blob: 24ef8550c93a88819df17117b852911035071c55 [file] [log] [blame]
Sean Silva709c44d2012-12-12 23:44:55 +00001=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6 :local:
Sean Silva13d43fe2013-01-02 21:09:58 +00007 :depth: 1
Sean Silva709c44d2012-12-12 23:44:55 +00008
Sean Silvaf380e0e2013-01-02 21:03:11 +00009.. toctree::
10 :hidden:
11
12 ObjectiveCLiterals
13 BlockLanguageSpec
Michael Gottesman6fd58462013-01-07 22:24:45 +000014 Block-ABI-Apple
15 AutomaticReferenceCounting
Sean Silvaf380e0e2013-01-02 21:03:11 +000016
Sean Silva709c44d2012-12-12 23:44:55 +000017Introduction
18============
19
20This document describes the language extensions provided by Clang. In addition
21to the language extensions listed here, Clang aims to support a broad range of
22GCC extensions. Please see the `GCC manual
23<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
24these extensions.
25
26.. _langext-feature_check:
27
28Feature Checking Macros
29=======================
30
31Language extensions can be very useful, but only if you know you can depend on
32them. In order to allow fine-grain features checks, we support three builtin
33function-like macros. This allows you to directly test for a feature in your
34code without having to resort to something like autoconf or fragile "compiler
35version checks".
36
37``__has_builtin``
38-----------------
39
40This function-like macro takes a single identifier argument that is the name of
41a builtin function. It evaluates to 1 if the builtin is supported or 0 if not.
42It can be used like this:
43
44.. code-block:: c++
45
46 #ifndef __has_builtin // Optional of course.
47 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
48 #endif
49
50 ...
51 #if __has_builtin(__builtin_trap)
52 __builtin_trap();
53 #else
54 abort();
55 #endif
56 ...
57
58.. _langext-__has_feature-__has_extension:
59
60``__has_feature`` and ``__has_extension``
61-----------------------------------------
62
63These function-like macros take a single identifier argument that is the name
64of a feature. ``__has_feature`` evaluates to 1 if the feature is both
65supported by Clang and standardized in the current language standard or 0 if
66not (but see :ref:`below <langext-has-feature-back-compat>`), while
67``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
68current language (either as a language extension or a standard language
69feature) or 0 if not. They can be used like this:
70
71.. code-block:: c++
72
73 #ifndef __has_feature // Optional of course.
74 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
75 #endif
76 #ifndef __has_extension
77 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
78 #endif
79
80 ...
81 #if __has_feature(cxx_rvalue_references)
82 // This code will only be compiled with the -std=c++11 and -std=gnu++11
83 // options, because rvalue references are only standardized in C++11.
84 #endif
85
86 #if __has_extension(cxx_rvalue_references)
87 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
88 // and -std=gnu++98 options, because rvalue references are supported as a
89 // language extension in C++98.
90 #endif
91
92.. _langext-has-feature-back-compat:
93
94For backwards compatibility reasons, ``__has_feature`` can also be used to test
95for support for non-standardized features, i.e. features not prefixed ``c_``,
96``cxx_`` or ``objc_``.
97
98Another use of ``__has_feature`` is to check for compiler features not related
Sean Silva173d2522013-01-02 13:07:47 +000099to the language standard, such as e.g. :doc:`AddressSanitizer
100<AddressSanitizer>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000101
102If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
103to ``__has_feature``.
104
105The feature tag is described along with the language feature below.
106
107The feature name or extension name can also be specified with a preceding and
108following ``__`` (double underscore) to avoid interference from a macro with
109the same name. For instance, ``__cxx_rvalue_references__`` can be used instead
110of ``cxx_rvalue_references``.
111
112``__has_attribute``
113-------------------
114
115This function-like macro takes a single identifier argument that is the name of
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000116an attribute. It evaluates to 1 if the attribute is supported by the current
117compilation target, or 0 if not. It can be used like this:
Sean Silva709c44d2012-12-12 23:44:55 +0000118
119.. code-block:: c++
120
121 #ifndef __has_attribute // Optional of course.
122 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
123 #endif
124
125 ...
126 #if __has_attribute(always_inline)
127 #define ALWAYS_INLINE __attribute__((always_inline))
128 #else
129 #define ALWAYS_INLINE
130 #endif
131 ...
132
133The attribute name can also be specified with a preceding and following ``__``
134(double underscore) to avoid interference from a macro with the same name. For
135instance, ``__always_inline__`` can be used instead of ``always_inline``.
136
Aaron Ballmana4bb4b92014-01-09 23:11:13 +0000137
Sean Silva709c44d2012-12-12 23:44:55 +0000138Include File Checking Macros
139============================
140
141Not all developments systems have the same include files. The
142:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
143you to check for the existence of an include file before doing a possibly
Dmitri Gribenko764ea242013-01-17 17:04:54 +0000144failing ``#include`` directive. Include file checking macros must be used
145as expressions in ``#if`` or ``#elif`` preprocessing directives.
Sean Silva709c44d2012-12-12 23:44:55 +0000146
147.. _langext-__has_include:
148
149``__has_include``
150-----------------
151
152This function-like macro takes a single file name string argument that is the
153name of an include file. It evaluates to 1 if the file can be found using the
154include paths, or 0 otherwise:
155
156.. code-block:: c++
157
158 // Note the two possible file name string formats.
159 #if __has_include("myinclude.h") && __has_include(<stdint.h>)
160 # include "myinclude.h"
161 #endif
162
Richard Smithccfc9ff2013-07-11 00:27:05 +0000163To test for this feature, use ``#if defined(__has_include)``:
164
165.. code-block:: c++
166
Sean Silva709c44d2012-12-12 23:44:55 +0000167 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000168 #if defined(__has_include)
169 #if __has_include("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000170 # include "myinclude.h"
171 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000172 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000173
174.. _langext-__has_include_next:
175
176``__has_include_next``
177----------------------
178
179This function-like macro takes a single file name string argument that is the
180name of an include file. It is like ``__has_include`` except that it looks for
181the second instance of the given file found in the include paths. It evaluates
182to 1 if the second instance of the file can be found using the include paths,
183or 0 otherwise:
184
185.. code-block:: c++
186
187 // Note the two possible file name string formats.
188 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
189 # include_next "myinclude.h"
190 #endif
191
192 // To avoid problem with non-clang compilers not having this macro.
Richard Smithccfc9ff2013-07-11 00:27:05 +0000193 #if defined(__has_include_next)
194 #if __has_include_next("myinclude.h")
Sean Silva709c44d2012-12-12 23:44:55 +0000195 # include_next "myinclude.h"
196 #endif
Richard Smithccfc9ff2013-07-11 00:27:05 +0000197 #endif
Sean Silva709c44d2012-12-12 23:44:55 +0000198
199Note that ``__has_include_next``, like the GNU extension ``#include_next``
200directive, is intended for use in headers only, and will issue a warning if
201used in the top-level compilation file. A warning will also be issued if an
202absolute path is used in the file argument.
203
204``__has_warning``
205-----------------
206
207This function-like macro takes a string literal that represents a command line
208option for a warning and returns true if that is a valid warning option.
209
210.. code-block:: c++
211
212 #if __has_warning("-Wformat")
213 ...
214 #endif
215
216Builtin Macros
217==============
218
219``__BASE_FILE__``
220 Defined to a string that contains the name of the main input file passed to
221 Clang.
222
223``__COUNTER__``
224 Defined to an integer value that starts at zero and is incremented each time
225 the ``__COUNTER__`` macro is expanded.
226
227``__INCLUDE_LEVEL__``
228 Defined to an integral value that is the include depth of the file currently
229 being translated. For the main file, this value is zero.
230
231``__TIMESTAMP__``
232 Defined to the date and time of the last modification of the current source
233 file.
234
235``__clang__``
236 Defined when compiling with Clang
237
238``__clang_major__``
239 Defined to the major marketing version number of Clang (e.g., the 2 in
240 2.0.1). Note that marketing version numbers should not be used to check for
241 language features, as different vendors use different numbering schemes.
242 Instead, use the :ref:`langext-feature_check`.
243
244``__clang_minor__``
245 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note
246 that marketing version numbers should not be used to check for language
247 features, as different vendors use different numbering schemes. Instead, use
248 the :ref:`langext-feature_check`.
249
250``__clang_patchlevel__``
251 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
252
253``__clang_version__``
254 Defined to a string that captures the Clang marketing version, including the
255 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
256
257.. _langext-vectors:
258
259Vectors and Extended Vectors
260============================
261
262Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
263
264OpenCL vector types are created using ``ext_vector_type`` attribute. It
265support for ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example
266is:
267
268.. code-block:: c++
269
270 typedef float float4 __attribute__((ext_vector_type(4)));
271 typedef float float2 __attribute__((ext_vector_type(2)));
272
273 float4 foo(float2 a, float2 b) {
274 float4 c;
275 c.xz = a;
276 c.yw = b;
277 return c;
278 }
279
280Query for this feature with ``__has_extension(attribute_ext_vector_type)``.
281
282Giving ``-faltivec`` option to clang enables support for AltiVec vector syntax
283and functions. For example:
284
285.. code-block:: c++
286
287 vector float foo(vector int a) {
288 vector int b;
289 b = vec_add(a, a) + a;
290 return (vector float)b;
291 }
292
293NEON vector types are created using ``neon_vector_type`` and
294``neon_polyvector_type`` attributes. For example:
295
296.. code-block:: c++
297
298 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
299 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
300
301 int8x8_t foo(int8x8_t a) {
302 int8x8_t v;
303 v = a;
304 return v;
305 }
306
307Vector Literals
308---------------
309
310Vector literals can be used to create vectors from a set of scalars, or
311vectors. Either parentheses or braces form can be used. In the parentheses
312form the number of literal values specified must be one, i.e. referring to a
313scalar value, or must match the size of the vector type being created. If a
314single scalar literal value is specified, the scalar literal value will be
315replicated to all the components of the vector type. In the brackets form any
316number of literals can be specified. For example:
317
318.. code-block:: c++
319
320 typedef int v4si __attribute__((__vector_size__(16)));
321 typedef float float4 __attribute__((ext_vector_type(4)));
322 typedef float float2 __attribute__((ext_vector_type(2)));
323
324 v4si vsi = (v4si){1, 2, 3, 4};
325 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
326 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
327 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
328 vector int vi3 = (vector int)(1, 2); // error
329 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
330 vector int vi5 = (vector int)(1, 2, 3, 4);
331 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
332
333Vector Operations
334-----------------
335
336The table below shows the support for each operation by vector extension. A
337dash indicates that an operation is not accepted according to a corresponding
338specification.
339
340============================== ====== ======= === ====
341 Opeator OpenCL AltiVec GCC NEON
342============================== ====== ======= === ====
343[] yes yes yes --
344unary operators +, -- yes yes yes --
345++, -- -- yes yes yes --
346+,--,*,/,% yes yes yes --
347bitwise operators &,|,^,~ yes yes yes --
348>>,<< yes yes yes --
349!, &&, || no -- -- --
350==, !=, >, <, >=, <= yes yes -- --
351= yes yes yes yes
352:? yes -- -- --
353sizeof yes yes yes yes
354============================== ====== ======= === ====
355
356See also :ref:`langext-__builtin_shufflevector`.
357
358Messages on ``deprecated`` and ``unavailable`` Attributes
359=========================================================
360
361An optional string message can be added to the ``deprecated`` and
362``unavailable`` attributes. For example:
363
364.. code-block:: c++
365
366 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
367
368If the deprecated or unavailable declaration is used, the message will be
369incorporated into the appropriate diagnostic:
370
371.. code-block:: c++
372
373 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
374 [-Wdeprecated-declarations]
375 explode();
376 ^
377
378Query for this feature with
379``__has_extension(attribute_deprecated_with_message)`` and
380``__has_extension(attribute_unavailable_with_message)``.
