1========================= 2Clang Language Extensions 3========================= 4 5.. contents:: 6 :local: 7 :depth: 1 8 9.. toctree:: 10 :hidden: 11 12 ObjectiveCLiterals 13 BlockLanguageSpec 14 Block-ABI-Apple 15 AutomaticReferenceCounting 16 17Introduction 18============ 19 20This document describes the language extensions provided by Clang. In addition 21to the language extensions listed here, Clang aims to support a broad range of 22GCC extensions. Please see the `GCC manual 23<https://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on 24these extensions. 25 26.. _langext-feature_check: 27 28Feature Checking Macros 29======================= 30 31Language extensions can be very useful, but only if you know you can depend on 32them. In order to allow fine-grain features checks, we support three builtin 33function-like macros. This allows you to directly test for a feature in your 34code without having to resort to something like autoconf or fragile "compiler 35version checks". 36 37``__has_builtin`` 38----------------- 39 40This function-like macro takes a single identifier argument that is the name of 41a builtin function, a builtin pseudo-function (taking one or more type 42arguments), or a builtin template. 43It evaluates to 1 if the builtin is supported or 0 if not. 44It can be used like this: 45 46.. code-block:: c++ 47 48 #ifndef __has_builtin // Optional of course. 49 #define __has_builtin(x) 0 // Compatibility with non-clang compilers. 50 #endif 51 52 ... 53 #if __has_builtin(__builtin_trap) 54 __builtin_trap(); 55 #else 56 abort(); 57 #endif 58 ... 59 60.. note:: 61 62 Prior to Clang 10, ``__has_builtin`` could not be used to detect most builtin 63 pseudo-functions. 64 65 ``__has_builtin`` should not be used to detect support for a builtin macro; 66 use ``#ifdef`` instead. 67 68.. _langext-__has_feature-__has_extension: 69 70``__has_feature`` and ``__has_extension`` 71----------------------------------------- 72 73These function-like macros take a single identifier argument that is the name 74of a feature. ``__has_feature`` evaluates to 1 if the feature is both 75supported by Clang and standardized in the current language standard or 0 if 76not (but see :ref:`below <langext-has-feature-back-compat>`), while 77``__has_extension`` evaluates to 1 if the feature is supported by Clang in the 78current language (either as a language extension or a standard language 79feature) or 0 if not. They can be used like this: 80 81.. code-block:: c++ 82 83 #ifndef __has_feature // Optional of course. 84 #define __has_feature(x) 0 // Compatibility with non-clang compilers. 85 #endif 86 #ifndef __has_extension 87 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers. 88 #endif 89 90 ... 91 #if __has_feature(cxx_rvalue_references) 92 // This code will only be compiled with the -std=c++11 and -std=gnu++11 93 // options, because rvalue references are only standardized in C++11. 94 #endif 95 96 #if __has_extension(cxx_rvalue_references) 97 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98 98 // and -std=gnu++98 options, because rvalue references are supported as a 99 // language extension in C++98. 100 #endif 101 102.. _langext-has-feature-back-compat: 103 104For backward compatibility, ``__has_feature`` can also be used to test 105for support for non-standardized features, i.e. features not prefixed ``c_``, 106``cxx_`` or ``objc_``. 107 108Another use of ``__has_feature`` is to check for compiler features not related 109to the language standard, such as e.g. :doc:`AddressSanitizer 110<AddressSanitizer>`. 111 112If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent 113to ``__has_feature``. 114 115The feature tag is described along with the language feature below. 116 117The feature name or extension name can also be specified with a preceding and 118following ``__`` (double underscore) to avoid interference from a macro with 119the same name. For instance, ``__cxx_rvalue_references__`` can be used instead 120of ``cxx_rvalue_references``. 121 122``__has_cpp_attribute`` 123----------------------- 124 125This function-like macro is available in C++20 by default, and is provided as an 126extension in earlier language standards. It takes a single argument that is the 127name of a double-square-bracket-style attribute. The argument can either be a 128single identifier or a scoped identifier. If the attribute is supported, a 129nonzero value is returned. If the attribute is a standards-based attribute, this 130macro returns a nonzero value based on the year and month in which the attribute 131was voted into the working draft. See `WG21 SD-6 132<https://isocpp.org/std/standing-documents/sd-6-sg10-feature-test-recommendations>`_ 133for the list of values returned for standards-based attributes. If the attribute 134is not supported by the current compliation target, this macro evaluates to 0. 135It can be used like this: 136 137.. code-block:: c++ 138 139 #ifndef __has_cpp_attribute // For backwards compatibility 140 #define __has_cpp_attribute(x) 0 141 #endif 142 143 ... 144 #if __has_cpp_attribute(clang::fallthrough) 145 #define FALLTHROUGH [[clang::fallthrough]] 146 #else 147 #define FALLTHROUGH 148 #endif 149 ... 150 151The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are 152the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either 153of these namespaces can be specified with a preceding and following ``__`` 154(double underscore) to avoid interference from a macro with the same name. For 155instance, ``gnu::__const__`` can be used instead of ``gnu::const``. 156 157``__has_c_attribute`` 158--------------------- 159 160This function-like macro takes a single argument that is the name of an 161attribute exposed with the double square-bracket syntax in C mode. The argument 162can either be a single identifier or a scoped identifier. If the attribute is 163supported, a nonzero value is returned. If the attribute is not supported by the 164current compilation target, this macro evaluates to 0. It can be used like this: 165 166.. code-block:: c 167 168 #ifndef __has_c_attribute // Optional of course. 169 #define __has_c_attribute(x) 0 // Compatibility with non-clang compilers. 170 #endif 171 172 ... 173 #if __has_c_attribute(fallthrough) 174 #define FALLTHROUGH [[fallthrough]] 175 #else 176 #define FALLTHROUGH 177 #endif 178 ... 179 180The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are 181the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either 182of these namespaces can be specified with a preceding and following ``__`` 183(double underscore) to avoid interference from a macro with the same name. For 184instance, ``gnu::__const__`` can be used instead of ``gnu::const``. 185 186``__has_attribute`` 187------------------- 188 189This function-like macro takes a single identifier argument that is the name of 190a GNU-style attribute. It evaluates to 1 if the attribute is supported by the 191current compilation target, or 0 if not. It can be used like this: 192 193.. code-block:: c++ 194 195 #ifndef __has_attribute // Optional of course. 196 #define __has_attribute(x) 0 // Compatibility with non-clang compilers. 197 #endif 198 199 ... 200 #if __has_attribute(always_inline) 201 #define ALWAYS_INLINE __attribute__((always_inline)) 202 #else 203 #define ALWAYS_INLINE 204 #endif 205 ... 206 207The attribute name can also be specified with a preceding and following ``__`` 208(double underscore) to avoid interference from a macro with the same name. For 209instance, ``__always_inline__`` can be used instead of ``always_inline``. 210 211 212``__has_declspec_attribute`` 213---------------------------- 214 215This function-like macro takes a single identifier argument that is the name of 216an attribute implemented as a Microsoft-style ``__declspec`` attribute. It 217evaluates to 1 if the attribute is supported by the current compilation target, 218or 0 if not. It can be used like this: 219 220.. code-block:: c++ 221 222 #ifndef __has_declspec_attribute // Optional of course. 223 #define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers. 224 #endif 225 226 ... 227 #if __has_declspec_attribute(dllexport) 228 #define DLLEXPORT __declspec(dllexport) 229 #else 230 #define DLLEXPORT 231 #endif 232 ... 233 234The attribute name can also be specified with a preceding and following ``__`` 235(double underscore) to avoid interference from a macro with the same name. For 236instance, ``__dllexport__`` can be used instead of ``dllexport``. 237 238``__is_identifier`` 239------------------- 240 241This function-like macro takes a single identifier argument that might be either 242a reserved word or a regular identifier. It evaluates to 1 if the argument is just 243a regular identifier and not a reserved word, in the sense that it can then be 244used as the name of a user-defined function or variable. Otherwise it evaluates 245to 0. It can be used like this: 246 247.. code-block:: c++ 248 249 ... 250 #ifdef __is_identifier // Compatibility with non-clang compilers. 251 #if __is_identifier(__wchar_t) 252 typedef wchar_t __wchar_t; 253 #endif 254 #endif 255 256 __wchar_t WideCharacter; 257 ... 258 259Include File Checking Macros 260============================ 261 262Not all developments systems have the same include files. The 263:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow 264you to check for the existence of an include file before doing a possibly 265failing ``#include`` directive. Include file checking macros must be used 266as expressions in ``#if`` or ``#elif`` preprocessing directives. 267 268.. _langext-__has_include: 269 270``__has_include`` 271----------------- 272 273This function-like macro takes a single file name string argument that is the 274name of an include file. It evaluates to 1 if the file can be found using the 275include paths, or 0 otherwise: 276 277.. code-block:: c++ 278 279 // Note the two possible file name string formats. 280 #if __has_include("myinclude.h") && __has_include(<stdint.h>) 281 # include "myinclude.h" 282 #endif 283 284To test for this feature, use ``#if defined(__has_include)``: 285 286.. code-block:: c++ 287 288 // To avoid problem with non-clang compilers not having this macro. 289 #if defined(__has_include) 290 #if __has_include("myinclude.h") 291 # include "myinclude.h" 292 #endif 293 #endif 294 295.. _langext-__has_include_next: 296 297``__has_include_next`` 298---------------------- 299 300This function-like macro takes a single file name string argument that is the 301name of an include file. It is like ``__has_include`` except that it looks for 302the second instance of the given file found in the include paths. It evaluates 303to 1 if the second instance of the file can be found using the include paths, 304or 0 otherwise: 305 306.. code-block:: c++ 307 308 // Note the two possible file name string formats. 309 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>) 310 # include_next "myinclude.h" 311 #endif 312 313 // To avoid problem with non-clang compilers not having this macro. 314 #if defined(__has_include_next) 315 #if __has_include_next("myinclude.h") 316 # include_next "myinclude.h" 317 #endif 318 #endif 319 320Note that ``__has_include_next``, like the GNU extension ``#include_next`` 321directive, is intended for use in headers only, and will issue a warning if 322used in the top-level compilation file. A warning will also be issued if an 323absolute path is used in the file argument. 324 325``__has_warning`` 326----------------- 327 328This function-like macro takes a string literal that represents a command line 329option for a warning and returns true if that is a valid warning option. 330 331.. code-block:: c++ 332 333 #if __has_warning("-Wformat") 334 ... 335 #endif 336 337.. _languageextensions-builtin-macros: 338 339Builtin Macros 340============== 341 342``__BASE_FILE__`` 343 Defined to a string that contains the name of the main input file passed to 344 Clang. 345 346``__FILE_NAME__`` 347 Clang-specific extension that functions similar to ``__FILE__`` but only 348 renders the last path component (the filename) instead of an invocation 349 dependent full path to that file. 350 351``__COUNTER__`` 352 Defined to an integer value that starts at zero and is incremented each time 353 the ``__COUNTER__`` macro is expanded. 354 355``__INCLUDE_LEVEL__`` 356 Defined to an integral value that is the include depth of the file currently 357 being translated. For the main file, this value is zero. 358 359``__TIMESTAMP__`` 360 Defined to the date and time of the last modification of the current source 361 file. 362 363``__clang__`` 364 Defined when compiling with Clang 365 366``__clang_major__`` 367 Defined to the major marketing version number of Clang (e.g., the 2 in 368 2.0.1). Note that marketing version numbers should not be used to check for 369 language features, as different vendors use different numbering schemes. 370 Instead, use the :ref:`langext-feature_check`. 371 372``__clang_minor__`` 373 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note 374 that marketing version numbers should not be used to check for language 375 features, as different vendors use different numbering schemes. Instead, use 376 the :ref:`langext-feature_check`. 377 378``__clang_patchlevel__`` 379 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1). 380 381``__clang_version__`` 382 Defined to a string that captures the Clang marketing version, including the 383 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``". 384 385.. _langext-vectors: 386 387Vectors and Extended Vectors 388============================ 389 390Supports the GCC, OpenCL, AltiVec and NEON vector extensions. 391 392OpenCL vector types are created using the ``ext_vector_type`` attribute. It 393supports the ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example 394is: 395 396.. code-block:: c++ 397 398 typedef float float4 __attribute__((ext_vector_type(4))); 399 typedef float float2 __attribute__((ext_vector_type(2))); 400 401 float4 foo(float2 a, float2 b) { 402 float4 c; 403 c.xz = a; 404 c.yw = b; 405 return c; 406 } 407 408Query for this feature with ``__has_attribute(ext_vector_type)``. 409 410Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax 411and functions. For example: 412 413.. code-block:: c++ 414 415 vector float foo(vector int a) { 416 vector int b; 417 b = vec_add(a, a) + a; 418 return (vector float)b; 419 } 420 421NEON vector types are created using ``neon_vector_type`` and 422``neon_polyvector_type`` attributes. For example: 423 424.. code-block:: c++ 425 426 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t; 427 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t; 428 429 int8x8_t foo(int8x8_t a) { 430 int8x8_t v; 431 v = a; 432 return v; 433 } 434 435Vector Literals 436--------------- 437 438Vector literals can be used to create vectors from a set of scalars, or 439vectors. Either parentheses or braces form can be used. In the parentheses 440form the number of literal values specified must be one, i.e. referring to a 441scalar value, or must match the size of the vector type being created. If a 442single scalar literal value is specified, the scalar literal value will be 443replicated to all the components of the vector type. In the brackets form any 444number of literals can be specified. For example: 445 446.. code-block:: c++ 447 448 typedef int v4si __attribute__((__vector_size__(16))); 449 typedef float float4 __attribute__((ext_vector_type(4))); 450 typedef float float2 __attribute__((ext_vector_type(2))); 451 452 v4si vsi = (v4si){1, 2, 3, 4}; 453 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f); 454 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1). 455 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0). 456 vector int vi3 = (vector int)(1, 2); // error 457 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0). 458 vector int vi5 = (vector int)(1, 2, 3, 4); 459 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f)); 460 461Vector Operations 462----------------- 463 464The table below shows the support for each operation by vector extension. A 465dash indicates that an operation is not accepted according to a corresponding 466specification. 