1=========================
2Clang Language Extensions
3=========================
4
5.. contents::
6   :local:
7   :depth: 1
8
9.. toctree::
10   :hidden:
11
12   ObjectiveCLiterals
13   BlockLanguageSpec
14   Block-ABI-Apple
15   AutomaticReferenceCounting
16   MatrixTypes
17
18Introduction
19============
20
21This document describes the language extensions provided by Clang.  In addition
22to the language extensions listed here, Clang aims to support a broad range of
23GCC extensions.  Please see the `GCC manual
24<https://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on
25these extensions.
26
27.. _langext-feature_check:
28
29Feature Checking Macros
30=======================
31
32Language extensions can be very useful, but only if you know you can depend on
33them.  In order to allow fine-grain features checks, we support three builtin
34function-like macros.  This allows you to directly test for a feature in your
35code without having to resort to something like autoconf or fragile "compiler
36version checks".
37
38``__has_builtin``
39-----------------
40
41This function-like macro takes a single identifier argument that is the name of
42a builtin function, a builtin pseudo-function (taking one or more type
43arguments), or a builtin template.
44It evaluates to 1 if the builtin is supported or 0 if not.
45It can be used like this:
46
47.. code-block:: c++
48
49  #ifndef __has_builtin         // Optional of course.
50    #define __has_builtin(x) 0  // Compatibility with non-clang compilers.
51  #endif
52
53  ...
54  #if __has_builtin(__builtin_trap)
55    __builtin_trap();
56  #else
57    abort();
58  #endif
59  ...
60
61.. note::
62
63  Prior to Clang 10, ``__has_builtin`` could not be used to detect most builtin
64  pseudo-functions.
65
66  ``__has_builtin`` should not be used to detect support for a builtin macro;
67  use ``#ifdef`` instead.
68
69.. _langext-__has_feature-__has_extension:
70
71``__has_feature`` and ``__has_extension``
72-----------------------------------------
73
74These function-like macros take a single identifier argument that is the name
75of a feature.  ``__has_feature`` evaluates to 1 if the feature is both
76supported by Clang and standardized in the current language standard or 0 if
77not (but see :ref:`below <langext-has-feature-back-compat>`), while
78``__has_extension`` evaluates to 1 if the feature is supported by Clang in the
79current language (either as a language extension or a standard language
80feature) or 0 if not.  They can be used like this:
81
82.. code-block:: c++
83
84  #ifndef __has_feature         // Optional of course.
85    #define __has_feature(x) 0  // Compatibility with non-clang compilers.
86  #endif
87  #ifndef __has_extension
88    #define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
89  #endif
90
91  ...
92  #if __has_feature(cxx_rvalue_references)
93  // This code will only be compiled with the -std=c++11 and -std=gnu++11
94  // options, because rvalue references are only standardized in C++11.
95  #endif
96
97  #if __has_extension(cxx_rvalue_references)
98  // This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
99  // and -std=gnu++98 options, because rvalue references are supported as a
100  // language extension in C++98.
101  #endif
102
103.. _langext-has-feature-back-compat:
104
105For backward compatibility, ``__has_feature`` can also be used to test
106for support for non-standardized features, i.e. features not prefixed ``c_``,
107``cxx_`` or ``objc_``.
108
109Another use of ``__has_feature`` is to check for compiler features not related
110to the language standard, such as e.g. :doc:`AddressSanitizer
111<AddressSanitizer>`.
112
113If the ``-pedantic-errors`` option is given, ``__has_extension`` is equivalent
114to ``__has_feature``.
115
116The feature tag is described along with the language feature below.
117
118The feature name or extension name can also be specified with a preceding and
119following ``__`` (double underscore) to avoid interference from a macro with
120the same name.  For instance, ``__cxx_rvalue_references__`` can be used instead
121of ``cxx_rvalue_references``.
122
123``__has_cpp_attribute``
124-----------------------
125
126This function-like macro is available in C++20 by default, and is provided as an
127extension in earlier language standards. It takes a single argument that is the
128name of a double-square-bracket-style attribute. The argument can either be a
129single identifier or a scoped identifier. If the attribute is supported, a
130nonzero value is returned. If the attribute is a standards-based attribute, this
131macro returns a nonzero value based on the year and month in which the attribute
132was voted into the working draft. See `WG21 SD-6
133<https://isocpp.org/std/standing-documents/sd-6-sg10-feature-test-recommendations>`_
134for the list of values returned for standards-based attributes. If the attribute
135is not supported by the current compilation target, this macro evaluates to 0.
136It can be used like this:
137
138.. code-block:: c++
139
140  #ifndef __has_cpp_attribute         // For backwards compatibility
141    #define __has_cpp_attribute(x) 0
142  #endif
143
144  ...
145  #if __has_cpp_attribute(clang::fallthrough)
146  #define FALLTHROUGH [[clang::fallthrough]]
147  #else
148  #define FALLTHROUGH
149  #endif
150  ...
151
152The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
153the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
154of these namespaces can be specified with a preceding and following ``__``
155(double underscore) to avoid interference from a macro with the same name. For
156instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
157
158``__has_c_attribute``
159---------------------
160
161This function-like macro takes a single argument that is the name of an
162attribute exposed with the double square-bracket syntax in C mode. The argument
163can either be a single identifier or a scoped identifier. If the attribute is
164supported, a nonzero value is returned. If the attribute is not supported by the
165current compilation target, this macro evaluates to 0. It can be used like this:
166
167.. code-block:: c
168
169  #ifndef __has_c_attribute         // Optional of course.
170    #define __has_c_attribute(x) 0  // Compatibility with non-clang compilers.
171  #endif
172
173  ...
174  #if __has_c_attribute(fallthrough)
175    #define FALLTHROUGH [[fallthrough]]
176  #else
177    #define FALLTHROUGH
178  #endif
179  ...
180
181The attribute scope tokens ``clang`` and ``_Clang`` are interchangeable, as are
182the attribute scope tokens ``gnu`` and ``__gnu__``. Attribute tokens in either
183of these namespaces can be specified with a preceding and following ``__``
184(double underscore) to avoid interference from a macro with the same name. For
185instance, ``gnu::__const__`` can be used instead of ``gnu::const``.
186
187``__has_attribute``
188-------------------
189
190This function-like macro takes a single identifier argument that is the name of
191a GNU-style attribute.  It evaluates to 1 if the attribute is supported by the
192current compilation target, or 0 if not.  It can be used like this:
193
194.. code-block:: c++
195
196  #ifndef __has_attribute         // Optional of course.
197    #define __has_attribute(x) 0  // Compatibility with non-clang compilers.
198  #endif
199
200  ...
201  #if __has_attribute(always_inline)
202  #define ALWAYS_INLINE __attribute__((always_inline))
203  #else
204  #define ALWAYS_INLINE
205  #endif
206  ...
207
208The attribute name can also be specified with a preceding and following ``__``
209(double underscore) to avoid interference from a macro with the same name.  For
210instance, ``__always_inline__`` can be used instead of ``always_inline``.
211
212
213``__has_declspec_attribute``
214----------------------------
215
216This function-like macro takes a single identifier argument that is the name of
217an attribute implemented as a Microsoft-style ``__declspec`` attribute.  It
218evaluates to 1 if the attribute is supported by the current compilation target,
219or 0 if not.  It can be used like this:
220
221.. code-block:: c++
222
223  #ifndef __has_declspec_attribute         // Optional of course.
224    #define __has_declspec_attribute(x) 0  // Compatibility with non-clang compilers.
225  #endif
226
227  ...
228  #if __has_declspec_attribute(dllexport)
229  #define DLLEXPORT __declspec(dllexport)
230  #else
231  #define DLLEXPORT
232  #endif
233  ...
234
235The attribute name can also be specified with a preceding and following ``__``
236(double underscore) to avoid interference from a macro with the same name.  For
237instance, ``__dllexport__`` can be used instead of ``dllexport``.
238
239``__is_identifier``
240-------------------
241
242This function-like macro takes a single identifier argument that might be either
243a reserved word or a regular identifier. It evaluates to 1 if the argument is just
244a regular identifier and not a reserved word, in the sense that it can then be
245used as the name of a user-defined function or variable. Otherwise it evaluates
246to 0.  It can be used like this:
247
248.. code-block:: c++
249
250  ...
251  #ifdef __is_identifier          // Compatibility with non-clang compilers.
252    #if __is_identifier(__wchar_t)
253      typedef wchar_t __wchar_t;
254    #endif
255  #endif
256
257  __wchar_t WideCharacter;
258  ...
259
260Include File Checking Macros
261============================
262
263Not all developments systems have the same include files.  The
264:ref:`langext-__has_include` and :ref:`langext-__has_include_next` macros allow
265you to check for the existence of an include file before doing a possibly
266failing ``#include`` directive.  Include file checking macros must be used
267as expressions in ``#if`` or ``#elif`` preprocessing directives.
268
269.. _langext-__has_include:
270
271``__has_include``
272-----------------
273
274This function-like macro takes a single file name string argument that is the
275name of an include file.  It evaluates to 1 if the file can be found using the
276include paths, or 0 otherwise:
277
278.. code-block:: c++
279
280  // Note the two possible file name string formats.
281  #if __has_include("myinclude.h") && __has_include(<stdint.h>)
282  # include "myinclude.h"
283  #endif
284
285To test for this feature, use ``#if defined(__has_include)``:
286
287.. code-block:: c++
288
289  // To avoid problem with non-clang compilers not having this macro.
290  #if defined(__has_include)
291  #if __has_include("myinclude.h")
292  # include "myinclude.h"
293  #endif
294  #endif
295
296.. _langext-__has_include_next:
297
298``__has_include_next``
299----------------------
300
301This function-like macro takes a single file name string argument that is the
302name of an include file.  It is like ``__has_include`` except that it looks for
303the second instance of the given file found in the include paths.  It evaluates
304to 1 if the second instance of the file can be found using the include paths,
305or 0 otherwise:
306
307.. code-block:: c++
308
309  // Note the two possible file name string formats.
310  #if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
311  # include_next "myinclude.h"
312  #endif
313
314  // To avoid problem with non-clang compilers not having this macro.
315  #if defined(__has_include_next)
316  #if __has_include_next("myinclude.h")
317  # include_next "myinclude.h"
318  #endif
319  #endif
320
321Note that ``__has_include_next``, like the GNU extension ``#include_next``
322directive, is intended for use in headers only, and will issue a warning if
323used in the top-level compilation file.  A warning will also be issued if an
324absolute path is used in the file argument.
325
326``__has_warning``
327-----------------
328
329This function-like macro takes a string literal that represents a command line
330option for a warning and returns true if that is a valid warning option.
331
332.. code-block:: c++
333
334  #if __has_warning("-Wformat")
335  ...
336  #endif
337
338.. _languageextensions-builtin-macros:
339
340Builtin Macros
341==============
342
343``__BASE_FILE__``
344  Defined to a string that contains the name of the main input file passed to
345  Clang.
346
347``__FILE_NAME__``
348  Clang-specific extension that functions similar to ``__FILE__`` but only
349  renders the last path component (the filename) instead of an invocation
350  dependent full path to that file.
351
352``__COUNTER__``
353  Defined to an integer value that starts at zero and is incremented each time
354  the ``__COUNTER__`` macro is expanded.
355
356``__INCLUDE_LEVEL__``
357  Defined to an integral value that is the include depth of the file currently
358  being translated.  For the main file, this value is zero.
359
360``__TIMESTAMP__``
361  Defined to the date and time of the last modification of the current source
362  file.
363
364``__clang__``
365  Defined when compiling with Clang
366
367``__clang_major__``
368  Defined to the major marketing version number of Clang (e.g., the 2 in
369  2.0.1).  Note that marketing version numbers should not be used to check for
370  language features, as different vendors use different numbering schemes.
371  Instead, use the :ref:`langext-feature_check`.
372
373``__clang_minor__``
374  Defined to the minor version number of Clang (e.g., the 0 in 2.0.1).  Note
375  that marketing version numbers should not be used to check for language
376  features, as different vendors use different numbering schemes.  Instead, use
377  the :ref:`langext-feature_check`.
378
379``__clang_patchlevel__``
380  Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
381
382``__clang_version__``
383  Defined to a string that captures the Clang marketing version, including the
384  Subversion tag or revision number, e.g., "``1.5 (trunk 102332)``".
385
386``__clang_literal_encoding__``
387  Defined to a narrow string literal that represents the current encoding of
388  narrow string literals, e.g., ``"hello"``. This macro typically expands to
389  "UTF-8" (but may change in the future if the
390  ``-fexec-charset="Encoding-Name"`` option is implemented.)
391
392``__clang_wide_literal_encoding__``
393  Defined to a narrow string literal that represents the current encoding of
394  wide string literals, e.g., ``L"hello"``. This macro typically expands to
395  "UTF-16" or "UTF-32" (but may change in the future if the
396  ``-fwide-exec-charset="Encoding-Name"`` option is implemented.)
397
398.. _langext-vectors:
399
400Vectors and Extended Vectors
401============================
402
403Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
404
405OpenCL vector types are created using the ``ext_vector_type`` attribute.  It
406supports the ``V.xyzw`` syntax and other tidbits as seen in OpenCL.  An example
407is:
408
409.. code-block:: c++
410
411  typedef float float4 __attribute__((ext_vector_type(4)));
412  typedef float float2 __attribute__((ext_vector_type(2)));
413
414  float4 foo(float2 a, float2 b) {
415    float4 c;
416    c.xz = a;
417    c.yw = b;
418    return c;
419  }
420
421Query for this feature with ``__has_attribute(ext_vector_type)``.
422
423Giving ``-maltivec`` option to clang enables support for AltiVec vector syntax
424and functions.  For example:
425
426.. code-block:: c++
427
428  vector float foo(vector int a) {
429    vector int b;
430    b = vec_add(a, a) + a;
431    return (vector float)b;
432  }
433
434NEON vector types are created using ``neon_vector_type`` and
435``neon_polyvector_type`` attributes.  For example:
436
437.. code-block:: c++
438
439  typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
440  typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
441
442  int8x8_t foo(int8x8_t a) {
443    int8x8_t v;
444    v = a;
445    return v;
446  }
447
448Vector Literals
449---------------
450
451Vector literals can be used to create vectors from a set of scalars, or
452vectors.  Either parentheses or braces form can be used.  In the parentheses
453form the number of literal values specified must be one, i.e. referring to a
454scalar value, or must match the size of the vector type being created.  If a
455single scalar literal value is specified, the scalar literal value will be
456replicated to all the components of the vector type.  In the brackets form any
457number of literals can be specified.  For example:
458
459.. code-block:: c++
460
461  typedef int v4si __attribute__((__vector_size__(16)));
462  typedef float float4 __attribute__((ext_vector_type(4)));
463  typedef float float2 __attribute__((ext_vector_type(2)));
464
465  v4si vsi = (v4si){1, 2, 3, 4};
466  float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
467  vector int vi1 = (vector int)(1);    // vi1 will be (1, 1, 1, 1).
468  vector int vi2 = (vector int){1};    // vi2 will be (1, 0, 0, 0).
469  vector int vi3 = (vector int)(1, 2); // error
470  vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
471  vector int vi5 = (vector int)(1, 2, 3, 4);
472  float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
473
474Vector Operations
475-----------------
476
477The table below shows the support for each operation by vector extension.  A
478dash indicates that an operation is not accepted according to a corresponding
479specification.
480
481============================== ======= ======= ============= =======
482         Operator              OpenCL  AltiVec     GCC        NEON
483============================== ======= ======= ============= =======
484[]                               yes     yes       yes         --
485unary operators +, --            yes     yes       yes         --
486++, -- --                        yes     yes       yes         --
487+,--,*,/,%                       yes     yes       yes         --
488bitwise operators &,|,^,~        yes     yes       yes         --
489>>,<<                            yes     yes       yes         --
490!, &&, ||                        yes     --        yes         --
491==, !=, >, <, >=, <=             yes     yes       yes         --
492=                                yes     yes       yes         yes
493?: [#]_                          yes     --        yes         --
494sizeof                           yes     yes       yes         yes
495C-style cast                     yes     yes       yes         no
496reinterpret_cast                 yes     no        yes         no
497static_cast                      yes     no        yes         no
498const_cast                       no      no        no          no
499============================== ======= ======= ============= =======
500
501See also :ref:`langext-__builtin_shufflevector`, :ref:`langext-__builtin_convertvector`.
502
503.. [#] ternary operator(?:) has different behaviors depending on condition
504  operand's vector type. If the condition is a GNU vector (i.e. __vector_size__),
505  it's only available in C++ and uses normal bool conversions (that is, != 0).
506  If it's an extension (OpenCL) vector, it's only available in C and OpenCL C.
507  And it selects base on signedness of the condition operands (OpenCL v1.1 s6.3.9).
508
509Vector Builtins
510---------------
511
512**Note: The implementation of vector builtins is work-in-progress and incomplete.**
513
514In addition to the operators mentioned above, Clang provides a set of builtins
515to perform additional operations on certain scalar and vector types.
516
517Let ``T`` be one of the following types:
518
519* an integer type (as in C2x 6.2.5p19), but excluding enumerated types and _Bool
520* the standard floating types float or double
521* a half-precision floating point type, if one is supported on the target
522* a vector type.
523
524For scalar types, consider the operation applied to a vector with a single element.
525
526*Elementwise Builtins*
527
528Each builtin returns a vector equivalent to applying the specified operation
529elementwise to the input.
530
531Unless specified otherwise operation(±0) = ±0 and operation(±infinity) = ±infinity
532
533========================================= ================================================================ =========================================
534         Name                              Operation                                                        Supported element types
535========================================= ================================================================ =========================================
536 T __builtin_elementwise_abs(T x)          return the absolute value of a number x; the absolute value of   signed integer and floating point types
537                                           the most negative integer remains the most negative integer
538 T __builtin_elementwise_ceil(T x)         return the smallest integral value greater than or equal to x    floating point types
539 T __builtin_elementwise_floor(T x)        return the largest integral value less than or equal to x        floating point types
540 T __builtin_elementwise_roundeven(T x)    round x to the nearest integer value in floating point format,   floating point types
541                                           rounding halfway cases to even (that is, to the nearest value
542                                           that is an even integer), regardless of the current rounding
543                                           direction.
544 T__builtin_elementwise_trunc(T x)         return the integral value nearest to but no larger in            floating point types
545                                           magnitude than x
546 T __builtin_elementwise_max(T x, T y)     return x or y, whichever is larger                               integer and floating point types
547 T __builtin_elementwise_min(T x, T y)     return x or y, whichever is smaller                              integer and floating point types
548========================================= ================================================================ =========================================
549
550
551*Reduction Builtins*
552
553Each builtin returns a scalar equivalent to applying the specified
554operation(x, y) as recursive even-odd pairwise reduction to all vector
555elements. ``operation(x, y)`` is repeatedly applied to each non-overlapping
556even-odd element pair with indices ``i * 2`` and ``i * 2 + 1`` with
557``i in [0, Number of elements / 2)``. If the numbers of elements is not a
558power of 2, the vector is widened with neutral elements for the reduction
559at the end to the next power of 2.
560
561Example:
562
563.. code-block:: c++
564
565    __builtin_reduce_add([e3, e2, e1, e0]) = __builtin_reduced_add([e3 + e2, e1 + e0])
566                                           = (e3 + e2) + (e1 + e0)
567
568
569Let ``VT`` be a vector type and ``ET`` the element type of ``VT``.
570
571======================================= ================================================================ ==================================
572         Name                            Operation                                                        Supported element types
573======================================= ================================================================ ==================================
574 ET __builtin_reduce_max(VT a)           return x or y, whichever is larger; If exactly one argument is   integer and floating point types
575                                         a NaN, return the other argument. If both arguments are NaNs,
576                                         fmax() return a NaN.
577 ET __builtin_reduce_min(VT a)           return x or y, whichever is smaller; If exactly one argument     integer and floating point types
578                                         is a NaN, return the other argument. If both arguments are
579                                         NaNs, fmax() return a NaN.
580 ET __builtin_reduce_add(VT a)           \+                                                               integer and floating point types
581 ET __builtin_reduce_and(VT a)           &                                                                integer types
582 ET __builtin_reduce_or(VT a)            \|                                                               integer types
583 ET __builtin_reduce_xor(VT a)           ^                                                                integer types
584======================================= ================================================================ ==================================
585
586Matrix Types
587============
588
589Clang provides an extension for matrix types, which is currently being
590implemented. See :ref:`the draft specification <matrixtypes>` for more details.
591
592For example, the code below uses the matrix types extension to multiply two 4x4
593float matrices and add the result to a third 4x4 matrix.
594
595.. code-block:: c++
596
597  typedef float m4x4_t __attribute__((matrix_type(4, 4)));
598
599  m4x4_t f(m4x4_t a, m4x4_t b, m4x4_t c) {
600    return a + b * c;
601  }
602
603The matrix type extension also supports operations on a matrix and a scalar.
