1========================= 2Clang Language Extensions 3========================= 4 5.. contents:: 6 :local: 7 :depth: 1 8 9.. toctree:: 10 :hidden: 11 12 ObjectiveCLiterals 13 BlockLanguageSpec 14 Block-ABI-Apple 15 AutomaticReferenceCounting 16 17Introduction 18============ 19 20This document describes the language extensions provided by Clang. In addition 21to the language extensions listed here, Clang aims to support a broad range of 22GCC extensions. Please see the `GCC manual 23<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on 24these extensions. 25 26.. _langext-feature_check: 27 28Feature Checking Macros 29======================= 30 31Language extensions can be very useful, but only if you know you can depend on 32them. In order to allow fine-grain features checks, we support three builtin 33function-like macros. This allows you to directly test for a feature in your 34code without having to resort to something like autoconf or fragile "compiler 35version checks". 36 37``__has_builtin`` 38----------------- 39 40This function-like macro takes a single identifier argument that is the name of 41a builtin function. It evaluates to 1 if the builtin is supported or 0 if not. 42It can be used like this: 43 44.. code-block:: c++ 45 46 #ifndef __has_builtin // Optional of course. 47 #define __has_builtin(x) 0 // Compatibility with non-clang compilers. 48 #endif 49 50 ... 51 #if __has_builtin(__builtin_trap) 52 __builtin_trap(); 53 #else 54 abort(); 55 #endif 56 ... 57 58.. _langext-__has_feature-__has_extension: 59 60``__has_feature`` and ``__has_extension`` 61----------------------------------------- 62 63These function-like macros take a single identifier argument that is the name 64of a feature. ``__has_feature`` evaluates to 1 if the feature is both 65supported by Clang and standardized in the current language standard or 0 if 66not (but see :ref:`below <langext-has-feature-back-compat>`), while 67``__has_extension`` evaluates to 1 if the feature is supported by Clang in the 68current language (either as a language extension or a standard language 69feature) or 0 if not. They can be used like this: 70 71.. code-block:: c++ 72 73 #ifndef __has_feature // Optional of course. 74 #define __has_feature(x) 0 // Compatibility with non-clang compilers. 75 #endif 76 #ifndef __has_extension 77 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers. 78 #endif 79 80 ... 81 #if __has_feature(cxx_rvalue_references) 82 // This code will only be compiled with the -std=c++11 and -std=gnu++11 83 // options, because rvalue references are only standardized in C++11. 84 #endif 85 86 #if __has_extension(cxx_rvalue_references) 87 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98 88 // and -std=gnu++98 options, because rvalue references are supported as a 89 // language extension in C++98. 90 #endif 91 92.. _langext-has-feature-back-compat: 93 94For backward compatibility, ``__has_feature`` can also be used to test 95for support for non-standardized features, i.e. features not prefixed ``c_``, 96``cxx_`` or ``objc_``. 97 98Another use of ``__has_feature`` is to check for compiler features not related 99to the language standard, such as e.g. :doc:`AddressSanitizer 100<AddressSanitizer>`. 101 102If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent 103to ``__has_feature``. 104 105The feature tag is described along with the language feature below. 106 107The feature name or extension name can also be specified with a preceding and 108following ``__`` (double underscore) to avoid interference from a macro with 109the same name. For instance, ``__cxx_rvalue_references__`` can be used instead 110of ``cxx_rvalue_references``. 111 112``__has_cpp_attribute`` 113----------------------- 114 115This function-like macro takes a single argument that is the name of a 116C++11-style attribute. The argument can either be a single identifier, or a 117scoped identifier. If the attribute is supported, a nonzero value is returned. 118If the attribute is a standards-based attribute, this macro returns a nonzero 119value based on the year and month in which the attribute was voted into the 120working draft. If the attribute is not supported by the current compliation 121target, this macro evaluates to 0. It can be used like this: 122 123.. code-block:: c++ 124 125 #ifndef __has_cpp_attribute // Optional of course. 126 #define __has_cpp_attribute(x) 0 // Compatibility with non-clang compilers. 127 #endif 128 129 ... 130 #if __has_cpp_attribute(clang::fallthrough) 131 #define FALLTHROUGH [[clang::fallthrough]] 132 #else 133 #define FALLTHROUGH 134 #endif 135 ... 136 137The attribute identifier (but not scope) can also be specified with a preceding 138and following ``__`` (double underscore) to avoid interference from a macro with 139the same name. For instance, ``gnu::__const__`` can be used instead of 140``gnu::const``. 141 142``__has_c_attribute`` 143--------------------- 144 145This function-like macro takes a single argument that is the name of an 146attribute exposed with the double square-bracket syntax in C mode. The argument 147can either be a single identifier or a scoped identifier. If the attribute is 148supported, a nonzero value is returned. If the attribute is not supported by the 149current compilation target, this macro evaluates to 0. It can be used like this: 150 151.. code-block:: c 152 153 #ifndef __has_c_attribute // Optional of course. 154 #define __has_c_attribute(x) 0 // Compatibility with non-clang compilers. 155 #endif 156 157 ... 158 #if __has_c_attribute(fallthrough) 159 #define FALLTHROUGH [[fallthrough]] 160 #else 161 #define FALLTHROUGH 162 #endif 163 ... 164 165The attribute identifier (but not scope) can also be specified with a preceding 166and following ``__`` (double underscore) to avoid interference from a macro with 167the same name. For instance, ``gnu::__const__`` can be used instead of 168``gnu::const``. 169 170 171``__has_attribute`` 172------------------- 173 174This function-like macro takes a single identifier argument that is the name of 175a GNU-style attribute. It evaluates to 1 if the attribute is supported by the 176current compilation target, or 0 if not. It can be used like this: 177 178.. code-block:: c++ 179 180 #ifndef __has_attribute // Optional of course. 181 #define __has_attribute(x) 0 // Compatibility with non-clang compilers. 182 #endif 183 184 ... 185 #if __has_attribute(always_inline) 186 #define ALWAYS_INLINE __attribute__((always_inline)) 187 #else 188 #define ALWAYS_INLINE 189 #endif 190 ... 191 192The attribute name can also be specified with a preceding and following ``__`` 193(double underscore) to avoid interference from a macro with the same name. For 194instance, ``__always_inline__`` can be used instead of ``always_inline``. 195 196 197``__has_declspec_attribute`` 198---------------------------- 199 200This function-like macro takes a single identifier argument that is the name of 201an attribute implemented as a Microsoft-style ``__declspec`` attribute. It 202evaluates to 1 if the attribute is supported by the current compilation target, 203or 0 if not. It can be used like this: 204 205.. code-block:: c++ 206 207 #ifndef __has_declspec_attribute // Optional of course. 208 #define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers. 209 #endif 210 211 ... 212 #if __has_declspec_attribute(dllexport) 213 #define DLLEXPORT __declspec(dllexport) 214 #else 215 #define DLLEXPORT 216 #endif 217 ... 218 219The attribute name can also be specified with a preceding and following ``__`` 220(double underscore) to avoid interference from a macro with the same name. For 221instance, ``__dllexport__`` can be used instead of ``dllexport``. 222 223``__is_identifier`` 224------------------- 225 226This function-like macro takes a single identifier argument that might be either 227a reserved word or a regular identifier. It evaluates to 1 if the argument is just 228a regular identifier and not a reserved word, in the sense that it can then be 229used as the name of a user-defined function or variable. Otherwise it evaluates 230to 0. It can be used like this: 231 232.. code-block:: c++ 233 234 ... 235 #ifdef __is_identifier // Compatibility with non-clang compilers. 236 #if __is_identifier(__wchar_t) 237 typedef wchar_t __wchar_t; 238 #endif 239 #endif 240 241 __wchar_t WideCharacter; 242 ... 243 244Include File Checking Macros 245============================ 246 247Not all developments systems have the same include files. The 248:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow 249you to check for the existence of an include file before doing a possibly 250failing ``#include`` directive. Include file checking macros must be used 251as expressions in ``#if`` or ``#elif`` preprocessing directives. 252 253.. _langext-__has_include: 254 255``__has_include`` 256----------------- 257 258This function-like macro takes a single file name string argument that is the 259name of an include file. It evaluates to 1 if the file can be found using the 260include paths, or 0 otherwise: 261 262.. code-block:: c++ 263 264 // Note the two possible file name string formats. 265 #if __has_include("myinclude.h") && __has_include(<stdint.h>) 266 # include "myinclude.h" 267 #endif 268 269To test for this feature, use ``#if defined(__has_include)``: 270 271.. code-block:: c++ 272 273 // To avoid problem with non-clang compilers not having this macro. 274 #if defined(__has_include) 275 #if __has_include("myinclude.h") 276 # include "myinclude.h" 277 #endif 278 #endif 279 280.. _langext-__has_include_next: 281 282``__has_include_next`` 283---------------------- 284 285This function-like macro takes a single file name string argument that is the 286name of an include file. It is like ``__has_include`` except that it looks for 287the second instance of the given file found in the include paths. It evaluates 288to 1 if the second instance of the file can be found using the include paths, 289or 0 otherwise: 290 291.. code-block:: c++ 292 293 // Note the two possible file name string formats. 294 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>) 295 # include_next "myinclude.h" 296 #endif 297 298 // To avoid problem with non-clang compilers not having this macro. 299 #if defined(__has_include_next) 300 #if __has_include_next("myinclude.h") 301 # include_next "myinclude.h" 302 #endif 303 #endif 304 305Note that ``__has_include_next``, like the GNU extension ``#include_next`` 306directive, is intended for use in headers only, and will issue a warning if 307used in the top-level compilation file. A warning will also be issued if an 308absolute path is used in the file argument. 309 310``__has_warning`` 311----------------- 312 313This function-like macro takes a string literal that represents a command line 314option for a warning and returns true if that is a valid warning option. 315 316.. code-block:: c++ 317 318 #if __has_warning("-Wformat") 319 ... 320 #endif 321 322Builtin Macros 323============== 324 325``__BASE_FILE__`` 326 Defined to a string that contains the name of the main input file passed to 327 Clang. 328 329``__COUNTER__`` 330 Defined to an integer value that starts at zero and is incremented each time 331 the ``__COUNTER__`` macro is expanded. 332 333``__INCLUDE_LEVEL__`` 334 Defined to an integral value that is the include depth of the file currently 335 being translated. For the main file, this value is zero. 336 337``__TIMESTAMP__`` 338 Defined to the date and time of the last modification of the current source 339 file. 340 341``__clang__`` 342 Defined when compiling with Clang 343 344``__clang_major__`` 345 Defined to the major marketing version number of Clang (e.g., the 2 in 346 2.0.1). Note that marketing version numbers should not be used to check for 347 language features, as different vendors use different numbering schemes. 348 Instead, use the :ref:`langext-feature_check`. 349 350``__clang_minor__`` 351 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note 352 that marketing version numbers should not be used to check for language 353 features, as different vendors use different numbering schemes. Instead, use 354 the :ref:`langext-feature_check`. 355 356``__clang_patchlevel__`` 357 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1). 358 359``__clang_version__`` 360 Defined to a string that captures the Clang marketing version, including the 361 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``". 362 363.. _langext-vectors: 364 365Vectors and Extended Vectors 366============================ 367 368Supports the GCC, OpenCL, AltiVec and NEON vector extensions. 369 370OpenCL vector types are created using ``ext_vector_type`` attribute. It 371support for ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example 372is: 373 374.. code-block:: c++ 375 376 typedef float float4 __attribute__((ext_vector_type(4))); 377 typedef float float2 __attribute__((ext_vector_type(2))); 378 379 float4 foo(float2 a, float2 b) { 380 float4 c; 381 c.xz = a; 382 c.yw = b; 383 return c; 384 } 385 386Query for this feature with ``__has_extension(attribute_ext_vector_type)``. 