1 =========================
2 Clang Language Extensions
3 =========================
15 AutomaticReferenceCounting
21 This document describes the language extensions provided by Clang. In addition
22 to the language extensions listed here, Clang aims to support a broad range of
23 GCC extensions. Please see the `GCC manual
24 <https://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
27 .. _langext-feature_check:
29 Feature Checking Macros
30 =======================
32 Language extensions can be very useful, but only if you know you can depend on
33 them. In order to allow fine-grain features checks, we support three builtin
34 function-like macros. This allows you to directly test for a feature in your
35 code without having to resort to something like autoconf or fragile "compiler
41 This function-like macro takes a single identifier argument that is the name of
42 a builtin function, a builtin pseudo-function (taking one or more type
43 arguments), or a builtin template.
44 It evaluates to 1 if the builtin is supported or 0 if not.
45 It can be used like this:
49 #ifndef __has_builtin // Optional of course.
50 #define __has_builtin(x) 0 // Compatibility with non-clang compilers.
54 #if __has_builtin(__builtin_trap)
63 Prior to Clang 10, ``__has_builtin`` could not be used to detect most builtin
66 ``__has_builtin`` should not be used to detect support for a builtin macro;
67 use ``#ifdef`` instead.
69 .. _langext-__has_feature-__has_extension:
71 ``__has_feature`` and ``__has_extension``
72 -----------------------------------------
74 These function-like macros take a single identifier argument that is the name
75 of a feature. ``__has_feature`` evaluates to 1 if the feature is both
76 supported by Clang and standardized in the current language standard or 0 if
77 not (but see :ref:`below <langext-has-feature-back-compat>`), while
78 ``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
79 current language (either as a language extension or a standard language
80 feature) or 0 if not. They can be used like this:
84 #ifndef __has_feature // Optional of course.
85 #define __has_feature(x) 0 // Compatibility with non-clang compilers.
87 #ifndef __has_extension
88 #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
92 #if __has_feature(cxx_rvalue_references)
93 // This code will only be compiled with the -std=c++11 and -std=gnu++11
94 // options, because rvalue references are only standardized in C++11.
97 #if __has_extension(cxx_rvalue_references)
98 // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
99 // and -std=gnu++98 options, because rvalue references are supported as a
100 // language extension in C++98.
103 .. _langext-has-feature-back-compat:
105 For backward compatibility, ``__has_feature`` can also be used to test
106 for support for non-standardized features, i.e. features not prefixed ``c_``,
107 ``cxx_`` or ``objc_``.
109 Another use of ``__has_feature`` is to check for compiler features not related
110 to the language standard, such as e.g. :doc:`AddressSanitizer
113 If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
114 to ``__has_feature``.
116 The feature tag is described along with the language feature below.
118 The feature name or extension name can also be specified with a preceding and
119 following ``__`` (double underscore) to avoid interference from a macro with
120 the same name. For instance, ``__cxx_rvalue_references__`` can be used instead
121 of ``cxx_rvalue_references``.
123 ``__has_cpp_attribute``
124 -----------------------
126 This function-like macro is available in C++20 by default, and is provided as an
127 extension in earlier language standards. It takes a single argument that is the
128 name of a double-square-bracket-style attribute. The argument can either be a
129 single identifier or a scoped identifier. If the attribute is supported, a
130 nonzero value is returned. If the attribute is a standards-based attribute, this
131 macro returns a nonzero value based on the year and month in which the attribute
132 was voted into the working draft. See `WG21 SD-6
133 <https://isocpp.org/std/standing-documents/sd-6-sg10-feature-test-recommendations>`_
134 for the list of values returned for standards-based attributes. If the attribute
135 is not supported by the current compilation target, this macro evaluates to 0.
136 It can be used like this:
140 #ifndef __has_cpp_attribute // For backwards compatibility
141 #define __has_cpp_attribute(x) 0
145 #if __has_cpp_attribute(clang::fallthrough)
146 #define FALLTHROUGH [[clang::fallthrough]]
152 The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
153 the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
154 of these namespaces can be specified with a preceding and following ``__``
155 (double underscore) to avoid interference from a macro with the same name. For
156 instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
158 ``__has_c_attribute``
159 ---------------------
161 This function-like macro takes a single argument that is the name of an
162 attribute exposed with the double square-bracket syntax in C mode. The argument
163 can either be a single identifier or a scoped identifier. If the attribute is
164 supported, a nonzero value is returned. If the attribute is not supported by the
165 current compilation target, this macro evaluates to 0. It can be used like this:
169 #ifndef __has_c_attribute // Optional of course.
170 #define __has_c_attribute(x) 0 // Compatibility with non-clang compilers.
174 #if __has_c_attribute(fallthrough)
175 #define FALLTHROUGH [[fallthrough]]
181 The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
182 the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
183 of these namespaces can be specified with a preceding and following ``__``
184 (double underscore) to avoid interference from a macro with the same name. For
185 instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
190 This function-like macro takes a single identifier argument that is the name of
191 a GNU-style attribute. It evaluates to 1 if the attribute is supported by the
192 current compilation target, or 0 if not. It can be used like this:
196 #ifndef __has_attribute // Optional of course.
197 #define __has_attribute(x) 0 // Compatibility with non-clang compilers.
201 #if __has_attribute(always_inline)
202 #define ALWAYS_INLINE __attribute__((always_inline))
204 #define ALWAYS_INLINE
208 The attribute name can also be specified with a preceding and following ``__``
209 (double underscore) to avoid interference from a macro with the same name. For
210 instance, ``__always_inline__`` can be used instead of ``always_inline``.
213 ``__has_declspec_attribute``
214 ----------------------------
216 This function-like macro takes a single identifier argument that is the name of
217 an attribute implemented as a Microsoft-style ``__declspec`` attribute. It
218 evaluates to 1 if the attribute is supported by the current compilation target,
219 or 0 if not. It can be used like this:
223 #ifndef __has_declspec_attribute // Optional of course.
224 #define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers.
228 #if __has_declspec_attribute(dllexport)
229 #define DLLEXPORT __declspec(dllexport)
235 The attribute name can also be specified with a preceding and following ``__``
236 (double underscore) to avoid interference from a macro with the same name. For
237 instance, ``__dllexport__`` can be used instead of ``dllexport``.
242 This function-like macro takes a single identifier argument that might be either
243 a reserved word or a regular identifier. It evaluates to 1 if the argument is just
244 a regular identifier and not a reserved word, in the sense that it can then be
245 used as the name of a user-defined function or variable. Otherwise it evaluates
246 to 0. It can be used like this:
251 #ifdef __is_identifier // Compatibility with non-clang compilers.
252 #if __is_identifier(__wchar_t)
253 typedef wchar_t __wchar_t;
257 __wchar_t WideCharacter;
260 Include File Checking Macros
261 ============================
263 Not all developments systems have the same include files. The
264 :ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
265 you to check for the existence of an include file before doing a possibly
266 failing ``#include`` directive. Include file checking macros must be used
267 as expressions in ``#if`` or ``#elif`` preprocessing directives.
269 .. _langext-__has_include:
274 This function-like macro takes a single file name string argument that is the
275 name of an include file. It evaluates to 1 if the file can be found using the
276 include paths, or 0 otherwise:
280 // Note the two possible file name string formats.
281 #if __has_include("myinclude.h") && __has_include(<stdint.h>)
282 # include "myinclude.h"
285 To test for this feature, use ``#if defined(__has_include)``:
289 // To avoid problem with non-clang compilers not having this macro.
290 #if defined(__has_include)
291 #if __has_include("myinclude.h")
292 # include "myinclude.h"
296 .. _langext-__has_include_next:
298 ``__has_include_next``
299 ----------------------
301 This function-like macro takes a single file name string argument that is the
302 name of an include file. It is like ``__has_include`` except that it looks for
303 the second instance of the given file found in the include paths. It evaluates
304 to 1 if the second instance of the file can be found using the include paths,
309 // Note the two possible file name string formats.
310 #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
311 # include_next "myinclude.h"
314 // To avoid problem with non-clang compilers not having this macro.
315 #if defined(__has_include_next)
316 #if __has_include_next("myinclude.h")
317 # include_next "myinclude.h"
321 Note that ``__has_include_next``, like the GNU extension ``#include_next``
322 directive, is intended for use in headers only, and will issue a warning if
323 used in the top-level compilation file. A warning will also be issued if an
324 absolute path is used in the file argument.
329 This function-like macro takes a string literal that represents a command line
330 option for a warning and returns true if that is a valid warning option.
334 #if __has_warning("-Wformat")
338 .. _languageextensions-builtin-macros:
344 Defined to a string that contains the name of the main input file passed to
348 Clang-specific extension that functions similar to ``__FILE__`` but only
349 renders the last path component (the filename) instead of an invocation
350 dependent full path to that file.
353 Defined to an integer value that starts at zero and is incremented each time
354 the ``__COUNTER__`` macro is expanded.
356 ``__INCLUDE_LEVEL__``
357 Defined to an integral value that is the include depth of the file currently
358 being translated. For the main file, this value is zero.
361 Defined to the date and time of the last modification of the current source
365 Defined when compiling with Clang
368 Defined to the major marketing version number of Clang (e.g., the 2 in
369 2.0.1). Note that marketing version numbers should not be used to check for
370 language features, as different vendors use different numbering schemes.
371 Instead, use the :ref:`langext-feature_check`.
374 Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note
375 that marketing version numbers should not be used to check for language
376 features, as different vendors use different numbering schemes. Instead, use
377 the :ref:`langext-feature_check`.
379 ``__clang_patchlevel__``
380 Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
382 ``__clang_version__``
383 Defined to a string that captures the Clang marketing version, including the
384 Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
386 ``__clang_literal_encoding__``
387 Defined to a narrow string literal that represents the current encoding of
388 narrow string literals, e.g., ``"hello"``. This macro typically expands to
389 "UTF-8" (but may change in the future if the
390 ``-fexec-charset="Encoding-Name"`` option is implemented.)
392 ``__clang_wide_literal_encoding__``
393 Defined to a narrow string literal that represents the current encoding of
394 wide string literals, e.g., ``L"hello"``. This macro typically expands to
395 "UTF-16" or "UTF-32" (but may change in the future if the
396 ``-fwide-exec-charset="Encoding-Name"`` option is implemented.)
400 Vectors and Extended Vectors
401 ============================
403 Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
405 OpenCL vector types are created using the ``ext_vector_type`` attribute. It
406 supports the ``V.xyzw`` syntax and other tidbits as seen in OpenCL. An example
411 typedef float float4 __attribute__((ext_vector_type(4)));
412 typedef float float2 __attribute__((ext_vector_type(2)));
414 float4 foo(float2 a, float2 b) {
421 Query for this feature with ``__has_attribute(ext_vector_type)``.
423 Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax
424 and functions. For example:
428 vector float foo(vector int a) {
430 b = vec_add(a, a) + a;
431 return (vector float)b;
434 NEON vector types are created using ``neon_vector_type`` and
435 ``neon_polyvector_type`` attributes. For example:
439 typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
440 typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
442 int8x8_t foo(int8x8_t a) {
448 GCC vector types are created using the ``vector_size(N)`` attribute. The
449 argument ``N`` specifies the number of bytes that will be allocated for an
450 object of this type. The size has to be multiple of the size of the vector
451 element type. For example:
455 // OK: This declares a vector type with four 'int' elements
456 typedef int int4 __attribute__((vector_size(4 * sizeof(int))));
458 // ERROR: '11' is not a multiple of sizeof(int)
459 typedef int int_impossible __attribute__((vector_size(11)));
471 Clang also supports the ext_vector_type attribute with boolean element types in
472 C and C++. For example:
476 // legal for Clang, error for GCC:
477 typedef bool bool4 __attribute__((ext_vector_type(4)));
478 // Objects of bool4 type hold 8 bits, sizeof(bool4) == 1
486 Boolean vectors are a Clang extension of the ext vector type. Boolean vectors
487 are intended, though not guaranteed, to map to vector mask registers. The size
488 parameter of a boolean vector type is the number of bits in the vector. The
489 boolean vector is dense and each bit in the boolean vector is one vector
492 The semantics of boolean vectors borrows from C bit-fields with the following
495 * Distinct boolean vectors are always distinct memory objects (there is no
497 * Only the operators `?:`, `!`, `~`, `|`, `&`, `^` and comparison are allowed on
499 * Casting a scalar bool value to a boolean vector type means broadcasting the
500 scalar value onto all lanes (same as general ext_vector_type).
501 * It is not possible to access or swizzle elements of a boolean vector
502 (different than general ext_vector_type).
504 The size and alignment are both the number of bits rounded up to the next power
505 of two, but the alignment is at most the maximum vector alignment of the
512 Vector literals can be used to create vectors from a set of scalars, or
513 vectors. Either parentheses or braces form can be used. In the parentheses
514 form the number of literal values specified must be one, i.e. referring to a
515 scalar value, or must match the size of the vector type being created. If a
516 single scalar literal value is specified, the scalar literal value will be
517 replicated to all the components of the vector type. In the brackets form any
518 number of literals can be specified. For example:
522 typedef int v4si __attribute__((__vector_size__(16)));
523 typedef float float4 __attribute__((ext_vector_type(4)));
524 typedef float float2 __attribute__((ext_vector_type(2)));
526 v4si vsi = (v4si){1, 2, 3, 4};
527 float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
528 vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
529 vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
530 vector int vi3 = (vector int)(1, 2); // error
531 vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
532 vector int vi5 = (vector int)(1, 2, 3, 4);
533 float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
538 The table below shows the support for each operation by vector extension. A
539 dash indicates that an operation is not accepted according to a corresponding
542 ============================== ======= ======= ============= =======
543 Operator OpenCL AltiVec GCC NEON
544 ============================== ======= ======= ============= =======
546 unary operators +, -- yes yes yes --
547 ++, -- -- yes yes yes --
548 +,--,*,/,% yes yes yes --
549 bitwise operators &,|,^,~ yes yes yes --
551 !, &&, || yes -- yes --
552 ==, !=, >, <, >=, <= yes yes yes --
554 ?: [#]_ yes -- yes --
555 sizeof yes yes yes yes
556 C-style cast yes yes yes no
557 reinterpret_cast yes no yes no
558 static_cast yes no yes no
559 const_cast no no no no
560 address &v[i] no no no [#]_ no
561 ============================== ======= ======= ============= =======
563 See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
565 .. [#] ternary operator(?:) has different behaviors depending on condition
566 operand's vector type. If the condition is a GNU vector (i.e. __vector_size__),
567 it's only available in C++ and uses normal bool conversions (that is, != 0).
568 If it's an extension (OpenCL) vector, it's only available in C and OpenCL C.
569 And it selects base on signedness of the condition operands (OpenCL v1.1 s6.3.9).
570 .. [#] Clang does not allow the address of an element to be taken while GCC
571 allows this. This is intentional for vectors with a boolean element type and
572 not implemented otherwise.
577 **Note: The implementation of vector builtins is work-in-progress and incomplete.**
579 In addition to the operators mentioned above, Clang provides a set of builtins
580 to perform additional operations on certain scalar and vector types.
582 Let ``T`` be one of the following types:
584 * an integer type (as in C2x 6.2.5p19), but excluding enumerated types and _Bool
585 * the standard floating types float or double
586 * a half-precision floating point type, if one is supported on the target
589 For scalar types, consider the operation applied to a vector with a single element.
591 *Elementwise Builtins*
593 Each builtin returns a vector equivalent to applying the specified operation
594 elementwise to the input.
596 Unless specified otherwise operation(±0) = ±0 and operation(±infinity) = ±infinity
598 =========================================== ================================================================ =========================================
599 Name Operation Supported element types
600 =========================================== ================================================================ =========================================
601 T __builtin_elementwise_abs(T x) return the absolute value of a number x; the absolute value of signed integer and floating point types
602 the most negative integer remains the most negative integer
603 T __builtin_elementwise_ceil(T x) return the smallest integral value greater than or equal to x floating point types
604 T __builtin_elementwise_floor(T x) return the largest integral value less than or equal to x floating point types
605 T __builtin_elementwise_roundeven(T x) round x to the nearest integer value in floating point format, floating point types
606 rounding halfway cases to even (that is, to the nearest value
607 that is an even integer), regardless of the current rounding
609 T__builtin_elementwise_trunc(T x) return the integral value nearest to but no larger in floating point types
611 T __builtin_elementwise_max(T x, T y) return x or y, whichever is larger integer and floating point types
612 T __builtin_elementwise_min(T x, T y) return x or y, whichever is smaller integer and floating point types
613 T __builtin_elementwise_add_sat(T x, T y) return the sum of x and y, clamped to the range of integer types
614 representable values for the signed/unsigned integer type.
615 T __builtin_elementwise_sub_sat(T x, T y) return the difference of x and y, clamped to the range of integer types
616 representable values for the signed/unsigned integer type.
617 =========================================== ================================================================ =========================================
622 Each builtin returns a scalar equivalent to applying the specified
623 operation(x, y) as recursive even-odd pairwise reduction to all vector
624 elements. ``operation(x, y)`` is repeatedly applied to each non-overlapping
625 even-odd element pair with indices ``i * 2`` and ``i * 2 + 1`` with
626 ``i in [0, Number of elements / 2)``. If the numbers of elements is not a
627 power of 2, the vector is widened with neutral elements for the reduction
628 at the end to the next power of 2.
634 __builtin_reduce_add([e3, e2, e1, e0]) = __builtin_reduced_add([e3 + e2, e1 + e0])
635 = (e3 + e2) + (e1 + e0)
638 Let ``VT`` be a vector type and ``ET`` the element type of ``VT``.
640 ======================================= ================================================================ ==================================
641 Name Operation Supported element types
642 ======================================= ================================================================ ==================================
643 ET __builtin_reduce_max(VT a) return x or y, whichever is larger; If exactly one argument is integer and floating point types
644 a NaN, return the other argument. If both arguments are NaNs,
646 ET __builtin_reduce_min(VT a) return x or y, whichever is smaller; If exactly one argument integer and floating point types
647 is a NaN, return the other argument. If both arguments are
648 NaNs, fmax() return a NaN.
649 ET __builtin_reduce_add(VT a) \+ integer and floating point types
650 ET __builtin_reduce_mul(VT a) \* integer and floating point types
651 ET __builtin_reduce_and(VT a) & integer types
652 ET __builtin_reduce_or(VT a) \| integer types
653 ET __builtin_reduce_xor(VT a) ^ integer types
654 ======================================= ================================================================ ==================================
659 Clang provides an extension for matrix types, which is currently being
660 implemented. See :ref:`the draft specification <matrixtypes>` for more details.