467 468============================== ======= ======= ============= ======= 469 Operator OpenCL AltiVec GCC NEON 470============================== ======= ======= ============= ======= 471[] yes yes yes -- 472unary operators +, -- yes yes yes -- 473++, -- -- yes yes yes -- 474+,--,*,/,% yes yes yes -- 475bitwise operators &,|,^,~ yes yes yes -- 476>>,<< yes yes yes -- 477!, &&, || yes -- yes [#]_ -- 478==, !=, >, <, >=, <= yes yes yes -- 479= yes yes yes yes 480:? [#]_ yes -- yes -- 481sizeof yes yes yes yes 482C-style cast yes yes yes no 483reinterpret_cast yes no yes no 484static_cast yes no yes no 485const_cast no no no no 486============================== ======= ======= ============= ======= 487 488See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`. 489 490.. [#] unary operator ! is not implemented, however && and || are. 491.. [#] While OpenCL and GCC vectors both implement the comparison operator(?:) as a 492 'select', they operate somewhat differently. OpenCL selects based on signedness of 493 the condition operands, but GCC vectors use normal bool conversions (that is, != 0). 494 495Half-Precision Floating Point 496============================= 497 498Clang supports two half-precision (16-bit) floating point types: ``__fp16`` and 499``_Float16``. These types are supported in all language modes. 500 501``__fp16`` is supported on every target, as it is purely a storage format; see below. 502``_Float16`` is currently only supported on the following targets, with further 503targets pending ABI standardization: 504 505* 32-bit ARM 506* 64-bit ARM (AArch64) 507* SPIR 508 509``_Float16`` will be supported on more targets as they define ABIs for it. 510 511``__fp16`` is a storage and interchange format only. This means that values of 512``__fp16`` are immediately promoted to (at least) ``float`` when used in arithmetic 513operations, so that e.g. the result of adding two ``__fp16`` values has type ``float``. 514The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE <http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_). 515Clang uses the ``binary16`` format from IEEE 754-2008 for ``__fp16``, not the ARM 516alternative format. 517 518``_Float16`` is an extended floating-point type. This means that, just like arithmetic on 519``float`` or ``double``, arithmetic on ``_Float16`` operands is formally performed in the 520``_Float16`` type, so that e.g. the result of adding two ``_Float16`` values has type 521``_Float16``. The behavior of ``_Float16`` is specified by ISO/IEC TS 18661-3:2015 522("Floating-point extensions for C"). As with ``__fp16``, Clang uses the ``binary16`` 523format from IEEE 754-2008 for ``_Float16``. 524 525``_Float16`` arithmetic will be performed using native half-precision support 526when available on the target (e.g. on ARMv8.2a); otherwise it will be performed 527at a higher precision (currently always ``float``) and then truncated down to 528``_Float16``. Note that C and C++ allow intermediate floating-point operands 529of an expression to be computed with greater precision than is expressible in 530their type, so Clang may avoid intermediate truncations in certain cases; this may 531lead to results that are inconsistent with native arithmetic. 532 533It is recommended that portable code use ``_Float16`` instead of ``__fp16``, 534as it has been defined by the C standards committee and has behavior that is 535more familiar to most programmers. 536 537Because ``__fp16`` operands are always immediately promoted to ``float``, the 538common real type of ``__fp16`` and ``_Float16`` for the purposes of the usual 539arithmetic conversions is ``float``. 540 541A literal can be given ``_Float16`` type using the suffix ``f16``. For example, 542``3.14f16``. 543 544Because default argument promotion only applies to the standard floating-point 545types, ``_Float16`` values are not promoted to ``double`` when passed as variadic 546or untyped arguments. As a consequence, some caution must be taken when using 547certain library facilities with ``_Float16``; for example, there is no ``printf`` format 548specifier for ``_Float16``, and (unlike ``float``) it will not be implicitly promoted to 549``double`` when passed to ``printf``, so the programmer must explicitly cast it to 550``double`` before using it with an ``%f`` or similar specifier. 551 552Messages on ``deprecated`` and ``unavailable`` Attributes 553========================================================= 554 555An optional string message can be added to the ``deprecated`` and 556``unavailable`` attributes. For example: 557 558.. code-block:: c++ 559 560 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!"))); 561 562If the deprecated or unavailable declaration is used, the message will be 563incorporated into the appropriate diagnostic: 564 565.. code-block:: none 566 567 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!! 568 [-Wdeprecated-declarations] 569 explode(); 570 ^ 571 572Query for this feature with 573``__has_extension(attribute_deprecated_with_message)`` and 574``__has_extension(attribute_unavailable_with_message)``. 575 576Attributes on Enumerators 577========================= 578 579Clang allows attributes to be written on individual enumerators. This allows 580enumerators to be deprecated, made unavailable, etc. The attribute must appear 581after the enumerator name and before any initializer, like so: 582 583.. code-block:: c++ 584 585 enum OperationMode { 586 OM_Invalid, 587 OM_Normal, 588 OM_Terrified __attribute__((deprecated)), 589 OM_AbortOnError __attribute__((deprecated)) = 4 590 }; 591 592Attributes on the ``enum`` declaration do not apply to individual enumerators. 593 594Query for this feature with ``__has_extension(enumerator_attributes)``. 595 596'User-Specified' System Frameworks 597================================== 598 599Clang provides a mechanism by which frameworks can be built in such a way that 600they will always be treated as being "system frameworks", even if they are not 601present in a system framework directory. This can be useful to system 602framework developers who want to be able to test building other applications 603with development builds of their framework, including the manner in which the 604compiler changes warning behavior for system headers. 605 606Framework developers can opt-in to this mechanism by creating a 607"``.system_framework``" file at the top-level of their framework. That is, the 608framework should have contents like: 609 610.. code-block:: none 611 612 .../TestFramework.framework 613 .../TestFramework.framework/.system_framework 614 .../TestFramework.framework/Headers 615 .../TestFramework.framework/Headers/TestFramework.h 616 ... 617 618Clang will treat the presence of this file as an indicator that the framework 619should be treated as a system framework, regardless of how it was found in the 620framework search path. For consistency, we recommend that such files never be 621included in installed versions of the framework. 622 623Checks for Standard Language Features 624===================================== 625 626The ``__has_feature`` macro can be used to query if certain standard language 627features are enabled. The ``__has_extension`` macro can be used to query if 628language features are available as an extension when compiling for a standard 629which does not provide them. The features which can be tested are listed here. 630 631Since Clang 3.4, the C++ SD-6 feature test macros are also supported. 632These are macros with names of the form ``__cpp_<feature_name>``, and are 633intended to be a portable way to query the supported features of the compiler. 634See `the C++ status page <https://clang.llvm.org/cxx_status.html#ts>`_ for 635information on the version of SD-6 supported by each Clang release, and the 636macros provided by that revision of the recommendations. 637 638C++98 639----- 640 641The features listed below are part of the C++98 standard. These features are 642enabled by default when compiling C++ code. 643 644C++ exceptions 645^^^^^^^^^^^^^^ 646 647Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been 648enabled. For example, compiling code with ``-fno-exceptions`` disables C++ 649exceptions. 650 651C++ RTTI 652^^^^^^^^ 653 654Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For 655example, compiling code with ``-fno-rtti`` disables the use of RTTI. 656 657C++11 658----- 659 660The features listed below are part of the C++11 standard. As a result, all 661these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option 662when compiling C++ code. 663 664C++11 SFINAE includes access control 665^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 666 667Use ``__has_feature(cxx_access_control_sfinae)`` or 668``__has_extension(cxx_access_control_sfinae)`` to determine whether 669access-control errors (e.g., calling a private constructor) are considered to 670be template argument deduction errors (aka SFINAE errors), per `C++ DR1170 671<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_. 672 673C++11 alias templates 674^^^^^^^^^^^^^^^^^^^^^ 675 676Use ``__has_feature(cxx_alias_templates)`` or 677``__has_extension(cxx_alias_templates)`` to determine if support for C++11's 678alias declarations and alias templates is enabled. 679 680C++11 alignment specifiers 681^^^^^^^^^^^^^^^^^^^^^^^^^^ 682 683Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to 684determine if support for alignment specifiers using ``alignas`` is enabled. 685 686Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to 687determine if support for the ``alignof`` keyword is enabled. 688 689C++11 attributes 690^^^^^^^^^^^^^^^^ 691 692Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to 693determine if support for attribute parsing with C++11's square bracket notation 694is enabled. 695 696C++11 generalized constant expressions 697^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 698 699Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized 700constant expressions (e.g., ``constexpr``) is enabled. 701 702C++11 ``decltype()`` 703^^^^^^^^^^^^^^^^^^^^ 704 705Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to 706determine if support for the ``decltype()`` specifier is enabled. C++11's 707``decltype`` does not require type-completeness of a function call expression. 708Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or 709``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if 710support for this feature is enabled. 711 712C++11 default template arguments in function templates 713^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 714 715Use ``__has_feature(cxx_default_function_template_args)`` or 716``__has_extension(cxx_default_function_template_args)`` to determine if support 717for default template arguments in function templates is enabled. 718 719C++11 ``default``\ ed functions 720^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 721 722Use ``__has_feature(cxx_defaulted_functions)`` or 723``__has_extension(cxx_defaulted_functions)`` to determine if support for 724defaulted function definitions (with ``= default``) is enabled. 725 726C++11 delegating constructors 727^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 728 729Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for 730delegating constructors is enabled. 731 732C++11 ``deleted`` functions 733^^^^^^^^^^^^^^^^^^^^^^^^^^^ 734 735Use ``__has_feature(cxx_deleted_functions)`` or 736``__has_extension(cxx_deleted_functions)`` to determine if support for deleted 737function definitions (with ``= delete``) is enabled. 738 739C++11 explicit conversion functions 740^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 741 742Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for 743``explicit`` conversion functions is enabled. 744 745C++11 generalized initializers 746^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 747 748Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for 749generalized initializers (using braced lists and ``std::initializer_list``) is 750enabled. 751 752C++11 implicit move constructors/assignment operators 753^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 754 755Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly 756generate move constructors and move assignment operators where needed. 757 758C++11 inheriting constructors 759^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 760 761Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for 762inheriting constructors is enabled. 763 764C++11 inline namespaces 765^^^^^^^^^^^^^^^^^^^^^^^ 766 767Use ``__has_feature(cxx_inline_namespaces)`` or 768``__has_extension(cxx_inline_namespaces)`` to determine if support for inline 769namespaces is enabled. 770 771C++11 lambdas 772^^^^^^^^^^^^^ 773 774Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to 775determine if support for lambdas is enabled. 776 777C++11 local and unnamed types as template arguments 778^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 779 780Use ``__has_feature(cxx_local_type_template_args)`` or 781``__has_extension(cxx_local_type_template_args)`` to determine if support for 782local and unnamed types as template arguments is enabled. 783 784C++11 noexcept 785^^^^^^^^^^^^^^ 786 787Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to 788determine if support for noexcept exception specifications is enabled. 789 790C++11 in-class non-static data member initialization 791^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 792 793Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class 794initialization of non-static data members is enabled. 795 796C++11 ``nullptr`` 797^^^^^^^^^^^^^^^^^ 798 799Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to 800determine if support for ``nullptr`` is enabled. 801 802C++11 ``override control`` 803^^^^^^^^^^^^^^^^^^^^^^^^^^ 804 805Use ``__has_feature(cxx_override_control)`` or 806``__has_extension(cxx_override_control)`` to determine if support for the 807override control keywords is enabled. 808 809C++11 reference-qualified functions 810^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 811 812Use ``__has_feature(cxx_reference_qualified_functions)`` or 813``__has_extension(cxx_reference_qualified_functions)`` to determine if support 814for reference-qualified functions (e.g., member functions with ``&`` or ``&&`` 815applied to ``*this``) is enabled. 816 817C++11 range-based ``for`` loop 818^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 819 820Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to 821determine if support for the range-based for loop is enabled. 822 823C++11 raw string literals 824^^^^^^^^^^^^^^^^^^^^^^^^^ 825 826Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw 827string literals (e.g., ``R"x(foo\bar)x"``) is enabled. 828 829C++11 rvalue references 830^^^^^^^^^^^^^^^^^^^^^^^ 831 832Use ``__has_feature(cxx_rvalue_references)`` or 833``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue 834references is enabled. 835 836C++11 ``static_assert()`` 837^^^^^^^^^^^^^^^^^^^^^^^^^ 838 839Use ``__has_feature(cxx_static_assert)`` or 840``__has_extension(cxx_static_assert)`` to determine if support for compile-time 841assertions using ``static_assert`` is enabled. 842 843C++11 ``thread_local`` 844^^^^^^^^^^^^^^^^^^^^^^ 845 846Use ``__has_feature(cxx_thread_local)`` to determine if support for 847``thread_local`` variables is enabled. 848 849C++11 type inference 850^^^^^^^^^^^^^^^^^^^^ 851 852Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to 853determine C++11 type inference is supported using the ``auto`` specifier. If 854this is disabled, ``auto`` will instead be a storage class specifier, as in C 855or C++98. 856 857C++11 strongly typed enumerations 858^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 859 860Use ``__has_feature(cxx_strong_enums)`` or 861``__has_extension(cxx_strong_enums)`` to determine if support for strongly 862typed, scoped enumerations is enabled. 863 864C++11 trailing return type 865^^^^^^^^^^^^^^^^^^^^^^^^^^ 866 867Use ``__has_feature(cxx_trailing_return)`` or 868``__has_extension(cxx_trailing_return)`` to determine if support for the 869alternate function declaration syntax with trailing return type is enabled. 870 871C++11 Unicode string literals 872^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 873 874Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode 875string literals is enabled. 876 877C++11 unrestricted unions 878^^^^^^^^^^^^^^^^^^^^^^^^^ 879 880Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for 881unrestricted unions is enabled. 