Clang 8.0.0 (In-Progress) Release Notes¶
- Introduction
- What’s New in Clang 8.0.0?
- Major New Features
- Non-comprehensive list of changes in this release
- New Compiler Flags
- Deprecated Compiler Flags
- Modified Compiler Flags
- New Pragmas in Clang
- Attribute Changes in Clang
- Windows Support
- C Language Changes in Clang
- C++ Language Changes in Clang
- Objective-C Language Changes in Clang
- OpenCL C Language Changes in Clang
- OpenMP Support in Clang
- CUDA Support in Clang
- Internal API Changes
- AST Matchers
- clang-format
- libclang
- Static Analyzer
- Undefined Behavior Sanitizer (UBSan)
- Core Analysis Improvements
- New Issues Found
- Significant Known Problems
- Additional Information
Written by the LLVM Team
Warning
These are in-progress notes for the upcoming Clang 8 release. Release notes for previous releases can be found on the Download Page.
Introduction¶
This document contains the release notes for the Clang C/C++/Objective-C frontend, part of the LLVM Compiler Infrastructure, release 8.0.0. Here we describe the status of Clang in some detail, including major improvements from the previous release and new feature work. For the general LLVM release notes, see the LLVM documentation. All LLVM releases may be downloaded from the LLVM releases web site.
For more information about Clang or LLVM, including information about the latest release, please see the Clang Web Site or the LLVM Web Site.
Note that if you are reading this file from a Subversion checkout or the main Clang web page, this document applies to the next release, not the current one. To see the release notes for a specific release, please see the releases page.
What’s New in Clang 8.0.0?¶
Some of the major new features and improvements to Clang are listed here. Generic improvements to Clang as a whole or to its underlying infrastructure are described first, followed by language-specific sections with improvements to Clang’s support for those languages.
Major New Features¶
Improvements to Clang’s diagnostics¶
Deprecated Compiler Flags¶
The following options are deprecated and ignored. They will be removed in future versions of Clang.
- …
New Pragmas in Clang¶
Clang now supports the …
Internal API Changes¶
These are major API changes that have happened since the 7.0.0 release of Clang. If upgrading an external codebase that uses Clang as a library, this section should help get you past the largest hurdles of upgrading.
- …
Additional Information¶
A wide variety of additional information is available on the Clang web
page. The web page contains versions of the
API documentation which are up-to-date with the Subversion version of
the source code. You can access versions of these documents specific to
this release by going into the “clang/docs/
” directory in the Clang
tree.
If you have any questions or comments about Clang, please feel free to contact us via the mailing list.
Using Clang as a Compiler¶
Clang Compiler User’s Manual¶
- Introduction
- Command Line Options
- Language and Target-Independent Features
- C Language Features
- C++ Language Features
- Objective-C Language Features
- Objective-C++ Language Features
- OpenMP Features
- OpenCL Features
- Target-Specific Features and Limitations
- clang-cl
Introduction¶
The Clang Compiler is an open-source compiler for the C family of programming languages, aiming to be the best in class implementation of these languages. Clang builds on the LLVM optimizer and code generator, allowing it to provide high-quality optimization and code generation support for many targets. For more general information, please see the Clang Web Site or the LLVM Web Site.
This document describes important notes about using Clang as a compiler for an end-user, documenting the supported features, command line options, etc. If you are interested in using Clang to build a tool that processes code, please see “Clang” CFE Internals Manual. If you are interested in the Clang Static Analyzer, please see its web page.
Clang is one component in a complete toolchain for C family languages. A separate document describes the other pieces necessary to assemble a complete toolchain.
Clang is designed to support the C family of programming languages, which includes C, Objective-C, C++, and Objective-C++ as well as many dialects of those. For language-specific information, please see the corresponding language specific section:
- C Language: K&R C, ANSI C89, ISO C90, ISO C94 (C89+AMD1), ISO C99 (+TC1, TC2, TC3).
- Objective-C Language: ObjC 1, ObjC 2, ObjC 2.1, plus variants depending on base language.
- C++ Language
- Objective C++ Language
- OpenCL C Language: v1.0, v1.1, v1.2, v2.0.
In addition to these base languages and their dialects, Clang supports a broad variety of language extensions, which are documented in the corresponding language section. These extensions are provided to be compatible with the GCC, Microsoft, and other popular compilers as well as to improve functionality through Clang-specific features. The Clang driver and language features are intentionally designed to be as compatible with the GNU GCC compiler as reasonably possible, easing migration from GCC to Clang. In most cases, code “just works”. Clang also provides an alternative driver, clang-cl, that is designed to be compatible with the Visual C++ compiler, cl.exe.
In addition to language specific features, Clang has a variety of features that depend on what CPU architecture or operating system is being compiled for. Please see the Target-Specific Features and Limitations section for more details.
The rest of the introduction introduces some basic compiler terminology that is used throughout this manual and contains a basic introduction to using Clang as a command line compiler.
Terminology¶
Front end, parser, backend, preprocessor, undefined behavior, diagnostic, optimizer
Basic Usage¶
Intro to how to use a C compiler for newbies.
compile + link compile then link debug info enabling optimizations picking a language to use, defaults to C11 by default. Autosenses based on extension. using a makefile
Command Line Options¶
This section is generally an index into other sections. It does not go
into depth on the ones that are covered by other sections. However, the
first part introduces the language selection and other high level
options like -c
, -g
, etc.
Options to Control Error and Warning Messages¶
-
-Werror
¶
Turn warnings into errors.
-Werror=foo
Turn warning “foo” into an error.
-
-Wfoo
¶
Enable warning “foo”. See the diagnostics reference for a complete list of the warning flags that can be specified in this way.
-
-Wno-foo
¶
Disable warning “foo”.
-
-w
¶
Disable all diagnostics.
-
-Weverything
¶
-
-pedantic
¶
Warn on language extensions.
-
-pedantic-errors
¶
Error on language extensions.
-
-Wsystem-headers
¶
Enable warnings from system headers.
-
-ferror-limit
=123
¶ Stop emitting diagnostics after 123 errors have been produced. The default is 20, and the error limit can be disabled with -ferror-limit=0.
-
-ftemplate-backtrace-limit
=123
¶ Only emit up to 123 template instantiation notes within the template instantiation backtrace for a single warning or error. The default is 10, and the limit can be disabled with -ftemplate-backtrace-limit=0.
Formatting of Diagnostics¶
Clang aims to produce beautiful diagnostics by default, particularly for new users that first come to Clang. However, different people have different preferences, and sometimes Clang is driven not by a human, but by a program that wants consistent and easily parsable output. For these cases, Clang provides a wide range of options to control the exact output format of the diagnostics that it generates.
- -f[no-]show-column
Print column number in diagnostic.
This option, which defaults to on, controls whether or not Clang prints the column number of a diagnostic. For example, when this is enabled, Clang will print something like:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
When this is disabled, Clang will print “test.c:28: warning…” with no column number.
The printed column numbers count bytes from the beginning of the line; take care if your source contains multibyte characters.
- -f[no-]show-source-location
Print source file/line/column information in diagnostic.
This option, which defaults to on, controls whether or not Clang prints the filename, line number and column number of a diagnostic. For example, when this is enabled, Clang will print something like:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
When this is disabled, Clang will not print the “test.c:28:8: ” part.
- -f[no-]caret-diagnostics
Print source line and ranges from source code in diagnostic. This option, which defaults to on, controls whether or not Clang prints the source line, source ranges, and caret when emitting a diagnostic. For example, when this is enabled, Clang will print something like:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
- -f[no-]color-diagnostics
This option, which defaults to on when a color-capable terminal is detected, controls whether or not Clang prints diagnostics in color.
When this option is enabled, Clang will use colors to highlight specific parts of the diagnostic, e.g.,
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
When this is disabled, Clang will just print:
test.c:2:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
- -fansi-escape-codes
- Controls whether ANSI escape codes are used instead of the Windows Console API to output colored diagnostics. This option is only used on Windows and defaults to off.
-
-fdiagnostics-format
=clang/msvc/vi
¶ Changes diagnostic output format to better match IDEs and command line tools.
This option controls the output format of the filename, line number, and column printed in diagnostic messages. The options, and their affect on formatting a simple conversion diagnostic, follow:
- clang (default)
t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int'
- msvc
t.c(3,11) : warning: conversion specifies type 'char *' but the argument has type 'int'
- vi
t.c +3:11: warning: conversion specifies type 'char *' but the argument has type 'int'
- -f[no-]diagnostics-show-option
Enable
[-Woption]
information in diagnostic line.This option, which defaults to on, controls whether or not Clang prints the associated warning group option name when outputting a warning diagnostic. For example, in this output:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
Passing -fno-diagnostics-show-option will prevent Clang from printing the [-Wextra-tokens] information in the diagnostic. This information tells you the flag needed to enable or disable the diagnostic, either from the command line or through #pragma GCC diagnostic.
-
-fdiagnostics-show-category
=none/id/name
¶ Enable printing category information in diagnostic line.
This option, which defaults to “none”, controls whether or not Clang prints the category associated with a diagnostic when emitting it. Each diagnostic may or many not have an associated category, if it has one, it is listed in the diagnostic categorization field of the diagnostic line (in the []’s).
For example, a format string warning will produce these three renditions based on the setting of this option:
t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat] t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat,1] t.c:3:11: warning: conversion specifies type 'char *' but the argument has type 'int' [-Wformat,Format String]
This category can be used by clients that want to group diagnostics by category, so it should be a high level category. We want dozens of these, not hundreds or thousands of them.
- -fsave-optimization-record
Write optimization remarks to a YAML file.
This option, which defaults to off, controls whether Clang writes optimization reports to a YAML file. By recording diagnostics in a file, using a structured YAML format, users can parse or sort the remarks in a convenient way.
- -foptimization-record-file
Control the file to which optimization reports are written.
When optimization reports are being output (see -fsave-optimization-record), this option controls the file to which those reports are written.
If this option is not used, optimization records are output to a file named after the primary file being compiled. If that’s “foo.c”, for example, optimization records are output to “foo.opt.yaml”.
- -f[no-]diagnostics-show-hotness
Enable profile hotness information in diagnostic line.
This option controls whether Clang prints the profile hotness associated with diagnostics in the presence of profile-guided optimization information. This is currently supported with optimization remarks (see Options to Emit Optimization Reports). The hotness information allows users to focus on the hot optimization remarks that are likely to be more relevant for run-time performance.
For example, in this output, the block containing the callsite of foo was executed 3000 times according to the profile data:
s.c:7:10: remark: foo inlined into bar (hotness: 3000) [-Rpass-analysis=inline] sum += foo(x, x - 2); ^
This option is implied when -fsave-optimization-record is used. Otherwise, it defaults to off.
- -fdiagnostics-hotness-threshold
Prevent optimization remarks from being output if they do not have at least this hotness value.
This option, which defaults to zero, controls the minimum hotness an optimization remark would need in order to be output by Clang. This is currently supported with optimization remarks (see Options to Emit Optimization Reports) when profile hotness information in diagnostics is enabled (see -fdiagnostics-show-hotness).
- -f[no-]diagnostics-fixit-info
Enable “FixIt” information in the diagnostics output.
This option, which defaults to on, controls whether or not Clang prints the information on how to fix a specific diagnostic underneath it when it knows. For example, in this output:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^ //
Passing -fno-diagnostics-fixit-info will prevent Clang from printing the “//” line at the end of the message. This information is useful for users who may not understand what is wrong, but can be confusing for machine parsing.
- -fdiagnostics-print-source-range-info
Print machine parsable information about source ranges. This option makes Clang print information about source ranges in a machine parsable format after the file/line/column number information. The information is a simple sequence of brace enclosed ranges, where each range lists the start and end line/column locations. For example, in this output:
exprs.c:47:15:{47:8-47:14}{47:17-47:24}: error: invalid operands to binary expression ('int *' and '_Complex float') P = (P-42) + Gamma*4; ~~~~~~ ^ ~~~~~~~
The {}’s are generated by -fdiagnostics-print-source-range-info.
The printed column numbers count bytes from the beginning of the line; take care if your source contains multibyte characters.
-
-fdiagnostics-parseable-fixits
¶
Print Fix-Its in a machine parseable form.
This option makes Clang print available Fix-Its in a machine parseable format at the end of diagnostics. The following example illustrates the format:
fix-it:"t.cpp":{7:25-7:29}:"Gamma"
The range printed is a half-open range, so in this example the characters at column 25 up to but not including column 29 on line 7 in t.cpp should be replaced with the string “Gamma”. Either the range or the replacement string may be empty (representing strict insertions and strict erasures, respectively). Both the file name and the insertion string escape backslash (as “\”), tabs (as “\t”), newlines (as “\n”), double quotes(as “"”) and non-printable characters (as octal “\xxx”).
The printed column numbers count bytes from the beginning of the line; take care if your source contains multibyte characters.
-
-fno-elide-type
¶
Turns off elision in template type printing.
The default for template type printing is to elide as many template arguments as possible, removing those which are the same in both template types, leaving only the differences. Adding this flag will print all the template arguments. If supported by the terminal, highlighting will still appear on differing arguments.
Default:
t.cc:4:5: note: candidate function not viable: no known conversion from 'vector<map<[...], map<float, [...]>>>' to 'vector<map<[...], map<double, [...]>>>' for 1st argument;
-fno-elide-type:
t.cc:4:5: note: candidate function not viable: no known conversion from 'vector<map<int, map<float, int>>>' to 'vector<map<int, map<double, int>>>' for 1st argument;
-
-fdiagnostics-show-template-tree
¶
Template type diffing prints a text tree.
For diffing large templated types, this option will cause Clang to display the templates as an indented text tree, one argument per line, with differences marked inline. This is compatible with -fno-elide-type.
Default:
t.cc:4:5: note: candidate function not viable: no known conversion from 'vector<map<[...], map<float, [...]>>>' to 'vector<map<[...], map<double, [...]>>>' for 1st argument;
With
-fdiagnostics-show-template-tree
:t.cc:4:5: note: candidate function not viable: no known conversion for 1st argument; vector< map< [...], map< [float != double], [...]>>>
Individual Warning Groups¶
TODO: Generate this from tblgen. Define one anchor per warning group.
-
-Wextra-tokens
¶
Warn about excess tokens at the end of a preprocessor directive.
This option, which defaults to on, enables warnings about extra tokens at the end of preprocessor directives. For example:
test.c:28:8: warning: extra tokens at end of #endif directive [-Wextra-tokens] #endif bad ^
These extra tokens are not strictly conforming, and are usually best handled by commenting them out.
-
-Wambiguous-member-template
¶
Warn about unqualified uses of a member template whose name resolves to another template at the location of the use.
This option, which defaults to on, enables a warning in the following code:
template<typename T> struct set{}; template<typename T> struct trait { typedef const T& type; }; struct Value { template<typename T> void set(typename trait<T>::type value) {} }; void foo() { Value v; v.set<double>(3.2); }
C++ [basic.lookup.classref] requires this to be an error, but, because it’s hard to work around, Clang downgrades it to a warning as an extension.
-
-Wbind-to-temporary-copy
¶
Warn about an unusable copy constructor when binding a reference to a temporary.
This option enables warnings about binding a reference to a temporary when the temporary doesn’t have a usable copy constructor. For example:
struct NonCopyable { NonCopyable(); private: NonCopyable(const NonCopyable&); }; void foo(const NonCopyable&); void bar() { foo(NonCopyable()); // Disallowed in C++98; allowed in C++11. }
struct NonCopyable2 { NonCopyable2(); NonCopyable2(NonCopyable2&); }; void foo(const NonCopyable2&); void bar() { foo(NonCopyable2()); // Disallowed in C++98; allowed in C++11. }
Note that if
NonCopyable2::NonCopyable2()
has a default argument whose instantiation produces a compile error, that error will still be a hard error in C++98 mode even if this warning is turned off.
Options to Control Clang Crash Diagnostics¶
As unbelievable as it may sound, Clang does crash from time to time. Generally, this only occurs to those living on the bleeding edge. Clang goes to great lengths to assist you in filing a bug report. Specifically, Clang generates preprocessed source file(s) and associated run script(s) upon a crash. These files should be attached to a bug report to ease reproducibility of the failure. Below are the command line options to control the crash diagnostics.
-
-fno-crash-diagnostics
¶
Disable auto-generation of preprocessed source files during a clang crash.
The -fno-crash-diagnostics flag can be helpful for speeding the process of generating a delta reduced test case.
Clang is also capable of generating preprocessed source file(s) and associated run script(s) even without a crash. This is specially useful when trying to generate a reproducer for warnings or errors while using modules.
-
-gen-reproducer
¶
Generates preprocessed source files, a reproducer script and if relevant, a cache containing: built module pcm’s and all headers needed to rebuilt the same modules.
Options to Emit Optimization Reports¶
Optimization reports trace, at a high-level, all the major decisions
done by compiler transformations. For instance, when the inliner
decides to inline function foo()
into bar()
, or the loop unroller
decides to unroll a loop N times, or the vectorizer decides to
vectorize a loop body.
Clang offers a family of flags which the optimizers can use to emit a diagnostic in three cases:
- When the pass makes a transformation (-Rpass).
- When the pass fails to make a transformation (-Rpass-missed).
- When the pass determines whether or not to make a transformation (-Rpass-analysis).
NOTE: Although the discussion below focuses on -Rpass, the exact same options apply to -Rpass-missed and -Rpass-analysis.
Since there are dozens of passes inside the compiler, each of these flags take a regular expression that identifies the name of the pass which should emit the associated diagnostic. For example, to get a report from the inliner, compile the code with:
$ clang -O2 -Rpass=inline code.cc -o code
code.cc:4:25: remark: foo inlined into bar [-Rpass=inline]
int bar(int j) { return foo(j, j - 2); }
^
Note that remarks from the inliner are identified with [-Rpass=inline]. To request a report from every optimization pass, you should use -Rpass=.* (in fact, you can use any valid POSIX regular expression). However, do not expect a report from every transformation made by the compiler. Optimization remarks do not really make sense outside of the major transformations (e.g., inlining, vectorization, loop optimizations) and not every optimization pass supports this feature.
Note that when using profile-guided optimization information, profile hotness information can be included in the remarks (see -fdiagnostics-show-hotness).
Current limitations¶
- Optimization remarks that refer to function names will display the mangled name of the function. Since these remarks are emitted by the back end of the compiler, it does not know anything about the input language, nor its mangling rules.
- Some source locations are not displayed correctly. The front end has a more detailed source location tracking than the locations included in the debug info (e.g., the front end can locate code inside macro expansions). However, the locations used by -Rpass are translated from debug annotations. That translation can be lossy, which results in some remarks having no location information.
Other Options¶
Clang options that don’t fit neatly into other categories.
-
-MV
¶
When emitting a dependency file, use formatting conventions appropriate for NMake or Jom. Ignored unless another option causes Clang to emit a dependency file.
When Clang emits a dependency file (e.g., you supplied the -M option) most filenames can be written to the file without any special formatting. Different Make tools will treat different sets of characters as “special” and use different conventions for telling the Make tool that the character is actually part of the filename. Normally Clang uses backslash to “escape” a special character, which is the convention used by GNU Make. The -MV option tells Clang to put double-quotes around the entire filename, which is the convention used by NMake and Jom.
Configuration files¶
Configuration files group command-line options and allow all of them to be specified just by referencing the configuration file. They may be used, for example, to collect options required to tune compilation for particular target, such as -L, -I, -l, –sysroot, codegen options, etc.
The command line option –config can be used to specify configuration file in a Clang invocation. For example:
clang --config /home/user/cfgs/testing.txt
clang --config debug.cfg
If the provided argument contains a directory separator, it is considered as a file path, and options are read from that file. Otherwise the argument is treated as a file name and is searched for sequentially in the directories:
- user directory,
- system directory,
- the directory where Clang executable resides.
Both user and system directories for configuration files are specified during clang build using CMake parameters, CLANG_CONFIG_FILE_USER_DIR and CLANG_CONFIG_FILE_SYSTEM_DIR respectively. The first file found is used. It is an error if the required file cannot be found.
Another way to specify a configuration file is to encode it in executable name. For example, if the Clang executable is named armv7l-clang (it may be a symbolic link to clang), then Clang will search for file armv7l.cfg in the directory where Clang resides.
If a driver mode is specified in invocation, Clang tries to find a file specific for the specified mode. For example, if the executable file is named x86_64-clang-cl, Clang first looks for x86_64-cl.cfg and if it is not found, looks for x86_64.cfg.
If the command line contains options that effectively change target architecture (these are -m32, -EL, and some others) and the configuration file starts with an architecture name, Clang tries to load the configuration file for the effective architecture. For example, invocation:
x86_64-clang -m32 abc.c
causes Clang search for a file i368.cfg first, and if no such file is found, Clang looks for the file x86_64.cfg.
The configuration file consists of command-line options specified on one or more lines. Lines composed of whitespace characters only are ignored as well as lines in which the first non-blank character is #. Long options may be split between several lines by a trailing backslash. Here is example of a configuration file:
# Several options on line
-c --target=x86_64-unknown-linux-gnu
# Long option split between lines
-I/usr/lib/gcc/x86_64-linux-gnu/5.4.0/../../../../\
include/c++/5.4.0
# other config files may be included
@linux.options
Files included by @file directives in configuration files are resolved relative to the including file. For example, if a configuration file ~/.llvm/target.cfg contains the directive @os/linux.opts, the file linux.opts is searched for in the directory ~/.llvm/os.
Language and Target-Independent Features¶
Controlling Errors and Warnings¶
Clang provides a number of ways to control which code constructs cause it to emit errors and warning messages, and how they are displayed to the console.
Controlling How Clang Displays Diagnostics¶
When Clang emits a diagnostic, it includes rich information in the output, and gives you fine-grain control over which information is printed. Clang has the ability to print this information, and these are the options that control it:
- A file/line/column indicator that shows exactly where the diagnostic occurs in your code [-fshow-column, -fshow-source-location].
- A categorization of the diagnostic as a note, warning, error, or fatal error.
- A text string that describes what the problem is.
- An option that indicates how to control the diagnostic (for diagnostics that support it) [-fdiagnostics-show-option].
- A high-level category for the diagnostic for clients that want to group diagnostics by class (for diagnostics that support it) [-fdiagnostics-show-category].
- The line of source code that the issue occurs on, along with a caret and ranges that indicate the important locations [-fcaret-diagnostics].
- “FixIt” information, which is a concise explanation of how to fix the problem (when Clang is certain it knows) [-fdiagnostics-fixit-info].
- A machine-parsable representation of the ranges involved (off by default) [-fdiagnostics-print-source-range-info].
For more information please see Formatting of Diagnostics.
Diagnostic Mappings¶
All diagnostics are mapped into one of these 6 classes:
- Ignored
- Note
- Remark
- Warning
- Error
- Fatal
Diagnostic Categories¶
Though not shown by default, diagnostics may each be associated with a high-level category. This category is intended to make it possible to triage builds that produce a large number of errors or warnings in a grouped way.
Categories are not shown by default, but they can be turned on with the
-fdiagnostics-show-category option.
When set to “name
”, the category is printed textually in the
diagnostic output. When it is set to “id
”, a category number is
printed. The mapping of category names to category id’s can be obtained
by running ‘clang --print-diagnostic-categories
’.
Controlling Diagnostics via Command Line Flags¶
TODO: -W flags, -pedantic, etc
Controlling Diagnostics via Pragmas¶
Clang can also control what diagnostics are enabled through the use of pragmas in the source code. This is useful for turning off specific warnings in a section of source code. Clang supports GCC’s pragma for compatibility with existing source code, as well as several extensions.
The pragma may control any warning that can be used from the command line. Warnings may be set to ignored, warning, error, or fatal. The following example code will tell Clang or GCC to ignore the -Wall warnings:
#pragma GCC diagnostic ignored "-Wall"
In addition to all of the functionality provided by GCC’s pragma, Clang also allows you to push and pop the current warning state. This is particularly useful when writing a header file that will be compiled by other people, because you don’t know what warning flags they build with.
In the below example -Wextra-tokens
is ignored for only a single line
of code, after which the diagnostics return to whatever state had previously
existed.
#if foo
#endif foo // warning: extra tokens at end of #endif directive
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wextra-tokens"
#if foo
#endif foo // no warning
#pragma clang diagnostic pop
The push and pop pragmas will save and restore the full diagnostic state of the compiler, regardless of how it was set. That means that it is possible to use push and pop around GCC compatible diagnostics and Clang will push and pop them appropriately, while GCC will ignore the pushes and pops as unknown pragmas. It should be noted that while Clang supports the GCC pragma, Clang and GCC do not support the exact same set of warnings, so even when using GCC compatible #pragmas there is no guarantee that they will have identical behaviour on both compilers.
In addition to controlling warnings and errors generated by the compiler, it is possible to generate custom warning and error messages through the following pragmas:
// The following will produce warning messages
#pragma message "some diagnostic message"
#pragma GCC warning "TODO: replace deprecated feature"
// The following will produce an error message
#pragma GCC error "Not supported"
These pragmas operate similarly to the #warning
and #error
preprocessor
directives, except that they may also be embedded into preprocessor macros via
the C99 _Pragma
operator, for example:
#define STR(X) #X
#define DEFER(M,...) M(__VA_ARGS__)
#define CUSTOM_ERROR(X) _Pragma(STR(GCC error(X " at line " DEFER(STR,__LINE__))))
CUSTOM_ERROR("Feature not available");
Controlling Diagnostics in System Headers¶
Warnings are suppressed when they occur in system headers. By default,
an included file is treated as a system header if it is found in an
include path specified by -isystem
, but this can be overridden in
several ways.
The system_header
pragma can be used to mark the current file as
being a system header. No warnings will be produced from the location of
the pragma onwards within the same file.
#if foo
#endif foo // warning: extra tokens at end of #endif directive
#pragma clang system_header
#if foo
#endif foo // no warning
The –system-header-prefix= and –no-system-header-prefix=
command-line arguments can be used to override whether subsets of an include
path are treated as system headers. When the name in a #include
directive
is found within a header search path and starts with a system prefix, the
header is treated as a system header. The last prefix on the
command-line which matches the specified header name takes precedence.
For instance:
$ clang -Ifoo -isystem bar --system-header-prefix=x/ \
--no-system-header-prefix=x/y/
Here, #include "x/a.h"
is treated as including a system header, even
if the header is found in foo
, and #include "x/y/b.h"
is treated
as not including a system header, even if the header is found in
bar
.
A #include
directive which finds a file relative to the current
directory is treated as including a system header if the including file
is treated as a system header.
Enabling All Diagnostics¶
In addition to the traditional -W
flags, one can enable all
diagnostics by passing -Weverything
. This works as expected
with
-Werror
, and also includes the warnings from -pedantic
.
Note that when combined with -w
(which disables all warnings), that
flag wins.
Controlling Static Analyzer Diagnostics¶
While not strictly part of the compiler, the diagnostics from Clang’s static analyzer can also be influenced by the user via changes to the source code. See the available annotations and the analyzer’s FAQ page for more information.
Precompiled Headers¶
Precompiled headers are a general approach employed by many compilers to reduce compilation time. The underlying motivation of the approach is that it is common for the same (and often large) header files to be included by multiple source files. Consequently, compile times can often be greatly improved by caching some of the (redundant) work done by a compiler to process headers. Precompiled header files, which represent one of many ways to implement this optimization, are literally files that represent an on-disk cache that contains the vital information necessary to reduce some of the work needed to process a corresponding header file. While details of precompiled headers vary between compilers, precompiled headers have been shown to be highly effective at speeding up program compilation on systems with very large system headers (e.g., Mac OS X).
Generating a PCH File¶
To generate a PCH file using Clang, one invokes Clang with the -x <language>-header option. This mirrors the interface in GCC for generating PCH files:
$ gcc -x c-header test.h -o test.h.gch
$ clang -x c-header test.h -o test.h.pch
Using a PCH File¶
A PCH file can then be used as a prefix header when a -include
option is passed to clang
:
$ clang -include test.h test.c -o test
The clang
driver will first check if a PCH file for test.h
is
available; if so, the contents of test.h
(and the files it includes)
will be processed from the PCH file. Otherwise, Clang falls back to
directly processing the content of test.h
. This mirrors the behavior
of GCC.
Note
Clang does not automatically use PCH files for headers that are directly included within a source file. For example:
$ clang -x c-header test.h -o test.h.pch
$ cat test.c
#include "test.h"
$ clang test.c -o test
In this example, clang
will not automatically use the PCH file for
test.h
since test.h
was included directly in the source file and not
specified on the command line using -include
.
Relocatable PCH Files¶
It is sometimes necessary to build a precompiled header from headers that are not yet in their final, installed locations. For example, one might build a precompiled header within the build tree that is then meant to be installed alongside the headers. Clang permits the creation of “relocatable” precompiled headers, which are built with a given path (into the build directory) and can later be used from an installed location.
To build a relocatable precompiled header, place your headers into a
subdirectory whose structure mimics the installed location. For example,
if you want to build a precompiled header for the header mylib.h
that will be installed into /usr/include
, create a subdirectory
build/usr/include
and place the header mylib.h
into that
subdirectory. If mylib.h
depends on other headers, then they can be
stored within build/usr/include
in a way that mimics the installed
location.
Building a relocatable precompiled header requires two additional
arguments. First, pass the --relocatable-pch
flag to indicate that
the resulting PCH file should be relocatable. Second, pass
-isysroot /path/to/build
, which makes all includes for your library
relative to the build directory. For example:
# clang -x c-header --relocatable-pch -isysroot /path/to/build /path/to/build/mylib.h mylib.h.pch
When loading the relocatable PCH file, the various headers used in the
PCH file are found from the system header root. For example, mylib.h
can be found in /usr/include/mylib.h
. If the headers are installed
in some other system root, the -isysroot
option can be used provide
a different system root from which the headers will be based. For
example, -isysroot /Developer/SDKs/MacOSX10.4u.sdk
will look for
mylib.h
in /Developer/SDKs/MacOSX10.4u.sdk/usr/include/mylib.h
.
Relocatable precompiled headers are intended to be used in a limited number of cases where the compilation environment is tightly controlled and the precompiled header cannot be generated after headers have been installed.
Controlling Code Generation¶
Clang provides a number of ways to control code generation. The options are listed below.
- -f[no-]sanitize=check1,check2,…
Turn on runtime checks for various forms of undefined or suspicious behavior.
This option controls whether Clang adds runtime checks for various forms of undefined or suspicious behavior, and is disabled by default. If a check fails, a diagnostic message is produced at runtime explaining the problem. The main checks are:
-fsanitize=address
: AddressSanitizer, a memory error detector.-fsanitize=thread
: ThreadSanitizer, a data race detector.-fsanitize=memory
: MemorySanitizer, a detector of uninitialized reads. Requires instrumentation of all program code.-fsanitize=undefined
: UndefinedBehaviorSanitizer, a fast and compatible undefined behavior checker.-fsanitize=dataflow
: DataFlowSanitizer, a general data flow analysis.-fsanitize=cfi
: control flow integrity checks. Requires-flto
.-fsanitize=safe-stack
: safe stack protection against stack-based memory corruption errors.
There are more fine-grained checks available: see the list of specific kinds of undefined behavior that can be detected and the list of control flow integrity schemes.
The
-fsanitize=
argument must also be provided when linking, in order to link to the appropriate runtime library.It is not possible to combine more than one of the
-fsanitize=address
,-fsanitize=thread
, and-fsanitize=memory
checkers in the same program.
-f[no-]sanitize-recover=check1,check2,…
-f[no-]sanitize-recover=all
Controls which checks enabled by
-fsanitize=
flag are non-fatal. If the check is fatal, program will halt after the first error of this kind is detected and error report is printed.By default, non-fatal checks are those enabled by UndefinedBehaviorSanitizer, except for
-fsanitize=return
and-fsanitize=unreachable
. Some sanitizers may not support recovery (or not support it by default e.g. AddressSanitizer), and always crash the program after the issue is detected.Note that the
-fsanitize-trap
flag has precedence over this flag. This means that if a check has been configured to trap elsewhere on the command line, or if the check traps by default, this flag will not have any effect unless that sanitizer’s trapping behavior is disabled with-fno-sanitize-trap
.For example, if a command line contains the flags
-fsanitize=undefined -fsanitize-trap=undefined
, the flag-fsanitize-recover=alignment
will have no effect on its own; it will need to be accompanied by-fno-sanitize-trap=alignment
.
-f[no-]sanitize-trap=check1,check2,…
Controls which checks enabled by the
-fsanitize=
flag trap. This option is intended for use in cases where the sanitizer runtime cannot be used (for instance, when building libc or a kernel module), or where the binary size increase caused by the sanitizer runtime is a concern.This flag is only compatible with control flow integrity schemes and UndefinedBehaviorSanitizer checks other than
vptr
. If this flag is supplied together with-fsanitize=undefined
, thevptr
sanitizer will be implicitly disabled.This flag is enabled by default for sanitizers in the
cfi
group.
-
-fsanitize-blacklist
=/path/to/blacklist/file
¶ Disable or modify sanitizer checks for objects (source files, functions, variables, types) listed in the file. See Sanitizer special case list for file format description.
-
-fno-sanitize-blacklist
¶
Don’t use blacklist file, if it was specified earlier in the command line.
-f[no-]sanitize-coverage=[type,features,…]
Enable simple code coverage in addition to certain sanitizers. See SanitizerCoverage for more details.
-f[no-]sanitize-stats
Enable simple statistics gathering for the enabled sanitizers. See SanitizerStats for more details.
-
-fsanitize-undefined-trap-on-error
¶
Deprecated alias for
-fsanitize-trap=undefined
.
-
-fsanitize-cfi-cross-dso
¶
Enable cross-DSO control flow integrity checks. This flag modifies the behavior of sanitizers in the
cfi
group to allow checking of cross-DSO virtual and indirect calls.
-
-fsanitize-cfi-icall-generalize-pointers
¶
Generalize pointers in return and argument types in function type signatures checked by Control Flow Integrity indirect call checking. See Control Flow Integrity for more details.
-
-fstrict-vtable-pointers
¶
Enable optimizations based on the strict rules for overwriting polymorphic C++ objects, i.e. the vptr is invariant during an object’s lifetime. This enables better devirtualization. Turned off by default, because it is still experimental.
-
-ffast-math
¶
Enable fast-math mode. This defines the
__FAST_MATH__
preprocessor macro, and lets the compiler make aggressive, potentially-lossy assumptions about floating-point math. These include:- Floating-point math obeys regular algebraic rules for real numbers (e.g.
+
and*
are associative,x/y == x * (1/y)
, and(a + b) * c == a * c + b * c
), - operands to floating-point operations are not equal to
NaN
andInf
, and +0
and-0
are interchangeable.
- Floating-point math obeys regular algebraic rules for real numbers (e.g.
-
-fdenormal-fp-math
=[values]
¶ Select which denormal numbers the code is permitted to require.
Valid values are:
ieee
,preserve-sign
, andpositive-zero
, which correspond to IEEE 754 denormal numbers, the sign of a flushed-to-zero number is preserved in the sign of 0, denormals are flushed to positive zero, respectively.
-
-f[no-]strict-float-cast-overflow
¶
When a floating-point value is not representable in a destination integer type, the code has undefined behavior according to the language standard. By default, Clang will not guarantee any particular result in that case. With the ‘no-strict’ option, Clang attempts to match the overflowing behavior of the target’s native float-to-int conversion instructions.
-
-fwhole-program-vtables
¶
Enable whole-program vtable optimizations, such as single-implementation devirtualization and virtual constant propagation, for classes with hidden LTO visibility. Requires
-flto
.
-
-fforce-emit-vtables
¶
In order to improve devirtualization, forces emitting of vtables even in modules where it isn’t necessary. It causes more inline virtual functions to be emitted.
-
-fno-assume-sane-operator-new
¶
Don’t assume that the C++’s new operator is sane.
This option tells the compiler to do not assume that C++’s global new operator will always return a pointer that does not alias any other pointer when the function returns.
-
-ftrap-function
=[name]
¶ Instruct code generator to emit a function call to the specified function name for
__builtin_trap()
.LLVM code generator translates
__builtin_trap()
to a trap instruction if it is supported by the target ISA. Otherwise, the builtin is translated into a call toabort
. If this option is set, then the code generator will always lower the builtin to a call to the specified function regardless of whether the target ISA has a trap instruction. This option is useful for environments (e.g. deeply embedded) where a trap cannot be properly handled, or when some custom behavior is desired.
-
-ftls-model
=[model]
¶ Select which TLS model to use.
Valid values are:
global-dynamic
,local-dynamic
,initial-exec
andlocal-exec
. The default value isglobal-dynamic
. The compiler may use a different model if the selected model is not supported by the target, or if a more efficient model can be used. The TLS model can be overridden per variable using thetls_model
attribute.
-
-femulated-tls
¶
Select emulated TLS model, which overrides all -ftls-model choices.
In emulated TLS mode, all access to TLS variables are converted to calls to __emutls_get_address in the runtime library.
-
-mhwdiv
=[values]
¶ Select the ARM modes (arm or thumb) that support hardware division instructions.
Valid values are:
arm
,thumb
andarm,thumb
. This option is used to indicate which mode (arm or thumb) supports hardware division instructions. This only applies to the ARM architecture.
-
-m[no-]crc
¶
Enable or disable CRC instructions.
This option is used to indicate whether CRC instructions are to be generated. This only applies to the ARM architecture.
CRC instructions are enabled by default on ARMv8.
-
-mgeneral-regs-only
¶
Generate code which only uses the general purpose registers.
This option restricts the generated code to use general registers only. This only applies to the AArch64 architecture.
-
-mcompact-branches
=[values]
¶ Control the usage of compact branches for MIPSR6.
Valid values are:
never
,optimal
andalways
. The default value isoptimal
which generates compact branches when a delay slot cannot be filled.never
disables the usage of compact branches andalways
generates compact branches whenever possible.
- -f[no-]max-type-align=[number]
Instruct the code generator to not enforce a higher alignment than the given number (of bytes) when accessing memory via an opaque pointer or reference. This cap is ignored when directly accessing a variable or when the pointee type has an explicit “aligned” attribute.
The value should usually be determined by the properties of the system allocator. Some builtin types, especially vector types, have very high natural alignments; when working with values of those types, Clang usually wants to use instructions that take advantage of that alignment. However, many system allocators do not promise to return memory that is more than 8-byte or 16-byte-aligned. Use this option to limit the alignment that the compiler can assume for an arbitrary pointer, which may point onto the heap.
This option does not affect the ABI alignment of types; the layout of structs and unions and the value returned by the alignof operator remain the same.
This option can be overridden on a case-by-case basis by putting an explicit “aligned” alignment on a struct, union, or typedef. For example:
#include <immintrin.h> // Make an aligned typedef of the AVX-512 16-int vector type. typedef __v16si __aligned_v16si __attribute__((aligned(64))); void initialize_vector(__aligned_v16si *v) { // The compiler may assume that ‘v’ is 64-byte aligned, regardless of the // value of -fmax-type-align. }
-
-faddrsig
,
-fno-addrsig
¶
Controls whether Clang emits an address-significance table into the object file. Address-significance tables allow linkers to implement safe ICF without the false positives that can result from other implementation techniques such as relocation scanning. Address-significance tables are enabled by default on ELF targets when using the integrated assembler. This flag currently only has an effect on ELF targets.
Profile Guided Optimization¶
Profile information enables better optimization. For example, knowing that a
branch is taken very frequently helps the compiler make better decisions when
ordering basic blocks. Knowing that a function foo
is called more
frequently than another function bar
helps the inliner. Optimization
levels -O2
and above are recommended for use of profile guided optimization.
Clang supports profile guided optimization with two different kinds of profiling. A sampling profiler can generate a profile with very low runtime overhead, or you can build an instrumented version of the code that collects more detailed profile information. Both kinds of profiles can provide execution counts for instructions in the code and information on branches taken and function invocation.
Regardless of which kind of profiling you use, be careful to collect profiles by running your code with inputs that are representative of the typical behavior. Code that is not exercised in the profile will be optimized as if it is unimportant, and the compiler may make poor optimization choices for code that is disproportionately used while profiling.
Differences Between Sampling and Instrumentation¶
Although both techniques are used for similar purposes, there are important differences between the two:
- Profile data generated with one cannot be used by the other, and there is no
conversion tool that can convert one to the other. So, a profile generated
via
-fprofile-instr-generate
must be used with-fprofile-instr-use
. Similarly, sampling profiles generated by external profilers must be converted and used with-fprofile-sample-use
. - Instrumentation profile data can be used for code coverage analysis and optimization.
- Sampling profiles can only be used for optimization. They cannot be used for code coverage analysis. Although it would be technically possible to use sampling profiles for code coverage, sample-based profiles are too coarse-grained for code coverage purposes; it would yield poor results.
- Sampling profiles must be generated by an external tool. The profile generated by that tool must then be converted into a format that can be read by LLVM. The section on sampling profilers describes one of the supported sampling profile formats.
Using Sampling Profilers¶
Sampling profilers are used to collect runtime information, such as hardware counters, while your application executes. They are typically very efficient and do not incur a large runtime overhead. The sample data collected by the profiler can be used during compilation to determine what the most executed areas of the code are.
Using the data from a sample profiler requires some changes in the way a program is built. Before the compiler can use profiling information, the code needs to execute under the profiler. The following is the usual build cycle when using sample profilers for optimization:
Build the code with source line table information. You can use all the usual build flags that you always build your application with. The only requirement is that you add
-gline-tables-only
or-g
to the command line. This is important for the profiler to be able to map instructions back to source line locations.$ clang++ -O2 -gline-tables-only code.cc -o code
Run the executable under a sampling profiler. The specific profiler you use does not really matter, as long as its output can be converted into the format that the LLVM optimizer understands. Currently, there exists a conversion tool for the Linux Perf profiler (https://perf.wiki.kernel.org/), so these examples assume that you are using Linux Perf to profile your code.
$ perf record -b ./code
Note the use of the
-b
flag. This tells Perf to use the Last Branch Record (LBR) to record call chains. While this is not strictly required, it provides better call information, which improves the accuracy of the profile data.Convert the collected profile data to LLVM’s sample profile format. This is currently supported via the AutoFDO converter
create_llvm_prof
. It is available at http://github.com/google/autofdo. Once built and installed, you can convert theperf.data
file to LLVM using the command:$ create_llvm_prof --binary=./code --out=code.prof
This will read
perf.data
and the binary file./code
and emit the profile data incode.prof
. Note that if you ranperf
without the-b
flag, you need to use--use_lbr=false
when callingcreate_llvm_prof
.Build the code again using the collected profile. This step feeds the profile back to the optimizers. This should result in a binary that executes faster than the original one. Note that you are not required to build the code with the exact same arguments that you used in the first step. The only requirement is that you build the code with
-gline-tables-only
and-fprofile-sample-use
.$ clang++ -O2 -gline-tables-only -fprofile-sample-use=code.prof code.cc -o code
Sample Profile Formats¶
Since external profilers generate profile data in a variety of custom formats, the data generated by the profiler must be converted into a format that can be read by the backend. LLVM supports three different sample profile formats:
- ASCII text. This is the easiest one to generate. The file is divided into
sections, which correspond to each of the functions with profile
information. The format is described below. It can also be generated from
the binary or gcov formats using the
llvm-profdata
tool. - Binary encoding. This uses a more efficient encoding that yields smaller
profile files. This is the format generated by the
create_llvm_prof
tool in http://github.com/google/autofdo. - GCC encoding. This is based on the gcov format, which is accepted by GCC. It
is only interesting in environments where GCC and Clang co-exist. This
encoding is only generated by the
create_gcov
tool in http://github.com/google/autofdo. It can be read by LLVM andllvm-profdata
, but it cannot be generated by either.
If you are using Linux Perf to generate sampling profiles, you can use the
conversion tool create_llvm_prof
described in the previous section.
Otherwise, you will need to write a conversion tool that converts your
profiler’s native format into one of these three.
Sample Profile Text Format¶
This section describes the ASCII text format for sampling profiles. It is,
arguably, the easiest one to generate. If you are interested in generating any
of the other two, consult the ProfileData
library in LLVM’s source tree
(specifically, include/llvm/ProfileData/SampleProfReader.h
).
function1:total_samples:total_head_samples
offset1[.discriminator]: number_of_samples [fn1:num fn2:num ... ]
offset2[.discriminator]: number_of_samples [fn3:num fn4:num ... ]
...
offsetN[.discriminator]: number_of_samples [fn5:num fn6:num ... ]
offsetA[.discriminator]: fnA:num_of_total_samples
offsetA1[.discriminator]: number_of_samples [fn7:num fn8:num ... ]
offsetA1[.discriminator]: number_of_samples [fn9:num fn10:num ... ]
offsetB[.discriminator]: fnB:num_of_total_samples
offsetB1[.discriminator]: number_of_samples [fn11:num fn12:num ... ]
This is a nested tree in which the indentation represents the nesting level of the inline stack. There are no blank lines in the file. And the spacing within a single line is fixed. Additional spaces will result in an error while reading the file.
Any line starting with the ‘#’ character is completely ignored.
Inlined calls are represented with indentation. The Inline stack is a stack of source locations in which the top of the stack represents the leaf function, and the bottom of the stack represents the actual symbol to which the instruction belongs.
Function names must be mangled in order for the profile loader to match them in the current translation unit. The two numbers in the function header specify how many total samples were accumulated in the function (first number), and the total number of samples accumulated in the prologue of the function (second number). This head sample count provides an indicator of how frequently the function is invoked.
There are two types of lines in the function body.
- Sampled line represents the profile information of a source location.
offsetN[.discriminator]: number_of_samples [fn5:num fn6:num ... ]
- Callsite line represents the profile information of an inlined callsite.
offsetA[.discriminator]: fnA:num_of_total_samples
Each sampled line may contain several items. Some are optional (marked below):
Source line offset. This number represents the line number in the function where the sample was collected. The line number is always relative to the line where symbol of the function is defined. So, if the function has its header at line 280, the offset 13 is at line 293 in the file.
Note that this offset should never be a negative number. This could happen in cases like macros. The debug machinery will register the line number at the point of macro expansion. So, if the macro was expanded in a line before the start of the function, the profile converter should emit a 0 as the offset (this means that the optimizers will not be able to associate a meaningful weight to the instructions in the macro).
[OPTIONAL] Discriminator. This is used if the sampled program was compiled with DWARF discriminator support (http://wiki.dwarfstd.org/index.php?title=Path_Discriminators). DWARF discriminators are unsigned integer values that allow the compiler to distinguish between multiple execution paths on the same source line location.
For example, consider the line of code
if (cond) foo(); else bar();
. If the predicatecond
is true 80% of the time, then the edge into functionfoo
should be considered to be taken most of the time. But both calls tofoo
andbar
are at the same source line, so a sample count at that line is not sufficient. The compiler needs to know which part of that line is taken more frequently.This is what discriminators provide. In this case, the calls to
foo
andbar
will be at the same line, but will have different discriminator values. This allows the compiler to correctly set edge weights intofoo
andbar
.Number of samples. This is an integer quantity representing the number of samples collected by the profiler at this source location.
[OPTIONAL] Potential call targets and samples. If present, this line contains a call instruction. This models both direct and number of samples. For example,
130: 7 foo:3 bar:2 baz:7
The above means that at relative line offset 130 there is a call instruction that calls one of
foo()
,bar()
andbaz()
, withbaz()
being the relatively more frequently called target.
As an example, consider a program with the call chain main -> foo -> bar
.
When built with optimizations enabled, the compiler may inline the
calls to bar
and foo
inside main
. The generated profile
could then be something like this:
main:35504:0
1: _Z3foov:35504
2: _Z32bari:31977
1.1: 31977
2: 0
This profile indicates that there were a total of 35,504 samples
collected in main. All of those were at line 1 (the call to foo
).
Of those, 31,977 were spent inside the body of bar
. The last line
of the profile (2: 0
) corresponds to line 2 inside main
. No
samples were collected there.
Profiling with Instrumentation¶
Clang also supports profiling via instrumentation. This requires building a special instrumented version of the code and has some runtime overhead during the profiling, but it provides more detailed results than a sampling profiler. It also provides reproducible results, at least to the extent that the code behaves consistently across runs.
Here are the steps for using profile guided optimization with instrumentation:
Build an instrumented version of the code by compiling and linking with the
-fprofile-instr-generate
option.$ clang++ -O2 -fprofile-instr-generate code.cc -o code
Run the instrumented executable with inputs that reflect the typical usage. By default, the profile data will be written to a
default.profraw
file in the current directory. You can override that default by using option-fprofile-instr-generate=
or by setting theLLVM_PROFILE_FILE
environment variable to specify an alternate file. If non-default file name is specified by both the environment variable and the command line option, the environment variable takes precedence. The file name pattern specified can include different modifiers:%p
,%h
, and%m
.Any instance of
%p
in that file name will be replaced by the process ID, so that you can easily distinguish the profile output from multiple runs.$ LLVM_PROFILE_FILE="code-%p.profraw" ./code
The modifier
%h
can be used in scenarios where the same instrumented binary is run in multiple different host machines dumping profile data to a shared network based storage. The%h
specifier will be substituted with the hostname so that profiles collected from different hosts do not clobber each other.While the use of
%p
specifier can reduce the likelihood for the profiles dumped from different processes to clobber each other, such clobbering can still happen because of thepid
re-use by the OS. Another side-effect of using%p
is that the storage requirement for raw profile data files is greatly increased. To avoid issues like this, the%m
specifier can used in the profile name. When this specifier is used, the profiler runtime will substitute%m
with a unique integer identifier associated with the instrumented binary. Additionally, multiple raw profiles dumped from different processes that share a file system (can be on different hosts) will be automatically merged by the profiler runtime during the dumping. If the program links in multiple instrumented shared libraries, each library will dump the profile data into its own profile data file (with its unique integer id embedded in the profile name). Note that the merging enabled by%m
is for raw profile data generated by profiler runtime. The resulting merged “raw” profile data file still needs to be converted to a different format expected by the compiler ( see step 3 below).$ LLVM_PROFILE_FILE="code-%m.profraw" ./code
Combine profiles from multiple runs and convert the “raw” profile format to the input expected by clang. Use the
merge
command of thellvm-profdata
tool to do this.$ llvm-profdata merge -output=code.profdata code-*.profraw
Note that this step is necessary even when there is only one “raw” profile, since the merge operation also changes the file format.
Build the code again using the
-fprofile-instr-use
option to specify the collected profile data.$ clang++ -O2 -fprofile-instr-use=code.profdata code.cc -o code
You can repeat step 4 as often as you like without regenerating the profile. As you make changes to your code, clang may no longer be able to use the profile data. It will warn you when this happens.
Profile generation using an alternative instrumentation method can be
controlled by the GCC-compatible flags -fprofile-generate
and
-fprofile-use
. Although these flags are semantically equivalent to
their GCC counterparts, they do not handle GCC-compatible profiles.
They are only meant to implement GCC’s semantics with respect to
profile creation and use.
-
-fprofile-generate[
=<dirname>]
¶ The
-fprofile-generate
and-fprofile-generate=
flags will use an alternative instrumentation method for profile generation. When given a directory name, it generates the profile filedefault_%m.profraw
in the directory nameddirname
if specified. Ifdirname
does not exist, it will be created at runtime.%m
specifier will be substituted with a unique id documented in step 2 above. In other words, with-fprofile-generate[=<dirname>]
option, the “raw” profile data automatic merging is turned on by default, so there will no longer any risk of profile clobbering from different running processes. For example,$ clang++ -O2 -fprofile-generate=yyy/zzz code.cc -o code
When
code
is executed, the profile will be written to the fileyyy/zzz/default_xxxx.profraw
.To generate the profile data file with the compiler readable format, the
llvm-profdata
tool can be used with the profile directory as the input:$ llvm-profdata merge -output=code.profdata yyy/zzz/
If the user wants to turn off the auto-merging feature, or simply override the the profile dumping path specified at command line, the environment variable
LLVM_PROFILE_FILE
can still be used to override the directory and filename for the profile file at runtime.
-
-fprofile-use[
=<pathname>]
¶ Without any other arguments,
-fprofile-use
behaves identically to-fprofile-instr-use
. Otherwise, ifpathname
is the full path to a profile file, it reads from that file. Ifpathname
is a directory name, it reads frompathname/default.profdata
.
Disabling Instrumentation¶
In certain situations, it may be useful to disable profile generation or use for specific files in a build, without affecting the main compilation flags used for the other files in the project.
In these cases, you can use the flag -fno-profile-instr-generate
(or
-fno-profile-generate
) to disable profile generation, and
-fno-profile-instr-use
(or -fno-profile-use
) to disable profile use.
Note that these flags should appear after the corresponding profile flags to have an effect.
Controlling Debug Information¶
Controlling Size of Debug Information¶
Debug info kind generated by Clang can be set by one of the flags listed below. If multiple flags are present, the last one is used.
-
-g0
¶
Don’t generate any debug info (default).
-
-gline-tables-only
¶
Generate line number tables only.
This kind of debug info allows to obtain stack traces with function names, file names and line numbers (by such tools as
gdb
oraddr2line
). It doesn’t contain any other data (e.g. description of local variables or function parameters).
-
-fstandalone-debug
¶
Clang supports a number of optimizations to reduce the size of debug information in the binary. They work based on the assumption that the debug type information can be spread out over multiple compilation units. For instance, Clang will not emit type definitions for types that are not needed by a module and could be replaced with a forward declaration. Further, Clang will only emit type info for a dynamic C++ class in the module that contains the vtable for the class.
The -fstandalone-debug option turns off these optimizations. This is useful when working with 3rd-party libraries that don’t come with debug information. Note that Clang will never emit type information for types that are not referenced at all by the program.
-
-fno-standalone-debug
¶
On Darwin -fstandalone-debug is enabled by default. The -fno-standalone-debug option can be used to get to turn on the vtable-based optimization described above.
-
-g
¶
Generate complete debug info.
Controlling Macro Debug Info Generation¶
Debug info for C preprocessor macros increases the size of debug information in the binary. Macro debug info generated by Clang can be controlled by the flags listed below.
-
-fdebug-macro
¶
Generate debug info for preprocessor macros. This flag is discarded when -g0 is enabled.
-
-fno-debug-macro
¶
Do not generate debug info for preprocessor macros (default).
Controlling Debugger “Tuning”¶
While Clang generally emits standard DWARF debug info (http://dwarfstd.org), different debuggers may know how to take advantage of different specific DWARF features. You can “tune” the debug info for one of several different debuggers.
-
-ggdb
,
-glldb
,
-gsce
¶
Tune the debug info for the
gdb
,lldb
, or Sony PlayStation® debugger, respectively. Each of these options implies -g. (Therefore, if you want both -gline-tables-only and debugger tuning, the tuning option must come first.)
Controlling LLVM IR Output¶
Controlling Value Names in LLVM IR¶
Emitting value names in LLVM IR increases the size and verbosity of the IR. By default, value names are only emitted in assertion-enabled builds of Clang. However, when reading IR it can be useful to re-enable the emission of value names to improve readability.
-
-fdiscard-value-names
¶
Discard value names when generating LLVM IR.
-
-fno-discard-value-names
¶
Do not discard value names when generating LLVM IR. This option can be used to re-enable names for release builds of Clang.
Comment Parsing Options¶
Clang parses Doxygen and non-Doxygen style documentation comments and attaches
them to the appropriate declaration nodes. By default, it only parses
Doxygen-style comments and ignores ordinary comments starting with //
and
/*
.
-
-Wdocumentation
¶
Emit warnings about use of documentation comments. This warning group is off by default.
This includes checking that
\param
commands name parameters that actually present in the function signature, checking that\returns
is used only on functions that actually return a value etc.
-
-Wno-documentation-unknown-command
¶
Don’t warn when encountering an unknown Doxygen command.
-
-fparse-all-comments
¶
Parse all comments as documentation comments (including ordinary comments starting with
//
and/*
).
-
-fcomment-block-commands
=[commands]
¶ Define custom documentation commands as block commands. This allows Clang to construct the correct AST for these custom commands, and silences warnings about unknown commands. Several commands must be separated by a comma without trailing space; e.g.
-fcomment-block-commands=foo,bar
defines custom commands\foo
and\bar
.It is also possible to use
-fcomment-block-commands
several times; e.g.-fcomment-block-commands=foo -fcomment-block-commands=bar
does the same as above.
C Language Features¶
The support for standard C in clang is feature-complete except for the C99 floating-point pragmas.
Differences between various standard modes¶
clang supports the -std option, which changes what language mode clang
uses. The supported modes for C are c89, gnu89, c99, gnu99, c11, gnu11,
c17, gnu17, and various aliases for those modes. If no -std option is
specified, clang defaults to gnu11 mode. Many C99 and C11 features are
supported in earlier modes as a conforming extension, with a warning. Use
-pedantic-errors
to request an error if a feature from a later standard
revision is used in an earlier mode.
Differences between all c*
and gnu*
modes:
c*
modes define “__STRICT_ANSI__
”.- Target-specific defines not prefixed by underscores, like “linux”,
are defined in
gnu*
modes. - Trigraphs default to being off in
gnu*
modes; they can be enabled by the -trigraphs option. - The parser recognizes “asm” and “typeof” as keywords in
gnu*
modes; the variants “__asm__
” and “__typeof__
” are recognized in all modes. - The Apple “blocks” extension is recognized by default in
gnu*
modes on some platforms; it can be enabled in any mode with the “-fblocks” option. - Arrays that are VLA’s according to the standard, but which can be
constant folded by the frontend are treated as fixed size arrays.
This occurs for things like “int X[(1, 2)];”, which is technically a
VLA.
c*
modes are strictly compliant and treat these as VLAs.
Differences between *89
and *99
modes:
- The
*99
modes default to implementing “inline” as specified in C99, while the*89
modes implement the GNU version. This can be overridden for individual functions with the__gnu_inline__
attribute. - Digraphs are not recognized in c89 mode.
- The scope of names defined inside a “for”, “if”, “switch”, “while”,
or “do” statement is different. (example: “
if ((struct x {int x;}*)0) {}
”.) __STDC_VERSION__
is not defined in*89
modes.- “inline” is not recognized as a keyword in c89 mode.
- “restrict” is not recognized as a keyword in
*89
modes. - Commas are allowed in integer constant expressions in
*99
modes. - Arrays which are not lvalues are not implicitly promoted to pointers
in
*89
modes. - Some warnings are different.
Differences between *99
and *11
modes:
- Warnings for use of C11 features are disabled.
__STDC_VERSION__
is defined to201112L
rather than199901L
.
Differences between *11
and *17
modes:
__STDC_VERSION__
is defined to201710L
rather than201112L
.
GCC extensions not implemented yet¶
clang tries to be compatible with gcc as much as possible, but some gcc extensions are not implemented yet:
clang does not support decimal floating point types (
_Decimal32
and friends) or fixed-point types (_Fract
and friends); nobody has expressed interest in these features yet, so it’s hard to say when they will be implemented.clang does not support nested functions; this is a complex feature which is infrequently used, so it is unlikely to be implemented anytime soon. In C++11 it can be emulated by assigning lambda functions to local variables, e.g:
auto const local_function = [&](int parameter) { // Do something }; ... local_function(1);
clang only supports global register variables when the register specified is non-allocatable (e.g. the stack pointer). Support for general global register variables is unlikely to be implemented soon because it requires additional LLVM backend support.
clang does not support static initialization of flexible array members. This appears to be a rarely used extension, but could be implemented pending user demand.
clang does not support
__builtin_va_arg_pack
/__builtin_va_arg_pack_len
. This is used rarely, but in some potentially interesting places, like the glibc headers, so it may be implemented pending user demand. Note that because clang pretends to be like GCC 4.2, and this extension was introduced in 4.3, the glibc headers will not try to use this extension with clang at the moment.clang does not support the gcc extension for forward-declaring function parameters; this has not shown up in any real-world code yet, though, so it might never be implemented.