604
605.. code-block:: c++
606
607  typedef float m4x4_t __attribute__((matrix_type(4, 4)));
608
609  m4x4_t f(m4x4_t a) {
610    return (a + 23) * 12;
611  }
612
613The matrix type extension supports division on a matrix and a scalar but not on a matrix and a matrix.
614
615.. code-block:: c++
616
617  typedef float m4x4_t __attribute__((matrix_type(4, 4)));
618
619  m4x4_t f(m4x4_t a) {
620    a = a / 3.0;
621    return a;
622  }
623
624The matrix type extension supports compound assignments for addition, subtraction, and multiplication on matrices
625and on a matrix and a scalar, provided their types are consistent.
626
627.. code-block:: c++
628
629  typedef float m4x4_t __attribute__((matrix_type(4, 4)));
630
631  m4x4_t f(m4x4_t a, m4x4_t b) {
632    a += b;
633    a -= b;
634    a *= b;
635    a += 23;
636    a -= 12;
637    return a;
638  }
639
640The matrix type extension supports explicit casts. Implicit type conversion between matrix types is not allowed.
641
642.. code-block:: c++
643
644  typedef int ix5x5 __attribute__((matrix_type(5, 5)));
645  typedef float fx5x5 __attribute__((matrix_type(5, 5)));
646
647  fx5x5 f1(ix5x5 i, fx5x5 f) {
648    return (fx5x5) i;
649  }
650
651
652  template <typename X>
653  using matrix_4_4 = X __attribute__((matrix_type(4, 4)));
654
655  void f2() {
656    matrix_5_5<double> d;
657    matrix_5_5<int> i;
658    i = (matrix_5_5<int>)d;
659    i = static_cast<matrix_5_5<int>>(d);
660  }
661
662Half-Precision Floating Point
663=============================
664
665Clang supports three half-precision (16-bit) floating point types: ``__fp16``,
666``_Float16`` and ``__bf16``.  These types are supported in all language modes.
667
668``__fp16`` is supported on every target, as it is purely a storage format; see below.
669``_Float16`` is currently only supported on the following targets, with further
670targets pending ABI standardization:
671
672* 32-bit ARM
673* 64-bit ARM (AArch64)
674* AMDGPU
675* SPIR
676* X86 (Only available under feature AVX512-FP16)
677
678``_Float16`` will be supported on more targets as they define ABIs for it.
679
680``__bf16`` is purely a storage format; it is currently only supported on the following targets:
681* 32-bit ARM
682* 64-bit ARM (AArch64)
683
684The ``__bf16`` type is only available when supported in hardware.
685
686``__fp16`` is a storage and interchange format only.  This means that values of
687``__fp16`` are immediately promoted to (at least) ``float`` when used in arithmetic
688operations, so that e.g. the result of adding two ``__fp16`` values has type ``float``.
689The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE <http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053d/IHI0053D_acle_2_1.pdf>`_).
690Clang uses the ``binary16`` format from IEEE 754-2008 for ``__fp16``, not the ARM
691alternative format.
692
693``_Float16`` is an interchange floating-point type.  This means that, just like arithmetic on
694``float`` or ``double``, arithmetic on ``_Float16`` operands is formally performed in the
695``_Float16`` type, so that e.g. the result of adding two ``_Float16`` values has type
696``_Float16``.  The behavior of ``_Float16`` is specified by ISO/IEC TS 18661-3:2015
697("Floating-point extensions for C").  As with ``__fp16``, Clang uses the ``binary16``
698format from IEEE 754-2008 for ``_Float16``.
699
700``_Float16`` arithmetic will be performed using native half-precision support
701when available on the target (e.g. on ARMv8.2a); otherwise it will be performed
702at a higher precision (currently always ``float``) and then truncated down to
703``_Float16``.  Note that C and C++ allow intermediate floating-point operands
704of an expression to be computed with greater precision than is expressible in
705their type, so Clang may avoid intermediate truncations in certain cases; this may
706lead to results that are inconsistent with native arithmetic.
707
708It is recommended that portable code use ``_Float16`` instead of ``__fp16``,
709as it has been defined by the C standards committee and has behavior that is
710more familiar to most programmers.
711
712Because ``__fp16`` operands are always immediately promoted to ``float``, the
713common real type of ``__fp16`` and ``_Float16`` for the purposes of the usual
714arithmetic conversions is ``float``.
715
716A literal can be given ``_Float16`` type using the suffix ``f16``. For example,
717``3.14f16``.
718
719Because default argument promotion only applies to the standard floating-point
720types, ``_Float16`` values are not promoted to ``double`` when passed as variadic
721or untyped arguments.  As a consequence, some caution must be taken when using
722certain library facilities with ``_Float16``; for example, there is no ``printf`` format
723specifier for ``_Float16``, and (unlike ``float``) it will not be implicitly promoted to
724``double`` when passed to ``printf``, so the programmer must explicitly cast it to
725``double`` before using it with an ``%f`` or similar specifier.
726
727Messages on ``deprecated`` and ``unavailable`` Attributes
728=========================================================
729
730An optional string message can be added to the ``deprecated`` and
731``unavailable`` attributes.  For example:
732
733.. code-block:: c++
734
735  void explode(void) __attribute__((deprecated("extremely unsafe, use 'combust' instead!!!")));
736
737If the deprecated or unavailable declaration is used, the message will be
738incorporated into the appropriate diagnostic:
739
740.. code-block:: none
741
742  harmless.c:4:3: warning: 'explode' is deprecated: extremely unsafe, use 'combust' instead!!!
743        [-Wdeprecated-declarations]
744    explode();
745    ^
746
747Query for this feature with
748``__has_extension(attribute_deprecated_with_message)`` and
749``__has_extension(attribute_unavailable_with_message)``.
750
751Attributes on Enumerators
752=========================
753
754Clang allows attributes to be written on individual enumerators.  This allows
755enumerators to be deprecated, made unavailable, etc.  The attribute must appear
756after the enumerator name and before any initializer, like so:
757
758.. code-block:: c++
759
760  enum OperationMode {
761    OM_Invalid,
762    OM_Normal,
763    OM_Terrified __attribute__((deprecated)),
764    OM_AbortOnError __attribute__((deprecated)) = 4
765  };
766
767Attributes on the ``enum`` declaration do not apply to individual enumerators.
768
769Query for this feature with ``__has_extension(enumerator_attributes)``.
770
771C++11 Attributes on using-declarations
772======================================
773
774Clang allows C++-style ``[[]]`` attributes to be written on using-declarations.
775For instance:
776
777.. code-block:: c++
778
779  [[clang::using_if_exists]] using foo::bar;
780  using foo::baz [[clang::using_if_exists]];
781
782You can test for support for this extension with
783``__has_extension(cxx_attributes_on_using_declarations)``.
784
785'User-Specified' System Frameworks
786==================================
787
788Clang provides a mechanism by which frameworks can be built in such a way that
789they will always be treated as being "system frameworks", even if they are not
790present in a system framework directory.  This can be useful to system
791framework developers who want to be able to test building other applications
792with development builds of their framework, including the manner in which the
793compiler changes warning behavior for system headers.
794
795Framework developers can opt-in to this mechanism by creating a
796"``.system_framework``" file at the top-level of their framework.  That is, the
797framework should have contents like:
798
799.. code-block:: none
800
801  .../TestFramework.framework
802  .../TestFramework.framework/.system_framework
803  .../TestFramework.framework/Headers
804  .../TestFramework.framework/Headers/TestFramework.h
805  ...
806
807Clang will treat the presence of this file as an indicator that the framework
808should be treated as a system framework, regardless of how it was found in the
809framework search path.  For consistency, we recommend that such files never be
810included in installed versions of the framework.
811
812Checks for Standard Language Features
813=====================================
814
815The ``__has_feature`` macro can be used to query if certain standard language
816features are enabled.  The ``__has_extension`` macro can be used to query if
817language features are available as an extension when compiling for a standard
818which does not provide them.  The features which can be tested are listed here.
819
820Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
821These are macros with names of the form ``__cpp_<feature_name>``, and are
822intended to be a portable way to query the supported features of the compiler.
823See `the C++ status page <https://clang.llvm.org/cxx_status.html#ts>`_ for
824information on the version of SD-6 supported by each Clang release, and the
825macros provided by that revision of the recommendations.
826
827C++98
828-----
829
830The features listed below are part of the C++98 standard.  These features are
831enabled by default when compiling C++ code.
832
833C++ exceptions
834^^^^^^^^^^^^^^
835
836Use ``__has_feature(cxx_exceptions)`` to determine if C++ exceptions have been
837enabled.  For example, compiling code with ``-fno-exceptions`` disables C++
838exceptions.
839
840C++ RTTI
841^^^^^^^^
842
843Use ``__has_feature(cxx_rtti)`` to determine if C++ RTTI has been enabled.  For
844example, compiling code with ``-fno-rtti`` disables the use of RTTI.
845
846C++11
847-----
848
849The features listed below are part of the C++11 standard.  As a result, all
850these features are enabled with the ``-std=c++11`` or ``-std=gnu++11`` option
851when compiling C++ code.
852
853C++11 SFINAE includes access control
854^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
855
856Use ``__has_feature(cxx_access_control_sfinae)`` or
857``__has_extension(cxx_access_control_sfinae)`` to determine whether
858access-control errors (e.g., calling a private constructor) are considered to
859be template argument deduction errors (aka SFINAE errors), per `C++ DR1170
860<http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#1170>`_.
861
862C++11 alias templates
863^^^^^^^^^^^^^^^^^^^^^
864
865Use ``__has_feature(cxx_alias_templates)`` or
866``__has_extension(cxx_alias_templates)`` to determine if support for C++11's
867alias declarations and alias templates is enabled.
868
869C++11 alignment specifiers
870^^^^^^^^^^^^^^^^^^^^^^^^^^
871
872Use ``__has_feature(cxx_alignas)`` or ``__has_extension(cxx_alignas)`` to
873determine if support for alignment specifiers using ``alignas`` is enabled.
874
875Use ``__has_feature(cxx_alignof)`` or ``__has_extension(cxx_alignof)`` to
876determine if support for the ``alignof`` keyword is enabled.
877
878C++11 attributes
879^^^^^^^^^^^^^^^^
880
881Use ``__has_feature(cxx_attributes)`` or ``__has_extension(cxx_attributes)`` to
882determine if support for attribute parsing with C++11's square bracket notation
883is enabled.
884
885C++11 generalized constant expressions
886^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
887
888Use ``__has_feature(cxx_constexpr)`` to determine if support for generalized
889constant expressions (e.g., ``constexpr``) is enabled.
890
891C++11 ``decltype()``
892^^^^^^^^^^^^^^^^^^^^
893
894Use ``__has_feature(cxx_decltype)`` or ``__has_extension(cxx_decltype)`` to
895determine if support for the ``decltype()`` specifier is enabled.  C++11's
896``decltype`` does not require type-completeness of a function call expression.
897Use ``__has_feature(cxx_decltype_incomplete_return_types)`` or
898``__has_extension(cxx_decltype_incomplete_return_types)`` to determine if
899support for this feature is enabled.
900
901C++11 default template arguments in function templates
902^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
903
904Use ``__has_feature(cxx_default_function_template_args)`` or
905``__has_extension(cxx_default_function_template_args)`` to determine if support
906for default template arguments in function templates is enabled.
907
908C++11 ``default``\ ed functions
909^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
910
911Use ``__has_feature(cxx_defaulted_functions)`` or
912``__has_extension(cxx_defaulted_functions)`` to determine if support for
913defaulted function definitions (with ``= default``) is enabled.
914
915C++11 delegating constructors
916^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
917
918Use ``__has_feature(cxx_delegating_constructors)`` to determine if support for
919delegating constructors is enabled.
920
921C++11 ``deleted`` functions
922^^^^^^^^^^^^^^^^^^^^^^^^^^^
923
924Use ``__has_feature(cxx_deleted_functions)`` or
925``__has_extension(cxx_deleted_functions)`` to determine if support for deleted
926function definitions (with ``= delete``) is enabled.
927
928C++11 explicit conversion functions
929^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
930
931Use ``__has_feature(cxx_explicit_conversions)`` to determine if support for
932``explicit`` conversion functions is enabled.
933
934C++11 generalized initializers
935^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
936
937Use ``__has_feature(cxx_generalized_initializers)`` to determine if support for
938generalized initializers (using braced lists and ``std::initializer_list``) is
939enabled.
940
941C++11 implicit move constructors/assignment operators
942^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
943
944Use ``__has_feature(cxx_implicit_moves)`` to determine if Clang will implicitly
945generate move constructors and move assignment operators where needed.
946
947C++11 inheriting constructors
948^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
949
950Use ``__has_feature(cxx_inheriting_constructors)`` to determine if support for
951inheriting constructors is enabled.
952
953C++11 inline namespaces
954^^^^^^^^^^^^^^^^^^^^^^^
955
956Use ``__has_feature(cxx_inline_namespaces)`` or
957``__has_extension(cxx_inline_namespaces)`` to determine if support for inline
958namespaces is enabled.
959
960C++11 lambdas
961^^^^^^^^^^^^^
962
963Use ``__has_feature(cxx_lambdas)`` or ``__has_extension(cxx_lambdas)`` to
964determine if support for lambdas is enabled.
965
966C++11 local and unnamed types as template arguments
967^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
968
969Use ``__has_feature(cxx_local_type_template_args)`` or
970``__has_extension(cxx_local_type_template_args)`` to determine if support for
971local and unnamed types as template arguments is enabled.
972
973C++11 noexcept
974^^^^^^^^^^^^^^
975
976Use ``__has_feature(cxx_noexcept)`` or ``__has_extension(cxx_noexcept)`` to
977determine if support for noexcept exception specifications is enabled.
978
979C++11 in-class non-static data member initialization
980^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
981
982Use ``__has_feature(cxx_nonstatic_member_init)`` to determine whether in-class
983initialization of non-static data members is enabled.
984
985C++11 ``nullptr``
986^^^^^^^^^^^^^^^^^
987
988Use ``__has_feature(cxx_nullptr)`` or ``__has_extension(cxx_nullptr)`` to
989determine if support for ``nullptr`` is enabled.
990
991C++11 ``override control``
992^^^^^^^^^^^^^^^^^^^^^^^^^^
993
994Use ``__has_feature(cxx_override_control)`` or
995``__has_extension(cxx_override_control)`` to determine if support for the
996override control keywords is enabled.
997
998C++11 reference-qualified functions
999^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1000
1001Use ``__has_feature(cxx_reference_qualified_functions)`` or
1002``__has_extension(cxx_reference_qualified_functions)`` to determine if support
1003for reference-qualified functions (e.g., member functions with ``&`` or ``&&``
1004applied to ``*this``) is enabled.
1005
1006C++11 range-based ``for`` loop
1007^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1008
1009Use ``__has_feature(cxx_range_for)`` or ``__has_extension(cxx_range_for)`` to
1010determine if support for the range-based for loop is enabled.
1011
1012C++11 raw string literals
1013^^^^^^^^^^^^^^^^^^^^^^^^^
1014
1015Use ``__has_feature(cxx_raw_string_literals)`` to determine if support for raw
1016string literals (e.g., ``R"x(foo\bar)x"``) is enabled.
1017
1018C++11 rvalue references
1019^^^^^^^^^^^^^^^^^^^^^^^
1020
1021Use ``__has_feature(cxx_rvalue_references)`` or
1022``__has_extension(cxx_rvalue_references)`` to determine if support for rvalue
1023references is enabled.
1024
1025C++11 ``static_assert()``
1026^^^^^^^^^^^^^^^^^^^^^^^^^
1027
1028Use ``__has_feature(cxx_static_assert)`` or
1029``__has_extension(cxx_static_assert)`` to determine if support for compile-time
1030assertions using ``static_assert`` is enabled.
1031
1032C++11 ``thread_local``
1033^^^^^^^^^^^^^^^^^^^^^^
1034
1035Use ``__has_feature(cxx_thread_local)`` to determine if support for
1036``thread_local`` variables is enabled.
1037
1038C++11 type inference
1039^^^^^^^^^^^^^^^^^^^^
1040
1041Use ``__has_feature(cxx_auto_type)`` or ``__has_extension(cxx_auto_type)`` to
1042determine C++11 type inference is supported using the ``auto`` specifier.  If
1043this is disabled, ``auto`` will instead be a storage class specifier, as in C
1044or C++98.
1045
1046C++11 strongly typed enumerations
1047^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1048
1049Use ``__has_feature(cxx_strong_enums)`` or
1050``__has_extension(cxx_strong_enums)`` to determine if support for strongly
1051typed, scoped enumerations is enabled.
1052
1053C++11 trailing return type
1054^^^^^^^^^^^^^^^^^^^^^^^^^^
1055
1056Use ``__has_feature(cxx_trailing_return)`` or
1057``__has_extension(cxx_trailing_return)`` to determine if support for the
1058alternate function declaration syntax with trailing return type is enabled.
1059
1060C++11 Unicode string literals
1061^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1062
1063Use ``__has_feature(cxx_unicode_literals)`` to determine if support for Unicode
1064string literals is enabled.
1065
1066C++11 unrestricted unions
1067^^^^^^^^^^^^^^^^^^^^^^^^^
1068
1069Use ``__has_feature(cxx_unrestricted_unions)`` to determine if support for
1070unrestricted unions is enabled.
1071
1072C++11 user-defined literals
1073^^^^^^^^^^^^^^^^^^^^^^^^^^^
1074
1075Use ``__has_feature(cxx_user_literals)`` to determine if support for
1076user-defined literals is enabled.
1077
1078C++11 variadic templates
1079^^^^^^^^^^^^^^^^^^^^^^^^
1080
1081Use ``__has_feature(cxx_variadic_templates)`` or
1082``__has_extension(cxx_variadic_templates)`` to determine if support for
1083variadic templates is enabled.
1084
1085C++14
1086-----
1087
1088The features listed below are part of the C++14 standard.  As a result, all
1089these features are enabled with the ``-std=C++14`` or ``-std=gnu++14`` option
1090when compiling C++ code.
1091
1092C++14 binary literals
1093^^^^^^^^^^^^^^^^^^^^^
1094
1095Use ``__has_feature(cxx_binary_literals)`` or
1096``__has_extension(cxx_binary_literals)`` to determine whether
1097binary literals (for instance, ``0b10010``) are recognized. Clang supports this
1098feature as an extension in all language modes.
1099
1100C++14 contextual conversions
1101^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1102
1103Use ``__has_feature(cxx_contextual_conversions)`` or
1104``__has_extension(cxx_contextual_conversions)`` to determine if the C++14 rules
1105are used when performing an implicit conversion for an array bound in a
1106*new-expression*, the operand of a *delete-expression*, an integral constant
1107expression, or a condition in a ``switch`` statement.
1108
1109C++14 decltype(auto)
1110^^^^^^^^^^^^^^^^^^^^
1111
1112Use ``__has_feature(cxx_decltype_auto)`` or
1113``__has_extension(cxx_decltype_auto)`` to determine if support
1114for the ``decltype(auto)`` placeholder type is enabled.
1115
1116C++14 default initializers for aggregates
1117^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1118
1119Use ``__has_feature(cxx_aggregate_nsdmi)`` or
1120``__has_extension(cxx_aggregate_nsdmi)`` to determine if support
1121for default initializers in aggregate members is enabled.
1122
1123C++14 digit separators
1124^^^^^^^^^^^^^^^^^^^^^^
1125
1126Use ``__cpp_digit_separators`` to determine if support for digit separators
1127using single quotes (for instance, ``10'000``) is enabled. At this time, there
1128is no corresponding ``__has_feature`` name
1129
1130C++14 generalized lambda capture
1131^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1132
1133Use ``__has_feature(cxx_init_captures)`` or
1134``__has_extension(cxx_init_captures)`` to determine if support for
1135lambda captures with explicit initializers is enabled
1136(for instance, ``[n(0)] { return ++n; }``).
1137
1138C++14 generic lambdas
1139^^^^^^^^^^^^^^^^^^^^^
1140
1141Use ``__has_feature(cxx_generic_lambdas)`` or
1142``__has_extension(cxx_generic_lambdas)`` to determine if support for generic
1143(polymorphic) lambdas is enabled
1144(for instance, ``[] (auto x) { return x + 1; }``).
1145
1146C++14 relaxed constexpr
1147^^^^^^^^^^^^^^^^^^^^^^^
1148
1149Use ``__has_feature(cxx_relaxed_constexpr)`` or
1150``__has_extension(cxx_relaxed_constexpr)`` to determine if variable
1151declarations, local variable modification, and control flow constructs
1152are permitted in ``constexpr`` functions.