387 388Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax 389and functions. For example: 390 391.. code-block:: c++ 392 393 vector float foo(vector int a) { 394 vector int b; 395 b = vec_add(a, a) + a; 396 return (vector float)b; 397 } 398 399NEON vector types are created using ``neon_vector_type`` and 400``neon_polyvector_type`` attributes. For example: 401 402.. code-block:: c++ 403 404 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t; 405 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t; 406 407 int8x8_t foo(int8x8_t a) { 408 int8x8_t v; 409 v = a; 410 return v; 411 } 412 413Vector Literals 414--------------- 415 416Vector literals can be used to create vectors from a set of scalars, or 417vectors. Either parentheses or braces form can be used. In the parentheses 418form the number of literal values specified must be one, i.e. referring to a 419scalar value, or must match the size of the vector type being created. If a 420single scalar literal value is specified, the scalar literal value will be 421replicated to all the components of the vector type. In the brackets form any 422number of literals can be specified. For example: 423 424.. code-block:: c++ 425 426 typedef int v4si __attribute__((__vector_size__(16))); 427 typedef float float4 __attribute__((ext_vector_type(4))); 428 typedef float float2 __attribute__((ext_vector_type(2))); 429 430 v4si vsi = (v4si){1, 2, 3, 4}; 431 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f); 432 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1). 433 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0). 434 vector int vi3 = (vector int)(1, 2); // error 435 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0). 436 vector int vi5 = (vector int)(1, 2, 3, 4); 437 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f)); 438 439Vector Operations 440----------------- 441 442The table below shows the support for each operation by vector extension. A 443dash indicates that an operation is not accepted according to a corresponding 444specification. 445 446============================== ======= ======= ======= ======= 447 Operator OpenCL AltiVec GCC NEON 448============================== ======= ======= ======= ======= 449[] yes yes yes -- 450unary operators +, -- yes yes yes -- 451++, -- -- yes yes yes -- 452+,--,*,/,% yes yes yes -- 453bitwise operators &,|,^,~ yes yes yes -- 454>>,<< yes yes yes -- 455!, &&, || yes -- -- -- 456==, !=, >, <, >=, <= yes yes -- -- 457= yes yes yes yes 458:? yes -- -- -- 459sizeof yes yes yes yes 460C-style cast yes yes yes no 461reinterpret_cast yes no yes no 462static_cast yes no yes no 463const_cast no no no no 464============================== ======= ======= ======= ======= 465 466See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`. 467 468Half-Precision Floating Point 469============================= 470 471Clang supports two half-precision (16-bit) floating point types: ``__fp16`` and 472``_Float16``. ``__fp16`` is defined in the ARM C Language Extensions (`ACLE 473<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_) 474and ``_Float16`` in ISO/IEC TS 18661-3:2015. 475 476``__fp16`` is a storage and interchange format only. This means that values of 477``__fp16`` promote to (at least) float when used in arithmetic operations. 478There are two ``__fp16`` formats. Clang supports the IEEE 754-2008 format and 479not the ARM alternative format. 480 481ISO/IEC TS 18661-3:2015 defines C support for additional floating point types. 482``_FloatN`` is defined as a binary floating type, where the N suffix denotes 483the number of bits and is 16, 32, 64, or greater and equal to 128 and a 484multiple of 32. Clang supports ``_Float16``. The difference from ``__fp16`` is 485that arithmetic on ``_Float16`` is performed in half-precision, thus it is not 486a storage-only format. ``_Float16`` is available as a source language type in 487both C and C++ mode. 488 489It is recommended that portable code use the ``_Float16`` type because 490``__fp16`` is an ARM C-Language Extension (ACLE), whereas ``_Float16`` is 491defined by the C standards committee, so using ``_Float16`` will not prevent 492code from being ported to architectures other than Arm. Also, ``_Float16`` 493arithmetic and operations will directly map on half-precision instructions when 494they are available (e.g. Armv8.2-A), avoiding conversions to/from 495single-precision, and thus will result in more performant code. If 496half-precision instructions are unavailable, values will be promoted to 497single-precision, similar to the semantics of ``__fp16`` except that the 498results will be stored in single-precision. 499 500In an arithmetic operation where one operand is of ``__fp16`` type and the 501other is of ``_Float16`` type, the ``_Float16`` type is first converted to 502``__fp16`` type and then the operation is completed as if both operands were of 503``__fp16`` type. 504 505To define a ``_Float16`` literal, suffix ``f16`` can be appended to the compile-time 506constant declaration. There is no default argument promotion for ``_Float16``; this 507applies to the standard floating types only. As a consequence, for example, an 508explicit cast is required for printing a ``_Float16`` value (there is no string 509format specifier for ``_Float16``). 510 511Messages on ``deprecated`` and ``unavailable`` Attributes 512========================================================= 513 514An optional string message can be added to the ``deprecated`` and 515``unavailable`` attributes. For example: 516 517.. code-block:: c++ 518 519 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!"))); 520 521If the deprecated or unavailable declaration is used, the message will be 522incorporated into the appropriate diagnostic: 523 524.. code-block:: none 525 526 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!! 527 [-Wdeprecated-declarations] 528 explode(); 529 ^ 530 531Query for this feature with 532``__has_extension(attribute_deprecated_with_message)`` and 533``__has_extension(attribute_unavailable_with_message)``. 534 535Attributes on Enumerators 536========================= 537 538Clang allows attributes to be written on individual enumerators. This allows 539enumerators to be deprecated, made unavailable, etc. The attribute must appear 540after the enumerator name and before any initializer, like so: 541 542.. code-block:: c++ 543 544 enum OperationMode { 545 OM_Invalid, 546 OM_Normal, 547 OM_Terrified __attribute__((deprecated)), 548 OM_AbortOnError __attribute__((deprecated)) = 4 549 }; 550 551Attributes on the ``enum`` declaration do not apply to individual enumerators. 552 553Query for this feature with ``__has_extension(enumerator_attributes)``. 554 555'User-Specified' System Frameworks 556================================== 557 558Clang provides a mechanism by which frameworks can be built in such a way that 559they will always be treated as being "system frameworks", even if they are not 560present in a system framework directory. This can be useful to system 561framework developers who want to be able to test building other applications 562with development builds of their framework, including the manner in which the 563compiler changes warning behavior for system headers. 564 565Framework developers can opt-in to this mechanism by creating a 566"``.system_framework``" file at the top-level of their framework. That is, the 567framework should have contents like: 568 569.. code-block:: none 570 571 .../TestFramework.framework 572 .../TestFramework.framework/.system_framework 573 .../TestFramework.framework/Headers 574 .../TestFramework.framework/Headers/TestFramework.h 575 ... 576 577Clang will treat the presence of this file as an indicator that the framework 578should be treated as a system framework, regardless of how it was found in the 579framework search path. For consistency, we recommend that such files never be 580included in installed versions of the framework. 581 582Checks for Standard Language Features 583===================================== 584 585The ``__has_feature`` macro can be used to query if certain standard language 586features are enabled. The ``__has_extension`` macro can be used to query if 587language features are available as an extension when compiling for a standard 588which does not provide them. The features which can be tested are listed here. 589 590Since Clang 3.4, the C++ SD-6 feature test macros are also supported. 591These are macros with names of the form ``__cpp_<feature_name>``, and are 592intended to be a portable way to query the supported features of the compiler. 593See `the C++ status page <http://clang.llvm.org/cxx_status.html#ts>`_ for 594information on the version of SD-6 supported by each Clang release, and the 595macros provided by that revision of the recommendations. 596 597C++98 598----- 599 600The features listed below are part of the C++98 standard. These features are 601enabled by default when compiling C++ code. 602 603C++ exceptions 604^^^^^^^^^^^^^^ 605 606Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been 607enabled. For example, compiling code with ``-fno-exceptions`` disables C++ 608exceptions. 609 610C++ RTTI 611^^^^^^^^ 612 613Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For 614example, compiling code with ``-fno-rtti`` disables the use of RTTI. 615 616C++11 617----- 618 619The features listed below are part of the C++11 standard. As a result, all 620these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option 621when compiling C++ code. 622 623C++11 SFINAE includes access control 624^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 625 626Use ``__has_feature(cxx_access_control_sfinae)`` or 627``__has_extension(cxx_access_control_sfinae)`` to determine whether 628access-control errors (e.g., calling a private constructor) are considered to 629be template argument deduction errors (aka SFINAE errors), per `C++ DR1170 630<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_. 631 632C++11 alias templates 633^^^^^^^^^^^^^^^^^^^^^ 634 635Use ``__has_feature(cxx_alias_templates)`` or 636``__has_extension(cxx_alias_templates)`` to determine if support for C++11's 637alias declarations and alias templates is enabled. 638 639C++11 alignment specifiers 640^^^^^^^^^^^^^^^^^^^^^^^^^^ 641 642Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to 643determine if support for alignment specifiers using ``alignas`` is enabled. 644 645Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to 646determine if support for the ``alignof`` keyword is enabled. 647 648C++11 attributes 649^^^^^^^^^^^^^^^^ 650 651Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to 652determine if support for attribute parsing with C++11's square bracket notation 653is enabled. 654 655C++11 generalized constant expressions 656^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 657 658Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized 659constant expressions (e.g., ``constexpr``) is enabled. 660 661C++11 ``decltype()`` 662^^^^^^^^^^^^^^^^^^^^ 663 664Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to 665determine if support for the ``decltype()`` specifier is enabled. C++11's 666``decltype`` does not require type-completeness of a function call expression. 667Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or 668``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if 669support for this feature is enabled. 670 671C++11 default template arguments in function templates 672^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 673 674Use ``__has_feature(cxx_default_function_template_args)`` or 675``__has_extension(cxx_default_function_template_args)`` to determine if support 676for default template arguments in function templates is enabled. 677 678C++11 ``default``\ ed functions 679^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 680 681Use ``__has_feature(cxx_defaulted_functions)`` or 682``__has_extension(cxx_defaulted_functions)`` to determine if support for 683defaulted function definitions (with ``= default``) is enabled. 684 685C++11 delegating constructors 686^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 687 688Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for 689delegating constructors is enabled. 690 691C++11 ``deleted`` functions 692^^^^^^^^^^^^^^^^^^^^^^^^^^^ 693 694Use ``__has_feature(cxx_deleted_functions)`` or 695``__has_extension(cxx_deleted_functions)`` to determine if support for deleted 696function definitions (with ``= delete``) is enabled. 697 698C++11 explicit conversion functions 699^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 700 701Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for 702``explicit`` conversion functions is enabled. 703 704C++11 generalized initializers 705^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 706 707Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for 708generalized initializers (using braced lists and ``std::initializer_list``) is 709enabled. 710 711C++11 implicit move constructors/assignment operators 712^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 713 714Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly 715generate move constructors and move assignment operators where needed. 716 717C++11 inheriting constructors 718^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 719 720Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for 721inheriting constructors is enabled. 722 723C++11 inline namespaces 724^^^^^^^^^^^^^^^^^^^^^^^ 725 726Use ``__has_feature(cxx_inline_namespaces)`` or 727``__has_extension(cxx_inline_namespaces)`` to determine if support for inline 728namespaces is enabled. 729 730C++11 lambdas 731^^^^^^^^^^^^^ 732 733Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to 734determine if support for lambdas is enabled. 735 736C++11 local and unnamed types as template arguments 737^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 738 739Use ``__has_feature(cxx_local_type_template_args)`` or 740``__has_extension(cxx_local_type_template_args)`` to determine if support for 741local and unnamed types as template arguments is enabled. 742 743C++11 noexcept 744^^^^^^^^^^^^^^ 745 746Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to 747determine if support for noexcept exception specifications is enabled. 