Clang Language Extensions

Introduction

This document describes the language extensions provided by Clang. In additionto the language extensions listed here, Clang aims to support a broad range ofGCC extensions. Please see theGCC manual for more information onthese extensions.

Feature Checking Macros

Language extensions can be very useful, but only if you know you can depend onthem. In order to allow fine-grain features checks, we support three builtinfunction-like macros. This allows you to directly test for a feature in yourcode without having to resort to something like autoconf or fragile “compilerversion checks”.

__has_builtin

This function-like macro takes a single identifier argument that is the name ofa builtin function, a builtin pseudo-function (taking one or more typearguments), or a builtin template.It evaluates to 1 if the builtin is supported or 0 if not.It can be used like this:

#ifndef __has_builtin// Optional of course.#define __has_builtin(x) 0// Compatibility with non-clang compilers.#endif...#if __has_builtin(__builtin_trap)__builtin_trap();#elseabort();#endif...

Note

Prior to Clang 10,__has_builtin could not be used to detect most builtinpseudo-functions.

__has_builtin should not be used to detect support for a builtin macro;use#ifdef instead.

__has_feature and__has_extension

These function-like macros take a single identifier argument that is the nameof a feature.__has_feature evaluates to 1 if the feature is bothsupported by Clang and standardized in the current language standard or 0 ifnot (but seebelow), while__has_extension evaluates to 1 if the feature is supported by Clang in thecurrent language (either as a language extension or a standard languagefeature) or 0 if not. They can be used like this:

#ifndef __has_feature// Optional of course.#define __has_feature(x) 0// Compatibility with non-clang compilers.#endif#ifndef __has_extension#define __has_extension __has_feature// Compatibility with pre-3.0 compilers.#endif...#if __has_feature(cxx_rvalue_references)// This code will only be compiled with the -std=c++11 and -std=gnu++11// options, because rvalue references are only standardized in C++11.#endif#if __has_extension(cxx_rvalue_references)// This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98// and -std=gnu++98 options, because rvalue references are supported as a// language extension in C++98.#endif

For backward compatibility,__has_feature can also be used to testfor support for non-standardized features, i.e. features not prefixedc_,cxx_ orobjc_.

Another use of__has_feature is to check for compiler features not relatedto the language standard, such as e.g.AddressSanitizer.

If the-pedantic-errors option is given,__has_extension is equivalentto__has_feature.

The feature tag is described along with the language feature below.

The feature name or extension name can also be specified with a preceding andfollowing__ (double underscore) to avoid interference from a macro withthe same name. For instance,__cxx_rvalue_references__ can be used insteadofcxx_rvalue_references.

__has_cpp_attribute

This function-like macro is available in C++20 by default, and is provided as anextension in earlier language standards. It takes a single argument that is thename of a double-square-bracket-style attribute. The argument can either be asingle identifier or a scoped identifier. If the attribute is supported, anonzero value is returned. If the attribute is a standards-based attribute, thismacro returns a nonzero value based on the year and month in which the attributewas voted into the working draft. SeeWG21 SD-6for the list of values returned for standards-based attributes. If the attributeis not supported by the current compilation target, this macro evaluates to 0.It can be used like this:

#ifndef __has_cpp_attribute// For backwards compatibility#define __has_cpp_attribute(x) 0#endif...#if __has_cpp_attribute(clang::fallthrough)#define FALLTHROUGH [[clang::fallthrough]]#else#define FALLTHROUGH#endif...

The attribute scope tokensclang and_Clang are interchangeable, as arethe attribute scope tokensgnu and__gnu__. Attribute tokens in eitherof these namespaces can be specified with a preceding and following__(double underscore) to avoid interference from a macro with the same name. Forinstance,gnu::__const__ can be used instead ofgnu::const.

__has_c_attribute

This function-like macro takes a single argument that is the name of anattribute exposed with the double square-bracket syntax in C mode. The argumentcan either be a single identifier or a scoped identifier. If the attribute issupported, a nonzero value is returned. If the attribute is not supported by thecurrent compilation target, this macro evaluates to 0. It can be used like this:

#ifndef __has_c_attribute// Optional of course.#define __has_c_attribute(x) 0// Compatibility with non-clang compilers.#endif...#if __has_c_attribute(fallthrough)#define FALLTHROUGH [[fallthrough]]#else#define FALLTHROUGH#endif...

The attribute scope tokensclang and_Clang are interchangeable, as arethe attribute scope tokensgnu and__gnu__. Attribute tokens in eitherof these namespaces can be specified with a preceding and following__(double underscore) to avoid interference from a macro with the same name. Forinstance,gnu::__const__ can be used instead ofgnu::const.

__has_attribute

This function-like macro takes a single identifier argument that is the name ofa GNU-style attribute. It evaluates to 1 if the attribute is supported by thecurrent compilation target, or 0 if not. It can be used like this:

#ifndef __has_attribute// Optional of course.#define __has_attribute(x) 0// Compatibility with non-clang compilers.#endif...#if __has_attribute(always_inline)#define ALWAYS_INLINE __attribute__((always_inline))#else#define ALWAYS_INLINE#endif...

The attribute name can also be specified with a preceding and following__(double underscore) to avoid interference from a macro with the same name. Forinstance,__always_inline__ can be used instead ofalways_inline.

__has_declspec_attribute

This function-like macro takes a single identifier argument that is the name ofan attribute implemented as a Microsoft-style__declspec attribute. Itevaluates to 1 if the attribute is supported by the current compilation target,or 0 if not. It can be used like this:

#ifndef __has_declspec_attribute// Optional of course.#define __has_declspec_attribute(x) 0// Compatibility with non-clang compilers.#endif...#if __has_declspec_attribute(dllexport)#define DLLEXPORT __declspec(dllexport)#else#define DLLEXPORT#endif...

The attribute name can also be specified with a preceding and following__(double underscore) to avoid interference from a macro with the same name. Forinstance,__dllexport__ can be used instead ofdllexport.

__is_identifier

This function-like macro takes a single identifier argument that might be eithera reserved word or a regular identifier. It evaluates to 1 if the argument is justa regular identifier and not a reserved word, in the sense that it can then beused as the name of a user-defined function or variable. Otherwise it evaluatesto 0. It can be used like this:

...#ifdef __is_identifier// Compatibility with non-clang compilers.#if __is_identifier(__wchar_t)typedefwchar_t__wchar_t;#endif#endif__wchar_tWideCharacter;...

Include File Checking Macros

Not all developments systems have the same include files. The__has_include and__has_include_next macros allowyou to check for the existence of an include file before doing a possiblyfailing#include directive. Include file checking macros must be usedas expressions in#if or#elif preprocessing directives.

__has_include

This function-like macro takes a single file name string argument that is thename of an include file. It evaluates to 1 if the file can be found using theinclude paths, or 0 otherwise:

// Note the two possible file name string formats.#if __has_include("myinclude.h") && __has_include(<stdint.h>)#include"myinclude.h"#endif

To test for this feature, use#ifdefined(__has_include):

// To avoid problem with non-clang compilers not having this macro.#if defined(__has_include)#if __has_include("myinclude.h")#include"myinclude.h"#endif#endif

__has_include_next

This function-like macro takes a single file name string argument that is thename of an include file. It is like__has_include except that it looks forthe second instance of the given file found in the include paths. It evaluatesto 1 if the second instance of the file can be found using the include paths,or 0 otherwise:

// Note the two possible file name string formats.#if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)# include_next "myinclude.h"#endif// To avoid problem with non-clang compilers not having this macro.#if defined(__has_include_next)#if __has_include_next("myinclude.h")# include_next "myinclude.h"#endif#endif

Note that__has_include_next, like the GNU extension#include_nextdirective, is intended for use in headers only, and will issue a warning ifused in the top-level compilation file. A warning will also be issued if anabsolute path is used in the file argument.

__has_warning

This function-like macro takes a string literal that represents a command lineoption for a warning and returns true if that is a valid warning option.

#if __has_warning("-Wformat")...#endif

Builtin Macros

__BASE_FILE__

Defined to a string that contains the name of the main input file passed toClang.

__FILE_NAME__

Clang-specific extension that functions similar to__FILE__ but onlyrenders the last path component (the filename) instead of an invocationdependent full path to that file.

__COUNTER__

Defined to an integer value that starts at zero and is incremented each timethe__COUNTER__ macro is expanded.

__INCLUDE_LEVEL__

Defined to an integral value that is the include depth of the file currentlybeing translated. For the main file, this value is zero.

__TIMESTAMP__

Defined to the date and time of the last modification of the current sourcefile.

__clang__

Defined when compiling with Clang

__clang_major__

Defined to the major marketing version number of Clang (e.g., the 2 in2.0.1). Note that marketing version numbers should not be used to check forlanguage features, as different vendors use different numbering schemes.Instead, use theFeature Checking Macros.

__clang_minor__

Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Notethat marketing version numbers should not be used to check for languagefeatures, as different vendors use different numbering schemes. Instead, usetheFeature Checking Macros.

__clang_patchlevel__

Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).

__clang_version__

Defined to a string that captures the Clang marketing version, including theSubversion tag or revision number, e.g., “1.5(trunk102332)”.

__clang_literal_encoding__

Defined to a narrow string literal that represents the current encoding ofnarrow string literals, e.g.,"hello". This macro typically expands to“UTF-8” (but may change in the future if the-fexec-charset="Encoding-Name" option is implemented.)

__clang_wide_literal_encoding__

Defined to a narrow string literal that represents the current encoding ofwide string literals, e.g.,L"hello". This macro typically expands to“UTF-16” or “UTF-32” (but may change in the future if the-fwide-exec-charset="Encoding-Name" option is implemented.)

Vectors and Extended Vectors

Supports the GCC, OpenCL, AltiVec, NEON and SVE vector extensions.

OpenCL vector types are created using theext_vector_type attribute. Itsupports theV.xyzw syntax and other tidbits as seen in OpenCL. An exampleis:

typedeffloatfloat4__attribute__((ext_vector_type(4)));typedeffloatfloat2__attribute__((ext_vector_type(2)));float4foo(float2a,float2b){float4c;c.xz=a;c.yw=b;returnc;}

Query for this feature with__has_attribute(ext_vector_type).

Giving-maltivec option to clang enables support for AltiVec vector syntaxand functions. For example:

vectorfloatfoo(vectorinta){vectorintb;b=vec_add(a,a)+a;return(vectorfloat)b;}

NEON vector types are created usingneon_vector_type andneon_polyvector_type attributes. For example:

typedef__attribute__((neon_vector_type(8)))int8_tint8x8_t;typedef__attribute__((neon_polyvector_type(16)))poly8_tpoly8x16_t;int8x8_tfoo(int8x8_ta){int8x8_tv;v=a;returnv;}

GCC vector types are created using thevector_size(N) attribute. TheargumentN specifies the number of bytes that will be allocated for anobject of this type. The size has to be multiple of the size of the vectorelement type. For example:

// OK: This declares a vector type with four 'int' elementstypedefintint4__attribute__((vector_size(4*sizeof(int))));// ERROR: '11' is not a multiple of sizeof(int)typedefintint_impossible__attribute__((vector_size(11)));int4foo(int4a){int4v;v=a;returnv;}

Boolean Vectors

Clang also supports the ext_vector_type attribute with boolean element types inC and C++. For example:

// legal for Clang, error for GCC:typedefboolbool4__attribute__((ext_vector_type(4)));// Objects of bool4 type hold 8 bits, sizeof(bool4) == 1bool4foo(bool4a){bool4v;v=a;returnv;}

Boolean vectors are a Clang extension of the ext vector type. Boolean vectorsare intended, though not guaranteed, to map to vector mask registers. The sizeparameter of a boolean vector type is the number of bits in the vector. Theboolean vector is dense and each bit in the boolean vector is one vectorelement.

The semantics of boolean vectors borrows from C bit-fields with the followingdifferences:

  • Distinct boolean vectors are always distinct memory objects (there is nopacking).

  • Only the operators?:,!,~,|,&,^ and comparison are allowed onboolean vectors.

  • Casting a scalar bool value to a boolean vector type means broadcasting thescalar value onto all lanes (same as general ext_vector_type).

  • It is not possible to access or swizzle elements of a boolean vector(different than general ext_vector_type).

The size and alignment are both the number of bits rounded up to the next powerof two, but the alignment is at most the maximum vector alignment of thetarget.

Vector Literals

Vector literals can be used to create vectors from a set of scalars, orvectors. Either parentheses or braces form can be used. In the parenthesesform the number of literal values specified must be one, i.e. referring to ascalar value, or must match the size of the vector type being created. If asingle scalar literal value is specified, the scalar literal value will bereplicated to all the components of the vector type. In the brackets form anynumber of literals can be specified. For example:

typedefintv4si__attribute__((__vector_size__(16)));typedeffloatfloat4__attribute__((ext_vector_type(4)));typedeffloatfloat2__attribute__((ext_vector_type(2)));v4sivsi=(v4si){1,2,3,4};float4vf=(float4)(1.0f,2.0f,3.0f,4.0f);vectorintvi1=(vectorint)(1);// vi1 will be (1, 1, 1, 1).vectorintvi2=(vectorint){1};// vi2 will be (1, 0, 0, 0).vectorintvi3=(vectorint)(1,2);// errorvectorintvi4=(vectorint){1,2};// vi4 will be (1, 2, 0, 0).vectorintvi5=(vectorint)(1,2,3,4);float4vf=(float4)((float2)(1.0f,2.0f),(float2)(3.0f,4.0f));

Vector Operations

The table below shows the support for each operation by vector extension. Adash indicates that an operation is not accepted according to a correspondingspecification.

Operator

OpenCL

AltiVec

GCC

NEON

SVE

[]

yes

yes

yes

yes

yes

unary operators +, –

yes

yes

yes

yes

yes

++, – –

yes

yes

yes

no

no

+,–,*,/,%

yes

yes

yes

yes

yes

bitwise operators &,|,^,~

yes

yes

yes

yes

yes

>>,<<

yes

yes

yes

yes

yes

!, &&, ||

yes

yes

yes

yes

==, !=, >, <, >=, <=

yes

yes

yes

yes

yes

=

yes

yes

yes

yes

yes

?:1

yes

yes

yes

yes

sizeof

yes

yes

yes

yes

yes2

C-style cast

yes

yes

yes

no

no

reinterpret_cast

yes

no

yes

no

no

static_cast

yes

no

yes

no

no

const_cast

no

no

no

no

no

address &v[i]

no

no

no3

no

no

See also__builtin_shufflevector,__builtin_convertvector.

1

ternary operator(?:) has different behaviors depending on conditionoperand’s vector type. If the condition is a GNU vector (i.e. __vector_size__),a NEON vector or an SVE vector, it’s only available in C++ and uses normal boolconversions (that is, != 0).If it’s an extension (OpenCL) vector, it’s only available in C and OpenCL C.And it selects base on signedness of the condition operands (OpenCL v1.1 s6.3.9).

2

sizeof can only be used on vector length specific SVE types.

3

Clang does not allow the address of an element to be taken while GCCallows this. This is intentional for vectors with a boolean element type andnot implemented otherwise.

Vector Builtins

Note: The implementation of vector builtins is work-in-progress and incomplete.

In addition to the operators mentioned above, Clang provides a set of builtinsto perform additional operations on certain scalar and vector types.

LetT be one of the following types:

  • an integer type (as in C2x 6.2.5p19), but excluding enumerated types and _Bool

  • the standard floating types float or double

  • a half-precision floating point type, if one is supported on the target

  • a vector type.

For scalar types, consider the operation applied to a vector with a single element.

Elementwise Builtins

Each builtin returns a vector equivalent to applying the specified operationelementwise to the input.

Unless specified otherwise operation(±0) = ±0 and operation(±infinity) = ±infinity

Name

Operation

Supported element types

T __builtin_elementwise_abs(T x)

return the absolute value of a number x; the absolute value ofthe most negative integer remains the most negative integer

signed integer and floating point types

T __builtin_elementwise_ceil(T x)

return the smallest integral value greater than or equal to x

floating point types

T __builtin_elementwise_floor(T x)

return the largest integral value less than or equal to x

floating point types

T __builtin_elementwise_roundeven(T x)

round x to the nearest integer value in floating point format,rounding halfway cases to even (that is, to the nearest valuethat is an even integer), regardless of the current roundingdirection.

floating point types

T__builtin_elementwise_trunc(T x)

return the integral value nearest to but no larger inmagnitude than x

floating point types

T __builtin_elementwise_max(T x, T y)

return x or y, whichever is larger

integer and floating point types

T __builtin_elementwise_min(T x, T y)

return x or y, whichever is smaller

integer and floating point types

T __builtin_elementwise_add_sat(T x, T y)

return the sum of x and y, clamped to the range ofrepresentable values for the signed/unsigned integer type.

integer types

T __builtin_elementwise_sub_sat(T x, T y)

return the difference of x and y, clamped to the range ofrepresentable values for the signed/unsigned integer type.

integer types

Reduction Builtins

Each builtin returns a scalar equivalent to applying the specifiedoperation(x, y) as recursive even-odd pairwise reduction to all vectorelements.operation(x,y) is repeatedly applied to each non-overlappingeven-odd element pair with indicesi*2 andi*2+1 withiin[0,Numberofelements/2). If the numbers of elements is not apower of 2, the vector is widened with neutral elements for the reductionat the end to the next power of 2.