882 883C++11 user-defined literals 884^^^^^^^^^^^^^^^^^^^^^^^^^^^ 885 886Use ``__has_feature(cxx_user_literals)`` to determine if support for 887user-defined literals is enabled. 888 889C++11 variadic templates 890^^^^^^^^^^^^^^^^^^^^^^^^ 891 892Use ``__has_feature(cxx_variadic_templates)`` or 893``__has_extension(cxx_variadic_templates)`` to determine if support for 894variadic templates is enabled. 895 896C++14 897----- 898 899The features listed below are part of the C++14 standard. As a result, all 900these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option 901when compiling C++ code. 902 903C++14 binary literals 904^^^^^^^^^^^^^^^^^^^^^ 905 906Use ``__has_feature(cxx_binary_literals)`` or 907``__has_extension(cxx_binary_literals)`` to determine whether 908binary literals (for instance, ``0b10010``) are recognized. Clang supports this 909feature as an extension in all language modes. 910 911C++14 contextual conversions 912^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 913 914Use ``__has_feature(cxx_contextual_conversions)`` or 915``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules 916are used when performing an implicit conversion for an array bound in a 917*new-expression*, the operand of a *delete-expression*, an integral constant 918expression, or a condition in a ``switch`` statement. 919 920C++14 decltype(auto) 921^^^^^^^^^^^^^^^^^^^^ 922 923Use ``__has_feature(cxx_decltype_auto)`` or 924``__has_extension(cxx_decltype_auto)`` to determine if support 925for the ``decltype(auto)`` placeholder type is enabled. 926 927C++14 default initializers for aggregates 928^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 929 930Use ``__has_feature(cxx_aggregate_nsdmi)`` or 931``__has_extension(cxx_aggregate_nsdmi)`` to determine if support 932for default initializers in aggregate members is enabled. 933 934C++14 digit separators 935^^^^^^^^^^^^^^^^^^^^^^ 936 937Use ``__cpp_digit_separators`` to determine if support for digit separators 938using single quotes (for instance, ``10'000``) is enabled. At this time, there 939is no corresponding ``__has_feature`` name 940 941C++14 generalized lambda capture 942^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 943 944Use ``__has_feature(cxx_init_captures)`` or 945``__has_extension(cxx_init_captures)`` to determine if support for 946lambda captures with explicit initializers is enabled 947(for instance, ``[n(0)] { return ++n; }``). 948 949C++14 generic lambdas 950^^^^^^^^^^^^^^^^^^^^^ 951 952Use ``__has_feature(cxx_generic_lambdas)`` or 953``__has_extension(cxx_generic_lambdas)`` to determine if support for generic 954(polymorphic) lambdas is enabled 955(for instance, ``[] (auto x) { return x + 1; }``). 956 957C++14 relaxed constexpr 958^^^^^^^^^^^^^^^^^^^^^^^ 959 960Use ``__has_feature(cxx_relaxed_constexpr)`` or 961``__has_extension(cxx_relaxed_constexpr)`` to determine if variable 962declarations, local variable modification, and control flow constructs 963are permitted in ``constexpr`` functions. 964 965C++14 return type deduction 966^^^^^^^^^^^^^^^^^^^^^^^^^^^ 967 968Use ``__has_feature(cxx_return_type_deduction)`` or 969``__has_extension(cxx_return_type_deduction)`` to determine if support 970for return type deduction for functions (using ``auto`` as a return type) 971is enabled. 972 973C++14 runtime-sized arrays 974^^^^^^^^^^^^^^^^^^^^^^^^^^ 975 976Use ``__has_feature(cxx_runtime_array)`` or 977``__has_extension(cxx_runtime_array)`` to determine if support 978for arrays of runtime bound (a restricted form of variable-length arrays) 979is enabled. 980Clang's implementation of this feature is incomplete. 981 982C++14 variable templates 983^^^^^^^^^^^^^^^^^^^^^^^^ 984 985Use ``__has_feature(cxx_variable_templates)`` or 986``__has_extension(cxx_variable_templates)`` to determine if support for 987templated variable declarations is enabled. 988 989C11 990--- 991 992The features listed below are part of the C11 standard. As a result, all these 993features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when 994compiling C code. Additionally, because these features are all 995backward-compatible, they are available as extensions in all language modes. 996 997C11 alignment specifiers 998^^^^^^^^^^^^^^^^^^^^^^^^ 999 1000Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine 1001if support for alignment specifiers using ``_Alignas`` is enabled. 1002 1003Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine 1004if support for the ``_Alignof`` keyword is enabled. 1005 1006C11 atomic operations 1007^^^^^^^^^^^^^^^^^^^^^ 1008 1009Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine 1010if support for atomic types using ``_Atomic`` is enabled. Clang also provides 1011:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement 1012the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use 1013``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header 1014is available. 1015 1016Clang will use the system's ``<stdatomic.h>`` header when one is available, and 1017will otherwise use its own. When using its own, implementations of the atomic 1018operations are provided as macros. In the cases where C11 also requires a real 1019function, this header provides only the declaration of that function (along 1020with a shadowing macro implementation), and you must link to a library which 1021provides a definition of the function if you use it instead of the macro. 1022 1023C11 generic selections 1024^^^^^^^^^^^^^^^^^^^^^^ 1025 1026Use ``__has_feature(c_generic_selections)`` or 1027``__has_extension(c_generic_selections)`` to determine if support for generic 1028selections is enabled. 1029 1030As an extension, the C11 generic selection expression is available in all 1031languages supported by Clang. The syntax is the same as that given in the C11 1032standard. 1033 1034In C, type compatibility is decided according to the rules given in the 1035appropriate standard, but in C++, which lacks the type compatibility rules used 1036in C, types are considered compatible only if they are equivalent. 1037 1038C11 ``_Static_assert()`` 1039^^^^^^^^^^^^^^^^^^^^^^^^ 1040 1041Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)`` 1042to determine if support for compile-time assertions using ``_Static_assert`` is 1043enabled. 1044 1045C11 ``_Thread_local`` 1046^^^^^^^^^^^^^^^^^^^^^ 1047 1048Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)`` 1049to determine if support for ``_Thread_local`` variables is enabled. 1050 1051Modules 1052------- 1053 1054Use ``__has_feature(modules)`` to determine if Modules have been enabled. 1055For example, compiling code with ``-fmodules`` enables the use of Modules. 1056 1057More information could be found `here <https://clang.llvm.org/docs/Modules.html>`_. 1058 1059Type Trait Primitives 1060===================== 1061 1062Type trait primitives are special builtin constant expressions that can be used 1063by the standard C++ library to facilitate or simplify the implementation of 1064user-facing type traits in the <type_traits> header. 1065 1066They are not intended to be used directly by user code because they are 1067implementation-defined and subject to change -- as such they're tied closely to 1068the supported set of system headers, currently: 1069 1070* LLVM's own libc++ 1071* GNU libstdc++ 1072* The Microsoft standard C++ library 1073 1074Clang supports the `GNU C++ type traits 1075<https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the 1076`Microsoft Visual C++ type traits 1077<https://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_, 1078as well as nearly all of the 1079`Embarcadero C++ type traits 1080<http://docwiki.embarcadero.com/RADStudio/Rio/en/Type_Trait_Functions_(C%2B%2B11)_Index>`_. 1081 1082The following type trait primitives are supported by Clang. Those traits marked 1083(C++) provide implementations for type traits specified by the C++ standard; 1084``__X(...)`` has the same semantics and constraints as the corresponding 1085``std::X_t<...>`` or ``std::X_v<...>`` type trait. 1086 1087* ``__array_rank(type)`` (Embarcadero): 1088 Returns the number of levels of array in the type ``type``: 1089 ``0`` if ``type`` is not an array type, and 1090 ``__array_rank(element) + 1`` if ``type`` is an array of ``element``. 1091* ``__array_extent(type, dim)`` (Embarcadero): 1092 The ``dim``'th array bound in the type ``type``, or ``0`` if 1093 ``dim >= __array_rank(type)``. 1094* ``__has_nothrow_assign`` (GNU, Microsoft, Embarcadero): 1095 Deprecated, use ``__is_nothrow_assignable`` instead. 1096* ``__has_nothrow_move_assign`` (GNU, Microsoft): 1097 Deprecated, use ``__is_nothrow_assignable`` instead. 1098* ``__has_nothrow_copy`` (GNU, Microsoft): 1099 Deprecated, use ``__is_nothrow_constructible`` instead. 1100* ``__has_nothrow_constructor`` (GNU, Microsoft): 1101 Deprecated, use ``__is_nothrow_constructible`` instead. 1102* ``__has_trivial_assign`` (GNU, Microsoft, Embarcadero): 1103 Deprecated, use ``__is_trivially_assignable`` instead. 1104* ``__has_trivial_move_assign`` (GNU, Microsoft): 1105 Deprecated, use ``__is_trivially_assignable`` instead. 1106* ``__has_trivial_copy`` (GNU, Microsoft): 1107 Deprecated, use ``__is_trivially_constructible`` instead. 1108* ``__has_trivial_constructor`` (GNU, Microsoft): 1109 Deprecated, use ``__is_trivially_constructible`` instead. 1110* ``__has_trivial_move_constructor`` (GNU, Microsoft): 1111 Deprecated, use ``__is_trivially_constructible`` instead. 1112* ``__has_trivial_destructor`` (GNU, Microsoft, Embarcadero): 1113 Deprecated, use ``__is_trivially_destructible`` instead. 1114* ``__has_unique_object_representations`` (C++, GNU) 1115* ``__has_virtual_destructor`` (C++, GNU, Microsoft, Embarcadero) 1116* ``__is_abstract`` (C++, GNU, Microsoft, Embarcadero) 1117* ``__is_aggregate`` (C++, GNU, Microsoft) 1118* ``__is_arithmetic`` (C++, Embarcadero) 1119* ``__is_array`` (C++, Embarcadero) 1120* ``__is_assignable`` (C++, MSVC 2015) 1121* ``__is_base_of`` (C++, GNU, Microsoft, Embarcadero) 1122* ``__is_class`` (C++, GNU, Microsoft, Embarcadero) 1123* ``__is_complete_type(type)`` (Embarcadero): 1124 Return ``true`` if ``type`` is a complete type. 1125 Warning: this trait is dangerous because it can return different values at 1126 different points in the same program. 1127* ``__is_compound`` (C++, Embarcadero) 1128* ``__is_const`` (C++, Embarcadero) 1129* ``__is_constructible`` (C++, MSVC 2013) 1130* ``__is_convertible`` (C++, Embarcadero) 1131* ``__is_convertible_to`` (Microsoft): 1132 Synonym for ``__is_convertible``. 1133* ``__is_destructible`` (C++, MSVC 2013): 1134 Only available in ``-fms-extensions`` mode. 1135* ``__is_empty`` (C++, GNU, Microsoft, Embarcadero) 1136* ``__is_enum`` (C++, GNU, Microsoft, Embarcadero) 1137* ``__is_final`` (C++, GNU, Microsoft) 1138* ``__is_floating_point`` (C++, Embarcadero) 1139* ``__is_function`` (C++, Embarcadero) 1140* ``__is_fundamental`` (C++, Embarcadero) 1141* ``__is_integral`` (C++, Embarcadero) 1142* ``__is_interface_class`` (Microsoft): 1143 Returns ``false``, even for types defined with ``__interface``. 1144* ``__is_literal`` (Clang): 1145 Synonym for ``__is_literal_type``. 1146* ``__is_literal_type`` (C++, GNU, Microsoft): 1147 Note, the corresponding standard trait was deprecated in C++17 1148 and removed in C++20. 1149* ``__is_lvalue_reference`` (C++, Embarcadero) 1150* ``__is_member_object_pointer`` (C++, Embarcadero) 1151* ``__is_member_function_pointer`` (C++, Embarcadero) 1152* ``__is_member_pointer`` (C++, Embarcadero) 1153* ``__is_nothrow_assignable`` (C++, MSVC 2013) 1154* ``__is_nothrow_constructible`` (C++, MSVC 2013) 1155* ``__is_nothrow_destructible`` (C++, MSVC 2013) 1156 Only available in ``-fms-extensions`` mode. 1157* ``__is_object`` (C++, Embarcadero) 1158* ``__is_pod`` (C++, GNU, Microsoft, Embarcadero): 1159 Note, the corresponding standard trait was deprecated in C++20. 1160* ``__is_pointer`` (C++, Embarcadero) 1161* ``__is_polymorphic`` (C++, GNU, Microsoft, Embarcadero) 1162* ``__is_reference`` (C++, Embarcadero) 1163* ``__is_rvalue_reference`` (C++, Embarcadero) 1164* ``__is_same`` (C++, Embarcadero) 1165* ``__is_same_as`` (GCC): Synonym for ``__is_same``. 1166* ``__is_scalar`` (C++, Embarcadero) 1167* ``__is_sealed`` (Microsoft): 1168 Synonym for ``__is_final``. 1169* ``__is_signed`` (C++, Embarcadero): 1170 Returns false for enumeration types, and returns true for floating-point types. Note, before Clang 10, returned true for enumeration types if the underlying type was signed, and returned false for floating-point types. 1171* ``__is_standard_layout`` (C++, GNU, Microsoft, Embarcadero) 1172* ``__is_trivial`` (C++, GNU, Microsoft, Embarcadero) 1173* ``__is_trivially_assignable`` (C++, GNU, Microsoft) 1174* ``__is_trivially_constructible`` (C++, GNU, Microsoft) 1175* ``__is_trivially_copyable`` (C++, GNU, Microsoft) 1176* ``__is_trivially_destructible`` (C++, MSVC 2013) 1177* ``__is_union`` (C++, GNU, Microsoft, Embarcadero) 1178* ``__is_unsigned`` (C++, Embarcadero) 1179 Note that this currently returns true for enumeration types if the underlying 1180 type is unsigned, in violation of the requirements for ``std::is_unsigned``. 1181 This behavior is likely to change in a future version of Clang. 1182* ``__is_void`` (C++, Embarcadero) 1183* ``__is_volatile`` (C++, Embarcadero) 1184* ``__reference_binds_to_temporary(T, U)`` (Clang): Determines whether a 1185 reference of type ``T`` bound to an expression of type ``U`` would bind to a 1186 materialized temporary object. If ``T`` is not a reference type the result 1187 is false. Note this trait will also return false when the initialization of 1188 ``T`` from ``U`` is ill-formed. 1189* ``__underlying_type`` (C++, GNU, Microsoft) 1190 1191In addition, the following expression traits are supported: 1192 1193* ``__is_lvalue_expr(e)`` (Embarcadero): 1194 Returns true if ``e`` is an lvalue expression. 1195 Deprecated, use ``__is_lvalue_reference(decltype((e)))`` instead. 1196* ``__is_rvalue_expr(e)`` (Embarcadero): 1197 Returns true if ``e`` is a prvalue expression. 1198 Deprecated, use ``!__is_reference(decltype((e)))`` instead. 1199 1200There are multiple ways to detect support for a type trait ``__X`` in the 1201compiler, depending on the oldest version of Clang you wish to support. 1202 1203* From Clang 10 onwards, ``__has_builtin(__X)`` can be used. 1204* From Clang 6 onwards, ``!__is_identifier(__X)`` can be used. 1205* From Clang 3 onwards, ``__has_feature(X)`` can be used, but only supports 1206 the following traits: 1207 1208 * ``__has_nothrow_assign`` 1209 * ``__has_nothrow_copy`` 1210 * ``__has_nothrow_constructor`` 1211 * ``__has_trivial_assign`` 1212 * ``__has_trivial_copy`` 1213 * ``__has_trivial_constructor`` 1214 * ``__has_trivial_destructor`` 1215 * ``__has_virtual_destructor`` 1216 * ``__is_abstract`` 1217 * ``__is_base_of`` 1218 * ``__is_class`` 1219 * ``__is_constructible`` 1220 * ``__is_convertible_to`` 1221 * ``__is_empty`` 1222 * ``__is_enum`` 1223 * ``__is_final`` 1224 * ``__is_literal`` 1225 * ``__is_standard_layout`` 1226 * ``__is_pod`` 1227 * ``__is_polymorphic`` 1228 * ``__is_sealed`` 1229 * ``__is_trivial`` 1230 * ``__is_trivially_assignable`` 1231 * ``__is_trivially_constructible`` 1232 * ``__is_trivially_copyable`` 1233 * ``__is_union`` 1234 * ``__underlying_type`` 1235 1236A simplistic usage example as might be seen in standard C++ headers follows: 1237 1238.. code-block:: c++ 1239 1240 #if __has_builtin(__is_convertible_to) 1241 template<typename From, typename To> 1242 struct is_convertible_to { 1243 static const bool value = __is_convertible_to(From, To); 1244 }; 1245 #else 1246 // Emulate type trait for compatibility with other compilers. 1247 #endif 1248 1249Blocks 1250====== 1251 1252The syntax and high level language feature description is in 1253:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for 1254the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`. 1255 1256Query for this feature with ``__has_extension(blocks)``. 