1=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6   :local:
7   :depth: 1
8
9.. toctree::
10   :hidden:
11
12   ObjectiveCLiterals
13   BlockLanguageSpec
14   Block-ABI-Apple
15   AutomaticReferenceCounting
16   MatrixTypes
17
18Introduction
19============
20
21This document describes the language extensions provided by Clang.  In addition
22to the language extensions listed here, Clang aims to support a broad range of
23GCC extensions.  Please see the `GCC manual
24<https://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
25these extensions.
26
27.. _langext-feature_check:
28
29Feature Checking Macros
30=======================
31
32Language extensions can be very useful, but only if you know you can depend on
33them.  In order to allow fine-grain features checks, we support three builtin
34function-like macros.  This allows you to directly test for a feature in your
35code without having to resort to something like autoconf or fragile "compiler
36version checks".
37
38``__has_builtin``
39-----------------
40
41This function-like macro takes a single identifier argument that is the name of
42a builtin function, a builtin pseudo-function (taking one or more type
43arguments), or a builtin template.
44It evaluates to 1 if the builtin is supported or 0 if not.
45It can be used like this:
46
47.. code-block:: c++
48
49  #ifndef __has_builtin         // Optional of course.
50    #define __has_builtin(x) 0  // Compatibility with non-clang compilers.
51  #endif
52
53  ...
54  #if __has_builtin(__builtin_trap)
55    __builtin_trap();
56  #else
57    abort();
58  #endif
59  ...
60
61.. note::
62
63  Prior to Clang 10, ``__has_builtin`` could not be used to detect most builtin
64  pseudo-functions.
65
66  ``__has_builtin`` should not be used to detect support for a builtin macro;
67  use ``#ifdef`` instead.
68
69.. _langext-__has_feature-__has_extension:
70
71``__has_feature`` and ``__has_extension``
72-----------------------------------------
73
74These function-like macros take a single identifier argument that is the name
75of a feature.  ``__has_feature`` evaluates to 1 if the feature is both
76supported by Clang and standardized in the current language standard or 0 if
77not (but see :ref:`below <langext-has-feature-back-compat>`), while
78``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
79current language (either as a language extension or a standard language
80feature) or 0 if not.  They can be used like this:
81
82.. code-block:: c++
83
84  #ifndef __has_feature         // Optional of course.
85    #define __has_feature(x) 0  // Compatibility with non-clang compilers.
86  #endif
87  #ifndef __has_extension
88    #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
89  #endif
90
91  ...
92  #if __has_feature(cxx_rvalue_references)
93  // This code will only be compiled with the -std=c++11 and -std=gnu++11
94  // options, because rvalue references are only standardized in C++11.
95  #endif
96
97  #if __has_extension(cxx_rvalue_references)
98  // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
99  // and -std=gnu++98 options, because rvalue references are supported as a
100  // language extension in C++98.
101  #endif
102
103.. _langext-has-feature-back-compat:
104
105For backward compatibility, ``__has_feature`` can also be used to test
106for support for non-standardized features, i.e. features not prefixed ``c_``,
107``cxx_`` or ``objc_``.
108
109Another use of ``__has_feature`` is to check for compiler features not related
110to the language standard, such as e.g. :doc:`AddressSanitizer
111<AddressSanitizer>`.
112
113If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
114to ``__has_feature``.
115
116The feature tag is described along with the language feature below.
117
118The feature name or extension name can also be specified with a preceding and
119following ``__`` (double underscore) to avoid interference from a macro with
120the same name.  For instance, ``__cxx_rvalue_references__`` can be used instead
121of ``cxx_rvalue_references``.
122
123``__has_cpp_attribute``
124-----------------------
125
126This function-like macro is available in C++20 by default, and is provided as an
127extension in earlier language standards. It takes a single argument that is the
128name of a double-square-bracket-style attribute. The argument can either be a
129single identifier or a scoped identifier. If the attribute is supported, a
130nonzero value is returned. If the attribute is a standards-based attribute, this
131macro returns a nonzero value based on the year and month in which the attribute
132was voted into the working draft. See `WG21 SD-6
133<https://isocpp.org/std/standing-documents/sd-6-sg10-feature-test-recommendations>`_
134for the list of values returned for standards-based attributes. If the attribute
135is not supported by the current compliation target, this macro evaluates to 0.
136It can be used like this:
137
138.. code-block:: c++
139
140  #ifndef __has_cpp_attribute         // For backwards compatibility
141    #define __has_cpp_attribute(x) 0
142  #endif
143
144  ...
145  #if __has_cpp_attribute(clang::fallthrough)
146  #define FALLTHROUGH [[clang::fallthrough]]
147  #else
148  #define FALLTHROUGH
149  #endif
150  ...
151
152The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
153the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
154of these namespaces can be specified with a preceding and following ``__``
155(double underscore) to avoid interference from a macro with the same name. For
156instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
157
158``__has_c_attribute``
159---------------------
160
161This function-like macro takes a single argument that is the name of an
162attribute exposed with the double square-bracket syntax in C mode. The argument
163can either be a single identifier or a scoped identifier. If the attribute is
164supported, a nonzero value is returned. If the attribute is not supported by the
165current compilation target, this macro evaluates to 0. It can be used like this:
166
167.. code-block:: c
168
169  #ifndef __has_c_attribute         // Optional of course.
170    #define __has_c_attribute(x) 0  // Compatibility with non-clang compilers.
171  #endif
172
173  ...
174  #if __has_c_attribute(fallthrough)
175    #define FALLTHROUGH [[fallthrough]]
176  #else
177    #define FALLTHROUGH
178  #endif
179  ...
180
181The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
182the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
183of these namespaces can be specified with a preceding and following ``__``
184(double underscore) to avoid interference from a macro with the same name. For
185instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
186
187``__has_attribute``
188-------------------
189
190This function-like macro takes a single identifier argument that is the name of
191a GNU-style attribute.  It evaluates to 1 if the attribute is supported by the
192current compilation target, or 0 if not.  It can be used like this:
193
194.. code-block:: c++
195
196  #ifndef __has_attribute         // Optional of course.
197    #define __has_attribute(x) 0  // Compatibility with non-clang compilers.
198  #endif
199
200  ...
201  #if __has_attribute(always_inline)
202  #define ALWAYS_INLINE __attribute__((always_inline))
203  #else
204  #define ALWAYS_INLINE
205  #endif
206  ...
207
208The attribute name can also be specified with a preceding and following ``__``
209(double underscore) to avoid interference from a macro with the same name.  For
210instance, ``__always_inline__`` can be used instead of ``always_inline``.
211
212
213``__has_declspec_attribute``
214----------------------------
215
216This function-like macro takes a single identifier argument that is the name of
217an attribute implemented as a Microsoft-style ``__declspec`` attribute.  It
218evaluates to 1 if the attribute is supported by the current compilation target,
219or 0 if not.  It can be used like this:
220
221.. code-block:: c++
222
223  #ifndef __has_declspec_attribute         // Optional of course.
224    #define __has_declspec_attribute(x) 0  // Compatibility with non-clang compilers.
225  #endif
226
227  ...
228  #if __has_declspec_attribute(dllexport)
229  #define DLLEXPORT __declspec(dllexport)
230  #else
231  #define DLLEXPORT
232  #endif
233  ...
234
235The attribute name can also be specified with a preceding and following ``__``
236(double underscore) to avoid interference from a macro with the same name.  For
237instance, ``__dllexport__`` can be used instead of ``dllexport``.
238
239``__is_identifier``
240-------------------
241
242This function-like macro takes a single identifier argument that might be either
243a reserved word or a regular identifier. It evaluates to 1 if the argument is just
244a regular identifier and not a reserved word, in the sense that it can then be
245used as the name of a user-defined function or variable. Otherwise it evaluates
246to 0.  It can be used like this:
247
248.. code-block:: c++
249
250  ...
251  #ifdef __is_identifier          // Compatibility with non-clang compilers.
252    #if __is_identifier(__wchar_t)
253      typedef wchar_t __wchar_t;
254    #endif
255  #endif
256
257  __wchar_t WideCharacter;
258  ...
259
260Include File Checking Macros
261============================
262
263Not all developments systems have the same include files.  The
264:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
265you to check for the existence of an include file before doing a possibly
266failing ``#include`` directive.  Include file checking macros must be used
267as expressions in ``#if`` or ``#elif`` preprocessing directives.
268
269.. _langext-__has_include:
270
271``__has_include``
272-----------------
273
274This function-like macro takes a single file name string argument that is the
275name of an include file.  It evaluates to 1 if the file can be found using the
276include paths, or 0 otherwise:
277
278.. code-block:: c++
279
280  // Note the two possible file name string formats.
281  #if __has_include("myinclude.h") && __has_include(<stdint.h>)
282  # include "myinclude.h"
283  #endif
284
285To test for this feature, use ``#if defined(__has_include)``:
286
287.. code-block:: c++
288
289  // To avoid problem with non-clang compilers not having this macro.
290  #if defined(__has_include)
291  #if __has_include("myinclude.h")
292  # include "myinclude.h"
293  #endif
294  #endif
295
296.. _langext-__has_include_next:
297
298``__has_include_next``
299----------------------
300
301This function-like macro takes a single file name string argument that is the
302name of an include file.  It is like ``__has_include`` except that it looks for
303the second instance of the given file found in the include paths.  It evaluates
304to 1 if the second instance of the file can be found using the include paths,
305or 0 otherwise:
306
307.. code-block:: c++
308
309  // Note the two possible file name string formats.
310  #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
311  # include_next "myinclude.h"
312  #endif
313
314  // To avoid problem with non-clang compilers not having this macro.
315  #if defined(__has_include_next)
316  #if __has_include_next("myinclude.h")
317  # include_next "myinclude.h"
318  #endif
319  #endif
320
321Note that ``__has_include_next``, like the GNU extension ``#include_next``
322directive, is intended for use in headers only, and will issue a warning if
323used in the top-level compilation file.  A warning will also be issued if an
324absolute path is used in the file argument.
325
326``__has_warning``
327-----------------
328
329This function-like macro takes a string literal that represents a command line
330option for a warning and returns true if that is a valid warning option.
331
332.. code-block:: c++
333
334  #if __has_warning("-Wformat")
335  ...
336  #endif
337
338.. _languageextensions-builtin-macros:
339
340Builtin Macros
341==============
342
343``__BASE_FILE__``
344  Defined to a string that contains the name of the main input file passed to
345  Clang.
346
347``__FILE_NAME__``
348  Clang-specific extension that functions similar to ``__FILE__`` but only
349  renders the last path component (the filename) instead of an invocation
350  dependent full path to that file.
351
352``__COUNTER__``
353  Defined to an integer value that starts at zero and is incremented each time
354  the ``__COUNTER__`` macro is expanded.
355
356``__INCLUDE_LEVEL__``
357  Defined to an integral value that is the include depth of the file currently
358  being translated.  For the main file, this value is zero.
359
360``__TIMESTAMP__``
361  Defined to the date and time of the last modification of the current source
362  file.
363
364``__clang__``
365  Defined when compiling with Clang
366
367``__clang_major__``
368  Defined to the major marketing version number of Clang (e.g., the 2 in
369  2.0.1).  Note that marketing version numbers should not be used to check for
370  language features, as different vendors use different numbering schemes.
371  Instead, use the :ref:`langext-feature_check`.
372
373``__clang_minor__``
374  Defined to the minor version number of Clang (e.g., the 0 in 2.0.1).  Note
375  that marketing version numbers should not be used to check for language
376  features, as different vendors use different numbering schemes.  Instead, use
377  the :ref:`langext-feature_check`.
378
379``__clang_patchlevel__``
380  Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
381
382``__clang_version__``
383  Defined to a string that captures the Clang marketing version, including the
384  Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
385
386.. _langext-vectors:
387
388Vectors and Extended Vectors
389============================
390
391Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
392
393OpenCL vector types are created using the ``ext_vector_type`` attribute.  It
394supports the ``V.xyzw`` syntax and other tidbits as seen in OpenCL.  An example
395is:
396
397.. code-block:: c++
398
399  typedef float float4 __attribute__((ext_vector_type(4)));
400  typedef float float2 __attribute__((ext_vector_type(2)));
401
402  float4 foo(float2 a, float2 b) {
403    float4 c;
404    c.xz = a;
405    c.yw = b;
406    return c;
407  }
408
409Query for this feature with ``__has_attribute(ext_vector_type)``.
410
411Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax
412and functions.  For example:
413
414.. code-block:: c++
415
416  vector float foo(vector int a) {
417    vector int b;
418    b = vec_add(a, a) + a;
419    return (vector float)b;
420  }
421
422NEON vector types are created using ``neon_vector_type`` and
423``neon_polyvector_type`` attributes.  For example:
424
425.. code-block:: c++
426
427  typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
428  typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
429
430  int8x8_t foo(int8x8_t a) {
431    int8x8_t v;
432    v = a;
433    return v;
434  }
435
436Vector Literals
437---------------
438
439Vector literals can be used to create vectors from a set of scalars, or
440vectors.  Either parentheses or braces form can be used.  In the parentheses
441form the number of literal values specified must be one, i.e. referring to a
442scalar value, or must match the size of the vector type being created.  If a
443single scalar literal value is specified, the scalar literal value will be
444replicated to all the components of the vector type.  In the brackets form any
445number of literals can be specified.  For example:
446
447.. code-block:: c++
448
449  typedef int v4si __attribute__((__vector_size__(16)));
450  typedef float float4 __attribute__((ext_vector_type(4)));
451  typedef float float2 __attribute__((ext_vector_type(2)));
452
453  v4si vsi = (v4si){1, 2, 3, 4};
454  float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
455  vector int vi1 = (vector int)(1);    // vi1 will be (1, 1, 1, 1).
456  vector int vi2 = (vector int){1};    // vi2 will be (1, 0, 0, 0).
457  vector int vi3 = (vector int)(1, 2); // error
458  vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
459  vector int vi5 = (vector int)(1, 2, 3, 4);
460  float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
461
462Vector Operations
463-----------------
464
465The table below shows the support for each operation by vector extension.  A
466dash indicates that an operation is not accepted according to a corresponding
467specification.
468
469============================== ======= ======= ============= =======
470         Operator              OpenCL  AltiVec     GCC        NEON
471============================== ======= ======= ============= =======
472[]                               yes     yes       yes         --
473unary operators +, --            yes     yes       yes         --
474++, -- --                        yes     yes       yes         --
475+,--,*,/,%                       yes     yes       yes         --
476bitwise operators &,|,^,~        yes     yes       yes         --
477>>,<<                            yes     yes       yes         --
478!, &&, ||                        yes     --        yes         --
479==, !=, >, <, >=, <=             yes     yes       yes         --
480=                                yes     yes       yes         yes
481?: [#]_                          yes     --        yes         --
482sizeof                           yes     yes       yes         yes
483C-style cast                     yes     yes       yes         no
484reinterpret_cast                 yes     no        yes         no
485static_cast                      yes     no        yes         no
486const_cast                       no      no        no          no
487============================== ======= ======= ============= =======
488
489See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
490
491.. [#] ternary operator(?:) has different behaviors depending on condition
492  operand's vector type. If the condition is a GNU vector (i.e. __vector_size__),
493  it's only available in C++ and uses normal bool conversions (that is, != 0).
494  If it's an extension (OpenCL) vector, it's only available in C and OpenCL C.
495  And it selects base on signedness of the condition operands (OpenCL v1.1 s6.3.9).
496
497Matrix Types
498============
499
500Clang provides an extension for matrix types, which is currently being
501implemented. See :ref:`the draft specification <matrixtypes>` for more details.
502
503For example, the code below uses the matrix types extension to multiply two 4x4
504float matrices and add the result to a third 4x4 matrix.
505
506.. code-block:: c++
507
508  typedef float m4x4_t __attribute__((matrix_type(4, 4)));
509
510  m4x4_t f(m4x4_t a, m4x4_t b, m4x4_t c) {
511    return a + b * c;
512  }
513
514
515Half-Precision Floating Point
516=============================
517
518Clang supports three half-precision (16-bit) floating point types: ``__fp16``,
519``_Float16`` and ``__bf16``.  These types are supported in all language modes.
520
521``__fp16`` is supported on every target, as it is purely a storage format; see below.
522``_Float16`` is currently only supported on the following targets, with further
523targets pending ABI standardization:
524
525* 32-bit ARM
526* 64-bit ARM (AArch64)
527* SPIR
528
529``_Float16`` will be supported on more targets as they define ABIs for it.