381
382Attributes on Enumerators
383=========================
384
385Clang allows attributes to be written on individual enumerators. This allows
386enumerators to be deprecated, made unavailable, etc. The attribute must appear
387after the enumerator name and before any initializer, like so:
388
389.. code-block:: c++
390
391 enum OperationMode {
392 OM_Invalid,
393 OM_Normal,
394 OM_Terrified __attribute__((deprecated)),
395 OM_AbortOnError __attribute__((deprecated)) = 4
396 };
397
398Attributes on the ``enum`` declaration do not apply to individual enumerators.
399
400Query for this feature with ``__has_extension(enumerator_attributes)``.
401
402'User-Specified' System Frameworks
403==================================
404
405Clang provides a mechanism by which frameworks can be built in such a way that
406they will always be treated as being "system frameworks", even if they are not
407present in a system framework directory. This can be useful to system
408framework developers who want to be able to test building other applications
409with development builds of their framework, including the manner in which the
410compiler changes warning behavior for system headers.
411
412Framework developers can opt-in to this mechanism by creating a
413"``.system_framework``" file at the top-level of their framework. That is, the
414framework should have contents like:
415
416.. code-block:: none
417
418 .../TestFramework.framework
419 .../TestFramework.framework/.system_framework
420 .../TestFramework.framework/Headers
421 .../TestFramework.framework/Headers/TestFramework.h
422 ...
423
424Clang will treat the presence of this file as an indicator that the framework
425should be treated as a system framework, regardless of how it was found in the
426framework search path. For consistency, we recommend that such files never be
427included in installed versions of the framework.
428
429Availability attribute
430======================
431
432Clang introduces the ``availability`` attribute, which can be placed on
433declarations to describe the lifecycle of that declaration relative to
434operating system versions. Consider the function declaration for a
435hypothetical function ``f``:
436
437.. code-block:: c++
438
439 void f(void) __attribute__((availability(macosx,introduced=10.4,deprecated=10.6,obsoleted=10.7)));
440
441The availability attribute states that ``f`` was introduced in Mac OS X 10.4,
442deprecated in Mac OS X 10.6, and obsoleted in Mac OS X 10.7. This information
443is used by Clang to determine when it is safe to use ``f``: for example, if
444Clang is instructed to compile code for Mac OS X 10.5, a call to ``f()``
445succeeds. If Clang is instructed to compile code for Mac OS X 10.6, the call
446succeeds but Clang emits a warning specifying that the function is deprecated.
447Finally, if Clang is instructed to compile code for Mac OS X 10.7, the call
448fails because ``f()`` is no longer available.
449
Douglas Gregor250ee632013-01-16 01:12:31 +0000450The availability attribute is a comma-separated list starting with the
Sean Silva709c44d2012-12-12 23:44:55 +0000451platform name and then including clauses specifying important milestones in the
452declaration's lifetime (in any order) along with additional information. Those
453clauses can be:
454
455introduced=\ *version*
456 The first version in which this declaration was introduced.
457
458deprecated=\ *version*
459 The first version in which this declaration was deprecated, meaning that
460 users should migrate away from this API.
461
462obsoleted=\ *version*
463 The first version in which this declaration was obsoleted, meaning that it
464 was removed completely and can no longer be used.
465
466unavailable
467 This declaration is never available on this platform.
468
469message=\ *string-literal*
470 Additional message text that Clang will provide when emitting a warning or
471 error about use of a deprecated or obsoleted declaration. Useful to direct
472 users to replacement APIs.
473
474Multiple availability attributes can be placed on a declaration, which may
475correspond to different platforms. Only the availability attribute with the
476platform corresponding to the target platform will be used; any others will be
477ignored. If no availability attribute specifies availability for the current
478target platform, the availability attributes are ignored. Supported platforms
479are:
480
481``ios``
482 Apple's iOS operating system. The minimum deployment target is specified by
483 the ``-mios-version-min=*version*`` or ``-miphoneos-version-min=*version*``
484 command-line arguments.
485
486``macosx``
487 Apple's Mac OS X operating system. The minimum deployment target is
488 specified by the ``-mmacosx-version-min=*version*`` command-line argument.
489
490A declaration can be used even when deploying back to a platform version prior
491to when the declaration was introduced. When this happens, the declaration is
492`weakly linked
493<https://developer.apple.com/library/mac/#documentation/MacOSX/Conceptual/BPFrameworks/Concepts/WeakLinking.html>`_,
494as if the ``weak_import`` attribute were added to the declaration. A
495weakly-linked declaration may or may not be present a run-time, and a program
496can determine whether the declaration is present by checking whether the
497address of that declaration is non-NULL.
498
Dmitri Gribenkofb5b2242013-01-16 01:17:05 +0000499If there are multiple declarations of the same entity, the availability
Douglas Gregor250ee632013-01-16 01:12:31 +0000500attributes must either match on a per-platform basis or later
501declarations must not have availability attributes for that
502platform. For example:
503
504.. code-block:: c
505
506 void g(void) __attribute__((availability(macosx,introduced=10.4)));
507 void g(void) __attribute__((availability(macosx,introduced=10.4))); // okay, matches
508 void g(void) __attribute__((availability(ios,introduced=4.0))); // okay, adds a new platform
509 void g(void); // okay, inherits both macosx and ios availability from above.
510 void g(void) __attribute__((availability(macosx,introduced=10.5))); // error: mismatch
511
512When one method overrides another, the overriding method can be more widely available than the overridden method, e.g.,:
513
514.. code-block:: objc
515
516 @interface A
517 - (id)method __attribute__((availability(macosx,introduced=10.4)));
518 - (id)method2 __attribute__((availability(macosx,introduced=10.4)));
519 @end
520
521 @interface B : A
522 - (id)method __attribute__((availability(macosx,introduced=10.3))); // okay: method moved into base class later
523 - (id)method __attribute__((availability(macosx,introduced=10.5))); // error: this method was available via the base class in 10.4
524 @end
525
Sean Silva709c44d2012-12-12 23:44:55 +0000526Checks for Standard Language Features
527=====================================
528
529The ``__has_feature`` macro can be used to query if certain standard language
530features are enabled. The ``__has_extension`` macro can be used to query if
531language features are available as an extension when compiling for a standard
532which does not provide them. The features which can be tested are listed here.
533
534C++98
535-----
536
537The features listed below are part of the C++98 standard. These features are
538enabled by default when compiling C++ code.
539
540C++ exceptions
541^^^^^^^^^^^^^^
542
543Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
544enabled. For example, compiling code with ``-fno-exceptions`` disables C++
545exceptions.
546
547C++ RTTI
548^^^^^^^^
549
550Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For
551example, compiling code with ``-fno-rtti`` disables the use of RTTI.
552
553C++11
554-----
555
556The features listed below are part of the C++11 standard. As a result, all
557these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
558when compiling C++ code.
559
560C++11 SFINAE includes access control
561^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
562
563Use ``__has_feature(cxx_access_control_sfinae)`` or
564``__has_extension(cxx_access_control_sfinae)`` to determine whether
565access-control errors (e.g., calling a private constructor) are considered to
566be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
567<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
568
569C++11 alias templates
570^^^^^^^^^^^^^^^^^^^^^
571
572Use ``__has_feature(cxx_alias_templates)`` or
573``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
574alias declarations and alias templates is enabled.
575
576C++11 alignment specifiers
577^^^^^^^^^^^^^^^^^^^^^^^^^^
578
579Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
580determine if support for alignment specifiers using ``alignas`` is enabled.
581
582C++11 attributes
583^^^^^^^^^^^^^^^^
584
585Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
586determine if support for attribute parsing with C++11's square bracket notation
587is enabled.
588
589C++11 generalized constant expressions
590^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
591
592Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
593constant expressions (e.g., ``constexpr``) is enabled.
594
595C++11 ``decltype()``
596^^^^^^^^^^^^^^^^^^^^
597
598Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
599determine if support for the ``decltype()`` specifier is enabled. C++11's
600``decltype`` does not require type-completeness of a function call expression.
601Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
602``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
603support for this feature is enabled.
604
605C++11 default template arguments in function templates
606^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
607
608Use ``__has_feature(cxx_default_function_template_args)`` or
609``__has_extension(cxx_default_function_template_args)`` to determine if support
610for default template arguments in function templates is enabled.
611
612C++11 ``default``\ ed functions
613^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
614
615Use ``__has_feature(cxx_defaulted_functions)`` or
616``__has_extension(cxx_defaulted_functions)`` to determine if support for
617defaulted function definitions (with ``= default``) is enabled.
618
619C++11 delegating constructors
620^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
621
622Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
623delegating constructors is enabled.
624
625C++11 ``deleted`` functions
626^^^^^^^^^^^^^^^^^^^^^^^^^^^
627
628Use ``__has_feature(cxx_deleted_functions)`` or
629``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
630function definitions (with ``= delete``) is enabled.
631
632C++11 explicit conversion functions
633^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
634
635Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
636``explicit`` conversion functions is enabled.
637
638C++11 generalized initializers
639^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
640
641Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
642generalized initializers (using braced lists and ``std::initializer_list``) is
643enabled.
644
645C++11 implicit move constructors/assignment operators
646^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
647
648Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
649generate move constructors and move assignment operators where needed.
650
651C++11 inheriting constructors
652^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
653
654Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
Richard Smith25b555a2013-04-19 17:00:31 +0000655inheriting constructors is enabled.
Sean Silva709c44d2012-12-12 23:44:55 +0000656
657C++11 inline namespaces
658^^^^^^^^^^^^^^^^^^^^^^^
659
660Use ``__has_feature(cxx_inline_namespaces)`` or
661``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
662namespaces is enabled.
663
664C++11 lambdas
665^^^^^^^^^^^^^
666
667Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
668determine if support for lambdas is enabled.
669
670C++11 local and unnamed types as template arguments
671^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
672
673Use ``__has_feature(cxx_local_type_template_args)`` or
674``__has_extension(cxx_local_type_template_args)`` to determine if support for
675local and unnamed types as template arguments is enabled.
676
677C++11 noexcept
678^^^^^^^^^^^^^^
679
680Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
681determine if support for noexcept exception specifications is enabled.
682
683C++11 in-class non-static data member initialization
684^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
685
686Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
687initialization of non-static data members is enabled.
688
689C++11 ``nullptr``
690^^^^^^^^^^^^^^^^^
691
692Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
693determine if support for ``nullptr`` is enabled.
694
695C++11 ``override control``
696^^^^^^^^^^^^^^^^^^^^^^^^^^
697
698Use ``__has_feature(cxx_override_control)`` or
699``__has_extension(cxx_override_control)`` to determine if support for the
700override control keywords is enabled.
701
702C++11 reference-qualified functions
703^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
704
705Use ``__has_feature(cxx_reference_qualified_functions)`` or
706``__has_extension(cxx_reference_qualified_functions)`` to determine if support
707for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
708applied to ``*this``) is enabled.
709
710C++11 range-based ``for`` loop
711^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
712
713Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
714determine if support for the range-based for loop is enabled.
715
716C++11 raw string literals
717^^^^^^^^^^^^^^^^^^^^^^^^^
718
719Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
720string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
721
722C++11 rvalue references
723^^^^^^^^^^^^^^^^^^^^^^^
724
725Use ``__has_feature(cxx_rvalue_references)`` or
726``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
727references is enabled.
728
729C++11 ``static_assert()``
730^^^^^^^^^^^^^^^^^^^^^^^^^
731
732Use ``__has_feature(cxx_static_assert)`` or
733``__has_extension(cxx_static_assert)`` to determine if support for compile-time
734assertions using ``static_assert`` is enabled.