748 749C++11 in-class non-static data member initialization 750^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 751 752Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class 753initialization of non-static data members is enabled. 754 755C++11 ``nullptr`` 756^^^^^^^^^^^^^^^^^ 757 758Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to 759determine if support for ``nullptr`` is enabled. 760 761C++11 ``override control`` 762^^^^^^^^^^^^^^^^^^^^^^^^^^ 763 764Use ``__has_feature(cxx_override_control)`` or 765``__has_extension(cxx_override_control)`` to determine if support for the 766override control keywords is enabled. 767 768C++11 reference-qualified functions 769^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 770 771Use ``__has_feature(cxx_reference_qualified_functions)`` or 772``__has_extension(cxx_reference_qualified_functions)`` to determine if support 773for reference-qualified functions (e.g., member functions with ``&`` or ``&&`` 774applied to ``*this``) is enabled. 775 776C++11 range-based ``for`` loop 777^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 778 779Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to 780determine if support for the range-based for loop is enabled. 781 782C++11 raw string literals 783^^^^^^^^^^^^^^^^^^^^^^^^^ 784 785Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw 786string literals (e.g., ``R"x(foo\bar)x"``) is enabled. 787 788C++11 rvalue references 789^^^^^^^^^^^^^^^^^^^^^^^ 790 791Use ``__has_feature(cxx_rvalue_references)`` or 792``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue 793references is enabled. 794 795C++11 ``static_assert()`` 796^^^^^^^^^^^^^^^^^^^^^^^^^ 797 798Use ``__has_feature(cxx_static_assert)`` or 799``__has_extension(cxx_static_assert)`` to determine if support for compile-time 800assertions using ``static_assert`` is enabled. 801 802C++11 ``thread_local`` 803^^^^^^^^^^^^^^^^^^^^^^ 804 805Use ``__has_feature(cxx_thread_local)`` to determine if support for 806``thread_local`` variables is enabled. 807 808C++11 type inference 809^^^^^^^^^^^^^^^^^^^^ 810 811Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to 812determine C++11 type inference is supported using the ``auto`` specifier. If 813this is disabled, ``auto`` will instead be a storage class specifier, as in C 814or C++98. 815 816C++11 strongly typed enumerations 817^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 818 819Use ``__has_feature(cxx_strong_enums)`` or 820``__has_extension(cxx_strong_enums)`` to determine if support for strongly 821typed, scoped enumerations is enabled. 822 823C++11 trailing return type 824^^^^^^^^^^^^^^^^^^^^^^^^^^ 825 826Use ``__has_feature(cxx_trailing_return)`` or 827``__has_extension(cxx_trailing_return)`` to determine if support for the 828alternate function declaration syntax with trailing return type is enabled. 829 830C++11 Unicode string literals 831^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 832 833Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode 834string literals is enabled. 835 836C++11 unrestricted unions 837^^^^^^^^^^^^^^^^^^^^^^^^^ 838 839Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for 840unrestricted unions is enabled. 841 842C++11 user-defined literals 843^^^^^^^^^^^^^^^^^^^^^^^^^^^ 844 845Use ``__has_feature(cxx_user_literals)`` to determine if support for 846user-defined literals is enabled. 847 848C++11 variadic templates 849^^^^^^^^^^^^^^^^^^^^^^^^ 850 851Use ``__has_feature(cxx_variadic_templates)`` or 852``__has_extension(cxx_variadic_templates)`` to determine if support for 853variadic templates is enabled. 854 855C++14 856----- 857 858The features listed below are part of the C++14 standard. As a result, all 859these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option 860when compiling C++ code. 861 862C++14 binary literals 863^^^^^^^^^^^^^^^^^^^^^ 864 865Use ``__has_feature(cxx_binary_literals)`` or 866``__has_extension(cxx_binary_literals)`` to determine whether 867binary literals (for instance, ``0b10010``) are recognized. Clang supports this 868feature as an extension in all language modes. 869 870C++14 contextual conversions 871^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 872 873Use ``__has_feature(cxx_contextual_conversions)`` or 874``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules 875are used when performing an implicit conversion for an array bound in a 876*new-expression*, the operand of a *delete-expression*, an integral constant 877expression, or a condition in a ``switch`` statement. 878 879C++14 decltype(auto) 880^^^^^^^^^^^^^^^^^^^^ 881 882Use ``__has_feature(cxx_decltype_auto)`` or 883``__has_extension(cxx_decltype_auto)`` to determine if support 884for the ``decltype(auto)`` placeholder type is enabled. 885 886C++14 default initializers for aggregates 887^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 888 889Use ``__has_feature(cxx_aggregate_nsdmi)`` or 890``__has_extension(cxx_aggregate_nsdmi)`` to determine if support 891for default initializers in aggregate members is enabled. 892 893C++14 digit separators 894^^^^^^^^^^^^^^^^^^^^^^ 895 896Use ``__cpp_digit_separators`` to determine if support for digit separators 897using single quotes (for instance, ``10'000``) is enabled. At this time, there 898is no corresponding ``__has_feature`` name 899 900C++14 generalized lambda capture 901^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 902 903Use ``__has_feature(cxx_init_captures)`` or 904``__has_extension(cxx_init_captures)`` to determine if support for 905lambda captures with explicit initializers is enabled 906(for instance, ``[n(0)] { return ++n; }``). 907 908C++14 generic lambdas 909^^^^^^^^^^^^^^^^^^^^^ 910 911Use ``__has_feature(cxx_generic_lambdas)`` or 912``__has_extension(cxx_generic_lambdas)`` to determine if support for generic 913(polymorphic) lambdas is enabled 914(for instance, ``[] (auto x) { return x + 1; }``). 915 916C++14 relaxed constexpr 917^^^^^^^^^^^^^^^^^^^^^^^ 918 919Use ``__has_feature(cxx_relaxed_constexpr)`` or 920``__has_extension(cxx_relaxed_constexpr)`` to determine if variable 921declarations, local variable modification, and control flow constructs 922are permitted in ``constexpr`` functions. 923 924C++14 return type deduction 925^^^^^^^^^^^^^^^^^^^^^^^^^^^ 926 927Use ``__has_feature(cxx_return_type_deduction)`` or 928``__has_extension(cxx_return_type_deduction)`` to determine if support 929for return type deduction for functions (using ``auto`` as a return type) 930is enabled. 931 932C++14 runtime-sized arrays 933^^^^^^^^^^^^^^^^^^^^^^^^^^ 934 935Use ``__has_feature(cxx_runtime_array)`` or 936``__has_extension(cxx_runtime_array)`` to determine if support 937for arrays of runtime bound (a restricted form of variable-length arrays) 938is enabled. 939Clang's implementation of this feature is incomplete. 940 941C++14 variable templates 942^^^^^^^^^^^^^^^^^^^^^^^^ 943 944Use ``__has_feature(cxx_variable_templates)`` or 945``__has_extension(cxx_variable_templates)`` to determine if support for 946templated variable declarations is enabled. 947 948C11 949--- 950 951The features listed below are part of the C11 standard. As a result, all these 952features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when 953compiling C code. Additionally, because these features are all 954backward-compatible, they are available as extensions in all language modes. 955 956C11 alignment specifiers 957^^^^^^^^^^^^^^^^^^^^^^^^ 958 959Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine 960if support for alignment specifiers using ``_Alignas`` is enabled. 961 962Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine 963if support for the ``_Alignof`` keyword is enabled. 964 965C11 atomic operations 966^^^^^^^^^^^^^^^^^^^^^ 967 968Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine 969if support for atomic types using ``_Atomic`` is enabled. Clang also provides 970:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement 971the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use 972``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header 973is available. 974 975Clang will use the system's ``<stdatomic.h>`` header when one is available, and 976will otherwise use its own. When using its own, implementations of the atomic 977operations are provided as macros. In the cases where C11 also requires a real 978function, this header provides only the declaration of that function (along 979with a shadowing macro implementation), and you must link to a library which 980provides a definition of the function if you use it instead of the macro. 981 982C11 generic selections 983^^^^^^^^^^^^^^^^^^^^^^ 984 985Use ``__has_feature(c_generic_selections)`` or 986``__has_extension(c_generic_selections)`` to determine if support for generic 987selections is enabled. 988 989As an extension, the C11 generic selection expression is available in all 990languages supported by Clang. The syntax is the same as that given in the C11 991standard. 992 993In C, type compatibility is decided according to the rules given in the 994appropriate standard, but in C++, which lacks the type compatibility rules used 995in C, types are considered compatible only if they are equivalent. 996 997C11 ``_Static_assert()`` 998^^^^^^^^^^^^^^^^^^^^^^^^ 999 1000Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)`` 1001to determine if support for compile-time assertions using ``_Static_assert`` is 1002enabled. 1003 1004C11 ``_Thread_local`` 1005^^^^^^^^^^^^^^^^^^^^^ 1006 1007Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)`` 1008to determine if support for ``_Thread_local`` variables is enabled. 1009 1010Modules 1011------- 1012 1013Use ``__has_feature(modules)`` to determine if Modules have been enabled. 1014For example, compiling code with ``-fmodules`` enables the use of Modules. 1015 1016More information could be found `here <http://clang.llvm.org/docs/Modules.html>`_. 1017 1018Checks for Type Trait Primitives 1019================================ 1020 1021Type trait primitives are special builtin constant expressions that can be used 1022by the standard C++ library to facilitate or simplify the implementation of 1023user-facing type traits in the <type_traits> header. 1024 1025They are not intended to be used directly by user code because they are 1026implementation-defined and subject to change -- as such they're tied closely to 1027the supported set of system headers, currently: 1028 1029* LLVM's own libc++ 1030* GNU libstdc++ 1031* The Microsoft standard C++ library 1032 1033Clang supports the `GNU C++ type traits 1034<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the 1035`Microsoft Visual C++ Type traits 1036<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_. 1037 1038Feature detection is supported only for some of the primitives at present. User 1039code should not use these checks because they bear no direct relation to the 1040actual set of type traits supported by the C++ standard library. 1041 1042For type trait ``__X``, ``__has_extension(X)`` indicates the presence of the 1043type trait primitive in the compiler. A simplistic usage example as might be 1044seen in standard C++ headers follows: 1045 1046.. code-block:: c++ 1047 1048 #if __has_extension(is_convertible_to) 1049 template<typename From, typename To> 1050 struct is_convertible_to { 1051 static const bool value = __is_convertible_to(From, To); 1052 }; 1053 #else 1054 // Emulate type trait for compatibility with other compilers. 1055 #endif 1056 1057The following type trait primitives are supported by Clang: 1058 1059* ``__has_nothrow_assign`` (GNU, Microsoft) 1060* ``__has_nothrow_copy`` (GNU, Microsoft) 1061* ``__has_nothrow_constructor`` (GNU, Microsoft) 1062* ``__has_trivial_assign`` (GNU, Microsoft) 1063* ``__has_trivial_copy`` (GNU, Microsoft) 1064* ``__has_trivial_constructor`` (GNU, Microsoft) 1065* ``__has_trivial_destructor`` (GNU, Microsoft) 1066* ``__has_virtual_destructor`` (GNU, Microsoft) 1067* ``__is_abstract`` (GNU, Microsoft) 1068* ``__is_aggregate`` (GNU, Microsoft) 1069* ``__is_base_of`` (GNU, Microsoft) 1070* ``__is_class`` (GNU, Microsoft) 1071* ``__is_convertible_to`` (Microsoft) 1072* ``__is_empty`` (GNU, Microsoft) 1073* ``__is_enum`` (GNU, Microsoft) 1074* ``__is_interface_class`` (Microsoft) 1075* ``__is_pod`` (GNU, Microsoft) 1076* ``__is_polymorphic`` (GNU, Microsoft) 1077* ``__is_union`` (GNU, Microsoft) 1078* ``__is_literal(type)``: Determines whether the given type is a literal type 1079* ``__is_final``: Determines whether the given type is declared with a 1080 ``final`` class-virt-specifier. 1081* ``__underlying_type(type)``: Retrieves the underlying type for a given 1082 ``enum`` type. This trait is required to implement the C++11 standard 1083 library. 1084* ``__is_trivially_assignable(totype, fromtype)``: Determines whether a value 1085 of type ``totype`` can be assigned to from a value of type ``fromtype`` such 1086 that no non-trivial functions are called as part of that assignment. This 1087 trait is required to implement the C++11 standard library. 1088* ``__is_trivially_constructible(type, argtypes...)``: Determines whether a 1089 value of type ``type`` can be direct-initialized with arguments of types 1090 ``argtypes...`` such that no non-trivial functions are called as part of 1091 that initialization. This trait is required to implement the C++11 standard 1092 library. 1093* ``__is_destructible`` (MSVC 2013) 1094* ``__is_nothrow_destructible`` (MSVC 2013) 1095* ``__is_nothrow_assignable`` (MSVC 2013, clang) 1096* ``__is_constructible`` (MSVC 2013, clang) 1097* ``__is_nothrow_constructible`` (MSVC 2013, clang) 1098* ``__is_assignable`` (MSVC 2015, clang) 1099* ``__reference_binds_to_temporary(T, U)`` (Clang): Determines whether a 1100 reference of type ``T`` bound to an expression of type ``U`` would bind to a 1101 materialized temporary object. If ``T`` is not a reference type the result 1102 is false. Note this trait will also return false when the initialization of 1103 ``T`` from ``U`` is ill-formed. 