530
531``__bf16`` is purely a storage format; it is currently only supported on the following targets:
532* 32-bit ARM
533* 64-bit ARM (AArch64)
534
535The ``__bf16`` type is only available when supported in hardware.
536
537``__fp16`` is a storage and interchange format only.  This means that values of
538``__fp16`` are immediately promoted to (at least) ``float`` when used in arithmetic
539operations, so that e.g. the result of adding two ``__fp16`` values has type ``float``.
540The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE <http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_).
541Clang uses the ``binary16`` format from IEEE 754-2008 for ``__fp16``, not the ARM
542alternative format.
543
544``_Float16`` is an extended floating-point type.  This means that, just like arithmetic on
545``float`` or ``double``, arithmetic on ``_Float16`` operands is formally performed in the
546``_Float16`` type, so that e.g. the result of adding two ``_Float16`` values has type
547``_Float16``.  The behavior of ``_Float16`` is specified by ISO/IEC TS 18661-3:2015
548("Floating-point extensions for C").  As with ``__fp16``, Clang uses the ``binary16``
549format from IEEE 754-2008 for ``_Float16``.
550
551``_Float16`` arithmetic will be performed using native half-precision support
552when available on the target (e.g. on ARMv8.2a); otherwise it will be performed
553at a higher precision (currently always ``float``) and then truncated down to
554``_Float16``.  Note that C and C++ allow intermediate floating-point operands
555of an expression to be computed with greater precision than is expressible in
556their type, so Clang may avoid intermediate truncations in certain cases; this may
557lead to results that are inconsistent with native arithmetic.
558
559It is recommended that portable code use ``_Float16`` instead of ``__fp16``,
560as it has been defined by the C standards committee and has behavior that is
561more familiar to most programmers.
562
563Because ``__fp16`` operands are always immediately promoted to ``float``, the
564common real type of ``__fp16`` and ``_Float16`` for the purposes of the usual
565arithmetic conversions is ``float``.
566
567A literal can be given ``_Float16`` type using the suffix ``f16``. For example,
568``3.14f16``.
569
570Because default argument promotion only applies to the standard floating-point
571types, ``_Float16`` values are not promoted to ``double`` when passed as variadic
572or untyped arguments.  As a consequence, some caution must be taken when using
573certain library facilities with ``_Float16``; for example, there is no ``printf`` format
574specifier for ``_Float16``, and (unlike ``float``) it will not be implicitly promoted to
575``double`` when passed to ``printf``, so the programmer must explicitly cast it to
576``double`` before using it with an ``%f`` or similar specifier.
577
578Messages on ``deprecated`` and ``unavailable`` Attributes
579=========================================================
580
581An optional string message can be added to the ``deprecated`` and
582``unavailable`` attributes.  For example:
583
584.. code-block:: c++
585
586  void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
587
588If the deprecated or unavailable declaration is used, the message will be
589incorporated into the appropriate diagnostic:
590
591.. code-block:: none
592
593  harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
594        [-Wdeprecated-declarations]
595    explode();
596    ^
597
598Query for this feature with
599``__has_extension(attribute_deprecated_with_message)`` and
600``__has_extension(attribute_unavailable_with_message)``.
601
602Attributes on Enumerators
603=========================
604
605Clang allows attributes to be written on individual enumerators.  This allows
606enumerators to be deprecated, made unavailable, etc.  The attribute must appear
607after the enumerator name and before any initializer, like so:
608
609.. code-block:: c++
610
611  enum OperationMode {
612    OM_Invalid,
613    OM_Normal,
614    OM_Terrified __attribute__((deprecated)),
615    OM_AbortOnError __attribute__((deprecated)) = 4
616  };
617
618Attributes on the ``enum`` declaration do not apply to individual enumerators.
619
620Query for this feature with ``__has_extension(enumerator_attributes)``.
621
622'User-Specified' System Frameworks
623==================================
624
625Clang provides a mechanism by which frameworks can be built in such a way that
626they will always be treated as being "system frameworks", even if they are not
627present in a system framework directory.  This can be useful to system
628framework developers who want to be able to test building other applications
629with development builds of their framework, including the manner in which the
630compiler changes warning behavior for system headers.
631
632Framework developers can opt-in to this mechanism by creating a
633"``.system_framework``" file at the top-level of their framework.  That is, the
634framework should have contents like:
635
636.. code-block:: none
637
638  .../TestFramework.framework
639  .../TestFramework.framework/.system_framework
640  .../TestFramework.framework/Headers
641  .../TestFramework.framework/Headers/TestFramework.h
642  ...
643
644Clang will treat the presence of this file as an indicator that the framework
645should be treated as a system framework, regardless of how it was found in the
646framework search path.  For consistency, we recommend that such files never be
647included in installed versions of the framework.
648
649Checks for Standard Language Features
650=====================================
651
652The ``__has_feature`` macro can be used to query if certain standard language
653features are enabled.  The ``__has_extension`` macro can be used to query if
654language features are available as an extension when compiling for a standard
655which does not provide them.  The features which can be tested are listed here.
656
657Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
658These are macros with names of the form ``__cpp_<feature_name>``, and are
659intended to be a portable way to query the supported features of the compiler.
660See `the C++ status page <https://clang.llvm.org/cxx_status.html#ts>`_ for
661information on the version of SD-6 supported by each Clang release, and the
662macros provided by that revision of the recommendations.
663
664C++98
665-----
666
667The features listed below are part of the C++98 standard.  These features are
668enabled by default when compiling C++ code.
669
670C++ exceptions
671^^^^^^^^^^^^^^
672
673Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
674enabled.  For example, compiling code with ``-fno-exceptions`` disables C++
675exceptions.
676
677C++ RTTI
678^^^^^^^^
679
680Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled.  For
681example, compiling code with ``-fno-rtti`` disables the use of RTTI.
682
683C++11
684-----
685
686The features listed below are part of the C++11 standard.  As a result, all
687these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
688when compiling C++ code.
689
690C++11 SFINAE includes access control
691^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
692
693Use ``__has_feature(cxx_access_control_sfinae)`` or
694``__has_extension(cxx_access_control_sfinae)`` to determine whether
695access-control errors (e.g., calling a private constructor) are considered to
696be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
697<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
698
699C++11 alias templates
700^^^^^^^^^^^^^^^^^^^^^
701
702Use ``__has_feature(cxx_alias_templates)`` or
703``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
704alias declarations and alias templates is enabled.
705
706C++11 alignment specifiers
707^^^^^^^^^^^^^^^^^^^^^^^^^^
708
709Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
710determine if support for alignment specifiers using ``alignas`` is enabled.
711
712Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to
713determine if support for the ``alignof`` keyword is enabled.
714
715C++11 attributes
716^^^^^^^^^^^^^^^^
717
718Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
719determine if support for attribute parsing with C++11's square bracket notation
720is enabled.
721
722C++11 generalized constant expressions
723^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
724
725Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
726constant expressions (e.g., ``constexpr``) is enabled.
727
728C++11 ``decltype()``
729^^^^^^^^^^^^^^^^^^^^
730
731Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
732determine if support for the ``decltype()`` specifier is enabled.  C++11's
733``decltype`` does not require type-completeness of a function call expression.
734Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
735``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
736support for this feature is enabled.
737
738C++11 default template arguments in function templates
739^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
740
741Use ``__has_feature(cxx_default_function_template_args)`` or
742``__has_extension(cxx_default_function_template_args)`` to determine if support
743for default template arguments in function templates is enabled.
744
745C++11 ``default``\ ed functions
746^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
747
748Use ``__has_feature(cxx_defaulted_functions)`` or
749``__has_extension(cxx_defaulted_functions)`` to determine if support for
750defaulted function definitions (with ``= default``) is enabled.
751
752C++11 delegating constructors
753^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
754
755Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
756delegating constructors is enabled.
757
758C++11 ``deleted`` functions
759^^^^^^^^^^^^^^^^^^^^^^^^^^^
760
761Use ``__has_feature(cxx_deleted_functions)`` or
762``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
763function definitions (with ``= delete``) is enabled.
764
765C++11 explicit conversion functions
766^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
767
768Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
769``explicit`` conversion functions is enabled.
770
771C++11 generalized initializers
772^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
773
774Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
775generalized initializers (using braced lists and ``std::initializer_list``) is
776enabled.
777
778C++11 implicit move constructors/assignment operators
779^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
780
781Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
782generate move constructors and move assignment operators where needed.
783
784C++11 inheriting constructors
785^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
786
787Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
788inheriting constructors is enabled.
789
790C++11 inline namespaces
791^^^^^^^^^^^^^^^^^^^^^^^
792
793Use ``__has_feature(cxx_inline_namespaces)`` or
794``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
795namespaces is enabled.
796
797C++11 lambdas
798^^^^^^^^^^^^^
799
800Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
801determine if support for lambdas is enabled.
802
803C++11 local and unnamed types as template arguments
804^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
805
806Use ``__has_feature(cxx_local_type_template_args)`` or
807``__has_extension(cxx_local_type_template_args)`` to determine if support for
808local and unnamed types as template arguments is enabled.
809
810C++11 noexcept
811^^^^^^^^^^^^^^
812
813Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
814determine if support for noexcept exception specifications is enabled.
815
816C++11 in-class non-static data member initialization
817^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
818
819Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
820initialization of non-static data members is enabled.
821
822C++11 ``nullptr``
823^^^^^^^^^^^^^^^^^
824
825Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
826determine if support for ``nullptr`` is enabled.
827
828C++11 ``override control``
829^^^^^^^^^^^^^^^^^^^^^^^^^^
830
831Use ``__has_feature(cxx_override_control)`` or
832``__has_extension(cxx_override_control)`` to determine if support for the
833override control keywords is enabled.
834
835C++11 reference-qualified functions
836^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
837
838Use ``__has_feature(cxx_reference_qualified_functions)`` or
839``__has_extension(cxx_reference_qualified_functions)`` to determine if support
840for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
841applied to ``*this``) is enabled.
842
843C++11 range-based ``for`` loop
844^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
845
846Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
847determine if support for the range-based for loop is enabled.
848
849C++11 raw string literals
850^^^^^^^^^^^^^^^^^^^^^^^^^
851
852Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
853string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
854
855C++11 rvalue references
856^^^^^^^^^^^^^^^^^^^^^^^
857
858Use ``__has_feature(cxx_rvalue_references)`` or
859``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
860references is enabled.
861
862C++11 ``static_assert()``
863^^^^^^^^^^^^^^^^^^^^^^^^^
864
865Use ``__has_feature(cxx_static_assert)`` or
866``__has_extension(cxx_static_assert)`` to determine if support for compile-time
867assertions using ``static_assert`` is enabled.
868
869C++11 ``thread_local``
870^^^^^^^^^^^^^^^^^^^^^^
871
872Use ``__has_feature(cxx_thread_local)`` to determine if support for
873``thread_local`` variables is enabled.
874
875C++11 type inference
876^^^^^^^^^^^^^^^^^^^^
877
878Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
879determine C++11 type inference is supported using the ``auto`` specifier.  If
880this is disabled, ``auto`` will instead be a storage class specifier, as in C
881or C++98.
882
883C++11 strongly typed enumerations
884^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
885
886Use ``__has_feature(cxx_strong_enums)`` or
887``__has_extension(cxx_strong_enums)`` to determine if support for strongly
888typed, scoped enumerations is enabled.
889
890C++11 trailing return type
891^^^^^^^^^^^^^^^^^^^^^^^^^^
892
893Use ``__has_feature(cxx_trailing_return)`` or
894``__has_extension(cxx_trailing_return)`` to determine if support for the
895alternate function declaration syntax with trailing return type is enabled.
896
897C++11 Unicode string literals
898^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
899
900Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
901string literals is enabled.
902
903C++11 unrestricted unions
904^^^^^^^^^^^^^^^^^^^^^^^^^
905
906Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
907unrestricted unions is enabled.
908
909C++11 user-defined literals
910^^^^^^^^^^^^^^^^^^^^^^^^^^^
911
912Use ``__has_feature(cxx_user_literals)`` to determine if support for
913user-defined literals is enabled.
914
915C++11 variadic templates
916^^^^^^^^^^^^^^^^^^^^^^^^
917
918Use ``__has_feature(cxx_variadic_templates)`` or
919``__has_extension(cxx_variadic_templates)`` to determine if support for
920variadic templates is enabled.
921
922C++14
923-----
924
925The features listed below are part of the C++14 standard.  As a result, all
926these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option
927when compiling C++ code.
928
929C++14 binary literals
930^^^^^^^^^^^^^^^^^^^^^
931
932Use ``__has_feature(cxx_binary_literals)`` or
933``__has_extension(cxx_binary_literals)`` to determine whether
934binary literals (for instance, ``0b10010``) are recognized. Clang supports this
935feature as an extension in all language modes.
936
937C++14 contextual conversions
938^^^^^^^^^^^^^^^^^^^^^^^^^^^^
939
940Use ``__has_feature(cxx_contextual_conversions)`` or
941``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules
942are used when performing an implicit conversion for an array bound in a
943*new-expression*, the operand of a *delete-expression*, an integral constant
944expression, or a condition in a ``switch`` statement.
945
946C++14 decltype(auto)
947^^^^^^^^^^^^^^^^^^^^
948
949Use ``__has_feature(cxx_decltype_auto)`` or
950``__has_extension(cxx_decltype_auto)`` to determine if support
951for the ``decltype(auto)`` placeholder type is enabled.
952
953C++14 default initializers for aggregates
954^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
955
956Use ``__has_feature(cxx_aggregate_nsdmi)`` or
957``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
958for default initializers in aggregate members is enabled.
959
960C++14 digit separators
961^^^^^^^^^^^^^^^^^^^^^^
962
963Use ``__cpp_digit_separators`` to determine if support for digit separators
964using single quotes (for instance, ``10'000``) is enabled. At this time, there
965is no corresponding ``__has_feature`` name
966
967C++14 generalized lambda capture
968^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
969
970Use ``__has_feature(cxx_init_captures)`` or
971``__has_extension(cxx_init_captures)`` to determine if support for
972lambda captures with explicit initializers is enabled
973(for instance, ``[n(0)] { return ++n; }``).
974
975C++14 generic lambdas
976^^^^^^^^^^^^^^^^^^^^^
977
978Use ``__has_feature(cxx_generic_lambdas)`` or
979``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
980(polymorphic) lambdas is enabled
981(for instance, ``[] (auto x) { return x + 1; }``).
982
983C++14 relaxed constexpr
984^^^^^^^^^^^^^^^^^^^^^^^
985
986Use ``__has_feature(cxx_relaxed_constexpr)`` or
987``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
988declarations, local variable modification, and control flow constructs
989are permitted in ``constexpr`` functions.
990
991C++14 return type deduction
992^^^^^^^^^^^^^^^^^^^^^^^^^^^
993
994Use ``__has_feature(cxx_return_type_deduction)`` or
995``__has_extension(cxx_return_type_deduction)`` to determine if support
996for return type deduction for functions (using ``auto`` as a return type)
997is enabled.
998
999C++14 runtime-sized arrays
1000^^^^^^^^^^^^^^^^^^^^^^^^^^
1001
1002Use ``__has_feature(cxx_runtime_array)`` or
1003``__has_extension(cxx_runtime_array)`` to determine if support
1004for arrays of runtime bound (a restricted form of variable-length arrays)
1005is enabled.
1006Clang's implementation of this feature is incomplete.
1007
1008C++14 variable templates
1009^^^^^^^^^^^^^^^^^^^^^^^^
1010
1011Use ``__has_feature(cxx_variable_templates)`` or
1012``__has_extension(cxx_variable_templates)`` to determine if support for
1013templated variable declarations is enabled.
1014
1015C11
1016---
1017
1018The features listed below are part of the C11 standard.  As a result, all these
1019features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
1020compiling C code.  Additionally, because these features are all
1021backward-compatible, they are available as extensions in all language modes.
1022
1023C11 alignment specifiers
1024^^^^^^^^^^^^^^^^^^^^^^^^
1025
1026Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
1027if support for alignment specifiers using ``_Alignas`` is enabled.
1028
1029Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine
1030if support for the ``_Alignof`` keyword is enabled.
1031
1032C11 atomic operations
1033^^^^^^^^^^^^^^^^^^^^^
1034
1035Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
1036if support for atomic types using ``_Atomic`` is enabled.  Clang also provides
1037:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
1038the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
1039``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
1040is available.