1257 1258Objective-C Features 1259==================== 1260 1261Related result types 1262-------------------- 1263 1264According to Cocoa conventions, Objective-C methods with certain names 1265("``init``", "``alloc``", etc.) always return objects that are an instance of 1266the receiving class's type. Such methods are said to have a "related result 1267type", meaning that a message send to one of these methods will have the same 1268static type as an instance of the receiver class. For example, given the 1269following classes: 1270 1271.. code-block:: objc 1272 1273 @interface NSObject 1274 + (id)alloc; 1275 - (id)init; 1276 @end 1277 1278 @interface NSArray : NSObject 1279 @end 1280 1281and this common initialization pattern 1282 1283.. code-block:: objc 1284 1285 NSArray *array = [[NSArray alloc] init]; 1286 1287the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because 1288``alloc`` implicitly has a related result type. Similarly, the type of the 1289expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a 1290related result type and its receiver is known to have the type ``NSArray *``. 1291If neither ``alloc`` nor ``init`` had a related result type, the expressions 1292would have had type ``id``, as declared in the method signature. 1293 1294A method with a related result type can be declared by using the type 1295``instancetype`` as its result type. ``instancetype`` is a contextual keyword 1296that is only permitted in the result type of an Objective-C method, e.g. 1297 1298.. code-block:: objc 1299 1300 @interface A 1301 + (instancetype)constructAnA; 1302 @end 1303 1304The related result type can also be inferred for some methods. To determine 1305whether a method has an inferred related result type, the first word in the 1306camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered, 1307and the method will have a related result type if its return type is compatible 1308with the type of its class and if: 1309 1310* the first word is "``alloc``" or "``new``", and the method is a class method, 1311 or 1312 1313* the first word is "``autorelease``", "``init``", "``retain``", or "``self``", 1314 and the method is an instance method. 1315 1316If a method with a related result type is overridden by a subclass method, the 1317subclass method must also return a type that is compatible with the subclass 1318type. For example: 1319 1320.. code-block:: objc 1321 1322 @interface NSString : NSObject 1323 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString 1324 @end 1325 1326Related result types only affect the type of a message send or property access 1327via the given method. In all other respects, a method with a related result 1328type is treated the same way as method that returns ``id``. 1329 1330Use ``__has_feature(objc_instancetype)`` to determine whether the 1331``instancetype`` contextual keyword is available. 1332 1333Automatic reference counting 1334---------------------------- 1335 1336Clang provides support for :doc:`automated reference counting 1337<AutomaticReferenceCounting>` in Objective-C, which eliminates the need 1338for manual ``retain``/``release``/``autorelease`` message sends. There are three 1339feature macros associated with automatic reference counting: 1340``__has_feature(objc_arc)`` indicates the availability of automated reference 1341counting in general, while ``__has_feature(objc_arc_weak)`` indicates that 1342automated reference counting also includes support for ``__weak`` pointers to 1343Objective-C objects. ``__has_feature(objc_arc_fields)`` indicates that C structs 1344are allowed to have fields that are pointers to Objective-C objects managed by 1345automatic reference counting. 1346 1347.. _objc-weak: 1348 1349Weak references 1350--------------- 1351 1352Clang supports ARC-style weak and unsafe references in Objective-C even 1353outside of ARC mode. Weak references must be explicitly enabled with 1354the ``-fobjc-weak`` option; use ``__has_feature((objc_arc_weak))`` 1355to test whether they are enabled. Unsafe references are enabled 1356unconditionally. ARC-style weak and unsafe references cannot be used 1357when Objective-C garbage collection is enabled. 1358 1359Except as noted below, the language rules for the ``__weak`` and 1360``__unsafe_unretained`` qualifiers (and the ``weak`` and 1361``unsafe_unretained`` property attributes) are just as laid out 1362in the :doc:`ARC specification <AutomaticReferenceCounting>`. 1363In particular, note that some classes do not support forming weak 1364references to their instances, and note that special care must be 1365taken when storing weak references in memory where initialization 1366and deinitialization are outside the responsibility of the compiler 1367(such as in ``malloc``-ed memory). 1368 1369Loading from a ``__weak`` variable always implicitly retains the 1370loaded value. In non-ARC modes, this retain is normally balanced 1371by an implicit autorelease. This autorelease can be suppressed 1372by performing the load in the receiver position of a ``-retain`` 1373message send (e.g. ``[weakReference retain]``); note that this performs 1374only a single retain (the retain done when primitively loading from 1375the weak reference). 1376 1377For the most part, ``__unsafe_unretained`` in non-ARC modes is just the 1378default behavior of variables and therefore is not needed. However, 1379it does have an effect on the semantics of block captures: normally, 1380copying a block which captures an Objective-C object or block pointer 1381causes the captured pointer to be retained or copied, respectively, 1382but that behavior is suppressed when the captured variable is qualified 1383with ``__unsafe_unretained``. 1384 1385Note that the ``__weak`` qualifier formerly meant the GC qualifier in 1386all non-ARC modes and was silently ignored outside of GC modes. It now 1387means the ARC-style qualifier in all non-GC modes and is no longer 1388allowed if not enabled by either ``-fobjc-arc`` or ``-fobjc-weak``. 1389It is expected that ``-fobjc-weak`` will eventually be enabled by default 1390in all non-GC Objective-C modes. 1391 1392.. _objc-fixed-enum: 1393 1394Enumerations with a fixed underlying type 1395----------------------------------------- 1396 1397Clang provides support for C++11 enumerations with a fixed underlying type 1398within Objective-C. For example, one can write an enumeration type as: 1399 1400.. code-block:: c++ 1401 1402 typedef enum : unsigned char { Red, Green, Blue } Color; 1403 1404This specifies that the underlying type, which is used to store the enumeration 1405value, is ``unsigned char``. 1406 1407Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed 1408underlying types is available in Objective-C. 1409 1410Interoperability with C++11 lambdas 1411----------------------------------- 1412 1413Clang provides interoperability between C++11 lambdas and blocks-based APIs, by 1414permitting a lambda to be implicitly converted to a block pointer with the 1415corresponding signature. For example, consider an API such as ``NSArray``'s 1416array-sorting method: 1417 1418.. code-block:: objc 1419 1420 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr; 1421 1422``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult 1423(^)(id, id)``, and parameters of this type are generally provided with block 1424literals as arguments. However, one can also use a C++11 lambda so long as it 1425provides the same signature (in this case, accepting two parameters of type 1426``id`` and returning an ``NSComparisonResult``): 1427 1428.. code-block:: objc 1429 1430 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11", 1431 @"String 02"]; 1432 const NSStringCompareOptions comparisonOptions 1433 = NSCaseInsensitiveSearch | NSNumericSearch | 1434 NSWidthInsensitiveSearch | NSForcedOrderingSearch; 1435 NSLocale *currentLocale = [NSLocale currentLocale]; 1436 NSArray *sorted 1437 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult { 1438 NSRange string1Range = NSMakeRange(0, [s1 length]); 1439 return [s1 compare:s2 options:comparisonOptions 1440 range:string1Range locale:currentLocale]; 1441 }]; 1442 NSLog(@"sorted: %@", sorted); 1443 1444This code relies on an implicit conversion from the type of the lambda 1445expression (an unnamed, local class type called the *closure type*) to the 1446corresponding block pointer type. The conversion itself is expressed by a 1447conversion operator in that closure type that produces a block pointer with the 1448same signature as the lambda itself, e.g., 1449 1450.. code-block:: objc 1451 1452 operator NSComparisonResult (^)(id, id)() const; 1453 1454This conversion function returns a new block that simply forwards the two 1455parameters to the lambda object (which it captures by copy), then returns the 1456result. The returned block is first copied (with ``Block_copy``) and then 1457autoreleased. As an optimization, if a lambda expression is immediately 1458converted to a block pointer (as in the first example, above), then the block 1459is not copied and autoreleased: rather, it is given the same lifetime as a 1460block literal written at that point in the program, which avoids the overhead 1461of copying a block to the heap in the common case. 1462 1463The conversion from a lambda to a block pointer is only available in 1464Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory 1465management (autorelease). 1466 1467Object Literals and Subscripting 1468-------------------------------- 1469 1470Clang provides support for :doc:`Object Literals and Subscripting 1471<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C 1472programming patterns, makes programs more concise, and improves the safety of 1473container creation. There are several feature macros associated with object 1474literals and subscripting: ``__has_feature(objc_array_literals)`` tests the 1475availability of array literals; ``__has_feature(objc_dictionary_literals)`` 1476tests the availability of dictionary literals; 1477``__has_feature(objc_subscripting)`` tests the availability of object 1478subscripting. 1479 1480Objective-C Autosynthesis of Properties 1481--------------------------------------- 1482 1483Clang provides support for autosynthesis of declared properties. Using this 1484feature, clang provides default synthesis of those properties not declared 1485@dynamic and not having user provided backing getter and setter methods. 1486``__has_feature(objc_default_synthesize_properties)`` checks for availability 1487of this feature in version of clang being used. 1488 1489.. _langext-objc-retain-release: 1490 1491Objective-C retaining behavior attributes 1492----------------------------------------- 1493 1494In Objective-C, functions and methods are generally assumed to follow the 1495`Cocoa Memory Management 1496<https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_ 1497conventions for ownership of object arguments and 1498return values. However, there are exceptions, and so Clang provides attributes 1499to allow these exceptions to be documented. This are used by ARC and the 1500`static analyzer <https://clang-analyzer.llvm.org>`_ Some exceptions may be 1501better described using the ``objc_method_family`` attribute instead. 1502 1503**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``, 1504``ns_returns_autoreleased``, ``cf_returns_retained``, and 1505``cf_returns_not_retained`` attributes can be placed on methods and functions 1506that return Objective-C or CoreFoundation objects. They are commonly placed at 1507the end of a function prototype or method declaration: 1508 1509.. code-block:: objc 1510 1511 id foo() __attribute__((ns_returns_retained)); 1512 1513 - (NSString *)bar:(int)x __attribute__((ns_returns_retained)); 1514 1515The ``*_returns_retained`` attributes specify that the returned object has a +1 1516retain count. The ``*_returns_not_retained`` attributes specify that the return 1517object has a +0 retain count, even if the normal convention for its selector 1518would be +1. ``ns_returns_autoreleased`` specifies that the returned object is 1519+0, but is guaranteed to live at least as long as the next flush of an 1520autorelease pool. 1521 1522**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on 1523an parameter declaration; they specify that the argument is expected to have a 1524+1 retain count, which will be balanced in some way by the function or method. 1525The ``ns_consumes_self`` attribute can only be placed on an Objective-C 1526method; it specifies that the method expects its ``self`` parameter to have a 1527+1 retain count, which it will balance in some way. 1528 1529.. code-block:: objc 1530 1531 void foo(__attribute__((ns_consumed)) NSString *string); 1532 1533 - (void) bar __attribute__((ns_consumes_self)); 1534 - (void) baz:(id) __attribute__((ns_consumed)) x; 1535 1536Further examples of these attributes are available in the static analyzer's `list of annotations for analysis 1537<https://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_. 1538 1539Query for these features with ``__has_attribute(ns_consumed)``, 1540``__has_attribute(ns_returns_retained)``, etc. 1541 1542Objective-C @available 1543---------------------- 1544 1545It is possible to use the newest SDK but still build a program that can run on 1546older versions of macOS and iOS by passing ``-mmacosx-version-min=`` / 1547``-miphoneos-version-min=``. 1548 1549Before LLVM 5.0, when calling a function that exists only in the OS that's 1550newer than the target OS (as determined by the minimum deployment version), 1551programmers had to carefully check if the function exists at runtime, using 1552null checks for weakly-linked C functions, ``+class`` for Objective-C classes, 1553and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for 1554Objective-C methods. If such a check was missed, the program would compile 1555fine, run fine on newer systems, but crash on older systems. 1556 1557As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes 1558<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ together 1559with the new ``@available()`` keyword to assist with this issue. 1560When a method that's introduced in the OS newer than the target OS is called, a 1561-Wunguarded-availability warning is emitted if that call is not guarded: 1562 1563.. code-block:: objc 1564 1565 void my_fun(NSSomeClass* var) { 1566 // If fancyNewMethod was added in e.g. macOS 10.12, but the code is 1567 // built with -mmacosx-version-min=10.11, then this unconditional call 1568 // will emit a -Wunguarded-availability warning: 1569 [var fancyNewMethod]; 1570 } 1571 1572To fix the warning and to avoid the crash on macOS 10.11, wrap it in 1573``if(@available())``: 1574 1575.. code-block:: objc 1576 1577 void my_fun(NSSomeClass* var) { 1578 if (@available(macOS 10.12, *)) { 1579 [var fancyNewMethod]; 1580 } else { 1581 // Put fallback behavior for old macOS versions (and for non-mac 1582 // platforms) here. 1583 } 1584 } 1585 1586The ``*`` is required and means that platforms not explicitly listed will take 1587the true branch, and the compiler will emit ``-Wunguarded-availability`` 1588warnings for unlisted platforms based on those platform's deployment target. 1589More than one platform can be listed in ``@available()``: 1590 1591.. code-block:: objc 1592 1593 void my_fun(NSSomeClass* var) { 1594 if (@available(macOS 10.12, iOS 10, *)) { 1595 [var fancyNewMethod]; 1596 } 1597 } 1598 1599If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called 1600on 10.12, then add an `availability attribute 1601<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it, 1602which will also suppress the warning and require that calls to my_fun() are 1603checked: 1604 1605.. code-block:: objc 1606 1607 API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) { 1608 [var fancyNewMethod]; // Now ok. 1609 } 1610 1611``@available()`` is only available in Objective-C code. To use the feature 1612in C and C++ code, use the ``__builtin_available()`` spelling instead. 1613 1614If existing code uses null checks or ``-respondsToSelector:``, it should 1615be changed to use ``@available()`` (or ``__builtin_available``) instead. 1616 1617``-Wunguarded-availability`` is disabled by default, but 1618``-Wunguarded-availability-new``, which only emits this warning for APIs 1619that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and 1620tvOS >= 11, is enabled by default. 