blob: bf41ef5feaf257455eb0bcb85cf6e531657e057e [file] [log] [blame]
Sean Silva709c44d2012-12-12 23:44:55 +00001=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6 :local:
Sean Silva13d43fe2013-01-02 21:09:58 +00007 :depth: 1
Sean Silva709c44d2012-12-12 23:44:55 +00008
Sean Silvaf380e0e2013-01-02 21:03:11 +00009.. toctree::
10 :hidden:
11
12 ObjectiveCLiterals
13 BlockLanguageSpec
Michael Gottesman6fd58462013-01-07 22:24:45 +000014 Block-ABI-Apple
DeLesley Hutchinsc51e08c2014-02-18 19:42:01 +000015 AutomaticReferenceCounting
Sean Silvaf380e0e2013-01-02 21:03:11 +000016
Sean Silva709c44d2012-12-12 23:44:55 +000017Introduction
18============
19
20This document describes the language extensions provided by Clang. In addition
21to the language extensions listed here, Clang aims to support a broad range of
22GCC extensions. Please see the `GCC manual
23<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
24these extensions.
25
26.. _langext-feature_check:
27
28Feature Checking Macros
29=======================
30
31Language extensions can be very useful, but only if you know you can depend on
32them. In order to allow fine-grain features checks, we support three builtin
33function-like macros. This allows you to directly test for a feature in your
34code without having to resort to something like autoconf or fragile "compiler
35version checks".
36
37``__has_builtin``
38-----------------
39
40This function-like macro takes a single identifier argument that is the name of
41a builtin function. It evaluates to 1 if the builtin is supported or 0 if not.
42It can be used like this:
43
44.. code-block:: c++
45
46 #ifndef __has_builtin // Optional of course.
47 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
48 #endif
49
50 ...
51 #if __has_builtin(__builtin_trap)
52 __builtin_trap();
53 #else
54 abort();
55 #endif
56 ...
57
58.. _langext-__has_feature-__has_extension:
59
60``__has_feature`` and ``__has_extension``
61-----------------------------------------
62
63These function-like macros take a single identifier argument that is the name
64of a feature. ``__has_feature`` evaluates to 1 if the feature is both
65supported by Clang and standardized in the current language standard or 0 if
66not (but see :ref:`below <langext-has-feature-back-compat>`), while
67``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
68current language (either as a language extension or a standard language
69feature) or 0 if not. They can be used like this:
70
71.. code-block:: c++
72
73 #ifndef __has_feature // Optional of course.
74 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
75 #endif
76 #ifndef __has_extension
77 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
78 #endif
79
80 ...
81 #if __has_feature(cxx_rvalue_references)
82 // This code will only be compiled with the -std=c++11 and -std=gnu++11
83 // options, because rvalue references are only standardized in C++11.
84 #endif
85
86 #if __has_extension(cxx_rvalue_references)
87 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
88 // and -std=gnu++98 options, because rvalue references are supported as a
89 // language extension in C++98.
90 #endif
91
92.. _langext-has-feature-back-compat:
93
Alp Toker958027b2014-07-14 19:42:55 +000094For backward compatibility, ``__has_feature`` can also be used to test
Sean Silva709c44d2012-12-12 23:44:55 +000095for support for non-standardized features, i.e. features not prefixed ``c_``,
96``cxx_`` or ``objc_``.
97
98Another use of ``__has_feature`` is to check for compiler features not related
Sean Silva173d2522013-01-02 13:07:47 +000099to the language standard, such as e.g. :doc:`AddressSanitizer
100<AddressSanitizer>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000101
102If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
103to ``__has_feature``.
104
105The feature tag is described along with the language feature below.
106
107The feature name or extension name can also be specified with a preceding and
108following ``__`` (double underscore) to avoid interference from a macro with
109the same name. For instance, ``__cxx_rvalue_references__`` can be used instead
110of ``cxx_rvalue_references``.
111
112``__has_attribute``
113-------------------
114
115This function-like macro takes a single identifier argument that is the name of
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000116an attribute. It evaluates to 1 if the attribute is supported by the current
117compilation target, or 0 if not. It can be used like this:
Sean Silva709c44d2012-12-12 23:44:55 +0000118
119.. code-block:: c++
120
121 #ifndef __has_attribute // Optional of course.
122 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
123 #endif
124
125 ...
126 #if __has_attribute(always_inline)
127 #define ALWAYS_INLINE __attribute__((always_inline))
128 #else
129 #define ALWAYS_INLINE
130 #endif
131 ...
132
133The attribute name can also be specified with a preceding and following ``__``
134(double underscore) to avoid interference from a macro with the same name. For
135instance, ``__always_inline__`` can be used instead of ``always_inline``.
136
Yunzhong Gaoa8c45c92014-04-12 02:25:32 +0000137``__is_identifier``
138-------------------
139
140This function-like macro takes a single identifier argument that might be either
141a reserved word or a regular identifier. It evaluates to 1 if the argument is just
142a regular identifier and not a reserved word, in the sense that it can then be
143used as the name of a user-defined function or variable. Otherwise it evaluates
144to 0. It can be used like this:
145
146.. code-block:: c++
147
148 ...
149 #ifdef __is_identifier // Compatibility with non-clang compilers.
150 #if __is_identifier(__wchar_t)
151 typedef wchar_t __wchar_t;
152 #endif
153 #endif
154
155 __wchar_t WideCharacter;
156 ...
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000157
Sean Silva709c44d2012-12-12 23:44:55 +0000158Include File Checking Macros
159============================
160
161Not all developments systems have the same include files. The
162:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
163you to check for the existence of an include file before doing a possibly
Dmitri Gribenko764ea242013-01-17 17:04:54 +0000164failing ``#include`` directive. Include file checking macros must be used
165as expressions in ``#if`` or ``#elif`` preprocessing directives.
Sean Silva709c44d2012-12-12 23:44:55 +0000166
167.. _langext-__has_include:
168
169``__has_include``
170-----------------
171
172This function-like macro takes a single file name string argument that is the
173name of an include file. It evaluates to 1 if the file can be found using the
174include paths, or 0 otherwise:
175
176.. code-block:: c++
177
178 // Note the two possible file name string formats.
179 #if __has_include("myinclude.h") && __has_include(<stdint.h>)
180 # include "myinclude.h"
181 #endif
182
Richard Smithccfc9ff2013-07-11 00:27:05 +0000183To test for this feature, use ``#if defined(__has_include)``:
184
185.. code-block:: c++
186
Sean Silva709c44d2012-12-12 23:44:55 +0000187 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000188 #if defined(__has_include)
189 #if __has_include("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000190 # include "myinclude.h"
191 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000192 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000193
194.. _langext-__has_include_next:
195
196``__has_include_next``
197----------------------
198
199This function-like macro takes a single file name string argument that is the
200name of an include file. It is like ``__has_include`` except that it looks for
201the second instance of the given file found in the include paths. It evaluates
202to 1 if the second instance of the file can be found using the include paths,
203or 0 otherwise:
204
205.. code-block:: c++
206
207 // Note the two possible file name string formats.
208 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
209 # include_next "myinclude.h"
210 #endif
211
212 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000213 #if defined(__has_include_next)
214 #if __has_include_next("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000215 # include_next "myinclude.h"
216 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000217 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000218
219Note that ``__has_include_next``, like the GNU extension ``#include_next``
220directive, is intended for use in headers only, and will issue a warning if
221used in the top-level compilation file. A warning will also be issued if an
222absolute path is used in the file argument.
223
224``__has_warning``
225-----------------
226
227This function-like macro takes a string literal that represents a command line
228option for a warning and returns true if that is a valid warning option.
229
230.. code-block:: c++
231
232 #if __has_warning("-Wformat")
233 ...
234 #endif
235
236Builtin Macros
237==============
238
239``__BASE_FILE__``
240 Defined to a string that contains the name of the main input file passed to
241 Clang.
242
243``__COUNTER__``
244 Defined to an integer value that starts at zero and is incremented each time
245 the ``__COUNTER__`` macro is expanded.
246
247``__INCLUDE_LEVEL__``
248 Defined to an integral value that is the include depth of the file currently
249 being translated. For the main file, this value is zero.
250
251``__TIMESTAMP__``
252 Defined to the date and time of the last modification of the current source
253 file.
254
255``__clang__``
256 Defined when compiling with Clang
257
258``__clang_major__``
259 Defined to the major marketing version number of Clang (e.g., the 2 in
260 2.0.1). Note that marketing version numbers should not be used to check for
261 language features, as different vendors use different numbering schemes.
262 Instead, use the :ref:`langext-feature_check`.
263
264``__clang_minor__``
265 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note
266 that marketing version numbers should not be used to check for language
267 features, as different vendors use different numbering schemes. Instead, use
268 the :ref:`langext-feature_check`.