1041
1042Clang will use the system's ``<stdatomic.h>`` header when one is available, and
1043will otherwise use its own. When using its own, implementations of the atomic
1044operations are provided as macros. In the cases where C11 also requires a real
1045function, this header provides only the declaration of that function (along
1046with a shadowing macro implementation), and you must link to a library which
1047provides a definition of the function if you use it instead of the macro.
1048
1049C11 generic selections
1050^^^^^^^^^^^^^^^^^^^^^^
1051
1052Use ``__has_feature(c_generic_selections)`` or
1053``__has_extension(c_generic_selections)`` to determine if support for generic
1054selections is enabled.
1055
1056As an extension, the C11 generic selection expression is available in all
1057languages supported by Clang.  The syntax is the same as that given in the C11
1058standard.
1059
1060In C, type compatibility is decided according to the rules given in the
1061appropriate standard, but in C++, which lacks the type compatibility rules used
1062in C, types are considered compatible only if they are equivalent.
1063
1064C11 ``_Static_assert()``
1065^^^^^^^^^^^^^^^^^^^^^^^^
1066
1067Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
1068to determine if support for compile-time assertions using ``_Static_assert`` is
1069enabled.
1070
1071C11 ``_Thread_local``
1072^^^^^^^^^^^^^^^^^^^^^
1073
1074Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
1075to determine if support for ``_Thread_local`` variables is enabled.
1076
1077Modules
1078-------
1079
1080Use ``__has_feature(modules)`` to determine if Modules have been enabled.
1081For example, compiling code with ``-fmodules`` enables the use of Modules.
1082
1083More information could be found `here <https://clang.llvm.org/docs/Modules.html>`_.
1084
1085Type Trait Primitives
1086=====================
1087
1088Type trait primitives are special builtin constant expressions that can be used
1089by the standard C++ library to facilitate or simplify the implementation of
1090user-facing type traits in the <type_traits> header.
1091
1092They are not intended to be used directly by user code because they are
1093implementation-defined and subject to change -- as such they're tied closely to
1094the supported set of system headers, currently:
1095
1096* LLVM's own libc++
1097* GNU libstdc++
1098* The Microsoft standard C++ library
1099
1100Clang supports the `GNU C++ type traits
1101<https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
1102`Microsoft Visual C++ type traits
1103<https://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_,
1104as well as nearly all of the
1105`Embarcadero C++ type traits
1106<http://docwiki.embarcadero.com/RADStudio/Rio/en/Type_Trait_Functions_(C%2B%2B11)_Index>`_.
1107
1108The following type trait primitives are supported by Clang. Those traits marked
1109(C++) provide implementations for type traits specified by the C++ standard;
1110``__X(...)`` has the same semantics and constraints as the corresponding
1111``std::X_t<...>`` or ``std::X_v<...>`` type trait.
1112
1113* ``__array_rank(type)`` (Embarcadero):
1114  Returns the number of levels of array in the type ``type``:
1115  ``0`` if ``type`` is not an array type, and
1116  ``__array_rank(element) + 1`` if ``type`` is an array of ``element``.
1117* ``__array_extent(type, dim)`` (Embarcadero):
1118  The ``dim``'th array bound in the type ``type``, or ``0`` if
1119  ``dim >= __array_rank(type)``.
1120* ``__has_nothrow_assign`` (GNU, Microsoft, Embarcadero):
1121  Deprecated, use ``__is_nothrow_assignable`` instead.
1122* ``__has_nothrow_move_assign`` (GNU, Microsoft):
1123  Deprecated, use ``__is_nothrow_assignable`` instead.
1124* ``__has_nothrow_copy`` (GNU, Microsoft):
1125  Deprecated, use ``__is_nothrow_constructible`` instead.
1126* ``__has_nothrow_constructor`` (GNU, Microsoft):
1127  Deprecated, use ``__is_nothrow_constructible`` instead.
1128* ``__has_trivial_assign`` (GNU, Microsoft, Embarcadero):
1129  Deprecated, use ``__is_trivially_assignable`` instead.
1130* ``__has_trivial_move_assign`` (GNU, Microsoft):
1131  Deprecated, use ``__is_trivially_assignable`` instead.
1132* ``__has_trivial_copy`` (GNU, Microsoft):
1133  Deprecated, use ``__is_trivially_constructible`` instead.
1134* ``__has_trivial_constructor`` (GNU, Microsoft):
1135  Deprecated, use ``__is_trivially_constructible`` instead.
1136* ``__has_trivial_move_constructor`` (GNU, Microsoft):
1137  Deprecated, use ``__is_trivially_constructible`` instead.
1138* ``__has_trivial_destructor`` (GNU, Microsoft, Embarcadero):
1139  Deprecated, use ``__is_trivially_destructible`` instead.
1140* ``__has_unique_object_representations`` (C++, GNU)
1141* ``__has_virtual_destructor`` (C++, GNU, Microsoft, Embarcadero)
1142* ``__is_abstract`` (C++, GNU, Microsoft, Embarcadero)
1143* ``__is_aggregate`` (C++, GNU, Microsoft)
1144* ``__is_arithmetic`` (C++, Embarcadero)
1145* ``__is_array`` (C++, Embarcadero)
1146* ``__is_assignable`` (C++, MSVC 2015)
1147* ``__is_base_of`` (C++, GNU, Microsoft, Embarcadero)
1148* ``__is_class`` (C++, GNU, Microsoft, Embarcadero)
1149* ``__is_complete_type(type)`` (Embarcadero):
1150  Return ``true`` if ``type`` is a complete type.
1151  Warning: this trait is dangerous because it can return different values at
1152  different points in the same program.
1153* ``__is_compound`` (C++, Embarcadero)
1154* ``__is_const`` (C++, Embarcadero)
1155* ``__is_constructible`` (C++, MSVC 2013)
1156* ``__is_convertible`` (C++, Embarcadero)
1157* ``__is_convertible_to`` (Microsoft):
1158  Synonym for ``__is_convertible``.
1159* ``__is_destructible`` (C++, MSVC 2013):
1160  Only available in ``-fms-extensions`` mode.
1161* ``__is_empty`` (C++, GNU, Microsoft, Embarcadero)
1162* ``__is_enum`` (C++, GNU, Microsoft, Embarcadero)
1163* ``__is_final`` (C++, GNU, Microsoft)
1164* ``__is_floating_point`` (C++, Embarcadero)
1165* ``__is_function`` (C++, Embarcadero)
1166* ``__is_fundamental`` (C++, Embarcadero)
1167* ``__is_integral`` (C++, Embarcadero)
1168* ``__is_interface_class`` (Microsoft):
1169  Returns ``false``, even for types defined with ``__interface``.
1170* ``__is_literal`` (Clang):
1171  Synonym for ``__is_literal_type``.
1172* ``__is_literal_type`` (C++, GNU, Microsoft):
1173  Note, the corresponding standard trait was deprecated in C++17
1174  and removed in C++20.
1175* ``__is_lvalue_reference`` (C++, Embarcadero)
1176* ``__is_member_object_pointer`` (C++, Embarcadero)
1177* ``__is_member_function_pointer`` (C++, Embarcadero)
1178* ``__is_member_pointer`` (C++, Embarcadero)
1179* ``__is_nothrow_assignable`` (C++, MSVC 2013)
1180* ``__is_nothrow_constructible`` (C++, MSVC 2013)
1181* ``__is_nothrow_destructible`` (C++, MSVC 2013)
1182  Only available in ``-fms-extensions`` mode.
1183* ``__is_object`` (C++, Embarcadero)
1184* ``__is_pod`` (C++, GNU, Microsoft, Embarcadero):
1185  Note, the corresponding standard trait was deprecated in C++20.
1186* ``__is_pointer`` (C++, Embarcadero)
1187* ``__is_polymorphic`` (C++, GNU, Microsoft, Embarcadero)
1188* ``__is_reference`` (C++, Embarcadero)
1189* ``__is_rvalue_reference`` (C++, Embarcadero)
1190* ``__is_same`` (C++, Embarcadero)
1191* ``__is_same_as`` (GCC): Synonym for ``__is_same``.
1192* ``__is_scalar`` (C++, Embarcadero)
1193* ``__is_sealed`` (Microsoft):
1194  Synonym for ``__is_final``.
1195* ``__is_signed`` (C++, Embarcadero):
1196  Returns false for enumeration types, and returns true for floating-point types. Note, before Clang 10, returned true for enumeration types if the underlying type was signed, and returned false for floating-point types.
1197* ``__is_standard_layout`` (C++, GNU, Microsoft, Embarcadero)
1198* ``__is_trivial`` (C++, GNU, Microsoft, Embarcadero)
1199* ``__is_trivially_assignable`` (C++, GNU, Microsoft)
1200* ``__is_trivially_constructible`` (C++, GNU, Microsoft)
1201* ``__is_trivially_copyable`` (C++, GNU, Microsoft)
1202* ``__is_trivially_destructible`` (C++, MSVC 2013)
1203* ``__is_union`` (C++, GNU, Microsoft, Embarcadero)
1204* ``__is_unsigned`` (C++, Embarcadero)
1205  Note that this currently returns true for enumeration types if the underlying
1206  type is unsigned, in violation of the requirements for ``std::is_unsigned``.
1207  This behavior is likely to change in a future version of Clang.
1208* ``__is_void`` (C++, Embarcadero)
1209* ``__is_volatile`` (C++, Embarcadero)
1210* ``__reference_binds_to_temporary(T, U)`` (Clang):  Determines whether a
1211  reference of type ``T`` bound to an expression of type ``U`` would bind to a
1212  materialized temporary object. If ``T`` is not a reference type the result
1213  is false. Note this trait will also return false when the initialization of
1214  ``T`` from ``U`` is ill-formed.
1215* ``__underlying_type`` (C++, GNU, Microsoft)
1216
1217In addition, the following expression traits are supported:
1218
1219* ``__is_lvalue_expr(e)`` (Embarcadero):
1220  Returns true if ``e`` is an lvalue expression.
1221  Deprecated, use ``__is_lvalue_reference(decltype((e)))`` instead.
1222* ``__is_rvalue_expr(e)`` (Embarcadero):
1223  Returns true if ``e`` is a prvalue expression.
1224  Deprecated, use ``!__is_reference(decltype((e)))`` instead.
1225
1226There are multiple ways to detect support for a type trait ``__X`` in the
1227compiler, depending on the oldest version of Clang you wish to support.
1228
1229* From Clang 10 onwards, ``__has_builtin(__X)`` can be used.
1230* From Clang 6 onwards, ``!__is_identifier(__X)`` can be used.
1231* From Clang 3 onwards, ``__has_feature(X)`` can be used, but only supports
1232  the following traits:
1233
1234  * ``__has_nothrow_assign``
1235  * ``__has_nothrow_copy``
1236  * ``__has_nothrow_constructor``
1237  * ``__has_trivial_assign``
1238  * ``__has_trivial_copy``
1239  * ``__has_trivial_constructor``
1240  * ``__has_trivial_destructor``
1241  * ``__has_virtual_destructor``
1242  * ``__is_abstract``
1243  * ``__is_base_of``
1244  * ``__is_class``
1245  * ``__is_constructible``
1246  * ``__is_convertible_to``
1247  * ``__is_empty``
1248  * ``__is_enum``
1249  * ``__is_final``
1250  * ``__is_literal``
1251  * ``__is_standard_layout``
1252  * ``__is_pod``
1253  * ``__is_polymorphic``
1254  * ``__is_sealed``
1255  * ``__is_trivial``
1256  * ``__is_trivially_assignable``
1257  * ``__is_trivially_constructible``
1258  * ``__is_trivially_copyable``
1259  * ``__is_union``
1260  * ``__underlying_type``
1261
1262A simplistic usage example as might be seen in standard C++ headers follows:
1263
1264.. code-block:: c++
1265
1266  #if __has_builtin(__is_convertible_to)
1267  template<typename From, typename To>
1268  struct is_convertible_to {
1269    static const bool value = __is_convertible_to(From, To);
1270  };
1271  #else
1272  // Emulate type trait for compatibility with other compilers.
1273  #endif
1274
1275Blocks
1276======
1277
1278The syntax and high level language feature description is in
1279:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
1280the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
1281
1282Query for this feature with ``__has_extension(blocks)``.
1283
1284ASM Goto with Output Constraints
1285================================
1286
1287In addition to the functionality provided by `GCC's extended
1288assembly <https://gcc.gnu.org/onlinedocs/gcc/Extended-Asm.html>`_, clang
1289supports output constraints with the `goto` form.
1290
1291The goto form of GCC's extended assembly allows the programmer to branch to a C
1292label from within an inline assembly block. Clang extends this behavior by
1293allowing the programmer to use output constraints:
1294
1295.. code-block:: c++
1296
1297  int foo(int x) {
1298      int y;
1299      asm goto("# %0 %1 %l2" : "=r"(y) : "r"(x) : : err);
1300      return y;
1301    err:
1302      return -1;
1303  }
1304
1305It's important to note that outputs are valid only on the "fallthrough" branch.
1306Using outputs on an indirect branch may result in undefined behavior. For
1307example, in the function above, use of the value assigned to `y` in the `err`
1308block is undefined behavior.
1309
1310Query for this feature with ``__has_extension(gnu_asm_goto_with_outputs)``.
1311
1312Objective-C Features
1313====================
1314
1315Related result types
1316--------------------
1317
1318According to Cocoa conventions, Objective-C methods with certain names
1319("``init``", "``alloc``", etc.) always return objects that are an instance of
1320the receiving class's type.  Such methods are said to have a "related result
1321type", meaning that a message send to one of these methods will have the same
1322static type as an instance of the receiver class.  For example, given the
1323following classes:
1324
1325.. code-block:: objc
1326
1327  @interface NSObject
1328  + (id)alloc;
1329  - (id)init;
1330  @end
1331
1332  @interface NSArray : NSObject
1333  @end
1334
1335and this common initialization pattern
1336
1337.. code-block:: objc
1338
1339  NSArray *array = [[NSArray alloc] init];
1340
1341the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1342``alloc`` implicitly has a related result type.  Similarly, the type of the
1343expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1344related result type and its receiver is known to have the type ``NSArray *``.
1345If neither ``alloc`` nor ``init`` had a related result type, the expressions
1346would have had type ``id``, as declared in the method signature.
1347
1348A method with a related result type can be declared by using the type
1349``instancetype`` as its result type.  ``instancetype`` is a contextual keyword
1350that is only permitted in the result type of an Objective-C method, e.g.
1351
1352.. code-block:: objc
1353
1354  @interface A
1355  + (instancetype)constructAnA;
1356  @end
1357
1358The related result type can also be inferred for some methods.  To determine
1359whether a method has an inferred related result type, the first word in the
1360camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1361and the method will have a related result type if its return type is compatible
1362with the type of its class and if:
1363
1364* the first word is "``alloc``" or "``new``", and the method is a class method,
1365  or
1366
1367* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1368  and the method is an instance method.
1369
1370If a method with a related result type is overridden by a subclass method, the
1371subclass method must also return a type that is compatible with the subclass
1372type.  For example:
1373
1374.. code-block:: objc
1375
1376  @interface NSString : NSObject
1377  - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1378  @end
1379
1380Related result types only affect the type of a message send or property access
1381via the given method.  In all other respects, a method with a related result
1382type is treated the same way as method that returns ``id``.
1383
1384Use ``__has_feature(objc_instancetype)`` to determine whether the
1385``instancetype`` contextual keyword is available.
1386
1387Automatic reference counting
1388----------------------------
1389
1390Clang provides support for :doc:`automated reference counting
1391<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
1392for manual ``retain``/``release``/``autorelease`` message sends.  There are three
1393feature macros associated with automatic reference counting:
1394``__has_feature(objc_arc)`` indicates the availability of automated reference
1395counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1396automated reference counting also includes support for ``__weak`` pointers to
1397Objective-C objects. ``__has_feature(objc_arc_fields)`` indicates that C structs
1398are allowed to have fields that are pointers to Objective-C objects managed by
1399automatic reference counting.
1400
1401.. _objc-weak:
1402
1403Weak references
1404---------------
1405
1406Clang supports ARC-style weak and unsafe references in Objective-C even
1407outside of ARC mode.  Weak references must be explicitly enabled with
1408the ``-fobjc-weak`` option; use ``__has_feature((objc_arc_weak))``
1409to test whether they are enabled.  Unsafe references are enabled
1410unconditionally.  ARC-style weak and unsafe references cannot be used
1411when Objective-C garbage collection is enabled.