This is not a complete list; if you find an unsupported extension missing from this list, please send an e-mail to cfe-dev. This list currently excludes C++; see C++ Language Features. Also, this list does not include bugs in mostly-implemented features; please see the bug tracker for known existing bugs (FIXME: Is there a section for bug-reporting guidelines somewhere?).
Intentionally unsupported GCC extensions¶
- clang does not support the gcc extension that allows variable-length arrays in structures. This is for a few reasons: one, it is tricky to implement, two, the extension is completely undocumented, and three, the extension appears to be rarely used. Note that clang does support flexible array members (arrays with a zero or unspecified size at the end of a structure).
- clang does not have an equivalent to gcc’s “fold”; this means that clang doesn’t accept some constructs gcc might accept in contexts where a constant expression is required, like “x-x” where x is a variable.
- clang does not support
__builtin_apply
and friends; this extension is extremely obscure and difficult to implement reliably.
Microsoft extensions¶
clang has support for many extensions from Microsoft Visual C++. To enable these
extensions, use the -fms-extensions
command-line option. This is the default
for Windows targets. Clang does not implement every pragma or declspec provided
by MSVC, but the popular ones, such as __declspec(dllexport)
and #pragma
comment(lib)
are well supported.
clang has a -fms-compatibility
flag that makes clang accept enough
invalid C++ to be able to parse most Microsoft headers. For example, it
allows unqualified lookup of dependent base class members, which is
a common compatibility issue with clang. This flag is enabled by default
for Windows targets.
-fdelayed-template-parsing
lets clang delay parsing of function template
definitions until the end of a translation unit. This flag is enabled by
default for Windows targets.
For compatibility with existing code that compiles with MSVC, clang defines the
_MSC_VER
and _MSC_FULL_VER
macros. These default to the values of 1800
and 180000000 respectively, making clang look like an early release of Visual
C++ 2013. The -fms-compatibility-version=
flag overrides these values. It
accepts a dotted version tuple, such as 19.00.23506. Changing the MSVC
compatibility version makes clang behave more like that version of MSVC. For
example, -fms-compatibility-version=19
will enable C++14 features and define
char16_t
and char32_t
as builtin types.
C++ Language Features¶
clang fully implements all of standard C++98 except for exported templates (which were removed in C++11), and all of standard C++11 and the current draft standard for C++1y.
Controlling implementation limits¶
-
-fbracket-depth
=N
¶ Sets the limit for nested parentheses, brackets, and braces to N. The default is 256.
-
-fconstexpr-depth
=N
¶ Sets the limit for recursive constexpr function invocations to N. The default is 512.
-
-fconstexpr-steps
=N
¶ Sets the limit for the number of full-expressions evaluated in a single constant expression evaluation. The default is 1048576.
-
-ftemplate-depth
=N
¶ Sets the limit for recursively nested template instantiations to N. The default is 1024.
-
-foperator-arrow-depth
=N
¶ Sets the limit for iterative calls to ‘operator->’ functions to N. The default is 256.
OpenMP Features¶
Clang supports all OpenMP 4.5 directives and clauses. See OpenMP Support for additional details.
Use -fopenmp to enable OpenMP. Support for OpenMP can be disabled with -fno-openmp.
Use -fopenmp-simd to enable OpenMP simd features only, without linking
the runtime library; for combined constructs
(e.g. #pragma omp parallel for simd
) the non-simd directives and clauses
will be ignored. This can be disabled with -fno-openmp-simd.
Controlling implementation limits¶
-
-fopenmp-use-tls
¶
Controls code generation for OpenMP threadprivate variables. In presence of this option all threadprivate variables are generated the same way as thread local variables, using TLS support. If -fno-openmp-use-tls is provided or target does not support TLS, code generation for threadprivate variables relies on OpenMP runtime library.
OpenCL Features¶
Clang can be used to compile OpenCL kernels for execution on a device (e.g. GPU). It is possible to compile the kernel into a binary (e.g. for AMD or Nvidia targets) that can be uploaded to run directly on a device (e.g. using clCreateProgramWithBinary) or into generic bitcode files loadable into other toolchains.
Compiling to a binary using the default target from the installation can be done as follows:
$ echo "kernel void k(){}" > test.cl $ clang test.cl
Compiling for a specific target can be done by specifying the triple corresponding to the target, for example:
$ clang -target nvptx64-unknown-unknown test.cl $ clang -target amdgcn-amd-amdhsa -mcpu=gfx900 test.cl
Compiling to bitcode can be done as follows:
$ clang -c -emit-llvm test.cl
This will produce a generic test.bc file that can be used in vendor toolchains to perform machine code generation.
Clang currently supports OpenCL C language standards up to v2.0.
OpenCL Specific Options¶
Most of the OpenCL build options from the specification v2.0 section 5.8.4 are available.
Examples:
$ clang -cl-std=CL2.0 -cl-single-precision-constant test.cl
Some extra options are available to support special OpenCL features.
-
-finclude-default-header
¶
Loads standard includes during compilations. By default OpenCL headers are not loaded and therefore standard library includes are not available. To load them automatically a flag has been added to the frontend (see also the section on the OpenCL Header):
$ clang -Xclang -finclude-default-header test.cl
Alternatively -include
or -I
followed by the path to the header location
can be given manually.
$ clang -I<path to clang>/lib/Headers/opencl-c.h test.cl
In this case the kernel code should contain #include <opencl-c.h>
just as a
regular C include.
-
-cl-ext
¶
Disables support of OpenCL extensions. All OpenCL targets provide a list
of extensions that they support. Clang allows to amend this using the -cl-ext
flag with a comma-separated list of extensions prefixed with '+'
or '-'
.
The syntax: -cl-ext=<(['-'|'+']<extension>[,])+>
, where extensions
can be either one of the OpenCL specification extensions
or any known vendor extension. Alternatively, 'all'
can be used to enable
or disable all known extensions.
Example disabling double support for the 64-bit SPIR target:
$ clang -cc1 -triple spir64-unknown-unknown -cl-ext=-cl_khr_fp64 test.cl
Enabling all extensions except double support in R600 AMD GPU can be done using:
$ clang -cc1 -triple r600-unknown-unknown -cl-ext=-all,+cl_khr_fp16 test.cl
-
-ffake-address-space-map
¶
Overrides the target address space map with a fake map.
This allows adding explicit address space IDs to the bitcode for non-segmented
memory architectures that don’t have separate IDs for each of the OpenCL
logical address spaces by default. Passing -ffake-address-space-map
will
add/override address spaces of the target compiled for with the following values:
1-global
, 2-constant
, 3-local
, 4-generic
. The private address
space is represented by the absence of an address space attribute in the IR (see
also the section on the address space attribute).
$ clang -ffake-address-space-map test.cl
Some other flags used for the compilation for C can also be passed while
compiling for OpenCL, examples: -c
, -O<1-4|s>
, -o
, -emit-llvm
, etc.
OpenCL Targets¶
OpenCL targets are derived from the regular Clang target classes. The OpenCL specific parts of the target representation provide address space mapping as well as a set of supported extensions.
Specific Targets¶
There is a set of concrete HW architectures that OpenCL can be compiled for.
For AMD target:
$ clang -target amdgcn-amd-amdhsa -mcpu=gfx900 test.cl
For Nvidia architectures:
$ clang -target nvptx64-unknown-unknown test.cl
Generic Targets¶
SPIR is available as a generic target to allow portable bitcode to be produced that can be used across GPU toolchains. The implementation follows the SPIR specification. There are two flavors available for 32 and 64 bits.
$ clang -target spir-unknown-unknown test.cl $ clang -target spir64-unknown-unknown test.cl
All known OpenCL extensions are supported in the SPIR targets. Clang will generate SPIR v1.2 compatible IR for OpenCL versions up to 2.0 and SPIR v2.0 for OpenCL v2.0.
x86 is used by some implementations that are x86 compatible and currently remains for backwards compatibility (with older implementations prior to SPIR target support). For “non-SPMD” targets which cannot spawn multiple work-items on the fly using hardware, which covers practically all non-GPU devices such as CPUs and DSPs, additional processing is needed for the kernels to support multiple work-item execution. For this, a 3rd party toolchain, such as for example POCL, can be used.
This target does not support multiple memory segments and, therefore, the fake address space map can be added using the -ffake-address-space-map flag.
OpenCL Header¶
By default Clang will not include standard headers and therefore OpenCL builtin
functions and some types (i.e. vectors) are unknown. The default CL header is,
however, provided in the Clang installation and can be enabled by passing the
-finclude-default-header
flag to the Clang frontend.
$ echo "bool is_wg_uniform(int i){return get_enqueued_local_size(i)==get_local_size(i);}" > test.cl $ clang -Xclang -finclude-default-header -cl-std=CL2.0 test.cl
Because the header is very large and long to parse, PCH (Precompiled Header and Modules Internals) and modules (Modules) are used internally to improve the compilation speed.
To enable modules for OpenCL:
$ clang -target spir-unknown-unknown -c -emit-llvm -Xclang -finclude-default-header -fmodules -fimplicit-module-maps -fmodules-cache-path=<path to the generated module> test.cl
OpenCL Extensions¶
All of the cl_khr_*
extensions from the official OpenCL specification
up to and including version 2.0 are available and set per target depending on the
support available in the specific architecture.
It is possible to alter the default extensions setting per target using
-cl-ext
flag. (See flags description for more details).
Vendor extensions can be added flexibly by declaring the list of types and functions associated with each extensions enclosed within the following compiler pragma directives:
#pragma OPENCL EXTENSION the_new_extension_name : begin // declare types and functions associated with the extension here #pragma OPENCL EXTENSION the_new_extension_name : end
For example, parsing the following code adds my_t
type and my_func
function to the custom my_ext
extension.
#pragma OPENCL EXTENSION my_ext : begin typedef struct{ int a; }my_t; void my_func(my_t); #pragma OPENCL EXTENSION my_ext : end
Declaring the same types in different vendor extensions is disallowed.
OpenCL Metadata¶
Clang uses metadata to provide additional OpenCL semantics in IR needed for backends and OpenCL runtime.
Each kernel will have function metadata attached to it, specifying the arguments. Kernel argument metadata is used to provide source level information for querying at runtime, for example using the clGetKernelArgInfo call.
Note that -cl-kernel-arg-info
enables more information about the original CL
code to be added e.g. kernel parameter names will appear in the OpenCL metadata
along with other information.
The IDs used to encode the OpenCL’s logical address spaces in the argument info metadata follows the SPIR address space mapping as defined in the SPIR specification section 2.2
OpenCL-Specific Attributes¶
OpenCL support in Clang contains a set of attribute taken directly from the specification as well as additional attributes.
See also Attributes in Clang.
nosvm¶
Clang supports this attribute to comply to OpenCL v2.0 conformance, but it does not have any effect on the IR. For more details reffer to the specification section 6.7.2
opencl_unroll_hint¶
The implementation of this feature mirrors the unroll hint for C. More details on the syntax can be found in the specification section 6.11.5
convergent¶
To make sure no invalid optimizations occur for single program multiple data (SPMD) / single instruction multiple thread (SIMT) Clang provides attributes that can be used for special functions that have cross work item semantics. An example is the subgroup operations such as intel_sub_group_shuffle
// Define custom my_sub_group_shuffle(data, c) // that makes use of intel_sub_group_shuffle r1 = ... if (r0) r1 = computeA(); // Shuffle data from r1 into r3 // of threads id r2. r3 = my_sub_group_shuffle(r1, r2); if (r0) r3 = computeB();
with non-SPMD semantics this is optimized to the following equivalent code:
r1 = ... if (!r0) // Incorrect functionality! The data in r1 // have not been computed by all threads yet. r3 = my_sub_group_shuffle(r1, r2); else { r1 = computeA(); r3 = my_sub_group_shuffle(r1, r2); r3 = computeB(); }
Declaring the function my_sub_group_shuffle
with the convergent attribute
would prevent this:
my_sub_group_shuffle() __attribute__((convergent));
Using convergent
guarantees correct execution by keeping CFG equivalence
wrt operations marked as convergent
. CFG G´
is equivalent to G
wrt
node Ni
: iff ∀ Nj (i≠j)
domination and post-domination relations with
respect to Ni
remain the same in both G
and G´
.
noduplicate¶
noduplicate
is more restrictive with respect to optimizations than
convergent
because a convergent function only preserves CFG equivalence.
This allows some optimizations to happen as long as the control flow remains
unmodified.
for (int i=0; i<4; i++) my_sub_group_shuffle()
can be modified to:
my_sub_group_shuffle(); my_sub_group_shuffle(); my_sub_group_shuffle(); my_sub_group_shuffle();
while using noduplicate
would disallow this. Also noduplicate
doesn’t
have the same safe semantics of CFG as convergent
and can cause changes in
CFG that modify semantics of the original program.
noduplicate
is kept for backwards compatibility only and it considered to be
deprecated for future uses.
address_space¶
Clang has arbitrary address space support using the address_space(N)
attribute, where N
is an integer number in the range 0
to 16777215
(0xffffffu
).
An OpenCL implementation provides a list of standard address spaces using
keywords: private
, local
, global
, and generic
. In the AST and
in the IR local, global, or generic will be represented by the address space
attribute with the corresponding unique number. Note that private does not have
any corresponding attribute added and, therefore, is represented by the absence
of an address space number. The specific IDs for an address space do not have to
match between the AST and the IR. Typically in the AST address space numbers
represent logical segments while in the IR they represent physical segments.
Therefore, machines with flat memory segments can map all AST address space
numbers to the same physical segment ID or skip address space attribute
completely while generating the IR. However, if the address space information
is needed by the IR passes e.g. to improve alias analysis, it is recommended
to keep it and only lower to reflect physical memory segments in the late
machine passes.
OpenCL builtins¶
There are some standard OpenCL functions that are implemented as Clang builtins:
- All pipe functions from section 6.13.16.2/6.13.16.3 of the OpenCL v2.0 kernel language specification. `
- Address space qualifier conversion functions
to_global
/to_local
/to_private
from section 6.13.9. - All the
enqueue_kernel
functions from section 6.13.17.1 and enqueue query functions from section 6.13.17.5.
Target-Specific Features and Limitations¶
CPU Architectures Features and Limitations¶
X86¶
The support for X86 (both 32-bit and 64-bit) is considered stable on Darwin (Mac OS X), Linux, FreeBSD, and Dragonfly BSD: it has been tested to correctly compile many large C, C++, Objective-C, and Objective-C++ codebases.
On x86_64-mingw32
, passing i128(by value) is incompatible with the
Microsoft x64 calling convention. You might need to tweak
WinX86_64ABIInfo::classify()
in lib/CodeGen/TargetInfo.cpp.
For the X86 target, clang supports the -m16 command line
argument which enables 16-bit code output. This is broadly similar to
using asm(".code16gcc")
with the GNU toolchain. The generated code
and the ABI remains 32-bit but the assembler emits instructions
appropriate for a CPU running in 16-bit mode, with address-size and
operand-size prefixes to enable 32-bit addressing and operations.
ARM¶
The support for ARM (specifically ARMv6 and ARMv7) is considered stable on Darwin (iOS): it has been tested to correctly compile many large C, C++, Objective-C, and Objective-C++ codebases. Clang only supports a limited number of ARM architectures. It does not yet fully support ARMv5, for example.
PowerPC¶
The support for PowerPC (especially PowerPC64) is considered stable on Linux and FreeBSD: it has been tested to correctly compile many large C and C++ codebases. PowerPC (32bit) is still missing certain features (e.g. PIC code on ELF platforms).
Other platforms¶
clang currently contains some support for other architectures (e.g. Sparc); however, significant pieces of code generation are still missing, and they haven’t undergone significant testing.
clang contains limited support for the MSP430 embedded processor, but both the clang support and the LLVM backend support are highly experimental.
Other platforms are completely unsupported at the moment. Adding the
minimal support needed for parsing and semantic analysis on a new
platform is quite easy; see lib/Basic/Targets.cpp
in the clang source
tree. This level of support is also sufficient for conversion to LLVM IR
for simple programs. Proper support for conversion to LLVM IR requires
adding code to lib/CodeGen/CGCall.cpp
at the moment; this is likely to
change soon, though. Generating assembly requires a suitable LLVM
backend.
Operating System Features and Limitations¶
Darwin (Mac OS X)¶
Thread Sanitizer is not supported.
Windows¶
Clang has experimental support for targeting “Cygming” (Cygwin / MinGW) platforms.
See also Microsoft Extensions.
MinGW32¶
Clang works on some mingw32 distributions. Clang assumes directories as below;
C:/mingw/include
C:/mingw/lib
C:/mingw/lib/gcc/mingw32/4.[3-5].0/include/c++
On MSYS, a few tests might fail.
MinGW-w64¶
For 32-bit (i686-w64-mingw32), and 64-bit (x86_64-w64-mingw32), Clang assumes as below;
GCC versions 4.5.0 to 4.5.3, 4.6.0 to 4.6.2, or 4.7.0 (for the C++ header search path)
some_directory/bin/gcc.exe
some_directory/bin/clang.exe
some_directory/bin/clang++.exe
some_directory/bin/../include/c++/GCC_version
some_directory/bin/../include/c++/GCC_version/x86_64-w64-mingw32
some_directory/bin/../include/c++/GCC_version/i686-w64-mingw32
some_directory/bin/../include/c++/GCC_version/backward
some_directory/bin/../x86_64-w64-mingw32/include
some_directory/bin/../i686-w64-mingw32/include
some_directory/bin/../include
This directory layout is standard for any toolchain you will find on the official MinGW-w64 website.
Clang expects the GCC executable “gcc.exe” compiled for
i686-w64-mingw32
(or x86_64-w64-mingw32
) to be present on PATH.
Some tests might fail on
x86_64-w64-mingw32
.
clang-cl¶
clang-cl is an alternative command-line interface to Clang, designed for compatibility with the Visual C++ compiler, cl.exe.
To enable clang-cl to find system headers, libraries, and the linker when run from the command-line, it should be executed inside a Visual Studio Native Tools Command Prompt or a regular Command Prompt where the environment has been set up using e.g. vcvarsall.bat.
clang-cl can also be used from inside Visual Studio by selecting the LLVM Platform Toolset. The toolset is installed by the LLVM installer, which can be downloaded from the LLVM release or snapshot build web pages. To use the toolset, select a project in Solution Explorer, open its Property Page (Alt+F7), and in the “General” section of “Configuration Properties” change “Platform Toolset” to e.g. LLVM-vs2014.
To use the toolset with MSBuild directly, invoke it with e.g.
/p:PlatformToolset=LLVM-vs2014
. This allows trying out the clang-cl
toolchain without modifying your project files.
It’s also possible to point MSBuild at clang-cl without changing toolset by
passing /p:CLToolPath=c:\llvm\bin /p:CLToolExe=clang-cl.exe
.
When using CMake and the Visual Studio generators, the toolset can be set with the -T
flag:
cmake -G"Visual Studio 15 2017" -T LLVM-vs2014 ..
When using CMake with the Ninja generator, set the CMAKE_C_COMPILER
and
CMAKE_CXX_COMPILER
variables to clang-cl:
cmake -GNinja -DCMAKE_C_COMPILER="c:/Program Files (x86)/LLVM/bin/clang-cl.exe" -DCMAKE_CXX_COMPILER="c:/Program Files (x86)/LLVM/bin/clang-cl.exe" ..
Command-Line Options¶
To be compatible with cl.exe, clang-cl supports most of the same command-line
options. Those options can start with either /
or -
. It also supports
some of Clang’s core options, such as the -W
options.
Options that are known to clang-cl, but not currently supported, are ignored with a warning. For example:
clang-cl.exe: warning: argument unused during compilation: '/AI'
To suppress warnings about unused arguments, use the -Qunused-arguments
option.
Options that are not known to clang-cl will be ignored by default. Use the
-Werror=unknown-argument
option in order to treat them as errors. If these
options are spelled with a leading /
, they will be mistaken for a filename:
clang-cl.exe: error: no such file or directory: '/foobar'
Please file a bug for any valid cl.exe flags that clang-cl does not understand.
Execute clang-cl /?
to see a list of supported options:
CL.EXE COMPATIBILITY OPTIONS: /? Display available options /arch:<value> Set architecture for code generation /Brepro- Emit an object file which cannot be reproduced over time /Brepro Emit an object file which can be reproduced over time /C Don't discard comments when preprocessing /c Compile only /d1PP Retain macro definitions in /E mode /d1reportAllClassLayout Dump record layout information /diagnostics:caret Enable caret and column diagnostics (on by default) /diagnostics:classic Disable column and caret diagnostics /diagnostics:column Disable caret diagnostics but keep column info /D <macro[=value]> Define macro /EH<value> Exception handling model /EP Disable linemarker output and preprocess to stdout /execution-charset:<value> Runtime encoding, supports only UTF-8 /E Preprocess to stdout /fallback Fall back to cl.exe if clang-cl fails to compile /FA Output assembly code file during compilation /Fa<file or directory> Output assembly code to this file during compilation (with /FA) /Fe<file or directory> Set output executable file or directory (ends in / or \) /FI <value> Include file before parsing /Fi<file> Set preprocess output file name (with /P) /Fo<file or directory> Set output object file, or directory (ends in / or \) (with /c) /fp:except- /fp:except /fp:fast /fp:precise /fp:strict /Fp<filename> Set pch filename (with /Yc and /Yu) /GA Assume thread-local variables are defined in the executable /Gd Set __cdecl as a default calling convention /GF- Disable string pooling /GR- Disable emission of RTTI data /Gregcall Set __regcall as a default calling convention /GR Enable emission of RTTI data /Gr Set __fastcall as a default calling convention /GS- Disable buffer security check /GS Enable buffer security check /Gs<value> Set stack probe size /guard:<value> Enable Control Flow Guard with /guard:cf /Gv Set __vectorcall as a default calling convention /Gw- Don't put each data item in its own section /Gw Put each data item in its own section /GX- Disable exception handling /GX Enable exception handling /Gy- Don't put each function in its own section /Gy Put each function in its own section /Gz Set __stdcall as a default calling convention /help Display available options /imsvc <dir> Add directory to system include search path, as if part of %INCLUDE% /I <dir> Add directory to include search path /J Make char type unsigned /LDd Create debug DLL /LD Create DLL /link <options> Forward options to the linker /MDd Use DLL debug run-time /MD Use DLL run-time /MTd Use static debug run-time /MT Use static run-time /Od Disable optimization /Oi- Disable use of builtin functions /Oi Enable use of builtin functions /Os Optimize for size /Ot Optimize for speed /O<value> Optimization level /o <file or directory> Set output file or directory (ends in / or \) /P Preprocess to file /Qvec- Disable the loop vectorization passes /Qvec Enable the loop vectorization passes /showIncludes Print info about included files to stderr /source-charset:<value> Source encoding, supports only UTF-8 /std:<value> Language standard to compile for /TC Treat all source files as C /Tc <filename> Specify a C source file /TP Treat all source files as C++ /Tp <filename> Specify a C++ source file /utf-8 Set source and runtime encoding to UTF-8 (default) /U <macro> Undefine macro /vd<value> Control vtordisp placement /vmb Use a best-case representation method for member pointers /vmg Use a most-general representation for member pointers /vmm Set the default most-general representation to multiple inheritance /vms Set the default most-general representation to single inheritance /vmv Set the default most-general representation to virtual inheritance /volatile:iso Volatile loads and stores have standard semantics /volatile:ms Volatile loads and stores have acquire and release semantics /W0 Disable all warnings /W1 Enable -Wall /W2 Enable -Wall /W3 Enable -Wall /W4 Enable -Wall and -Wextra /Wall Enable -Weverything /WX- Do not treat warnings as errors /WX Treat warnings as errors /w Disable all warnings /X Don't add %INCLUDE% to the include search path /Y- Disable precompiled headers, overrides /Yc and /Yu /Yc<filename> Generate a pch file for all code up to and including <filename> /Yu<filename> Load a pch file and use it instead of all code up to and including <filename> /Z7 Enable CodeView debug information in object files /Zc:sizedDealloc- Disable C++14 sized global deallocation functions /Zc:sizedDealloc Enable C++14 sized global deallocation functions /Zc:strictStrings Treat string literals as const /Zc:threadSafeInit- Disable thread-safe initialization of static variables /Zc:threadSafeInit Enable thread-safe initialization of static variables /Zc:trigraphs- Disable trigraphs (default) /Zc:trigraphs Enable trigraphs /Zc:twoPhase- Disable two-phase name lookup in templates /Zc:twoPhase Enable two-phase name lookup in templates /Zd Emit debug line number tables only /Zi Alias for /Z7. Does not produce PDBs. /Zl Don't mention any default libraries in the object file /Zp Set the default maximum struct packing alignment to 1 /Zp<value> Specify the default maximum struct packing alignment /Zs Syntax-check only OPTIONS: -### Print (but do not run) the commands to run for this compilation --analyze Run the static analyzer -faddrsig Emit an address-significance table -fansi-escape-codes Use ANSI escape codes for diagnostics -fblocks Enable the 'blocks' language feature -fcf-protection=<value> Instrument control-flow architecture protection. Options: return, branch, full, none. -fcf-protection Enable cf-protection in 'full' mode -fcolor-diagnostics Use colors in diagnostics -fcomplete-member-pointers Require member pointer base types to be complete if they would be significant under the Microsoft ABI -fcoverage-mapping Generate coverage mapping to enable code coverage analysis -fdebug-macro Emit macro debug information -fdelayed-template-parsing Parse templated function definitions at the end of the translation unit -fdiagnostics-absolute-paths Print absolute paths in diagnostics -fdiagnostics-parseable-fixits Print fix-its in machine parseable form -flto=<value> Set LTO mode to either 'full' or 'thin' -flto Enable LTO in 'full' mode -fmerge-all-constants Allow merging of constants -fms-compatibility-version=<value> Dot-separated value representing the Microsoft compiler version number to report in _MSC_VER (0 = don't define it (default)) -fms-compatibility Enable full Microsoft Visual C++ compatibility -fms-extensions Accept some non-standard constructs supported by the Microsoft compiler -fmsc-version=<value> Microsoft compiler version number to report in _MSC_VER (0 = don't define it (default)) -fno-addrsig Don't emit an address-significance table -fno-builtin-<value> Disable implicit builtin knowledge of a specific function -fno-builtin Disable implicit builtin knowledge of functions -fno-complete-member-pointers Do not require member pointer base types to be complete if they would be significant under the Microsoft ABI -fno-coverage-mapping Disable code coverage analysis -fno-debug-macro Do not emit macro debug information -fno-delayed-template-parsing Disable delayed template parsing -fno-sanitize-address-poison-class-member-array-new-cookie Disable poisoning array cookies when using class member operator new[] in AddressSanitizer -fno-sanitize-address-use-after-scope Disable use-after-scope detection in AddressSanitizer -fno-sanitize-blacklist Don't use blacklist file for sanitizers -fno-sanitize-cfi-cross-dso Disable control flow integrity (CFI) checks for cross-DSO calls. -fno-sanitize-coverage=<value> Disable specified features of coverage instrumentation for Sanitizers -fno-sanitize-memory-track-origins Disable origins tracking in MemorySanitizer -fno-sanitize-memory-use-after-dtor Disable use-after-destroy detection in MemorySanitizer -fno-sanitize-recover=<value> Disable recovery for specified sanitizers -fno-sanitize-stats Disable sanitizer statistics gathering. -fno-sanitize-thread-atomics Disable atomic operations instrumentation in ThreadSanitizer -fno-sanitize-thread-func-entry-exit Disable function entry/exit instrumentation in ThreadSanitizer -fno-sanitize-thread-memory-access Disable memory access instrumentation in ThreadSanitizer -fno-sanitize-trap=<value> Disable trapping for specified sanitizers -fno-standalone-debug Limit debug information produced to reduce size of debug binary -fprofile-instr-generate=<file> Generate instrumented code to collect execution counts into <file> (overridden by LLVM_PROFILE_FILE env var) -fprofile-instr-generate Generate instrumented code to collect execution counts into default.profraw file (overridden by '=' form of option or LLVM_PROFILE_FILE env var) -fprofile-instr-use=<value> Use instrumentation data for profile-guided optimization -fsanitize-address-field-padding=<value> Level of field padding for AddressSanitizer -fsanitize-address-globals-dead-stripping Enable linker dead stripping of globals in AddressSanitizer -fsanitize-address-poison-class-member-array-new-cookie Enable poisoning array cookies when using class member operator new[] in AddressSanitizer -fsanitize-address-use-after-scope Enable use-after-scope detection in AddressSanitizer -fsanitize-blacklist=<value> Path to blacklist file for sanitizers -fsanitize-cfi-cross-dso Enable control flow integrity (CFI) checks for cross-DSO calls. -fsanitize-cfi-icall-generalize-pointers Generalize pointers in CFI indirect call type signature checks -fsanitize-coverage=<value> Specify the type of coverage instrumentation for Sanitizers -fsanitize-memory-track-origins=<value> Enable origins tracking in MemorySanitizer -fsanitize-memory-track-origins Enable origins tracking in MemorySanitizer -fsanitize-memory-use-after-dtor Enable use-after-destroy detection in MemorySanitizer -fsanitize-recover=<value> Enable recovery for specified sanitizers -fsanitize-stats Enable sanitizer statistics gathering. -fsanitize-thread-atomics Enable atomic operations instrumentation in ThreadSanitizer (default) -fsanitize-thread-func-entry-exit Enable function entry/exit instrumentation in ThreadSanitizer (default) -fsanitize-thread-memory-access Enable memory access instrumentation in ThreadSanitizer (default) -fsanitize-trap=<value> Enable trapping for specified sanitizers -fsanitize-undefined-strip-path-components=<number> Strip (or keep only, if negative) a given number of path components when emitting check metadata. -fsanitize=<check> Turn on runtime checks for various forms of undefined or suspicious behavior. See user manual for available checks -fstandalone-debug Emit full debug info for all types used by the program -fwhole-program-vtables Enables whole-program vtable optimization. Requires -flto -gcodeview Generate CodeView debug information -gline-tables-only Emit debug line number tables only -miamcu Use Intel MCU ABI -mllvm <value> Additional arguments to forward to LLVM's option processing -nobuiltininc Disable builtin #include directories -Qunused-arguments Don't emit warning for unused driver arguments -R<remark> Enable the specified remark --target=<value> Generate code for the given target --version Print version information -v Show commands to run and use verbose output -W<warning> Enable the specified warning -Xclang <arg> Pass <arg> to the clang compiler
The /fallback Option¶
When clang-cl is run with the /fallback
option, it will first try to
compile files itself. For any file that it fails to compile, it will fall back
and try to compile the file by invoking cl.exe.
This option is intended to be used as a temporary means to build projects where clang-cl cannot successfully compile all the files. clang-cl may fail to compile a file either because it cannot generate code for some C++ feature, or because it cannot parse some Microsoft language extension.
Assembling a Complete Toolchain¶
Introduction¶
Clang is only one component in a complete tool chain for C family programming languages. In order to assemble a complete toolchain, additional tools and runtime libraries are required. Clang is designed to interoperate with existing tools and libraries for its target platforms, and the LLVM project provides alternatives for a number of these components.
This document describes the required and optional components in a complete toolchain, where to find them, and the supported versions and limitations of each option.
Warning
This document currently describes Clang configurations on POSIX-like
operating systems with the GCC-compatible clang
driver. When
targeting Windows with the MSVC-compatible clang-cl
driver, some
of the details are different.
Tools¶
A complete compilation of C family programming languages typically involves the following pipeline of tools, some of which are omitted in some compilations:
- Preprocessor: This performs the actions of the C preprocessor:
expanding #includes and #defines.
The
-E
flag instructs Clang to stop after this step. - Parsing: This parses and semantically analyzes the source language and
builds a source-level intermediate representation (“AST”), producing a
precompiled header (PCH),
preamble, or
precompiled module file (PCM),
depending on the input.
The
-precompile
flag instructs Clang to stop after this step. This is the default when the input is a header file. - IR generation: This converts the source-level intermediate representation
into an optimizer-specific intermediate representation (IR); for Clang, this
is LLVM IR.
The
-emit-llvm
flag instructs Clang to stop after this step. If combined with-S
, Clang will produce textual LLVM IR; otherwise, it will produce LLVM IR bitcode. - Compiler backend: This converts the intermediate representation
into target-specific assembly code.
The
-S
flag instructs Clang to stop after this step. - Assembler: This converts target-specific assembly code into
target-specific machine code object files.
The
-c
flag instructs Clang to stop after this step. - Linker: This combines multiple object files into a single image (either a shared object or an executable).
Clang provides all of these pieces other than the linker. When multiple steps are performed by the same tool, it is common for the steps to be fused together to avoid creating intermediate files.
When given an output of one of the above steps as an input, earlier steps
are skipped (for instance, a .s
file input will be assembled and linked).
The Clang driver can be invoked with the -###
flag (this argument will need
to be escaped under most shells) to see which commands it would run for the
above steps, without running them. The -v
(verbose) flag will print the
commands in addition to running them.
Clang frontend¶
The Clang frontend (clang -cc1
) is used to compile C family languages. The
command-line interface of the frontend is considered to be an implementation
detail, intentionally has no external documentation, and is subject to change
without notice.
Language frontends for other languages¶
Clang can be provided with inputs written in non-C-family languages. In such cases, an external tool will be used to compile the input. The currently-supported languages are:
- Ada (
-x ada
,.ad[bs]
) - Fortran (
-x f95
,.f
,.f9[05]
,.for
,.fpp
, case-insensitive) - Java (
-x java
)
In each case, GCC will be invoked to compile the input.
Assember¶
Clang can either use LLVM’s integrated assembler or an external system-specific
tool (for instance, the GNU Assembler on GNU OSes) to produce machine code from
assembly.
By default, Clang uses LLVM’s integrated assembler on all targets where it is
supported. If you wish to use the system assember instead, use the
-fno-integrated-as
option.
Linker¶
Clang can be configured to use one of several different linkers:
- GNU ld
- GNU gold
- LLVM’s lld
- MSVC’s link.exe
Link-time optimization is natively supported by lld, and supported via a linker plugin when using gold.
The default linker varies between targets, and can be overridden via the
-fuse-ld=<linker name>
flag.
Runtime libraries¶
A number of different runtime libraries are required to provide different
layers of support for C family programs. Clang will implicitly link an
appropriate implementation of each runtime library, selected based on
target defaults or explicitly selected by the --rtlib=
and --stdlib=
flags.
The set of implicitly-linked libraries depend on the language mode. As a
consequence, you should use clang++
when linking C++ programs in order
to ensure the C++ runtimes are provided.
Note
There may exist other implementations for these components not described below. Please let us know how well those other implementations work with Clang so they can be added to this list!
Compiler runtime¶
The compiler runtime library provides definitions of functions implicitly invoked by the compiler to support operations not natively supported by the underlying hardware (for instance, 128-bit integer multiplications), and where inline expansion of the operation is deemed unsuitable.
The default runtime library is target-specific. For targets where GCC is the dominant compiler, Clang currently defaults to using libgcc_s. On most other targets, compiler-rt is used by default.
compiler-rt (LLVM)¶
LLVM’s compiler runtime library provides a
complete set of runtime library functions containing all functions that
Clang will implicitly call, in libclang_rt.builtins.<arch>.a
.
You can instruct Clang to use compiler-rt with the --rtlib=compiler-rt
flag.
This is not supported on every platform.
If using libc++ and/or libc++abi, you may need to configure them to use
compiler-rt rather than libgcc_s by passing -DLIBCXX_USE_COMPILER_RT=YES
and/or -DLIBCXXABI_USE_COMPILER_RT=YES
to cmake
. Otherwise, you
may end up with both runtime libraries linked into your program (this is
typically harmless, but wasteful).
libgcc_s (GNU)¶
GCC’s runtime library
can be used in place of compiler-rt. However, it lacks several functions
that LLVM may emit references to, particularly when using Clang’s
__builtin_*_overflow
family of intrinsics.
You can instruct Clang to use libgcc_s with the --rtlib=libgcc
flag.
This is not supported on every platform.
Atomics library¶
If your program makes use of atomic operations and the compiler is not able
to lower them all directly to machine instructions (because there either is
no known suitable machine instruction or the operand is not known to be
suitably aligned), a call to a runtime library __atomic_*
function
will be generated. A runtime library containing these atomics functions is
necessary for such programs.
compiler-rt (LLVM)¶
compiler-rt contains an implementation of an atomics library.
libatomic (GNU)¶
libgcc_s does not provide an implementation of an atomics library. Instead, GCC’s libatomic library can be used to supply these when using libgcc_s.
Note
Clang does not currently automatically link against libatomic when using
libgcc_s. You may need to manually add -latomic
to support this
configuration when using non-native atomic operations (if you see link errors
referring to __atomic_*
functions).
Unwind library¶
The unwind library provides a family of _Unwind_*
functions implementing
the language-neutral stack unwinding portion of the Itanium C++ ABI
(Level I).
It is a dependency of the C++ ABI library, and sometimes is a dependency
of other runtimes.
libunwind (LLVM)¶
LLVM’s unwinder library can be obtained from subversion:
llvm-src$ svn co http://llvm.org/svn/llvm-project/libunwind/trunk projects/libunwind
When checked out into projects/libunwind within an LLVM checkout, it should be automatically picked up by the LLVM build system.
If using libc++abi, you may need to configure it to use libunwind
rather than libgcc_s by passing -DLIBCXXABI_USE_LLVM_UNWINDER=YES
to cmake
. If libc++abi is configured to use some version of
libunwind, that library will be implicitly linked into binaries that
link to libc++abi.
libgcc_s (GNU)¶
libgcc_s has an integrated unwinder, and does not need an external unwind library to be provided.
libunwind (nongnu.org)¶
This is another implementation of the libunwind specification. See libunwind (nongnu.org).
libunwind (PathScale)¶
This is another implementation of the libunwind specification. See libunwind (pathscale).
Sanitizer runtime¶
The instrumentation added by Clang’s sanitizers (-fsanitize=...
) implicitly
makes calls to a runtime library, in order to maintain side state about the
execution of the program and to issue diagnostic messages when a problem is
detected.
The only supported implementation of these runtimes is provided by LLVM’s
compiler-rt, and the relevant portion of that library
(libclang_rt.<sanitizer>.<arch>.a
)
will be implicitly linked when linking with a -fsanitize=...
flag.
C standard library¶
Clang supports a wide variety of C standard library implementations.
C++ ABI library¶
The C++ ABI library provides an implementation of the library portion of the Itanium C++ ABI, covering both the support functionality in the main Itanium C++ ABI document and Level II of the exception handling support. References to the functions and objects in this library are implicitly generated by Clang when compiling C++ code.
While it is possible to link C++ code using libstdc++ and code using libc++ together into the same program (so long as you do not attempt to pass C++ standard library objects across the boundary), it is not generally possible to have more than one C++ ABI library in a program.
The version of the C++ ABI library used by Clang will be the one that the chosen C++ standard library was linked against. Several implementations are available:
libsupc++ (GNU)¶
libsupc++ is GCC’s implementation of this specification. However, this library is only used when libstdc++ is linked statically. The dynamic library version of libstdc++ contains a copy of libsupc++.
Note
Clang does not currently automatically link against libatomic when statically
linking libstdc++. You may need to manually add -lsupc++
to support this
configuration when using -static
or -static-libstdc++
.
C++ standard library¶
Clang supports use of either LLVM’s libc++ or GCC’s libstdc++ implementation of the C++ standard library.
libc++ (LLVM)¶
libc++ is LLVM’s implementation of the C++ standard library, aimed at being a complete implementation of the C++ standards from C++11 onwards.
You can instruct Clang to use libc++ with the -stdlib=libc++
flag.
libstdc++ (GNU)¶
libstdc++ is GCC’s implementation of the C++ standard library. Clang supports a wide range of versions of libstdc++, from around version 4.2 onwards, and will implicitly work around some bugs in older versions of libstdc++.
You can instruct Clang to use libstdc++ with the -stdlib=libstdc++
flag.
Clang Language Extensions¶
- Introduction
- Feature Checking Macros
- Include File Checking Macros
- Builtin Macros
- Vectors and Extended Vectors
- Half-Precision Floating Point
- Messages on
deprecated
andunavailable
Attributes - Attributes on Enumerators
- ‘User-Specified’ System Frameworks
- Checks for Standard Language Features
- Checks for Type Trait Primitives
- Blocks
- Objective-C Features
- Initializer lists for complex numbers in C
- Builtin Functions
- Non-standard C++11 Attributes
- Target-Specific Extensions
- Extensions for Static Analysis
- Extensions for Dynamic Analysis
- Extensions for selectively disabling optimization
- Extensions for loop hint optimizations
- Extensions to specify floating-point flags
- Specifying an attribute for multiple declarations (#pragma clang attribute)
- Specifying section names for global objects (#pragma clang section)
- Specifying Linker Options on ELF Targets
Objective-C Literals¶
Introduction¶
Three new features were introduced into clang at the same time:
NSNumber Literals provide a syntax for creating NSNumber
from
scalar literal expressions; Collection Literals provide a short-hand
for creating arrays and dictionaries; Object Subscripting provides a
way to use subscripting with Objective-C objects. Users of Apple
compiler releases can use these features starting with the Apple LLVM
Compiler 4.0. Users of open-source LLVM.org compiler releases can use
these features starting with clang v3.1.
These language additions simplify common Objective-C programming patterns, make programs more concise, and improve the safety of container creation.
This document describes how the features are implemented in clang, and how to use them in your own programs.
NSNumber Literals¶
The framework class NSNumber
is used to wrap scalar values inside
objects: signed and unsigned integers (char
, short
, int
,
long
, long long
), floating point numbers (float
,
double
), and boolean values (BOOL
, C++ bool
). Scalar values
wrapped in objects are also known as boxed values.
In Objective-C, any character, numeric or boolean literal prefixed with
the '@'
character will evaluate to a pointer to an NSNumber
object initialized with that value. C’s type suffixes may be used to
control the size of numeric literals.
Examples¶
The following program illustrates the rules for NSNumber
literals:
void main(int argc, const char *argv[]) {
// character literals.
NSNumber *theLetterZ = @'Z'; // equivalent to [NSNumber numberWithChar:'Z']
// integral literals.
NSNumber *fortyTwo = @42; // equivalent to [NSNumber numberWithInt:42]
NSNumber *fortyTwoUnsigned = @42U; // equivalent to [NSNumber numberWithUnsignedInt:42U]
NSNumber *fortyTwoLong = @42L; // equivalent to [NSNumber numberWithLong:42L]
NSNumber *fortyTwoLongLong = @42LL; // equivalent to [NSNumber numberWithLongLong:42LL]
// floating point literals.
NSNumber *piFloat = @3.141592654F; // equivalent to [NSNumber numberWithFloat:3.141592654F]
NSNumber *piDouble = @3.1415926535; // equivalent to [NSNumber numberWithDouble:3.1415926535]
// BOOL literals.
NSNumber *yesNumber = @YES; // equivalent to [NSNumber numberWithBool:YES]
NSNumber *noNumber = @NO; // equivalent to [NSNumber numberWithBool:NO]
#ifdef __cplusplus
NSNumber *trueNumber = @true; // equivalent to [NSNumber numberWithBool:(BOOL)true]
NSNumber *falseNumber = @false; // equivalent to [NSNumber numberWithBool:(BOOL)false]
#endif
}
Discussion¶
NSNumber literals only support literal scalar values after the '@'
.
Consequently, @INT_MAX
works, but @INT_MIN
does not, because
they are defined like this:
#define INT_MAX 2147483647 /* max value for an int */
#define INT_MIN (-2147483647-1) /* min value for an int */
The definition of INT_MIN
is not a simple literal, but a
parenthesized expression. Parenthesized expressions are supported using
the boxed expression syntax, which is
described in the next section.
Because NSNumber
does not currently support wrapping long double
values, the use of a long double NSNumber
literal (e.g.
@123.23L
) will be rejected by the compiler.
Previously, the BOOL
type was simply a typedef for signed char
,
and YES
and NO
were macros that expand to (BOOL)1
and
(BOOL)0
respectively. To support @YES
and @NO
expressions,
these macros are now defined using new language keywords in
<objc/objc.h>
:
#if __has_feature(objc_bool)
#define YES __objc_yes
#define NO __objc_no
#else
#define YES ((BOOL)1)
#define NO ((BOOL)0)
#endif
The compiler implicitly converts __objc_yes
and __objc_no
to
(BOOL)1
and (BOOL)0
. The keywords are used to disambiguate
BOOL
and integer literals.
Objective-C++ also supports @true
and @false
expressions, which
are equivalent to @YES
and @NO
.
Boxed Expressions¶
Objective-C provides a new syntax for boxing C expressions:
@( <expression> )
Expressions of scalar (numeric, enumerated, BOOL), C string pointer and some C structures (via NSValue) are supported:
// numbers.
NSNumber *smallestInt = @(-INT_MAX - 1); // [NSNumber numberWithInt:(-INT_MAX - 1)]
NSNumber *piOverTwo = @(M_PI / 2); // [NSNumber numberWithDouble:(M_PI / 2)]
// enumerated types.
typedef enum { Red, Green, Blue } Color;
NSNumber *favoriteColor = @(Green); // [NSNumber numberWithInt:((int)Green)]
// strings.
NSString *path = @(getenv("PATH")); // [NSString stringWithUTF8String:(getenv("PATH"))]
NSArray *pathComponents = [path componentsSeparatedByString:@":"];
// structs.
NSValue *center = @(view.center); // Point p = view.center;
// [NSValue valueWithBytes:&p objCType:@encode(Point)];
NSValue *frame = @(view.frame); // Rect r = view.frame;
// [NSValue valueWithBytes:&r objCType:@encode(Rect)];
Boxed Enums¶
Cocoa frameworks frequently define constant values using enums.
Although enum values are integral, they may not be used directly as
boxed literals (this avoids conflicts with future '@'
-prefixed
Objective-C keywords). Instead, an enum value must be placed inside a
boxed expression. The following example demonstrates configuring an
AVAudioRecorder
using a dictionary that contains a boxed enumeration
value:
enum {
AVAudioQualityMin = 0,
AVAudioQualityLow = 0x20,
AVAudioQualityMedium = 0x40,
AVAudioQualityHigh = 0x60,
AVAudioQualityMax = 0x7F
};
- (AVAudioRecorder *)recordToFile:(NSURL *)fileURL {
NSDictionary *settings = @{ AVEncoderAudioQualityKey : @(AVAudioQualityMax) };
return [[AVAudioRecorder alloc] initWithURL:fileURL settings:settings error:NULL];
}
The expression @(AVAudioQualityMax)
converts AVAudioQualityMax
to an integer type, and boxes the value accordingly. If the enum has a
fixed underlying type as in:
typedef enum : unsigned char { Red, Green, Blue } Color;
NSNumber *red = @(Red), *green = @(Green), *blue = @(Blue); // => [NSNumber numberWithUnsignedChar:]
then the fixed underlying type will be used to select the correct
NSNumber
creation method.
Boxing a value of enum type will result in a NSNumber
pointer with a
creation method according to the underlying type of the enum, which can
be a fixed underlying type
or a compiler-defined integer type capable of representing the values of
all the members of the enumeration:
typedef enum : unsigned char { Red, Green, Blue } Color;
Color col = Red;
NSNumber *nsCol = @(col); // => [NSNumber numberWithUnsignedChar:]
Boxed C Strings¶
A C string literal prefixed by the '@'
token denotes an NSString
literal in the same way a numeric literal prefixed by the '@'
token
denotes an NSNumber
literal. When the type of the parenthesized
expression is (char *)
or (const char *)
, the result of the
boxed expression is a pointer to an NSString
object containing
equivalent character data, which is assumed to be ‘\0’-terminated and
UTF-8 encoded. The following example converts C-style command line
arguments into NSString
objects.
// Partition command line arguments into positional and option arguments.
NSMutableArray *args = [NSMutableArray new];
NSMutableDictionary *options = [NSMutableDictionary new];
while (--argc) {
const char *arg = *++argv;
if (strncmp(arg, "--", 2) == 0) {
options[@(arg + 2)] = @(*++argv); // --key value
} else {
[args addObject:@(arg)]; // positional argument
}
}
As with all C pointers, character pointer expressions can involve
arbitrary pointer arithmetic, therefore programmers must ensure that the
character data is valid. Passing NULL
as the character pointer will
raise an exception at runtime. When possible, the compiler will reject
NULL
character pointers used in boxed expressions.
Boxed C Structures¶
Boxed expressions support construction of NSValue objects.
It said that C structures can be used, the only requirement is:
structure should be marked with objc_boxable
attribute.
To support older version of frameworks and/or third-party libraries
you may need to add the attribute via typedef
.
struct __attribute__((objc_boxable)) Point {
// ...
};
typedef struct __attribute__((objc_boxable)) _Size {
// ...
} Size;
typedef struct _Rect {
// ...
} Rect;
struct Point p;
NSValue *point = @(p); // ok
Size s;
NSValue *size = @(s); // ok
Rect r;
NSValue *bad_rect = @(r); // error
typedef struct __attribute__((objc_boxable)) _Rect Rect;
NSValue *good_rect = @(r); // ok
Container Literals¶
Objective-C now supports a new expression syntax for creating immutable array and dictionary container objects.
Examples¶
Immutable array expression:
NSArray *array = @[ @"Hello", NSApp, [NSNumber numberWithInt:42] ];
This creates an NSArray
with 3 elements. The comma-separated
sub-expressions of an array literal can be any Objective-C object
pointer typed expression.
Immutable dictionary expression:
NSDictionary *dictionary = @{
@"name" : NSUserName(),
@"date" : [NSDate date],
@"processInfo" : [NSProcessInfo processInfo]
};
This creates an NSDictionary
with 3 key/value pairs. Value
sub-expressions of a dictionary literal must be Objective-C object
pointer typed, as in array literals. Key sub-expressions must be of an
Objective-C object pointer type that implements the
<NSCopying>
protocol.
Discussion¶
Neither keys nor values can have the value nil
in containers. If the
compiler can prove that a key or value is nil
at compile time, then
a warning will be emitted. Otherwise, a runtime error will occur.
Using array and dictionary literals is safer than the variadic creation
forms commonly in use today. Array literal expressions expand to calls
to +[NSArray arrayWithObjects:count:]
, which validates that all
objects are non-nil
. The variadic form,
+[NSArray arrayWithObjects:]
uses nil
as an argument list
terminator, which can lead to malformed array objects. Dictionary
literals are similarly created with
+[NSDictionary dictionaryWithObjects:forKeys:count:]
which validates
all objects and keys, unlike
+[NSDictionary dictionaryWithObjectsAndKeys:]
which also uses a
nil
parameter as an argument list terminator.
Object Subscripting¶
Objective-C object pointer values can now be used with C’s subscripting operator.
Examples¶
The following code demonstrates the use of object subscripting syntax
with NSMutableArray
and NSMutableDictionary
objects:
NSMutableArray *array = ...;
NSUInteger idx = ...;
id newObject = ...;
id oldObject = array[idx];
array[idx] = newObject; // replace oldObject with newObject
NSMutableDictionary *dictionary = ...;
NSString *key = ...;
oldObject = dictionary[key];
dictionary[key] = newObject; // replace oldObject with newObject
The next section explains how subscripting expressions map to accessor methods.
Subscripting Methods¶
Objective-C supports two kinds of subscript expressions: array-style subscript expressions use integer typed subscripts; dictionary-style subscript expressions use Objective-C object pointer typed subscripts. Each type of subscript expression is mapped to a message send using a predefined selector. The advantage of this design is flexibility: class designers are free to introduce subscripting by declaring methods or by adopting protocols. Moreover, because the method names are selected by the type of the subscript, an object can be subscripted using both array and dictionary styles.
Array-Style Subscripting¶
When the subscript operand has an integral type, the expression is rewritten to use one of two different selectors, depending on whether the element is being read or written. When an expression reads an element using an integral index, as in the following example:
NSUInteger idx = ...;
id value = object[idx];
it is translated into a call to objectAtIndexedSubscript:
id value = [object objectAtIndexedSubscript:idx];
When an expression writes an element using an integral index:
object[idx] = newValue;
it is translated to a call to setObject:atIndexedSubscript:
[object setObject:newValue atIndexedSubscript:idx];
These message sends are then type-checked and performed just like explicit message sends. The method used for objectAtIndexedSubscript: must be declared with an argument of integral type and a return value of some Objective-C object pointer type. The method used for setObject:atIndexedSubscript: must be declared with its first argument having some Objective-C pointer type and its second argument having integral type.
The meaning of indexes is left up to the declaring class. The compiler
will coerce the index to the appropriate argument type of the method it
uses for type-checking. For an instance of NSArray
, reading an
element using an index outside the range [0, array.count)
will raise
an exception. For an instance of NSMutableArray
, assigning to an
element using an index within this range will replace that element, but
assigning to an element using an index outside this range will raise an
exception; no syntax is provided for inserting, appending, or removing
elements for mutable arrays.
A class need not declare both methods in order to take advantage of this
language feature. For example, the class NSArray
declares only
objectAtIndexedSubscript:
, so that assignments to elements will fail
to type-check; moreover, its subclass NSMutableArray
declares
setObject:atIndexedSubscript:
.
Dictionary-Style Subscripting¶
When the subscript operand has an Objective-C object pointer type, the expression is rewritten to use one of two different selectors, depending on whether the element is being read from or written to. When an expression reads an element using an Objective-C object pointer subscript operand, as in the following example:
id key = ...;
id value = object[key];
it is translated into a call to the objectForKeyedSubscript:
method:
id value = [object objectForKeyedSubscript:key];
When an expression writes an element using an Objective-C object pointer subscript:
object[key] = newValue;
it is translated to a call to setObject:forKeyedSubscript:
[object setObject:newValue forKeyedSubscript:key];
The behavior of setObject:forKeyedSubscript:
is class-specific; but
in general it should replace an existing value if one is already
associated with a key, otherwise it should add a new value for the key.
No syntax is provided for removing elements from mutable dictionaries.
Discussion¶
An Objective-C subscript expression occurs when the base operand of the C subscript operator has an Objective-C object pointer type. Since this potentially collides with pointer arithmetic on the value, these expressions are only supported under the modern Objective-C runtime, which categorically forbids such arithmetic.
Currently, only subscripts of integral or Objective-C object pointer type are supported. In C++, a class type can be used if it has a single conversion function to an integral or Objective-C pointer type, in which case that conversion is applied and analysis continues as appropriate. Otherwise, the expression is ill-formed.
An Objective-C object subscript expression is always an l-value. If the expression appears on the left-hand side of a simple assignment operator (=), the element is written as described below. If the expression appears on the left-hand side of a compound assignment operator (e.g. +=), the program is ill-formed, because the result of reading an element is always an Objective-C object pointer and no binary operators are legal on such pointers. If the expression appears in any other position, the element is read as described below. It is an error to take the address of a subscript expression, or (in C++) to bind a reference to it.
Programs can use object subscripting with Objective-C object pointers of
type id
. Normal dynamic message send rules apply; the compiler must
see some declaration of the subscripting methods, and will pick the
declaration seen first.
Caveats¶
Objects created using the literal or boxed expression syntax are not
guaranteed to be uniqued by the runtime, but nor are they guaranteed to
be newly-allocated. As such, the result of performing direct comparisons
against the location of an object literal (using ==
, !=
, <
,
<=
, >
, or >=
) is not well-defined. This is usually a simple
mistake in code that intended to call the isEqual:
method (or the
compare:
method).
This caveat applies to compile-time string literals as well.
Historically, string literals (using the @"..."
syntax) have been
uniqued across translation units during linking. This is an
implementation detail of the compiler and should not be relied upon. If
you are using such code, please use global string constants instead
(NSString * const MyConst = @"..."
) or use isEqual:
.
Grammar Additions¶
To support the new syntax described above, the Objective-C
@
-expression grammar has the following new productions:
objc-at-expression : '@' (string-literal | encode-literal | selector-literal | protocol-literal | object-literal)
;
object-literal : ('+' | '-')? numeric-constant
| character-constant
| boolean-constant
| array-literal
| dictionary-literal
;
boolean-constant : '__objc_yes' | '__objc_no' | 'true' | 'false' /* boolean keywords. */
;
array-literal : '[' assignment-expression-list ']'
;
assignment-expression-list : assignment-expression (',' assignment-expression-list)?
| /* empty */
;
dictionary-literal : '{' key-value-list '}'
;
key-value-list : key-value-pair (',' key-value-list)?
| /* empty */
;
key-value-pair : assignment-expression ':' assignment-expression
;
Note: @true
and @false
are only supported in Objective-C++.
Availability Checks¶
Programs test for the new features by using clang’s __has_feature checks. Here are examples of their use:
#if __has_feature(objc_array_literals)
// new way.
NSArray *elements = @[ @"H", @"He", @"O", @"C" ];
#else
// old way (equivalent).
id objects[] = { @"H", @"He", @"O", @"C" };
NSArray *elements = [NSArray arrayWithObjects:objects count:4];
#endif
#if __has_feature(objc_dictionary_literals)
// new way.
NSDictionary *masses = @{ @"H" : @1.0078, @"He" : @4.0026, @"O" : @15.9990, @"C" : @12.0096 };
#else
// old way (equivalent).
id keys[] = { @"H", @"He", @"O", @"C" };
id values[] = { [NSNumber numberWithDouble:1.0078], [NSNumber numberWithDouble:4.0026],
[NSNumber numberWithDouble:15.9990], [NSNumber numberWithDouble:12.0096] };
NSDictionary *masses = [NSDictionary dictionaryWithObjects:objects forKeys:keys count:4];
#endif
#if __has_feature(objc_subscripting)
NSUInteger i, count = elements.count;
for (i = 0; i < count; ++i) {
NSString *element = elements[i];
NSNumber *mass = masses[element];
NSLog(@"the mass of %@ is %@", element, mass);
}
#else
NSUInteger i, count = [elements count];
for (i = 0; i < count; ++i) {
NSString *element = [elements objectAtIndex:i];
NSNumber *mass = [masses objectForKey:element];
NSLog(@"the mass of %@ is %@", element, mass);
}
#endif
#if __has_attribute(objc_boxable)
typedef struct __attribute__((objc_boxable)) _Rect Rect;
#endif
#if __has_feature(objc_boxed_nsvalue_expressions)
CABasicAnimation animation = [CABasicAnimation animationWithKeyPath:@"position"];
animation.fromValue = @(layer.position);
animation.toValue = @(newPosition);
[layer addAnimation:animation forKey:@"move"];
#else
CABasicAnimation animation = [CABasicAnimation animationWithKeyPath:@"position"];
animation.fromValue = [NSValue valueWithCGPoint:layer.position];
animation.toValue = [NSValue valueWithCGPoint:newPosition];
[layer addAnimation:animation forKey:@"move"];
#endif
Code can use also __has_feature(objc_bool)
to check for the
availability of numeric literals support. This checks for the new
__objc_yes / __objc_no
keywords, which enable the use of
@YES / @NO
literals.
To check whether boxed expressions are supported, use
__has_feature(objc_boxed_expressions)
feature macro.
Language Specification for Blocks¶
Revisions¶
- 2008/2/25 — created
- 2008/7/28 — revised,
__block
syntax - 2008/8/13 — revised, Block globals
- 2008/8/21 — revised, C++ elaboration
- 2008/11/1 — revised,
__weak
support - 2009/1/12 — revised, explicit return types
- 2009/2/10 — revised,
__block
objects need retain
Overview¶
A new derived type is introduced to C and, by extension, Objective-C, C++, and Objective-C++
The Block Type¶
Like function types, the Block type is a pair consisting of a result value type and a list of parameter types very similar to a function type. Blocks are intended to be used much like functions with the key distinction being that in addition to executable code they also contain various variable bindings to automatic (stack) or managed (heap) memory.