735
Richard Smith25b555a2013-04-19 17:00:31 +0000736C++11 ``thread_local``
737^^^^^^^^^^^^^^^^^^^^^^
738
739Use ``__has_feature(cxx_thread_local)`` to determine if support for
740``thread_local`` variables is enabled.
741
Sean Silva709c44d2012-12-12 23:44:55 +0000742C++11 type inference
743^^^^^^^^^^^^^^^^^^^^
744
745Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
746determine C++11 type inference is supported using the ``auto`` specifier. If
747this is disabled, ``auto`` will instead be a storage class specifier, as in C
748or C++98.
749
750C++11 strongly typed enumerations
751^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
752
753Use ``__has_feature(cxx_strong_enums)`` or
754``__has_extension(cxx_strong_enums)`` to determine if support for strongly
755typed, scoped enumerations is enabled.
756
757C++11 trailing return type
758^^^^^^^^^^^^^^^^^^^^^^^^^^
759
760Use ``__has_feature(cxx_trailing_return)`` or
761``__has_extension(cxx_trailing_return)`` to determine if support for the
762alternate function declaration syntax with trailing return type is enabled.
763
764C++11 Unicode string literals
765^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
766
767Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
768string literals is enabled.
769
770C++11 unrestricted unions
771^^^^^^^^^^^^^^^^^^^^^^^^^
772
773Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
774unrestricted unions is enabled.
775
776C++11 user-defined literals
777^^^^^^^^^^^^^^^^^^^^^^^^^^^
778
779Use ``__has_feature(cxx_user_literals)`` to determine if support for
780user-defined literals is enabled.
781
782C++11 variadic templates
783^^^^^^^^^^^^^^^^^^^^^^^^
784
785Use ``__has_feature(cxx_variadic_templates)`` or
786``__has_extension(cxx_variadic_templates)`` to determine if support for
787variadic templates is enabled.
788
Richard Smith0a715422013-05-07 19:32:56 +0000789C++1y
790-----
791
792The features listed below are part of the committee draft for the C++1y
793standard. As a result, all these features are enabled with the ``-std=c++1y``
794or ``-std=gnu++1y`` option when compiling C++ code.
795
796C++1y binary literals
797^^^^^^^^^^^^^^^^^^^^^
798
799Use ``__has_feature(cxx_binary_literals)`` or
800``__has_extension(cxx_binary_literals)`` to determine whether
801binary literals (for instance, ``0b10010``) are recognized. Clang supports this
802feature as an extension in all language modes.
803
804C++1y contextual conversions
805^^^^^^^^^^^^^^^^^^^^^^^^^^^^
806
807Use ``__has_feature(cxx_contextual_conversions)`` or
808``__has_extension(cxx_contextual_conversions)`` to determine if the C++1y rules
809are used when performing an implicit conversion for an array bound in a
810*new-expression*, the operand of a *delete-expression*, an integral constant
Richard Smithc0f7b812013-07-24 17:41:31 +0000811expression, or a condition in a ``switch`` statement.
Richard Smith0a715422013-05-07 19:32:56 +0000812
813C++1y decltype(auto)
814^^^^^^^^^^^^^^^^^^^^
815
816Use ``__has_feature(cxx_decltype_auto)`` or
817``__has_extension(cxx_decltype_auto)`` to determine if support
818for the ``decltype(auto)`` placeholder type is enabled.
819
820C++1y default initializers for aggregates
821^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
822
823Use ``__has_feature(cxx_aggregate_nsdmi)`` or
824``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
825for default initializers in aggregate members is enabled.
826
827C++1y generalized lambda capture
828^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
829
Richard Smith4fb09722013-07-24 17:51:13 +0000830Use ``__has_feature(cxx_init_capture)`` or
831``__has_extension(cxx_init_capture)`` to determine if support for
832lambda captures with explicit initializers is enabled
Richard Smith0a715422013-05-07 19:32:56 +0000833(for instance, ``[n(0)] { return ++n; }``).
834Clang does not yet support this feature.
835
836C++1y generic lambdas
837^^^^^^^^^^^^^^^^^^^^^
838
839Use ``__has_feature(cxx_generic_lambda)`` or
840``__has_extension(cxx_generic_lambda)`` to determine if support for generic
841(polymorphic) lambdas is enabled
842(for instance, ``[] (auto x) { return x + 1; }``).
843Clang does not yet support this feature.
844
845C++1y relaxed constexpr
846^^^^^^^^^^^^^^^^^^^^^^^
847
848Use ``__has_feature(cxx_relaxed_constexpr)`` or
849``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
850declarations, local variable modification, and control flow constructs
851are permitted in ``constexpr`` functions.
Richard Smith0a715422013-05-07 19:32:56 +0000852
853C++1y return type deduction
854^^^^^^^^^^^^^^^^^^^^^^^^^^^
855
856Use ``__has_feature(cxx_return_type_deduction)`` or
857``__has_extension(cxx_return_type_deduction)`` to determine if support
858for return type deduction for functions (using ``auto`` as a return type)
859is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000860
861C++1y runtime-sized arrays
862^^^^^^^^^^^^^^^^^^^^^^^^^^
863
864Use ``__has_feature(cxx_runtime_array)`` or
865``__has_extension(cxx_runtime_array)`` to determine if support
866for arrays of runtime bound (a restricted form of variable-length arrays)
867is enabled.
868Clang's implementation of this feature is incomplete.
869
870C++1y variable templates
871^^^^^^^^^^^^^^^^^^^^^^^^
872
873Use ``__has_feature(cxx_variable_templates)`` or
874``__has_extension(cxx_variable_templates)`` to determine if support for
875templated variable declarations is enabled.
Richard Smith0a715422013-05-07 19:32:56 +0000876
Sean Silva709c44d2012-12-12 23:44:55 +0000877C11
878---
879
880The features listed below are part of the C11 standard. As a result, all these
881features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
882compiling C code. Additionally, because these features are all
883backward-compatible, they are available as extensions in all language modes.
884
885C11 alignment specifiers
886^^^^^^^^^^^^^^^^^^^^^^^^
887
888Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
889if support for alignment specifiers using ``_Alignas`` is enabled.
890
891C11 atomic operations
892^^^^^^^^^^^^^^^^^^^^^
893
894Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
895if support for atomic types using ``_Atomic`` is enabled. Clang also provides
896:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
897the ``<stdatomic.h>`` operations on ``_Atomic`` types.
898
899C11 generic selections
900^^^^^^^^^^^^^^^^^^^^^^
901
902Use ``__has_feature(c_generic_selections)`` or
903``__has_extension(c_generic_selections)`` to determine if support for generic
904selections is enabled.
905
906As an extension, the C11 generic selection expression is available in all
907languages supported by Clang. The syntax is the same as that given in the C11
908standard.
909
910In C, type compatibility is decided according to the rules given in the
911appropriate standard, but in C++, which lacks the type compatibility rules used
912in C, types are considered compatible only if they are equivalent.
913
914C11 ``_Static_assert()``
915^^^^^^^^^^^^^^^^^^^^^^^^
916
917Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
918to determine if support for compile-time assertions using ``_Static_assert`` is
919enabled.
920
Richard Smith25b555a2013-04-19 17:00:31 +0000921C11 ``_Thread_local``
922^^^^^^^^^^^^^^^^^^^^^
923
Ed Schouten401aeba2013-09-14 16:17:20 +0000924Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
925to determine if support for ``_Thread_local`` variables is enabled.
Richard Smith25b555a2013-04-19 17:00:31 +0000926
Sean Silva709c44d2012-12-12 23:44:55 +0000927Checks for Type Traits
928======================
929
930Clang supports the `GNU C++ type traits
931<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
932`Microsoft Visual C++ Type traits
933<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_. For each
934supported type trait ``__X``, ``__has_extension(X)`` indicates the presence of
935the type trait. For example:
936
937.. code-block:: c++
938
939 #if __has_extension(is_convertible_to)
940 template<typename From, typename To>
941 struct is_convertible_to {
942 static const bool value = __is_convertible_to(From, To);
943 };
944 #else
945 // Emulate type trait
946 #endif
947
948The following type traits are supported by Clang:
949
950* ``__has_nothrow_assign`` (GNU, Microsoft)
951* ``__has_nothrow_copy`` (GNU, Microsoft)
952* ``__has_nothrow_constructor`` (GNU, Microsoft)
953* ``__has_trivial_assign`` (GNU, Microsoft)
954* ``__has_trivial_copy`` (GNU, Microsoft)
955* ``__has_trivial_constructor`` (GNU, Microsoft)
956* ``__has_trivial_destructor`` (GNU, Microsoft)
957* ``__has_virtual_destructor`` (GNU, Microsoft)
958* ``__is_abstract`` (GNU, Microsoft)
959* ``__is_base_of`` (GNU, Microsoft)
960* ``__is_class`` (GNU, Microsoft)
961* ``__is_convertible_to`` (Microsoft)
962* ``__is_empty`` (GNU, Microsoft)
963* ``__is_enum`` (GNU, Microsoft)
964* ``__is_interface_class`` (Microsoft)
965* ``__is_pod`` (GNU, Microsoft)
966* ``__is_polymorphic`` (GNU, Microsoft)
967* ``__is_union`` (GNU, Microsoft)
968* ``__is_literal(type)``: Determines whether the given type is a literal type
969* ``__is_final``: Determines whether the given type is declared with a
970 ``final`` class-virt-specifier.
971* ``__underlying_type(type)``: Retrieves the underlying type for a given
972 ``enum`` type. This trait is required to implement the C++11 standard
973 library.
974* ``__is_trivially_assignable(totype, fromtype)``: Determines whether a value
975 of type ``totype`` can be assigned to from a value of type ``fromtype`` such
976 that no non-trivial functions are called as part of that assignment. This
977 trait is required to implement the C++11 standard library.
978* ``__is_trivially_constructible(type, argtypes...)``: Determines whether a
979 value of type ``type`` can be direct-initialized with arguments of types
980 ``argtypes...`` such that no non-trivial functions are called as part of
981 that initialization. This trait is required to implement the C++11 standard
982 library.
983
984Blocks
985======
986
987The syntax and high level language feature description is in
Michael Gottesman6fd58462013-01-07 22:24:45 +0000988:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
989the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
Sean Silva709c44d2012-12-12 23:44:55 +0000990
991Query for this feature with ``__has_extension(blocks)``.
992
993Objective-C Features
994====================
995
996Related result types
997--------------------
998
999According to Cocoa conventions, Objective-C methods with certain names
1000("``init``", "``alloc``", etc.) always return objects that are an instance of
1001the receiving class's type. Such methods are said to have a "related result
1002type", meaning that a message send to one of these methods will have the same
1003static type as an instance of the receiver class. For example, given the
1004following classes:
1005
1006.. code-block:: objc
1007
1008 @interface NSObject
1009 + (id)alloc;
1010 - (id)init;
1011 @end
1012
1013 @interface NSArray : NSObject
1014 @end
1015
1016and this common initialization pattern
1017
1018.. code-block:: objc
1019
1020 NSArray *array = [[NSArray alloc] init];
1021
1022the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1023``alloc`` implicitly has a related result type. Similarly, the type of the
1024expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1025related result type and its receiver is known to have the type ``NSArray *``.
1026If neither ``alloc`` nor ``init`` had a related result type, the expressions
1027would have had type ``id``, as declared in the method signature.
1028
1029A method with a related result type can be declared by using the type
1030``instancetype`` as its result type. ``instancetype`` is a contextual keyword
1031that is only permitted in the result type of an Objective-C method, e.g.
1032
1033.. code-block:: objc
1034
1035 @interface A
1036 + (instancetype)constructAnA;
1037 @end
1038
1039The related result type can also be inferred for some methods. To determine
1040whether a method has an inferred related result type, the first word in the
1041camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1042and the method will have a related result type if its return type is compatible
1043with the type of its class and if:
1044
1045* the first word is "``alloc``" or "``new``", and the method is a class method,
1046 or
1047
1048* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1049 and the method is an instance method.