1104 1105Blocks 1106====== 1107 1108The syntax and high level language feature description is in 1109:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for 1110the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`. 1111 1112Query for this feature with ``__has_extension(blocks)``. 1113 1114Objective-C Features 1115==================== 1116 1117Related result types 1118-------------------- 1119 1120According to Cocoa conventions, Objective-C methods with certain names 1121("``init``", "``alloc``", etc.) always return objects that are an instance of 1122the receiving class's type. Such methods are said to have a "related result 1123type", meaning that a message send to one of these methods will have the same 1124static type as an instance of the receiver class. For example, given the 1125following classes: 1126 1127.. code-block:: objc 1128 1129 @interface NSObject 1130 + (id)alloc; 1131 - (id)init; 1132 @end 1133 1134 @interface NSArray : NSObject 1135 @end 1136 1137and this common initialization pattern 1138 1139.. code-block:: objc 1140 1141 NSArray *array = [[NSArray alloc] init]; 1142 1143the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because 1144``alloc`` implicitly has a related result type. Similarly, the type of the 1145expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a 1146related result type and its receiver is known to have the type ``NSArray *``. 1147If neither ``alloc`` nor ``init`` had a related result type, the expressions 1148would have had type ``id``, as declared in the method signature. 1149 1150A method with a related result type can be declared by using the type 1151``instancetype`` as its result type. ``instancetype`` is a contextual keyword 1152that is only permitted in the result type of an Objective-C method, e.g. 1153 1154.. code-block:: objc 1155 1156 @interface A 1157 + (instancetype)constructAnA; 1158 @end 1159 1160The related result type can also be inferred for some methods. To determine 1161whether a method has an inferred related result type, the first word in the 1162camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered, 1163and the method will have a related result type if its return type is compatible 1164with the type of its class and if: 1165 1166* the first word is "``alloc``" or "``new``", and the method is a class method, 1167 or 1168 1169* the first word is "``autorelease``", "``init``", "``retain``", or "``self``", 1170 and the method is an instance method. 1171 1172If a method with a related result type is overridden by a subclass method, the 1173subclass method must also return a type that is compatible with the subclass 1174type. For example: 1175 1176.. code-block:: objc 1177 1178 @interface NSString : NSObject 1179 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString 1180 @end 1181 1182Related result types only affect the type of a message send or property access 1183via the given method. In all other respects, a method with a related result 1184type is treated the same way as method that returns ``id``. 1185 1186Use ``__has_feature(objc_instancetype)`` to determine whether the 1187``instancetype`` contextual keyword is available. 1188 1189Automatic reference counting 1190---------------------------- 1191 1192Clang provides support for :doc:`automated reference counting 1193<AutomaticReferenceCounting>` in Objective-C, which eliminates the need 1194for manual ``retain``/``release``/``autorelease`` message sends. There are three 1195feature macros associated with automatic reference counting: 1196``__has_feature(objc_arc)`` indicates the availability of automated reference 1197counting in general, while ``__has_feature(objc_arc_weak)`` indicates that 1198automated reference counting also includes support for ``__weak`` pointers to 1199Objective-C objects. ``__has_feature(objc_arc_fields)`` indicates that C structs 1200are allowed to have fields that are pointers to Objective-C objects managed by 1201automatic reference counting. 1202 1203.. _objc-weak: 1204 1205Weak references 1206--------------- 1207 1208Clang supports ARC-style weak and unsafe references in Objective-C even 1209outside of ARC mode. Weak references must be explicitly enabled with 1210the ``-fobjc-weak`` option; use ``__has_feature((objc_arc_weak))`` 1211to test whether they are enabled. Unsafe references are enabled 1212unconditionally. ARC-style weak and unsafe references cannot be used 1213when Objective-C garbage collection is enabled. 1214 1215Except as noted below, the language rules for the ``__weak`` and 1216``__unsafe_unretained`` qualifiers (and the ``weak`` and 1217``unsafe_unretained`` property attributes) are just as laid out 1218in the :doc:`ARC specification <AutomaticReferenceCounting>`. 1219In particular, note that some classes do not support forming weak 1220references to their instances, and note that special care must be 1221taken when storing weak references in memory where initialization 1222and deinitialization are outside the responsibility of the compiler 1223(such as in ``malloc``-ed memory). 1224 1225Loading from a ``__weak`` variable always implicitly retains the 1226loaded value. In non-ARC modes, this retain is normally balanced 1227by an implicit autorelease. This autorelease can be suppressed 1228by performing the load in the receiver position of a ``-retain`` 1229message send (e.g. ``[weakReference retain]``); note that this performs 1230only a single retain (the retain done when primitively loading from 1231the weak reference). 1232 1233For the most part, ``__unsafe_unretained`` in non-ARC modes is just the 1234default behavior of variables and therefore is not needed. However, 1235it does have an effect on the semantics of block captures: normally, 1236copying a block which captures an Objective-C object or block pointer 1237causes the captured pointer to be retained or copied, respectively, 1238but that behavior is suppressed when the captured variable is qualified 1239with ``__unsafe_unretained``. 1240 1241Note that the ``__weak`` qualifier formerly meant the GC qualifier in 1242all non-ARC modes and was silently ignored outside of GC modes. It now 1243means the ARC-style qualifier in all non-GC modes and is no longer 1244allowed if not enabled by either ``-fobjc-arc`` or ``-fobjc-weak``. 1245It is expected that ``-fobjc-weak`` will eventually be enabled by default 1246in all non-GC Objective-C modes. 1247 1248.. _objc-fixed-enum: 1249 1250Enumerations with a fixed underlying type 1251----------------------------------------- 1252 1253Clang provides support for C++11 enumerations with a fixed underlying type 1254within Objective-C. For example, one can write an enumeration type as: 1255 1256.. code-block:: c++ 1257 1258 typedef enum : unsigned char { Red, Green, Blue } Color; 1259 1260This specifies that the underlying type, which is used to store the enumeration 1261value, is ``unsigned char``. 1262 1263Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed 1264underlying types is available in Objective-C. 1265 1266Interoperability with C++11 lambdas 1267----------------------------------- 1268 1269Clang provides interoperability between C++11 lambdas and blocks-based APIs, by 1270permitting a lambda to be implicitly converted to a block pointer with the 1271corresponding signature. For example, consider an API such as ``NSArray``'s 1272array-sorting method: 1273 1274.. code-block:: objc 1275 1276 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr; 1277 1278``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult 1279(^)(id, id)``, and parameters of this type are generally provided with block 1280literals as arguments. However, one can also use a C++11 lambda so long as it 1281provides the same signature (in this case, accepting two parameters of type 1282``id`` and returning an ``NSComparisonResult``): 1283 1284.. code-block:: objc 1285 1286 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11", 1287 @"String 02"]; 1288 const NSStringCompareOptions comparisonOptions 1289 = NSCaseInsensitiveSearch | NSNumericSearch | 1290 NSWidthInsensitiveSearch | NSForcedOrderingSearch; 1291 NSLocale *currentLocale = [NSLocale currentLocale]; 1292 NSArray *sorted 1293 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult { 1294 NSRange string1Range = NSMakeRange(0, [s1 length]); 1295 return [s1 compare:s2 options:comparisonOptions 1296 range:string1Range locale:currentLocale]; 1297 }]; 1298 NSLog(@"sorted: %@", sorted); 1299 1300This code relies on an implicit conversion from the type of the lambda 1301expression (an unnamed, local class type called the *closure type*) to the 1302corresponding block pointer type. The conversion itself is expressed by a 1303conversion operator in that closure type that produces a block pointer with the 1304same signature as the lambda itself, e.g., 1305 1306.. code-block:: objc 1307 1308 operator NSComparisonResult (^)(id, id)() const; 1309 1310This conversion function returns a new block that simply forwards the two 1311parameters to the lambda object (which it captures by copy), then returns the 1312result. The returned block is first copied (with ``Block_copy``) and then 1313autoreleased. As an optimization, if a lambda expression is immediately 1314converted to a block pointer (as in the first example, above), then the block 1315is not copied and autoreleased: rather, it is given the same lifetime as a 1316block literal written at that point in the program, which avoids the overhead 1317of copying a block to the heap in the common case. 1318 1319The conversion from a lambda to a block pointer is only available in 1320Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory 1321management (autorelease). 1322 1323Object Literals and Subscripting 1324-------------------------------- 1325 1326Clang provides support for :doc:`Object Literals and Subscripting 1327<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C 1328programming patterns, makes programs more concise, and improves the safety of 1329container creation. There are several feature macros associated with object 1330literals and subscripting: ``__has_feature(objc_array_literals)`` tests the 1331availability of array literals; ``__has_feature(objc_dictionary_literals)`` 1332tests the availability of dictionary literals; 1333``__has_feature(objc_subscripting)`` tests the availability of object 1334subscripting. 1335 1336Objective-C Autosynthesis of Properties 1337--------------------------------------- 1338 1339Clang provides support for autosynthesis of declared properties. Using this 1340feature, clang provides default synthesis of those properties not declared 1341@dynamic and not having user provided backing getter and setter methods. 1342``__has_feature(objc_default_synthesize_properties)`` checks for availability 1343of this feature in version of clang being used. 1344 1345.. _langext-objc-retain-release: 1346 1347Objective-C retaining behavior attributes 1348----------------------------------------- 1349 1350In Objective-C, functions and methods are generally assumed to follow the 1351`Cocoa Memory Management 1352<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_ 1353conventions for ownership of object arguments and 1354return values. However, there are exceptions, and so Clang provides attributes 1355to allow these exceptions to be documented. This are used by ARC and the 1356`static analyzer <http://clang-analyzer.llvm.org>`_ Some exceptions may be 1357better described using the ``objc_method_family`` attribute instead. 1358 1359**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``, 1360``ns_returns_autoreleased``, ``cf_returns_retained``, and 1361``cf_returns_not_retained`` attributes can be placed on methods and functions 1362that return Objective-C or CoreFoundation objects. They are commonly placed at 1363the end of a function prototype or method declaration: 1364 1365.. code-block:: objc 1366 1367 id foo() __attribute__((ns_returns_retained)); 1368 1369 - (NSString *)bar:(int)x __attribute__((ns_returns_retained)); 1370 1371The ``*_returns_retained`` attributes specify that the returned object has a +1 1372retain count. The ``*_returns_not_retained`` attributes specify that the return 1373object has a +0 retain count, even if the normal convention for its selector 1374would be +1. ``ns_returns_autoreleased`` specifies that the returned object is 1375+0, but is guaranteed to live at least as long as the next flush of an 1376autorelease pool. 1377 1378**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on 1379an parameter declaration; they specify that the argument is expected to have a 1380+1 retain count, which will be balanced in some way by the function or method. 1381The ``ns_consumes_self`` attribute can only be placed on an Objective-C 1382method; it specifies that the method expects its ``self`` parameter to have a 1383+1 retain count, which it will balance in some way. 1384 1385.. code-block:: objc 1386 1387 void foo(__attribute__((ns_consumed)) NSString *string); 1388 1389 - (void) bar __attribute__((ns_consumes_self)); 1390 - (void) baz:(id) __attribute__((ns_consumed)) x; 1391 1392Further examples of these attributes are available in the static analyzer's `list of annotations for analysis 1393<http://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_. 