Example:

__builtin_reduce_add([e3,e2,e1,e0])=__builtin_reduced_add([e3+e2,e1+e0])=(e3+e2)+(e1+e0)

LetVT be a vector type andET the element type ofVT.

Name

Operation

Supported element types

ET __builtin_reduce_max(VT a)

return x or y, whichever is larger; If exactly one argument isa NaN, return the other argument. If both arguments are NaNs,fmax() return a NaN.

integer and floating point types

ET __builtin_reduce_min(VT a)

return x or y, whichever is smaller; If exactly one argumentis a NaN, return the other argument. If both arguments areNaNs, fmax() return a NaN.

integer and floating point types

ET __builtin_reduce_add(VT a)

+

integer and floating point types

ET __builtin_reduce_mul(VT a)

*

integer and floating point types

ET __builtin_reduce_and(VT a)

&

integer types

ET __builtin_reduce_or(VT a)

|

integer types

ET __builtin_reduce_xor(VT a)

^

integer types

Matrix Types

Clang provides an extension for matrix types, which is currently beingimplemented. Seethe draft specification for more details.

For example, the code below uses the matrix types extension to multiply two 4x4float matrices and add the result to a third 4x4 matrix.

typedeffloatm4x4_t__attribute__((matrix_type(4,4)));m4x4_tf(m4x4_ta,m4x4_tb,m4x4_tc){returna+b*c;}

The matrix type extension also supports operations on a matrix and a scalar.

typedeffloatm4x4_t__attribute__((matrix_type(4,4)));m4x4_tf(m4x4_ta){return(a+23)*12;}

The matrix type extension supports division on a matrix and a scalar but not on a matrix and a matrix.

typedeffloatm4x4_t__attribute__((matrix_type(4,4)));m4x4_tf(m4x4_ta){a=a/3.0;returna;}

The matrix type extension supports compound assignments for addition, subtraction, and multiplication on matricesand on a matrix and a scalar, provided their types are consistent.

typedeffloatm4x4_t__attribute__((matrix_type(4,4)));m4x4_tf(m4x4_ta,m4x4_tb){a+=b;a-=b;a*=b;a+=23;a-=12;returna;}

The matrix type extension supports explicit casts. Implicit type conversion between matrix types is not allowed.

typedefintix5x5__attribute__((matrix_type(5,5)));typedeffloatfx5x5__attribute__((matrix_type(5,5)));fx5x5f1(ix5x5i,fx5x5f){return(fx5x5)i;}template<typenameX>usingmatrix_4_4=X__attribute__((matrix_type(4,4)));voidf2(){matrix_5_5<double>d;matrix_5_5<int>i;i=(matrix_5_5<int>)d;i=static_cast<matrix_5_5<int>>(d);}

Half-Precision Floating Point

Clang supports three half-precision (16-bit) floating point types:__fp16,_Float16 and__bf16. These types are supported in all language modes.

__fp16 is supported on every target, as it is purely a storage format; see below._Float16 is currently only supported on the following targets, with furthertargets pending ABI standardization:

  • 32-bit ARM

  • 64-bit ARM (AArch64)

  • AMDGPU

  • SPIR

  • X86 (see below)

On X86 targets,_Float16 is supported as long as SSE2 is available, whichincludes all 64-bit and all recent 32-bit processors. When the target supportsAVX512-FP16,_Float16 arithmetic is performed using that native support.Otherwise,_Float16 arithmetic is performed by promoting tofloat,performing the operation, and then truncating to_Float16.

_Float16 will be supported on more targets as they define ABIs for it.

__bf16 is purely a storage format; it is currently only supported on the following targets:* 32-bit ARM* 64-bit ARM (AArch64)* X86 (see below)

On X86 targets,__bf16 is supported as long as SSE2 is available, whichincludes all 64-bit and all recent 32-bit processors.

The__bf16 type is only available when supported in hardware.

__fp16 is a storage and interchange format only. This means that values of__fp16 are immediately promoted to (at least)float when used in arithmeticoperations, so that e.g. the result of adding two__fp16 values has typefloat.The behavior of__fp16 is specified by the ARM C Language Extensions (ACLE).Clang uses thebinary16 format from IEEE 754-2008 for__fp16, not the ARMalternative format.

_Float16 is an interchange floating-point type. This means that, just like arithmetic onfloat ordouble, arithmetic on_Float16 operands is formally performed in the_Float16 type, so that e.g. the result of adding two_Float16 values has type_Float16. The behavior of_Float16 is specified by ISO/IEC TS 18661-3:2015(“Floating-point extensions for C”). As with__fp16, Clang uses thebinary16format from IEEE 754-2008 for_Float16.

_Float16 arithmetic will be performed using native half-precision supportwhen available on the target (e.g. on ARMv8.2a); otherwise it will be performedat a higher precision (currently alwaysfloat) and then truncated down to_Float16. Note that C and C++ allow intermediate floating-point operandsof an expression to be computed with greater precision than is expressible intheir type, so Clang may avoid intermediate truncations in certain cases; this maylead to results that are inconsistent with native arithmetic.

It is recommended that portable code use_Float16 instead of__fp16,as it has been defined by the C standards committee and has behavior that ismore familiar to most programmers.

Because__fp16 operands are always immediately promoted tofloat, thecommon real type of__fp16 and_Float16 for the purposes of the usualarithmetic conversions isfloat.

A literal can be given_Float16 type using the suffixf16. For example,3.14f16.

Because default argument promotion only applies to the standard floating-pointtypes,_Float16 values are not promoted todouble when passed as variadicor untyped arguments. As a consequence, some caution must be taken when usingcertain library facilities with_Float16; for example, there is noprintf formatspecifier for_Float16, and (unlikefloat) it will not be implicitly promoted todouble when passed toprintf, so the programmer must explicitly cast it todouble before using it with an%f or similar specifier.

Messages ondeprecated andunavailable Attributes

An optional string message can be added to thedeprecated andunavailable attributes. For example:

voidexplode(void)__attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));

If the deprecated or unavailable declaration is used, the message will beincorporated into the appropriate diagnostic:

harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!      [-Wdeprecated-declarations]  explode();  ^

Query for this feature with__has_extension(attribute_deprecated_with_message) and__has_extension(attribute_unavailable_with_message).

Attributes on Enumerators

Clang allows attributes to be written on individual enumerators. This allowsenumerators to be deprecated, made unavailable, etc. The attribute must appearafter the enumerator name and before any initializer, like so:

enumOperationMode{OM_Invalid,OM_Normal,OM_Terrified__attribute__((deprecated)),OM_AbortOnError__attribute__((deprecated))=4};

Attributes on theenum declaration do not apply to individual enumerators.

Query for this feature with__has_extension(enumerator_attributes).

C++11 Attributes on using-declarations

Clang allows C++-style[[]] attributes to be written on using-declarations.For instance:

[[clang::using_if_exists]]usingfoo::bar;usingfoo::baz[[clang::using_if_exists]];

You can test for support for this extension with__has_extension(cxx_attributes_on_using_declarations).

‘User-Specified’ System Frameworks

Clang provides a mechanism by which frameworks can be built in such a way thatthey will always be treated as being “system frameworks”, even if they are notpresent in a system framework directory. This can be useful to systemframework developers who want to be able to test building other applicationswith development builds of their framework, including the manner in which thecompiler changes warning behavior for system headers.

Framework developers can opt-in to this mechanism by creating a“.system_framework” file at the top-level of their framework. That is, theframework should have contents like:

.../TestFramework.framework.../TestFramework.framework/.system_framework.../TestFramework.framework/Headers.../TestFramework.framework/Headers/TestFramework.h...

Clang will treat the presence of this file as an indicator that the frameworkshould be treated as a system framework, regardless of how it was found in theframework search path. For consistency, we recommend that such files never beincluded in installed versions of the framework.

Checks for Standard Language Features

The__has_feature macro can be used to query if certain standard languagefeatures are enabled. The__has_extension macro can be used to query iflanguage features are available as an extension when compiling for a standardwhich does not provide them. The features which can be tested are listed here.

Since Clang 3.4, the C++ SD-6 feature test macros are also supported.These are macros with names of the form__cpp_<feature_name>, and areintended to be a portable way to query the supported features of the compiler.Seethe C++ status page forinformation on the version of SD-6 supported by each Clang release, and themacros provided by that revision of the recommendations.

C++98

The features listed below are part of the C++98 standard. These features areenabled by default when compiling C++ code.

C++ exceptions

Use__has_feature(cxx_exceptions) to determine if C++ exceptions have beenenabled. For example, compiling code with-fno-exceptions disables C++exceptions.

C++ RTTI

Use__has_feature(cxx_rtti) to determine if C++ RTTI has been enabled. Forexample, compiling code with-fno-rtti disables the use of RTTI.

C++11

The features listed below are part of the C++11 standard. As a result, allthese features are enabled with the-std=c++11 or-std=gnu++11 optionwhen compiling C++ code.

C++11 SFINAE includes access control

Use__has_feature(cxx_access_control_sfinae) or__has_extension(cxx_access_control_sfinae) to determine whetheraccess-control errors (e.g., calling a private constructor) are considered tobe template argument deduction errors (aka SFINAE errors), perC++ DR1170.

C++11 alias templates

Use__has_feature(cxx_alias_templates) or__has_extension(cxx_alias_templates) to determine if support for C++11’salias declarations and alias templates is enabled.

C++11 alignment specifiers

Use__has_feature(cxx_alignas) or__has_extension(cxx_alignas) todetermine if support for alignment specifiers usingalignas is enabled.

Use__has_feature(cxx_alignof) or__has_extension(cxx_alignof) todetermine if support for thealignof keyword is enabled.

C++11 attributes

Use__has_feature(cxx_attributes) or__has_extension(cxx_attributes) todetermine if support for attribute parsing with C++11’s square bracket notationis enabled.

C++11 generalized constant expressions

Use__has_feature(cxx_constexpr) to determine if support for generalizedconstant expressions (e.g.,constexpr) is enabled.

C++11decltype()

Use__has_feature(cxx_decltype) or__has_extension(cxx_decltype) todetermine if support for thedecltype() specifier is enabled. C++11’sdecltype does not require type-completeness of a function call expression.Use__has_feature(cxx_decltype_incomplete_return_types) or__has_extension(cxx_decltype_incomplete_return_types) to determine ifsupport for this feature is enabled.

C++11 default template arguments in function templates

Use__has_feature(cxx_default_function_template_args) or__has_extension(cxx_default_function_template_args) to determine if supportfor default template arguments in function templates is enabled.

C++11defaulted functions

Use__has_feature(cxx_defaulted_functions) or__has_extension(cxx_defaulted_functions) to determine if support fordefaulted function definitions (with=default) is enabled.

C++11 delegating constructors

Use__has_feature(cxx_delegating_constructors) to determine if support fordelegating constructors is enabled.

C++11deleted functions

Use__has_feature(cxx_deleted_functions) or__has_extension(cxx_deleted_functions) to determine if support for deletedfunction definitions (with=delete) is enabled.

C++11 explicit conversion functions

Use__has_feature(cxx_explicit_conversions) to determine if support forexplicit conversion functions is enabled.

C++11 generalized initializers

Use__has_feature(cxx_generalized_initializers) to determine if support forgeneralized initializers (using braced lists andstd::initializer_list) isenabled.

C++11 implicit move constructors/assignment operators

Use__has_feature(cxx_implicit_moves) to determine if Clang will implicitlygenerate move constructors and move assignment operators where needed.

C++11 inheriting constructors

Use__has_feature(cxx_inheriting_constructors) to determine if support forinheriting constructors is enabled.

C++11 inline namespaces

Use__has_feature(cxx_inline_namespaces) or__has_extension(cxx_inline_namespaces) to determine if support for inlinenamespaces is enabled.

C++11 lambdas

Use__has_feature(cxx_lambdas) or__has_extension(cxx_lambdas) todetermine if support for lambdas is enabled.

C++11 local and unnamed types as template arguments

Use__has_feature(cxx_local_type_template_args) or__has_extension(cxx_local_type_template_args) to determine if support forlocal and unnamed types as template arguments is enabled.

C++11 noexcept

Use__has_feature(cxx_noexcept) or__has_extension(cxx_noexcept) todetermine if support for noexcept exception specifications is enabled.

C++11 in-class non-static data member initialization

Use__has_feature(cxx_nonstatic_member_init) to determine whether in-classinitialization of non-static data members is enabled.

C++11nullptr

Use__has_feature(cxx_nullptr) or__has_extension(cxx_nullptr) todetermine if support fornullptr is enabled.

C++11overridecontrol

Use__has_feature(cxx_override_control) or__has_extension(cxx_override_control) to determine if support for theoverride control keywords is enabled.

C++11 reference-qualified functions

Use__has_feature(cxx_reference_qualified_functions) or__has_extension(cxx_reference_qualified_functions) to determine if supportfor reference-qualified functions (e.g., member functions with& or&&applied to*this) is enabled.

C++11 range-basedfor loop

Use__has_feature(cxx_range_for) or__has_extension(cxx_range_for) todetermine if support for the range-based for loop is enabled.

C++11 raw string literals

Use__has_feature(cxx_raw_string_literals) to determine if support for rawstring literals (e.g.,R"x(foo\bar)x") is enabled.

C++11 rvalue references

Use__has_feature(cxx_rvalue_references) or__has_extension(cxx_rvalue_references) to determine if support for rvaluereferences is enabled.

C++11static_assert()

Use__has_feature(cxx_static_assert) or__has_extension(cxx_static_assert) to determine if support for compile-timeassertions usingstatic_assert is enabled.

C++11thread_local

Use__has_feature(cxx_thread_local) to determine if support forthread_local variables is enabled.

C++11 type inference

Use__has_feature(cxx_auto_type) or__has_extension(cxx_auto_type) todetermine C++11 type inference is supported using theauto specifier. Ifthis is disabled,auto will instead be a storage class specifier, as in Cor C++98.

C++11 strongly typed enumerations

Use__has_feature(cxx_strong_enums) or__has_extension(cxx_strong_enums) to determine if support for stronglytyped, scoped enumerations is enabled.

C++11 trailing return type

Use__has_feature(cxx_trailing_return) or__has_extension(cxx_trailing_return) to determine if support for thealternate function declaration syntax with trailing return type is enabled.

C++11 Unicode string literals

Use__has_feature(cxx_unicode_literals) to determine if support for Unicodestring literals is enabled.

C++11 unrestricted unions

Use__has_feature(cxx_unrestricted_unions) to determine if support forunrestricted unions is enabled.

C++11 user-defined literals

Use__has_feature(cxx_user_literals) to determine if support foruser-defined literals is enabled.

C++11 variadic templates

Use__has_feature(cxx_variadic_templates) or__has_extension(cxx_variadic_templates) to determine if support forvariadic templates is enabled.

C++14

The features listed below are part of the C++14 standard. As a result, allthese features are enabled with the-std=C++14 or-std=gnu++14 optionwhen compiling C++ code.

C++14 binary literals

Use__has_feature(cxx_binary_literals) or__has_extension(cxx_binary_literals) to determine whetherbinary literals (for instance,0b10010) are recognized. Clang supports thisfeature as an extension in all language modes.

C++14 contextual conversions

Use__has_feature(cxx_contextual_conversions) or__has_extension(cxx_contextual_conversions) to determine if the C++14 rulesare used when performing an implicit conversion for an array bound in anew-expression, the operand of adelete-expression, an integral constantexpression, or a condition in aswitch statement.

C++14 decltype(auto)

Use__has_feature(cxx_decltype_auto) or__has_extension(cxx_decltype_auto) to determine if supportfor thedecltype(auto) placeholder type is enabled.

C++14 default initializers for aggregates

Use__has_feature(cxx_aggregate_nsdmi) or__has_extension(cxx_aggregate_nsdmi) to determine if supportfor default initializers in aggregate members is enabled.

C++14 digit separators

Use__cpp_digit_separators to determine if support for digit separatorsusing single quotes (for instance,10'000) is enabled. At this time, thereis no corresponding__has_feature name

C++14 generalized lambda capture

Use__has_feature(cxx_init_captures) or__has_extension(cxx_init_captures) to determine if support forlambda captures with explicit initializers is enabled(for instance,[n(0)]{return++n;}).