1050
1051If a method with a related result type is overridden by a subclass method, the
1052subclass method must also return a type that is compatible with the subclass
1053type. For example:
1054
1055.. code-block:: objc
1056
1057 @interface NSString : NSObject
1058 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1059 @end
1060
1061Related result types only affect the type of a message send or property access
1062via the given method. In all other respects, a method with a related result
1063type is treated the same way as method that returns ``id``.
1064
1065Use ``__has_feature(objc_instancetype)`` to determine whether the
1066``instancetype`` contextual keyword is available.
1067
1068Automatic reference counting
1069----------------------------
1070
Sean Silva173d2522013-01-02 13:07:47 +00001071Clang provides support for :doc:`automated reference counting
1072<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
Sean Silva709c44d2012-12-12 23:44:55 +00001073for manual ``retain``/``release``/``autorelease`` message sends. There are two
1074feature macros associated with automatic reference counting:
1075``__has_feature(objc_arc)`` indicates the availability of automated reference
1076counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1077automated reference counting also includes support for ``__weak`` pointers to
1078Objective-C objects.
1079
Sean Silva173d2522013-01-02 13:07:47 +00001080.. _objc-fixed-enum:
1081
Sean Silva709c44d2012-12-12 23:44:55 +00001082Enumerations with a fixed underlying type
1083-----------------------------------------
1084
1085Clang provides support for C++11 enumerations with a fixed underlying type
1086within Objective-C. For example, one can write an enumeration type as:
1087
1088.. code-block:: c++
1089
1090 typedef enum : unsigned char { Red, Green, Blue } Color;
1091
1092This specifies that the underlying type, which is used to store the enumeration
1093value, is ``unsigned char``.
1094
1095Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1096underlying types is available in Objective-C.
1097
1098Interoperability with C++11 lambdas
1099-----------------------------------
1100
1101Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1102permitting a lambda to be implicitly converted to a block pointer with the
1103corresponding signature. For example, consider an API such as ``NSArray``'s
1104array-sorting method:
1105
1106.. code-block:: objc
1107
1108 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1109
1110``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1111(^)(id, id)``, and parameters of this type are generally provided with block
1112literals as arguments. However, one can also use a C++11 lambda so long as it
1113provides the same signature (in this case, accepting two parameters of type
1114``id`` and returning an ``NSComparisonResult``):
1115
1116.. code-block:: objc
1117
1118 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1119 @"String 02"];
1120 const NSStringCompareOptions comparisonOptions
1121 = NSCaseInsensitiveSearch | NSNumericSearch |
1122 NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1123 NSLocale *currentLocale = [NSLocale currentLocale];
1124 NSArray *sorted
1125 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1126 NSRange string1Range = NSMakeRange(0, [s1 length]);
1127 return [s1 compare:s2 options:comparisonOptions
1128 range:string1Range locale:currentLocale];
1129 }];
1130 NSLog(@"sorted: %@", sorted);
1131
1132This code relies on an implicit conversion from the type of the lambda
1133expression (an unnamed, local class type called the *closure type*) to the
1134corresponding block pointer type. The conversion itself is expressed by a
1135conversion operator in that closure type that produces a block pointer with the
1136same signature as the lambda itself, e.g.,
1137
1138.. code-block:: objc
1139
1140 operator NSComparisonResult (^)(id, id)() const;
1141
1142This conversion function returns a new block that simply forwards the two
1143parameters to the lambda object (which it captures by copy), then returns the
1144result. The returned block is first copied (with ``Block_copy``) and then
1145autoreleased. As an optimization, if a lambda expression is immediately
1146converted to a block pointer (as in the first example, above), then the block
1147is not copied and autoreleased: rather, it is given the same lifetime as a
1148block literal written at that point in the program, which avoids the overhead
1149of copying a block to the heap in the common case.
1150
1151The conversion from a lambda to a block pointer is only available in
1152Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1153management (autorelease).
1154
1155Object Literals and Subscripting
1156--------------------------------
1157
Sean Silva173d2522013-01-02 13:07:47 +00001158Clang provides support for :doc:`Object Literals and Subscripting
1159<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
Sean Silva709c44d2012-12-12 23:44:55 +00001160programming patterns, makes programs more concise, and improves the safety of
1161container creation. There are several feature macros associated with object
1162literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1163availability of array literals; ``__has_feature(objc_dictionary_literals)``
1164tests the availability of dictionary literals;
1165``__has_feature(objc_subscripting)`` tests the availability of object
1166subscripting.
1167
1168Objective-C Autosynthesis of Properties
1169---------------------------------------
1170
1171Clang provides support for autosynthesis of declared properties. Using this
1172feature, clang provides default synthesis of those properties not declared
1173@dynamic and not having user provided backing getter and setter methods.
1174``__has_feature(objc_default_synthesize_properties)`` checks for availability
1175of this feature in version of clang being used.
1176
Jordan Rose32e94892012-12-15 00:37:01 +00001177.. _langext-objc_method_family:
1178
Ted Kremenekc3481f42013-10-23 22:14:59 +00001179
Ted Kremenek7f7a4832013-10-23 22:41:52 +00001180Objective-C requiring a call to ``super`` in an override
1181--------------------------------------------------------
Ted Kremenekf2ee81d2013-10-23 22:15:01 +00001182
Ted Kremenek7f7a4832013-10-23 22:41:52 +00001183Some Objective-C classes allow a subclass to override a particular method in a
Warren Hunte0bc9802013-10-24 00:59:24 +00001184parent class but expect that the overriding method also calls the overridden
1185method in the parent class. For these cases, we provide an attribute to
1186designate that a method requires a "call to ``super``" in the overriding
1187method in the subclass.
Ted Kremenekf2ee81d2013-10-23 22:15:01 +00001188
Warren Hunte0bc9802013-10-24 00:59:24 +00001189**Usage**: ``__attribute__((objc_requires_super))``. This attribute can only
1190be placed at the end of a method declaration:
Ted Kremenekf2ee81d2013-10-23 22:15:01 +00001191
1192.. code-block:: objc
1193
1194 - (void)foo __attribute__((objc_requires_super));
1195
Warren Hunte0bc9802013-10-24 00:59:24 +00001196This attribute can only be applied the method declarations within a class, and
1197not a protocol. Currently this attribute does not enforce any placement of
1198where the call occurs in the overriding method (such as in the case of
1199``-dealloc`` where the call must appear at the end). It checks only that it
1200exists.
Ted Kremenekf2ee81d2013-10-23 22:15:01 +00001201
1202Note that on both OS X and iOS that the Foundation framework provides a
Ted Kremenek620cde32013-10-23 22:25:59 +00001203convenience macro ``NS_REQUIRES_SUPER`` that provides syntactic sugar for this
Ted Kremenekf2ee81d2013-10-23 22:15:01 +00001204attribute:
1205
1206.. code-block:: objc
1207
1208 - (void)foo NS_REQUIRES_SUPER;
1209
1210This macro is conditionally defined depending on the compiler's support for
1211this attribute. If the compiler does not support the attribute the macro
1212expands to nothing.
1213
1214Operationally, when a method has this annotation the compiler will warn if the
1215implementation of an override in a subclass does not call super. For example:
1216
1217.. code-block:: objc
1218
1219 warning: method possibly missing a [super AnnotMeth] call
1220 - (void) AnnotMeth{};
1221 ^
1222
Ted Kremenekc3481f42013-10-23 22:14:59 +00001223Objective-C Method Families
1224---------------------------
Jordan Rose32e94892012-12-15 00:37:01 +00001225
1226Many methods in Objective-C have conventional meanings determined by their
1227selectors. It is sometimes useful to be able to mark a method as having a
1228particular conventional meaning despite not having the right selector, or as
1229not having the conventional meaning that its selector would suggest. For these
1230use cases, we provide an attribute to specifically describe the "method family"
1231that a method belongs to.
1232
1233**Usage**: ``__attribute__((objc_method_family(X)))``, where ``X`` is one of
1234``none``, ``alloc``, ``copy``, ``init``, ``mutableCopy``, or ``new``. This
1235attribute can only be placed at the end of a method declaration:
1236
1237.. code-block:: objc
1238
1239 - (NSString *)initMyStringValue __attribute__((objc_method_family(none)));
1240
1241Users who do not wish to change the conventional meaning of a method, and who
1242merely want to document its non-standard retain and release semantics, should
1243use the :ref:`retaining behavior attributes <langext-objc-retain-release>`
1244described below.
1245
1246Query for this feature with ``__has_attribute(objc_method_family)``.
1247
1248.. _langext-objc-retain-release:
1249
1250Objective-C retaining behavior attributes
1251-----------------------------------------
1252
1253In Objective-C, functions and methods are generally assumed to follow the
1254`Cocoa Memory Management
1255<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1256conventions for ownership of object arguments and
1257return values. However, there are exceptions, and so Clang provides attributes
1258to allow these exceptions to be documented. This are used by ARC and the
1259`static analyzer <http://clang-analyzer.llvm.org>`_ Some exceptions may be
1260better described using the :ref:`objc_method_family
1261<langext-objc_method_family>` attribute instead.
1262
1263**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1264``ns_returns_autoreleased``, ``cf_returns_retained``, and
1265``cf_returns_not_retained`` attributes can be placed on methods and functions
1266that return Objective-C or CoreFoundation objects. They are commonly placed at
1267the end of a function prototype or method declaration:
1268
1269.. code-block:: objc
1270
1271 id foo() __attribute__((ns_returns_retained));
1272
1273 - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1274
1275The ``*_returns_retained`` attributes specify that the returned object has a +1
1276retain count. The ``*_returns_not_retained`` attributes specify that the return
1277object has a +0 retain count, even if the normal convention for its selector
1278would be +1. ``ns_returns_autoreleased`` specifies that the returned object is
1279+0, but is guaranteed to live at least as long as the next flush of an
1280autorelease pool.
1281
1282**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1283an parameter declaration; they specify that the argument is expected to have a
1284+1 retain count, which will be balanced in some way by the function or method.
1285The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1286method; it specifies that the method expects its ``self`` parameter to have a
1287+1 retain count, which it will balance in some way.
1288
1289.. code-block:: objc
1290
1291 void foo(__attribute__((ns_consumed)) NSString *string);
1292
1293 - (void) bar __attribute__((ns_consumes_self));
1294 - (void) baz:(id) __attribute__((ns_consumed)) x;
1295
1296Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1297<http://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1298
1299Query for these features with ``__has_attribute(ns_consumed)``,
1300``__has_attribute(ns_returns_retained)``, etc.
1301
1302
Ted Kremenek84342d62013-10-15 04:28:42 +00001303Objective-C++ ABI: protocol-qualifier mangling of parameters
1304------------------------------------------------------------
1305
1306Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1307type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such
1308parameters to be differentiated from those with the regular unqualified ``id``
1309type.
1310
1311This was a non-backward compatible mangling change to the ABI. This change
1312allows proper overloading, and also prevents mangling conflicts with template
1313parameters of protocol-qualified type.
1314
1315Query the presence of this new mangling with
1316``__has_feature(objc_protocol_qualifier_mangling)``.