1394 1395Query for these features with ``__has_attribute(ns_consumed)``, 1396``__has_attribute(ns_returns_retained)``, etc. 1397 1398Objective-C @available 1399---------------------- 1400 1401It is possible to use the newest SDK but still build a program that can run on 1402older versions of macOS and iOS by passing ``-mmacosx-version-min=`` / 1403``-miphoneos-version-min=``. 1404 1405Before LLVM 5.0, when calling a function that exists only in the OS that's 1406newer than the target OS (as determined by the minimum deployment version), 1407programmers had to carefully check if the function exists at runtime, using 1408null checks for weakly-linked C functions, ``+class`` for Objective-C classes, 1409and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for 1410Objective-C methods. If such a check was missed, the program would compile 1411fine, run fine on newer systems, but crash on older systems. 1412 1413As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes 1414<http://clang.llvm.org/docs/AttributeReference.html#availability>`_ together 1415with the new ``@available()`` keyword to assist with this issue. 1416When a method that's introduced in the OS newer than the target OS is called, a 1417-Wunguarded-availability warning is emitted if that call is not guarded: 1418 1419.. code-block:: objc 1420 1421 void my_fun(NSSomeClass* var) { 1422 // If fancyNewMethod was added in e.g. macOS 10.12, but the code is 1423 // built with -mmacosx-version-min=10.11, then this unconditional call 1424 // will emit a -Wunguarded-availability warning: 1425 [var fancyNewMethod]; 1426 } 1427 1428To fix the warning and to avoid the crash on macOS 10.11, wrap it in 1429``if(@available())``: 1430 1431.. code-block:: objc 1432 1433 void my_fun(NSSomeClass* var) { 1434 if (@available(macOS 10.12, *)) { 1435 [var fancyNewMethod]; 1436 } else { 1437 // Put fallback behavior for old macOS versions (and for non-mac 1438 // platforms) here. 1439 } 1440 } 1441 1442The ``*`` is required and means that platforms not explicitly listed will take 1443the true branch, and the compiler will emit ``-Wunguarded-availability`` 1444warnings for unlisted platforms based on those platform's deployment target. 1445More than one platform can be listed in ``@available()``: 1446 1447.. code-block:: objc 1448 1449 void my_fun(NSSomeClass* var) { 1450 if (@available(macOS 10.12, iOS 10, *)) { 1451 [var fancyNewMethod]; 1452 } 1453 } 1454 1455If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called 1456on 10.12, then add an `availability attribute 1457<http://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it, 1458which will also suppress the warning and require that calls to my_fun() are 1459checked: 1460 1461.. code-block:: objc 1462 1463 API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) { 1464 [var fancyNewMethod]; // Now ok. 1465 } 1466 1467``@available()`` is only available in Objective-C code. To use the feature 1468in C and C++ code, use the ``__builtin_available()`` spelling instead. 1469 1470If existing code uses null checks or ``-respondsToSelector:``, it should 1471be changed to use ``@available()`` (or ``__builtin_available``) instead. 1472 1473``-Wunguarded-availability`` is disabled by default, but 1474``-Wunguarded-availability-new``, which only emits this warning for APIs 1475that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and 1476tvOS >= 11, is enabled by default. 1477 1478.. _langext-overloading: 1479 1480Objective-C++ ABI: protocol-qualifier mangling of parameters 1481------------------------------------------------------------ 1482 1483Starting with LLVM 3.4, Clang produces a new mangling for parameters whose 1484type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such 1485parameters to be differentiated from those with the regular unqualified ``id`` 1486type. 1487 1488This was a non-backward compatible mangling change to the ABI. This change 1489allows proper overloading, and also prevents mangling conflicts with template 1490parameters of protocol-qualified type. 1491 1492Query the presence of this new mangling with 1493``__has_feature(objc_protocol_qualifier_mangling)``. 1494 1495Initializer lists for complex numbers in C 1496========================================== 1497 1498clang supports an extension which allows the following in C: 1499 1500.. code-block:: c++ 1501 1502 #include <math.h> 1503 #include <complex.h> 1504 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf) 1505 1506This construct is useful because there is no way to separately initialize the 1507real and imaginary parts of a complex variable in standard C, given that clang 1508does not support ``_Imaginary``. (Clang also supports the ``__real__`` and 1509``__imag__`` extensions from gcc, which help in some cases, but are not usable 1510in static initializers.) 1511 1512Note that this extension does not allow eliding the braces; the meaning of the 1513following two lines is different: 1514 1515.. code-block:: c++ 1516 1517 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1) 1518 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0) 1519 1520This extension also works in C++ mode, as far as that goes, but does not apply 1521to the C++ ``std::complex``. (In C++11, list initialization allows the same 1522syntax to be used with ``std::complex`` with the same meaning.) 1523 1524Builtin Functions 1525================= 1526 1527Clang supports a number of builtin library functions with the same syntax as 1528GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``, 1529``__builtin_choose_expr``, ``__builtin_types_compatible_p``, 1530``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to 1531the GCC builtins, Clang supports a number of builtins that GCC does not, which 1532are listed here. 1533 1534Please note that Clang does not and will not support all of the GCC builtins 1535for vector operations. Instead of using builtins, you should use the functions 1536defined in target-specific header files like ``<xmmintrin.h>``, which define 1537portable wrappers for these. Many of the Clang versions of these functions are 1538implemented directly in terms of :ref:`extended vector support 1539<langext-vectors>` instead of builtins, in order to reduce the number of 1540builtins that we need to implement. 1541 1542``__builtin_assume`` 1543------------------------------ 1544 1545``__builtin_assume`` is used to provide the optimizer with a boolean 1546invariant that is defined to be true. 1547 1548**Syntax**: 1549 1550.. code-block:: c++ 1551 1552 __builtin_assume(bool) 1553 1554**Example of Use**: 1555 1556.. code-block:: c++ 1557 1558 int foo(int x) { 1559 __builtin_assume(x != 0); 1560 1561 // The optimizer may short-circuit this check using the invariant. 1562 if (x == 0) 1563 return do_something(); 1564 1565 return do_something_else(); 1566 } 1567 1568**Description**: 1569 1570The boolean argument to this function is defined to be true. The optimizer may 1571analyze the form of the expression provided as the argument and deduce from 1572that information used to optimize the program. If the condition is violated 1573during execution, the behavior is undefined. The argument itself is never 1574evaluated, so any side effects of the expression will be discarded. 1575 1576Query for this feature with ``__has_builtin(__builtin_assume)``. 1577 1578``__builtin_readcyclecounter`` 1579------------------------------ 1580 1581``__builtin_readcyclecounter`` is used to access the cycle counter register (or 1582a similar low-latency, high-accuracy clock) on those targets that support it. 1583 1584**Syntax**: 1585 1586.. code-block:: c++ 1587 1588 __builtin_readcyclecounter() 1589 1590**Example of Use**: 1591 1592.. code-block:: c++ 1593 1594 unsigned long long t0 = __builtin_readcyclecounter(); 1595 do_something(); 1596 unsigned long long t1 = __builtin_readcyclecounter(); 1597 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow 1598 1599**Description**: 1600 1601The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value, 1602which may be either global or process/thread-specific depending on the target. 1603As the backing counters often overflow quickly (on the order of seconds) this 1604should only be used for timing small intervals. When not supported by the 1605target, the return value is always zero. This builtin takes no arguments and 1606produces an unsigned long long result. 1607 1608Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note 1609that even if present, its use may depend on run-time privilege or other OS 1610controlled state. 1611 1612.. _langext-__builtin_shufflevector: 1613 1614``__builtin_shufflevector`` 1615--------------------------- 1616 1617``__builtin_shufflevector`` is used to express generic vector 1618permutation/shuffle/swizzle operations. This builtin is also very important 1619for the implementation of various target-specific header files like 1620``<xmmintrin.h>``. 1621 1622**Syntax**: 1623 1624.. code-block:: c++ 1625 1626 __builtin_shufflevector(vec1, vec2, index1, index2, ...) 1627 1628**Examples**: 1629 1630.. code-block:: c++ 1631 1632 // identity operation - return 4-element vector v1. 1633 __builtin_shufflevector(v1, v1, 0, 1, 2, 3) 1634 1635 // "Splat" element 0 of V1 into a 4-element result. 1636 __builtin_shufflevector(V1, V1, 0, 0, 0, 0) 1637 1638 // Reverse 4-element vector V1. 1639 __builtin_shufflevector(V1, V1, 3, 2, 1, 0) 1640 1641 // Concatenate every other element of 4-element vectors V1 and V2. 1642 __builtin_shufflevector(V1, V2, 0, 2, 4, 6) 1643 1644 // Concatenate every other element of 8-element vectors V1 and V2. 1645 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14) 1646 1647 // Shuffle v1 with some elements being undefined 1648 __builtin_shufflevector(v1, v1, 3, -1, 1, -1) 1649 1650**Description**: 1651 1652The first two arguments to ``__builtin_shufflevector`` are vectors that have 1653the same element type. The remaining arguments are a list of integers that 1654specify the elements indices of the first two vectors that should be extracted 1655and returned in a new vector. These element indices are numbered sequentially 1656starting with the first vector, continuing into the second vector. Thus, if 1657``vec1`` is a 4-element vector, index 5 would refer to the second element of 1658``vec2``. An index of -1 can be used to indicate that the corresponding element 1659in the returned vector is a don't care and can be optimized by the backend. 1660 1661The result of ``__builtin_shufflevector`` is a vector with the same element 1662type as ``vec1``/``vec2`` but that has an element count equal to the number of 1663indices specified. 1664 1665Query for this feature with ``__has_builtin(__builtin_shufflevector)``. 1666 1667.. _langext-__builtin_convertvector: 1668 1669``__builtin_convertvector`` 1670--------------------------- 1671 1672``__builtin_convertvector`` is used to express generic vector 1673type-conversion operations. The input vector and the output vector 1674type must have the same number of elements. 1675 1676**Syntax**: 1677 1678.. code-block:: c++ 1679 1680 __builtin_convertvector(src_vec, dst_vec_type) 1681 1682**Examples**: 1683 1684.. code-block:: c++ 1685 1686 typedef double vector4double __attribute__((__vector_size__(32))); 1687 typedef float vector4float __attribute__((__vector_size__(16))); 1688 typedef short vector4short __attribute__((__vector_size__(8))); 1689 vector4float vf; vector4short vs; 1690 1691 // convert from a vector of 4 floats to a vector of 4 doubles. 1692 __builtin_convertvector(vf, vector4double) 1693 // equivalent to: 1694 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] } 1695 1696 // convert from a vector of 4 shorts to a vector of 4 floats. 1697 __builtin_convertvector(vs, vector4float) 1698 // equivalent to: 1699 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] } 1700 1701**Description**: 1702 1703The first argument to ``__builtin_convertvector`` is a vector, and the second 1704argument is a vector type with the same number of elements as the first 1705argument. 1706 1707The result of ``__builtin_convertvector`` is a vector with the same element 1708type as the second argument, with a value defined in terms of the action of a 1709C-style cast applied to each element of the first argument. 1710 1711Query for this feature with ``__has_builtin(__builtin_convertvector)``. 1712 1713``__builtin_bitreverse`` 1714------------------------ 1715 1716* ``__builtin_bitreverse8`` 1717* ``__builtin_bitreverse16`` 1718* ``__builtin_bitreverse32`` 1719* ``__builtin_bitreverse64`` 1720 1721**Syntax**: 1722 1723.. code-block:: c++ 1724 1725 __builtin_bitreverse32(x) 1726 1727**Examples**: 1728 1729.. code-block:: c++ 1730 1731 uint8_t rev_x = __builtin_bitreverse8(x); 1732 uint16_t rev_x = __builtin_bitreverse16(x); 1733 uint32_t rev_y = __builtin_bitreverse32(y); 1734 uint64_t rev_z = __builtin_bitreverse64(z); 1735 1736**Description**: 1737 1738The '``__builtin_bitreverse``' family of builtins is used to reverse 1739the bitpattern of an integer value; for example ``0b10110110`` becomes 1740``0b01101101``. 1741 1742``__builtin_unreachable`` 1743------------------------- 1744 1745``__builtin_unreachable`` is used to indicate that a specific point in the 1746program cannot be reached, even if the compiler might otherwise think it can. 1747This is useful to improve optimization and eliminates certain warnings. For 1748example, without the ``__builtin_unreachable`` in the example below, the 1749compiler assumes that the inline asm can fall through and prints a "function 1750declared '``noreturn``' should not return" warning. 1751 1752**Syntax**: 1753 1754.. code-block:: c++ 1755 1756 __builtin_unreachable() 1757 1758**Example of use**: 1759 1760.. code-block:: c++ 1761 1762 void myabort(void) __attribute__((noreturn)); 1763 void myabort(void) { 1764 asm("int3"); 1765 __builtin_unreachable(); 1766 } 1767 1768**Description**: 1769 1770The ``__builtin_unreachable()`` builtin has completely undefined behavior. 