1412
1413Except as noted below, the language rules for the ``__weak`` and
1414``__unsafe_unretained`` qualifiers (and the ``weak`` and
1415``unsafe_unretained`` property attributes) are just as laid out
1416in the :doc:`ARC specification <AutomaticReferenceCounting>`.
1417In particular, note that some classes do not support forming weak
1418references to their instances, and note that special care must be
1419taken when storing weak references in memory where initialization
1420and deinitialization are outside the responsibility of the compiler
1421(such as in ``malloc``-ed memory).
1422
1423Loading from a ``__weak`` variable always implicitly retains the
1424loaded value.  In non-ARC modes, this retain is normally balanced
1425by an implicit autorelease.  This autorelease can be suppressed
1426by performing the load in the receiver position of a ``-retain``
1427message send (e.g. ``[weakReference retain]``); note that this performs
1428only a single retain (the retain done when primitively loading from
1429the weak reference).
1430
1431For the most part, ``__unsafe_unretained`` in non-ARC modes is just the
1432default behavior of variables and therefore is not needed.  However,
1433it does have an effect on the semantics of block captures: normally,
1434copying a block which captures an Objective-C object or block pointer
1435causes the captured pointer to be retained or copied, respectively,
1436but that behavior is suppressed when the captured variable is qualified
1437with ``__unsafe_unretained``.
1438
1439Note that the ``__weak`` qualifier formerly meant the GC qualifier in
1440all non-ARC modes and was silently ignored outside of GC modes.  It now
1441means the ARC-style qualifier in all non-GC modes and is no longer
1442allowed if not enabled by either ``-fobjc-arc`` or ``-fobjc-weak``.
1443It is expected that ``-fobjc-weak`` will eventually be enabled by default
1444in all non-GC Objective-C modes.
1445
1446.. _objc-fixed-enum:
1447
1448Enumerations with a fixed underlying type
1449-----------------------------------------
1450
1451Clang provides support for C++11 enumerations with a fixed underlying type
1452within Objective-C.  For example, one can write an enumeration type as:
1453
1454.. code-block:: c++
1455
1456  typedef enum : unsigned char { Red, Green, Blue } Color;
1457
1458This specifies that the underlying type, which is used to store the enumeration
1459value, is ``unsigned char``.
1460
1461Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1462underlying types is available in Objective-C.
1463
1464Interoperability with C++11 lambdas
1465-----------------------------------
1466
1467Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1468permitting a lambda to be implicitly converted to a block pointer with the
1469corresponding signature.  For example, consider an API such as ``NSArray``'s
1470array-sorting method:
1471
1472.. code-block:: objc
1473
1474  - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1475
1476``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1477(^)(id, id)``, and parameters of this type are generally provided with block
1478literals as arguments.  However, one can also use a C++11 lambda so long as it
1479provides the same signature (in this case, accepting two parameters of type
1480``id`` and returning an ``NSComparisonResult``):
1481
1482.. code-block:: objc
1483
1484  NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1485                     @"String 02"];
1486  const NSStringCompareOptions comparisonOptions
1487    = NSCaseInsensitiveSearch | NSNumericSearch |
1488      NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1489  NSLocale *currentLocale = [NSLocale currentLocale];
1490  NSArray *sorted
1491    = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1492               NSRange string1Range = NSMakeRange(0, [s1 length]);
1493               return [s1 compare:s2 options:comparisonOptions
1494               range:string1Range locale:currentLocale];
1495       }];
1496  NSLog(@"sorted: %@", sorted);
1497
1498This code relies on an implicit conversion from the type of the lambda
1499expression (an unnamed, local class type called the *closure type*) to the
1500corresponding block pointer type.  The conversion itself is expressed by a
1501conversion operator in that closure type that produces a block pointer with the
1502same signature as the lambda itself, e.g.,
1503
1504.. code-block:: objc
1505
1506  operator NSComparisonResult (^)(id, id)() const;
1507
1508This conversion function returns a new block that simply forwards the two
1509parameters to the lambda object (which it captures by copy), then returns the
1510result.  The returned block is first copied (with ``Block_copy``) and then
1511autoreleased.  As an optimization, if a lambda expression is immediately
1512converted to a block pointer (as in the first example, above), then the block
1513is not copied and autoreleased: rather, it is given the same lifetime as a
1514block literal written at that point in the program, which avoids the overhead
1515of copying a block to the heap in the common case.
1516
1517The conversion from a lambda to a block pointer is only available in
1518Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1519management (autorelease).
1520
1521Object Literals and Subscripting
1522--------------------------------
1523
1524Clang provides support for :doc:`Object Literals and Subscripting
1525<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
1526programming patterns, makes programs more concise, and improves the safety of
1527container creation.  There are several feature macros associated with object
1528literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1529availability of array literals; ``__has_feature(objc_dictionary_literals)``
1530tests the availability of dictionary literals;
1531``__has_feature(objc_subscripting)`` tests the availability of object
1532subscripting.
1533
1534Objective-C Autosynthesis of Properties
1535---------------------------------------
1536
1537Clang provides support for autosynthesis of declared properties.  Using this
1538feature, clang provides default synthesis of those properties not declared
1539@dynamic and not having user provided backing getter and setter methods.
1540``__has_feature(objc_default_synthesize_properties)`` checks for availability
1541of this feature in version of clang being used.
1542
1543.. _langext-objc-retain-release:
1544
1545Objective-C retaining behavior attributes
1546-----------------------------------------
1547
1548In Objective-C, functions and methods are generally assumed to follow the
1549`Cocoa Memory Management
1550<https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1551conventions for ownership of object arguments and
1552return values. However, there are exceptions, and so Clang provides attributes
1553to allow these exceptions to be documented. This are used by ARC and the
1554`static analyzer <https://clang-analyzer.llvm.org>`_ Some exceptions may be
1555better described using the ``objc_method_family`` attribute instead.
1556
1557**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1558``ns_returns_autoreleased``, ``cf_returns_retained``, and
1559``cf_returns_not_retained`` attributes can be placed on methods and functions
1560that return Objective-C or CoreFoundation objects. They are commonly placed at
1561the end of a function prototype or method declaration:
1562
1563.. code-block:: objc
1564
1565  id foo() __attribute__((ns_returns_retained));
1566
1567  - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1568
1569The ``*_returns_retained`` attributes specify that the returned object has a +1
1570retain count.  The ``*_returns_not_retained`` attributes specify that the return
1571object has a +0 retain count, even if the normal convention for its selector
1572would be +1.  ``ns_returns_autoreleased`` specifies that the returned object is
1573+0, but is guaranteed to live at least as long as the next flush of an
1574autorelease pool.
1575
1576**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1577an parameter declaration; they specify that the argument is expected to have a
1578+1 retain count, which will be balanced in some way by the function or method.
1579The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1580method; it specifies that the method expects its ``self`` parameter to have a
1581+1 retain count, which it will balance in some way.
1582
1583.. code-block:: objc
1584
1585  void foo(__attribute__((ns_consumed)) NSString *string);
1586
1587  - (void) bar __attribute__((ns_consumes_self));
1588  - (void) baz:(id) __attribute__((ns_consumed)) x;
1589
1590Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1591<https://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1592
1593Query for these features with ``__has_attribute(ns_consumed)``,
1594``__has_attribute(ns_returns_retained)``, etc.
1595
1596Objective-C @available
1597----------------------
1598
1599It is possible to use the newest SDK but still build a program that can run on
1600older versions of macOS and iOS by passing ``-mmacosx-version-min=`` /
1601``-miphoneos-version-min=``.
1602
1603Before LLVM 5.0, when calling a function that exists only in the OS that's
1604newer than the target OS (as determined by the minimum deployment version),
1605programmers had to carefully check if the function exists at runtime, using
1606null checks for weakly-linked C functions, ``+class`` for Objective-C classes,
1607and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for
1608Objective-C methods.  If such a check was missed, the program would compile
1609fine, run fine on newer systems, but crash on older systems.
1610
1611As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes
1612<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ together
1613with the new ``@available()`` keyword to assist with this issue.
1614When a method that's introduced in the OS newer than the target OS is called, a
1615-Wunguarded-availability warning is emitted if that call is not guarded:
1616
1617.. code-block:: objc
1618
1619  void my_fun(NSSomeClass* var) {
1620    // If fancyNewMethod was added in e.g. macOS 10.12, but the code is
1621    // built with -mmacosx-version-min=10.11, then this unconditional call
1622    // will emit a -Wunguarded-availability warning:
1623    [var fancyNewMethod];
1624  }
1625
1626To fix the warning and to avoid the crash on macOS 10.11, wrap it in
1627``if(@available())``:
1628
1629.. code-block:: objc
1630
1631  void my_fun(NSSomeClass* var) {
1632    if (@available(macOS 10.12, *)) {
1633      [var fancyNewMethod];
1634    } else {
1635      // Put fallback behavior for old macOS versions (and for non-mac
1636      // platforms) here.
1637    }
1638  }
1639
1640The ``*`` is required and means that platforms not explicitly listed will take
1641the true branch, and the compiler will emit ``-Wunguarded-availability``
1642warnings for unlisted platforms based on those platform's deployment target.
1643More than one platform can be listed in ``@available()``:
1644
1645.. code-block:: objc
1646
1647  void my_fun(NSSomeClass* var) {
1648    if (@available(macOS 10.12, iOS 10, *)) {
1649      [var fancyNewMethod];
1650    }
1651  }
1652
1653If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called
1654on 10.12, then add an `availability attribute
1655<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it,
1656which will also suppress the warning and require that calls to my_fun() are
1657checked:
1658
1659.. code-block:: objc
1660
1661  API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) {
1662    [var fancyNewMethod];  // Now ok.
1663  }
1664
1665``@available()`` is only available in Objective-C code.  To use the feature
1666in C and C++ code, use the ``__builtin_available()`` spelling instead.
1667
1668If existing code uses null checks or ``-respondsToSelector:``, it should
1669be changed to use ``@available()`` (or ``__builtin_available``) instead.
1670
1671``-Wunguarded-availability`` is disabled by default, but
1672``-Wunguarded-availability-new``, which only emits this warning for APIs
1673that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and
1674tvOS >= 11, is enabled by default.
1675
1676.. _langext-overloading:
1677
1678Objective-C++ ABI: protocol-qualifier mangling of parameters
1679------------------------------------------------------------
1680
1681Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1682type is a qualified-``id`` (e.g., ``id<Foo>``).  This mangling allows such
1683parameters to be differentiated from those with the regular unqualified ``id``
1684type.
1685
1686This was a non-backward compatible mangling change to the ABI.  This change
1687allows proper overloading, and also prevents mangling conflicts with template
1688parameters of protocol-qualified type.
1689
1690Query the presence of this new mangling with
1691``__has_feature(objc_protocol_qualifier_mangling)``.
1692
1693Initializer lists for complex numbers in C
1694==========================================
1695
1696clang supports an extension which allows the following in C:
1697
1698.. code-block:: c++
1699
1700  #include <math.h>
1701  #include <complex.h>
1702  complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1703
1704This construct is useful because there is no way to separately initialize the
1705real and imaginary parts of a complex variable in standard C, given that clang
1706does not support ``_Imaginary``.  (Clang also supports the ``__real__`` and
1707``__imag__`` extensions from gcc, which help in some cases, but are not usable
1708in static initializers.)
1709
1710Note that this extension does not allow eliding the braces; the meaning of the
1711following two lines is different:
1712
1713.. code-block:: c++
1714
1715  complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1716  complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1717
1718This extension also works in C++ mode, as far as that goes, but does not apply
1719to the C++ ``std::complex``.  (In C++11, list initialization allows the same
1720syntax to be used with ``std::complex`` with the same meaning.)
1721
1722For GCC compatibility, ``__builtin_complex(re, im)`` can also be used to
1723construct a complex number from the given real and imaginary components.
1724
1725Builtin Functions
1726=================
1727
1728Clang supports a number of builtin library functions with the same syntax as
1729GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
1730``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
1731``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc.  In addition to
1732the GCC builtins, Clang supports a number of builtins that GCC does not, which
1733are listed here.
1734
1735Please note that Clang does not and will not support all of the GCC builtins
1736for vector operations.  Instead of using builtins, you should use the functions
1737defined in target-specific header files like ``<xmmintrin.h>``, which define
1738portable wrappers for these.  Many of the Clang versions of these functions are
1739implemented directly in terms of :ref:`extended vector support
1740<langext-vectors>` instead of builtins, in order to reduce the number of
1741builtins that we need to implement.
1742
1743``__builtin_assume``
1744------------------------------
1745
1746``__builtin_assume`` is used to provide the optimizer with a boolean
1747invariant that is defined to be true.
1748
1749**Syntax**:
1750
1751.. code-block:: c++
1752
1753  __builtin_assume(bool)
1754
1755**Example of Use**:
1756
1757.. code-block:: c++
1758
1759  int foo(int x) {
1760    __builtin_assume(x != 0);
1761
1762    // The optimizer may short-circuit this check using the invariant.
1763    if (x == 0)
1764      return do_something();
1765
1766    return do_something_else();
1767  }
1768
1769**Description**:
1770
1771The boolean argument to this function is defined to be true. The optimizer may
1772analyze the form of the expression provided as the argument and deduce from
1773that information used to optimize the program. If the condition is violated
1774during execution, the behavior is undefined. The argument itself is never
1775evaluated, so any side effects of the expression will be discarded.
1776
1777Query for this feature with ``__has_builtin(__builtin_assume)``.
1778
1779``__builtin_readcyclecounter``
1780------------------------------
1781
1782``__builtin_readcyclecounter`` is used to access the cycle counter register (or
1783a similar low-latency, high-accuracy clock) on those targets that support it.
1784
1785**Syntax**:
1786
1787.. code-block:: c++
1788
1789  __builtin_readcyclecounter()
1790
1791**Example of Use**:
1792
1793.. code-block:: c++
1794
1795  unsigned long long t0 = __builtin_readcyclecounter();
1796  do_something();
1797  unsigned long long t1 = __builtin_readcyclecounter();
1798  unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
1799
1800**Description**:
1801
1802The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
1803which may be either global or process/thread-specific depending on the target.
1804As the backing counters often overflow quickly (on the order of seconds) this
1805should only be used for timing small intervals.  When not supported by the
1806target, the return value is always zero.  This builtin takes no arguments and
1807produces an unsigned long long result.
1808
1809Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
1810that even if present, its use may depend on run-time privilege or other OS
1811controlled state.
1812
1813``__builtin_dump_struct``
1814-------------------------
1815
1816**Syntax**:
1817
1818.. code-block:: c++
1819
1820     __builtin_dump_struct(&some_struct, &some_printf_func);
1821
1822**Examples**:
1823
1824.. code-block:: c++
1825
1826     struct S {
1827       int x, y;
1828       float f;
1829       struct T {
1830         int i;
1831       } t;
1832     };
1833
1834     void func(struct S *s) {
1835       __builtin_dump_struct(s, &printf);
1836     }
1837
1838Example output:
1839
1840.. code-block:: none
1841
1842     struct S {
1843     int i : 100
1844     int j : 42
1845     float f : 3.14159
1846     struct T t : struct T {
1847         int i : 1997
1848         }
1849     }
1850
1851**Description**:
1852
1853The '``__builtin_dump_struct``' function is used to print the fields of a simple
1854structure and their values for debugging purposes. The builtin accepts a pointer
1855to a structure to dump the fields of, and a pointer to a formatted output
1856function whose signature must be: ``int (*)(const char *, ...)`` and must
1857support the format specifiers used by ``printf()``.
1858
1859.. _langext-__builtin_shufflevector:
1860
1861``__builtin_shufflevector``
1862---------------------------
1863
1864``__builtin_shufflevector`` is used to express generic vector
1865permutation/shuffle/swizzle operations.  This builtin is also very important
1866for the implementation of various target-specific header files like
1867``<xmmintrin.h>``.
1868
1869**Syntax**:
1870
1871.. code-block:: c++
1872
1873  __builtin_shufflevector(vec1, vec2, index1, index2, ...)
1874
1875**Examples**:
1876
1877.. code-block:: c++
1878
1879  // identity operation - return 4-element vector v1.
1880  __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
1881
1882  // "Splat" element 0 of V1 into a 4-element result.
1883  __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
1884
1885  // Reverse 4-element vector V1.
1886  __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
1887
1888  // Concatenate every other element of 4-element vectors V1 and V2.