1317
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001318.. _langext-overloading:
1319
Sean Silva709c44d2012-12-12 23:44:55 +00001320Function Overloading in C
1321=========================
1322
1323Clang provides support for C++ function overloading in C. Function overloading
1324in C is introduced using the ``overloadable`` attribute. For example, one
1325might provide several overloaded versions of a ``tgsin`` function that invokes
1326the appropriate standard function computing the sine of a value with ``float``,
1327``double``, or ``long double`` precision:
1328
1329.. code-block:: c
1330
1331 #include <math.h>
1332 float __attribute__((overloadable)) tgsin(float x) { return sinf(x); }
1333 double __attribute__((overloadable)) tgsin(double x) { return sin(x); }
1334 long double __attribute__((overloadable)) tgsin(long double x) { return sinl(x); }
1335
1336Given these declarations, one can call ``tgsin`` with a ``float`` value to
1337receive a ``float`` result, with a ``double`` to receive a ``double`` result,
1338etc. Function overloading in C follows the rules of C++ function overloading
1339to pick the best overload given the call arguments, with a few C-specific
1340semantics:
1341
1342* Conversion from ``float`` or ``double`` to ``long double`` is ranked as a
1343 floating-point promotion (per C99) rather than as a floating-point conversion
1344 (as in C++).
1345
1346* A conversion from a pointer of type ``T*`` to a pointer of type ``U*`` is
1347 considered a pointer conversion (with conversion rank) if ``T`` and ``U`` are
1348 compatible types.
1349
1350* A conversion from type ``T`` to a value of type ``U`` is permitted if ``T``
1351 and ``U`` are compatible types. This conversion is given "conversion" rank.
1352
1353The declaration of ``overloadable`` functions is restricted to function
1354declarations and definitions. Most importantly, if any function with a given
1355name is given the ``overloadable`` attribute, then all function declarations
1356and definitions with that name (and in that scope) must have the
1357``overloadable`` attribute. This rule even applies to redeclarations of
1358functions whose original declaration had the ``overloadable`` attribute, e.g.,
1359
1360.. code-block:: c
1361
1362 int f(int) __attribute__((overloadable));
1363 float f(float); // error: declaration of "f" must have the "overloadable" attribute
1364
1365 int g(int) __attribute__((overloadable));
1366 int g(int) { } // error: redeclaration of "g" must also have the "overloadable" attribute
1367
1368Functions marked ``overloadable`` must have prototypes. Therefore, the
1369following code is ill-formed:
1370
1371.. code-block:: c
1372
1373 int h() __attribute__((overloadable)); // error: h does not have a prototype
1374
1375However, ``overloadable`` functions are allowed to use a ellipsis even if there
1376are no named parameters (as is permitted in C++). This feature is particularly
1377useful when combined with the ``unavailable`` attribute:
1378
1379.. code-block:: c++
1380
1381 void honeypot(...) __attribute__((overloadable, unavailable)); // calling me is an error
1382
1383Functions declared with the ``overloadable`` attribute have their names mangled
1384according to the same rules as C++ function names. For example, the three
1385``tgsin`` functions in our motivating example get the mangled names
1386``_Z5tgsinf``, ``_Z5tgsind``, and ``_Z5tgsine``, respectively. There are two
1387caveats to this use of name mangling:
1388
1389* Future versions of Clang may change the name mangling of functions overloaded
1390 in C, so you should not depend on an specific mangling. To be completely
1391 safe, we strongly urge the use of ``static inline`` with ``overloadable``
1392 functions.
1393
1394* The ``overloadable`` attribute has almost no meaning when used in C++,
1395 because names will already be mangled and functions are already overloadable.
1396 However, when an ``overloadable`` function occurs within an ``extern "C"``
1397 linkage specification, it's name *will* be mangled in the same way as it
1398 would in C.
1399
1400Query for this feature with ``__has_extension(attribute_overloadable)``.
1401
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001402Controlling Overload Resolution
1403===============================
1404
1405Clang introduces the ``enable_if`` attribute, which can be placed on function
1406declarations to control which overload is selected based on the values of the
1407function's arguments. When combined with the
1408:ref:``overloadable<langext-overloading>`` attribute, this feature is also
1409available in C.
1410
1411.. code-block:: c++
1412
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001413 int isdigit(int c) __attribute__((enable_if(c >= -1 && c <= 255, "'c' must have the value of an unsigned char or EOF")));
1414
1415 void foo(char c) {
Nick Lewycky35a6ef42014-01-11 02:50:57 +00001416 isdigit(10);
1417 isdigit(-10); // results in a compile-time error.
1418 }
1419
1420The enable_if attribute takes two arguments, the first is an expression written
1421in terms of the function parameters, the second is a string explaining why this
1422overload candidate could not be selected to be displayed in diagnostics. The
1423expression is part of the function signature for the purposes of determining
1424whether it is a redeclaration (following the rules used when determining
1425whether a C++ template specialization is ODR-equivalent), but is not part of
1426the type.
1427
1428An enable_if expression will be evaluated by substituting the values of the
1429parameters from the call site into the arguments in the expression and
1430determining whether the result is true. If the result is false or could not be
1431determined through constant expression evaluation, then this overload will not
1432be chosen and the reason supplied in the string will be given to the user if
1433their code does not compile as a result.
1434
1435Because the enable_if expression is an unevaluated context, there are no global
1436state changes, nor the ability to pass information from the enable_if
1437expression to the function body. For example, suppose we want calls to
1438strnlen(strbuf, maxlen) to resolve to strnlen_chk(strbuf, maxlen, size of
1439strbuf) only if the size of strbuf can be determined:
1440
1441.. code-block:: c++
1442
1443 __attribute__((always_inline))
1444 static inline size_t strnlen(const char *s, size_t maxlen)
1445 __attribute__((overloadable))
1446 __attribute__((enable_if(__builtin_object_size(s, 0) != -1))),
1447 "chosen when the buffer size is known but 'maxlen' is not")))
1448 {
1449 return strnlen_chk(s, maxlen, __builtin_object_size(s, 0));
1450 }
1451
1452Multiple enable_if attributes may be applied to a single declaration. In this
1453case, the enable_if expressions are evaluated from left to right in the
1454following manner. First, the candidates whose enable_if expressions evaluate to
1455false or cannot be evaluated are discarded. If the remaining candidates do not
1456share ODR-equivalent enable_if expressions, the overload resolution is
1457ambiguous. Otherwise, enable_if overload resolution continues with the next
1458enable_if attribute on the candidates that have not been discarded and have
1459remaining enable_if attributes. In this way, we pick the most specific
1460overload out of a number of viable overloads using enable_if.
1461
1462.. code-block:: c++
1463 void f() __attribute__((enable_if(true, ""))); // #1
1464 void f() __attribute__((enable_if(true, ""))) __attribute__((enable_if(true, ""))); // #2
1465
1466 void g(int i, int j) __attribute__((enable_if(i, ""))); // #1
1467 void g(int i, int j) __attribute__((enable_if(j, ""))) __attribute__((enable_if(true))); // #2
1468
1469In this example, a call to f() is always resolved to #2, as the first enable_if
1470expression is ODR-equivalent for both declarations, but #1 does not have another
1471enable_if expression to continue evaluating, so the next round of evaluation has
1472only a single candidate. In a call to g(1, 1), the call is ambiguous even though
1473#2 has more enable_if attributes, because the first enable_if expressions are
1474not ODR-equivalent.
1475
1476Query for this feature with ``__has_attribute(enable_if)``.
1477
Sean Silva709c44d2012-12-12 23:44:55 +00001478Initializer lists for complex numbers in C
1479==========================================
1480
1481clang supports an extension which allows the following in C:
1482
1483.. code-block:: c++
1484
1485 #include <math.h>
1486 #include <complex.h>
1487 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1488
1489This construct is useful because there is no way to separately initialize the
1490real and imaginary parts of a complex variable in standard C, given that clang
1491does not support ``_Imaginary``. (Clang also supports the ``__real__`` and
1492``__imag__`` extensions from gcc, which help in some cases, but are not usable
1493in static initializers.)
1494
1495Note that this extension does not allow eliding the braces; the meaning of the
1496following two lines is different:
1497
1498.. code-block:: c++
1499
1500 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1501 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1502
1503This extension also works in C++ mode, as far as that goes, but does not apply
1504to the C++ ``std::complex``. (In C++11, list initialization allows the same
1505syntax to be used with ``std::complex`` with the same meaning.)
1506
1507Builtin Functions
1508=================
1509
1510Clang supports a number of builtin library functions with the same syntax as
1511GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
1512``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
1513``__sync_fetch_and_add``, etc. In addition to the GCC builtins, Clang supports
1514a number of builtins that GCC does not, which are listed here.
1515
1516Please note that Clang does not and will not support all of the GCC builtins
1517for vector operations. Instead of using builtins, you should use the functions
1518defined in target-specific header files like ``<xmmintrin.h>``, which define
1519portable wrappers for these. Many of the Clang versions of these functions are
1520implemented directly in terms of :ref:`extended vector support
1521<langext-vectors>` instead of builtins, in order to reduce the number of
1522builtins that we need to implement.
1523
1524``__builtin_readcyclecounter``
1525------------------------------
1526
1527``__builtin_readcyclecounter`` is used to access the cycle counter register (or
1528a similar low-latency, high-accuracy clock) on those targets that support it.
1529
1530**Syntax**:
1531
1532.. code-block:: c++
1533
1534 __builtin_readcyclecounter()
1535
1536**Example of Use**:
1537
1538.. code-block:: c++
1539
1540 unsigned long long t0 = __builtin_readcyclecounter();
1541 do_something();
1542 unsigned long long t1 = __builtin_readcyclecounter();
1543 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
1544
1545**Description**:
1546
1547The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
1548which may be either global or process/thread-specific depending on the target.
1549As the backing counters often overflow quickly (on the order of seconds) this
1550should only be used for timing small intervals. When not supported by the
1551target, the return value is always zero. This builtin takes no arguments and
1552produces an unsigned long long result.
1553
Tim Northoverbfe2e5f72013-05-23 19:14:12 +00001554Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
1555that even if present, its use may depend on run-time privilege or other OS
1556controlled state.
Sean Silva709c44d2012-12-12 23:44:55 +00001557
1558.. _langext-__builtin_shufflevector:
1559
1560``__builtin_shufflevector``
1561---------------------------
1562
1563``__builtin_shufflevector`` is used to express generic vector
1564permutation/shuffle/swizzle operations. This builtin is also very important
1565for the implementation of various target-specific header files like
1566``<xmmintrin.h>``.
1567
1568**Syntax**:
1569
1570.. code-block:: c++
1571
1572 __builtin_shufflevector(vec1, vec2, index1, index2, ...)
1573
1574**Examples**:
1575
1576.. code-block:: c++
1577
Craig Topper50ad5b72013-08-03 17:40:38 +00001578 // identity operation - return 4-element vector v1.
1579 __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
Sean Silva709c44d2012-12-12 23:44:55 +00001580
1581 // "Splat" element 0 of V1 into a 4-element result.
1582 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1583
1584 // Reverse 4-element vector V1.
1585 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1586
1587 // Concatenate every other element of 4-element vectors V1 and V2.
1588 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1589
1590 // Concatenate every other element of 8-element vectors V1 and V2.
1591 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
1592
Craig Topper50ad5b72013-08-03 17:40:38 +00001593 // Shuffle v1 with some elements being undefined
1594 __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
1595
Sean Silva709c44d2012-12-12 23:44:55 +00001596**Description**:
1597
1598The first two arguments to ``__builtin_shufflevector`` are vectors that have
1599the same element type. The remaining arguments are a list of integers that
1600specify the elements indices of the first two vectors that should be extracted
1601and returned in a new vector. These element indices are numbered sequentially
1602starting with the first vector, continuing into the second vector. Thus, if
1603``vec1`` is a 4-element vector, index 5 would refer to the second element of
Craig Topper50ad5b72013-08-03 17:40:38 +00001604``vec2``. An index of -1 can be used to indicate that the corresponding element
1605in the returned vector is a don't care and can be optimized by the backend.
Sean Silva709c44d2012-12-12 23:44:55 +00001606
1607The result of ``__builtin_shufflevector`` is a vector with the same element
1608type as ``vec1``/``vec2`` but that has an element count equal to the number of
1609indices specified.
