mark Heffernan397a98d2015-08-10 17:29:39 +00002418to the same code size limit as with ``unroll(enable)``.
Eli Bendersky778268d2014-06-19 18:12:44 +00002419
2420.. code-block:: c++
2421
2422 #pragma clang loop unroll_count(8)
2423 for(...) {
2424 ...
2425 }
2426
2427Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
2428
Adam Nemet2de463e2016-06-14 12:04:26 +00002429Loop Distribution
2430-----------------
2431
2432Loop Distribution allows splitting a loop into multiple loops. This is
2433beneficial for example when the entire loop cannot be vectorized but some of the
2434resulting loops can.
2435
Adam Nemet0c58eb72016-06-14 19:33:16 +00002436If ``distribute(enable))`` is specified and the loop has memory dependencies
Adam Nemet2de463e2016-06-14 12:04:26 +00002437that inhibit vectorization, the compiler will attempt to isolate the offending
2438operations into a new loop. This optimization is not enabled by default, only
2439loops marked with the pragma are considered.
2440
2441.. code-block:: c++
2442
2443 #pragma clang loop distribute(enable)
2444 for (i = 0; i < N; ++i) {
2445 S1: A[i + 1] = A[i] + B[i];
2446 S2: C[i] = D[i] * E[i];
2447 }
2448
2449This loop will be split into two loops between statements S1 and S2. The
2450second loop containing S2 will be vectorized.
2451
2452Loop Distribution is currently not enabled by default in the optimizer because
2453it can hurt performance in some cases. For example, instruction-level
2454parallelism could be reduced by sequentializing the execution of the
2455statements S1 and S2 above.
2456
2457If Loop Distribution is turned on globally with
2458``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can
2459be used the disable it on a per-loop basis.
2460
Eli Bendersky778268d2014-06-19 18:12:44 +00002461Additional Information
2462----------------------
2463
Tyler Nowickidb2668a2014-06-18 00:51:32 +00002464For convenience multiple loop hints can be specified on a single line.
2465
2466.. code-block:: c++
2467
2468 #pragma clang loop vectorize_width(4) interleave_count(8)
2469 for(...) {
2470 ...
2471 }
2472
2473If an optimization cannot be applied any hints that apply to it will be ignored.
2474For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
2475proven safe to vectorize. To identify and diagnose optimization issues use
2476`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
2477user guide for details.
Adam Nemet60d32642017-04-04 21:18:36 +00002478
2479Extensions to specify floating-point flags
2480====================================================
2481
2482The ``#pragma clang fp`` pragma allows floating-point options to be specified
2483for a section of the source code. This pragma can only appear at file scope or
2484at the start of a compound statement (excluding comments). When using within a
2485compound statement, the pragma is active within the scope of the compound
2486statement.
2487
2488Currently, only FP contraction can be controlled with the pragma. ``#pragma
2489clang fp contract`` specifies whether the compiler should contract a multiply
2490and an addition (or subtraction) into a fused FMA operation when supported by
2491the target.
2492
2493The pragma can take three values: ``on``, ``fast`` and ``off``. The ``on``
2494option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows
2495fusion as specified the language standard. The ``fast`` option allows fusiong
2496in cases when the language standard does not make this possible (e.g. across
2497statements in C)
2498
2499.. code-block:: c++
2500
2501 for(...) {
2502 #pragma clang fp contract(fast)
2503 a = b[i] * c[i];
2504 d[i] += a;
2505 }
2506
2507
Adam Nemete73e00c2017-04-04 22:45:20 +00002508The pragma can also be used with ``off`` which turns FP contraction off for a
Adam Nemet60d32642017-04-04 21:18:36 +00002509section of the code. This can be useful when fast contraction is otherwise
Adam Nemetd7f95112017-04-04 23:46:34 +00002510enabled for the translation unit with the ``-ffp-contract=fast`` flag.