269
270``__clang_patchlevel__``
271 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
272
273``__clang_version__``
274 Defined to a string that captures the Clang marketing version, including the
275 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
276
277.. _langext-vectors:
278
279Vectors and Extended Vectors
280============================
281
282Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
283
284OpenCL vector types are created using ``ext_vector_type`` attribute. It
285support for ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example
286is:
287
288.. code-block:: c++
289
290 typedef float float4 __attribute__((ext_vector_type(4)));
291 typedef float float2 __attribute__((ext_vector_type(2)));
292
293 float4 foo(float2 a, float2 b) {
294 float4 c;
295 c.xz = a;
296 c.yw = b;
297 return c;
298 }
299
300Query for this feature with ``__has_extension(attribute_ext_vector_type)``.
301
302Giving ``-faltivec`` option to clang enables support for AltiVec vector syntax
303and functions. For example:
304
305.. code-block:: c++
306
307 vector float foo(vector int a) {
308 vector int b;
309 b = vec_add(a, a) + a;
310 return (vector float)b;
311 }
312
313NEON vector types are created using ``neon_vector_type`` and
314``neon_polyvector_type`` attributes. For example:
315
316.. code-block:: c++
317
318 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
319 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
320
321 int8x8_t foo(int8x8_t a) {
322 int8x8_t v;
323 v = a;
324 return v;
325 }
326
327Vector Literals
328---------------
329
330Vector literals can be used to create vectors from a set of scalars, or
331vectors. Either parentheses or braces form can be used. In the parentheses
332form the number of literal values specified must be one, i.e. referring to a
333scalar value, or must match the size of the vector type being created. If a
334single scalar literal value is specified, the scalar literal value will be
335replicated to all the components of the vector type. In the brackets form any
336number of literals can be specified. For example:
337
338.. code-block:: c++
339
340 typedef int v4si __attribute__((__vector_size__(16)));
341 typedef float float4 __attribute__((ext_vector_type(4)));
342 typedef float float2 __attribute__((ext_vector_type(2)));
343
344 v4si vsi = (v4si){1, 2, 3, 4};
345 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
346 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
347 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
348 vector int vi3 = (vector int)(1, 2); // error
349 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
350 vector int vi5 = (vector int)(1, 2, 3, 4);
351 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
352
353Vector Operations
354-----------------
355
356The table below shows the support for each operation by vector extension. A
357dash indicates that an operation is not accepted according to a corresponding
358specification.
359
Anton Yartsev94e46f32014-09-03 17:59:21 +0000360============================== ======= ======= ======= =======
361 Opeator OpenCL AltiVec GCC NEON
362============================== ======= ======= ======= =======
363[] yes yes yes --
364unary operators +, -- yes yes yes --
365++, -- -- yes yes yes --
366+,--,*,/,% yes yes yes --
367bitwise operators &,|,^,~ yes yes yes --
368>>,<< yes yes yes --
369!, &&, || yes -- -- --
370==, !=, >, <, >=, <= yes yes -- --
371= yes yes yes yes
372:? yes -- -- --
373sizeof yes yes yes yes
374C-style cast yes yes yes no
375reinterpret_cast yes no yes no
376static_cast yes no yes no
377const_cast no no no no
378============================== ======= ======= ======= =======
Sean Silva709c44d2012-12-12 23:44:55 +0000379
Anton Yartsev94e46f32014-09-03 17:59:21 +0000380See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
Sean Silva709c44d2012-12-12 23:44:55 +0000381
382Messages on ``deprecated`` and ``unavailable`` Attributes
383=========================================================
384
385An optional string message can be added to the ``deprecated`` and
386``unavailable`` attributes. For example:
387
388.. code-block:: c++
389
390 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
391
392If the deprecated or unavailable declaration is used, the message will be
393incorporated into the appropriate diagnostic:
394
395.. code-block:: c++
396
397 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
398 [-Wdeprecated-declarations]
399 explode();
400 ^
401
402Query for this feature with
403``__has_extension(attribute_deprecated_with_message)`` and
404``__has_extension(attribute_unavailable_with_message)``.
405
406Attributes on Enumerators
407=========================
408
409Clang allows attributes to be written on individual enumerators. This allows
410enumerators to be deprecated, made unavailable, etc. The attribute must appear
411after the enumerator name and before any initializer, like so:
412
413.. code-block:: c++
414
415 enum OperationMode {
416 OM_Invalid,
417 OM_Normal,
418 OM_Terrified __attribute__((deprecated)),
419 OM_AbortOnError __attribute__((deprecated)) = 4
420 };
421
422Attributes on the ``enum`` declaration do not apply to individual enumerators.
423
424Query for this feature with ``__has_extension(enumerator_attributes)``.
425
426'User-Specified' System Frameworks
427==================================
428
429Clang provides a mechanism by which frameworks can be built in such a way that
430they will always be treated as being "system frameworks", even if they are not
431present in a system framework directory. This can be useful to system
432framework developers who want to be able to test building other applications
433with development builds of their framework, including the manner in which the
434compiler changes warning behavior for system headers.
435
436Framework developers can opt-in to this mechanism by creating a
437"``.system_framework``" file at the top-level of their framework. That is, the
438framework should have contents like:
439
440.. code-block:: none
441
442 .../TestFramework.framework
443 .../TestFramework.framework/.system_framework
444 .../TestFramework.framework/Headers
445 .../TestFramework.framework/Headers/TestFramework.h
446 ...
447
448Clang will treat the presence of this file as an indicator that the framework
449should be treated as a system framework, regardless of how it was found in the
450framework search path. For consistency, we recommend that such files never be
451included in installed versions of the framework.
452
Sean Silva709c44d2012-12-12 23:44:55 +0000453Checks for Standard Language Features
454=====================================
455
456The ``__has_feature`` macro can be used to query if certain standard language
457features are enabled. The ``__has_extension`` macro can be used to query if
458language features are available as an extension when compiling for a standard
459which does not provide them. The features which can be tested are listed here.
460
Richard Smith38af8562014-11-12 21:16:38 +0000461Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
462These are macros with names of the form ``__cpp_<feature_name>``, and are
463intended to be a portable way to query the supported features of the compiler.
464See `the C++ status page <http://clang.llvm.org/cxx_status.html#ts>`_ for
465information on the version of SD-6 supported by each Clang release, and the
466macros provided by that revision of the recommendations.
467
Sean Silva709c44d2012-12-12 23:44:55 +0000468C++98
469-----
470
471The features listed below are part of the C++98 standard. These features are
472enabled by default when compiling C++ code.
473
474C++ exceptions
475^^^^^^^^^^^^^^
476
477Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
478enabled. For example, compiling code with ``-fno-exceptions`` disables C++
479exceptions.
480
481C++ RTTI
482^^^^^^^^
483
484Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For
485example, compiling code with ``-fno-rtti`` disables the use of RTTI.
486
487C++11
488-----
489
490The features listed below are part of the C++11 standard. As a result, all
491these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
492when compiling C++ code.
493
494C++11 SFINAE includes access control
495^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
496
497Use ``__has_feature(cxx_access_control_sfinae)`` or
498``__has_extension(cxx_access_control_sfinae)`` to determine whether
499access-control errors (e.g., calling a private constructor) are considered to
500be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
501<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
502
503C++11 alias templates
504^^^^^^^^^^^^^^^^^^^^^
505
506Use ``__has_feature(cxx_alias_templates)`` or
507``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
508alias declarations and alias templates is enabled.
509
510C++11 alignment specifiers
511^^^^^^^^^^^^^^^^^^^^^^^^^^
512
513Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
514determine if support for alignment specifiers using ``alignas`` is enabled.
515
516C++11 attributes
517^^^^^^^^^^^^^^^^
518
519Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
520determine if support for attribute parsing with C++11's square bracket notation
521is enabled.
522
523C++11 generalized constant expressions
524^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
525
526Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
527constant expressions (e.g., ``constexpr``) is enabled.
528
529C++11 ``decltype()``
530^^^^^^^^^^^^^^^^^^^^
531
532Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
533determine if support for the ``decltype()`` specifier is enabled. C++11's
534``decltype`` does not require type-completeness of a function call expression.
535Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
536``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
537support for this feature is enabled.
538
539C++11 default template arguments in function templates
540^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
541
542Use ``__has_feature(cxx_default_function_template_args)`` or
543``__has_extension(cxx_default_function_template_args)`` to determine if support
544for default template arguments in function templates is enabled.
545
546C++11 ``default``\ ed functions
547^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
548
549Use ``__has_feature(cxx_defaulted_functions)`` or
550``__has_extension(cxx_defaulted_functions)`` to determine if support for
551defaulted function definitions (with ``= default``) is enabled.
552
553C++11 delegating constructors
554^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
555
556Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
557delegating constructors is enabled.
558
559C++11 ``deleted`` functions
560^^^^^^^^^^^^^^^^^^^^^^^^^^^
561
562Use ``__has_feature(cxx_deleted_functions)`` or
563``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
564function definitions (with ``= delete``) is enabled.