662 For example, the code below uses the matrix types extension to multiply two 4x4
663 float matrices and add the result to a third 4x4 matrix.
667 typedef float m4x4_t __attribute__((matrix_type(4, 4)));
669 m4x4_t f(m4x4_t a, m4x4_t b, m4x4_t c) {
673 The matrix type extension also supports operations on a matrix and a scalar.
677 typedef float m4x4_t __attribute__((matrix_type(4, 4)));
680 return (a + 23) * 12;
683 The matrix type extension supports division on a matrix and a scalar but not on a matrix and a matrix.
687 typedef float m4x4_t __attribute__((matrix_type(4, 4)));
694 The matrix type extension supports compound assignments for addition, subtraction, and multiplication on matrices
695 and on a matrix and a scalar, provided their types are consistent.
699 typedef float m4x4_t __attribute__((matrix_type(4, 4)));
701 m4x4_t f(m4x4_t a, m4x4_t b) {
710 The matrix type extension supports explicit casts. Implicit type conversion between matrix types is not allowed.
714 typedef int ix5x5 __attribute__((matrix_type(5, 5)));
715 typedef float fx5x5 __attribute__((matrix_type(5, 5)));
717 fx5x5 f1(ix5x5 i, fx5x5 f) {
722 template <typename X>
723 using matrix_4_4 = X __attribute__((matrix_type(4, 4)));
726 matrix_5_5<double> d;
728 i = (matrix_5_5<int>)d;
729 i = static_cast<matrix_5_5<int>>(d);
732 Half-Precision Floating Point
733 =============================
735 Clang supports three half-precision (16-bit) floating point types: ``__fp16``,
736 ``_Float16`` and ``__bf16``. These types are supported in all language modes.
738 ``__fp16`` is supported on every target, as it is purely a storage format; see below.
739 ``_Float16`` is currently only supported on the following targets, with further
740 targets pending ABI standardization:
743 * 64-bit ARM (AArch64)
748 On X86 targets, ``_Float16`` is supported as long as SSE2 is available, which
749 includes all 64-bit and all recent 32-bit processors. When the target supports
750 AVX512-FP16, ``_Float16`` arithmetic is performed using that native support.
751 Otherwise, ``_Float16`` arithmetic is performed by promoting to ``float``,
752 performing the operation, and then truncating to ``_Float16``.
754 ``_Float16`` will be supported on more targets as they define ABIs for it.
756 ``__bf16`` is purely a storage format; it is currently only supported on the following targets:
758 * 64-bit ARM (AArch64)
760 The ``__bf16`` type is only available when supported in hardware.
762 ``__fp16`` is a storage and interchange format only. This means that values of
763 ``__fp16`` are immediately promoted to (at least) ``float`` when used in arithmetic
764 operations, so that e.g. the result of adding two ``__fp16`` values has type ``float``.
765 The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE <http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_).
766 Clang uses the ``binary16`` format from IEEE 754-2008 for ``__fp16``, not the ARM
769 ``_Float16`` is an interchange floating-point type. This means that, just like arithmetic on
770 ``float`` or ``double``, arithmetic on ``_Float16`` operands is formally performed in the
771 ``_Float16`` type, so that e.g. the result of adding two ``_Float16`` values has type
772 ``_Float16``. The behavior of ``_Float16`` is specified by ISO/IEC TS 18661-3:2015
773 ("Floating-point extensions for C"). As with ``__fp16``, Clang uses the ``binary16``
774 format from IEEE 754-2008 for ``_Float16``.
776 ``_Float16`` arithmetic will be performed using native half-precision support
777 when available on the target (e.g. on ARMv8.2a); otherwise it will be performed
778 at a higher precision (currently always ``float``) and then truncated down to
779 ``_Float16``. Note that C and C++ allow intermediate floating-point operands
780 of an expression to be computed with greater precision than is expressible in
781 their type, so Clang may avoid intermediate truncations in certain cases; this may
782 lead to results that are inconsistent with native arithmetic.
784 It is recommended that portable code use ``_Float16`` instead of ``__fp16``,
785 as it has been defined by the C standards committee and has behavior that is
786 more familiar to most programmers.
788 Because ``__fp16`` operands are always immediately promoted to ``float``, the
789 common real type of ``__fp16`` and ``_Float16`` for the purposes of the usual
790 arithmetic conversions is ``float``.
792 A literal can be given ``_Float16`` type using the suffix ``f16``. For example,
795 Because default argument promotion only applies to the standard floating-point
796 types, ``_Float16`` values are not promoted to ``double`` when passed as variadic
797 or untyped arguments. As a consequence, some caution must be taken when using
798 certain library facilities with ``_Float16``; for example, there is no ``printf`` format
799 specifier for ``_Float16``, and (unlike ``float``) it will not be implicitly promoted to
800 ``double`` when passed to ``printf``, so the programmer must explicitly cast it to
801 ``double`` before using it with an ``%f`` or similar specifier.
803 Messages on ``deprecated`` and ``unavailable`` Attributes
804 =========================================================
806 An optional string message can be added to the ``deprecated`` and
807 ``unavailable`` attributes. For example:
811 void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
813 If the deprecated or unavailable declaration is used, the message will be
814 incorporated into the appropriate diagnostic:
818 harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
819 [-Wdeprecated-declarations]
823 Query for this feature with
824 ``__has_extension(attribute_deprecated_with_message)`` and
825 ``__has_extension(attribute_unavailable_with_message)``.
827 Attributes on Enumerators
828 =========================
830 Clang allows attributes to be written on individual enumerators. This allows
831 enumerators to be deprecated, made unavailable, etc. The attribute must appear
832 after the enumerator name and before any initializer, like so:
839 OM_Terrified __attribute__((deprecated)),
840 OM_AbortOnError __attribute__((deprecated)) = 4
843 Attributes on the ``enum`` declaration do not apply to individual enumerators.
845 Query for this feature with ``__has_extension(enumerator_attributes)``.
847 C++11 Attributes on using-declarations
848 ======================================
850 Clang allows C++-style ``[[]]`` attributes to be written on using-declarations.
855 [[clang::using_if_exists]] using foo::bar;
856 using foo::baz [[clang::using_if_exists]];
858 You can test for support for this extension with
859 ``__has_extension(cxx_attributes_on_using_declarations)``.
861 'User-Specified' System Frameworks
862 ==================================
864 Clang provides a mechanism by which frameworks can be built in such a way that
865 they will always be treated as being "system frameworks", even if they are not
866 present in a system framework directory. This can be useful to system
867 framework developers who want to be able to test building other applications
868 with development builds of their framework, including the manner in which the
869 compiler changes warning behavior for system headers.
871 Framework developers can opt-in to this mechanism by creating a
872 "``.system_framework``" file at the top-level of their framework. That is, the
873 framework should have contents like:
877 .../TestFramework.framework
878 .../TestFramework.framework/.system_framework
879 .../TestFramework.framework/Headers
880 .../TestFramework.framework/Headers/TestFramework.h
883 Clang will treat the presence of this file as an indicator that the framework
884 should be treated as a system framework, regardless of how it was found in the
885 framework search path. For consistency, we recommend that such files never be
886 included in installed versions of the framework.
888 Checks for Standard Language Features
889 =====================================
891 The ``__has_feature`` macro can be used to query if certain standard language
892 features are enabled. The ``__has_extension`` macro can be used to query if
893 language features are available as an extension when compiling for a standard
894 which does not provide them. The features which can be tested are listed here.
896 Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
897 These are macros with names of the form ``__cpp_<feature_name>``, and are
898 intended to be a portable way to query the supported features of the compiler.
899 See `the C++ status page <https://clang.llvm.org/cxx_status.html#ts>`_ for
900 information on the version of SD-6 supported by each Clang release, and the
901 macros provided by that revision of the recommendations.
906 The features listed below are part of the C++98 standard. These features are
907 enabled by default when compiling C++ code.
912 Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
913 enabled. For example, compiling code with ``-fno-exceptions`` disables C++
919 Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled. For
920 example, compiling code with ``-fno-rtti`` disables the use of RTTI.
925 The features listed below are part of the C++11 standard. As a result, all
926 these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
927 when compiling C++ code.
929 C++11 SFINAE includes access control
930 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
932 Use ``__has_feature(cxx_access_control_sfinae)`` or
933 ``__has_extension(cxx_access_control_sfinae)`` to determine whether
934 access-control errors (e.g., calling a private constructor) are considered to
935 be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
936 <http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
938 C++11 alias templates
939 ^^^^^^^^^^^^^^^^^^^^^
941 Use ``__has_feature(cxx_alias_templates)`` or
942 ``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
943 alias declarations and alias templates is enabled.
945 C++11 alignment specifiers
946 ^^^^^^^^^^^^^^^^^^^^^^^^^^
948 Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
949 determine if support for alignment specifiers using ``alignas`` is enabled.
951 Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to
952 determine if support for the ``alignof`` keyword is enabled.
957 Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
958 determine if support for attribute parsing with C++11's square bracket notation
961 C++11 generalized constant expressions
962 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
964 Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
965 constant expressions (e.g., ``constexpr``) is enabled.
970 Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
971 determine if support for the ``decltype()`` specifier is enabled. C++11's
972 ``decltype`` does not require type-completeness of a function call expression.
973 Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
974 ``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
975 support for this feature is enabled.
977 C++11 default template arguments in function templates
978 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
980 Use ``__has_feature(cxx_default_function_template_args)`` or
981 ``__has_extension(cxx_default_function_template_args)`` to determine if support
982 for default template arguments in function templates is enabled.
984 C++11 ``default``\ ed functions
985 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
987 Use ``__has_feature(cxx_defaulted_functions)`` or
988 ``__has_extension(cxx_defaulted_functions)`` to determine if support for
989 defaulted function definitions (with ``= default``) is enabled.
991 C++11 delegating constructors
992 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
994 Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
995 delegating constructors is enabled.
997 C++11 ``deleted`` functions
998 ^^^^^^^^^^^^^^^^^^^^^^^^^^^
1000 Use ``__has_feature(cxx_deleted_functions)`` or
1001 ``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
1002 function definitions (with ``= delete``) is enabled.
1004 C++11 explicit conversion functions
1005 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1007 Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
1008 ``explicit`` conversion functions is enabled.
1010 C++11 generalized initializers
1011 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1013 Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
1014 generalized initializers (using braced lists and ``std::initializer_list``) is
1017 C++11 implicit move constructors/assignment operators
1018 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1020 Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
1021 generate move constructors and move assignment operators where needed.
1023 C++11 inheriting constructors
1024 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1026 Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
1027 inheriting constructors is enabled.
1029 C++11 inline namespaces
1030 ^^^^^^^^^^^^^^^^^^^^^^^
1032 Use ``__has_feature(cxx_inline_namespaces)`` or
1033 ``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
1034 namespaces is enabled.
1039 Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
1040 determine if support for lambdas is enabled.
1042 C++11 local and unnamed types as template arguments
1043 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1045 Use ``__has_feature(cxx_local_type_template_args)`` or
1046 ``__has_extension(cxx_local_type_template_args)`` to determine if support for
1047 local and unnamed types as template arguments is enabled.
1052 Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
1053 determine if support for noexcept exception specifications is enabled.
1055 C++11 in-class non-static data member initialization
1056 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1058 Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
1059 initialization of non-static data members is enabled.
1064 Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
1065 determine if support for ``nullptr`` is enabled.
1067 C++11 ``override control``
1068 ^^^^^^^^^^^^^^^^^^^^^^^^^^
1070 Use ``__has_feature(cxx_override_control)`` or
1071 ``__has_extension(cxx_override_control)`` to determine if support for the
1072 override control keywords is enabled.
1074 C++11 reference-qualified functions
1075 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1077 Use ``__has_feature(cxx_reference_qualified_functions)`` or
1078 ``__has_extension(cxx_reference_qualified_functions)`` to determine if support
1079 for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
1080 applied to ``*this``) is enabled.
1082 C++11 range-based ``for`` loop
1083 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1085 Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
1086 determine if support for the range-based for loop is enabled.
1088 C++11 raw string literals
1089 ^^^^^^^^^^^^^^^^^^^^^^^^^
1091 Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
1092 string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
1094 C++11 rvalue references
1095 ^^^^^^^^^^^^^^^^^^^^^^^
1097 Use ``__has_feature(cxx_rvalue_references)`` or
1098 ``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
1099 references is enabled.
1101 C++11 ``static_assert()``
1102 ^^^^^^^^^^^^^^^^^^^^^^^^^
1104 Use ``__has_feature(cxx_static_assert)`` or
1105 ``__has_extension(cxx_static_assert)`` to determine if support for compile-time
1106 assertions using ``static_assert`` is enabled.
1108 C++11 ``thread_local``
1109 ^^^^^^^^^^^^^^^^^^^^^^
1111 Use ``__has_feature(cxx_thread_local)`` to determine if support for
1112 ``thread_local`` variables is enabled.
1114 C++11 type inference
1115 ^^^^^^^^^^^^^^^^^^^^
1117 Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
1118 determine C++11 type inference is supported using the ``auto`` specifier. If
1119 this is disabled, ``auto`` will instead be a storage class specifier, as in C
1122 C++11 strongly typed enumerations
1123 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1125 Use ``__has_feature(cxx_strong_enums)`` or
1126 ``__has_extension(cxx_strong_enums)`` to determine if support for strongly
1127 typed, scoped enumerations is enabled.
1129 C++11 trailing return type
1130 ^^^^^^^^^^^^^^^^^^^^^^^^^^
1132 Use ``__has_feature(cxx_trailing_return)`` or
1133 ``__has_extension(cxx_trailing_return)`` to determine if support for the
1134 alternate function declaration syntax with trailing return type is enabled.
1136 C++11 Unicode string literals
1137 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1139 Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
1140 string literals is enabled.
1142 C++11 unrestricted unions
1143 ^^^^^^^^^^^^^^^^^^^^^^^^^
1145 Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
1146 unrestricted unions is enabled.
1148 C++11 user-defined literals
1149 ^^^^^^^^^^^^^^^^^^^^^^^^^^^
1151 Use ``__has_feature(cxx_user_literals)`` to determine if support for
1152 user-defined literals is enabled.
1154 C++11 variadic templates
1155 ^^^^^^^^^^^^^^^^^^^^^^^^
1157 Use ``__has_feature(cxx_variadic_templates)`` or
1158 ``__has_extension(cxx_variadic_templates)`` to determine if support for
1159 variadic templates is enabled.
1164 The features listed below are part of the C++14 standard. As a result, all
1165 these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option
1166 when compiling C++ code.
1168 C++14 binary literals
1169 ^^^^^^^^^^^^^^^^^^^^^
1171 Use ``__has_feature(cxx_binary_literals)`` or
1172 ``__has_extension(cxx_binary_literals)`` to determine whether
1173 binary literals (for instance, ``0b10010``) are recognized. Clang supports this
1174 feature as an extension in all language modes.
1176 C++14 contextual conversions
1177 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1179 Use ``__has_feature(cxx_contextual_conversions)`` or
1180 ``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules
1181 are used when performing an implicit conversion for an array bound in a
1182 *new-expression*, the operand of a *delete-expression*, an integral constant
1183 expression, or a condition in a ``switch`` statement.
1185 C++14 decltype(auto)
1186 ^^^^^^^^^^^^^^^^^^^^
1188 Use ``__has_feature(cxx_decltype_auto)`` or
1189 ``__has_extension(cxx_decltype_auto)`` to determine if support
1190 for the ``decltype(auto)`` placeholder type is enabled.
1192 C++14 default initializers for aggregates
1193 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1195 Use ``__has_feature(cxx_aggregate_nsdmi)`` or
1196 ``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
1197 for default initializers in aggregate members is enabled.
1199 C++14 digit separators
1200 ^^^^^^^^^^^^^^^^^^^^^^
1202 Use ``__cpp_digit_separators`` to determine if support for digit separators
1203 using single quotes (for instance, ``10'000``) is enabled. At this time, there
1204 is no corresponding ``__has_feature`` name
1206 C++14 generalized lambda capture
1207 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1209 Use ``__has_feature(cxx_init_captures)`` or
1210 ``__has_extension(cxx_init_captures)`` to determine if support for
1211 lambda captures with explicit initializers is enabled
1212 (for instance, ``[n(0)] { return ++n; }``).
1214 C++14 generic lambdas
1215 ^^^^^^^^^^^^^^^^^^^^^
1217 Use ``__has_feature(cxx_generic_lambdas)`` or
1218 ``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
1219 (polymorphic) lambdas is enabled
1220 (for instance, ``[] (auto x) { return x + 1; }``).
1222 C++14 relaxed constexpr
1223 ^^^^^^^^^^^^^^^^^^^^^^^
1225 Use ``__has_feature(cxx_relaxed_constexpr)`` or
1226 ``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
1227 declarations, local variable modification, and control flow constructs
1228 are permitted in ``constexpr`` functions.
1230 C++14 return type deduction
1231 ^^^^^^^^^^^^^^^^^^^^^^^^^^^
1233 Use ``__has_feature(cxx_return_type_deduction)`` or
1234 ``__has_extension(cxx_return_type_deduction)`` to determine if support
1235 for return type deduction for functions (using ``auto`` as a return type)
1238 C++14 runtime-sized arrays
1239 ^^^^^^^^^^^^^^^^^^^^^^^^^^
1241 Use ``__has_feature(cxx_runtime_array)`` or
1242 ``__has_extension(cxx_runtime_array)`` to determine if support
1243 for arrays of runtime bound (a restricted form of variable-length arrays)
1245 Clang's implementation of this feature is incomplete.
1247 C++14 variable templates
1248 ^^^^^^^^^^^^^^^^^^^^^^^^
1250 Use ``__has_feature(cxx_variable_templates)`` or
1251 ``__has_extension(cxx_variable_templates)`` to determine if support for
1252 templated variable declarations is enabled.