Alex Lorenz9e7bf162017-04-18 14:33:39 +00002511
2512Specifying an attribute for multiple declarations (#pragma clang attribute)
2513===========================================================================
2514
2515The ``#pragma clang attribute`` directive can be used to apply an attribute to
2516multiple declarations. The ``#pragma clang attribute push`` variation of the
2517directive pushes a new attribute to the attribute stack. The declarations that
2518follow the pragma receive the attributes that are on the attribute stack, until
2519the stack is cleared using a ``#pragma clang attribute pop`` directive. Multiple
2520push directives can be nested inside each other.
2521
2522The attributes that are used in the ``#pragma clang attribute`` directives
2523can be written using the GNU-style syntax:
2524
2525.. code-block:: c++
2526
2527 #pragma clang attribute push(__attribute__((annotate("custom"))), apply_to = function)
2528
2529 void function(); // The function now has the annotate("custom") attribute
2530
2531 #pragma clang attribute pop
2532
2533The attributes can also be written using the C++11 style syntax:
2534
2535.. code-block:: c++
2536
2537 #pragma clang attribute push([[noreturn]], apply_to = function)
2538
2539 void function(); // The function now has the [[noreturn]] attribute
2540
2541 #pragma clang attribute pop
2542
2543The ``__declspec`` style syntax is also supported:
2544
2545.. code-block:: c++
2546
2547 #pragma clang attribute push(__declspec(dllexport), apply_to = function)
2548
2549 void function(); // The function now has the __declspec(dllexport) attribute
2550
2551 #pragma clang attribute pop
2552
2553A single push directive accepts only one attribute regardless of the syntax
2554used.
2555
2556Subject Match Rules
2557-------------------
2558
2559The set of declarations that receive a single attribute from the attribute stack
2560depends on the subject match rules that were specified in the pragma. Subject
2561match rules are specified after the attribute. The compiler expects an
2562identifier that corresponds to the subject set specifier. The ``apply_to``
2563specifier is currently the only supported subject set specifier. It allows you
2564to specify match rules that form a subset of the attribute's allowed subject
2565set, i.e. the compiler doesn't require all of the attribute's subjects. For
2566example, an attribute like ``[[nodiscard]]`` whose subject set includes
2567``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at
2568least one of these rules after ``apply_to``:
2569
2570.. code-block:: c++
2571
2572 #pragma clang attribute push([[nodiscard]], apply_to = enum)
2573
2574 enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]]
2575
2576 struct Record1 { }; // The struct will *not* receive [[nodiscard]]
2577
2578 #pragma clang attribute pop
2579
2580 #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))
2581
2582 enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]]
2583
2584 struct Record2 { }; // The struct *will* receive [[nodiscard]]
2585
2586 #pragma clang attribute pop
2587
2588 // This is an error, since [[nodiscard]] can't be applied to namespaces:
2589 #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))
2590
2591 #pragma clang attribute pop
2592
2593Multiple match rules can be specified using the ``any`` match rule, as shown
2594in the example above. The ``any`` rule applies attributes to all declarations
2595that are matched by at least one of the rules in the ``any``. It doesn't nest
2596and can't be used inside the other match rules. Redundant match rules or rules
2597that conflict with one another should not be used inside of ``any``.
2598
2599Clang supports the following match rules:
2600
2601- ``function``: Can be used to apply attributes to functions. This includes C++
2602 member functions, static functions, operators, and constructors/destructors.
2603
2604- ``function(is_member)``: Can be used to apply attributes to C++ member
2605 functions. This includes members like static functions, operators, and
2606 constructors/destructors.
2607
2608- ``hasType(functionType)``: Can be used to apply attributes to functions, C++
2609 member functions, and variables/fields whose type is a function pointer. It
2610 does not apply attributes to Objective-C methods or blocks.
2611
2612- ``type_alias``: Can be used to apply attributes to ``typedef`` declarations
2613 and C++11 type aliases.
2614
2615- ``record``: Can be used to apply attributes to ``struct``, ``class``, and
2616 ``union`` declarations.
2617
2618- ``record(unless(is_union))``: Can be used to apply attributes only to
2619 ``struct`` and ``class`` declarations.
2620
2621- ``enum``: Can be be used to apply attributes to enumeration declarations.
2622
2623- ``enum_constant``: Can be used to apply attributes to enumerators.