The abstract declarator,
int (^)(char, float)
describes a reference to a Block that, when invoked, takes two parameters, the first of type char and the second of type float, and returns a value of type int. The Block referenced is of opaque data that may reside in automatic (stack) memory, global memory, or heap memory.
Block Variable Declarations¶
A variable with Block type is declared using function
pointer style notation substituting ^
for *
. The following are
valid Block variable declarations:
void (^blockReturningVoidWithVoidArgument)(void);
int (^blockReturningIntWithIntAndCharArguments)(int, char);
void (^arrayOfTenBlocksReturningVoidWithIntArgument[10])(int);
Variadic ...
arguments are supported. [variadic.c] A Block that
takes no arguments must specify void in the argument list [voidarg.c].
An empty parameter list does not represent, as K&R provide, an
unspecified argument list. Note: both gcc and clang support K&R style
as a convenience.
A Block reference may be cast to a pointer of arbitrary type and vice
versa. [cast.c] A Block reference may not be dereferenced via the
pointer dereference operator *
, and thus a Block’s size may not be
computed at compile time. [sizeof.c]
Block Literal Expressions¶
A Block literal expression produces a reference to a
Block. It is introduced by the use of the ^
token as a unary
operator.
Block_literal_expression ::= ^ block_decl compound_statement_body
block_decl ::=
block_decl ::= parameter_list
block_decl ::= type_expression
where type expression is extended to allow ^
as a Block reference
(pointer) where *
is allowed as a function reference (pointer).
The following Block literal:
^ void (void) { printf("hello world\n"); }
produces a reference to a Block with no arguments with no return value.
The return type is optional and is inferred from the return statements. If the return statements return a value, they all must return a value of the same type. If there is no value returned the inferred type of the Block is void; otherwise it is the type of the return statement value.
If the return type is omitted and the argument list is ( void )
,
the ( void )
argument list may also be omitted.
So:
^ ( void ) { printf("hello world\n"); }
and:
^ { printf("hello world\n"); }
are exactly equivalent constructs for the same expression.
The type_expression extends C expression parsing to accommodate Block reference declarations as it accommodates function pointer declarations.
Given:
typedef int (*pointerToFunctionThatReturnsIntWithCharArg)(char);
pointerToFunctionThatReturnsIntWithCharArg functionPointer;
^ pointerToFunctionThatReturnsIntWithCharArg (float x) { return functionPointer; }
and:
^ int ((*)(float x))(char) { return functionPointer; }
are equivalent expressions, as is:
^(float x) { return functionPointer; }
[returnfunctionptr.c]
The compound statement body establishes a new lexical scope within that of its parent. Variables used within the scope of the compound statement are bound to the Block in the normal manner with the exception of those in automatic (stack) storage. Thus one may access functions and global variables as one would expect, as well as static local variables. [testme]
Local automatic (stack) variables referenced within the compound statement of a Block are imported and captured by the Block as const copies. The capture (binding) is performed at the time of the Block literal expression evaluation.
The compiler is not required to capture a variable if it can prove that no references to the variable will actually be evaluated. Programmers can force a variable to be captured by referencing it in a statement at the beginning of the Block, like so:
(void) foo;
This matters when capturing the variable has side-effects, as it can in Objective-C or C++.
The lifetime of variables declared in a Block is that of a function; each activation frame contains a new copy of variables declared within the local scope of the Block. Such variable declarations should be allowed anywhere [testme] rather than only when C99 parsing is requested, including for statements. [testme]
Block literal expressions may occur within Block literal expressions (nest) and all variables captured by any nested blocks are implicitly also captured in the scopes of their enclosing Blocks.
A Block literal expression may be used as the initialization value for Block variables at global or local static scope.
The Invoke Operator¶
Blocks are invoked using function call syntax with a list of expression parameters of types corresponding to the declaration and returning a result type also according to the declaration. Given:
int (^x)(char);
void (^z)(void);
int (^(*y))(char) = &x;
the following are all legal Block invocations:
x('a');
(*y)('a');
(true ? x : *y)('a')
The Copy and Release Operations¶
The compiler and runtime provide copy and release operations for Block references that create and, in matched use, release allocated storage for referenced Blocks.
The copy operation Block_copy()
is styled as a function that takes
an arbitrary Block reference and returns a Block reference of the same
type. The release operation, Block_release()
, is styled as a
function that takes an arbitrary Block reference and, if dynamically
matched to a Block copy operation, allows recovery of the referenced
allocated memory.
The __block
Storage Qualifier¶
In addition to the new Block type we also introduce a new storage
qualifier, __block, for local variables. [testme: a
__block declaration within a block literal] The __block
storage
qualifier is mutually exclusive to the existing local storage
qualifiers auto, register, and static. [testme] Variables qualified by
__block
act as if they were in allocated storage and this storage
is automatically recovered after last use of said variable. An
implementation may choose an optimization where the storage is
initially automatic and only “moved” to allocated (heap) storage upon
a Block_copy of a referencing Block. Such variables may be mutated as
normal variables are.
In the case where a __block
variable is a Block one must assume
that the __block
variable resides in allocated storage and as such
is assumed to reference a Block that is also in allocated storage
(that it is the result of a Block_copy
operation). Despite this
there is no provision to do a Block_copy
or a Block_release
if
an implementation provides initial automatic storage for Blocks. This
is due to the inherent race condition of potentially several threads
trying to update the shared variable and the need for synchronization
around disposing of older values and copying new ones. Such
synchronization is beyond the scope of this language specification.
Control Flow¶
The compound statement of a Block is treated much like a function body with respect to control flow in that goto, break, and continue do not escape the Block. Exceptions are treated normally in that when thrown they pop stack frames until a catch clause is found.
Objective-C Extensions¶
Objective-C extends the definition of a Block reference type to be that also of id. A variable or expression of Block type may be messaged or used as a parameter wherever an id may be. The converse is also true. Block references may thus appear as properties and are subject to the assign, retain, and copy attribute logic that is reserved for objects.
All Blocks are constructed to be Objective-C objects regardless of
whether the Objective-C runtime is operational in the program or
not. Blocks using automatic (stack) memory are objects and may be
messaged, although they may not be assigned into __weak
locations
if garbage collection is enabled.
Within a Block literal expression within a method definition references to instance variables are also imported into the lexical scope of the compound statement. These variables are implicitly qualified as references from self, and so self is imported as a const copy. The net effect is that instance variables can be mutated.
The Block_copy operator retains all objects held in
variables of automatic storage referenced within the Block expression
(or form strong references if running under garbage collection).
Object variables of __block
storage type are assumed to hold
normal pointers with no provision for retain and release messages.
Foundation defines (and supplies) -copy
and -release
methods for
Blocks.
In the Objective-C and Objective-C++ languages, we allow the
__weak
specifier for __block
variables of object type. If
garbage collection is not enabled, this qualifier causes these
variables to be kept without retain messages being sent. This
knowingly leads to dangling pointers if the Block (or a copy) outlives
the lifetime of this object.
In garbage collected environments, the __weak
variable is set to
nil when the object it references is collected, as long as the
__block
variable resides in the heap (either by default or via
Block_copy()
). The initial Apple implementation does in fact
start __block
variables on the stack and migrate them to the heap
only as a result of a Block_copy()
operation.
It is a runtime error to attempt to assign a reference to a
stack-based Block into any storage marked __weak
, including
__weak
__block
variables.
C++ Extensions¶
Block literal expressions within functions are extended to allow const use of C++ objects, pointers, or references held in automatic storage.
As usual, within the block, references to captured variables become const-qualified, as if they were references to members of a const object. Note that this does not change the type of a variable of reference type.
For example, given a class Foo:
Foo foo;
Foo &fooRef = foo;
Foo *fooPtr = &foo;
A Block that referenced these variables would import the variables as const variations:
const Foo block_foo = foo;
Foo &block_fooRef = fooRef;
Foo *const block_fooPtr = fooPtr;
Captured variables are copied into the Block at the instant of
evaluating the Block literal expression. They are also copied when
calling Block_copy()
on a Block allocated on the stack. In both
cases, they are copied as if the variable were const-qualified, and
it’s an error if there’s no such constructor.
Captured variables in Blocks on the stack are destroyed when control leaves the compound statement that contains the Block literal expression. Captured variables in Blocks on the heap are destroyed when the reference count of the Block drops to zero.
Variables declared as residing in __block
storage may be initially
allocated in the heap or may first appear on the stack and be copied
to the heap as a result of a Block_copy()
operation. When copied
from the stack, __block
variables are copied using their normal
qualification (i.e. without adding const). In C++11, __block
variables are copied as x-values if that is possible, then as l-values
if not; if both fail, it’s an error. The destructor for any initial
stack-based version is called at the variable’s normal end of scope.
References to this
, as well as references to non-static members of
any enclosing class, are evaluated by capturing this
just like a
normal variable of C pointer type.
Member variables that are Blocks may not be overloaded by the types of their arguments.
Block Implementation Specification¶
History¶
- 2008/7/14 - created.
- 2008/8/21 - revised, C++.
- 2008/9/24 - add
NULL
isa
field to__block
storage. - 2008/10/1 - revise block layout to use a
static
descriptor structure. - 2008/10/6 - revise block layout to use an unsigned long int flags.
- 2008/10/28 - specify use of
_Block_object_assign
and_Block_object_dispose
for all “Object” types in helper functions. - 2008/10/30 - revise new layout to have invoke function in same place.
- 2008/10/30 - add
__weak
support. - 2010/3/16 - rev for stret return, signature field.
- 2010/4/6 - improved wording.
- 2013/1/6 - improved wording and converted to rst.
This document describes the Apple ABI implementation specification of Blocks.
The first shipping version of this ABI is found in Mac OS X 10.6, and shall be referred to as 10.6.ABI. As of 2010/3/16, the following describes the ABI contract with the runtime and the compiler, and, as necessary, will be referred to as ABI.2010.3.16.
Since the Apple ABI references symbols from other elements of the system, any attempt to use this ABI on systems prior to SnowLeopard is undefined.
High Level¶
The ABI of Blocks
consist of their layout and the runtime functions required
by the compiler. A Block
consists of a structure of the following form:
struct Block_literal_1 {
void *isa; // initialized to &_NSConcreteStackBlock or &_NSConcreteGlobalBlock
int flags;
int reserved;
void (*invoke)(void *, ...);
struct Block_descriptor_1 {
unsigned long int reserved; // NULL
unsigned long int size; // sizeof(struct Block_literal_1)
// optional helper functions
void (*copy_helper)(void *dst, void *src); // IFF (1<<25)
void (*dispose_helper)(void *src); // IFF (1<<25)
// required ABI.2010.3.16
const char *signature; // IFF (1<<30)
} *descriptor;
// imported variables
};
The following flags bits are in use thusly for a possible ABI.2010.3.16:
enum {
// Set to true on blocks that have captures (and thus are not true
// global blocks) but are known not to escape for various other
// reasons. For backward compatiblity with old runtimes, whenever
// BLOCK_IS_NOESCAPE is set, BLOCK_IS_GLOBAL is set too. Copying a
// non-escaping block returns the original block and releasing such a
// block is a no-op, which is exactly how global blocks are handled.
BLOCK_IS_NOESCAPE = (1 << 23),
BLOCK_HAS_COPY_DISPOSE = (1 << 25),
BLOCK_HAS_CTOR = (1 << 26), // helpers have C++ code
BLOCK_IS_GLOBAL = (1 << 28),
BLOCK_HAS_STRET = (1 << 29), // IFF BLOCK_HAS_SIGNATURE
BLOCK_HAS_SIGNATURE = (1 << 30),
};
In 10.6.ABI the (1<<29) was usually set and was always ignored by the runtime - it had been a transitional marker that did not get deleted after the transition. This bit is now paired with (1<<30), and represented as the pair (3<<30), for the following combinations of valid bit settings, and their meanings:
switch (flags & (3<<29)) {
case (0<<29): 10.6.ABI, no signature field available
case (1<<29): 10.6.ABI, no signature field available
case (2<<29): ABI.2010.3.16, regular calling convention, presence of signature field
case (3<<29): ABI.2010.3.16, stret calling convention, presence of signature field,
}
The signature field is not always populated.
The following discussions are presented as 10.6.ABI otherwise.
Block
literals may occur within functions where the structure is created in
stack local memory. They may also appear as initialization expressions for
Block
variables of global or static
local variables.
When a Block
literal expression is evaluated the stack based structure is
initialized as follows:
- A
static
descriptor structure is declared and initialized as follows:
a. The
invoke
function pointer is set to a function that takes theBlock
structure as its first argument and the rest of the arguments (if any) to theBlock
and executes theBlock
compound statement.b. The
size
field is set to the size of the followingBlock
literal structure.c. The
copy_helper
anddispose_helper
function pointers are set to respective helper functions if they are required by theBlock
literal.
A stack (or global)
Block
literal data structure is created and initialized as follows:a. The
isa
field is set to the address of the external_NSConcreteStackBlock
, which is a block of uninitialized memory supplied inlibSystem
, or_NSConcreteGlobalBlock
if this is a static or file levelBlock
literal.b. The
flags
field is set to zero unless there are variables imported into theBlock
that need helper functions for program levelBlock_copy()
andBlock_release()
operations, in which case the (1<<25) flags bit is set.
As an example, the Block
literal expression:
^ { printf("hello world\n"); }
would cause the following to be created on a 32-bit system:
struct __block_literal_1 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_1 *);
struct __block_descriptor_1 *descriptor;
};
void __block_invoke_1(struct __block_literal_1 *_block) {
printf("hello world\n");
}
static struct __block_descriptor_1 {
unsigned long int reserved;
unsigned long int Block_size;
} __block_descriptor_1 = { 0, sizeof(struct __block_literal_1), __block_invoke_1 };
and where the Block
literal itself appears:
struct __block_literal_1 _block_literal = {
&_NSConcreteStackBlock,
(1<<29), <uninitialized>,
__block_invoke_1,
&__block_descriptor_1
};
A Block
imports other Block
references, const
copies of other
variables, and variables marked __block
. In Objective-C, variables may
additionally be objects.
When a Block
literal expression is used as the initial value of a global
or static
local variable, it is initialized as follows:
struct __block_literal_1 __block_literal_1 = {
&_NSConcreteGlobalBlock,
(1<<28)|(1<<29), <uninitialized>,
__block_invoke_1,
&__block_descriptor_1
};
that is, a different address is provided as the first value and a particular
(1<<28) bit is set in the flags
field, and otherwise it is the same as for
stack based Block
literals. This is an optimization that can be used for
any Block
literal that imports no const
or __block
storage
variables.
Imported Variables¶
Variables of auto
storage class are imported as const
copies. Variables
of __block
storage class are imported as a pointer to an enclosing data
structure. Global variables are simply referenced and not considered as
imported.
Imported const
copy variables¶
Automatic storage variables not marked with __block
are imported as
const
copies.
The simplest example is that of importing a variable of type int
:
int x = 10;
void (^vv)(void) = ^{ printf("x is %d\n", x); }
x = 11;
vv();
which would be compiled to:
struct __block_literal_2 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_2 *);
struct __block_descriptor_2 *descriptor;
const int x;
};
void __block_invoke_2(struct __block_literal_2 *_block) {
printf("x is %d\n", _block->x);
}
static struct __block_descriptor_2 {
unsigned long int reserved;
unsigned long int Block_size;
} __block_descriptor_2 = { 0, sizeof(struct __block_literal_2) };
and:
struct __block_literal_2 __block_literal_2 = {
&_NSConcreteStackBlock,
(1<<29), <uninitialized>,
__block_invoke_2,
&__block_descriptor_2,
x
};
In summary, scalars, structures, unions, and function pointers are generally
imported as const
copies with no need for helper functions.
Imported const
copy of Block
reference¶
The first case where copy and dispose helper functions are required is for the
case of when a Block
itself is imported. In this case both a
copy_helper
function and a dispose_helper
function are needed. The
copy_helper
function is passed both the existing stack based pointer and the
pointer to the new heap version and should call back into the runtime to
actually do the copy operation on the imported fields within the Block
. The
runtime functions are all described in Runtime Helper Functions.
A quick example:
void (^existingBlock)(void) = ...;
void (^vv)(void) = ^{ existingBlock(); }
vv();
struct __block_literal_3 {
...; // existing block
};
struct __block_literal_4 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_4 *);
struct __block_literal_3 *const existingBlock;
};
void __block_invoke_4(struct __block_literal_2 *_block) {
__block->existingBlock->invoke(__block->existingBlock);
}
void __block_copy_4(struct __block_literal_4 *dst, struct __block_literal_4 *src) {
//_Block_copy_assign(&dst->existingBlock, src->existingBlock, 0);
_Block_object_assign(&dst->existingBlock, src->existingBlock, BLOCK_FIELD_IS_BLOCK);
}
void __block_dispose_4(struct __block_literal_4 *src) {
// was _Block_destroy
_Block_object_dispose(src->existingBlock, BLOCK_FIELD_IS_BLOCK);
}
static struct __block_descriptor_4 {
unsigned long int reserved;
unsigned long int Block_size;
void (*copy_helper)(struct __block_literal_4 *dst, struct __block_literal_4 *src);
void (*dispose_helper)(struct __block_literal_4 *);
} __block_descriptor_4 = {
0,
sizeof(struct __block_literal_4),
__block_copy_4,
__block_dispose_4,
};
and where said Block
is used:
struct __block_literal_4 _block_literal = {
&_NSConcreteStackBlock,
(1<<25)|(1<<29), <uninitialized>
__block_invoke_4,
& __block_descriptor_4
existingBlock,
};
Importing __attribute__((NSObject))
variables¶
GCC introduces __attribute__((NSObject))
on structure pointers to mean “this
is an object”. This is useful because many low level data structures are
declared as opaque structure pointers, e.g. CFStringRef
, CFArrayRef
,
etc. When used from C, however, these are still really objects and are the
second case where that requires copy and dispose helper functions to be
generated. The copy helper functions generated by the compiler should use the
_Block_object_assign
runtime helper function and in the dispose helper the
_Block_object_dispose
runtime helper function should be called.
For example, Block
foo in the following:
struct Opaque *__attribute__((NSObject)) objectPointer = ...;
...
void (^foo)(void) = ^{ CFPrint(objectPointer); };
would have the following helper functions generated:
void __block_copy_foo(struct __block_literal_5 *dst, struct __block_literal_5 *src) {
_Block_object_assign(&dst->objectPointer, src-> objectPointer, BLOCK_FIELD_IS_OBJECT);
}
void __block_dispose_foo(struct __block_literal_5 *src) {
_Block_object_dispose(src->objectPointer, BLOCK_FIELD_IS_OBJECT);
}
Imported __block
marked variables¶
Layout of __block
marked variables¶
The compiler must embed variables that are marked __block
in a specialized
structure of the form:
struct _block_byref_foo {
void *isa;
struct Block_byref *forwarding;
int flags; //refcount;
int size;
typeof(marked_variable) marked_variable;
};
Variables of certain types require helper functions for when Block_copy()
and Block_release()
are performed upon a referencing Block
. At the “C”
level only variables that are of type Block
or ones that have
__attribute__((NSObject))
marked require helper functions. In Objective-C
objects require helper functions and in C++ stack based objects require helper
functions. Variables that require helper functions use the form:
struct _block_byref_foo {
void *isa;
struct _block_byref_foo *forwarding;
int flags; //refcount;
int size;
// helper functions called via Block_copy() and Block_release()
void (*byref_keep)(void *dst, void *src);
void (*byref_dispose)(void *);
typeof(marked_variable) marked_variable;
};
The structure is initialized such that:
a. The
forwarding
pointer is set to the beginning of its enclosing structure.b. The
size
field is initialized to the total size of the enclosing structure.c. The
flags
field is set to either 0 if no helper functions are needed or (1<<25) if they are.
- The helper functions are initialized (if present).
- The variable itself is set to its initial value.
- The
isa
field is set toNULL
.
Access to __block
variables from within its lexical scope¶
In order to “move” the variable to the heap upon a copy_helper
operation the
compiler must rewrite access to such a variable to be indirect through the
structures forwarding
pointer. For example:
int __block i = 10;
i = 11;
would be rewritten to be:
struct _block_byref_i {
void *isa;
struct _block_byref_i *forwarding;
int flags; //refcount;
int size;
int captured_i;
} i = { NULL, &i, 0, sizeof(struct _block_byref_i), 10 };
i.forwarding->captured_i = 11;
In the case of a Block
reference variable being marked __block
the
helper code generated must use the _Block_object_assign
and
_Block_object_dispose
routines supplied by the runtime to make the
copies. For example:
__block void (voidBlock)(void) = blockA;
voidBlock = blockB;
would translate into:
struct _block_byref_voidBlock {
void *isa;
struct _block_byref_voidBlock *forwarding;
int flags; //refcount;
int size;
void (*byref_keep)(struct _block_byref_voidBlock *dst, struct _block_byref_voidBlock *src);
void (*byref_dispose)(struct _block_byref_voidBlock *);
void (^captured_voidBlock)(void);
};
void _block_byref_keep_helper(struct _block_byref_voidBlock *dst, struct _block_byref_voidBlock *src) {
//_Block_copy_assign(&dst->captured_voidBlock, src->captured_voidBlock, 0);
_Block_object_assign(&dst->captured_voidBlock, src->captured_voidBlock, BLOCK_FIELD_IS_BLOCK | BLOCK_BYREF_CALLER);
}
void _block_byref_dispose_helper(struct _block_byref_voidBlock *param) {
//_Block_destroy(param->captured_voidBlock, 0);
_Block_object_dispose(param->captured_voidBlock, BLOCK_FIELD_IS_BLOCK | BLOCK_BYREF_CALLER)}
and:
struct _block_byref_voidBlock voidBlock = {( .forwarding=&voidBlock, .flags=(1<<25), .size=sizeof(struct _block_byref_voidBlock *),
.byref_keep=_block_byref_keep_helper, .byref_dispose=_block_byref_dispose_helper,
.captured_voidBlock=blockA )};
voidBlock.forwarding->captured_voidBlock = blockB;
Importing __block
variables into Blocks
¶
A Block
that uses a __block
variable in its compound statement body must
import the variable and emit copy_helper
and dispose_helper
helper
functions that, in turn, call back into the runtime to actually copy or release
the byref
data block using the functions _Block_object_assign
and
_Block_object_dispose
.
For example:
int __block i = 2;
functioncall(^{ i = 10; });
would translate to:
struct _block_byref_i {
void *isa; // set to NULL
struct _block_byref_voidBlock *forwarding;
int flags; //refcount;
int size;
void (*byref_keep)(struct _block_byref_i *dst, struct _block_byref_i *src);
void (*byref_dispose)(struct _block_byref_i *);
int captured_i;
};
struct __block_literal_5 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_5 *);
struct __block_descriptor_5 *descriptor;
struct _block_byref_i *i_holder;
};
void __block_invoke_5(struct __block_literal_5 *_block) {
_block->forwarding->captured_i = 10;
}
void __block_copy_5(struct __block_literal_5 *dst, struct __block_literal_5 *src) {
//_Block_byref_assign_copy(&dst->captured_i, src->captured_i);
_Block_object_assign(&dst->captured_i, src->captured_i, BLOCK_FIELD_IS_BYREF | BLOCK_BYREF_CALLER);
}
void __block_dispose_5(struct __block_literal_5 *src) {
//_Block_byref_release(src->captured_i);
_Block_object_dispose(src->captured_i, BLOCK_FIELD_IS_BYREF | BLOCK_BYREF_CALLER);
}
static struct __block_descriptor_5 {
unsigned long int reserved;
unsigned long int Block_size;
void (*copy_helper)(struct __block_literal_5 *dst, struct __block_literal_5 *src);
void (*dispose_helper)(struct __block_literal_5 *);
} __block_descriptor_5 = { 0, sizeof(struct __block_literal_5) __block_copy_5, __block_dispose_5 };
and:
struct _block_byref_i i = {( .isa=NULL, .forwarding=&i, .flags=0, .size=sizeof(struct _block_byref_i), .captured_i=2 )};
struct __block_literal_5 _block_literal = {
&_NSConcreteStackBlock,
(1<<25)|(1<<29), <uninitialized>,
__block_invoke_5,
&__block_descriptor_5,
&i,
};
Importing __attribute__((NSObject))
__block
variables¶
A __block
variable that is also marked __attribute__((NSObject))
should
have byref_keep
and byref_dispose
helper functions that use
_Block_object_assign
and _Block_object_dispose
.
__block
escapes¶
Because Blocks
referencing __block
variables may have Block_copy()
performed upon them the underlying storage for the variables may move to the
heap. In Objective-C Garbage Collection Only compilation environments the heap
used is the garbage collected one and no further action is required. Otherwise
the compiler must issue a call to potentially release any heap storage for
__block
variables at all escapes or terminations of their scope. The call
should be:
_Block_object_dispose(&_block_byref_foo, BLOCK_FIELD_IS_BYREF);
Objective C Extensions to Blocks
¶
Importing Objects¶
Objects should be treated as __attribute__((NSObject))
variables; all
copy_helper
, dispose_helper
, byref_keep
, and byref_dispose
helper functions should use _Block_object_assign
and
_Block_object_dispose
. There should be no code generated that uses
*-retain
or *-release
methods.
Blocks
as Objects¶
The compiler will treat Blocks
as objects when synthesizing property setters
and getters, will characterize them as objects when generating garbage
collection strong and weak layout information in the same manner as objects, and
will issue strong and weak write-barrier assignments in the same manner as
objects.
__weak __block
Support¶
Objective-C (and Objective-C++) support the __weak
attribute on __block
variables. Under normal circumstances the compiler uses the Objective-C runtime
helper support functions objc_assign_weak
and objc_read_weak
. Both
should continue to be used for all reads and writes of __weak __block
variables:
objc_read_weak(&block->byref_i->forwarding->i)
The __weak
variable is stored in a _block_byref_foo
structure and the
Block
has copy and dispose helpers for this structure that call:
_Block_object_assign(&dest->_block_byref_i, src-> _block_byref_i, BLOCK_FIELD_IS_WEAK | BLOCK_FIELD_IS_BYREF);
and:
_Block_object_dispose(src->_block_byref_i, BLOCK_FIELD_IS_WEAK | BLOCK_FIELD_IS_BYREF);
In turn, the block_byref
copy support helpers distinguish between whether
the __block
variable is a Block
or not and should either call:
_Block_object_assign(&dest->_block_byref_i, src->_block_byref_i, BLOCK_FIELD_IS_WEAK | BLOCK_FIELD_IS_OBJECT | BLOCK_BYREF_CALLER);
for something declared as an object or:
_Block_object_assign(&dest->_block_byref_i, src->_block_byref_i, BLOCK_FIELD_IS_WEAK | BLOCK_FIELD_IS_BLOCK | BLOCK_BYREF_CALLER);
for something declared as a Block
.
A full example follows:
__block __weak id obj = <initialization expression>;
functioncall(^{ [obj somemessage]; });
would translate to:
struct _block_byref_obj {
void *isa; // uninitialized
struct _block_byref_obj *forwarding;
int flags; //refcount;
int size;
void (*byref_keep)(struct _block_byref_i *dst, struct _block_byref_i *src);
void (*byref_dispose)(struct _block_byref_i *);
id captured_obj;
};
void _block_byref_obj_keep(struct _block_byref_voidBlock *dst, struct _block_byref_voidBlock *src) {
//_Block_copy_assign(&dst->captured_obj, src->captured_obj, 0);
_Block_object_assign(&dst->captured_obj, src->captured_obj, BLOCK_FIELD_IS_OBJECT | BLOCK_FIELD_IS_WEAK | BLOCK_BYREF_CALLER);
}
void _block_byref_obj_dispose(struct _block_byref_voidBlock *param) {
//_Block_destroy(param->captured_obj, 0);
_Block_object_dispose(param->captured_obj, BLOCK_FIELD_IS_OBJECT | BLOCK_FIELD_IS_WEAK | BLOCK_BYREF_CALLER);
};
for the block byref
part and:
struct __block_literal_5 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_5 *);
struct __block_descriptor_5 *descriptor;
struct _block_byref_obj *byref_obj;
};
void __block_invoke_5(struct __block_literal_5 *_block) {
[objc_read_weak(&_block->byref_obj->forwarding->captured_obj) somemessage];
}
void __block_copy_5(struct __block_literal_5 *dst, struct __block_literal_5 *src) {
//_Block_byref_assign_copy(&dst->byref_obj, src->byref_obj);
_Block_object_assign(&dst->byref_obj, src->byref_obj, BLOCK_FIELD_IS_BYREF | BLOCK_FIELD_IS_WEAK);
}
void __block_dispose_5(struct __block_literal_5 *src) {
//_Block_byref_release(src->byref_obj);
_Block_object_dispose(src->byref_obj, BLOCK_FIELD_IS_BYREF | BLOCK_FIELD_IS_WEAK);
}
static struct __block_descriptor_5 {
unsigned long int reserved;
unsigned long int Block_size;
void (*copy_helper)(struct __block_literal_5 *dst, struct __block_literal_5 *src);
void (*dispose_helper)(struct __block_literal_5 *);
} __block_descriptor_5 = { 0, sizeof(struct __block_literal_5), __block_copy_5, __block_dispose_5 };
and within the compound statement:
truct _block_byref_obj obj = {( .forwarding=&obj, .flags=(1<<25), .size=sizeof(struct _block_byref_obj),
.byref_keep=_block_byref_obj_keep, .byref_dispose=_block_byref_obj_dispose,
.captured_obj = <initialization expression> )};
truct __block_literal_5 _block_literal = {
&_NSConcreteStackBlock,
(1<<25)|(1<<29), <uninitialized>,
__block_invoke_5,
&__block_descriptor_5,
&obj, // a reference to the on-stack structure containing "captured_obj"
};
functioncall(_block_literal->invoke(&_block_literal));
C++ Support¶
Within a block stack based C++ objects are copied into const
copies using
the copy constructor. It is an error if a stack based C++ object is used within
a block if it does not have a copy constructor. In addition both copy and
destroy helper routines must be synthesized for the block to support the
Block_copy()
operation, and the flags work marked with the (1<<26) bit in
addition to the (1<<25) bit. The copy helper should call the constructor using
appropriate offsets of the variable within the supplied stack based block source
and heap based destination for all const
constructed copies, and similarly
should call the destructor in the destroy routine.
As an example, suppose a C++ class FOO
existed with a copy constructor.
Within a code block a stack version of a FOO
object is declared and used
within a Block
literal expression:
{
FOO foo;
void (^block)(void) = ^{ printf("%d\n", foo.value()); };
}
The compiler would synthesize:
struct __block_literal_10 {
void *isa;
int flags;
int reserved;
void (*invoke)(struct __block_literal_10 *);
struct __block_descriptor_10 *descriptor;
const FOO foo;
};
void __block_invoke_10(struct __block_literal_10 *_block) {
printf("%d\n", _block->foo.value());
}
void __block_literal_10(struct __block_literal_10 *dst, struct __block_literal_10 *src) {
FOO_ctor(&dst->foo, &src->foo);
}
void __block_dispose_10(struct __block_literal_10 *src) {
FOO_dtor(&src->foo);
}
static struct __block_descriptor_10 {
unsigned long int reserved;
unsigned long int Block_size;
void (*copy_helper)(struct __block_literal_10 *dst, struct __block_literal_10 *src);
void (*dispose_helper)(struct __block_literal_10 *);
} __block_descriptor_10 = { 0, sizeof(struct __block_literal_10), __block_copy_10, __block_dispose_10 };
and the code would be:
{
FOO foo;
comp_ctor(&foo); // default constructor
struct __block_literal_10 _block_literal = {
&_NSConcreteStackBlock,
(1<<25)|(1<<26)|(1<<29), <uninitialized>,
__block_invoke_10,
&__block_descriptor_10,
};
comp_ctor(&_block_literal->foo, &foo); // const copy into stack version
struct __block_literal_10 &block = &_block_literal; // assign literal to block variable
block->invoke(block); // invoke block
comp_dtor(&_block_literal->foo); // destroy stack version of const block copy
comp_dtor(&foo); // destroy original version
}
C++ objects stored in __block
storage start out on the stack in a
block_byref
data structure as do other variables. Such objects (if not
const
objects) must support a regular copy constructor. The block_byref
data structure will have copy and destroy helper routines synthesized by the
compiler. The copy helper will have code created to perform the copy
constructor based on the initial stack block_byref
data structure, and will
also set the (1<<26) bit in addition to the (1<<25) bit. The destroy helper
will have code to do the destructor on the object stored within the supplied
block_byref
heap data structure. For example,
__block FOO blockStorageFoo;
requires the normal constructor for the embedded blockStorageFoo
object:
FOO_ctor(& _block_byref_blockStorageFoo->blockStorageFoo);
and at scope termination the destructor:
FOO_dtor(& _block_byref_blockStorageFoo->blockStorageFoo);
Note that the forwarding indirection is NOT used.
The compiler would need to generate (if used from a block literal) the following copy/dispose helpers:
void _block_byref_obj_keep(struct _block_byref_blockStorageFoo *dst, struct _block_byref_blockStorageFoo *src) {
FOO_ctor(&dst->blockStorageFoo, &src->blockStorageFoo);
}
void _block_byref_obj_dispose(struct _block_byref_blockStorageFoo *src) {
FOO_dtor(&src->blockStorageFoo);
}
for the appropriately named constructor and destructor for the class/struct
FOO
.
To support member variable and function access the compiler will synthesize a
const
pointer to a block version of the this
pointer.
Runtime Helper Functions¶
The runtime helper functions are described in
/usr/local/include/Block_private.h
. To summarize their use, a Block
requires copy/dispose helpers if it imports any block variables, __block
storage variables, __attribute__((NSObject))
variables, or C++ const
copied objects with constructor/destructors. The (1<<26) bit is set and
functions are generated.
The block copy helper function should, for each of the variables of the type mentioned above, call:
_Block_object_assign(&dst->target, src->target, BLOCK_FIELD_<apropos>);
in the copy helper and:
_Block_object_dispose(->target, BLOCK_FIELD_<apropos>);
in the dispose helper where <apropos>
is:
enum {
BLOCK_FIELD_IS_OBJECT = 3, // id, NSObject, __attribute__((NSObject)), block, ...
BLOCK_FIELD_IS_BLOCK = 7, // a block variable
BLOCK_FIELD_IS_BYREF = 8, // the on stack structure holding the __block variable
BLOCK_FIELD_IS_WEAK = 16, // declared __weak
BLOCK_BYREF_CALLER = 128, // called from byref copy/dispose helpers
};
and of course the constructors/destructors for const
copied C++ objects.
The block_byref
data structure similarly requires copy/dispose helpers for
block variables, __attribute__((NSObject))
variables, or C++ const
copied objects with constructor/destructors, and again the (1<<26) bit is set
and functions are generated in the same manner.
Under ObjC we allow __weak
as an attribute on __block
variables, and
this causes the addition of BLOCK_FIELD_IS_WEAK
orred onto the
BLOCK_FIELD_IS_BYREF
flag when copying the block_byref
structure in the
Block
copy helper, and onto the BLOCK_FIELD_<apropos>
field within the
block_byref
copy/dispose helper calls.
The prototypes, and summary, of the helper functions are:
/* Certain field types require runtime assistance when being copied to the
heap. The following function is used to copy fields of types: blocks,
pointers to byref structures, and objects (including
__attribute__((NSObject)) pointers. BLOCK_FIELD_IS_WEAK is orthogonal to
the other choices which are mutually exclusive. Only in a Block copy
helper will one see BLOCK_FIELD_IS_BYREF.
*/
void _Block_object_assign(void *destAddr, const void *object, const int flags);
/* Similarly a compiler generated dispose helper needs to call back for each
field of the byref data structure. (Currently the implementation only
packs one field into the byref structure but in principle there could be
more). The same flags used in the copy helper should be used for each
call generated to this function:
*/
void _Block_object_dispose(const void *object, const int flags);
Copyright¶
Copyright 2008-2010 Apple, Inc. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Objective-C Automatic Reference Counting (ARC)¶
- About this document
- General
- Retainable object pointers
- Ownership qualification
- Method families
- Optimization
- Miscellaneous
- Runtime support
id objc_autorelease(id value);
void objc_autoreleasePoolPop(void *pool);
void *objc_autoreleasePoolPush(void);
id objc_autoreleaseReturnValue(id value);
void objc_copyWeak(id *dest, id *src);
void objc_destroyWeak(id *object);
id objc_initWeak(id *object, id value);
id objc_loadWeak(id *object);
id objc_loadWeakRetained(id *object);
void objc_moveWeak(id *dest, id *src);
void objc_release(id value);
id objc_retain(id value);
id objc_retainAutorelease(id value);
id objc_retainAutoreleaseReturnValue(id value);
id objc_retainAutoreleasedReturnValue(id value);
id objc_retainBlock(id value);
id objc_storeStrong(id *object, id value);
id objc_storeWeak(id *object, id value);
About this document¶
Purpose¶
The first and primary purpose of this document is to serve as a complete technical specification of Automatic Reference Counting. Given a core Objective-C compiler and runtime, it should be possible to write a compiler and runtime which implements these new semantics.
The secondary purpose is to act as a rationale for why ARC was designed in this way. This should remain tightly focused on the technical design and should not stray into marketing speculation.
Background¶
This document assumes a basic familiarity with C.
Blocks are a C language extension for creating anonymous functions.
Users interact with and transfer block objects using block
pointers, which are represented like a normal pointer. A block may capture
values from local variables; when this occurs, memory must be dynamically
allocated. The initial allocation is done on the stack, but the runtime
provides a Block_copy
function which, given a block pointer, either copies
the underlying block object to the heap, setting its reference count to 1 and
returning the new block pointer, or (if the block object is already on the
heap) increases its reference count by 1. The paired function is
Block_release
, which decreases the reference count by 1 and destroys the
object if the count reaches zero and is on the heap.
Objective-C is a set of language extensions, significant enough to be considered a different language. It is a strict superset of C. The extensions can also be imposed on C++, producing a language called Objective-C++. The primary feature is a single-inheritance object system; we briefly describe the modern dialect.
Objective-C defines a new type kind, collectively called the object
pointer types. This kind has two notable builtin members, id
and
Class
; id
is the final supertype of all object pointers. The validity
of conversions between object pointer types is not checked at runtime. Users
may define classes; each class is a type, and the pointer to that
type is an object pointer type. A class may have a superclass; its pointer
type is a subtype of its superclass’s pointer type. A class has a set of
ivars, fields which appear on all instances of that class. For
every class T there’s an associated metaclass; it has no fields, its
superclass is the metaclass of T’s superclass, and its metaclass is a global
class. Every class has a global object whose class is the class’s metaclass;
metaclasses have no associated type, so pointers to this object have type
Class
.
A class declaration (@interface
) declares a set of methods. A
method has a return type, a list of argument types, and a selector:
a name like foo:bar:baz:
, where the number of colons corresponds to the
number of formal arguments. A method may be an instance method, in which case
it can be invoked on objects of the class, or a class method, in which case it
can be invoked on objects of the metaclass. A method may be invoked by
providing an object (called the receiver) and a list of formal
arguments interspersed with the selector, like so:
[receiver foo: fooArg bar: barArg baz: bazArg]
This looks in the dynamic class of the receiver for a method with this name,
then in that class’s superclass, etc., until it finds something it can execute.
The receiver “expression” may also be the name of a class, in which case the
actual receiver is the class object for that class, or (within method
definitions) it may be super
, in which case the lookup algorithm starts
with the static superclass instead of the dynamic class. The actual methods
dynamically found in a class are not those declared in the @interface
, but
those defined in a separate @implementation
declaration; however, when
compiling a call, typechecking is done based on the methods declared in the
@interface
.
Method declarations may also be grouped into protocols, which are not inherently associated with any class, but which classes may claim to follow. Object pointer types may be qualified with additional protocols that the object is known to support.
Class extensions are collections of ivars and methods, designed to
allow a class’s @interface
to be split across multiple files; however,
there is still a primary implementation file which must see the
@interface
s of all class extensions. Categories allow
methods (but not ivars) to be declared post hoc on an arbitrary class; the
methods in the category’s @implementation
will be dynamically added to that
class’s method tables which the category is loaded at runtime, replacing those
methods in case of a collision.
In the standard environment, objects are allocated on the heap, and their
lifetime is manually managed using a reference count. This is done using two
instance methods which all classes are expected to implement: retain
increases the object’s reference count by 1, whereas release
decreases it
by 1 and calls the instance method dealloc
if the count reaches 0. To
simplify certain operations, there is also an autorelease pool, a
thread-local list of objects to call release
on later; an object can be
added to this pool by calling autorelease
on it.
Block pointers may be converted to type id
; block objects are laid out in a
way that makes them compatible with Objective-C objects. There is a builtin
class that all block objects are considered to be objects of; this class
implements retain
by adjusting the reference count, not by calling
Block_copy
.
Evolution¶
ARC is under continual evolution, and this document must be updated as the language progresses.
If a change increases the expressiveness of the language, for example by lifting a restriction or by adding new syntax, the change will be annotated with a revision marker, like so:
ARC applies to Objective-C pointer types, block pointer types, and [beginning Apple 8.0, LLVM 3.8] BPTRs declared withinextern "BCPL"
blocks.
For now, it is sensible to version this document by the releases of its sole implementation (and its host project), clang. “LLVM X.Y” refers to an open-source release of clang from the LLVM project. “Apple X.Y” refers to an Apple-provided release of the Apple LLVM Compiler. Other organizations that prepare their own, separately-versioned clang releases and wish to maintain similar information in this document should send requests to cfe-dev.
If a change decreases the expressiveness of the language, for example by imposing a new restriction, this should be taken as an oversight in the original specification and something to be avoided in all versions. Such changes are generally to be avoided.
General¶
Automatic Reference Counting implements automatic memory management for Objective-C objects and blocks, freeing the programmer from the need to explicitly insert retains and releases. It does not provide a cycle collector; users must explicitly manage the lifetime of their objects, breaking cycles manually or with weak or unsafe references.
ARC may be explicitly enabled with the compiler flag -fobjc-arc
. It may
also be explicitly disabled with the compiler flag -fno-objc-arc
. The last
of these two flags appearing on the compile line “wins”.
If ARC is enabled, __has_feature(objc_arc)
will expand to 1 in the
preprocessor. For more information about __has_feature
, see the
language extensions document.
Retainable object pointers¶
This section describes retainable object pointers, their basic operations, and the restrictions imposed on their use under ARC. Note in particular that it covers the rules for pointer values (patterns of bits indicating the location of a pointed-to object), not pointer objects (locations in memory which store pointer values). The rules for objects are covered in the next section.
A retainable object pointer (or “retainable pointer”) is a value of a retainable object pointer type (“retainable type”). There are three kinds of retainable object pointer types:
- block pointers (formed by applying the caret (
^
) declarator sigil to a function type) - Objective-C object pointers (
id
,Class
,NSFoo*
, etc.) - typedefs marked with
__attribute__((NSObject))
Other pointer types, such as int*
and CFStringRef
, are not subject to
ARC’s semantics and restrictions.
Rationale
We are not at liberty to require all code to be recompiled with ARC; therefore, ARC must interoperate with Objective-C code which manages retains and releases manually. In general, there are three requirements in order for a compiler-supported reference-count system to provide reliable interoperation:
- The type system must reliably identify which objects are to be managed. An
int*
might be a pointer to amalloc
’ed array, or it might be an interior pointer to such an array, or it might point to some field or local variable. In contrast, values of the retainable object pointer types are never interior. - The type system must reliably indicate how to manage objects of a type. This usually means that the type must imply a procedure for incrementing and decrementing retain counts. Supporting single-ownership objects requires a lot more explicit mediation in the language.
- There must be reliable conventions for whether and when “ownership” is passed between caller and callee, for both arguments and return values. Objective-C methods follow such a convention very reliably, at least for system libraries on Mac OS X, and functions always pass objects at +0. The C-based APIs for Core Foundation objects, on the other hand, have much more varied transfer semantics.
The use of __attribute__((NSObject))
typedefs is not recommended. If it’s
absolutely necessary to use this attribute, be very explicit about using the
typedef, and do not assume that it will be preserved by language features like
__typeof
and C++ template argument substitution.
Rationale
Any compiler operation which incidentally strips type “sugar” from a type will yield a type without the attribute, which may result in unexpected behavior.
Retain count semantics¶
A retainable object pointer is either a null pointer or a pointer
to a valid object. Furthermore, if it has block pointer type and is not
null
then it must actually be a pointer to a block object, and if it has
Class
type (possibly protocol-qualified) then it must actually be a pointer
to a class object. Otherwise ARC does not enforce the Objective-C type system
as long as the implementing methods follow the signature of the static type.
It is undefined behavior if ARC is exposed to an invalid pointer.
For ARC’s purposes, a valid object is one with “well-behaved” retaining operations. Specifically, the object must be laid out such that the Objective-C message send machinery can successfully send it the following messages:
retain
, taking no arguments and returning a pointer to the object.release
, taking no arguments and returningvoid
.autorelease
, taking no arguments and returning a pointer to the object.
The behavior of these methods is constrained in the following ways. The term
high-level semantics is an intentionally vague term; the intent is
that programmers must implement these methods in a way such that the compiler,
modifying code in ways it deems safe according to these constraints, will not
violate their requirements. For example, if the user puts logging statements
in retain
, they should not be surprised if those statements are executed
more or less often depending on optimization settings. These constraints are
not exhaustive of the optimization opportunities: values held in local
variables are subject to additional restrictions, described later in this
document.
It is undefined behavior if a computation history featuring a send of
retain
followed by a send of release
to the same object, with no
intervening release
on that object, is not equivalent under the high-level
semantics to a computation history in which these sends are removed. Note that
this implies that these methods may not raise exceptions.
It is undefined behavior if a computation history features any use whatsoever
of an object following the completion of a send of release
that is not
preceded by a send of retain
to the same object.
The behavior of autorelease
must be equivalent to sending release
when
one of the autorelease pools currently in scope is popped. It may not throw an
exception.
When the semantics call for performing one of these operations on a retainable
object pointer, if that pointer is null
then the effect is a no-op.
All of the semantics described in this document are subject to additional optimization rules which permit the removal or optimization of operations based on local knowledge of data flow. The semantics describe the high-level behaviors that the compiler implements, not an exact sequence of operations that a program will be compiled into.
Retainable object pointers as operands and arguments¶
In general, ARC does not perform retain or release operations when simply using a retainable object pointer as an operand within an expression. This includes:
- loading a retainable pointer from an object with non-weak ownership,
- passing a retainable pointer as an argument to a function or method, and
- receiving a retainable pointer as the result of a function or method call.
Rationale
While this might seem uncontroversial, it is actually unsafe when multiple expressions are evaluated in “parallel”, as with binary operators and calls, because (for example) one expression might load from an object while another writes to it. However, C and C++ already call this undefined behavior because the evaluations are unsequenced, and ARC simply exploits that here to avoid needing to retain arguments across a large number of calls.
The remainder of this section describes exceptions to these rules, how those exceptions are detected, and what those exceptions imply semantically.
Consumed parameters¶
A function or method parameter of retainable object pointer type may be marked
as consumed, signifying that the callee expects to take ownership
of a +1 retain count. This is done by adding the ns_consumed
attribute to
the parameter declaration, like so:
void foo(__attribute((ns_consumed)) id x);
- (void) foo: (id) __attribute((ns_consumed)) x;
This attribute is part of the type of the function or method, not the type of the parameter. It controls only how the argument is passed and received.
When passing such an argument, ARC retains the argument prior to making the call.
When receiving such an argument, ARC releases the argument at the end of the function, subject to the usual optimizations for local values.
Rationale
This formalizes direct transfers of ownership from a caller to a callee. The
most common scenario here is passing the self
parameter to init
, but
it is useful to generalize. Typically, local optimization will remove any
extra retains and releases: on the caller side the retain will be merged with
a +1 source, and on the callee side the release will be rolled into the
initialization of the parameter.
The implicit self
parameter of a method may be marked as consumed by adding
__attribute__((ns_consumes_self))
to the method declaration. Methods in
the init
family are treated as if they were
implicitly marked with this attribute.
It is undefined behavior if an Objective-C message send to a method with
ns_consumed
parameters (other than self) is made with a null receiver. It
is undefined behavior if the method to which an Objective-C message send
statically resolves to has a different set of ns_consumed
parameters than
the method it dynamically resolves to. It is undefined behavior if a block or
function call is made through a static type with a different set of
ns_consumed
parameters than the implementation of the called block or
function.
Rationale
Consumed parameters with null receiver are a guaranteed leak. Mismatches with consumed parameters will cause over-retains or over-releases, depending on the direction. The rule about function calls is really just an application of the existing C/C++ rule about calling functions through an incompatible function type, but it’s useful to state it explicitly.
Retained return values¶
A function or method which returns a retainable object pointer type may be
marked as returning a retained value, signifying that the caller expects to take
ownership of a +1 retain count. This is done by adding the
ns_returns_retained
attribute to the function or method declaration, like
so:
id foo(void) __attribute((ns_returns_retained));
- (id) foo __attribute((ns_returns_retained));
This attribute is part of the type of the function or method.
When returning from such a function or method, ARC retains the value at the point of evaluation of the return statement, before leaving all local scopes.
When receiving a return result from such a function or method, ARC releases the value at the end of the full-expression it is contained within, subject to the usual optimizations for local values.
Rationale
This formalizes direct transfers of ownership from a callee to a caller. The
most common scenario this models is the retained return from init
,
alloc
, new
, and copy
methods, but there are other cases in the
frameworks. After optimization there are typically no extra retains and
releases required.
Methods in the alloc
, copy
, init
, mutableCopy
, and new
families are implicitly marked
__attribute__((ns_returns_retained))
. This may be suppressed by explicitly
marking the method __attribute__((ns_returns_not_retained))
.
It is undefined behavior if the method to which an Objective-C message send statically resolves has different retain semantics on its result from the method it dynamically resolves to. It is undefined behavior if a block or function call is made through a static type with different retain semantics on its result from the implementation of the called block or function.
Rationale
Mismatches with returned results will cause over-retains or over-releases, depending on the direction. Again, the rule about function calls is really just an application of the existing C/C++ rule about calling functions through an incompatible function type.
Unretained return values¶
A method or function which returns a retainable object type but does not return a retained value must ensure that the object is still valid across the return boundary.
When returning from such a function or method, ARC retains the value at the
point of evaluation of the return statement, then leaves all local scopes, and
then balances out the retain while ensuring that the value lives across the
call boundary. In the worst case, this may involve an autorelease
, but
callers must not assume that the value is actually in the autorelease pool.
ARC performs no extra mandatory work on the caller side, although it may elect to do something to shorten the lifetime of the returned value.
Rationale
It is common in non-ARC code to not return an autoreleased value; therefore the convention does not force either path. It is convenient to not be required to do unnecessary retains and autoreleases; this permits optimizations such as eliding retain/autoreleases when it can be shown that the original pointer will still be valid at the point of return.
A method or function may be marked with
__attribute__((ns_returns_autoreleased))
to indicate that it returns a
pointer which is guaranteed to be valid at least as long as the innermost
autorelease pool. There are no additional semantics enforced in the definition
of such a method; it merely enables optimizations in callers.
Bridged casts¶
A bridged cast is a C-style cast annotated with one of three keywords:
(__bridge T) op
casts the operand to the destination typeT
. IfT
is a retainable object pointer type, thenop
must have a non-retainable pointer type. IfT
is a non-retainable pointer type, thenop
must have a retainable object pointer type. Otherwise the cast is ill-formed. There is no transfer of ownership, and ARC inserts no retain operations.(__bridge_retained T) op
casts the operand, which must have retainable object pointer type, to the destination type, which must be a non-retainable pointer type. ARC retains the value, subject to the usual optimizations on local values, and the recipient is responsible for balancing that +1.(__bridge_transfer T) op
casts the operand, which must have non-retainable pointer type, to the destination type, which must be a retainable object pointer type. ARC will release the value at the end of the enclosing full-expression, subject to the usual optimizations on local values.
These casts are required in order to transfer objects in and out of ARC control; see the rationale in the section on conversion of retainable object pointers.
Using a __bridge_retained
or __bridge_transfer
cast purely to convince
ARC to emit an unbalanced retain or release, respectively, is poor form.
Restrictions¶
Conversion of retainable object pointers¶
In general, a program which attempts to implicitly or explicitly convert a
value of retainable object pointer type to any non-retainable type, or
vice-versa, is ill-formed. For example, an Objective-C object pointer shall
not be converted to void*
. As an exception, cast to intptr_t
is
allowed because such casts are not transferring ownership. The bridged
casts may be used to perform these conversions
where necessary.
Rationale
We cannot ensure the correct management of the lifetime of objects if they may be freely passed around as unmanaged types. The bridged casts are provided so that the programmer may explicitly describe whether the cast transfers control into or out of ARC.
However, the following exceptions apply.
Conversion to retainable object pointer type of expressions with known semantics¶
[beginning Apple 4.0, LLVM 3.1] These exceptions have been greatly expanded; they previously applied only to a much-reduced subset which is difficult to categorize but which included null pointers, message sends (under the given rules), and the various global constants.
An unbridged conversion to a retainable object pointer type from a type other than a retainable object pointer type is ill-formed, as discussed above, unless the operand of the cast has a syntactic form which is known retained, known unretained, or known retain-agnostic.
An expression is known retain-agnostic if it is:
- an Objective-C string literal,
- a load from a
const
system global variable of C retainable pointer type, or - a null pointer constant.
An expression is known unretained if it is an rvalue of C retainable pointer type and it is:
- a direct call to a function, and either that function has the
cf_returns_not_retained
attribute or it is an audited function that does not have thecf_returns_retained
attribute and does not follow the create/copy naming convention, - a message send, and the declared method either has the
cf_returns_not_retained
attribute or it has neither thecf_returns_retained
attribute nor a selector family that implies a retained result, or - [beginning LLVM 3.6] a load from a
const
non-system global variable.
An expression is known retained if it is an rvalue of C retainable pointer type and it is:
- a message send, and the declared method either has the
cf_returns_retained
attribute, or it does not have thecf_returns_not_retained
attribute but it does have a selector family that implies a retained result.
Furthermore:
- a comma expression is classified according to its right-hand side,
- a statement expression is classified according to its result expression, if it has one,
- an lvalue-to-rvalue conversion applied to an Objective-C property lvalue is classified according to the underlying message send, and
- a conditional operator is classified according to its second and third operands, if they agree in classification, or else the other if one is known retain-agnostic.
If the cast operand is known retained, the conversion is treated as a
__bridge_transfer
cast. If the cast operand is known unretained or known
retain-agnostic, the conversion is treated as a __bridge
cast.
Rationale
Bridging casts are annoying. Absent the ability to completely automate the management of CF objects, however, we are left with relatively poor attempts to reduce the need for a glut of explicit bridges. Hence these rules.
We’ve so far consciously refrained from implicitly turning retained CF
results from function calls into __bridge_transfer
casts. The worry is
that some code patterns — for example, creating a CF value, assigning it
to an ObjC-typed local, and then calling CFRelease
when done — are a
bit too likely to be accidentally accepted, leading to mysterious behavior.
For loads from const
global variables of C retainable pointer type, it is reasonable to assume that global system
constants were initialitzed with true constants (e.g. string literals), but
user constants might have been initialized with something dynamically
allocated, using a global initializer.
Conversion from retainable object pointer type in certain contexts¶
[beginning Apple 4.0, LLVM 3.1]
If an expression of retainable object pointer type is explicitly cast to a C retainable pointer type, the program is ill-formed as discussed above unless the result is immediately used:
- to initialize a parameter in an Objective-C message send where the parameter
is not marked with the
cf_consumed
attribute, or - to initialize a parameter in a direct call to an
audited function where the parameter is
not marked with the
cf_consumed
attribute.
Rationale
Consumed parameters are left out because ARC would naturally balance them
with a retain, which was judged too treacherous. This is in part because
several of the most common consuming functions are in the Release
family,
and it would be quite unfortunate for explicit releases to be silently
balanced out in this way.
Ownership qualification¶
This section describes the behavior of objects of retainable object pointer type; that is, locations in memory which store retainable object pointers.
A type is a retainable object owner type if it is a retainable object pointer type or an array type whose element type is a retainable object owner type.
An ownership qualifier is a type qualifier which applies only to retainable object owner types. An array type is ownership-qualified according to its element type, and adding an ownership qualifier to an array type so qualifies its element type.
A program is ill-formed if it attempts to apply an ownership qualifier to a type which is already ownership-qualified, even if it is the same qualifier. There is a single exception to this rule: an ownership qualifier may be applied to a substituted template type parameter, which overrides the ownership qualifier provided by the template argument.
When forming a function type, the result type is adjusted so that any top-level ownership qualifier is deleted.
Except as described under the inference rules, a program is ill-formed if it attempts to form a pointer or reference type to a retainable object owner type which lacks an ownership qualifier.
Rationale
These rules, together with the inference rules, ensure that all objects and lvalues of retainable object pointer type have an ownership qualifier. The ability to override an ownership qualifier during template substitution is required to counteract the inference of __strong for template type arguments. Ownership qualifiers on return types are dropped because they serve no purpose there except to cause spurious problems with overloading and templates.
There are four ownership qualifiers:
__autoreleasing
__strong
__unsafe_unretained
__weak
A type is nontrivially ownership-qualified if it is qualified with
__autoreleasing
, __strong
, or __weak
.
Spelling¶
The names of the ownership qualifiers are reserved for the implementation. A program may not assume that they are or are not implemented with macros, or what those macros expand to.
An ownership qualifier may be written anywhere that any other type qualifier may be written.
If an ownership qualifier appears in the declaration-specifiers, the following rules apply:
- if the type specifier is a retainable object owner type, the qualifier initially applies to that type;
- otherwise, if the outermost non-array declarator is a pointer or block pointer declarator, the qualifier initially applies to that type;
- otherwise the program is ill-formed.
- If the qualifier is so applied at a position in the declaration where the next-innermost declarator is a function declarator, and there is an block declarator within that function declarator, then the qualifier applies instead to that block declarator and this rule is considered afresh beginning from the new position.
If an ownership qualifier appears on the declarator name, or on the declared object, it is applied to the innermost pointer or block-pointer type.
If an ownership qualifier appears anywhere else in a declarator, it applies to the type there.
Rationale
Ownership qualifiers are like const
and volatile
in the sense
that they may sensibly apply at multiple distinct positions within a
declarator. However, unlike those qualifiers, there are many
situations where they are not meaningful, and so we make an effort
to “move” the qualifier to a place where it will be meaningful. The
general goal is to allow the programmer to write, say, __strong
before the entire declaration and have it apply in the leftmost
sensible place.
Property declarations¶
A property of retainable object pointer type may have ownership. If the
property’s type is ownership-qualified, then the property has that ownership.
If the property has one of the following modifiers, then the property has the
corresponding ownership. A property is ill-formed if it has conflicting
sources of ownership, or if it has redundant ownership modifiers, or if it has
__autoreleasing
ownership.
assign
implies__unsafe_unretained
ownership.copy
implies__strong
ownership, as well as the usual behavior of copy semantics on the setter.retain
implies__strong
ownership.strong
implies__strong
ownership.unsafe_unretained
implies__unsafe_unretained
ownership.weak
implies__weak
ownership.
With the exception of weak
, these modifiers are available in non-ARC
modes.