1257 The features listed below are part of the C11 standard. As a result, all these
1258 features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
1259 compiling C code. Additionally, because these features are all
1260 backward-compatible, they are available as extensions in all language modes.
1262 C11 alignment specifiers
1263 ^^^^^^^^^^^^^^^^^^^^^^^^
1265 Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
1266 if support for alignment specifiers using ``_Alignas`` is enabled.
1268 Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine
1269 if support for the ``_Alignof`` keyword is enabled.
1271 C11 atomic operations
1272 ^^^^^^^^^^^^^^^^^^^^^
1274 Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
1275 if support for atomic types using ``_Atomic`` is enabled. Clang also provides
1276 :ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
1277 the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
1278 ``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
1281 Clang will use the system's ``<stdatomic.h>`` header when one is available, and
1282 will otherwise use its own. When using its own, implementations of the atomic
1283 operations are provided as macros. In the cases where C11 also requires a real
1284 function, this header provides only the declaration of that function (along
1285 with a shadowing macro implementation), and you must link to a library which
1286 provides a definition of the function if you use it instead of the macro.
1288 C11 generic selections
1289 ^^^^^^^^^^^^^^^^^^^^^^
1291 Use ``__has_feature(c_generic_selections)`` or
1292 ``__has_extension(c_generic_selections)`` to determine if support for generic
1293 selections is enabled.
1295 As an extension, the C11 generic selection expression is available in all
1296 languages supported by Clang. The syntax is the same as that given in the C11
1299 In C, type compatibility is decided according to the rules given in the
1300 appropriate standard, but in C++, which lacks the type compatibility rules used
1301 in C, types are considered compatible only if they are equivalent.
1303 C11 ``_Static_assert()``
1304 ^^^^^^^^^^^^^^^^^^^^^^^^
1306 Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
1307 to determine if support for compile-time assertions using ``_Static_assert`` is
1310 C11 ``_Thread_local``
1311 ^^^^^^^^^^^^^^^^^^^^^
1313 Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
1314 to determine if support for ``_Thread_local`` variables is enabled.
1319 Use ``__has_feature(modules)`` to determine if Modules have been enabled.
1320 For example, compiling code with ``-fmodules`` enables the use of Modules.
1322 More information could be found `here <https://clang.llvm.org/docs/Modules.html>`_.
1324 Type Trait Primitives
1325 =====================
1327 Type trait primitives are special builtin constant expressions that can be used
1328 by the standard C++ library to facilitate or simplify the implementation of
1329 user-facing type traits in the <type_traits> header.
1331 They are not intended to be used directly by user code because they are
1332 implementation-defined and subject to change -- as such they're tied closely to
1333 the supported set of system headers, currently:
1337 * The Microsoft standard C++ library
1339 Clang supports the `GNU C++ type traits
1340 <https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
1341 `Microsoft Visual C++ type traits
1342 <https://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_,
1343 as well as nearly all of the
1344 `Embarcadero C++ type traits
1345 <http://docwiki.embarcadero.com/RADStudio/Rio/en/Type_Trait_Functions_(C%2B%2B11)_Index>`_.
1347 The following type trait primitives are supported by Clang. Those traits marked
1348 (C++) provide implementations for type traits specified by the C++ standard;
1349 ``__X(...)`` has the same semantics and constraints as the corresponding
1350 ``std::X_t<...>`` or ``std::X_v<...>`` type trait.
1352 * ``__array_rank(type)`` (Embarcadero):
1353 Returns the number of levels of array in the type ``type``:
1354 ``0`` if ``type`` is not an array type, and
1355 ``__array_rank(element) + 1`` if ``type`` is an array of ``element``.
1356 * ``__array_extent(type, dim)`` (Embarcadero):
1357 The ``dim``'th array bound in the type ``type``, or ``0`` if
1358 ``dim >= __array_rank(type)``.
1359 * ``__has_nothrow_assign`` (GNU, Microsoft, Embarcadero):
1360 Deprecated, use ``__is_nothrow_assignable`` instead.
1361 * ``__has_nothrow_move_assign`` (GNU, Microsoft):
1362 Deprecated, use ``__is_nothrow_assignable`` instead.
1363 * ``__has_nothrow_copy`` (GNU, Microsoft):
1364 Deprecated, use ``__is_nothrow_constructible`` instead.
1365 * ``__has_nothrow_constructor`` (GNU, Microsoft):
1366 Deprecated, use ``__is_nothrow_constructible`` instead.
1367 * ``__has_trivial_assign`` (GNU, Microsoft, Embarcadero):
1368 Deprecated, use ``__is_trivially_assignable`` instead.
1369 * ``__has_trivial_move_assign`` (GNU, Microsoft):
1370 Deprecated, use ``__is_trivially_assignable`` instead.
1371 * ``__has_trivial_copy`` (GNU, Microsoft):
1372 Deprecated, use ``__is_trivially_constructible`` instead.
1373 * ``__has_trivial_constructor`` (GNU, Microsoft):
1374 Deprecated, use ``__is_trivially_constructible`` instead.
1375 * ``__has_trivial_move_constructor`` (GNU, Microsoft):
1376 Deprecated, use ``__is_trivially_constructible`` instead.
1377 * ``__has_trivial_destructor`` (GNU, Microsoft, Embarcadero):
1378 Deprecated, use ``__is_trivially_destructible`` instead.
1379 * ``__has_unique_object_representations`` (C++, GNU)
1380 * ``__has_virtual_destructor`` (C++, GNU, Microsoft, Embarcadero)
1381 * ``__is_abstract`` (C++, GNU, Microsoft, Embarcadero)
1382 * ``__is_aggregate`` (C++, GNU, Microsoft)
1383 * ``__is_arithmetic`` (C++, Embarcadero)
1384 * ``__is_array`` (C++, Embarcadero)
1385 * ``__is_assignable`` (C++, MSVC 2015)
1386 * ``__is_base_of`` (C++, GNU, Microsoft, Embarcadero)
1387 * ``__is_class`` (C++, GNU, Microsoft, Embarcadero)
1388 * ``__is_complete_type(type)`` (Embarcadero):
1389 Return ``true`` if ``type`` is a complete type.
1390 Warning: this trait is dangerous because it can return different values at
1391 different points in the same program.
1392 * ``__is_compound`` (C++, Embarcadero)
1393 * ``__is_const`` (C++, Embarcadero)
1394 * ``__is_constructible`` (C++, MSVC 2013)
1395 * ``__is_convertible`` (C++, Embarcadero)
1396 * ``__is_convertible_to`` (Microsoft):
1397 Synonym for ``__is_convertible``.
1398 * ``__is_destructible`` (C++, MSVC 2013):
1399 Only available in ``-fms-extensions`` mode.
1400 * ``__is_empty`` (C++, GNU, Microsoft, Embarcadero)
1401 * ``__is_enum`` (C++, GNU, Microsoft, Embarcadero)
1402 * ``__is_final`` (C++, GNU, Microsoft)
1403 * ``__is_floating_point`` (C++, Embarcadero)
1404 * ``__is_function`` (C++, Embarcadero)
1405 * ``__is_fundamental`` (C++, Embarcadero)
1406 * ``__is_integral`` (C++, Embarcadero)
1407 * ``__is_interface_class`` (Microsoft):
1408 Returns ``false``, even for types defined with ``__interface``.
1409 * ``__is_literal`` (Clang):
1410 Synonym for ``__is_literal_type``.
1411 * ``__is_literal_type`` (C++, GNU, Microsoft):
1412 Note, the corresponding standard trait was deprecated in C++17
1413 and removed in C++20.
1414 * ``__is_lvalue_reference`` (C++, Embarcadero)
1415 * ``__is_member_object_pointer`` (C++, Embarcadero)
1416 * ``__is_member_function_pointer`` (C++, Embarcadero)
1417 * ``__is_member_pointer`` (C++, Embarcadero)
1418 * ``__is_nothrow_assignable`` (C++, MSVC 2013)
1419 * ``__is_nothrow_constructible`` (C++, MSVC 2013)
1420 * ``__is_nothrow_destructible`` (C++, MSVC 2013)
1421 Only available in ``-fms-extensions`` mode.
1422 * ``__is_object`` (C++, Embarcadero)
1423 * ``__is_pod`` (C++, GNU, Microsoft, Embarcadero):
1424 Note, the corresponding standard trait was deprecated in C++20.
1425 * ``__is_pointer`` (C++, Embarcadero)
1426 * ``__is_polymorphic`` (C++, GNU, Microsoft, Embarcadero)
1427 * ``__is_reference`` (C++, Embarcadero)
1428 * ``__is_rvalue_reference`` (C++, Embarcadero)
1429 * ``__is_same`` (C++, Embarcadero)
1430 * ``__is_same_as`` (GCC): Synonym for ``__is_same``.
1431 * ``__is_scalar`` (C++, Embarcadero)
1432 * ``__is_sealed`` (Microsoft):
1433 Synonym for ``__is_final``.
1434 * ``__is_signed`` (C++, Embarcadero):
1435 Returns false for enumeration types, and returns true for floating-point
1436 types. Note, before Clang 10, returned true for enumeration types if the
1437 underlying type was signed, and returned false for floating-point types.
1438 * ``__is_standard_layout`` (C++, GNU, Microsoft, Embarcadero)
1439 * ``__is_trivial`` (C++, GNU, Microsoft, Embarcadero)
1440 * ``__is_trivially_assignable`` (C++, GNU, Microsoft)
1441 * ``__is_trivially_constructible`` (C++, GNU, Microsoft)
1442 * ``__is_trivially_copyable`` (C++, GNU, Microsoft)
1443 * ``__is_trivially_destructible`` (C++, MSVC 2013)
1444 * ``__is_trivially_relocatable`` (Clang): Returns true if moving an object
1445 of the given type, and then destroying the source object, is known to be
1446 functionally equivalent to copying the underlying bytes and then dropping the
1447 source object on the floor. This is true of trivial types and types which
1448 were made trivially relocatable via the ``clang::trivial_abi`` attribute.
1449 * ``__is_union`` (C++, GNU, Microsoft, Embarcadero)
1450 * ``__is_unsigned`` (C++, Embarcadero):
1451 Returns false for enumeration types. Note, before Clang 13, returned true for
1452 enumeration types if the underlying type was unsigned.
1453 * ``__is_void`` (C++, Embarcadero)
1454 * ``__is_volatile`` (C++, Embarcadero)
1455 * ``__reference_binds_to_temporary(T, U)`` (Clang): Determines whether a
1456 reference of type ``T`` bound to an expression of type ``U`` would bind to a
1457 materialized temporary object. If ``T`` is not a reference type the result
1458 is false. Note this trait will also return false when the initialization of
1459 ``T`` from ``U`` is ill-formed.
1460 * ``__underlying_type`` (C++, GNU, Microsoft)
1462 In addition, the following expression traits are supported:
1464 * ``__is_lvalue_expr(e)`` (Embarcadero):
1465 Returns true if ``e`` is an lvalue expression.
1466 Deprecated, use ``__is_lvalue_reference(decltype((e)))`` instead.
1467 * ``__is_rvalue_expr(e)`` (Embarcadero):
1468 Returns true if ``e`` is a prvalue expression.
1469 Deprecated, use ``!__is_reference(decltype((e)))`` instead.
1471 There are multiple ways to detect support for a type trait ``__X`` in the
1472 compiler, depending on the oldest version of Clang you wish to support.
1474 * From Clang 10 onwards, ``__has_builtin(__X)`` can be used.
1475 * From Clang 6 onwards, ``!__is_identifier(__X)`` can be used.
1476 * From Clang 3 onwards, ``__has_feature(X)`` can be used, but only supports
1477 the following traits:
1479 * ``__has_nothrow_assign``
1480 * ``__has_nothrow_copy``
1481 * ``__has_nothrow_constructor``
1482 * ``__has_trivial_assign``
1483 * ``__has_trivial_copy``
1484 * ``__has_trivial_constructor``
1485 * ``__has_trivial_destructor``
1486 * ``__has_virtual_destructor``
1490 * ``__is_constructible``
1491 * ``__is_convertible_to``
1496 * ``__is_standard_layout``
1498 * ``__is_polymorphic``
1501 * ``__is_trivially_assignable``
1502 * ``__is_trivially_constructible``
1503 * ``__is_trivially_copyable``
1505 * ``__underlying_type``
1507 A simplistic usage example as might be seen in standard C++ headers follows:
1511 #if __has_builtin(__is_convertible_to)
1512 template<typename From, typename To>
1513 struct is_convertible_to {
1514 static const bool value = __is_convertible_to(From, To);
1517 // Emulate type trait for compatibility with other compilers.
1523 The syntax and high level language feature description is in
1524 :doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
1525 the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
1527 Query for this feature with ``__has_extension(blocks)``.
1529 ASM Goto with Output Constraints
1530 ================================
1532 In addition to the functionality provided by `GCC's extended
1533 assembly <https://gcc.gnu.org/onlinedocs/gcc/Extended-Asm.html>`_, clang
1534 supports output constraints with the `goto` form.
1536 The goto form of GCC's extended assembly allows the programmer to branch to a C
1537 label from within an inline assembly block. Clang extends this behavior by
1538 allowing the programmer to use output constraints:
1544 asm goto("# %0 %1 %l2" : "=r"(y) : "r"(x) : : err);
1550 It's important to note that outputs are valid only on the "fallthrough" branch.
1551 Using outputs on an indirect branch may result in undefined behavior. For
1552 example, in the function above, use of the value assigned to `y` in the `err`
1553 block is undefined behavior.
1555 When using tied-outputs (i.e. outputs that are inputs and outputs, not just
1556 outputs) with the `+r` constraint, there is a hidden input that's created
1557 before the label, so numeric references to operands must account for that.
1562 // %0 and %1 both refer to x
1563 // %l2 refers to err
1564 asm goto("# %0 %1 %l2" : "+r"(x) : : : err);
1570 This was changed to match GCC in clang-13; for better portability, symbolic
1571 references can be used instead of numeric references.
1576 asm goto("# %[x] %l[err]" : [x]"+r"(x) : : : err);
1582 Query for this feature with ``__has_extension(gnu_asm_goto_with_outputs)``.
1584 Objective-C Features
1585 ====================
1587 Related result types
1588 --------------------
1590 According to Cocoa conventions, Objective-C methods with certain names
1591 ("``init``", "``alloc``", etc.) always return objects that are an instance of
1592 the receiving class's type. Such methods are said to have a "related result
1593 type", meaning that a message send to one of these methods will have the same
1594 static type as an instance of the receiver class. For example, given the
1597 .. code-block:: objc
1604 @interface NSArray : NSObject
1607 and this common initialization pattern
1609 .. code-block:: objc
1611 NSArray *array = [[NSArray alloc] init];
1613 the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1614 ``alloc`` implicitly has a related result type. Similarly, the type of the
1615 expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1616 related result type and its receiver is known to have the type ``NSArray *``.
1617 If neither ``alloc`` nor ``init`` had a related result type, the expressions
1618 would have had type ``id``, as declared in the method signature.
1620 A method with a related result type can be declared by using the type
1621 ``instancetype`` as its result type. ``instancetype`` is a contextual keyword
1622 that is only permitted in the result type of an Objective-C method, e.g.
1624 .. code-block:: objc
1627 + (instancetype)constructAnA;
1630 The related result type can also be inferred for some methods. To determine
1631 whether a method has an inferred related result type, the first word in the
1632 camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1633 and the method will have a related result type if its return type is compatible
1634 with the type of its class and if:
1636 * the first word is "``alloc``" or "``new``", and the method is a class method,
1639 * the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1640 and the method is an instance method.
1642 If a method with a related result type is overridden by a subclass method, the
1643 subclass method must also return a type that is compatible with the subclass
1646 .. code-block:: objc
1648 @interface NSString : NSObject
1649 - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1652 Related result types only affect the type of a message send or property access
1653 via the given method. In all other respects, a method with a related result
1654 type is treated the same way as method that returns ``id``.
1656 Use ``__has_feature(objc_instancetype)`` to determine whether the
1657 ``instancetype`` contextual keyword is available.
1659 Automatic reference counting
1660 ----------------------------
1662 Clang provides support for :doc:`automated reference counting
1663 <AutomaticReferenceCounting>` in Objective-C, which eliminates the need
1664 for manual ``retain``/``release``/``autorelease`` message sends. There are three
1665 feature macros associated with automatic reference counting:
1666 ``__has_feature(objc_arc)`` indicates the availability of automated reference
1667 counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1668 automated reference counting also includes support for ``__weak`` pointers to
1669 Objective-C objects. ``__has_feature(objc_arc_fields)`` indicates that C structs
1670 are allowed to have fields that are pointers to Objective-C objects managed by
1671 automatic reference counting.
1678 Clang supports ARC-style weak and unsafe references in Objective-C even
1679 outside of ARC mode. Weak references must be explicitly enabled with
1680 the ``-fobjc-weak`` option; use ``__has_feature((objc_arc_weak))``
1681 to test whether they are enabled. Unsafe references are enabled
1682 unconditionally. ARC-style weak and unsafe references cannot be used
1683 when Objective-C garbage collection is enabled.
1685 Except as noted below, the language rules for the ``__weak`` and
1686 ``__unsafe_unretained`` qualifiers (and the ``weak`` and
1687 ``unsafe_unretained`` property attributes) are just as laid out
1688 in the :doc:`ARC specification <AutomaticReferenceCounting>`.
1689 In particular, note that some classes do not support forming weak
1690 references to their instances, and note that special care must be
1691 taken when storing weak references in memory where initialization
1692 and deinitialization are outside the responsibility of the compiler
1693 (such as in ``malloc``-ed memory).
1695 Loading from a ``__weak`` variable always implicitly retains the
1696 loaded value. In non-ARC modes, this retain is normally balanced
1697 by an implicit autorelease. This autorelease can be suppressed
1698 by performing the load in the receiver position of a ``-retain``
1699 message send (e.g. ``[weakReference retain]``); note that this performs
1700 only a single retain (the retain done when primitively loading from
1701 the weak reference).