C++14 generic lambdas

Use__has_feature(cxx_generic_lambdas) or__has_extension(cxx_generic_lambdas) to determine if support for generic(polymorphic) lambdas is enabled(for instance,[](autox){returnx+1;}).

C++14 relaxed constexpr

Use__has_feature(cxx_relaxed_constexpr) or__has_extension(cxx_relaxed_constexpr) to determine if variabledeclarations, local variable modification, and control flow constructsare permitted inconstexpr functions.

C++14 return type deduction

Use__has_feature(cxx_return_type_deduction) or__has_extension(cxx_return_type_deduction) to determine if supportfor return type deduction for functions (usingauto as a return type)is enabled.

C++14 runtime-sized arrays

Use__has_feature(cxx_runtime_array) or__has_extension(cxx_runtime_array) to determine if supportfor arrays of runtime bound (a restricted form of variable-length arrays)is enabled.Clang’s implementation of this feature is incomplete.

C++14 variable templates

Use__has_feature(cxx_variable_templates) or__has_extension(cxx_variable_templates) to determine if support fortemplated variable declarations is enabled.

C11

The features listed below are part of the C11 standard. As a result, all thesefeatures are enabled with the-std=c11 or-std=gnu11 option whencompiling C code. Additionally, because these features are allbackward-compatible, they are available as extensions in all language modes.

C11 alignment specifiers

Use__has_feature(c_alignas) or__has_extension(c_alignas) to determineif support for alignment specifiers using_Alignas is enabled.

Use__has_feature(c_alignof) or__has_extension(c_alignof) to determineif support for the_Alignof keyword is enabled.

C11 atomic operations

Use__has_feature(c_atomic) or__has_extension(c_atomic) to determineif support for atomic types using_Atomic is enabled. Clang also providesa set of builtins which can be used to implementthe<stdatomic.h> operations on_Atomic types. Use__has_include(<stdatomic.h>) to determine if C11’s<stdatomic.h> headeris available.

Clang will use the system’s<stdatomic.h> header when one is available, andwill otherwise use its own. When using its own, implementations of the atomicoperations are provided as macros. In the cases where C11 also requires a realfunction, this header provides only the declaration of that function (alongwith a shadowing macro implementation), and you must link to a library whichprovides a definition of the function if you use it instead of the macro.

C11 generic selections

Use__has_feature(c_generic_selections) or__has_extension(c_generic_selections) to determine if support for genericselections is enabled.

As an extension, the C11 generic selection expression is available in alllanguages supported by Clang. The syntax is the same as that given in the C11standard.

In C, type compatibility is decided according to the rules given in theappropriate standard, but in C++, which lacks the type compatibility rules usedin C, types are considered compatible only if they are equivalent.

C11_Static_assert()

Use__has_feature(c_static_assert) or__has_extension(c_static_assert)to determine if support for compile-time assertions using_Static_assert isenabled.

C11_Thread_local

Use__has_feature(c_thread_local) or__has_extension(c_thread_local)to determine if support for_Thread_local variables is enabled.

Modules

Use__has_feature(modules) to determine if Modules have been enabled.For example, compiling code with-fmodules enables the use of Modules.

More information could be foundhere.

Type Trait Primitives

Type trait primitives are special builtin constant expressions that can be usedby the standard C++ library to facilitate or simplify the implementation ofuser-facing type traits in the <type_traits> header.

They are not intended to be used directly by user code because they areimplementation-defined and subject to change – as such they’re tied closely tothe supported set of system headers, currently:

  • LLVM’s own libc++

  • GNU libstdc++

  • The Microsoft standard C++ library

Clang supports theGNU C++ type traits and a subset of theMicrosoft Visual C++ type traits,as well as nearly all of theEmbarcadero C++ type traits.

The following type trait primitives are supported by Clang. Those traits marked(C++) provide implementations for type traits specified by the C++ standard;__X(...) has the same semantics and constraints as the correspondingstd::X_t<...> orstd::X_v<...> type trait.

  • __array_rank(type) (Embarcadero):Returns the number of levels of array in the typetype:0 iftype is not an array type, and__array_rank(element)+1 iftype is an array ofelement.

  • __array_extent(type,dim) (Embarcadero):Thedim’th array bound in the typetype, or0 ifdim>=__array_rank(type).

  • __has_nothrow_assign (GNU, Microsoft, Embarcadero):Deprecated, use__is_nothrow_assignable instead.

  • __has_nothrow_move_assign (GNU, Microsoft):Deprecated, use__is_nothrow_assignable instead.

  • __has_nothrow_copy (GNU, Microsoft):Deprecated, use__is_nothrow_constructible instead.

  • __has_nothrow_constructor (GNU, Microsoft):Deprecated, use__is_nothrow_constructible instead.

  • __has_trivial_assign (GNU, Microsoft, Embarcadero):Deprecated, use__is_trivially_assignable instead.

  • __has_trivial_move_assign (GNU, Microsoft):Deprecated, use__is_trivially_assignable instead.

  • __has_trivial_copy (GNU, Microsoft):Deprecated, use__is_trivially_copyable instead.

  • __has_trivial_constructor (GNU, Microsoft):Deprecated, use__is_trivially_constructible instead.

  • __has_trivial_move_constructor (GNU, Microsoft):Deprecated, use__is_trivially_constructible instead.

  • __has_trivial_destructor (GNU, Microsoft, Embarcadero):Deprecated, use__is_trivially_destructible instead.

  • __has_unique_object_representations (C++, GNU)

  • __has_virtual_destructor (C++, GNU, Microsoft, Embarcadero)

  • __is_abstract (C++, GNU, Microsoft, Embarcadero)

  • __is_aggregate (C++, GNU, Microsoft)

  • __is_arithmetic (C++, Embarcadero)

  • __is_array (C++, Embarcadero)

  • __is_assignable (C++, MSVC 2015)

  • __is_base_of (C++, GNU, Microsoft, Embarcadero)

  • __is_class (C++, GNU, Microsoft, Embarcadero)

  • __is_complete_type(type) (Embarcadero):Returntrue iftype is a complete type.Warning: this trait is dangerous because it can return different values atdifferent points in the same program.

  • __is_compound (C++, Embarcadero)

  • __is_const (C++, Embarcadero)

  • __is_constructible (C++, MSVC 2013)

  • __is_convertible (C++, Embarcadero)

  • __is_convertible_to (Microsoft):Synonym for__is_convertible.

  • __is_destructible (C++, MSVC 2013):Only available in-fms-extensions mode.

  • __is_empty (C++, GNU, Microsoft, Embarcadero)

  • __is_enum (C++, GNU, Microsoft, Embarcadero)

  • __is_final (C++, GNU, Microsoft)

  • __is_floating_point (C++, Embarcadero)

  • __is_function (C++, Embarcadero)

  • __is_fundamental (C++, Embarcadero)

  • __is_integral (C++, Embarcadero)

  • __is_interface_class (Microsoft):Returnsfalse, even for types defined with__interface.

  • __is_literal (Clang):Synonym for__is_literal_type.

  • __is_literal_type (C++, GNU, Microsoft):Note, the corresponding standard trait was deprecated in C++17and removed in C++20.

  • __is_lvalue_reference (C++, Embarcadero)

  • __is_member_object_pointer (C++, Embarcadero)

  • __is_member_function_pointer (C++, Embarcadero)

  • __is_member_pointer (C++, Embarcadero)

  • __is_nothrow_assignable (C++, MSVC 2013)

  • __is_nothrow_constructible (C++, MSVC 2013)

  • __is_nothrow_destructible (C++, MSVC 2013)Only available in-fms-extensions mode.

  • __is_object (C++, Embarcadero)

  • __is_pod (C++, GNU, Microsoft, Embarcadero):Note, the corresponding standard trait was deprecated in C++20.

  • __is_pointer (C++, Embarcadero)

  • __is_polymorphic (C++, GNU, Microsoft, Embarcadero)

  • __is_reference (C++, Embarcadero)

  • __is_rvalue_reference (C++, Embarcadero)

  • __is_same (C++, Embarcadero)

  • __is_same_as (GCC): Synonym for__is_same.

  • __is_scalar (C++, Embarcadero)

  • __is_sealed (Microsoft):Synonym for__is_final.

  • __is_signed (C++, Embarcadero):Returns false for enumeration types, and returns true for floating-pointtypes. Note, before Clang 10, returned true for enumeration types if theunderlying type was signed, and returned false for floating-point types.

  • __is_standard_layout (C++, GNU, Microsoft, Embarcadero)

  • __is_trivial (C++, GNU, Microsoft, Embarcadero)

  • __is_trivially_assignable (C++, GNU, Microsoft)

  • __is_trivially_constructible (C++, GNU, Microsoft)

  • __is_trivially_copyable (C++, GNU, Microsoft)

  • __is_trivially_destructible (C++, MSVC 2013)

  • __is_trivially_relocatable (Clang): Returns true if moving an objectof the given type, and then destroying the source object, is known to befunctionally equivalent to copying the underlying bytes and then dropping thesource object on the floor. This is true of trivial types and types whichwere made trivially relocatable via theclang::trivial_abi attribute.

  • __is_union (C++, GNU, Microsoft, Embarcadero)

  • __is_unsigned (C++, Embarcadero):Returns false for enumeration types. Note, before Clang 13, returned true forenumeration types if the underlying type was unsigned.

  • __is_void (C++, Embarcadero)

  • __is_volatile (C++, Embarcadero)

  • __reference_binds_to_temporary(T,U) (Clang): Determines whether areference of typeT bound to an expression of typeU would bind to amaterialized temporary object. IfT is not a reference type the resultis false. Note this trait will also return false when the initialization ofT fromU is ill-formed.

  • __underlying_type (C++, GNU, Microsoft)

In addition, the following expression traits are supported:

  • __is_lvalue_expr(e) (Embarcadero):Returns true ife is an lvalue expression.Deprecated, use__is_lvalue_reference(decltype((e))) instead.

  • __is_rvalue_expr(e) (Embarcadero):Returns true ife is a prvalue expression.Deprecated, use!__is_reference(decltype((e))) instead.

There are multiple ways to detect support for a type trait__X in thecompiler, depending on the oldest version of Clang you wish to support.

  • From Clang 10 onwards,__has_builtin(__X) can be used.

  • From Clang 6 onwards,!__is_identifier(__X) can be used.

  • From Clang 3 onwards,__has_feature(X) can be used, but only supportsthe following traits:

    • __has_nothrow_assign

    • __has_nothrow_copy

    • __has_nothrow_constructor

    • __has_trivial_assign

    • __has_trivial_copy

    • __has_trivial_constructor

    • __has_trivial_destructor

    • __has_virtual_destructor

    • __is_abstract

    • __is_base_of

    • __is_class

    • __is_constructible

    • __is_convertible_to

    • __is_empty

    • __is_enum

    • __is_final

    • __is_literal

    • __is_standard_layout

    • __is_pod

    • __is_polymorphic

    • __is_sealed

    • __is_trivial

    • __is_trivially_assignable

    • __is_trivially_constructible

    • __is_trivially_copyable

    • __is_union

    • __underlying_type

A simplistic usage example as might be seen in standard C++ headers follows:

#if __has_builtin(__is_convertible_to)template<typenameFrom,typenameTo>structis_convertible_to{staticconstboolvalue=__is_convertible_to(From,To);};#else// Emulate type trait for compatibility with other compilers.#endif

Blocks

The syntax and high level language feature description is inBlockLanguageSpec. Implementation and ABI details forthe clang implementation are inBlock-ABI-Apple.

Query for this feature with__has_extension(blocks).

ASM Goto with Output Constraints

In addition to the functionality provided byGCC’s extendedassembly, clangsupports output constraints with thegoto form.

The goto form of GCC’s extended assembly allows the programmer to branch to a Clabel from within an inline assembly block. Clang extends this behavior byallowing the programmer to use output constraints:

intfoo(intx){inty;asmgoto("# %0 %1 %l2":"=r"(y):"r"(x)::err);returny;err:return-1;}

It’s important to note that outputs are valid only on the “fallthrough” branch.Using outputs on an indirect branch may result in undefined behavior. Forexample, in the function above, use of the value assigned toy in theerrblock is undefined behavior.

When using tied-outputs (i.e. outputs that are inputs and outputs, not justoutputs) with the+r constraint, there is a hidden input that’s createdbefore the label, so numeric references to operands must account for that.

intfoo(intx){// %0 and %1 both refer to x// %l2 refers to errasmgoto("# %0 %1 %l2":"+r"(x):::err);returnx;err:return-1;}

This was changed to match GCC in clang-13; for better portability, symbolicreferences can be used instead of numeric references.

intfoo(intx){asmgoto("# %[x] %l[err]":[x]"+r"(x):::err);returnx;err:return-1;}

Query for this feature with__has_extension(gnu_asm_goto_with_outputs).

Objective-C Features

Related result types

According to Cocoa conventions, Objective-C methods with certain names(“init”, “alloc”, etc.) always return objects that are an instance ofthe receiving class’s type. Such methods are said to have a “related resulttype”, meaning that a message send to one of these methods will have the samestatic type as an instance of the receiver class. For example, given thefollowing classes:

@interfaceNSObject+(id)alloc;-(id)init;@end@interfaceNSArray :NSObject@end

and this common initialization pattern

NSArray*array=[[NSArrayalloc]init];

the type of the expression[NSArrayalloc] isNSArray* becausealloc implicitly has a related result type. Similarly, the type of theexpression[[NSArrayalloc]init] isNSArray*, sinceinit has arelated result type and its receiver is known to have the typeNSArray*.If neitheralloc norinit had a related result type, the expressionswould have had typeid, as declared in the method signature.

A method with a related result type can be declared by using the typeinstancetype as its result type.instancetype is a contextual keywordthat is only permitted in the result type of an Objective-C method, e.g.

@interfaceA+(instancetype)constructAnA;@end

The related result type can also be inferred for some methods. To determinewhether a method has an inferred related result type, the first word in thecamel-case selector (e.g., “init” in “initWithObjects”) is considered,and the method will have a related result type if its return type is compatiblewith the type of its class and if:

  • the first word is “alloc” or “new”, and the method is a class method,or

  • the first word is “autorelease”, “init”, “retain”, or “self”,and the method is an instance method.

If a method with a related result type is overridden by a subclass method, thesubclass method must also return a type that is compatible with the subclasstype. For example:

@interfaceNSString :NSObject-(NSUnrelated*)init;// incorrect usage: NSUnrelated is not NSString or a superclass of NSString@end

Related result types only affect the type of a message send or property accessvia the given method. In all other respects, a method with a related resulttype is treated the same way as method that returnsid.

Use__has_feature(objc_instancetype) to determine whether theinstancetype contextual keyword is available.

Automatic reference counting

Clang provides support forautomated reference counting in Objective-C, which eliminates the needfor manualretain/release/autorelease message sends. There are threefeature macros associated with automatic reference counting:__has_feature(objc_arc) indicates the availability of automated referencecounting in general, while__has_feature(objc_arc_weak) indicates thatautomated reference counting also includes support for__weak pointers toObjective-C objects.__has_feature(objc_arc_fields) indicates that C structsare allowed to have fields that are pointers to Objective-C objects managed byautomatic reference counting.

Weak references

Clang supports ARC-style weak and unsafe references in Objective-C evenoutside of ARC mode. Weak references must be explicitly enabled withthe-fobjc-weak option; use__has_feature((objc_arc_weak))to test whether they are enabled. Unsafe references are enabledunconditionally. ARC-style weak and unsafe references cannot be usedwhen Objective-C garbage collection is enabled.

Except as noted below, the language rules for the__weak and__unsafe_unretained qualifiers (and theweak andunsafe_unretained property attributes) are just as laid outin theARC specification.In particular, note that some classes do not support forming weakreferences to their instances, and note that special care must betaken when storing weak references in memory where initializationand deinitialization are outside the responsibility of the compiler(such as inmalloc-ed memory).

Loading from a__weak variable always implicitly retains theloaded value. In non-ARC modes, this retain is normally balancedby an implicit autorelease. This autorelease can be suppressedby performing the load in the receiver position of a-retainmessage send (e.g.[weakReferenceretain]); note that this performsonly a single retain (the retain done when primitively loading fromthe weak reference).

For the most part,__unsafe_unretained in non-ARC modes is just thedefault behavior of variables and therefore is not needed. However,it does have an effect on the semantics of block captures: normally,copying a block which captures an Objective-C object or block pointercauses the captured pointer to be retained or copied, respectively,but that behavior is suppressed when the captured variable is qualifiedwith__unsafe_unretained.

Note that the__weak qualifier formerly meant the GC qualifier inall non-ARC modes and was silently ignored outside of GC modes. It nowmeans the ARC-style qualifier in all non-GC modes and is no longerallowed if not enabled by either-fobjc-arc or-fobjc-weak.It is expected that-fobjc-weak will eventually be enabled by defaultin all non-GC Objective-C modes.