565
566C++11 explicit conversion functions
567^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
568
569Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
570``explicit`` conversion functions is enabled.
571
572C++11 generalized initializers
573^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
574
575Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
576generalized initializers (using braced lists and ``std::initializer_list``) is
577enabled.
578
579C++11 implicit move constructors/assignment operators
580^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
581
582Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
583generate move constructors and move assignment operators where needed.
584
585C++11 inheriting constructors
586^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
587
588Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
Richard Smith25b555a2013-04-19 17:00:31 +0000589inheriting constructors is enabled.
Sean Silva709c44d2012-12-12 23:44:55 +0000590
591C++11 inline namespaces
592^^^^^^^^^^^^^^^^^^^^^^^
593
594Use ``__has_feature(cxx_inline_namespaces)`` or
595``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
596namespaces is enabled.
597
598C++11 lambdas
599^^^^^^^^^^^^^
600
601Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
602determine if support for lambdas is enabled.
603
604C++11 local and unnamed types as template arguments
605^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
606
607Use ``__has_feature(cxx_local_type_template_args)`` or
608``__has_extension(cxx_local_type_template_args)`` to determine if support for
609local and unnamed types as template arguments is enabled.
610
611C++11 noexcept
612^^^^^^^^^^^^^^
613
614Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
615determine if support for noexcept exception specifications is enabled.
616
617C++11 in-class non-static data member initialization
618^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
619
620Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
621initialization of non-static data members is enabled.
622
623C++11 ``nullptr``
624^^^^^^^^^^^^^^^^^
625
626Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
627determine if support for ``nullptr`` is enabled.
628
629C++11 ``override control``
630^^^^^^^^^^^^^^^^^^^^^^^^^^
631
632Use ``__has_feature(cxx_override_control)`` or
633``__has_extension(cxx_override_control)`` to determine if support for the
634override control keywords is enabled.
635
636C++11 reference-qualified functions
637^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
638
639Use ``__has_feature(cxx_reference_qualified_functions)`` or
640``__has_extension(cxx_reference_qualified_functions)`` to determine if support
641for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
642applied to ``*this``) is enabled.
643
644C++11 range-based ``for`` loop
645^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
646
647Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
648determine if support for the range-based for loop is enabled.
649
650C++11 raw string literals
651^^^^^^^^^^^^^^^^^^^^^^^^^
652
653Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
654string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
655
656C++11 rvalue references
657^^^^^^^^^^^^^^^^^^^^^^^
658
659Use ``__has_feature(cxx_rvalue_references)`` or
660``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
661references is enabled.
662
663C++11 ``static_assert()``
664^^^^^^^^^^^^^^^^^^^^^^^^^
665
666Use ``__has_feature(cxx_static_assert)`` or
667``__has_extension(cxx_static_assert)`` to determine if support for compile-time
668assertions using ``static_assert`` is enabled.
669
Richard Smith25b555a2013-04-19 17:00:31 +0000670C++11 ``thread_local``
671^^^^^^^^^^^^^^^^^^^^^^
672
673Use ``__has_feature(cxx_thread_local)`` to determine if support for
674``thread_local`` variables is enabled.
675
Sean Silva709c44d2012-12-12 23:44:55 +0000676C++11 type inference
677^^^^^^^^^^^^^^^^^^^^
678
679Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
680determine C++11 type inference is supported using the ``auto`` specifier. If
681this is disabled, ``auto`` will instead be a storage class specifier, as in C
682or C++98.
683
684C++11 strongly typed enumerations
685^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
686
687Use ``__has_feature(cxx_strong_enums)`` or
688``__has_extension(cxx_strong_enums)`` to determine if support for strongly
689typed, scoped enumerations is enabled.
690
691C++11 trailing return type
692^^^^^^^^^^^^^^^^^^^^^^^^^^
693
694Use ``__has_feature(cxx_trailing_return)`` or
695``__has_extension(cxx_trailing_return)`` to determine if support for the
696alternate function declaration syntax with trailing return type is enabled.
697
698C++11 Unicode string literals
699^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
700
701Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
702string literals is enabled.
703
704C++11 unrestricted unions
705^^^^^^^^^^^^^^^^^^^^^^^^^
706
707Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
708unrestricted unions is enabled.
709
710C++11 user-defined literals
711^^^^^^^^^^^^^^^^^^^^^^^^^^^
712
713Use ``__has_feature(cxx_user_literals)`` to determine if support for
714user-defined literals is enabled.
715
716C++11 variadic templates
717^^^^^^^^^^^^^^^^^^^^^^^^
718
719Use ``__has_feature(cxx_variadic_templates)`` or
720``__has_extension(cxx_variadic_templates)`` to determine if support for
721variadic templates is enabled.
722
Richard Smith0a715422013-05-07 19:32:56 +0000723C++1y
724-----
725
726The features listed below are part of the committee draft for the C++1y
727standard. As a result, all these features are enabled with the ``-std=c++1y``
728or ``-std=gnu++1y`` option when compiling C++ code.
729
730C++1y binary literals
731^^^^^^^^^^^^^^^^^^^^^
732
733Use ``__has_feature(cxx_binary_literals)`` or
734``__has_extension(cxx_binary_literals)`` to determine whether
735binary literals (for instance, ``0b10010``) are recognized. Clang supports this
736feature as an extension in all language modes.
737
738C++1y contextual conversions
739^^^^^^^^^^^^^^^^^^^^^^^^^^^^
740
741Use ``__has_feature(cxx_contextual_conversions)`` or
742``__has_extension(cxx_contextual_conversions)`` to determine if the C++1y rules
743are used when performing an implicit conversion for an array bound in a
744*new-expression*, the operand of a *delete-expression*, an integral constant
Richard Smithc0f7b812013-07-24 17:41:31 +0000745expression, or a condition in a ``switch`` statement.
Richard Smith0a715422013-05-07 19:32:56 +0000746
747C++1y decltype(auto)
748^^^^^^^^^^^^^^^^^^^^
749
750Use ``__has_feature(cxx_decltype_auto)`` or
751``__has_extension(cxx_decltype_auto)`` to determine if support
752for the ``decltype(auto)`` placeholder type is enabled.
753
754C++1y default initializers for aggregates
755^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
756
757Use ``__has_feature(cxx_aggregate_nsdmi)`` or
758``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
759for default initializers in aggregate members is enabled.
760
Richard Smith38af8562014-11-12 21:16:38 +0000761C++1y digit separators
762^^^^^^^^^^^^^^^^^^^^^^
763
764Use ``__cpp_digit_separators`` to determine if support for digit separators
765using single quotes (for instance, ``10'000``) is enabled. At this time, there
766is no corresponding ``__has_feature`` name
767
Richard Smith0a715422013-05-07 19:32:56 +0000768C++1y generalized lambda capture
769^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
770
Richard Smith6d540142014-05-09 21:08:59 +0000771Use ``__has_feature(cxx_init_captures)`` or
772``__has_extension(cxx_init_captures)`` to determine if support for
Richard Smith4fb09722013-07-24 17:51:13 +0000773lambda captures with explicit initializers is enabled
Richard Smith0a715422013-05-07 19:32:56 +0000774(for instance, ``[n(0)] { return ++n; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000775
776C++1y generic lambdas
777^^^^^^^^^^^^^^^^^^^^^
778
Richard Smith6d540142014-05-09 21:08:59 +0000779Use ``__has_feature(cxx_generic_lambdas)`` or
780``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
Richard Smith0a715422013-05-07 19:32:56 +0000781(polymorphic) lambdas is enabled
782(for instance, ``[] (auto x) { return x + 1; }``).
Richard Smith0a715422013-05-07 19:32:56 +0000783
784C++1y relaxed constexpr
785^^^^^^^^^^^^^^^^^^^^^^^
786
787Use ``__has_feature(cxx_relaxed_constexpr)`` or
788``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
789declarations, local variable modification, and control flow constructs
790are permitted in ``constexpr`` functions.
Richard Smith0a715422013-05-07 19:32:56 +0000791
792C++1y return type deduction
793^^^^^^^^^^^^^^^^^^^^^^^^^^^
794
795Use ``__has_feature(cxx_return_type_deduction)`` or
796``__has_extension(cxx_return_type_deduction)`` to determine if support
797for return type deduction for functions (using ``auto`` as a return type)
798is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000799
800C++1y runtime-sized arrays
801^^^^^^^^^^^^^^^^^^^^^^^^^^
802
803Use ``__has_feature(cxx_runtime_array)`` or
804``__has_extension(cxx_runtime_array)`` to determine if support
805for arrays of runtime bound (a restricted form of variable-length arrays)
806is enabled.
807Clang's implementation of this feature is incomplete.