1703 For the most part, ``__unsafe_unretained`` in non-ARC modes is just the
1704 default behavior of variables and therefore is not needed. However,
1705 it does have an effect on the semantics of block captures: normally,
1706 copying a block which captures an Objective-C object or block pointer
1707 causes the captured pointer to be retained or copied, respectively,
1708 but that behavior is suppressed when the captured variable is qualified
1709 with ``__unsafe_unretained``.
1711 Note that the ``__weak`` qualifier formerly meant the GC qualifier in
1712 all non-ARC modes and was silently ignored outside of GC modes. It now
1713 means the ARC-style qualifier in all non-GC modes and is no longer
1714 allowed if not enabled by either ``-fobjc-arc`` or ``-fobjc-weak``.
1715 It is expected that ``-fobjc-weak`` will eventually be enabled by default
1716 in all non-GC Objective-C modes.
1718 .. _objc-fixed-enum:
1720 Enumerations with a fixed underlying type
1721 -----------------------------------------
1723 Clang provides support for C++11 enumerations with a fixed underlying type
1724 within Objective-C. For example, one can write an enumeration type as:
1728 typedef enum : unsigned char { Red, Green, Blue } Color;
1730 This specifies that the underlying type, which is used to store the enumeration
1731 value, is ``unsigned char``.
1733 Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1734 underlying types is available in Objective-C.
1736 Interoperability with C++11 lambdas
1737 -----------------------------------
1739 Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1740 permitting a lambda to be implicitly converted to a block pointer with the
1741 corresponding signature. For example, consider an API such as ``NSArray``'s
1742 array-sorting method:
1744 .. code-block:: objc
1746 - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1748 ``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1749 (^)(id, id)``, and parameters of this type are generally provided with block
1750 literals as arguments. However, one can also use a C++11 lambda so long as it
1751 provides the same signature (in this case, accepting two parameters of type
1752 ``id`` and returning an ``NSComparisonResult``):
1754 .. code-block:: objc
1756 NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1758 const NSStringCompareOptions comparisonOptions
1759 = NSCaseInsensitiveSearch | NSNumericSearch |
1760 NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1761 NSLocale *currentLocale = [NSLocale currentLocale];
1763 = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1764 NSRange string1Range = NSMakeRange(0, [s1 length]);
1765 return [s1 compare:s2 options:comparisonOptions
1766 range:string1Range locale:currentLocale];
1768 NSLog(@"sorted: %@", sorted);
1770 This code relies on an implicit conversion from the type of the lambda
1771 expression (an unnamed, local class type called the *closure type*) to the
1772 corresponding block pointer type. The conversion itself is expressed by a
1773 conversion operator in that closure type that produces a block pointer with the
1774 same signature as the lambda itself, e.g.,
1776 .. code-block:: objc
1778 operator NSComparisonResult (^)(id, id)() const;
1780 This conversion function returns a new block that simply forwards the two
1781 parameters to the lambda object (which it captures by copy), then returns the
1782 result. The returned block is first copied (with ``Block_copy``) and then
1783 autoreleased. As an optimization, if a lambda expression is immediately
1784 converted to a block pointer (as in the first example, above), then the block
1785 is not copied and autoreleased: rather, it is given the same lifetime as a
1786 block literal written at that point in the program, which avoids the overhead
1787 of copying a block to the heap in the common case.
1789 The conversion from a lambda to a block pointer is only available in
1790 Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1791 management (autorelease).
1793 Object Literals and Subscripting
1794 --------------------------------
1796 Clang provides support for :doc:`Object Literals and Subscripting
1797 <ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
1798 programming patterns, makes programs more concise, and improves the safety of
1799 container creation. There are several feature macros associated with object
1800 literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1801 availability of array literals; ``__has_feature(objc_dictionary_literals)``
1802 tests the availability of dictionary literals;
1803 ``__has_feature(objc_subscripting)`` tests the availability of object
1806 Objective-C Autosynthesis of Properties
1807 ---------------------------------------
1809 Clang provides support for autosynthesis of declared properties. Using this
1810 feature, clang provides default synthesis of those properties not declared
1811 @dynamic and not having user provided backing getter and setter methods.
1812 ``__has_feature(objc_default_synthesize_properties)`` checks for availability
1813 of this feature in version of clang being used.
1815 .. _langext-objc-retain-release:
1817 Objective-C retaining behavior attributes
1818 -----------------------------------------
1820 In Objective-C, functions and methods are generally assumed to follow the
1821 `Cocoa Memory Management
1822 <https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1823 conventions for ownership of object arguments and
1824 return values. However, there are exceptions, and so Clang provides attributes
1825 to allow these exceptions to be documented. This are used by ARC and the
1826 `static analyzer <https://clang-analyzer.llvm.org>`_ Some exceptions may be
1827 better described using the ``objc_method_family`` attribute instead.
1829 **Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1830 ``ns_returns_autoreleased``, ``cf_returns_retained``, and
1831 ``cf_returns_not_retained`` attributes can be placed on methods and functions
1832 that return Objective-C or CoreFoundation objects. They are commonly placed at
1833 the end of a function prototype or method declaration:
1835 .. code-block:: objc
1837 id foo() __attribute__((ns_returns_retained));
1839 - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1841 The ``*_returns_retained`` attributes specify that the returned object has a +1
1842 retain count. The ``*_returns_not_retained`` attributes specify that the return
1843 object has a +0 retain count, even if the normal convention for its selector
1844 would be +1. ``ns_returns_autoreleased`` specifies that the returned object is
1845 +0, but is guaranteed to live at least as long as the next flush of an
1848 **Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1849 an parameter declaration; they specify that the argument is expected to have a
1850 +1 retain count, which will be balanced in some way by the function or method.
1851 The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1852 method; it specifies that the method expects its ``self`` parameter to have a
1853 +1 retain count, which it will balance in some way.
1855 .. code-block:: objc
1857 void foo(__attribute__((ns_consumed)) NSString *string);
1859 - (void) bar __attribute__((ns_consumes_self));
1860 - (void) baz:(id) __attribute__((ns_consumed)) x;
1862 Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1863 <https://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1865 Query for these features with ``__has_attribute(ns_consumed)``,
1866 ``__has_attribute(ns_returns_retained)``, etc.
1868 Objective-C @available
1869 ----------------------
1871 It is possible to use the newest SDK but still build a program that can run on
1872 older versions of macOS and iOS by passing ``-mmacosx-version-min=`` /
1873 ``-miphoneos-version-min=``.
1875 Before LLVM 5.0, when calling a function that exists only in the OS that's
1876 newer than the target OS (as determined by the minimum deployment version),
1877 programmers had to carefully check if the function exists at runtime, using
1878 null checks for weakly-linked C functions, ``+class`` for Objective-C classes,
1879 and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for
1880 Objective-C methods. If such a check was missed, the program would compile
1881 fine, run fine on newer systems, but crash on older systems.
1883 As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes
1884 <https://clang.llvm.org/docs/AttributeReference.html#availability>`_ together
1885 with the new ``@available()`` keyword to assist with this issue.
1886 When a method that's introduced in the OS newer than the target OS is called, a
1887 -Wunguarded-availability warning is emitted if that call is not guarded:
1889 .. code-block:: objc
1891 void my_fun(NSSomeClass* var) {
1892 // If fancyNewMethod was added in e.g. macOS 10.12, but the code is
1893 // built with -mmacosx-version-min=10.11, then this unconditional call
1894 // will emit a -Wunguarded-availability warning:
1895 [var fancyNewMethod];
1898 To fix the warning and to avoid the crash on macOS 10.11, wrap it in
1899 ``if(@available())``:
1901 .. code-block:: objc
1903 void my_fun(NSSomeClass* var) {
1904 if (@available(macOS 10.12, *)) {
1905 [var fancyNewMethod];
1907 // Put fallback behavior for old macOS versions (and for non-mac
1912 The ``*`` is required and means that platforms not explicitly listed will take
1913 the true branch, and the compiler will emit ``-Wunguarded-availability``
1914 warnings for unlisted platforms based on those platform's deployment target.
1915 More than one platform can be listed in ``@available()``:
1917 .. code-block:: objc
1919 void my_fun(NSSomeClass* var) {
1920 if (@available(macOS 10.12, iOS 10, *)) {
1921 [var fancyNewMethod];
1925 If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called
1926 on 10.12, then add an `availability attribute
1927 <https://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it,
1928 which will also suppress the warning and require that calls to my_fun() are
1931 .. code-block:: objc
1933 API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) {
1934 [var fancyNewMethod]; // Now ok.
1937 ``@available()`` is only available in Objective-C code. To use the feature
1938 in C and C++ code, use the ``__builtin_available()`` spelling instead.
1940 If existing code uses null checks or ``-respondsToSelector:``, it should
1941 be changed to use ``@available()`` (or ``__builtin_available``) instead.
1943 ``-Wunguarded-availability`` is disabled by default, but
1944 ``-Wunguarded-availability-new``, which only emits this warning for APIs
1945 that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and
1946 tvOS >= 11, is enabled by default.
1948 .. _langext-overloading:
1950 Objective-C++ ABI: protocol-qualifier mangling of parameters
1951 ------------------------------------------------------------
1953 Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1954 type is a qualified-``id`` (e.g., ``id<Foo>``). This mangling allows such
1955 parameters to be differentiated from those with the regular unqualified ``id``
1958 This was a non-backward compatible mangling change to the ABI. This change
1959 allows proper overloading, and also prevents mangling conflicts with template
1960 parameters of protocol-qualified type.
1962 Query the presence of this new mangling with
1963 ``__has_feature(objc_protocol_qualifier_mangling)``.
1965 Initializer lists for complex numbers in C
1966 ==========================================
1968 clang supports an extension which allows the following in C:
1973 #include <complex.h>
1974 complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1976 This construct is useful because there is no way to separately initialize the
1977 real and imaginary parts of a complex variable in standard C, given that clang
1978 does not support ``_Imaginary``. (Clang also supports the ``__real__`` and
1979 ``__imag__`` extensions from gcc, which help in some cases, but are not usable
1980 in static initializers.)
1982 Note that this extension does not allow eliding the braces; the meaning of the
1983 following two lines is different:
1987 complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1988 complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1990 This extension also works in C++ mode, as far as that goes, but does not apply
1991 to the C++ ``std::complex``. (In C++11, list initialization allows the same
1992 syntax to be used with ``std::complex`` with the same meaning.)
1994 For GCC compatibility, ``__builtin_complex(re, im)`` can also be used to
1995 construct a complex number from the given real and imaginary components.
2000 Clang supports internal OpenCL extensions documented below.
2002 ``__cl_clang_bitfields``
2003 --------------------------------
2005 With this extension it is possible to enable bitfields in structs
2006 or unions using the OpenCL extension pragma mechanism detailed in
2007 `the OpenCL Extension Specification, section 1.2
2008 <https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2010 Use of bitfields in OpenCL kernels can result in reduced portability as struct
2011 layout is not guaranteed to be consistent when compiled by different compilers.
2012 If structs with bitfields are used as kernel function parameters, it can result
2013 in incorrect functionality when the layout is different between the host and
2020 #pragma OPENCL EXTENSION __cl_clang_bitfields : enable
2021 struct with_bitfield {
2022 unsigned int i : 5; // compiled - no diagnostic generated
2025 #pragma OPENCL EXTENSION __cl_clang_bitfields : disable
2026 struct without_bitfield {
2027 unsigned int i : 5; // error - bitfields are not supported
2030 ``__cl_clang_function_pointers``
2031 --------------------------------
2033 With this extension it is possible to enable various language features that
2034 are relying on function pointers using regular OpenCL extension pragma
2035 mechanism detailed in `the OpenCL Extension Specification,
2037 <https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2039 In C++ for OpenCL this also enables:
2041 - Use of member function pointers;
2043 - Unrestricted use of references to functions;
2045 - Virtual member functions.
2047 Such functionality is not conformant and does not guarantee to compile
2048 correctly in any circumstances. It can be used if:
2050 - the kernel source does not contain call expressions to (member-) function
2051 pointers, or virtual functions. For example this extension can be used in
2052 metaprogramming algorithms to be able to specify/detect types generically.
2054 - the generated kernel binary does not contain indirect calls because they
2055 are eliminated using compiler optimizations e.g. devirtualization.
2057 - the selected target supports the function pointer like functionality e.g.
2064 #pragma OPENCL EXTENSION __cl_clang_function_pointers : enable
2067 void (*fp)(); // compiled - no diagnostic generated
2070 #pragma OPENCL EXTENSION __cl_clang_function_pointers : disable
2073 void (*fp)(); // error - pointers to function are not allowed
2076 ``__cl_clang_variadic_functions``
2077 ---------------------------------
2079 With this extension it is possible to enable variadic arguments in functions
2080 using regular OpenCL extension pragma mechanism detailed in `the OpenCL
2081 Extension Specification, section 1.2
2082 <https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2084 This is not conformant behavior and it can only be used portably when the
2085 functions with variadic prototypes do not get generated in binary e.g. the
2086 variadic prototype is used to specify a function type with any number of
2087 arguments in metaprogramming algorithms in C++ for OpenCL.
2089 This extensions can also be used when the kernel code is intended for targets
2090 supporting the variadic arguments e.g. majority of CPU targets.
2096 #pragma OPENCL EXTENSION __cl_clang_variadic_functions : enable
2097 void foo(int a, ...); // compiled - no diagnostic generated
2099 #pragma OPENCL EXTENSION __cl_clang_variadic_functions : disable
2100 void bar(int a, ...); // error - variadic prototype is not allowed
2102 ``__cl_clang_non_portable_kernel_param_types``
2103 ----------------------------------------------
2105 With this extension it is possible to enable the use of some restricted types
2106 in kernel parameters specified in `C++ for OpenCL v1.0 s2.4
2107 <https://www.khronos.org/opencl/assets/CXX_for_OpenCL.html#kernel_function>`_.
2108 The restrictions can be relaxed using regular OpenCL extension pragma mechanism
2109 detailed in `the OpenCL Extension Specification, section 1.2
2110 <https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2112 This is not a conformant behavior and it can only be used when the
2113 kernel arguments are not accessed on the host side or the data layout/size
2114 between the host and device is known to be compatible.
2120 // Plain Old Data type.
2126 // Not POD type because of the constructor.
2127 // Standard layout type because there is only one access control.
2131 NotPod() : a(0), b(0) {}
2134 // Not standard layout type because of two different access controls.
2141 kernel void kernel_main(
2143 #pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : enable
2146 #pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : disable
2150 Remove address space builtin function
2151 -------------------------------------
2153 ``__remove_address_space`` allows to derive types in C++ for OpenCL
2154 that have address space qualifiers removed. This utility only affects
2155 address space qualifiers, therefore, other type qualifiers such as
2156 ``const`` or ``volatile`` remain unchanged.
2162 template<typename T>
2164 T var1; // error - local function variable with global address space
2165 __private T var2; // error - conflicting address space qualifiers
2166 __private __remove_address_space<T>::type var3; // var3 is __private int
2174 Legacy 1.x atomics with generic address space
2175 ---------------------------------------------
2177 Clang allows use of atomic functions from the OpenCL 1.x standards
2178 with the generic address space pointer in C++ for OpenCL mode.
2180 This is a non-portable feature and might not be supported by all
2187 void foo(__generic volatile unsigned int* a) {
2194 Clang supports a number of builtin library functions with the same syntax as
2195 GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
2196 ``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
2197 ``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc. In addition to
2198 the GCC builtins, Clang supports a number of builtins that GCC does not, which
2201 Please note that Clang does not and will not support all of the GCC builtins
2202 for vector operations. Instead of using builtins, you should use the functions
2203 defined in target-specific header files like ``<xmmintrin.h>``, which define
2204 portable wrappers for these. Many of the Clang versions of these functions are
2205 implemented directly in terms of :ref:`extended vector support
2206 <langext-vectors>` instead of builtins, in order to reduce the number of
2207 builtins that we need to implement.
2209 ``__builtin_alloca``
2210 --------------------
2212 ``__builtin_alloca`` is used to dynamically allocate memory on the stack. Memory
2213 is automatically freed upon function termination.
2219 __builtin_alloca(size_t n)
2225 void init(float* data, size_t nbelems);
2226 void process(float* data, size_t nbelems);
2228 auto mem = (float*)__builtin_alloca(n * sizeof(float));
2231 /* mem is automatically freed at this point */
2236 ``__builtin_alloca`` is meant to be used to allocate a dynamic amount of memory
2237 on the stack. This amount is subject to stack allocation limits.
2239 Query for this feature with ``__has_builtin(__builtin_alloca)``.
2241 ``__builtin_alloca_with_align``
2242 -------------------------------
2244 ``__builtin_alloca_with_align`` is used to dynamically allocate memory on the
2245 stack while controlling its alignment. Memory is automatically freed upon
2246 function termination.
2253 __builtin_alloca_with_align(size_t n, size_t align)
2259 void init(float* data, size_t nbelems);
2260 void process(float* data, size_t nbelems);
2262 auto mem = (float*)__builtin_alloca_with_align(
2264 CHAR_BIT * alignof(float));
2267 /* mem is automatically freed at this point */
2272 ``__builtin_alloca_with_align`` is meant to be used to allocate a dynamic amount of memory
2273 on the stack. It is similar to ``__builtin_alloca`` but accepts a second
2274 argument whose value is the alignment constraint, as a power of 2 in *bits*.
2276 Query for this feature with ``__has_builtin(__builtin_alloca_with_align)``.
2278 .. _langext-__builtin_assume:
2280 ``__builtin_assume``
2281 --------------------
2283 ``__builtin_assume`` is used to provide the optimizer with a boolean
2284 invariant that is defined to be true.
2290 __builtin_assume(bool)
2297 __builtin_assume(x != 0);
2298 // The optimizer may short-circuit this check using the invariant.
2300 return do_something();
2301 return do_something_else();
2306 The boolean argument to this function is defined to be true. The optimizer may
2307 analyze the form of the expression provided as the argument and deduce from
2308 that information used to optimize the program. If the condition is violated
2309 during execution, the behavior is undefined. The argument itself is never
2310 evaluated, so any side effects of the expression will be discarded.