2624
2625- ``variable``: Can be used to apply attributes to variables, including
2626 local variables, parameters, global variables, and static member variables.
2627 It does not apply attributes to instance member variables or Objective-C
2628 ivars.
2629
2630- ``variable(is_thread_local)``: Can be used to apply attributes to thread-local
2631 variables only.
2632
2633- ``variable(is_global)``: Can be used to apply attributes to global variables
2634 only.
2635
2636- ``variable(is_parameter)``: Can be used to apply attributes to parameters
2637 only.
2638
2639- ``variable(unless(is_parameter))``: Can be used to apply attributes to all
2640 the variables that are not parameters.
2641
2642- ``field``: Can be used to apply attributes to non-static member variables
2643 in a record. This includes Objective-C ivars.
2644
2645- ``namespace``: Can be used to apply attributes to ``namespace`` declarations.
2646
2647- ``objc_interface``: Can be used to apply attributes to ``@interface``
2648 declarations.
2649
2650- ``objc_protocol``: Can be used to apply attributes to ``@protocol``
2651 declarations.
2652
2653- ``objc_category``: Can be used to apply attributes to category declarations,
2654 including class extensions.
2655
2656- ``objc_method``: Can be used to apply attributes to Objective-C methods,
2657 including instance and class methods. Implicit methods like implicit property
2658 getters and setters do not receive the attribute.
2659
2660- ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C
2661 instance methods.
2662
2663- ``objc_property``: Can be used to apply attributes to ``@property``
2664 declarations.
2665
2666- ``block``: Can be used to apply attributes to block declarations. This does
2667 not include variables/fields of block pointer type.
2668
2669The use of ``unless`` in match rules is currently restricted to a strict set of
2670sub-rules that are used by the supported attributes. That means that even though
2671``variable(unless(is_parameter))`` is a valid match rule,
2672``variable(unless(is_thread_local))`` is not.
2673
2674Supported Attributes
2675--------------------
2676
2677Not all attributes can be used with the ``#pragma clang attribute`` directive.
2678Notably, statement attributes like ``[[fallthrough]]`` or type attributes
2679like ``address_space`` aren't supported by this directive. You can determine
2680whether or not an attribute is supported by the pragma by referring to the
2681:doc:`individual documentation for that attribute <AttributeReference>`.
2682
2683The attributes are applied to all matching declarations individually, even when
2684the attribute is semantically incorrect. The attributes that aren't applied to
2685any declaration are not verified semantically.
Javed Absar2a67c9e2017-06-05 10:11:57 +00002686
2687Specifying section names for global objects (#pragma clang section)
2688===================================================================
2689
2690The ``#pragma clang section`` directive provides a means to assign section-names
2691to global variables, functions and static variables.
2692
2693The section names can be specified as:
2694
2695.. code-block:: c++
2696
2697 #pragma clang section bss="myBSS" data="myData" rodata="myRodata" text="myText"
2698
2699The section names can be reverted back to default name by supplying an empty
2700string to the section kind, for example:
2701
2702.. code-block:: c++
2703
2704 #pragma clang section bss="" data="" text="" rodata=""
2705
2706The ``#pragma clang section`` directive obeys the following rules:
2707
2708* The pragma applies to all global variable, statics and function declarations
2709 from the pragma to the end of the translation unit.
2710
2711* The pragma clang section is enabled automatically, without need of any flags.
2712
2713* This feature is only defined to work sensibly for ELF targets.
2714
2715* If section name is specified through _attribute_((section("myname"))), then
2716 the attribute name gains precedence.
2717
2718* Global variables that are initialized to zero will be placed in the named
2719 bss section, if one is present.
2720
2721* The ``#pragma clang section`` directive does not does try to infer section-kind
2722 from the name. For example, naming a section "``.bss.mySec``" does NOT mean
2723 it will be a bss section name.
2724
2725* The decision about which section-kind applies to each global is taken in the back-end.
2726 Once the section-kind is known, appropriate section name, as specified by the user using
2727 ``#pragma clang section`` directive, is applied to that global.