1153
1154C++14 return type deduction
1155^^^^^^^^^^^^^^^^^^^^^^^^^^^
1156
1157Use ``__has_feature(cxx_return_type_deduction)`` or
1158``__has_extension(cxx_return_type_deduction)`` to determine if support
1159for return type deduction for functions (using ``auto`` as a return type)
1160is enabled.
1161
1162C++14 runtime-sized arrays
1163^^^^^^^^^^^^^^^^^^^^^^^^^^
1164
1165Use ``__has_feature(cxx_runtime_array)`` or
1166``__has_extension(cxx_runtime_array)`` to determine if support
1167for arrays of runtime bound (a restricted form of variable-length arrays)
1168is enabled.
1169Clang's implementation of this feature is incomplete.
1170
1171C++14 variable templates
1172^^^^^^^^^^^^^^^^^^^^^^^^
1173
1174Use ``__has_feature(cxx_variable_templates)`` or
1175``__has_extension(cxx_variable_templates)`` to determine if support for
1176templated variable declarations is enabled.
1177
1178C11
1179---
1180
1181The features listed below are part of the C11 standard.  As a result, all these
1182features are enabled with the ``-std=c11`` or ``-std=gnu11`` option when
1183compiling C code.  Additionally, because these features are all
1184backward-compatible, they are available as extensions in all language modes.
1185
1186C11 alignment specifiers
1187^^^^^^^^^^^^^^^^^^^^^^^^
1188
1189Use ``__has_feature(c_alignas)`` or ``__has_extension(c_alignas)`` to determine
1190if support for alignment specifiers using ``_Alignas`` is enabled.
1191
1192Use ``__has_feature(c_alignof)`` or ``__has_extension(c_alignof)`` to determine
1193if support for the ``_Alignof`` keyword is enabled.
1194
1195C11 atomic operations
1196^^^^^^^^^^^^^^^^^^^^^
1197
1198Use ``__has_feature(c_atomic)`` or ``__has_extension(c_atomic)`` to determine
1199if support for atomic types using ``_Atomic`` is enabled.  Clang also provides
1200:ref:`a set of builtins <langext-__c11_atomic>` which can be used to implement
1201the ``<stdatomic.h>`` operations on ``_Atomic`` types. Use
1202``__has_include(<stdatomic.h>)`` to determine if C11's ``<stdatomic.h>`` header
1203is available.
1204
1205Clang will use the system's ``<stdatomic.h>`` header when one is available, and
1206will otherwise use its own. When using its own, implementations of the atomic
1207operations are provided as macros. In the cases where C11 also requires a real
1208function, this header provides only the declaration of that function (along
1209with a shadowing macro implementation), and you must link to a library which
1210provides a definition of the function if you use it instead of the macro.
1211
1212C11 generic selections
1213^^^^^^^^^^^^^^^^^^^^^^
1214
1215Use ``__has_feature(c_generic_selections)`` or
1216``__has_extension(c_generic_selections)`` to determine if support for generic
1217selections is enabled.
1218
1219As an extension, the C11 generic selection expression is available in all
1220languages supported by Clang.  The syntax is the same as that given in the C11
1221standard.
1222
1223In C, type compatibility is decided according to the rules given in the
1224appropriate standard, but in C++, which lacks the type compatibility rules used
1225in C, types are considered compatible only if they are equivalent.
1226
1227C11 ``_Static_assert()``
1228^^^^^^^^^^^^^^^^^^^^^^^^
1229
1230Use ``__has_feature(c_static_assert)`` or ``__has_extension(c_static_assert)``
1231to determine if support for compile-time assertions using ``_Static_assert`` is
1232enabled.
1233
1234C11 ``_Thread_local``
1235^^^^^^^^^^^^^^^^^^^^^
1236
1237Use ``__has_feature(c_thread_local)`` or ``__has_extension(c_thread_local)``
1238to determine if support for ``_Thread_local`` variables is enabled.
1239
1240Modules
1241-------
1242
1243Use ``__has_feature(modules)`` to determine if Modules have been enabled.
1244For example, compiling code with ``-fmodules`` enables the use of Modules.
1245
1246More information could be found `here <https://clang.llvm.org/docs/Modules.html>`_.
1247
1248Type Trait Primitives
1249=====================
1250
1251Type trait primitives are special builtin constant expressions that can be used
1252by the standard C++ library to facilitate or simplify the implementation of
1253user-facing type traits in the <type_traits> header.
1254
1255They are not intended to be used directly by user code because they are
1256implementation-defined and subject to change -- as such they're tied closely to
1257the supported set of system headers, currently:
1258
1259* LLVM's own libc++
1260* GNU libstdc++
1261* The Microsoft standard C++ library
1262
1263Clang supports the `GNU C++ type traits
1264<https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the
1265`Microsoft Visual C++ type traits
1266<https://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_,
1267as well as nearly all of the
1268`Embarcadero C++ type traits
1269<http://docwiki.embarcadero.com/RADStudio/Rio/en/Type_Trait_Functions_(C%2B%2B11)_Index>`_.
1270
1271The following type trait primitives are supported by Clang. Those traits marked
1272(C++) provide implementations for type traits specified by the C++ standard;
1273``__X(...)`` has the same semantics and constraints as the corresponding
1274``std::X_t<...>`` or ``std::X_v<...>`` type trait.
1275
1276* ``__array_rank(type)`` (Embarcadero):
1277  Returns the number of levels of array in the type ``type``:
1278  ``0`` if ``type`` is not an array type, and
1279  ``__array_rank(element) + 1`` if ``type`` is an array of ``element``.
1280* ``__array_extent(type, dim)`` (Embarcadero):
1281  The ``dim``'th array bound in the type ``type``, or ``0`` if
1282  ``dim >= __array_rank(type)``.
1283* ``__has_nothrow_assign`` (GNU, Microsoft, Embarcadero):
1284  Deprecated, use ``__is_nothrow_assignable`` instead.
1285* ``__has_nothrow_move_assign`` (GNU, Microsoft):
1286  Deprecated, use ``__is_nothrow_assignable`` instead.
1287* ``__has_nothrow_copy`` (GNU, Microsoft):
1288  Deprecated, use ``__is_nothrow_constructible`` instead.
1289* ``__has_nothrow_constructor`` (GNU, Microsoft):
1290  Deprecated, use ``__is_nothrow_constructible`` instead.
1291* ``__has_trivial_assign`` (GNU, Microsoft, Embarcadero):
1292  Deprecated, use ``__is_trivially_assignable`` instead.
1293* ``__has_trivial_move_assign`` (GNU, Microsoft):
1294  Deprecated, use ``__is_trivially_assignable`` instead.
1295* ``__has_trivial_copy`` (GNU, Microsoft):
1296  Deprecated, use ``__is_trivially_constructible`` instead.
1297* ``__has_trivial_constructor`` (GNU, Microsoft):
1298  Deprecated, use ``__is_trivially_constructible`` instead.
1299* ``__has_trivial_move_constructor`` (GNU, Microsoft):
1300  Deprecated, use ``__is_trivially_constructible`` instead.
1301* ``__has_trivial_destructor`` (GNU, Microsoft, Embarcadero):
1302  Deprecated, use ``__is_trivially_destructible`` instead.
1303* ``__has_unique_object_representations`` (C++, GNU)
1304* ``__has_virtual_destructor`` (C++, GNU, Microsoft, Embarcadero)
1305* ``__is_abstract`` (C++, GNU, Microsoft, Embarcadero)
1306* ``__is_aggregate`` (C++, GNU, Microsoft)
1307* ``__is_arithmetic`` (C++, Embarcadero)
1308* ``__is_array`` (C++, Embarcadero)
1309* ``__is_assignable`` (C++, MSVC 2015)
1310* ``__is_base_of`` (C++, GNU, Microsoft, Embarcadero)
1311* ``__is_class`` (C++, GNU, Microsoft, Embarcadero)
1312* ``__is_complete_type(type)`` (Embarcadero):
1313  Return ``true`` if ``type`` is a complete type.
1314  Warning: this trait is dangerous because it can return different values at
1315  different points in the same program.
1316* ``__is_compound`` (C++, Embarcadero)
1317* ``__is_const`` (C++, Embarcadero)
1318* ``__is_constructible`` (C++, MSVC 2013)
1319* ``__is_convertible`` (C++, Embarcadero)
1320* ``__is_convertible_to`` (Microsoft):
1321  Synonym for ``__is_convertible``.
1322* ``__is_destructible`` (C++, MSVC 2013):
1323  Only available in ``-fms-extensions`` mode.
1324* ``__is_empty`` (C++, GNU, Microsoft, Embarcadero)
1325* ``__is_enum`` (C++, GNU, Microsoft, Embarcadero)
1326* ``__is_final`` (C++, GNU, Microsoft)
1327* ``__is_floating_point`` (C++, Embarcadero)
1328* ``__is_function`` (C++, Embarcadero)
1329* ``__is_fundamental`` (C++, Embarcadero)
1330* ``__is_integral`` (C++, Embarcadero)
1331* ``__is_interface_class`` (Microsoft):
1332  Returns ``false``, even for types defined with ``__interface``.
1333* ``__is_literal`` (Clang):
1334  Synonym for ``__is_literal_type``.
1335* ``__is_literal_type`` (C++, GNU, Microsoft):
1336  Note, the corresponding standard trait was deprecated in C++17
1337  and removed in C++20.
1338* ``__is_lvalue_reference`` (C++, Embarcadero)
1339* ``__is_member_object_pointer`` (C++, Embarcadero)
1340* ``__is_member_function_pointer`` (C++, Embarcadero)
1341* ``__is_member_pointer`` (C++, Embarcadero)
1342* ``__is_nothrow_assignable`` (C++, MSVC 2013)
1343* ``__is_nothrow_constructible`` (C++, MSVC 2013)
1344* ``__is_nothrow_destructible`` (C++, MSVC 2013)
1345  Only available in ``-fms-extensions`` mode.
1346* ``__is_object`` (C++, Embarcadero)
1347* ``__is_pod`` (C++, GNU, Microsoft, Embarcadero):
1348  Note, the corresponding standard trait was deprecated in C++20.
1349* ``__is_pointer`` (C++, Embarcadero)
1350* ``__is_polymorphic`` (C++, GNU, Microsoft, Embarcadero)
1351* ``__is_reference`` (C++, Embarcadero)
1352* ``__is_rvalue_reference`` (C++, Embarcadero)
1353* ``__is_same`` (C++, Embarcadero)
1354* ``__is_same_as`` (GCC): Synonym for ``__is_same``.
1355* ``__is_scalar`` (C++, Embarcadero)
1356* ``__is_sealed`` (Microsoft):
1357  Synonym for ``__is_final``.
1358* ``__is_signed`` (C++, Embarcadero):
1359  Returns false for enumeration types, and returns true for floating-point
1360  types. Note, before Clang 10, returned true for enumeration types if the
1361  underlying type was signed, and returned false for floating-point types.
1362* ``__is_standard_layout`` (C++, GNU, Microsoft, Embarcadero)
1363* ``__is_trivial`` (C++, GNU, Microsoft, Embarcadero)
1364* ``__is_trivially_assignable`` (C++, GNU, Microsoft)
1365* ``__is_trivially_constructible`` (C++, GNU, Microsoft)
1366* ``__is_trivially_copyable`` (C++, GNU, Microsoft)
1367* ``__is_trivially_destructible`` (C++, MSVC 2013)
1368* ``__is_union`` (C++, GNU, Microsoft, Embarcadero)
1369* ``__is_unsigned`` (C++, Embarcadero):
1370  Returns false for enumeration types. Note, before Clang 13, returned true for
1371  enumeration types if the underlying type was unsigned.
1372* ``__is_void`` (C++, Embarcadero)
1373* ``__is_volatile`` (C++, Embarcadero)
1374* ``__reference_binds_to_temporary(T, U)`` (Clang):  Determines whether a
1375  reference of type ``T`` bound to an expression of type ``U`` would bind to a
1376  materialized temporary object. If ``T`` is not a reference type the result
1377  is false. Note this trait will also return false when the initialization of
1378  ``T`` from ``U`` is ill-formed.
1379* ``__underlying_type`` (C++, GNU, Microsoft)
1380
1381In addition, the following expression traits are supported:
1382
1383* ``__is_lvalue_expr(e)`` (Embarcadero):
1384  Returns true if ``e`` is an lvalue expression.
1385  Deprecated, use ``__is_lvalue_reference(decltype((e)))`` instead.
1386* ``__is_rvalue_expr(e)`` (Embarcadero):
1387  Returns true if ``e`` is a prvalue expression.
1388  Deprecated, use ``!__is_reference(decltype((e)))`` instead.
1389
1390There are multiple ways to detect support for a type trait ``__X`` in the
1391compiler, depending on the oldest version of Clang you wish to support.
1392
1393* From Clang 10 onwards, ``__has_builtin(__X)`` can be used.
1394* From Clang 6 onwards, ``!__is_identifier(__X)`` can be used.
1395* From Clang 3 onwards, ``__has_feature(X)`` can be used, but only supports
1396  the following traits:
1397
1398  * ``__has_nothrow_assign``
1399  * ``__has_nothrow_copy``
1400  * ``__has_nothrow_constructor``
1401  * ``__has_trivial_assign``
1402  * ``__has_trivial_copy``
1403  * ``__has_trivial_constructor``
1404  * ``__has_trivial_destructor``
1405  * ``__has_virtual_destructor``
1406  * ``__is_abstract``
1407  * ``__is_base_of``
1408  * ``__is_class``
1409  * ``__is_constructible``
1410  * ``__is_convertible_to``
1411  * ``__is_empty``
1412  * ``__is_enum``
1413  * ``__is_final``
1414  * ``__is_literal``
1415  * ``__is_standard_layout``
1416  * ``__is_pod``
1417  * ``__is_polymorphic``
1418  * ``__is_sealed``
1419  * ``__is_trivial``
1420  * ``__is_trivially_assignable``
1421  * ``__is_trivially_constructible``
1422  * ``__is_trivially_copyable``
1423  * ``__is_union``
1424  * ``__underlying_type``
1425
1426A simplistic usage example as might be seen in standard C++ headers follows:
1427
1428.. code-block:: c++
1429
1430  #if __has_builtin(__is_convertible_to)
1431  template<typename From, typename To>
1432  struct is_convertible_to {
1433    static const bool value = __is_convertible_to(From, To);
1434  };
1435  #else
1436  // Emulate type trait for compatibility with other compilers.
1437  #endif
1438
1439Blocks
1440======
1441
1442The syntax and high level language feature description is in
1443:doc:`BlockLanguageSpec<BlockLanguageSpec>`. Implementation and ABI details for
1444the clang implementation are in :doc:`Block-ABI-Apple<Block-ABI-Apple>`.
1445
1446Query for this feature with ``__has_extension(blocks)``.
1447
1448ASM Goto with Output Constraints
1449================================
1450
1451In addition to the functionality provided by `GCC's extended
1452assembly <https://gcc.gnu.org/onlinedocs/gcc/Extended-Asm.html>`_, clang
1453supports output constraints with the `goto` form.
1454
1455The goto form of GCC's extended assembly allows the programmer to branch to a C
1456label from within an inline assembly block. Clang extends this behavior by
1457allowing the programmer to use output constraints:
1458
1459.. code-block:: c++
1460
1461  int foo(int x) {
1462      int y;
1463      asm goto("# %0 %1 %l2" : "=r"(y) : "r"(x) : : err);
1464      return y;
1465    err:
1466      return -1;
1467  }
1468
1469It's important to note that outputs are valid only on the "fallthrough" branch.
1470Using outputs on an indirect branch may result in undefined behavior. For
1471example, in the function above, use of the value assigned to `y` in the `err`
1472block is undefined behavior.
1473
1474When using tied-outputs (i.e. outputs that are inputs and outputs, not just
1475outputs) with the `+r` constraint, there is a hidden input that's created
1476before the label, so numeric references to operands must account for that.
1477
1478.. code-block:: c++
1479
1480  int foo(int x) {
1481      // %0 and %1 both refer to x
1482      // %l2 refers to err
1483      asm goto("# %0 %1 %l2" : "+r"(x) : : : err);
1484      return x;
1485    err:
1486      return -1;
1487  }
1488
1489This was changed to match GCC in clang-13; for better portability, symbolic
1490references can be used instead of numeric references.
1491
1492.. code-block:: c++
1493
1494  int foo(int x) {
1495      asm goto("# %[x] %l[err]" : [x]"+r"(x) : : : err);
1496      return x;
1497    err:
1498      return -1;
1499  }
1500
1501Query for this feature with ``__has_extension(gnu_asm_goto_with_outputs)``.
1502
1503Objective-C Features
1504====================
1505
1506Related result types
1507--------------------
1508
1509According to Cocoa conventions, Objective-C methods with certain names
1510("``init``", "``alloc``", etc.) always return objects that are an instance of
1511the receiving class's type.  Such methods are said to have a "related result
1512type", meaning that a message send to one of these methods will have the same
1513static type as an instance of the receiver class.  For example, given the
1514following classes:
1515
1516.. code-block:: objc
1517
1518  @interface NSObject
1519  + (id)alloc;
1520  - (id)init;
1521  @end
1522
1523  @interface NSArray : NSObject
1524  @end
1525
1526and this common initialization pattern
1527
1528.. code-block:: objc
1529
1530  NSArray *array = [[NSArray alloc] init];
1531
1532the type of the expression ``[NSArray alloc]`` is ``NSArray*`` because
1533``alloc`` implicitly has a related result type.  Similarly, the type of the
1534expression ``[[NSArray alloc] init]`` is ``NSArray*``, since ``init`` has a
1535related result type and its receiver is known to have the type ``NSArray *``.
1536If neither ``alloc`` nor ``init`` had a related result type, the expressions
1537would have had type ``id``, as declared in the method signature.
1538
1539A method with a related result type can be declared by using the type
1540``instancetype`` as its result type.  ``instancetype`` is a contextual keyword
1541that is only permitted in the result type of an Objective-C method, e.g.
1542
1543.. code-block:: objc
1544
1545  @interface A
1546  + (instancetype)constructAnA;
1547  @end
1548
1549The related result type can also be inferred for some methods.  To determine
1550whether a method has an inferred related result type, the first word in the
1551camel-case selector (e.g., "``init``" in "``initWithObjects``") is considered,
1552and the method will have a related result type if its return type is compatible
1553with the type of its class and if:
1554
1555* the first word is "``alloc``" or "``new``", and the method is a class method,
1556  or
1557
1558* the first word is "``autorelease``", "``init``", "``retain``", or "``self``",
1559  and the method is an instance method.
1560
1561If a method with a related result type is overridden by a subclass method, the
1562subclass method must also return a type that is compatible with the subclass
1563type.  For example:
1564
1565.. code-block:: objc
1566
1567  @interface NSString : NSObject
1568  - (NSUnrelated *)init; // incorrect usage: NSUnrelated is not NSString or a superclass of NSString
1569  @end
1570
1571Related result types only affect the type of a message send or property access
1572via the given method.  In all other respects, a method with a related result
1573type is treated the same way as method that returns ``id``.
1574
1575Use ``__has_feature(objc_instancetype)`` to determine whether the
1576``instancetype`` contextual keyword is available.
1577
1578Automatic reference counting
1579----------------------------
1580
1581Clang provides support for :doc:`automated reference counting
1582<AutomaticReferenceCounting>` in Objective-C, which eliminates the need
1583for manual ``retain``/``release``/``autorelease`` message sends.  There are three
1584feature macros associated with automatic reference counting:
1585``__has_feature(objc_arc)`` indicates the availability of automated reference
1586counting in general, while ``__has_feature(objc_arc_weak)`` indicates that
1587automated reference counting also includes support for ``__weak`` pointers to
1588Objective-C objects. ``__has_feature(objc_arc_fields)`` indicates that C structs
1589are allowed to have fields that are pointers to Objective-C objects managed by
1590automatic reference counting.
1591
1592.. _objc-weak:
1593
1594Weak references
1595---------------
1596
1597Clang supports ARC-style weak and unsafe references in Objective-C even
1598outside of ARC mode.  Weak references must be explicitly enabled with
1599the ``-fobjc-weak`` option; use ``__has_feature((objc_arc_weak))``
1600to test whether they are enabled.  Unsafe references are enabled
1601unconditionally.  ARC-style weak and unsafe references cannot be used
1602when Objective-C garbage collection is enabled.
1603
1604Except as noted below, the language rules for the ``__weak`` and
1605``__unsafe_unretained`` qualifiers (and the ``weak`` and
1606``unsafe_unretained`` property attributes) are just as laid out
1607in the :doc:`ARC specification <AutomaticReferenceCounting>`.
1608In particular, note that some classes do not support forming weak
1609references to their instances, and note that special care must be
1610taken when storing weak references in memory where initialization
1611and deinitialization are outside the responsibility of the compiler
1612(such as in ``malloc``-ed memory).