2312 Query for this feature with ``__has_builtin(__builtin_assume)``.
2314 ``__builtin_call_with_static_chain``
2315 ------------------------------------
2317 ``__builtin_call_with_static_chain`` is used to perform a static call while
2318 setting updating the static chain register.
2324 T __builtin_call_with_static_chain(T expr, void* ptr)
2330 auto v = __builtin_call_with_static_chain(foo(3), foo);
2334 This builtin returns ``expr`` after checking that ``expr`` is a non-member
2335 static call expression. The call to that expression is made while using ``ptr``
2336 as a function pointer stored in a dedicated register to implement *static chain*
2337 calling convention, as used by some language to implement closures or nested
2340 Query for this feature with ``__has_builtin(__builtin_call_with_static_chain)``.
2342 ``__builtin_readcyclecounter``
2343 ------------------------------
2345 ``__builtin_readcyclecounter`` is used to access the cycle counter register (or
2346 a similar low-latency, high-accuracy clock) on those targets that support it.
2352 __builtin_readcyclecounter()
2358 unsigned long long t0 = __builtin_readcyclecounter();
2360 unsigned long long t1 = __builtin_readcyclecounter();
2361 unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
2365 The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
2366 which may be either global or process/thread-specific depending on the target.
2367 As the backing counters often overflow quickly (on the order of seconds) this
2368 should only be used for timing small intervals. When not supported by the
2369 target, the return value is always zero. This builtin takes no arguments and
2370 produces an unsigned long long result.
2372 Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
2373 that even if present, its use may depend on run-time privilege or other OS
2376 ``__builtin_dump_struct``
2377 -------------------------
2383 __builtin_dump_struct(&some_struct, some_printf_func, args...);
2397 void func(struct S *s) {
2398 __builtin_dump_struct(s, printf);
2403 .. code-block:: none
2417 struct T { int a, b; };
2418 constexpr void constexpr_sprintf(std::string &out, const char *format,
2422 constexpr std::string dump_struct(auto &x) {
2424 __builtin_dump_struct(&x, constexpr_sprintf, s);
2427 static_assert(dump_struct(T{1, 2}) == R"(struct T {
2435 The ``__builtin_dump_struct`` function is used to print the fields of a simple
2436 structure and their values for debugging purposes. The first argument of the
2437 builtin should be a pointer to the struct to dump. The second argument ``f``
2438 should be some callable expression, and can be a function object or an overload
2439 set. The builtin calls ``f``, passing any further arguments ``args...``
2440 followed by a ``printf``-compatible format string and the corresponding
2441 arguments. ``f`` may be called more than once, and ``f`` and ``args`` will be
2442 evaluated once per call. In C++, ``f`` may be a template or overload set and
2443 resolve to different functions for each call.
2445 In the format string, a suitable format specifier will be used for builtin
2446 types that Clang knows how to format. This includes standard builtin types, as
2447 well as aggregate structures, ``void*`` (printed with ``%p``), and ``const
2448 char*`` (printed with ``%s``). A ``*%p`` specifier will be used for a field
2449 that Clang doesn't know how to format, and the corresopnding argument will be a
2450 pointer to the field. This allows a C++ templated formatting function to detect
2451 this case and implement custom formatting. A ``*`` will otherwise not precede a
2454 This builtin does not return a value.
2456 This builtin can be used in constant expressions.
2458 Query for this feature with ``__has_builtin(__builtin_dump_struct)``
2460 .. _langext-__builtin_shufflevector:
2462 ``__builtin_shufflevector``
2463 ---------------------------
2465 ``__builtin_shufflevector`` is used to express generic vector
2466 permutation/shuffle/swizzle operations. This builtin is also very important
2467 for the implementation of various target-specific header files like
2474 __builtin_shufflevector(vec1, vec2, index1, index2, ...)
2480 // identity operation - return 4-element vector v1.
2481 __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
2483 // "Splat" element 0 of V1 into a 4-element result.
2484 __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
2486 // Reverse 4-element vector V1.
2487 __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
2489 // Concatenate every other element of 4-element vectors V1 and V2.
2490 __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
2492 // Concatenate every other element of 8-element vectors V1 and V2.
2493 __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
2495 // Shuffle v1 with some elements being undefined
2496 __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
2500 The first two arguments to ``__builtin_shufflevector`` are vectors that have
2501 the same element type. The remaining arguments are a list of integers that
2502 specify the elements indices of the first two vectors that should be extracted
2503 and returned in a new vector. These element indices are numbered sequentially
2504 starting with the first vector, continuing into the second vector. Thus, if
2505 ``vec1`` is a 4-element vector, index 5 would refer to the second element of
2506 ``vec2``. An index of -1 can be used to indicate that the corresponding element
2507 in the returned vector is a don't care and can be optimized by the backend.
2509 The result of ``__builtin_shufflevector`` is a vector with the same element
2510 type as ``vec1``/``vec2`` but that has an element count equal to the number of
2513 Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
2515 .. _langext-__builtin_convertvector:
2517 ``__builtin_convertvector``
2518 ---------------------------
2520 ``__builtin_convertvector`` is used to express generic vector
2521 type-conversion operations. The input vector and the output vector
2522 type must have the same number of elements.
2528 __builtin_convertvector(src_vec, dst_vec_type)
2534 typedef double vector4double __attribute__((__vector_size__(32)));
2535 typedef float vector4float __attribute__((__vector_size__(16)));
2536 typedef short vector4short __attribute__((__vector_size__(8)));
2537 vector4float vf; vector4short vs;
2539 // convert from a vector of 4 floats to a vector of 4 doubles.
2540 __builtin_convertvector(vf, vector4double)
2542 (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
2544 // convert from a vector of 4 shorts to a vector of 4 floats.
2545 __builtin_convertvector(vs, vector4float)
2547 (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
2551 The first argument to ``__builtin_convertvector`` is a vector, and the second
2552 argument is a vector type with the same number of elements as the first
2555 The result of ``__builtin_convertvector`` is a vector with the same element
2556 type as the second argument, with a value defined in terms of the action of a
2557 C-style cast applied to each element of the first argument.
2559 Query for this feature with ``__has_builtin(__builtin_convertvector)``.
2561 ``__builtin_bitreverse``
2562 ------------------------
2564 * ``__builtin_bitreverse8``
2565 * ``__builtin_bitreverse16``
2566 * ``__builtin_bitreverse32``
2567 * ``__builtin_bitreverse64``
2573 __builtin_bitreverse32(x)
2579 uint8_t rev_x = __builtin_bitreverse8(x);
2580 uint16_t rev_x = __builtin_bitreverse16(x);
2581 uint32_t rev_y = __builtin_bitreverse32(y);
2582 uint64_t rev_z = __builtin_bitreverse64(z);
2586 The '``__builtin_bitreverse``' family of builtins is used to reverse
2587 the bitpattern of an integer value; for example ``0b10110110`` becomes
2588 ``0b01101101``. These builtins can be used within constant expressions.
2590 ``__builtin_rotateleft``
2591 ------------------------
2593 * ``__builtin_rotateleft8``
2594 * ``__builtin_rotateleft16``
2595 * ``__builtin_rotateleft32``
2596 * ``__builtin_rotateleft64``
2602 __builtin_rotateleft32(x, y)
2608 uint8_t rot_x = __builtin_rotateleft8(x, y);
2609 uint16_t rot_x = __builtin_rotateleft16(x, y);
2610 uint32_t rot_x = __builtin_rotateleft32(x, y);
2611 uint64_t rot_x = __builtin_rotateleft64(x, y);
2615 The '``__builtin_rotateleft``' family of builtins is used to rotate
2616 the bits in the first argument by the amount in the second argument.
2617 For example, ``0b10000110`` rotated left by 11 becomes ``0b00110100``.
2618 The shift value is treated as an unsigned amount modulo the size of
2619 the arguments. Both arguments and the result have the bitwidth specified
2620 by the name of the builtin. These builtins can be used within constant
2623 ``__builtin_rotateright``
2624 -------------------------
2626 * ``__builtin_rotateright8``
2627 * ``__builtin_rotateright16``
2628 * ``__builtin_rotateright32``
2629 * ``__builtin_rotateright64``
2635 __builtin_rotateright32(x, y)
2641 uint8_t rot_x = __builtin_rotateright8(x, y);
2642 uint16_t rot_x = __builtin_rotateright16(x, y);
2643 uint32_t rot_x = __builtin_rotateright32(x, y);
2644 uint64_t rot_x = __builtin_rotateright64(x, y);
2648 The '``__builtin_rotateright``' family of builtins is used to rotate
2649 the bits in the first argument by the amount in the second argument.
2650 For example, ``0b10000110`` rotated right by 3 becomes ``0b11010000``.
2651 The shift value is treated as an unsigned amount modulo the size of
2652 the arguments. Both arguments and the result have the bitwidth specified
2653 by the name of the builtin. These builtins can be used within constant
2656 ``__builtin_unreachable``
2657 -------------------------
2659 ``__builtin_unreachable`` is used to indicate that a specific point in the
2660 program cannot be reached, even if the compiler might otherwise think it can.
2661 This is useful to improve optimization and eliminates certain warnings. For
2662 example, without the ``__builtin_unreachable`` in the example below, the
2663 compiler assumes that the inline asm can fall through and prints a "function
2664 declared '``noreturn``' should not return" warning.
2670 __builtin_unreachable()
2676 void myabort(void) __attribute__((noreturn));
2677 void myabort(void) {
2679 __builtin_unreachable();
2684 The ``__builtin_unreachable()`` builtin has completely undefined behavior.
2685 Since it has undefined behavior, it is a statement that it is never reached and
2686 the optimizer can take advantage of this to produce better code. This builtin
2687 takes no arguments and produces a void result.
2689 Query for this feature with ``__has_builtin(__builtin_unreachable)``.
2691 ``__builtin_unpredictable``
2692 ---------------------------
2694 ``__builtin_unpredictable`` is used to indicate that a branch condition is
2695 unpredictable by hardware mechanisms such as branch prediction logic.
2701 __builtin_unpredictable(long long)
2707 if (__builtin_unpredictable(x > 0)) {
2713 The ``__builtin_unpredictable()`` builtin is expected to be used with control
2714 flow conditions such as in ``if`` and ``switch`` statements.
2716 Query for this feature with ``__has_builtin(__builtin_unpredictable)``.
2719 ``__builtin_expect``
2720 --------------------
2722 ``__builtin_expect`` is used to indicate that the value of an expression is
2723 anticipated to be the same as a statically known result.
2729 long __builtin_expect(long expr, long val)
2735 if (__builtin_expect(x, 0)) {
2741 The ``__builtin_expect()`` builtin is typically used with control flow
2742 conditions such as in ``if`` and ``switch`` statements to help branch
2743 prediction. It means that its first argument ``expr`` is expected to take the
2744 value of its second argument ``val``. It always returns ``expr``.
2746 Query for this feature with ``__has_builtin(__builtin_expect)``.
2748 ``__builtin_expect_with_probability``
2749 -------------------------------------
2751 ``__builtin_expect_with_probability`` is similar to ``__builtin_expect`` but it
2752 takes a probability as third argument.
2758 long __builtin_expect_with_probability(long expr, long val, double p)
2764 if (__builtin_expect_with_probability(x, 0, .3)) {
2770 The ``__builtin_expect_with_probability()`` builtin is typically used with
2771 control flow conditions such as in ``if`` and ``switch`` statements to help
2772 branch prediction. It means that its first argument ``expr`` is expected to take
2773 the value of its second argument ``val`` with probability ``p``. ``p`` must be
2774 within ``[0.0 ; 1.0]`` bounds. This builtin always returns the value of ``expr``.
2776 Query for this feature with ``__has_builtin(__builtin_expect_with_probability)``.
2778 ``__builtin_prefetch``
2779 ----------------------
2781 ``__builtin_prefetch`` is used to communicate with the cache handler to bring
2782 data into the cache before it gets used.
2788 void __builtin_prefetch(const void *addr, int rw=0, int locality=3)
2794 __builtin_prefetch(a + i);
2798 The ``__builtin_prefetch(addr, rw, locality)`` builtin is expected to be used to
2799 avoid cache misses when the developper has a good understanding of which data
2800 are going to be used next. ``addr`` is the address that needs to be brought into
2801 the cache. ``rw`` indicates the expected access mode: ``0`` for *read* and ``1``
2802 for *write*. In case of *read write* access, ``1`` is to be used. ``locality``
2803 indicates the expected persistance of data in cache, from ``0`` which means that
2804 data can be discarded from cache after its next use to ``3`` which means that
2805 data is going to be reused a lot once in cache. ``1`` and ``2`` provide
2806 intermediate behavior between these two extremes.
2808 Query for this feature with ``__has_builtin(__builtin_prefetch)``.
2813 ``__sync_swap`` is used to atomically swap integers or pointers in memory.
2819 type __sync_swap(type *ptr, type value, ...)
2825 int old_value = __sync_swap(&value, new_value);
2829 The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
2830 atomic intrinsics to allow code to atomically swap the current value with the
2831 new value. More importantly, it helps developers write more efficient and
2832 correct code by avoiding expensive loops around
2833 ``__sync_bool_compare_and_swap()`` or relying on the platform specific
2834 implementation details of ``__sync_lock_test_and_set()``. The
2835 ``__sync_swap()`` builtin is a full barrier.
2837 ``__builtin_addressof``
2838 -----------------------
2840 ``__builtin_addressof`` performs the functionality of the built-in ``&``
2841 operator, ignoring any ``operator&`` overload. This is useful in constant
2842 expressions in C++11, where there is no other way to take the address of an
2843 object that overloads ``operator&``.
2849 template<typename T> constexpr T *addressof(T &value) {
2850 return __builtin_addressof(value);
2853 ``__builtin_function_start``
2854 -----------------------------
2856 ``__builtin_function_start`` returns the address of a function body.
2862 void *__builtin_function_start(function)
2869 void *p = __builtin_function_start(a);
2880 void *pa1 = __builtin_function_start((void(A::*)(int)) &A::a);
2881 void *pa2 = __builtin_function_start((void(A::*)()) &A::a);
2885 The ``__builtin_function_start`` builtin accepts an argument that can be
2886 constant-evaluated to a function, and returns the address of the function
2887 body. This builtin is not supported on all targets.
2889 The returned pointer may differ from the normally taken function address
2890 and is not safe to call. For example, with ``-fsanitize=cfi``, taking a
2891 function address produces a callable pointer to a CFI jump table, while
2892 ``__builtin_function_start`` returns an address that fails
2893 :doc:`cfi-icall<ControlFlowIntegrity>` checks.
2895 ``__builtin_operator_new`` and ``__builtin_operator_delete``
2896 ------------------------------------------------------------
2898 A call to ``__builtin_operator_new(args)`` is exactly the same as a call to
2899 ``::operator new(args)``, except that it allows certain optimizations
2900 that the C++ standard does not permit for a direct function call to
2901 ``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
2902 merging allocations), and that the call is required to resolve to a
2903 `replaceable global allocation function
2904 <https://en.cppreference.com/w/cpp/memory/new/operator_new>`_.
2906 Likewise, ``__builtin_operator_delete`` is exactly the same as a call to
2907 ``::operator delete(args)``, except that it permits optimizations
2908 and that the call is required to resolve to a
2909 `replaceable global deallocation function
2910 <https://en.cppreference.com/w/cpp/memory/new/operator_delete>`_.
2912 These builtins are intended for use in the implementation of ``std::allocator``
2913 and other similar allocation libraries, and are only available in C++.
2915 Query for this feature with ``__has_builtin(__builtin_operator_new)`` or
2916 ``__has_builtin(__builtin_operator_delete)``:
2918 * If the value is at least ``201802L``, the builtins behave as described above.
2920 * If the value is non-zero, the builtins may not support calling arbitrary
2921 replaceable global (de)allocation functions, but do support calling at least
2922 ``::operator new(size_t)`` and ``::operator delete(void*)``.
2924 ``__builtin_preserve_access_index``
2925 -----------------------------------
2927 ``__builtin_preserve_access_index`` specifies a code section where
2928 array subscript access and structure/union member access are relocatable
2929 under bpf compile-once run-everywhere framework. Debuginfo (typically
2930 with ``-g``) is needed, otherwise, the compiler will exit with an error.
2931 The return type for the intrinsic is the same as the type of the
2938 type __builtin_preserve_access_index(type arg)
2953 int *pb =__builtin_preserve_access_index(&v->c[3].b);
2954 __builtin_preserve_access_index(v->j);
2956 ``__builtin_debugtrap``
2957 -----------------------
2959 ``__builtin_debugtrap`` causes the program to stop its execution in such a way that a debugger can catch it.
2965 __builtin_debugtrap()
2969 ``__builtin_debugtrap`` is lowered to the ` ``llvm.debugtrap`` <https://llvm.org/docs/LangRef.html#llvm-debugtrap-intrinsic>`_ builtin. It should have the same effect as setting a breakpoint on the line where the builtin is called.
2971 Query for this feature with ``__has_builtin(__builtin_debugtrap)``.
2977 ``__builtin_trap`` causes the program to stop its execution abnormally.
2987 ``__builtin_trap`` is lowered to the ` ``llvm.trap`` <https://llvm.org/docs/LangRef.html#llvm-trap-intrinsic>`_ builtin.
2989 Query for this feature with ``__has_builtin(__builtin_trap)``.
2992 ``__builtin_sycl_unique_stable_name``
2993 -------------------------------------
2995 ``__builtin_sycl_unique_stable_name()`` is a builtin that takes a type and
2996 produces a string literal containing a unique name for the type that is stable
2997 across split compilations, mainly to support SYCL/Data Parallel C++ language.
2999 In cases where the split compilation needs to share a unique token for a type
3000 across the boundary (such as in an offloading situation), this name can be used
3001 for lookup purposes, such as in the SYCL Integration Header.
3003 The value of this builtin is computed entirely at compile time, so it can be
3004 used in constant expressions. This value encodes lambda functions based on a
3005 stable numbering order in which they appear in their local declaration contexts.
3006 Once this builtin is evaluated in a constexpr context, it is erroneous to use
3007 it in an instantiation which changes its value.