1771Since it has undefined behavior, it is a statement that it is never reached and 1772the optimizer can take advantage of this to produce better code. This builtin 1773takes no arguments and produces a void result. 1774 1775Query for this feature with ``__has_builtin(__builtin_unreachable)``. 1776 1777``__builtin_unpredictable`` 1778--------------------------- 1779 1780``__builtin_unpredictable`` is used to indicate that a branch condition is 1781unpredictable by hardware mechanisms such as branch prediction logic. 1782 1783**Syntax**: 1784 1785.. code-block:: c++ 1786 1787 __builtin_unpredictable(long long) 1788 1789**Example of use**: 1790 1791.. code-block:: c++ 1792 1793 if (__builtin_unpredictable(x > 0)) { 1794 foo(); 1795 } 1796 1797**Description**: 1798 1799The ``__builtin_unpredictable()`` builtin is expected to be used with control 1800flow conditions such as in ``if`` and ``switch`` statements. 1801 1802Query for this feature with ``__has_builtin(__builtin_unpredictable)``. 1803 1804``__sync_swap`` 1805--------------- 1806 1807``__sync_swap`` is used to atomically swap integers or pointers in memory. 1808 1809**Syntax**: 1810 1811.. code-block:: c++ 1812 1813 type __sync_swap(type *ptr, type value, ...) 1814 1815**Example of Use**: 1816 1817.. code-block:: c++ 1818 1819 int old_value = __sync_swap(&value, new_value); 1820 1821**Description**: 1822 1823The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of 1824atomic intrinsics to allow code to atomically swap the current value with the 1825new value. More importantly, it helps developers write more efficient and 1826correct code by avoiding expensive loops around 1827``__sync_bool_compare_and_swap()`` or relying on the platform specific 1828implementation details of ``__sync_lock_test_and_set()``. The 1829``__sync_swap()`` builtin is a full barrier. 1830 1831``__builtin_addressof`` 1832----------------------- 1833 1834``__builtin_addressof`` performs the functionality of the built-in ``&`` 1835operator, ignoring any ``operator&`` overload. This is useful in constant 1836expressions in C++11, where there is no other way to take the address of an 1837object that overloads ``operator&``. 1838 1839**Example of use**: 1840 1841.. code-block:: c++ 1842 1843 template<typename T> constexpr T *addressof(T &value) { 1844 return __builtin_addressof(value); 1845 } 1846 1847``__builtin_operator_new`` and ``__builtin_operator_delete`` 1848------------------------------------------------------------ 1849 1850``__builtin_operator_new`` allocates memory just like a non-placement non-class 1851*new-expression*. This is exactly like directly calling the normal 1852non-placement ``::operator new``, except that it allows certain optimizations 1853that the C++ standard does not permit for a direct function call to 1854``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and 1855merging allocations). 1856 1857Likewise, ``__builtin_operator_delete`` deallocates memory just like a 1858non-class *delete-expression*, and is exactly like directly calling the normal 1859``::operator delete``, except that it permits optimizations. Only the unsized 1860form of ``__builtin_operator_delete`` is currently available. 1861 1862These builtins are intended for use in the implementation of ``std::allocator`` 1863and other similar allocation libraries, and are only available in C++. 1864 1865Multiprecision Arithmetic Builtins 1866---------------------------------- 1867 1868Clang provides a set of builtins which expose multiprecision arithmetic in a 1869manner amenable to C. They all have the following form: 1870 1871.. code-block:: c 1872 1873 unsigned x = ..., y = ..., carryin = ..., carryout; 1874 unsigned sum = __builtin_addc(x, y, carryin, &carryout); 1875 1876Thus one can form a multiprecision addition chain in the following manner: 1877 1878.. code-block:: c 1879 1880 unsigned *x, *y, *z, carryin=0, carryout; 1881 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout); 1882 carryin = carryout; 1883 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout); 1884 carryin = carryout; 1885 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout); 1886 carryin = carryout; 1887 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout); 1888 1889The complete list of builtins are: 1890 1891.. code-block:: c 1892 1893 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout); 1894 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout); 1895 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout); 1896 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout); 1897 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout); 1898 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout); 1899 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout); 1900 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout); 1901 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout); 1902 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout); 1903 1904Checked Arithmetic Builtins 1905--------------------------- 1906 1907Clang provides a set of builtins that implement checked arithmetic for security 1908critical applications in a manner that is fast and easily expressable in C. As 1909an example of their usage: 1910 1911.. code-block:: c 1912 1913 errorcode_t security_critical_application(...) { 1914 unsigned x, y, result; 1915 ... 1916 if (__builtin_mul_overflow(x, y, &result)) 1917 return kErrorCodeHackers; 1918 ... 1919 use_multiply(result); 1920 ... 1921 } 1922 1923Clang provides the following checked arithmetic builtins: 1924 1925.. code-block:: c 1926 1927 bool __builtin_add_overflow (type1 x, type2 y, type3 *sum); 1928 bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff); 1929 bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod); 1930 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum); 1931 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum); 1932 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum); 1933 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff); 1934 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff); 1935 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff); 1936 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod); 1937 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod); 1938 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod); 1939 bool __builtin_sadd_overflow (int x, int y, int *sum); 1940 bool __builtin_saddl_overflow (long x, long y, long *sum); 1941 bool __builtin_saddll_overflow(long long x, long long y, long long *sum); 1942 bool __builtin_ssub_overflow (int x, int y, int *diff); 1943 bool __builtin_ssubl_overflow (long x, long y, long *diff); 1944 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff); 1945 bool __builtin_smul_overflow (int x, int y, int *prod); 1946 bool __builtin_smull_overflow (long x, long y, long *prod); 1947 bool __builtin_smulll_overflow(long long x, long long y, long long *prod); 1948 1949Each builtin performs the specified mathematical operation on the 1950first two arguments and stores the result in the third argument. If 1951possible, the result will be equal to mathematically-correct result 1952and the builtin will return 0. Otherwise, the builtin will return 19531 and the result will be equal to the unique value that is equivalent 1954to the mathematically-correct result modulo two raised to the *k* 1955power, where *k* is the number of bits in the result type. The 1956behavior of these builtins is well-defined for all argument values. 1957 1958The first three builtins work generically for operands of any integer type, 1959including boolean types. The operands need not have the same type as each 1960other, or as the result. The other builtins may implicitly promote or 1961convert their operands before performing the operation. 1962 1963Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc. 1964 1965Floating point builtins 1966--------------------------------------- 1967 1968``__builtin_canonicalize`` 1969-------------------------- 1970 1971.. code-block:: c 1972 1973 double __builtin_canonicalize(double); 1974 float __builtin_canonicalizef(float); 1975 long double__builtin_canonicalizel(long double); 1976 1977Returns the platform specific canonical encoding of a floating point 1978number. This canonicalization is useful for implementing certain 1979numeric primitives such as frexp. See `LLVM canonicalize intrinsic 1980<http://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for 1981more information on the semantics. 1982 1983String builtins 1984--------------- 1985 1986Clang provides constant expression evaluation support for builtins forms of 1987the following functions from the C standard library ``<string.h>`` header: 1988 1989* ``memchr`` 1990* ``memcmp`` 1991* ``strchr`` 1992* ``strcmp`` 1993* ``strlen`` 1994* ``strncmp`` 1995* ``wcschr`` 1996* ``wcscmp`` 1997* ``wcslen`` 1998* ``wcsncmp`` 1999* ``wmemchr`` 2000* ``wmemcmp`` 2001 2002In each case, the builtin form has the name of the C library function prefixed 2003by ``__builtin_``. Example: 2004 2005.. code-block:: c 2006 2007 void *p = __builtin_memchr("foobar", 'b', 5); 2008 2009In addition to the above, one further builtin is provided: 2010 2011.. code-block:: c 2012 2013 char *__builtin_char_memchr(const char *haystack, int needle, size_t size); 2014 2015``__builtin_char_memchr(a, b, c)`` is identical to 2016``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within 2017constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*`` 2018is disallowed in general). 2019 2020Support for constant expression evaluation for the above builtins be detected 2021with ``__has_feature(cxx_constexpr_string_builtins)``. 2022 2023Atomic Min/Max builtins with memory ordering 2024-------------------------------------------- 2025 2026There are two atomic builtins with min/max in-memory comparison and swap. 2027The syntax and semantics are similar to GCC-compatible __atomic_* builtins. 2028 2029* ``__atomic_fetch_min`` 2030* ``__atomic_fetch_max`` 2031 2032The builtins work with signed and unsigned integers and require to specify memory ordering. 2033The return value is the original value that was stored in memory before comparison. 2034 2035Example: 2036 2037.. code-block:: c 2038 2039 unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED); 2040 2041The third argument is one of the memory ordering specifiers ``__ATOMIC_RELAXED``, 2042``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, ``__ATOMIC_RELEASE``, 2043``__ATOMIC_ACQ_REL``, or ``__ATOMIC_SEQ_CST`` following C++11 memory model semantics. 2044 2045In terms or aquire-release ordering barriers these two operations are always 2046considered as operations with *load-store* semantics, even when the original value 2047is not actually modified after comparison. 2048 2049.. _langext-__c11_atomic: 2050 2051__c11_atomic builtins 2052--------------------- 2053 2054Clang provides a set of builtins which are intended to be used to implement 2055C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the 2056``_explicit`` form of the corresponding C11 operation, and are named with a 2057``__c11_`` prefix. The supported operations, and the differences from 2058the corresponding C11 operations, are: 2059 2060* ``__c11_atomic_init`` 2061* ``__c11_atomic_thread_fence`` 2062* ``__c11_atomic_signal_fence`` 2063* ``__c11_atomic_is_lock_free`` (The argument is the size of the 2064 ``_Atomic(...)`` object, instead of its address) 2065* ``__c11_atomic_store`` 2066* ``__c11_atomic_load`` 2067* ``__c11_atomic_exchange`` 2068* ``__c11_atomic_compare_exchange_strong`` 2069* ``__c11_atomic_compare_exchange_weak`` 2070* ``__c11_atomic_fetch_add`` 2071* ``__c11_atomic_fetch_sub`` 2072* ``__c11_atomic_fetch_and`` 2073* ``__c11_atomic_fetch_or`` 2074* ``__c11_atomic_fetch_xor`` 2075 2076The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, 2077``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are 2078provided, with values corresponding to the enumerators of C11's 2079``memory_order`` enumeration. 2080 2081(Note that Clang additionally provides GCC-compatible ``__atomic_*`` 2082builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0 2083atomic builtins are an explicit form of the corresponding OpenCL 2.0 2084builtin function, and are named with a ``__opencl_`` prefix. The macros 2085``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``, 2086``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``, 2087and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values 2088corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.) 2089 2090Low-level ARM exclusive memory builtins 2091--------------------------------------- 2092 2093Clang provides overloaded builtins giving direct access to the three key ARM 2094instructions for implementing atomic operations. 2095 2096.. code-block:: c 2097 2098 T __builtin_arm_ldrex(const volatile T *addr); 2099 T __builtin_arm_ldaex(const volatile T *addr); 2100 int __builtin_arm_strex(T val, volatile T *addr); 2101 int __builtin_arm_stlex(T val, volatile T *addr); 2102 void __builtin_arm_clrex(void); 2103 2104The types ``T`` currently supported are: 2105 2106* Integer types with width at most 64 bits (or 128 bits on AArch64). 2107* Floating-point types 2108* Pointer types. 2109 2110Note that the compiler does not guarantee it will not insert stores which clear 2111the exclusive monitor in between an ``ldrex`` type operation and its paired 2112``strex``. In practice this is only usually a risk when the extra store is on 2113the same cache line as the variable being modified and Clang will only insert 2114stack stores on its own, so it is best not to use these operations on variables 2115with automatic storage duration. 