1889  __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
1890
1891  // Concatenate every other element of 8-element vectors V1 and V2.
1892  __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
1893
1894  // Shuffle v1 with some elements being undefined
1895  __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
1896
1897**Description**:
1898
1899The first two arguments to ``__builtin_shufflevector`` are vectors that have
1900the same element type.  The remaining arguments are a list of integers that
1901specify the elements indices of the first two vectors that should be extracted
1902and returned in a new vector.  These element indices are numbered sequentially
1903starting with the first vector, continuing into the second vector.  Thus, if
1904``vec1`` is a 4-element vector, index 5 would refer to the second element of
1905``vec2``. An index of -1 can be used to indicate that the corresponding element
1906in the returned vector is a don't care and can be optimized by the backend.
1907
1908The result of ``__builtin_shufflevector`` is a vector with the same element
1909type as ``vec1``/``vec2`` but that has an element count equal to the number of
1910indices specified.
1911
1912Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
1913
1914.. _langext-__builtin_convertvector:
1915
1916``__builtin_convertvector``
1917---------------------------
1918
1919``__builtin_convertvector`` is used to express generic vector
1920type-conversion operations. The input vector and the output vector
1921type must have the same number of elements.
1922
1923**Syntax**:
1924
1925.. code-block:: c++
1926
1927  __builtin_convertvector(src_vec, dst_vec_type)
1928
1929**Examples**:
1930
1931.. code-block:: c++
1932
1933  typedef double vector4double __attribute__((__vector_size__(32)));
1934  typedef float  vector4float  __attribute__((__vector_size__(16)));
1935  typedef short  vector4short  __attribute__((__vector_size__(8)));
1936  vector4float vf; vector4short vs;
1937
1938  // convert from a vector of 4 floats to a vector of 4 doubles.
1939  __builtin_convertvector(vf, vector4double)
1940  // equivalent to:
1941  (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
1942
1943  // convert from a vector of 4 shorts to a vector of 4 floats.
1944  __builtin_convertvector(vs, vector4float)
1945  // equivalent to:
1946  (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
1947
1948**Description**:
1949
1950The first argument to ``__builtin_convertvector`` is a vector, and the second
1951argument is a vector type with the same number of elements as the first
1952argument.
1953
1954The result of ``__builtin_convertvector`` is a vector with the same element
1955type as the second argument, with a value defined in terms of the action of a
1956C-style cast applied to each element of the first argument.
1957
1958Query for this feature with ``__has_builtin(__builtin_convertvector)``.
1959
1960``__builtin_bitreverse``
1961------------------------
1962
1963* ``__builtin_bitreverse8``
1964* ``__builtin_bitreverse16``
1965* ``__builtin_bitreverse32``
1966* ``__builtin_bitreverse64``
1967
1968**Syntax**:
1969
1970.. code-block:: c++
1971
1972     __builtin_bitreverse32(x)
1973
1974**Examples**:
1975
1976.. code-block:: c++
1977
1978      uint8_t rev_x = __builtin_bitreverse8(x);
1979      uint16_t rev_x = __builtin_bitreverse16(x);
1980      uint32_t rev_y = __builtin_bitreverse32(y);
1981      uint64_t rev_z = __builtin_bitreverse64(z);
1982
1983**Description**:
1984
1985The '``__builtin_bitreverse``' family of builtins is used to reverse
1986the bitpattern of an integer value; for example ``0b10110110`` becomes
1987``0b01101101``. These builtins can be used within constant expressions.
1988
1989``__builtin_rotateleft``
1990------------------------
1991
1992* ``__builtin_rotateleft8``
1993* ``__builtin_rotateleft16``
1994* ``__builtin_rotateleft32``
1995* ``__builtin_rotateleft64``
1996
1997**Syntax**:
1998
1999.. code-block:: c++
2000
2001     __builtin_rotateleft32(x, y)
2002
2003**Examples**:
2004
2005.. code-block:: c++
2006
2007      uint8_t rot_x = __builtin_rotateleft8(x, y);
2008      uint16_t rot_x = __builtin_rotateleft16(x, y);
2009      uint32_t rot_x = __builtin_rotateleft32(x, y);
2010      uint64_t rot_x = __builtin_rotateleft64(x, y);
2011
2012**Description**:
2013
2014The '``__builtin_rotateleft``' family of builtins is used to rotate
2015the bits in the first argument by the amount in the second argument.
2016For example, ``0b10000110`` rotated left by 11 becomes ``0b00110100``.
2017The shift value is treated as an unsigned amount modulo the size of
2018the arguments. Both arguments and the result have the bitwidth specified
2019by the name of the builtin. These builtins can be used within constant
2020expressions.
2021
2022``__builtin_rotateright``
2023-------------------------
2024
2025* ``__builtin_rotateright8``
2026* ``__builtin_rotateright16``
2027* ``__builtin_rotateright32``
2028* ``__builtin_rotateright64``
2029
2030**Syntax**:
2031
2032.. code-block:: c++
2033
2034     __builtin_rotateright32(x, y)
2035
2036**Examples**:
2037
2038.. code-block:: c++
2039
2040      uint8_t rot_x = __builtin_rotateright8(x, y);
2041      uint16_t rot_x = __builtin_rotateright16(x, y);
2042      uint32_t rot_x = __builtin_rotateright32(x, y);
2043      uint64_t rot_x = __builtin_rotateright64(x, y);
2044
2045**Description**:
2046
2047The '``__builtin_rotateright``' family of builtins is used to rotate
2048the bits in the first argument by the amount in the second argument.
2049For example, ``0b10000110`` rotated right by 3 becomes ``0b11010000``.
2050The shift value is treated as an unsigned amount modulo the size of
2051the arguments. Both arguments and the result have the bitwidth specified
2052by the name of the builtin. These builtins can be used within constant
2053expressions.
2054
2055``__builtin_unreachable``
2056-------------------------
2057
2058``__builtin_unreachable`` is used to indicate that a specific point in the
2059program cannot be reached, even if the compiler might otherwise think it can.
2060This is useful to improve optimization and eliminates certain warnings.  For
2061example, without the ``__builtin_unreachable`` in the example below, the
2062compiler assumes that the inline asm can fall through and prints a "function
2063declared '``noreturn``' should not return" warning.
2064
2065**Syntax**:
2066
2067.. code-block:: c++
2068
2069    __builtin_unreachable()
2070
2071**Example of use**:
2072
2073.. code-block:: c++
2074
2075  void myabort(void) __attribute__((noreturn));
2076  void myabort(void) {
2077    asm("int3");
2078    __builtin_unreachable();
2079  }
2080
2081**Description**:
2082
2083The ``__builtin_unreachable()`` builtin has completely undefined behavior.
2084Since it has undefined behavior, it is a statement that it is never reached and
2085the optimizer can take advantage of this to produce better code.  This builtin
2086takes no arguments and produces a void result.
2087
2088Query for this feature with ``__has_builtin(__builtin_unreachable)``.
2089
2090``__builtin_unpredictable``
2091---------------------------
2092
2093``__builtin_unpredictable`` is used to indicate that a branch condition is
2094unpredictable by hardware mechanisms such as branch prediction logic.
2095
2096**Syntax**:
2097
2098.. code-block:: c++
2099
2100    __builtin_unpredictable(long long)
2101
2102**Example of use**:
2103
2104.. code-block:: c++
2105
2106  if (__builtin_unpredictable(x > 0)) {
2107     foo();
2108  }
2109
2110**Description**:
2111
2112The ``__builtin_unpredictable()`` builtin is expected to be used with control
2113flow conditions such as in ``if`` and ``switch`` statements.
2114
2115Query for this feature with ``__has_builtin(__builtin_unpredictable)``.
2116
2117``__sync_swap``
2118---------------
2119
2120``__sync_swap`` is used to atomically swap integers or pointers in memory.
2121
2122**Syntax**:
2123
2124.. code-block:: c++
2125
2126  type __sync_swap(type *ptr, type value, ...)
2127
2128**Example of Use**:
2129
2130.. code-block:: c++
2131
2132  int old_value = __sync_swap(&value, new_value);
2133
2134**Description**:
2135
2136The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
2137atomic intrinsics to allow code to atomically swap the current value with the
2138new value.  More importantly, it helps developers write more efficient and
2139correct code by avoiding expensive loops around
2140``__sync_bool_compare_and_swap()`` or relying on the platform specific
2141implementation details of ``__sync_lock_test_and_set()``.  The
2142``__sync_swap()`` builtin is a full barrier.
2143
2144``__builtin_addressof``
2145-----------------------
2146
2147``__builtin_addressof`` performs the functionality of the built-in ``&``
2148operator, ignoring any ``operator&`` overload.  This is useful in constant
2149expressions in C++11, where there is no other way to take the address of an
2150object that overloads ``operator&``.
2151
2152**Example of use**:
2153
2154.. code-block:: c++
2155
2156  template<typename T> constexpr T *addressof(T &value) {
2157    return __builtin_addressof(value);
2158  }
2159
2160``__builtin_operator_new`` and ``__builtin_operator_delete``
2161------------------------------------------------------------
2162
2163A call to ``__builtin_operator_new(args)`` is exactly the same as a call to
2164``::operator new(args)``, except that it allows certain optimizations
2165that the C++ standard does not permit for a direct function call to
2166``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
2167merging allocations), and that the call is required to resolve to a
2168`replaceable global allocation function
2169<https://en.cppreference.com/w/cpp/memory/new/operator_new>`_.
2170
2171Likewise, ``__builtin_operator_delete`` is exactly the same as a call to
2172``::operator delete(args)``, except that it permits optimizations
2173and that the call is required to resolve to a
2174`replaceable global deallocation function
2175<https://en.cppreference.com/w/cpp/memory/new/operator_delete>`_.
2176
2177These builtins are intended for use in the implementation of ``std::allocator``
2178and other similar allocation libraries, and are only available in C++.
2179
2180Query for this feature with ``__has_builtin(__builtin_operator_new)`` or
2181``__has_builtin(__builtin_operator_delete)``:
2182
2183  * If the value is at least ``201802L``, the builtins behave as described above.
2184
2185  * If the value is non-zero, the builtins may not support calling arbitrary
2186    replaceable global (de)allocation functions, but do support calling at least
2187    ``::operator new(size_t)`` and ``::operator delete(void*)``.
2188
2189``__builtin_preserve_access_index``
2190-----------------------------------
2191
2192``__builtin_preserve_access_index`` specifies a code section where
2193array subscript access and structure/union member access are relocatable
2194under bpf compile-once run-everywhere framework. Debuginfo (typically
2195with ``-g``) is needed, otherwise, the compiler will exit with an error.
2196The return type for the intrinsic is the same as the type of the
2197argument.
2198
2199**Syntax**:
2200
2201.. code-block:: c
2202
2203  type __builtin_preserve_access_index(type arg)
2204
2205**Example of Use**:
2206
2207.. code-block:: c
2208
2209  struct t {
2210    int i;
2211    int j;
2212    union {
2213      int a;
2214      int b;
2215    } c[4];
2216  };
2217  struct t *v = ...;
2218  int *pb =__builtin_preserve_access_index(&v->c[3].b);
2219  __builtin_preserve_access_index(v->j);
2220
2221Multiprecision Arithmetic Builtins
2222----------------------------------
2223
2224Clang provides a set of builtins which expose multiprecision arithmetic in a
2225manner amenable to C. They all have the following form:
2226
2227.. code-block:: c
2228
2229  unsigned x = ..., y = ..., carryin = ..., carryout;
2230  unsigned sum = __builtin_addc(x, y, carryin, &carryout);
2231
2232Thus one can form a multiprecision addition chain in the following manner:
2233
2234.. code-block:: c
2235
2236  unsigned *x, *y, *z, carryin=0, carryout;
2237  z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
2238  carryin = carryout;
2239  z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
2240  carryin = carryout;
2241  z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
2242  carryin = carryout;
2243  z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
2244
2245The complete list of builtins are:
2246
2247.. code-block:: c
2248
2249  unsigned char      __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
2250  unsigned short     __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
2251  unsigned           __builtin_addc  (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
2252  unsigned long      __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
2253  unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
2254  unsigned char      __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
2255  unsigned short     __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
2256  unsigned           __builtin_subc  (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
2257  unsigned long      __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
2258  unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
2259
2260Checked Arithmetic Builtins
2261---------------------------
2262
2263Clang provides a set of builtins that implement checked arithmetic for security
2264critical applications in a manner that is fast and easily expressible in C. As
2265an example of their usage:
2266
2267.. code-block:: c
2268
2269  errorcode_t security_critical_application(...) {
2270    unsigned x, y, result;
2271    ...
2272    if (__builtin_mul_overflow(x, y, &result))
2273      return kErrorCodeHackers;
2274    ...
2275    use_multiply(result);
2276    ...
2277  }
2278
2279Clang provides the following checked arithmetic builtins:
2280
2281.. code-block:: c
2282
2283  bool __builtin_add_overflow   (type1 x, type2 y, type3 *sum);
2284  bool __builtin_sub_overflow   (type1 x, type2 y, type3 *diff);
2285  bool __builtin_mul_overflow   (type1 x, type2 y, type3 *prod);
2286  bool __builtin_uadd_overflow  (unsigned x, unsigned y, unsigned *sum);
2287  bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
2288  bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
2289  bool __builtin_usub_overflow  (unsigned x, unsigned y, unsigned *diff);
2290  bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
2291  bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
2292  bool __builtin_umul_overflow  (unsigned x, unsigned y, unsigned *prod);
2293  bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
2294  bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
2295  bool __builtin_sadd_overflow  (int x, int y, int *sum);
2296  bool __builtin_saddl_overflow (long x, long y, long *sum);
2297  bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
2298  bool __builtin_ssub_overflow  (int x, int y, int *diff);
2299  bool __builtin_ssubl_overflow (long x, long y, long *diff);
2300  bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
2301  bool __builtin_smul_overflow  (int x, int y, int *prod);
2302  bool __builtin_smull_overflow (long x, long y, long *prod);
2303  bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
2304
2305Each builtin performs the specified mathematical operation on the
2306first two arguments and stores the result in the third argument.  If
2307possible, the result will be equal to mathematically-correct result
2308and the builtin will return 0.  Otherwise, the builtin will return
23091 and the result will be equal to the unique value that is equivalent
2310to the mathematically-correct result modulo two raised to the *k*
2311power, where *k* is the number of bits in the result type.  The
2312behavior of these builtins is well-defined for all argument values.
2313
2314The first three builtins work generically for operands of any integer type,
2315including boolean types.  The operands need not have the same type as each
2316other, or as the result.  The other builtins may implicitly promote or
2317convert their operands before performing the operation.
2318
2319Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc.
2320
2321Floating point builtins
2322---------------------------------------
2323
2324``__builtin_canonicalize``
2325--------------------------
2326
2327.. code-block:: c
2328
2329   double __builtin_canonicalize(double);
2330   float __builtin_canonicalizef(float);
2331   long double__builtin_canonicalizel(long double);
2332
2333Returns the platform specific canonical encoding of a floating point
2334number. This canonicalization is useful for implementing certain
2335numeric primitives such as frexp. See `LLVM canonicalize intrinsic
2336<https://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for
2337more information on the semantics.
2338
2339String builtins
2340---------------
2341
2342Clang provides constant expression evaluation support for builtins forms of
2343the following functions from the C standard library headers
2344``<string.h>`` and ``<wchar.h>``:
2345
2346* ``memchr``
2347* ``memcmp`` (and its deprecated BSD / POSIX alias ``bcmp``)
2348* ``strchr``
2349* ``strcmp``
2350* ``strlen``
2351* ``strncmp``
2352* ``wcschr``
2353* ``wcscmp``
2354* ``wcslen``
2355* ``wcsncmp``
2356* ``wmemchr``
2357* ``wmemcmp``
2358
2359In each case, the builtin form has the name of the C library function prefixed
2360by ``__builtin_``. Example:
2361
2362.. code-block:: c
2363
2364  void *p = __builtin_memchr("foobar", 'b', 5);
2365
2366In addition to the above, one further builtin is provided:
2367
2368.. code-block:: c
2369
2370  char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
2371
2372``__builtin_char_memchr(a, b, c)`` is identical to
2373``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within
2374constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*``
2375is disallowed in general).
2376
2377Constant evaluation support for the ``__builtin_mem*`` functions is provided
2378only for arrays of ``char``, ``signed char``, ``unsigned char``, or ``char8_t``,
2379despite these functions accepting an argument of type ``const void*``.