808
809C++1y variable templates
810^^^^^^^^^^^^^^^^^^^^^^^^
811
812Use ``__has_feature(cxx_variable_templates)`` or
813``__has_extension(cxx_variable_templates)`` to determine if support for
814templated variable declarations is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000815
Sean Silva709c44d2012-12-12 23:44:55 +0000816C11
817---
818
819The features listed below are part of the C11 standard. As a result, all these
820features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
821compiling C code. Additionally, because these features are all
822backward-compatible, they are available as extensions in all language modes.
823
824C11 alignment specifiers
825^^^^^^^^^^^^^^^^^^^^^^^^
826
827Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
828if support for alignment specifiers using ``_Alignas`` is enabled.
829
830C11 atomic operations
831^^^^^^^^^^^^^^^^^^^^^
832
833Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
834if support for atomic types using ``_Atomic`` is enabled. Clang also provides
835:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
Hal Finkel6970ac82014-10-03 04:29:40 +0000836the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
837``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
838is available.
839
840Clang will use the system's ``<stdatomic.h>`` header when one is available, and
841will otherwise use its own. When using its own, implementations of the atomic
842operations are provided as macros. In the cases where C11 also requires a real
843function, this header provides only the declaration of that function (along
844with a shadowing macro implementation), and you must link to a library which
845provides a definition of the function if you use it instead of the macro.
Sean Silva709c44d2012-12-12 23:44:55 +0000846
847C11 generic selections
848^^^^^^^^^^^^^^^^^^^^^^
849
850Use ``__has_feature(c_generic_selections)`` or
851``__has_extension(c_generic_selections)`` to determine if support for generic
852selections is enabled.
853
854As an extension, the C11 generic selection expression is available in all
855languages supported by Clang. The syntax is the same as that given in the C11
856standard.
857
858In C, type compatibility is decided according to the rules given in the
859appropriate standard, but in C++, which lacks the type compatibility rules used
860in C, types are considered compatible only if they are equivalent.
861
862C11 ``_Static_assert()``
863^^^^^^^^^^^^^^^^^^^^^^^^
864
865Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
866to determine if support for compile-time assertions using ``_Static_assert`` is
867enabled.
868
Richard Smith25b555a2013-04-19 17:00:31 +0000869C11 ``_Thread_local``
870^^^^^^^^^^^^^^^^^^^^^
871
Ed Schouten401aeba2013-09-14 16:17:20 +0000872Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
873to determine if support for ``_Thread_local`` variables is enabled.
Richard Smith25b555a2013-04-19 17:00:31 +0000874
Alp Toker64197b92014-01-18 21:49:02 +0000875Checks for Type Trait Primitives
876================================
877
878Type trait primitives are special builtin constant expressions that can be used
879by the standard C++ library to facilitate or simplify the implementation of
880user-facing type traits in the <type_traits> header.
881
882They are not intended to be used directly by user code because they are
883implementation-defined and subject to change -- as such they're tied closely to
884the supported set of system headers, currently:
885
886* LLVM's own libc++
887* GNU libstdc++
888* The Microsoft standard C++ library
Sean Silva709c44d2012-12-12 23:44:55 +0000889
890Clang supports the `GNU C++ type traits
891<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
892`Microsoft Visual C++ Type traits
Alp Toker64197b92014-01-18 21:49:02 +0000893<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_.
894
895Feature detection is supported only for some of the primitives at present. User
896code should not use these checks because they bear no direct relation to the
897actual set of type traits supported by the C++ standard library.
898
899For type trait ``__X``, ``__has_extension(X)`` indicates the presence of the
900type trait primitive in the compiler. A simplistic usage example as might be
901seen in standard C++ headers follows:
Sean Silva709c44d2012-12-12 23:44:55 +0000902
903.. code-block:: c++
904
905 #if __has_extension(is_convertible_to)
906 template<typename From, typename To>
907 struct is_convertible_to {
908 static const bool value = __is_convertible_to(From, To);
909 };
910 #else
Alp Toker64197b92014-01-18 21:49:02 +0000911 // Emulate type trait for compatibility with other compilers.
Sean Silva709c44d2012-12-12 23:44:55 +0000912 #endif
913
Alp Toker64197b92014-01-18 21:49:02 +0000914The following type trait primitives are supported by Clang:
Sean Silva709c44d2012-12-12 23:44:55 +0000915
916* ``__has_nothrow_assign`` (GNU, Microsoft)
917* ``__has_nothrow_copy`` (GNU, Microsoft)
918* ``__has_nothrow_constructor`` (GNU, Microsoft)
919* ``__has_trivial_assign`` (GNU, Microsoft)
920* ``__has_trivial_copy`` (GNU, Microsoft)
921* ``__has_trivial_constructor`` (GNU, Microsoft)
922* ``__has_trivial_destructor`` (GNU, Microsoft)
923* ``__has_virtual_destructor`` (GNU, Microsoft)
924* ``__is_abstract`` (GNU, Microsoft)
925* ``__is_base_of`` (GNU, Microsoft)
926* ``__is_class`` (GNU, Microsoft)
927* ``__is_convertible_to`` (Microsoft)
928* ``__is_empty`` (GNU, Microsoft)
929* ``__is_enum`` (GNU, Microsoft)
930* ``__is_interface_class`` (Microsoft)
931* ``__is_pod`` (GNU, Microsoft)
932* ``__is_polymorphic`` (GNU, Microsoft)
933* ``__is_union`` (GNU, Microsoft)
934* ``__is_literal(type)``: Determines whether the given type is a literal type
935* ``__is_final``: Determines whether the given type is declared with a
936 ``final`` class-virt-specifier.
937* ``__underlying_type(type)``: Retrieves the underlying type for a given
938 ``enum`` type. This trait is required to implement the C++11 standard
939 library.
940* ``__is_trivially_assignable(totype, fromtype)``: Determines whether a value
941 of type ``totype`` can be assigned to from a value of type ``fromtype`` such
942 that no non-trivial functions are called as part of that assignment. This
943 trait is required to implement the C++11 standard library.
944* ``__is_trivially_constructible(type, argtypes...)``: Determines whether a
945 value of type ``type`` can be direct-initialized with arguments of types
946 ``argtypes...`` such that no non-trivial functions are called as part of
947 that initialization. This trait is required to implement the C++11 standard
948 library.
Alp Toker73287bf2014-01-20 00:24:09 +0000949* ``__is_destructible`` (MSVC 2013): partially implemented
950* ``__is_nothrow_destructible`` (MSVC 2013): partially implemented
951* ``__is_nothrow_assignable`` (MSVC 2013, clang)
952* ``__is_constructible`` (MSVC 2013, clang)
953* ``__is_nothrow_constructible`` (MSVC 2013, clang)
Sean Silva709c44d2012-12-12 23:44:55 +0000954
955Blocks
956======
957
958The syntax and high level language feature description is in
Michael Gottesman6fd58462013-01-07 22:24:45 +0000959:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
960the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000961
962Query for this feature with ``__has_extension(blocks)``.
963
964Objective-C Features
965====================
966
967Related result types
968--------------------
969
970According to Cocoa conventions, Objective-C methods with certain names
971("``init``", "``alloc``", etc.) always return objects that are an instance of
972the receiving class's type. Such methods are said to have a "related result
973type", meaning that a message send to one of these methods will have the same
974static type as an instance of the receiver class. For example, given the
975following classes:
976
977.. code-block:: objc
978
979 @interface NSObject
980 + (id)alloc;
981 - (id)init;
982 @end
983
984 @interface NSArray : NSObject
985 @end
986
987and this common initialization pattern
988
989.. code-block:: objc
990
991 NSArray *array = [[NSArray alloc] init];
992
993the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
994``alloc`` implicitly has a related result type. Similarly, the type of the
995expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
996related result type and its receiver is known to have the type ``NSArray *``.
997If neither ``alloc`` nor ``init`` had a related result type, the expressions
998would have had type ``id``, as declared in the method signature.
999
1000A method with a related result type can be declared by using the type
1001``instancetype`` as its result type. ``instancetype`` is a contextual keyword
1002that is only permitted in the result type of an Objective-C method, e.g.
1003
1004.. code-block:: objc
1005
1006 @interface A
1007 + (instancetype)constructAnA;
1008 @end
1009
1010The related result type can also be inferred for some methods. To determine
1011whether a method has an inferred related result type, the first word in the
1012camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1013and the method will have a related result type if its return type is compatible
1014with the type of its class and if:
1015
1016* the first word is "``alloc``" or "``new``", and the method is a class method,
1017 or
1018
1019* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1020 and the method is an instance method.
1021
1022If a method with a related result type is overridden by a subclass method, the
1023subclass method must also return a type that is compatible with the subclass
1024type. For example:
1025
1026.. code-block:: objc
1027
1028 @interface NSString : NSObject
1029 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1030 @end
1031
1032Related result types only affect the type of a message send or property access
1033via the given method. In all other respects, a method with a related result
1034type is treated the same way as method that returns ``id``.