1610
1611Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
1612
Hal Finkelc4d7c822013-09-18 03:29:45 +00001613``__builtin_convertvector``
1614---------------------------
1615
1616``__builtin_convertvector`` is used to express generic vector
1617type-conversion operations. The input vector and the output vector
1618type must have the same number of elements.
1619
1620**Syntax**:
1621
1622.. code-block:: c++
1623
1624 __builtin_convertvector(src_vec, dst_vec_type)
1625
1626**Examples**:
1627
1628.. code-block:: c++
1629
1630 typedef double vector4double __attribute__((__vector_size__(32)));
1631 typedef float vector4float __attribute__((__vector_size__(16)));
1632 typedef short vector4short __attribute__((__vector_size__(8)));
1633 vector4float vf; vector4short vs;
1634
1635 // convert from a vector of 4 floats to a vector of 4 doubles.
1636 __builtin_convertvector(vf, vector4double)
1637 // equivalent to:
1638 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
1639
1640 // convert from a vector of 4 shorts to a vector of 4 floats.
1641 __builtin_convertvector(vs, vector4float)
1642 // equivalent to:
1643 (vector4float) { (float) vf[0], (float) vf[1], (float) vf[2], (float) vf[3] }
1644
1645**Description**:
1646
1647The first argument to ``__builtin_convertvector`` is a vector, and the second
1648argument is a vector type with the same number of elements as the first
1649argument.
1650
1651The result of ``__builtin_convertvector`` is a vector with the same element
1652type as the second argument, with a value defined in terms of the action of a
1653C-style cast applied to each element of the first argument.
1654
1655Query for this feature with ``__has_builtin(__builtin_convertvector)``.
1656
Sean Silva709c44d2012-12-12 23:44:55 +00001657``__builtin_unreachable``
1658-------------------------
1659
1660``__builtin_unreachable`` is used to indicate that a specific point in the
1661program cannot be reached, even if the compiler might otherwise think it can.
1662This is useful to improve optimization and eliminates certain warnings. For
1663example, without the ``__builtin_unreachable`` in the example below, the
1664compiler assumes that the inline asm can fall through and prints a "function
1665declared '``noreturn``' should not return" warning.
1666
1667**Syntax**:
1668
1669.. code-block:: c++
1670
1671 __builtin_unreachable()
1672
1673**Example of use**:
1674
1675.. code-block:: c++
1676
1677 void myabort(void) __attribute__((noreturn));
1678 void myabort(void) {
1679 asm("int3");
1680 __builtin_unreachable();
1681 }
1682
1683**Description**:
1684
1685The ``__builtin_unreachable()`` builtin has completely undefined behavior.
1686Since it has undefined behavior, it is a statement that it is never reached and
1687the optimizer can take advantage of this to produce better code. This builtin
1688takes no arguments and produces a void result.
1689
1690Query for this feature with ``__has_builtin(__builtin_unreachable)``.
1691
1692``__sync_swap``
1693---------------
1694
1695``__sync_swap`` is used to atomically swap integers or pointers in memory.
1696
1697**Syntax**:
1698
1699.. code-block:: c++
1700
1701 type __sync_swap(type *ptr, type value, ...)
1702
1703**Example of Use**:
1704
1705.. code-block:: c++
1706
1707 int old_value = __sync_swap(&value, new_value);
1708
1709**Description**:
1710
1711The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
1712atomic intrinsics to allow code to atomically swap the current value with the
1713new value. More importantly, it helps developers write more efficient and
1714correct code by avoiding expensive loops around
1715``__sync_bool_compare_and_swap()`` or relying on the platform specific
1716implementation details of ``__sync_lock_test_and_set()``. The
1717``__sync_swap()`` builtin is a full barrier.
1718
Richard Smith6cbd65d2013-07-11 02:27:57 +00001719``__builtin_addressof``
1720-----------------------
1721
1722``__builtin_addressof`` performs the functionality of the built-in ``&``
1723operator, ignoring any ``operator&`` overload. This is useful in constant
1724expressions in C++11, where there is no other way to take the address of an
1725object that overloads ``operator&``.
1726
1727**Example of use**:
1728
1729.. code-block:: c++
1730
1731 template<typename T> constexpr T *addressof(T &value) {
1732 return __builtin_addressof(value);
1733 }
1734
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001735Multiprecision Arithmetic Builtins
1736----------------------------------
1737
1738Clang provides a set of builtins which expose multiprecision arithmetic in a
1739manner amenable to C. They all have the following form:
1740
1741.. code-block:: c
1742
1743 unsigned x = ..., y = ..., carryin = ..., carryout;
1744 unsigned sum = __builtin_addc(x, y, carryin, &carryout);
1745
1746Thus one can form a multiprecision addition chain in the following manner:
1747
1748.. code-block:: c
1749
1750 unsigned *x, *y, *z, carryin=0, carryout;
1751 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
1752 carryin = carryout;
1753 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
1754 carryin = carryout;
1755 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
1756 carryin = carryout;
1757 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
1758
1759The complete list of builtins are:
1760
1761.. code-block:: c
1762
Michael Gottesman15343992013-06-18 20:40:40 +00001763 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001764 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1765 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1766 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1767 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
Michael Gottesman15343992013-06-18 20:40:40 +00001768 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
Michael Gottesmanc5cc9f12013-01-13 04:35:31 +00001769 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
1770 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
1771 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
1772 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
1773
Michael Gottesman930ecdb2013-06-20 23:28:10 +00001774Checked Arithmetic Builtins
1775---------------------------
1776
1777Clang provides a set of builtins that implement checked arithmetic for security
1778critical applications in a manner that is fast and easily expressable in C. As
1779an example of their usage:
1780
1781.. code-block:: c
1782
1783 errorcode_t security_critical_application(...) {
1784 unsigned x, y, result;
1785 ...
1786 if (__builtin_umul_overflow(x, y, &result))
1787 return kErrorCodeHackers;
1788 ...
1789 use_multiply(result);
1790 ...
1791 }
1792
1793A complete enumeration of the builtins are:
1794
1795.. code-block:: c
1796
1797 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
1798 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
1799 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
1800 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
1801 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
1802 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
1803 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
1804 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
1805 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
1806 bool __builtin_sadd_overflow (int x, int y, int *sum);
1807 bool __builtin_saddl_overflow (long x, long y, long *sum);
1808 bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
1809 bool __builtin_ssub_overflow (int x, int y, int *diff);
1810 bool __builtin_ssubl_overflow (long x, long y, long *diff);
1811 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
1812 bool __builtin_smul_overflow (int x, int y, int *prod);
1813 bool __builtin_smull_overflow (long x, long y, long *prod);
1814 bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
1815
1816
Sean Silva709c44d2012-12-12 23:44:55 +00001817.. _langext-__c11_atomic:
1818
1819__c11_atomic builtins
1820---------------------
1821
1822Clang provides a set of builtins which are intended to be used to implement
1823C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the
1824``_explicit`` form of the corresponding C11 operation, and are named with a
1825``__c11_`` prefix. The supported operations are:
1826
1827* ``__c11_atomic_init``
1828* ``__c11_atomic_thread_fence``
1829* ``__c11_atomic_signal_fence``
1830* ``__c11_atomic_is_lock_free``
1831* ``__c11_atomic_store``
1832* ``__c11_atomic_load``
1833* ``__c11_atomic_exchange``
1834* ``__c11_atomic_compare_exchange_strong``
1835* ``__c11_atomic_compare_exchange_weak``
1836* ``__c11_atomic_fetch_add``
1837* ``__c11_atomic_fetch_sub``
1838* ``__c11_atomic_fetch_and``
1839* ``__c11_atomic_fetch_or``
1840* ``__c11_atomic_fetch_xor``
1841
Tim Northover6aacd492013-07-16 09:47:53 +00001842Low-level ARM exclusive memory builtins
1843---------------------------------------
1844
1845Clang provides overloaded builtins giving direct access to the three key ARM
1846instructions for implementing atomic operations.
1847
1848.. code-block:: c
Sean Silvaa928c242013-09-09 19:50:40 +00001849
Tim Northover6aacd492013-07-16 09:47:53 +00001850 T __builtin_arm_ldrex(const volatile T *addr);
1851 int __builtin_arm_strex(T val, volatile T *addr);
1852 void __builtin_arm_clrex(void);
1853
1854The types ``T`` currently supported are:
1855* Integer types with width at most 64 bits.
1856* Floating-point types
1857* Pointer types.
1858
1859Note that the compiler does not guarantee it will not insert stores which clear
1860the exclusive monitor in between an ``ldrex`` and its paired ``strex``. In
1861practice this is only usually a risk when the extra store is on the same cache
1862line as the variable being modified and Clang will only insert stack stores on
1863its own, so it is best not to use these operations on variables with automatic
1864storage duration.
1865
1866Also, loads and stores may be implicit in code written between the ``ldrex`` and
1867``strex``. Clang will not necessarily mitigate the effects of these either, so
1868care should be exercised.
1869
1870For these reasons the higher level atomic primitives should be preferred where
1871possible.
1872
Sean Silva709c44d2012-12-12 23:44:55 +00001873Non-standard C++11 Attributes
1874=============================
1875
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001876Clang's non-standard C++11 attributes live in the ``clang`` attribute
1877namespace.
Sean Silva709c44d2012-12-12 23:44:55 +00001878
1879The ``clang::fallthrough`` attribute
1880------------------------------------
1881
1882The ``clang::fallthrough`` attribute is used along with the
1883``-Wimplicit-fallthrough`` argument to annotate intentional fall-through
1884between switch labels. It can only be applied to a null statement placed at a
1885point of execution between any statement and the next switch label. It is
1886common to mark these places with a specific comment, but this attribute is
1887meant to replace comments with a more strict annotation, which can be checked
1888by the compiler. This attribute doesn't change semantics of the code and can
1889be used wherever an intended fall-through occurs. It is designed to mimic
1890control-flow statements like ``break;``, so it can be placed in most places
1891where ``break;`` can, but only if there are no statements on the execution path
1892between it and the next switch label.
1893
1894Here is an example:
1895
1896.. code-block:: c++
1897
1898 // compile with -Wimplicit-fallthrough
1899 switch (n) {
1900 case 22:
1901 case 33: // no warning: no statements between case labels
1902 f();
1903 case 44: // warning: unannotated fall-through
1904 g();
1905 [[clang::fallthrough]];
1906 case 55: // no warning
1907 if (x) {
1908 h();
1909 break;
1910 }
1911 else {
1912 i();
1913 [[clang::fallthrough]];
1914 }
1915 case 66: // no warning
1916 p();
1917 [[clang::fallthrough]]; // warning: fallthrough annotation does not
1918 // directly precede case label
1919 q();
1920 case 77: // warning: unannotated fall-through
1921 r();
1922 }
1923
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001924``gnu::`` attributes
1925--------------------
1926
1927Clang also supports GCC's ``gnu`` attribute namespace. All GCC attributes which
1928are accepted with the ``__attribute__((foo))`` syntax are also accepted as
1929``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
1930(see the list of `GCC function attributes
1931<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
1932attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
1933`GCC type attributes
Richard Smithccfc9ff2013-07-11 00:27:05 +00001934<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
Richard Smithf6d2d3b2013-02-14 00:13:34 +00001935implementation, these attributes must appertain to the *declarator-id* in a
1936declaration, which means they must go either at the start of the declaration or
1937immediately after the name being declared.
1938
1939For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
1940also applies the GNU ``noreturn`` attribute to ``f``.
1941
1942.. code-block:: c++
1943
1944 [[gnu::unused]] int a, f [[gnu::noreturn]] ();
1945
Sean Silva709c44d2012-12-12 23:44:55 +00001946Target-Specific Extensions
1947==========================
1948
1949Clang supports some language features conditionally on some targets.