1621 1622.. _langext-overloading: 1623 1624Objective-C++ ABI: protocol-qualifier mangling of parameters 1625------------------------------------------------------------ 1626 1627Starting with LLVM 3.4, Clang produces a new mangling for parameters whose 1628type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such 1629parameters to be differentiated from those with the regular unqualified ``id`` 1630type. 1631 1632This was a non-backward compatible mangling change to the ABI. This change 1633allows proper overloading, and also prevents mangling conflicts with template 1634parameters of protocol-qualified type. 1635 1636Query the presence of this new mangling with 1637``__has_feature(objc_protocol_qualifier_mangling)``. 1638 1639Initializer lists for complex numbers in C 1640========================================== 1641 1642clang supports an extension which allows the following in C: 1643 1644.. code-block:: c++ 1645 1646 #include <math.h> 1647 #include <complex.h> 1648 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf) 1649 1650This construct is useful because there is no way to separately initialize the 1651real and imaginary parts of a complex variable in standard C, given that clang 1652does not support ``_Imaginary``. (Clang also supports the ``__real__`` and 1653``__imag__`` extensions from gcc, which help in some cases, but are not usable 1654in static initializers.) 1655 1656Note that this extension does not allow eliding the braces; the meaning of the 1657following two lines is different: 1658 1659.. code-block:: c++ 1660 1661 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1) 1662 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0) 1663 1664This extension also works in C++ mode, as far as that goes, but does not apply 1665to the C++ ``std::complex``. (In C++11, list initialization allows the same 1666syntax to be used with ``std::complex`` with the same meaning.) 1667 1668Builtin Functions 1669================= 1670 1671Clang supports a number of builtin library functions with the same syntax as 1672GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``, 1673``__builtin_choose_expr``, ``__builtin_types_compatible_p``, 1674``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to 1675the GCC builtins, Clang supports a number of builtins that GCC does not, which 1676are listed here. 1677 1678Please note that Clang does not and will not support all of the GCC builtins 1679for vector operations. Instead of using builtins, you should use the functions 1680defined in target-specific header files like ``<xmmintrin.h>``, which define 1681portable wrappers for these. Many of the Clang versions of these functions are 1682implemented directly in terms of :ref:`extended vector support 1683<langext-vectors>` instead of builtins, in order to reduce the number of 1684builtins that we need to implement. 1685 1686``__builtin_assume`` 1687------------------------------ 1688 1689``__builtin_assume`` is used to provide the optimizer with a boolean 1690invariant that is defined to be true. 1691 1692**Syntax**: 1693 1694.. code-block:: c++ 1695 1696 __builtin_assume(bool) 1697 1698**Example of Use**: 1699 1700.. code-block:: c++ 1701 1702 int foo(int x) { 1703 __builtin_assume(x != 0); 1704 1705 // The optimizer may short-circuit this check using the invariant. 1706 if (x == 0) 1707 return do_something(); 1708 1709 return do_something_else(); 1710 } 1711 1712**Description**: 1713 1714The boolean argument to this function is defined to be true. The optimizer may 1715analyze the form of the expression provided as the argument and deduce from 1716that information used to optimize the program. If the condition is violated 1717during execution, the behavior is undefined. The argument itself is never 1718evaluated, so any side effects of the expression will be discarded. 1719 1720Query for this feature with ``__has_builtin(__builtin_assume)``. 1721 1722``__builtin_readcyclecounter`` 1723------------------------------ 1724 1725``__builtin_readcyclecounter`` is used to access the cycle counter register (or 1726a similar low-latency, high-accuracy clock) on those targets that support it. 1727 1728**Syntax**: 1729 1730.. code-block:: c++ 1731 1732 __builtin_readcyclecounter() 1733 1734**Example of Use**: 1735 1736.. code-block:: c++ 1737 1738 unsigned long long t0 = __builtin_readcyclecounter(); 1739 do_something(); 1740 unsigned long long t1 = __builtin_readcyclecounter(); 1741 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow 1742 1743**Description**: 1744 1745The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value, 1746which may be either global or process/thread-specific depending on the target. 1747As the backing counters often overflow quickly (on the order of seconds) this 1748should only be used for timing small intervals. When not supported by the 1749target, the return value is always zero. This builtin takes no arguments and 1750produces an unsigned long long result. 1751 1752Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note 1753that even if present, its use may depend on run-time privilege or other OS 1754controlled state. 1755 1756.. _langext-__builtin_shufflevector: 1757 1758``__builtin_shufflevector`` 1759--------------------------- 1760 1761``__builtin_shufflevector`` is used to express generic vector 1762permutation/shuffle/swizzle operations. This builtin is also very important 1763for the implementation of various target-specific header files like 1764``<xmmintrin.h>``. 1765 1766**Syntax**: 1767 1768.. code-block:: c++ 1769 1770 __builtin_shufflevector(vec1, vec2, index1, index2, ...) 1771 1772**Examples**: 1773 1774.. code-block:: c++ 1775 1776 // identity operation - return 4-element vector v1. 1777 __builtin_shufflevector(v1, v1, 0, 1, 2, 3) 1778 1779 // "Splat" element 0 of V1 into a 4-element result. 1780 __builtin_shufflevector(V1, V1, 0, 0, 0, 0) 1781 1782 // Reverse 4-element vector V1. 1783 __builtin_shufflevector(V1, V1, 3, 2, 1, 0) 1784 1785 // Concatenate every other element of 4-element vectors V1 and V2. 1786 __builtin_shufflevector(V1, V2, 0, 2, 4, 6) 1787 1788 // Concatenate every other element of 8-element vectors V1 and V2. 1789 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14) 1790 1791 // Shuffle v1 with some elements being undefined 1792 __builtin_shufflevector(v1, v1, 3, -1, 1, -1) 1793 1794**Description**: 1795 1796The first two arguments to ``__builtin_shufflevector`` are vectors that have 1797the same element type. The remaining arguments are a list of integers that 1798specify the elements indices of the first two vectors that should be extracted 1799and returned in a new vector. These element indices are numbered sequentially 1800starting with the first vector, continuing into the second vector. Thus, if 1801``vec1`` is a 4-element vector, index 5 would refer to the second element of 1802``vec2``. An index of -1 can be used to indicate that the corresponding element 1803in the returned vector is a don't care and can be optimized by the backend. 1804 1805The result of ``__builtin_shufflevector`` is a vector with the same element 1806type as ``vec1``/``vec2`` but that has an element count equal to the number of 1807indices specified. 1808 1809Query for this feature with ``__has_builtin(__builtin_shufflevector)``. 1810 1811.. _langext-__builtin_convertvector: 1812 1813``__builtin_convertvector`` 1814--------------------------- 1815 1816``__builtin_convertvector`` is used to express generic vector 1817type-conversion operations. The input vector and the output vector 1818type must have the same number of elements. 1819 1820**Syntax**: 1821 1822.. code-block:: c++ 1823 1824 __builtin_convertvector(src_vec, dst_vec_type) 1825 1826**Examples**: 1827 1828.. code-block:: c++ 1829 1830 typedef double vector4double __attribute__((__vector_size__(32))); 1831 typedef float vector4float __attribute__((__vector_size__(16))); 1832 typedef short vector4short __attribute__((__vector_size__(8))); 1833 vector4float vf; vector4short vs; 1834 1835 // convert from a vector of 4 floats to a vector of 4 doubles. 1836 __builtin_convertvector(vf, vector4double) 1837 // equivalent to: 1838 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] } 1839 1840 // convert from a vector of 4 shorts to a vector of 4 floats. 1841 __builtin_convertvector(vs, vector4float) 1842 // equivalent to: 1843 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] } 1844 1845**Description**: 1846 1847The first argument to ``__builtin_convertvector`` is a vector, and the second 1848argument is a vector type with the same number of elements as the first 1849argument. 1850 1851The result of ``__builtin_convertvector`` is a vector with the same element 1852type as the second argument, with a value defined in terms of the action of a 1853C-style cast applied to each element of the first argument. 1854 1855Query for this feature with ``__has_builtin(__builtin_convertvector)``. 1856 1857``__builtin_bitreverse`` 1858------------------------ 1859 1860* ``__builtin_bitreverse8`` 1861* ``__builtin_bitreverse16`` 1862* ``__builtin_bitreverse32`` 1863* ``__builtin_bitreverse64`` 1864 1865**Syntax**: 1866 1867.. code-block:: c++ 1868 1869 __builtin_bitreverse32(x) 1870 1871**Examples**: 1872 1873.. code-block:: c++ 1874 1875 uint8_t rev_x = __builtin_bitreverse8(x); 1876 uint16_t rev_x = __builtin_bitreverse16(x); 1877 uint32_t rev_y = __builtin_bitreverse32(y); 1878 uint64_t rev_z = __builtin_bitreverse64(z); 1879 1880**Description**: 1881 1882The '``__builtin_bitreverse``' family of builtins is used to reverse 1883the bitpattern of an integer value; for example ``0b10110110`` becomes 1884``0b01101101``. 1885 1886``__builtin_rotateleft`` 1887------------------------ 1888 1889* ``__builtin_rotateleft8`` 1890* ``__builtin_rotateleft16`` 1891* ``__builtin_rotateleft32`` 1892* ``__builtin_rotateleft64`` 1893 1894**Syntax**: 1895 1896.. code-block:: c++ 1897 1898 __builtin_rotateleft32(x, y) 1899 1900**Examples**: 1901 1902.. code-block:: c++ 1903 1904 uint8_t rot_x = __builtin_rotateleft8(x, y); 1905 uint16_t rot_x = __builtin_rotateleft16(x, y); 1906 uint32_t rot_x = __builtin_rotateleft32(x, y); 1907 uint64_t rot_x = __builtin_rotateleft64(x, y); 1908 1909**Description**: 1910 1911The '``__builtin_rotateleft``' family of builtins is used to rotate 1912the bits in the first argument by the amount in the second argument. 1913For example, ``0b10000110`` rotated left by 11 becomes ``0b00110100``. 1914The shift value is treated as an unsigned amount modulo the size of 1915the arguments. Both arguments and the result have the bitwidth specified 1916by the name of the builtin. 1917 1918``__builtin_rotateright`` 1919------------------------- 1920 1921* ``__builtin_rotateright8`` 1922* ``__builtin_rotateright16`` 1923* ``__builtin_rotateright32`` 1924* ``__builtin_rotateright64`` 1925 1926**Syntax**: 1927 1928.. code-block:: c++ 1929 1930 __builtin_rotateright32(x, y) 1931 1932**Examples**: 1933 1934.. code-block:: c++ 1935 1936 uint8_t rot_x = __builtin_rotateright8(x, y); 1937 uint16_t rot_x = __builtin_rotateright16(x, y); 1938 uint32_t rot_x = __builtin_rotateright32(x, y); 1939 uint64_t rot_x = __builtin_rotateright64(x, y); 1940 1941**Description**: 1942 1943The '``__builtin_rotateright``' family of builtins is used to rotate 1944the bits in the first argument by the amount in the second argument. 1945For example, ``0b10000110`` rotated right by 3 becomes ``0b11010000``. 1946The shift value is treated as an unsigned amount modulo the size of 1947the arguments. Both arguments and the result have the bitwidth specified 1948by the name of the builtin. 1949 1950``__builtin_unreachable`` 1951------------------------- 1952 1953``__builtin_unreachable`` is used to indicate that a specific point in the 1954program cannot be reached, even if the compiler might otherwise think it can. 1955This is useful to improve optimization and eliminates certain warnings. For 1956example, without the ``__builtin_unreachable`` in the example below, the 1957compiler assumes that the inline asm can fall through and prints a "function 1958declared '``noreturn``' should not return" warning. 1959 1960**Syntax**: 1961 1962.. code-block:: c++ 1963 1964 __builtin_unreachable() 1965 1966**Example of use**: 1967 1968.. code-block:: c++ 1969 1970 void myabort(void) __attribute__((noreturn)); 1971 void myabort(void) { 1972 asm("int3"); 1973 __builtin_unreachable(); 1974 } 1975 1976**Description**: 1977 1978The ``__builtin_unreachable()`` builtin has completely undefined behavior. 1979Since it has undefined behavior, it is a statement that it is never reached and 1980the optimizer can take advantage of this to produce better code. This builtin 1981takes no arguments and produces a void result. 1982 1983Query for this feature with ``__has_builtin(__builtin_unreachable)``. 1984 1985``__builtin_unpredictable`` 1986--------------------------- 1987 1988``__builtin_unpredictable`` is used to indicate that a branch condition is 1989unpredictable by hardware mechanisms such as branch prediction logic. 1990 1991**Syntax**: 1992 1993.. code-block:: c++ 1994 1995 __builtin_unpredictable(long long) 1996 1997**Example of use**: 1998 1999.. code-block:: c++ 2000 2001 if (__builtin_unpredictable(x > 0)) { 2002 foo(); 2003 } 2004 2005**Description**: 2006 2007The ``__builtin_unpredictable()`` builtin is expected to be used with control 2008flow conditions such as in ``if`` and ``switch`` statements. 2009 2010Query for this feature with ``__has_builtin(__builtin_unpredictable)``. 2011 2012``__sync_swap`` 2013--------------- 2014 2015``__sync_swap`` is used to atomically swap integers or pointers in memory. 2016 2017**Syntax**: 2018 2019.. code-block:: c++ 2020 2021 type __sync_swap(type *ptr, type value, ...) 2022 2023**Example of Use**: 2024 2025.. code-block:: c++ 2026 2027 int old_value = __sync_swap(&value, new_value); 2028 2029**Description**: 2030 2031The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of 2032atomic intrinsics to allow code to atomically swap the current value with the 2033new value. More importantly, it helps developers write more efficient and 2034correct code by avoiding expensive loops around 2035``__sync_bool_compare_and_swap()`` or relying on the platform specific 2036implementation details of ``__sync_lock_test_and_set()``. The 2037``__sync_swap()`` builtin is a full barrier. 2038 2039``__builtin_addressof`` 2040----------------------- 2041 2042``__builtin_addressof`` performs the functionality of the built-in ``&`` 2043operator, ignoring any ``operator&`` overload. This is useful in constant 2044expressions in C++11, where there is no other way to take the address of an 2045object that overloads ``operator&``. 2046 2047**Example of use**: 2048 2049.. code-block:: c++ 2050 2051 template<typename T> constexpr T *addressof(T &value) { 2052 return __builtin_addressof(value); 2053 } 2054 2055``__builtin_operator_new`` and ``__builtin_operator_delete`` 2056------------------------------------------------------------ 2057 2058``__builtin_operator_new`` allocates memory just like a non-placement non-class 2059*new-expression*. This is exactly like directly calling the normal 2060non-placement ``::operator new``, except that it allows certain optimizations 2061that the C++ standard does not permit for a direct function call to 2062``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and 2063merging allocations). 2064 2065Likewise, ``__builtin_operator_delete`` deallocates memory just like a 2066non-class *delete-expression*, and is exactly like directly calling the normal 2067``::operator delete``, except that it permits optimizations. Only the unsized 2068form of ``__builtin_operator_delete`` is currently available. 2069 2070These builtins are intended for use in the implementation of ``std::allocator`` 2071and other similar allocation libraries, and are only available in C++. 2072 2073``__builtin_preserve_access_index`` 2074----------------------------------- 2075 2076``__builtin_preserve_access_index`` specifies a code section where 2077array subscript access and structure/union member access are relocatable 2078under bpf compile-once run-everywhere framework. Debuginfo (typically 2079with ``-g``) is needed, otherwise, the compiler will exit with an error. 2080The return type for the intrinsic is the same as the type of the 2081argument. 