1613
1614Loading from a ``__weak`` variable always implicitly retains the
1615loaded value.  In non-ARC modes, this retain is normally balanced
1616by an implicit autorelease.  This autorelease can be suppressed
1617by performing the load in the receiver position of a ``-retain``
1618message send (e.g. ``[weakReference retain]``); note that this performs
1619only a single retain (the retain done when primitively loading from
1620the weak reference).
1621
1622For the most part, ``__unsafe_unretained`` in non-ARC modes is just the
1623default behavior of variables and therefore is not needed.  However,
1624it does have an effect on the semantics of block captures: normally,
1625copying a block which captures an Objective-C object or block pointer
1626causes the captured pointer to be retained or copied, respectively,
1627but that behavior is suppressed when the captured variable is qualified
1628with ``__unsafe_unretained``.
1629
1630Note that the ``__weak`` qualifier formerly meant the GC qualifier in
1631all non-ARC modes and was silently ignored outside of GC modes.  It now
1632means the ARC-style qualifier in all non-GC modes and is no longer
1633allowed if not enabled by either ``-fobjc-arc`` or ``-fobjc-weak``.
1634It is expected that ``-fobjc-weak`` will eventually be enabled by default
1635in all non-GC Objective-C modes.
1636
1637.. _objc-fixed-enum:
1638
1639Enumerations with a fixed underlying type
1640-----------------------------------------
1641
1642Clang provides support for C++11 enumerations with a fixed underlying type
1643within Objective-C.  For example, one can write an enumeration type as:
1644
1645.. code-block:: c++
1646
1647  typedef enum : unsigned char { Red, Green, Blue } Color;
1648
1649This specifies that the underlying type, which is used to store the enumeration
1650value, is ``unsigned char``.
1651
1652Use ``__has_feature(objc_fixed_enum)`` to determine whether support for fixed
1653underlying types is available in Objective-C.
1654
1655Interoperability with C++11 lambdas
1656-----------------------------------
1657
1658Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
1659permitting a lambda to be implicitly converted to a block pointer with the
1660corresponding signature.  For example, consider an API such as ``NSArray``'s
1661array-sorting method:
1662
1663.. code-block:: objc
1664
1665  - (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
1666
1667``NSComparator`` is simply a typedef for the block pointer ``NSComparisonResult
1668(^)(id, id)``, and parameters of this type are generally provided with block
1669literals as arguments.  However, one can also use a C++11 lambda so long as it
1670provides the same signature (in this case, accepting two parameters of type
1671``id`` and returning an ``NSComparisonResult``):
1672
1673.. code-block:: objc
1674
1675  NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
1676                     @"String 02"];
1677  const NSStringCompareOptions comparisonOptions
1678    = NSCaseInsensitiveSearch | NSNumericSearch |
1679      NSWidthInsensitiveSearch | NSForcedOrderingSearch;
1680  NSLocale *currentLocale = [NSLocale currentLocale];
1681  NSArray *sorted
1682    = [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
1683               NSRange string1Range = NSMakeRange(0, [s1 length]);
1684               return [s1 compare:s2 options:comparisonOptions
1685               range:string1Range locale:currentLocale];
1686       }];
1687  NSLog(@"sorted: %@", sorted);
1688
1689This code relies on an implicit conversion from the type of the lambda
1690expression (an unnamed, local class type called the *closure type*) to the
1691corresponding block pointer type.  The conversion itself is expressed by a
1692conversion operator in that closure type that produces a block pointer with the
1693same signature as the lambda itself, e.g.,
1694
1695.. code-block:: objc
1696
1697  operator NSComparisonResult (^)(id, id)() const;
1698
1699This conversion function returns a new block that simply forwards the two
1700parameters to the lambda object (which it captures by copy), then returns the
1701result.  The returned block is first copied (with ``Block_copy``) and then
1702autoreleased.  As an optimization, if a lambda expression is immediately
1703converted to a block pointer (as in the first example, above), then the block
1704is not copied and autoreleased: rather, it is given the same lifetime as a
1705block literal written at that point in the program, which avoids the overhead
1706of copying a block to the heap in the common case.
1707
1708The conversion from a lambda to a block pointer is only available in
1709Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory
1710management (autorelease).
1711
1712Object Literals and Subscripting
1713--------------------------------
1714
1715Clang provides support for :doc:`Object Literals and Subscripting
1716<ObjectiveCLiterals>` in Objective-C, which simplifies common Objective-C
1717programming patterns, makes programs more concise, and improves the safety of
1718container creation.  There are several feature macros associated with object
1719literals and subscripting: ``__has_feature(objc_array_literals)`` tests the
1720availability of array literals; ``__has_feature(objc_dictionary_literals)``
1721tests the availability of dictionary literals;
1722``__has_feature(objc_subscripting)`` tests the availability of object
1723subscripting.
1724
1725Objective-C Autosynthesis of Properties
1726---------------------------------------
1727
1728Clang provides support for autosynthesis of declared properties.  Using this
1729feature, clang provides default synthesis of those properties not declared
1730@dynamic and not having user provided backing getter and setter methods.
1731``__has_feature(objc_default_synthesize_properties)`` checks for availability
1732of this feature in version of clang being used.
1733
1734.. _langext-objc-retain-release:
1735
1736Objective-C retaining behavior attributes
1737-----------------------------------------
1738
1739In Objective-C, functions and methods are generally assumed to follow the
1740`Cocoa Memory Management
1741<https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_
1742conventions for ownership of object arguments and
1743return values. However, there are exceptions, and so Clang provides attributes
1744to allow these exceptions to be documented. This are used by ARC and the
1745`static analyzer <https://clang-analyzer.llvm.org>`_ Some exceptions may be
1746better described using the ``objc_method_family`` attribute instead.
1747
1748**Usage**: The ``ns_returns_retained``, ``ns_returns_not_retained``,
1749``ns_returns_autoreleased``, ``cf_returns_retained``, and
1750``cf_returns_not_retained`` attributes can be placed on methods and functions
1751that return Objective-C or CoreFoundation objects. They are commonly placed at
1752the end of a function prototype or method declaration:
1753
1754.. code-block:: objc
1755
1756  id foo() __attribute__((ns_returns_retained));
1757
1758  - (NSString *)bar:(int)x __attribute__((ns_returns_retained));
1759
1760The ``*_returns_retained`` attributes specify that the returned object has a +1
1761retain count.  The ``*_returns_not_retained`` attributes specify that the return
1762object has a +0 retain count, even if the normal convention for its selector
1763would be +1.  ``ns_returns_autoreleased`` specifies that the returned object is
1764+0, but is guaranteed to live at least as long as the next flush of an
1765autorelease pool.
1766
1767**Usage**: The ``ns_consumed`` and ``cf_consumed`` attributes can be placed on
1768an parameter declaration; they specify that the argument is expected to have a
1769+1 retain count, which will be balanced in some way by the function or method.
1770The ``ns_consumes_self`` attribute can only be placed on an Objective-C
1771method; it specifies that the method expects its ``self`` parameter to have a
1772+1 retain count, which it will balance in some way.
1773
1774.. code-block:: objc
1775
1776  void foo(__attribute__((ns_consumed)) NSString *string);
1777
1778  - (void) bar __attribute__((ns_consumes_self));
1779  - (void) baz:(id) __attribute__((ns_consumed)) x;
1780
1781Further examples of these attributes are available in the static analyzer's `list of annotations for analysis
1782<https://clang-analyzer.llvm.org/annotations.html#cocoa_mem>`_.
1783
1784Query for these features with ``__has_attribute(ns_consumed)``,
1785``__has_attribute(ns_returns_retained)``, etc.
1786
1787Objective-C @available
1788----------------------
1789
1790It is possible to use the newest SDK but still build a program that can run on
1791older versions of macOS and iOS by passing ``-mmacosx-version-min=`` /
1792``-miphoneos-version-min=``.
1793
1794Before LLVM 5.0, when calling a function that exists only in the OS that's
1795newer than the target OS (as determined by the minimum deployment version),
1796programmers had to carefully check if the function exists at runtime, using
1797null checks for weakly-linked C functions, ``+class`` for Objective-C classes,
1798and ``-respondsToSelector:`` or ``+instancesRespondToSelector:`` for
1799Objective-C methods.  If such a check was missed, the program would compile
1800fine, run fine on newer systems, but crash on older systems.
1801
1802As of LLVM 5.0, ``-Wunguarded-availability`` uses the `availability attributes
1803<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ together
1804with the new ``@available()`` keyword to assist with this issue.
1805When a method that's introduced in the OS newer than the target OS is called, a
1806-Wunguarded-availability warning is emitted if that call is not guarded:
1807
1808.. code-block:: objc
1809
1810  void my_fun(NSSomeClass* var) {
1811    // If fancyNewMethod was added in e.g. macOS 10.12, but the code is
1812    // built with -mmacosx-version-min=10.11, then this unconditional call
1813    // will emit a -Wunguarded-availability warning:
1814    [var fancyNewMethod];
1815  }
1816
1817To fix the warning and to avoid the crash on macOS 10.11, wrap it in
1818``if(@available())``:
1819
1820.. code-block:: objc
1821
1822  void my_fun(NSSomeClass* var) {
1823    if (@available(macOS 10.12, *)) {
1824      [var fancyNewMethod];
1825    } else {
1826      // Put fallback behavior for old macOS versions (and for non-mac
1827      // platforms) here.
1828    }
1829  }
1830
1831The ``*`` is required and means that platforms not explicitly listed will take
1832the true branch, and the compiler will emit ``-Wunguarded-availability``
1833warnings for unlisted platforms based on those platform's deployment target.
1834More than one platform can be listed in ``@available()``:
1835
1836.. code-block:: objc
1837
1838  void my_fun(NSSomeClass* var) {
1839    if (@available(macOS 10.12, iOS 10, *)) {
1840      [var fancyNewMethod];
1841    }
1842  }
1843
1844If the caller of ``my_fun()`` already checks that ``my_fun()`` is only called
1845on 10.12, then add an `availability attribute
1846<https://clang.llvm.org/docs/AttributeReference.html#availability>`_ to it,
1847which will also suppress the warning and require that calls to my_fun() are
1848checked:
1849
1850.. code-block:: objc
1851
1852  API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) {
1853    [var fancyNewMethod];  // Now ok.
1854  }
1855
1856``@available()`` is only available in Objective-C code.  To use the feature
1857in C and C++ code, use the ``__builtin_available()`` spelling instead.
1858
1859If existing code uses null checks or ``-respondsToSelector:``, it should
1860be changed to use ``@available()`` (or ``__builtin_available``) instead.
1861
1862``-Wunguarded-availability`` is disabled by default, but
1863``-Wunguarded-availability-new``, which only emits this warning for APIs
1864that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and
1865tvOS >= 11, is enabled by default.
1866
1867.. _langext-overloading:
1868
1869Objective-C++ ABI: protocol-qualifier mangling of parameters
1870------------------------------------------------------------
1871
1872Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
1873type is a qualified-``id`` (e.g., ``id<Foo>``).  This mangling allows such
1874parameters to be differentiated from those with the regular unqualified ``id``
1875type.
1876
1877This was a non-backward compatible mangling change to the ABI.  This change
1878allows proper overloading, and also prevents mangling conflicts with template
1879parameters of protocol-qualified type.
1880
1881Query the presence of this new mangling with
1882``__has_feature(objc_protocol_qualifier_mangling)``.
1883
1884Initializer lists for complex numbers in C
1885==========================================
1886
1887clang supports an extension which allows the following in C:
1888
1889.. code-block:: c++
1890
1891  #include <math.h>
1892  #include <complex.h>
1893  complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
1894
1895This construct is useful because there is no way to separately initialize the
1896real and imaginary parts of a complex variable in standard C, given that clang
1897does not support ``_Imaginary``.  (Clang also supports the ``__real__`` and
1898``__imag__`` extensions from gcc, which help in some cases, but are not usable
1899in static initializers.)
1900
1901Note that this extension does not allow eliding the braces; the meaning of the
1902following two lines is different:
1903
1904.. code-block:: c++
1905
1906  complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
1907  complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
1908
1909This extension also works in C++ mode, as far as that goes, but does not apply
1910to the C++ ``std::complex``.  (In C++11, list initialization allows the same
1911syntax to be used with ``std::complex`` with the same meaning.)
1912
1913For GCC compatibility, ``__builtin_complex(re, im)`` can also be used to
1914construct a complex number from the given real and imaginary components.
1915
1916OpenCL Features
1917===============
1918
1919Clang supports internal OpenCL extensions documented below.
1920
1921``__cl_clang_bitfields``
1922--------------------------------
1923
1924With this extension it is possible to enable bitfields in structs
1925or unions using the OpenCL extension pragma mechanism detailed in
1926`the OpenCL Extension Specification, section 1.2
1927<https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
1928
1929Use of bitfields in OpenCL kernels can result in reduced portability as struct
1930layout is not guaranteed to be consistent when compiled by different compilers.
1931If structs with bitfields are used as kernel function parameters, it can result
1932in incorrect functionality when the layout is different between the host and
1933device code.
1934
1935**Example of Use**:
1936
1937.. code-block:: c++
1938
1939  #pragma OPENCL EXTENSION __cl_clang_bitfields : enable
1940  struct with_bitfield {
1941    unsigned int i : 5; // compiled - no diagnostic generated
1942  };
1943
1944  #pragma OPENCL EXTENSION __cl_clang_bitfields : disable
1945  struct without_bitfield {
1946    unsigned int i : 5; // error - bitfields are not supported
1947  };
1948
1949``__cl_clang_function_pointers``
1950--------------------------------
1951
1952With this extension it is possible to enable various language features that
1953are relying on function pointers using regular OpenCL extension pragma
1954mechanism detailed in `the OpenCL Extension Specification,
1955section 1.2
1956<https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
1957
1958In C++ for OpenCL this also enables:
1959
1960- Use of member function pointers;
1961
1962- Unrestricted use of references to functions;
1963
1964- Virtual member functions.
1965
1966Such functionality is not conformant and does not guarantee to compile
1967correctly in any circumstances. It can be used if:
1968
1969- the kernel source does not contain call expressions to (member-) function
1970  pointers, or virtual functions. For example this extension can be used in
1971  metaprogramming algorithms to be able to specify/detect types generically.
1972
1973- the generated kernel binary does not contain indirect calls because they
1974  are eliminated using compiler optimizations e.g. devirtualization.
1975
1976- the selected target supports the function pointer like functionality e.g.
1977  most CPU targets.
1978
1979**Example of Use**:
1980
1981.. code-block:: c++
1982
1983  #pragma OPENCL EXTENSION __cl_clang_function_pointers : enable
1984  void foo()
1985  {
1986    void (*fp)(); // compiled - no diagnostic generated
1987  }
1988
1989  #pragma OPENCL EXTENSION __cl_clang_function_pointers : disable
1990  void bar()
1991  {
1992    void (*fp)(); // error - pointers to function are not allowed
1993  }
1994
1995``__cl_clang_variadic_functions``
1996---------------------------------
1997
1998With this extension it is possible to enable variadic arguments in functions
1999using regular OpenCL extension pragma mechanism detailed in `the OpenCL
2000Extension Specification, section 1.2
2001<https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2002
2003This is not conformant behavior and it can only be used portably when the
2004functions with variadic prototypes do not get generated in binary e.g. the
2005variadic prototype is used to specify a function type with any number of
2006arguments in metaprogramming algorithms in C++ for OpenCL.
2007
2008This extensions can also be used when the kernel code is intended for targets
2009supporting the variadic arguments e.g. majority of CPU targets.
2010
2011**Example of Use**:
2012
2013.. code-block:: c++
2014
2015  #pragma OPENCL EXTENSION __cl_clang_variadic_functions : enable
2016  void foo(int a, ...); // compiled - no diagnostic generated
2017
2018  #pragma OPENCL EXTENSION __cl_clang_variadic_functions : disable
2019  void bar(int a, ...); // error - variadic prototype is not allowed
2020
2021``__cl_clang_non_portable_kernel_param_types``
2022----------------------------------------------
2023
2024With this extension it is possible to enable the use of some restricted types
2025in kernel parameters specified in `C++ for OpenCL v1.0 s2.4
2026<https://www.khronos.org/opencl/assets/CXX_for_OpenCL.html#kernel_function>`_.
2027The restrictions can be relaxed using regular OpenCL extension pragma mechanism
2028detailed in `the OpenCL Extension Specification, section 1.2
2029<https://www.khronos.org/registry/OpenCL/specs/3.0-unified/html/OpenCL_Ext.html#extensions-overview>`_.
2030
2031This is not a conformant behavior and it can only be used when the
2032kernel arguments are not accessed on the host side or the data layout/size
2033between the host and device is known to be compatible.
2034
2035**Example of Use**:
2036
2037.. code-block:: c++
2038
2039  // Plain Old Data type.
2040  struct Pod {
2041    int a;
2042    int b;
2043  };
2044
2045  // Not POD type because of the constructor.
2046  // Standard layout type because there is only one access control.
2047  struct OnlySL {
2048    int a;
2049    int b;
2050    NotPod() : a(0), b(0) {}
2051  };
2052
2053  // Not standard layout type because of two different access controls.
2054  struct NotSL {
2055    int a;
2056  private:
2057    int b;
2058  }
2059
2060  kernel void kernel_main(
2061    Pod a,
2062  #pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : enable
2063    OnlySL b,
2064    global NotSL *c,
2065  #pragma OPENCL EXTENSION __cl_clang_non_portable_kernel_param_types : disable
2066    global OnlySL *d,
2067  );
2068
2069Remove address space builtin function
2070-------------------------------------
2071
2072``__remove_address_space`` allows to derive types in C++ for OpenCL
2073that have address space qualifiers removed. This utility only affects
2074address space qualifiers, therefore, other type qualifiers such as
2075``const`` or ``volatile`` remain unchanged.
2076
2077**Example of Use**:
2078
2079.. code-block:: c++
2080
2081  template<typename T>
2082  void foo(T *par){
2083    T var1; // error - local function variable with global address space
2084    __private T var2; // error - conflicting address space qualifiers
2085    __private __remove_address_space<T>::type var3; // var3 is __private int
2086  }
2087
2088  void bar(){
2089    __global int* ptr;
2090    foo(ptr);
2091  }
2092
2093Legacy 1.x atomics with generic address space
2094---------------------------------------------
2095
2096Clang allows use of atomic functions from the OpenCL 1.x standards
2097with the generic address space pointer in C++ for OpenCL mode.
2098
2099This is a non-portable feature and might not be supported by all
2100targets.
2101
2102**Example of Use**:
2103
2104.. code-block:: c++
2105
2106  void foo(__generic volatile unsigned int* a) {
2107    atomic_add(a, 1);
2108  }
2109
2110Builtin Functions
2111=================
2112
2113Clang supports a number of builtin library functions with the same syntax as
2114GCC, including things like ``__builtin_nan``, ``__builtin_constant_p``,
2115``__builtin_choose_expr``, ``__builtin_types_compatible_p``,
2116``__builtin_assume_aligned``, ``__sync_fetch_and_add``, etc.  In addition to
2117the GCC builtins, Clang supports a number of builtins that GCC does not, which
2118are listed here.
2119
2120Please note that Clang does not and will not support all of the GCC builtins
2121for vector operations.  Instead of using builtins, you should use the functions
2122defined in target-specific header files like ``<xmmintrin.h>``, which define
2123portable wrappers for these.  Many of the Clang versions of these functions are
2124implemented directly in terms of :ref:`extended vector support
2125<langext-vectors>` instead of builtins, in order to reduce the number of
2126builtins that we need to implement.
2127
2128``__builtin_alloca``
2129--------------------
2130
2131``__builtin_alloca`` is used to dynamically allocate memory on the stack. Memory
2132is automatically freed upon function termination.
2133
2134**Syntax**:
2135
2136.. code-block:: c++
2137
2138  __builtin_alloca(size_t n)
2139
2140**Example of Use**:
2141
2142.. code-block:: c++
2143
2144  void init(float* data, size_t nbelems);
2145  void process(float* data, size_t nbelems);
2146  int foo(size_t n) {
2147    auto mem = (float*)__builtin_alloca(n * sizeof(float));
2148    init(mem, n);
2149    process(mem, n);
2150    /* mem is automatically freed at this point */
2151  }
2152
2153**Description**:
2154
2155``__builtin_alloca`` is meant to be used to allocate a dynamic amount of memory
2156on the stack. This amount is subject to stack allocation limits.
2157
2158Query for this feature with ``__has_builtin(__builtin_alloca)``.
2159
2160``__builtin_alloca_with_align``
2161-------------------------------
2162
2163``__builtin_alloca_with_align`` is used to dynamically allocate memory on the
2164stack while controlling its alignment. Memory is automatically freed upon
2165function termination.