1950
1951X86/X86-64 Language Extensions
1952------------------------------
1953
1954The X86 backend has these language extensions:
1955
1956Memory references off the GS segment
1957^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1958
1959Annotating a pointer with address space #256 causes it to be code generated
1960relative to the X86 GS segment register, and address space #257 causes it to be
1961relative to the X86 FS segment. Note that this is a very very low-level
1962feature that should only be used if you know what you're doing (for example in
1963an OS kernel).
1964
1965Here is an example:
1966
1967.. code-block:: c++
1968
1969 #define GS_RELATIVE __attribute__((address_space(256)))
1970 int foo(int GS_RELATIVE *P) {
1971 return *P;
1972 }
1973
1974Which compiles to (on X86-32):
1975
1976.. code-block:: gas
1977
1978 _foo:
1979 movl 4(%esp), %eax
1980 movl %gs:(%eax), %eax
1981 ret
1982
Tim Northovera484bc02013-10-01 14:34:25 +00001983ARM Language Extensions
1984-----------------------
1985
1986Interrupt attribute
1987^^^^^^^^^^^^^^^^^^^
1988
Alp Toker3b557ba2013-12-03 06:53:39 +00001989Clang supports the GNU style ``__attribute__((interrupt("TYPE")))`` attribute on
1990ARM targets. This attribute may be attached to a function definition and
Tim Northovera484bc02013-10-01 14:34:25 +00001991instructs the backend to generate appropriate function entry/exit code so that
1992it can be used directly as an interrupt service routine.
1993
1994 The parameter passed to the interrupt attribute is optional, but if
1995provided it must be a string literal with one of the following values: "IRQ",
1996"FIQ", "SWI", "ABORT", "UNDEF".
1997
1998The semantics are as follows:
1999
2000- If the function is AAPCS, Clang instructs the backend to realign the stack to
2001 8 bytes on entry. This is a general requirement of the AAPCS at public
2002 interfaces, but may not hold when an exception is taken. Doing this allows
2003 other AAPCS functions to be called.
2004- If the CPU is M-class this is all that needs to be done since the architecture
2005 itself is designed in such a way that functions obeying the normal AAPCS ABI
2006 constraints are valid exception handlers.
2007- If the CPU is not M-class, the prologue and epilogue are modified to save all
2008 non-banked registers that are used, so that upon return the user-mode state
2009 will not be corrupted. Note that to avoid unnecessary overhead, only
2010 general-purpose (integer) registers are saved in this way. If VFP operations
2011 are needed, that state must be saved manually.
2012
2013 Specifically, interrupt kinds other than "FIQ" will save all core registers
2014 except "lr" and "sp". "FIQ" interrupts will save r0-r7.
2015- If the CPU is not M-class, the return instruction is changed to one of the
2016 canonical sequences permitted by the architecture for exception return. Where
2017 possible the function itself will make the necessary "lr" adjustments so that
2018 the "preferred return address" is selected.
2019
Tim Northovera77b7b82013-10-01 14:39:43 +00002020 Unfortunately the compiler is unable to make this guarantee for an "UNDEF"
Tim Northovera484bc02013-10-01 14:34:25 +00002021 handler, where the offset from "lr" to the preferred return address depends on
2022 the execution state of the code which generated the exception. In this case
2023 a sequence equivalent to "movs pc, lr" will be used.
2024
Jordan Rose32e94892012-12-15 00:37:01 +00002025Extensions for Static Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002026==============================
Sean Silva709c44d2012-12-12 23:44:55 +00002027
2028Clang supports additional attributes that are useful for documenting program
Jordan Rose32e94892012-12-15 00:37:01 +00002029invariants and rules for static analysis tools, such as the `Clang Static
2030Analyzer <http://clang-analyzer.llvm.org/>`_. These attributes are documented
2031in the analyzer's `list of source-level annotations
2032<http://clang-analyzer.llvm.org/annotations.html>`_.
Sean Silva709c44d2012-12-12 23:44:55 +00002033
Sean Silva709c44d2012-12-12 23:44:55 +00002034
Jordan Rose32e94892012-12-15 00:37:01 +00002035Extensions for Dynamic Analysis
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002036===============================
Sean Silva709c44d2012-12-12 23:44:55 +00002037
2038.. _langext-address_sanitizer:
2039
2040AddressSanitizer
2041----------------
2042
2043Use ``__has_feature(address_sanitizer)`` to check if the code is being built
Dmitri Gribenkoace09a22012-12-15 14:25:25 +00002044with :doc:`AddressSanitizer`.
Sean Silva709c44d2012-12-12 23:44:55 +00002045
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002046Use ``__attribute__((no_sanitize_address))``
2047on a function declaration
Sean Silva709c44d2012-12-12 23:44:55 +00002048to specify that address safety instrumentation (e.g. AddressSanitizer) should
2049not be applied to that function.
2050
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002051.. _langext-thread_sanitizer:
2052
2053ThreadSanitizer
2054----------------
2055
2056Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
2057with :doc:`ThreadSanitizer`.
2058
2059Use ``__attribute__((no_sanitize_thread))`` on a function declaration
2060to specify that checks for data races on plain (non-atomic) memory accesses
2061should not be inserted by ThreadSanitizer.
Dmitry Vyukovae4ea1d2013-10-17 08:06:19 +00002062The function is still instrumented by the tool to avoid false positives and
2063provide meaningful stack traces.
Kostya Serebryany4c0fc992013-02-26 06:58:27 +00002064
2065.. _langext-memory_sanitizer:
2066
2067MemorySanitizer
2068----------------
2069Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
2070with :doc:`MemorySanitizer`.
2071
2072Use ``__attribute__((no_sanitize_memory))`` on a function declaration
2073to specify that checks for uninitialized memory should not be inserted
2074(e.g. by MemorySanitizer). The function may still be instrumented by the tool
2075to avoid false positives in other places.
2076
2077
Sean Silva709c44d2012-12-12 23:44:55 +00002078Thread-Safety Annotation Checking
2079=================================
2080
2081Clang supports additional attributes for checking basic locking policies in
2082multithreaded programs. Clang currently parses the following list of
2083attributes, although **the implementation for these annotations is currently in
2084development.** For more details, see the `GCC implementation
2085<http://gcc.gnu.org/wiki/ThreadSafetyAnnotation>`_.
2086
2087``no_thread_safety_analysis``
2088-----------------------------
2089
2090Use ``__attribute__((no_thread_safety_analysis))`` on a function declaration to
2091specify that the thread safety analysis should not be run on that function.
2092This attribute provides an escape hatch (e.g. for situations when it is
2093difficult to annotate the locking policy).
2094
2095``lockable``
2096------------
2097
2098Use ``__attribute__((lockable))`` on a class definition to specify that it has
2099a lockable type (e.g. a Mutex class). This annotation is primarily used to
2100check consistency.
2101
2102``scoped_lockable``
2103-------------------
2104
2105Use ``__attribute__((scoped_lockable))`` on a class definition to specify that
2106it has a "scoped" lockable type. Objects of this type will acquire the lock
2107upon construction and release it upon going out of scope. This annotation is
2108primarily used to check consistency.
2109
2110``guarded_var``
2111---------------
2112
2113Use ``__attribute__((guarded_var))`` on a variable declaration to specify that
2114the variable must be accessed while holding some lock.
2115
2116``pt_guarded_var``
2117------------------
2118
2119Use ``__attribute__((pt_guarded_var))`` on a pointer declaration to specify
2120that the pointer must be dereferenced while holding some lock.
2121
2122``guarded_by(l)``
2123-----------------
2124
2125Use ``__attribute__((guarded_by(l)))`` on a variable declaration to specify
2126that the variable must be accessed while holding lock ``l``.
2127
2128``pt_guarded_by(l)``
2129--------------------
2130
2131Use ``__attribute__((pt_guarded_by(l)))`` on a pointer declaration to specify
2132that the pointer must be dereferenced while holding lock ``l``.
2133
2134``acquired_before(...)``
2135------------------------
2136
2137Use ``__attribute__((acquired_before(...)))`` on a declaration of a lockable
2138variable to specify that the lock must be acquired before all attribute
2139arguments. Arguments must be lockable type, and there must be at least one
2140argument.
2141
2142``acquired_after(...)``
2143-----------------------
2144
2145Use ``__attribute__((acquired_after(...)))`` on a declaration of a lockable
2146variable to specify that the lock must be acquired after all attribute
2147arguments. Arguments must be lockable type, and there must be at least one
2148argument.
2149
2150``exclusive_lock_function(...)``
2151--------------------------------
2152
2153Use ``__attribute__((exclusive_lock_function(...)))`` on a function declaration
2154to specify that the function acquires all listed locks exclusively. This
2155attribute takes zero or more arguments: either of lockable type or integers
2156indexing into function parameters of lockable type. If no arguments are given,
2157the acquired lock is implicitly ``this`` of the enclosing object.
2158
2159``shared_lock_function(...)``
2160-----------------------------
2161
2162Use ``__attribute__((shared_lock_function(...)))`` on a function declaration to
2163specify that the function acquires all listed locks, although the locks may be
2164shared (e.g. read locks). This attribute takes zero or more arguments: either
2165of lockable type or integers indexing into function parameters of lockable
2166type. If no arguments are given, the acquired lock is implicitly ``this`` of
2167the enclosing object.
2168
2169``exclusive_trylock_function(...)``
2170-----------------------------------
2171
2172Use ``__attribute__((exclusive_lock_function(...)))`` on a function declaration
2173to specify that the function will try (without blocking) to acquire all listed
2174locks exclusively. This attribute takes one or more arguments. The first
2175argument is an integer or boolean value specifying the return value of a
2176successful lock acquisition. The remaining arugments are either of lockable
2177type or integers indexing into function parameters of lockable type. If only
2178one argument is given, the acquired lock is implicitly ``this`` of the
2179enclosing object.
2180
2181``shared_trylock_function(...)``
2182--------------------------------
2183
2184Use ``__attribute__((shared_lock_function(...)))`` on a function declaration to
2185specify that the function will try (without blocking) to acquire all listed
2186locks, although the locks may be shared (e.g. read locks). This attribute
2187takes one or more arguments. The first argument is an integer or boolean value
2188specifying the return value of a successful lock acquisition. The remaining
2189arugments are either of lockable type or integers indexing into function
2190parameters of lockable type. If only one argument is given, the acquired lock
2191is implicitly ``this`` of the enclosing object.
2192
2193``unlock_function(...)``
2194------------------------
2195
2196Use ``__attribute__((unlock_function(...)))`` on a function declaration to
2197specify that the function release all listed locks. This attribute takes zero
2198or more arguments: either of lockable type or integers indexing into function
2199parameters of lockable type. If no arguments are given, the acquired lock is
2200implicitly ``this`` of the enclosing object.
2201
2202``lock_returned(l)``
2203--------------------
2204
2205Use ``__attribute__((lock_returned(l)))`` on a function declaration to specify
2206that the function returns lock ``l`` (``l`` must be of lockable type). This
2207annotation is used to aid in resolving lock expressions.
2208
2209``locks_excluded(...)``
2210-----------------------
2211
2212Use ``__attribute__((locks_excluded(...)))`` on a function declaration to
2213specify that the function must not be called with the listed locks. Arguments
2214must be lockable type, and there must be at least one argument.
2215
2216``exclusive_locks_required(...)``
2217---------------------------------
2218
2219Use ``__attribute__((exclusive_locks_required(...)))`` on a function
2220declaration to specify that the function must be called while holding the
2221listed exclusive locks. Arguments must be lockable type, and there must be at
2222least one argument.