1035
1036Use ``__has_feature(objc_instancetype)`` to determine whether the
1037``instancetype`` contextual keyword is available.
1038
1039Automatic reference counting
1040----------------------------
1041
Sean Silva173d2522013-01-02 13:07:47 +00001042Clang provides support for :doc:`automated reference counting
1043<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
Sean Silva709c44d2012-12-12 23:44:55 +00001044for manual ``retain``/``release``/``autorelease`` message sends. There are two
1045feature macros associated with automatic reference counting:
1046``__has_feature(objc_arc)`` indicates the availability of automated reference
1047counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1048automated reference counting also includes support for ``__weak`` pointers to
1049Objective-C objects.
1050
Sean Silva173d2522013-01-02 13:07:47 +00001051.. _objc-fixed-enum:
1052
Sean Silva709c44d2012-12-12 23:44:55 +00001053Enumerations with a fixed underlying type
1054-----------------------------------------
1055
1056Clang provides support for C++11 enumerations with a fixed underlying type
1057within Objective-C. For example, one can write an enumeration type as:
1058
1059.. code-block:: c++
1060
1061 typedef enum : unsigned char { Red, Green, Blue } Color;
1062
1063This specifies that the underlying type, which is used to store the enumeration
1064value, is ``unsigned char``.
1065
1066Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1067underlying types is available in Objective-C.
1068
1069Interoperability with C++11 lambdas
1070-----------------------------------
1071
1072Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1073permitting a lambda to be implicitly converted to a block pointer with the
1074corresponding signature. For example, consider an API such as ``NSArray``'s
1075array-sorting method:
1076
1077.. code-block:: objc
1078
1079 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1080
1081``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1082(^)(id, id)``, and parameters of this type are generally provided with block
1083literals as arguments. However, one can also use a C++11 lambda so long as it
1084provides the same signature (in this case, accepting two parameters of type
1085``id`` and returning an ``NSComparisonResult``):
1086
1087.. code-block:: objc
1088
1089 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1090 @"String 02"];
1091 const NSStringCompareOptions comparisonOptions
1092 = NSCaseInsensitiveSearch | NSNumericSearch |
1093 NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1094 NSLocale *currentLocale = [NSLocale currentLocale];
1095 NSArray *sorted
1096 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1097 NSRange string1Range = NSMakeRange(0, [s1 length]);
1098 return [s1 compare:s2 options:comparisonOptions
1099 range:string1Range locale:currentLocale];
1100 }];
1101 NSLog(@"sorted: %@", sorted);
1102
1103This code relies on an implicit conversion from the type of the lambda
1104expression (an unnamed, local class type called the *closure type*) to the
1105corresponding block pointer type. The conversion itself is expressed by a
1106conversion operator in that closure type that produces a block pointer with the
1107same signature as the lambda itself, e.g.,
1108
1109.. code-block:: objc
1110
1111 operator NSComparisonResult (^)(id, id)() const;
1112
1113This conversion function returns a new block that simply forwards the two
1114parameters to the lambda object (which it captures by copy), then returns the
1115result. The returned block is first copied (with ``Block_copy``) and then
1116autoreleased. As an optimization, if a lambda expression is immediately
1117converted to a block pointer (as in the first example, above), then the block
1118is not copied and autoreleased: rather, it is given the same lifetime as a
1119block literal written at that point in the program, which avoids the overhead
1120of copying a block to the heap in the common case.
1121
1122The conversion from a lambda to a block pointer is only available in
1123Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1124management (autorelease).
1125
1126Object Literals and Subscripting
1127--------------------------------
1128
Sean Silva173d2522013-01-02 13:07:47 +00001129Clang provides support for :doc:`Object Literals and Subscripting
1130<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
Sean Silva709c44d2012-12-12 23:44:55 +00001131programming patterns, makes programs more concise, and improves the safety of
1132container creation. There are several feature macros associated with object
1133literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1134availability of array literals; ``__has_feature(objc_dictionary_literals)``
1135tests the availability of dictionary literals;
1136``__has_feature(objc_subscripting)`` tests the availability of object
1137subscripting.
1138
1139Objective-C Autosynthesis of Properties
1140---------------------------------------
1141
1142Clang provides support for autosynthesis of declared properties. Using this
1143feature, clang provides default synthesis of those properties not declared
1144@dynamic and not having user provided backing getter and setter methods.
1145``__has_feature(objc_default_synthesize_properties)`` checks for availability
1146of this feature in version of clang being used.
1147
Jordan Rose32e94892012-12-15 00:37:01 +00001148.. _langext-objc-retain-release:
1149
1150Objective-C retaining behavior attributes
1151-----------------------------------------
1152
1153In Objective-C, functions and methods are generally assumed to follow the
1154`Cocoa Memory Management
1155<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1156conventions for ownership of object arguments and
1157return values. However, there are exceptions, and so Clang provides attributes
1158to allow these exceptions to be documented. This are used by ARC and the
1159`static analyzer <http://clang-analyzer.llvm.org>`_ Some exceptions may be
Aaron Ballman840cef32014-02-19 15:45:13 +00001160better described using the ``objc_method_family`` attribute instead.
Jordan Rose32e94892012-12-15 00:37:01 +00001161
1162**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1163``ns_returns_autoreleased``, ``cf_returns_retained``, and
1164``cf_returns_not_retained`` attributes can be placed on methods and functions
1165that return Objective-C or CoreFoundation objects. They are commonly placed at
1166the end of a function prototype or method declaration:
1167
1168.. code-block:: objc
1169
1170 id foo() __attribute__((ns_returns_retained));
1171
1172 - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1173
1174The ``*_returns_retained`` attributes specify that the returned object has a +1
1175retain count. The ``*_returns_not_retained`` attributes specify that the return
1176object has a +0 retain count, even if the normal convention for its selector
1177would be +1. ``ns_returns_autoreleased`` specifies that the returned object is
1178+0, but is guaranteed to live at least as long as the next flush of an
1179autorelease pool.
1180
1181**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1182an parameter declaration; they specify that the argument is expected to have a
1183+1 retain count, which will be balanced in some way by the function or method.
1184The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1185method; it specifies that the method expects its ``self`` parameter to have a
1186+1 retain count, which it will balance in some way.
1187
1188.. code-block:: objc
1189
1190 void foo(__attribute__((ns_consumed)) NSString *string);
1191
1192 - (void) bar __attribute__((ns_consumes_self));
1193 - (void) baz:(id) __attribute__((ns_consumed)) x;
1194
1195Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1196<http://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1197
1198Query for these features with ``__has_attribute(ns_consumed)``,
1199``__has_attribute(ns_returns_retained)``, etc.
1200
1201
Ted Kremenek84342d62013-10-15 04:28:42 +00001202Objective-C++ ABI: protocol-qualifier mangling of parameters
1203------------------------------------------------------------
1204
1205Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1206type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such
1207parameters to be differentiated from those with the regular unqualified ``id``
1208type.
1209
1210This was a non-backward compatible mangling change to the ABI. This change
1211allows proper overloading, and also prevents mangling conflicts with template
1212parameters of protocol-qualified type.
1213
1214Query the presence of this new mangling with
1215``__has_feature(objc_protocol_qualifier_mangling)``.
1216
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001217.. _langext-overloading:
1218
Sean Silva709c44d2012-12-12 23:44:55 +00001219Initializer lists for complex numbers in C
1220==========================================
1221
1222clang supports an extension which allows the following in C:
1223
1224.. code-block:: c++
1225
1226 #include <math.h>
1227 #include <complex.h>
1228 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1229
1230This construct is useful because there is no way to separately initialize the
1231real and imaginary parts of a complex variable in standard C, given that clang
1232does not support ``_Imaginary``. (Clang also supports the ``__real__`` and
1233``__imag__`` extensions from gcc, which help in some cases, but are not usable
1234in static initializers.)
1235
1236Note that this extension does not allow eliding the braces; the meaning of the
1237following two lines is different:
1238
1239.. code-block:: c++
1240
1241 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1242 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1243
1244This extension also works in C++ mode, as far as that goes, but does not apply
1245to the C++ ``std::complex``. (In C++11, list initialization allows the same
1246syntax to be used with ``std::complex`` with the same meaning.)
1247
1248Builtin Functions
1249=================
1250
1251Clang supports a number of builtin library functions with the same syntax as
1252GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
1253``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
Hal Finkelbcc06082014-09-07 22:58:14 +00001254``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to
1255the GCC builtins, Clang supports a number of builtins that GCC does not, which
1256are listed here.
Sean Silva709c44d2012-12-12 23:44:55 +00001257
1258Please note that Clang does not and will not support all of the GCC builtins
1259for vector operations. Instead of using builtins, you should use the functions
1260defined in target-specific header files like ``<xmmintrin.h>``, which define
1261portable wrappers for these. Many of the Clang versions of these functions are
1262implemented directly in terms of :ref:`extended vector support
1263<langext-vectors>` instead of builtins, in order to reduce the number of
1264builtins that we need to implement.