3009 In order to produce the unique name, the current implementation of the builtin
3010 uses Itanium mangling even if the host compilation uses a different name
3011 mangling scheme at runtime. The mangler marks all the lambdas required to name
3012 the SYCL kernel and emits a stable local ordering of the respective lambdas.
3013 The resulting pattern is demanglable. When non-lambda types are passed to the
3014 builtin, the mangler emits their usual pattern without any special treatment.
3020 // Computes a unique stable name for the given type.
3021 constexpr const char * __builtin_sycl_unique_stable_name( type-id );
3023 Multiprecision Arithmetic Builtins
3024 ----------------------------------
3026 Clang provides a set of builtins which expose multiprecision arithmetic in a
3027 manner amenable to C. They all have the following form:
3031 unsigned x = ..., y = ..., carryin = ..., carryout;
3032 unsigned sum = __builtin_addc(x, y, carryin, &carryout);
3034 Thus one can form a multiprecision addition chain in the following manner:
3038 unsigned *x, *y, *z, carryin=0, carryout;
3039 z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
3041 z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
3043 z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
3045 z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
3047 The complete list of builtins are:
3051 unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
3052 unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
3053 unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
3054 unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
3055 unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
3056 unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
3057 unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
3058 unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
3059 unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
3060 unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
3062 Checked Arithmetic Builtins
3063 ---------------------------
3065 Clang provides a set of builtins that implement checked arithmetic for security
3066 critical applications in a manner that is fast and easily expressible in C. As
3067 an example of their usage:
3071 errorcode_t security_critical_application(...) {
3072 unsigned x, y, result;
3074 if (__builtin_mul_overflow(x, y, &result))
3075 return kErrorCodeHackers;
3077 use_multiply(result);
3081 Clang provides the following checked arithmetic builtins:
3085 bool __builtin_add_overflow (type1 x, type2 y, type3 *sum);
3086 bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff);
3087 bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod);
3088 bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
3089 bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
3090 bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
3091 bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
3092 bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
3093 bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
3094 bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
3095 bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
3096 bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
3097 bool __builtin_sadd_overflow (int x, int y, int *sum);
3098 bool __builtin_saddl_overflow (long x, long y, long *sum);
3099 bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
3100 bool __builtin_ssub_overflow (int x, int y, int *diff);
3101 bool __builtin_ssubl_overflow (long x, long y, long *diff);
3102 bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
3103 bool __builtin_smul_overflow (int x, int y, int *prod);
3104 bool __builtin_smull_overflow (long x, long y, long *prod);
3105 bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
3107 Each builtin performs the specified mathematical operation on the
3108 first two arguments and stores the result in the third argument. If
3109 possible, the result will be equal to mathematically-correct result
3110 and the builtin will return 0. Otherwise, the builtin will return
3111 1 and the result will be equal to the unique value that is equivalent
3112 to the mathematically-correct result modulo two raised to the *k*
3113 power, where *k* is the number of bits in the result type. The
3114 behavior of these builtins is well-defined for all argument values.
3116 The first three builtins work generically for operands of any integer type,
3117 including boolean types. The operands need not have the same type as each
3118 other, or as the result. The other builtins may implicitly promote or
3119 convert their operands before performing the operation.
3121 Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc.
3123 Floating point builtins
3124 ---------------------------------------
3126 ``__builtin_canonicalize``
3127 --------------------------
3131 double __builtin_canonicalize(double);
3132 float __builtin_canonicalizef(float);
3133 long double__builtin_canonicalizel(long double);
3135 Returns the platform specific canonical encoding of a floating point
3136 number. This canonicalization is useful for implementing certain
3137 numeric primitives such as frexp. See `LLVM canonicalize intrinsic
3138 <https://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for
3139 more information on the semantics.
3144 Clang provides constant expression evaluation support for builtins forms of
3145 the following functions from the C standard library headers
3146 ``<string.h>`` and ``<wchar.h>``:
3149 * ``memcmp`` (and its deprecated BSD / POSIX alias ``bcmp``)
3161 In each case, the builtin form has the name of the C library function prefixed
3162 by ``__builtin_``. Example:
3166 void *p = __builtin_memchr("foobar", 'b', 5);
3168 In addition to the above, one further builtin is provided:
3172 char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
3174 ``__builtin_char_memchr(a, b, c)`` is identical to
3175 ``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within
3176 constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*``
3177 is disallowed in general).
3179 Constant evaluation support for the ``__builtin_mem*`` functions is provided
3180 only for arrays of ``char``, ``signed char``, ``unsigned char``, or ``char8_t``,
3181 despite these functions accepting an argument of type ``const void*``.
3183 Support for constant expression evaluation for the above builtins can be detected
3184 with ``__has_feature(cxx_constexpr_string_builtins)``.
3189 Clang provides constant expression evaluation support for builtin forms of the
3190 following functions from the C standard library headers
3191 ``<string.h>`` and ``<wchar.h>``:
3198 In each case, the builtin form has the name of the C library function prefixed
3201 Constant evaluation support is only provided when the source and destination
3202 are pointers to arrays with the same trivially copyable element type, and the
3203 given size is an exact multiple of the element size that is no greater than
3204 the number of elements accessible through the source and destination operands.
3206 Guaranteed inlined copy
3207 ^^^^^^^^^^^^^^^^^^^^^^^
3211 void __builtin_memcpy_inline(void *dst, const void *src, size_t size);
3214 ``__builtin_memcpy_inline`` has been designed as a building block for efficient
3215 ``memcpy`` implementations. It is identical to ``__builtin_memcpy`` but also
3216 guarantees not to call any external functions. See LLVM IR `llvm.memcpy.inline
3217 <https://llvm.org/docs/LangRef.html#llvm-memcpy-inline-intrinsic>`_ intrinsic
3218 for more information.
3220 This is useful to implement a custom version of ``memcpy``, implement a
3221 ``libc`` memcpy or work around the absence of a ``libc``.
3223 Note that the `size` argument must be a compile time constant.
3225 Note that this intrinsic cannot yet be called in a ``constexpr`` context.
3227 Guaranteed inlined memset
3228 ^^^^^^^^^^^^^^^^^^^^^^^^^
3232 void __builtin_memset_inline(void *dst, int value, size_t size);
3235 ``__builtin_memset_inline`` has been designed as a building block for efficient
3236 ``memset`` implementations. It is identical to ``__builtin_memset`` but also
3237 guarantees not to call any external functions. See LLVM IR `llvm.memset.inline
3238 <https://llvm.org/docs/LangRef.html#llvm-memset-inline-intrinsic>`_ intrinsic
3239 for more information.
3241 This is useful to implement a custom version of ``memset``, implement a
3242 ``libc`` memset or work around the absence of a ``libc``.
3244 Note that the `size` argument must be a compile time constant.
3246 Note that this intrinsic cannot yet be called in a ``constexpr`` context.
3248 Atomic Min/Max builtins with memory ordering
3249 --------------------------------------------
3251 There are two atomic builtins with min/max in-memory comparison and swap.
3252 The syntax and semantics are similar to GCC-compatible __atomic_* builtins.
3254 * ``__atomic_fetch_min``
3255 * ``__atomic_fetch_max``
3257 The builtins work with signed and unsigned integers and require to specify memory ordering.
3258 The return value is the original value that was stored in memory before comparison.
3264 unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED);
3266 The third argument is one of the memory ordering specifiers ``__ATOMIC_RELAXED``,
3267 ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, ``__ATOMIC_RELEASE``,
3268 ``__ATOMIC_ACQ_REL``, or ``__ATOMIC_SEQ_CST`` following C++11 memory model semantics.
3270 In terms or aquire-release ordering barriers these two operations are always
3271 considered as operations with *load-store* semantics, even when the original value
3272 is not actually modified after comparison.
3274 .. _langext-__c11_atomic:
3276 __c11_atomic builtins
3277 ---------------------
3279 Clang provides a set of builtins which are intended to be used to implement
3280 C11's ``<stdatomic.h>`` header. These builtins provide the semantics of the
3281 ``_explicit`` form of the corresponding C11 operation, and are named with a
3282 ``__c11_`` prefix. The supported operations, and the differences from
3283 the corresponding C11 operations, are:
3285 * ``__c11_atomic_init``
3286 * ``__c11_atomic_thread_fence``
3287 * ``__c11_atomic_signal_fence``
3288 * ``__c11_atomic_is_lock_free`` (The argument is the size of the
3289 ``_Atomic(...)`` object, instead of its address)
3290 * ``__c11_atomic_store``
3291 * ``__c11_atomic_load``
3292 * ``__c11_atomic_exchange``
3293 * ``__c11_atomic_compare_exchange_strong``
3294 * ``__c11_atomic_compare_exchange_weak``
3295 * ``__c11_atomic_fetch_add``
3296 * ``__c11_atomic_fetch_sub``
3297 * ``__c11_atomic_fetch_and``
3298 * ``__c11_atomic_fetch_or``
3299 * ``__c11_atomic_fetch_xor``
3300 * ``__c11_atomic_fetch_nand`` (Nand is not presented in ``<stdatomic.h>``)
3301 * ``__c11_atomic_fetch_max``
3302 * ``__c11_atomic_fetch_min``
3304 The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
3305 ``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
3306 provided, with values corresponding to the enumerators of C11's
3307 ``memory_order`` enumeration.
3309 (Note that Clang additionally provides GCC-compatible ``__atomic_*``
3310 builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0
3311 atomic builtins are an explicit form of the corresponding OpenCL 2.0
3312 builtin function, and are named with a ``__opencl_`` prefix. The macros
3313 ``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``,
3314 ``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``,
3315 and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values
3316 corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.)
3318 Low-level ARM exclusive memory builtins
3319 ---------------------------------------
3321 Clang provides overloaded builtins giving direct access to the three key ARM
3322 instructions for implementing atomic operations.
3326 T __builtin_arm_ldrex(const volatile T *addr);
3327 T __builtin_arm_ldaex(const volatile T *addr);
3328 int __builtin_arm_strex(T val, volatile T *addr);
3329 int __builtin_arm_stlex(T val, volatile T *addr);
3330 void __builtin_arm_clrex(void);
3332 The types ``T`` currently supported are:
3334 * Integer types with width at most 64 bits (or 128 bits on AArch64).
3335 * Floating-point types
3338 Note that the compiler does not guarantee it will not insert stores which clear
3339 the exclusive monitor in between an ``ldrex`` type operation and its paired
3340 ``strex``. In practice this is only usually a risk when the extra store is on
3341 the same cache line as the variable being modified and Clang will only insert
3342 stack stores on its own, so it is best not to use these operations on variables
3343 with automatic storage duration.
3345 Also, loads and stores may be implicit in code written between the ``ldrex`` and
3346 ``strex``. Clang will not necessarily mitigate the effects of these either, so
3347 care should be exercised.
3349 For these reasons the higher level atomic primitives should be preferred where
3352 Non-temporal load/store builtins
3353 --------------------------------
3355 Clang provides overloaded builtins allowing generation of non-temporal memory
3360 T __builtin_nontemporal_load(T *addr);
3361 void __builtin_nontemporal_store(T value, T *addr);
3363 The types ``T`` currently supported are:
3366 * Floating-point types.
3369 Note that the compiler does not guarantee that non-temporal loads or stores
3372 C++ Coroutines support builtins
3373 --------------------------------
3376 This is a work in progress. Compatibility across Clang/LLVM releases is not
3379 Clang provides experimental builtins to support C++ Coroutines as defined by
3380 https://wg21.link/P0057. The following four are intended to be used by the
3381 standard library to implement the ``std::coroutine_handle`` type.
3387 void __builtin_coro_resume(void *addr);
3388 void __builtin_coro_destroy(void *addr);
3389 bool __builtin_coro_done(void *addr);
3390 void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
3396 template <> struct coroutine_handle<void> {
3397 void resume() const { __builtin_coro_resume(ptr); }
3398 void destroy() const { __builtin_coro_destroy(ptr); }
3399 bool done() const { return __builtin_coro_done(ptr); }
3405 template <typename Promise> struct coroutine_handle : coroutine_handle<> {
3407 Promise &promise() const {
3408 return *reinterpret_cast<Promise *>(
3409 __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
3411 static coroutine_handle from_promise(Promise &promise) {
3413 p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
3414 /*from-promise=*/true);
3420 Other coroutine builtins are either for internal clang use or for use during
3421 development of the coroutine feature. See `Coroutines in LLVM
3422 <https://llvm.org/docs/Coroutines.html#intrinsics>`_ for
3423 more information on their semantics. Note that builtins matching the intrinsics
3424 that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,
3425 llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to
3426 an appropriate value during the emission.
3432 size_t __builtin_coro_size()
3433 void *__builtin_coro_frame()
3434 void *__builtin_coro_free(void *coro_frame)
3436 void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
3437 bool __builtin_coro_alloc()
3438 void *__builtin_coro_begin(void *memory)
3439 void __builtin_coro_end(void *coro_frame, bool unwind)
3440 char __builtin_coro_suspend(bool final)
3442 Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM
3443 automatically will insert one if the first argument to `llvm.coro.suspend` is
3444 token `none`. If a user calls `__builin_suspend`, clang will insert `token none`
3445 as the first argument to the intrinsic.
3447 Source location builtins
3448 ------------------------
3450 Clang provides builtins to support C++ standard library implementation
3451 of ``std::source_location`` as specified in C++20. With the exception
3452 of ``__builtin_COLUMN``, these builtins are also implemented by GCC.
3458 const char *__builtin_FILE();
3459 const char *__builtin_FUNCTION();
3460 unsigned __builtin_LINE();
3461 unsigned __builtin_COLUMN(); // Clang only
3462 const std::source_location::__impl *__builtin_source_location();
3468 void my_assert(bool pred, int line = __builtin_LINE(), // Captures line of caller
3469 const char* file = __builtin_FILE(),
3470 const char* function = __builtin_FUNCTION()) {
3472 printf("%s:%d assertion failed in function %s\n", file, line, function);
3476 struct MyAggregateType {
3478 int line = __builtin_LINE(); // captures line where aggregate initialization occurs
3480 static_assert(MyAggregateType{42}.line == __LINE__);
3482 struct MyClassType {
3483 int line = __builtin_LINE(); // captures line of the constructor used during initialization
3484 constexpr MyClassType(int) { assert(line == __LINE__); }
3489 The builtins ``__builtin_LINE``, ``__builtin_FUNCTION``, and ``__builtin_FILE``
3490 return the values, at the "invocation point", for ``__LINE__``,
3491 ``__FUNCTION__``, and ``__FILE__`` respectively. ``__builtin_COLUMN`` similarly
3492 returns the column, though there is no corresponding macro. These builtins are
3493 constant expressions.
3495 When the builtins appear as part of a default function argument the invocation
3496 point is the location of the caller. When the builtins appear as part of a
3497 default member initializer, the invocation point is the location of the
3498 constructor or aggregate initialization used to create the object. Otherwise
3499 the invocation point is the same as the location of the builtin.
3501 When the invocation point of ``__builtin_FUNCTION`` is not a function scope the
3502 empty string is returned.
3504 The builtin ``__builtin_source_location`` returns a pointer to constant static
3505 data of type ``std::source_location::__impl``. This type must have already been
3506 defined, and must contain exactly four fields: ``const char *_M_file_name``,
3507 ``const char *_M_function_name``, ``<any-integral-type> _M_line``, and
3508 ``<any-integral-type> _M_column``. The fields will be populated in the same
3509 manner as the above four builtins, except that ``_M_function_name`` is populated
3510 with ``__PRETTY_FUNCTION__`` rather than ``__FUNCTION__``.
3515 Clang provides builtins to support checking and adjusting alignment of
3516 pointers and integers.
3517 These builtins can be used to avoid relying on implementation-defined behavior
3518 of arithmetic on integers derived from pointers.
3519 Additionally, these builtins retain type information and, unlike bitwise
3520 arithmetic, they can perform semantic checking on the alignment value.
3526 Type __builtin_align_up(Type value, size_t alignment);
3527 Type __builtin_align_down(Type value, size_t alignment);
3528 bool __builtin_is_aligned(Type value, size_t alignment);
3535 char* global_alloc_buffer;
3536 void* my_aligned_allocator(size_t alloc_size, size_t alignment) {
3537 char* result = __builtin_align_up(global_alloc_buffer, alignment);
3538 // result now contains the value of global_alloc_buffer rounded up to the
3539 // next multiple of alignment.
3540 global_alloc_buffer = result + alloc_size;
3544 void* get_start_of_page(void* ptr) {
3545 return __builtin_align_down(ptr, PAGE_SIZE);
3548 void example(char* buffer) {
3549 if (__builtin_is_aligned(buffer, 64)) {
3550 do_fast_aligned_copy(buffer);
3552 do_unaligned_copy(buffer);
3556 // In addition to pointers, the builtins can also be used on integer types
3557 // and are evaluatable inside constant expressions.
3558 static_assert(__builtin_align_up(123, 64) == 128, "");
3559 static_assert(__builtin_align_down(123u, 64) == 64u, "");
3560 static_assert(!__builtin_is_aligned(123, 64), "");
3565 The builtins ``__builtin_align_up``, ``__builtin_align_down``, return their
3566 first argument aligned up/down to the next multiple of the second argument.
3567 If the value is already sufficiently aligned, it is returned unchanged.
3568 The builtin ``__builtin_is_aligned`` returns whether the first argument is
3569 aligned to a multiple of the second argument.
3570 All of these builtins expect the alignment to be expressed as a number of bytes.
3572 These builtins can be used for all integer types as well as (non-function)
3573 pointer types. For pointer types, these builtins operate in terms of the integer
3574 address of the pointer and return a new pointer of the same type (including
3575 qualifiers such as ``const``) with an adjusted address.
3576 When aligning pointers up or down, the resulting value must be within the same
3577 underlying allocation or one past the end (see C17 6.5.6p8, C++ [expr.add]).
3578 This means that arbitrary integer values stored in pointer-type variables must
3579 not be passed to these builtins. For those use cases, the builtins can still be
3580 used, but the operation must be performed on the pointer cast to ``uintptr_t``.
3582 If Clang can determine that the alignment is not a power of two at compile time,
3583 it will result in a compilation failure. If the alignment argument is not a
3584 power of two at run time, the behavior of these builtins is undefined.