2166
2167
2168**Syntax**:
2169
2170.. code-block:: c++
2171
2172  __builtin_alloca_with_align(size_t n, size_t align)
2173
2174**Example of Use**:
2175
2176.. code-block:: c++
2177
2178  void init(float* data, size_t nbelems);
2179  void process(float* data, size_t nbelems);
2180  int foo(size_t n) {
2181    auto mem = (float*)__builtin_alloca_with_align(
2182                        n * sizeof(float),
2183                        CHAR_BIT * alignof(float));
2184    init(mem, n);
2185    process(mem, n);
2186    /* mem is automatically freed at this point */
2187  }
2188
2189**Description**:
2190
2191``__builtin_alloca_with_align`` is meant to be used to allocate a dynamic amount of memory
2192on the stack. It is similar to ``__builtin_alloca`` but accepts a second
2193argument whose value is the alignment constraint, as a power of 2 in *bits*.
2194
2195Query for this feature with ``__has_builtin(__builtin_alloca_with_align)``.
2196
2197.. _langext-__builtin_assume:
2198
2199``__builtin_call_with_static_chain``
2200------------------------------------
2201
2202``__builtin_call_with_static_chain`` is used to perform a static call while
2203setting updating the static chain register.
2204
2205**Syntax**:
2206
2207.. code-block:: c++
2208
2209  T __builtin_call_with_static_chain(T expr, void* ptr)
2210
2211**Example of Use**:
2212
2213.. code-block:: c++
2214
2215  auto v = __builtin_call_with_static_chain(foo(3), foo);
2216
2217**Description**:
2218
2219This builtin returns ``expr`` after checking that ``expr`` is a non-member
2220static call expression. The call to that expression is made while using ``ptr``
2221as a function pointer stored in a dedicated register to implement *static chain*
2222calling convention, as used by some language to implement closures or nested
2223functions.
2224
2225Query for this feature with ``__has_builtin(__builtin_call_with_static_chain)``.
2226
2227``__builtin_readcyclecounter``
2228------------------------------
2229
2230``__builtin_readcyclecounter`` is used to access the cycle counter register (or
2231a similar low-latency, high-accuracy clock) on those targets that support it.
2232
2233**Syntax**:
2234
2235.. code-block:: c++
2236
2237  __builtin_readcyclecounter()
2238
2239**Example of Use**:
2240
2241.. code-block:: c++
2242
2243  unsigned long long t0 = __builtin_readcyclecounter();
2244  do_something();
2245  unsigned long long t1 = __builtin_readcyclecounter();
2246  unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
2247
2248**Description**:
2249
2250The ``__builtin_readcyclecounter()`` builtin returns the cycle counter value,
2251which may be either global or process/thread-specific depending on the target.
2252As the backing counters often overflow quickly (on the order of seconds) this
2253should only be used for timing small intervals.  When not supported by the
2254target, the return value is always zero.  This builtin takes no arguments and
2255produces an unsigned long long result.
2256
2257Query for this feature with ``__has_builtin(__builtin_readcyclecounter)``. Note
2258that even if present, its use may depend on run-time privilege or other OS
2259controlled state.
2260
2261``__builtin_dump_struct``
2262-------------------------
2263
2264**Syntax**:
2265
2266.. code-block:: c++
2267
2268     __builtin_dump_struct(&some_struct, &some_printf_func);
2269
2270**Examples**:
2271
2272.. code-block:: c++
2273
2274     struct S {
2275       int x, y;
2276       float f;
2277       struct T {
2278         int i;
2279       } t;
2280     };
2281
2282     void func(struct S *s) {
2283       __builtin_dump_struct(s, &printf);
2284     }
2285
2286Example output:
2287
2288.. code-block:: none
2289
2290     struct S {
2291     int i : 100
2292     int j : 42
2293     float f : 3.14159
2294     struct T t : struct T {
2295         int i : 1997
2296         }
2297     }
2298
2299**Description**:
2300
2301The '``__builtin_dump_struct``' function is used to print the fields of a simple
2302structure and their values for debugging purposes. The builtin accepts a pointer
2303to a structure to dump the fields of, and a pointer to a formatted output
2304function whose signature must be: ``int (*)(const char *, ...)`` and must
2305support the format specifiers used by ``printf()``.
2306
2307.. _langext-__builtin_shufflevector:
2308
2309``__builtin_shufflevector``
2310---------------------------
2311
2312``__builtin_shufflevector`` is used to express generic vector
2313permutation/shuffle/swizzle operations.  This builtin is also very important
2314for the implementation of various target-specific header files like
2315``<xmmintrin.h>``.
2316
2317**Syntax**:
2318
2319.. code-block:: c++
2320
2321  __builtin_shufflevector(vec1, vec2, index1, index2, ...)
2322
2323**Examples**:
2324
2325.. code-block:: c++
2326
2327  // identity operation - return 4-element vector v1.
2328  __builtin_shufflevector(v1, v1, 0, 1, 2, 3)
2329
2330  // "Splat" element 0 of V1 into a 4-element result.
2331  __builtin_shufflevector(V1, V1, 0, 0, 0, 0)
2332
2333  // Reverse 4-element vector V1.
2334  __builtin_shufflevector(V1, V1, 3, 2, 1, 0)
2335
2336  // Concatenate every other element of 4-element vectors V1 and V2.
2337  __builtin_shufflevector(V1, V2, 0, 2, 4, 6)
2338
2339  // Concatenate every other element of 8-element vectors V1 and V2.
2340  __builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
2341
2342  // Shuffle v1 with some elements being undefined
2343  __builtin_shufflevector(v1, v1, 3, -1, 1, -1)
2344
2345**Description**:
2346
2347The first two arguments to ``__builtin_shufflevector`` are vectors that have
2348the same element type.  The remaining arguments are a list of integers that
2349specify the elements indices of the first two vectors that should be extracted
2350and returned in a new vector.  These element indices are numbered sequentially
2351starting with the first vector, continuing into the second vector.  Thus, if
2352``vec1`` is a 4-element vector, index 5 would refer to the second element of
2353``vec2``. An index of -1 can be used to indicate that the corresponding element
2354in the returned vector is a don't care and can be optimized by the backend.
2355
2356The result of ``__builtin_shufflevector`` is a vector with the same element
2357type as ``vec1``/``vec2`` but that has an element count equal to the number of
2358indices specified.
2359
2360Query for this feature with ``__has_builtin(__builtin_shufflevector)``.
2361
2362.. _langext-__builtin_convertvector:
2363
2364``__builtin_convertvector``
2365---------------------------
2366
2367``__builtin_convertvector`` is used to express generic vector
2368type-conversion operations. The input vector and the output vector
2369type must have the same number of elements.
2370
2371**Syntax**:
2372
2373.. code-block:: c++
2374
2375  __builtin_convertvector(src_vec, dst_vec_type)
2376
2377**Examples**:
2378
2379.. code-block:: c++
2380
2381  typedef double vector4double __attribute__((__vector_size__(32)));
2382  typedef float  vector4float  __attribute__((__vector_size__(16)));
2383  typedef short  vector4short  __attribute__((__vector_size__(8)));
2384  vector4float vf; vector4short vs;
2385
2386  // convert from a vector of 4 floats to a vector of 4 doubles.
2387  __builtin_convertvector(vf, vector4double)
2388  // equivalent to:
2389  (vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
2390
2391  // convert from a vector of 4 shorts to a vector of 4 floats.
2392  __builtin_convertvector(vs, vector4float)
2393  // equivalent to:
2394  (vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
2395
2396**Description**:
2397
2398The first argument to ``__builtin_convertvector`` is a vector, and the second
2399argument is a vector type with the same number of elements as the first
2400argument.
2401
2402The result of ``__builtin_convertvector`` is a vector with the same element
2403type as the second argument, with a value defined in terms of the action of a
2404C-style cast applied to each element of the first argument.
2405
2406Query for this feature with ``__has_builtin(__builtin_convertvector)``.
2407
2408``__builtin_bitreverse``
2409------------------------
2410
2411* ``__builtin_bitreverse8``
2412* ``__builtin_bitreverse16``
2413* ``__builtin_bitreverse32``
2414* ``__builtin_bitreverse64``
2415
2416**Syntax**:
2417
2418.. code-block:: c++
2419
2420     __builtin_bitreverse32(x)
2421
2422**Examples**:
2423
2424.. code-block:: c++
2425
2426      uint8_t rev_x = __builtin_bitreverse8(x);
2427      uint16_t rev_x = __builtin_bitreverse16(x);
2428      uint32_t rev_y = __builtin_bitreverse32(y);
2429      uint64_t rev_z = __builtin_bitreverse64(z);
2430
2431**Description**:
2432
2433The '``__builtin_bitreverse``' family of builtins is used to reverse
2434the bitpattern of an integer value; for example ``0b10110110`` becomes
2435``0b01101101``. These builtins can be used within constant expressions.
2436
2437``__builtin_rotateleft``
2438------------------------
2439
2440* ``__builtin_rotateleft8``
2441* ``__builtin_rotateleft16``
2442* ``__builtin_rotateleft32``
2443* ``__builtin_rotateleft64``
2444
2445**Syntax**:
2446
2447.. code-block:: c++
2448
2449     __builtin_rotateleft32(x, y)
2450
2451**Examples**:
2452
2453.. code-block:: c++
2454
2455      uint8_t rot_x = __builtin_rotateleft8(x, y);
2456      uint16_t rot_x = __builtin_rotateleft16(x, y);
2457      uint32_t rot_x = __builtin_rotateleft32(x, y);
2458      uint64_t rot_x = __builtin_rotateleft64(x, y);
2459
2460**Description**:
2461
2462The '``__builtin_rotateleft``' family of builtins is used to rotate
2463the bits in the first argument by the amount in the second argument.
2464For example, ``0b10000110`` rotated left by 11 becomes ``0b00110100``.
2465The shift value is treated as an unsigned amount modulo the size of
2466the arguments. Both arguments and the result have the bitwidth specified
2467by the name of the builtin. These builtins can be used within constant
2468expressions.
2469
2470``__builtin_rotateright``
2471-------------------------
2472
2473* ``__builtin_rotateright8``
2474* ``__builtin_rotateright16``
2475* ``__builtin_rotateright32``
2476* ``__builtin_rotateright64``
2477
2478**Syntax**:
2479
2480.. code-block:: c++
2481
2482     __builtin_rotateright32(x, y)
2483
2484**Examples**:
2485
2486.. code-block:: c++
2487
2488      uint8_t rot_x = __builtin_rotateright8(x, y);
2489      uint16_t rot_x = __builtin_rotateright16(x, y);
2490      uint32_t rot_x = __builtin_rotateright32(x, y);
2491      uint64_t rot_x = __builtin_rotateright64(x, y);
2492
2493**Description**:
2494
2495The '``__builtin_rotateright``' family of builtins is used to rotate
2496the bits in the first argument by the amount in the second argument.
2497For example, ``0b10000110`` rotated right by 3 becomes ``0b11010000``.
2498The shift value is treated as an unsigned amount modulo the size of
2499the arguments. Both arguments and the result have the bitwidth specified
2500by the name of the builtin. These builtins can be used within constant
2501expressions.
2502
2503``__builtin_unreachable``
2504-------------------------
2505
2506``__builtin_unreachable`` is used to indicate that a specific point in the
2507program cannot be reached, even if the compiler might otherwise think it can.
2508This is useful to improve optimization and eliminates certain warnings.  For
2509example, without the ``__builtin_unreachable`` in the example below, the
2510compiler assumes that the inline asm can fall through and prints a "function
2511declared '``noreturn``' should not return" warning.
2512
2513**Syntax**:
2514
2515.. code-block:: c++
2516
2517    __builtin_unreachable()
2518
2519**Example of use**:
2520
2521.. code-block:: c++
2522
2523  void myabort(void) __attribute__((noreturn));
2524  void myabort(void) {
2525    asm("int3");
2526    __builtin_unreachable();
2527  }
2528
2529**Description**:
2530
2531The ``__builtin_unreachable()`` builtin has completely undefined behavior.
2532Since it has undefined behavior, it is a statement that it is never reached and
2533the optimizer can take advantage of this to produce better code.  This builtin
2534takes no arguments and produces a void result.
2535
2536Query for this feature with ``__has_builtin(__builtin_unreachable)``.
2537
2538``__builtin_unpredictable``
2539---------------------------
2540
2541``__builtin_unpredictable`` is used to indicate that a branch condition is
2542unpredictable by hardware mechanisms such as branch prediction logic.
2543
2544**Syntax**:
2545
2546.. code-block:: c++
2547
2548    __builtin_unpredictable(long long)
2549
2550**Example of use**:
2551
2552.. code-block:: c++
2553
2554  if (__builtin_unpredictable(x > 0)) {
2555     foo();
2556  }
2557
2558**Description**:
2559
2560The ``__builtin_unpredictable()`` builtin is expected to be used with control
2561flow conditions such as in ``if`` and ``switch`` statements.
2562
2563Query for this feature with ``__has_builtin(__builtin_unpredictable)``.
2564
2565
2566``__builtin_expect``
2567--------------------
2568
2569``__builtin_expect`` is used to indicate that the value of an expression is
2570anticipated to be the same as a statically known result.
2571
2572**Syntax**:
2573
2574.. code-block:: c++
2575
2576    long __builtin_expect(long expr, long val)
2577
2578**Example of use**:
2579
2580.. code-block:: c++
2581
2582  if (__builtin_expect(x, 0)) {
2583     bar();
2584  }
2585
2586**Description**:
2587
2588The ``__builtin_expect()`` builtin is typically used with control flow
2589conditions such as in ``if`` and ``switch`` statements to help branch
2590prediction. It means that its first argument ``expr`` is expected to take the
2591value of its second argument ``val``. It always returns ``expr``.
2592
2593Query for this feature with ``__has_builtin(__builtin_expect)``.
2594
2595``__builtin_expect_with_probability``
2596-------------------------------------
2597
2598``__builtin_expect_with_probability`` is similar to ``__builtin_expect`` but it
2599takes a probability as third argument.
2600
2601**Syntax**:
2602
2603.. code-block:: c++
2604
2605    long __builtin_expect_with_probability(long expr, long val, double p)
2606
2607**Example of use**:
2608
2609.. code-block:: c++
2610
2611  if (__builtin_expect_with_probability(x, 0, .3)) {
2612     bar();
2613  }
2614
2615**Description**:
2616
2617The ``__builtin_expect_with_probability()`` builtin is typically used with
2618control flow conditions such as in ``if`` and ``switch`` statements to help
2619branch prediction. It means that its first argument ``expr`` is expected to take
2620the value of its second argument ``val`` with probability ``p``. ``p`` must be
2621within ``[0.0 ; 1.0]`` bounds. This builtin always returns the value of ``expr``.
2622
2623Query for this feature with ``__has_builtin(__builtin_expect_with_probability)``.
2624
2625``__builtin_prefetch``
2626----------------------
2627
2628``__builtin_prefetch`` is used to communicate with the cache handler to bring
2629data into the cache before it gets used.
2630
2631**Syntax**:
2632
2633.. code-block:: c++
2634
2635    void __builtin_prefetch(const void *addr, int rw=0, int locality=3)
2636
2637**Example of use**:
2638
2639.. code-block:: c++
2640
2641    __builtin_prefetch(a + i);
2642
2643**Description**:
2644
2645The ``__builtin_prefetch(addr, rw, locality)`` builtin is expected to be used to
2646avoid cache misses when the developper has a good understanding of which data
2647are going to be used next. ``addr`` is the address that needs to be brought into
2648the cache. ``rw`` indicates the expected access mode: ``0`` for *read* and ``1``
2649for *write*. In case of *read write* access, ``1`` is to be used. ``locality``
2650indicates the expected persistance of data in cache, from ``0`` which means that
2651data can be discarded from cache after its next use to ``3`` which means that
2652data is going to be reused a lot once in cache. ``1`` and ``2`` provide
2653intermediate behavior between these two extremes.
2654
2655Query for this feature with ``__has_builtin(__builtin_prefetch)``.
2656
2657``__sync_swap``
2658---------------
2659
2660``__sync_swap`` is used to atomically swap integers or pointers in memory.
2661
2662**Syntax**:
2663
2664.. code-block:: c++
2665
2666  type __sync_swap(type *ptr, type value, ...)
2667
2668**Example of Use**:
2669
2670.. code-block:: c++
2671
2672  int old_value = __sync_swap(&value, new_value);
2673
2674**Description**:
2675
2676The ``__sync_swap()`` builtin extends the existing ``__sync_*()`` family of
2677atomic intrinsics to allow code to atomically swap the current value with the
2678new value.  More importantly, it helps developers write more efficient and
2679correct code by avoiding expensive loops around
2680``__sync_bool_compare_and_swap()`` or relying on the platform specific
2681implementation details of ``__sync_lock_test_and_set()``.  The
2682``__sync_swap()`` builtin is a full barrier.
2683
2684``__builtin_addressof``
2685-----------------------
2686
2687``__builtin_addressof`` performs the functionality of the built-in ``&``
2688operator, ignoring any ``operator&`` overload.  This is useful in constant
2689expressions in C++11, where there is no other way to take the address of an
2690object that overloads ``operator&``.
2691
2692**Example of use**:
2693
2694.. code-block:: c++
2695
2696  template<typename T> constexpr T *addressof(T &value) {
2697    return __builtin_addressof(value);
2698  }
2699
2700``__builtin_function_start``
2701-----------------------------
2702
2703``__builtin_function_start`` returns the address of a function body.
2704
2705**Syntax**:
2706
2707.. code-block:: c++
2708
2709  void *__builtin_function_start(function)
2710
2711**Example of use**:
2712
2713.. code-block:: c++
2714
2715  void a() {}
2716  void *p = __builtin_function_start(a);
2717
2718  class A {
2719  public:
2720    void a(int n);
2721    void a();
2722  };
2723
2724  void A::a(int n) {}
2725  void A::a() {}
2726
2727  void *pa1 = __builtin_function_start((void(A::*)(int)) &A::a);
2728  void *pa2 = __builtin_function_start((void(A::*)()) &A::a);
2729
2730**Description**:
2731
2732The ``__builtin_function_start`` builtin accepts an argument that can be
2733constant-evaluated to a function, and returns the address of the function
2734body.  This builtin is not supported on all targets.
2735
2736The returned pointer may differ from the normally taken function address
2737and is not safe to call.  For example, with ``-fsanitize=cfi``, taking a
2738function address produces a callable pointer to a CFI jump table, while
2739``__builtin_function_start`` returns an address that fails
2740:doc:`cfi-icall<ControlFlowIntegrity>` checks.
2741
2742``__builtin_operator_new`` and ``__builtin_operator_delete``
2743------------------------------------------------------------
2744
2745A call to ``__builtin_operator_new(args)`` is exactly the same as a call to
2746``::operator new(args)``, except that it allows certain optimizations
2747that the C++ standard does not permit for a direct function call to
2748``::operator new`` (in particular, removing ``new`` / ``delete`` pairs and
2749merging allocations), and that the call is required to resolve to a
2750`replaceable global allocation function
2751<https://en.cppreference.com/w/cpp/memory/new/operator_new>`_.
2752
2753Likewise, ``__builtin_operator_delete`` is exactly the same as a call to
2754``::operator delete(args)``, except that it permits optimizations
2755and that the call is required to resolve to a
2756`replaceable global deallocation function
2757<https://en.cppreference.com/w/cpp/memory/new/operator_delete>`_.
2758
2759These builtins are intended for use in the implementation of ``std::allocator``
2760and other similar allocation libraries, and are only available in C++.
2761
2762Query for this feature with ``__has_builtin(__builtin_operator_new)`` or
2763``__has_builtin(__builtin_operator_delete)``:
2764
2765  * If the value is at least ``201802L``, the builtins behave as described above.
2766
2767  * If the value is non-zero, the builtins may not support calling arbitrary
2768    replaceable global (de)allocation functions, but do support calling at least
2769    ``::operator new(size_t)`` and ``::operator delete(void*)``.
2770
2771``__builtin_preserve_access_index``
2772-----------------------------------
2773
2774``__builtin_preserve_access_index`` specifies a code section where
2775array subscript access and structure/union member access are relocatable
2776under bpf compile-once run-everywhere framework. Debuginfo (typically
2777with ``-g``) is needed, otherwise, the compiler will exit with an error.
2778The return type for the intrinsic is the same as the type of the
2779argument.
2780
2781**Syntax**:
2782
2783.. code-block:: c
2784
2785  type __builtin_preserve_access_index(type arg)
2786
2787**Example of Use**:
2788
2789.. code-block:: c
2790
2791  struct t {
2792    int i;
2793    int j;
2794    union {
2795      int a;
2796      int b;
2797    } c[4];
2798  };
2799  struct t *v = ...;
2800  int *pb =__builtin_preserve_access_index(&v->c[3].b);
2801  __builtin_preserve_access_index(v->j);
2802
2803``__builtin_debugtrap``
2804-----------------------
2805
2806``__builtin_debugtrap`` causes the program to stop its execution in such a way that a debugger can catch it.