2082 2083**Syntax**: 2084 2085.. code-block:: c 2086 2087 type __builtin_preserve_access_index(type arg) 2088 2089**Example of Use**: 2090 2091.. code-block:: c 2092 2093 struct t { 2094 int i; 2095 int j; 2096 union { 2097 int a; 2098 int b; 2099 } c[4]; 2100 }; 2101 struct t *v = ...; 2102 int *pb =__builtin_preserve_access_index(&v->c[3].b); 2103 __builtin_preserve_access_index(v->j); 2104 2105Multiprecision Arithmetic Builtins 2106---------------------------------- 2107 2108Clang provides a set of builtins which expose multiprecision arithmetic in a 2109manner amenable to C. They all have the following form: 2110 2111.. code-block:: c 2112 2113 unsigned x = ..., y = ..., carryin = ..., carryout; 2114 unsigned sum = __builtin_addc(x, y, carryin, &carryout); 2115 2116Thus one can form a multiprecision addition chain in the following manner: 2117 2118.. code-block:: c 2119 2120 unsigned *x, *y, *z, carryin=0, carryout; 2121 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout); 2122 carryin = carryout; 2123 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout); 2124 carryin = carryout; 2125 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout); 2126 carryin = carryout; 2127 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout); 2128 2129The complete list of builtins are: 2130 2131.. code-block:: c 2132 2133 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout); 2134 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout); 2135 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout); 2136 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout); 2137 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout); 2138 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout); 2139 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout); 2140 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout); 2141 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout); 2142 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout); 2143 2144Checked Arithmetic Builtins 2145--------------------------- 2146 2147Clang provides a set of builtins that implement checked arithmetic for security 2148critical applications in a manner that is fast and easily expressable in C. As 2149an example of their usage: 2150 2151.. code-block:: c 2152 2153 errorcode_t security_critical_application(...) { 2154 unsigned x, y, result; 2155 ... 2156 if (__builtin_mul_overflow(x, y, &result)) 2157 return kErrorCodeHackers; 2158 ... 2159 use_multiply(result); 2160 ... 2161 } 2162 2163Clang provides the following checked arithmetic builtins: 2164 2165.. code-block:: c 2166 2167 bool __builtin_add_overflow (type1 x, type2 y, type3 *sum); 2168 bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff); 2169 bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod); 2170 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum); 2171 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum); 2172 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum); 2173 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff); 2174 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff); 2175 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff); 2176 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod); 2177 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod); 2178 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod); 2179 bool __builtin_sadd_overflow (int x, int y, int *sum); 2180 bool __builtin_saddl_overflow (long x, long y, long *sum); 2181 bool __builtin_saddll_overflow(long long x, long long y, long long *sum); 2182 bool __builtin_ssub_overflow (int x, int y, int *diff); 2183 bool __builtin_ssubl_overflow (long x, long y, long *diff); 2184 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff); 2185 bool __builtin_smul_overflow (int x, int y, int *prod); 2186 bool __builtin_smull_overflow (long x, long y, long *prod); 2187 bool __builtin_smulll_overflow(long long x, long long y, long long *prod); 2188 2189Each builtin performs the specified mathematical operation on the 2190first two arguments and stores the result in the third argument. If 2191possible, the result will be equal to mathematically-correct result 2192and the builtin will return 0. Otherwise, the builtin will return 21931 and the result will be equal to the unique value that is equivalent 2194to the mathematically-correct result modulo two raised to the *k* 2195power, where *k* is the number of bits in the result type. The 2196behavior of these builtins is well-defined for all argument values. 2197 2198The first three builtins work generically for operands of any integer type, 2199including boolean types. The operands need not have the same type as each 2200other, or as the result. The other builtins may implicitly promote or 2201convert their operands before performing the operation. 2202 2203Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc. 2204 2205Floating point builtins 2206--------------------------------------- 2207 2208``__builtin_canonicalize`` 2209-------------------------- 2210 2211.. code-block:: c 2212 2213 double __builtin_canonicalize(double); 2214 float __builtin_canonicalizef(float); 2215 long double__builtin_canonicalizel(long double); 2216 2217Returns the platform specific canonical encoding of a floating point 2218number. This canonicalization is useful for implementing certain 2219numeric primitives such as frexp. See `LLVM canonicalize intrinsic 2220<https://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for 2221more information on the semantics. 2222 2223String builtins 2224--------------- 2225 2226Clang provides constant expression evaluation support for builtins forms of 2227the following functions from the C standard library ``<string.h>`` header: 2228 2229* ``memchr`` 2230* ``memcmp`` 2231* ``strchr`` 2232* ``strcmp`` 2233* ``strlen`` 2234* ``strncmp`` 2235* ``wcschr`` 2236* ``wcscmp`` 2237* ``wcslen`` 2238* ``wcsncmp`` 2239* ``wmemchr`` 2240* ``wmemcmp`` 2241 2242In each case, the builtin form has the name of the C library function prefixed 2243by ``__builtin_``. Example: 2244 2245.. code-block:: c 2246 2247 void *p = __builtin_memchr("foobar", 'b', 5); 2248 2249In addition to the above, one further builtin is provided: 2250 2251.. code-block:: c 2252 2253 char *__builtin_char_memchr(const char *haystack, int needle, size_t size); 2254 2255``__builtin_char_memchr(a, b, c)`` is identical to 2256``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within 2257constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*`` 2258is disallowed in general). 2259 2260Support for constant expression evaluation for the above builtins be detected 2261with ``__has_feature(cxx_constexpr_string_builtins)``. 2262 2263Atomic Min/Max builtins with memory ordering 2264-------------------------------------------- 2265 2266There are two atomic builtins with min/max in-memory comparison and swap. 2267The syntax and semantics are similar to GCC-compatible __atomic_* builtins. 2268 2269* ``__atomic_fetch_min`` 2270* ``__atomic_fetch_max`` 2271 2272The builtins work with signed and unsigned integers and require to specify memory ordering. 2273The return value is the original value that was stored in memory before comparison. 2274 2275Example: 2276 2277.. code-block:: c 2278 2279 unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED); 2280 2281The third argument is one of the memory ordering specifiers ``__ATOMIC_RELAXED``, 2282``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, ``__ATOMIC_RELEASE``, 2283``__ATOMIC_ACQ_REL``, or ``__ATOMIC_SEQ_CST`` following C++11 memory model semantics. 2284 2285In terms or aquire-release ordering barriers these two operations are always 2286considered as operations with *load-store* semantics, even when the original value 2287is not actually modified after comparison. 2288 2289.. _langext-__c11_atomic: 2290 2291__c11_atomic builtins 2292--------------------- 2293 2294Clang provides a set of builtins which are intended to be used to implement 2295C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the 2296``_explicit`` form of the corresponding C11 operation, and are named with a 2297``__c11_`` prefix. The supported operations, and the differences from 2298the corresponding C11 operations, are: 2299 2300* ``__c11_atomic_init`` 2301* ``__c11_atomic_thread_fence`` 2302* ``__c11_atomic_signal_fence`` 2303* ``__c11_atomic_is_lock_free`` (The argument is the size of the 2304 ``_Atomic(...)`` object, instead of its address) 2305* ``__c11_atomic_store`` 2306* ``__c11_atomic_load`` 2307* ``__c11_atomic_exchange`` 2308* ``__c11_atomic_compare_exchange_strong`` 2309* ``__c11_atomic_compare_exchange_weak`` 2310* ``__c11_atomic_fetch_add`` 2311* ``__c11_atomic_fetch_sub`` 2312* ``__c11_atomic_fetch_and`` 2313* ``__c11_atomic_fetch_or`` 2314* ``__c11_atomic_fetch_xor`` 2315* ``__c11_atomic_fetch_max`` 2316* ``__c11_atomic_fetch_min`` 2317 2318The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, 2319``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are 2320provided, with values corresponding to the enumerators of C11's 2321``memory_order`` enumeration. 2322 2323(Note that Clang additionally provides GCC-compatible ``__atomic_*`` 2324builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0 2325atomic builtins are an explicit form of the corresponding OpenCL 2.0 2326builtin function, and are named with a ``__opencl_`` prefix. The macros 2327``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``, 2328``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``, 2329and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values 2330corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.) 2331 2332Low-level ARM exclusive memory builtins 2333--------------------------------------- 2334 2335Clang provides overloaded builtins giving direct access to the three key ARM 2336instructions for implementing atomic operations. 2337 2338.. code-block:: c 2339 2340 T __builtin_arm_ldrex(const volatile T *addr); 2341 T __builtin_arm_ldaex(const volatile T *addr); 2342 int __builtin_arm_strex(T val, volatile T *addr); 2343 int __builtin_arm_stlex(T val, volatile T *addr); 2344 void __builtin_arm_clrex(void); 2345 2346The types ``T`` currently supported are: 2347 2348* Integer types with width at most 64 bits (or 128 bits on AArch64). 2349* Floating-point types 2350* Pointer types. 2351 2352Note that the compiler does not guarantee it will not insert stores which clear 2353the exclusive monitor in between an ``ldrex`` type operation and its paired 2354``strex``. In practice this is only usually a risk when the extra store is on 2355the same cache line as the variable being modified and Clang will only insert 2356stack stores on its own, so it is best not to use these operations on variables 2357with automatic storage duration. 2358 2359Also, loads and stores may be implicit in code written between the ``ldrex`` and 2360``strex``. Clang will not necessarily mitigate the effects of these either, so 2361care should be exercised. 2362 2363For these reasons the higher level atomic primitives should be preferred where 2364possible. 2365 2366Non-temporal load/store builtins 2367-------------------------------- 2368 2369Clang provides overloaded builtins allowing generation of non-temporal memory 2370accesses. 2371 2372.. code-block:: c 2373 2374 T __builtin_nontemporal_load(T *addr); 2375 void __builtin_nontemporal_store(T value, T *addr); 2376 2377The types ``T`` currently supported are: 2378 2379* Integer types. 2380* Floating-point types. 2381* Vector types. 2382 2383Note that the compiler does not guarantee that non-temporal loads or stores 2384will be used. 2385 2386C++ Coroutines support builtins 2387-------------------------------- 2388 2389.. warning:: 2390 This is a work in progress. Compatibility across Clang/LLVM releases is not 2391 guaranteed. 2392 2393Clang provides experimental builtins to support C++ Coroutines as defined by 2394https://wg21.link/P0057. The following four are intended to be used by the 2395standard library to implement `std::experimental::coroutine_handle` type. 2396 2397**Syntax**: 2398 2399.. code-block:: c 2400 2401 void __builtin_coro_resume(void *addr); 2402 void __builtin_coro_destroy(void *addr); 2403 bool __builtin_coro_done(void *addr); 2404 void *__builtin_coro_promise(void *addr, int alignment, bool from_promise) 2405 2406**Example of use**: 2407 2408.. code-block:: c++ 2409 2410 template <> struct coroutine_handle<void> { 2411 void resume() const { __builtin_coro_resume(ptr); } 2412 void destroy() const { __builtin_coro_destroy(ptr); } 2413 bool done() const { return __builtin_coro_done(ptr); } 2414 // ... 2415 protected: 2416 void *ptr; 2417 }; 2418 2419 template <typename Promise> struct coroutine_handle : coroutine_handle<> { 2420 // ... 2421 Promise &promise() const { 2422 return *reinterpret_cast<Promise *>( 2423 __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false)); 2424 } 2425 static coroutine_handle from_promise(Promise &promise) { 2426 coroutine_handle p; 2427 p.ptr = __builtin_coro_promise(&promise, alignof(Promise), 2428 /*from-promise=*/true); 2429 return p; 2430 } 2431 }; 2432 2433 2434Other coroutine builtins are either for internal clang use or for use during 2435development of the coroutine feature. See `Coroutines in LLVM 2436<https://llvm.org/docs/Coroutines.html#intrinsics>`_ for 2437more information on their semantics. Note that builtins matching the intrinsics 2438that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc, 2439llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to 2440an appropriate value during the emission. 2441 2442**Syntax**: 2443 2444.. code-block:: c 2445 2446 size_t __builtin_coro_size() 2447 void *__builtin_coro_frame() 2448 void *__builtin_coro_free(void *coro_frame) 2449 2450 void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts) 2451 bool __builtin_coro_alloc() 2452 void *__builtin_coro_begin(void *memory) 2453 void __builtin_coro_end(void *coro_frame, bool unwind) 2454 char __builtin_coro_suspend(bool final) 2455 bool __builtin_coro_param(void *original, void *copy) 2456 2457Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM 2458automatically will insert one if the first argument to `llvm.coro.suspend` is 2459token `none`. If a user calls `__builin_suspend`, clang will insert `token none` 2460as the first argument to the intrinsic. 2461 2462Source location builtins 2463------------------------ 2464 2465Clang provides experimental builtins to support C++ standard library implementation 2466of ``std::experimental::source_location`` as specified in http://wg21.link/N4600. 2467With the exception of ``__builtin_COLUMN``, these builtins are also implemented by 2468GCC. 2469 2470**Syntax**: 2471 2472.. code-block:: c 2473 2474 const char *__builtin_FILE(); 2475 const char *__builtin_FUNCTION(); 2476 unsigned __builtin_LINE(); 2477 unsigned __builtin_COLUMN(); // Clang only 2478 2479**Example of use**: 2480 2481.. code-block:: c++ 2482 2483 void my_assert(bool pred, int line = __builtin_LINE(), // Captures line of caller 2484 const char* file = __builtin_FILE(), 2485 const char* function = __builtin_FUNCTION()) { 2486 if (pred) return; 2487 printf("%s:%d assertion failed in function %s\n", file, line, function); 2488 std::abort(); 2489 } 2490 2491 struct MyAggregateType { 2492 int x; 2493 int line = __builtin_LINE(); // captures line where aggregate initialization occurs 2494 }; 2495 static_assert(MyAggregateType{42}.line == __LINE__); 2496 2497 struct MyClassType { 2498 int line = __builtin_LINE(); // captures line of the constructor used during initialization 2499 constexpr MyClassType(int) { assert(line == __LINE__); } 2500 }; 2501 2502**Description**: 2503 2504The builtins ``__builtin_LINE``, ``__builtin_FUNCTION``, and ``__builtin_FILE`` return 2505the values, at the "invocation point", for ``__LINE__``, ``__FUNCTION__``, and 2506``__FILE__`` respectively. These builtins are constant expressions. 2507 2508When the builtins appear as part of a default function argument the invocation 2509point is the location of the caller. When the builtins appear as part of a 2510default member initializer, the invocation point is the location of the 2511constructor or aggregate initialization used to create the object. Otherwise 2512the invocation point is the same as the location of the builtin. 2513 2514When the invocation point of ``__builtin_FUNCTION`` is not a function scope the 2515empty string is returned. 2516 2517Alignment builtins 2518------------------ 2519Clang provides builtins to support checking and adjusting alignment of 2520pointers and integers. 2521These builtins can be used to avoid relying on implementation-defined behavior 2522of arithmetic on integers derived from pointers. 