1265
Hal Finkelbcc06082014-09-07 22:58:14 +00001266``__builtin_assume``
1267------------------------------
1268
1269``__builtin_assume`` is used to provide the optimizer with a boolean
1270invariant that is defined to be true.
1271
1272**Syntax**:
1273
1274.. code-block:: c++
1275
1276 __builtin_assume(bool)
1277
1278**Example of Use**:
1279
1280.. code-block:: c++
1281
1282 int foo(int x) {
1283 __builtin_assume(x != 0);
1284
1285 // The optimizer may short-circuit this check using the invariant.
1286 if (x == 0)
1287 return do_something();
1288
1289 return do_something_else();
1290 }
1291
1292**Description**:
1293
1294The boolean argument to this function is defined to be true. The optimizer may
1295analyze the form of the expression provided as the argument and deduce from
1296that information used to optimize the program. If the condition is violated
1297during execution, the behavior is undefined. The argument itself is never
1298evaluated, so any side effects of the expression will be discarded.
1299
1300Query for this feature with ``__has_builtin(__builtin_assume)``.
1301
Sean Silva709c44d2012-12-12 23:44:55 +00001302``__builtin_readcyclecounter``
1303------------------------------
1304
1305``__builtin_readcyclecounter`` is used to access the cycle counter register (or
1306a similar low-latency, high-accuracy clock) on those targets that support it.
1307
1308**Syntax**:
1309
1310.. code-block:: c++
1311
1312 __builtin_readcyclecounter()
1313
1314**Example of Use**:
1315
1316.. code-block:: c++
1317
1318 unsigned long long t0 = __builtin_readcyclecounter();
1319 do_something();
1320 unsigned long long t1 = __builtin_readcyclecounter();
1321 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
1322
1323**Description**:
1324
1325The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
1326which may be either global or process/thread-specific depending on the target.
1327As the backing counters often overflow quickly (on the order of seconds) this
1328should only be used for timing small intervals. When not supported by the
1329target, the return value is always zero. This builtin takes no arguments and
1330produces an unsigned long long result.
1331
Tim Northoverbfe2e5f72013-05-23 19:14:12 +00001332Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
1333that even if present, its use may depend on run-time privilege or other OS
1334controlled state.
Sean Silva709c44d2012-12-12 23:44:55 +00001335
1336.. _langext-__builtin_shufflevector:
1337
1338``__builtin_shufflevector``
1339---------------------------
1340
1341``__builtin_shufflevector`` is used to express generic vector
1342permutation/shuffle/swizzle operations. This builtin is also very important
1343for the implementation of various target-specific header files like
1344``<xmmintrin.h>``.
1345
1346**Syntax**:
1347
1348.. code-block:: c++
1349
1350 __builtin_shufflevector(vec1, vec2, index1, index2, ...)
1351
1352**Examples**:
1353
1354.. code-block:: c++
1355
Craig Topper50ad5b72013-08-03 17:40:38 +00001356 // identity operation - return 4-element vector v1.
1357 __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
Sean Silva709c44d2012-12-12 23:44:55 +00001358
1359 // "Splat" element 0 of V1 into a 4-element result.
1360 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1361
1362 // Reverse 4-element vector V1.
1363 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1364
1365 // Concatenate every other element of 4-element vectors V1 and V2.
1366 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1367
1368 // Concatenate every other element of 8-element vectors V1 and V2.
1369 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
1370
Craig Topper50ad5b72013-08-03 17:40:38 +00001371 // Shuffle v1 with some elements being undefined
1372 __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
1373
Sean Silva709c44d2012-12-12 23:44:55 +00001374**Description**:
1375
1376The first two arguments to ``__builtin_shufflevector`` are vectors that have
1377the same element type. The remaining arguments are a list of integers that
1378specify the elements indices of the first two vectors that should be extracted
1379and returned in a new vector. These element indices are numbered sequentially
1380starting with the first vector, continuing into the second vector. Thus, if
1381``vec1`` is a 4-element vector, index 5 would refer to the second element of
Craig Topper50ad5b72013-08-03 17:40:38 +00001382``vec2``. An index of -1 can be used to indicate that the corresponding element
1383in the returned vector is a don't care and can be optimized by the backend.
Sean Silva709c44d2012-12-12 23:44:55 +00001384
1385The result of ``__builtin_shufflevector`` is a vector with the same element
1386type as ``vec1``/``vec2`` but that has an element count equal to the number of
1387indices specified.
1388
1389Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
1390
Anton Yartsev94e46f32014-09-03 17:59:21 +00001391.. _langext-__builtin_convertvector:
1392
Hal Finkelc4d7c822013-09-18 03:29:45 +00001393``__builtin_convertvector``
1394---------------------------
1395
1396``__builtin_convertvector`` is used to express generic vector
1397type-conversion operations. The input vector and the output vector
1398type must have the same number of elements.
1399
1400**Syntax**:
1401
1402.. code-block:: c++
1403
1404 __builtin_convertvector(src_vec, dst_vec_type)
1405
1406**Examples**:
1407
1408.. code-block:: c++
1409
1410 typedef double vector4double __attribute__((__vector_size__(32)));
1411 typedef float vector4float __attribute__((__vector_size__(16)));
1412 typedef short vector4short __attribute__((__vector_size__(8)));
1413 vector4float vf; vector4short vs;
1414
1415 // convert from a vector of 4 floats to a vector of 4 doubles.
1416 __builtin_convertvector(vf, vector4double)
1417 // equivalent to:
1418 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
1419
1420 // convert from a vector of 4 shorts to a vector of 4 floats.
1421 __builtin_convertvector(vs, vector4float)
1422 // equivalent to:
Yunzhong Gao637cb90b2014-09-02 19:24:14 +00001423 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
Hal Finkelc4d7c822013-09-18 03:29:45 +00001424
1425**Description**:
1426
1427The first argument to ``__builtin_convertvector`` is a vector, and the second
1428argument is a vector type with the same number of elements as the first
1429argument.
1430
1431The result of ``__builtin_convertvector`` is a vector with the same element
1432type as the second argument, with a value defined in terms of the action of a
1433C-style cast applied to each element of the first argument.
1434
1435Query for this feature with ``__has_builtin(__builtin_convertvector)``.
1436
Sean Silva709c44d2012-12-12 23:44:55 +00001437``__builtin_unreachable``
1438-------------------------
1439
1440``__builtin_unreachable`` is used to indicate that a specific point in the
1441program cannot be reached, even if the compiler might otherwise think it can.
1442This is useful to improve optimization and eliminates certain warnings. For
1443example, without the ``__builtin_unreachable`` in the example below, the
1444compiler assumes that the inline asm can fall through and prints a "function
1445declared '``noreturn``' should not return" warning.
1446
1447**Syntax**:
1448
1449.. code-block:: c++
1450
1451 __builtin_unreachable()
1452
1453**Example of use**:
1454
1455.. code-block:: c++
1456
1457 void myabort(void) __attribute__((noreturn));
1458 void myabort(void) {
1459 asm("int3");
1460 __builtin_unreachable();
1461 }
1462
1463**Description**:
1464
1465The ``__builtin_unreachable()`` builtin has completely undefined behavior.
1466Since it has undefined behavior, it is a statement that it is never reached and
1467the optimizer can take advantage of this to produce better code. This builtin
1468takes no arguments and produces a void result.
1469
1470Query for this feature with ``__has_builtin(__builtin_unreachable)``.
1471
1472``__sync_swap``
1473---------------
1474
1475``__sync_swap`` is used to atomically swap integers or pointers in memory.
1476
1477**Syntax**:
1478
1479.. code-block:: c++
1480
1481 type __sync_swap(type *ptr, type value, ...)
1482
1483**Example of Use**:
1484
1485.. code-block:: c++
1486
1487 int old_value = __sync_swap(&value, new_value);
1488
1489**Description**:
1490
1491The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
1492atomic intrinsics to allow code to atomically swap the current value with the
1493new value. More importantly, it helps developers write more efficient and
1494correct code by avoiding expensive loops around
1495``__sync_bool_compare_and_swap()`` or relying on the platform specific
1496implementation details of ``__sync_lock_test_and_set()``. The
1497``__sync_swap()`` builtin is a full barrier.
1498
Richard Smith6cbd65d2013-07-11 02:27:57 +00001499``__builtin_addressof``
1500-----------------------
1501
1502``__builtin_addressof`` performs the functionality of the built-in ``&``
1503operator, ignoring any ``operator&`` overload. This is useful in constant
1504expressions in C++11, where there is no other way to take the address of an
1505object that overloads ``operator&``.