2116 2117Also, loads and stores may be implicit in code written between the ``ldrex`` and 2118``strex``. Clang will not necessarily mitigate the effects of these either, so 2119care should be exercised. 2120 2121For these reasons the higher level atomic primitives should be preferred where 2122possible. 2123 2124Non-temporal load/store builtins 2125-------------------------------- 2126 2127Clang provides overloaded builtins allowing generation of non-temporal memory 2128accesses. 2129 2130.. code-block:: c 2131 2132 T __builtin_nontemporal_load(T *addr); 2133 void __builtin_nontemporal_store(T value, T *addr); 2134 2135The types ``T`` currently supported are: 2136 2137* Integer types. 2138* Floating-point types. 2139* Vector types. 2140 2141Note that the compiler does not guarantee that non-temporal loads or stores 2142will be used. 2143 2144C++ Coroutines support builtins 2145-------------------------------- 2146 2147.. warning:: 2148 This is a work in progress. Compatibility across Clang/LLVM releases is not 2149 guaranteed. 2150 2151Clang provides experimental builtins to support C++ Coroutines as defined by 2152http://wg21.link/P0057. The following four are intended to be used by the 2153standard library to implement `std::experimental::coroutine_handle` type. 2154 2155**Syntax**: 2156 2157.. code-block:: c 2158 2159 void __builtin_coro_resume(void *addr); 2160 void __builtin_coro_destroy(void *addr); 2161 bool __builtin_coro_done(void *addr); 2162 void *__builtin_coro_promise(void *addr, int alignment, bool from_promise) 2163 2164**Example of use**: 2165 2166.. code-block:: c++ 2167 2168 template <> struct coroutine_handle<void> { 2169 void resume() const { __builtin_coro_resume(ptr); } 2170 void destroy() const { __builtin_coro_destroy(ptr); } 2171 bool done() const { return __builtin_coro_done(ptr); } 2172 // ... 2173 protected: 2174 void *ptr; 2175 }; 2176 2177 template <typename Promise> struct coroutine_handle : coroutine_handle<> { 2178 // ... 2179 Promise &promise() const { 2180 return *reinterpret_cast<Promise *>( 2181 __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false)); 2182 } 2183 static coroutine_handle from_promise(Promise &promise) { 2184 coroutine_handle p; 2185 p.ptr = __builtin_coro_promise(&promise, alignof(Promise), 2186 /*from-promise=*/true); 2187 return p; 2188 } 2189 }; 2190 2191 2192Other coroutine builtins are either for internal clang use or for use during 2193development of the coroutine feature. See `Coroutines in LLVM 2194<http://llvm.org/docs/Coroutines.html#intrinsics>`_ for 2195more information on their semantics. Note that builtins matching the intrinsics 2196that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc, 2197llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to 2198an appropriate value during the emission. 2199 2200**Syntax**: 2201 2202.. code-block:: c 2203 2204 size_t __builtin_coro_size() 2205 void *__builtin_coro_frame() 2206 void *__builtin_coro_free(void *coro_frame) 2207 2208 void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts) 2209 bool __builtin_coro_alloc() 2210 void *__builtin_coro_begin(void *memory) 2211 void __builtin_coro_end(void *coro_frame, bool unwind) 2212 char __builtin_coro_suspend(bool final) 2213 bool __builtin_coro_param(void *original, void *copy) 2214 2215Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM 2216automatically will insert one if the first argument to `llvm.coro.suspend` is 2217token `none`. If a user calls `__builin_suspend`, clang will insert `token none` 2218as the first argument to the intrinsic. 2219 2220Non-standard C++11 Attributes 2221============================= 2222 2223Clang's non-standard C++11 attributes live in the ``clang`` attribute 2224namespace. 2225 2226Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which 2227are accepted with the ``__attribute__((foo))`` syntax are also accepted as 2228``[[gnu::foo]]``. This only extends to attributes which are specified by GCC 2229(see the list of `GCC function attributes 2230<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable 2231attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and 2232`GCC type attributes 2233<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC 2234implementation, these attributes must appertain to the *declarator-id* in a 2235declaration, which means they must go either at the start of the declaration or 2236immediately after the name being declared. 2237 2238For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and 2239also applies the GNU ``noreturn`` attribute to ``f``. 2240 2241.. code-block:: c++ 2242 2243 [[gnu::unused]] int a, f [[gnu::noreturn]] (); 2244 2245Target-Specific Extensions 2246========================== 2247 2248Clang supports some language features conditionally on some targets. 2249 2250ARM/AArch64 Language Extensions 2251------------------------------- 2252 2253Memory Barrier Intrinsics 2254^^^^^^^^^^^^^^^^^^^^^^^^^ 2255Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined 2256in the `ARM C Language Extensions Release 2.0 2257<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_. 2258Note that these intrinsics are implemented as motion barriers that block 2259reordering of memory accesses and side effect instructions. Other instructions 2260like simple arithmetic may be reordered around the intrinsic. If you expect to 2261have no reordering at all, use inline assembly instead. 2262 2263X86/X86-64 Language Extensions 2264------------------------------ 2265 2266The X86 backend has these language extensions: 2267 2268Memory references to specified segments 2269^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 2270 2271Annotating a pointer with address space #256 causes it to be code generated 2272relative to the X86 GS segment register, address space #257 causes it to be 2273relative to the X86 FS segment, and address space #258 causes it to be 2274relative to the X86 SS segment. Note that this is a very very low-level 2275feature that should only be used if you know what you're doing (for example in 2276an OS kernel). 2277 2278Here is an example: 2279 2280.. code-block:: c++ 2281 2282 #define GS_RELATIVE __attribute__((address_space(256))) 2283 int foo(int GS_RELATIVE *P) { 2284 return *P; 2285 } 2286 2287Which compiles to (on X86-32): 2288 2289.. code-block:: gas 2290 2291 _foo: 2292 movl 4(%esp), %eax 2293 movl %gs:(%eax), %eax 2294 ret 2295 2296Extensions for Static Analysis 2297============================== 2298 2299Clang supports additional attributes that are useful for documenting program 2300invariants and rules for static analysis tools, such as the `Clang Static 2301Analyzer <http://clang-analyzer.llvm.org/>`_. These attributes are documented 2302in the analyzer's `list of source-level annotations 2303<http://clang-analyzer.llvm.org/annotations.html>`_. 2304 2305 2306Extensions for Dynamic Analysis 2307=============================== 2308 2309Use ``__has_feature(address_sanitizer)`` to check if the code is being built 2310with :doc:`AddressSanitizer`. 2311 2312Use ``__has_feature(thread_sanitizer)`` to check if the code is being built 2313with :doc:`ThreadSanitizer`. 2314 2315Use ``__has_feature(memory_sanitizer)`` to check if the code is being built 2316with :doc:`MemorySanitizer`. 2317 2318Use ``__has_feature(safe_stack)`` to check if the code is being built 2319with :doc:`SafeStack`. 2320 2321 2322Extensions for selectively disabling optimization 2323================================================= 2324 2325Clang provides a mechanism for selectively disabling optimizations in functions 2326and methods. 2327 2328To disable optimizations in a single function definition, the GNU-style or C++11 2329non-standard attribute ``optnone`` can be used. 2330 2331.. code-block:: c++ 2332 2333 // The following functions will not be optimized. 2334 // GNU-style attribute 2335 __attribute__((optnone)) int foo() { 2336 // ... code 2337 } 2338 // C++11 attribute 2339 [[clang::optnone]] int bar() { 2340 // ... code 2341 } 2342 2343To facilitate disabling optimization for a range of function definitions, a 2344range-based pragma is provided. Its syntax is ``#pragma clang optimize`` 2345followed by ``off`` or ``on``. 2346 2347All function definitions in the region between an ``off`` and the following 2348``on`` will be decorated with the ``optnone`` attribute unless doing so would 2349conflict with explicit attributes already present on the function (e.g. the 2350ones that control inlining). 2351 2352.. code-block:: c++ 2353 2354 #pragma clang optimize off 2355 // This function will be decorated with optnone. 2356 int foo() { 2357 // ... code 2358 } 2359 2360 // optnone conflicts with always_inline, so bar() will not be decorated. 2361 __attribute__((always_inline)) int bar() { 2362 // ... code 2363 } 2364 #pragma clang optimize on 2365 2366If no ``on`` is found to close an ``off`` region, the end of the region is the 2367end of the compilation unit. 2368 2369Note that a stray ``#pragma clang optimize on`` does not selectively enable 2370additional optimizations when compiling at low optimization levels. This feature 2371can only be used to selectively disable optimizations. 2372 2373The pragma has an effect on functions only at the point of their definition; for 2374function templates, this means that the state of the pragma at the point of an 2375instantiation is not necessarily relevant. Consider the following example: 2376 2377.. code-block:: c++ 2378 2379 template<typename T> T twice(T t) { 2380 return 2 * t; 2381 } 2382 2383 #pragma clang optimize off 2384 template<typename T> T thrice(T t) { 2385 return 3 * t; 2386 } 2387 2388 int container(int a, int b) { 2389 return twice(a) + thrice(b); 2390 } 2391 #pragma clang optimize on 2392 2393In this example, the definition of the template function ``twice`` is outside 2394the pragma region, whereas the definition of ``thrice`` is inside the region. 2395The ``container`` function is also in the region and will not be optimized, but 2396it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of 2397these two instantiations, ``twice`` will be optimized (because its definition 2398was outside the region) and ``thrice`` will not be optimized. 2399 2400Extensions for loop hint optimizations 2401====================================== 2402 2403The ``#pragma clang loop`` directive is used to specify hints for optimizing the 2404subsequent for, while, do-while, or c++11 range-based for loop. The directive 2405provides options for vectorization, interleaving, unrolling and 2406distribution. Loop hints can be specified before any loop and will be ignored if 2407the optimization is not safe to apply. 2408 2409Vectorization and Interleaving 2410------------------------------ 2411 2412A vectorized loop performs multiple iterations of the original loop 2413in parallel using vector instructions. The instruction set of the target 2414processor determines which vector instructions are available and their vector 2415widths. This restricts the types of loops that can be vectorized. The vectorizer 2416automatically determines if the loop is safe and profitable to vectorize. A 2417vector instruction cost model is used to select the vector width. 2418 2419Interleaving multiple loop iterations allows modern processors to further 2420improve instruction-level parallelism (ILP) using advanced hardware features, 2421such as multiple execution units and out-of-order execution. The vectorizer uses 2422a cost model that depends on the register pressure and generated code size to 2423select the interleaving count. 2424 2425Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled 2426by ``interleave(enable)``. This is useful when compiling with ``-Os`` to 2427manually enable vectorization or interleaving. 2428 2429.. code-block:: c++ 2430 2431 #pragma clang loop vectorize(enable) 2432 #pragma clang loop interleave(enable) 2433 for(...) { 2434 ... 2435 } 2436 2437The vector width is specified by ``vectorize_width(_value_)`` and the interleave 2438count is specified by ``interleave_count(_value_)``, where 2439_value_ is a positive integer. This is useful for specifying the optimal 2440width/count of the set of target architectures supported by your application. 2441 2442.. code-block:: c++ 2443 2444 #pragma clang loop vectorize_width(2) 2445 #pragma clang loop interleave_count(2) 2446 for(...) { 2447 ... 2448 } 2449 2450Specifying a width/count of 1 disables the optimization, and is equivalent to 2451``vectorize(disable)`` or ``interleave(disable)``. 2452 2453Loop Unrolling 2454-------------- 2455 2456Unrolling a loop reduces the loop control overhead and exposes more 2457opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling 2458eliminates the loop and replaces it with an enumerated sequence of loop 2459iterations. Full unrolling is only possible if the loop trip count is known at 2460compile time. Partial unrolling replicates the loop body within the loop and 2461reduces the trip count. 2462 2463If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the 2464loop if the trip count is known at compile time. If the fully unrolled code size 2465is greater than an internal limit the loop will be partially unrolled up to this 2466limit. If the trip count is not known at compile time the loop will be partially 2467unrolled with a heuristically chosen unroll factor. 2468 2469.. code-block:: c++ 2470 2471 #pragma clang loop unroll(enable) 2472 for(...) { 2473 ... 