2523Additionally, these builtins retain type information and, unlike bitwise 2524arithmentic, they can perform semantic checking on the alignment value. 2525 2526**Syntax**: 2527 2528.. code-block:: c 2529 2530 Type __builtin_align_up(Type value, size_t alignment); 2531 Type __builtin_align_down(Type value, size_t alignment); 2532 bool __builtin_is_aligned(Type value, size_t alignment); 2533 2534 2535**Example of use**: 2536 2537.. code-block:: c++ 2538 2539 char* global_alloc_buffer; 2540 void* my_aligned_allocator(size_t alloc_size, size_t alignment) { 2541 char* result = __builtin_align_up(global_alloc_buffer, alignment); 2542 // result now contains the value of global_alloc_buffer rounded up to the 2543 // next multiple of alignment. 2544 global_alloc_buffer = result + alloc_size; 2545 return result; 2546 } 2547 2548 void* get_start_of_page(void* ptr) { 2549 return __builtin_align_down(ptr, PAGE_SIZE); 2550 } 2551 2552 void example(char* buffer) { 2553 if (__builtin_is_aligned(buffer, 64)) { 2554 do_fast_aligned_copy(buffer); 2555 } else { 2556 do_unaligned_copy(buffer); 2557 } 2558 } 2559 2560 // In addition to pointers, the builtins can also be used on integer types 2561 // and are evaluatable inside constant expressions. 2562 static_assert(__builtin_align_up(123, 64) == 128, ""); 2563 static_assert(__builtin_align_down(123u, 64) == 64u, ""); 2564 static_assert(!__builtin_is_aligned(123, 64), ""); 2565 2566 2567**Description**: 2568 2569The builtins ``__builtin_align_up``, ``__builtin_align_down``, return their 2570first argument aligned up/down to the next multiple of the second argument. 2571If the value is already sufficiently aligned, it is returned unchanged. 2572The builtin ``__builtin_is_aligned`` returns whether the first argument is 2573aligned to a multiple of the second argument. 2574All of these builtins expect the alignment to be expressed as a number of bytes. 2575 2576These builtins can be used for all integer types as well as (non-function) 2577pointer types. For pointer types, these builtins operate in terms of the integer 2578address of the pointer and return a new pointer of the same type (including 2579qualifiers such as ``const``) with an adjusted address. 2580When aligning pointers up or down, the resulting value must be within the same 2581underlying allocation or one past the end (see C17 6.5.6p8, C++ [expr.add]). 2582This means that arbitrary integer values stored in pointer-type variables must 2583not be passed to these builtins. For those use cases, the builtins can still be 2584used, but the operation must be performed on the pointer cast to ``uintptr_t``. 2585 2586If Clang can determine that the alignment is not a power of two at compile time, 2587it will result in a compilation failure. If the alignment argument is not a 2588power of two at run time, the behavior of these builtins is undefined. 2589 2590Non-standard C++11 Attributes 2591============================= 2592 2593Clang's non-standard C++11 attributes live in the ``clang`` attribute 2594namespace. 2595 2596Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which 2597are accepted with the ``__attribute__((foo))`` syntax are also accepted as 2598``[[gnu::foo]]``. This only extends to attributes which are specified by GCC 2599(see the list of `GCC function attributes 2600<https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable 2601attributes <https://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and 2602`GCC type attributes 2603<https://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC 2604implementation, these attributes must appertain to the *declarator-id* in a 2605declaration, which means they must go either at the start of the declaration or 2606immediately after the name being declared. 2607 2608For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and 2609also applies the GNU ``noreturn`` attribute to ``f``. 2610 2611.. code-block:: c++ 2612 2613 [[gnu::unused]] int a, f [[gnu::noreturn]] (); 2614 2615Target-Specific Extensions 2616========================== 2617 2618Clang supports some language features conditionally on some targets. 2619 2620ARM/AArch64 Language Extensions 2621------------------------------- 2622 2623Memory Barrier Intrinsics 2624^^^^^^^^^^^^^^^^^^^^^^^^^ 2625Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined 2626in the `ARM C Language Extensions Release 2.0 2627<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_. 2628Note that these intrinsics are implemented as motion barriers that block 2629reordering of memory accesses and side effect instructions. Other instructions 2630like simple arithmetic may be reordered around the intrinsic. If you expect to 2631have no reordering at all, use inline assembly instead. 2632 2633X86/X86-64 Language Extensions 2634------------------------------ 2635 2636The X86 backend has these language extensions: 2637 2638Memory references to specified segments 2639^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 2640 2641Annotating a pointer with address space #256 causes it to be code generated 2642relative to the X86 GS segment register, address space #257 causes it to be 2643relative to the X86 FS segment, and address space #258 causes it to be 2644relative to the X86 SS segment. Note that this is a very very low-level 2645feature that should only be used if you know what you're doing (for example in 2646an OS kernel). 2647 2648Here is an example: 2649 2650.. code-block:: c++ 2651 2652 #define GS_RELATIVE __attribute__((address_space(256))) 2653 int foo(int GS_RELATIVE *P) { 2654 return *P; 2655 } 2656 2657Which compiles to (on X86-32): 2658 2659.. code-block:: gas 2660 2661 _foo: 2662 movl 4(%esp), %eax 2663 movl %gs:(%eax), %eax 2664 ret 2665 2666You can also use the GCC compatibility macros ``__seg_fs`` and ``__seg_gs`` for 2667the same purpose. The preprocessor symbols ``__SEG_FS`` and ``__SEG_GS`` 2668indicate their support. 2669 2670PowerPC Language Extensions 2671------------------------------ 2672 2673Set the Floating Point Rounding Mode 2674^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 2675PowerPC64/PowerPC64le supports the builtin function ``__builtin_setrnd`` to set 2676the floating point rounding mode. This function will use the least significant 2677two bits of integer argument to set the floating point rounding mode. 2678 2679.. code-block:: c++ 2680 2681 double __builtin_setrnd(int mode); 2682 2683The effective values for mode are: 2684 2685 - 0 - round to nearest 2686 - 1 - round to zero 2687 - 2 - round to +infinity 2688 - 3 - round to -infinity 2689 2690Note that the mode argument will modulo 4, so if the integer argument is greater 2691than 3, it will only use the least significant two bits of the mode. 2692Namely, ``__builtin_setrnd(102))`` is equal to ``__builtin_setrnd(2)``. 2693 2694PowerPC cache builtins 2695^^^^^^^^^^^^^^^^^^^^^^ 2696 2697The PowerPC architecture specifies instructions implementing cache operations. 2698Clang provides builtins that give direct programmer access to these cache 2699instructions. 2700 2701Currently the following builtins are implemented in clang: 2702 2703``__builtin_dcbf`` copies the contents of a modified block from the data cache 2704to main memory and flushes the copy from the data cache. 2705 2706**Syntax**: 2707 2708.. code-block:: c 2709 2710 void __dcbf(const void* addr); /* Data Cache Block Flush */ 2711 2712**Example of Use**: 2713 2714.. code-block:: c 2715 2716 int a = 1; 2717 __builtin_dcbf (&a); 2718 2719Extensions for Static Analysis 2720============================== 2721 2722Clang supports additional attributes that are useful for documenting program 2723invariants and rules for static analysis tools, such as the `Clang Static 2724Analyzer <https://clang-analyzer.llvm.org/>`_. These attributes are documented 2725in the analyzer's `list of source-level annotations 2726<https://clang-analyzer.llvm.org/annotations.html>`_. 2727 2728 2729Extensions for Dynamic Analysis 2730=============================== 2731 2732Use ``__has_feature(address_sanitizer)`` to check if the code is being built 2733with :doc:`AddressSanitizer`. 2734 2735Use ``__has_feature(thread_sanitizer)`` to check if the code is being built 2736with :doc:`ThreadSanitizer`. 2737 2738Use ``__has_feature(memory_sanitizer)`` to check if the code is being built 2739with :doc:`MemorySanitizer`. 2740 2741Use ``__has_feature(safe_stack)`` to check if the code is being built 2742with :doc:`SafeStack`. 2743 2744 2745Extensions for selectively disabling optimization 2746================================================= 2747 2748Clang provides a mechanism for selectively disabling optimizations in functions 2749and methods. 2750 2751To disable optimizations in a single function definition, the GNU-style or C++11 2752non-standard attribute ``optnone`` can be used. 2753 2754.. code-block:: c++ 2755 2756 // The following functions will not be optimized. 2757 // GNU-style attribute 2758 __attribute__((optnone)) int foo() { 2759 // ... code 2760 } 2761 // C++11 attribute 2762 [[clang::optnone]] int bar() { 2763 // ... code 2764 } 2765 2766To facilitate disabling optimization for a range of function definitions, a 2767range-based pragma is provided. Its syntax is ``#pragma clang optimize`` 2768followed by ``off`` or ``on``. 2769 2770All function definitions in the region between an ``off`` and the following 2771``on`` will be decorated with the ``optnone`` attribute unless doing so would 2772conflict with explicit attributes already present on the function (e.g. the 2773ones that control inlining). 2774 2775.. code-block:: c++ 2776 2777 #pragma clang optimize off 2778 // This function will be decorated with optnone. 2779 int foo() { 2780 // ... code 2781 } 2782 2783 // optnone conflicts with always_inline, so bar() will not be decorated. 2784 __attribute__((always_inline)) int bar() { 2785 // ... code 2786 } 2787 #pragma clang optimize on 2788 2789If no ``on`` is found to close an ``off`` region, the end of the region is the 2790end of the compilation unit. 2791 2792Note that a stray ``#pragma clang optimize on`` does not selectively enable 2793additional optimizations when compiling at low optimization levels. This feature 2794can only be used to selectively disable optimizations. 2795 2796The pragma has an effect on functions only at the point of their definition; for 2797function templates, this means that the state of the pragma at the point of an 2798instantiation is not necessarily relevant. Consider the following example: 2799 2800.. code-block:: c++ 2801 2802 template<typename T> T twice(T t) { 2803 return 2 * t; 2804 } 2805 2806 #pragma clang optimize off 2807 template<typename T> T thrice(T t) { 2808 return 3 * t; 2809 } 2810 2811 int container(int a, int b) { 2812 return twice(a) + thrice(b); 2813 } 2814 #pragma clang optimize on 2815 2816In this example, the definition of the template function ``twice`` is outside 2817the pragma region, whereas the definition of ``thrice`` is inside the region. 2818The ``container`` function is also in the region and will not be optimized, but 2819it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of 2820these two instantiations, ``twice`` will be optimized (because its definition 2821was outside the region) and ``thrice`` will not be optimized. 2822 2823Extensions for loop hint optimizations 2824====================================== 2825 2826The ``#pragma clang loop`` directive is used to specify hints for optimizing the 2827subsequent for, while, do-while, or c++11 range-based for loop. The directive 2828provides options for vectorization, interleaving, predication, unrolling and 2829distribution. Loop hints can be specified before any loop and will be ignored if 2830the optimization is not safe to apply. 2831 2832There are loop hints that control transformations (e.g. vectorization, loop 2833unrolling) and there are loop hints that set transformation options (e.g. 2834``vectorize_width``, ``unroll_count``). Pragmas setting transformation options 2835imply the transformation is enabled, as if it was enabled via the corresponding 2836transformation pragma (e.g. ``vectorize(enable)``). If the transformation is 2837disabled (e.g. ``vectorize(disable)``), that takes precedence over 2838transformations option pragmas implying that transformation. 2839 2840Vectorization, Interleaving, and Predication 2841-------------------------------------------- 2842 2843A vectorized loop performs multiple iterations of the original loop 2844in parallel using vector instructions. The instruction set of the target 2845processor determines which vector instructions are available and their vector 2846widths. This restricts the types of loops that can be vectorized. The vectorizer 2847automatically determines if the loop is safe and profitable to vectorize. A 2848vector instruction cost model is used to select the vector width. 2849 2850Interleaving multiple loop iterations allows modern processors to further 2851improve instruction-level parallelism (ILP) using advanced hardware features, 2852such as multiple execution units and out-of-order execution. The vectorizer uses 2853a cost model that depends on the register pressure and generated code size to 2854select the interleaving count. 2855 2856Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled 2857by ``interleave(enable)``. This is useful when compiling with ``-Os`` to 2858manually enable vectorization or interleaving. 2859 2860.. code-block:: c++ 2861 2862 #pragma clang loop vectorize(enable) 2863 #pragma clang loop interleave(enable) 2864 for(...) { 2865 ... 2866 } 2867 2868The vector width is specified by ``vectorize_width(_value_)`` and the interleave 2869count is specified by ``interleave_count(_value_)``, where 2870_value_ is a positive integer. This is useful for specifying the optimal 2871width/count of the set of target architectures supported by your application. 2872 2873.. code-block:: c++ 2874 2875 #pragma clang loop vectorize_width(2) 2876 #pragma clang loop interleave_count(2) 2877 for(...) { 2878 ... 2879 } 2880 2881Specifying a width/count of 1 disables the optimization, and is equivalent to 2882``vectorize(disable)`` or ``interleave(disable)``. 2883 2884Vector predication is enabled by ``vectorize_predicate(enable)``, for example: 2885 2886.. code-block:: c++ 2887 2888 #pragma clang loop vectorize(enable) 2889 #pragma clang loop vectorize_predicate(enable) 2890 for(...) { 2891 ... 2892 } 2893 2894This predicates (masks) all instructions in the loop, which allows the scalar 2895remainder loop (the tail) to be folded into the main vectorized loop. This 2896might be more efficient when vector predication is efficiently supported by the 2897target platform. 2898 2899Loop Unrolling 2900-------------- 2901 2902Unrolling a loop reduces the loop control overhead and exposes more 2903opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling 2904eliminates the loop and replaces it with an enumerated sequence of loop 2905iterations. Full unrolling is only possible if the loop trip count is known at 2906compile time. Partial unrolling replicates the loop body within the loop and 2907reduces the trip count. 2908 2909If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the 2910loop if the trip count is known at compile time. If the fully unrolled code size 2911is greater than an internal limit the loop will be partially unrolled up to this 2912limit. If the trip count is not known at compile time the loop will be partially 2913unrolled with a heuristically chosen unroll factor. 2914 2915.. code-block:: c++ 2916 2917 #pragma clang loop unroll(enable) 2918 for(...) { 2919 ... 2920 } 2921 2922If ``unroll(full)`` is specified the unroller will attempt to fully unroll the 2923loop if the trip count is known at compile time identically to 2924``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled 2925if the loop count is not known at compile time. 2926 2927.. code-block:: c++ 2928 2929 #pragma clang loop unroll(full) 2930 for(...) { 2931 ... 2932 } 2933 2934The unroll count can be specified explicitly with ``unroll_count(_value_)`` where 2935_value_ is a positive integer. If this value is greater than the trip count the 2936loop will be fully unrolled. Otherwise the loop is partially unrolled subject 2937to the same code size limit as with ``unroll(enable)``. 