A property’s specified ownership is preserved in its metadata, but otherwise
the meaning is purely conventional unless the property is synthesized. If a
property is synthesized, then the associated instance variable is
the instance variable which is named, possibly implicitly, by the
@synthesize
declaration. If the associated instance variable already
exists, then its ownership qualification must equal the ownership of the
property; otherwise, the instance variable is created with that ownership
qualification.
A property of retainable object pointer type which is synthesized without a
source of ownership has the ownership of its associated instance variable, if it
already exists; otherwise, [beginning Apple 3.1, LLVM 3.1]
its ownership is implicitly strong
. Prior to this revision, it
was ill-formed to synthesize such a property.
Rationale
Using strong
by default is safe and consistent with the generic ARC rule
about inferring ownership. It is,
unfortunately, inconsistent with the non-ARC rule which states that such
properties are implicitly assign
. However, that rule is clearly
untenable in ARC, since it leads to default-unsafe code. The main merit to
banning the properties is to avoid confusion with non-ARC practice, which did
not ultimately strike us as sufficient to justify requiring extra syntax and
(more importantly) forcing novices to understand ownership rules just to
declare a property when the default is so reasonable. Changing the rule away
from non-ARC practice was acceptable because we had conservatively banned the
synthesis in order to give ourselves exactly this leeway.
Applying __attribute__((NSObject))
to a property not of retainable object
pointer type has the same behavior it does outside of ARC: it requires the
property type to be some sort of pointer and permits the use of modifiers other
than assign
. These modifiers only affect the synthesized getter and
setter; direct accesses to the ivar (even if synthesized) still have primitive
semantics, and the value in the ivar will not be automatically released during
deallocation.
Semantics¶
There are five managed operations which may be performed on an object of retainable object pointer type. Each qualifier specifies different semantics for each of these operations. It is still undefined behavior to access an object outside of its lifetime.
A load or store with “primitive semantics” has the same semantics as the
respective operation would have on an void*
lvalue with the same alignment
and non-ownership qualification.
Reading occurs when performing a lvalue-to-rvalue conversion on an object lvalue.
- For
__weak
objects, the current pointee is retained and then released at the end of the current full-expression. This must execute atomically with respect to assignments and to the final release of the pointee. - For all other objects, the lvalue is loaded with primitive semantics.
Assignment occurs when evaluating an assignment operator. The semantics vary based on the qualification:
- For
__strong
objects, the new pointee is first retained; second, the lvalue is loaded with primitive semantics; third, the new pointee is stored into the lvalue with primitive semantics; and finally, the old pointee is released. This is not performed atomically; external synchronization must be used to make this safe in the face of concurrent loads and stores. - For
__weak
objects, the lvalue is updated to point to the new pointee, unless the new pointee is an object currently undergoing deallocation, in which case the lvalue is updated to a null pointer. This must execute atomically with respect to other assignments to the object, to reads from the object, and to the final release of the new pointee. - For
__unsafe_unretained
objects, the new pointee is stored into the lvalue using primitive semantics. - For
__autoreleasing
objects, the new pointee is retained, autoreleased, and stored into the lvalue using primitive semantics.
Initialization occurs when an object’s lifetime begins, which depends on its storage duration. Initialization proceeds in two stages:
- First, a null pointer is stored into the lvalue using primitive semantics.
This step is skipped if the object is
__unsafe_unretained
. - Second, if the object has an initializer, that expression is evaluated and then assigned into the object using the usual assignment semantics.
Destruction occurs when an object’s lifetime ends. In all cases it is semantically equivalent to assigning a null pointer to the object, with the proviso that of course the object cannot be legally read after the object’s lifetime ends.
Moving occurs in specific situations where an lvalue is “moved
from”, meaning that its current pointee will be used but the object may be left
in a different (but still valid) state. This arises with __block
variables
and rvalue references in C++. For __strong
lvalues, moving is equivalent
to loading the lvalue with primitive semantics, writing a null pointer to it
with primitive semantics, and then releasing the result of the load at the end
of the current full-expression. For all other lvalues, moving is equivalent to
reading the object.
Restrictions¶
Storage duration of __autoreleasing
objects¶
A program is ill-formed if it declares an __autoreleasing
object of
non-automatic storage duration. A program is ill-formed if it captures an
__autoreleasing
object in a block or, unless by reference, in a C++11
lambda.
Rationale
Autorelease pools are tied to the current thread and scope by their nature. While it is possible to have temporary objects whose instance variables are filled with autoreleased objects, there is no way that ARC can provide any sort of safety guarantee there.
It is undefined behavior if a non-null pointer is assigned to an
__autoreleasing
object while an autorelease pool is in scope and then that
object is read after the autorelease pool’s scope is left.
Conversion of pointers to ownership-qualified types¶
A program is ill-formed if an expression of type T*
is converted,
explicitly or implicitly, to the type U*
, where T
and U
have
different ownership qualification, unless:
T
is qualified with__strong
,__autoreleasing
, or__unsafe_unretained
, andU
is qualified with bothconst
and__unsafe_unretained
; or- either
T
orU
iscv void
, wherecv
is an optional sequence of non-ownership qualifiers; or - the conversion is requested with a
reinterpret_cast
in Objective-C++; or - the conversion is a well-formed pass-by-writeback.
The analogous rule applies to T&
and U&
in Objective-C++.
Rationale
These rules provide a reasonable level of type-safety for indirect pointers,
as long as the underlying memory is not deallocated. The conversion to
const __unsafe_unretained
is permitted because the semantics of reads are
equivalent across all these ownership semantics, and that’s a very useful and
common pattern. The interconversion with void*
is useful for allocating
memory or otherwise escaping the type system, but use it carefully.
reinterpret_cast
is considered to be an obvious enough sign of taking
responsibility for any problems.
It is undefined behavior to access an ownership-qualified object through an
lvalue of a differently-qualified type, except that any non-__weak
object
may be read through an __unsafe_unretained
lvalue.
It is undefined behavior if the storage of a __strong
or __weak
object is not properly initialized before the first managed operation
is performed on the object, or if the storage of such an object is freed
or reused before the object has been properly deinitialized. Storage for
a __strong
or __weak
object may be properly initialized by filling
it with the representation of a null pointer, e.g. by acquiring the memory
with calloc
or using bzero
to zero it out. A __strong
or
__weak
object may be properly deinitialized by assigning a null pointer
into it. A __strong
object may also be properly initialized
by copying into it (e.g. with memcpy
) the representation of a
different __strong
object whose storage has been properly initialized;
doing this properly deinitializes the source object and causes its storage
to no longer be properly initialized. A __weak
object may not be
representation-copied in this way.
These requirements are followed automatically for objects whose initialization and deinitialization are under the control of ARC:
- objects of static, automatic, and temporary storage duration
- instance variables of Objective-C objects
- elements of arrays where the array object’s initialization and deinitialization are under the control of ARC
- fields of Objective-C struct types where the struct object’s initialization and deinitialization are under the control of ARC
- non-static data members of Objective-C++ non-union class types
- Objective-C++ objects and arrays of dynamic storage duration created
with the
new
ornew[]
operators and destroyed with the correspondingdelete
ordelete[]
operator
They are not followed automatically for these objects:
- objects of dynamic storage duration created in other memory, such as
that returned by
malloc
- union members
Rationale
ARC must perform special operations when initializing an object and when destroying it. In many common situations, ARC knows when an object is created and when it is destroyed and can ensure that these operations are performed correctly. Otherwise, however, ARC requires programmer cooperation to establish its initialization invariants because it is infeasible for ARC to dynamically infer whether they are intact. For example, there is no syntactic difference in C between an assignment that is intended by the programmer to initialize a variable and one that is intended to replace the existing value stored there, but ARC must perform one operation or the other. ARC chooses to always assume that objects are initialized (except when it is in charge of initializing them) because the only workable alternative would be to ban all code patterns that could potentially be used to access uninitialized memory, and that would be too limiting. In practice, this is rarely a problem because programmers do not generally need to work with objects for which the requirements are not handled automatically.
Note that dynamically-allocated Objective-C++ arrays of
nontrivially-ownership-qualified type are not ABI-compatible with non-ARC
code because the non-ARC code will consider the element type to be POD.
Such arrays that are new[]
’d in ARC translation units cannot be
delete[]
’d in non-ARC translation units and vice-versa.
Passing to an out parameter by writeback¶
If the argument passed to a parameter of type T __autoreleasing *
has type
U oq *
, where oq
is an ownership qualifier, then the argument is a
candidate for pass-by-writeback` if:
oq
is__strong
or__weak
, and- it would be legal to initialize a
T __strong *
with aU __strong *
.
For purposes of overload resolution, an implicit conversion sequence requiring a pass-by-writeback is always worse than an implicit conversion sequence not requiring a pass-by-writeback.
The pass-by-writeback is ill-formed if the argument expression does not have a legal form:
&var
, wherevar
is a scalar variable of automatic storage duration with retainable object pointer type- a conditional expression where the second and third operands are both legal forms
- a cast whose operand is a legal form
- a null pointer constant
Rationale
The restriction in the form of the argument serves two purposes. First, it makes it impossible to pass the address of an array to the argument, which serves to protect against an otherwise serious risk of mis-inferring an “array” argument as an out-parameter. Second, it makes it much less likely that the user will see confusing aliasing problems due to the implementation, below, where their store to the writeback temporary is not immediately seen in the original argument variable.
A pass-by-writeback is evaluated as follows:
- The argument is evaluated to yield a pointer
p
of typeU oq *
. - If
p
is a null pointer, then a null pointer is passed as the argument, and no further work is required for the pass-by-writeback. - Otherwise, a temporary of type
T __autoreleasing
is created and initialized to a null pointer. - If the parameter is not an Objective-C method parameter marked
out
, then*p
is read, and the result is written into the temporary with primitive semantics. - The address of the temporary is passed as the argument to the actual call.
- After the call completes, the temporary is loaded with primitive
semantics, and that value is assigned into
*p
.
Rationale
This is all admittedly convoluted. In an ideal world, we would see that a
local variable is being passed to an out-parameter and retroactively modify
its type to be __autoreleasing
rather than __strong
. This would be
remarkably difficult and not always well-founded under the C type system.
However, it was judged unacceptably invasive to require programmers to write
__autoreleasing
on all the variables they intend to use for
out-parameters. This was the least bad solution.
Ownership-qualified fields of structs and unions¶
A program is ill-formed if it declares a member of a C struct or union to have a nontrivially ownership-qualified type.
Rationale
The resulting type would be non-POD in the C++ sense, but C does not give us
very good language tools for managing the lifetime of aggregates, so it is
more convenient to simply forbid them. It is still possible to manage this
with a void*
or an __unsafe_unretained
object.
This restriction does not apply in Objective-C++. However, nontrivally ownership-qualified types are considered non-POD: in C++11 terms, they are not trivially default constructible, copy constructible, move constructible, copy assignable, move assignable, or destructible. It is a violation of C++’s One Definition Rule to use a class outside of ARC that, under ARC, would have a nontrivially ownership-qualified member.
Rationale
Unlike in C, we can express all the necessary ARC semantics for ownership-qualified subobjects as suboperations of the (default) special member functions for the class. These functions then become non-trivial. This has the non-obvious result that the class will have a non-trivial copy constructor and non-trivial destructor; if this would not normally be true outside of ARC, objects of the type will be passed and returned in an ABI-incompatible manner.
Ownership inference¶
Objects¶
If an object is declared with retainable object owner type, but without an
explicit ownership qualifier, its type is implicitly adjusted to have
__strong
qualification.
As a special case, if the object’s base type is Class
(possibly
protocol-qualified), the type is adjusted to have __unsafe_unretained
qualification instead.
Indirect parameters¶
If a function or method parameter has type T*
, where T
is an
ownership-unqualified retainable object pointer type, then:
- if
T
isconst
-qualified orClass
, then it is implicitly qualified with__unsafe_unretained
; - otherwise, it is implicitly qualified with
__autoreleasing
.
Rationale
__autoreleasing
exists mostly for this case, the Cocoa convention for
out-parameters. Since a pointer to const
is obviously not an
out-parameter, we instead use a type more useful for passing arrays. If the
user instead intends to pass in a mutable array, inferring
__autoreleasing
is the wrong thing to do; this directs some of the
caution in the following rules about writeback.
Such a type written anywhere else would be ill-formed by the general rule requiring ownership qualifiers.
This rule does not apply in Objective-C++ if a parameter’s type is dependent in a template pattern and is only instantiated to a type which would be a pointer to an unqualified retainable object pointer type. Such code is still ill-formed.
Rationale
The convention is very unlikely to be intentional in template code.
Template arguments¶
If a template argument for a template type parameter is an retainable object
owner type that does not have an explicit ownership qualifier, it is adjusted
to have __strong
qualification. This adjustment occurs regardless of
whether the template argument was deduced or explicitly specified.
Rationale
__strong
is a useful default for containers (e.g., std::vector<id>
),
which would otherwise require explicit qualification. Moreover, unqualified
retainable object pointer types are unlikely to be useful within templates,
since they generally need to have a qualifier applied to the before being
used.
Method families¶
An Objective-C method may fall into a method family, which is a conventional set of behaviors ascribed to it by the Cocoa conventions.
A method is in a certain method family if:
- it has a
objc_method_family
attribute placing it in that family; or if not that, - it does not have an
objc_method_family
attribute placing it in a different or no family, and - its selector falls into the corresponding selector family, and
- its signature obeys the added restrictions of the method family.
A selector is in a certain selector family if, ignoring any leading
underscores, the first component of the selector either consists entirely of
the name of the method family or it begins with that name followed by a
character other than a lowercase letter. For example, _perform:with:
and
performWith:
would fall into the perform
family (if we recognized one),
but performing:with
would not.
The families and their added restrictions are:
alloc
methods must return a retainable object pointer type.copy
methods must return a retainable object pointer type.mutableCopy
methods must return a retainable object pointer type.new
methods must return a retainable object pointer type.init
methods must be instance methods and must return an Objective-C pointer type. Additionally, a program is ill-formed if it declares or contains a call to aninit
method whose return type is neitherid
nor a pointer to a super-class or sub-class of the declaring class (if the method was declared on a class) or the static receiver type of the call (if it was declared on a protocol).Rationale
There are a fair number of existing methods with
init
-like selectors which nonetheless don’t follow theinit
conventions. Typically these are either accidental naming collisions or helper methods called during initialization. Because of the peculiar retain/release behavior ofinit
methods, it’s very important not to treat these methods asinit
methods if they aren’t meant to be. It was felt that implicitly defining these methods out of the family based on the exact relationship between the return type and the declaring class would be much too subtle and fragile. Therefore we identify a small number of legitimate-seeming return types and call everything else an error. This serves the secondary purpose of encouraging programmers not to accidentally give methods names in theinit
family.Note that a method with an
init
-family selector which returns a non-Objective-C type (e.g.void
) is perfectly well-formed; it simply isn’t in theinit
family.
A program is ill-formed if a method’s declarations, implementations, and overrides do not all have the same method family.
Explicit method family control¶
A method may be annotated with the objc_method_family
attribute to
precisely control which method family it belongs to. If a method in an
@implementation
does not have this attribute, but there is a method
declared in the corresponding @interface
that does, then the attribute is
copied to the declaration in the @implementation
. The attribute is
available outside of ARC, and may be tested for with the preprocessor query
__has_attribute(objc_method_family)
.
The attribute is spelled
__attribute__((objc_method_family(
family )))
. If family is
none
, the method has no family, even if it would otherwise be considered to
have one based on its selector and type. Otherwise, family must be one of
alloc
, copy
, init
, mutableCopy
, or new
, in which case the
method is considered to belong to the corresponding family regardless of its
selector. It is an error if a method that is explicitly added to a family in
this way does not meet the requirements of the family other than the selector
naming convention.
Rationale
The rules codified in this document describe the standard conventions of
Objective-C. However, as these conventions have not heretofore been enforced
by an unforgiving mechanical system, they are only imperfectly kept,
especially as they haven’t always even been precisely defined. While it is
possible to define low-level ownership semantics with attributes like
ns_returns_retained
, this attribute allows the user to communicate
semantic intent, which is of use both to ARC (which, e.g., treats calls to
init
specially) and the static analyzer.
Semantics of method families¶
A method’s membership in a method family may imply non-standard semantics for its parameters and return type.
Methods in the alloc
, copy
, mutableCopy
, and new
families —
that is, methods in all the currently-defined families except init
—
implicitly return a retained object as if they were annotated with
the ns_returns_retained
attribute. This can be overridden by annotating
the method with either of the ns_returns_autoreleased
or
ns_returns_not_retained
attributes.
Properties also follow same naming rules as methods. This means that those in
the alloc
, copy
, mutableCopy
, and new
families provide access
to retained objects. This
can be overridden by annotating the property with ns_returns_not_retained
attribute.
Semantics of init
¶
Methods in the init
family implicitly consume their self
parameter and return a
retained object. Neither of
these properties can be altered through attributes.
A call to an init
method with a receiver that is either self
(possibly
parenthesized or casted) or super
is called a delegate init
call. It is an error for a delegate init call to be made except from an
init
method, and excluding blocks within such methods.
As an exception to the usual rule, the variable self
is mutable in an init
method and has the usual semantics for a __strong
variable. However, it is undefined behavior and the program is ill-formed, no
diagnostic required, if an init
method attempts to use the previous value
of self
after the completion of a delegate init call. It is conventional,
but not required, for an init
method to return self
.
It is undefined behavior for a program to cause two or more calls to init
methods on the same object, except that each init
method invocation may
perform at most one delegate init call.
Optimization¶
Within this section, the word function will be used to refer to any structured unit of code, be it a C function, an Objective-C method, or a block.
This specification describes ARC as performing specific retain
and
release
operations on retainable object pointers at specific
points during the execution of a program. These operations make up a
non-contiguous subsequence of the computation history of the program.
The portion of this sequence for a particular retainable object
pointer for which a specific function execution is directly
responsible is the formal local retain history of the
object pointer. The corresponding actual sequence executed is the
dynamic local retain history.
However, under certain circumstances, ARC is permitted to re-order and
eliminate operations in a manner which may alter the overall
computation history beyond what is permitted by the general “as if”
rule of C/C++ and the restrictions on
the implementation of retain
and release
.
Rationale
Specifically, ARC is sometimes permitted to optimize release
operations in ways which might cause an object to be deallocated
before it would otherwise be. Without this, it would be almost
impossible to eliminate any retain
/release
pairs. For
example, consider the following code:
id x = _ivar;
[x foo];
If we were not permitted in any event to shorten the lifetime of the
object in x
, then we would not be able to eliminate this retain
and release unless we could prove that the message send could not
modify _ivar
(or deallocate self
). Since message sends are
opaque to the optimizer, this is not possible, and so ARC’s hands
would be almost completely tied.
ARC makes no guarantees about the execution of a computation history which contains undefined behavior. In particular, ARC makes no guarantees in the presence of race conditions.
ARC may assume that any retainable object pointers it receives or generates are instantaneously valid from that point until a point which, by the concurrency model of the host language, happens-after the generation of the pointer and happens-before a release of that object (possibly via an aliasing pointer or indirectly due to destruction of a different object).
Rationale
There is very little point in trying to guarantee correctness in the presence of race conditions. ARC does not have a stack-scanning garbage collector, and guaranteeing the atomicity of every load and store operation would be prohibitive and preclude a vast amount of optimization.
ARC may assume that non-ARC code engages in sensible balancing
behavior and does not rely on exact or minimum retain count values
except as guaranteed by __strong
object invariants or +1 transfer
conventions. For example, if an object is provably double-retained
and double-released, ARC may eliminate the inner retain and release;
it does not need to guard against code which performs an unbalanced
release followed by a “balancing” retain.
Object liveness¶
ARC may not allow a retainable object X
to be deallocated at a
time T
in a computation history if:
X
is the value stored in a__strong
objectS
with precise lifetime semantics, orX
is the value stored in a__strong
objectS
with imprecise lifetime semantics and, at some point afterT
but before the next store toS
, the computation history features a load fromS
and in some way depends on the value loaded, orX
is a value described as being released at the end of the current full-expression and, at some point afterT
but before the end of the full-expression, the computation history depends on that value.
Rationale
The intent of the second rule is to say that objects held in normal
__strong
local variables may be released as soon as the value in
the variable is no longer being used: either the variable stops
being used completely or a new value is stored in the variable.
The intent of the third rule is to say that return values may be released after they’ve been used.
A computation history depends on a pointer value P
if it:
- performs a pointer comparison with
P
, - loads from
P
, - stores to
P
, - depends on a pointer value
Q
derived via pointer arithmetic fromP
(including an instance-variable or field access), or - depends on a pointer value
Q
loaded fromP
.
Dependency applies only to values derived directly or indirectly from
a particular expression result and does not occur merely because a
separate pointer value dynamically aliases P
. Furthermore, this
dependency is not carried by values that are stored to objects.
Rationale
The restrictions on dependency are intended to make this analysis feasible by an optimizer with only incomplete information about a program. Essentially, dependence is carried to “obvious” uses of a pointer. Merely passing a pointer argument to a function does not itself cause dependence, but since generally the optimizer will not be able to prove that the function doesn’t depend on that parameter, it will be forced to conservatively assume it does.
Dependency propagates to values loaded from a pointer because those
values might be invalidated by deallocating the object. For
example, given the code __strong id x = p->ivar;
, ARC must not
move the release of p
to between the load of p->ivar
and the
retain of that value for storing into x
.
Dependency does not propagate through stores of dependent pointer values because doing so would allow dependency to outlive the full-expression which produced the original value. For example, the address of an instance variable could be written to some global location and then freely accessed during the lifetime of the local, or a function could return an inner pointer of an object and store it to a local. These cases would be potentially impossible to reason about and so would basically prevent any optimizations based on imprecise lifetime. There are also uncommon enough to make it reasonable to require the precise-lifetime annotation if someone really wants to rely on them.
Dependency does propagate through return values of pointer type. The compelling source of need for this rule is a property accessor which returns an un-autoreleased result; the calling function must have the chance to operate on the value, e.g. to retain it, before ARC releases the original pointer. Note again, however, that dependence does not survive a store, so ARC does not guarantee the continued validity of the return value past the end of the full-expression.
No object lifetime extension¶
If, in the formal computation history of the program, an object X
has been deallocated by the time of an observable side-effect, then
ARC must cause X
to be deallocated by no later than the occurrence
of that side-effect, except as influenced by the re-ordering of the
destruction of objects.
Rationale
This rule is intended to prohibit ARC from observably extending the lifetime of a retainable object, other than as specified in this document. Together with the rule limiting the transformation of releases, this rule requires ARC to eliminate retains and release only in pairs.
ARC’s power to reorder the destruction of objects is critical to its ability to do any optimization, for essentially the same reason that it must retain the power to decrease the lifetime of an object. Unfortunately, while it’s generally poor style for the destruction of objects to have arbitrary side-effects, it’s certainly possible. Hence the caveat.
Precise lifetime semantics¶
In general, ARC maintains an invariant that a retainable object pointer held in
a __strong
object will be retained for the full formal lifetime of the
object. Objects subject to this invariant have precise lifetime
semantics.
By default, local variables of automatic storage duration do not have precise lifetime semantics. Such objects are simply strong references which hold values of retainable object pointer type, and these values are still fully subject to the optimizations on values under local control.
Rationale
Applying these precise-lifetime semantics strictly would be prohibitive. Many useful optimizations that might theoretically decrease the lifetime of an object would be rendered impossible. Essentially, it promises too much.
A local variable of retainable object owner type and automatic storage duration
may be annotated with the objc_precise_lifetime
attribute to indicate that
it should be considered to be an object with precise lifetime semantics.
Rationale
Nonetheless, it is sometimes useful to be able to force an object to be released at a precise time, even if that object does not appear to be used. This is likely to be uncommon enough that the syntactic weight of explicitly requesting these semantics will not be burdensome, and may even make the code clearer.
Miscellaneous¶
Special methods¶
Memory management methods¶
A program is ill-formed if it contains a method definition, message send, or
@selector
expression for any of the following selectors:
autorelease
release
retain
retainCount
Rationale
retainCount
is banned because ARC robs it of consistent semantics. The
others were banned after weighing three options for how to deal with message
sends:
Honoring them would work out very poorly if a programmer naively or accidentally tried to incorporate code written for manual retain/release code into an ARC program. At best, such code would do twice as much work as necessary; quite frequently, however, ARC and the explicit code would both try to balance the same retain, leading to crashes. The cost is losing the ability to perform “unrooted” retains, i.e. retains not logically corresponding to a strong reference in the object graph.
Ignoring them would badly violate user expectations about their code. While it would make it easier to develop code simultaneously for ARC and non-ARC, there is very little reason to do so except for certain library developers. ARC and non-ARC translation units share an execution model and can seamlessly interoperate. Within a translation unit, a developer who faithfully maintains their code in non-ARC mode is suffering all the restrictions of ARC for zero benefit, while a developer who isn’t testing the non-ARC mode is likely to be unpleasantly surprised if they try to go back to it.
Banning them has the disadvantage of making it very awkward to migrate existing code to ARC. The best answer to that, given a number of other changes and restrictions in ARC, is to provide a specialized tool to assist users in that migration.
Implementing these methods was banned because they are too integral to the semantics of ARC; many tricks which worked tolerably under manual reference counting will misbehave if ARC performs an ephemeral extra retain or two. If absolutely required, it is still possible to implement them in non-ARC code, for example in a category; the implementations must obey the semantics laid out elsewhere in this document.
dealloc
¶
A program is ill-formed if it contains a message send or @selector
expression for the selector dealloc
.
Rationale
There are no legitimate reasons to call dealloc
directly.
A class may provide a method definition for an instance method named
dealloc
. This method will be called after the final release
of the
object but before it is deallocated or any of its instance variables are
destroyed. The superclass’s implementation of dealloc
will be called
automatically when the method returns.
Rationale
Even though ARC destroys instance variables automatically, there are still
legitimate reasons to write a dealloc
method, such as freeing
non-retainable resources. Failing to call [super dealloc]
in such a
method is nearly always a bug. Sometimes, the object is simply trying to
prevent itself from being destroyed, but dealloc
is really far too late
for the object to be raising such objections. Somewhat more legitimately, an
object may have been pool-allocated and should not be deallocated with
free
; for now, this can only be supported with a dealloc
implementation outside of ARC. Such an implementation must be very careful
to do all the other work that NSObject
’s dealloc
would, which is
outside the scope of this document to describe.
The instance variables for an ARC-compiled class will be destroyed at some
point after control enters the dealloc
method for the root class of the
class. The ordering of the destruction of instance variables is unspecified,
both within a single class and between subclasses and superclasses.
Rationale
The traditional, non-ARC pattern for destroying instance variables is to
destroy them immediately before calling [super dealloc]
. Unfortunately,
message sends from the superclass are quite capable of reaching methods in
the subclass, and those methods may well read or write to those instance
variables. Making such message sends from dealloc is generally discouraged,
since the subclass may well rely on other invariants that were broken during
dealloc
, but it’s not so inescapably dangerous that we felt comfortable
calling it undefined behavior. Therefore we chose to delay destroying the
instance variables to a point at which message sends are clearly disallowed:
the point at which the root class’s deallocation routines take over.
In most code, the difference is not observable. It can, however, be observed
if an instance variable holds a strong reference to an object whose
deallocation will trigger a side-effect which must be carefully ordered with
respect to the destruction of the super class. Such code violates the design
principle that semantically important behavior should be explicit. A simple
fix is to clear the instance variable manually during dealloc
; a more
holistic solution is to move semantically important side-effects out of
dealloc
and into a separate teardown phase which can rely on working with
well-formed objects.
@autoreleasepool
¶
To simplify the use of autorelease pools, and to bring them under the control
of the compiler, a new kind of statement is available in Objective-C. It is
written @autoreleasepool
followed by a compound-statement, i.e. by a new
scope delimited by curly braces. Upon entry to this block, the current state
of the autorelease pool is captured. When the block is exited normally,
whether by fallthrough or directed control flow (such as return
or
break
), the autorelease pool is restored to the saved state, releasing all
the objects in it. When the block is exited with an exception, the pool is not
drained.
@autoreleasepool
may be used in non-ARC translation units, with equivalent
semantics.
A program is ill-formed if it refers to the NSAutoreleasePool
class.
Rationale
Autorelease pools are clearly important for the compiler to reason about, but it is far too much to expect the compiler to accurately reason about control dependencies between two calls. It is also very easy to accidentally forget to drain an autorelease pool when using the manual API, and this can significantly inflate the process’s high-water-mark. The introduction of a new scope is unfortunate but basically required for sane interaction with the rest of the language. Not draining the pool during an unwind is apparently required by the Objective-C exceptions implementation.
self
¶
The self
parameter variable of an Objective-C method is never actually
retained by the implementation. It is undefined behavior, or at least
dangerous, to cause an object to be deallocated during a message send to that
object.
To make this safe, for Objective-C instance methods self
is implicitly
const
unless the method is in the init family. Further, self
is always implicitly
const
within a class method.
Rationale
The cost of retaining self
in all methods was found to be prohibitive, as
it tends to be live across calls, preventing the optimizer from proving that
the retain and release are unnecessary — for good reason, as it’s quite
possible in theory to cause an object to be deallocated during its execution
without this retain and release. Since it’s extremely uncommon to actually
do so, even unintentionally, and since there’s no natural way for the
programmer to remove this retain/release pair otherwise (as there is for
other parameters by, say, making the variable __unsafe_unretained
), we
chose to make this optimizing assumption and shift some amount of risk to the
user.
Fast enumeration iteration variables¶
If a variable is declared in the condition of an Objective-C fast enumeration
loop, and the variable has no explicit ownership qualifier, then it is
qualified with const __strong
and objects encountered during the
enumeration are not actually retained.
Rationale
This is an optimization made possible because fast enumeration loops promise
to keep the objects retained during enumeration, and the collection itself
cannot be synchronously modified. It can be overridden by explicitly
qualifying the variable with __strong
, which will make the variable
mutable again and cause the loop to retain the objects it encounters.
Blocks¶
The implicit const
capture variables created when evaluating a block
literal expression have the same ownership semantics as the local variables
they capture. The capture is performed by reading from the captured variable
and initializing the capture variable with that value; the capture variable is
destroyed when the block literal is, i.e. at the end of the enclosing scope.
The inference rules apply equally to
__block
variables, which is a shift in semantics from non-ARC, where
__block
variables did not implicitly retain during capture.
__block
variables of retainable object owner type are moved off the stack
by initializing the heap copy with the result of moving from the stack copy.
With the exception of retains done as part of initializing a __strong
parameter variable or reading a __weak
variable, whenever these semantics
call for retaining a value of block-pointer type, it has the effect of a
Block_copy
. The optimizer may remove such copies when it sees that the
result is used only as an argument to a call.
Exceptions¶
By default in Objective C, ARC is not exception-safe for normal releases:
- It does not end the lifetime of
__strong
variables when their scopes are abnormally terminated by an exception. - It does not perform releases which would occur at the end of a full-expression if that full-expression throws an exception.
A program may be compiled with the option -fobjc-arc-exceptions
in order to
enable these, or with the option -fno-objc-arc-exceptions
to explicitly
disable them, with the last such argument “winning”.
Rationale
The standard Cocoa convention is that exceptions signal programmer error and are not intended to be recovered from. Making code exceptions-safe by default would impose severe runtime and code size penalties on code that typically does not actually care about exceptions safety. Therefore, ARC-generated code leaks by default on exceptions, which is just fine if the process is going to be immediately terminated anyway. Programs which do care about recovering from exceptions should enable the option.
In Objective-C++, -fobjc-arc-exceptions
is enabled by default.
Rationale
C++ already introduces pervasive exceptions-cleanup code of the sort that ARC introduces. C++ programmers who have not already disabled exceptions are much more likely to actual require exception-safety.
ARC does end the lifetimes of __weak
objects when an exception terminates
their scope unless exceptions are disabled in the compiler.
Rationale
The consequence of a local __weak
object not being destroyed is very
likely to be corruption of the Objective-C runtime, so we want to be safer
here. Of course, potentially massive leaks are about as likely to take down
the process as this corruption is if the program does try to recover from
exceptions.
Interior pointers¶
An Objective-C method returning a non-retainable pointer may be annotated with
the objc_returns_inner_pointer
attribute to indicate that it returns a
handle to the internal data of an object, and that this reference will be
invalidated if the object is destroyed. When such a message is sent to an
object, the object’s lifetime will be extended until at least the earliest of:
- the last use of the returned pointer, or any pointer derived from it, in the calling function or
- the autorelease pool is restored to a previous state.
Rationale
Rationale: not all memory and resources are managed with reference counts; it is common for objects to manage private resources in their own, private way. Typically these resources are completely encapsulated within the object, but some classes offer their users direct access for efficiency. If ARC is not aware of methods that return such “interior” pointers, its optimizations can cause the owning object to be reclaimed too soon. This attribute informs ARC that it must tread lightly.
The extension rules are somewhat intentionally vague. The autorelease pool
limit is there to permit a simple implementation to simply retain and
autorelease the receiver. The other limit permits some amount of
optimization. The phrase “derived from” is intended to encompass the results
both of pointer transformations, such as casts and arithmetic, and of loading
from such derived pointers; furthermore, it applies whether or not such
derivations are applied directly in the calling code or by other utility code
(for example, the C library routine strchr
). However, the implementation
never need account for uses after a return from the code which calls the
method returning an interior pointer.
As an exception, no extension is required if the receiver is loaded directly
from a __strong
object with precise lifetime semantics.
Rationale
Implicit autoreleases carry the risk of significantly inflating memory use, so it’s important to provide users a way of avoiding these autoreleases. Tying this to precise lifetime semantics is ideal, as for local variables this requires a very explicit annotation, which allows ARC to trust the user with good cheer.
C retainable pointer types¶
A type is a C retainable pointer type if it is a pointer to
(possibly qualified) void
or a pointer to a (possibly qualifier) struct
or class
type.
Rationale
ARC does not manage pointers of CoreFoundation type (or any of the related families of retainable C pointers which interoperate with Objective-C for retain/release operation). In fact, ARC does not even know how to distinguish these types from arbitrary C pointer types. The intent of this concept is to filter out some obviously non-object types while leaving a hook for later tightening if a means of exhaustively marking CF types is made available.
Auditing of C retainable pointer interfaces¶
[beginning Apple 4.0, LLVM 3.1]
A C function may be marked with the cf_audited_transfer
attribute to
express that, except as otherwise marked with attributes, it obeys the
parameter (consuming vs. non-consuming) and return (retained vs. non-retained)
conventions for a C function of its name, namely:
- A parameter of C retainable pointer type is assumed to not be consumed
unless it is marked with the
cf_consumed
attribute, and - A result of C retainable pointer type is assumed to not be returned retained
unless the function is either marked
cf_returns_retained
or it follows the create/copy naming convention and is not markedcf_returns_not_retained
.
A function obeys the create/copy naming convention if its name contains as a substring:
- either “Create” or “Copy” not followed by a lowercase letter, or
- either “create” or “copy” not followed by a lowercase letter and not preceded by any letter, whether uppercase or lowercase.
A second attribute, cf_unknown_transfer
, signifies that a function’s
transfer semantics cannot be accurately captured using any of these
annotations. A program is ill-formed if it annotates the same function with
both cf_audited_transfer
and cf_unknown_transfer
.
A pragma is provided to facilitate the mass annotation of interfaces:
#pragma clang arc_cf_code_audited begin
...
#pragma clang arc_cf_code_audited end
All C functions declared within the extent of this pragma are treated as if
annotated with the cf_audited_transfer
attribute unless they otherwise have
the cf_unknown_transfer
attribute. The pragma is accepted in all language
modes. A program is ill-formed if it attempts to change files, whether by
including a file or ending the current file, within the extent of this pragma.
It is possible to test for all the features in this section with
__has_feature(arc_cf_code_audited)
.
Rationale
A significant inconvenience in ARC programming is the necessity of interacting with APIs based around C retainable pointers. These features are designed to make it relatively easy for API authors to quickly review and annotate their interfaces, in turn improving the fidelity of tools such as the static analyzer and ARC. The single-file restriction on the pragma is designed to eliminate the risk of accidentally annotating some other header’s interfaces.
Runtime support¶
This section describes the interaction between the ARC runtime and the code generated by the ARC compiler. This is not part of the ARC language specification; instead, it is effectively a language-specific ABI supplement, akin to the “Itanium” generic ABI for C++.
Ownership qualification does not alter the storage requirements for objects,
except that it is undefined behavior if a __weak
object is inadequately
aligned for an object of type id
. The other qualifiers may be used on
explicitly under-aligned memory.
The runtime tracks __weak
objects which holds non-null values. It is
undefined behavior to direct modify a __weak
object which is being tracked
by the runtime except through an
objc_storeWeak,
objc_destroyWeak, or
objc_moveWeak call.
The runtime must provide a number of new entrypoints which the compiler may emit, which are described in the remainder of this section.
Rationale
Several of these functions are semantically equivalent to a message send; we emit calls to C functions instead because:
- the machine code to do so is significantly smaller,
- it is much easier to recognize the C functions in the ARC optimizer, and
- a sufficient sophisticated runtime may be able to avoid the message send in common cases.
Several other of these functions are “fused” operations which can be described entirely in terms of other operations. We use the fused operations primarily as a code-size optimization, although in some cases there is also a real potential for avoiding redundant operations in the runtime.
id objc_autorelease(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it adds the object
to the innermost autorelease pool exactly as if the object had been sent the
autorelease
message.
Always returns value
.
void objc_autoreleasePoolPop(void *pool);
¶
Precondition: pool
is the result of a previous call to
objc_autoreleasePoolPush on the
current thread, where neither pool
nor any enclosing pool have previously
been popped.
Releases all the objects added to the given autorelease pool and any
autorelease pools it encloses, then sets the current autorelease pool to the
pool directly enclosing pool
.
void *objc_autoreleasePoolPush(void);
¶
Creates a new autorelease pool that is enclosed by the current pool, makes that the current pool, and returns an opaque “handle” to it.
Rationale
While the interface is described as an explicit hierarchy of pools, the rules allow the implementation to just keep a stack of objects, using the stack depth as the opaque pool handle.
id objc_autoreleaseReturnValue(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it makes a best
effort to hand off ownership of a retain count on the object to a call to
objc_retainAutoreleasedReturnValue for the same object in an
enclosing call frame. If this is not possible, the object is autoreleased as
above.
Always returns value
.
void objc_copyWeak(id *dest, id *src);
¶
Precondition: src
is a valid pointer which either contains a null pointer
or has been registered as a __weak
object. dest
is a valid pointer
which has not been registered as a __weak
object.
dest
is initialized to be equivalent to src
, potentially registering it
with the runtime. Equivalent to the following code:
void objc_copyWeak(id *dest, id *src) {
objc_release(objc_initWeak(dest, objc_loadWeakRetained(src)));
}
Must be atomic with respect to calls to objc_storeWeak
on src
.
void objc_destroyWeak(id *object);
¶
Precondition: object
is a valid pointer which either contains a null
pointer or has been registered as a __weak
object.
object
is unregistered as a weak object, if it ever was. The current value
of object
is left unspecified; otherwise, equivalent to the following code:
void objc_destroyWeak(id *object) {
objc_storeWeak(object, nil);
}
Does not need to be atomic with respect to calls to objc_storeWeak
on
object
.
id objc_initWeak(id *object, id value);
¶
Precondition: object
is a valid pointer which has not been registered as
a __weak
object. value
is null or a pointer to a valid object.
If value
is a null pointer or the object to which it points has begun
deallocation, object
is zero-initialized. Otherwise, object
is
registered as a __weak
object pointing to value
. Equivalent to the
following code:
id objc_initWeak(id *object, id value) {
*object = nil;
return objc_storeWeak(object, value);
}
Returns the value of object
after the call.
Does not need to be atomic with respect to calls to objc_storeWeak
on
object
.
id objc_loadWeak(id *object);
¶
Precondition: object
is a valid pointer which either contains a null
pointer or has been registered as a __weak
object.
If object
is registered as a __weak
object, and the last value stored
into object
has not yet been deallocated or begun deallocation, retains and
autoreleases that value and returns it. Otherwise returns null. Equivalent to
the following code:
id objc_loadWeak(id *object) {
return objc_autorelease(objc_loadWeakRetained(object));
}
Must be atomic with respect to calls to objc_storeWeak
on object
.
Rationale
Loading weak references would be inherently prone to race conditions without the retain.
id objc_loadWeakRetained(id *object);
¶
Precondition: object
is a valid pointer which either contains a null
pointer or has been registered as a __weak
object.
If object
is registered as a __weak
object, and the last value stored
into object
has not yet been deallocated or begun deallocation, retains
that value and returns it. Otherwise returns null.
Must be atomic with respect to calls to objc_storeWeak
on object
.
void objc_moveWeak(id *dest, id *src);
¶
Precondition: src
is a valid pointer which either contains a null pointer
or has been registered as a __weak
object. dest
is a valid pointer
which has not been registered as a __weak
object.
dest
is initialized to be equivalent to src
, potentially registering it
with the runtime. src
may then be left in its original state, in which
case this call is equivalent to objc_copyWeak, or it may be left as null.
Must be atomic with respect to calls to objc_storeWeak
on src
.
void objc_release(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it performs a
release operation exactly as if the object had been sent the release
message.
id objc_retain(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it performs a retain
operation exactly as if the object had been sent the retain
message.
Always returns value
.
id objc_retainAutorelease(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it performs a retain
operation followed by an autorelease operation. Equivalent to the following
code:
id objc_retainAutorelease(id value) {
return objc_autorelease(objc_retain(value));
}
Always returns value
.
id objc_retainAutoreleaseReturnValue(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it performs a retain
operation followed by the operation described in
objc_autoreleaseReturnValue.
Equivalent to the following code:
id objc_retainAutoreleaseReturnValue(id value) {
return objc_autoreleaseReturnValue(objc_retain(value));
}
Always returns value
.
id objc_retainAutoreleasedReturnValue(id value);
¶
Precondition: value
is null or a pointer to a valid object.
If value
is null, this call has no effect. Otherwise, it attempts to
accept a hand off of a retain count from a call to
objc_autoreleaseReturnValue on
value
in a recently-called function or something it calls. If that fails,
it performs a retain operation exactly like objc_retain.
Always returns value
.
id objc_retainBlock(id value);
¶
Precondition: value
is null or a pointer to a valid block object.
If value
is null, this call has no effect. Otherwise, if the block pointed
to by value
is still on the stack, it is copied to the heap and the address
of the copy is returned. Otherwise a retain operation is performed on the
block exactly as if it had been sent the retain
message.
id objc_storeStrong(id *object, id value);
¶
Precondition: object
is a valid pointer to a __strong
object which is
adequately aligned for a pointer. value
is null or a pointer to a valid
object.
Performs the complete sequence for assigning to a __strong
object of
non-block type [*]. Equivalent to the following code:
void objc_storeStrong(id *object, id value) {
id oldValue = *object;
value = [value retain];
*object = value;
[oldValue release];
}
[*] | This does not imply that a __strong object of block type is an
invalid argument to this function. Rather it implies that an objc_retain
and not an objc_retainBlock operation will be emitted if the argument is
a block. |
id objc_storeWeak(id *object, id value);
¶
Precondition: object
is a valid pointer which either contains a null
pointer or has been registered as a __weak
object. value
is null or a
pointer to a valid object.
If value
is a null pointer or the object to which it points has begun
deallocation, object
is assigned null and unregistered as a __weak
object. Otherwise, object
is registered as a __weak
object or has its
registration updated to point to value
.
Returns the value of object
after the call.
Introduction¶
This document describes the language extensions provided by Clang. In addition to the language extensions listed here, Clang aims to support a broad range of GCC extensions. Please see the GCC manual for more information on these extensions.
Feature Checking Macros¶
Language extensions can be very useful, but only if you know you can depend on them. In order to allow fine-grain features checks, we support three builtin function-like macros. This allows you to directly test for a feature in your code without having to resort to something like autoconf or fragile “compiler version checks”.
__has_builtin
¶
This function-like macro takes a single identifier argument that is the name of a builtin function. It evaluates to 1 if the builtin is supported or 0 if not. It can be used like this:
#ifndef __has_builtin // Optional of course.
#define __has_builtin(x) 0 // Compatibility with non-clang compilers.
#endif
...
#if __has_builtin(__builtin_trap)
__builtin_trap();
#else
abort();
#endif
...
__has_feature
and __has_extension
¶
These function-like macros take a single identifier argument that is the name
of a feature. __has_feature
evaluates to 1 if the feature is both
supported by Clang and standardized in the current language standard or 0 if
not (but see below), while
__has_extension
evaluates to 1 if the feature is supported by Clang in the
current language (either as a language extension or a standard language
feature) or 0 if not. They can be used like this:
#ifndef __has_feature // Optional of course.
#define __has_feature(x) 0 // Compatibility with non-clang compilers.
#endif
#ifndef __has_extension
#define __has_extension __has_feature // Compatibility with pre-3.0 compilers.
#endif
...
#if __has_feature(cxx_rvalue_references)
// This code will only be compiled with the -std=c++11 and -std=gnu++11
// options, because rvalue references are only standardized in C++11.
#endif
#if __has_extension(cxx_rvalue_references)
// This code will be compiled with the -std=c++11, -std=gnu++11, -std=c++98
// and -std=gnu++98 options, because rvalue references are supported as a
// language extension in C++98.
#endif
For backward compatibility, __has_feature
can also be used to test
for support for non-standardized features, i.e. features not prefixed c_
,
cxx_
or objc_
.
Another use of __has_feature
is to check for compiler features not related
to the language standard, such as e.g. AddressSanitizer.
If the -pedantic-errors
option is given, __has_extension
is equivalent
to __has_feature
.
The feature tag is described along with the language feature below.
The feature name or extension name can also be specified with a preceding and
following __
(double underscore) to avoid interference from a macro with
the same name. For instance, __cxx_rvalue_references__
can be used instead
of cxx_rvalue_references
.
__has_cpp_attribute
¶
This function-like macro takes a single argument that is the name of a C++11-style attribute. The argument can either be a single identifier, or a scoped identifier. If the attribute is supported, a nonzero value is returned. If the attribute is a standards-based attribute, this macro returns a nonzero value based on the year and month in which the attribute was voted into the working draft. If the attribute is not supported by the current compliation target, this macro evaluates to 0. It can be used like this:
#ifndef __has_cpp_attribute // Optional of course.
#define __has_cpp_attribute(x) 0 // Compatibility with non-clang compilers.
#endif
...
#if __has_cpp_attribute(clang::fallthrough)
#define FALLTHROUGH [[clang::fallthrough]]
#else
#define FALLTHROUGH
#endif
...
The attribute identifier (but not scope) can also be specified with a preceding
and following __
(double underscore) to avoid interference from a macro with
the same name. For instance, gnu::__const__
can be used instead of
gnu::const
.
__has_c_attribute
¶
This function-like macro takes a single argument that is the name of an attribute exposed with the double square-bracket syntax in C mode. The argument can either be a single identifier or a scoped identifier. If the attribute is supported, a nonzero value is returned. If the attribute is not supported by the current compilation target, this macro evaluates to 0. It can be used like this:
#ifndef __has_c_attribute // Optional of course.
#define __has_c_attribute(x) 0 // Compatibility with non-clang compilers.
#endif
...
#if __has_c_attribute(fallthrough)
#define FALLTHROUGH [[fallthrough]]
#else
#define FALLTHROUGH
#endif
...
The attribute identifier (but not scope) can also be specified with a preceding
and following __
(double underscore) to avoid interference from a macro with
the same name. For instance, gnu::__const__
can be used instead of
gnu::const
.
__has_attribute
¶
This function-like macro takes a single identifier argument that is the name of a GNU-style attribute. It evaluates to 1 if the attribute is supported by the current compilation target, or 0 if not. It can be used like this:
#ifndef __has_attribute // Optional of course.
#define __has_attribute(x) 0 // Compatibility with non-clang compilers.
#endif
...
#if __has_attribute(always_inline)
#define ALWAYS_INLINE __attribute__((always_inline))
#else
#define ALWAYS_INLINE
#endif
...
The attribute name can also be specified with a preceding and following __
(double underscore) to avoid interference from a macro with the same name. For
instance, __always_inline__
can be used instead of always_inline
.
__has_declspec_attribute
¶
This function-like macro takes a single identifier argument that is the name of
an attribute implemented as a Microsoft-style __declspec
attribute. It
evaluates to 1 if the attribute is supported by the current compilation target,
or 0 if not. It can be used like this:
#ifndef __has_declspec_attribute // Optional of course.
#define __has_declspec_attribute(x) 0 // Compatibility with non-clang compilers.
#endif
...
#if __has_declspec_attribute(dllexport)
#define DLLEXPORT __declspec(dllexport)
#else
#define DLLEXPORT
#endif
...
The attribute name can also be specified with a preceding and following __
(double underscore) to avoid interference from a macro with the same name. For
instance, __dllexport__
can be used instead of dllexport
.
__is_identifier
¶
This function-like macro takes a single identifier argument that might be either a reserved word or a regular identifier. It evaluates to 1 if the argument is just a regular identifier and not a reserved word, in the sense that it can then be used as the name of a user-defined function or variable. Otherwise it evaluates to 0. It can be used like this:
...
#ifdef __is_identifier // Compatibility with non-clang compilers.
#if __is_identifier(__wchar_t)
typedef wchar_t __wchar_t;
#endif
#endif
__wchar_t WideCharacter;
...
Include File Checking Macros¶
Not all developments systems have the same include files. The
__has_include and __has_include_next macros allow
you to check for the existence of an include file before doing a possibly
failing #include
directive. Include file checking macros must be used
as expressions in #if
or #elif
preprocessing directives.
__has_include
¶
This function-like macro takes a single file name string argument that is the name of an include file. It evaluates to 1 if the file can be found using the include paths, or 0 otherwise:
// Note the two possible file name string formats.
#if __has_include("myinclude.h") && __has_include(<stdint.h>)
# include "myinclude.h"
#endif
To test for this feature, use #if defined(__has_include)
:
// To avoid problem with non-clang compilers not having this macro.
#if defined(__has_include)
#if __has_include("myinclude.h")
# include "myinclude.h"
#endif
#endif
__has_include_next
¶
This function-like macro takes a single file name string argument that is the
name of an include file. It is like __has_include
except that it looks for
the second instance of the given file found in the include paths. It evaluates
to 1 if the second instance of the file can be found using the include paths,
or 0 otherwise:
// Note the two possible file name string formats.
#if __has_include_next("myinclude.h") && __has_include_next(<stdint.h>)
# include_next "myinclude.h"
#endif
// To avoid problem with non-clang compilers not having this macro.
#if defined(__has_include_next)
#if __has_include_next("myinclude.h")
# include_next "myinclude.h"
#endif
#endif
Note that __has_include_next
, like the GNU extension #include_next
directive, is intended for use in headers only, and will issue a warning if
used in the top-level compilation file. A warning will also be issued if an
absolute path is used in the file argument.
__has_warning
¶
This function-like macro takes a string literal that represents a command line option for a warning and returns true if that is a valid warning option.
#if __has_warning("-Wformat")
...
#endif
Builtin Macros¶
__BASE_FILE__
- Defined to a string that contains the name of the main input file passed to Clang.
__COUNTER__
- Defined to an integer value that starts at zero and is incremented each time
the
__COUNTER__
macro is expanded. __INCLUDE_LEVEL__
- Defined to an integral value that is the include depth of the file currently being translated. For the main file, this value is zero.
__TIMESTAMP__
- Defined to the date and time of the last modification of the current source file.
__clang__
- Defined when compiling with Clang
__clang_major__
- Defined to the major marketing version number of Clang (e.g., the 2 in 2.0.1). Note that marketing version numbers should not be used to check for language features, as different vendors use different numbering schemes. Instead, use the Feature Checking Macros.
__clang_minor__
- Defined to the minor version number of Clang (e.g., the 0 in 2.0.1). Note that marketing version numbers should not be used to check for language features, as different vendors use different numbering schemes. Instead, use the Feature Checking Macros.
__clang_patchlevel__
- Defined to the marketing patch level of Clang (e.g., the 1 in 2.0.1).
__clang_version__
- Defined to a string that captures the Clang marketing version, including the
Subversion tag or revision number, e.g., “
1.5 (trunk 102332)
”.
Vectors and Extended Vectors¶
Supports the GCC, OpenCL, AltiVec and NEON vector extensions.
OpenCL vector types are created using ext_vector_type
attribute. It
support for V.xyzw
syntax and other tidbits as seen in OpenCL. An example
is:
typedef float float4 __attribute__((ext_vector_type(4)));
typedef float float2 __attribute__((ext_vector_type(2)));
float4 foo(float2 a, float2 b) {
float4 c;
c.xz = a;
c.yw = b;
return c;
}
Query for this feature with __has_extension(attribute_ext_vector_type)
.
Giving -maltivec
option to clang enables support for AltiVec vector syntax
and functions. For example:
vector float foo(vector int a) {
vector int b;
b = vec_add(a, a) + a;
return (vector float)b;
}
NEON vector types are created using neon_vector_type
and
neon_polyvector_type
attributes. For example:
typedef __attribute__((neon_vector_type(8))) int8_t int8x8_t;
typedef __attribute__((neon_polyvector_type(16))) poly8_t poly8x16_t;
int8x8_t foo(int8x8_t a) {
int8x8_t v;
v = a;
return v;
}
Vector Literals¶
Vector literals can be used to create vectors from a set of scalars, or vectors. Either parentheses or braces form can be used. In the parentheses form the number of literal values specified must be one, i.e. referring to a scalar value, or must match the size of the vector type being created. If a single scalar literal value is specified, the scalar literal value will be replicated to all the components of the vector type. In the brackets form any number of literals can be specified. For example:
typedef int v4si __attribute__((__vector_size__(16)));
typedef float float4 __attribute__((ext_vector_type(4)));
typedef float float2 __attribute__((ext_vector_type(2)));
v4si vsi = (v4si){1, 2, 3, 4};
float4 vf = (float4)(1.0f, 2.0f, 3.0f, 4.0f);
vector int vi1 = (vector int)(1); // vi1 will be (1, 1, 1, 1).
vector int vi2 = (vector int){1}; // vi2 will be (1, 0, 0, 0).
vector int vi3 = (vector int)(1, 2); // error
vector int vi4 = (vector int){1, 2}; // vi4 will be (1, 2, 0, 0).
vector int vi5 = (vector int)(1, 2, 3, 4);
float4 vf = (float4)((float2)(1.0f, 2.0f), (float2)(3.0f, 4.0f));
Vector Operations¶
The table below shows the support for each operation by vector extension. A dash indicates that an operation is not accepted according to a corresponding specification.
Operator | OpenCL | AltiVec | GCC | NEON |
---|---|---|---|---|
[] | yes | yes | yes | – |
unary operators +, – | yes | yes | yes | – |
++, – – | yes | yes | yes | – |
+,–,*,/,% | yes | yes | yes | – |
bitwise operators &,|,^,~ | yes | yes | yes | – |
>>,<< | yes | yes | yes | – |
!, &&, || | yes | – | – | – |
==, !=, >, <, >=, <= | yes | yes | – | – |
= | yes | yes | yes | yes |
:? | yes | – | – | – |
sizeof | yes | yes | yes | yes |
C-style cast | yes | yes | yes | no |
reinterpret_cast | yes | no | yes | no |
static_cast | yes | no | yes | no |
const_cast | no | no | no | no |
See also __builtin_shufflevector, __builtin_convertvector.
Half-Precision Floating Point¶
Clang supports two half-precision (16-bit) floating point types: __fp16
and
_Float16
. __fp16
is defined in the ARM C Language Extensions (ACLE)
and _Float16
in ISO/IEC TS 18661-3:2015.
__fp16
is a storage and interchange format only. This means that values of
__fp16
promote to (at least) float when used in arithmetic operations.
There are two __fp16
formats. Clang supports the IEEE 754-2008 format and
not the ARM alternative format.
ISO/IEC TS 18661-3:2015 defines C support for additional floating point types.
_FloatN
is defined as a binary floating type, where the N suffix denotes
the number of bits and is 16, 32, 64, or greater and equal to 128 and a
multiple of 32. Clang supports _Float16
. The difference from __fp16
is
that arithmetic on _Float16
is performed in half-precision, thus it is not
a storage-only format. _Float16
is available as a source language type in
both C and C++ mode.
It is recommended that portable code use the _Float16
type because
__fp16
is an ARM C-Language Extension (ACLE), whereas _Float16
is
defined by the C standards committee, so using _Float16
will not prevent
code from being ported to architectures other than Arm. Also, _Float16
arithmetic and operations will directly map on half-precision instructions when
they are available (e.g. Armv8.2-A), avoiding conversions to/from
single-precision, and thus will result in more performant code. If
half-precision instructions are unavailable, values will be promoted to
single-precision, similar to the semantics of __fp16
except that the
results will be stored in single-precision.
In an arithmetic operation where one operand is of __fp16
type and the
other is of _Float16
type, the _Float16
type is first converted to
__fp16
type and then the operation is completed as if both operands were of
__fp16
type.
To define a _Float16
literal, suffix f16
can be appended to the compile-time
constant declaration. There is no default argument promotion for _Float16
; this
applies to the standard floating types only. As a consequence, for example, an
explicit cast is required for printing a _Float16
value (there is no string
format specifier for _Float16
).
Attributes on Enumerators¶
Clang allows attributes to be written on individual enumerators. This allows enumerators to be deprecated, made unavailable, etc. The attribute must appear after the enumerator name and before any initializer, like so:
enum OperationMode {
OM_Invalid,
OM_Normal,
OM_Terrified __attribute__((deprecated)),
OM_AbortOnError __attribute__((deprecated)) = 4
};
Attributes on the enum
declaration do not apply to individual enumerators.
Query for this feature with __has_extension(enumerator_attributes)
.
‘User-Specified’ System Frameworks¶
Clang provides a mechanism by which frameworks can be built in such a way that they will always be treated as being “system frameworks”, even if they are not present in a system framework directory. This can be useful to system framework developers who want to be able to test building other applications with development builds of their framework, including the manner in which the compiler changes warning behavior for system headers.
Framework developers can opt-in to this mechanism by creating a
“.system_framework
” file at the top-level of their framework. That is, the
framework should have contents like:
.../TestFramework.framework
.../TestFramework.framework/.system_framework
.../TestFramework.framework/Headers
.../TestFramework.framework/Headers/TestFramework.h
...
Clang will treat the presence of this file as an indicator that the framework should be treated as a system framework, regardless of how it was found in the framework search path. For consistency, we recommend that such files never be included in installed versions of the framework.
Checks for Standard Language Features¶
The __has_feature
macro can be used to query if certain standard language
features are enabled. The __has_extension
macro can be used to query if
language features are available as an extension when compiling for a standard
which does not provide them. The features which can be tested are listed here.
Since Clang 3.4, the C++ SD-6 feature test macros are also supported.
These are macros with names of the form __cpp_<feature_name>
, and are
intended to be a portable way to query the supported features of the compiler.
See the C++ status page for
information on the version of SD-6 supported by each Clang release, and the
macros provided by that revision of the recommendations.
C++98¶
The features listed below are part of the C++98 standard. These features are enabled by default when compiling C++ code.
C++ exceptions¶
Use __has_feature(cxx_exceptions)
to determine if C++ exceptions have been
enabled. For example, compiling code with -fno-exceptions
disables C++
exceptions.
C++ RTTI¶
Use __has_feature(cxx_rtti)
to determine if C++ RTTI has been enabled. For
example, compiling code with -fno-rtti
disables the use of RTTI.
C++11¶
The features listed below are part of the C++11 standard. As a result, all
these features are enabled with the -std=c++11
or -std=gnu++11
option
when compiling C++ code.