2807
2808**Syntax**:
2809
2810.. code-block:: c++
2811
2812    __builtin_debugtrap()
2813
2814**Description**
2815
2816``__builtin_debugtrap`` is lowered to the ` ``llvm.debugtrap`` <https://llvm.org/docs/LangRef.html#llvm-debugtrap-intrinsic>`_ builtin. It should have the same effect as setting a breakpoint on the line where the builtin is called.
2817
2818Query for this feature with ``__has_builtin(__builtin_debugtrap)``.
2819
2820
2821``__builtin_trap``
2822------------------
2823
2824``__builtin_trap`` causes the program to stop its execution abnormally.
2825
2826**Syntax**:
2827
2828.. code-block:: c++
2829
2830    __builtin_trap()
2831
2832**Description**
2833
2834``__builtin_trap`` is lowered to the ` ``llvm.trap`` <https://llvm.org/docs/LangRef.html#llvm-trap-intrinsic>`_ builtin.
2835
2836Query for this feature with ``__has_builtin(__builtin_trap)``.
2837
2838
2839``__builtin_sycl_unique_stable_name``
2840-------------------------------------
2841
2842``__builtin_sycl_unique_stable_name()`` is a builtin that takes a type and
2843produces a string literal containing a unique name for the type that is stable
2844across split compilations, mainly to support SYCL/Data Parallel C++ language.
2845
2846In cases where the split compilation needs to share a unique token for a type
2847across the boundary (such as in an offloading situation), this name can be used
2848for lookup purposes, such as in the SYCL Integration Header.
2849
2850The value of this builtin is computed entirely at compile time, so it can be
2851used in constant expressions. This value encodes lambda functions based on a
2852stable numbering order in which they appear in their local declaration contexts.
2853Once this builtin is evaluated in a constexpr context, it is erroneous to use
2854it in an instantiation which changes its value.
2855
2856In order to produce the unique name, the current implementation of the bultin
2857uses Itanium mangling even if the host compilation uses a different name
2858mangling scheme at runtime. The mangler marks all the lambdas required to name
2859the SYCL kernel and emits a stable local ordering of the respective lambdas.
2860The resulting pattern is demanglable.  When non-lambda types are passed to the
2861builtin, the mangler emits their usual pattern without any special treatment.
2862
2863**Syntax**:
2864
2865.. code-block:: c
2866
2867  // Computes a unique stable name for the given type.
2868  constexpr const char * __builtin_sycl_unique_stable_name( type-id );
2869
2870Multiprecision Arithmetic Builtins
2871----------------------------------
2872
2873Clang provides a set of builtins which expose multiprecision arithmetic in a
2874manner amenable to C. They all have the following form:
2875
2876.. code-block:: c
2877
2878  unsigned x = ..., y = ..., carryin = ..., carryout;
2879  unsigned sum = __builtin_addc(x, y, carryin, &carryout);
2880
2881Thus one can form a multiprecision addition chain in the following manner:
2882
2883.. code-block:: c
2884
2885  unsigned *x, *y, *z, carryin=0, carryout;
2886  z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
2887  carryin = carryout;
2888  z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
2889  carryin = carryout;
2890  z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
2891  carryin = carryout;
2892  z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
2893
2894The complete list of builtins are:
2895
2896.. code-block:: c
2897
2898  unsigned char      __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
2899  unsigned short     __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
2900  unsigned           __builtin_addc  (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
2901  unsigned long      __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
2902  unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
2903  unsigned char      __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
2904  unsigned short     __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
2905  unsigned           __builtin_subc  (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
2906  unsigned long      __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
2907  unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
2908
2909Checked Arithmetic Builtins
2910---------------------------
2911
2912Clang provides a set of builtins that implement checked arithmetic for security
2913critical applications in a manner that is fast and easily expressible in C. As
2914an example of their usage:
2915
2916.. code-block:: c
2917
2918  errorcode_t security_critical_application(...) {
2919    unsigned x, y, result;
2920    ...
2921    if (__builtin_mul_overflow(x, y, &result))
2922      return kErrorCodeHackers;
2923    ...
2924    use_multiply(result);
2925    ...
2926  }
2927
2928Clang provides the following checked arithmetic builtins:
2929
2930.. code-block:: c
2931
2932  bool __builtin_add_overflow   (type1 x, type2 y, type3 *sum);
2933  bool __builtin_sub_overflow   (type1 x, type2 y, type3 *diff);
2934  bool __builtin_mul_overflow   (type1 x, type2 y, type3 *prod);
2935  bool __builtin_uadd_overflow  (unsigned x, unsigned y, unsigned *sum);
2936  bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
2937  bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
2938  bool __builtin_usub_overflow  (unsigned x, unsigned y, unsigned *diff);
2939  bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
2940  bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
2941  bool __builtin_umul_overflow  (unsigned x, unsigned y, unsigned *prod);
2942  bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
2943  bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
2944  bool __builtin_sadd_overflow  (int x, int y, int *sum);
2945  bool __builtin_saddl_overflow (long x, long y, long *sum);
2946  bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
2947  bool __builtin_ssub_overflow  (int x, int y, int *diff);
2948  bool __builtin_ssubl_overflow (long x, long y, long *diff);
2949  bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
2950  bool __builtin_smul_overflow  (int x, int y, int *prod);
2951  bool __builtin_smull_overflow (long x, long y, long *prod);
2952  bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
2953
2954Each builtin performs the specified mathematical operation on the
2955first two arguments and stores the result in the third argument.  If
2956possible, the result will be equal to mathematically-correct result
2957and the builtin will return 0.  Otherwise, the builtin will return
29581 and the result will be equal to the unique value that is equivalent
2959to the mathematically-correct result modulo two raised to the *k*
2960power, where *k* is the number of bits in the result type.  The
2961behavior of these builtins is well-defined for all argument values.
2962
2963The first three builtins work generically for operands of any integer type,
2964including boolean types.  The operands need not have the same type as each
2965other, or as the result.  The other builtins may implicitly promote or
2966convert their operands before performing the operation.
2967
2968Query for this feature with ``__has_builtin(__builtin_add_overflow)``, etc.
2969
2970Floating point builtins
2971---------------------------------------
2972
2973``__builtin_canonicalize``
2974--------------------------
2975
2976.. code-block:: c
2977
2978   double __builtin_canonicalize(double);
2979   float __builtin_canonicalizef(float);
2980   long double__builtin_canonicalizel(long double);
2981
2982Returns the platform specific canonical encoding of a floating point
2983number. This canonicalization is useful for implementing certain
2984numeric primitives such as frexp. See `LLVM canonicalize intrinsic
2985<https://llvm.org/docs/LangRef.html#llvm-canonicalize-intrinsic>`_ for
2986more information on the semantics.
2987
2988String builtins
2989---------------
2990
2991Clang provides constant expression evaluation support for builtins forms of
2992the following functions from the C standard library headers
2993``<string.h>`` and ``<wchar.h>``:
2994
2995* ``memchr``
2996* ``memcmp`` (and its deprecated BSD / POSIX alias ``bcmp``)
2997* ``strchr``
2998* ``strcmp``
2999* ``strlen``
3000* ``strncmp``
3001* ``wcschr``
3002* ``wcscmp``
3003* ``wcslen``
3004* ``wcsncmp``
3005* ``wmemchr``
3006* ``wmemcmp``
3007
3008In each case, the builtin form has the name of the C library function prefixed
3009by ``__builtin_``. Example:
3010
3011.. code-block:: c
3012
3013  void *p = __builtin_memchr("foobar", 'b', 5);
3014
3015In addition to the above, one further builtin is provided:
3016
3017.. code-block:: c
3018
3019  char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
3020
3021``__builtin_char_memchr(a, b, c)`` is identical to
3022``(char*)__builtin_memchr(a, b, c)`` except that its use is permitted within
3023constant expressions in C++11 onwards (where a cast from ``void*`` to ``char*``
3024is disallowed in general).
3025
3026Constant evaluation support for the ``__builtin_mem*`` functions is provided
3027only for arrays of ``char``, ``signed char``, ``unsigned char``, or ``char8_t``,
3028despite these functions accepting an argument of type ``const void*``.
3029
3030Support for constant expression evaluation for the above builtins can be detected
3031with ``__has_feature(cxx_constexpr_string_builtins)``.
3032
3033Memory builtins
3034---------------
3035
3036Clang provides constant expression evaluation support for builtin forms of the
3037following functions from the C standard library headers
3038``<string.h>`` and ``<wchar.h>``:
3039
3040* ``memcpy``
3041* ``memmove``
3042* ``wmemcpy``
3043* ``wmemmove``
3044
3045In each case, the builtin form has the name of the C library function prefixed
3046by ``__builtin_``.
3047
3048Constant evaluation support is only provided when the source and destination
3049are pointers to arrays with the same trivially copyable element type, and the
3050given size is an exact multiple of the element size that is no greater than
3051the number of elements accessible through the source and destination operands.
3052
3053Guaranteed inlined copy
3054^^^^^^^^^^^^^^^^^^^^^^^
3055
3056.. code-block:: c
3057
3058  void __builtin_memcpy_inline(void *dst, const void *src, size_t size);
3059
3060
3061``__builtin_memcpy_inline`` has been designed as a building block for efficient
3062``memcpy`` implementations. It is identical to ``__builtin_memcpy`` but also
3063guarantees not to call any external functions. See LLVM IR `llvm.memcpy.inline
3064<https://llvm.org/docs/LangRef.html#llvm-memcpy-inline-intrinsic>`_ intrinsic
3065for more information.
3066
3067This is useful to implement a custom version of ``memcpy``, implement a
3068``libc`` memcpy or work around the absence of a ``libc``.
3069
3070Note that the `size` argument must be a compile time constant.
3071
3072Note that this intrinsic cannot yet be called in a ``constexpr`` context.
3073
3074
3075Atomic Min/Max builtins with memory ordering
3076--------------------------------------------
3077
3078There are two atomic builtins with min/max in-memory comparison and swap.
3079The syntax and semantics are similar to GCC-compatible __atomic_* builtins.
3080
3081* ``__atomic_fetch_min``
3082* ``__atomic_fetch_max``
3083
3084The builtins work with signed and unsigned integers and require to specify memory ordering.
3085The return value is the original value that was stored in memory before comparison.
3086
3087Example:
3088
3089.. code-block:: c
3090
3091  unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED);
3092
3093The third argument is one of the memory ordering specifiers ``__ATOMIC_RELAXED``,
3094``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``, ``__ATOMIC_RELEASE``,
3095``__ATOMIC_ACQ_REL``, or ``__ATOMIC_SEQ_CST`` following C++11 memory model semantics.
3096
3097In terms or aquire-release ordering barriers these two operations are always
3098considered as operations with *load-store* semantics, even when the original value
3099is not actually modified after comparison.
3100
3101.. _langext-__c11_atomic:
3102
3103__c11_atomic builtins
3104---------------------
3105
3106Clang provides a set of builtins which are intended to be used to implement
3107C11's ``<stdatomic.h>`` header.  These builtins provide the semantics of the
3108``_explicit`` form of the corresponding C11 operation, and are named with a
3109``__c11_`` prefix.  The supported operations, and the differences from
3110the corresponding C11 operations, are:
3111
3112* ``__c11_atomic_init``
3113* ``__c11_atomic_thread_fence``
3114* ``__c11_atomic_signal_fence``
3115* ``__c11_atomic_is_lock_free`` (The argument is the size of the
3116  ``_Atomic(...)`` object, instead of its address)
3117* ``__c11_atomic_store``
3118* ``__c11_atomic_load``
3119* ``__c11_atomic_exchange``
3120* ``__c11_atomic_compare_exchange_strong``
3121* ``__c11_atomic_compare_exchange_weak``
3122* ``__c11_atomic_fetch_add``
3123* ``__c11_atomic_fetch_sub``
3124* ``__c11_atomic_fetch_and``
3125* ``__c11_atomic_fetch_or``
3126* ``__c11_atomic_fetch_xor``
3127* ``__c11_atomic_fetch_nand`` (Nand is not presented in ``<stdatomic.h>``)
3128* ``__c11_atomic_fetch_max``
3129* ``__c11_atomic_fetch_min``
3130
3131The macros ``__ATOMIC_RELAXED``, ``__ATOMIC_CONSUME``, ``__ATOMIC_ACQUIRE``,
3132``__ATOMIC_RELEASE``, ``__ATOMIC_ACQ_REL``, and ``__ATOMIC_SEQ_CST`` are
3133provided, with values corresponding to the enumerators of C11's
3134``memory_order`` enumeration.
3135
3136(Note that Clang additionally provides GCC-compatible ``__atomic_*``
3137builtins and OpenCL 2.0 ``__opencl_atomic_*`` builtins. The OpenCL 2.0
3138atomic builtins are an explicit form of the corresponding OpenCL 2.0
3139builtin function, and are named with a ``__opencl_`` prefix. The macros
3140``__OPENCL_MEMORY_SCOPE_WORK_ITEM``, ``__OPENCL_MEMORY_SCOPE_WORK_GROUP``,
3141``__OPENCL_MEMORY_SCOPE_DEVICE``, ``__OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES``,
3142and ``__OPENCL_MEMORY_SCOPE_SUB_GROUP`` are provided, with values
3143corresponding to the enumerators of OpenCL's ``memory_scope`` enumeration.)
3144
3145Low-level ARM exclusive memory builtins
3146---------------------------------------
3147
3148Clang provides overloaded builtins giving direct access to the three key ARM
3149instructions for implementing atomic operations.
3150
3151.. code-block:: c
3152
3153  T __builtin_arm_ldrex(const volatile T *addr);
3154  T __builtin_arm_ldaex(const volatile T *addr);
3155  int __builtin_arm_strex(T val, volatile T *addr);
3156  int __builtin_arm_stlex(T val, volatile T *addr);
3157  void __builtin_arm_clrex(void);
3158
3159The types ``T`` currently supported are:
3160
3161* Integer types with width at most 64 bits (or 128 bits on AArch64).
3162* Floating-point types
3163* Pointer types.
3164
3165Note that the compiler does not guarantee it will not insert stores which clear
3166the exclusive monitor in between an ``ldrex`` type operation and its paired
3167``strex``. In practice this is only usually a risk when the extra store is on
3168the same cache line as the variable being modified and Clang will only insert
3169stack stores on its own, so it is best not to use these operations on variables
3170with automatic storage duration.
3171
3172Also, loads and stores may be implicit in code written between the ``ldrex`` and
3173``strex``. Clang will not necessarily mitigate the effects of these either, so
3174care should be exercised.
3175
3176For these reasons the higher level atomic primitives should be preferred where
3177possible.
3178
3179Non-temporal load/store builtins
3180--------------------------------
3181
3182Clang provides overloaded builtins allowing generation of non-temporal memory
3183accesses.
3184
3185.. code-block:: c
3186
3187  T __builtin_nontemporal_load(T *addr);
3188  void __builtin_nontemporal_store(T value, T *addr);
3189
3190The types ``T`` currently supported are:
3191
3192* Integer types.
3193* Floating-point types.
3194* Vector types.
3195
3196Note that the compiler does not guarantee that non-temporal loads or stores
3197will be used.
3198
3199C++ Coroutines support builtins
3200--------------------------------
3201
3202.. warning::
3203  This is a work in progress. Compatibility across Clang/LLVM releases is not
3204  guaranteed.
3205
3206Clang provides experimental builtins to support C++ Coroutines as defined by
3207https://wg21.link/P0057. The following four are intended to be used by the
3208standard library to implement the ``std::coroutine_handle`` type.
3209
3210**Syntax**:
3211
3212.. code-block:: c
3213
3214  void  __builtin_coro_resume(void *addr);
3215  void  __builtin_coro_destroy(void *addr);
3216  bool  __builtin_coro_done(void *addr);
3217  void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
3218
3219**Example of use**:
3220
3221.. code-block:: c++
3222
3223  template <> struct coroutine_handle<void> {
3224    void resume() const { __builtin_coro_resume(ptr); }
3225    void destroy() const { __builtin_coro_destroy(ptr); }
3226    bool done() const { return __builtin_coro_done(ptr); }
3227    // ...
3228  protected:
3229    void *ptr;
3230  };
3231
3232  template <typename Promise> struct coroutine_handle : coroutine_handle<> {
3233    // ...
3234    Promise &promise() const {
3235      return *reinterpret_cast<Promise *>(
3236        __builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
3237    }
3238    static coroutine_handle from_promise(Promise &promise) {
3239      coroutine_handle p;
3240      p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
3241                                                      /*from-promise=*/true);
3242      return p;
3243    }
3244  };
3245
3246
3247Other coroutine builtins are either for internal clang use or for use during
3248development of the coroutine feature. See `Coroutines in LLVM
3249<https://llvm.org/docs/Coroutines.html#intrinsics>`_ for
3250more information on their semantics. Note that builtins matching the intrinsics
3251that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc,
3252llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to
3253an appropriate value during the emission.
3254
3255**Syntax**:
3256
3257.. code-block:: c
3258
3259  size_t __builtin_coro_size()
3260  void  *__builtin_coro_frame()
3261  void  *__builtin_coro_free(void *coro_frame)
3262
3263  void  *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
3264  bool   __builtin_coro_alloc()
3265  void  *__builtin_coro_begin(void *memory)
3266  void   __builtin_coro_end(void *coro_frame, bool unwind)
3267  char   __builtin_coro_suspend(bool final)
3268
3269Note that there is no builtin matching the `llvm.coro.save` intrinsic. LLVM
3270automatically will insert one if the first argument to `llvm.coro.suspend` is
3271token `none`. If a user calls `__builin_suspend`, clang will insert `token none`
3272as the first argument to the intrinsic.
3273
3274Source location builtins
3275------------------------
3276
3277Clang provides experimental builtins to support C++ standard library implementation
3278of ``std::experimental::source_location`` as specified in  http://wg21.link/N4600.
3279With the exception of ``__builtin_COLUMN``, these builtins are also implemented by
3280GCC.
3281
3282**Syntax**:
3283
3284.. code-block:: c
3285
3286  const char *__builtin_FILE();
3287  const char *__builtin_FUNCTION();
3288  unsigned    __builtin_LINE();
3289  unsigned    __builtin_COLUMN(); // Clang only
3290
3291**Example of use**:
3292
3293.. code-block:: c++
3294
3295  void my_assert(bool pred, int line = __builtin_LINE(), // Captures line of caller
3296                 const char* file = __builtin_FILE(),
3297                 const char* function = __builtin_FUNCTION()) {
3298    if (pred) return;
3299    printf("%s:%d assertion failed in function %s\n", file, line, function);
3300    std::abort();
3301  }
3302
3303  struct MyAggregateType {
3304    int x;
3305    int line = __builtin_LINE(); // captures line where aggregate initialization occurs
3306  };
3307  static_assert(MyAggregateType{42}.line == __LINE__);
3308
3309  struct MyClassType {
3310    int line = __builtin_LINE(); // captures line of the constructor used during initialization
3311    constexpr MyClassType(int) { assert(line == __LINE__); }
3312  };
3313
3314**Description**:
3315
3316The builtins ``__builtin_LINE``, ``__builtin_FUNCTION``, and ``__builtin_FILE`` return
3317the values, at the "invocation point", for ``__LINE__``, ``__FUNCTION__``, and
3318``__FILE__`` respectively. These builtins are constant expressions.
3319
3320When the builtins appear as part of a default function argument the invocation
3321point is the location of the caller. When the builtins appear as part of a
3322default member initializer, the invocation point is the location of the
3323constructor or aggregate initialization used to create the object. Otherwise
3324the invocation point is the same as the location of the builtin.
3325
3326When the invocation point of ``__builtin_FUNCTION`` is not a function scope the
3327empty string is returned.
3328
3329Alignment builtins
3330------------------
3331Clang provides builtins to support checking and adjusting alignment of
3332pointers and integers.
3333These builtins can be used to avoid relying on implementation-defined behavior
3334of arithmetic on integers derived from pointers.
3335Additionally, these builtins retain type information and, unlike bitwise
3336arithmetic, they can perform semantic checking on the alignment value.
3337
3338**Syntax**:
3339
3340.. code-block:: c
3341
3342  Type __builtin_align_up(Type value, size_t alignment);
3343  Type __builtin_align_down(Type value, size_t alignment);
3344  bool __builtin_is_aligned(Type value, size_t alignment);
3345
3346
3347**Example of use**:
3348
3349.. code-block:: c++
3350
3351  char* global_alloc_buffer;
3352  void* my_aligned_allocator(size_t alloc_size, size_t alignment) {
3353    char* result = __builtin_align_up(global_alloc_buffer, alignment);
3354    // result now contains the value of global_alloc_buffer rounded up to the
3355    // next multiple of alignment.