Enumerations with a fixed underlying type

Clang provides support for C++11 enumerations with a fixed underlying typewithin Objective-C. For example, one can write an enumeration type as:

typedefenum:unsignedchar{Red,Green,Blue}Color;

This specifies that the underlying type, which is used to store the enumerationvalue, isunsignedchar.

Use__has_feature(objc_fixed_enum) to determine whether support for fixedunderlying types is available in Objective-C.

Interoperability with C++11 lambdas

Clang provides interoperability between C++11 lambdas and blocks-based APIs, bypermitting a lambda to be implicitly converted to a block pointer with thecorresponding signature. For example, consider an API such asNSArray’sarray-sorting method:

-(NSArray*)sortedArrayUsingComparator:(NSComparator)cmptr;

NSComparator is simply a typedef for the block pointerNSComparisonResult(^)(id,id), and parameters of this type are generally provided with blockliterals as arguments. However, one can also use a C++11 lambda so long as itprovides the same signature (in this case, accepting two parameters of typeid and returning anNSComparisonResult):

NSArray*array=@[@"string 1",@"string 21",@"string 12",@"String 11",@"String 02"];constNSStringCompareOptionscomparisonOptions=NSCaseInsensitiveSearch|NSNumericSearch|NSWidthInsensitiveSearch|NSForcedOrderingSearch;NSLocale*currentLocale=[NSLocalecurrentLocale];NSArray*sorted=[arraysortedArrayUsingComparator:[=](ids1,ids2)->NSComparisonResult{NSRangestring1Range=NSMakeRange(0,[s1length]);return[s1compare:s2options:comparisonOptionsrange:string1Rangelocale:currentLocale];}];NSLog(@"sorted: %@",sorted);

This code relies on an implicit conversion from the type of the lambdaexpression (an unnamed, local class type called theclosure type) to thecorresponding block pointer type. The conversion itself is expressed by aconversion operator in that closure type that produces a block pointer with thesame signature as the lambda itself, e.g.,

operatorNSComparisonResult(^)(id,id)()const;

This conversion function returns a new block that simply forwards the twoparameters to the lambda object (which it captures by copy), then returns theresult. The returned block is first copied (withBlock_copy) and thenautoreleased. As an optimization, if a lambda expression is immediatelyconverted to a block pointer (as in the first example, above), then the blockis not copied and autoreleased: rather, it is given the same lifetime as ablock literal written at that point in the program, which avoids the overheadof copying a block to the heap in the common case.

The conversion from a lambda to a block pointer is only available inObjective-C++, and not in C++ with blocks, due to its use of Objective-C memorymanagement (autorelease).

Object Literals and Subscripting

Clang provides support forObject Literals and Subscripting in Objective-C, which simplifies common Objective-Cprogramming patterns, makes programs more concise, and improves the safety ofcontainer creation. There are several feature macros associated with objectliterals and subscripting:__has_feature(objc_array_literals) tests theavailability of array literals;__has_feature(objc_dictionary_literals)tests the availability of dictionary literals;__has_feature(objc_subscripting) tests the availability of objectsubscripting.

Objective-C Autosynthesis of Properties

Clang provides support for autosynthesis of declared properties. Using thisfeature, clang provides default synthesis of those properties not declared@dynamic and not having user provided backing getter and setter methods.__has_feature(objc_default_synthesize_properties) checks for availabilityof this feature in version of clang being used.

Objective-C retaining behavior attributes

In Objective-C, functions and methods are generally assumed to follow theCocoa Memory Managementconventions for ownership of object arguments andreturn values. However, there are exceptions, and so Clang provides attributesto allow these exceptions to be documented. This are used by ARC and thestatic analyzer Some exceptions may bebetter described using theobjc_method_family attribute instead.

Usage: Thens_returns_retained,ns_returns_not_retained,ns_returns_autoreleased,cf_returns_retained, andcf_returns_not_retained attributes can be placed on methods and functionsthat return Objective-C or CoreFoundation objects. They are commonly placed atthe end of a function prototype or method declaration:

idfoo()__attribute__((ns_returns_retained));-(NSString*)bar:(int)x__attribute__((ns_returns_retained));

The*_returns_retained attributes specify that the returned object has a +1retain count. The*_returns_not_retained attributes specify that the returnobject has a +0 retain count, even if the normal convention for its selectorwould be +1.ns_returns_autoreleased specifies that the returned object is+0, but is guaranteed to live at least as long as the next flush of anautorelease pool.

Usage: Thens_consumed andcf_consumed attributes can be placed onan parameter declaration; they specify that the argument is expected to have a+1 retain count, which will be balanced in some way by the function or method.Thens_consumes_self attribute can only be placed on an Objective-Cmethod; it specifies that the method expects itsself parameter to have a+1 retain count, which it will balance in some way.

voidfoo(__attribute__((ns_consumed))NSString*string);-(void)bar__attribute__((ns_consumes_self));-(void)baz:(id)__attribute__((ns_consumed))x;

Further examples of these attributes are available in the static analyzer’slist of annotations for analysis.

Query for these features with__has_attribute(ns_consumed),__has_attribute(ns_returns_retained), etc.

Objective-C @available

It is possible to use the newest SDK but still build a program that can run onolder versions of macOS and iOS by passing-mmacosx-version-min= /-miphoneos-version-min=.

Before LLVM 5.0, when calling a function that exists only in the OS that’snewer than the target OS (as determined by the minimum deployment version),programmers had to carefully check if the function exists at runtime, usingnull checks for weakly-linked C functions,+class for Objective-C classes,and-respondsToSelector: or+instancesRespondToSelector: forObjective-C methods. If such a check was missed, the program would compilefine, run fine on newer systems, but crash on older systems.

As of LLVM 5.0,-Wunguarded-availability uses theavailability attributes togetherwith the new@available() keyword to assist with this issue.When a method that’s introduced in the OS newer than the target OS is called, a-Wunguarded-availability warning is emitted if that call is not guarded:

voidmy_fun(NSSomeClass*var){// If fancyNewMethod was added in e.g. macOS 10.12, but the code is// built with -mmacosx-version-min=10.11, then this unconditional call// will emit a -Wunguarded-availability warning:[varfancyNewMethod];}

To fix the warning and to avoid the crash on macOS 10.11, wrap it inif(@available()):

voidmy_fun(NSSomeClass*var){if(@available(macOS10.12,*)){[varfancyNewMethod];}else{// Put fallback behavior for old macOS versions (and for non-mac// platforms) here.}}

The* is required and means that platforms not explicitly listed will takethe true branch, and the compiler will emit-Wunguarded-availabilitywarnings for unlisted platforms based on those platform’s deployment target.More than one platform can be listed in@available():

voidmy_fun(NSSomeClass*var){if(@available(macOS10.12,iOS10,*)){[varfancyNewMethod];}}

If the caller ofmy_fun() already checks thatmy_fun() is only calledon 10.12, then add anavailability attribute to it,which will also suppress the warning and require that calls to my_fun() arechecked:

API_AVAILABLE(macos(10.12))voidmy_fun(NSSomeClass*var){[varfancyNewMethod];// Now ok.}

@available() is only available in Objective-C code. To use the featurein C and C++ code, use the__builtin_available() spelling instead.

If existing code uses null checks or-respondsToSelector:, it shouldbe changed to use@available() (or__builtin_available) instead.

-Wunguarded-availability is disabled by default, but-Wunguarded-availability-new, which only emits this warning for APIsthat have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 andtvOS >= 11, is enabled by default.

Objective-C++ ABI: protocol-qualifier mangling of parameters

Starting with LLVM 3.4, Clang produces a new mangling for parameters whosetype is a qualified-id (e.g.,id<Foo>). This mangling allows suchparameters to be differentiated from those with the regular unqualifiedidtype.

This was a non-backward compatible mangling change to the ABI. This changeallows proper overloading, and also prevents mangling conflicts with templateparameters of protocol-qualified type.

Query the presence of this new mangling with__has_feature(objc_protocol_qualifier_mangling).

Initializer lists for complex numbers in C

clang supports an extension which allows the following in C:

#include<math.h>#include<complex.h>complexfloatx={1.0f,INFINITY};// Init to (1, Inf)

This construct is useful because there is no way to separately initialize thereal and imaginary parts of a complex variable in standard C, given that clangdoes not support_Imaginary. (Clang also supports the__real__ and__imag__ extensions from gcc, which help in some cases, but are not usablein static initializers.)

Note that this extension does not allow eliding the braces; the meaning of thefollowing two lines is different:

complexfloatx[]={{1.0f,1.0f}};// [0] = (1, 1)complexfloatx[]={1.0f,1.0f};// [0] = (1, 0), [1] = (1, 0)

This extension also works in C++ mode, as far as that goes, but does not applyto the C++std::complex. (In C++11, list initialization allows the samesyntax to be used withstd::complex with the same meaning.)

For GCC compatibility,__builtin_complex(re,im) can also be used toconstruct a complex number from the given real and imaginary components.

OpenCL Features

Clang supports internal OpenCL extensions documented below.

__cl_clang_bitfields

With this extension it is possible to enable bitfields in structsor unions using the OpenCL extension pragma mechanism detailed inthe OpenCL Extension Specification, section 1.2.

Use of bitfields in OpenCL kernels can result in reduced portability as structlayout is not guaranteed to be consistent when compiled by different compilers.If structs with bitfields are used as kernel function parameters, it can resultin incorrect functionality when the layout is different between the host anddevice code.

Example of Use:

#pragma OPENCL EXTENSION __cl_clang_bitfields : enablestructwith_bitfield{unsignedinti:5;// compiled - no diagnostic generated};#pragma OPENCL EXTENSION __cl_clang_bitfields : disablestructwithout_bitfield{unsignedinti:5;// error - bitfields are not supported};

__cl_clang_function_pointers

With this extension it is possible to enable various language features thatare relying on function pointers using regular OpenCL extension pragmamechanism detailed inthe OpenCL Extension Specification,section 1.2.

In C++ for OpenCL this also enables:

  • Use of member function pointers;

  • Unrestricted use of references to functions;

  • Virtual member functions.

Such functionality is not conformant and does not guarantee to compilecorrectly in any circumstances. It can be used if:

  • the kernel source does not contain call expressions to (member-) functionpointers, or virtual functions. For example this extension can be used inmetaprogramming algorithms to be able to specify/detect types generically.

  • the generated kernel binary does not contain indirect calls because theyare eliminated using compiler optimizations e.g. devirtualization.

  • the selected target supports the function pointer like functionality e.g.most CPU targets.

Example of Use:

#pragma OPENCL EXTENSION __cl_clang_function_pointers : enablevoidfoo(){void(*fp)();// compiled - no diagnostic generated}#pragma OPENCL EXTENSION __cl_clang_function_pointers : disablevoidbar(){void(*fp)();// error - pointers to function are not allowed}

__cl_clang_variadic_functions

With this extension it is possible to enable variadic arguments in functionsusing regular OpenCL extension pragma mechanism detailed inthe OpenCLExtension Specification, section 1.2.

This is not conformant behavior and it can only be used portably when thefunctions with variadic prototypes do not get generated in binary e.g. thevariadic prototype is used to specify a function type with any number ofarguments in metaprogramming algorithms in C++ for OpenCL.

This extensions can also be used when the kernel code is intended for targetssupporting the variadic arguments e.g. majority of CPU targets.

Example of Use:

#pragma OPENCL EXTENSION __cl_clang_variadic_functions : enablevoidfoo(inta,...);// compiled - no diagnostic generated#pragma OPENCL EXTENSION __cl_clang_variadic_functions : disablevoidbar(inta,...);// error - variadic prototype is not allowed

__cl_clang_non_portable_kernel_param_types

With this extension it is possible to enable the use of some restricted typesin kernel parameters specified inC++ for OpenCL v1.0 s2.4.The restrictions can be relaxed using regular OpenCL extension pragma mechanismdetailed inthe OpenCL Extension Specification, section 1.2.

This is not a conformant behavior and it can only be used when thekernel arguments are not accessed on the host side or the data layout/sizebetween the host and device is known to be compatible.

Example of Use:

// Plain Old Data type.structPod{inta;intb;};// Not POD type because of the constructor.// Standard layout type because there is only one access control.structOnlySL{inta;intb;NotPod():a(0),b(0){}};// Not standard layout type because of two different access controls.structNotSL{inta;private:intb;}kernelvoidkernel_main(Poda,#pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : enableOnlySLb,globalNotSL*c,#pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : disableglobalOnlySL*d,);

Remove address space builtin function

__remove_address_space allows to derive types in C++ for OpenCLthat have address space qualifiers removed. This utility only affectsaddress space qualifiers, therefore, other type qualifiers such asconst orvolatile remain unchanged.

Example of Use:

template<typenameT>voidfoo(T*par){Tvar1;// error - local function variable with global address space__privateTvar2;// error - conflicting address space qualifiers__private__remove_address_space<T>::typevar3;// var3 is __private int}voidbar(){__globalint*ptr;foo(ptr);}

Legacy 1.x atomics with generic address space

Clang allows use of atomic functions from the OpenCL 1.x standardswith the generic address space pointer in C++ for OpenCL mode.

This is a non-portable feature and might not be supported by alltargets.

Example of Use:

voidfoo(__genericvolatileunsignedint*a){atomic_add(a,1);}

Builtin Functions

Clang supports a number of builtin library functions with the same syntax asGCC, including things like__builtin_nan,__builtin_constant_p,__builtin_choose_expr,__builtin_types_compatible_p,__builtin_assume_aligned,__sync_fetch_and_add, etc. In addition tothe GCC builtins, Clang supports a number of builtins that GCC does not, whichare listed here.

Please note that Clang does not and will not support all of the GCC builtinsfor vector operations. Instead of using builtins, you should use the functionsdefined in target-specific header files like<xmmintrin.h>, which defineportable wrappers for these. Many of the Clang versions of these functions areimplemented directly in terms ofextended vector support instead of builtins, in order to reduce the number ofbuiltins that we need to implement.

__builtin_alloca

__builtin_alloca is used to dynamically allocate memory on the stack. Memoryis automatically freed upon function termination.

Syntax:

__builtin_alloca(size_tn)

Example of Use:

voidinit(float*data,size_tnbelems);voidprocess(float*data,size_tnbelems);intfoo(size_tn){automem=(float*)__builtin_alloca(n*sizeof(float));init(mem,n);process(mem,n);/* mem is automatically freed at this point */}

Description:

__builtin_alloca is meant to be used to allocate a dynamic amount of memoryon the stack. This amount is subject to stack allocation limits.

Query for this feature with__has_builtin(__builtin_alloca).

__builtin_alloca_with_align

__builtin_alloca_with_align is used to dynamically allocate memory on thestack while controlling its alignment. Memory is automatically freed uponfunction termination.

Syntax:

__builtin_alloca_with_align(size_tn,size_talign)

Example of Use:

voidinit(float*data,size_tnbelems);voidprocess(float*data,size_tnbelems);intfoo(size_tn){automem=(float*)__builtin_alloca_with_align(n*sizeof(float),CHAR_BIT*alignof(float));init(mem,n);process(mem,n);/* mem is automatically freed at this point */}

Description:

__builtin_alloca_with_align is meant to be used to allocate a dynamic amount of memoryon the stack. It is similar to__builtin_alloca but accepts a secondargument whose value is the alignment constraint, as a power of 2 inbits.

Query for this feature with__has_builtin(__builtin_alloca_with_align).

__builtin_assume

__builtin_assume is used to provide the optimizer with a booleaninvariant that is defined to be true.

Syntax:

__builtin_assume(bool)

Example of Use:

intfoo(intx){__builtin_assume(x!=0);// The optimizer may short-circuit this check using the invariant.if(x==0)returndo_something();returndo_something_else();}

Description:

The boolean argument to this function is defined to be true. The optimizer mayanalyze the form of the expression provided as the argument and deduce fromthat information used to optimize the program. If the condition is violatedduring execution, the behavior is undefined. The argument itself is neverevaluated, so any side effects of the expression will be discarded.

Query for this feature with__has_builtin(__builtin_assume).

__builtin_call_with_static_chain

__builtin_call_with_static_chain is used to perform a static call whilesetting updating the static chain register.

Syntax:

T__builtin_call_with_static_chain(Texpr,void*ptr)

Example of Use:

autov=__builtin_call_with_static_chain(foo(3),foo);

Description:

This builtin returnsexpr after checking thatexpr is a non-memberstatic call expression. The call to that expression is made while usingptras a function pointer stored in a dedicated register to implementstatic chaincalling convention, as used by some language to implement closures or nestedfunctions.

Query for this feature with__has_builtin(__builtin_call_with_static_chain).