C++11 SFINAE includes access control¶
Use __has_feature(cxx_access_control_sfinae)
or
__has_extension(cxx_access_control_sfinae)
to determine whether
access-control errors (e.g., calling a private constructor) are considered to
be template argument deduction errors (aka SFINAE errors), per C++ DR1170.
C++11 alias templates¶
Use __has_feature(cxx_alias_templates)
or
__has_extension(cxx_alias_templates)
to determine if support for C++11’s
alias declarations and alias templates is enabled.
C++11 alignment specifiers¶
Use __has_feature(cxx_alignas)
or __has_extension(cxx_alignas)
to
determine if support for alignment specifiers using alignas
is enabled.
Use __has_feature(cxx_alignof)
or __has_extension(cxx_alignof)
to
determine if support for the alignof
keyword is enabled.
C++11 attributes¶
Use __has_feature(cxx_attributes)
or __has_extension(cxx_attributes)
to
determine if support for attribute parsing with C++11’s square bracket notation
is enabled.
C++11 generalized constant expressions¶
Use __has_feature(cxx_constexpr)
to determine if support for generalized
constant expressions (e.g., constexpr
) is enabled.
C++11 decltype()
¶
Use __has_feature(cxx_decltype)
or __has_extension(cxx_decltype)
to
determine if support for the decltype()
specifier is enabled. C++11’s
decltype
does not require type-completeness of a function call expression.
Use __has_feature(cxx_decltype_incomplete_return_types)
or
__has_extension(cxx_decltype_incomplete_return_types)
to determine if
support for this feature is enabled.
C++11 default template arguments in function templates¶
Use __has_feature(cxx_default_function_template_args)
or
__has_extension(cxx_default_function_template_args)
to determine if support
for default template arguments in function templates is enabled.
C++11 default
ed functions¶
Use __has_feature(cxx_defaulted_functions)
or
__has_extension(cxx_defaulted_functions)
to determine if support for
defaulted function definitions (with = default
) is enabled.
C++11 delegating constructors¶
Use __has_feature(cxx_delegating_constructors)
to determine if support for
delegating constructors is enabled.
C++11 deleted
functions¶
Use __has_feature(cxx_deleted_functions)
or
__has_extension(cxx_deleted_functions)
to determine if support for deleted
function definitions (with = delete
) is enabled.
C++11 explicit conversion functions¶
Use __has_feature(cxx_explicit_conversions)
to determine if support for
explicit
conversion functions is enabled.
C++11 generalized initializers¶
Use __has_feature(cxx_generalized_initializers)
to determine if support for
generalized initializers (using braced lists and std::initializer_list
) is
enabled.
C++11 implicit move constructors/assignment operators¶
Use __has_feature(cxx_implicit_moves)
to determine if Clang will implicitly
generate move constructors and move assignment operators where needed.
C++11 inheriting constructors¶
Use __has_feature(cxx_inheriting_constructors)
to determine if support for
inheriting constructors is enabled.
C++11 inline namespaces¶
Use __has_feature(cxx_inline_namespaces)
or
__has_extension(cxx_inline_namespaces)
to determine if support for inline
namespaces is enabled.
C++11 lambdas¶
Use __has_feature(cxx_lambdas)
or __has_extension(cxx_lambdas)
to
determine if support for lambdas is enabled.
C++11 local and unnamed types as template arguments¶
Use __has_feature(cxx_local_type_template_args)
or
__has_extension(cxx_local_type_template_args)
to determine if support for
local and unnamed types as template arguments is enabled.
C++11 noexcept¶
Use __has_feature(cxx_noexcept)
or __has_extension(cxx_noexcept)
to
determine if support for noexcept exception specifications is enabled.
C++11 in-class non-static data member initialization¶
Use __has_feature(cxx_nonstatic_member_init)
to determine whether in-class
initialization of non-static data members is enabled.
C++11 nullptr
¶
Use __has_feature(cxx_nullptr)
or __has_extension(cxx_nullptr)
to
determine if support for nullptr
is enabled.
C++11 override control
¶
Use __has_feature(cxx_override_control)
or
__has_extension(cxx_override_control)
to determine if support for the
override control keywords is enabled.
C++11 reference-qualified functions¶
Use __has_feature(cxx_reference_qualified_functions)
or
__has_extension(cxx_reference_qualified_functions)
to determine if support
for reference-qualified functions (e.g., member functions with &
or &&
applied to *this
) is enabled.
C++11 range-based for
loop¶
Use __has_feature(cxx_range_for)
or __has_extension(cxx_range_for)
to
determine if support for the range-based for loop is enabled.
C++11 raw string literals¶
Use __has_feature(cxx_raw_string_literals)
to determine if support for raw
string literals (e.g., R"x(foo\bar)x"
) is enabled.
C++11 rvalue references¶
Use __has_feature(cxx_rvalue_references)
or
__has_extension(cxx_rvalue_references)
to determine if support for rvalue
references is enabled.
C++11 static_assert()
¶
Use __has_feature(cxx_static_assert)
or
__has_extension(cxx_static_assert)
to determine if support for compile-time
assertions using static_assert
is enabled.
C++11 thread_local
¶
Use __has_feature(cxx_thread_local)
to determine if support for
thread_local
variables is enabled.
C++11 type inference¶
Use __has_feature(cxx_auto_type)
or __has_extension(cxx_auto_type)
to
determine C++11 type inference is supported using the auto
specifier. If
this is disabled, auto
will instead be a storage class specifier, as in C
or C++98.
C++11 strongly typed enumerations¶
Use __has_feature(cxx_strong_enums)
or
__has_extension(cxx_strong_enums)
to determine if support for strongly
typed, scoped enumerations is enabled.
C++11 trailing return type¶
Use __has_feature(cxx_trailing_return)
or
__has_extension(cxx_trailing_return)
to determine if support for the
alternate function declaration syntax with trailing return type is enabled.
C++11 Unicode string literals¶
Use __has_feature(cxx_unicode_literals)
to determine if support for Unicode
string literals is enabled.
C++11 unrestricted unions¶
Use __has_feature(cxx_unrestricted_unions)
to determine if support for
unrestricted unions is enabled.
C++11 user-defined literals¶
Use __has_feature(cxx_user_literals)
to determine if support for
user-defined literals is enabled.
C++11 variadic templates¶
Use __has_feature(cxx_variadic_templates)
or
__has_extension(cxx_variadic_templates)
to determine if support for
variadic templates is enabled.
C++14¶
The features listed below are part of the C++14 standard. As a result, all
these features are enabled with the -std=C++14
or -std=gnu++14
option
when compiling C++ code.
C++14 binary literals¶
Use __has_feature(cxx_binary_literals)
or
__has_extension(cxx_binary_literals)
to determine whether
binary literals (for instance, 0b10010
) are recognized. Clang supports this
feature as an extension in all language modes.
C++14 contextual conversions¶
Use __has_feature(cxx_contextual_conversions)
or
__has_extension(cxx_contextual_conversions)
to determine if the C++14 rules
are used when performing an implicit conversion for an array bound in a
new-expression, the operand of a delete-expression, an integral constant
expression, or a condition in a switch
statement.
C++14 decltype(auto)¶
Use __has_feature(cxx_decltype_auto)
or
__has_extension(cxx_decltype_auto)
to determine if support
for the decltype(auto)
placeholder type is enabled.
C++14 default initializers for aggregates¶
Use __has_feature(cxx_aggregate_nsdmi)
or
__has_extension(cxx_aggregate_nsdmi)
to determine if support
for default initializers in aggregate members is enabled.
C++14 digit separators¶
Use __cpp_digit_separators
to determine if support for digit separators
using single quotes (for instance, 10'000
) is enabled. At this time, there
is no corresponding __has_feature
name
C++14 generalized lambda capture¶
Use __has_feature(cxx_init_captures)
or
__has_extension(cxx_init_captures)
to determine if support for
lambda captures with explicit initializers is enabled
(for instance, [n(0)] { return ++n; }
).
C++14 generic lambdas¶
Use __has_feature(cxx_generic_lambdas)
or
__has_extension(cxx_generic_lambdas)
to determine if support for generic
(polymorphic) lambdas is enabled
(for instance, [] (auto x) { return x + 1; }
).
C++14 relaxed constexpr¶
Use __has_feature(cxx_relaxed_constexpr)
or
__has_extension(cxx_relaxed_constexpr)
to determine if variable
declarations, local variable modification, and control flow constructs
are permitted in constexpr
functions.
C++14 return type deduction¶
Use __has_feature(cxx_return_type_deduction)
or
__has_extension(cxx_return_type_deduction)
to determine if support
for return type deduction for functions (using auto
as a return type)
is enabled.
C++14 runtime-sized arrays¶
Use __has_feature(cxx_runtime_array)
or
__has_extension(cxx_runtime_array)
to determine if support
for arrays of runtime bound (a restricted form of variable-length arrays)
is enabled.
Clang’s implementation of this feature is incomplete.
C++14 variable templates¶
Use __has_feature(cxx_variable_templates)
or
__has_extension(cxx_variable_templates)
to determine if support for
templated variable declarations is enabled.
C11¶
The features listed below are part of the C11 standard. As a result, all these
features are enabled with the -std=c11
or -std=gnu11
option when
compiling C code. Additionally, because these features are all
backward-compatible, they are available as extensions in all language modes.
C11 alignment specifiers¶
Use __has_feature(c_alignas)
or __has_extension(c_alignas)
to determine
if support for alignment specifiers using _Alignas
is enabled.
Use __has_feature(c_alignof)
or __has_extension(c_alignof)
to determine
if support for the _Alignof
keyword is enabled.
C11 atomic operations¶
Use __has_feature(c_atomic)
or __has_extension(c_atomic)
to determine
if support for atomic types using _Atomic
is enabled. Clang also provides
a set of builtins which can be used to implement
the <stdatomic.h>
operations on _Atomic
types. Use
__has_include(<stdatomic.h>)
to determine if C11’s <stdatomic.h>
header
is available.
Clang will use the system’s <stdatomic.h>
header when one is available, and
will otherwise use its own. When using its own, implementations of the atomic
operations are provided as macros. In the cases where C11 also requires a real
function, this header provides only the declaration of that function (along
with a shadowing macro implementation), and you must link to a library which
provides a definition of the function if you use it instead of the macro.
C11 generic selections¶
Use __has_feature(c_generic_selections)
or
__has_extension(c_generic_selections)
to determine if support for generic
selections is enabled.
As an extension, the C11 generic selection expression is available in all languages supported by Clang. The syntax is the same as that given in the C11 standard.
In C, type compatibility is decided according to the rules given in the appropriate standard, but in C++, which lacks the type compatibility rules used in C, types are considered compatible only if they are equivalent.
C11 _Static_assert()
¶
Use __has_feature(c_static_assert)
or __has_extension(c_static_assert)
to determine if support for compile-time assertions using _Static_assert
is
enabled.
C11 _Thread_local
¶
Use __has_feature(c_thread_local)
or __has_extension(c_thread_local)
to determine if support for _Thread_local
variables is enabled.
Checks for Type Trait Primitives¶
Type trait primitives are special builtin constant expressions that can be used by the standard C++ library to facilitate or simplify the implementation of user-facing type traits in the <type_traits> header.
They are not intended to be used directly by user code because they are implementation-defined and subject to change – as such they’re tied closely to the supported set of system headers, currently:
- LLVM’s own libc++
- GNU libstdc++
- The Microsoft standard C++ library
Clang supports the GNU C++ type traits and a subset of the Microsoft Visual C++ Type traits.
Feature detection is supported only for some of the primitives at present. User code should not use these checks because they bear no direct relation to the actual set of type traits supported by the C++ standard library.
For type trait __X
, __has_extension(X)
indicates the presence of the
type trait primitive in the compiler. A simplistic usage example as might be
seen in standard C++ headers follows:
#if __has_extension(is_convertible_to)
template<typename From, typename To>
struct is_convertible_to {
static const bool value = __is_convertible_to(From, To);
};
#else
// Emulate type trait for compatibility with other compilers.
#endif
The following type trait primitives are supported by Clang:
__has_nothrow_assign
(GNU, Microsoft)__has_nothrow_copy
(GNU, Microsoft)__has_nothrow_constructor
(GNU, Microsoft)__has_trivial_assign
(GNU, Microsoft)__has_trivial_copy
(GNU, Microsoft)__has_trivial_constructor
(GNU, Microsoft)__has_trivial_destructor
(GNU, Microsoft)__has_virtual_destructor
(GNU, Microsoft)__is_abstract
(GNU, Microsoft)__is_aggregate
(GNU, Microsoft)__is_base_of
(GNU, Microsoft)__is_class
(GNU, Microsoft)__is_convertible_to
(Microsoft)__is_empty
(GNU, Microsoft)__is_enum
(GNU, Microsoft)__is_interface_class
(Microsoft)__is_pod
(GNU, Microsoft)__is_polymorphic
(GNU, Microsoft)__is_union
(GNU, Microsoft)__is_literal(type)
: Determines whether the given type is a literal type__is_final
: Determines whether the given type is declared with afinal
class-virt-specifier.__underlying_type(type)
: Retrieves the underlying type for a givenenum
type. This trait is required to implement the C++11 standard library.__is_trivially_assignable(totype, fromtype)
: Determines whether a value of typetotype
can be assigned to from a value of typefromtype
such that no non-trivial functions are called as part of that assignment. This trait is required to implement the C++11 standard library.__is_trivially_constructible(type, argtypes...)
: Determines whether a value of typetype
can be direct-initialized with arguments of typesargtypes...
such that no non-trivial functions are called as part of that initialization. This trait is required to implement the C++11 standard library.__is_destructible
(MSVC 2013)__is_nothrow_destructible
(MSVC 2013)__is_nothrow_assignable
(MSVC 2013, clang)__is_constructible
(MSVC 2013, clang)__is_nothrow_constructible
(MSVC 2013, clang)__is_assignable
(MSVC 2015, clang)__reference_binds_to_temporary(T, U)
(Clang): Determines whether a reference of typeT
bound to an expression of typeU
would bind to a materialized temporary object. IfT
is not a reference type the result is false. Note this trait will also return false when the initialization ofT
fromU
is ill-formed.
Blocks¶
The syntax and high level language feature description is in BlockLanguageSpec. Implementation and ABI details for the clang implementation are in Block-ABI-Apple.
Query for this feature with __has_extension(blocks)
.
Objective-C Features¶
Automatic reference counting¶
Clang provides support for automated reference counting in Objective-C, which eliminates the need
for manual retain
/release
/autorelease
message sends. There are three
feature macros associated with automatic reference counting:
__has_feature(objc_arc)
indicates the availability of automated reference
counting in general, while __has_feature(objc_arc_weak)
indicates that
automated reference counting also includes support for __weak
pointers to
Objective-C objects. __has_feature(objc_arc_fields)
indicates that C structs
are allowed to have fields that are pointers to Objective-C objects managed by
automatic reference counting.
Weak references¶
Clang supports ARC-style weak and unsafe references in Objective-C even
outside of ARC mode. Weak references must be explicitly enabled with
the -fobjc-weak
option; use __has_feature((objc_arc_weak))
to test whether they are enabled. Unsafe references are enabled
unconditionally. ARC-style weak and unsafe references cannot be used
when Objective-C garbage collection is enabled.
Except as noted below, the language rules for the __weak
and
__unsafe_unretained
qualifiers (and the weak
and
unsafe_unretained
property attributes) are just as laid out
in the ARC specification.
In particular, note that some classes do not support forming weak
references to their instances, and note that special care must be
taken when storing weak references in memory where initialization
and deinitialization are outside the responsibility of the compiler
(such as in malloc
-ed memory).
Loading from a __weak
variable always implicitly retains the
loaded value. In non-ARC modes, this retain is normally balanced
by an implicit autorelease. This autorelease can be suppressed
by performing the load in the receiver position of a -retain
message send (e.g. [weakReference retain]
); note that this performs
only a single retain (the retain done when primitively loading from
the weak reference).
For the most part, __unsafe_unretained
in non-ARC modes is just the
default behavior of variables and therefore is not needed. However,
it does have an effect on the semantics of block captures: normally,
copying a block which captures an Objective-C object or block pointer
causes the captured pointer to be retained or copied, respectively,
but that behavior is suppressed when the captured variable is qualified
with __unsafe_unretained
.
Note that the __weak
qualifier formerly meant the GC qualifier in
all non-ARC modes and was silently ignored outside of GC modes. It now
means the ARC-style qualifier in all non-GC modes and is no longer
allowed if not enabled by either -fobjc-arc
or -fobjc-weak
.
It is expected that -fobjc-weak
will eventually be enabled by default
in all non-GC Objective-C modes.
Enumerations with a fixed underlying type¶
Clang provides support for C++11 enumerations with a fixed underlying type within Objective-C. For example, one can write an enumeration type as:
typedef enum : unsigned char { Red, Green, Blue } Color;
This specifies that the underlying type, which is used to store the enumeration
value, is unsigned char
.
Use __has_feature(objc_fixed_enum)
to determine whether support for fixed
underlying types is available in Objective-C.
Interoperability with C++11 lambdas¶
Clang provides interoperability between C++11 lambdas and blocks-based APIs, by
permitting a lambda to be implicitly converted to a block pointer with the
corresponding signature. For example, consider an API such as NSArray
’s
array-sorting method:
- (NSArray *)sortedArrayUsingComparator:(NSComparator)cmptr;
NSComparator
is simply a typedef for the block pointer NSComparisonResult
(^)(id, id)
, and parameters of this type are generally provided with block
literals as arguments. However, one can also use a C++11 lambda so long as it
provides the same signature (in this case, accepting two parameters of type
id
and returning an NSComparisonResult
):
NSArray *array = @[@"string 1", @"string 21", @"string 12", @"String 11",
@"String 02"];
const NSStringCompareOptions comparisonOptions
= NSCaseInsensitiveSearch | NSNumericSearch |
NSWidthInsensitiveSearch | NSForcedOrderingSearch;
NSLocale *currentLocale = [NSLocale currentLocale];
NSArray *sorted
= [array sortedArrayUsingComparator:[=](id s1, id s2) -> NSComparisonResult {
NSRange string1Range = NSMakeRange(0, [s1 length]);
return [s1 compare:s2 options:comparisonOptions
range:string1Range locale:currentLocale];
}];
NSLog(@"sorted: %@", sorted);
This code relies on an implicit conversion from the type of the lambda expression (an unnamed, local class type called the closure type) to the corresponding block pointer type. The conversion itself is expressed by a conversion operator in that closure type that produces a block pointer with the same signature as the lambda itself, e.g.,
operator NSComparisonResult (^)(id, id)() const;
This conversion function returns a new block that simply forwards the two
parameters to the lambda object (which it captures by copy), then returns the
result. The returned block is first copied (with Block_copy
) and then
autoreleased. As an optimization, if a lambda expression is immediately
converted to a block pointer (as in the first example, above), then the block
is not copied and autoreleased: rather, it is given the same lifetime as a
block literal written at that point in the program, which avoids the overhead
of copying a block to the heap in the common case.
The conversion from a lambda to a block pointer is only available in Objective-C++, and not in C++ with blocks, due to its use of Objective-C memory management (autorelease).
Object Literals and Subscripting¶
Clang provides support for Object Literals and Subscripting in Objective-C, which simplifies common Objective-C
programming patterns, makes programs more concise, and improves the safety of
container creation. There are several feature macros associated with object
literals and subscripting: __has_feature(objc_array_literals)
tests the
availability of array literals; __has_feature(objc_dictionary_literals)
tests the availability of dictionary literals;
__has_feature(objc_subscripting)
tests the availability of object
subscripting.
Objective-C Autosynthesis of Properties¶
Clang provides support for autosynthesis of declared properties. Using this
feature, clang provides default synthesis of those properties not declared
@dynamic and not having user provided backing getter and setter methods.
__has_feature(objc_default_synthesize_properties)
checks for availability
of this feature in version of clang being used.
Objective-C retaining behavior attributes¶
In Objective-C, functions and methods are generally assumed to follow the
Cocoa Memory Management
conventions for ownership of object arguments and
return values. However, there are exceptions, and so Clang provides attributes
to allow these exceptions to be documented. This are used by ARC and the
static analyzer Some exceptions may be
better described using the objc_method_family
attribute instead.
Usage: The ns_returns_retained
, ns_returns_not_retained
,
ns_returns_autoreleased
, cf_returns_retained
, and
cf_returns_not_retained
attributes can be placed on methods and functions
that return Objective-C or CoreFoundation objects. They are commonly placed at
the end of a function prototype or method declaration:
id foo() __attribute__((ns_returns_retained));
- (NSString *)bar:(int)x __attribute__((ns_returns_retained));
The *_returns_retained
attributes specify that the returned object has a +1
retain count. The *_returns_not_retained
attributes specify that the return
object has a +0 retain count, even if the normal convention for its selector
would be +1. ns_returns_autoreleased
specifies that the returned object is
+0, but is guaranteed to live at least as long as the next flush of an
autorelease pool.
Usage: The ns_consumed
and cf_consumed
attributes can be placed on
an parameter declaration; they specify that the argument is expected to have a
+1 retain count, which will be balanced in some way by the function or method.
The ns_consumes_self
attribute can only be placed on an Objective-C
method; it specifies that the method expects its self
parameter to have a
+1 retain count, which it will balance in some way.
void foo(__attribute__((ns_consumed)) NSString *string);
- (void) bar __attribute__((ns_consumes_self));
- (void) baz:(id) __attribute__((ns_consumed)) x;
Further examples of these attributes are available in the static analyzer’s list of annotations for analysis.
Query for these features with __has_attribute(ns_consumed)
,
__has_attribute(ns_returns_retained)
, etc.
Objective-C @available¶
It is possible to use the newest SDK but still build a program that can run on
older versions of macOS and iOS by passing -mmacosx-version-min=
/
-miphoneos-version-min=
.
Before LLVM 5.0, when calling a function that exists only in the OS that’s
newer than the target OS (as determined by the minimum deployment version),
programmers had to carefully check if the function exists at runtime, using
null checks for weakly-linked C functions, +class
for Objective-C classes,
and -respondsToSelector:
or +instancesRespondToSelector:
for
Objective-C methods. If such a check was missed, the program would compile
fine, run fine on newer systems, but crash on older systems.
As of LLVM 5.0, -Wunguarded-availability
uses the availability attributes together
with the new @available()
keyword to assist with this issue.
When a method that’s introduced in the OS newer than the target OS is called, a
-Wunguarded-availability warning is emitted if that call is not guarded:
void my_fun(NSSomeClass* var) {
// If fancyNewMethod was added in e.g. macOS 10.12, but the code is
// built with -mmacosx-version-min=10.11, then this unconditional call
// will emit a -Wunguarded-availability warning:
[var fancyNewMethod];
}
To fix the warning and to avoid the crash on macOS 10.11, wrap it in
if(@available())
:
void my_fun(NSSomeClass* var) {
if (@available(macOS 10.12, *)) {
[var fancyNewMethod];
} else {
// Put fallback behavior for old macOS versions (and for non-mac
// platforms) here.
}
}
The *
is required and means that platforms not explicitly listed will take
the true branch, and the compiler will emit -Wunguarded-availability
warnings for unlisted platforms based on those platform’s deployment target.
More than one platform can be listed in @available()
:
void my_fun(NSSomeClass* var) {
if (@available(macOS 10.12, iOS 10, *)) {
[var fancyNewMethod];
}
}
If the caller of my_fun()
already checks that my_fun()
is only called
on 10.12, then add an availability attribute to it,
which will also suppress the warning and require that calls to my_fun() are
checked:
API_AVAILABLE(macos(10.12)) void my_fun(NSSomeClass* var) {
[var fancyNewMethod]; // Now ok.
}
@available()
is only available in Objective-C code. To use the feature
in C and C++ code, use the __builtin_available()
spelling instead.
If existing code uses null checks or -respondsToSelector:
, it should
be changed to use @available()
(or __builtin_available
) instead.
-Wunguarded-availability
is disabled by default, but
-Wunguarded-availability-new
, which only emits this warning for APIs
that have been introduced in macOS >= 10.13, iOS >= 11, watchOS >= 4 and
tvOS >= 11, is enabled by default.
Objective-C++ ABI: protocol-qualifier mangling of parameters¶
Starting with LLVM 3.4, Clang produces a new mangling for parameters whose
type is a qualified-id
(e.g., id<Foo>
). This mangling allows such
parameters to be differentiated from those with the regular unqualified id
type.
This was a non-backward compatible mangling change to the ABI. This change allows proper overloading, and also prevents mangling conflicts with template parameters of protocol-qualified type.
Query the presence of this new mangling with
__has_feature(objc_protocol_qualifier_mangling)
.
Initializer lists for complex numbers in C¶
clang supports an extension which allows the following in C:
#include <math.h>
#include <complex.h>
complex float x = { 1.0f, INFINITY }; // Init to (1, Inf)
This construct is useful because there is no way to separately initialize the
real and imaginary parts of a complex variable in standard C, given that clang
does not support _Imaginary
. (Clang also supports the __real__
and
__imag__
extensions from gcc, which help in some cases, but are not usable
in static initializers.)
Note that this extension does not allow eliding the braces; the meaning of the following two lines is different:
complex float x[] = { { 1.0f, 1.0f } }; // [0] = (1, 1)
complex float x[] = { 1.0f, 1.0f }; // [0] = (1, 0), [1] = (1, 0)
This extension also works in C++ mode, as far as that goes, but does not apply
to the C++ std::complex
. (In C++11, list initialization allows the same
syntax to be used with std::complex
with the same meaning.)
Builtin Functions¶
Clang supports a number of builtin library functions with the same syntax as
GCC, including things like __builtin_nan
, __builtin_constant_p
,
__builtin_choose_expr
, __builtin_types_compatible_p
,
__builtin_assume_aligned
, __sync_fetch_and_add
, etc. In addition to
the GCC builtins, Clang supports a number of builtins that GCC does not, which
are listed here.
Please note that Clang does not and will not support all of the GCC builtins
for vector operations. Instead of using builtins, you should use the functions
defined in target-specific header files like <xmmintrin.h>
, which define
portable wrappers for these. Many of the Clang versions of these functions are
implemented directly in terms of extended vector support instead of builtins, in order to reduce the number of
builtins that we need to implement.
__builtin_assume
¶
__builtin_assume
is used to provide the optimizer with a boolean
invariant that is defined to be true.
Syntax:
__builtin_assume(bool)
Example of Use:
int foo(int x) {
__builtin_assume(x != 0);
// The optimizer may short-circuit this check using the invariant.
if (x == 0)
return do_something();
return do_something_else();
}
Description:
The boolean argument to this function is defined to be true. The optimizer may analyze the form of the expression provided as the argument and deduce from that information used to optimize the program. If the condition is violated during execution, the behavior is undefined. The argument itself is never evaluated, so any side effects of the expression will be discarded.
Query for this feature with __has_builtin(__builtin_assume)
.
__builtin_readcyclecounter
¶
__builtin_readcyclecounter
is used to access the cycle counter register (or
a similar low-latency, high-accuracy clock) on those targets that support it.
Syntax:
__builtin_readcyclecounter()
Example of Use:
unsigned long long t0 = __builtin_readcyclecounter();
do_something();
unsigned long long t1 = __builtin_readcyclecounter();
unsigned long long cycles_to_do_something = t1 - t0; // assuming no overflow
Description:
The __builtin_readcyclecounter()
builtin returns the cycle counter value,
which may be either global or process/thread-specific depending on the target.
As the backing counters often overflow quickly (on the order of seconds) this
should only be used for timing small intervals. When not supported by the
target, the return value is always zero. This builtin takes no arguments and
produces an unsigned long long result.
Query for this feature with __has_builtin(__builtin_readcyclecounter)
. Note
that even if present, its use may depend on run-time privilege or other OS
controlled state.
__builtin_shufflevector
¶
__builtin_shufflevector
is used to express generic vector
permutation/shuffle/swizzle operations. This builtin is also very important
for the implementation of various target-specific header files like
<xmmintrin.h>
.
Syntax:
__builtin_shufflevector(vec1, vec2, index1, index2, ...)
Examples:
// identity operation - return 4-element vector v1.
__builtin_shufflevector(v1, v1, 0, 1, 2, 3)
// "Splat" element 0 of V1 into a 4-element result.
__builtin_shufflevector(V1, V1, 0, 0, 0, 0)
// Reverse 4-element vector V1.
__builtin_shufflevector(V1, V1, 3, 2, 1, 0)
// Concatenate every other element of 4-element vectors V1 and V2.
__builtin_shufflevector(V1, V2, 0, 2, 4, 6)
// Concatenate every other element of 8-element vectors V1 and V2.
__builtin_shufflevector(V1, V2, 0, 2, 4, 6, 8, 10, 12, 14)
// Shuffle v1 with some elements being undefined
__builtin_shufflevector(v1, v1, 3, -1, 1, -1)
Description:
The first two arguments to __builtin_shufflevector
are vectors that have
the same element type. The remaining arguments are a list of integers that
specify the elements indices of the first two vectors that should be extracted
and returned in a new vector. These element indices are numbered sequentially
starting with the first vector, continuing into the second vector. Thus, if
vec1
is a 4-element vector, index 5 would refer to the second element of
vec2
. An index of -1 can be used to indicate that the corresponding element
in the returned vector is a don’t care and can be optimized by the backend.
The result of __builtin_shufflevector
is a vector with the same element
type as vec1
/vec2
but that has an element count equal to the number of
indices specified.
Query for this feature with __has_builtin(__builtin_shufflevector)
.
__builtin_convertvector
¶
__builtin_convertvector
is used to express generic vector
type-conversion operations. The input vector and the output vector
type must have the same number of elements.
Syntax:
__builtin_convertvector(src_vec, dst_vec_type)
Examples:
typedef double vector4double __attribute__((__vector_size__(32)));
typedef float vector4float __attribute__((__vector_size__(16)));
typedef short vector4short __attribute__((__vector_size__(8)));
vector4float vf; vector4short vs;
// convert from a vector of 4 floats to a vector of 4 doubles.
__builtin_convertvector(vf, vector4double)
// equivalent to:
(vector4double) { (double) vf[0], (double) vf[1], (double) vf[2], (double) vf[3] }
// convert from a vector of 4 shorts to a vector of 4 floats.
__builtin_convertvector(vs, vector4float)
// equivalent to:
(vector4float) { (float) vs[0], (float) vs[1], (float) vs[2], (float) vs[3] }
Description:
The first argument to __builtin_convertvector
is a vector, and the second
argument is a vector type with the same number of elements as the first
argument.
The result of __builtin_convertvector
is a vector with the same element
type as the second argument, with a value defined in terms of the action of a
C-style cast applied to each element of the first argument.
Query for this feature with __has_builtin(__builtin_convertvector)
.
__builtin_bitreverse
¶
__builtin_bitreverse8
__builtin_bitreverse16
__builtin_bitreverse32
__builtin_bitreverse64
Syntax:
__builtin_bitreverse32(x)
Examples:
uint8_t rev_x = __builtin_bitreverse8(x);
uint16_t rev_x = __builtin_bitreverse16(x);
uint32_t rev_y = __builtin_bitreverse32(y);
uint64_t rev_z = __builtin_bitreverse64(z);
Description:
The ‘__builtin_bitreverse
’ family of builtins is used to reverse
the bitpattern of an integer value; for example 0b10110110
becomes
0b01101101
.
__builtin_unreachable
¶
__builtin_unreachable
is used to indicate that a specific point in the
program cannot be reached, even if the compiler might otherwise think it can.
This is useful to improve optimization and eliminates certain warnings. For
example, without the __builtin_unreachable
in the example below, the
compiler assumes that the inline asm can fall through and prints a “function
declared ‘noreturn
’ should not return” warning.
Syntax:
__builtin_unreachable()
Example of use:
void myabort(void) __attribute__((noreturn));
void myabort(void) {
asm("int3");
__builtin_unreachable();
}
Description:
The __builtin_unreachable()
builtin has completely undefined behavior.
Since it has undefined behavior, it is a statement that it is never reached and
the optimizer can take advantage of this to produce better code. This builtin
takes no arguments and produces a void result.
Query for this feature with __has_builtin(__builtin_unreachable)
.
__builtin_unpredictable
¶
__builtin_unpredictable
is used to indicate that a branch condition is
unpredictable by hardware mechanisms such as branch prediction logic.
Syntax:
__builtin_unpredictable(long long)
Example of use:
if (__builtin_unpredictable(x > 0)) {
foo();
}
Description:
The __builtin_unpredictable()
builtin is expected to be used with control
flow conditions such as in if
and switch
statements.
Query for this feature with __has_builtin(__builtin_unpredictable)
.
__sync_swap
¶
__sync_swap
is used to atomically swap integers or pointers in memory.
Syntax:
type __sync_swap(type *ptr, type value, ...)
Example of Use:
int old_value = __sync_swap(&value, new_value);
Description:
The __sync_swap()
builtin extends the existing __sync_*()
family of
atomic intrinsics to allow code to atomically swap the current value with the
new value. More importantly, it helps developers write more efficient and
correct code by avoiding expensive loops around
__sync_bool_compare_and_swap()
or relying on the platform specific
implementation details of __sync_lock_test_and_set()
. The
__sync_swap()
builtin is a full barrier.
__builtin_addressof
¶
__builtin_addressof
performs the functionality of the built-in &
operator, ignoring any operator&
overload. This is useful in constant
expressions in C++11, where there is no other way to take the address of an
object that overloads operator&
.
Example of use:
template<typename T> constexpr T *addressof(T &value) {
return __builtin_addressof(value);
}
__builtin_operator_new
and __builtin_operator_delete
¶
__builtin_operator_new
allocates memory just like a non-placement non-class
new-expression. This is exactly like directly calling the normal
non-placement ::operator new
, except that it allows certain optimizations
that the C++ standard does not permit for a direct function call to
::operator new
(in particular, removing new
/ delete
pairs and
merging allocations).
Likewise, __builtin_operator_delete
deallocates memory just like a
non-class delete-expression, and is exactly like directly calling the normal
::operator delete
, except that it permits optimizations. Only the unsized
form of __builtin_operator_delete
is currently available.
These builtins are intended for use in the implementation of std::allocator
and other similar allocation libraries, and are only available in C++.
Multiprecision Arithmetic Builtins¶
Clang provides a set of builtins which expose multiprecision arithmetic in a manner amenable to C. They all have the following form:
unsigned x = ..., y = ..., carryin = ..., carryout;
unsigned sum = __builtin_addc(x, y, carryin, &carryout);
Thus one can form a multiprecision addition chain in the following manner:
unsigned *x, *y, *z, carryin=0, carryout;
z[0] = __builtin_addc(x[0], y[0], carryin, &carryout);
carryin = carryout;
z[1] = __builtin_addc(x[1], y[1], carryin, &carryout);
carryin = carryout;
z[2] = __builtin_addc(x[2], y[2], carryin, &carryout);
carryin = carryout;
z[3] = __builtin_addc(x[3], y[3], carryin, &carryout);
The complete list of builtins are:
unsigned char __builtin_addcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
unsigned short __builtin_addcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
unsigned __builtin_addc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
unsigned long __builtin_addcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
unsigned long long __builtin_addcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
unsigned char __builtin_subcb (unsigned char x, unsigned char y, unsigned char carryin, unsigned char *carryout);
unsigned short __builtin_subcs (unsigned short x, unsigned short y, unsigned short carryin, unsigned short *carryout);
unsigned __builtin_subc (unsigned x, unsigned y, unsigned carryin, unsigned *carryout);
unsigned long __builtin_subcl (unsigned long x, unsigned long y, unsigned long carryin, unsigned long *carryout);
unsigned long long __builtin_subcll(unsigned long long x, unsigned long long y, unsigned long long carryin, unsigned long long *carryout);
Checked Arithmetic Builtins¶
Clang provides a set of builtins that implement checked arithmetic for security critical applications in a manner that is fast and easily expressable in C. As an example of their usage:
errorcode_t security_critical_application(...) {
unsigned x, y, result;
...
if (__builtin_mul_overflow(x, y, &result))
return kErrorCodeHackers;
...
use_multiply(result);
...
}
Clang provides the following checked arithmetic builtins:
bool __builtin_add_overflow (type1 x, type2 y, type3 *sum);
bool __builtin_sub_overflow (type1 x, type2 y, type3 *diff);
bool __builtin_mul_overflow (type1 x, type2 y, type3 *prod);
bool __builtin_uadd_overflow (unsigned x, unsigned y, unsigned *sum);
bool __builtin_uaddl_overflow (unsigned long x, unsigned long y, unsigned long *sum);
bool __builtin_uaddll_overflow(unsigned long long x, unsigned long long y, unsigned long long *sum);
bool __builtin_usub_overflow (unsigned x, unsigned y, unsigned *diff);
bool __builtin_usubl_overflow (unsigned long x, unsigned long y, unsigned long *diff);
bool __builtin_usubll_overflow(unsigned long long x, unsigned long long y, unsigned long long *diff);
bool __builtin_umul_overflow (unsigned x, unsigned y, unsigned *prod);
bool __builtin_umull_overflow (unsigned long x, unsigned long y, unsigned long *prod);
bool __builtin_umulll_overflow(unsigned long long x, unsigned long long y, unsigned long long *prod);
bool __builtin_sadd_overflow (int x, int y, int *sum);
bool __builtin_saddl_overflow (long x, long y, long *sum);
bool __builtin_saddll_overflow(long long x, long long y, long long *sum);
bool __builtin_ssub_overflow (int x, int y, int *diff);
bool __builtin_ssubl_overflow (long x, long y, long *diff);
bool __builtin_ssubll_overflow(long long x, long long y, long long *diff);
bool __builtin_smul_overflow (int x, int y, int *prod);
bool __builtin_smull_overflow (long x, long y, long *prod);
bool __builtin_smulll_overflow(long long x, long long y, long long *prod);
Each builtin performs the specified mathematical operation on the first two arguments and stores the result in the third argument. If possible, the result will be equal to mathematically-correct result and the builtin will return 0. Otherwise, the builtin will return 1 and the result will be equal to the unique value that is equivalent to the mathematically-correct result modulo two raised to the k power, where k is the number of bits in the result type. The behavior of these builtins is well-defined for all argument values.
The first three builtins work generically for operands of any integer type, including boolean types. The operands need not have the same type as each other, or as the result. The other builtins may implicitly promote or convert their operands before performing the operation.
Query for this feature with __has_builtin(__builtin_add_overflow)
, etc.
Floating point builtins¶
__builtin_canonicalize
¶
double __builtin_canonicalize(double);
float __builtin_canonicalizef(float);
long double__builtin_canonicalizel(long double);
Returns the platform specific canonical encoding of a floating point number. This canonicalization is useful for implementing certain numeric primitives such as frexp. See LLVM canonicalize intrinsic for more information on the semantics.
String builtins¶
Clang provides constant expression evaluation support for builtins forms of
the following functions from the C standard library <string.h>
header:
memchr
memcmp
strchr
strcmp
strlen
strncmp
wcschr
wcscmp
wcslen
wcsncmp
wmemchr
wmemcmp
In each case, the builtin form has the name of the C library function prefixed
by __builtin_
. Example:
void *p = __builtin_memchr("foobar", 'b', 5);
In addition to the above, one further builtin is provided:
char *__builtin_char_memchr(const char *haystack, int needle, size_t size);
__builtin_char_memchr(a, b, c)
is identical to
(char*)__builtin_memchr(a, b, c)
except that its use is permitted within
constant expressions in C++11 onwards (where a cast from void*
to char*
is disallowed in general).
Support for constant expression evaluation for the above builtins be detected
with __has_feature(cxx_constexpr_string_builtins)
.
Atomic Min/Max builtins with memory ordering¶
There are two atomic builtins with min/max in-memory comparison and swap. The syntax and semantics are similar to GCC-compatible __atomic_* builtins.
__atomic_fetch_min
__atomic_fetch_max
The builtins work with signed and unsigned integers and require to specify memory ordering. The return value is the original value that was stored in memory before comparison.
Example:
unsigned int val = __atomic_fetch_min(unsigned int *pi, unsigned int ui, __ATOMIC_RELAXED);
The third argument is one of the memory ordering specifiers __ATOMIC_RELAXED
,
__ATOMIC_CONSUME
, __ATOMIC_ACQUIRE
, __ATOMIC_RELEASE
,
__ATOMIC_ACQ_REL
, or __ATOMIC_SEQ_CST
following C++11 memory model semantics.
In terms or aquire-release ordering barriers these two operations are always considered as operations with load-store semantics, even when the original value is not actually modified after comparison.
__c11_atomic builtins¶
Clang provides a set of builtins which are intended to be used to implement
C11’s <stdatomic.h>
header. These builtins provide the semantics of the
_explicit
form of the corresponding C11 operation, and are named with a
__c11_
prefix. The supported operations, and the differences from
the corresponding C11 operations, are:
__c11_atomic_init
__c11_atomic_thread_fence
__c11_atomic_signal_fence
__c11_atomic_is_lock_free
(The argument is the size of the_Atomic(...)
object, instead of its address)__c11_atomic_store
__c11_atomic_load
__c11_atomic_exchange
__c11_atomic_compare_exchange_strong
__c11_atomic_compare_exchange_weak
__c11_atomic_fetch_add
__c11_atomic_fetch_sub
__c11_atomic_fetch_and
__c11_atomic_fetch_or
__c11_atomic_fetch_xor
The macros __ATOMIC_RELAXED
, __ATOMIC_CONSUME
, __ATOMIC_ACQUIRE
,
__ATOMIC_RELEASE
, __ATOMIC_ACQ_REL
, and __ATOMIC_SEQ_CST
are
provided, with values corresponding to the enumerators of C11’s
memory_order
enumeration.
(Note that Clang additionally provides GCC-compatible __atomic_*
builtins and OpenCL 2.0 __opencl_atomic_*
builtins. The OpenCL 2.0
atomic builtins are an explicit form of the corresponding OpenCL 2.0
builtin function, and are named with a __opencl_
prefix. The macros
__OPENCL_MEMORY_SCOPE_WORK_ITEM
, __OPENCL_MEMORY_SCOPE_WORK_GROUP
,
__OPENCL_MEMORY_SCOPE_DEVICE
, __OPENCL_MEMORY_SCOPE_ALL_SVM_DEVICES
,
and __OPENCL_MEMORY_SCOPE_SUB_GROUP
are provided, with values
corresponding to the enumerators of OpenCL’s memory_scope
enumeration.)
Low-level ARM exclusive memory builtins¶
Clang provides overloaded builtins giving direct access to the three key ARM instructions for implementing atomic operations.
T __builtin_arm_ldrex(const volatile T *addr);
T __builtin_arm_ldaex(const volatile T *addr);
int __builtin_arm_strex(T val, volatile T *addr);
int __builtin_arm_stlex(T val, volatile T *addr);
void __builtin_arm_clrex(void);
The types T
currently supported are:
- Integer types with width at most 64 bits (or 128 bits on AArch64).
- Floating-point types
- Pointer types.
Note that the compiler does not guarantee it will not insert stores which clear
the exclusive monitor in between an ldrex
type operation and its paired
strex
. In practice this is only usually a risk when the extra store is on
the same cache line as the variable being modified and Clang will only insert
stack stores on its own, so it is best not to use these operations on variables
with automatic storage duration.
Also, loads and stores may be implicit in code written between the ldrex
and
strex
. Clang will not necessarily mitigate the effects of these either, so
care should be exercised.
For these reasons the higher level atomic primitives should be preferred where possible.
Non-temporal load/store builtins¶
Clang provides overloaded builtins allowing generation of non-temporal memory accesses.
T __builtin_nontemporal_load(T *addr);
void __builtin_nontemporal_store(T value, T *addr);
The types T
currently supported are:
- Integer types.
- Floating-point types.
- Vector types.
Note that the compiler does not guarantee that non-temporal loads or stores will be used.
C++ Coroutines support builtins¶
Warning
This is a work in progress. Compatibility across Clang/LLVM releases is not guaranteed.
Clang provides experimental builtins to support C++ Coroutines as defined by http://wg21.link/P0057. The following four are intended to be used by the standard library to implement std::experimental::coroutine_handle type.
Syntax:
void __builtin_coro_resume(void *addr);
void __builtin_coro_destroy(void *addr);
bool __builtin_coro_done(void *addr);
void *__builtin_coro_promise(void *addr, int alignment, bool from_promise)
Example of use:
template <> struct coroutine_handle<void> {
void resume() const { __builtin_coro_resume(ptr); }
void destroy() const { __builtin_coro_destroy(ptr); }
bool done() const { return __builtin_coro_done(ptr); }
// ...
protected:
void *ptr;
};
template <typename Promise> struct coroutine_handle : coroutine_handle<> {
// ...
Promise &promise() const {
return *reinterpret_cast<Promise *>(
__builtin_coro_promise(ptr, alignof(Promise), /*from-promise=*/false));
}
static coroutine_handle from_promise(Promise &promise) {
coroutine_handle p;
p.ptr = __builtin_coro_promise(&promise, alignof(Promise),
/*from-promise=*/true);
return p;
}
};
Other coroutine builtins are either for internal clang use or for use during development of the coroutine feature. See Coroutines in LLVM for more information on their semantics. Note that builtins matching the intrinsics that take token as the first parameter (llvm.coro.begin, llvm.coro.alloc, llvm.coro.free and llvm.coro.suspend) omit the token parameter and fill it to an appropriate value during the emission.
Syntax:
size_t __builtin_coro_size()
void *__builtin_coro_frame()
void *__builtin_coro_free(void *coro_frame)
void *__builtin_coro_id(int align, void *promise, void *fnaddr, void *parts)
bool __builtin_coro_alloc()
void *__builtin_coro_begin(void *memory)
void __builtin_coro_end(void *coro_frame, bool unwind)
char __builtin_coro_suspend(bool final)
bool __builtin_coro_param(void *original, void *copy)
Note that there is no builtin matching the llvm.coro.save intrinsic. LLVM automatically will insert one if the first argument to llvm.coro.suspend is token none. If a user calls __builin_suspend, clang will insert token none as the first argument to the intrinsic.
Non-standard C++11 Attributes¶
Clang’s non-standard C++11 attributes live in the clang
attribute
namespace.
Clang supports GCC’s gnu
attribute namespace. All GCC attributes which
are accepted with the __attribute__((foo))
syntax are also accepted as
[[gnu::foo]]
. This only extends to attributes which are specified by GCC
(see the list of GCC function attributes, GCC variable
attributes, and
GCC type attributes). As with the GCC
implementation, these attributes must appertain to the declarator-id in a
declaration, which means they must go either at the start of the declaration or
immediately after the name being declared.
For example, this applies the GNU unused
attribute to a
and f
, and
also applies the GNU noreturn
attribute to f
.
[[gnu::unused]] int a, f [[gnu::noreturn]] ();
Target-Specific Extensions¶
Clang supports some language features conditionally on some targets.
ARM/AArch64 Language Extensions¶
Memory Barrier Intrinsics¶
Clang implements the __dmb
, __dsb
and __isb
intrinsics as defined
in the ARM C Language Extensions Release 2.0.
Note that these intrinsics are implemented as motion barriers that block
reordering of memory accesses and side effect instructions. Other instructions
like simple arithmetic may be reordered around the intrinsic. If you expect to
have no reordering at all, use inline assembly instead.
X86/X86-64 Language Extensions¶
The X86 backend has these language extensions:
Memory references to specified segments¶
Annotating a pointer with address space #256 causes it to be code generated relative to the X86 GS segment register, address space #257 causes it to be relative to the X86 FS segment, and address space #258 causes it to be relative to the X86 SS segment. Note that this is a very very low-level feature that should only be used if you know what you’re doing (for example in an OS kernel).
Here is an example:
#define GS_RELATIVE __attribute__((address_space(256)))
int foo(int GS_RELATIVE *P) {
return *P;
}
Which compiles to (on X86-32):
_foo:
movl 4(%esp), %eax
movl %gs:(%eax), %eax
ret
Extensions for Static Analysis¶
Clang supports additional attributes that are useful for documenting program invariants and rules for static analysis tools, such as the Clang Static Analyzer. These attributes are documented in the analyzer’s list of source-level annotations.
Extensions for Dynamic Analysis¶
Use __has_feature(address_sanitizer)
to check if the code is being built
with AddressSanitizer.
Use __has_feature(thread_sanitizer)
to check if the code is being built
with ThreadSanitizer.
Use __has_feature(memory_sanitizer)
to check if the code is being built
with MemorySanitizer.
Use __has_feature(safe_stack)
to check if the code is being built
with SafeStack.
Extensions for selectively disabling optimization¶
Clang provides a mechanism for selectively disabling optimizations in functions and methods.
To disable optimizations in a single function definition, the GNU-style or C++11
non-standard attribute optnone
can be used.
// The following functions will not be optimized.
// GNU-style attribute
__attribute__((optnone)) int foo() {
// ... code
}
// C++11 attribute
[[clang::optnone]] int bar() {
// ... code
}
To facilitate disabling optimization for a range of function definitions, a
range-based pragma is provided. Its syntax is #pragma clang optimize
followed by off
or on
.
All function definitions in the region between an off
and the following
on
will be decorated with the optnone
attribute unless doing so would
conflict with explicit attributes already present on the function (e.g. the
ones that control inlining).
#pragma clang optimize off
// This function will be decorated with optnone.
int foo() {
// ... code
}
// optnone conflicts with always_inline, so bar() will not be decorated.
__attribute__((always_inline)) int bar() {
// ... code
}
#pragma clang optimize on
If no on
is found to close an off
region, the end of the region is the
end of the compilation unit.
Note that a stray #pragma clang optimize on
does not selectively enable
additional optimizations when compiling at low optimization levels. This feature
can only be used to selectively disable optimizations.
The pragma has an effect on functions only at the point of their definition; for function templates, this means that the state of the pragma at the point of an instantiation is not necessarily relevant. Consider the following example:
template<typename T> T twice(T t) {
return 2 * t;
}
#pragma clang optimize off
template<typename T> T thrice(T t) {
return 3 * t;
}
int container(int a, int b) {
return twice(a) + thrice(b);
}
#pragma clang optimize on
In this example, the definition of the template function twice
is outside
the pragma region, whereas the definition of thrice
is inside the region.
The container
function is also in the region and will not be optimized, but
it causes the instantiation of twice
and thrice
with an int
type; of
these two instantiations, twice
will be optimized (because its definition
was outside the region) and thrice
will not be optimized.
Extensions for loop hint optimizations¶
The #pragma clang loop
directive is used to specify hints for optimizing the
subsequent for, while, do-while, or c++11 range-based for loop. The directive
provides options for vectorization, interleaving, unrolling and
distribution. Loop hints can be specified before any loop and will be ignored if
the optimization is not safe to apply.
Vectorization and Interleaving¶
A vectorized loop performs multiple iterations of the original loop in parallel using vector instructions. The instruction set of the target processor determines which vector instructions are available and their vector widths. This restricts the types of loops that can be vectorized. The vectorizer automatically determines if the loop is safe and profitable to vectorize. A vector instruction cost model is used to select the vector width.
Interleaving multiple loop iterations allows modern processors to further improve instruction-level parallelism (ILP) using advanced hardware features, such as multiple execution units and out-of-order execution. The vectorizer uses a cost model that depends on the register pressure and generated code size to select the interleaving count.
Vectorization is enabled by vectorize(enable)
and interleaving is enabled
by interleave(enable)
. This is useful when compiling with -Os
to
manually enable vectorization or interleaving.
#pragma clang loop vectorize(enable)
#pragma clang loop interleave(enable)
for(...) {
...
}
The vector width is specified by vectorize_width(_value_)
and the interleave
count is specified by interleave_count(_value_)
, where
_value_ is a positive integer. This is useful for specifying the optimal
width/count of the set of target architectures supported by your application.
#pragma clang loop vectorize_width(2)
#pragma clang loop interleave_count(2)
for(...) {
...
}
Specifying a width/count of 1 disables the optimization, and is equivalent to
vectorize(disable)
or interleave(disable)
.
Loop Unrolling¶
Unrolling a loop reduces the loop control overhead and exposes more opportunities for ILP. Loops can be fully or partially unrolled. Full unrolling eliminates the loop and replaces it with an enumerated sequence of loop iterations. Full unrolling is only possible if the loop trip count is known at compile time. Partial unrolling replicates the loop body within the loop and reduces the trip count.
If unroll(enable)
is specified the unroller will attempt to fully unroll the
loop if the trip count is known at compile time. If the fully unrolled code size
is greater than an internal limit the loop will be partially unrolled up to this
limit. If the trip count is not known at compile time the loop will be partially
unrolled with a heuristically chosen unroll factor.
#pragma clang loop unroll(enable)
for(...) {
...
}
If unroll(full)
is specified the unroller will attempt to fully unroll the
loop if the trip count is known at compile time identically to
unroll(enable)
. However, with unroll(full)
the loop will not be unrolled
if the loop count is not known at compile time.
#pragma clang loop unroll(full)
for(...) {
...
}
The unroll count can be specified explicitly with unroll_count(_value_)
where
_value_ is a positive integer. If this value is greater than the trip count the
loop will be fully unrolled. Otherwise the loop is partially unrolled subject
to the same code size limit as with unroll(enable)
.
#pragma clang loop unroll_count(8)
for(...) {
...
}
Unrolling of a loop can be prevented by specifying unroll(disable)
.
Loop Distribution¶
Loop Distribution allows splitting a loop into multiple loops. This is beneficial for example when the entire loop cannot be vectorized but some of the resulting loops can.
If distribute(enable))
is specified and the loop has memory dependencies
that inhibit vectorization, the compiler will attempt to isolate the offending
operations into a new loop. This optimization is not enabled by default, only
loops marked with the pragma are considered.
#pragma clang loop distribute(enable)
for (i = 0; i < N; ++i) {
S1: A[i + 1] = A[i] + B[i];
S2: C[i] = D[i] * E[i];
}
This loop will be split into two loops between statements S1 and S2. The second loop containing S2 will be vectorized.
Loop Distribution is currently not enabled by default in the optimizer because it can hurt performance in some cases. For example, instruction-level parallelism could be reduced by sequentializing the execution of the statements S1 and S2 above.
If Loop Distribution is turned on globally with
-mllvm -enable-loop-distribution
, specifying distribute(disable)
can
be used the disable it on a per-loop basis.
Additional Information¶
For convenience multiple loop hints can be specified on a single line.
#pragma clang loop vectorize_width(4) interleave_count(8)
for(...) {
...
}
If an optimization cannot be applied any hints that apply to it will be ignored.
For example, the hint vectorize_width(4)
is ignored if the loop is not
proven safe to vectorize. To identify and diagnose optimization issues use
-Rpass, -Rpass-missed, and -Rpass-analysis command line options. See the
user guide for details.
Extensions to specify floating-point flags¶
The #pragma clang fp
pragma allows floating-point options to be specified
for a section of the source code. This pragma can only appear at file scope or
at the start of a compound statement (excluding comments). When using within a
compound statement, the pragma is active within the scope of the compound
statement.
Currently, only FP contraction can be controlled with the pragma. #pragma
clang fp contract
specifies whether the compiler should contract a multiply
and an addition (or subtraction) into a fused FMA operation when supported by
the target.
The pragma can take three values: on
, fast
and off
. The on
option is identical to using #pragma STDC FP_CONTRACT(ON)
and it allows
fusion as specified the language standard. The fast
option allows fusiong
in cases when the language standard does not make this possible (e.g. across
statements in C)
for(...) {
#pragma clang fp contract(fast)
a = b[i] * c[i];
d[i] += a;
}
The pragma can also be used with off
which turns FP contraction off for a
section of the code. This can be useful when fast contraction is otherwise
enabled for the translation unit with the -ffp-contract=fast
flag.
Specifying an attribute for multiple declarations (#pragma clang attribute)¶
The #pragma clang attribute
directive can be used to apply an attribute to
multiple declarations. The #pragma clang attribute push
variation of the
directive pushes a new attribute to the attribute stack. The declarations that
follow the pragma receive the attributes that are on the attribute stack, until
the stack is cleared using a #pragma clang attribute pop
directive. Multiple
push directives can be nested inside each other.
The attributes that are used in the #pragma clang attribute
directives
can be written using the GNU-style syntax:
#pragma clang attribute push(__attribute__((annotate("custom"))), apply_to = function)
void function(); // The function now has the annotate("custom") attribute
#pragma clang attribute pop
The attributes can also be written using the C++11 style syntax:
#pragma clang attribute push([[noreturn]], apply_to = function)
void function(); // The function now has the [[noreturn]] attribute
#pragma clang attribute pop
The __declspec
style syntax is also supported:
#pragma clang attribute push(__declspec(dllexport), apply_to = function)
void function(); // The function now has the __declspec(dllexport) attribute
#pragma clang attribute pop
A single push directive accepts only one attribute regardless of the syntax used.
Subject Match Rules¶
The set of declarations that receive a single attribute from the attribute stack
depends on the subject match rules that were specified in the pragma. Subject
match rules are specified after the attribute. The compiler expects an
identifier that corresponds to the subject set specifier. The apply_to
specifier is currently the only supported subject set specifier. It allows you
to specify match rules that form a subset of the attribute’s allowed subject
set, i.e. the compiler doesn’t require all of the attribute’s subjects. For
example, an attribute like [[nodiscard]]
whose subject set includes
enum
, record
and hasType(functionType)
, requires the presence of at
least one of these rules after apply_to
:
#pragma clang attribute push([[nodiscard]], apply_to = enum)
enum Enum1 { A1, B1 }; // The enum will receive [[nodiscard]]
struct Record1 { }; // The struct will *not* receive [[nodiscard]]
#pragma clang attribute pop
#pragma clang attribute push([[nodiscard]], apply_to = any(record, enum))
enum Enum2 { A2, B2 }; // The enum will receive [[nodiscard]]
struct Record2 { }; // The struct *will* receive [[nodiscard]]
#pragma clang attribute pop
// This is an error, since [[nodiscard]] can't be applied to namespaces:
#pragma clang attribute push([[nodiscard]], apply_to = any(record, namespace))
#pragma clang attribute pop
Multiple match rules can be specified using the any
match rule, as shown
in the example above. The any
rule applies attributes to all declarations
that are matched by at least one of the rules in the any
. It doesn’t nest
and can’t be used inside the other match rules. Redundant match rules or rules
that conflict with one another should not be used inside of any
.
Clang supports the following match rules:
function
: Can be used to apply attributes to functions. This includes C++ member functions, static functions, operators, and constructors/destructors.function(is_member)
: Can be used to apply attributes to C++ member functions. This includes members like static functions, operators, and constructors/destructors.hasType(functionType)
: Can be used to apply attributes to functions, C++ member functions, and variables/fields whose type is a function pointer. It does not apply attributes to Objective-C methods or blocks.type_alias
: Can be used to apply attributes totypedef
declarations and C++11 type aliases.record
: Can be used to apply attributes tostruct
,class
, andunion
declarations.record(unless(is_union))
: Can be used to apply attributes only tostruct
andclass
declarations.enum
: Can be be used to apply attributes to enumeration declarations.enum_constant
: Can be used to apply attributes to enumerators.variable
: Can be used to apply attributes to variables, including local variables, parameters, global variables, and static member variables. It does not apply attributes to instance member variables or Objective-C ivars.variable(is_thread_local)
: Can be used to apply attributes to thread-local variables only.variable(is_global)
: Can be used to apply attributes to global variables only.variable(is_parameter)
: Can be used to apply attributes to parameters only.variable(unless(is_parameter))
: Can be used to apply attributes to all the variables that are not parameters.field
: Can be used to apply attributes to non-static member variables in a record. This includes Objective-C ivars.namespace
: Can be used to apply attributes tonamespace
declarations.objc_interface
: Can be used to apply attributes to@interface
declarations.objc_protocol
: Can be used to apply attributes to@protocol
declarations.objc_category
: Can be used to apply attributes to category declarations, including class extensions.objc_method
: Can be used to apply attributes to Objective-C methods, including instance and class methods. Implicit methods like implicit property getters and setters do not receive the attribute.objc_method(is_instance)
: Can be used to apply attributes to Objective-C instance methods.objc_property
: Can be used to apply attributes to@property
declarations.block
: Can be used to apply attributes to block declarations. This does not include variables/fields of block pointer type.