3356    global_alloc_buffer = result + alloc_size;
3357    return result;
3358  }
3359
3360  void* get_start_of_page(void* ptr) {
3361    return __builtin_align_down(ptr, PAGE_SIZE);
3362  }
3363
3364  void example(char* buffer) {
3365     if (__builtin_is_aligned(buffer, 64)) {
3366       do_fast_aligned_copy(buffer);
3367     } else {
3368       do_unaligned_copy(buffer);
3369     }
3370  }
3371
3372  // In addition to pointers, the builtins can also be used on integer types
3373  // and are evaluatable inside constant expressions.
3374  static_assert(__builtin_align_up(123, 64) == 128, "");
3375  static_assert(__builtin_align_down(123u, 64) == 64u, "");
3376  static_assert(!__builtin_is_aligned(123, 64), "");
3377
3378
3379**Description**:
3380
3381The builtins ``__builtin_align_up``, ``__builtin_align_down``, return their
3382first argument aligned up/down to the next multiple of the second argument.
3383If the value is already sufficiently aligned, it is returned unchanged.
3384The builtin ``__builtin_is_aligned`` returns whether the first argument is
3385aligned to a multiple of the second argument.
3386All of these builtins expect the alignment to be expressed as a number of bytes.
3387
3388These builtins can be used for all integer types as well as (non-function)
3389pointer types. For pointer types, these builtins operate in terms of the integer
3390address of the pointer and return a new pointer of the same type (including
3391qualifiers such as ``const``) with an adjusted address.
3392When aligning pointers up or down, the resulting value must be within the same
3393underlying allocation or one past the end (see C17 6.5.6p8, C++ [expr.add]).
3394This means that arbitrary integer values stored in pointer-type variables must
3395not be passed to these builtins. For those use cases, the builtins can still be
3396used, but the operation must be performed on the pointer cast to ``uintptr_t``.
3397
3398If Clang can determine that the alignment is not a power of two at compile time,
3399it will result in a compilation failure. If the alignment argument is not a
3400power of two at run time, the behavior of these builtins is undefined.
3401
3402Non-standard C++11 Attributes
3403=============================
3404
3405Clang's non-standard C++11 attributes live in the ``clang`` attribute
3406namespace.
3407
3408Clang supports GCC's ``gnu`` attribute namespace. All GCC attributes which
3409are accepted with the ``__attribute__((foo))`` syntax are also accepted as
3410``[[gnu::foo]]``. This only extends to attributes which are specified by GCC
3411(see the list of `GCC function attributes
3412<https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable
3413attributes <https://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and
3414`GCC type attributes
3415<https://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC
3416implementation, these attributes must appertain to the *declarator-id* in a
3417declaration, which means they must go either at the start of the declaration or
3418immediately after the name being declared.
3419
3420For example, this applies the GNU ``unused`` attribute to ``a`` and ``f``, and
3421also applies the GNU ``noreturn`` attribute to ``f``.
3422
3423.. code-block:: c++
3424
3425  [[gnu::unused]] int a, f [[gnu::noreturn]] ();
3426
3427Target-Specific Extensions
3428==========================
3429
3430Clang supports some language features conditionally on some targets.
3431
3432ARM/AArch64 Language Extensions
3433-------------------------------
3434
3435Memory Barrier Intrinsics
3436^^^^^^^^^^^^^^^^^^^^^^^^^
3437Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined
3438in the `ARM C Language Extensions Release 2.0
3439<http://infocenter.arm.com/help/topic/com.arm.doc.ihi0053c/IHI0053C_acle_2_0.pdf>`_.
3440Note that these intrinsics are implemented as motion barriers that block
3441reordering of memory accesses and side effect instructions. Other instructions
3442like simple arithmetic may be reordered around the intrinsic. If you expect to
3443have no reordering at all, use inline assembly instead.
3444
3445X86/X86-64 Language Extensions
3446------------------------------
3447
3448The X86 backend has these language extensions:
3449
3450Memory references to specified segments
3451^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
3452
3453Annotating a pointer with address space #256 causes it to be code generated
3454relative to the X86 GS segment register, address space #257 causes it to be
3455relative to the X86 FS segment, and address space #258 causes it to be
3456relative to the X86 SS segment.  Note that this is a very very low-level
3457feature that should only be used if you know what you're doing (for example in
3458an OS kernel).
3459
3460Here is an example:
3461
3462.. code-block:: c++
3463
3464  #define GS_RELATIVE __attribute__((address_space(256)))
3465  int foo(int GS_RELATIVE *P) {
3466    return *P;
3467  }
3468
3469Which compiles to (on X86-32):
3470
3471.. code-block:: gas
3472
3473  _foo:
3474          movl    4(%esp), %eax
3475          movl    %gs:(%eax), %eax
3476          ret
3477
3478You can also use the GCC compatibility macros ``__seg_fs`` and ``__seg_gs`` for
3479the same purpose. The preprocessor symbols ``__SEG_FS`` and ``__SEG_GS``
3480indicate their support.
3481
3482PowerPC Language Extensions
3483---------------------------
3484
3485Set the Floating Point Rounding Mode
3486^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
3487PowerPC64/PowerPC64le supports the builtin function ``__builtin_setrnd`` to set
3488the floating point rounding mode. This function will use the least significant
3489two bits of integer argument to set the floating point rounding mode.
3490
3491.. code-block:: c++
3492
3493  double __builtin_setrnd(int mode);
3494
3495The effective values for mode are:
3496
3497    - 0 - round to nearest
3498    - 1 - round to zero
3499    - 2 - round to +infinity
3500    - 3 - round to -infinity
3501
3502Note that the mode argument will modulo 4, so if the integer argument is greater
3503than 3, it will only use the least significant two bits of the mode.
3504Namely, ``__builtin_setrnd(102))`` is equal to ``__builtin_setrnd(2)``.
3505
3506PowerPC cache builtins
3507^^^^^^^^^^^^^^^^^^^^^^
3508
3509The PowerPC architecture specifies instructions implementing cache operations.
3510Clang provides builtins that give direct programmer access to these cache
3511instructions.
3512
3513Currently the following builtins are implemented in clang:
3514
3515``__builtin_dcbf`` copies the contents of a modified block from the data cache
3516to main memory and flushes the copy from the data cache.
3517
3518**Syntax**:
3519
3520.. code-block:: c
3521
3522  void __dcbf(const void* addr); /* Data Cache Block Flush */
3523
3524**Example of Use**:
3525
3526.. code-block:: c
3527
3528  int a = 1;
3529  __builtin_dcbf (&a);
3530
3531Extensions for Static Analysis
3532==============================
3533
3534Clang supports additional attributes that are useful for documenting program
3535invariants and rules for static analysis tools, such as the `Clang Static
3536Analyzer <https://clang-analyzer.llvm.org/>`_. These attributes are documented
3537in the analyzer's `list of source-level annotations
3538<https://clang-analyzer.llvm.org/annotations.html>`_.
3539
3540
3541Extensions for Dynamic Analysis
3542===============================
3543
3544Use ``__has_feature(address_sanitizer)`` to check if the code is being built
3545with :doc:`AddressSanitizer`.
3546
3547Use ``__has_feature(thread_sanitizer)`` to check if the code is being built
3548with :doc:`ThreadSanitizer`.
3549
3550Use ``__has_feature(memory_sanitizer)`` to check if the code is being built
3551with :doc:`MemorySanitizer`.
3552
3553Use ``__has_feature(safe_stack)`` to check if the code is being built
3554with :doc:`SafeStack`.
3555
3556
3557Extensions for selectively disabling optimization
3558=================================================
3559
3560Clang provides a mechanism for selectively disabling optimizations in functions
3561and methods.
3562
3563To disable optimizations in a single function definition, the GNU-style or C++11
3564non-standard attribute ``optnone`` can be used.
3565
3566.. code-block:: c++
3567
3568  // The following functions will not be optimized.
3569  // GNU-style attribute
3570  __attribute__((optnone)) int foo() {
3571    // ... code
3572  }
3573  // C++11 attribute
3574  [[clang::optnone]] int bar() {
3575    // ... code
3576  }
3577
3578To facilitate disabling optimization for a range of function definitions, a
3579range-based pragma is provided. Its syntax is ``#pragma clang optimize``
3580followed by ``off`` or ``on``.
3581
3582All function definitions in the region between an ``off`` and the following
3583``on`` will be decorated with the ``optnone`` attribute unless doing so would
3584conflict with explicit attributes already present on the function (e.g. the
3585ones that control inlining).
3586
3587.. code-block:: c++
3588
3589  #pragma clang optimize off
3590  // This function will be decorated with optnone.
3591  int foo() {
3592    // ... code
3593  }
3594
3595  // optnone conflicts with always_inline, so bar() will not be decorated.
3596  __attribute__((always_inline)) int bar() {
3597    // ... code
3598  }
3599  #pragma clang optimize on
3600
3601If no ``on`` is found to close an ``off`` region, the end of the region is the
3602end of the compilation unit.
3603
3604Note that a stray ``#pragma clang optimize on`` does not selectively enable
3605additional optimizations when compiling at low optimization levels. This feature
3606can only be used to selectively disable optimizations.
3607
3608The pragma has an effect on functions only at the point of their definition; for
3609function templates, this means that the state of the pragma at the point of an
3610instantiation is not necessarily relevant. Consider the following example:
3611
3612.. code-block:: c++
3613
3614  template<typename T> T twice(T t) {
3615    return 2 * t;
3616  }
3617
3618  #pragma clang optimize off
3619  template<typename T> T thrice(T t) {
3620    return 3 * t;
3621  }
3622
3623  int container(int a, int b) {
3624    return twice(a) + thrice(b);
3625  }
3626  #pragma clang optimize on
3627
3628In this example, the definition of the template function ``twice`` is outside
3629the pragma region, whereas the definition of ``thrice`` is inside the region.
3630The ``container`` function is also in the region and will not be optimized, but
3631it causes the instantiation of ``twice`` and ``thrice`` with an ``int`` type; of
3632these two instantiations, ``twice`` will be optimized (because its definition
3633was outside the region) and ``thrice`` will not be optimized.
3634
3635Extensions for loop hint optimizations
3636======================================
3637
3638The ``#pragma clang loop`` directive is used to specify hints for optimizing the
3639subsequent for, while, do-while, or c++11 range-based for loop. The directive
3640provides options for vectorization, interleaving, predication, unrolling and
3641distribution. Loop hints can be specified before any loop and will be ignored if
3642the optimization is not safe to apply.
3643
3644There are loop hints that control transformations (e.g. vectorization, loop
3645unrolling) and there are loop hints that set transformation options (e.g.
3646``vectorize_width``, ``unroll_count``).  Pragmas setting transformation options
3647imply the transformation is enabled, as if it was enabled via the corresponding
3648transformation pragma (e.g. ``vectorize(enable)``). If the transformation is
3649disabled  (e.g. ``vectorize(disable)``), that takes precedence over
3650transformations option pragmas implying that transformation.
3651
3652Vectorization, Interleaving, and Predication
3653--------------------------------------------
3654
3655A vectorized loop performs multiple iterations of the original loop
3656in parallel using vector instructions. The instruction set of the target
3657processor determines which vector instructions are available and their vector
3658widths. This restricts the types of loops that can be vectorized. The vectorizer
3659automatically determines if the loop is safe and profitable to vectorize. A
3660vector instruction cost model is used to select the vector width.
3661
3662Interleaving multiple loop iterations allows modern processors to further
3663improve instruction-level parallelism (ILP) using advanced hardware features,
3664such as multiple execution units and out-of-order execution. The vectorizer uses
3665a cost model that depends on the register pressure and generated code size to
3666select the interleaving count.
3667
3668Vectorization is enabled by ``vectorize(enable)`` and interleaving is enabled
3669by ``interleave(enable)``. This is useful when compiling with ``-Os`` to
3670manually enable vectorization or interleaving.
3671
3672.. code-block:: c++
3673
3674  #pragma clang loop vectorize(enable)
3675  #pragma clang loop interleave(enable)
3676  for(...) {
3677    ...
3678  }
3679
3680The vector width is specified by
3681``vectorize_width(_value_[, fixed|scalable])``, where _value_ is a positive
3682integer and the type of vectorization can be specified with an optional
3683second parameter. The default for the second parameter is 'fixed' and
3684refers to fixed width vectorization, whereas 'scalable' indicates the
3685compiler should use scalable vectors instead. Another use of vectorize_width
3686is ``vectorize_width(fixed|scalable)`` where the user can hint at the type
3687of vectorization to use without specifying the exact width. In both variants
3688of the pragma the vectorizer may decide to fall back on fixed width
3689vectorization if the target does not support scalable vectors.
3690
3691The interleave count is specified by ``interleave_count(_value_)``, where
3692_value_ is a positive integer. This is useful for specifying the optimal
3693width/count of the set of target architectures supported by your application.
3694
3695.. code-block:: c++
3696
3697  #pragma clang loop vectorize_width(2)
3698  #pragma clang loop interleave_count(2)
3699  for(...) {
3700    ...
3701  }
3702
3703Specifying a width/count of 1 disables the optimization, and is equivalent to
3704``vectorize(disable)`` or ``interleave(disable)``.
3705
3706Vector predication is enabled by ``vectorize_predicate(enable)``, for example:
3707
3708.. code-block:: c++
3709
3710  #pragma clang loop vectorize(enable)
3711  #pragma clang loop vectorize_predicate(enable)
3712  for(...) {
3713    ...
3714  }
3715
3716This predicates (masks) all instructions in the loop, which allows the scalar
3717remainder loop (the tail) to be folded into the main vectorized loop. This
3718might be more efficient when vector predication is efficiently supported by the
3719target platform.
3720
3721Loop Unrolling
3722--------------
3723
3724Unrolling a loop reduces the loop control overhead and exposes more
3725opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling
3726eliminates the loop and replaces it with an enumerated sequence of loop
3727iterations. Full unrolling is only possible if the loop trip count is known at
3728compile time. Partial unrolling replicates the loop body within the loop and
3729reduces the trip count.
3730
3731If ``unroll(enable)`` is specified the unroller will attempt to fully unroll the
3732loop if the trip count is known at compile time. If the fully unrolled code size
3733is greater than an internal limit the loop will be partially unrolled up to this
3734limit. If the trip count is not known at compile time the loop will be partially
3735unrolled with a heuristically chosen unroll factor.
3736
3737.. code-block:: c++
3738
3739  #pragma clang loop unroll(enable)
3740  for(...) {
3741    ...
3742  }
3743
3744If ``unroll(full)`` is specified the unroller will attempt to fully unroll the
3745loop if the trip count is known at compile time identically to
3746``unroll(enable)``. However, with ``unroll(full)`` the loop will not be unrolled
3747if the loop count is not known at compile time.
3748
3749.. code-block:: c++
3750
3751  #pragma clang loop unroll(full)
3752  for(...) {
3753    ...
3754  }
3755
3756The unroll count can be specified explicitly with ``unroll_count(_value_)`` where
3757_value_ is a positive integer. If this value is greater than the trip count the
3758loop will be fully unrolled. Otherwise the loop is partially unrolled subject
3759to the same code size limit as with ``unroll(enable)``.
3760
3761.. code-block:: c++
3762
3763  #pragma clang loop unroll_count(8)
3764  for(...) {
3765    ...
3766  }
3767
3768Unrolling of a loop can be prevented by specifying ``unroll(disable)``.
3769
3770Loop unroll parameters can be controlled by options
3771`-mllvm -unroll-count=n` and `-mllvm -pragma-unroll-threshold=n`.
3772
3773Loop Distribution
3774-----------------
3775
3776Loop Distribution allows splitting a loop into multiple loops.  This is
3777beneficial for example when the entire loop cannot be vectorized but some of the
3778resulting loops can.
3779
3780If ``distribute(enable))`` is specified and the loop has memory dependencies
3781that inhibit vectorization, the compiler will attempt to isolate the offending
3782operations into a new loop.  This optimization is not enabled by default, only
3783loops marked with the pragma are considered.
3784
3785.. code-block:: c++
3786
3787  #pragma clang loop distribute(enable)
3788  for (i = 0; i < N; ++i) {
3789    S1: A[i + 1] = A[i] + B[i];
3790    S2: C[i] = D[i] * E[i];
3791  }
3792
3793This loop will be split into two loops between statements S1 and S2.  The
3794second loop containing S2 will be vectorized.
3795
3796Loop Distribution is currently not enabled by default in the optimizer because
3797it can hurt performance in some cases.  For example, instruction-level
3798parallelism could be reduced by sequentializing the execution of the
3799statements S1 and S2 above.
3800
3801If Loop Distribution is turned on globally with
3802``-mllvm -enable-loop-distribution``, specifying ``distribute(disable)`` can
3803be used the disable it on a per-loop basis.
3804
3805Additional Information
3806----------------------
3807
3808For convenience multiple loop hints can be specified on a single line.
3809
3810.. code-block:: c++
3811
3812  #pragma clang loop vectorize_width(4) interleave_count(8)
3813  for(...) {
3814    ...
3815  }
3816
3817If an optimization cannot be applied any hints that apply to it will be ignored.
3818For example, the hint ``vectorize_width(4)`` is ignored if the loop is not
3819proven safe to vectorize. To identify and diagnose optimization issues use
3820`-Rpass`, `-Rpass-missed`, and `-Rpass-analysis` command line options. See the
3821user guide for details.
3822
3823Extensions to specify floating-point flags
3824====================================================
3825
3826The ``#pragma clang fp`` pragma allows floating-point options to be specified
3827for a section of the source code. This pragma can only appear at file scope or
3828at the start of a compound statement (excluding comments). When using within a
3829compound statement, the pragma is active within the scope of the compound
3830statement.
3831
3832Currently, the following settings can be controlled with this pragma:
3833
3834``#pragma clang fp reassociate`` allows control over the reassociation
3835of floating point expressions. When enabled, this pragma allows the expression
3836``x + (y + z)`` to be reassociated as ``(x + y) + z``.
3837Reassociation can also occur across multiple statements.
3838This pragma can be used to disable reassociation when it is otherwise
3839enabled for the translation unit with the ``-fassociative-math`` flag.
3840The pragma can take two values: ``on`` and ``off``.
3841
3842.. code-block:: c++
3843
3844  float f(float x, float y, float z)
3845  {
3846    // Enable floating point reassociation across statements
3847    #pragma clang fp reassociate(on)
3848    float t = x + y;
3849    float v = t + z;
3850  }
3851
3852
3853``#pragma clang fp contract`` specifies whether the compiler should
3854contract a multiply and an addition (or subtraction) into a fused FMA
3855operation when supported by the target.
3856
3857The pragma can take three values: ``on``, ``fast`` and ``off``.  The ``on``
3858option is identical to using ``#pragma STDC FP_CONTRACT(ON)`` and it allows
3859fusion as specified the language standard.  The ``fast`` option allows fusion
3860in cases when the language standard does not make this possible (e.g. across
3861statements in C).
3862
3863.. code-block:: c++
3864
3865  for(...) {
3866    #pragma clang fp contract(fast)
3867    a = b[i] * c[i];
3868    d[i] += a;
3869  }
3870
3871
3872The pragma can also be used with ``off`` which turns FP contraction off for a
3873section of the code. This can be useful when fast contraction is otherwise
3874enabled for the translation unit with the ``-ffp-contract=fast-honor-pragmas`` flag.
3875Note that ``-ffp-contract=fast`` will override pragmas to fuse multiply and
3876addition across statements regardless of any controlling pragmas.
3877
3878``#pragma clang fp exceptions`` specifies floating point exception behavior. It
3879may take one the the values: ``ignore``, ``maytrap`` or ``strict``. Meaning of
3880these values is same as for `constrained floating point intrinsics <http://llvm.org/docs/LangRef.html#constrained-floating-point-intrinsics>`_.
3881
3882.. code-block:: c++
3883
3884  {
3885    // Preserve floating point exceptions
3886    #pragma clang fp exceptions(strict)
3887    z = x + y;
3888    if (fetestexcept(FE_OVERFLOW))
3889	  ...
3890  }
3891
3892A ``#pragma clang fp`` pragma may contain any number of options:
3893
3894.. code-block:: c++
3895
3896  void func(float *dest, float a, float b) {
3897    #pragma clang fp exceptions(maytrap) contract(fast) reassociate(on)
3898    ...
3899  }
3900
3901
3902The ``#pragma float_control`` pragma allows precise floating-point
3903semantics and floating-point exception behavior to be specified
3904for a section of the source code. This pragma can only appear at file or
3905namespace scope, within a language linkage specification or at the start of a
3906compound statement (excluding comments). When used within a compound statement,
3907the pragma is active within the scope of the compound statement.  This pragma
3908is modeled after a Microsoft pragma with the same spelling and syntax.  For
3909pragmas specified at file or namespace scope, or within a language linkage
3910specification, a stack is supported so that the ``pragma float_control``
3911settings can be pushed or popped.