__builtin_readcyclecounter

__builtin_readcyclecounter is used to access the cycle counter register (ora similar low-latency, high-accuracy clock) on those targets that support it.

Syntax:

__builtin_readcyclecounter()

Example of Use:

unsignedlonglongt0=__builtin_readcyclecounter();do_something();unsignedlonglongt1=__builtin_readcyclecounter();unsignedlonglongcycles_to_do_something=t1-t0;// assuming no overflow

Description:

The__builtin_readcyclecounter() builtin returns the cycle counter value,which may be either global or process/thread-specific depending on the target.As the backing counters often overflow quickly (on the order of seconds) thisshould only be used for timing small intervals. When not supported by thetarget, the return value is always zero. This builtin takes no arguments andproduces an unsigned long long result.

Query for this feature with__has_builtin(__builtin_readcyclecounter). Notethat even if present, its use may depend on run-time privilege or other OScontrolled state.

__builtin_dump_struct

Syntax:

__builtin_dump_struct(&some_struct,some_printf_func,args...);

Examples:

structS{intx,y;floatf;structT{inti;}t;};voidfunc(structS*s){__builtin_dump_struct(s,printf);}

Example output:

struct S {  int x = 100  int y = 42  float f = 3.141593  struct T t = {    int i = 1997  }}
#include<string>structT{inta,b;};constexprvoidconstexpr_sprintf(std::string&out,constchar*format,auto...args){// ...}constexprstd::stringdump_struct(auto&x){std::strings;__builtin_dump_struct(&x,constexpr_sprintf,s);returns;}static_assert(dump_struct(T{1,2})==R"(struct T {  int a = 1  int b = 2})");

Description:

The__builtin_dump_struct function is used to print the fields of a simplestructure and their values for debugging purposes. The first argument of thebuiltin should be a pointer to the struct to dump. The second argumentfshould be some callable expression, and can be a function object or an overloadset. The builtin callsf, passing any further argumentsargs...followed by aprintf-compatible format string and the correspondingarguments.f may be called more than once, andf andargs will beevaluated once per call. In C++,f may be a template or overload set andresolve to different functions for each call.

In the format string, a suitable format specifier will be used for builtintypes that Clang knows how to format. This includes standard builtin types, aswell as aggregate structures,void* (printed with%p), andconstchar* (printed with%s). A*%p specifier will be used for a fieldthat Clang doesn’t know how to format, and the corresopnding argument will be apointer to the field. This allows a C++ templated formatting function to detectthis case and implement custom formatting. A* will otherwise not precede aformat specifier.

This builtin does not return a value.

This builtin can be used in constant expressions.

Query for this feature with__has_builtin(__builtin_dump_struct)

__builtin_shufflevector

__builtin_shufflevector is used to express generic vectorpermutation/shuffle/swizzle operations. This builtin is also very importantfor the implementation of various target-specific header files like<xmmintrin.h>.

Syntax:

__builtin_shufflevector(vec1,vec2,index1,index2,...)

Examples:

// identity operation - return 4-element vector v1.__builtin_shufflevector(v1,v1,0,1,2,3)// "Splat" element 0 of V1 into a 4-element result.__builtin_shufflevector(V1,V1,0,0,0,0)// Reverse 4-element vector V1.__builtin_shufflevector(V1,V1,3,2,1,0)// Concatenate every other element of 4-element vectors V1 and V2.__builtin_shufflevector(V1,V2,0,2,4,6)// Concatenate every other element of 8-element vectors V1 and V2.__builtin_shufflevector(V1,V2,0,2,4,6,8,10,12,14)// Shuffle v1 with some elements being undefined__builtin_shufflevector(v1,v1,3,-1,1,-1)

Description:

The first two arguments to__builtin_shufflevector are vectors that havethe same element type. The remaining arguments are a list of integers thatspecify the elements indices of the first two vectors that should be extractedand returned in a new vector. These element indices are numbered sequentiallystarting with the first vector, continuing into the second vector. Thus, ifvec1 is a 4-element vector, index 5 would refer to the second element ofvec2. An index of -1 can be used to indicate that the corresponding elementin the returned vector is a don’t care and can be optimized by the backend.

The result of__builtin_shufflevector is a vector with the same elementtype asvec1/vec2 but that has an element count equal to the number ofindices specified.

Query for this feature with__has_builtin(__builtin_shufflevector).

__builtin_convertvector

__builtin_convertvector is used to express generic vectortype-conversion operations. The input vector and the output vectortype must have the same number of elements.

Syntax:

__builtin_convertvector(src_vec,dst_vec_type)

Examples:

typedefdoublevector4double__attribute__((__vector_size__(32)));typedeffloatvector4float__attribute__((__vector_size__(16)));typedefshortvector4short__attribute__((__vector_size__(8)));vector4floatvf;vector4shortvs;// convert from a vector of 4 floats to a vector of 4 doubles.__builtin_convertvector(vf,vector4double)// equivalent to:(vector4double){(double)vf[0],(double)vf[1],(double)vf[2],(double)vf[3]}// convert from a vector of 4 shorts to a vector of 4 floats.__builtin_convertvector(vs,vector4float)// equivalent to:(vector4float){(float)vs[0],(float)vs[1],(float)vs[2],(float)vs[3]}

Description:

The first argument to__builtin_convertvector is a vector, and the secondargument is a vector type with the same number of elements as the firstargument.

The result of__builtin_convertvector is a vector with the same elementtype as the second argument, with a value defined in terms of the action of aC-style cast applied to each element of the first argument.

Query for this feature with__has_builtin(__builtin_convertvector).

__builtin_bitreverse

  • __builtin_bitreverse8

  • __builtin_bitreverse16

  • __builtin_bitreverse32

  • __builtin_bitreverse64

Syntax:

__builtin_bitreverse32(x)

Examples:

uint8_trev_x=__builtin_bitreverse8(x);uint16_trev_x=__builtin_bitreverse16(x);uint32_trev_y=__builtin_bitreverse32(y);uint64_trev_z=__builtin_bitreverse64(z);

Description:

The ‘__builtin_bitreverse’ family of builtins is used to reversethe bitpattern of an integer value; for example0b10110110 becomes0b01101101. These builtins can be used within constant expressions.

__builtin_rotateleft

  • __builtin_rotateleft8

  • __builtin_rotateleft16

  • __builtin_rotateleft32

  • __builtin_rotateleft64

Syntax:

__builtin_rotateleft32(x,y)

Examples:

uint8_trot_x=__builtin_rotateleft8(x,y);uint16_trot_x=__builtin_rotateleft16(x,y);uint32_trot_x=__builtin_rotateleft32(x,y);uint64_trot_x=__builtin_rotateleft64(x,y);

Description:

The ‘__builtin_rotateleft’ family of builtins is used to rotatethe bits in the first argument by the amount in the second argument.For example,0b10000110 rotated left by 11 becomes0b00110100.The shift value is treated as an unsigned amount modulo the size ofthe arguments. Both arguments and the result have the bitwidth specifiedby the name of the builtin. These builtins can be used within constantexpressions.

__builtin_rotateright

  • __builtin_rotateright8

  • __builtin_rotateright16

  • __builtin_rotateright32

  • __builtin_rotateright64

Syntax:

__builtin_rotateright32(x,y)

Examples:

uint8_trot_x=__builtin_rotateright8(x,y);uint16_trot_x=__builtin_rotateright16(x,y);uint32_trot_x=__builtin_rotateright32(x,y);uint64_trot_x=__builtin_rotateright64(x,y);

Description:

The ‘__builtin_rotateright’ family of builtins is used to rotatethe bits in the first argument by the amount in the second argument.For example,0b10000110 rotated right by 3 becomes0b11010000.The shift value is treated as an unsigned amount modulo the size ofthe arguments. Both arguments and the result have the bitwidth specifiedby the name of the builtin. These builtins can be used within constantexpressions.

__builtin_unreachable

__builtin_unreachable is used to indicate that a specific point in theprogram cannot be reached, even if the compiler might otherwise think it can.This is useful to improve optimization and eliminates certain warnings. Forexample, without the__builtin_unreachable in the example below, thecompiler assumes that the inline asm can fall through and prints a “functiondeclared ‘noreturn’ should not return” warning.

Syntax:

__builtin_unreachable()

Example of use:

voidmyabort(void)__attribute__((noreturn));voidmyabort(void){asm("int3");__builtin_unreachable();}

Description:

The__builtin_unreachable() builtin has completely undefined behavior.Since it has undefined behavior, it is a statement that it is never reached andthe optimizer can take advantage of this to produce better code. This builtintakes no arguments and produces a void result.

Query for this feature with__has_builtin(__builtin_unreachable).

__builtin_unpredictable

__builtin_unpredictable is used to indicate that a branch condition isunpredictable by hardware mechanisms such as branch prediction logic.

Syntax:

__builtin_unpredictable(longlong)

Example of use:

if(__builtin_unpredictable(x>0)){foo();}

Description:

The__builtin_unpredictable() builtin is expected to be used with controlflow conditions such as inif andswitch statements.

Query for this feature with__has_builtin(__builtin_unpredictable).

__builtin_expect

__builtin_expect is used to indicate that the value of an expression isanticipated to be the same as a statically known result.

Syntax:

long__builtin_expect(longexpr,longval)

Example of use:

if(__builtin_expect(x,0)){bar();}

Description:

The__builtin_expect() builtin is typically used with control flowconditions such as inif andswitch statements to help branchprediction. It means that its first argumentexpr is expected to take thevalue of its second argumentval. It always returnsexpr.

Query for this feature with__has_builtin(__builtin_expect).

__builtin_expect_with_probability

__builtin_expect_with_probability is similar to__builtin_expect but ittakes a probability as third argument.

Syntax:

long__builtin_expect_with_probability(longexpr,longval,doublep)

Example of use:

if(__builtin_expect_with_probability(x,0,.3)){bar();}

Description:

The__builtin_expect_with_probability() builtin is typically used withcontrol flow conditions such as inif andswitch statements to helpbranch prediction. It means that its first argumentexpr is expected to takethe value of its second argumentval with probabilityp.p must bewithin[0.0;1.0] bounds. This builtin always returns the value ofexpr.

Query for this feature with__has_builtin(__builtin_expect_with_probability).

__builtin_prefetch

__builtin_prefetch is used to communicate with the cache handler to bringdata into the cache before it gets used.

Syntax:

void__builtin_prefetch(constvoid*addr,intrw=0,intlocality=3)

Example of use:

__builtin_prefetch(a+i);

Description:

The__builtin_prefetch(addr,rw,locality) builtin is expected to be used toavoid cache misses when the developper has a good understanding of which dataare going to be used next.addr is the address that needs to be brought intothe cache.rw indicates the expected access mode:0 forread and1forwrite. In case ofread write access,1 is to be used.localityindicates the expected persistance of data in cache, from0 which means thatdata can be discarded from cache after its next use to3 which means thatdata is going to be reused a lot once in cache.1 and2 provideintermediate behavior between these two extremes.

Query for this feature with__has_builtin(__builtin_prefetch).

__sync_swap

__sync_swap is used to atomically swap integers or pointers in memory.

Syntax:

type__sync_swap(type*ptr,typevalue,...)

Example of Use:

intold_value=__sync_swap(&value,new_value);

Description:

The__sync_swap() builtin extends the existing__sync_*() family ofatomic intrinsics to allow code to atomically swap the current value with thenew value. More importantly, it helps developers write more efficient andcorrect code by avoiding expensive loops around__sync_bool_compare_and_swap() or relying on the platform specificimplementation details of__sync_lock_test_and_set(). The__sync_swap() builtin is a full barrier.

__builtin_addressof

__builtin_addressof performs the functionality of the built-in&operator, ignoring anyoperator& overload. This is useful in constantexpressions in C++11, where there is no other way to take the address of anobject that overloadsoperator&.

Example of use:

template<typenameT>constexprT*addressof(T&value){return__builtin_addressof(value);}

__builtin_function_start

__builtin_function_start returns the address of a function body.

Syntax:

void*__builtin_function_start(function)

Example of use:

voida(){}void*p=__builtin_function_start(a);classA{public:voida(intn);voida();};voidA::a(intn){}voidA::a(){}void*pa1=__builtin_function_start((void(A::*)(int))&A::a);void*pa2=__builtin_function_start((void(A::*)())&A::a);

Description:

The__builtin_function_start builtin accepts an argument that can beconstant-evaluated to a function, and returns the address of the functionbody. This builtin is not supported on all targets.

The returned pointer may differ from the normally taken function addressand is not safe to call. For example, with-fsanitize=cfi, taking afunction address produces a callable pointer to a CFI jump table, while__builtin_function_start returns an address that failscfi-icall checks.

__builtin_operator_new and__builtin_operator_delete

A call to__builtin_operator_new(args) is exactly the same as a call to::operatornew(args), except that it allows certain optimizationsthat the C++ standard does not permit for a direct function call to::operatornew (in particular, removingnew /delete pairs andmerging allocations), and that the call is required to resolve to areplaceable global allocation function.

Likewise,__builtin_operator_delete is exactly the same as a call to::operatordelete(args), except that it permits optimizationsand that the call is required to resolve to areplaceable global deallocation function.

These builtins are intended for use in the implementation ofstd::allocatorand other similar allocation libraries, and are only available in C++.

Query for this feature with__has_builtin(__builtin_operator_new) or__has_builtin(__builtin_operator_delete):

  • If the value is at least201802L, the builtins behave as described above.

  • If the value is non-zero, the builtins may not support calling arbitraryreplaceable global (de)allocation functions, but do support calling at least::operatornew(size_t) and::operatordelete(void*).

__builtin_preserve_access_index

__builtin_preserve_access_index specifies a code section wherearray subscript access and structure/union member access are relocatableunder bpf compile-once run-everywhere framework. Debuginfo (typicallywith-g) is needed, otherwise, the compiler will exit with an error.The return type for the intrinsic is the same as the type of theargument.

Syntax:

type__builtin_preserve_access_index(typearg)

Example of Use:

structt{inti;intj;union{inta;intb;}c[4];};structt*v=...;int*pb=__builtin_preserve_access_index(&v->c[3].b);__builtin_preserve_access_index(v->j);

__builtin_debugtrap

__builtin_debugtrap causes the program to stop its execution in such a way that a debugger can catch it.

Syntax:

__builtin_debugtrap()

Description

__builtin_debugtrap is lowered to the `llvm.debugtrap <https://llvm.org/docs/LangRef.html#llvm-debugtrap-intrinsic>`_ builtin. It should have the same effect as setting a breakpoint on the line where the builtin is called.

Query for this feature with__has_builtin(__builtin_debugtrap).

__builtin_trap

__builtin_trap causes the program to stop its execution abnormally.

Syntax:

__builtin_trap()

Description

__builtin_trap is lowered to the `llvm.trap <https://llvm.org/docs/LangRef.html#llvm-trap-intrinsic>`_ builtin.

Query for this feature with__has_builtin(__builtin_trap).

__builtin_sycl_unique_stable_name

__builtin_sycl_unique_stable_name() is a builtin that takes a type andproduces a string literal containing a unique name for the type that is stableacross split compilations, mainly to support SYCL/Data Parallel C++ language.

In cases where the split compilation needs to share a unique token for a typeacross the boundary (such as in an offloading situation), this name can be usedfor lookup purposes, such as in the SYCL Integration Header.

The value of this builtin is computed entirely at compile time, so it can beused in constant expressions. This value encodes lambda functions based on astable numbering order in which they appear in their local declaration contexts.Once this builtin is evaluated in a constexpr context, it is erroneous to useit in an instantiation which changes its value.

In order to produce the unique name, the current implementation of the bultinuses Itanium mangling even if the host compilation uses a different namemangling scheme at runtime. The mangler marks all the lambdas required to namethe SYCL kernel and emits a stable local ordering of the respective lambdas.The resulting pattern is demanglable. When non-lambda types are passed to thebuiltin, the mangler emits their usual pattern without any special treatment.