2223
2224``shared_locks_required(...)``
2225------------------------------
2226
2227Use ``__attribute__((shared_locks_required(...)))`` on a function declaration
2228to specify that the function must be called while holding the listed shared
2229locks. Arguments must be lockable type, and there must be at least one
2230argument.
2231
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002232Consumed Annotation Checking
2233============================
2234
2235Clang supports additional attributes for checking basic resource management
2236properties, specifically for unique objects that have a single owning reference.
2237The following attributes are currently supported, although **the implementation
2238for these annotations is currently in development and are subject to change.**
2239
Chris Wailes155df712013-10-21 20:54:06 +00002240``consumable``
2241--------------
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002242
Chris Wailes155df712013-10-21 20:54:06 +00002243Each class that uses any of the following annotations must first be marked
2244using the consumable attribute. Failure to do so will result in a warning.
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002245
Chris Wailes155df712013-10-21 20:54:06 +00002246``set_typestate(new_state)``
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002247----------------------------
2248
Chris Wailes155df712013-10-21 20:54:06 +00002249Annotate methods that transition an object into a new state with
2250``__attribute__((set_typestate(new_state)))``. The new new state must be
2251unconsumed, consumed, or unknown.
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002252
Chris Wailes155df712013-10-21 20:54:06 +00002253``callable_when(...)``
2254----------------------
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002255
Chris Wailes155df712013-10-21 20:54:06 +00002256Use ``__attribute__((callable_when(...)))`` to indicate what states a method
2257may be called in. Valid states are unconsumed, consumed, or unknown. Each
2258argument to this attribute must be a quoted string. E.g.:
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002259
Chris Wailes155df712013-10-21 20:54:06 +00002260``__attribute__((callable_when("unconsumed", "unknown")))``
2261
2262``tests_typestate(tested_state)``
2263---------------------------------
2264
2265Use ``__attribute__((tests_typestate(tested_state)))`` to indicate that a method
2266returns true if the object is in the specified state..
2267
2268``param_typestate(expected_state)``
2269-----------------------------------
2270
2271This attribute specifies expectations about function parameters. Calls to an
2272function with annotated parameters will issue a warning if the corresponding
2273argument isn't in the expected state. The attribute is also used to set the
2274initial state of the parameter when analyzing the function's body.
2275
2276``return_typestate(ret_state)``
2277-------------------------------
2278
2279The ``return_typestate`` attribute can be applied to functions or parameters.
2280When applied to a function the attribute specifies the state of the returned
2281value. The function's body is checked to ensure that it always returns a value
2282in the specified state. On the caller side, values returned by the annotated
2283function are initialized to the given state.
2284
2285If the attribute is applied to a function parameter it modifies the state of
2286an argument after a call to the function returns. The function's body is
2287checked to ensure that the parameter is in the expected state before returning.
DeLesley Hutchinsc2ecf0d2013-08-22 20:44:47 +00002288
Sean Silva709c44d2012-12-12 23:44:55 +00002289Type Safety Checking
2290====================
2291
2292Clang supports additional attributes to enable checking type safety properties
Richard Smith36ee4fc2013-07-11 00:34:42 +00002293that can't be enforced by the C type system. Use cases include:
Sean Silva709c44d2012-12-12 23:44:55 +00002294
2295* MPI library implementations, where these attributes enable checking that
Richard Smith36ee4fc2013-07-11 00:34:42 +00002296 the buffer type matches the passed ``MPI_Datatype``;
2297* for HDF5 library there is a similar use case to MPI;
Sean Silva709c44d2012-12-12 23:44:55 +00002298* checking types of variadic functions' arguments for functions like
2299 ``fcntl()`` and ``ioctl()``.
2300
2301You can detect support for these attributes with ``__has_attribute()``. For
2302example:
2303
2304.. code-block:: c++
2305
2306 #if defined(__has_attribute)
2307 # if __has_attribute(argument_with_type_tag) && \
2308 __has_attribute(pointer_with_type_tag) && \
2309 __has_attribute(type_tag_for_datatype)
2310 # define ATTR_MPI_PWT(buffer_idx, type_idx) __attribute__((pointer_with_type_tag(mpi,buffer_idx,type_idx)))
2311 /* ... other macros ... */
2312 # endif
2313 #endif
2314
2315 #if !defined(ATTR_MPI_PWT)
2316 # define ATTR_MPI_PWT(buffer_idx, type_idx)
2317 #endif
2318
2319 int MPI_Send(void *buf, int count, MPI_Datatype datatype /*, other args omitted */)
2320 ATTR_MPI_PWT(1,3);
2321
2322``argument_with_type_tag(...)``
2323-------------------------------
2324
2325Use ``__attribute__((argument_with_type_tag(arg_kind, arg_idx,
2326type_tag_idx)))`` on a function declaration to specify that the function
2327accepts a type tag that determines the type of some other argument.
2328``arg_kind`` is an identifier that should be used when annotating all
2329applicable type tags.
2330
2331This attribute is primarily useful for checking arguments of variadic functions
Richard Smith36ee4fc2013-07-11 00:34:42 +00002332(``pointer_with_type_tag`` can be used in most non-variadic cases).
Sean Silva709c44d2012-12-12 23:44:55 +00002333
2334For example:
2335
2336.. code-block:: c++
2337
2338 int fcntl(int fd, int cmd, ...)
2339 __attribute__(( argument_with_type_tag(fcntl,3,2) ));
2340
2341``pointer_with_type_tag(...)``
2342------------------------------
2343
2344Use ``__attribute__((pointer_with_type_tag(ptr_kind, ptr_idx, type_tag_idx)))``
2345on a function declaration to specify that the function accepts a type tag that
2346determines the pointee type of some other pointer argument.
2347
2348For example:
2349
2350.. code-block:: c++
2351
2352 int MPI_Send(void *buf, int count, MPI_Datatype datatype /*, other args omitted */)
2353 __attribute__(( pointer_with_type_tag(mpi,1,3) ));
2354
2355``type_tag_for_datatype(...)``
2356------------------------------
2357
2358Clang supports annotating type tags of two forms.
2359
2360* **Type tag that is an expression containing a reference to some declared
2361 identifier.** Use ``__attribute__((type_tag_for_datatype(kind, type)))`` on a
2362 declaration with that identifier:
2363
2364 .. code-block:: c++
2365
2366 extern struct mpi_datatype mpi_datatype_int
2367 __attribute__(( type_tag_for_datatype(mpi,int) ));
2368 #define MPI_INT ((MPI_Datatype) &mpi_datatype_int)
2369
2370* **Type tag that is an integral literal.** Introduce a ``static const``
2371 variable with a corresponding initializer value and attach
2372 ``__attribute__((type_tag_for_datatype(kind, type)))`` on that declaration,
2373 for example:
2374
2375 .. code-block:: c++
2376
2377 #define MPI_INT ((MPI_Datatype) 42)
2378 static const MPI_Datatype mpi_datatype_int
2379 __attribute__(( type_tag_for_datatype(mpi,int) )) = 42
2380
2381The attribute also accepts an optional third argument that determines how the
2382expression is compared to the type tag. There are two supported flags:
2383
2384* ``layout_compatible`` will cause types to be compared according to
2385 layout-compatibility rules (C++11 [class.mem] p 17, 18). This is
2386 implemented to support annotating types like ``MPI_DOUBLE_INT``.
2387
2388 For example:
2389
2390 .. code-block:: c++
2391
2392 /* In mpi.h */
2393 struct internal_mpi_double_int { double d; int i; };
2394 extern struct mpi_datatype mpi_datatype_double_int
2395 __attribute__(( type_tag_for_datatype(mpi, struct internal_mpi_double_int, layout_compatible) ));
2396
2397 #define MPI_DOUBLE_INT ((MPI_Datatype) &mpi_datatype_double_int)
2398
2399 /* In user code */
2400 struct my_pair { double a; int b; };
2401 struct my_pair *buffer;
2402 MPI_Send(buffer, 1, MPI_DOUBLE_INT /*, ... */); // no warning
2403
2404 struct my_int_pair { int a; int b; }
2405 struct my_int_pair *buffer2;
2406 MPI_Send(buffer2, 1, MPI_DOUBLE_INT /*, ... */); // warning: actual buffer element
2407 // type 'struct my_int_pair'
2408 // doesn't match specified MPI_Datatype
2409
2410* ``must_be_null`` specifies that the expression should be a null pointer
2411 constant, for example:
2412
2413 .. code-block:: c++
2414
2415 /* In mpi.h */
2416 extern struct mpi_datatype mpi_datatype_null
2417 __attribute__(( type_tag_for_datatype(mpi, void, must_be_null) ));
2418
2419 #define MPI_DATATYPE_NULL ((MPI_Datatype) &mpi_datatype_null)
2420
2421 /* In user code */
2422 MPI_Send(buffer, 1, MPI_DATATYPE_NULL /*, ... */); // warning: MPI_DATATYPE_NULL
2423 // was specified but buffer
2424 // is not a null pointer
2425
Dmitri Gribenkodc81f512013-01-13 16:37:18 +00002426Format String Checking
2427======================
2428
2429Clang supports the ``format`` attribute, which indicates that the function
2430accepts a ``printf`` or ``scanf``-like format string and corresponding
2431arguments or a ``va_list`` that contains these arguments.
2432
2433Please see `GCC documentation about format attribute
2434<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_ to find details
2435about attribute syntax.
2436
2437Clang implements two kinds of checks with this attribute.
2438
2439#. Clang checks that the function with the ``format`` attribute is called with
2440 a format string that uses format specifiers that are allowed, and that
2441 arguments match the format string. This is the ``-Wformat`` warning, it is
2442 on by default.
2443
2444#. Clang checks that the format string argument is a literal string. This is
2445 the ``-Wformat-nonliteral`` warning, it is off by default.
2446
2447 Clang implements this mostly the same way as GCC, but there is a difference
2448 for functions that accept a ``va_list`` argument (for example, ``vprintf``).
2449 GCC does not emit ``-Wformat-nonliteral`` warning for calls to such
2450 fuctions. Clang does not warn if the format string comes from a function
Richard Smithfabbcd92013-02-14 00:22:00 +00002451 parameter, where the function is annotated with a compatible attribute,
Dmitri Gribenkodc81f512013-01-13 16:37:18 +00002452 otherwise it warns. For example:
2453
2454 .. code-block:: c
2455
2456 __attribute__((__format__ (__scanf__, 1, 3)))
2457 void foo(const char* s, char *buf, ...) {
2458 va_list ap;
2459 va_start(ap, buf);
2460
2461 vprintf(s, ap); // warning: format string is not a string literal
2462 }
2463
2464 In this case we warn because ``s`` contains a format string for a
Richard Smithfabbcd92013-02-14 00:22:00 +00002465 ``scanf``-like function, but it is passed to a ``printf``-like function.
Dmitri Gribenkodc81f512013-01-13 16:37:18 +00002466
2467 If the attribute is removed, clang still warns, because the format string is
2468 not a string literal.
2469
Richard Smithfabbcd92013-02-14 00:22:00 +00002470 Another example:
Dmitri Gribenkodc81f512013-01-13 16:37:18 +00002471
Richard Smithd06a8702013-02-14 00:23:04 +00002472 .. code-block:: c
Dmitri Gribenkodc81f512013-01-13 16:37:18 +00002473
2474 __attribute__((__format__ (__printf__, 1, 3)))
2475 void foo(const char* s, char *buf, ...) {
2476 va_list ap;
2477 va_start(ap, buf);
2478
2479 vprintf(s, ap); // warning
2480 }
2481
Richard Smithfabbcd92013-02-14 00:22:00 +00002482 In this case Clang does not warn because the format string ``s`` and
2483 the corresponding arguments are annotated. If the arguments are
2484 incorrect, the caller of ``foo`` will receive a warning.