3586 Non-standard C++11 Attributes
3587 =============================
3589 Clang's non-standard C++11 attributes live in the ``clang`` attribute
3592 Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
3593 are accepted with the ``__attribute__((foo))`` syntax are also accepted as
3594 ``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
3595 (see the list of `GCC function attributes
3596 <https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
3597 attributes <https://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
3598 `GCC type attributes
3599 <https://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
3600 implementation, these attributes must appertain to the *declarator-id* in a
3601 declaration, which means they must go either at the start of the declaration or
3602 immediately after the name being declared.
3604 For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
3605 also applies the GNU ``noreturn`` attribute to ``f``.
3609 [[gnu::unused]] int a, f [[gnu::noreturn]] ();
3611 Target-Specific Extensions
3612 ==========================
3614 Clang supports some language features conditionally on some targets.
3616 ARM/AArch64 Language Extensions
3617 -------------------------------
3619 Memory Barrier Intrinsics
3620 ^^^^^^^^^^^^^^^^^^^^^^^^^
3621 Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
3622 in the `ARM C Language Extensions Release 2.0
3623 <http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
3624 Note that these intrinsics are implemented as motion barriers that block
3625 reordering of memory accesses and side effect instructions. Other instructions
3626 like simple arithmetic may be reordered around the intrinsic. If you expect to
3627 have no reordering at all, use inline assembly instead.
3629 X86/X86-64 Language Extensions
3630 ------------------------------
3632 The X86 backend has these language extensions:
3634 Memory references to specified segments
3635 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
3637 Annotating a pointer with address space #256 causes it to be code generated
3638 relative to the X86 GS segment register, address space #257 causes it to be
3639 relative to the X86 FS segment, and address space #258 causes it to be
3640 relative to the X86 SS segment. Note that this is a very very low-level
3641 feature that should only be used if you know what you're doing (for example in
3648 #define GS_RELATIVE __attribute__((address_space(256)))
3649 int foo(int GS_RELATIVE *P) {
3653 Which compiles to (on X86-32):
3659 movl %gs:(%eax), %eax
3662 You can also use the GCC compatibility macros ``__seg_fs`` and ``__seg_gs`` for
3663 the same purpose. The preprocessor symbols ``__SEG_FS`` and ``__SEG_GS``
3664 indicate their support.
3666 PowerPC Language Extensions
3667 ---------------------------
3669 Set the Floating Point Rounding Mode
3670 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
3671 PowerPC64/PowerPC64le supports the builtin function ``__builtin_setrnd`` to set
3672 the floating point rounding mode. This function will use the least significant
3673 two bits of integer argument to set the floating point rounding mode.
3677 double __builtin_setrnd(int mode);
3679 The effective values for mode are:
3681 - 0 - round to nearest
3683 - 2 - round to +infinity
3684 - 3 - round to -infinity
3686 Note that the mode argument will modulo 4, so if the integer argument is greater
3687 than 3, it will only use the least significant two bits of the mode.
3688 Namely, ``__builtin_setrnd(102))`` is equal to ``__builtin_setrnd(2)``.
3690 PowerPC cache builtins
3691 ^^^^^^^^^^^^^^^^^^^^^^
3693 The PowerPC architecture specifies instructions implementing cache operations.
3694 Clang provides builtins that give direct programmer access to these cache
3697 Currently the following builtins are implemented in clang:
3699 ``__builtin_dcbf`` copies the contents of a modified block from the data cache
3700 to main memory and flushes the copy from the data cache.
3706 void __dcbf(const void* addr); /* Data Cache Block Flush */
3713 __builtin_dcbf (&a);
3715 Extensions for Static Analysis
3716 ==============================
3718 Clang supports additional attributes that are useful for documenting program
3719 invariants and rules for static analysis tools, such as the `Clang Static
3720 Analyzer <https://clang-analyzer.llvm.org/>`_. These attributes are documented
3721 in the analyzer's `list of source-level annotations
3722 <https://clang-analyzer.llvm.org/annotations.html>`_.
3725 Extensions for Dynamic Analysis
3726 ===============================
3728 Use ``__has_feature(address_sanitizer)`` to check if the code is being built
3729 with :doc:`AddressSanitizer`.
3731 Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
3732 with :doc:`ThreadSanitizer`.
3734 Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
3735 with :doc:`MemorySanitizer`.
3737 Use ``__has_feature(dataflow_sanitizer)`` to check if the code is being built
3738 with :doc:`DataFlowSanitizer`.
3740 Use ``__has_feature(safe_stack)`` to check if the code is being built
3741 with :doc:`SafeStack`.
3744 Extensions for selectively disabling optimization
3745 =================================================
3747 Clang provides a mechanism for selectively disabling optimizations in functions
3750 To disable optimizations in a single function definition, the GNU-style or C++11
3751 non-standard attribute ``optnone`` can be used.
3755 // The following functions will not be optimized.
3756 // GNU-style attribute
3757 __attribute__((optnone)) int foo() {
3761 [[clang::optnone]] int bar() {
3765 To facilitate disabling optimization for a range of function definitions, a
3766 range-based pragma is provided. Its syntax is ``#pragma clang optimize``
3767 followed by ``off`` or ``on``.
3769 All function definitions in the region between an ``off`` and the following
3770 ``on`` will be decorated with the ``optnone`` attribute unless doing so would
3771 conflict with explicit attributes already present on the function (e.g. the
3772 ones that control inlining).
3776 #pragma clang optimize off
3777 // This function will be decorated with optnone.
3782 // optnone conflicts with always_inline, so bar() will not be decorated.
3783 __attribute__((always_inline)) int bar() {
3786 #pragma clang optimize on
3788 If no ``on`` is found to close an ``off`` region, the end of the region is the
3789 end of the compilation unit.
3791 Note that a stray ``#pragma clang optimize on`` does not selectively enable
3792 additional optimizations when compiling at low optimization levels. This feature
3793 can only be used to selectively disable optimizations.
3795 The pragma has an effect on functions only at the point of their definition; for
3796 function templates, this means that the state of the pragma at the point of an
3797 instantiation is not necessarily relevant. Consider the following example:
3801 template<typename T> T twice(T t) {
3805 #pragma clang optimize off
3806 template<typename T> T thrice(T t) {
3810 int container(int a, int b) {
3811 return twice(a) + thrice(b);
3813 #pragma clang optimize on
3815 In this example, the definition of the template function ``twice`` is outside
3816 the pragma region, whereas the definition of ``thrice`` is inside the region.
3817 The ``container`` function is also in the region and will not be optimized, but
3818 it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
3819 these two instantiations, ``twice`` will be optimized (because its definition
3820 was outside the region) and ``thrice`` will not be optimized.
3822 Clang also implements MSVC's range-based pragma,
3823 ``#pragma optimize("[optimization-list]", on | off)``. At the moment, Clang only
3824 supports an empty optimization list, whereas MSVC supports the arguments, ``s``,
3825 ``g``, ``t``, and ``y``. Currently, the implementation of ``pragma optimize`` behaves
3826 the same as ``#pragma clang optimize``. All functions
3827 between ``off`` and ``on`` will be decorated with the ``optnone`` attribute.
3831 #pragma optimize("", off)
3832 // This function will be decorated with optnone.
3835 #pragma optimize("", on)
3836 // This function will be optimized with whatever was specified on
3840 // This will warn with Clang's current implementation.
3841 #pragma optimize("g", on)
3844 For MSVC, an empty optimization list and ``off`` parameter will turn off
3845 all optimizations, ``s``, ``g``, ``t``, and ``y``. An empty optimization and
3846 ``on`` parameter will reset the optimizations to the ones specified on the
3849 .. list-table:: Parameters (unsupported by Clang)
3852 - Type of optimization
3856 - Short or fast sequences of machine code
3858 - Enable frame pointers
3860 Extensions for loop hint optimizations
3861 ======================================
3863 The ``#pragma clang loop`` directive is used to specify hints for optimizing the
3864 subsequent for, while, do-while, or c++11 range-based for loop. The directive
3865 provides options for vectorization, interleaving, predication, unrolling and
3866 distribution. Loop hints can be specified before any loop and will be ignored if
3867 the optimization is not safe to apply.
3869 There are loop hints that control transformations (e.g. vectorization, loop
3870 unrolling) and there are loop hints that set transformation options (e.g.
3871 ``vectorize_width``, ``unroll_count``). Pragmas setting transformation options
3872 imply the transformation is enabled, as if it was enabled via the corresponding
3873 transformation pragma (e.g. ``vectorize(enable)``). If the transformation is
3874 disabled (e.g. ``vectorize(disable)``), that takes precedence over
3875 transformations option pragmas implying that transformation.
3877 Vectorization, Interleaving, and Predication
3878 --------------------------------------------
3880 A vectorized loop performs multiple iterations of the original loop
3881 in parallel using vector instructions. The instruction set of the target
3882 processor determines which vector instructions are available and their vector
3883 widths. This restricts the types of loops that can be vectorized. The vectorizer
3884 automatically determines if the loop is safe and profitable to vectorize. A
3885 vector instruction cost model is used to select the vector width.
3887 Interleaving multiple loop iterations allows modern processors to further
3888 improve instruction-level parallelism (ILP) using advanced hardware features,
3889 such as multiple execution units and out-of-order execution. The vectorizer uses
3890 a cost model that depends on the register pressure and generated code size to
3891 select the interleaving count.
3893 Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
3894 by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
3895 manually enable vectorization or interleaving.
3899 #pragma clang loop vectorize(enable)
3900 #pragma clang loop interleave(enable)
3905 The vector width is specified by
3906 ``vectorize_width(_value_[, fixed|scalable])``, where _value_ is a positive
3907 integer and the type of vectorization can be specified with an optional
3908 second parameter. The default for the second parameter is 'fixed' and
3909 refers to fixed width vectorization, whereas 'scalable' indicates the
3910 compiler should use scalable vectors instead. Another use of vectorize_width
3911 is ``vectorize_width(fixed|scalable)`` where the user can hint at the type
3912 of vectorization to use without specifying the exact width. In both variants
3913 of the pragma the vectorizer may decide to fall back on fixed width
3914 vectorization if the target does not support scalable vectors.
3916 The interleave count is specified by ``interleave_count(_value_)``, where
3917 _value_ is a positive integer. This is useful for specifying the optimal
3918 width/count of the set of target architectures supported by your application.
3922 #pragma clang loop vectorize_width(2)
3923 #pragma clang loop interleave_count(2)
3928 Specifying a width/count of 1 disables the optimization, and is equivalent to
3929 ``vectorize(disable)`` or ``interleave(disable)``.
3931 Vector predication is enabled by ``vectorize_predicate(enable)``, for example:
3935 #pragma clang loop vectorize(enable)
3936 #pragma clang loop vectorize_predicate(enable)
3941 This predicates (masks) all instructions in the loop, which allows the scalar
3942 remainder loop (the tail) to be folded into the main vectorized loop. This
3943 might be more efficient when vector predication is efficiently supported by the
3949 Unrolling a loop reduces the loop control overhead and exposes more
3950 opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
3951 eliminates the loop and replaces it with an enumerated sequence of loop
3952 iterations. Full unrolling is only possible if the loop trip count is known at
3953 compile time. Partial unrolling replicates the loop body within the loop and
3954 reduces the trip count.
3956 If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the
3957 loop if the trip count is known at compile time. If the fully unrolled code size
3958 is greater than an internal limit the loop will be partially unrolled up to this
3959 limit. If the trip count is not known at compile time the loop will be partially
3960 unrolled with a heuristically chosen unroll factor.
3964 #pragma clang loop unroll(enable)
3969 If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
3970 loop if the trip count is known at compile time identically to
3971 ``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled
3972 if the loop count is not known at compile time.
3976 #pragma clang loop unroll(full)
3981 The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
3982 _value_ is a positive integer. If this value is greater than the trip count the
3983 loop will be fully unrolled. Otherwise the loop is partially unrolled subject
3984 to the same code size limit as with ``unroll(enable)``.
3988 #pragma clang loop unroll_count(8)
3993 Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
3995 Loop unroll parameters can be controlled by options
3996 `-mllvm -unroll-count=n` and `-mllvm -pragma-unroll-threshold=n`.
4001 Loop Distribution allows splitting a loop into multiple loops. This is
4002 beneficial for example when the entire loop cannot be vectorized but some of the
4003 resulting loops can.
4005 If ``distribute(enable))`` is specified and the loop has memory dependencies
4006 that inhibit vectorization, the compiler will attempt to isolate the offending
4007 operations into a new loop. This optimization is not enabled by default, only
4008 loops marked with the pragma are considered.
4012 #pragma clang loop distribute(enable)
4013 for (i = 0; i < N; ++i) {
4014 S1: A[i + 1] = A[i] + B[i];
4015 S2: C[i] = D[i] * E[i];
4018 This loop will be split into two loops between statements S1 and S2. The
4019 second loop containing S2 will be vectorized.
4021 Loop Distribution is currently not enabled by default in the optimizer because
4022 it can hurt performance in some cases. For example, instruction-level
4023 parallelism could be reduced by sequentializing the execution of the
4024 statements S1 and S2 above.
4026 If Loop Distribution is turned on globally with
4027 ``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can
4028 be used the disable it on a per-loop basis.
4030 Additional Information
4031 ----------------------
4033 For convenience multiple loop hints can be specified on a single line.
4037 #pragma clang loop vectorize_width(4) interleave_count(8)
4042 If an optimization cannot be applied any hints that apply to it will be ignored.
4043 For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
4044 proven safe to vectorize. To identify and diagnose optimization issues use
4045 `-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
4046 user guide for details.
4048 Extensions to specify floating-point flags
4049 ====================================================
4051 The ``#pragma clang fp`` pragma allows floating-point options to be specified
4052 for a section of the source code. This pragma can only appear at file scope or
4053 at the start of a compound statement (excluding comments). When using within a
4054 compound statement, the pragma is active within the scope of the compound
4057 Currently, the following settings can be controlled with this pragma:
4059 ``#pragma clang fp reassociate`` allows control over the reassociation
4060 of floating point expressions. When enabled, this pragma allows the expression
4061 ``x + (y + z)`` to be reassociated as ``(x + y) + z``.
4062 Reassociation can also occur across multiple statements.
4063 This pragma can be used to disable reassociation when it is otherwise
4064 enabled for the translation unit with the ``-fassociative-math`` flag.
4065 The pragma can take two values: ``on`` and ``off``.
4069 float f(float x, float y, float z)
4071 // Enable floating point reassociation across statements
4072 #pragma clang fp reassociate(on)
4078 ``#pragma clang fp contract`` specifies whether the compiler should
4079 contract a multiply and an addition (or subtraction) into a fused FMA
4080 operation when supported by the target.
4082 The pragma can take three values: ``on``, ``fast`` and ``off``. The ``on``
4083 option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows
4084 fusion as specified the language standard. The ``fast`` option allows fusion
4085 in cases when the language standard does not make this possible (e.g. across
4091 #pragma clang fp contract(fast)
4097 The pragma can also be used with ``off`` which turns FP contraction off for a
4098 section of the code. This can be useful when fast contraction is otherwise
4099 enabled for the translation unit with the ``-ffp-contract=fast-honor-pragmas`` flag.
4100 Note that ``-ffp-contract=fast`` will override pragmas to fuse multiply and
4101 addition across statements regardless of any controlling pragmas.
4103 ``#pragma clang fp exceptions`` specifies floating point exception behavior. It
4104 may take one of the values: ``ignore``, ``maytrap`` or ``strict``. Meaning of
4105 these values is same as for `constrained floating point intrinsics <http://llvm.org/docs/LangRef.html#constrained-floating-point-intrinsics>`_.
4110 // Preserve floating point exceptions
4111 #pragma clang fp exceptions(strict)
4113 if (fetestexcept(FE_OVERFLOW))
4117 A ``#pragma clang fp`` pragma may contain any number of options:
4121 void func(float *dest, float a, float b) {
4122 #pragma clang fp exceptions(maytrap) contract(fast) reassociate(on)
4126 ``#pragma clang fp eval_method`` allows floating-point behavior to be specified
4127 for a section of the source code. This pragma can appear at file or namespace
4128 scope, or at the start of a compound statement (excluding comments).
4129 The pragma is active within the scope of the compound statement.
4131 When ``pragma clang fp eval_method(source)`` is enabled, the section of code
4132 governed by the pragma behaves as though the command-line option
4133 ``-ffp-eval-method=source`` is enabled. Rounds intermediate results to
4134 source-defined precision.
4136 When ``pragma clang fp eval_method(double)`` is enabled, the section of code
4137 governed by the pragma behaves as though the command-line option
4138 ``-ffp-eval-method=double`` is enabled. Rounds intermediate results to
4139 ``double`` precision.
4141 When ``pragma clang fp eval_method(extended)`` is enabled, the section of code
4142 governed by the pragma behaves as though the command-line option
4143 ``-ffp-eval-method=extended`` is enabled. Rounds intermediate results to
4144 target-dependent ``long double`` precision. In Win32 programming, for instance,
4145 the long double data type maps to the double, 64-bit precision data type.
4147 The full syntax this pragma supports is
4148 ``#pragma clang fp eval_method(source|double|extended)``.
4153 // The compiler will use long double as the floating-point evaluation
4155 #pragma clang fp eval_method(extended)
4156 a = b[i] * c[i] + e;
4159 The ``#pragma float_control`` pragma allows precise floating-point
4160 semantics and floating-point exception behavior to be specified
4161 for a section of the source code. This pragma can only appear at file or
4162 namespace scope, within a language linkage specification or at the start of a
4163 compound statement (excluding comments). When used within a compound statement,
4164 the pragma is active within the scope of the compound statement. This pragma
4165 is modeled after a Microsoft pragma with the same spelling and syntax. For
4166 pragmas specified at file or namespace scope, or within a language linkage
4167 specification, a stack is supported so that the ``pragma float_control``
4168 settings can be pushed or popped.
4170 When ``pragma float_control(precise, on)`` is enabled, the section of code
4171 governed by the pragma uses precise floating point semantics, effectively
4172 ``-ffast-math`` is disabled and ``-ffp-contract=on``
4173 (fused multiply add) is enabled.