3912
3913When ``pragma float_control(precise, on)`` is enabled, the section of code
3914governed by the pragma uses precise floating point semantics, effectively
3915``-ffast-math`` is disabled and ``-ffp-contract=on``
3916(fused multiply add) is enabled.
3917
3918When ``pragma float_control(except, on)`` is enabled, the section of code
3919governed by the pragma behaves as though the command-line option
3920``-ffp-exception-behavior=strict`` is enabled,
3921when ``pragma float_control(except, off)`` is enabled, the section of code
3922governed by the pragma behaves as though the command-line option
3923``-ffp-exception-behavior=ignore`` is enabled.
3924
3925The full syntax this pragma supports is
3926``float_control(except|precise, on|off [, push])`` and
3927``float_control(push|pop)``.
3928The ``push`` and ``pop`` forms, including using ``push`` as the optional
3929third argument, can only occur at file scope.
3930
3931.. code-block:: c++
3932
3933  for(...) {
3934    // This block will be compiled with -fno-fast-math and -ffp-contract=on
3935    #pragma float_control(precise, on)
3936    a = b[i] * c[i] + e;
3937  }
3938
3939Specifying an attribute for multiple declarations (#pragma clang attribute)
3940===========================================================================
3941
3942The ``#pragma clang attribute`` directive can be used to apply an attribute to
3943multiple declarations. The ``#pragma clang attribute push`` variation of the
3944directive pushes a new "scope" of ``#pragma clang attribute`` that attributes
3945can be added to. The ``#pragma clang attribute (...)`` variation adds an
3946attribute to that scope, and the ``#pragma clang attribute pop`` variation pops
3947the scope. You can also use ``#pragma clang attribute push (...)``, which is a
3948shorthand for when you want to add one attribute to a new scope. Multiple push
3949directives can be nested inside each other.
3950
3951The attributes that are used in the ``#pragma clang attribute`` directives
3952can be written using the GNU-style syntax:
3953
3954.. code-block:: c++
3955
3956  #pragma clang attribute push (__attribute__((annotate("custom"))), apply_to = function)
3957
3958  void function(); // The function now has the annotate("custom") attribute
3959
3960  #pragma clang attribute pop
3961
3962The attributes can also be written using the C++11 style syntax:
3963
3964.. code-block:: c++
3965
3966  #pragma clang attribute push ([[noreturn]], apply_to = function)
3967
3968  void function(); // The function now has the [[noreturn]] attribute
3969
3970  #pragma clang attribute pop
3971
3972The ``__declspec`` style syntax is also supported:
3973
3974.. code-block:: c++
3975
3976  #pragma clang attribute push (__declspec(dllexport), apply_to = function)
3977
3978  void function(); // The function now has the __declspec(dllexport) attribute
3979
3980  #pragma clang attribute pop
3981
3982A single push directive accepts only one attribute regardless of the syntax
3983used.
3984
3985Because multiple push directives can be nested, if you're writing a macro that
3986expands to ``_Pragma("clang attribute")`` it's good hygiene (though not
3987required) to add a namespace to your push/pop directives. A pop directive with a
3988namespace will pop the innermost push that has that same namespace. This will
3989ensure that another macro's ``pop`` won't inadvertently pop your attribute. Note
3990that an ``pop`` without a namespace will pop the innermost ``push`` without a
3991namespace. ``push``es with a namespace can only be popped by ``pop`` with the
3992same namespace. For instance:
3993
3994.. code-block:: c++
3995
3996   #define ASSUME_NORETURN_BEGIN _Pragma("clang attribute AssumeNoreturn.push ([[noreturn]], apply_to = function)")
3997   #define ASSUME_NORETURN_END   _Pragma("clang attribute AssumeNoreturn.pop")
3998
3999   #define ASSUME_UNAVAILABLE_BEGIN _Pragma("clang attribute Unavailable.push (__attribute__((unavailable)), apply_to=function)")
4000   #define ASSUME_UNAVAILABLE_END   _Pragma("clang attribute Unavailable.pop")
4001
4002
4003   ASSUME_NORETURN_BEGIN
4004   ASSUME_UNAVAILABLE_BEGIN
4005   void function(); // function has [[noreturn]] and __attribute__((unavailable))
4006   ASSUME_NORETURN_END
4007   void other_function(); // function has __attribute__((unavailable))
4008   ASSUME_UNAVAILABLE_END
4009
4010Without the namespaces on the macros, ``other_function`` will be annotated with
4011``[[noreturn]]`` instead of ``__attribute__((unavailable))``. This may seem like
4012a contrived example, but its very possible for this kind of situation to appear
4013in real code if the pragmas are spread out across a large file. You can test if
4014your version of clang supports namespaces on ``#pragma clang attribute`` with
4015``__has_extension(pragma_clang_attribute_namespaces)``.
4016
4017Subject Match Rules
4018-------------------
4019
4020The set of declarations that receive a single attribute from the attribute stack
4021depends on the subject match rules that were specified in the pragma. Subject
4022match rules are specified after the attribute. The compiler expects an
4023identifier that corresponds to the subject set specifier. The ``apply_to``
4024specifier is currently the only supported subject set specifier. It allows you
4025to specify match rules that form a subset of the attribute's allowed subject
4026set, i.e. the compiler doesn't require all of the attribute's subjects. For
4027example, an attribute like ``[[nodiscard]]`` whose subject set includes
4028``enum``, ``record`` and ``hasType(functionType)``, requires the presence of at
4029least one of these rules after ``apply_to``:
4030
4031.. code-block:: c++
4032
4033  #pragma clang attribute push([[nodiscard]], apply_to = enum)
4034
4035  enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]]
4036
4037  struct Record1 { }; // The struct will *not* receive [[nodiscard]]
4038
4039  #pragma clang attribute pop
4040
4041  #pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))
4042
4043  enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]]
4044
4045  struct Record2 { }; // The struct *will* receive [[nodiscard]]
4046
4047  #pragma clang attribute pop
4048
4049  // This is an error, since [[nodiscard]] can't be applied to namespaces:
4050  #pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))
4051
4052  #pragma clang attribute pop
4053
4054Multiple match rules can be specified using the ``any`` match rule, as shown
4055in the example above. The ``any`` rule applies attributes to all declarations
4056that are matched by at least one of the rules in the ``any``. It doesn't nest
4057and can't be used inside the other match rules. Redundant match rules or rules
4058that conflict with one another should not be used inside of ``any``. Failing to
4059specify a rule within the ``any`` rule results in an error.
4060
4061Clang supports the following match rules:
4062
4063- ``function``: Can be used to apply attributes to functions. This includes C++
4064  member functions, static functions, operators, and constructors/destructors.
4065
4066- ``function(is_member)``: Can be used to apply attributes to C++ member
4067  functions. This includes members like static functions, operators, and
4068  constructors/destructors.
4069
4070- ``hasType(functionType)``: Can be used to apply attributes to functions, C++
4071  member functions, and variables/fields whose type is a function pointer. It
4072  does not apply attributes to Objective-C methods or blocks.
4073
4074- ``type_alias``: Can be used to apply attributes to ``typedef`` declarations
4075  and C++11 type aliases.
4076
4077- ``record``: Can be used to apply attributes to ``struct``, ``class``, and
4078  ``union`` declarations.
4079
4080- ``record(unless(is_union))``: Can be used to apply attributes only to
4081  ``struct`` and ``class`` declarations.
4082
4083- ``enum``: Can be be used to apply attributes to enumeration declarations.
4084
4085- ``enum_constant``: Can be used to apply attributes to enumerators.
4086
4087- ``variable``: Can be used to apply attributes to variables, including
4088  local variables, parameters, global variables, and static member variables.
4089  It does not apply attributes to instance member variables or Objective-C
4090  ivars.
4091
4092- ``variable(is_thread_local)``: Can be used to apply attributes to thread-local
4093  variables only.
4094
4095- ``variable(is_global)``: Can be used to apply attributes to global variables
4096  only.
4097
4098- ``variable(is_local)``: Can be used to apply attributes to local variables
4099  only.
4100
4101- ``variable(is_parameter)``: Can be used to apply attributes to parameters
4102  only.
4103
4104- ``variable(unless(is_parameter))``: Can be used to apply attributes to all
4105  the variables that are not parameters.
4106
4107- ``field``: Can be used to apply attributes to non-static member variables
4108  in a record. This includes Objective-C ivars.
4109
4110- ``namespace``: Can be used to apply attributes to ``namespace`` declarations.
4111
4112- ``objc_interface``: Can be used to apply attributes to ``@interface``
4113  declarations.
4114
4115- ``objc_protocol``: Can be used to apply attributes to ``@protocol``
4116  declarations.
4117
4118- ``objc_category``: Can be used to apply attributes to category declarations,
4119  including class extensions.
4120
4121- ``objc_method``: Can be used to apply attributes to Objective-C methods,
4122  including instance and class methods. Implicit methods like implicit property
4123  getters and setters do not receive the attribute.
4124
4125- ``objc_method(is_instance)``: Can be used to apply attributes to Objective-C
4126  instance methods.
4127
4128- ``objc_property``: Can be used to apply attributes to ``@property``
4129  declarations.
4130
4131- ``block``: Can be used to apply attributes to block declarations. This does
4132  not include variables/fields of block pointer type.
4133
4134The use of ``unless`` in match rules is currently restricted to a strict set of
4135sub-rules that are used by the supported attributes. That means that even though
4136``variable(unless(is_parameter))`` is a valid match rule,
4137``variable(unless(is_thread_local))`` is not.
4138
4139Supported Attributes
4140--------------------
4141
4142Not all attributes can be used with the ``#pragma clang attribute`` directive.
4143Notably, statement attributes like ``[[fallthrough]]`` or type attributes
4144like ``address_space`` aren't supported by this directive. You can determine
4145whether or not an attribute is supported by the pragma by referring to the
4146:doc:`individual documentation for that attribute <AttributeReference>`.
4147
4148The attributes are applied to all matching declarations individually, even when
4149the attribute is semantically incorrect. The attributes that aren't applied to
4150any declaration are not verified semantically.
4151
4152Specifying section names for global objects (#pragma clang section)
4153===================================================================
4154
4155The ``#pragma clang section`` directive provides a means to assign section-names
4156to global variables, functions and static variables.
4157
4158The section names can be specified as:
4159
4160.. code-block:: c++
4161
4162  #pragma clang section bss="myBSS" data="myData" rodata="myRodata" relro="myRelro" text="myText"
4163
4164The section names can be reverted back to default name by supplying an empty
4165string to the section kind, for example:
4166
4167.. code-block:: c++
4168
4169  #pragma clang section bss="" data="" text="" rodata="" relro=""
4170
4171The ``#pragma clang section`` directive obeys the following rules:
4172
4173* The pragma applies to all global variable, statics and function declarations
4174  from the pragma to the end of the translation unit.
4175
4176* The pragma clang section is enabled automatically, without need of any flags.
4177
4178* This feature is only defined to work sensibly for ELF targets.
4179
4180* If section name is specified through _attribute_((section("myname"))), then
4181  the attribute name gains precedence.
4182
4183* Global variables that are initialized to zero will be placed in the named
4184  bss section, if one is present.
4185
4186* The ``#pragma clang section`` directive does not does try to infer section-kind
4187  from the name. For example, naming a section "``.bss.mySec``" does NOT mean
4188  it will be a bss section name.
4189
4190* The decision about which section-kind applies to each global is taken in the back-end.
4191  Once the section-kind is known, appropriate section name, as specified by the user using
4192  ``#pragma clang section`` directive, is applied to that global.
4193
4194Specifying Linker Options on ELF Targets
4195========================================
4196
4197The ``#pragma comment(lib, ...)`` directive is supported on all ELF targets.
4198The second parameter is the library name (without the traditional Unix prefix of
4199``lib``).  This allows you to provide an implicit link of dependent libraries.
4200
4201Evaluating Object Size Dynamically
4202==================================
4203
4204Clang supports the builtin ``__builtin_dynamic_object_size``, the semantics are
4205the same as GCC's ``__builtin_object_size`` (which Clang also supports), but
4206``__builtin_dynamic_object_size`` can evaluate the object's size at runtime.
4207``__builtin_dynamic_object_size`` is meant to be used as a drop-in replacement
4208for ``__builtin_object_size`` in libraries that support it.
4209
4210For instance, here is a program that ``__builtin_dynamic_object_size`` will make
4211safer:
4212
4213.. code-block:: c
4214
4215  void copy_into_buffer(size_t size) {
4216    char* buffer = malloc(size);
4217    strlcpy(buffer, "some string", strlen("some string"));
4218    // Previous line preprocesses to:
4219    // __builtin___strlcpy_chk(buffer, "some string", strlen("some string"), __builtin_object_size(buffer, 0))
4220  }
4221
4222Since the size of ``buffer`` can't be known at compile time, Clang will fold
4223``__builtin_object_size(buffer, 0)`` into ``-1``. However, if this was written
4224as ``__builtin_dynamic_object_size(buffer, 0)``, Clang will fold it into
4225``size``, providing some extra runtime safety.
4226
4227Deprecating Macros
4228==================
4229
4230Clang supports the pragma ``#pragma clang deprecated``, which can be used to
4231provide deprecation warnings for macro uses. For example:
4232
4233.. code-block:: c
4234
4235   #define MIN(x, y) x < y ? x : y
4236   #pragma clang deprecated(MIN, "use std::min instead")
4237
4238   void min(int a, int b) {
4239     return MIN(a, b); // warning: MIN is deprecated: use std::min instead
4240   }
4241
4242``#pragma clang deprecated`` should be preferred for this purpose over
4243``#pragma GCC warning`` because the warning can be controlled with
4244``-Wdeprecated``.
4245
4246Restricted Expansion Macros
4247===========================
4248
4249Clang supports the pragma ``#pragma clang restrict_expansion``, which can be
4250used restrict macro expansion in headers. This can be valuable when providing
4251headers with ABI stability requirements. Any expansion of the annotated macro
4252processed by the preprocessor after the ``#pragma`` annotation will log a
4253warning. Redefining the macro or undefining the macro will not be diagnosed, nor
4254will expansion of the macro within the main source file. For example:
4255
4256.. code-block:: c
4257
4258   #define TARGET_ARM 1
4259   #pragma clang restrict_expansion(TARGET_ARM, "<reason>")
4260
4261   /// Foo.h
4262   struct Foo {
4263   #if TARGET_ARM // warning: TARGET_ARM is marked unsafe in headers: <reason>
4264     uint32_t X;
4265   #else
4266     uint64_t X;
4267   #endif
4268   };
4269
4270   /// main.c
4271   #include "foo.h"
4272   #if TARGET_ARM // No warning in main source file
4273   X_TYPE uint32_t
4274   #else
4275   X_TYPE uint64_t
4276   #endif
4277
4278This warning is controlled by ``-Wpedantic-macros``.
4279
4280Final Macros
4281============
4282
4283Clang supports the pragma ``#pragma clang final``, which can be used to
4284mark macros as final, meaning they cannot be undef'd or re-defined. For example:
4285
4286.. code-block:: c
4287
4288   #define FINAL_MACRO 1
4289   #pragma clang final(FINAL_MACRO)
4290
4291   #define FINAL_MACRO // warning: FINAL_MACRO is marked final and should not be redefined
4292   #undef FINAL_MACRO  // warning: FINAL_MACRO is marked final and should not be undefined
4293
4294This is useful for enforcing system-provided macros that should not be altered
4295in user headers or code. This is controlled by ``-Wpedantic-macros``. Final
4296macros will always warn on redefinition, including situations with identical
4297bodies and in system headers.
4298
4299Line Control
4300============
4301
4302Clang supports an extension for source line control, which takes the
4303form of a preprocessor directive starting with an unsigned integral
4304constant. In addition to the standard ``#line`` directive, this form
4305allows control of an include stack and header file type, which is used
4306in issuing diagnostics. These lines are emitted in preprocessed
4307output.
4308
4309.. code-block:: c
4310
4311   # <line:number> <filename:string> <header-type:numbers>
4312
4313The filename is optional, and if unspecified indicates no change in
4314source filename. The header-type is an optional, whitespace-delimited,
4315sequence of magic numbers as follows.
4316
4317* ``1:`` Push the current source file name onto the include stack and
4318  enter a new file.
4319
4320* ``2``: Pop the include stack and return to the specified file. If
4321  the filename is ``""``, the name popped from the include stack is
4322  used. Otherwise there is no requirement that the specified filename
4323  matches the current source when originally pushed.
4324
4325* ``3``: Enter a system-header region. System headers often contain
4326  implementation-specific source that would normally emit a diagnostic.
4327
4328* ``4``: Enter an implicit ``extern "C"`` region. This is not required on
4329  modern systems where system headers are C++-aware.
4330
4331At most a single ``1`` or ``2`` can be present, and values must be in
4332ascending order.
4333
4334Examples are:
4335
4336.. code-block:: c
4337
4338   # 57 // Advance (or return) to line 57 of the current source file
4339   # 57 "frob" // Set to line 57 of "frob"
4340   # 1 "foo.h" 1 // Enter "foo.h" at line 1
4341   # 59 "main.c" 2 // Leave current include and return to "main.c"
4342   # 1 "/usr/include/stdio.h" 1 3 // Enter a system header
4343   # 60 "" 2 // return to "main.c"
4344   # 1 "/usr/ancient/header.h" 1 4 // Enter an implicit extern "C" header
4345
4346Extended Integer Types
4347======================
4348
4349Clang supports the C23 ``_BitInt(N)`` feature as an extension in older C modes
4350and in C++. This type was previously implemented in Clang with the same
4351semantics, but spelled ``_ExtInt(N)``. This spelling has been deprecated in
4352favor of the standard type.
4353
4354Note: the ABI for ``_BitInt(N)`` is still in the process of being stabilized,
4355so this type should not yet be used in interfaces that require ABI stability.
4356
4357Intrinsics Support within Constant Expressions
4358==============================================
4359
4360The following builtin intrinsics can be used in constant expressions:
4361
4362* ``__builtin_bitreverse8``
4363* ``__builtin_bitreverse16``
4364* ``__builtin_bitreverse32``
4365* ``__builtin_bitreverse64``
4366* ``__builtin_bswap16``
4367* ``__builtin_bswap32``
4368* ``__builtin_bswap64``
4369* ``__builtin_clrsb``
4370* ``__builtin_clrsbl``
4371* ``__builtin_clrsbll``
4372* ``__builtin_clz``
4373* ``__builtin_clzl``
4374* ``__builtin_clzll``
4375* ``__builtin_clzs``
4376* ``__builtin_ctz``
4377* ``__builtin_ctzl``
4378* ``__builtin_ctzll``
4379* ``__builtin_ctzs``
4380* ``__builtin_ffs``
4381* ``__builtin_ffsl``
4382* ``__builtin_ffsll``
4383* ``__builtin_fpclassify``
4384* ``__builtin_inf``
4385* ``__builtin_isinf``
4386* ``__builtin_isinf_sign``
4387* ``__builtin_isfinite``
4388* ``__builtin_isnan``
4389* ``__builtin_isnormal``
4390* ``__builtin_nan``
4391* ``__builtin_nans``
4392* ``__builtin_parity``
4393* ``__builtin_parityl``
4394* ``__builtin_parityll``
4395* ``__builtin_popcount``
4396* ``__builtin_popcountl``
4397* ``__builtin_popcountll``
4398* ``__builtin_rotateleft8``
4399* ``__builtin_rotateleft16``
4400* ``__builtin_rotateleft32``
4401* ``__builtin_rotateleft64``
4402* ``__builtin_rotateright8``
4403* ``__builtin_rotateright16``
4404* ``__builtin_rotateright32``
4405* ``__builtin_rotateright64``
4406
4407The following x86-specific intrinsics can be used in constant expressions:
4408
4409* ``_bit_scan_forward``
4410* ``_bit_scan_reverse``
4411* ``__bsfd``
4412* ``__bsfq``
4413* ``__bsrd``
4414* ``__bsrq``
4415* ``__bswap``
4416* ``__bswapd``
4417* ``__bswap64``
4418* ``__bswapq``
4419* ``_castf32_u32``
4420* ``_castf64_u64``
4421* ``_castu32_f32``
4422* ``_castu64_f64``
4423* ``_mm_popcnt_u32``
4424* ``_mm_popcnt_u64``
4425* ``_popcnt32``
4426* ``_popcnt64``
4427* ``__popcntd``
4428* ``__popcntq``
4429* ``__rolb``
4430* ``__rolw``
4431* ``__rold``
4432* ``__rolq``
4433* ``__rorb``
4434* ``__rorw``
4435* ``__rord``
4436* ``__rorq``
4437* ``_rotl``
4438* ``_rotr``
4439* ``_rotwl``
4440* ``_rotwr``
4441* ``_lrotl``
4442* ``_lrotr``
4443