2474 } 2475 2476If ``unroll(full)`` is specified the unroller will attempt to fully unroll the 2477loop if the trip count is known at compile time identically to 2478``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled 2479if the loop count is not known at compile time. 2480 2481.. code-block:: c++ 2482 2483 #pragma clang loop unroll(full) 2484 for(...) { 2485 ... 2486 } 2487 2488The unroll count can be specified explicitly with ``unroll_count(_value_)`` where 2489_value_ is a positive integer. If this value is greater than the trip count the 2490loop will be fully unrolled. Otherwise the loop is partially unrolled subject 2491to the same code size limit as with ``unroll(enable)``. 2492 2493.. code-block:: c++ 2494 2495 #pragma clang loop unroll_count(8) 2496 for(...) { 2497 ... 2498 } 2499 2500Unrolling of a loop can be prevented by specifying ``unroll(disable)``. 2501 2502Loop Distribution 2503----------------- 2504 2505Loop Distribution allows splitting a loop into multiple loops. This is 2506beneficial for example when the entire loop cannot be vectorized but some of the 2507resulting loops can. 2508 2509If ``distribute(enable))`` is specified and the loop has memory dependencies 2510that inhibit vectorization, the compiler will attempt to isolate the offending 2511operations into a new loop. This optimization is not enabled by default, only 2512loops marked with the pragma are considered. 2513 2514.. code-block:: c++ 2515 2516 #pragma clang loop distribute(enable) 2517 for (i = 0; i < N; ++i) { 2518 S1: A[i + 1] = A[i] + B[i]; 2519 S2: C[i] = D[i] * E[i]; 2520 } 2521 2522This loop will be split into two loops between statements S1 and S2. The 2523second loop containing S2 will be vectorized. 2524 2525Loop Distribution is currently not enabled by default in the optimizer because 2526it can hurt performance in some cases. For example, instruction-level 2527parallelism could be reduced by sequentializing the execution of the 2528statements S1 and S2 above. 2529 2530If Loop Distribution is turned on globally with 2531``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can 2532be used the disable it on a per-loop basis. 2533 2534Additional Information 2535---------------------- 2536 2537For convenience multiple loop hints can be specified on a single line. 2538 2539.. code-block:: c++ 2540 2541 #pragma clang loop vectorize_width(4) interleave_count(8) 2542 for(...) { 2543 ... 2544 } 2545 2546If an optimization cannot be applied any hints that apply to it will be ignored. 2547For example, the hint ``vectorize_width(4)`` is ignored if the loop is not 2548proven safe to vectorize. To identify and diagnose optimization issues use 2549`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the 2550user guide for details. 2551 2552Extensions to specify floating-point flags 2553==================================================== 2554 2555The ``#pragma clang fp`` pragma allows floating-point options to be specified 2556for a section of the source code. This pragma can only appear at file scope or 2557at the start of a compound statement (excluding comments). When using within a 2558compound statement, the pragma is active within the scope of the compound 2559statement. 2560 2561Currently, only FP contraction can be controlled with the pragma. ``#pragma 2562clang fp contract`` specifies whether the compiler should contract a multiply 2563and an addition (or subtraction) into a fused FMA operation when supported by 2564the target. 2565 2566The pragma can take three values: ``on``, ``fast`` and ``off``. The ``on`` 2567option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows 2568fusion as specified the language standard. The ``fast`` option allows fusiong 2569in cases when the language standard does not make this possible (e.g. across 2570statements in C) 2571 2572.. code-block:: c++ 2573 2574 for(...) { 2575 #pragma clang fp contract(fast) 2576 a = b[i] * c[i]; 2577 d[i] += a; 2578 } 2579 2580 2581The pragma can also be used with ``off`` which turns FP contraction off for a 2582section of the code. This can be useful when fast contraction is otherwise 2583enabled for the translation unit with the ``-ffp-contract=fast`` flag. 2584 2585Specifying an attribute for multiple declarations (#pragma clang attribute) 2586=========================================================================== 2587 2588The ``#pragma clang attribute`` directive can be used to apply an attribute to 2589multiple declarations. The ``#pragma clang attribute push`` variation of the 2590directive pushes a new attribute to the attribute stack. The declarations that 2591follow the pragma receive the attributes that are on the attribute stack, until 2592the stack is cleared using a ``#pragma clang attribute pop`` directive. Multiple 2593push directives can be nested inside each other. 2594 2595The attributes that are used in the ``#pragma clang attribute`` directives 2596can be written using the GNU-style syntax: 2597 2598.. code-block:: c++ 2599 2600 #pragma clang attribute push(__attribute__((annotate("custom"))), apply_to = function) 2601 2602 void function(); // The function now has the annotate("custom") attribute 2603 2604 #pragma clang attribute pop 2605 2606The attributes can also be written using the C++11 style syntax: 2607 2608.. code-block:: c++ 2609 2610 #pragma clang attribute push([[noreturn]], apply_to = function) 2611 2612 void function(); // The function now has the [[noreturn]] attribute 2613 2614 #pragma clang attribute pop 2615 2616The ``__declspec`` style syntax is also supported: 2617 2618.. code-block:: c++ 2619 2620 #pragma clang attribute push(__declspec(dllexport), apply_to = function) 2621 2622 void function(); // The function now has the __declspec(dllexport) attribute 2623 2624 #pragma clang attribute pop 2625 2626A single push directive accepts only one attribute regardless of the syntax 2627used. 2628 2629Subject Match Rules 2630------------------- 2631 2632The set of declarations that receive a single attribute from the attribute stack 2633depends on the subject match rules that were specified in the pragma. Subject 2634match rules are specified after the attribute. The compiler expects an 2635identifier that corresponds to the subject set specifier. The ``apply_to`` 2636specifier is currently the only supported subject set specifier. It allows you 2637to specify match rules that form a subset of the attribute's allowed subject 2638set, i.e. the compiler doesn't require all of the attribute's subjects. For 2639example, an attribute like ``[[nodiscard]]`` whose subject set includes 2640``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at 2641least one of these rules after ``apply_to``: 2642 2643.. code-block:: c++ 2644 2645 #pragma clang attribute push([[nodiscard]], apply_to = enum) 2646 2647 enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]] 2648 2649 struct Record1 { }; // The struct will *not* receive [[nodiscard]] 2650 2651 #pragma clang attribute pop 2652 2653 #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum)) 2654 2655 enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]] 2656 2657 struct Record2 { }; // The struct *will* receive [[nodiscard]] 2658 2659 #pragma clang attribute pop 2660 2661 // This is an error, since [[nodiscard]] can't be applied to namespaces: 2662 #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace)) 2663 2664 #pragma clang attribute pop 2665 2666Multiple match rules can be specified using the ``any`` match rule, as shown 2667in the example above. The ``any`` rule applies attributes to all declarations 2668that are matched by at least one of the rules in the ``any``. It doesn't nest 2669and can't be used inside the other match rules. Redundant match rules or rules 2670that conflict with one another should not be used inside of ``any``. 2671 2672Clang supports the following match rules: 2673 2674- ``function``: Can be used to apply attributes to functions. This includes C++ 2675 member functions, static functions, operators, and constructors/destructors. 2676 2677- ``function(is_member)``: Can be used to apply attributes to C++ member 2678 functions. This includes members like static functions, operators, and 2679 constructors/destructors. 2680 2681- ``hasType(functionType)``: Can be used to apply attributes to functions, C++ 2682 member functions, and variables/fields whose type is a function pointer. It 2683 does not apply attributes to Objective-C methods or blocks. 2684 2685- ``type_alias``: Can be used to apply attributes to ``typedef`` declarations 2686 and C++11 type aliases. 2687 2688- ``record``: Can be used to apply attributes to ``struct``, ``class``, and 2689 ``union`` declarations. 2690 2691- ``record(unless(is_union))``: Can be used to apply attributes only to 2692 ``struct`` and ``class`` declarations. 2693 2694- ``enum``: Can be be used to apply attributes to enumeration declarations. 2695 2696- ``enum_constant``: Can be used to apply attributes to enumerators. 2697 2698- ``variable``: Can be used to apply attributes to variables, including 2699 local variables, parameters, global variables, and static member variables. 2700 It does not apply attributes to instance member variables or Objective-C 2701 ivars. 2702 2703- ``variable(is_thread_local)``: Can be used to apply attributes to thread-local 2704 variables only. 2705 2706- ``variable(is_global)``: Can be used to apply attributes to global variables 2707 only. 2708 2709- ``variable(is_parameter)``: Can be used to apply attributes to parameters 2710 only. 2711 2712- ``variable(unless(is_parameter))``: Can be used to apply attributes to all 2713 the variables that are not parameters. 2714 2715- ``field``: Can be used to apply attributes to non-static member variables 2716 in a record. This includes Objective-C ivars. 2717 2718- ``namespace``: Can be used to apply attributes to ``namespace`` declarations. 2719 2720- ``objc_interface``: Can be used to apply attributes to ``@interface`` 2721 declarations. 2722 2723- ``objc_protocol``: Can be used to apply attributes to ``@protocol`` 2724 declarations. 2725 2726- ``objc_category``: Can be used to apply attributes to category declarations, 2727 including class extensions. 2728 2729- ``objc_method``: Can be used to apply attributes to Objective-C methods, 2730 including instance and class methods. Implicit methods like implicit property 2731 getters and setters do not receive the attribute. 2732 2733- ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C 2734 instance methods. 2735 2736- ``objc_property``: Can be used to apply attributes to ``@property`` 2737 declarations. 2738 2739- ``block``: Can be used to apply attributes to block declarations. This does 2740 not include variables/fields of block pointer type. 2741 2742The use of ``unless`` in match rules is currently restricted to a strict set of 2743sub-rules that are used by the supported attributes. That means that even though 2744``variable(unless(is_parameter))`` is a valid match rule, 2745``variable(unless(is_thread_local))`` is not. 2746 2747Supported Attributes 2748-------------------- 2749 2750Not all attributes can be used with the ``#pragma clang attribute`` directive. 2751Notably, statement attributes like ``[[fallthrough]]`` or type attributes 2752like ``address_space`` aren't supported by this directive. You can determine 2753whether or not an attribute is supported by the pragma by referring to the 2754:doc:`individual documentation for that attribute <AttributeReference>`. 2755 2756The attributes are applied to all matching declarations individually, even when 2757the attribute is semantically incorrect. The attributes that aren't applied to 2758any declaration are not verified semantically. 2759 2760Specifying section names for global objects (#pragma clang section) 2761=================================================================== 2762 2763The ``#pragma clang section`` directive provides a means to assign section-names 2764to global variables, functions and static variables. 2765 2766The section names can be specified as: 2767 2768.. code-block:: c++ 2769 2770 #pragma clang section bss="myBSS" data="myData" rodata="myRodata" text="myText" 2771 2772The section names can be reverted back to default name by supplying an empty 2773string to the section kind, for example: 2774 2775.. code-block:: c++ 2776 2777 #pragma clang section bss="" data="" text="" rodata="" 2778 2779The ``#pragma clang section`` directive obeys the following rules: 2780 2781* The pragma applies to all global variable, statics and function declarations 2782 from the pragma to the end of the translation unit. 2783 2784* The pragma clang section is enabled automatically, without need of any flags. 2785 2786* This feature is only defined to work sensibly for ELF targets. 2787 2788* If section name is specified through _attribute_((section("myname"))), then 2789 the attribute name gains precedence. 2790 2791* Global variables that are initialized to zero will be placed in the named 2792 bss section, if one is present. 2793 2794* The ``#pragma clang section`` directive does not does try to infer section-kind 2795 from the name. For example, naming a section "``.bss.mySec``" does NOT mean 2796 it will be a bss section name. 2797 2798* The decision about which section-kind applies to each global is taken in the back-end. 2799 Once the section-kind is known, appropriate section name, as specified by the user using 2800 ``#pragma clang section`` directive, is applied to that global. 2801 2802Specifying Linker Options on ELF Targets 2803======================================== 2804 2805The ``#pragma comment(lib, ...)`` directive is supported on all ELF targets. 2806The second parameter is the library name (without the traditional Unix prefix of 2807``lib``). This allows you to provide an implicit link of dependent libraries. 2808