1506
1507**Example of use**:
1508
1509.. code-block:: c++
1510
1511 template<typename T> constexpr T *addressof(T &value) {
1512 return __builtin_addressof(value);
1513 }
1514
Richard Smith760520b2014-06-03 23:27:44 +00001515``__builtin_operator_new`` and ``__builtin_operator_delete``
1516------------------------------------------------------------
1517
1518``__builtin_operator_new`` allocates memory just like a non-placement non-class
1519*new-expression*. This is exactly like directly calling the normal
1520non-placement ``::operator new``, except that it allows certain optimizations
1521that the C++ standard does not permit for a direct function call to
1522``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
1523merging allocations).
1524
1525Likewise, ``__builtin_operator_delete`` deallocates memory just like a
1526non-class *delete-expression*, and is exactly like directly calling the normal
1527``::operator delete``, except that it permits optimizations. Only the unsized
1528form of ``__builtin_operator_delete`` is currently available.
1529
1530These builtins are intended for use in the implementation of ``std::allocator``
1531and other similar allocation libraries, and are only available in C++.
1532
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001533Multiprecision Arithmetic Builtins
1534----------------------------------
1535
1536Clang provides a set of builtins which expose multiprecision arithmetic in a
1537manner amenable to C. They all have the following form:
1538
1539.. code-block:: c
1540
1541 unsigned x = ..., y = ..., carryin = ..., carryout;
1542 unsigned sum = __builtin_addc(x, y, carryin, &carryout);
1543
1544Thus one can form a multiprecision addition chain in the following manner:
1545
1546.. code-block:: c
1547
1548 unsigned *x, *y, *z, carryin=0, carryout;
1549 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
1550 carryin = carryout;
1551 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
1552 carryin = carryout;
1553 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
1554 carryin = carryout;
1555 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
1556
1557The complete list of builtins are:
1558
1559.. code-block:: c
1560
Michael Gottesman15343992013-06-18 20:40:40 +00001561 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001562 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1563 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1564 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1565 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
Michael Gottesman15343992013-06-18 20:40:40 +00001566 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001567 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1568 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1569 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1570 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
1571
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001572Checked Arithmetic Builtins
1573---------------------------
1574
1575Clang provides a set of builtins that implement checked arithmetic for security
1576critical applications in a manner that is fast and easily expressable in C. As
1577an example of their usage:
1578
1579.. code-block:: c
1580
1581 errorcode_t security_critical_application(...) {
1582 unsigned x, y, result;
1583 ...
1584 if (__builtin_umul_overflow(x, y, &result))
1585 return kErrorCodeHackers;
1586 ...
1587 use_multiply(result);
1588 ...
1589 }
1590
1591A complete enumeration of the builtins are:
1592
1593.. code-block:: c
1594
1595 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
1596 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
1597 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
1598 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
1599 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
1600 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
1601 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
1602 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
1603 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
1604 bool __builtin_sadd_overflow (int x, int y, int *sum);
1605 bool __builtin_saddl_overflow (long x, long y, long *sum);
1606 bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
1607 bool __builtin_ssub_overflow (int x, int y, int *diff);
1608 bool __builtin_ssubl_overflow (long x, long y, long *diff);
1609 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
1610 bool __builtin_smul_overflow (int x, int y, int *prod);
1611 bool __builtin_smull_overflow (long x, long y, long *prod);
1612 bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
1613
1614
Sean Silva709c44d2012-12-12 23:44:55 +00001615.. _langext-__c11_atomic:
1616
1617__c11_atomic builtins
1618---------------------
1619
1620Clang provides a set of builtins which are intended to be used to implement
1621C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the
1622``_explicit`` form of the corresponding C11 operation, and are named with a
Hal Finkel6970ac82014-10-03 04:29:40 +00001623``__c11_`` prefix. The supported operations, and the differences from
1624the corresponding C11 operations, are:
Sean Silva709c44d2012-12-12 23:44:55 +00001625
1626* ``__c11_atomic_init``
1627* ``__c11_atomic_thread_fence``
1628* ``__c11_atomic_signal_fence``
Hal Finkel6970ac82014-10-03 04:29:40 +00001629* ``__c11_atomic_is_lock_free`` (The argument is the size of the
Dan Liewfe726862014-10-03 12:36:20 +00001630 ``_Atomic(...)`` object, instead of its address)
Sean Silva709c44d2012-12-12 23:44:55 +00001631* ``__c11_atomic_store``
1632* ``__c11_atomic_load``
1633* ``__c11_atomic_exchange``
1634* ``__c11_atomic_compare_exchange_strong``
1635* ``__c11_atomic_compare_exchange_weak``
1636* ``__c11_atomic_fetch_add``
1637* ``__c11_atomic_fetch_sub``
1638* ``__c11_atomic_fetch_and``
1639* ``__c11_atomic_fetch_or``
1640* ``__c11_atomic_fetch_xor``
1641
Hal Finkel6970ac82014-10-03 04:29:40 +00001642The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
JF Bastiene6ccacf2014-10-10 16:09:48 +00001643``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
Hal Finkel6970ac82014-10-03 04:29:40 +00001644provided, with values corresponding to the enumerators of C11's
1645``memory_order`` enumeration.
1646
Tim Northover6aacd492013-07-16 09:47:53 +00001647Low-level ARM exclusive memory builtins
1648---------------------------------------
1649
1650Clang provides overloaded builtins giving direct access to the three key ARM
1651instructions for implementing atomic operations.
1652
1653.. code-block:: c
Sean Silvaa928c242013-09-09 19:50:40 +00001654
Tim Northover6aacd492013-07-16 09:47:53 +00001655 T __builtin_arm_ldrex(const volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00001656 T __builtin_arm_ldaex(const volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00001657 int __builtin_arm_strex(T val, volatile T *addr);
Tim Northover3acd6bd2014-07-02 12:56:02 +00001658 int __builtin_arm_stlex(T val, volatile T *addr);
Tim Northover6aacd492013-07-16 09:47:53 +00001659 void __builtin_arm_clrex(void);
1660
1661The types ``T`` currently supported are:
Tim Northover573cbee2014-05-24 12:52:07 +00001662* Integer types with width at most 64 bits (or 128 bits on AArch64).
Tim Northover6aacd492013-07-16 09:47:53 +00001663* Floating-point types
1664* Pointer types.
1665
1666Note that the compiler does not guarantee it will not insert stores which clear
Tim Northover3acd6bd2014-07-02 12:56:02 +00001667the exclusive monitor in between an ``ldrex`` type operation and its paired
1668``strex``. In practice this is only usually a risk when the extra store is on
1669the same cache line as the variable being modified and Clang will only insert
1670stack stores on its own, so it is best not to use these operations on variables
1671with automatic storage duration.
Tim Northover6aacd492013-07-16 09:47:53 +00001672
1673Also, loads and stores may be implicit in code written between the ``ldrex`` and
1674``strex``. Clang will not necessarily mitigate the effects of these either, so
1675care should be exercised.
1676
1677For these reasons the higher level atomic primitives should be preferred where
1678possible.
1679
Sean Silva709c44d2012-12-12 23:44:55 +00001680Non-standard C++11 Attributes
1681=============================
1682
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001683Clang's non-standard C++11 attributes live in the ``clang`` attribute
1684namespace.
Sean Silva709c44d2012-12-12 23:44:55 +00001685
Aaron Ballman68893db2014-02-19 23:21:40 +00001686Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001687are accepted with the ``__attribute__((foo))`` syntax are also accepted as
1688``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
1689(see the list of `GCC function attributes
1690<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
1691attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
1692`GCC type attributes
Richard Smithccfc9ff2013-07-11 00:27:05 +00001693<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001694implementation, these attributes must appertain to the *declarator-id* in a
1695declaration, which means they must go either at the start of the declaration or
1696immediately after the name being declared.
1697
1698For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
1699also applies the GNU ``noreturn`` attribute to ``f``.
1700
1701.. code-block:: c++
1702
1703 [[gnu::unused]] int a, f [[gnu::noreturn]] ();
1704
Sean Silva709c44d2012-12-12 23:44:55 +00001705Target-Specific Extensions
1706==========================
1707
1708Clang supports some language features conditionally on some targets.
1709
Yi Kong4de26fb2014-07-23 09:25:02 +00001710ARM/AArch64 Language Extensions
1711-------------------------------
1712
1713Memory Barrier Intrinsics
1714^^^^^^^^^^^^^^^^^^^^^^^^^
1715Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
1716in the `ARM C Language Extensions Release 2.0
1717<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
1718Note that these intrinsics are implemented as motion barriers that block
1719reordering of memory accesses and side effect instructions. Other instructions
1720like simple arithmatic may be reordered around the intrinsic. If you expect to
1721have no reordering at all, use inline assembly instead.