2380
2381Support for constant expression evaluation for the above builtins can be detected
2382with ``__has_feature(cxx_constexpr_string_builtins)``.
2383
2384Memory builtins
2385---------------
2386
2387Clang provides constant expression evaluation support for builtin forms of the
2388following functions from the C standard library headers
2389``<string.h>`` and ``<wchar.h>``:
2390
2391* ``memcpy``
2392* ``memmove``
2393* ``wmemcpy``
2394* ``wmemmove``
2395
2396In each case, the builtin form has the name of the C library function prefixed
2397by ``__builtin_``.
2398
2399Constant evaluation support is only provided when the source and destination
2400are pointers to arrays with the same trivially copyable element type, and the
2401given size is an exact multiple of the element size that is no greater than
2402the number of elements accessible through the source and destination operands.
2403
2404Guaranteed inlined copy
2405^^^^^^^^^^^^^^^^^^^^^^^
2406
2407.. code-block:: c
2408
2409  void __builtin_memcpy_inline(void *dst, const void *src, size_t size);
2410
2411
2412``__builtin_memcpy_inline`` has been designed as a building block for efficient
2413``memcpy`` implementations. It is identical to ``__builtin_memcpy`` but also
2414guarantees not to call any external functions. See LLVM IR `llvm.memcpy.inline
2415<https://llvm.org/docs/LangRef.html#llvm-memcpy-inline-intrinsic>`_ intrinsic
2416for more information.
2417
2418This is useful to implement a custom version of ``memcpy``, implemement a
2419``libc`` memcpy or work around the absence of a ``libc``.
2420
2421Note that the `size` argument must be a compile time constant.
2422
2423Note that this intrinsic cannot yet be called in a ``constexpr`` context.
2424
2425
2426Atomic Min/Max builtins with memory ordering
2427--------------------------------------------
2428
2429There are two atomic builtins with min/max in-memory comparison and swap.
2430The syntax and semantics are similar to GCC-compatible __atomic_* builtins.
2431
2432* ``__atomic_fetch_min``
2433* ``__atomic_fetch_max``
2434
2435The builtins work with signed and unsigned integers and require to specify memory ordering.
2436The return value is the original value that was stored in memory before comparison.
2437
2438Example:
2439
2440.. code-block:: c
2441
2442  unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED);
2443
2444The third argument is one of the memory ordering specifiers ``__ATOMIC_RELAXED``,
2445``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, ``__ATOMIC_RELEASE``,
2446``__ATOMIC_ACQ_REL``, or ``__ATOMIC_SEQ_CST`` following C++11 memory model semantics.
2447
2448In terms or aquire-release ordering barriers these two operations are always
2449considered as operations with *load-store* semantics, even when the original value
2450is not actually modified after comparison.
2451
2452.. _langext-__c11_atomic:
2453
2454__c11_atomic builtins
2455---------------------
2456
2457Clang provides a set of builtins which are intended to be used to implement
2458C11's ``<stdatomic.h>`` header.  These builtins provide the semantics of the
2459``_explicit`` form of the corresponding C11 operation, and are named with a
2460``__c11_`` prefix.  The supported operations, and the differences from
2461the corresponding C11 operations, are:
2462
2463* ``__c11_atomic_init``
2464* ``__c11_atomic_thread_fence``
2465* ``__c11_atomic_signal_fence``
2466* ``__c11_atomic_is_lock_free`` (The argument is the size of the
2467  ``_Atomic(...)`` object, instead of its address)
2468* ``__c11_atomic_store``
2469* ``__c11_atomic_load``
2470* ``__c11_atomic_exchange``
2471* ``__c11_atomic_compare_exchange_strong``
2472* ``__c11_atomic_compare_exchange_weak``
2473* ``__c11_atomic_fetch_add``
2474* ``__c11_atomic_fetch_sub``
2475* ``__c11_atomic_fetch_and``
2476* ``__c11_atomic_fetch_or``
2477* ``__c11_atomic_fetch_xor``
2478* ``__c11_atomic_fetch_max``
2479* ``__c11_atomic_fetch_min``
2480
2481The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
2482``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
2483provided, with values corresponding to the enumerators of C11's
2484``memory_order`` enumeration.
2485
2486(Note that Clang additionally provides GCC-compatible ``__atomic_*``
2487builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0
2488atomic builtins are an explicit form of the corresponding OpenCL 2.0
2489builtin function, and are named with a ``__opencl_`` prefix. The macros
2490``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``,
2491``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``,
2492and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values
2493corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.)
2494
2495Low-level ARM exclusive memory builtins
2496---------------------------------------
2497
2498Clang provides overloaded builtins giving direct access to the three key ARM
2499instructions for implementing atomic operations.
2500
2501.. code-block:: c
2502
2503  T __builtin_arm_ldrex(const volatile T *addr);
2504  T __builtin_arm_ldaex(const volatile T *addr);
2505  int __builtin_arm_strex(T val, volatile T *addr);
2506  int __builtin_arm_stlex(T val, volatile T *addr);
2507  void __builtin_arm_clrex(void);
2508
2509The types ``T`` currently supported are:
2510
2511* Integer types with width at most 64 bits (or 128 bits on AArch64).
2512* Floating-point types
2513* Pointer types.
2514
2515Note that the compiler does not guarantee it will not insert stores which clear
2516the exclusive monitor in between an ``ldrex`` type operation and its paired
2517``strex``. In practice this is only usually a risk when the extra store is on
2518the same cache line as the variable being modified and Clang will only insert
2519stack stores on its own, so it is best not to use these operations on variables
2520with automatic storage duration.
2521
2522Also, loads and stores may be implicit in code written between the ``ldrex`` and
2523``strex``. Clang will not necessarily mitigate the effects of these either, so
2524care should be exercised.
2525
2526For these reasons the higher level atomic primitives should be preferred where
2527possible.
2528
2529Non-temporal load/store builtins
2530--------------------------------
2531
2532Clang provides overloaded builtins allowing generation of non-temporal memory
2533accesses.
2534
2535.. code-block:: c
2536
2537  T __builtin_nontemporal_load(T *addr);
2538  void __builtin_nontemporal_store(T value, T *addr);
2539
2540The types ``T`` currently supported are:
2541
2542* Integer types.
2543* Floating-point types.
2544* Vector types.
2545
2546Note that the compiler does not guarantee that non-temporal loads or stores
2547will be used.
2548
2549C++ Coroutines support builtins
2550--------------------------------
2551
2552.. warning::
2553  This is a work in progress. Compatibility across Clang/LLVM releases is not
2554  guaranteed.
2555
2556Clang provides experimental builtins to support C++ Coroutines as defined by
2557https://wg21.link/P0057. The following four are intended to be used by the
2558standard library to implement `std::experimental::coroutine_handle` type.
2559
2560**Syntax**:
2561
2562.. code-block:: c
2563
2564  void  __builtin_coro_resume(void *addr);
2565  void  __builtin_coro_destroy(void *addr);
2566  bool  __builtin_coro_done(void *addr);
2567  void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
2568
2569**Example of use**:
2570
2571.. code-block:: c++
2572
2573  template <> struct coroutine_handle<void> {
2574    void resume() const { __builtin_coro_resume(ptr); }
2575    void destroy() const { __builtin_coro_destroy(ptr); }
2576    bool done() const { return __builtin_coro_done(ptr); }
2577    // ...
2578  protected:
2579    void *ptr;
2580  };
2581
2582  template <typename Promise> struct coroutine_handle : coroutine_handle<> {
2583    // ...
2584    Promise &promise() const {
2585      return *reinterpret_cast<Promise *>(
2586        __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
2587    }
2588    static coroutine_handle from_promise(Promise &promise) {
2589      coroutine_handle p;
2590      p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
2591                                                      /*from-promise=*/true);
2592      return p;
2593    }
2594  };
2595
2596
2597Other coroutine builtins are either for internal clang use or for use during
2598development of the coroutine feature. See `Coroutines in LLVM
2599<https://llvm.org/docs/Coroutines.html#intrinsics>`_ for
2600more information on their semantics. Note that builtins matching the intrinsics
2601that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,
2602llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to
2603an appropriate value during the emission.
2604
2605**Syntax**:
2606
2607.. code-block:: c
2608
2609  size_t __builtin_coro_size()
2610  void  *__builtin_coro_frame()
2611  void  *__builtin_coro_free(void *coro_frame)
2612
2613  void  *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
2614  bool   __builtin_coro_alloc()
2615  void  *__builtin_coro_begin(void *memory)
2616  void   __builtin_coro_end(void *coro_frame, bool unwind)
2617  char   __builtin_coro_suspend(bool final)
2618  bool   __builtin_coro_param(void *original, void *copy)
2619
2620Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM
2621automatically will insert one if the first argument to `llvm.coro.suspend` is
2622token `none`. If a user calls `__builin_suspend`, clang will insert `token none`
2623as the first argument to the intrinsic.
2624
2625Source location builtins
2626------------------------
2627
2628Clang provides experimental builtins to support C++ standard library implementation
2629of ``std::experimental::source_location`` as specified in  http://wg21.link/N4600.
2630With the exception of ``__builtin_COLUMN``, these builtins are also implemented by
2631GCC.
2632
2633**Syntax**:
2634
2635.. code-block:: c
2636
2637  const char *__builtin_FILE();
2638  const char *__builtin_FUNCTION();
2639  unsigned    __builtin_LINE();
2640  unsigned    __builtin_COLUMN(); // Clang only
2641
2642**Example of use**:
2643
2644.. code-block:: c++
2645
2646  void my_assert(bool pred, int line = __builtin_LINE(), // Captures line of caller
2647                 const char* file = __builtin_FILE(),
2648                 const char* function = __builtin_FUNCTION()) {
2649    if (pred) return;
2650    printf("%s:%d assertion failed in function %s\n", file, line, function);
2651    std::abort();
2652  }
2653
2654  struct MyAggregateType {
2655    int x;
2656    int line = __builtin_LINE(); // captures line where aggregate initialization occurs
2657  };
2658  static_assert(MyAggregateType{42}.line == __LINE__);
2659
2660  struct MyClassType {
2661    int line = __builtin_LINE(); // captures line of the constructor used during initialization
2662    constexpr MyClassType(int) { assert(line == __LINE__); }
2663  };
2664
2665**Description**:
2666
2667The builtins ``__builtin_LINE``, ``__builtin_FUNCTION``, and ``__builtin_FILE`` return
2668the values, at the "invocation point", for ``__LINE__``, ``__FUNCTION__``, and
2669``__FILE__`` respectively. These builtins are constant expressions.
2670
2671When the builtins appear as part of a default function argument the invocation
2672point is the location of the caller. When the builtins appear as part of a
2673default member initializer, the invocation point is the location of the
2674constructor or aggregate initialization used to create the object. Otherwise
2675the invocation point is the same as the location of the builtin.
2676
2677When the invocation point of ``__builtin_FUNCTION`` is not a function scope the
2678empty string is returned.
2679
2680Alignment builtins
2681------------------
2682Clang provides builtins to support checking and adjusting alignment of
2683pointers and integers.
2684These builtins can be used to avoid relying on implementation-defined behavior
2685of arithmetic on integers derived from pointers.
2686Additionally, these builtins retain type information and, unlike bitwise
2687arithmetic, they can perform semantic checking on the alignment value.
2688
2689**Syntax**:
2690
2691.. code-block:: c
2692
2693  Type __builtin_align_up(Type value, size_t alignment);
2694  Type __builtin_align_down(Type value, size_t alignment);
2695  bool __builtin_is_aligned(Type value, size_t alignment);
2696
2697
2698**Example of use**:
2699
2700.. code-block:: c++
2701
2702  char* global_alloc_buffer;
2703  void* my_aligned_allocator(size_t alloc_size, size_t alignment) {
2704    char* result = __builtin_align_up(global_alloc_buffer, alignment);
2705    // result now contains the value of global_alloc_buffer rounded up to the
2706    // next multiple of alignment.
2707    global_alloc_buffer = result + alloc_size;
2708    return result;
2709  }
2710
2711  void* get_start_of_page(void* ptr) {
2712    return __builtin_align_down(ptr, PAGE_SIZE);
2713  }
2714
2715  void example(char* buffer) {
2716     if (__builtin_is_aligned(buffer, 64)) {
2717       do_fast_aligned_copy(buffer);
2718     } else {
2719       do_unaligned_copy(buffer);
2720     }
2721  }
2722
2723  // In addition to pointers, the builtins can also be used on integer types
2724  // and are evaluatable inside constant expressions.
2725  static_assert(__builtin_align_up(123, 64) == 128, "");
2726  static_assert(__builtin_align_down(123u, 64) == 64u, "");
2727  static_assert(!__builtin_is_aligned(123, 64), "");
2728
2729
2730**Description**:
2731
2732The builtins ``__builtin_align_up``, ``__builtin_align_down``, return their
2733first argument aligned up/down to the next multiple of the second argument.
2734If the value is already sufficiently aligned, it is returned unchanged.
2735The builtin ``__builtin_is_aligned`` returns whether the first argument is
2736aligned to a multiple of the second argument.
2737All of these builtins expect the alignment to be expressed as a number of bytes.
2738
2739These builtins can be used for all integer types as well as (non-function)
2740pointer types. For pointer types, these builtins operate in terms of the integer
2741address of the pointer and return a new pointer of the same type (including
2742qualifiers such as ``const``) with an adjusted address.
2743When aligning pointers up or down, the resulting value must be within the same
2744underlying allocation or one past the end (see C17 6.5.6p8, C++ [expr.add]).
2745This means that arbitrary integer values stored in pointer-type variables must
2746not be passed to these builtins. For those use cases, the builtins can still be
2747used, but the operation must be performed on the pointer cast to ``uintptr_t``.
2748
2749If Clang can determine that the alignment is not a power of two at compile time,
2750it will result in a compilation failure. If the alignment argument is not a
2751power of two at run time, the behavior of these builtins is undefined.
2752
2753Non-standard C++11 Attributes
2754=============================
2755
2756Clang's non-standard C++11 attributes live in the ``clang`` attribute
2757namespace.
2758
2759Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
2760are accepted with the ``__attribute__((foo))`` syntax are also accepted as
2761``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
2762(see the list of `GCC function attributes
2763<https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
2764attributes <https://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
2765`GCC type attributes
2766<https://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
2767implementation, these attributes must appertain to the *declarator-id* in a
2768declaration, which means they must go either at the start of the declaration or
2769immediately after the name being declared.
2770
2771For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
2772also applies the GNU ``noreturn`` attribute to ``f``.
2773
2774.. code-block:: c++
2775
2776  [[gnu::unused]] int a, f [[gnu::noreturn]] ();
2777
2778Target-Specific Extensions
2779==========================
2780
2781Clang supports some language features conditionally on some targets.
2782
2783ARM/AArch64 Language Extensions
2784-------------------------------
2785
2786Memory Barrier Intrinsics
2787^^^^^^^^^^^^^^^^^^^^^^^^^
2788Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
2789in the `ARM C Language Extensions Release 2.0
2790<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
2791Note that these intrinsics are implemented as motion barriers that block
2792reordering of memory accesses and side effect instructions. Other instructions
2793like simple arithmetic may be reordered around the intrinsic. If you expect to
2794have no reordering at all, use inline assembly instead.
2795
2796X86/X86-64 Language Extensions
2797------------------------------
2798
2799The X86 backend has these language extensions:
2800
2801Memory references to specified segments
2802^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
2803
2804Annotating a pointer with address space #256 causes it to be code generated
2805relative to the X86 GS segment register, address space #257 causes it to be
2806relative to the X86 FS segment, and address space #258 causes it to be
2807relative to the X86 SS segment.  Note that this is a very very low-level
2808feature that should only be used if you know what you're doing (for example in
2809an OS kernel).
2810
2811Here is an example:
2812
2813.. code-block:: c++
2814
2815  #define GS_RELATIVE __attribute__((address_space(256)))
2816  int foo(int GS_RELATIVE *P) {
2817    return *P;
2818  }
2819
2820Which compiles to (on X86-32):
2821
2822.. code-block:: gas
2823
2824  _foo:
2825          movl    4(%esp), %eax
2826          movl    %gs:(%eax), %eax
2827          ret
2828
2829You can also use the GCC compatibility macros ``__seg_fs`` and ``__seg_gs`` for
2830the same purpose. The preprocessor symbols ``__SEG_FS`` and ``__SEG_GS``
2831indicate their support.