The use of unless
in match rules is currently restricted to a strict set of
sub-rules that are used by the supported attributes. That means that even though
variable(unless(is_parameter))
is a valid match rule,
variable(unless(is_thread_local))
is not.
Supported Attributes¶
Not all attributes can be used with the #pragma clang attribute
directive.
Notably, statement attributes like [[fallthrough]]
or type attributes
like address_space
aren’t supported by this directive. You can determine
whether or not an attribute is supported by the pragma by referring to the
individual documentation for that attribute.
The attributes are applied to all matching declarations individually, even when the attribute is semantically incorrect. The attributes that aren’t applied to any declaration are not verified semantically.
Specifying section names for global objects (#pragma clang section)¶
The #pragma clang section
directive provides a means to assign section-names
to global variables, functions and static variables.
The section names can be specified as:
#pragma clang section bss="myBSS" data="myData" rodata="myRodata" text="myText"
The section names can be reverted back to default name by supplying an empty string to the section kind, for example:
#pragma clang section bss="" data="" text="" rodata=""
The #pragma clang section
directive obeys the following rules:
- The pragma applies to all global variable, statics and function declarations from the pragma to the end of the translation unit.
- The pragma clang section is enabled automatically, without need of any flags.
- This feature is only defined to work sensibly for ELF targets.
- If section name is specified through _attribute_((section(“myname”))), then the attribute name gains precedence.
- Global variables that are initialized to zero will be placed in the named bss section, if one is present.
- The
#pragma clang section
directive does not does try to infer section-kind from the name. For example, naming a section “.bss.mySec
” does NOT mean it will be a bss section name. - The decision about which section-kind applies to each global is taken in the back-end.
Once the section-kind is known, appropriate section name, as specified by the user using
#pragma clang section
directive, is applied to that global.
Specifying Linker Options on ELF Targets¶
The #pragma comment(lib, ...)
directive is supported on all ELF targets.
The second parameter is the library name (without the traditional Unix prefix of
lib
). This allows you to provide an implicit link of dependent libraries.
Clang command line argument reference¶
Introduction¶
This page lists the command line arguments currently supported by the
GCC-compatible clang
and clang++
drivers.
-
-B<dir>
,
--prefix
<arg>
,
--prefix
=<arg>
¶
Add <dir> to search path for binaries and object files used implicitly
-
-F<arg>
¶
Add directory to framework include search path
-
-ObjC
¶
Treat source input files as Objective-C inputs
-
-ObjC++
¶
Treat source input files as Objective-C++ inputs
-
-Qn
¶
Do not emit metadata containing compiler name and version
-
-Qunused-arguments
¶
Don’t emit warning for unused driver arguments
-
-Qy
¶
Emit metadata containing compiler name and version
-
-Wa,<arg>,<arg2>...
¶
Pass the comma separated arguments in <arg> to the assembler
-
-Wlarge-by-value-copy
=<arg>
¶
-
-Xarch_<arg1>
<arg2>
¶
-
-Xcuda-fatbinary
<arg>
¶
Pass <arg> to fatbinary invocation
-
-Xcuda-ptxas
<arg>
¶
Pass <arg> to the ptxas assembler
-
-Xopenmp-target
<arg>
¶
Pass <arg> to the target offloading toolchain.
-
-Xopenmp-target
=<triple> <arg>
¶
Pass <arg> to the target offloading toolchain identified by <triple>.
-
-Z<arg>
¶
-
-a<arg>
,
--profile-blocks
¶
-
-all_load
¶
-
-allowable_client
<arg>
¶
-
--analyze
¶
Run the static analyzer
-
--analyze-auto
¶
-
--analyzer-no-default-checks
¶
-
--analyzer-output<arg>
¶
Static analyzer report output format (html|plist|plist-multi-file|plist-html|text).
-
-ansi
,
--ansi
¶
-
-arch
<arg>
¶
-
-arch_errors_fatal
¶
-
-arch_only
<arg>
¶
-
-arcmt-migrate-emit-errors
¶
Emit ARC errors even if the migrator can fix them
-
-arcmt-migrate-report-output
<arg>
¶
Output path for the plist report
-
--autocomplete
=<arg>
¶
-
-bind_at_load
¶
-
-bundle
¶
-
-bundle_loader
<arg>
¶
-
-cfguard
¶
Emit tables required for Windows Control Flow Guard.
-
-client_name<arg>
¶
-
-compatibility_version<arg>
¶
-
--config
<arg>
¶
Specifies configuration file
-
--constant-cfstrings
¶
-
-coverage
,
--coverage
¶
-
--cuda-compile-host-device
¶
Compile CUDA code for both host and device (default). Has no effect on non-CUDA compilations.
-
--cuda-device-only
¶
Compile CUDA code for device only
-
--cuda-gpu-arch
=<arg>
,
--no-cuda-gpu-arch
=<arg>
¶
CUDA GPU architecture (e.g. sm_35). May be specified more than once.
-
--cuda-host-only
¶
Compile CUDA code for host only. Has no effect on non-CUDA compilations.
-
--cuda-include-ptx
=<arg>
,
--no-cuda-include-ptx
=<arg>
¶
Include PTX for the follwing GPU architecture (e.g. sm_35) or ‘all’. May be specified more than once.
-
--cuda-noopt-device-debug
,
--no-cuda-noopt-device-debug
¶
Enable device-side debug info generation. Disables ptxas optimizations.
-
-current_version<arg>
¶
-
-dead_strip
¶
-
-dependency-dot
<arg>
¶
Filename to write DOT-formatted header dependencies to
-
-dependency-file
<arg>
¶
Filename (or -) to write dependency output to
-
-dumpmachine
¶
-
-dumpversion
¶
-
--dyld-prefix
=<arg>
,
--dyld-prefix
<arg>
¶
-
-dylib_file
<arg>
¶
-
-dylinker
¶
-
-dylinker_install_name<arg>
¶
-
-dynamic
¶
-
-dynamiclib
¶
-
-emit-ast
¶
Emit Clang AST files for source inputs
-
-exported_symbols_list
<arg>
¶
-
-faligned-new
=<arg>
¶
-
-fcuda-approx-transcendentals
,
-fno-cuda-approx-transcendentals
¶
Use approximate transcendental functions
-
-fcuda-flush-denormals-to-zero
,
-fno-cuda-flush-denormals-to-zero
¶
Flush denormal floating point values to zero in CUDA device mode.
-
-fcuda-rdc
,
-fno-cuda-rdc
¶
Generate relocatable device code, also known as separate compilation mode.
-
-ffixed-r19
¶
Reserve the r19 register (Hexagon only)
-
-fheinous-gnu-extensions
¶
-
-flat_namespace
¶
-
-fopenmp-targets
=<arg1>,<arg2>...
¶
Specify comma-separated list of triples OpenMP offloading targets to be supported
-
-force_cpusubtype_ALL
¶
-
-force_flat_namespace
¶
-
-force_load
<arg>
¶
-
-framework
<arg>
¶
-
-frtlib-add-rpath
,
-fno-rtlib-add-rpath
¶
Add -rpath with architecture-specific resource directory to the linker flags
-
--gcc-toolchain
=<arg>
,
-gcc-toolchain
<arg>
¶
Use the gcc toolchain at the given directory
-
-gcodeview
¶
Generate CodeView debug information
-
-headerpad_max_install_names<arg>
¶
-
-help
,
--help
¶
Display available options
Display help for hidden options
-
-image_base
<arg>
¶
-
-index-header-map
¶
Make the next included directory (-I or -F) an indexer header map
-
-init
<arg>
¶
-
-install_name
<arg>
¶
-
-keep_private_externs
¶
-
-lazy_framework
<arg>
¶
-
-lazy_library
<arg>
¶
-
-mbig-endian
,
-EB
¶
-
--migrate
¶
Run the migrator
-
-mios-simulator-version-min
=<arg>
,
-miphonesimulator-version-min
=<arg>
¶
-
-mlinker-version
=<arg>
¶
-
-mlittle-endian
,
-EL
¶
-
-mllvm
<arg>
¶
Additional arguments to forward to LLVM’s option processing
-
-module-dependency-dir
<arg>
¶
Directory to dump module dependencies to
-
-mtvos-simulator-version-min
=<arg>
,
-mappletvsimulator-version-min
=<arg>
¶
-
-multi_module
¶
-
-multiply_defined
<arg>
¶
-
-multiply_defined_unused
<arg>
¶
-
-mwatchos-simulator-version-min
=<arg>
,
-mwatchsimulator-version-min
=<arg>
¶
-
--no-cuda-version-check
¶
Don’t error out if the detected version of the CUDA install is too low for the requested CUDA gpu architecture.
-
-no-integrated-cpp
,
--no-integrated-cpp
¶
-
-no_dead_strip_inits_and_terms
¶
-
-nobuiltininc
¶
Disable builtin #include directories
-
-nocudainc
¶
-
-nocudalib
¶
-
-nodefaultlibs
¶
-
-nofixprebinding
¶
-
-nolibc
¶
-
-nomultidefs
¶
-
-nopie
,
-no-pie
¶
-
-noprebind
¶
-
-noseglinkedit
¶
-
-nostartfiles
¶
-
-nostdinc
,
--no-standard-includes
¶
-
-nostdinc++
¶
Disable standard #include directories for the C++ standard library
-
-nostdlib
,
--no-standard-libraries
¶
-
-nostdlib++
¶
-
-nostdlibinc
¶
-
-o<file>
,
--output
<arg>
,
--output
=<arg>
¶
Write output to <file>
-
-objcmt-atomic-property
¶
Make migration to ‘atomic’ properties
-
-objcmt-migrate-all
¶
Enable migration to modern ObjC
-
-objcmt-migrate-annotation
¶
Enable migration to property and method annotations
-
-objcmt-migrate-designated-init
¶
Enable migration to infer NS_DESIGNATED_INITIALIZER for initializer methods
-
-objcmt-migrate-instancetype
¶
Enable migration to infer instancetype for method result type
-
-objcmt-migrate-literals
¶
Enable migration to modern ObjC literals
-
-objcmt-migrate-ns-macros
¶
Enable migration to NS_ENUM/NS_OPTIONS macros
-
-objcmt-migrate-property
¶
Enable migration to modern ObjC property
-
-objcmt-migrate-property-dot-syntax
¶
Enable migration of setter/getter messages to property-dot syntax
-
-objcmt-migrate-protocol-conformance
¶
Enable migration to add protocol conformance on classes
-
-objcmt-migrate-readonly-property
¶
Enable migration to modern ObjC readonly property
-
-objcmt-migrate-readwrite-property
¶
Enable migration to modern ObjC readwrite property
-
-objcmt-migrate-subscripting
¶
Enable migration to modern ObjC subscripting
-
-objcmt-ns-nonatomic-iosonly
¶
Enable migration to use NS_NONATOMIC_IOSONLY macro for setting property’s ‘atomic’ attribute
-
-objcmt-returns-innerpointer-property
¶
Enable migration to annotate property with NS_RETURNS_INNER_POINTER
-
-objcmt-whitelist-dir-path
=<arg>
,
-objcmt-white-list-dir-path
=<arg>
¶
Only modify files with a filename contained in the provided directory path
-
-object
¶
-
-p
,
--profile
¶
-
-pagezero_size<arg>
¶
-
-pg
¶
Enable mcount instrumentation
-
-pie
¶
-
-pipe
,
--pipe
¶
Use pipes between commands, when possible
-
-prebind
¶
-
-prebind_all_twolevel_modules
¶
-
-preload
¶
-
--print-diagnostic-categories
¶
-
-print-file-name
=<file>
,
--print-file-name
=<file>
,
--print-file-name
<arg>
¶
Print the full library path of <file>
-
-print-ivar-layout
¶
Enable Objective-C Ivar layout bitmap print trace
-
-print-libgcc-file-name
,
--print-libgcc-file-name
¶
Print the library path for the currently used compiler runtime library (“libgcc.a” or “libclang_rt.builtins.*.a”)
-
-print-multi-directory
,
--print-multi-directory
¶
-
-print-multi-lib
,
--print-multi-lib
¶
-
-print-prog-name
=<name>
,
--print-prog-name
=<name>
,
--print-prog-name
<arg>
¶
Print the full program path of <name>
-
-print-resource-dir
,
--print-resource-dir
¶
Print the resource directory pathname
-
-print-search-dirs
,
--print-search-dirs
¶
Print the paths used for finding libraries and programs
-
-private_bundle
¶
-
-pthread
,
-no-pthread
¶
Support POSIX threads in generated code
-
-pthreads
¶
-
-rdynamic
¶
-
-read_only_relocs
<arg>
¶
-
-relocatable-pch
,
--relocatable-pch
¶
Whether to build a relocatable precompiled header
-
-remap
¶
-
-rewrite-legacy-objc
¶
Rewrite Legacy Objective-C source to C++
-
-rtlib
=<arg>
,
--rtlib
=<arg>
,
--rtlib
<arg>
¶
Compiler runtime library to use
-
-save-stats
=<arg>
,
--save-stats
=<arg>
,
-save-stats
(equivalent to -save-stats=cwd)
,
--save-stats
(equivalent to -save-stats=cwd)
¶
Save llvm statistics.
-
-save-temps
=<arg>
,
--save-temps
=<arg>
,
-save-temps
(equivalent to -save-temps=cwd)
,
--save-temps
(equivalent to -save-temps=cwd)
¶
Save intermediate compilation results.
-
-sectalign
<arg1> <arg2> <arg3>
¶
-
-sectcreate
<arg1> <arg2> <arg3>
¶
-
-sectobjectsymbols
<arg1> <arg2>
¶
-
-sectorder
<arg1> <arg2> <arg3>
¶
-
-seg1addr<arg>
¶
-
-seg_addr_table
<arg>
¶
-
-seg_addr_table_filename
<arg>
¶
-
-segaddr
<arg1> <arg2>
¶
-
-segcreate
<arg1> <arg2> <arg3>
¶
-
-seglinkedit
¶
-
-segprot
<arg1> <arg2> <arg3>
¶
-
-segs_read_<arg>
¶
-
-segs_read_only_addr
<arg>
¶
-
-segs_read_write_addr
<arg>
¶
-
-serialize-diagnostics
<arg>
,
--serialize-diagnostics
<arg>
¶
Serialize compiler diagnostics to a file
-
-single_module
¶
-
-specs
=<arg>
,
--specs
=<arg>
¶
-
-static
,
--static
¶
-
-static-libgcc
¶
-
-static-libsan
¶
-
-static-libstdc++
¶
-
-std-default
=<arg>
¶
-
-stdlib
=<arg>
,
--stdlib
=<arg>
,
--stdlib
<arg>
¶
C++ standard library to use
-
-sub_library<arg>
¶
-
-sub_umbrella<arg>
¶
-
--sysroot
=<arg>
,
--sysroot
<arg>
¶
-
--target-help
¶
-
--target
=<arg>
,
-target
<arg>
¶
Generate code for the given target
-
-time
¶
Time individual commands
-
-traditional
,
--traditional
¶
-
-traditional-cpp
,
--traditional-cpp
¶
Enable some traditional CPP emulation
-
-twolevel_namespace
¶
-
-twolevel_namespace_hints
¶
-
-umbrella
<arg>
¶
-
-unexported_symbols_list
<arg>
¶
-
-v
,
--verbose
¶
Show commands to run and use verbose output
-
--verify-debug-info
¶
Verify the binary representation of debug output
-
--version
¶
Print version information
-
-w
,
--no-warnings
¶
Suppress all warnings
-
-weak-l<arg>
¶
-
-weak_framework
<arg>
¶
-
-weak_library
<arg>
¶
-
-weak_reference_mismatches
<arg>
¶
-
-whatsloaded
¶
-
-whyload
¶
-
-working-directory<arg>
,
-working-directory
=<arg>
¶
Resolve file paths relative to the specified directory
-
-x<language>
,
--language
<arg>
,
--language
=<arg>
¶
Treat subsequent input files as having type <language>
-
-y<arg>
¶
Actions¶
The action to perform on the input.
-
-E
,
--preprocess
¶
Only run the preprocessor
-
-S
,
--assemble
¶
Only run preprocess and compilation steps
-
-c
,
--compile
¶
Only run preprocess, compile, and assemble steps
-
-emit-llvm
¶
Use the LLVM representation for assembler and object files
-
-fsyntax-only
¶
-
-module-file-info
¶
Provide information about a particular module file
-
--precompile
¶
Only precompile the input
-
-rewrite-objc
¶
Rewrite Objective-C source to C++
-
-verify-pch
¶
Load and verify that a pre-compiled header file is not stale
Compilation flags¶
Flags controlling the behavior of Clang during compilation. These flags have no effect during actions that do not perform compilation.
-
-Xassembler
<arg>
¶
Pass <arg> to the assembler
-
-Xclang
<arg>
¶
Pass <arg> to the clang compiler
-
-fclang-abi-compat
=<version>
¶
Attempt to match the ABI of Clang <version>
-
-fcomment-block-commands
=<arg>,<arg2>...
¶
Treat each comma separated argument in <arg> as a documentation comment block command
-
-fdeclspec
,
-fno-declspec
¶
Allow __declspec as a keyword
-
-fdepfile-entry
=<arg>
¶
-
-fdiagnostics-fixit-info
,
-fno-diagnostics-fixit-info
¶
-
-fdiagnostics-format
=<arg>
¶
-
-fdiagnostics-parseable-fixits
¶
Print fix-its in machine parseable form
-
-fdiagnostics-print-source-range-info
¶
Print source range spans in numeric form
-
-fdiagnostics-show-category
=<arg>
¶
-
-fdiscard-value-names
,
-fno-discard-value-names
¶
Discard value names in LLVM IR
-
-fexperimental-isel
,
-fno-experimental-isel
¶
Enables the experimental global instruction selector
-
-fexperimental-new-pass-manager
,
-fno-experimental-new-pass-manager
¶
Enables an experimental new pass manager in LLVM.
-
-ffine-grained-bitfield-accesses
,
-fno-fine-grained-bitfield-accesses
¶
Use separate accesses for bitfields with legal widths and alignments.
-
-finline-functions
,
-fno-inline-functions
¶
Inline suitable functions
-
-finline-hint-functions
¶
Inline functions which are (explicitly or implicitly) marked inline
-
-fno-crash-diagnostics
¶
Disable auto-generation of preprocessed source files and a script for reproduction during a clang crash
-
-fno-sanitize-blacklist
¶
Don’t use blacklist file for sanitizers
-
-fparse-all-comments
¶
-
-fsanitize-address-field-padding
=<arg>
¶
Level of field padding for AddressSanitizer
-
-fsanitize-address-globals-dead-stripping
¶
Enable linker dead stripping of globals in AddressSanitizer
Enable poisoning array cookies when using class member operator new[] in AddressSanitizer
-
-fsanitize-address-use-after-scope
,
-fno-sanitize-address-use-after-scope
¶
Enable use-after-scope detection in AddressSanitizer
-
-fsanitize-blacklist
=<arg>
¶
Path to blacklist file for sanitizers
-
-fsanitize-cfi-cross-dso
,
-fno-sanitize-cfi-cross-dso
¶
Enable control flow integrity (CFI) checks for cross-DSO calls.
-
-fsanitize-cfi-icall-generalize-pointers
¶
Generalize pointers in CFI indirect call type signature checks
-
-fsanitize-coverage
=<arg1>,<arg2>...
,
-fno-sanitize-coverage
=<arg1>,<arg2>...
¶
Specify the type of coverage instrumentation for Sanitizers
-
-fsanitize-link-c++-runtime
¶
-
-fsanitize-memory-track-origins
,
-fno-sanitize-memory-track-origins
¶
Enable origins tracking in MemorySanitizer
-
-fsanitize-memory-track-origins
=<arg>
¶
Enable origins tracking in MemorySanitizer
-
-fsanitize-memory-use-after-dtor
,
-fno-sanitize-memory-use-after-dtor
¶
Enable use-after-destroy detection in MemorySanitizer
-
-fsanitize-minimal-runtime
,
-fno-sanitize-minimal-runtime
¶
-
-fsanitize-recover
,
-fno-sanitize-recover
¶
-
-fsanitize-recover
=<arg1>,<arg2>...
,
-fno-sanitize-recover
=<arg1>,<arg2>...
¶
Enable recovery for specified sanitizers
-
-fsanitize-stats
,
-fno-sanitize-stats
¶
Enable sanitizer statistics gathering.
-
-fsanitize-thread-atomics
,
-fno-sanitize-thread-atomics
¶
Enable atomic operations instrumentation in ThreadSanitizer (default)
-
-fsanitize-thread-func-entry-exit
,
-fno-sanitize-thread-func-entry-exit
¶
Enable function entry/exit instrumentation in ThreadSanitizer (default)
-
-fsanitize-thread-memory-access
,
-fno-sanitize-thread-memory-access
¶
Enable memory access instrumentation in ThreadSanitizer (default)
-
-fsanitize-trap
=<arg1>,<arg2>...
,
-fno-sanitize-trap
=<arg1>,<arg2>...
¶
Enable trapping for specified sanitizers
-
-fsanitize-undefined-strip-path-components
=<number>
¶
Strip (or keep only, if negative) a given number of path components when emitting check metadata.
-
-fsanitize-undefined-trap-on-error
,
-fno-sanitize-undefined-trap-on-error
¶
-
-fsanitize
=<check>,<arg2>...
,
-fno-sanitize
=<arg1>,<arg2>...
¶
Turn on runtime checks for various forms of undefined or suspicious behavior. See user manual for available checks
-
--param
<arg>
,
--param
=<arg>
¶
-
-std
=<arg>
,
--std
=<arg>
,
--std
<arg>
¶
Language standard to compile for
Preprocessor flags¶
Flags controlling the behavior of the Clang preprocessor.
-
-C
,
--comments
¶
Include comments in preprocessed output
-
-CC
,
--comments-in-macros
¶
Include comments from within macros in preprocessed output
-
-D<macro>
=<value>
,
--define-macro
<arg>
,
--define-macro
=<arg>
¶
Define <macro> to <value> (or 1 if <value> omitted)
-
-H
,
--trace-includes
¶
Show header includes and nesting depth
-
-P
,
--no-line-commands
¶
Disable linemarker output in -E mode
-
-U<macro>
,
--undefine-macro
<arg>
,
--undefine-macro
=<arg>
¶
Undefine macro <macro>
-
-Wp,<arg>,<arg2>...
¶
Pass the comma separated arguments in <arg> to the preprocessor
-
-Xpreprocessor
<arg>
¶
Pass <arg> to the preprocessor
Include path management¶
Flags controlling how #include
s are resolved to files.
-
-I<dir>
,
--include-directory
<arg>
,
--include-directory
=<arg>
¶
Add directory to include search path
-
-I-
,
--include-barrier
¶
Restrict all prior -I flags to double-quoted inclusion and remove current directory from include path
-
--cuda-path-ignore-env
¶
Ignore environment variables to detect CUDA installation
-
--cuda-path
=<arg>
¶
CUDA installation path
-
-cxx-isystem<directory>
¶
Add directory to the C++ SYSTEM include search path
-
-fbuild-session-file
=<file>
¶
Use the last modification time of <file> as the build session timestamp
-
-fbuild-session-timestamp
=<time since Epoch in seconds>
¶
Time when the current build session started
-
-fmodule-file
=[<name>=]<file>
¶
Specify the mapping of module name to precompiled module file, or load a module file if name is omitted.
-
-fmodules-cache-path
=<directory>
¶
Specify the module cache path
-
-fmodules-disable-diagnostic-validation
¶
Disable validation of the diagnostic options when loading the module
-
-fmodules-prune-after
=<seconds>
¶
Specify the interval (in seconds) after which a module file will be considered unused
-
-fmodules-prune-interval
=<seconds>
¶
Specify the interval (in seconds) between attempts to prune the module cache
-
-fmodules-user-build-path
<directory>
¶
Specify the module user build path
-
-fmodules-validate-once-per-build-session
¶
Don’t verify input files for the modules if the module has been successfully validated or loaded during this build session
-
-fmodules-validate-system-headers
,
-fno-modules-validate-system-headers
¶
Validate the system headers that a module depends on when loading the module
-
-fprebuilt-module-path
=<directory>
¶
Specify the prebuilt module path
-
-idirafter<arg>
,
--include-directory-after
<arg>
,
--include-directory-after
=<arg>
¶
Add directory to AFTER include search path
-
-iframework<arg>
¶
Add directory to SYSTEM framework search path
-
-iframeworkwithsysroot<directory>
¶
Add directory to SYSTEM framework search path, absolute paths are relative to -isysroot
-
-imacros<file>
,
--imacros<file>
,
--imacros
=<arg>
¶
Include macros from file before parsing
-
-include<file>
,
--include<file>
,
--include
=<arg>
¶
Include file before parsing
-
-include-pch
<file>
¶
Include precompiled header file
-
-iprefix<dir>
,
--include-prefix
<arg>
,
--include-prefix
=<arg>
¶
Set the -iwithprefix/-iwithprefixbefore prefix
-
-iquote<directory>
¶
Add directory to QUOTE include search path
-
-isysroot<dir>
¶
Set the system root directory (usually /)
-
-isystem<directory>
¶
Add directory to SYSTEM include search path
-
-isystem-after<directory>
¶
Add directory to end of the SYSTEM include search path
-
-ivfsoverlay<arg>
¶
Overlay the virtual filesystem described by file over the real file system
-
-iwithprefix<dir>
,
--include-with-prefix
<arg>
,
--include-with-prefix-after
<arg>
,
--include-with-prefix-after
=<arg>
,
--include-with-prefix
=<arg>
¶
Set directory to SYSTEM include search path with prefix
-
-iwithprefixbefore<dir>
,
--include-with-prefix-before
<arg>
,
--include-with-prefix-before
=<arg>
¶
Set directory to include search path with prefix
-
-iwithsysroot<directory>
¶
Add directory to SYSTEM include search path, absolute paths are relative to -isysroot
-
--ptxas-path
=<arg>
¶
Path to ptxas (used for compiling CUDA code)
-
--system-header-prefix
=<prefix>
,
--no-system-header-prefix
=<prefix>
,
--system-header-prefix
<arg>
¶
Treat all #include paths starting with <prefix> as including a system header.
Dependency file generation¶
Flags controlling generation of a dependency file for make
-like build
systems.
-
-M
,
--dependencies
¶
Like -MD, but also implies -E and writes to stdout by default
-
-MD
,
--write-dependencies
¶
Write a depfile containing user and system headers
-
-MF<file>
¶
Write depfile output from -MMD, -MD, -MM, or -M to <file>
-
-MG
,
--print-missing-file-dependencies
¶
Add missing headers to depfile
-
-MJ<arg>
¶
Write a compilation database entry per input
-
-MM
,
--user-dependencies
¶
Like -MMD, but also implies -E and writes to stdout by default
-
-MMD
,
--write-user-dependencies
¶
Write a depfile containing user headers
-
-MP
¶
Create phony target for each dependency (other than main file)
-
-MQ<arg>
¶
Specify name of main file output to quote in depfile
-
-MT<arg>
¶
Specify name of main file output in depfile
-
-MV
¶
Use NMake/Jom format for the depfile
Dumping preprocessor state¶
Flags allowing the state of the preprocessor to be dumped in various ways.
-
-d
¶
-
-d<arg>
¶
-
-dA
¶
-
-dD
¶
Print macro definitions in -E mode in addition to normal output
-
-dI
¶
Print include directives in -E mode in addition to normal output
-
-dM
¶
Print macro definitions in -E mode instead of normal output
Diagnostic flags¶
Flags controlling which warnings, errors, and remarks Clang will generate. See the full list of warning and remark flags.
-
-R<remark>
¶
Enable the specified remark
-
-Rpass-analysis
=<arg>
¶
Report transformation analysis from optimization passes whose name matches the given POSIX regular expression
-
-Rpass-missed
=<arg>
¶
Report missed transformations by optimization passes whose name matches the given POSIX regular expression
-
-Rpass
=<arg>
¶
Report transformations performed by optimization passes whose name matches the given POSIX regular expression
-
-W<warning>
,
--extra-warnings
,
--warn-<arg>
,
--warn-
=<arg>
¶
Enable the specified warning
-
-Wdeprecated
,
-Wno-deprecated
¶
Enable warnings for deprecated constructs and define __DEPRECATED
-
-Wnonportable-cfstrings<arg>
,
-Wno-nonportable-cfstrings<arg>
¶
Target-independent compilation options¶
-
-Wframe-larger-than
=<arg>
¶
-
-fPIC
,
-fno-PIC
¶
-
-fPIE
,
-fno-PIE
¶
-
-faccess-control
,
-fno-access-control
¶
-
-falign-functions
,
-fno-align-functions
¶
-
-falign-functions
=<arg>
¶
-
-faligned-allocation
,
-faligned-new
,
-fno-aligned-allocation
¶
Enable C++17 aligned allocation functions
-
-fallow-editor-placeholders
,
-fno-allow-editor-placeholders
¶
Treat editor placeholders as valid source code
-
-fallow-unsupported
¶
-
-faltivec
,
-fno-altivec
¶
-
-fansi-escape-codes
¶
Use ANSI escape codes for diagnostics
-
-fapple-kext
,
-findirect-virtual-calls
,
-fterminated-vtables
¶
Use Apple’s kernel extensions ABI
-
-fapple-pragma-pack
,
-fno-apple-pragma-pack
¶
Enable Apple gcc-compatible #pragma pack handling
-
-fapplication-extension
,
-fno-application-extension
¶
Restrict code to those available for App Extensions
-
-fasm
,
-fno-asm
¶
-
-fasm-blocks
,
-fno-asm-blocks
¶
-
-fassociative-math
,
-fno-associative-math
¶
-
-fassume-sane-operator-new
,
-fno-assume-sane-operator-new
¶
-
-fast
¶
-
-fastcp
¶
-
-fastf
¶
-
-fasynchronous-unwind-tables
,
-fno-asynchronous-unwind-tables
¶
-
-fautolink
,
-fno-autolink
¶
-
-fblocks
,
-fno-blocks
¶
Enable the ‘blocks’ language feature
-
-fbootclasspath
=<arg>
,
--bootclasspath
<arg>
,
--bootclasspath
=<arg>
¶
-
-fborland-extensions
,
-fno-borland-extensions
¶
Accept non-standard constructs supported by the Borland compiler
-
-fbracket-depth
=<arg>
¶
-
-fbuiltin
,
-fno-builtin
¶
-
-fbuiltin-module-map
¶
Load the clang builtins module map file.
-
-fcaret-diagnostics
,
-fno-caret-diagnostics
¶
-
-fcf-protection
=<arg>
,
-fcf-protection
(equivalent to -fcf-protection=full)
¶
Instrument control-flow architecture protection. Options: return, branch, full, none.
-
-fclasspath
=<arg>
,
--CLASSPATH
<arg>
,
--CLASSPATH
=<arg>
,
--classpath
<arg>
,
--classpath
=<arg>
¶
-
-fcolor-diagnostics
,
-fno-color-diagnostics
¶
Use colors in diagnostics
-
-fcommon
,
-fno-common
¶
-
-fcompile-resource
=<arg>
,
--resource
<arg>
,
--resource
=<arg>
¶
-
-fconstant-cfstrings
,
-fno-constant-cfstrings
¶
-
-fconstant-string-class
=<arg>
¶
-
-fconstexpr-backtrace-limit
=<arg>
¶
-
-fconstexpr-depth
=<arg>
¶
-
-fconstexpr-steps
=<arg>
¶
-
-fcoroutines-ts
,
-fno-coroutines-ts
¶
Enable support for the C++ Coroutines TS
-
-fcoverage-mapping
,
-fno-coverage-mapping
¶
Generate coverage mapping to enable code coverage analysis
-
-fcreate-profile
¶
-
-fcxx-exceptions
,
-fno-cxx-exceptions
¶
Enable C++ exceptions
-
-fcxx-modules
,
-fno-cxx-modules
¶
-
-fdata-sections
,
-fno-data-sections
¶
Place each data in its own section (ELF Only)
-
-fdebug-info-for-profiling
,
-fno-debug-info-for-profiling
¶
Emit extra debug info to make sample profile more accurate.
-
-fdebug-macro
,
-fno-debug-macro
¶
Emit macro debug information
-
-fdebug-pass-arguments
¶
-
-fdebug-pass-structure
¶
-
-fdebug-prefix-map
=<arg>
¶
remap file source paths in debug info
-
-fdebug-types-section
,
-fno-debug-types-section
¶
Place debug types in their own section (ELF Only)
-
-fdelayed-template-parsing
,
-fno-delayed-template-parsing
¶
Parse templated function definitions at the end of the translation unit
-
-fdenormal-fp-math
=<arg>
¶
-
-fdiagnostics-absolute-paths
¶
Print absolute paths in diagnostics
-
-fdiagnostics-color
,
-fno-diagnostics-color
¶
-
-fdiagnostics-color
=<arg>
¶
-
-fdiagnostics-hotness-threshold
=<number>
¶
Prevent optimization remarks from being output if they do not have at least this profile count
-
-fdiagnostics-show-hotness
,
-fno-diagnostics-show-hotness
¶
Enable profile hotness information in diagnostic line
-
-fdiagnostics-show-note-include-stack
,
-fno-diagnostics-show-note-include-stack
¶
Display include stacks for diagnostic notes
-
-fdiagnostics-show-option
,
-fno-diagnostics-show-option
¶
Print option name with mappable diagnostics
-
-fdiagnostics-show-template-tree
¶
Print a template comparison tree for differing templates
-
-fdollars-in-identifiers
,
-fno-dollars-in-identifiers
¶
Allow ‘$’ in identifiers
-
-fdouble-square-bracket-attributes
,
-fno-double-square-bracket-attributes
¶
Enable ‘[[]]’ attributes in all C and C++ language modes
-
-fdwarf-directory-asm
,
-fno-dwarf-directory-asm
¶
-
-fdwarf-exceptions
¶
Use DWARF style exceptions
-
-felide-constructors
,
-fno-elide-constructors
¶
-
-feliminate-unused-debug-symbols
,
-fno-eliminate-unused-debug-symbols
¶
-
-fembed-bitcode
=<option>
,
-fembed-bitcode
(equivalent to -fembed-bitcode=all)
,
-fembed-bitcode-marker
(equivalent to -fembed-bitcode=marker)
¶
Embed LLVM bitcode (option: off, all, bitcode, marker)
-
-femit-all-decls
¶
Emit all declarations, even if unused
-
-femulated-tls
,
-fno-emulated-tls
¶
Use emutls functions to access thread_local variables
-
-fencoding
=<arg>
,
--encoding
<arg>
,
--encoding
=<arg>
¶
-
-ferror-limit
=<arg>
¶
-
-fescaping-block-tail-calls
,
-fno-escaping-block-tail-calls
¶
-
-fexceptions
,
-fno-exceptions
¶
Enable support for exception handling
-
-fexec-charset
=<arg>
¶
-
-fextdirs
=<arg>
,
--extdirs
<arg>
,
--extdirs
=<arg>
¶
-
-ffast-math
,
-fno-fast-math
¶
Allow aggressive, lossy floating-point optimizations
-
-ffinite-math-only
,
-fno-finite-math-only
¶
-
-ffor-scope
,
-fno-for-scope
¶
-
-fforce-enable-int128
,
-fno-force-enable-int128
¶
Enable support for int128_t type
-
-ffp-contract
=<arg>
¶
Form fused FP ops (e.g. FMAs): fast (everywhere) | on (according to FP_CONTRACT pragma, default) | off (never fuse)
-
-ffreestanding
¶
Assert that the compilation takes place in a freestanding environment
-
-ffunction-sections
,
-fno-function-sections
¶
Place each function in its own section (ELF Only)
-
-fgnu-inline-asm
,
-fno-gnu-inline-asm
¶
-
-fgnu-keywords
,
-fno-gnu-keywords
¶
Allow GNU-extension keywords regardless of language standard
-
-fgnu-runtime
¶
Generate output compatible with the standard GNU Objective-C runtime
-
-fgnu89-inline
,
-fno-gnu89-inline
¶
Use the gnu89 inline semantics
-
-fhonor-infinities
,
-fhonor-infinites
,
-fno-honor-infinities
¶
-
-fhonor-nans
,
-fno-honor-nans
¶
-
-fhosted
¶
-
-fimplicit-module-maps
,
-fmodule-maps
,
-fno-implicit-module-maps
¶
Implicitly search the file system for module map files.
-
-fimplicit-modules
,
-fno-implicit-modules
¶
-
-finput-charset
=<arg>
¶
-
-finstrument-function-entry-bare
¶
Instrument function entry only, after inlining, without arguments to the instrumentation call
-
-finstrument-functions
¶
Generate calls to instrument function entry and exit
-
-finstrument-functions-after-inlining
¶
Like -finstrument-functions, but insert the calls after inlining
-
-fintegrated-as
,
-fno-integrated-as
,
-integrated-as
¶
Enable the integrated assembler
-
-fjump-tables
,
-fno-jump-tables
¶
-
-flax-vector-conversions
,
-fno-lax-vector-conversions
¶
-
-flimited-precision
=<arg>
¶
-
-flto
,
-fno-lto
¶
Enable LTO in ‘full’ mode
-
-flto-jobs
=<arg>
¶
Controls the backend parallelism of -flto=thin (default of 0 means the number of threads will be derived from the number of CPUs detected)
-
-flto
=<arg>
¶
Set LTO mode to either ‘full’ or ‘thin’
-
-fmacro-backtrace-limit
=<arg>
¶
-
-fmath-errno
,
-fno-math-errno
¶
Require math functions to indicate errors by setting errno
-
-fmax-type-align
=<arg>
¶
Specify the maximum alignment to enforce on pointers lacking an explicit alignment
-
-fmerge-all-constants
,
-fno-merge-all-constants
¶
Allow merging of constants
-
-fmessage-length
=<arg>
¶
-
-fmodule-file-deps
,
-fno-module-file-deps
¶
-
-fmodule-map-file
=<file>
¶
Load this module map file
-
-fmodule-name
=<name>
,
-fmodule-implementation-of
<arg>
,
-fmodule-name
<arg>
¶
Specify the name of the module to build
-
-fmodules
,
-fno-modules
¶
Enable the ‘modules’ language feature
-
-fmodules-decluse
,
-fno-modules-decluse
¶
Require declaration of modules used within a module
-
-fmodules-ignore-macro
=<arg>
¶
Ignore the definition of the given macro when building and loading modules
-
-fmodules-search-all
,
-fno-modules-search-all
¶
Search even non-imported modules to resolve references
-
-fmodules-strict-decluse
¶
Like -fmodules-decluse but requires all headers to be in modules
-
-fmodules-ts
¶
Enable support for the C++ Modules TS
-
-fms-compatibility
,
-fno-ms-compatibility
¶
Enable full Microsoft Visual C++ compatibility
-
-fms-compatibility-version
=<arg>
¶
Dot-separated value representing the Microsoft compiler version number to report in _MSC_VER (0 = don’t define it (default))
-
-fms-extensions
,
-fno-ms-extensions
¶
Accept some non-standard constructs supported by the Microsoft compiler
-
-fms-memptr-rep
=<arg>
¶
-
-fms-volatile<arg>
¶
-
-fmsc-version
=<arg>
¶
Microsoft compiler version number to report in _MSC_VER (0 = don’t define it (default))
-
-fmudflap
¶
-
-fmudflapth
¶
-
-fnested-functions
¶
-
-fnew-alignment
=<align>
,
-fnew-alignment
<arg>
¶
Specifies the largest alignment guaranteed by ‘::operator new(size_t)’
-
-fnext-runtime
¶
-
-fno-builtin-<arg>
¶
Disable implicit builtin knowledge of a specific function
-
-fdelete-null-pointer-checks
,
-fno-delete-null-pointer-checks
¶
When enabled, treat null pointer dereference, creation of a reference to null, or passing a null pointer to a function parameter annotated with the “nonnull” attribute as undefined behavior. (And, thus the optimizer may assume that any pointer used in such a way must not have been null and optimize away the branches accordingly.) On by default.
-
-fno-elide-type
¶
Do not elide types when printing diagnostics
-
-fno-max-type-align
¶
-
-fno-operator-names
¶
Do not treat C++ operator name keywords as synonyms for operators
-
-fno-rtti-data
¶
Control emission of RTTI data
-
-fno-strict-modules-decluse
¶
-
-fno-working-directory
¶
-
-fnoxray-link-deps
¶
-
-fobjc-abi-version
=<arg>
¶
-
-fobjc-arc
,
-fno-objc-arc
¶
Synthesize retain and release calls for Objective-C pointers
-
-fobjc-arc-exceptions
,
-fno-objc-arc-exceptions
¶
Use EH-safe code when synthesizing retains and releases in -fobjc-arc
-
-fobjc-exceptions
,
-fno-objc-exceptions
¶
Enable Objective-C exceptions
-
-fobjc-legacy-dispatch
,
-fno-objc-legacy-dispatch
¶
-
-fobjc-link-runtime
¶
-
-fobjc-nonfragile-abi
,
-fno-objc-nonfragile-abi
¶
-
-fobjc-nonfragile-abi-version
=<arg>
¶
-
-fobjc-runtime
=<arg>
¶
Specify the target Objective-C runtime kind and version
-
-fobjc-sender-dependent-dispatch
¶
-
-fobjc-weak
,
-fno-objc-weak
¶
Enable ARC-style weak references in Objective-C
-
-fomit-frame-pointer
,
-fno-omit-frame-pointer
¶
-
-fopenmp
,
-fno-openmp
¶
Parse OpenMP pragmas and generate parallel code.
-
-fopenmp-simd
,
-fno-openmp-simd
¶
Emit OpenMP code only for SIMD-based constructs.
-
-fopenmp-version
=<arg>
¶
-
-fopenmp
=<arg>
¶
-
-foperator-arrow-depth
=<arg>
¶
-
-foptimization-record-file
=<arg>
¶
Specify the file name of any generated YAML optimization record
-
-foptimize-sibling-calls
,
-fno-optimize-sibling-calls
¶
-
-foutput-class-dir
=<arg>
,
--output-class-directory
<arg>
,
--output-class-directory
=<arg>
¶
-
-fpack-struct
,
-fno-pack-struct
¶
-
-fpack-struct
=<arg>
¶
Specify the default maximum struct packing alignment
-
-fpascal-strings
,
-fno-pascal-strings
,
-mpascal-strings
¶
Recognize and construct Pascal-style string literals
-
-fpcc-struct-return
¶
Override the default ABI to return all structs on the stack
-
-fpch-preprocess
¶
-
-fpic
,
-fno-pic
¶
-
-fpie
,
-fno-pie
¶
-
-fplt
,
-fno-plt
¶
Use the PLT to make function calls
-
-fplugin
=<dsopath>
¶
Load the named plugin (dynamic shared object)
-
-fpreserve-as-comments
,
-fno-preserve-as-comments
¶
-
-fprofile-arcs
,
-fno-profile-arcs
¶
-
-fprofile-dir
=<arg>
¶
-
-fprofile-generate
,
-fno-profile-generate
¶
Generate instrumented code to collect execution counts into default.profraw (overridden by LLVM_PROFILE_FILE env var)
-
-fprofile-generate
=<directory>
¶
Generate instrumented code to collect execution counts into <directory>/default.profraw (overridden by LLVM_PROFILE_FILE env var)
-
-fprofile-instr-generate
,
-fno-profile-instr-generate
¶
Generate instrumented code to collect execution counts into default.profraw file (overridden by ‘=’ form of option or LLVM_PROFILE_FILE env var)
-
-fprofile-instr-generate
=<file>
¶
Generate instrumented code to collect execution counts into <file> (overridden by LLVM_PROFILE_FILE env var)
-
-fprofile-instr-use
,
-fno-profile-instr-use
,
-fprofile-use
¶
-
-fprofile-instr-use
=<arg>
¶
Use instrumentation data for profile-guided optimization
-
-fprofile-sample-accurate
,
-fauto-profile-accurate
,
-fno-profile-sample-accurate
¶
- Specifies that the sample profile is accurate. If the sample
- profile is accurate, callsites without profile samples are marked as cold. Otherwise, treat callsites without profile samples as if we have no profile
-
-fprofile-sample-use
,
-fauto-profile
,
-fno-profile-sample-use
¶
-
-fprofile-sample-use
=<arg>
,
-fauto-profile
=<arg>
¶
Enable sample-based profile guided optimizations
-
-fprofile-use
=<pathname>
¶
Use instrumentation data for profile-guided optimization. If pathname is a directory, it reads from <pathname>/default.profdata. Otherwise, it reads from file <pathname>.
-
-freciprocal-math
,
-fno-reciprocal-math
¶
Allow division operations to be reassociated
-
-freg-struct-return
¶
Override the default ABI to return small structs in registers
-
-fregister-global-dtors-with-atexit
,
-fno-register-global-dtors-with-atexit
¶
Use atexit or __cxa_atexit to register global destructors
-
-frelaxed-template-template-args
,
-fno-relaxed-template-template-args
¶
Enable C++17 relaxed template template argument matching
-
-freroll-loops
,
-fno-reroll-loops
¶
Turn on loop reroller
-
-fretain-comments-from-system-headers
¶
-
-frewrite-imports
,
-fno-rewrite-imports
¶
-
-frewrite-includes
,
-fno-rewrite-includes
¶
-
-frewrite-map-file
<arg>
¶
-
-frewrite-map-file
=<arg>
¶
-
-fropi
,
-fno-ropi
¶
-
-frtti
,
-fno-rtti
¶
-
-frwpi
,
-fno-rwpi
¶
-
-fsave-optimization-record
,
-fno-save-optimization-record
¶
Generate a YAML optimization record file
-
-fseh-exceptions
¶
Use SEH style exceptions
-
-fshort-enums
,
-fno-short-enums
¶
Allocate to an enum type only as many bytes as it needs for the declared range of possible values
-
-fshort-wchar
,
-fno-short-wchar
¶
Force wchar_t to be a short unsigned int
-
-fshow-column
,
-fno-show-column
¶
-
-fshow-overloads
=<arg>
¶
Which overload candidates to show when overload resolution fails: best|all; defaults to all
-
-fshow-source-location
,
-fno-show-source-location
¶
-
-fsignaling-math
,
-fno-signaling-math
¶
-
-fsigned-bitfields
¶
-
-fsigned-char
,
-fno-signed-char
,
--signed-char
¶
-
-fsigned-zeros
,
-fno-signed-zeros
¶
-
-fsized-deallocation
,
-fno-sized-deallocation
¶
Enable C++14 sized global deallocation functions
-
-fsjlj-exceptions
¶
Use SjLj style exceptions
-
-fslp-vectorize
,
-fno-slp-vectorize
,
-ftree-slp-vectorize
¶
Enable the superword-level parallelism vectorization passes
-
-fspell-checking
,
-fno-spell-checking
¶
-
-fspell-checking-limit
=<arg>
¶
-
-fsplit-dwarf-inlining
,
-fno-split-dwarf-inlining
¶
Provide minimal debug info in the object/executable to facilitate online symbolication/stack traces in the absence of .dwo/.dwp files when using Split DWARF
-
-fsplit-stack
¶
-
-fstack-protector
,
-fno-stack-protector
¶
Enable stack protectors for functions potentially vulnerable to stack smashing
-
-fstack-protector-all
¶
Force the usage of stack protectors for all functions
-
-fstack-protector-strong
¶
Use a strong heuristic to apply stack protectors to functions
-
-fstack-size-section
,
-fno-stack-size-section
¶
Emit section containing metadata on function stack sizes
-
-fstandalone-debug
,
-fno-limit-debug-info
,
-fno-standalone-debug
¶
Emit full debug info for all types used by the program
-
-fstrict-aliasing
,
-fno-strict-aliasing
¶
-
-fstrict-enums
,
-fno-strict-enums
¶
Enable optimizations based on the strict definition of an enum’s value range
-
-fstrict-overflow
,
-fno-strict-overflow
¶
-
-fstrict-return
,
-fno-strict-return
¶
Always treat control flow paths that fall off the end of a non-void function as unreachable
-
-fstrict-vtable-pointers
,
-fno-strict-vtable-pointers
¶
Enable optimizations based on the strict rules for overwriting polymorphic C++ objects
-
-fstruct-path-tbaa
,
-fno-struct-path-tbaa
¶
-
-ftabstop
=<arg>
¶
-
-ftemplate-backtrace-limit
=<arg>
¶
-
-ftemplate-depth-<arg>
¶
-
-ftemplate-depth
=<arg>
¶
-
-ftest-coverage
¶
-
-fthinlto-index
=<arg>
¶
Perform ThinLTO importing using provided function summary index
-
-fthreadsafe-statics
,
-fno-threadsafe-statics
¶
-
-ftime-report
¶
-
-ftls-model
=<arg>
¶
-
-ftrap-function
=<arg>
¶
Issue call to specified function rather than a trap instruction
-
-ftrapping-math
,
-fno-trapping-math
¶
-
-ftrapv
¶
Trap on integer overflow
-
-ftrapv-handler
<arg>
¶
-
-ftrapv-handler
=<function name>
¶
Specify the function to be called on overflow
-
-ftrigraphs
,
-fno-trigraphs
,
-trigraphs
,
--trigraphs
¶
Process trigraph sequences
-
-funique-section-names
,
-fno-unique-section-names
¶
Use unique names for text and data sections (ELF Only)
-
-funit-at-a-time
,
-fno-unit-at-a-time
¶
-
-funroll-loops
,
-fno-unroll-loops
¶
Turn on loop unroller
-
-funsafe-math-optimizations
,
-fno-unsafe-math-optimizations
¶
-
-funsigned-bitfields
¶
-
-funsigned-char
,
-fno-unsigned-char
,
--unsigned-char
¶
-
-funwind-tables
,
-fno-unwind-tables
¶
-
-fuse-cxa-atexit
,
-fno-use-cxa-atexit
¶
-
-fuse-init-array
,
-fno-use-init-array
¶
Use .init_array instead of .ctors
-
-fuse-ld
=<arg>
¶
-
-fuse-line-directives
,
-fno-use-line-directives
¶
-
-fveclib
=<arg>
¶
Use the given vector functions library
-
-fvectorize
,
-fno-vectorize
,
-ftree-vectorize
¶
Enable the loop vectorization passes
-
-fverbose-asm
,
-fno-verbose-asm
¶
Give inline C++ member functions hidden visibility by default
-
-fvisibility-ms-compat
¶
Give global types ‘default’ visibility and global functions and variables ‘hidden’ visibility by default
-
-fvisibility
=<arg>
¶
Set the default symbol visibility for all global declarations
-
-fwhole-program-vtables
,
-fno-whole-program-vtables
¶
Enables whole-program vtable optimization. Requires -flto
-
-fforce-emit-vtables
,
-fno-force-emit-vtables
¶
In order to improve devirtualization, forces emitting of vtables even in modules where it isn’t necessary. It causes more inline virtual functions to be emitted.
-
-fwrapv
,
-fno-wrapv
¶
Treat signed integer overflow as two’s complement
-
-fwritable-strings
¶
Store string literals as writable data
-
-fxray-always-emit-customevents
,
-fno-xray-always-emit-customevents
¶
Determine whether to always emit __xray_customevent(…) calls even if the function it appears in is not always instrumented.
-
-fxray-always-emit-typedevents
,
-fno-xray-always-emit-typedevents
¶
Determine whether to always emit __xray_typedevent(…) calls even if the function it appears in is not always instrumented.
-
-fxray-always-instrument
=<arg>
¶
DEPRECATED: Filename defining the whitelist for imbuing the ‘always instrument’ XRay attribute.
-
-fxray-attr-list
=<arg>
¶
Filename defining the list of functions/types for imbuing XRay attributes.
-
-fxray-instruction-threshold<arg>
¶
-
-fxray-instruction-threshold
=<arg>
¶
Sets the minimum function size to instrument with XRay
-
-fxray-instrument
,
-fno-xray-instrument
¶
Generate XRay instrumentation sleds on function entry and exit
-
-fxray-instrumentation-bundle
=<arg>
¶
Select which XRay instrumentation points to emit. Options: all, none, function, custom. Default is ‘all’.
-
-fxray-link-deps
¶
Tells clang to add the link dependencies for XRay.
-
-fxray-modes
=<arg>
¶
List of modes to link in by default into XRay instrumented binaries.
-
-fxray-never-instrument
=<arg>
¶
DEPRECATED: Filename defining the whitelist for imbuing the ‘never instrument’ XRay attribute.
-
-fzero-initialized-in-bss
,
-fno-zero-initialized-in-bss
¶
-
-fzvector
,
-fno-zvector
,
-mzvector
¶
Enable System z vector language extension
-
-pedantic
,
--pedantic
,
-no-pedantic
,
--no-pedantic
¶
-
-pedantic-errors
,
--pedantic-errors
¶
OpenCL flags¶
-
-cl-denorms-are-zero
¶
OpenCL only. Allow denormals to be flushed to zero.
-
-cl-fast-relaxed-math
¶
OpenCL only. Sets -cl-finite-math-only and -cl-unsafe-math-optimizations, and defines __FAST_RELAXED_MATH__.
-
-cl-finite-math-only
¶
OpenCL only. Allow floating-point optimizations that assume arguments and results are not NaNs or +-Inf.
-
-cl-fp32-correctly-rounded-divide-sqrt
¶
OpenCL only. Specify that single precision floating-point divide and sqrt used in the program source are correctly rounded.
-
-cl-kernel-arg-info
¶
OpenCL only. Generate kernel argument metadata.
-
-cl-mad-enable
¶
OpenCL only. Allow use of less precise MAD computations in the generated binary.
-
-cl-no-signed-zeros
¶
OpenCL only. Allow use of less precise no signed zeros computations in the generated binary.
-
-cl-opt-disable
¶
OpenCL only. This option disables all optimizations. By default optimizations are enabled.
-
-cl-single-precision-constant
¶
OpenCL only. Treat double precision floating-point constant as single precision constant.
-
-cl-std
=<arg>
¶
OpenCL language standard to compile for.
-
-cl-strict-aliasing
¶
OpenCL only. This option is added for compatibility with OpenCL 1.0.
-
-cl-uniform-work-group-size
¶
OpenCL only. Defines that the global work-size be a multiple of the work-group size specified to clEnqueueNDRangeKernel
-
-cl-unsafe-math-optimizations
¶
OpenCL only. Allow unsafe floating-point optimizations. Also implies -cl-no-signed-zeros and -cl-mad-enable.
Target-dependent compilation options¶
-
-G<size>
,
-G
=<arg>
,
-msmall-data-threshold
=<arg>
¶
Put objects of at most <size> bytes into small data section (MIPS / Hexagon)
-
-m16
¶
-
-m32
¶
-
-m64
¶
-
-mabi
=<arg>
¶
-
-mabicalls
,
-mno-abicalls
¶
Enable SVR4-style position-independent code (Mips only)
-
-mabs
=<arg>
¶
-
-malign-double
¶
Align doubles to two words in structs (x86 only)
-
-march
=<arg>
¶
-
-masm
=<arg>
¶
-
-mbackchain
,
-mno-backchain
¶
Link stack frames through backchain on System Z
-
-mcheck-zero-division
,
-mno-check-zero-division
¶
-
-mcmodel
=<arg>
¶
-
-mcompact-branches
=<arg>
¶
-
-mconsole<arg>
¶
-
-mcpu
=<arg>
,
-mv4
(equivalent to -mcpu=hexagonv4)
,
-mv5
(equivalent to -mcpu=hexagonv5)
,
-mv55
(equivalent to -mcpu=hexagonv55)
,
-mv60
(equivalent to -mcpu=hexagonv60)
,
-mv62
(equivalent to -mcpu=hexagonv62)
,
-mv65
(equivalent to -mcpu=hexagonv65)
¶
-
-mdefault-build-attributes<arg>
,
-mno-default-build-attributes<arg>
¶
-
-mdll<arg>
¶
-
-mdouble-float
¶
-
-mdsp
,
-mno-dsp
¶
-
-mdspr2
,
-mno-dspr2
¶
-
-mdynamic-no-pic<arg>
¶
-
-meabi
<arg>
¶
Set EABI type, e.g. 4, 5 or gnu (default depends on triple)
-
-membedded-data
,
-mno-embedded-data
¶
Place constants in the .rodata section instead of the .sdata section even if they meet the -G <size> threshold (MIPS)
-
-mextern-sdata
,
-mno-extern-sdata
¶
Assume that externally defined data is in the small data if it meets the -G <size> threshold (MIPS)
-
-mfentry
¶
Insert calls to fentry at function entry (x86 only)
-
-mfloat-abi
=<arg>
¶
-
-mfp32
¶
Use 32-bit floating point registers (MIPS only)
-
-mfp64
¶
Use 64-bit floating point registers (MIPS only)
-
-mfpmath
=<arg>
¶
-
-mfpu
=<arg>
¶
-
-mglobal-merge
,
-mno-global-merge
¶
Enable merging of globals
-
-mgpopt
,
-mno-gpopt
¶
Use GP relative accesses for symbols known to be in a small data section (MIPS)
-
-mhard-float
¶
-
-mhwdiv
=<arg>
,
--mhwdiv
<arg>
,
--mhwdiv
=<arg>
¶
-
-miamcu
,
-mno-iamcu
¶
Use Intel MCU ABI
-
-mimplicit-float
,
-mno-implicit-float
¶
-
-mimplicit-it
=<arg>
¶
-
-mincremental-linker-compatible
,
-mno-incremental-linker-compatible
¶
(integrated-as) Emit an object file which can be used with an incremental linker
-
-mindirect-jump
=<arg>
¶
Change indirect jump instructions to inhibit speculation
-
-miphoneos-version-min
=<arg>
,
-mios-version-min
=<arg>
¶
-
-mips16
¶
-
-mkernel
¶
-
-mldc1-sdc1
,
-mno-ldc1-sdc1
¶
-
-mlocal-sdata
,
-mno-local-sdata
¶
Extend the -G behaviour to object local data (MIPS)
-
-mlong-calls
,
-mno-long-calls
¶
Generate branches with extended addressability, usually via indirect jumps.
-
-mmacosx-version-min
=<arg>
,
-mmacos-version-min
=<arg>
¶
Set Mac OS X deployment target
-
-mmadd4
,
-mno-madd4
¶
Enable the generation of 4-operand madd.s, madd.d and related instructions.
-
-mmcu
=<arg>
¶
-
-mmicromips
,
-mno-micromips
¶
-
-mms-bitfields
,
-mno-ms-bitfields
¶
Set the default structure layout to be compatible with the Microsoft compiler standard
-
-mmsa
,
-mno-msa
¶
Enable MSA ASE (MIPS only)
-
-mmt
,
-mno-mt
¶
Enable MT ASE (MIPS only)
-
-mnan
=<arg>
¶
-
-mno-mips16
¶
-
-momit-leaf-frame-pointer
,
-mno-omit-leaf-frame-pointer
¶
Omit frame pointer setup for leaf functions
-
-moslib
=<arg>
¶
-
-mpie-copy-relocations
,
-mno-pie-copy-relocations
¶
Use copy relocations support for PIE builds
-
-mprefer-vector-width
=<arg>
¶
Specifies preferred vector width for auto-vectorization. Defaults to ‘none’ which allows target specific decisions.
-
-mqdsp6-compat
¶
Enable hexagon-qdsp6 backward compatibility
-
-mrecip
¶
-
-mrecip
=<arg1>,<arg2>...