4175 When ``pragma float_control(except, on)`` is enabled, the section of code
4176 governed by the pragma behaves as though the command-line option
4177 ``-ffp-exception-behavior=strict`` is enabled,
4178 when ``pragma float_control(except, off)`` is enabled, the section of code
4179 governed by the pragma behaves as though the command-line option
4180 ``-ffp-exception-behavior=ignore`` is enabled.
4182 The full syntax this pragma supports is
4183 ``float_control(except|precise, on|off [, push])`` and
4184 ``float_control(push|pop)``.
4185 The ``push`` and ``pop`` forms, including using ``push`` as the optional
4186 third argument, can only occur at file scope.
4191 // This block will be compiled with -fno-fast-math and -ffp-contract=on
4192 #pragma float_control(precise, on)
4193 a = b[i] * c[i] + e;
4196 Specifying an attribute for multiple declarations (#pragma clang attribute)
4197 ===========================================================================
4199 The ``#pragma clang attribute`` directive can be used to apply an attribute to
4200 multiple declarations. The ``#pragma clang attribute push`` variation of the
4201 directive pushes a new "scope" of ``#pragma clang attribute`` that attributes
4202 can be added to. The ``#pragma clang attribute (...)`` variation adds an
4203 attribute to that scope, and the ``#pragma clang attribute pop`` variation pops
4204 the scope. You can also use ``#pragma clang attribute push (...)``, which is a
4205 shorthand for when you want to add one attribute to a new scope. Multiple push
4206 directives can be nested inside each other.
4208 The attributes that are used in the ``#pragma clang attribute`` directives
4209 can be written using the GNU-style syntax:
4213 #pragma clang attribute push (__attribute__((annotate("custom"))), apply_to = function)
4215 void function(); // The function now has the annotate("custom") attribute
4217 #pragma clang attribute pop
4219 The attributes can also be written using the C++11 style syntax:
4223 #pragma clang attribute push ([[noreturn]], apply_to = function)
4225 void function(); // The function now has the [[noreturn]] attribute
4227 #pragma clang attribute pop
4229 The ``__declspec`` style syntax is also supported:
4233 #pragma clang attribute push (__declspec(dllexport), apply_to = function)
4235 void function(); // The function now has the __declspec(dllexport) attribute
4237 #pragma clang attribute pop
4239 A single push directive can contain multiple attributes, however,
4240 only one syntax style can be used within a single directive:
4244 #pragma clang attribute push ([[noreturn, noinline]], apply_to = function)
4246 void function1(); // The function now has the [[noreturn]] and [[noinline]] attributes
4248 #pragma clang attribute pop
4250 #pragma clang attribute push (__attribute((noreturn, noinline)), apply_to = function)
4252 void function2(); // The function now has the __attribute((noreturn)) and __attribute((noinline)) attributes
4254 #pragma clang attribute pop
4256 Because multiple push directives can be nested, if you're writing a macro that
4257 expands to ``_Pragma("clang attribute")`` it's good hygiene (though not
4258 required) to add a namespace to your push/pop directives. A pop directive with a
4259 namespace will pop the innermost push that has that same namespace. This will
4260 ensure that another macro's ``pop`` won't inadvertently pop your attribute. Note
4261 that an ``pop`` without a namespace will pop the innermost ``push`` without a
4262 namespace. ``push``es with a namespace can only be popped by ``pop`` with the
4263 same namespace. For instance:
4267 #define ASSUME_NORETURN_BEGIN _Pragma("clang attribute AssumeNoreturn.push ([[noreturn]], apply_to = function)")
4268 #define ASSUME_NORETURN_END _Pragma("clang attribute AssumeNoreturn.pop")
4270 #define ASSUME_UNAVAILABLE_BEGIN _Pragma("clang attribute Unavailable.push (__attribute__((unavailable)), apply_to=function)")
4271 #define ASSUME_UNAVAILABLE_END _Pragma("clang attribute Unavailable.pop")
4274 ASSUME_NORETURN_BEGIN
4275 ASSUME_UNAVAILABLE_BEGIN
4276 void function(); // function has [[noreturn]] and __attribute__((unavailable))
4278 void other_function(); // function has __attribute__((unavailable))
4279 ASSUME_UNAVAILABLE_END
4281 Without the namespaces on the macros, ``other_function`` will be annotated with
4282 ``[[noreturn]]`` instead of ``__attribute__((unavailable))``. This may seem like
4283 a contrived example, but its very possible for this kind of situation to appear
4284 in real code if the pragmas are spread out across a large file. You can test if
4285 your version of clang supports namespaces on ``#pragma clang attribute`` with
4286 ``__has_extension(pragma_clang_attribute_namespaces)``.
4291 The set of declarations that receive a single attribute from the attribute stack
4292 depends on the subject match rules that were specified in the pragma. Subject
4293 match rules are specified after the attribute. The compiler expects an
4294 identifier that corresponds to the subject set specifier. The ``apply_to``
4295 specifier is currently the only supported subject set specifier. It allows you
4296 to specify match rules that form a subset of the attribute's allowed subject
4297 set, i.e. the compiler doesn't require all of the attribute's subjects. For
4298 example, an attribute like ``[[nodiscard]]`` whose subject set includes
4299 ``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at
4300 least one of these rules after ``apply_to``:
4304 #pragma clang attribute push([[nodiscard]], apply_to = enum)
4306 enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]]
4308 struct Record1 { }; // The struct will *not* receive [[nodiscard]]
4310 #pragma clang attribute pop
4312 #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))
4314 enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]]
4316 struct Record2 { }; // The struct *will* receive [[nodiscard]]
4318 #pragma clang attribute pop
4320 // This is an error, since [[nodiscard]] can't be applied to namespaces:
4321 #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))
4323 #pragma clang attribute pop
4325 Multiple match rules can be specified using the ``any`` match rule, as shown
4326 in the example above. The ``any`` rule applies attributes to all declarations
4327 that are matched by at least one of the rules in the ``any``. It doesn't nest
4328 and can't be used inside the other match rules. Redundant match rules or rules
4329 that conflict with one another should not be used inside of ``any``. Failing to
4330 specify a rule within the ``any`` rule results in an error.
4332 Clang supports the following match rules:
4334 - ``function``: Can be used to apply attributes to functions. This includes C++
4335 member functions, static functions, operators, and constructors/destructors.
4337 - ``function(is_member)``: Can be used to apply attributes to C++ member
4338 functions. This includes members like static functions, operators, and
4339 constructors/destructors.
4341 - ``hasType(functionType)``: Can be used to apply attributes to functions, C++
4342 member functions, and variables/fields whose type is a function pointer. It
4343 does not apply attributes to Objective-C methods or blocks.
4345 - ``type_alias``: Can be used to apply attributes to ``typedef`` declarations
4346 and C++11 type aliases.
4348 - ``record``: Can be used to apply attributes to ``struct``, ``class``, and
4349 ``union`` declarations.
4351 - ``record(unless(is_union))``: Can be used to apply attributes only to
4352 ``struct`` and ``class`` declarations.
4354 - ``enum``: Can be be used to apply attributes to enumeration declarations.
4356 - ``enum_constant``: Can be used to apply attributes to enumerators.
4358 - ``variable``: Can be used to apply attributes to variables, including
4359 local variables, parameters, global variables, and static member variables.
4360 It does not apply attributes to instance member variables or Objective-C
4363 - ``variable(is_thread_local)``: Can be used to apply attributes to thread-local
4366 - ``variable(is_global)``: Can be used to apply attributes to global variables
4369 - ``variable(is_local)``: Can be used to apply attributes to local variables
4372 - ``variable(is_parameter)``: Can be used to apply attributes to parameters
4375 - ``variable(unless(is_parameter))``: Can be used to apply attributes to all
4376 the variables that are not parameters.
4378 - ``field``: Can be used to apply attributes to non-static member variables
4379 in a record. This includes Objective-C ivars.
4381 - ``namespace``: Can be used to apply attributes to ``namespace`` declarations.
4383 - ``objc_interface``: Can be used to apply attributes to ``@interface``
4386 - ``objc_protocol``: Can be used to apply attributes to ``@protocol``
4389 - ``objc_category``: Can be used to apply attributes to category declarations,
4390 including class extensions.
4392 - ``objc_method``: Can be used to apply attributes to Objective-C methods,
4393 including instance and class methods. Implicit methods like implicit property
4394 getters and setters do not receive the attribute.
4396 - ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C
4399 - ``objc_property``: Can be used to apply attributes to ``@property``
4402 - ``block``: Can be used to apply attributes to block declarations. This does
4403 not include variables/fields of block pointer type.
4405 The use of ``unless`` in match rules is currently restricted to a strict set of
4406 sub-rules that are used by the supported attributes. That means that even though
4407 ``variable(unless(is_parameter))`` is a valid match rule,
4408 ``variable(unless(is_thread_local))`` is not.
4410 Supported Attributes
4411 --------------------
4413 Not all attributes can be used with the ``#pragma clang attribute`` directive.
4414 Notably, statement attributes like ``[[fallthrough]]`` or type attributes
4415 like ``address_space`` aren't supported by this directive. You can determine
4416 whether or not an attribute is supported by the pragma by referring to the
4417 :doc:`individual documentation for that attribute <AttributeReference>`.
4419 The attributes are applied to all matching declarations individually, even when
4420 the attribute is semantically incorrect. The attributes that aren't applied to
4421 any declaration are not verified semantically.
4423 Specifying section names for global objects (#pragma clang section)
4424 ===================================================================
4426 The ``#pragma clang section`` directive provides a means to assign section-names
4427 to global variables, functions and static variables.
4429 The section names can be specified as:
4433 #pragma clang section bss="myBSS" data="myData" rodata="myRodata" relro="myRelro" text="myText"
4435 The section names can be reverted back to default name by supplying an empty
4436 string to the section kind, for example:
4440 #pragma clang section bss="" data="" text="" rodata="" relro=""
4442 The ``#pragma clang section`` directive obeys the following rules:
4444 * The pragma applies to all global variable, statics and function declarations
4445 from the pragma to the end of the translation unit.
4447 * The pragma clang section is enabled automatically, without need of any flags.
4449 * This feature is only defined to work sensibly for ELF targets.
4451 * If section name is specified through _attribute_((section("myname"))), then
4452 the attribute name gains precedence.
4454 * Global variables that are initialized to zero will be placed in the named
4455 bss section, if one is present.
4457 * The ``#pragma clang section`` directive does not does try to infer section-kind
4458 from the name. For example, naming a section "``.bss.mySec``" does NOT mean
4459 it will be a bss section name.
4461 * The decision about which section-kind applies to each global is taken in the back-end.
4462 Once the section-kind is known, appropriate section name, as specified by the user using
4463 ``#pragma clang section`` directive, is applied to that global.
4465 Specifying Linker Options on ELF Targets
4466 ========================================
4468 The ``#pragma comment(lib, ...)`` directive is supported on all ELF targets.
4469 The second parameter is the library name (without the traditional Unix prefix of
4470 ``lib``). This allows you to provide an implicit link of dependent libraries.
4472 Evaluating Object Size Dynamically
4473 ==================================
4475 Clang supports the builtin ``__builtin_dynamic_object_size``, the semantics are
4476 the same as GCC's ``__builtin_object_size`` (which Clang also supports), but
4477 ``__builtin_dynamic_object_size`` can evaluate the object's size at runtime.
4478 ``__builtin_dynamic_object_size`` is meant to be used as a drop-in replacement
4479 for ``__builtin_object_size`` in libraries that support it.
4481 For instance, here is a program that ``__builtin_dynamic_object_size`` will make
4486 void copy_into_buffer(size_t size) {
4487 char* buffer = malloc(size);
4488 strlcpy(buffer, "some string", strlen("some string"));
4489 // Previous line preprocesses to:
4490 // __builtin___strlcpy_chk(buffer, "some string", strlen("some string"), __builtin_object_size(buffer, 0))
4493 Since the size of ``buffer`` can't be known at compile time, Clang will fold
4494 ``__builtin_object_size(buffer, 0)`` into ``-1``. However, if this was written
4495 as ``__builtin_dynamic_object_size(buffer, 0)``, Clang will fold it into
4496 ``size``, providing some extra runtime safety.
4501 Clang supports the pragma ``#pragma clang deprecated``, which can be used to
4502 provide deprecation warnings for macro uses. For example:
4506 #define MIN(x, y) x < y ? x : y
4507 #pragma clang deprecated(MIN, "use std::min instead")
4509 void min(int a, int b) {
4510 return MIN(a, b); // warning: MIN is deprecated: use std::min instead
4513 ``#pragma clang deprecated`` should be preferred for this purpose over
4514 ``#pragma GCC warning`` because the warning can be controlled with
4517 Restricted Expansion Macros
4518 ===========================
4520 Clang supports the pragma ``#pragma clang restrict_expansion``, which can be
4521 used restrict macro expansion in headers. This can be valuable when providing
4522 headers with ABI stability requirements. Any expansion of the annotated macro
4523 processed by the preprocessor after the ``#pragma`` annotation will log a
4524 warning. Redefining the macro or undefining the macro will not be diagnosed, nor
4525 will expansion of the macro within the main source file. For example:
4529 #define TARGET_ARM 1
4530 #pragma clang restrict_expansion(TARGET_ARM, "<reason>")
4534 #if TARGET_ARM // warning: TARGET_ARM is marked unsafe in headers: <reason>
4543 #if TARGET_ARM // No warning in main source file
4549 This warning is controlled by ``-Wpedantic-macros``.
4554 Clang supports the pragma ``#pragma clang final``, which can be used to
4555 mark macros as final, meaning they cannot be undef'd or re-defined. For example:
4559 #define FINAL_MACRO 1
4560 #pragma clang final(FINAL_MACRO)
4562 #define FINAL_MACRO // warning: FINAL_MACRO is marked final and should not be redefined
4563 #undef FINAL_MACRO // warning: FINAL_MACRO is marked final and should not be undefined
4565 This is useful for enforcing system-provided macros that should not be altered
4566 in user headers or code. This is controlled by ``-Wpedantic-macros``. Final
4567 macros will always warn on redefinition, including situations with identical
4568 bodies and in system headers.
4573 Clang supports an extension for source line control, which takes the
4574 form of a preprocessor directive starting with an unsigned integral
4575 constant. In addition to the standard ``#line`` directive, this form
4576 allows control of an include stack and header file type, which is used
4577 in issuing diagnostics. These lines are emitted in preprocessed
4582 # <line:number> <filename:string> <header-type:numbers>
4584 The filename is optional, and if unspecified indicates no change in
4585 source filename. The header-type is an optional, whitespace-delimited,
4586 sequence of magic numbers as follows.
4588 * ``1:`` Push the current source file name onto the include stack and
4591 * ``2``: Pop the include stack and return to the specified file. If
4592 the filename is ``""``, the name popped from the include stack is
4593 used. Otherwise there is no requirement that the specified filename
4594 matches the current source when originally pushed.
4596 * ``3``: Enter a system-header region. System headers often contain
4597 implementation-specific source that would normally emit a diagnostic.
4599 * ``4``: Enter an implicit ``extern "C"`` region. This is not required on
4600 modern systems where system headers are C++-aware.
4602 At most a single ``1`` or ``2`` can be present, and values must be in
4609 # 57 // Advance (or return) to line 57 of the current source file
4610 # 57 "frob" // Set to line 57 of "frob"
4611 # 1 "foo.h" 1 // Enter "foo.h" at line 1
4612 # 59 "main.c" 2 // Leave current include and return to "main.c"
4613 # 1 "/usr/include/stdio.h" 1 3 // Enter a system header
4614 # 60 "" 2 // return to "main.c"
4615 # 1 "/usr/ancient/header.h" 1 4 // Enter an implicit extern "C" header
4617 Extended Integer Types
4618 ======================
4620 Clang supports the C23 ``_BitInt(N)`` feature as an extension in older C modes
4621 and in C++. This type was previously implemented in Clang with the same
4622 semantics, but spelled ``_ExtInt(N)``. This spelling has been deprecated in
4623 favor of the standard type.
4625 Note: the ABI for ``_BitInt(N)`` is still in the process of being stabilized,
4626 so this type should not yet be used in interfaces that require ABI stability.
4628 Intrinsics Support within Constant Expressions
4629 ==============================================
4631 The following builtin intrinsics can be used in constant expressions:
4633 * ``__builtin_bitreverse8``
4634 * ``__builtin_bitreverse16``
4635 * ``__builtin_bitreverse32``
4636 * ``__builtin_bitreverse64``
4637 * ``__builtin_bswap16``
4638 * ``__builtin_bswap32``
4639 * ``__builtin_bswap64``
4640 * ``__builtin_clrsb``
4641 * ``__builtin_clrsbl``
4642 * ``__builtin_clrsbll``
4644 * ``__builtin_clzl``
4645 * ``__builtin_clzll``
4646 * ``__builtin_clzs``
4648 * ``__builtin_ctzl``
4649 * ``__builtin_ctzll``
4650 * ``__builtin_ctzs``
4652 * ``__builtin_ffsl``
4653 * ``__builtin_ffsll``
4654 * ``__builtin_fpclassify``
4656 * ``__builtin_isinf``
4657 * ``__builtin_isinf_sign``
4658 * ``__builtin_isfinite``
4659 * ``__builtin_isnan``
4660 * ``__builtin_isnormal``
4662 * ``__builtin_nans``
4663 * ``__builtin_parity``
4664 * ``__builtin_parityl``
4665 * ``__builtin_parityll``
4666 * ``__builtin_popcount``
4667 * ``__builtin_popcountl``
4668 * ``__builtin_popcountll``
4669 * ``__builtin_rotateleft8``
4670 * ``__builtin_rotateleft16``
4671 * ``__builtin_rotateleft32``
4672 * ``__builtin_rotateleft64``
4673 * ``__builtin_rotateright8``
4674 * ``__builtin_rotateright16``
4675 * ``__builtin_rotateright32``
4676 * ``__builtin_rotateright64``
4678 The following x86-specific intrinsics can be used in constant expressions:
4680 * ``_bit_scan_forward``
4681 * ``_bit_scan_reverse``
4694 * ``_mm_popcnt_u32``
4695 * ``_mm_popcnt_u64``