2832
2833PowerPC Language Extensions
2834------------------------------
2835
2836Set the Floating Point Rounding Mode
2837^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
2838PowerPC64/PowerPC64le supports the builtin function ``__builtin_setrnd`` to set
2839the floating point rounding mode. This function will use the least significant
2840two bits of integer argument to set the floating point rounding mode.
2841
2842.. code-block:: c++
2843
2844  double __builtin_setrnd(int mode);
2845
2846The effective values for mode are:
2847
2848    - 0 - round to nearest
2849    - 1 - round to zero
2850    - 2 - round to +infinity
2851    - 3 - round to -infinity
2852
2853Note that the mode argument will modulo 4, so if the integer argument is greater
2854than 3, it will only use the least significant two bits of the mode.
2855Namely, ``__builtin_setrnd(102))`` is equal to ``__builtin_setrnd(2)``.
2856
2857PowerPC cache builtins
2858^^^^^^^^^^^^^^^^^^^^^^
2859
2860The PowerPC architecture specifies instructions implementing cache operations.
2861Clang provides builtins that give direct programmer access to these cache
2862instructions.
2863
2864Currently the following builtins are implemented in clang:
2865
2866``__builtin_dcbf`` copies the contents of a modified block from the data cache
2867to main memory and flushes the copy from the data cache.
2868
2869**Syntax**:
2870
2871.. code-block:: c
2872
2873  void __dcbf(const void* addr); /* Data Cache Block Flush */
2874
2875**Example of Use**:
2876
2877.. code-block:: c
2878
2879  int a = 1;
2880  __builtin_dcbf (&a);
2881
2882Extensions for Static Analysis
2883==============================
2884
2885Clang supports additional attributes that are useful for documenting program
2886invariants and rules for static analysis tools, such as the `Clang Static
2887Analyzer <https://clang-analyzer.llvm.org/>`_. These attributes are documented
2888in the analyzer's `list of source-level annotations
2889<https://clang-analyzer.llvm.org/annotations.html>`_.
2890
2891
2892Extensions for Dynamic Analysis
2893===============================
2894
2895Use ``__has_feature(address_sanitizer)`` to check if the code is being built
2896with :doc:`AddressSanitizer`.
2897
2898Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
2899with :doc:`ThreadSanitizer`.
2900
2901Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
2902with :doc:`MemorySanitizer`.
2903
2904Use ``__has_feature(safe_stack)`` to check if the code is being built
2905with :doc:`SafeStack`.
2906
2907
2908Extensions for selectively disabling optimization
2909=================================================
2910
2911Clang provides a mechanism for selectively disabling optimizations in functions
2912and methods.
2913
2914To disable optimizations in a single function definition, the GNU-style or C++11
2915non-standard attribute ``optnone`` can be used.
2916
2917.. code-block:: c++
2918
2919  // The following functions will not be optimized.
2920  // GNU-style attribute
2921  __attribute__((optnone)) int foo() {
2922    // ... code
2923  }
2924  // C++11 attribute
2925  [[clang::optnone]] int bar() {
2926    // ... code
2927  }
2928
2929To facilitate disabling optimization for a range of function definitions, a
2930range-based pragma is provided. Its syntax is ``#pragma clang optimize``
2931followed by ``off`` or ``on``.
2932
2933All function definitions in the region between an ``off`` and the following
2934``on`` will be decorated with the ``optnone`` attribute unless doing so would
2935conflict with explicit attributes already present on the function (e.g. the
2936ones that control inlining).
2937
2938.. code-block:: c++
2939
2940  #pragma clang optimize off
2941  // This function will be decorated with optnone.
2942  int foo() {
2943    // ... code
2944  }
2945
2946  // optnone conflicts with always_inline, so bar() will not be decorated.
2947  __attribute__((always_inline)) int bar() {
2948    // ... code
2949  }
2950  #pragma clang optimize on
2951
2952If no ``on`` is found to close an ``off`` region, the end of the region is the
2953end of the compilation unit.
2954
2955Note that a stray ``#pragma clang optimize on`` does not selectively enable
2956additional optimizations when compiling at low optimization levels. This feature
2957can only be used to selectively disable optimizations.
2958
2959The pragma has an effect on functions only at the point of their definition; for
2960function templates, this means that the state of the pragma at the point of an
2961instantiation is not necessarily relevant. Consider the following example:
2962
2963.. code-block:: c++
2964
2965  template<typename T> T twice(T t) {
2966    return 2 * t;
2967  }
2968
2969  #pragma clang optimize off
2970  template<typename T> T thrice(T t) {
2971    return 3 * t;
2972  }
2973
2974  int container(int a, int b) {
2975    return twice(a) + thrice(b);
2976  }
2977  #pragma clang optimize on
2978
2979In this example, the definition of the template function ``twice`` is outside
2980the pragma region, whereas the definition of ``thrice`` is inside the region.
2981The ``container`` function is also in the region and will not be optimized, but
2982it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
2983these two instantiations, ``twice`` will be optimized (because its definition
2984was outside the region) and ``thrice`` will not be optimized.
2985
2986Extensions for loop hint optimizations
2987======================================
2988
2989The ``#pragma clang loop`` directive is used to specify hints for optimizing the
2990subsequent for, while, do-while, or c++11 range-based for loop. The directive
2991provides options for vectorization, interleaving, predication, unrolling and
2992distribution. Loop hints can be specified before any loop and will be ignored if
2993the optimization is not safe to apply.
2994
2995There are loop hints that control transformations (e.g. vectorization, loop
2996unrolling) and there are loop hints that set transformation options (e.g.
2997``vectorize_width``, ``unroll_count``).  Pragmas setting transformation options
2998imply the transformation is enabled, as if it was enabled via the corresponding
2999transformation pragma (e.g. ``vectorize(enable)``). If the transformation is
3000disabled  (e.g. ``vectorize(disable)``), that takes precedence over
3001transformations option pragmas implying that transformation.
3002
3003Vectorization, Interleaving, and Predication
3004--------------------------------------------
3005
3006A vectorized loop performs multiple iterations of the original loop
3007in parallel using vector instructions. The instruction set of the target
3008processor determines which vector instructions are available and their vector
3009widths. This restricts the types of loops that can be vectorized. The vectorizer
3010automatically determines if the loop is safe and profitable to vectorize. A
3011vector instruction cost model is used to select the vector width.
3012
3013Interleaving multiple loop iterations allows modern processors to further
3014improve instruction-level parallelism (ILP) using advanced hardware features,
3015such as multiple execution units and out-of-order execution. The vectorizer uses
3016a cost model that depends on the register pressure and generated code size to
3017select the interleaving count.
3018
3019Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
3020by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
3021manually enable vectorization or interleaving.
3022
3023.. code-block:: c++
3024
3025  #pragma clang loop vectorize(enable)
3026  #pragma clang loop interleave(enable)
3027  for(...) {
3028    ...
3029  }
3030
3031The vector width is specified by ``vectorize_width(_value_)`` and the interleave
3032count is specified by ``interleave_count(_value_)``, where
3033_value_ is a positive integer. This is useful for specifying the optimal
3034width/count of the set of target architectures supported by your application.
3035
3036.. code-block:: c++
3037
3038  #pragma clang loop vectorize_width(2)
3039  #pragma clang loop interleave_count(2)
3040  for(...) {
3041    ...
3042  }
3043
3044Specifying a width/count of 1 disables the optimization, and is equivalent to
3045``vectorize(disable)`` or ``interleave(disable)``.
3046
3047Vector predication is enabled by ``vectorize_predicate(enable)``, for example:
3048
3049.. code-block:: c++
3050
3051  #pragma clang loop vectorize(enable)
3052  #pragma clang loop vectorize_predicate(enable)
3053  for(...) {
3054    ...
3055  }
3056
3057This predicates (masks) all instructions in the loop, which allows the scalar
3058remainder loop (the tail) to be folded into the main vectorized loop. This
3059might be more efficient when vector predication is efficiently supported by the
3060target platform.
3061
3062Loop Unrolling
3063--------------
3064
3065Unrolling a loop reduces the loop control overhead and exposes more
3066opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
3067eliminates the loop and replaces it with an enumerated sequence of loop
3068iterations. Full unrolling is only possible if the loop trip count is known at
3069compile time. Partial unrolling replicates the loop body within the loop and
3070reduces the trip count.
3071
3072If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the
3073loop if the trip count is known at compile time. If the fully unrolled code size
3074is greater than an internal limit the loop will be partially unrolled up to this
3075limit. If the trip count is not known at compile time the loop will be partially
3076unrolled with a heuristically chosen unroll factor.
3077
3078.. code-block:: c++
3079
3080  #pragma clang loop unroll(enable)
3081  for(...) {
3082    ...
3083  }
3084
3085If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
3086loop if the trip count is known at compile time identically to
3087``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled
3088if the loop count is not known at compile time.
3089
3090.. code-block:: c++
3091
3092  #pragma clang loop unroll(full)
3093  for(...) {
3094    ...
3095  }
3096
3097The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
3098_value_ is a positive integer. If this value is greater than the trip count the
3099loop will be fully unrolled. Otherwise the loop is partially unrolled subject
3100to the same code size limit as with ``unroll(enable)``.
3101
3102.. code-block:: c++
3103
3104  #pragma clang loop unroll_count(8)
3105  for(...) {
3106    ...
3107  }
3108
3109Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
3110
3111Loop Distribution
3112-----------------
3113
3114Loop Distribution allows splitting a loop into multiple loops.  This is
3115beneficial for example when the entire loop cannot be vectorized but some of the
3116resulting loops can.
3117
3118If ``distribute(enable))`` is specified and the loop has memory dependencies
3119that inhibit vectorization, the compiler will attempt to isolate the offending
3120operations into a new loop.  This optimization is not enabled by default, only
3121loops marked with the pragma are considered.
3122
3123.. code-block:: c++
3124
3125  #pragma clang loop distribute(enable)
3126  for (i = 0; i < N; ++i) {
3127    S1: A[i + 1] = A[i] + B[i];
3128    S2: C[i] = D[i] * E[i];
3129  }
3130
3131This loop will be split into two loops between statements S1 and S2.  The
3132second loop containing S2 will be vectorized.
3133
3134Loop Distribution is currently not enabled by default in the optimizer because
3135it can hurt performance in some cases.  For example, instruction-level
3136parallelism could be reduced by sequentializing the execution of the
3137statements S1 and S2 above.
3138
3139If Loop Distribution is turned on globally with
3140``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can
3141be used the disable it on a per-loop basis.
3142
3143Additional Information
3144----------------------
3145
3146For convenience multiple loop hints can be specified on a single line.
3147
3148.. code-block:: c++
3149
3150  #pragma clang loop vectorize_width(4) interleave_count(8)
3151  for(...) {
3152    ...
3153  }
3154
3155If an optimization cannot be applied any hints that apply to it will be ignored.
3156For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
3157proven safe to vectorize. To identify and diagnose optimization issues use
3158`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
3159user guide for details.
3160
3161Extensions to specify floating-point flags
3162====================================================
3163
3164The ``#pragma clang fp`` pragma allows floating-point options to be specified
3165for a section of the source code. This pragma can only appear at file scope or
3166at the start of a compound statement (excluding comments). When using within a
3167compound statement, the pragma is active within the scope of the compound
3168statement.
3169
3170Currently, the following settings can be controlled with this pragma:
3171
3172``#pragma clang fp reassociate`` allows control over the reassociation
3173of floating point expressions. When enabled, this pragma allows the expression
3174``x + (y + z)`` to be reassociated as ``(x + y) + z``.
3175Reassociation can also occur across multiple statements.
3176This pragma can be used to disable reassociation when it is otherwise
3177enabled for the translation unit with the ``-fassociative-math`` flag.
3178The pragma can take two values: ``on`` and ``off``.
3179
3180.. code-block:: c++
3181
3182  float f(float x, float y, float z)
3183  {
3184    // Enable floating point reassociation across statements
3185    #pragma clang fp reassociate(on)
3186    float t = x + y;
3187    float v = t + z;
3188  }
3189
3190
3191``#pragma clang fp contract`` specifies whether the compiler should
3192contract a multiply and an addition (or subtraction) into a fused FMA
3193operation when supported by the target.
3194
3195The pragma can take three values: ``on``, ``fast`` and ``off``.  The ``on``
3196option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows
3197fusion as specified the language standard.  The ``fast`` option allows fusion
3198in cases when the language standard does not make this possible (e.g. across
3199statements in C).
3200
3201.. code-block:: c++
3202
3203  for(...) {
3204    #pragma clang fp contract(fast)
3205    a = b[i] * c[i];
3206    d[i] += a;
3207  }
3208
3209
3210The pragma can also be used with ``off`` which turns FP contraction off for a
3211section of the code. This can be useful when fast contraction is otherwise
3212enabled for the translation unit with the ``-ffp-contract=fast-honor-pragmas`` flag.
3213Note that ``-ffp-contract=fast`` will override pragmas to fuse multiply and
3214addition across statements regardless of any controlling pragmas.
3215
3216``#pragma clang fp exceptions`` specifies floating point exception behavior. It
3217may take one the the values: ``ignore``, ``maytrap`` or ``strict``. Meaning of
3218these values is same as for `constrained floating point intrinsics <http://llvm.org/docs/LangRef.html#constrained-floating-point-intrinsics>`_.
3219
3220.. code-block:: c++
3221
3222  {
3223    // Preserve floating point exceptions
3224    #pragma clang fp exceptions(strict)
3225    z = x + y;
3226    if (fetestexcept(FE_OVERFLOW))
3227	  ...
3228  }
3229
3230A ``#pragma clang fp`` pragma may contain any number of options:
3231
3232.. code-block:: c++
3233
3234  void func(float *dest, float a, float b) {
3235    #pragma clang fp exceptions(maytrap) contract(fast) reassociate(on)
3236    ...
3237  }
3238
3239
3240The ``#pragma float_control`` pragma allows precise floating-point
3241semantics and floating-point exception behavior to be specified
3242for a section of the source code. This pragma can only appear at file scope or
3243at the start of a compound statement (excluding comments). When using within a
3244compound statement, the pragma is active within the scope of the compound
3245statement.  This pragma is modeled after a Microsoft pragma with the
3246same spelling and syntax.  For pragmas specified at file scope, a stack
3247is supported so that the ``pragma float_control`` settings can be pushed or popped.
3248
3249When ``pragma float_control(precise, on)`` is enabled, the section of code
3250governed by the pragma uses precise floating point semantics, effectively
3251``-ffast-math`` is disabled and ``-ffp-contract=on``
3252(fused multiply add) is enabled.
3253
3254When ``pragma float_control(except, on)`` is enabled, the section of code governed
3255by the pragma behaves as though the command-line option
3256``-ffp-exception-behavior=strict`` is enabled,
3257when ``pragma float_control(precise, off)`` is enabled, the section of code
3258governed by the pragma behaves as though the command-line option
3259``-ffp-exception-behavior=ignore`` is enabled.
3260
3261The full syntax this pragma supports is
3262``float_control(except|precise, on|off [, push])`` and
3263``float_control(push|pop)``.
3264The ``push`` and ``pop`` forms, including using ``push`` as the optional
3265third argument, can only occur at file scope.
3266
3267.. code-block:: c++
3268
3269  for(...) {
3270    // This block will be compiled with -fno-fast-math and -ffp-contract=on
3271    #pragma float_control(precise, on)
3272    a = b[i] * c[i] + e;
3273  }
3274
3275Specifying an attribute for multiple declarations (#pragma clang attribute)
3276===========================================================================
3277
3278The ``#pragma clang attribute`` directive can be used to apply an attribute to
3279multiple declarations. The ``#pragma clang attribute push`` variation of the
3280directive pushes a new "scope" of ``#pragma clang attribute`` that attributes
3281can be added to. The ``#pragma clang attribute (...)`` variation adds an
3282attribute to that scope, and the ``#pragma clang attribute pop`` variation pops
3283the scope. You can also use ``#pragma clang attribute push (...)``, which is a
3284shorthand for when you want to add one attribute to a new scope. Multiple push
3285directives can be nested inside each other.