¶
-
-mred-zone
,
-mno-red-zone
¶
-
-mregparm
=<arg>
¶
-
-mrelax-all
,
-mno-relax-all
¶
(integrated-as) Relax all machine instructions
-
-mrtd
,
-mno-rtd
¶
Make StdCall calling convention the default
-
-msingle-float
¶
-
-msoft-float
,
-mno-soft-float
¶
Use software floating point
-
-mstack-alignment
=<arg>
¶
Set the stack alignment
-
-mstack-arg-probe
,
-mno-stack-arg-probe
¶
Enable stack probes
-
-mstack-probe-size
=<arg>
¶
Set the stack probe size
-
-mstackrealign
,
-mno-stackrealign
¶
Force realign the stack at entry to every function
-
-mthread-model
<arg>
¶
The thread model to use, e.g. posix, single (posix by default)
-
-mthreads<arg>
¶
-
-mthumb
,
-mno-thumb
¶
-
-mtune
=<arg>
¶
-
-mtvos-version-min
=<arg>
,
-mappletvos-version-min
=<arg>
¶
-
-municode<arg>
¶
-
-mvx
,
-mno-vx
¶
-
-mwarn-nonportable-cfstrings
,
-mno-warn-nonportable-cfstrings
¶
-
-mwatchos-version-min
=<arg>
¶
-
-mwindows<arg>
¶
-
-mx32
¶
-
-mxgot
,
-mno-xgot
¶
AARCH64¶
-
-ffixed-x18
¶
Reserve the x18 register (AArch64 only)
-
-ffixed-x20
¶
Reserve the x20 register (AArch64 only)
-
-mfix-cortex-a53-835769
,
-mno-fix-cortex-a53-835769
¶
Workaround Cortex-A53 erratum 835769 (AArch64 only)
-
-mgeneral-regs-only
¶
Generate code which only uses the general purpose registers (AArch64 only)
ARM¶
-
-ffixed-r9
¶
Reserve the r9 register (ARM only)
-
-mcrc
¶
Allow use of CRC instructions (ARM only)
-
-mexecute-only
,
-mno-execute-only
,
-mpure-code
¶
Disallow generation of data access to code sections (ARM only)
-
-mno-movt
¶
Disallow use of movt/movw pairs (ARM only)
-
-mno-neg-immediates
¶
Disallow converting instructions with negative immediates to their negation or inversion.
-
-mnocrc
¶
Disallow use of CRC instructions (ARM only)
-
-mrestrict-it
,
-mno-restrict-it
¶
Disallow generation of deprecated IT blocks for ARMv8. It is on by default for ARMv8 Thumb mode.
-
-mtp
=<arg>
¶
Read thread pointer from coprocessor register (ARM only)
-
-munaligned-access
,
-mno-unaligned-access
¶
Allow memory accesses to be unaligned (AArch32/AArch64 only)
Hexagon¶
-
-mhvx
,
-mno-hvx
¶
Enable Hexagon Vector eXtensions
-
-mhvx-length
=<arg>
¶
Set Hexagon Vector Length
-
-mhvx
=<arg>
¶
Enable Hexagon Vector eXtensions
PowerPC¶
-
-maltivec
,
-mno-altivec
¶
-
-mcmpb
,
-mno-cmpb
¶
-
-mcrbits
,
-mno-crbits
¶
-
-mcrypto
,
-mno-crypto
¶
-
-mdirect-move
,
-mno-direct-move
¶
-
-mfloat128
,
-mno-float128
¶
-
-mfprnd
,
-mno-fprnd
¶
-
-mhtm
,
-mno-htm
¶
-
-minvariant-function-descriptors
,
-mno-invariant-function-descriptors
¶
-
-misel
,
-mno-isel
¶
-
-mlongcall
,
-mno-longcall
¶
-
-mmfocrf
,
-mmfcrf
,
-mno-mfocrf
¶
-
-mpopcntd
,
-mno-popcntd
¶
-
-mpower8-vector
,
-mno-power8-vector
¶
-
-mpower9-vector
,
-mno-power9-vector
¶
-
-mqpx
,
-mno-qpx
¶
-
-msecure-plt
¶
-
-mvsx
,
-mno-vsx
¶
WebAssembly¶
-
-mexception-handling
,
-mno-exception-handling
¶
-
-mnontrapping-fptoint
,
-mno-nontrapping-fptoint
¶
-
-msign-ext
,
-mno-sign-ext
¶
-
-msimd128
,
-mno-simd128
¶
X86¶
-
-m3dnow
,
-mno-3dnow
¶
-
-m3dnowa
,
-mno-3dnowa
¶
-
-madx
,
-mno-adx
¶
-
-maes
,
-mno-aes
¶
-
-mavx
,
-mno-avx
¶
-
-mavx2
,
-mno-avx2
¶
-
-mavx512bitalg
,
-mno-avx512bitalg
¶
-
-mavx512bw
,
-mno-avx512bw
¶
-
-mavx512cd
,
-mno-avx512cd
¶
-
-mavx512dq
,
-mno-avx512dq
¶
-
-mavx512er
,
-mno-avx512er
¶
-
-mavx512f
,
-mno-avx512f
¶
-
-mavx512ifma
,
-mno-avx512ifma
¶
-
-mavx512pf
,
-mno-avx512pf
¶
-
-mavx512vbmi
,
-mno-avx512vbmi
¶
-
-mavx512vbmi2
,
-mno-avx512vbmi2
¶
-
-mavx512vl
,
-mno-avx512vl
¶
-
-mavx512vnni
,
-mno-avx512vnni
¶
-
-mavx512vpopcntdq
,
-mno-avx512vpopcntdq
¶
-
-mbmi
,
-mno-bmi
¶
-
-mbmi2
,
-mno-bmi2
¶
-
-mcldemote
,
-mno-cldemote
¶
-
-mclflushopt
,
-mno-clflushopt
¶
-
-mclwb
,
-mno-clwb
¶
-
-mclzero
,
-mno-clzero
¶
-
-mcx16
,
-mno-cx16
¶
-
-mf16c
,
-mno-f16c
¶
-
-mfma
,
-mno-fma
¶
-
-mfma4
,
-mno-fma4
¶
-
-mfsgsbase
,
-mno-fsgsbase
¶
-
-mfxsr
,
-mno-fxsr
¶
-
-mgfni
,
-mno-gfni
¶
-
-mlwp
,
-mno-lwp
¶
-
-mlzcnt
,
-mno-lzcnt
¶
-
-mmmx
,
-mno-mmx
¶
-
-mmovbe
,
-mno-movbe
¶
-
-mmovdiri
,
-mno-movdiri
¶
-
-mmovdir64b
,
-mno-movdir64b
¶
-
-mmpx
,
-mno-mpx
¶
-
-mmwaitx
,
-mno-mwaitx
¶
-
-mpclmul
,
-mno-pclmul
¶
-
-mpku
,
-mno-pku
¶
-
-mpopcnt
,
-mno-popcnt
¶
-
-mprefetchwt1
,
-mno-prefetchwt1
¶
-
-mprfchw
,
-mno-prfchw
¶
-
-mrdpid
,
-mno-rdpid
¶
-
-mrdrnd
,
-mno-rdrnd
¶
-
-mrdseed
,
-mno-rdseed
¶
-
-mretpoline
,
-mno-retpoline
¶
-
-mretpoline-external-thunk
,
-mno-retpoline-external-thunk
¶
-
-mrtm
,
-mno-rtm
¶
-
-msahf
,
-mno-sahf
¶
-
-msgx
,
-mno-sgx
¶
-
-msha
,
-mno-sha
¶
-
-mshstk
,
-mno-shstk
¶
-
-msse
,
-mno-sse
¶
-
-msse2
,
-mno-sse2
¶
-
-msse3
,
-mno-sse3
¶
-
-msse4.1
,
-mno-sse4.1
¶
-
-msse4.2
,
-mno-sse4.2
,
-msse4
¶
-
-msse4a
,
-mno-sse4a
¶
-
-mssse3
,
-mno-ssse3
¶
-
-mtbm
,
-mno-tbm
¶
-
-mvaes
,
-mno-vaes
¶
-
-mvpclmulqdq
,
-mno-vpclmulqdq
¶
-
-mwaitpkg
,
-mno-waitpkg
¶
-
-mwbnoinvd
,
-mno-wbnoinvd
¶
-
-mx87
,
-m80387
,
-mno-x87
¶
-
-mxop
,
-mno-xop
¶
-
-mxsave
,
-mno-xsave
¶
-
-mxsavec
,
-mno-xsavec
¶
-
-mxsaveopt
,
-mno-xsaveopt
¶
-
-mxsaves
,
-mno-xsaves
¶
Optimization level¶
Flags controlling how much optimization should be performed.
-
-O<arg>
,
-O
(equivalent to -O2)
,
--optimize
,
--optimize
=<arg>
¶
-
-Ofast<arg>
¶
Debug information generation¶
Flags controlling how much and what kind of debug information should be generated.
Kind and level of debug information¶
-
-g
,
--debug
,
--debug
=<arg>
¶
Generate source-level debug information
-
-gdwarf-2
¶
Generate source-level debug information with dwarf version 2
-
-gdwarf-3
¶
Generate source-level debug information with dwarf version 3
-
-gdwarf-4
,
-gdwarf
¶
Generate source-level debug information with dwarf version 4
-
-gdwarf-5
¶
Generate source-level debug information with dwarf version 5
-
-gfull
¶
-
-gused
¶
Debug information flags¶
-
-gcolumn-info
,
-gno-column-info
¶
-
-gdwarf-aranges
¶
-
-gembed-source
,
-gno-embed-source
¶
Embed source text in DWARF debug sections
-
-ggnu-pubnames
¶
-
-grecord-gcc-switches
,
-gno-record-gcc-switches
¶
-
-gsplit-dwarf
¶
-
-gstrict-dwarf
,
-gno-strict-dwarf
¶
-
-gz
¶
DWARF debug sections compression type
-
-gz
=<arg>
¶
DWARF debug sections compression type
Static analyzer flags¶
Flags controlling the behavior of the Clang Static Analyzer.
-
-Xanalyzer
<arg>
¶
Pass <arg> to the static analyzer
Fortran compilation flags¶
Flags that will be passed onto the gfortran
compiler when Clang is given
a Fortran input.
-
-A<arg>
,
--assert
<arg>
,
--assert
=<arg>
¶
-
-A-<arg>
¶
-
-J<arg>
¶
-
-cpp
¶
-
-faggressive-function-elimination
,
-fno-aggressive-function-elimination
¶
-
-falign-commons
,
-fno-align-commons
¶
-
-fall-intrinsics
,
-fno-all-intrinsics
¶
-
-fautomatic
,
-fno-automatic
¶
-
-fbackslash
,
-fno-backslash
¶
-
-fbacktrace
,
-fno-backtrace
¶
-
-fblas-matmul-limit
=<arg>
¶
-
-fbounds-check
,
-fno-bounds-check
¶
-
-fcheck-array-temporaries
,
-fno-check-array-temporaries
¶
-
-fcheck
=<arg>
¶
-
-fcoarray
=<arg>
¶
-
-fconvert
=<arg>
¶
-
-fcray-pointer
,
-fno-cray-pointer
¶
-
-fd-lines-as-code
,
-fno-d-lines-as-code
¶
-
-fd-lines-as-comments
,
-fno-d-lines-as-comments
¶
-
-fdefault-double-8
,
-fno-default-double-8
¶
-
-fdefault-integer-8
,
-fno-default-integer-8
¶
-
-fdefault-real-8
,
-fno-default-real-8
¶
-
-fdollar-ok
,
-fno-dollar-ok
¶
-
-fdump-fortran-optimized
,
-fno-dump-fortran-optimized
¶
-
-fdump-fortran-original
,
-fno-dump-fortran-original
¶
-
-fdump-parse-tree
,
-fno-dump-parse-tree
¶
-
-fexternal-blas
,
-fno-external-blas
¶
-
-ff2c
,
-fno-f2c
¶
-
-ffixed-form
,
-fno-fixed-form
¶
-
-ffixed-line-length-<arg>
¶
-
-ffpe-trap
=<arg>
¶
-
-ffree-form
,
-fno-free-form
¶
-
-ffree-line-length-<arg>
¶
-
-ffrontend-optimize
,
-fno-frontend-optimize
¶
-
-fimplicit-none
,
-fno-implicit-none
¶
-
-finit-character
=<arg>
¶
-
-finit-integer
=<arg>
¶
-
-finit-local-zero
,
-fno-init-local-zero
¶
-
-finit-logical
=<arg>
¶
-
-finit-real
=<arg>
¶
-
-finteger-4-integer-8
,
-fno-integer-4-integer-8
¶
-
-fintrinsic-modules-path
,
-fno-intrinsic-modules-path
¶
-
-fmax-array-constructor
=<arg>
¶
-
-fmax-errors
=<arg>
¶
-
-fmax-identifier-length
,
-fno-max-identifier-length
¶
-
-fmax-stack-var-size
=<arg>
¶
-
-fmax-subrecord-length
=<arg>
¶
-
-fmodule-private
,
-fno-module-private
¶
-
-fpack-derived
,
-fno-pack-derived
¶
-
-fprotect-parens
,
-fno-protect-parens
¶
-
-frange-check
,
-fno-range-check
¶
-
-freal-4-real-10
,
-fno-real-4-real-10
¶
-
-freal-4-real-16
,
-fno-real-4-real-16
¶
-
-freal-4-real-8
,
-fno-real-4-real-8
¶
-
-freal-8-real-10
,
-fno-real-8-real-10
¶
-
-freal-8-real-16
,
-fno-real-8-real-16
¶
-
-freal-8-real-4
,
-fno-real-8-real-4
¶
-
-frealloc-lhs
,
-fno-realloc-lhs
¶
-
-frecord-marker
=<arg>
¶
-
-frecursive
,
-fno-recursive
¶
-
-frepack-arrays
,
-fno-repack-arrays
¶
-
-fsecond-underscore
,
-fno-second-underscore
¶
-
-fsign-zero
,
-fno-sign-zero
¶
-
-fstack-arrays
,
-fno-stack-arrays
¶
-
-funderscoring
,
-fno-underscoring
¶
-
-fwhole-file
,
-fno-whole-file
¶
-
-imultilib
<arg>
¶
-
-nocpp
¶
-
-static-libgfortran
¶
Linker flags¶
Flags that are passed on to the linker
-
-L<dir>
,
--library-directory
<arg>
,
--library-directory
=<arg>
¶
Add directory to library search path
-
-Mach
¶
-
-T<script>
¶
Specify <script> as linker script
-
-Tbss<addr>
¶
Set starting address of BSS to <addr>
-
-Tdata<addr>
¶
Set starting address of DATA to <addr>
-
-Ttext<addr>
¶
Set starting address of TEXT to <addr>
-
-Wl,<arg>,<arg2>...
¶
Pass the comma separated arguments in <arg> to the linker
-
-X
¶
-
-Xlinker
<arg>
,
--for-linker
<arg>
,
--for-linker
=<arg>
¶
Pass <arg> to the linker
-
-Z
¶
-
-e<arg>
,
--entry
¶
-
-filelist
<arg>
¶
-
-l<arg>
¶
-
-r
¶
-
-rpath
<arg>
¶
-
-s
¶
-
-t
¶
-
-u<arg>
,
--force-link
<arg>
,
--force-link
=<arg>
¶
-
-undef
¶
undef all system defines
-
-undefined<arg>
,
--no-undefined
¶
-
-z
<arg>
¶
Pass -z <arg> to the linker
Attributes in Clang¶
Diagnostic flags in Clang¶
- Introduction
- Diagnostic flags
- -W
- -W#pragma-messages
- -W#warnings
- -WCFString-literal
- -WCL4
- -WIndependentClass-attribute
- -WNSObject-attribute
- -Wabi
- -Wabsolute-value
- -Wabstract-final-class
- -Wabstract-vbase-init
- -Waddress
- -Waddress-of-array-temporary
- -Waddress-of-packed-member
- -Waddress-of-temporary
- -Waggregate-return
- -Waligned-allocation-unavailable
- -Wall
- -Walloca-with-align-alignof
- -Wambiguous-delete
- -Wambiguous-ellipsis
- -Wambiguous-macro
- -Wambiguous-member-template
- -Wanalyzer-incompatible-plugin
- -Wanonymous-pack-parens
- -Warc
- -Warc-bridge-casts-disallowed-in-nonarc
- -Warc-maybe-repeated-use-of-weak
- -Warc-non-pod-memaccess
- -Warc-performSelector-leaks
- -Warc-repeated-use-of-weak
- -Warc-retain-cycles
- -Warc-unsafe-retained-assign
- -Warray-bounds
- -Warray-bounds-pointer-arithmetic
- -Wasm
- -Wasm-ignored-qualifier
- -Wasm-operand-widths
- -Wassign-enum
- -Wassume
- -Wat-protocol
- -Watomic-memory-ordering
- -Watomic-properties
- -Watomic-property-with-user-defined-accessor
- -Wattribute-packed-for-bitfield
- -Wattributes
- -Wauto-disable-vptr-sanitizer
- -Wauto-import
- -Wauto-storage-class
- -Wauto-var-id
- -Wavailability
- -Wbackend-plugin
- -Wbackslash-newline-escape
- -Wbad-function-cast
- -Wbinary-literal
- -Wbind-to-temporary-copy
- -Wbitfield-constant-conversion
- -Wbitfield-enum-conversion
- -Wbitfield-width
- -Wbitwise-op-parentheses
- -Wblock-capture-autoreleasing
- -Wbool-conversion
- -Wbool-conversions
- -Wbraced-scalar-init
- -Wbridge-cast
- -Wbuiltin-macro-redefined
- -Wbuiltin-memcpy-chk-size
- -Wbuiltin-requires-header
- -Wc++-compat
- -Wc++0x-compat
- -Wc++0x-extensions
- -Wc++0x-narrowing
- -Wc++11-compat
- -Wc++11-compat-deprecated-writable-strings
- -Wc++11-compat-pedantic
- -Wc++11-compat-reserved-user-defined-literal
- -Wc++11-extensions
- -Wc++11-extra-semi
- -Wc++11-inline-namespace
- -Wc++11-long-long
- -Wc++11-narrowing
- -Wc++14-binary-literal
- -Wc++14-compat
- -Wc++14-compat-pedantic
- -Wc++14-extensions
- -Wc++17-compat
- -Wc++17-compat-mangling
- -Wc++17-compat-pedantic
- -Wc++17-extensions
- -Wc++1y-extensions
- -Wc++1z-compat
- -Wc++1z-compat-mangling
- -Wc++1z-extensions
- -Wc++2a-compat
- -Wc++2a-compat-pedantic
- -Wc++2a-extensions
- -Wc++98-c++11-c++14-c++17-compat
- -Wc++98-c++11-c++14-c++17-compat-pedantic
- -Wc++98-c++11-c++14-compat
- -Wc++98-c++11-c++14-compat-pedantic
- -Wc++98-c++11-compat
- -Wc++98-c++11-compat-binary-literal
- -Wc++98-c++11-compat-pedantic
- -Wc++98-compat
- -Wc++98-compat-bind-to-temporary-copy
- -Wc++98-compat-local-type-template-args
- -Wc++98-compat-pedantic
- -Wc++98-compat-unnamed-type-template-args
- -Wc11-extensions
- -Wc99-compat
- -Wc99-extensions
- -Wcast-align
- -Wcast-calling-convention
- -Wcast-of-sel-type
- -Wcast-qual
- -Wchar-align
- -Wchar-subscripts
- -Wclang-cl-pch
- -Wclass-varargs
- -Wcomma
- -Wcomment
- -Wcomments
- -Wcompare-distinct-pointer-types
- -Wcomplex-component-init
- -Wconditional-type-mismatch
- -Wconditional-uninitialized
- -Wconfig-macros
- -Wconstant-conversion
- -Wconstant-logical-operand
- -Wconstexpr-not-const
- -Wconsumed
- -Wconversion
- -Wconversion-null
- -Wcoroutine
- -Wcoroutine-missing-unhandled-exception
- -Wcovered-switch-default
- -Wcpp
- -Wcstring-format-directive
- -Wctor-dtor-privacy
- -Wcuda-compat
- -Wcustom-atomic-properties
- -Wdangling-else
- -Wdangling-field
- -Wdangling-initializer-list
- -Wdate-time
- -Wdealloc-in-category
- -Wdebug-compression-unavailable
- -Wdeclaration-after-statement
- -Wdelegating-ctor-cycles
- -Wdelete-incomplete
- -Wdelete-non-virtual-dtor
- -Wdeprecated
- -Wdeprecated-attributes
- -Wdeprecated-declarations
- -Wdeprecated-dynamic-exception-spec
- -Wdeprecated-implementations
- -Wdeprecated-increment-bool
- -Wdeprecated-objc-isa-usage
- -Wdeprecated-objc-pointer-introspection
- -Wdeprecated-objc-pointer-introspection-performSelector
- -Wdeprecated-register
- -Wdeprecated-writable-strings
- -Wdirect-ivar-access
- -Wdisabled-macro-expansion
- -Wdisabled-optimization
- -Wdiscard-qual
- -Wdistributed-object-modifiers
- -Wdiv-by-zero
- -Wdivision-by-zero
- -Wdll-attribute-on-redeclaration
- -Wdllexport-explicit-instantiation-decl
- -Wdllimport-static-field-def
- -Wdocumentation
- -Wdocumentation-deprecated-sync
- -Wdocumentation-html
- -Wdocumentation-pedantic
- -Wdocumentation-unknown-command
- -Wdollar-in-identifier-extension
- -Wdouble-promotion
- -Wduplicate-decl-specifier
- -Wduplicate-enum
- -Wduplicate-method-arg
- -Wduplicate-method-match
- -Wduplicate-protocol
- -Wdynamic-class-memaccess
- -Wdynamic-exception-spec
- -Weffc++
- -Wembedded-directive
- -Wempty-body
- -Wempty-decomposition
- -Wempty-translation-unit
- -Wencode-type
- -Wendif-labels
- -Wenum-compare
- -Wenum-compare-switch
- -Wenum-conversion
- -Wenum-too-large
- -Wexceptions
- -Wexit-time-destructors
- -Wexpansion-to-defined
- -Wexplicit-initialize-call
- -Wexplicit-ownership-type
- -Wextended-offsetof
- -Wextern-c-compat
- -Wextern-initializer
- -Wextra
- -Wextra-qualification
- -Wextra-semi
- -Wextra-tokens
- -Wfallback
- -Wflag-enum
- -Wflexible-array-extensions
- -Wfloat-conversion
- -Wfloat-equal
- -Wfloat-overflow-conversion
- -Wfloat-zero-conversion
- -Wfor-loop-analysis
- -Wformat
- -Wformat-extra-args
- -Wformat-invalid-specifier
- -Wformat-non-iso
- -Wformat-nonliteral
- -Wformat-pedantic
- -Wformat-security
- -Wformat-y2k
- -Wformat-zero-length
- -Wformat=2
- -Wfour-char-constants
- -Wframe-larger-than=
- -Wfunction-def-in-objc-container
- -Wfuture-compat
- -Wgcc-compat
- -Wglobal-constructors
- -Wgnu
- -Wgnu-alignof-expression
- -Wgnu-anonymous-struct
- -Wgnu-array-member-paren-init
- -Wgnu-auto-type
- -Wgnu-binary-literal
- -Wgnu-case-range
- -Wgnu-complex-integer
- -Wgnu-compound-literal-initializer
- -Wgnu-conditional-omitted-operand
- -Wgnu-designator
- -Wgnu-empty-initializer
- -Wgnu-empty-struct
- -Wgnu-flexible-array-initializer
- -Wgnu-flexible-array-union-member
- -Wgnu-folding-constant
- -Wgnu-imaginary-constant
- -Wgnu-include-next
- -Wgnu-label-as-value
- -Wgnu-redeclared-enum
- -Wgnu-statement-expression
- -Wgnu-static-float-init
- -Wgnu-string-literal-operator-template
- -Wgnu-union-cast
- -Wgnu-variable-sized-type-not-at-end
- -Wgnu-zero-line-directive
- -Wgnu-zero-variadic-macro-arguments
- -Wheader-guard
- -Wheader-hygiene
- -Widiomatic-parentheses
- -Wignored-attributes
- -Wignored-optimization-argument
- -Wignored-pragma-intrinsic
- -Wignored-pragmas
- -Wignored-qualifiers
- -Wimplicit
- -Wimplicit-atomic-properties
- -Wimplicit-conversion-floating-point-to-bool
- -Wimplicit-exception-spec-mismatch
- -Wimplicit-fallthrough
- -Wimplicit-fallthrough-per-function
- -Wimplicit-function-declaration
- -Wimplicit-int
- -Wimplicit-retain-self
- -Wimplicitly-unsigned-literal
- -Wimport
- -Wimport-preprocessor-directive-pedantic
- -Winaccessible-base
- -Winclude-next-absolute-path
- -Winclude-next-outside-header
- -Wincompatible-exception-spec
- -Wincompatible-function-pointer-types
- -Wincompatible-library-redeclaration
- -Wincompatible-ms-struct
- -Wincompatible-pointer-types
- -Wincompatible-pointer-types-discards-qualifiers
- -Wincompatible-property-type
- -Wincompatible-sysroot
- -Wincomplete-implementation
- -Wincomplete-module
- -Wincomplete-umbrella
- -Winconsistent-dllimport
- -Winconsistent-missing-destructor-override
- -Winconsistent-missing-override
- -Wincrement-bool
- -Winfinite-recursion
- -Winit-self
- -Winitializer-overrides
- -Winjected-class-name
- -Winline
- -Winline-asm
- -Winline-new-delete
- -Winstantiation-after-specialization
- -Wint-conversion
- -Wint-conversions
- -Wint-to-pointer-cast
- -Wint-to-void-pointer-cast
- -Winteger-overflow
- -Winvalid-command-line-argument
- -Winvalid-constexpr
- -Winvalid-iboutlet
- -Winvalid-initializer-from-system-header
- -Winvalid-ios-deployment-target
- -Winvalid-noreturn
- -Winvalid-offsetof
- -Winvalid-or-nonexistent-directory
- -Winvalid-partial-specialization
- -Winvalid-pch
- -Winvalid-pp-token
- -Winvalid-source-encoding
- -Winvalid-token-paste
- -Wjump-seh-finally
- -Wkeyword-compat
- -Wkeyword-macro
- -Wknr-promoted-parameter
- -Wlanguage-extension-token
- -Wlarge-by-value-copy
- -Wliblto
- -Wliteral-conversion
- -Wliteral-range
- -Wlocal-type-template-args
- -Wlogical-not-parentheses
- -Wlogical-op-parentheses
- -Wlong-long
- -Wloop-analysis
- -Wmacro-redefined
- -Wmain
- -Wmain-return-type
- -Wmalformed-warning-check
- -Wmany-braces-around-scalar-init
- -Wmax-unsigned-zero
- -Wmemsize-comparison
- -Wmethod-signatures
- -Wmicrosoft
- -Wmicrosoft-anon-tag
- -Wmicrosoft-cast
- -Wmicrosoft-charize
- -Wmicrosoft-comment-paste
- -Wmicrosoft-const-init
- -Wmicrosoft-cpp-macro
- -Wmicrosoft-default-arg-redefinition
- -Wmicrosoft-end-of-file
- -Wmicrosoft-enum-forward-reference
- -Wmicrosoft-enum-value
- -Wmicrosoft-exception-spec
- -Wmicrosoft-exists
- -Wmicrosoft-explicit-constructor-call
- -Wmicrosoft-extra-qualification
- -Wmicrosoft-fixed-enum
- -Wmicrosoft-flexible-array
- -Wmicrosoft-goto
- -Wmicrosoft-include
- -Wmicrosoft-mutable-reference
- -Wmicrosoft-pure-definition
- -Wmicrosoft-redeclare-static
- -Wmicrosoft-sealed
- -Wmicrosoft-template
- -Wmicrosoft-union-member-reference
- -Wmicrosoft-unqualified-friend
- -Wmicrosoft-using-decl
- -Wmicrosoft-void-pseudo-dtor
- -Wmismatched-new-delete
- -Wmismatched-parameter-types
- -Wmismatched-return-types
- -Wmismatched-tags
- -Wmissing-braces
- -Wmissing-declarations
- -Wmissing-exception-spec
- -Wmissing-field-initializers
- -Wmissing-format-attribute
- -Wmissing-include-dirs
- -Wmissing-method-return-type
- -Wmissing-noescape
- -Wmissing-noreturn
- -Wmissing-prototype-for-cc
- -Wmissing-prototypes
- -Wmissing-selector-name
- -Wmissing-sysroot
- -Wmissing-variable-declarations
- -Rmodule-build
- -Wmodule-conflict
- -Wmodule-file-config-mismatch
- -Wmodule-file-extension
- -Wmodule-import-in-extern-c
- -Wmodules-ambiguous-internal-linkage
- -Wmodules-import-nested-redundant
- -Wmost
- -Wmove
- -Wmsvc-include
- -Wmsvc-not-found
- -Wmultichar
- -Wmultiple-move-vbase
- -Wnarrowing
- -Wnested-anon-types
- -Wnested-externs
- -Wnew-returns-null
- -Wnewline-eof
- -Wnoexcept-type
- -Wnon-gcc
- -Wnon-literal-null-conversion
- -Wnon-modular-include-in-framework-module
- -Wnon-modular-include-in-module
- -Wnon-pod-varargs
- -Wnon-virtual-dtor
- -Wnonnull
- -Wnonportable-cfstrings
- -Wnonportable-include-path
- -Wnonportable-system-include-path
- -Wnonportable-vector-initialization
- -Wnsconsumed-mismatch
- -Wnsreturns-mismatch
- -Wnull-arithmetic
- -Wnull-character
- -Wnull-conversion
- -Wnull-dereference
- -Wnull-pointer-arithmetic
- -Wnullability
- -Wnullability-completeness
- -Wnullability-completeness-on-arrays
- -Wnullability-declspec
- -Wnullability-extension
- -Wnullability-inferred-on-nested-type
- -Wnullable-to-nonnull-conversion
- -Wobjc-autosynthesis-property-ivar-name-match
- -Wobjc-circular-container
- -Wobjc-cocoa-api
- -Wobjc-designated-initializers
- -Wobjc-flexible-array
- -Wobjc-forward-class-redefinition
- -Wobjc-interface-ivars
- -Wobjc-literal-compare
- -Wobjc-literal-conversion
- -Wobjc-macro-redefinition
- -Wobjc-messaging-id
- -Wobjc-method-access
- -Wobjc-missing-property-synthesis
- -Wobjc-missing-super-calls
- -Wobjc-multiple-method-names
- -Wobjc-noncopy-retain-block-property
- -Wobjc-nonunified-exceptions
- -Wobjc-property-implementation
- -Wobjc-property-implicit-mismatch
- -Wobjc-property-matches-cocoa-ownership-rule
- -Wobjc-property-no-attribute
- -Wobjc-property-synthesis
- -Wobjc-protocol-method-implementation
- -Wobjc-protocol-property-synthesis
- -Wobjc-protocol-qualifiers
- -Wobjc-readonly-with-setter-property
- -Wobjc-redundant-api-use
- -Wobjc-redundant-literal-use
- -Wobjc-root-class
- -Wobjc-string-compare
- -Wobjc-string-concatenation
- -Wobjc-unsafe-perform-selector
- -Wodr
- -Wold-style-cast
- -Wold-style-definition
- -Wopencl-unsupported-rgba
- -Wopenmp-clauses
- -Wopenmp-loop-form
- -Wopenmp-target
- -Woption-ignored
- -Wout-of-line-declaration
- -Wout-of-scope-function
- -Wover-aligned
- -Woverflow
- -Woverlength-strings
- -Woverloaded-shift-op-parentheses
- -Woverloaded-virtual
- -Woverride-module
- -Woverriding-method-mismatch
- -Woverriding-t-option
- -Wpacked
- -Wpadded
- -Wparentheses
- -Wparentheses-equality
- -Wpartial-availability
- -Rpass
- -Rpass-analysis
- -Wpass-failed
- -Rpass-missed
- -Wpch-date-time
- -Wpedantic
- -Wpedantic-core-features
- -Wpessimizing-move
- -Wpointer-arith
- -Wpointer-bool-conversion
- -Wpointer-sign
- -Wpointer-to-int-cast
- -Wpointer-type-mismatch
- -Wpotentially-evaluated-expression
- -Wpragma-clang-attribute
- -Wpragma-once-outside-header
- -Wpragma-pack
- -Wpragma-pack-suspicious-include
- -Wpragma-system-header-outside-header
- -Wpragmas
- -Wpredefined-identifier-outside-function
- -Wprivate-extern
- -Wprivate-header
- -Wprivate-module
- -Wprofile-instr-missing
- -Wprofile-instr-out-of-date
- -Wprofile-instr-unprofiled
- -Wproperty-access-dot-syntax
- -Wproperty-attribute-mismatch
- -Wprotocol
- -Wprotocol-property-synthesis-ambiguity
- -Wqualified-void-return-type
- -Wrange-loop-analysis
- -Wreadonly-iboutlet-property
- -Wreceiver-expr
- -Wreceiver-forward-class
- -Wredeclared-class-member
- -Wredundant-decls
- -Wredundant-move
- -Wredundant-parens
- -Wregister
- -Wreinterpret-base-class
- -Rremark-backend-plugin
- -Wreorder
- -Wrequires-super-attribute
- -Wreserved-id-macro
- -Wreserved-user-defined-literal
- -Wretained-language-linkage
- -Wreturn-stack-address
- -Wreturn-type
- -Wreturn-type-c-linkage
- -Wrtti-for-exceptions
- -Rsanitize-address
- -Wsection
- -Wselector
- -Wselector-type-mismatch
- -Wself-assign
- -Wself-assign-field
- -Wself-move
- -Wsemicolon-before-method-body
- -Wsentinel
- -Wsequence-point
- -Wserialized-diagnostics
- -Wshadow
- -Wshadow-all
- -Wshadow-field
- -Wshadow-field-in-constructor
- -Wshadow-field-in-constructor-modified
- -Wshadow-ivar
- -Wshadow-uncaptured-local
- -Wshift-count-negative
- -Wshift-count-overflow
- -Wshift-negative-value
- -Wshift-op-parentheses
- -Wshift-overflow
- -Wshift-sign-overflow
- -Wshorten-64-to-32
- -Wsign-compare
- -Wsign-conversion
- -Wsign-promo
- -Wsigned-enum-bitfield
- -Wsizeof-array-argument
- -Wsizeof-array-decay
- -Wsizeof-pointer-memaccess
- -Wslash-u-filename
- -Wsometimes-uninitialized
- -Wsource-uses-openmp
- -Wspir-compat
- -Wstack-protector
- -Wstatic-float-init
- -Wstatic-in-inline
- -Wstatic-inline-explicit-instantiation
- -Wstatic-local-in-inline
- -Wstatic-self-init
- -Wstrict-aliasing
- -Wstrict-aliasing=0
- -Wstrict-aliasing=1
- -Wstrict-aliasing=2
- -Wstrict-overflow
- -Wstrict-overflow=0
- -Wstrict-overflow=1
- -Wstrict-overflow=2
- -Wstrict-overflow=3
- -Wstrict-overflow=4
- -Wstrict-overflow=5
- -Wstrict-prototypes
- -Wstrict-prototypes
- -Wstrict-selector-match
- -Wstring-compare
- -Wstring-conversion
- -Wstring-plus-char
- -Wstring-plus-int
- -Wstrlcpy-strlcat-size
- -Wstrncat-size
- -Wsuper-class-method-mismatch
- -Wswitch
- -Wswitch-bool
- -Wswitch-default
- -Wswitch-enum
- -Wsync-fetch-and-nand-semantics-changed
- -Wsynth
- -Wtautological-compare
- -Wtautological-constant-compare
- -Wtautological-constant-out-of-range-compare
- -Wtautological-overlap-compare
- -Wtautological-pointer-compare
- -Wtautological-undefined-compare
- -Wtautological-unsigned-enum-zero-compare
- -Wtautological-unsigned-zero-compare
- -Wtentative-definition-incomplete-type
- -Wthread-safety
- -Wthread-safety-analysis
- -Wthread-safety-attributes
- -Wthread-safety-beta
- -Wthread-safety-negative
- -Wthread-safety-precise
- -Wthread-safety-reference
- -Wthread-safety-verbose
- -Wtrigraphs
- -Wtype-limits
- -Wtype-safety
- -Wtypedef-redefinition
- -Wtypename-missing
- -Wunable-to-open-stats-file
- -Wunavailable-declarations
- -Wundeclared-selector
- -Wundef
- -Wundefined-bool-conversion
- -Wundefined-func-template
- -Wundefined-inline
- -Wundefined-internal
- -Wundefined-internal-type
- -Wundefined-reinterpret-cast
- -Wundefined-var-template
- -Wunevaluated-expression
- -Wunguarded-availability
- -Wunguarded-availability-new
- -Wunicode
- -Wunicode-whitespace
- -Wuninitialized
- -Wunknown-argument
- -Wunknown-attributes
- -Wunknown-escape-sequence
- -Wunknown-pragmas
- -Wunknown-sanitizers
- -Wunknown-warning-option
- -Wunnamed-type-template-args
- -Wunneeded-internal-declaration
- -Wunneeded-member-function
- -Wunreachable-code
- -Wunreachable-code-aggressive
- -Wunreachable-code-break
- -Wunreachable-code-loop-increment
- -Wunreachable-code-return
- -Wunsequenced
- -Wunsupported-abs
- -Wunsupported-availability-guard
- -Wunsupported-cb
- -Wunsupported-dll-base-class-template
- -Wunsupported-friend
- -Wunsupported-gpopt
- -Wunsupported-nan
- -Wunsupported-visibility
- -Wunusable-partial-specialization
- -Wunused
- -Wunused-argument
- -Wunused-command-line-argument
- -Wunused-comparison
- -Wunused-const-variable
- -Wunused-exception-parameter
- -Wunused-function
- -Wunused-getter-return-value
- -Wunused-label
- -Wunused-lambda-capture
- -Wunused-local-typedef
- -Wunused-local-typedefs
- -Wunused-macros
- -Wunused-member-function
- -Wunused-parameter
- -Wunused-private-field
- -Wunused-property-ivar
- -Wunused-result
- -Wunused-template
- -Wunused-value
- -Wunused-variable
- -Wunused-volatile-lvalue
- -Wused-but-marked-unused
- -Wuser-defined-literals
- -Wuser-defined-warnings
- -Wvarargs
- -Wvariadic-macros
- -Wvec-elem-size
- -Wvector-conversion
- -Wvector-conversions
- -Wvexing-parse
- -Wvisibility
- -Wvla
- -Wvla-extension
- -Wvoid-ptr-dereference
- -Wvolatile-register-var
- -Wweak-template-vtables
- -Wweak-vtables
- -Wwritable-strings
- -Wwrite-strings
- -Wzero-as-null-pointer-constant
- -Wzero-length-array
Introduction¶
This page lists the diagnostic flags currently supported by Clang.
Diagnostic flags¶
-W#pragma-messages¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-W#warnings¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-WCFString-literal¶
This diagnostic is enabled by default.
Diagnostic text:
warning: input conversion stopped due to an input byte that does not belong to the input codeset UTF-8 |
-WIndependentClass-attribute¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘objc_independent_class’ attribute may be put on a typedef only; attribute is ignored |
warning: ‘objc_independent_class’ attribute may be put on Objective-C object pointer type only; attribute is ignored |
-WNSObject-attribute¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘NSObject’ attribute may be put on a typedef only; attribute is ignored |
-Wabsolute-value¶
This diagnostic is enabled by default.
Diagnostic text:
warning: absolute value function A given an argument of type B but has parameter of type C which may cause truncation of value |
warning: taking the absolute value of |
|
type B is suspicious |
warning: taking the absolute value of unsigned type A has no effect |
warning: using |
|
absolute value function A when argument is of |
|
type |
-Wabstract-final-class¶
This diagnostic is enabled by default.
Diagnostic text:
warning: abstract class is marked ‘ |
|
‘ |
-Wabstract-vbase-init¶
Diagnostic text:
warning: initializer for virtual base class A of abstract class B will never be used |
-Waddress¶
This diagnostic is enabled by default.
Controls -Wpointer-bool-conversion, -Wstring-compare, -Wtautological-pointer-compare.
-Waddress-of-array-temporary¶
This diagnostic is enabled by default.
Diagnostic text:
warning: pointer is initialized by a temporary array, which will be destroyed at the end of the full-expression |
-Waddress-of-packed-member¶
This diagnostic is enabled by default.
Diagnostic text:
warning: taking address of packed member A of class or structure B may result in an unaligned pointer value |
-Waddress-of-temporary¶
This diagnostic is an error by default, but the flag -Wno-address-of-temporary
can be used to disable the error.
Diagnostic text:
error: taking the address of a temporary object of type A |
-Waggregate-return¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wall¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wmost, -Wparentheses, -Wswitch, -Wswitch-bool.
-Walloca-with-align-alignof¶
This diagnostic is enabled by default.
Diagnostic text:
warning: second argument to __builtin_alloca_with_align is supposed to be in bits |
-Wambiguous-delete¶
This diagnostic is enabled by default.
Diagnostic text:
warning: multiple suitable A functions for B; no ‘operator delete’ function will be invoked if initialization throws an exception |
-Wambiguous-ellipsis¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’…’ in this location creates a C-style varargs function |
|
-Wambiguous-macro¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ambiguous expansion of macro A |
-Wambiguous-member-template¶
This diagnostic is enabled by default.
Diagnostic text:
warning: lookup of A in member access expression is ambiguous; using member of B |
-Wanalyzer-incompatible-plugin¶
This diagnostic is enabled by default.
Diagnostic text:
warning: checker plugin ‘A’ is not compatible with this version of the analyzer |
-Wanonymous-pack-parens¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ISO C++11 requires a parenthesized pack declaration to have a name |
-Warc¶
This diagnostic is enabled by default.
Controls -Warc-non-pod-memaccess, -Warc-retain-cycles, -Warc-unsafe-retained-assign.
-Warc-bridge-casts-disallowed-in-nonarc¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’A’ casts have no effect when not using ARC |
-Warc-maybe-repeated-use-of-weak¶
Diagnostic text:
warning: weak |
|
B may be accessed multiple times in this |
|
and may be unpredictably set to nil; assign to a strong variable to keep the object alive |
-Warc-non-pod-memaccess¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
this B call is a pointer to ownership-qualified type C |
-Warc-performSelector-leaks¶
This diagnostic is enabled by default.
Diagnostic text:
warning: performSelector may cause a leak because its selector is unknown |
-Warc-repeated-use-of-weak¶
Also controls -Warc-maybe-repeated-use-of-weak.
Diagnostic text:
warning: weak |
|
B is accessed multiple times in this |
|
but may be unpredictably set to nil; assign to a strong variable to keep the object alive |
-Warc-retain-cycles¶
This diagnostic is enabled by default.
Diagnostic text:
warning: capturing A strongly in this block is likely to lead to a retain cycle |
-Warc-unsafe-retained-assign¶
This diagnostic is enabled by default.
Diagnostic text:
warning: assigning |
|
to a weak |
|
; object will be released after assignment |
warning: assigning retained object to |
|
|
; object will be released after assignment |
warning: assigning retained object to unsafe property; object will be released after assignment |
-Warray-bounds¶
This diagnostic is enabled by default.
Diagnostic text:
warning: array index A is past the end of the array (which contains B element |
|
) |
warning: array index A is before the beginning of the array |
warning: array argument is too small; contains A elements, callee requires at least B |
warning: ‘static’ has no effect on zero-length arrays |
-Warray-bounds-pointer-arithmetic¶
Diagnostic text:
warning: the pointer incremented by A refers past the end of the array (that contains B element |
|
) |
warning: the pointer decremented by A refers before the beginning of the array |
-Wasm¶
This diagnostic is enabled by default.
Controls -Wasm-ignored-qualifier, -Wasm-operand-widths.
-Wasm-ignored-qualifier¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignored A qualifier on asm |
warning: meaningless ‘volatile’ on asm outside function |
-Wasm-operand-widths¶
This diagnostic is enabled by default.
Diagnostic text:
warning: value size does not match register size specified by the constraint and modifier |
-Wassume¶
This diagnostic is enabled by default.
Diagnostic text:
warning: the argument to A has side effects that will be discarded |
-Wat-protocol¶
This diagnostic is enabled by default.
Diagnostic text:
warning: @protocol is using a forward protocol declaration of A |
-Watomic-memory-ordering¶
This diagnostic is enabled by default.
Diagnostic text:
warning: memory order argument to atomic operation is invalid |
-Watomic-property-with-user-defined-accessor¶
This diagnostic is enabled by default.
Diagnostic text:
warning: writable atomic property A cannot pair a synthesized |
|
with a user defined |
|
-Wattribute-packed-for-bitfield¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘packed’ attribute was ignored on bit-fields with single-byte alignment in older versions of GCC and Clang |
-Wattributes¶
This diagnostic is enabled by default.
Controls -Wignored-attributes, -Wunknown-attributes.
-Wauto-disable-vptr-sanitizer¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicitly disabling vptr sanitizer because rtti wasn’t enabled |
-Wauto-import¶
Diagnostic text:
warning: treating # |
|
as an import of module ‘B’ |
-Wauto-storage-class¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘auto’ storage class specifier is not permitted in C++11, and will not be supported in future releases |
-Wauto-var-id¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘auto’ deduced as ‘id’ in declaration of A |
-Wavailability¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘unavailable’ availability overrides all other availability information |
warning: unknown platform A in availability macro |
warning: feature cannot be |
|
in B version C before it was |
|
in version E; attribute ignored |
warning: use same version number separators ‘_’ or ‘.’; as in ‘major[.minor[.subminor]]’ |
warning: availability does not match previous declaration |
warning: |
|
method |
|
|
on B (C vs. D) |
warning: |
|
method cannot be unavailable on A when |
|
is available |
-Wbackend-plugin¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-Wbackslash-newline-escape¶
This diagnostic is enabled by default.
Diagnostic text:
warning: backslash and newline separated by space |
-Wbad-function-cast¶
Diagnostic text:
warning: cast from function call of type A to non-matching type B |
-Wbinary-literal¶
Controls -Wc++14-binary-literal, -Wc++98-c++11-compat-binary-literal, -Wgnu-binary-literal.
-Wbind-to-temporary-copy¶
Also controls -Wc++98-compat-bind-to-temporary-copy.
Diagnostic text:
warning: C++98 requires an accessible copy constructor for class C when binding a reference to a temporary; was |
|
warning: no viable constructor |
|
of type B; C++98 requires a copy constructor when binding a reference to a temporary |
-Wbitfield-constant-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit truncation from C to bit-field changes value from A to B |
-Wbitfield-enum-conversion¶
Diagnostic text:
warning: bit-field A is not wide enough to store all enumerators of B |
warning: signed bit-field A needs an extra bit to represent the largest positive enumerators of B |
warning: assigning value of signed enum type B to unsigned bit-field A; negative enumerators of enum B will be converted to positive values |
-Wbitfield-width¶
This diagnostic is enabled by default.
Diagnostic text:
warning: width of anonymous bit-field (A bits) exceeds width of its type; value will be truncated to B bit |
|
warning: width of bit-field A (B bits) exceeds the width of its type; value will be truncated to C bit |
|
-Wbitwise-op-parentheses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’A’ within ‘B’ |
-Wblock-capture-autoreleasing¶
This diagnostic is enabled by default.
Diagnostic text:
warning: block captures an autoreleasing out-parameter, which may result in use-after-free bugs |
-Wbool-conversion¶
This diagnostic is enabled by default.
Also controls -Wpointer-bool-conversion, -Wundefined-bool-conversion.
Diagnostic text:
warning: initialization of pointer of type A to null from a constant boolean expression |
-Wbool-conversions¶
Synonym for -Wbool-conversion.
-Wbraced-scalar-init¶
This diagnostic is enabled by default.
Diagnostic text:
warning: braces around scalar initializer |
-Wbridge-cast¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A bridges to B, not C |
warning: A cannot bridge to B |
-Wbuiltin-macro-redefined¶
This diagnostic is enabled by default.
Diagnostic text:
warning: redefining builtin macro |
warning: undefining builtin macro |
-Wbuiltin-memcpy-chk-size¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A will always overflow destination buffer |
-Wbuiltin-requires-header¶
This diagnostic is enabled by default.
Diagnostic text:
warning: declaration of built-in function ‘B’ requires inclusion of the header <A> |
-Wc++-compat¶
Diagnostic text:
warning: |
|
|
has size 0 in C, |
|
in C++ |
-Wc++0x-compat¶
Synonym for -Wc++11-compat.
-Wc++0x-extensions¶
Synonym for -Wc++11-extensions.
-Wc++0x-narrowing¶
Synonym for -Wc++11-narrowing.
-Wc++11-compat¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++11-compat-deprecated-writable-strings, -Wc++11-compat-reserved-user-defined-literal, -Wc++11-narrowing, -Wc++98-c++11-c++14-c++17-compat, -Wc++98-c++11-c++14-compat, -Wc++98-c++11-compat.
Diagnostic text:
warning: integer literal is too large to be represented in type ‘long’ and is subject to undefined behavior under C++98, interpreting as ‘unsigned long’; this literal will |
|
in C++11 onwards |
warning: ‘auto’ storage class specifier is redundant and incompatible with C++11 |
warning: identifier after literal will be treated as a user-defined literal suffix in C++11 |
warning: ’A’ is a keyword in C++11 |
warning: use of right-shift operator (‘>>’) in template argument will require parentheses in C++11 |
warning: explicit instantiation cannot be ‘inline’ |
warning: explicit instantiation of A must occur at global scope |
warning: explicit instantiation of A not in a namespace enclosing B |
warning: explicit instantiation of A must occur in namespace B |
warning: integer literal is too large to be represented in type ‘long’, interpreting as ‘unsigned long’ per C++98; this literal will |
|
in C++11 onwards |
-Wc++11-compat-deprecated-writable-strings¶
This diagnostic is enabled by default.
Diagnostic text:
warning: conversion from string literal to A is deprecated |
-Wc++11-compat-pedantic¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wc++11-compat, -Wc++98-c++11-c++14-c++17-compat-pedantic, -Wc++98-c++11-c++14-compat-pedantic, -Wc++98-c++11-compat-pedantic.
-Wc++11-compat-reserved-user-defined-literal¶
Diagnostic text:
warning: identifier after literal will be treated as a reserved user-defined literal suffix in C++11 |
-Wc++11-extensions¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++11-extra-semi, -Wc++11-inline-namespace, -Wc++11-long-long.
Diagnostic text:
warning: alias declarations are a C++11 extension |
warning: implicit conversion from array size expression of type A to |
|
type C is a C++11 extension |
warning: ‘auto’ type specifier is a C++11 extension |
warning: enumeration types with a fixed underlying type are a C++11 extension |
warning: |
|
function definitions are a C++11 extension |
warning: befriending enumeration type A is a C++11 extension |
warning: commas at the end of enumerator lists are a C++11 extension |
warning: explicit conversion functions are a C++11 extension |
warning: extern templates are a C++11 extension |
warning: range-based for loop is a C++11 extension |
warning: generalized initializer lists are a C++11 extension |
warning: use of enumeration in a nested name specifier is a C++11 extension |
warning: non-class friend type A is a C++11 extension |
warning: in-class initialization of non-static data member is a C++11 extension |
warning: ’A’ keyword is a C++11 extension |
warning: reference qualifiers on functions are a C++11 extension |
warning: rvalue references are a C++11 extension |
warning: scoped enumerations are a C++11 extension |
warning: static data member A in union is a C++11 extension |
warning: non-type template argument referring to |
|
B with internal linkage is a C++11 extension |
warning: ‘template’ keyword outside of a template |
warning: default template arguments for a function template are a C++11 extension |
warning: first declaration of |
|
specialization of B outside namespace C is a C++11 extension |
warning: ‘typename’ occurs outside of a template |
warning: unelaborated friend declaration is a C++11 extension; specify ‘ |
|
‘ to befriend B |
warning: variadic templates are a C++11 extension |
-Wc++11-inline-namespace¶
This diagnostic is enabled by default.
Diagnostic text:
warning: inline namespaces are a C++11 feature |
-Wc++11-narrowing¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
error: |
|
|
error: constant expression evaluates to A which cannot be narrowed to type B |
error: type A cannot be narrowed to B in initializer list |
error: non-constant-expression cannot be narrowed from type A to B in initializer list |
warning: constant expression evaluates to A which cannot be narrowed to type B in C++11 |
warning: type A cannot be narrowed to B in initializer list in C++11 |
warning: non-constant-expression cannot be narrowed from type A to B in initializer list in C++11 |
-Wc++14-compat-pedantic¶
Controls -Wc++14-compat, -Wc++98-c++11-c++14-c++17-compat-pedantic, -Wc++98-c++11-c++14-compat-pedantic.
-Wc++14-extensions¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++14-binary-literal.
Diagnostic text:
warning: use of this statement in a constexpr |
|
is a C++14 extension |
warning: multiple return statements in constexpr function is a C++14 extension |
warning: variable declaration in a constexpr |
|
is a C++14 extension |
warning: type definition in a constexpr |
|
is a C++14 extension |
warning: use of the A attribute is a C++14 extension |
warning: ‘decltype(auto)’ type specifier is a C++14 extension |
warning: initialized lambda captures are a C++14 extension |
warning: variable templates are a C++14 extension |
-Wc++17-compat¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wc++17-compat-mangling, -Wc++98-c++11-c++14-c++17-compat, -Wdeprecated-increment-bool, -Wdeprecated-register.
-Wc++17-compat-mangling¶
This diagnostic is enabled by default.
Diagnostic text:
warning: mangled name of A will change in C++17 due to non-throwing exception specification in function signature |
-Wc++17-compat-pedantic¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wc++17-compat, -Wc++98-c++11-c++14-c++17-compat-pedantic.
-Wc++17-extensions¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: constexpr if is a C++17 extension |
warning: ‘constexpr’ on lambda expressions is a C++17 extension |
warning: use of the A attribute is a C++17 extension |
warning: decomposition declarations are a C++17 extension |
warning: pack fold expression is a C++17 extension |
warning: ‘begin’ and ‘end’ returning different types (A and B) is a C++17 extension |
warning: hexadecimal floating literals are a C++17 feature |
warning: ’ |
|
‘ initialization statements are a C++17 extension |
warning: inline variables are a C++17 extension |
warning: use of multiple declarators in a single using declaration is a C++17 extension |
warning: nested namespace definition is a C++17 extension; define each namespace separately |
warning: attributes on |
|
declaration are a C++17 extension |
warning: capture of ‘*this’ by copy is a C++17 extension |
warning: static_assert with no message is a C++17 extension |
warning: template template parameter using ‘typename’ is a C++17 extension |
warning: default scope specifier for attributes is a C++17 extension |
warning: pack expansion of using declaration is a C++17 extension |
-Wc++1y-extensions¶
Synonym for -Wc++14-extensions.
-Wc++1z-compat¶
Synonym for -Wc++17-compat.
-Wc++1z-compat-mangling¶
Synonym for -Wc++17-compat-mangling.
-Wc++1z-extensions¶
Synonym for -Wc++17-extensions.
-Wc++2a-compat-pedantic¶
Synonym for -Wc++2a-compat.
-Wc++2a-extensions¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: default member initializer for bit-field is a C++2a extension |
warning: explicit capture of ‘this’ with a capture default of ‘=’ is a C++2a extension |
warning: invoking a pointer to a ‘const &’ member function on an rvalue is a C++2a extension |
-Wc++98-c++11-c++14-c++17-compat¶
Diagnostic text:
warning: default member initializer for bit-field is incompatible with C++ standards before C++2a |
warning: explicit capture of ‘this’ with a capture default of ‘=’ is incompatible with C++ standards before C++2a |
-Wc++98-c++11-c++14-c++17-compat-pedantic¶
Also controls -Wc++98-c++11-c++14-c++17-compat.
Diagnostic text:
warning: invoking a pointer to a ‘const &’ member function on an rvalue is incompatible with C++ standards before C++2a |
-Wc++98-c++11-c++14-compat¶
Diagnostic text:
warning: constexpr if is incompatible with C++ standards before C++17 |
warning: constexpr on lambda expressions is incompatible with C++ standards before C++17 |
warning: decomposition declarations are incompatible with C++ standards before C++17 |
warning: pack fold expression is incompatible with C++ standards before C++17 |
warning: |
|
initialization statements are incompatible with C++ standards before C++17 |
warning: inline variables are incompatible with C++ standards before C++17 |
warning: nested namespace definition is incompatible with C++ standards before C++17 |
warning: by value capture of ‘*this’ is incompatible with C++ standards before C++17 |
warning: static_assert with no message is incompatible with C++ standards before C++17 |
warning: non-type template parameters declared with A are incompatible with C++ standards before C++17 |
warning: template template parameter using ‘typename’ is incompatible with C++ standards before C++17 |
warning: unicode literals are incompatible with C++ standards before C++17 |
warning: default scope specifier for attributes is incompatible with C++ standards before C++17 |
warning: use of multiple declarators in a single using declaration is incompatible with C++ standards before C++17 |
warning: pack expansion using declaration is incompatible with C++ standards before C++17 |
warning: ‘begin’ and ‘end’ returning different types (A and B) is incompatible with C++ standards before C++17 |
-Wc++98-c++11-c++14-compat-pedantic¶
Also controls -Wc++98-c++11-c++14-compat.
Diagnostic text:
warning: attributes on |
|
declaration are incompatible with C++ standards before C++17 |
warning: hexadecimal floating literals are incompatible with C++ standards before C++17 |
-Wc++98-c++11-compat¶
Diagnostic text:
warning: use of this statement in a constexpr |
|
is incompatible with C++ standards before C++14 |
warning: multiple return statements in constexpr function is incompatible with C++ standards before C++14 |
warning: constexpr function with no return statements is incompatible with C++ standards before C++14 |
warning: variable declaration in a constexpr |
|
is incompatible with C++ standards before C++14 |
warning: type definition in a constexpr |
|
is incompatible with C++ standards before C++14 |
warning: ‘decltype(auto)’ type specifier is incompatible with C++ standards before C++14 |
warning: digit separators are incompatible with C++ standards before C++14 |
warning: initialized lambda captures are incompatible with C++ standards before C++14 |
warning: variable templates are incompatible with C++ standards before C++14 |
-Wc++98-c++11-compat-binary-literal¶
Diagnostic text:
warning: binary integer literals are incompatible with C++ standards before C++14 |
-Wc++98-compat¶
Also controls -Wc++98-c++11-c++14-c++17-compat, -Wc++98-c++11-c++14-compat, -Wc++98-c++11-compat, -Wc++98-compat-local-type-template-args, -Wc++98-compat-unnamed-type-template-args.