2938 2939.. code-block:: c++ 2940 2941 #pragma clang loop unroll_count(8) 2942 for(...) { 2943 ... 2944 } 2945 2946Unrolling of a loop can be prevented by specifying ``unroll(disable)``. 2947 2948Loop Distribution 2949----------------- 2950 2951Loop Distribution allows splitting a loop into multiple loops. This is 2952beneficial for example when the entire loop cannot be vectorized but some of the 2953resulting loops can. 2954 2955If ``distribute(enable))`` is specified and the loop has memory dependencies 2956that inhibit vectorization, the compiler will attempt to isolate the offending 2957operations into a new loop. This optimization is not enabled by default, only 2958loops marked with the pragma are considered. 2959 2960.. code-block:: c++ 2961 2962 #pragma clang loop distribute(enable) 2963 for (i = 0; i < N; ++i) { 2964 S1: A[i + 1] = A[i] + B[i]; 2965 S2: C[i] = D[i] * E[i]; 2966 } 2967 2968This loop will be split into two loops between statements S1 and S2. The 2969second loop containing S2 will be vectorized. 2970 2971Loop Distribution is currently not enabled by default in the optimizer because 2972it can hurt performance in some cases. For example, instruction-level 2973parallelism could be reduced by sequentializing the execution of the 2974statements S1 and S2 above. 2975 2976If Loop Distribution is turned on globally with 2977``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can 2978be used the disable it on a per-loop basis. 2979 2980Additional Information 2981---------------------- 2982 2983For convenience multiple loop hints can be specified on a single line. 2984 2985.. code-block:: c++ 2986 2987 #pragma clang loop vectorize_width(4) interleave_count(8) 2988 for(...) { 2989 ... 2990 } 2991 2992If an optimization cannot be applied any hints that apply to it will be ignored. 2993For example, the hint ``vectorize_width(4)`` is ignored if the loop is not 2994proven safe to vectorize. To identify and diagnose optimization issues use 2995`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the 2996user guide for details. 2997 2998Extensions to specify floating-point flags 2999==================================================== 3000 3001The ``#pragma clang fp`` pragma allows floating-point options to be specified 3002for a section of the source code. This pragma can only appear at file scope or 3003at the start of a compound statement (excluding comments). When using within a 3004compound statement, the pragma is active within the scope of the compound 3005statement. 3006 3007Currently, only FP contraction can be controlled with the pragma. ``#pragma 3008clang fp contract`` specifies whether the compiler should contract a multiply 3009and an addition (or subtraction) into a fused FMA operation when supported by 3010the target. 3011 3012The pragma can take three values: ``on``, ``fast`` and ``off``. The ``on`` 3013option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows 3014fusion as specified the language standard. The ``fast`` option allows fusiong 3015in cases when the language standard does not make this possible (e.g. across 3016statements in C) 3017 3018.. code-block:: c++ 3019 3020 for(...) { 3021 #pragma clang fp contract(fast) 3022 a = b[i] * c[i]; 3023 d[i] += a; 3024 } 3025 3026 3027The pragma can also be used with ``off`` which turns FP contraction off for a 3028section of the code. This can be useful when fast contraction is otherwise 3029enabled for the translation unit with the ``-ffp-contract=fast`` flag. 3030 3031Specifying an attribute for multiple declarations (#pragma clang attribute) 3032=========================================================================== 3033 3034The ``#pragma clang attribute`` directive can be used to apply an attribute to 3035multiple declarations. The ``#pragma clang attribute push`` variation of the 3036directive pushes a new "scope" of ``#pragma clang attribute`` that attributes 3037can be added to. The ``#pragma clang attribute (...)`` variation adds an 3038attribute to that scope, and the ``#pragma clang attribute pop`` variation pops 3039the scope. You can also use ``#pragma clang attribute push (...)``, which is a 3040shorthand for when you want to add one attribute to a new scope. Multiple push 3041directives can be nested inside each other. 3042 3043The attributes that are used in the ``#pragma clang attribute`` directives 3044can be written using the GNU-style syntax: 3045 3046.. code-block:: c++ 3047 3048 #pragma clang attribute push (__attribute__((annotate("custom"))), apply_to = function) 3049 3050 void function(); // The function now has the annotate("custom") attribute 3051 3052 #pragma clang attribute pop 3053 3054The attributes can also be written using the C++11 style syntax: 3055 3056.. code-block:: c++ 3057 3058 #pragma clang attribute push ([[noreturn]], apply_to = function) 3059 3060 void function(); // The function now has the [[noreturn]] attribute 3061 3062 #pragma clang attribute pop 3063 3064The ``__declspec`` style syntax is also supported: 3065 3066.. code-block:: c++ 3067 3068 #pragma clang attribute push (__declspec(dllexport), apply_to = function) 3069 3070 void function(); // The function now has the __declspec(dllexport) attribute 3071 3072 #pragma clang attribute pop 3073 3074A single push directive accepts only one attribute regardless of the syntax 3075used. 3076 3077Because multiple push directives can be nested, if you're writing a macro that 3078expands to ``_Pragma("clang attribute")`` it's good hygiene (though not 3079required) to add a namespace to your push/pop directives. A pop directive with a 3080namespace will pop the innermost push that has that same namespace. This will 3081ensure that another macro's ``pop`` won't inadvertently pop your attribute. Note 3082that an ``pop`` without a namespace will pop the innermost ``push`` without a 3083namespace. ``push``es with a namespace can only be popped by ``pop`` with the 3084same namespace. For instance: 3085 3086.. code-block:: c++ 3087 3088 #define ASSUME_NORETURN_BEGIN _Pragma("clang attribute AssumeNoreturn.push ([[noreturn]], apply_to = function)") 3089 #define ASSUME_NORETURN_END _Pragma("clang attribute AssumeNoreturn.pop") 3090 3091 #define ASSUME_UNAVAILABLE_BEGIN _Pragma("clang attribute Unavailable.push (__attribute__((unavailable)), apply_to=function)") 3092 #define ASSUME_UNAVAILABLE_END _Pragma("clang attribute Unavailable.pop") 3093 3094 3095 ASSUME_NORETURN_BEGIN 3096 ASSUME_UNAVAILABLE_BEGIN 3097 void function(); // function has [[noreturn]] and __attribute__((unavailable)) 3098 ASSUME_NORETURN_END 3099 void other_function(); // function has __attribute__((unavailable)) 3100 ASSUME_UNAVAILABLE_END 3101 3102Without the namespaces on the macros, ``other_function`` will be annotated with 3103``[[noreturn]]`` instead of ``__attribute__((unavailable))``. This may seem like 3104a contrived example, but its very possible for this kind of situation to appear 3105in real code if the pragmas are spread out across a large file. You can test if 3106your version of clang supports namespaces on ``#pragma clang attribute`` with 3107``__has_extension(pragma_clang_attribute_namespaces)``. 3108 3109Subject Match Rules 3110------------------- 3111 3112The set of declarations that receive a single attribute from the attribute stack 3113depends on the subject match rules that were specified in the pragma. Subject 3114match rules are specified after the attribute. The compiler expects an 3115identifier that corresponds to the subject set specifier. The ``apply_to`` 3116specifier is currently the only supported subject set specifier. It allows you 3117to specify match rules that form a subset of the attribute's allowed subject 3118set, i.e. the compiler doesn't require all of the attribute's subjects. For 3119example, an attribute like ``[[nodiscard]]`` whose subject set includes 3120``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at 3121least one of these rules after ``apply_to``: 3122 3123.. code-block:: c++ 3124 3125 #pragma clang attribute push([[nodiscard]], apply_to = enum) 3126 3127 enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]] 3128 3129 struct Record1 { }; // The struct will *not* receive [[nodiscard]] 3130 3131 #pragma clang attribute pop 3132 3133 #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum)) 3134 3135 enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]] 3136 3137 struct Record2 { }; // The struct *will* receive [[nodiscard]] 3138 3139 #pragma clang attribute pop 3140 3141 // This is an error, since [[nodiscard]] can't be applied to namespaces: 3142 #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace)) 3143 3144 #pragma clang attribute pop 3145 3146Multiple match rules can be specified using the ``any`` match rule, as shown 3147in the example above. The ``any`` rule applies attributes to all declarations 3148that are matched by at least one of the rules in the ``any``. It doesn't nest 3149and can't be used inside the other match rules. Redundant match rules or rules 3150that conflict with one another should not be used inside of ``any``. 3151 3152Clang supports the following match rules: 3153 3154- ``function``: Can be used to apply attributes to functions. This includes C++ 3155 member functions, static functions, operators, and constructors/destructors. 3156 3157- ``function(is_member)``: Can be used to apply attributes to C++ member 3158 functions. This includes members like static functions, operators, and 3159 constructors/destructors. 3160 3161- ``hasType(functionType)``: Can be used to apply attributes to functions, C++ 3162 member functions, and variables/fields whose type is a function pointer. It 3163 does not apply attributes to Objective-C methods or blocks. 3164 3165- ``type_alias``: Can be used to apply attributes to ``typedef`` declarations 3166 and C++11 type aliases. 3167 3168- ``record``: Can be used to apply attributes to ``struct``, ``class``, and 3169 ``union`` declarations. 3170 3171- ``record(unless(is_union))``: Can be used to apply attributes only to 3172 ``struct`` and ``class`` declarations. 3173 3174- ``enum``: Can be be used to apply attributes to enumeration declarations. 3175 3176- ``enum_constant``: Can be used to apply attributes to enumerators. 3177 3178- ``variable``: Can be used to apply attributes to variables, including 3179 local variables, parameters, global variables, and static member variables. 3180 It does not apply attributes to instance member variables or Objective-C 3181 ivars. 3182 3183- ``variable(is_thread_local)``: Can be used to apply attributes to thread-local 3184 variables only. 3185 3186- ``variable(is_global)``: Can be used to apply attributes to global variables 3187 only. 3188 3189- ``variable(is_parameter)``: Can be used to apply attributes to parameters 3190 only. 3191 3192- ``variable(unless(is_parameter))``: Can be used to apply attributes to all 3193 the variables that are not parameters. 3194 3195- ``field``: Can be used to apply attributes to non-static member variables 3196 in a record. This includes Objective-C ivars. 3197 3198- ``namespace``: Can be used to apply attributes to ``namespace`` declarations. 3199 3200- ``objc_interface``: Can be used to apply attributes to ``@interface`` 3201 declarations. 3202 3203- ``objc_protocol``: Can be used to apply attributes to ``@protocol`` 3204 declarations. 3205 3206- ``objc_category``: Can be used to apply attributes to category declarations, 3207 including class extensions. 3208 3209- ``objc_method``: Can be used to apply attributes to Objective-C methods, 3210 including instance and class methods. Implicit methods like implicit property 3211 getters and setters do not receive the attribute. 3212 3213- ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C 3214 instance methods. 3215 3216- ``objc_property``: Can be used to apply attributes to ``@property`` 3217 declarations. 3218 3219- ``block``: Can be used to apply attributes to block declarations. This does 3220 not include variables/fields of block pointer type. 3221 3222The use of ``unless`` in match rules is currently restricted to a strict set of 3223sub-rules that are used by the supported attributes. That means that even though 3224``variable(unless(is_parameter))`` is a valid match rule, 3225``variable(unless(is_thread_local))`` is not. 3226 3227Supported Attributes 3228-------------------- 3229 3230Not all attributes can be used with the ``#pragma clang attribute`` directive. 3231Notably, statement attributes like ``[[fallthrough]]`` or type attributes 3232like ``address_space`` aren't supported by this directive. You can determine 3233whether or not an attribute is supported by the pragma by referring to the 3234:doc:`individual documentation for that attribute <AttributeReference>`. 3235 3236The attributes are applied to all matching declarations individually, even when 3237the attribute is semantically incorrect. The attributes that aren't applied to 3238any declaration are not verified semantically. 3239 3240Specifying section names for global objects (#pragma clang section) 3241=================================================================== 3242 3243The ``#pragma clang section`` directive provides a means to assign section-names 3244to global variables, functions and static variables. 3245 3246The section names can be specified as: 3247 3248.. code-block:: c++ 3249 3250 #pragma clang section bss="myBSS" data="myData" rodata="myRodata" relro="myRelro" text="myText" 3251 3252The section names can be reverted back to default name by supplying an empty 3253string to the section kind, for example: 3254 3255.. code-block:: c++ 3256 3257 #pragma clang section bss="" data="" text="" rodata="" relro="" 3258 3259The ``#pragma clang section`` directive obeys the following rules: 3260 3261* The pragma applies to all global variable, statics and function declarations 3262 from the pragma to the end of the translation unit. 3263 3264* The pragma clang section is enabled automatically, without need of any flags. 3265 3266* This feature is only defined to work sensibly for ELF targets. 3267 3268* If section name is specified through _attribute_((section("myname"))), then 3269 the attribute name gains precedence. 3270 3271* Global variables that are initialized to zero will be placed in the named 3272 bss section, if one is present. 3273 3274* The ``#pragma clang section`` directive does not does try to infer section-kind 3275 from the name. For example, naming a section "``.bss.mySec``" does NOT mean 3276 it will be a bss section name. 3277 3278* The decision about which section-kind applies to each global is taken in the back-end. 3279 Once the section-kind is known, appropriate section name, as specified by the user using 3280 ``#pragma clang section`` directive, is applied to that global. 3281 3282Specifying Linker Options on ELF Targets 3283======================================== 3284 3285The ``#pragma comment(lib, ...)`` directive is supported on all ELF targets. 3286The second parameter is the library name (without the traditional Unix prefix of 3287``lib``). This allows you to provide an implicit link of dependent libraries. 3288 3289Evaluating Object Size Dynamically 3290================================== 3291 3292Clang supports the builtin ``__builtin_dynamic_object_size``, the semantics are 3293the same as GCC's ``__builtin_object_size`` (which Clang also supports), but 3294``__builtin_dynamic_object_size`` can evaluate the object's size at runtime. 3295``__builtin_dynamic_object_size`` is meant to be used as a drop-in replacement 3296for ``__builtin_object_size`` in libraries that support it. 3297 3298For instance, here is a program that ``__builtin_dynamic_object_size`` will make 3299safer: 3300 3301.. code-block:: c 3302 3303 void copy_into_buffer(size_t size) { 3304 char* buffer = malloc(size); 3305 strlcpy(buffer, "some string", strlen("some string")); 3306 // Previous line preprocesses to: 3307 // __builtin___strlcpy_chk(buffer, "some string", strlen("some string"), __builtin_object_size(buffer, 0)) 3308 } 3309 3310Since the size of ``buffer`` can't be known at compile time, Clang will fold 3311``__builtin_object_size(buffer, 0)`` into ``-1``. However, if this was written 3312as ``__builtin_dynamic_object_size(buffer, 0)``, Clang will fold it into 3313``size``, providing some extra runtime safety. 3314