3286
3287The attributes that are used in the ``#pragma clang attribute`` directives
3288can be written using the GNU-style syntax:
3289
3290.. code-block:: c++
3291
3292  #pragma clang attribute push (__attribute__((annotate("custom"))), apply_to = function)
3293
3294  void function(); // The function now has the annotate("custom") attribute
3295
3296  #pragma clang attribute pop
3297
3298The attributes can also be written using the C++11 style syntax:
3299
3300.. code-block:: c++
3301
3302  #pragma clang attribute push ([[noreturn]], apply_to = function)
3303
3304  void function(); // The function now has the [[noreturn]] attribute
3305
3306  #pragma clang attribute pop
3307
3308The ``__declspec`` style syntax is also supported:
3309
3310.. code-block:: c++
3311
3312  #pragma clang attribute push (__declspec(dllexport), apply_to = function)
3313
3314  void function(); // The function now has the __declspec(dllexport) attribute
3315
3316  #pragma clang attribute pop
3317
3318A single push directive accepts only one attribute regardless of the syntax
3319used.
3320
3321Because multiple push directives can be nested, if you're writing a macro that
3322expands to ``_Pragma("clang attribute")`` it's good hygiene (though not
3323required) to add a namespace to your push/pop directives. A pop directive with a
3324namespace will pop the innermost push that has that same namespace. This will
3325ensure that another macro's ``pop`` won't inadvertently pop your attribute. Note
3326that an ``pop`` without a namespace will pop the innermost ``push`` without a
3327namespace. ``push``es with a namespace can only be popped by ``pop`` with the
3328same namespace. For instance:
3329
3330.. code-block:: c++
3331
3332   #define ASSUME_NORETURN_BEGIN _Pragma("clang attribute AssumeNoreturn.push ([[noreturn]], apply_to = function)")
3333   #define ASSUME_NORETURN_END   _Pragma("clang attribute AssumeNoreturn.pop")
3334
3335   #define ASSUME_UNAVAILABLE_BEGIN _Pragma("clang attribute Unavailable.push (__attribute__((unavailable)), apply_to=function)")
3336   #define ASSUME_UNAVAILABLE_END   _Pragma("clang attribute Unavailable.pop")
3337
3338
3339   ASSUME_NORETURN_BEGIN
3340   ASSUME_UNAVAILABLE_BEGIN
3341   void function(); // function has [[noreturn]] and __attribute__((unavailable))
3342   ASSUME_NORETURN_END
3343   void other_function(); // function has __attribute__((unavailable))
3344   ASSUME_UNAVAILABLE_END
3345
3346Without the namespaces on the macros, ``other_function`` will be annotated with
3347``[[noreturn]]`` instead of ``__attribute__((unavailable))``. This may seem like
3348a contrived example, but its very possible for this kind of situation to appear
3349in real code if the pragmas are spread out across a large file. You can test if
3350your version of clang supports namespaces on ``#pragma clang attribute`` with
3351``__has_extension(pragma_clang_attribute_namespaces)``.
3352
3353Subject Match Rules
3354-------------------
3355
3356The set of declarations that receive a single attribute from the attribute stack
3357depends on the subject match rules that were specified in the pragma. Subject
3358match rules are specified after the attribute. The compiler expects an
3359identifier that corresponds to the subject set specifier. The ``apply_to``
3360specifier is currently the only supported subject set specifier. It allows you
3361to specify match rules that form a subset of the attribute's allowed subject
3362set, i.e. the compiler doesn't require all of the attribute's subjects. For
3363example, an attribute like ``[[nodiscard]]`` whose subject set includes
3364``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at
3365least one of these rules after ``apply_to``:
3366
3367.. code-block:: c++
3368
3369  #pragma clang attribute push([[nodiscard]], apply_to = enum)
3370
3371  enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]]
3372
3373  struct Record1 { }; // The struct will *not* receive [[nodiscard]]
3374
3375  #pragma clang attribute pop
3376
3377  #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))
3378
3379  enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]]
3380
3381  struct Record2 { }; // The struct *will* receive [[nodiscard]]
3382
3383  #pragma clang attribute pop
3384
3385  // This is an error, since [[nodiscard]] can't be applied to namespaces:
3386  #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))
3387
3388  #pragma clang attribute pop
3389
3390Multiple match rules can be specified using the ``any`` match rule, as shown
3391in the example above. The ``any`` rule applies attributes to all declarations
3392that are matched by at least one of the rules in the ``any``. It doesn't nest
3393and can't be used inside the other match rules. Redundant match rules or rules
3394that conflict with one another should not be used inside of ``any``.
3395
3396Clang supports the following match rules:
3397
3398- ``function``: Can be used to apply attributes to functions. This includes C++
3399  member functions, static functions, operators, and constructors/destructors.
3400
3401- ``function(is_member)``: Can be used to apply attributes to C++ member
3402  functions. This includes members like static functions, operators, and
3403  constructors/destructors.
3404
3405- ``hasType(functionType)``: Can be used to apply attributes to functions, C++
3406  member functions, and variables/fields whose type is a function pointer. It
3407  does not apply attributes to Objective-C methods or blocks.
3408
3409- ``type_alias``: Can be used to apply attributes to ``typedef`` declarations
3410  and C++11 type aliases.
3411
3412- ``record``: Can be used to apply attributes to ``struct``, ``class``, and
3413  ``union`` declarations.
3414
3415- ``record(unless(is_union))``: Can be used to apply attributes only to
3416  ``struct`` and ``class`` declarations.
3417
3418- ``enum``: Can be be used to apply attributes to enumeration declarations.
3419
3420- ``enum_constant``: Can be used to apply attributes to enumerators.
3421
3422- ``variable``: Can be used to apply attributes to variables, including
3423  local variables, parameters, global variables, and static member variables.
3424  It does not apply attributes to instance member variables or Objective-C
3425  ivars.
3426
3427- ``variable(is_thread_local)``: Can be used to apply attributes to thread-local
3428  variables only.
3429
3430- ``variable(is_global)``: Can be used to apply attributes to global variables
3431  only.
3432
3433- ``variable(is_local)``: Can be used to apply attributes to local variables
3434  only.
3435
3436- ``variable(is_parameter)``: Can be used to apply attributes to parameters
3437  only.
3438
3439- ``variable(unless(is_parameter))``: Can be used to apply attributes to all
3440  the variables that are not parameters.
3441
3442- ``field``: Can be used to apply attributes to non-static member variables
3443  in a record. This includes Objective-C ivars.
3444
3445- ``namespace``: Can be used to apply attributes to ``namespace`` declarations.
3446
3447- ``objc_interface``: Can be used to apply attributes to ``@interface``
3448  declarations.
3449
3450- ``objc_protocol``: Can be used to apply attributes to ``@protocol``
3451  declarations.
3452
3453- ``objc_category``: Can be used to apply attributes to category declarations,
3454  including class extensions.
3455
3456- ``objc_method``: Can be used to apply attributes to Objective-C methods,
3457  including instance and class methods. Implicit methods like implicit property
3458  getters and setters do not receive the attribute.
3459
3460- ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C
3461  instance methods.
3462
3463- ``objc_property``: Can be used to apply attributes to ``@property``
3464  declarations.
3465
3466- ``block``: Can be used to apply attributes to block declarations. This does
3467  not include variables/fields of block pointer type.
3468
3469The use of ``unless`` in match rules is currently restricted to a strict set of
3470sub-rules that are used by the supported attributes. That means that even though
3471``variable(unless(is_parameter))`` is a valid match rule,
3472``variable(unless(is_thread_local))`` is not.
3473
3474Supported Attributes
3475--------------------
3476
3477Not all attributes can be used with the ``#pragma clang attribute`` directive.
3478Notably, statement attributes like ``[[fallthrough]]`` or type attributes
3479like ``address_space`` aren't supported by this directive. You can determine
3480whether or not an attribute is supported by the pragma by referring to the
3481:doc:`individual documentation for that attribute <AttributeReference>`.
3482
3483The attributes are applied to all matching declarations individually, even when
3484the attribute is semantically incorrect. The attributes that aren't applied to
3485any declaration are not verified semantically.
3486
3487Specifying section names for global objects (#pragma clang section)
3488===================================================================
3489
3490The ``#pragma clang section`` directive provides a means to assign section-names
3491to global variables, functions and static variables.
3492
3493The section names can be specified as:
3494
3495.. code-block:: c++
3496
3497  #pragma clang section bss="myBSS" data="myData" rodata="myRodata" relro="myRelro" text="myText"
3498
3499The section names can be reverted back to default name by supplying an empty
3500string to the section kind, for example:
3501
3502.. code-block:: c++
3503
3504  #pragma clang section bss="" data="" text="" rodata="" relro=""
3505
3506The ``#pragma clang section`` directive obeys the following rules:
3507
3508* The pragma applies to all global variable, statics and function declarations
3509  from the pragma to the end of the translation unit.
3510
3511* The pragma clang section is enabled automatically, without need of any flags.
3512
3513* This feature is only defined to work sensibly for ELF targets.
3514
3515* If section name is specified through _attribute_((section("myname"))), then
3516  the attribute name gains precedence.
3517
3518* Global variables that are initialized to zero will be placed in the named
3519  bss section, if one is present.
3520
3521* The ``#pragma clang section`` directive does not does try to infer section-kind
3522  from the name. For example, naming a section "``.bss.mySec``" does NOT mean
3523  it will be a bss section name.
3524
3525* The decision about which section-kind applies to each global is taken in the back-end.
3526  Once the section-kind is known, appropriate section name, as specified by the user using
3527  ``#pragma clang section`` directive, is applied to that global.
3528
3529Specifying Linker Options on ELF Targets
3530========================================
3531
3532The ``#pragma comment(lib, ...)`` directive is supported on all ELF targets.
3533The second parameter is the library name (without the traditional Unix prefix of
3534``lib``).  This allows you to provide an implicit link of dependent libraries.
3535
3536Evaluating Object Size Dynamically
3537==================================
3538
3539Clang supports the builtin ``__builtin_dynamic_object_size``, the semantics are
3540the same as GCC's ``__builtin_object_size`` (which Clang also supports), but
3541``__builtin_dynamic_object_size`` can evaluate the object's size at runtime.
3542``__builtin_dynamic_object_size`` is meant to be used as a drop-in replacement
3543for ``__builtin_object_size`` in libraries that support it.
3544
3545For instance, here is a program that ``__builtin_dynamic_object_size`` will make
3546safer:
3547
3548.. code-block:: c
3549
3550  void copy_into_buffer(size_t size) {
3551    char* buffer = malloc(size);
3552    strlcpy(buffer, "some string", strlen("some string"));
3553    // Previous line preprocesses to:
3554    // __builtin___strlcpy_chk(buffer, "some string", strlen("some string"), __builtin_object_size(buffer, 0))
3555  }
3556
3557Since the size of ``buffer`` can't be known at compile time, Clang will fold
3558``__builtin_object_size(buffer, 0)`` into ``-1``. However, if this was written
3559as ``__builtin_dynamic_object_size(buffer, 0)``, Clang will fold it into
3560``size``, providing some extra runtime safety.
3561
3562Extended Integer Types
3563======================
3564
3565Clang supports a set of extended integer types under the syntax ``_ExtInt(N)``
3566where ``N`` is an integer that specifies the number of bits that are used to represent
3567the type, including the sign bit. The keyword ``_ExtInt`` is a type specifier, thus
3568it can be used in any place a type can, including as a non-type-template-parameter,
3569as the type of a bitfield, and as the underlying type of an enumeration.
3570
3571An extended integer can be declared either signed, or unsigned by using the
3572``signed``/``unsigned`` keywords. If no sign specifier is used or if the ``signed``
3573keyword is used, the extended integer type is a signed integer and can represent
3574negative values.
3575
3576The ``N`` expression is an integer constant expression, which specifies the number
3577of bits used to represent the type, following normal integer representations for
3578both signed and unsigned types. Both a signed and unsigned extended integer of the
3579same ``N`` value will have the same number of bits in its representation. Many
3580architectures don't have a way of representing non power-of-2 integers, so these
3581architectures emulate these types using larger integers. In these cases, they are
3582expected to follow the 'as-if' rule and do math 'as-if' they were done at the
3583specified number of bits.
3584
3585In order to be consistent with the C language specification, and make the extended
3586integer types useful for their intended purpose, extended integers follow the C
3587standard integer conversion ranks. An extended integer type has a greater rank than
3588any integer type with less precision.  However, they have lower rank than any
3589of the built in or other integer types (such as __int128). Usual arithmetic conversions
3590also work the same, where the smaller ranked integer is converted to the larger.
3591
3592The one exception to the C rules for integers for these types is Integer Promotion.
3593Unary +, -, and ~ operators typically will promote operands to ``int``. Doing these
3594promotions would inflate the size of required hardware on some platforms, so extended
3595integer types aren't subject to the integer promotion rules in these cases.
3596
3597In languages (such as OpenCL) that define shift by-out-of-range behavior as a mask,
3598non-power-of-two versions of these types use an unsigned remainder operation to constrain
3599the value to the proper range, preventing undefined behavior.
3600
3601Extended integer types are aligned to the next greatest power-of-2 up to 64 bits.
3602The size of these types for the purposes of layout and ``sizeof`` are the number of
3603bits aligned to this calculated alignment. This permits the use of these types in
3604allocated arrays using common ``sizeof(Array)/sizeof(ElementType)`` pattern.
3605
3606Extended integer types work with the C _Atomic type modifier, however only precisions
3607that are powers-of-2 greater than 8 bit are accepted.
3608
3609Extended integer types align with existing calling conventions. They have the same size
3610and alignment as the smallest basic type that can contain them. Types that are larger
3611than 64 bits are handled in the same way as _int128 is handled; they are conceptually
3612treated as struct of register size chunks. They number of chunks are the smallest
3613number that can contain the types which does not necessarily mean a power-of-2 size.
3614
3615Intrinsics Support within Constant Expressions
3616==============================================
3617
3618The following builtin intrinsics can be used in constant expressions:
3619
3620* ``__builtin_bitreverse8``
3621* ``__builtin_bitreverse16``
3622* ``__builtin_bitreverse32``
3623* ``__builtin_bitreverse64``
3624* ``__builtin_bswap16``
3625* ``__builtin_bswap32``
3626* ``__builtin_bswap64``
3627* ``__builtin_clrsb``
3628* ``__builtin_clrsbl``
3629* ``__builtin_clrsbll``
3630* ``__builtin_clz``
3631* ``__builtin_clzl``
3632* ``__builtin_clzll``
3633* ``__builtin_clzs``
3634* ``__builtin_ctz``
3635* ``__builtin_ctzl``
3636* ``__builtin_ctzll``
3637* ``__builtin_ctzs``
3638* ``__builtin_ffs``
3639* ``__builtin_ffsl``
3640* ``__builtin_ffsll``
3641* ``__builtin_fpclassify``
3642* ``__builtin_inf``
3643* ``__builtin_isinf``
3644* ``__builtin_isinf_sign``
3645* ``__builtin_isfinite``
3646* ``__builtin_isnan``
3647* ``__builtin_isnormal``
3648* ``__builtin_nan``
3649* ``__builtin_nans``
3650* ``__builtin_parity``
3651* ``__builtin_parityl``
3652* ``__builtin_parityll``
3653* ``__builtin_popcount``
3654* ``__builtin_popcountl``
3655* ``__builtin_popcountll``
3656* ``__builtin_rotateleft8``
3657* ``__builtin_rotateleft16``
3658* ``__builtin_rotateleft32``
3659* ``__builtin_rotateleft64``
3660* ``__builtin_rotateright8``
3661* ``__builtin_rotateright16``
3662* ``__builtin_rotateright32``
3663* ``__builtin_rotateright64``
3664
3665The following x86-specific intrinsics can be used in constant expressions:
3666
3667* ``_bit_scan_forward``
3668* ``_bit_scan_reverse``
3669* ``__bsfd``
3670* ``__bsfq``
3671* ``__bsrd``
3672* ``__bsrq``
3673* ``__bswap``
3674* ``__bswapd``
3675* ``__bswap64``
3676* ``__bswapq``
3677* ``_castf32_u32``
3678* ``_castf64_u64``
3679* ``_castu32_f32``
3680* ``_castu64_f64``
3681* ``_mm_popcnt_u32``
3682* ``_mm_popcnt_u64``
3683* ``_popcnt32``
3684* ``_popcnt64``
3685* ``__popcntd``
3686* ``__popcntq``
3687* ``__rolb``
3688* ``__rolw``
3689* ``__rold``
3690* ``__rolq``
3691* ``__rorb``
3692* ``__rorw``
3693* ``__rord``
3694* ``__rorq``
3695* ``_rotl``
3696* ``_rotr``
3697* ``_rotwl``
3698* ``_rotwr``
3699* ``_lrotl``
3700* ``_lrotr``
3701