1722
Sean Silva709c44d2012-12-12 23:44:55 +00001723X86/X86-64 Language Extensions
1724------------------------------
1725
1726The X86 backend has these language extensions:
1727
1728Memory references off the GS segment
1729^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1730
1731Annotating a pointer with address space #256 causes it to be code generated
1732relative to the X86 GS segment register, and address space #257 causes it to be
1733relative to the X86 FS segment. Note that this is a very very low-level
1734feature that should only be used if you know what you're doing (for example in
1735an OS kernel).
1736
1737Here is an example:
1738
1739.. code-block:: c++
1740
1741 #define GS_RELATIVE __attribute__((address_space(256)))
1742 int foo(int GS_RELATIVE *P) {
1743 return *P;
1744 }
1745
1746Which compiles to (on X86-32):
1747
1748.. code-block:: gas
1749
1750 _foo:
1751 movl 4(%esp), %eax
1752 movl %gs:(%eax), %eax
1753 ret
1754
Jordan Rose32e94892012-12-15 00:37:01 +00001755Extensions for Static Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00001756==============================
Sean Silva709c44d2012-12-12 23:44:55 +00001757
1758Clang supports additional attributes that are useful for documenting program
Jordan Rose32e94892012-12-15 00:37:01 +00001759invariants and rules for static analysis tools, such as the `Clang Static
1760Analyzer <http://clang-analyzer.llvm.org/>`_. These attributes are documented
1761in the analyzer's `list of source-level annotations
1762<http://clang-analyzer.llvm.org/annotations.html>`_.
Sean Silva709c44d2012-12-12 23:44:55 +00001763
Sean Silva709c44d2012-12-12 23:44:55 +00001764
Jordan Rose32e94892012-12-15 00:37:01 +00001765Extensions for Dynamic Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00001766===============================
Sean Silva709c44d2012-12-12 23:44:55 +00001767
Sean Silva709c44d2012-12-12 23:44:55 +00001768Use ``__has_feature(address_sanitizer)`` to check if the code is being built
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00001769with :doc:`AddressSanitizer`.
Sean Silva709c44d2012-12-12 23:44:55 +00001770
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00001771Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
1772with :doc:`ThreadSanitizer`.
1773
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00001774Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
1775with :doc:`MemorySanitizer`.
Dario Domizioli33c17872014-05-28 14:06:38 +00001776
1777
1778Extensions for selectively disabling optimization
1779=================================================
1780
1781Clang provides a mechanism for selectively disabling optimizations in functions
1782and methods.
1783
1784To disable optimizations in a single function definition, the GNU-style or C++11
1785non-standard attribute ``optnone`` can be used.
1786
1787.. code-block:: c++
1788
1789 // The following functions will not be optimized.
1790 // GNU-style attribute
1791 __attribute__((optnone)) int foo() {
1792 // ... code
1793 }
1794 // C++11 attribute
1795 [[clang::optnone]] int bar() {
1796 // ... code
1797 }
1798
1799To facilitate disabling optimization for a range of function definitions, a
1800range-based pragma is provided. Its syntax is ``#pragma clang optimize``
1801followed by ``off`` or ``on``.
1802
1803All function definitions in the region between an ``off`` and the following
1804``on`` will be decorated with the ``optnone`` attribute unless doing so would
1805conflict with explicit attributes already present on the function (e.g. the
1806ones that control inlining).
1807
1808.. code-block:: c++
1809
1810 #pragma clang optimize off
1811 // This function will be decorated with optnone.
1812 int foo() {
1813 // ... code
1814 }
1815
1816 // optnone conflicts with always_inline, so bar() will not be decorated.
1817 __attribute__((always_inline)) int bar() {
1818 // ... code
1819 }
1820 #pragma clang optimize on
1821
1822If no ``on`` is found to close an ``off`` region, the end of the region is the
1823end of the compilation unit.
1824
1825Note that a stray ``#pragma clang optimize on`` does not selectively enable
1826additional optimizations when compiling at low optimization levels. This feature
1827can only be used to selectively disable optimizations.
1828
1829The pragma has an effect on functions only at the point of their definition; for
1830function templates, this means that the state of the pragma at the point of an
1831instantiation is not necessarily relevant. Consider the following example:
1832
1833.. code-block:: c++
1834
1835 template<typename T> T twice(T t) {
1836 return 2 * t;
1837 }
1838
1839 #pragma clang optimize off
1840 template<typename T> T thrice(T t) {
1841 return 3 * t;
1842 }
1843
1844 int container(int a, int b) {
1845 return twice(a) + thrice(b);
1846 }
1847 #pragma clang optimize on
1848
1849In this example, the definition of the template function ``twice`` is outside
1850the pragma region, whereas the definition of ``thrice`` is inside the region.
1851The ``container`` function is also in the region and will not be optimized, but
1852it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
1853these two instantiations, ``twice`` will be optimized (because its definition
1854was outside the region) and ``thrice`` will not be optimized.
Tyler Nowickidb2668a2014-06-18 00:51:32 +00001855
1856Extensions for loop hint optimizations
1857======================================
1858
1859The ``#pragma clang loop`` directive is used to specify hints for optimizing the
1860subsequent for, while, do-while, or c++11 range-based for loop. The directive
Eli Bendersky778268d2014-06-19 18:12:44 +00001861provides options for vectorization, interleaving, and unrolling. Loop hints can
1862be specified before any loop and will be ignored if the optimization is not safe
1863to apply.
1864
1865Vectorization and Interleaving
1866------------------------------
Tyler Nowickidb2668a2014-06-18 00:51:32 +00001867
1868A vectorized loop performs multiple iterations of the original loop
1869in parallel using vector instructions. The instruction set of the target
1870processor determines which vector instructions are available and their vector
1871widths. This restricts the types of loops that can be vectorized. The vectorizer
1872automatically determines if the loop is safe and profitable to vectorize. A
1873vector instruction cost model is used to select the vector width.
1874
1875Interleaving multiple loop iterations allows modern processors to further
1876improve instruction-level parallelism (ILP) using advanced hardware features,
1877such as multiple execution units and out-of-order execution. The vectorizer uses
1878a cost model that depends on the register pressure and generated code size to
1879select the interleaving count.
1880
1881Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
1882by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
1883manually enable vectorization or interleaving.
1884
1885.. code-block:: c++
1886
1887 #pragma clang loop vectorize(enable)
1888 #pragma clang loop interleave(enable)
1889 for(...) {
1890 ...
1891 }
1892
1893The vector width is specified by ``vectorize_width(_value_)`` and the interleave
1894count is specified by ``interleave_count(_value_)``, where
1895_value_ is a positive integer. This is useful for specifying the optimal
1896width/count of the set of target architectures supported by your application.
1897
1898.. code-block:: c++
1899
Tyler Nowickidb2668a2014-06-18 00:51:32 +00001900 #pragma clang loop vectorize_width(2)
1901 #pragma clang loop interleave_count(2)
1902 for(...) {
1903 ...
1904 }
1905
1906Specifying a width/count of 1 disables the optimization, and is equivalent to
1907``vectorize(disable)`` or ``interleave(disable)``.
1908
Eli Bendersky778268d2014-06-19 18:12:44 +00001909Loop Unrolling
1910--------------
1911
1912Unrolling a loop reduces the loop control overhead and exposes more
1913opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
1914eliminates the loop and replaces it with an enumerated sequence of loop
1915iterations. Full unrolling is only possible if the loop trip count is known at
1916compile time. Partial unrolling replicates the loop body within the loop and
1917reduces the trip count.
1918
Mark Heffernan450c2382014-07-23 17:31:31 +00001919If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
Eli Bendersky778268d2014-06-19 18:12:44 +00001920loop if the trip count is known at compile time. If the loop count is not known
1921or the fully unrolled code size is greater than the limit specified by the
1922`-pragma-unroll-threshold` command line option the loop will be partially
1923unrolled subject to the same limit.
1924
1925.. code-block:: c++
1926
Mark Heffernan450c2382014-07-23 17:31:31 +00001927 #pragma clang loop unroll(full)
Eli Bendersky778268d2014-06-19 18:12:44 +00001928 for(...) {
1929 ...
1930 }
1931
1932The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
1933_value_ is a positive integer. If this value is greater than the trip count the
1934loop will be fully unrolled. Otherwise the loop is partially unrolled subject
1935to the `-pragma-unroll-threshold` limit.
1936
1937.. code-block:: c++
1938
1939 #pragma clang loop unroll_count(8)
1940 for(...) {
1941 ...
1942 }
1943
1944Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
1945
1946Additional Information
1947----------------------
1948
Tyler Nowickidb2668a2014-06-18 00:51:32 +00001949For convenience multiple loop hints can be specified on a single line.
1950
1951.. code-block:: c++
1952
1953 #pragma clang loop vectorize_width(4) interleave_count(8)
1954 for(...) {
1955 ...
1956 }
1957
1958If an optimization cannot be applied any hints that apply to it will be ignored.
1959For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
1960proven safe to vectorize. To identify and diagnose optimization issues use
1961`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
1962user guide for details.