Syntax:

// Computes a unique stable name for the given type.constexprconstchar*__builtin_sycl_unique_stable_name(type-id);

Multiprecision Arithmetic Builtins

Clang provides a set of builtins which expose multiprecision arithmetic in amanner amenable to C. They all have the following form:

unsignedx=...,y=...,carryin=...,carryout;unsignedsum=__builtin_addc(x,y,carryin,&carryout);

Thus one can form a multiprecision addition chain in the following manner:

unsigned*x,*y,*z,carryin=0,carryout;z[0]=__builtin_addc(x[0],y[0],carryin,&carryout);carryin=carryout;z[1]=__builtin_addc(x[1],y[1],carryin,&carryout);carryin=carryout;z[2]=__builtin_addc(x[2],y[2],carryin,&carryout);carryin=carryout;z[3]=__builtin_addc(x[3],y[3],carryin,&carryout);

The complete list of builtins are:

unsignedchar__builtin_addcb(unsignedcharx,unsignedchary,unsignedcharcarryin,unsignedchar*carryout);unsignedshort__builtin_addcs(unsignedshortx,unsignedshorty,unsignedshortcarryin,unsignedshort*carryout);unsigned__builtin_addc(unsignedx,unsignedy,unsignedcarryin,unsigned*carryout);unsignedlong__builtin_addcl(unsignedlongx,unsignedlongy,unsignedlongcarryin,unsignedlong*carryout);unsignedlonglong__builtin_addcll(unsignedlonglongx,unsignedlonglongy,unsignedlonglongcarryin,unsignedlonglong*carryout);unsignedchar__builtin_subcb(unsignedcharx,unsignedchary,unsignedcharcarryin,unsignedchar*carryout);unsignedshort__builtin_subcs(unsignedshortx,unsignedshorty,unsignedshortcarryin,unsignedshort*carryout);unsigned__builtin_subc(unsignedx,unsignedy,unsignedcarryin,unsigned*carryout);unsignedlong__builtin_subcl(unsignedlongx,unsignedlongy,unsignedlongcarryin,unsignedlong*carryout);unsignedlonglong__builtin_subcll(unsignedlonglongx,unsignedlonglongy,unsignedlonglongcarryin,unsignedlonglong*carryout);

Checked Arithmetic Builtins

Clang provides a set of builtins that implement checked arithmetic for securitycritical applications in a manner that is fast and easily expressible in C. Asan example of their usage:

errorcode_tsecurity_critical_application(...){unsignedx,y,result;...if(__builtin_mul_overflow(x,y,&result))returnkErrorCodeHackers;...use_multiply(result);...}

Clang provides the following checked arithmetic builtins:

bool__builtin_add_overflow(type1x,type2y,type3*sum);bool__builtin_sub_overflow(type1x,type2y,type3*diff);bool__builtin_mul_overflow(type1x,type2y,type3*prod);bool__builtin_uadd_overflow(unsignedx,unsignedy,unsigned*sum);bool__builtin_uaddl_overflow(unsignedlongx,unsignedlongy,unsignedlong*sum);bool__builtin_uaddll_overflow(unsignedlonglongx,unsignedlonglongy,unsignedlonglong*sum);bool__builtin_usub_overflow(unsignedx,unsignedy,unsigned*diff);bool__builtin_usubl_overflow(unsignedlongx,unsignedlongy,unsignedlong*diff);bool__builtin_usubll_overflow(unsignedlonglongx,unsignedlonglongy,unsignedlonglong*diff);bool__builtin_umul_overflow(unsignedx,unsignedy,unsigned*prod);bool__builtin_umull_overflow(unsignedlongx,unsignedlongy,unsignedlong*prod);bool__builtin_umulll_overflow(unsignedlonglongx,unsignedlonglongy,unsignedlonglong*prod);bool__builtin_sadd_overflow(intx,inty,int*sum);bool__builtin_saddl_overflow(longx,longy,long*sum);bool__builtin_saddll_overflow(longlongx,longlongy,longlong*sum);bool__builtin_ssub_overflow(intx,inty,int*diff);bool__builtin_ssubl_overflow(longx,longy,long*diff);bool__builtin_ssubll_overflow(longlongx,longlongy,longlong*diff);bool__builtin_smul_overflow(intx,inty,int*prod);bool__builtin_smull_overflow(longx,longy,long*prod);bool__builtin_smulll_overflow(longlongx,longlongy,longlong*prod);

Each builtin performs the specified mathematical operation on thefirst two arguments and stores the result in the third argument. Ifpossible, the result will be equal to mathematically-correct resultand the builtin will return 0. Otherwise, the builtin will return1 and the result will be equal to the unique value that is equivalentto the mathematically-correct result modulo two raised to thekpower, wherek is the number of bits in the result type. Thebehavior of these builtins is well-defined for all argument values.

The first three builtins work generically for operands of any integer type,including boolean types. The operands need not have the same type as eachother, or as the result. The other builtins may implicitly promote orconvert their operands before performing the operation.

Query for this feature with__has_builtin(__builtin_add_overflow), etc.

Floating point builtins

__builtin_canonicalize

double__builtin_canonicalize(double);float__builtin_canonicalizef(float);longdouble__builtin_canonicalizel(longdouble);

Returns the platform specific canonical encoding of a floating pointnumber. This canonicalization is useful for implementing certainnumeric primitives such as frexp. SeeLLVM canonicalize intrinsic formore information on the semantics.

String builtins

Clang provides constant expression evaluation support for builtins forms ofthe following functions from the C standard library headers<string.h> and<wchar.h>:

  • memchr

  • memcmp (and its deprecated BSD / POSIX aliasbcmp)

  • strchr

  • strcmp

  • strlen

  • strncmp

  • wcschr

  • wcscmp

  • wcslen

  • wcsncmp

  • wmemchr

  • wmemcmp

In each case, the builtin form has the name of the C library function prefixedby__builtin_. Example:

void*p=__builtin_memchr("foobar",'b',5);

In addition to the above, one further builtin is provided:

char*__builtin_char_memchr(constchar*haystack,intneedle,size_tsize);

__builtin_char_memchr(a,b,c) is identical to(char*)__builtin_memchr(a,b,c) except that its use is permitted withinconstant expressions in C++11 onwards (where a cast fromvoid* tochar*is disallowed in general).

Constant evaluation support for the__builtin_mem* functions is providedonly for arrays ofchar,signedchar,unsignedchar, orchar8_t,despite these functions accepting an argument of typeconstvoid*.

Support for constant expression evaluation for the above builtins can be detectedwith__has_feature(cxx_constexpr_string_builtins).

Memory builtins

Clang provides constant expression evaluation support for builtin forms of thefollowing functions from the C standard library headers<string.h> and<wchar.h>:

  • memcpy

  • memmove

  • wmemcpy

  • wmemmove

In each case, the builtin form has the name of the C library function prefixedby__builtin_.

Constant evaluation support is only provided when the source and destinationare pointers to arrays with the same trivially copyable element type, and thegiven size is an exact multiple of the element size that is no greater thanthe number of elements accessible through the source and destination operands.

Guaranteed inlined copy

void__builtin_memcpy_inline(void*dst,constvoid*src,size_tsize);

__builtin_memcpy_inline has been designed as a building block for efficientmemcpy implementations. It is identical to__builtin_memcpy but alsoguarantees not to call any external functions. See LLVM IRllvm.memcpy.inline intrinsicfor more information.

This is useful to implement a custom version ofmemcpy, implement alibc memcpy or work around the absence of alibc.

Note that thesize argument must be a compile time constant.

Note that this intrinsic cannot yet be called in aconstexpr context.

Guaranteed inlined memset

void__builtin_memset_inline(void*dst,intvalue,size_tsize);

__builtin_memset_inline has been designed as a building block for efficientmemset implementations. It is identical to__builtin_memset but alsoguarantees not to call any external functions. See LLVM IRllvm.memset.inline intrinsicfor more information.

This is useful to implement a custom version ofmemset, implement alibc memset or work around the absence of alibc.

Note that thesize argument must be a compile time constant.

Note that this intrinsic cannot yet be called in aconstexpr context.

Atomic Min/Max builtins with memory ordering

There are two atomic builtins with min/max in-memory comparison and swap.The syntax and semantics are similar to GCC-compatible __atomic_* builtins.

  • __atomic_fetch_min

  • __atomic_fetch_max

The builtins work with signed and unsigned integers and require to specify memory ordering.The return value is the original value that was stored in memory before comparison.

Example:

unsignedintval=__atomic_fetch_min(unsignedint*pi,unsignedintui,__ATOMIC_RELAXED);

The third argument is one of the memory ordering specifiers__ATOMIC_RELAXED,__ATOMIC_CONSUME,__ATOMIC_ACQUIRE,__ATOMIC_RELEASE,__ATOMIC_ACQ_REL, or__ATOMIC_SEQ_CST following C++11 memory model semantics.

In terms or aquire-release ordering barriers these two operations are alwaysconsidered as operations withload-store semantics, even when the original valueis not actually modified after comparison.

__c11_atomic builtins

Clang provides a set of builtins which are intended to be used to implementC11’s<stdatomic.h> header. These builtins provide the semantics of the_explicit form of the corresponding C11 operation, and are named with a__c11_ prefix. The supported operations, and the differences fromthe corresponding C11 operations, are:

  • __c11_atomic_init

  • __c11_atomic_thread_fence

  • __c11_atomic_signal_fence

  • __c11_atomic_is_lock_free (The argument is the size of the_Atomic(...) object, instead of its address)

  • __c11_atomic_store

  • __c11_atomic_load

  • __c11_atomic_exchange

  • __c11_atomic_compare_exchange_strong

  • __c11_atomic_compare_exchange_weak

  • __c11_atomic_fetch_add

  • __c11_atomic_fetch_sub

  • __c11_atomic_fetch_and

  • __c11_atomic_fetch_or

  • __c11_atomic_fetch_xor

  • __c11_atomic_fetch_nand (Nand is not presented in<stdatomic.h>)

  • __c11_atomic_fetch_max

  • __c11_atomic_fetch_min

The macros__ATOMIC_RELAXED,__ATOMIC_CONSUME,__ATOMIC_ACQUIRE,__ATOMIC_RELEASE,__ATOMIC_ACQ_REL, and__ATOMIC_SEQ_CST areprovided, with values corresponding to the enumerators of C11’smemory_order enumeration.

(Note that Clang additionally provides GCC-compatible__atomic_*builtins and OpenCL 2.0__opencl_atomic_* builtins. The OpenCL 2.0atomic builtins are an explicit form of the corresponding OpenCL 2.0builtin function, and are named with a__opencl_ prefix. The macros__OPENCL_MEMORY_SCOPE_WORK_ITEM,__OPENCL_MEMORY_SCOPE_WORK_GROUP,__OPENCL_MEMORY_SCOPE_DEVICE,__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES,and__OPENCL_MEMORY_SCOPE_SUB_GROUP are provided, with valuescorresponding to the enumerators of OpenCL’smemory_scope enumeration.)

Low-level ARM exclusive memory builtins

Clang provides overloaded builtins giving direct access to the three key ARMinstructions for implementing atomic operations.

T__builtin_arm_ldrex(constvolatileT*addr);T__builtin_arm_ldaex(constvolatileT*addr);int__builtin_arm_strex(Tval,volatileT*addr);int__builtin_arm_stlex(Tval,volatileT*addr);void__builtin_arm_clrex(void);

The typesT currently supported are:

  • Integer types with width at most 64 bits (or 128 bits on AArch64).

  • Floating-point types

  • Pointer types.

Note that the compiler does not guarantee it will not insert stores which clearthe exclusive monitor in between anldrex type operation and its pairedstrex. In practice this is only usually a risk when the extra store is onthe same cache line as the variable being modified and Clang will only insertstack stores on its own, so it is best not to use these operations on variableswith automatic storage duration.

Also, loads and stores may be implicit in code written between theldrex andstrex. Clang will not necessarily mitigate the effects of these either, socare should be exercised.

For these reasons the higher level atomic primitives should be preferred wherepossible.

Non-temporal load/store builtins

Clang provides overloaded builtins allowing generation of non-temporal memoryaccesses.

T__builtin_nontemporal_load(T*addr);void__builtin_nontemporal_store(Tvalue,T*addr);

The typesT currently supported are:

  • Integer types.

  • Floating-point types.

  • Vector types.

Note that the compiler does not guarantee that non-temporal loads or storeswill be used.

C++ Coroutines support builtins

Warning

This is a work in progress. Compatibility across Clang/LLVM releases is notguaranteed.

Clang provides experimental builtins to support C++ Coroutines as defined byhttps://wg21.link/P0057. The following four are intended to be used by thestandard library to implement thestd::coroutine_handle type.

Syntax:

void__builtin_coro_resume(void*addr);void__builtin_coro_destroy(void*addr);bool__builtin_coro_done(void*addr);void*__builtin_coro_promise(void*addr,intalignment,boolfrom_promise)

Example of use:

template<>structcoroutine_handle<void>{voidresume()const{__builtin_coro_resume(ptr);}voiddestroy()const{__builtin_coro_destroy(ptr);}booldone()const{return__builtin_coro_done(ptr);}// ...protected:void*ptr;};template<typenamePromise>structcoroutine_handle:coroutine_handle<>{// ...Promise&promise()const{return*reinterpret_cast<Promise*>(__builtin_coro_promise(ptr,alignof(Promise),/*from-promise=*/false));}staticcoroutine_handlefrom_promise(Promise&promise){coroutine_handlep;p.ptr=__builtin_coro_promise(&promise,alignof(Promise),/*from-promise=*/true);returnp;}};

Other coroutine builtins are either for internal clang use or for use duringdevelopment of the coroutine feature. SeeCoroutines in LLVM formore information on their semantics. Note that builtins matching the intrinsicsthat take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it toan appropriate value during the emission.

Syntax:

size_t__builtin_coro_size()void*__builtin_coro_frame()void*__builtin_coro_free(void*coro_frame)void*__builtin_coro_id(intalign,void*promise,void*fnaddr,void*parts)bool__builtin_coro_alloc()void*__builtin_coro_begin(void*memory)void__builtin_coro_end(void*coro_frame,boolunwind)char__builtin_coro_suspend(boolfinal)

Note that there is no builtin matching thellvm.coro.save intrinsic. LLVMautomatically will insert one if the first argument tollvm.coro.suspend istokennone. If a user calls__builin_suspend, clang will inserttoken noneas the first argument to the intrinsic.

Source location builtins

Clang provides builtins to support C++ standard library implementationofstd::source_location as specified in C++20. With the exceptionof__builtin_COLUMN, these builtins are also implemented by GCC.

Syntax:

constchar*__builtin_FILE();constchar*__builtin_FUNCTION();unsigned__builtin_LINE();unsigned__builtin_COLUMN();// Clang onlyconststd::source_location::__impl*__builtin_source_location();

Example of use:

voidmy_assert(boolpred,intline=__builtin_LINE(),// Captures line of callerconstchar*file=__builtin_FILE(),constchar*function=__builtin_FUNCTION()){if(pred)return;printf("%s:%d assertion failed in function %s\n",file,line,function);std::abort();}structMyAggregateType{intx;intline=__builtin_LINE();// captures line where aggregate initialization occurs};static_assert(MyAggregateType{42}.line==__LINE__);structMyClassType{intline=__builtin_LINE();// captures line of the constructor used during initializationconstexprMyClassType(int){assert(line==__LINE__);}};

Description:

The builtins__builtin_LINE,__builtin_FUNCTION, and__builtin_FILEreturn the values, at the “invocation point”, for__LINE__,__FUNCTION__, and__FILE__ respectively.__builtin_COLUMN similarlyreturns the column, though there is no corresponding macro. These builtins areconstant expressions.

When the builtins appear as part of a default function argument the invocationpoint is the location of the caller. When the builtins appear as part of adefault member initializer, the invocation point is the location of theconstructor or aggregate initialization used to create the object. Otherwisethe invocation point is the same as the location of the builtin.

When the invocation point of__builtin_FUNCTION is not a function scope theempty string is returned.

The builtin__builtin_source_location returns a pointer to constant staticdata of typestd::source_location::__impl. This type must have already beendefined, and must contain exactly four fields:constchar*_M_file_name,constchar*_M_function_name,<any-integral-type>_M_line, and<any-integral-type>_M_column. The fields will be populated in the samemanner as the above four builtins, except that_M_function_name is populatedwith__PRETTY_FUNCTION__ rather than__FUNCTION__.

Alignment builtins

Clang provides builtins to support checking and adjusting alignment ofpointers and integers.These builtins can be used to avoid relying on implementation-defined behaviorof arithmetic on integers derived from pointers.Additionally, these builtins retain type information and, unlike bitwisearithmetic, they can perform semantic checking on the alignment value.

Syntax:

Type__builtin_align_up(Typevalue,size_talignment);Type__builtin_align_down(Typevalue,size_talignment);bool__builtin_is_aligned(Typevalue,size_talignment);

Example of use:

char*global_alloc_buffer;void*my_aligned_allocator(size_talloc_size,size_talignment){char*result=__builtin_align_up(global_alloc_buffer,alignment);// result now contains the value of global_alloc_buffer rounded up to the// next multiple of alignment.global_alloc_buffer=result+alloc_size;returnresult;}void*get_start_of_page(void*ptr){return__builtin_align_down(ptr,PAGE_SIZE);}voidexample(char*buffer){if(__builtin_is_aligned(buffer,64)){do_fast_aligned_copy(buffer);}else{do_unaligned_copy(buffer);}}// In addition to pointers, the builtins can also be used on integer types// and are evaluatable inside constant expressions.static_assert(__builtin_align_up(123,64)==128,"");static_assert(__builtin_align_down(123u,64)==64u,"");static_assert(!__builtin_is_aligned(123,64),"");

Description:

The builtins__builtin_align_up,__builtin_align_down, return theirfirst argument aligned up/down to the next multiple of the second argument.If the value is already sufficiently aligned, it is returned unchanged.The builtin__builtin_is_aligned returns whether the first argument isaligned to a multiple of the second argument.All of these builtins expect the alignment to be expressed as a number of bytes.

These builtins can be used for all integer types as well as (non-function)pointer types. For pointer types, these builtins operate in terms of the integeraddress of the pointer and return a new pointer of the same type (includingqualifiers such asconst) with an adjusted address.When aligning pointers up or down, the resulting value must be within the sameunderlying allocation or one past the end (see C17 6.5.6p8, C++ [expr.add]).This means that arbitrary integer values stored in pointer-type variables mustnot be passed to these builtins. For those use cases, the builtins can still beused, but the operation must be performed on the pointer cast touintptr_t.

If Clang can determine that the alignment is not a power of two at compile time,it will result in a compilation failure. If the alignment argument is not apower of two at run time, the behavior of these builtins is undefined.

Non-standard C++11 Attributes

Clang’s non-standard C++11 attributes live in theclang attributenamespace.

Clang supports GCC’sgnu attribute namespace. All GCC attributes whichare accepted with the__attribute__((foo)) syntax are also accepted as[[gnu::foo]]. This only extends to attributes which are specified by GCC(see the list ofGCC function attributes,GCC variableattributes, andGCC type attributes). As with the GCCimplementation, these attributes must appertain to thedeclarator-id in adeclaration, which means they must go either at the start of the declaration orimmediately after the name being declared.

For example, this applies the GNUunused attribute toa andf, andalso applies the GNUnoreturn attribute tof.

[[gnu::unused]]inta,f[[gnu::noreturn]]();

Target-Specific Extensions

Clang supports some language features conditionally on some targets.

ARM/AArch64 Language Extensions

Memory Barrier Intrinsics

Clang implements the__dmb,__dsb and__isb intrinsics as definedin theARM C Language Extensions Release 2.0.Note that these intrinsics are implemented as motion barriers that blockreordering of memory accesses and side effect instructions. Other instructionslike simple arithmetic may be reordered around the intrinsic. If you expect tohave no reordering at all, use inline assembly instead.

X86/X86-64 Language Extensions

The X86 backend has these language extensions:

Memory references to specified segments

Annotating a pointer with address space #256 causes it to be code generatedrelative to the X86 GS segment register, address space #257 causes it to berelative to the X86 FS segment, and address space #258 causes it to berelative to the X86 SS segment. Note that this is a very very low-levelfeature that should only be used if you know what you’re doing (for example inan OS kernel).

Here is an example:

#define GS_RELATIVE __attribute__((address_space(256)))intfoo(intGS_RELATIVE*P){return*P;}

Which compiles to (on X86-32):

_foo:movl4(%esp),%eaxmovl%gs:(%eax),%eaxret

You can also use the GCC compatibility macros__seg_fs and__seg_gs forthe same purpose. The preprocessor symbols__SEG_FS and__SEG_GSindicate their support.

PowerPC Language Extensions

Set the Floating Point Rounding Mode

PowerPC64/PowerPC64le supports the builtin function__builtin_setrnd to setthe floating point rounding mode. This function will use the least significanttwo bits of integer argument to set the floating point rounding mode.

double__builtin_setrnd(intmode);

The effective values for mode are:

  • 0 - round to nearest

  • 1 - round to zero

  • 2 - round to +infinity

  • 3 - round to -infinity

Note that the mode argument will modulo 4, so if the integer argument is greaterthan 3, it will only use the least significant two bits of the mode.Namely,__builtin_setrnd(102)) is equal to__builtin_setrnd(2).

PowerPC cache builtins

The PowerPC architecture specifies instructions implementing cache operations.Clang provides builtins that give direct programmer access to these cacheinstructions.

Currently the following builtins are implemented in clang:

__builtin_dcbf copies the contents of a modified block from the data cacheto main memory and flushes the copy from the data cache.

Syntax:

void__dcbf(constvoid*addr);/* Data Cache Block Flush */

Example of Use:

inta=1;__builtin_dcbf(&a);

Extensions for Static Analysis

Clang supports additional attributes that are useful for documenting programinvariants and rules for static analysis tools, such as theClang StaticAnalyzer. These attributes are documentedin the analyzer’slist of source-level annotations.

Extensions for Dynamic Analysis

Use__has_feature(address_sanitizer) to check if the code is being builtwithAddressSanitizer.

Use__has_feature(thread_sanitizer) to check if the code is being builtwithThreadSanitizer.

Use__has_feature(memory_sanitizer) to check if the code is being builtwithMemorySanitizer.

Use__has_feature(dataflow_sanitizer) to check if the code is being builtwithDataFlowSanitizer.

Use__has_feature(safe_stack) to check if the code is being builtwithSafeStack.

Extensions for selectively disabling optimization

Clang provides a mechanism for selectively disabling optimizations in functionsand methods.

To disable optimizations in a single function definition, the GNU-style or C++11non-standard attributeoptnone can be used.

// The following functions will not be optimized.// GNU-style attribute__attribute__((optnone))intfoo(){// ... code}// C++11 attribute[[clang::optnone]]intbar(){// ... code}

To facilitate disabling optimization for a range of function definitions, arange-based pragma is provided. Its syntax is#pragmaclangoptimizefollowed byoff oron.

All function definitions in the region between anoff and the followingon will be decorated with theoptnone attribute unless doing so wouldconflict with explicit attributes already present on the function (e.g. theones that control inlining).

#pragma clang optimize off// This function will be decorated with optnone.intfoo(){// ... code}// optnone conflicts with always_inline, so bar() will not be decorated.__attribute__((always_inline))intbar(){// ... code}#pragma clang optimize on

If noon is found to close anoff region, the end of the region is theend of the compilation unit.

Note that a stray#pragmaclangoptimizeon does not selectively enableadditional optimizations when compiling at low optimization levels. This featurecan only be used to selectively disable optimizations.

The pragma has an effect on functions only at the point of their definition; forfunction templates, this means that the state of the pragma at the point of aninstantiation is not necessarily relevant. Consider the following example:

template<typenameT>Ttwice(Tt){return2*t;}#pragma clang optimize offtemplate<typenameT>Tthrice(Tt){return3*t;}intcontainer(inta,intb){returntwice(a)+thrice(b);}#pragma clang optimize on

In this example, the definition of the template functiontwice is outsidethe pragma region, whereas the definition ofthrice is inside the region.Thecontainer function is also in the region and will not be optimized, butit causes the instantiation oftwice andthrice with anint type; ofthese two instantiations,twice will be optimized (because its definitionwas outside the region) andthrice will not be optimized.

Clang also implements MSVC’s range-based pragma,#pragmaoptimize("[optimization-list]",on|off). At the moment, Clang onlysupports an empty optimization list, whereas MSVC supports the arguments,s,g,t, andy. Currently, the implementation ofpragmaoptimize behavesthe same as#pragmaclangoptimize. All functionsbetweenoff andon will be decorated with theoptnone attribute.

#pragma optimize("", off)// This function will be decorated with optnone.voidf1(){}#pragma optimize("", on)// This function will be optimized with whatever was specified on// the commandline.voidf2(){}// This will warn with Clang's current implementation.#pragma optimize("g", on)voidf3(){}

For MSVC, an empty optimization list andoff parameter will turn offall optimizations,s,g,t, andy. An empty optimization andon parameter will reset the optimizations to the ones specified on thecommandline.

Parameters (unsupported by Clang)

Parameter

Type of optimization

g

Deprecated

s or t

Short or fast sequences of machine code

y

Enable frame pointers

Extensions for loop hint optimizations

The#pragmaclangloop directive is used to specify hints for optimizing thesubsequent for, while, do-while, or c++11 range-based for loop. The directiveprovides options for vectorization, interleaving, predication, unrolling anddistribution. Loop hints can be specified before any loop and will be ignored ifthe optimization is not safe to apply.

There are loop hints that control transformations (e.g. vectorization, loopunrolling) and there are loop hints that set transformation options (e.g.vectorize_width,unroll_count). Pragmas setting transformation optionsimply the transformation is enabled, as if it was enabled via the correspondingtransformation pragma (e.g.vectorize(enable)). If the transformation isdisabled (e.g.vectorize(disable)), that takes precedence overtransformations option pragmas implying that transformation.

Vectorization, Interleaving, and Predication

A vectorized loop performs multiple iterations of the original loopin parallel using vector instructions. The instruction set of the targetprocessor determines which vector instructions are available and their vectorwidths. This restricts the types of loops that can be vectorized. The vectorizerautomatically determines if the loop is safe and profitable to vectorize. Avector instruction cost model is used to select the vector width.

Interleaving multiple loop iterations allows modern processors to furtherimprove instruction-level parallelism (ILP) using advanced hardware features,such as multiple execution units and out-of-order execution. The vectorizer usesa cost model that depends on the register pressure and generated code size toselect the interleaving count.

Vectorization is enabled byvectorize(enable) and interleaving is enabledbyinterleave(enable). This is useful when compiling with-Os tomanually enable vectorization or interleaving.

#pragma clang loop vectorize(enable)#pragma clang loop interleave(enable)for(...){...}

The vector width is specified byvectorize_width(_value_[,fixed|scalable]), where _value_ is a positiveinteger and the type of vectorization can be specified with an optionalsecond parameter. The default for the second parameter is ‘fixed’ andrefers to fixed width vectorization, whereas ‘scalable’ indicates thecompiler should use scalable vectors instead. Another use of vectorize_widthisvectorize_width(fixed|scalable) where the user can hint at the typeof vectorization to use without specifying the exact width. In both variantsof the pragma the vectorizer may decide to fall back on fixed widthvectorization if the target does not support scalable vectors.

The interleave count is specified byinterleave_count(_value_), where_value_ is a positive integer. This is useful for specifying the optimalwidth/count of the set of target architectures supported by your application.

#pragma clang loop vectorize_width(2)#pragma clang loop interleave_count(2)for(...){...}

Specifying a width/count of 1 disables the optimization, and is equivalent tovectorize(disable) orinterleave(disable).

Vector predication is enabled byvectorize_predicate(enable), for example:

#pragma clang loop vectorize(enable)#pragma clang loop vectorize_predicate(enable)for(...){...}

This predicates (masks) all instructions in the loop, which allows the scalarremainder loop (the tail) to be folded into the main vectorized loop. Thismight be more efficient when vector predication is efficiently supported by thetarget platform.

Loop Unrolling

Unrolling a loop reduces the loop control overhead and exposes moreopportunities for ILP. Loops can be fully or partially unrolled. Full unrollingeliminates the loop and replaces it with an enumerated sequence of loopiterations. Full unrolling is only possible if the loop trip count is known atcompile time. Partial unrolling replicates the loop body within the loop andreduces the trip count.

Ifunroll(enable) is specified the unroller will attempt to fully unroll theloop if the trip count is known at compile time. If the fully unrolled code sizeis greater than an internal limit the loop will be partially unrolled up to thislimit. If the trip count is not known at compile time the loop will be partiallyunrolled with a heuristically chosen unroll factor.

#pragma clang loop unroll(enable)for(...){...}

Ifunroll(full) is specified the unroller will attempt to fully unroll theloop if the trip count is known at compile time identically tounroll(enable). However, withunroll(full) the loop will not be unrolledif the loop count is not known at compile time.

#pragma clang loop unroll(full)for(...){...}

The unroll count can be specified explicitly withunroll_count(_value_) where_value_ is a positive integer. If this value is greater than the trip count theloop will be fully unrolled. Otherwise the loop is partially unrolled subjectto the same code size limit as withunroll(enable).

#pragma clang loop unroll_count(8)for(...){...}

Unrolling of a loop can be prevented by specifyingunroll(disable).

Loop unroll parameters can be controlled by options-mllvm -unroll-count=n and-mllvm -pragma-unroll-threshold=n.

Loop Distribution

Loop Distribution allows splitting a loop into multiple loops. This isbeneficial for example when the entire loop cannot be vectorized but some of theresulting loops can.

Ifdistribute(enable)) is specified and the loop has memory dependenciesthat inhibit vectorization, the compiler will attempt to isolate the offendingoperations into a new loop. This optimization is not enabled by default, onlyloops marked with the pragma are considered.

#pragma clang loop distribute(enable)for(i=0;i<N;++i){S1:A[i+1]=A[i]+B[i];S2:C[i]=D[i]*E[i];}

This loop will be split into two loops between statements S1 and S2. Thesecond loop containing S2 will be vectorized.

Loop Distribution is currently not enabled by default in the optimizer becauseit can hurt performance in some cases. For example, instruction-levelparallelism could be reduced by sequentializing the execution of thestatements S1 and S2 above.

If Loop Distribution is turned on globally with-mllvm-enable-loop-distribution, specifyingdistribute(disable) canbe used the disable it on a per-loop basis.

Additional Information

For convenience multiple loop hints can be specified on a single line.

#pragma clang loop vectorize_width(4) interleave_count(8)for(...){...}

If an optimization cannot be applied any hints that apply to it will be ignored.For example, the hintvectorize_width(4) is ignored if the loop is notproven safe to vectorize. To identify and diagnose optimization issues use-Rpass,-Rpass-missed, and-Rpass-analysis command line options. See theuser guide for details.

Extensions to specify floating-point flags

The#pragmaclangfp pragma allows floating-point options to be specifiedfor a section of the source code. This pragma can only appear at file scope orat the start of a compound statement (excluding comments). When using within acompound statement, the pragma is active within the scope of the compoundstatement.

Currently, the following settings can be controlled with this pragma:

#pragmaclangfpreassociate allows control over the reassociationof floating point expressions. When enabled, this pragma allows the expressionx+(y+z) to be reassociated as(x+y)+z.Reassociation can also occur across multiple statements.This pragma can be used to disable reassociation when it is otherwiseenabled for the translation unit with the-fassociative-math flag.The pragma can take two values:on andoff.

floatf(floatx,floaty,floatz){// Enable floating point reassociation across statements#pragma clang fp reassociate(on)floatt=x+y;floatv=t+z;}

#pragmaclangfpcontract specifies whether the compiler shouldcontract a multiply and an addition (or subtraction) into a fused FMAoperation when supported by the target.

The pragma can take three values:on,fast andoff. Theonoption is identical to using#pragmaSTDCFP_CONTRACT(ON) and it allowsfusion as specified the language standard. Thefast option allows fusionin cases when the language standard does not make this possible (e.g. acrossstatements in C).

for(...){#pragma clang fp contract(fast)a=b[i]*c[i];d[i]+=a;}

The pragma can also be used withoff which turns FP contraction off for asection of the code. This can be useful when fast contraction is otherwiseenabled for the translation unit with the-ffp-contract=fast-honor-pragmas flag.Note that-ffp-contract=fast will override pragmas to fuse multiply andaddition across statements regardless of any controlling pragmas.

#pragmaclangfpexceptions specifies floating point exception behavior. Itmay take one of the values:ignore,maytrap orstrict. Meaning ofthese values is same as forconstrained floating point intrinsics.

{// Preserve floating point exceptions#pragma clang fp exceptions(strict)z=x+y;if(fetestexcept(FE_OVERFLOW))...}

A#pragmaclangfp pragma may contain any number of options:

voidfunc(float*dest,floata,floatb){#pragma clang fp exceptions(maytrap) contract(fast) reassociate(on)...}

#pragmaclangfpeval_method allows floating-point behavior to be specifiedfor a section of the source code. This pragma can appear at file or namespacescope, or at the start of a compound statement (excluding comments).The pragma is active within the scope of the compound statement.

Whenpragmaclangfpeval_method(source) is enabled, the section of codegoverned by the pragma behaves as though the command-line option-ffp-eval-method=source is enabled. Rounds intermediate results tosource-defined precision.

Whenpragmaclangfpeval_method(double) is enabled, the section of codegoverned by the pragma behaves as though the command-line option-ffp-eval-method=double is enabled. Rounds intermediate results todouble precision.

Whenpragmaclangfpeval_method(extended) is enabled, the section of codegoverned by the pragma behaves as though the command-line option-ffp-eval-method=extended is enabled. Rounds intermediate results totarget-dependentlongdouble precision. In Win32 programming, for instance,the long double data type maps to the double, 64-bit precision data type.

The full syntax this pragma supports is#pragmaclangfpeval_method(source|double|extended).

for(...){// The compiler will use long double as the floating-point evaluation// method.#pragma clang fp eval_method(extended)a=b[i]*c[i]+e;}

The#pragmafloat_control pragma allows precise floating-pointsemantics and floating-point exception behavior to be specifiedfor a section of the source code. This pragma can only appear at file ornamespace scope, within a language linkage specification or at the start of acompound statement (excluding comments). When used within a compound statement,the pragma is active within the scope of the compound statement. This pragmais modeled after a Microsoft pragma with the same spelling and syntax. Forpragmas specified at file or namespace scope, or within a language linkagespecification, a stack is supported so that thepragmafloat_controlsettings can be pushed or popped.

Whenpragmafloat_control(precise,on) is enabled, the section of codegoverned by the pragma uses precise floating point semantics, effectively-ffast-math is disabled and-ffp-contract=on(fused multiply add) is enabled.

Whenpragmafloat_control(except,on) is enabled, the section of codegoverned by the pragma behaves as though the command-line option-ffp-exception-behavior=strict is enabled,whenpragmafloat_control(except,off) is enabled, the section of codegoverned by the pragma behaves as though the command-line option-ffp-exception-behavior=ignore is enabled.

The full syntax this pragma supports isfloat_control(except|precise,on|off[,push]) andfloat_control(push|pop).Thepush andpop forms, including usingpush as the optionalthird argument, can only occur at file scope.

for(...){// This block will be compiled with -fno-fast-math and -ffp-contract=on#pragma float_control(precise, on)a=b[i]*c[i]+e;}

Specifying an attribute for multiple declarations (#pragma clang attribute)

The#pragmaclangattribute directive can be used to apply an attribute tomultiple declarations. The#pragmaclangattributepush variation of thedirective pushes a new “scope” of#pragmaclangattribute that attributescan be added to. The#pragmaclangattribute(...) variation adds anattribute to that scope, and the#pragmaclangattributepop variation popsthe scope. You can also use#pragmaclangattributepush(...), which is ashorthand for when you want to add one attribute to a new scope. Multiple pushdirectives can be nested inside each other.

The attributes that are used in the#pragmaclangattribute directivescan be written using the GNU-style syntax:

#pragma clang attribute push (__attribute__((annotate("custom"))), apply_to = function)voidfunction();// The function now has the annotate("custom") attribute#pragma clang attribute pop

The attributes can also be written using the C++11 style syntax:

#pragma clang attribute push ([[noreturn]], apply_to = function)voidfunction();// The function now has the [[noreturn]] attribute#pragma clang attribute pop

The__declspec style syntax is also supported:

#pragma clang attribute push (__declspec(dllexport), apply_to = function)voidfunction();// The function now has the __declspec(dllexport) attribute#pragma clang attribute pop

A single push directive can contain multiple attributes, however,only one syntax style can be used within a single directive:

#pragma clang attribute push ([[noreturn, noinline]], apply_to = function)voidfunction1();// The function now has the [[noreturn]] and [[noinline]] attributes#pragma clang attribute pop#pragma clang attribute push (__attribute((noreturn, noinline)), apply_to = function)voidfunction2();// The function now has the __attribute((noreturn)) and __attribute((noinline)) attributes#pragma clang attribute pop

Because multiple push directives can be nested, if you’re writing a macro thatexpands to_Pragma("clangattribute") it’s good hygiene (though notrequired) to add a namespace to your push/pop directives. A pop directive with anamespace will pop the innermost push that has that same namespace. This willensure that another macro’spop won’t inadvertently pop your attribute. Notethat anpop without a namespace will pop the innermostpush without anamespace.push``eswithanamespacecanonlybepoppedby``pop with thesame namespace. For instance:

#define ASSUME_NORETURN_BEGIN _Pragma("clang attribute AssumeNoreturn.push ([[noreturn]], apply_to = function)")#define ASSUME_NORETURN_END   _Pragma("clang attribute AssumeNoreturn.pop")#define ASSUME_UNAVAILABLE_BEGIN _Pragma("clang attribute Unavailable.push (__attribute__((unavailable)), apply_to=function)")#define ASSUME_UNAVAILABLE_END   _Pragma("clang attribute Unavailable.pop")ASSUME_NORETURN_BEGINASSUME_UNAVAILABLE_BEGINvoidfunction();// function has [[noreturn]] and __attribute__((unavailable))ASSUME_NORETURN_ENDvoidother_function();// function has __attribute__((unavailable))ASSUME_UNAVAILABLE_END

Without the namespaces on the macros,other_function will be annotated with[[noreturn]] instead of__attribute__((unavailable)). This may seem likea contrived example, but its very possible for this kind of situation to appearin real code if the pragmas are spread out across a large file. You can test ifyour version of clang supports namespaces on#pragmaclangattribute with__has_extension(pragma_clang_attribute_namespaces).

Subject Match Rules

The set of declarations that receive a single attribute from the attribute stackdepends on the subject match rules that were specified in the pragma. Subjectmatch rules are specified after the attribute. The compiler expects anidentifier that corresponds to the subject set specifier. Theapply_tospecifier is currently the only supported subject set specifier. It allows youto specify match rules that form a subset of the attribute’s allowed subjectset, i.e. the compiler doesn’t require all of the attribute’s subjects. Forexample, an attribute like[[nodiscard]] whose subject set includesenum,record andhasType(functionType), requires the presence of atleast one of these rules afterapply_to:

#pragma clang attribute push([[nodiscard]], apply_to = enum)enumEnum1{A1,B1};// The enum will receive [[nodiscard]]structRecord1{};// The struct will *not* receive [[nodiscard]]#pragma clang attribute pop#pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))enumEnum2{A2,B2};// The enum will receive [[nodiscard]]structRecord2{};// The struct *will* receive [[nodiscard]]#pragma clang attribute pop// This is an error, since [[nodiscard]] can't be applied to namespaces:#pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))#pragma clang attribute pop

Multiple match rules can be specified using theany match rule, as shownin the example above. Theany rule applies attributes to all declarationsthat are matched by at least one of the rules in theany. It doesn’t nestand can’t be used inside the other match rules. Redundant match rules or rulesthat conflict with one another should not be used inside ofany. Failing tospecify a rule within theany rule results in an error.

Clang supports the following match rules:

  • function: Can be used to apply attributes to functions. This includes C++member functions, static functions, operators, and constructors/destructors.

  • function(is_member): Can be used to apply attributes to C++ memberfunctions. This includes members like static functions, operators, andconstructors/destructors.

  • hasType(functionType): Can be used to apply attributes to functions, C++member functions, and variables/fields whose type is a function pointer. Itdoes not apply attributes to Objective-C methods or blocks.

  • type_alias: Can be used to apply attributes totypedef declarationsand C++11 type aliases.

  • record: Can be used to apply attributes tostruct,class, andunion declarations.

  • record(unless(is_union)): Can be used to apply attributes only tostruct andclass declarations.

  • enum: Can be be used to apply attributes to enumeration declarations.

  • enum_constant: Can be used to apply attributes to enumerators.

  • variable: Can be used to apply attributes to variables, includinglocal variables, parameters, global variables, and static member variables.It does not apply attributes to instance member variables or Objective-Civars.

  • variable(is_thread_local): Can be used to apply attributes to thread-localvariables only.

  • variable(is_global): Can be used to apply attributes to global variablesonly.

  • variable(is_local): Can be used to apply attributes to local variablesonly.

  • variable(is_parameter): Can be used to apply attributes to parametersonly.

  • variable(unless(is_parameter)): Can be used to apply attributes to allthe variables that are not parameters.

  • field: Can be used to apply attributes to non-static member variablesin a record. This includes Objective-C ivars.

  • namespace: Can be used to apply attributes tonamespace declarations.

  • objc_interface: Can be used to apply attributes to@interfacedeclarations.

  • objc_protocol: Can be used to apply attributes to@protocoldeclarations.

  • objc_category: Can be used to apply attributes to category declarations,including class extensions.

  • objc_method: Can be used to apply attributes to Objective-C methods,including instance and class methods. Implicit methods like implicit propertygetters and setters do not receive the attribute.

  • objc_method(is_instance): Can be used to apply attributes to Objective-Cinstance methods.

  • objc_property: Can be used to apply attributes to@propertydeclarations.

  • block: Can be used to apply attributes to block declarations. This doesnot include variables/fields of block pointer type.

The use ofunless in match rules is currently restricted to a strict set ofsub-rules that are used by the supported attributes. That means that even thoughvariable(unless(is_parameter)) is a valid match rule,variable(unless(is_thread_local)) is not.

Supported Attributes

Not all attributes can be used with the#pragmaclangattribute directive.Notably, statement attributes like[[fallthrough]] or type attributeslikeaddress_space aren’t supported by this directive. You can determinewhether or not an attribute is supported by the pragma by referring to theindividual documentation for that attribute.

The attributes are applied to all matching declarations individually, even whenthe attribute is semantically incorrect. The attributes that aren’t applied toany declaration are not verified semantically.

Specifying section names for global objects (#pragma clang section)

The#pragmaclangsection directive provides a means to assign section-namesto global variables, functions and static variables.

The section names can be specified as:

#pragma clang section bss="myBSS" data="myData" rodata="myRodata" relro="myRelro" text="myText"

The section names can be reverted back to default name by supplying an emptystring to the section kind, for example:

#pragma clang section bss="" data="" text="" rodata="" relro=""

The#pragmaclangsection directive obeys the following rules:

  • The pragma applies to all global variable, statics and function declarationsfrom the pragma to the end of the translation unit.

  • The pragma clang section is enabled automatically, without need of any flags.

  • This feature is only defined to work sensibly for ELF targets.

  • If section name is specified through _attribute_((section(“myname”))), thenthe attribute name gains precedence.

  • Global variables that are initialized to zero will be placed in the namedbss section, if one is present.

  • The#pragmaclangsection directive does not does try to infer section-kindfrom the name. For example, naming a section “.bss.mySec” does NOT meanit will be a bss section name.

  • The decision about which section-kind applies to each global is taken in the back-end.Once the section-kind is known, appropriate section name, as specified by the user using#pragmaclangsection directive, is applied to that global.

Specifying Linker Options on ELF Targets

The#pragmacomment(lib,...) directive is supported on all ELF targets.The second parameter is the library name (without the traditional Unix prefix oflib). This allows you to provide an implicit link of dependent libraries.

Evaluating Object Size Dynamically

Clang supports the builtin__builtin_dynamic_object_size, the semantics arethe same as GCC’s__builtin_object_size (which Clang also supports), but__builtin_dynamic_object_size can evaluate the object’s size at runtime.__builtin_dynamic_object_size is meant to be used as a drop-in replacementfor__builtin_object_size in libraries that support it.

For instance, here is a program that__builtin_dynamic_object_size will makesafer:

voidcopy_into_buffer(size_tsize){char*buffer=malloc(size);strlcpy(buffer,"some string",strlen("some string"));// Previous line preprocesses to:// __builtin___strlcpy_chk(buffer, "some string", strlen("some string"), __builtin_object_size(buffer, 0))}

Since the size ofbuffer can’t be known at compile time, Clang will fold__builtin_object_size(buffer,0) into-1. However, if this was writtenas__builtin_dynamic_object_size(buffer,0), Clang will fold it intosize, providing some extra runtime safety.

Deprecating Macros

Clang supports the pragma#pragmaclangdeprecated, which can be used toprovide deprecation warnings for macro uses. For example:

#define MIN(x, y) x < y ? x : y#pragma clang deprecated(MIN, "use std::min instead")voidmin(inta,intb){returnMIN(a,b);// warning: MIN is deprecated: use std::min instead}

#pragmaclangdeprecated should be preferred for this purpose over#pragmaGCCwarning because the warning can be controlled with-Wdeprecated.

Restricted Expansion Macros

Clang supports the pragma#pragmaclangrestrict_expansion, which can beused restrict macro expansion in headers. This can be valuable when providingheaders with ABI stability requirements. Any expansion of the annotated macroprocessed by the preprocessor after the#pragma annotation will log awarning. Redefining the macro or undefining the macro will not be diagnosed, norwill expansion of the macro within the main source file. For example:

#define TARGET_ARM 1#pragma clang restrict_expansion(TARGET_ARM, "<reason>")/// Foo.hstructFoo{#if TARGET_ARM// warning: TARGET_ARM is marked unsafe in headers: <reason>uint32_tX;#elseuint64_tX;#endif};/// main.c#include"foo.h"#if TARGET_ARM// No warning in main source fileX_TYPEuint32_t#elseX_TYPEuint64_t#endif

This warning is controlled by-Wpedantic-macros.

Final Macros

Clang supports the pragma#pragmaclangfinal, which can be used tomark macros as final, meaning they cannot be undef’d or re-defined. For example:

#define FINAL_MACRO 1#pragma clang final(FINAL_MACRO)#define FINAL_MACRO// warning: FINAL_MACRO is marked final and should not be redefined#undef FINAL_MACRO// warning: FINAL_MACRO is marked final and should not be undefined

This is useful for enforcing system-provided macros that should not be alteredin user headers or code. This is controlled by-Wpedantic-macros. Finalmacros will always warn on redefinition, including situations with identicalbodies and in system headers.

Line Control

Clang supports an extension for source line control, which takes theform of a preprocessor directive starting with an unsigned integralconstant. In addition to the standard#line directive, this formallows control of an include stack and header file type, which is usedin issuing diagnostics. These lines are emitted in preprocessedoutput.

# <line:number> <filename:string> <header-type:numbers>

The filename is optional, and if unspecified indicates no change insource filename. The header-type is an optional, whitespace-delimited,sequence of magic numbers as follows.

  • 1: Push the current source file name onto the include stack andenter a new file.

  • 2: Pop the include stack and return to the specified file. Ifthe filename is"", the name popped from the include stack isused. Otherwise there is no requirement that the specified filenamematches the current source when originally pushed.

  • 3: Enter a system-header region. System headers often containimplementation-specific source that would normally emit a diagnostic.

  • 4: Enter an implicitextern"C" region. This is not required onmodern systems where system headers are C++-aware.

At most a single1 or2 can be present, and values must be inascending order.

Examples are:

# 57// Advance (or return) to line 57 of the current source file# 57 "frob"// Set to line 57 of "frob"# 1 "foo.h" 1// Enter "foo.h" at line 1# 59 "main.c" 2// Leave current include and return to "main.c"# 1 "/usr/include/stdio.h" 1 3// Enter a system header# 60 "" 2// return to "main.c"# 1 "/usr/ancient/header.h" 1 4// Enter an implicit extern "C" header

Extended Integer Types

Clang supports the C23_BitInt(N) feature as an extension in older C modesand in C++. This type was previously implemented in Clang with the samesemantics, but spelled_ExtInt(N). This spelling has been deprecated infavor of the standard type.

Note: the ABI for_BitInt(N) is still in the process of being stabilized,so this type should not yet be used in interfaces that require ABI stability.

Intrinsics Support within Constant Expressions

The following builtin intrinsics can be used in constant expressions:

  • __builtin_bitreverse8

  • __builtin_bitreverse16

  • __builtin_bitreverse32

  • __builtin_bitreverse64

  • __builtin_bswap16

  • __builtin_bswap32

  • __builtin_bswap64

  • __builtin_clrsb

  • __builtin_clrsbl

  • __builtin_clrsbll

  • __builtin_clz

  • __builtin_clzl

  • __builtin_clzll

  • __builtin_clzs

  • __builtin_ctz

  • __builtin_ctzl

  • __builtin_ctzll

  • __builtin_ctzs

  • __builtin_ffs

  • __builtin_ffsl

  • __builtin_ffsll

  • __builtin_fpclassify

  • __builtin_inf

  • __builtin_isinf

  • __builtin_isinf_sign

  • __builtin_isfinite

  • __builtin_isnan

  • __builtin_isnormal

  • __builtin_nan

  • __builtin_nans

  • __builtin_parity

  • __builtin_parityl

  • __builtin_parityll

  • __builtin_popcount

  • __builtin_popcountl

  • __builtin_popcountll

  • __builtin_rotateleft8

  • __builtin_rotateleft16

  • __builtin_rotateleft32

  • __builtin_rotateleft64

  • __builtin_rotateright8

  • __builtin_rotateright16

  • __builtin_rotateright32

  • __builtin_rotateright64

The following x86-specific intrinsics can be used in constant expressions:

  • _bit_scan_forward

  • _bit_scan_reverse

  • __bsfd

  • __bsfq

  • __bsrd

  • __bsrq

  • __bswap

  • __bswapd

  • __bswap64

  • __bswapq

  • _castf32_u32

  • _castf64_u64

  • _castu32_f32

  • _castu64_f64

  • _mm_popcnt_u32

  • _mm_popcnt_u64

  • _popcnt32

  • _popcnt64

  • __popcntd

  • __popcntq

  • __rolb

  • __rolw

  • __rold

  • __rolq

  • __rorb

  • __rorw

  • __rord

  • __rorq

  • _rotl

  • _rotr

  • _rotwl

  • _rotwr

  • _lrotl

  • _lrotr