Diagnostic text:
warning: alias declarations are incompatible with C++98 |
warning: ‘alignas’ is incompatible with C++98 |
warning: alignof expressions are incompatible with C++98 |
warning: C++11 attribute syntax is incompatible with C++98 |
warning: ‘auto’ type specifier is incompatible with C++98 |
warning: ‘constexpr’ specifier is incompatible with C++98 |
warning: constructor call from initializer list is incompatible with C++98 |
warning: ‘decltype’ type specifier is incompatible with C++98 |
warning: |
|
function definitions are incompatible with C++98 |
warning: delegating constructors are incompatible with C++98 |
warning: scalar initialized from empty initializer list is incompatible with C++98 |
warning: enumeration types with a fixed underlying type are incompatible with C++98 |
warning: befriending enumeration type A is incompatible with C++98 |
warning: enumeration type in nested name specifier is incompatible with C++98 |
warning: explicit conversion functions are incompatible with C++98 |
warning: range-based for loop is incompatible with C++98 |
warning: friend declaration naming a member of the declaring class is incompatible with C++98 |
warning: generalized initializer lists are incompatible with C++98 |
warning: jump from this goto statement to its label is incompatible with C++98 |
warning: jump from this indirect goto statement to one of its possible targets is incompatible with C++98 |
warning: initialization of initializer_list object is incompatible with C++98 |
warning: inline namespaces are incompatible with C++98 |
warning: lambda expressions are incompatible with C++98 |
warning: ’<::’ is treated as digraph ‘<:’ (aka ‘[‘) followed by ‘:’ in C++98 |
warning: literal operators are incompatible with C++98 |
warning: universal character name referring to a control character is incompatible with C++98 |
warning: specifying character ‘A’ with a universal character name is incompatible with C++98 |
warning: noexcept specifications are incompatible with C++98 |
warning: noexcept expressions are incompatible with C++98 |
warning: use of non-static data member A in an unevaluated context is incompatible with C++98 |
warning: non-class friend type A is incompatible with C++98 |
warning: in-class initialization of non-static data members is incompatible with C++98 |
warning: |
|
member B with a non-trivial |
|
is incompatible with C++98 |
warning: ‘nullptr’ is incompatible with C++98 |
warning: ’A’ keyword is incompatible with C++98 |
warning: passing object of trivial but non-POD type A through variadic |
|
is incompatible with C++98 |
warning: raw string literals are incompatible with C++98 |
warning: reference qualifiers on functions are incompatible with C++98 |
warning: reference initialized from initializer list is incompatible with C++98 |
warning: rvalue references are incompatible with C++98 |
warning: scoped enumerations are incompatible with C++98 |
warning: substitution failure due to access control is incompatible with C++98 |
warning: static_assert declarations are incompatible with C++98 |
warning: static data member A in union is incompatible with C++98 |
warning: jump from switch statement to this case label is incompatible with C++98 |
warning: redundant parentheses surrounding address non-type template argument are incompatible with C++98 |
warning: use of null pointer as non-type template argument is incompatible with C++98 |
warning: non-type template argument referring to |
|
B with internal linkage is incompatible with C++98 |
warning: use of ‘template’ keyword outside of a template is incompatible with C++98 |
warning: default template arguments for a function template are incompatible with C++98 |
warning: |
|
specialization of B outside namespace C is incompatible with C++98 |
warning: trailing return types are incompatible with C++98 |
warning: consecutive right angle brackets are incompatible with C++98 (use ‘> >’) |
warning: use of ‘typename’ outside of a template is incompatible with C++98 |
warning: befriending B without ‘ |
|
‘ keyword is incompatible with C++98 |
warning: using this character in an identifier is incompatible with C++98 |
warning: unicode literals are incompatible with C++98 |
warning: ’A’ type specifier is incompatible with C++98 |
warning: inheriting constructors are incompatible with C++98 |
warning: variadic templates are incompatible with C++98 |
-Wc++98-compat-bind-to-temporary-copy¶
Diagnostic text:
warning: |
|
of type C when binding a reference to a temporary would |
|
in C++98 |
-Wc++98-compat-local-type-template-args¶
Diagnostic text:
warning: local type A as template argument is incompatible with C++98 |
-Wc++98-compat-pedantic¶
Also controls -Wc++98-c++11-c++14-c++17-compat-pedantic, -Wc++98-c++11-c++14-compat-pedantic, -Wc++98-c++11-compat-pedantic, -Wc++98-compat, -Wc++98-compat-bind-to-temporary-copy.
Diagnostic text:
warning: implicit conversion from array size expression of type A to |
|
type C is incompatible with C++98 |
warning: cast between pointer-to-function and pointer-to-object is incompatible with C++98 |
warning: empty macro arguments are incompatible with C++98 |
warning: commas at the end of enumerator lists are incompatible with C++98 |
warning: extern templates are incompatible with C++98 |
warning: ‘long long’ is incompatible with C++98 |
warning: C++98 requires newline at end of file |
warning: #line number greater than 32767 is incompatible with C++98 |
warning: extra ‘;’ outside of a function is incompatible with C++98 |
warning: variadic macros are incompatible with C++98 |
-Wc++98-compat-unnamed-type-template-args¶
Diagnostic text:
warning: unnamed type as template argument is incompatible with C++98 |
-Wc11-extensions¶
Diagnostic text:
warning: anonymous unions are a C11 extension |
warning: A is a C11-specific feature |
warning: anonymous structs are a C11 extension |
warning: generic selections are a C11-specific feature |
warning: _Noreturn functions are a C11-specific feature |
warning: _Static_assert is a C11-specific feature |
-Wc99-compat¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: |
|
is incompatible with C99 |
warning: unicode literals are incompatible with C99 |
warning: integer literal is too large to be represented in type ‘long’, interpreting as ‘unsigned long’ per C89; this literal will |
|
in C99 onwards |
-Wc99-extensions¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: initializer for aggregate is not a compile-time constant |
warning: |
|
array size |
|
is a C99 feature |
warning: compound literals are a C99-specific feature |
warning: flexible array members are a C99 feature |
warning: variable declaration in for loop is a C99-specific feature |
warning: ISO C99 requires whitespace after the macro name |
warning: designated initializers are a C99 feature |
warning: empty macro arguments are a C99 feature |
warning: commas at the end of enumerator lists are a C99-specific feature |
warning: hexadecimal floating constants are a C99 feature |
-Wcast-calling-convention¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cast between incompatible calling conventions ‘A’ and ‘B’; calls through this pointer may abort at runtime |
-Wcast-of-sel-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cast of type A to B is deprecated; use sel_getName instead |
-Wcast-qual¶
Diagnostic text:
warning: cast from A to B drops |
|
warning: cast from A to B must have all intermediate pointers const qualified to be safe |
-Wchar-align¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wchar-subscripts¶
Diagnostic text:
warning: array section |
|
is of type ‘char’ |
warning: array subscript is of type ‘char’ |
-Wclang-cl-pch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: support for ‘/Yc’ with more than one source file not implemented yet; flag ignored |
warning: support for ‘/Yc’ and ‘/Yu’ with different filenames not implemented yet; flags ignored |
warning: support for ‘A’ without a filename not implemented yet; flag ignored |
warning: support for ‘A’ without a corresponding /FI flag not implemented yet; flag ignored |
-Wclass-varargs¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wnon-pod-varargs.
Diagnostic text:
warning: passing object of class type A through variadic |
|
|
-Wcomment¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: escaped newline between */ characters at block comment end |
warning: // comments are not allowed in this language |
warning: multi-line // comment |
warning: ’/*’ within block comment |
-Wcomments¶
Synonym for -Wcomment.
-Wcompare-distinct-pointer-types¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of distinct pointer types |
-Wcomplex-component-init¶
Diagnostic text:
warning: complex initialization specifying real and imaginary components is an extension |
-Wconditional-type-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: pointer/integer type mismatch in conditional expression |
-Wconditional-uninitialized¶
Diagnostic text:
warning: variable A may be uninitialized when |
|
-Wconfig-macros¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
of configuration macro ‘B’ has no effect on the import of ‘C’; pass ‘ |
|
‘ on the command line to configure the module |
-Wconstant-conversion¶
This diagnostic is enabled by default.
Also controls -Wbitfield-constant-conversion.
Diagnostic text:
warning: implicit conversion from C to D changes value from A to B |
-Wconstant-logical-operand¶
This diagnostic is enabled by default.
Diagnostic text:
warning: use of logical ‘A’ with constant operand |
-Wconstexpr-not-const¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘constexpr’ non-static member function will not be implicitly ‘const’ in C++14; add ‘const’ to avoid a change in behavior |
-Wconsumed¶
Diagnostic text:
warning: consumed analysis attribute is attached to member of class ‘A’ which isn’t marked as consumable |
warning: state of variable ‘A’ must match at the entry and exit of loop |
warning: parameter ‘A’ not in expected state when the function returns: expected ‘B’, observed ‘C’ |
warning: argument not in expected state; expected ‘A’, observed ‘B’ |
warning: return state set for an unconsumable type ‘A’ |
warning: return value not in expected state; expected ‘A’, observed ‘B’ |
warning: invalid invocation of method ‘A’ on object ‘B’ while it is in the ‘C’ state |
warning: invalid invocation of method ‘A’ on a temporary object while it is in the ‘B’ state |
-Wconversion¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wbitfield-enum-conversion, -Wbool-conversion, -Wconstant-conversion, -Wenum-conversion, -Wfloat-conversion, -Wint-conversion, -Wliteral-conversion, -Wnon-literal-null-conversion, -Wnull-conversion, -Wobjc-literal-conversion, -Wshorten-64-to-32, -Wsign-conversion, -Wstring-conversion.
Diagnostic text:
warning: implicit conversion discards imaginary component: A to B |
warning: implicit conversion loses floating-point precision: A to B |
warning: implicit conversion loses integer precision: A to B |
warning: implicit conversion turns vector to scalar: A to B |
warning: non-type template argument with value ‘A’ converted to ‘B’ for unsigned template parameter of type C |
warning: non-type template argument value ‘A’ truncated to ‘B’ for template parameter of type C |
-Wconversion-null¶
Synonym for -Wnull-conversion.
-Wcoroutine¶
Synonym for -Wcoroutine-missing-unhandled-exception.
-Wcoroutine-missing-unhandled-exception¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is required to declare the member ‘unhandled_exception()’ when exceptions are enabled |
-Wcovered-switch-default¶
Diagnostic text:
warning: default label in switch which covers all enumeration values |
-Wcpp¶
Synonym for -W#warnings.
-Wcstring-format-directive¶
Diagnostic text:
warning: using A directive in |
|
which is being passed as a formatting argument to the formatting |
|
-Wctor-dtor-privacy¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wcuda-compat¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: A attribute parameter B is negative and will be ignored |
warning: nvcc does not allow ‘__A__’ to appear after ‘()’ in lambdas |
warning: ignored ‘inline’ attribute on kernel function A |
warning: kernel function A is a member function; this may not be accepted by nvcc |
warning: argument to ‘#pragma unroll’ should not be in parentheses in CUDA C/C++ |
-Wcustom-atomic-properties¶
Diagnostic text:
warning: atomic by default property A has a user defined |
|
(property should be marked ‘atomic’ if this is intended) |
-Wdangling-else¶
This diagnostic is enabled by default.
Diagnostic text:
warning: add explicit braces to avoid dangling else |
-Wdangling-field¶
This diagnostic is enabled by default.
Diagnostic text:
warning: binding reference member A to stack allocated parameter B |
warning: binding reference |
|
member A to a temporary value |
warning: initializing pointer member A with the stack address of parameter B |
-Wdangling-initializer-list¶
This diagnostic is enabled by default.
Diagnostic text:
warning: array backing the initializer list will be destroyed at the end of |
|
-Wdealloc-in-category¶
This diagnostic is enabled by default.
Diagnostic text:
warning: -dealloc is being overridden in a category |
-Wdeclaration-after-statement¶
Diagnostic text:
warning: ISO C90 forbids mixing declarations and code |
-Wdelegating-ctor-cycles¶
This diagnostic is an error by default, but the flag -Wno-delegating-ctor-cycles
can be used to disable the error.
Diagnostic text:
error: constructor for A creates a delegation cycle |
-Wdelete-incomplete¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cannot delete expression with pointer-to-‘void’ type A |
warning: deleting pointer to incomplete type A may cause undefined behavior |
-Wdelete-non-virtual-dtor¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: |
|
called on B that is abstract but has non-virtual destructor |
warning: |
|
called on non-final B that has virtual functions but non-virtual destructor |
-Wdeprecated¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wdeprecated-attributes, -Wdeprecated-declarations, -Wdeprecated-dynamic-exception-spec, -Wdeprecated-increment-bool, -Wdeprecated-register, -Wdeprecated-writable-strings.
Diagnostic text:
warning: -O4 is equivalent to -O3 |
warning: access declarations are deprecated; use using declarations instead |
warning: definition of implicit copy |
|
for A is deprecated because it has a user-declared |
|
warning: out-of-line definition of constexpr static data member is redundant in C++17 and is deprecated |
warning: argument ‘A’ is deprecated, use ‘B’ instead |
warning: treating ‘A’ input as ‘B’ when in C++ mode, this behavior is deprecated |
warning: OpenCL version A does not support the option ‘B’ |
warning: Use of ‘long’ with ‘__vector’ is deprecated |
-Wdeprecated-attributes¶
This diagnostic is enabled by default.
Diagnostic text:
warning: specifying vector types with the ‘mode’ attribute is deprecated; use the ‘vector_size’ attribute instead |
-Wdeprecated-declarations¶
This diagnostic is enabled by default.
Diagnostic text:
warning: specifying ‘uuid’ as an ATL attribute is deprecated; use __declspec instead |
warning: use of C-style parameters in Objective-C method declarations is deprecated |
warning: A is deprecated |
warning: A may be deprecated because the receiver type is unknown |
warning: A is deprecated: B |
warning: property access is using A method which is deprecated |
-Wdeprecated-dynamic-exception-spec¶
Diagnostic text:
warning: dynamic exception specifications are deprecated |
-Wdeprecated-implementations¶
Diagnostic text:
warning: implementing deprecated |
|
warning: implementing unavailable method |
-Wdeprecated-increment-bool¶
This diagnostic is enabled by default.
Diagnostic text:
warning: incrementing expression of type bool is deprecated and incompatible with C++17 |
-Wdeprecated-objc-isa-usage¶
This diagnostic is enabled by default.
Diagnostic text:
warning: assignment to Objective-C’s isa is deprecated in favor of object_setClass() |
warning: direct access to Objective-C’s isa is deprecated in favor of object_getClass() |
-Wdeprecated-objc-pointer-introspection¶
This diagnostic is enabled by default.
Also controls -Wdeprecated-objc-pointer-introspection-performSelector.
Diagnostic text:
warning: bitmasking for introspection of Objective-C object pointers is strongly discouraged |
-Wdeprecated-objc-pointer-introspection-performSelector¶
This diagnostic is enabled by default.
Diagnostic text:
warning: bitmasking for introspection of Objective-C object pointers is strongly discouraged |
-Wdeprecated-register¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘register’ storage class specifier is deprecated and incompatible with C++17 |
-Wdisabled-optimization¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wdiscard-qual¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wdistributed-object-modifiers¶
This diagnostic is enabled by default.
Diagnostic text:
warning: conflicting distributed object modifiers on parameter type in implementation of A |
warning: conflicting distributed object modifiers on return type in implementation of A |
-Wdiv-by-zero¶
Synonym for -Wdivision-by-zero.
-Wdivision-by-zero¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
by zero is undefined |
-Wdll-attribute-on-redeclaration¶
This diagnostic is enabled by default.
Diagnostic text:
warning: redeclaration of A should not add B attribute |
-Wdllexport-explicit-instantiation-decl¶
This diagnostic is enabled by default.
Diagnostic text:
warning: explicit instantiation declaration should not be ‘dllexport’ |
-Wdllimport-static-field-def¶
This diagnostic is enabled by default.
Diagnostic text:
warning: definition of dllimport static field |
-Wdocumentation¶
Also controls -Wdocumentation-deprecated-sync, -Wdocumentation-html.
Diagnostic text:
warning: ’ |
|
|
‘ command should not be used in a comment attached to a non- |
|
declaration |
warning: duplicated command ‘ |
|
B’ |
warning: empty paragraph passed to ‘ |
|
B’ command |
warning: ’ |
|
|
‘ command should not be used in a comment attached to a non-container declaration |
warning: ’ |
|
|
‘ command should be used in a comment attached to |
|
declaration |
warning: HTML start tag prematurely ended, expected attribute name or ‘>’ |
warning: expected quoted string after equals sign |
warning: parameter ‘A’ is already documented |
warning: unrecognized parameter passing direction, valid directions are ‘[in]’, ‘[out]’ and ‘[in,out]’ |
warning: ’ |
|
param’ command used in a comment that is not attached to a function declaration |
warning: parameter ‘A’ not found in the function declaration |
warning: ’ |
|
B’ command used in a comment that is attached to a |
|
warning: ’ |
|
B’ command used in a comment that is not attached to a function or method declaration |
warning: template parameter ‘A’ is already documented |
warning: ’ |
|
tparam’ command used in a comment that is not attached to a template declaration |
warning: template parameter ‘A’ not found in the template declaration |
warning: not a Doxygen trailing comment |
warning: ’ |
|
B’ command does not terminate a verbatim text block |
-Wdocumentation-deprecated-sync¶
Diagnostic text:
warning: declaration is marked with ‘\deprecated’ command but does not have a deprecation attribute |
-Wdocumentation-html¶
Diagnostic text:
warning: HTML end tag ‘A’ is forbidden |
warning: HTML end tag does not match any start tag |
warning: HTML tag ‘A’ requires an end tag |
warning: HTML start tag ‘A’ closed by ‘B’ |
-Wdocumentation-pedantic¶
Also controls -Wdocumentation-unknown-command.
Diagnostic text:
warning: whitespace is not allowed in parameter passing direction |
-Wdocumentation-unknown-command¶
Diagnostic text:
warning: unknown command tag name ‘A’; did you mean ‘B’? |
warning: unknown command tag name |
-Wdouble-promotion¶
Diagnostic text:
warning: implicit conversion increases floating-point precision: A to B |
-Wduplicate-decl-specifier¶
This diagnostic is enabled by default.
Diagnostic text:
warning: duplicate ‘A’ declaration specifier |
warning: duplicate ‘A’ declaration specifier |
-Wduplicate-enum¶
Diagnostic text:
warning: element A has been implicitly assigned B which another element has been assigned |
-Wduplicate-method-match¶
Diagnostic text:
warning: multiple declarations of method A found and ignored |
-Wduplicate-protocol¶
This diagnostic is enabled by default.
Diagnostic text:
warning: duplicate protocol definition of A is ignored |
-Wdynamic-class-memaccess¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
this B call is a pointer to |
|
dynamic class D; vtable pointer will be |
|
-Wdynamic-exception-spec¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wdeprecated-dynamic-exception-spec.
Diagnostic text:
error: ISO C++17 does not allow dynamic exception specifications |
-Weffc++¶
Synonym for -Wnon-virtual-dtor.
-Wembedded-directive¶
Diagnostic text:
warning: embedding a directive within macro arguments has undefined behavior |
-Wempty-body¶
This diagnostic is enabled by default.
Diagnostic text:
warning: for loop has empty body |
warning: if statement has empty body |
warning: range-based for loop has empty body |
warning: switch statement has empty body |
warning: while loop has empty body |
-Wempty-decomposition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ISO C++17 does not allow a decomposition group to be empty |
-Wempty-translation-unit¶
Diagnostic text:
warning: ISO C requires a translation unit to contain at least one declaration |
-Wencode-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: encoding of A type is incomplete because B component has unknown encoding |
-Wendif-labels¶
Synonym for -Wextra-tokens.
-Wenum-compare¶
This diagnostic is enabled by default.
Also controls -Wenum-compare-switch.
Diagnostic text:
warning: comparison of two values with different enumeration types |
-Wenum-compare-switch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of two values with different enumeration types in switch statement |
-Wenum-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit conversion from enumeration type A to different enumeration type B |
-Wenum-too-large¶
This diagnostic is enabled by default.
Diagnostic text:
warning: enumeration values exceed range of largest integer |
warning: incremented enumerator value A is not representable in the largest integer type |
-Wexceptions¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cannot refer to a non-static member from the handler of a |
|
function try block |
warning: exception of type A will be caught by earlier handler |
warning: A has a non-throwing exception specification but can still throw |
-Wexpansion-to-defined¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: macro expansion producing ‘defined’ has undefined behavior |
warning: macro expansion producing ‘defined’ has undefined behavior |
-Wexplicit-initialize-call¶
This diagnostic is enabled by default.
Diagnostic text:
warning: explicit call to +initialize results in duplicate call to +initialize |
warning: explicit call to [super initialize] should only be in implementation of +initialize |
-Wexplicit-ownership-type¶
Diagnostic text:
warning: method parameter of type A with no explicit ownership |
-Wextern-c-compat¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
|
has size 0 in C, |
|
in C++ |
-Wextern-initializer¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘extern’ variable has an initializer |
-Wextra¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wignored-qualifiers, -Winitializer-overrides, -Wmissing-field-initializers, -Wmissing-method-return-type, -Wnull-pointer-arithmetic, -Wsemicolon-before-method-body, -Wsign-compare, -Wunused-parameter.
Diagnostic text:
warning: call to function without interrupt attribute could clobber interruptee’s VFP registers |
-Wextra-qualification¶
This diagnostic is enabled by default.
Diagnostic text:
warning: extra qualification on member A |
-Wextra-semi¶
Also controls -Wc++11-extra-semi.
Diagnostic text:
warning: extra ‘;’ |
|
warning: extra ‘;’ after member function definition |
-Wextra-tokens¶
This diagnostic is enabled by default.
Diagnostic text:
warning: extra tokens at end of #A directive |
warning: extra tokens at the end of ‘#pragma omp A’ are ignored |
-Wflag-enum¶
This diagnostic is enabled by default.
Diagnostic text:
warning: enumeration value A is out of range of flags in enumeration type B |
-Wflexible-array-extensions¶
Diagnostic text:
warning: A may not be used as an array element due to flexible array member |
warning: A may not be nested in a struct due to flexible array member |
-Wfloat-conversion¶
Also controls -Wfloat-overflow-conversion, -Wfloat-zero-conversion.
Diagnostic text:
warning: implicit conversion turns floating-point number into integer: A to B |
-Wfloat-overflow-conversion¶
Diagnostic text:
warning: implicit conversion of out of range value from A to B changes value from C to D |
-Wfloat-zero-conversion¶
Diagnostic text:
warning: implicit conversion from A to B changes non-zero value from C to D |
-Wfor-loop-analysis¶
Diagnostic text:
warning: variable A is |
|
both in the loop header and in the loop body |
warning: variable |
|
used in loop condition not modified in loop body |
-Wformat¶
This diagnostic is enabled by default.
Also controls -Wformat-extra-args, -Wformat-invalid-specifier, -Wformat-security, -Wformat-y2k, -Wformat-zero-length, -Wnonnull.
Diagnostic text:
warning: using ‘%%P’ format specifier without precision |
warning: |
|
’A’ should not be used as format arguments; add an explicit cast to B instead |
warning: format specifies type A but the argument has |
|
B |
warning: using ‘A’ format specifier annotation outside of os_log()/os_trace() |
warning: invalid position specified for |
|
warning: cannot mix positional and non-positional arguments in format string |
warning: length modifier ‘A’ results in undefined behavior or no effect with ‘B’ conversion specifier |
warning: format string should not be a wide string |
warning: position arguments in format strings start counting at 1 (not 0) |
warning: format string missing |
warning: object format flags cannot be used with ‘A’ conversion specifier |
warning: ’ |
|
‘ specified field |
|
is missing a matching ‘int’ argument |
warning: field |
|
should have type B, but argument has type C |
warning: missing object format flag |
warning: format string contains ‘\0’ within the string body |
warning: format string is not null-terminated |
warning: flag ‘A’ is ignored when flag ‘B’ is present |
warning: incomplete format specifier |
warning: more ‘%%’ conversions than data arguments |
warning: ’A’ is not a valid object format flag |
warning: flag ‘A’ results in undefined behavior with ‘B’ conversion specifier |
warning: |
|
used with ‘B’ conversion specifier, resulting in undefined behavior |
warning: data argument position ‘A’ exceeds the number of data arguments (B) |
warning: zero field width in scanf format string is unused |
warning: no closing ‘]’ for ‘%%[‘ in scanf format string |
-Wformat-extra-args¶
This diagnostic is enabled by default.
Diagnostic text:
warning: data argument not used by format string |
-Wformat-invalid-specifier¶
This diagnostic is enabled by default.
Diagnostic text:
warning: invalid conversion specifier ‘A’ |
-Wformat-non-iso¶
Diagnostic text:
warning: ’A’ |
|
is not supported by ISO C |
warning: using length modifier ‘A’ with conversion specifier ‘B’ is not supported by ISO C |
warning: positional arguments are not supported by ISO C |
-Wformat-pedantic¶
Diagnostic text:
warning: format specifies type A but the argument has |
|
B |
-Wformat-security¶
This diagnostic is enabled by default.
Diagnostic text:
warning: format string is not a string literal (potentially insecure) |
-Wformat-y2k¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wformat-zero-length¶
This diagnostic is enabled by default.
Diagnostic text:
warning: format string is empty |
-Wformat=2¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wformat-nonliteral, -Wformat-security, -Wformat-y2k.
-Wframe-larger-than=¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
warning: stack frame size of A bytes in B |
-Wfunction-def-in-objc-container¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function definition inside an Objective-C container is deprecated |
-Wfuture-compat¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wgcc-compat¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: ‘diagnose_if’ is a clang extension |
warning: ‘enable_if’ is a clang extension |
warning: __final is a GNU extension, consider using C++11 final |
warning: GCC does not allow A attribute in this position on a function definition |
warning: ‘break’ is bound to loop, GCC binds it to switch |
warning: GCC does not allow the ‘cleanup’ attribute argument to be anything other than a simple identifier |
warning: GCC does not allow an attribute in this position on a function declaration |
warning: ’A’ is bound to current loop, GCC binds it to the enclosing loop |
-Wglobal-constructors¶
Diagnostic text:
warning: declaration requires a global constructor |
warning: declaration requires a global destructor |
-Wgnu¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wgnu-alignof-expression, -Wgnu-anonymous-struct, -Wgnu-auto-type, -Wgnu-binary-literal, -Wgnu-case-range, -Wgnu-complex-integer, -Wgnu-compound-literal-initializer, -Wgnu-conditional-omitted-operand, -Wgnu-designator, -Wgnu-empty-initializer, -Wgnu-empty-struct, -Wgnu-flexible-array-initializer, -Wgnu-flexible-array-union-member, -Wgnu-folding-constant, -Wgnu-imaginary-constant, -Wgnu-include-next, -Wgnu-label-as-value, -Wgnu-redeclared-enum, -Wgnu-statement-expression, -Wgnu-static-float-init, -Wgnu-string-literal-operator-template, -Wgnu-union-cast, -Wgnu-variable-sized-type-not-at-end, -Wgnu-zero-line-directive, -Wgnu-zero-variadic-macro-arguments, -Wredeclared-class-member, -Wvla-extension, -Wzero-length-array.
-Wgnu-alignof-expression¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A applied to an expression is a GNU extension |
-Wgnu-array-member-paren-init¶
This diagnostic is an error by default, but the flag -Wno-gnu-array-member-paren-init
can be used to disable the error.
Diagnostic text:
error: parenthesized initialization of a member array is a GNU extension |
-Wgnu-compound-literal-initializer¶
Diagnostic text:
warning: initialization of an array from a compound literal is a GNU extension |
-Wgnu-conditional-omitted-operand¶
Diagnostic text:
warning: use of GNU ?: conditional expression extension, omitting middle operand |
-Wgnu-designator¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: use of GNU array range extension |
warning: use of GNU ‘missing =’ extension in designator |
warning: use of GNU old-style field designator extension |
-Wgnu-empty-struct¶
Diagnostic text:
warning: empty |
|
is a GNU extension |
warning: flexible array member A in otherwise empty |
|
is a GNU extension |
warning: |
|
without named members is a GNU extension |
-Wgnu-flexible-array-initializer¶
Diagnostic text:
warning: flexible array initialization is a GNU extension |
-Wgnu-flexible-array-union-member¶
Diagnostic text:
warning: flexible array member A in a union is a GNU extension |
-Wgnu-folding-constant¶
Diagnostic text:
warning: expression is not an |
|
constant expression; folding it to a constant is a GNU extension |
warning: in-class initializer for static data member is not a constant expression; folding it to a constant is a GNU extension |
warning: variable length array folded to constant array as an extension |
-Wgnu-label-as-value¶
Diagnostic text:
warning: use of GNU address-of-label extension |
warning: use of GNU indirect-goto extension |
-Wgnu-redeclared-enum¶
Diagnostic text:
warning: redeclaration of already-defined enum A is a GNU extension |
-Wgnu-static-float-init¶
This diagnostic is enabled by default.
Diagnostic text:
warning: in-class initializer for static data member of type A is a GNU extension |
-Wgnu-string-literal-operator-template¶
This diagnostic is enabled by default.
Diagnostic text:
warning: string literal operator templates are a GNU extension |
-Wgnu-variable-sized-type-not-at-end¶
This diagnostic is enabled by default.
Diagnostic text:
warning: field A with variable sized type B not at the end of a struct or class is a GNU extension |
-Wgnu-zero-line-directive¶
Diagnostic text:
warning: #line directive with zero argument is a GNU extension |
-Wgnu-zero-variadic-macro-arguments¶
Diagnostic text:
warning: must specify at least one argument for ‘…’ parameter of variadic macro |
warning: token pasting of ‘,’ and __VA_ARGS__ is a GNU extension |
-Wheader-guard¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is used as a header guard here, followed by #define of a different macro |
-Widiomatic-parentheses¶
Diagnostic text:
warning: using the result of an assignment as a condition without parentheses |
-Wignored-attributes¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
will always resolve to A even if weak definition of B is overridden |
warning: |
|
will not be in section ‘A’ but in the same section as the |
|
warning: ‘abi_tag’ attribute on |
|
namespace ignored |
warning: attribute A after definition is ignored |
warning: A attribute can only be applied to instance variables or properties |
warning: A attribute ignored |
warning: A attribute ignored for field of type B |
warning: A attribute ignored on inline function |
warning: ’A’ attribute cannot be specified on a definition |
warning: attribute A ignored, because it is not attached to a declaration |
warning: ‘nonnull’ attribute applied to function with no pointer arguments |
warning: ‘nonnull’ attribute when used on parameters takes no arguments |
warning: A attribute ignored when parsing type |
warning: A attribute only applies to a pointer or reference (B is invalid) |
warning: A attribute only applies to |
|
pointer arguments |
warning: attribute declaration must precede definition |
warning: A attribute only applies to return values that are pointers |
warning: A attribute only applies to return values that are pointers or references |
warning: ‘sentinel’ attribute requires named arguments |
warning: ‘sentinel’ attribute only supported for variadic |
|
warning: A attribute argument not supported: B |
warning: unknown visibility A |
warning: attribute A cannot be applied to |
|
without return value |
warning: __weak attribute cannot be specified on a field declaration |
warning: __weak attribute cannot be specified on an automatic variable when ARC is not enabled |
warning: A attribute only applies to |
|
warning: attribute A ignored, because it cannot be applied to omitted return type |
warning: calling convention A ignored for this target |
warning: A calling convention ignored on constructor/destructor |
warning: A calling convention ignored on variadic function |
warning: attribute A ignored, because it cannot be applied to a type |
warning: attribute A is ignored, place it after “ |
|
” to apply attribute to type declaration |
warning: ‘deprecated’ attribute on anonymous namespace ignored |
warning: A redeclared inline; B attribute ignored |
warning: attribute A is already applied with different parameters |
warning: attribute A is already applied |
warning: Objective-C GC does not allow weak variables on the stack |
warning: ‘gnu_inline’ attribute requires function to be marked ‘inline’, attribute ignored |
warning: inheritance model ignored on |
|
warning: ‘internal_linkage’ attribute on a non-static local variable is ignored |
warning: qualifiers after comma in declarator list are ignored |
warning: MIPS ‘interrupt’ attribute only applies to functions that have |
|
warning: unknown attribute ‘A’ |
warning: A attribute only applies to |
|
parameters |
warning: A attribute only applies to |
|
that return |
|
warning: A attribute is deprecated and ignored in OpenCL version B |
warning: |
|
of field B (C bits) does not match the |
|
of the first field in transparent union; transparent_union attribute ignored |
warning: first field of a transparent union cannot have |
|
type B; transparent_union attribute ignored |
warning: transparent_union attribute can only be applied to a union definition; attribute ignored |
warning: transparent union definition must contain at least one field; transparent_union attribute ignored |
warning: ’A’ only applies to |
|
types; type here is C |
warning: __declspec attribute A is not supported |
warning: ignoring |
|
|
’C’ in the target attribute string |
-Wignored-optimization-argument¶
This diagnostic is enabled by default.
Diagnostic text:
warning: optimization flag ‘A’ is not supported for target ‘B’ |
warning: optimization flag ‘A’ is not supported |
-Wignored-pragma-intrinsic¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is not a recognized builtin |
|
-Wignored-pragmas¶
This diagnostic is enabled by default.
Also controls -Wignored-pragma-intrinsic.
Diagnostic text:
warning: expected ‘=’ following ‘#pragma |
|
‘ - ignored |
warning: invalid alignment option in ‘#pragma |
|
‘ - ignored |
warning: OpenCL extension end directive mismatches begin directive - ignoring |
warning: ’#pragma comment A’ ignored |
warning: missing argument to debug command ‘A’ |
warning: unexpected debug command ‘A’ |
warning: expected action or ‘)’ in ‘#pragma A’ - ignored |
warning: missing ‘:’ after A - ignoring |
warning: missing ‘:’ or ‘)’ after A - ignoring |
warning: expected identifier in ‘#pragma A’ - ignored |
warning: expected ‘compiler’, ‘lib’, ‘user’, or a string literal for the section name in ‘#pragma A’ - ignored |
warning: expected integer between A and B inclusive in ‘#pragma C’ - ignored |
warning: missing ‘(‘ after ‘#pragma A’ - ignoring |
warning: expected non-wide string literal in ‘#pragma A’ |
warning: expected |
|
- ignoring |
warning: expected ‘)’ or ‘,’ in ‘#pragma A’ |
warning: missing ‘)’ after ‘#pragma A’ - ignoring |
warning: expected a stack label or a string literal for the section name in ‘#pragma A’ - ignored |
warning: expected a string literal for the section name in ‘#pragma A’ - ignored |
warning: expected push, pop or a string literal for the section name in ‘#pragma A’ - ignored |
warning: extra tokens at end of ‘#pragma A’ - ignored |
warning: incorrect use of #pragma clang force_cuda_host_device begin|end |
warning: ’#pragma init_seg’ is only supported when targeting a Microsoft environment |
warning: unknown action for ‘#pragma A’ - ignored |
warning: unknown action ‘B’ for ‘#pragma A’ - ignored |
warning: incorrect use of ‘#pragma ms_struct on|off’ - ignored |
warning: #pragma options align=reset failed: A |
warning: expected ‘align’ following ‘#pragma options’ - ignored |
warning: expected #pragma pack parameter to be ‘1’, ‘2’, ‘4’, ‘8’, or ‘16’ |
warning: expected integer or identifier in ‘#pragma pack’ - ignored |
warning: #pragma A(pop, …) failed: B |
warning: pragma pop_macro could not pop ‘A’, no matching push_macro |
warning: unknown OpenCL extension A - ignoring |
warning: known but unsupported action ‘B’ for ‘#pragma A’ - ignored |
warning: unsupported OpenCL extension A - ignoring |
warning: expected ‘#pragma unused’ argument to be a variable name |
warning: only variables can be arguments to ‘#pragma unused’ |
warning: undeclared variable A used as an argument for ‘#pragma unused’ |
-Wignored-qualifiers¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: ARC |
|
lifetime qualifier on return type is ignored |
warning: ’A’ qualifier on omitted return type B has no effect |
warning: ’A’ type qualifier |
|
on return type |
|
no effect |
warning: ’A’ qualifier on function type B has no effect |
warning: ’A’ qualifier on reference type B has no effect |
-Wimplicit¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wimplicit-function-declaration, -Wimplicit-int.
-Wimplicit-atomic-properties¶
Diagnostic text:
warning: property is assumed atomic when auto-synthesizing the property |
warning: property is assumed atomic by default |
-Wimplicit-conversion-floating-point-to-bool¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit conversion turns floating-point number into bool: A to B |
-Wimplicit-exception-spec-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function previously declared with an |
|
exception specification redeclared with an |
|
exception specification |
-Wimplicit-fallthrough¶
Also controls -Wimplicit-fallthrough-per-function.
Diagnostic text:
warning: fallthrough annotation in unreachable code |
warning: unannotated fall-through between switch labels |
-Wimplicit-fallthrough-per-function¶
Diagnostic text:
warning: unannotated fall-through between switch labels in partly-annotated function |
-Wimplicit-function-declaration¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: implicit declaration of function A is invalid in |
|
warning: implicitly declaring library function ‘A’ with type B |
error: use of unknown builtin A |
warning: implicit declaration of function A |
-Wimplicit-int¶
This diagnostic is enabled by default.
Diagnostic text:
warning: type specifier missing, defaults to ‘int’ |
-Wimplicit-retain-self¶
Diagnostic text:
warning: block implicitly retains ‘self’; explicitly mention ‘self’ to indicate this is intended behavior |
-Wimplicitly-unsigned-literal¶
This diagnostic is enabled by default.
Diagnostic text:
warning: integer literal is too large to be represented in a signed integer type, interpreting as unsigned |
-Winaccessible-base¶
This diagnostic is enabled by default.
Diagnostic text:
warning: direct base A is inaccessible due to ambiguity:B |
-Winclude-next-absolute-path¶
This diagnostic is enabled by default.
Diagnostic text:
warning: #include_next with absolute path |
-Winclude-next-outside-header¶
This diagnostic is enabled by default.
Diagnostic text:
warning: #include_next in primary source file |
-Wincompatible-exception-spec¶
This diagnostic is enabled by default.
Diagnostic text:
warning: exception specifications of |
|
types differ |
warning: target exception specification is not superset of source |
-Wincompatible-function-pointer-types¶
This diagnostic is enabled by default.
Diagnostic text:
warning: incompatible function pointer types |
|
|
-Wincompatible-library-redeclaration¶
This diagnostic is enabled by default.
Diagnostic text:
warning: incompatible redeclaration of library function A |
-Wincompatible-ms-struct¶
This diagnostic is an error by default, but the flag -Wno-incompatible-ms-struct
can be used to disable the error.
Diagnostic text:
error: ms_struct may not produce Microsoft-compatible layouts for classes with base classes or virtual functions |
-Wincompatible-pointer-types¶
This diagnostic is enabled by default.
Also controls -Wincompatible-function-pointer-types, -Wincompatible-pointer-types-discards-qualifiers.
Diagnostic text:
warning: incompatible pointer types |
|
|
-Wincompatible-pointer-types-discards-qualifiers¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
discards qualifiers in nested pointer types |
warning: |
|
discards qualifiers |
-Wincompatible-property-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property type A is incompatible with type B inherited from C |
-Wincompatible-sysroot¶
This diagnostic is enabled by default.
Diagnostic text:
warning: using sysroot for ‘A’ but targeting ‘B’ |
-Wincomplete-implementation¶
This diagnostic is enabled by default.
Diagnostic text:
warning: method definition for A not found |
-Wincomplete-module¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wincomplete-umbrella, -Wnon-modular-include-in-module.
-Wincomplete-umbrella¶
This diagnostic is enabled by default.
Diagnostic text:
warning: missing submodule ‘A’ |
warning: umbrella directory ‘A’ not found |
warning: umbrella header for module ‘A’ does not include header ‘B’ |
-Winconsistent-dllimport¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A redeclared without B attribute: previous B ignored |
warning: A redeclared without ‘dllimport’ attribute: ‘dllexport’ attribute added |
-Winconsistent-missing-destructor-override¶
Diagnostic text:
warning: A overrides a destructor but is not marked ‘override’ |
-Winconsistent-missing-override¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A overrides a member function but is not marked ‘override’ |
-Wincrement-bool¶
This diagnostic is enabled by default.
Also controls -Wdeprecated-increment-bool.
Diagnostic text:
error: ISO C++17 does not allow incrementing expression of type bool |
-Winit-self¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Winitializer-overrides¶
This diagnostic is enabled by default.
Diagnostic text:
warning: initializer overrides prior initialization of this subobject |
warning: subobject initialization overrides initialization of other fields within its enclosing subobject |
-Winjected-class-name¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ISO C++ specifies that qualified reference to A is a constructor name rather than a |
|
in this context, despite preceding |
|
keyword |
-Winline-asm¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-Winline-new-delete¶
This diagnostic is enabled by default.
Diagnostic text:
warning: replacement function A cannot be declared ‘inline’ |
-Winstantiation-after-specialization¶
This diagnostic is enabled by default.
Diagnostic text:
warning: explicit instantiation of A that occurs after an explicit specialization has no effect |
-Wint-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: incompatible integer to pointer conversion |
|
|
warning: incompatible pointer to integer conversion |
|
|
-Wint-conversions¶
Synonym for -Wint-conversion.
-Wint-to-pointer-cast¶
This diagnostic is enabled by default.
Also controls -Wint-to-void-pointer-cast.
Diagnostic text:
warning: cast to B from smaller integer type A |
-Wint-to-void-pointer-cast¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cast to B from smaller integer type A |
-Winteger-overflow¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overflow in expression; result is A with type B |
-Winvalid-command-line-argument¶
This diagnostic is enabled by default.
Also controls -Wignored-optimization-argument.
Diagnostic text:
warning: the object size sanitizer has no effect at -O0, but is explicitly enabled: A |
warning: optimization level ‘A’ is not supported; using ‘BC’ instead |
-Winvalid-constexpr¶
This diagnostic is an error by default, but the flag -Wno-invalid-constexpr
can be used to disable the error.
Diagnostic text:
error: constexpr |
|
never produces a constant expression |
-Winvalid-iboutlet¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
with A attribute must be an object type (invalid B) |
warning: IBOutletCollection properties should be copy/strong and not assign |
-Winvalid-initializer-from-system-header¶
This diagnostic is enabled by default.
Diagnostic text:
warning: invalid constructor form class in system header, should not be explicit |
-Winvalid-ios-deployment-target¶
This diagnostic is an error by default, but the flag -Wno-invalid-ios-deployment-target
can be used to disable the error.
Diagnostic text:
error: invalid iOS deployment version ‘A’, iOS 10 is the maximum deployment target for 32-bit targets |
-Winvalid-noreturn¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function declared ‘noreturn’ should not return |
warning: function A declared ‘noreturn’ should not return |
-Winvalid-offsetof¶
This diagnostic is enabled by default.
Diagnostic text:
warning: offset of on non-POD type A |
warning: offset of on non-standard-layout type A |
-Winvalid-or-nonexistent-directory¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: environment variable SCE_ORBIS_SDK_DIR is set, but points to invalid or nonexistent directory ‘A’ |
warning: unable to find A directory, expected to be in ‘B’ |
-Winvalid-partial-specialization¶
This diagnostic is an error by default, but the flag -Wno-invalid-partial-specialization
can be used to disable the error.
Diagnostic text:
error: |
|
template partial specialization is not more specialized than the primary template |
-Winvalid-pch¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Winvalid-pp-token¶
This diagnostic is enabled by default.
Diagnostic text:
warning: empty character constant |
warning: missing terminating |
|
character |
-Winvalid-source-encoding¶
This diagnostic is enabled by default.
Diagnostic text:
warning: illegal character encoding in character literal |
warning: illegal character encoding in string literal |
-Winvalid-token-paste¶
This diagnostic is an error by default, but the flag -Wno-invalid-token-paste
can be used to disable the error.
Diagnostic text:
error: pasting formed ‘A’, an invalid preprocessing token |
-Wjump-seh-finally¶
This diagnostic is enabled by default.
Diagnostic text:
warning: jump out of __finally block has undefined behavior |
-Wkeyword-compat¶
This diagnostic is enabled by default.
Diagnostic text:
warning: keyword ‘A’ will be made available as an identifier |
|
-Wknr-promoted-parameter¶
This diagnostic is enabled by default.
Diagnostic text:
warning: promoted type of K&R function parameter is not compatible with parameter type declared in a previous prototype |
-Wlarge-by-value-copy¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is a large (B bytes) pass-by-value argument; pass it by reference instead ? |
warning: return value of A is a large (B bytes) pass-by-value object; pass it by reference instead ? |
-Wliteral-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit conversion from A to B changes value from C to D |
-Wliteral-range¶
This diagnostic is enabled by default.
Diagnostic text:
warning: magnitude of floating-point constant too large for type A; maximum is B |
warning: magnitude of floating-point constant too small for type A; minimum is B |
-Wlocal-type-template-args¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++98-compat-local-type-template-args.
Diagnostic text:
warning: template argument uses local type A |
-Wlogical-not-parentheses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: logical not is only applied to the left hand side of this |
|
-Wlogical-op-parentheses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’&&’ within ‘||’ |
-Wlong-long¶
Also controls -Wc++11-long-long.
Diagnostic text:
warning: ‘long long’ is an extension when C99 mode is not enabled |
-Wmacro-redefined¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A macro redefined |
-Wmain¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: ISO C++ does not allow ‘main’ to be used by a program |
warning: ‘main’ is not allowed to be declared _Noreturn |
warning: ‘main’ is not allowed to be declared variadic |
warning: only one parameter on ‘main’ declaration |
warning: variable named ‘main’ with external linkage has undefined behavior |
warning: bool literal returned from ‘main’ |
warning: ‘main’ should not be declared static |
-Wmain-return-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: return type of ‘main’ is not ‘int’ |
-Wmalformed-warning-check¶
This diagnostic is enabled by default.
Diagnostic text:
warning: __has_warning expected option name (e.g. “-Wundef”) |
-Wmany-braces-around-scalar-init¶
This diagnostic is enabled by default.
Diagnostic text:
warning: too many braces around scalar initializer |
-Wmax-unsigned-zero¶
This diagnostic is enabled by default.
Diagnostic text:
warning: taking the max of |
|
is always equal to the other value |
-Wmemsize-comparison¶
This diagnostic is enabled by default.
Diagnostic text:
warning: size argument in A call is a comparison |
-Wmethod-signatures¶
Diagnostic text:
warning: conflicting parameter types in implementation of A: B vs C |
warning: conflicting return type in implementation of A: B vs C |
-Wmicrosoft¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Winconsistent-dllimport, -Wmicrosoft-anon-tag, -Wmicrosoft-cast, -Wmicrosoft-charize, -Wmicrosoft-comment-paste, -Wmicrosoft-const-init, -Wmicrosoft-cpp-macro, -Wmicrosoft-default-arg-redefinition, -Wmicrosoft-end-of-file, -Wmicrosoft-enum-forward-reference, -Wmicrosoft-enum-value, -Wmicrosoft-exception-spec, -Wmicrosoft-explicit-constructor-call, -Wmicrosoft-extra-qualification, -Wmicrosoft-fixed-enum, -Wmicrosoft-flexible-array, -Wmicrosoft-goto, -Wmicrosoft-include, -Wmicrosoft-mutable-reference, -Wmicrosoft-pure-definition, -Wmicrosoft-redeclare-static, -Wmicrosoft-sealed, -Wmicrosoft-template, -Wmicrosoft-union-member-reference, -Wmicrosoft-unqualified-friend, -Wmicrosoft-using-decl, -Wmicrosoft-void-pseudo-dtor.
-Wmicrosoft-anon-tag¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: types declared in an anonymous |
|
are a Microsoft extension |
warning: anonymous |
|
are a Microsoft extension |
-Wmicrosoft-cast¶
This diagnostic is enabled by default.
Diagnostic text:
warning: static_cast between pointer-to-function and pointer-to-object is a Microsoft extension |
warning: implicit conversion between pointer-to-function and pointer-to-object is a Microsoft extension |
-Wmicrosoft-comment-paste¶
Diagnostic text:
warning: pasting two ‘/’ tokens into a ‘//’ comment is a Microsoft extension |
-Wmicrosoft-const-init¶
This diagnostic is enabled by default.
Diagnostic text:
warning: default initialization of an object of const type A |
|
is a Microsoft extension |
-Wmicrosoft-default-arg-redefinition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: redefinition of default argument |
-Wmicrosoft-end-of-file¶
Diagnostic text:
warning: treating Ctrl-Z as end-of-file is a Microsoft extension |
-Wmicrosoft-enum-forward-reference¶
This diagnostic is enabled by default.
Diagnostic text:
warning: forward references to ‘enum’ types are a Microsoft extension |
-Wmicrosoft-enum-value¶
Diagnostic text:
warning: enumerator value is not representable in the underlying type A |
-Wmicrosoft-exception-spec¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: exception specification of ‘…’ is a Microsoft extension |
warning: |
|
incomplete type B is not allowed in exception specification |
warning: exception specification in declaration does not match previous declaration |
warning: exception specification in explicit instantiation does not match instantiated one |
warning: A is missing exception specification ‘B’ |
warning: exception specification of overriding function is more lax than base version |
-Wmicrosoft-exists¶
This diagnostic is enabled by default.
Diagnostic text:
warning: dependent |
|
declarations are ignored |
-Wmicrosoft-explicit-constructor-call¶
This diagnostic is enabled by default.
Diagnostic text:
warning: explicit constructor calls are a Microsoft extension |
-Wmicrosoft-extra-qualification¶
This diagnostic is enabled by default.
Diagnostic text:
warning: extra qualification on member A |
-Wmicrosoft-fixed-enum¶
Diagnostic text:
warning: enumeration types with a fixed underlying type are a Microsoft extension |
-Wmicrosoft-flexible-array¶
Diagnostic text:
warning: flexible array member A in otherwise empty |
|
is a Microsoft extension |
warning: flexible array member A in a union is a Microsoft extension |
-Wmicrosoft-goto¶
This diagnostic is enabled by default.
Diagnostic text:
warning: jump from this goto statement to its label is a Microsoft extension |
-Wmicrosoft-include¶
This diagnostic is enabled by default.
Diagnostic text:
warning: #include resolved using non-portable Microsoft search rules as: A |
-Wmicrosoft-mutable-reference¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘mutable’ on a reference type is a Microsoft extension |
-Wmicrosoft-pure-definition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function definition with pure-specifier is a Microsoft extension |
-Wmicrosoft-redeclare-static¶
Diagnostic text:
warning: redeclaring non-static A as static is a Microsoft extension |
-Wmicrosoft-sealed¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘sealed’ keyword is a Microsoft extension |
-Wmicrosoft-template¶
This diagnostic is enabled by default.
Diagnostic text:
warning: duplicate explicit instantiation of A ignored as a Microsoft extension |
warning: use of identifier A found via unqualified lookup into dependent bases of class templates is a Microsoft extension |
warning: explicit specialization of A within class scope is a Microsoft extension |
warning: using the undeclared type A as a default template argument is a Microsoft extension |
warning: non-type template argument containing a dereference operation is a Microsoft extension |
warning: |
|
specialization of B outside namespace enclosing C is a Microsoft extension |
warning: template argument for template type parameter must be a type; omitted ‘typename’ is a Microsoft extension |
warning: use of undeclared identifier A; unqualified lookup into dependent bases of class template B is a Microsoft extension |
-Wmicrosoft-union-member-reference¶
This diagnostic is enabled by default.
Diagnostic text:
warning: union member A has reference type B, which is a Microsoft extension |
-Wmicrosoft-unqualified-friend¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unqualified friend declaration referring to type outside of the nearest enclosing namespace is a Microsoft extension; add a nested name specifier |
-Wmicrosoft-using-decl¶
This diagnostic is enabled by default.
Diagnostic text:
warning: using declaration referring to inaccessible member ‘A’ (which refers to accessible member ‘B’) is a Microsoft compatibility extension |
-Wmicrosoft-void-pseudo-dtor¶
This diagnostic is enabled by default.
Diagnostic text:
warning: pseudo-destructors on type void are a Microsoft extension |
-Wmismatched-new-delete¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘delete |
|
‘ applied to a pointer that was allocated with ‘new |
|
‘; did you mean ‘delete |
|
‘? |
-Wmismatched-parameter-types¶
This diagnostic is enabled by default.
Diagnostic text:
warning: conflicting parameter types in implementation of A |
-Wmismatched-return-types¶
This diagnostic is enabled by default.
Diagnostic text:
warning: conflicting return type in implementation of A |
-Wmismatched-tags¶
Diagnostic text:
warning: C defined as |
|
|
here but previously declared as |
|
|
warning: |
|
|
C was previously declared as a |
|
|
-Wmissing-declarations¶
This diagnostic is enabled by default.
Diagnostic text:
warning: declaration does not declare anything |
warning: ’A’ is not permitted on a declaration of a type |
warning: typedef requires a name |
warning: ’A’ ignored on this declaration |
-Wmissing-exception-spec¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is missing exception specification ‘B’ |
-Wmissing-format-attribute¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wmissing-include-dirs¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wmissing-method-return-type¶
Diagnostic text:
warning: method has no return type specified; defaults to ‘id’ |
-Wmissing-noescape¶
This diagnostic is enabled by default.
Diagnostic text:
warning: parameter of overriding method should be annotated with __attribute__((noescape)) |
-Wmissing-noreturn¶
Diagnostic text:
warning: block could be declared with attribute ‘noreturn’ |
warning: |
|
B could be declared with attribute ‘noreturn’ |
-Wmissing-prototype-for-cc¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function with no prototype cannot use the A calling convention |
-Wmissing-selector-name¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A used as the name of the previous parameter rather than as part of the selector |
-Wmissing-sysroot¶
This diagnostic is enabled by default.
Diagnostic text:
warning: no such sysroot directory: ‘A’ |
-Wmissing-variable-declarations¶
Diagnostic text:
warning: no previous extern declaration for non-static variable A |
-Rmodule-build¶
Diagnostic text:
remark: building module ‘A’ as ‘B’ |
remark: finished building module ‘A’ |
remark: could not acquire lock file for module ‘A’: B |
remark: timed out waiting to acquire lock file for module ‘A’ |
-Wmodule-conflict¶
This diagnostic is enabled by default.
Diagnostic text:
warning: module ‘A’ conflicts with already-imported module ‘B’: C |
warning: module file ‘A’ was validated as a system module and is now being imported as a non-system module; any difference in diagnostic options will be ignored |
-Wmodule-file-config-mismatch¶
This diagnostic is an error by default, but the flag -Wno-module-file-config-mismatch
can be used to disable the error.
Diagnostic text:
error: module file A cannot be loaded due to a configuration mismatch with the current compilation |
-Wmodule-file-extension¶
This diagnostic is enabled by default.
Diagnostic text:
warning: duplicate module file extension block name ‘A’ |
-Wmodule-import-in-extern-c¶
This diagnostic is an error by default, but the flag -Wno-module-import-in-extern-c
can be used to disable the error.
Diagnostic text:
error: import of C++ module ‘A’ appears within extern “C” language linkage specification |
-Wmodules-ambiguous-internal-linkage¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ambiguous use of internal linkage declaration A defined in multiple modules |
-Wmodules-import-nested-redundant¶
This diagnostic is an error by default, but the flag -Wno-modules-import-nested-redundant
can be used to disable the error.
Diagnostic text:
error: redundant #include of module ‘A’ appears within B |
-Wmost¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wcast-of-sel-type, -Wchar-subscripts, -Wcomment, -Wdelete-non-virtual-dtor, -Wextern-c-compat, -Wfor-loop-analysis, -Wformat, -Wimplicit, -Winfinite-recursion, -Wmismatched-tags, -Wmissing-braces, -Wmove, -Wmultichar, -Wobjc-designated-initializers, -Wobjc-flexible-array, -Wobjc-missing-super-calls, -Woverloaded-virtual, -Wprivate-extern, -Wreorder, -Wreturn-type, -Wself-assign, -Wself-move, -Wsizeof-array-argument, -Wsizeof-array-decay, -Wstring-plus-int, -Wtrigraphs, -Wuninitialized, -Wunknown-pragmas, -Wunused, -Wuser-defined-warnings, -Wvolatile-register-var.
-Wmove¶
Controls -Wpessimizing-move, -Wredundant-move, -Wself-move.
-Wmsvc-include¶
Synonym for -Wmicrosoft-include.
-Wmsvc-not-found¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unable to find a Visual Studio installation; try running Clang from a developer command prompt |
-Wmultichar¶
This diagnostic is enabled by default.
Diagnostic text:
warning: multi-character character constant |
-Wmultiple-move-vbase¶
This diagnostic is enabled by default.
Diagnostic text:
warning: defaulted move assignment operator of A will move assign virtual base class B multiple times |
-Wnarrowing¶
Synonym for -Wc++11-narrowing.
-Wnested-anon-types¶
Diagnostic text:
warning: anonymous types declared in an anonymous |
|
are an extension |
-Wnested-externs¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wnew-returns-null¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A should not return a null pointer unless it is declared ‘throw()’ |
|
-Wnewline-eof¶
Diagnostic text:
warning: no newline at end of file |
warning: no newline at end of file |
-Wnoexcept-type¶
Synonym for -Wc++17-compat-mangling.
-Wnon-gcc¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wconversion, -Wliteral-range, -Wsign-compare.
-Wnon-literal-null-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: expression which evaluates to zero treated as a null pointer constant of type A |
-Wnon-modular-include-in-framework-module¶
Diagnostic text:
warning: include of non-modular header inside framework module ‘A’: ‘B’ |
-Wnon-modular-include-in-module¶
Also controls -Wnon-modular-include-in-framework-module.
Diagnostic text:
warning: include of non-modular header inside module ‘A’: ‘B’ |
-Wnon-pod-varargs¶
This diagnostic is an error by default, but the flag -Wno-non-pod-varargs
can be used to disable the error.
Diagnostic text:
error: cannot pass object of |
|
type B through variadic |
|
; call will abort at runtime |
error: cannot pass |
|
object of type B to variadic |
|
; expected type from format string was D |
error: second argument to ‘va_arg’ is of non-POD type A |
error: second argument to ‘va_arg’ is of ARC ownership-qualified type A |
-Wnonnull¶
This diagnostic is enabled by default.
Diagnostic text:
warning: null passed to a callee that requires a non-null argument |
warning: null returned from |
|
that requires a non-null return value |
-Wnonportable-cfstrings¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wnonportable-include-path¶
This diagnostic is enabled by default.
Diagnostic text:
warning: non-portable path to file ‘A’; specified path differs in case from file name on disk |
-Wnonportable-system-include-path¶
Diagnostic text:
warning: non-portable path to file ‘A’; specified path differs in case from file name on disk |
-Wnonportable-vector-initialization¶
This diagnostic is enabled by default.
Diagnostic text:
warning: vector initializers are not compatible with NEON intrinsics in big endian mode |
-Wnsconsumed-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overriding method has mismatched ns_consumed attribute on its parameter |
-Wnsreturns-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overriding method has mismatched ns_returns_ |
|
attributes |
-Wnull-arithmetic¶
This diagnostic is enabled by default.
Diagnostic text:
warning: use of NULL in arithmetic operation |
warning: comparison between NULL and non-pointer |
|
-Wnull-character¶
This diagnostic is enabled by default.
Diagnostic text:
warning: null character(s) preserved in |
|
literal |
warning: null character ignored |
-Wnull-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit conversion of |
|
constant to B |
-Wnull-dereference¶
This diagnostic is enabled by default.
Diagnostic text:
warning: binding dereferenced null pointer to reference has undefined behavior |
warning: indirection of non-volatile null pointer will be deleted, not trap |
-Wnull-pointer-arithmetic¶
Diagnostic text:
warning: arithmetic on a null pointer treated as a cast from integer to pointer is a GNU extension |
warning: performing pointer arithmetic on a null pointer has undefined behavior |
|
-Wnullability¶
This diagnostic is enabled by default.
Diagnostic text:
warning: conflicting nullability specifier on parameter types, A conflicts with existing specifier B |
warning: conflicting nullability specifier on return types, A conflicts with existing specifier B |
warning: nullability specifier A conflicts with existing specifier B |
warning: synthesized setter A for null_resettable property B does not handle nil |
warning: duplicate nullability specifier A |
-Wnullability-completeness¶
This diagnostic is enabled by default.
Also controls -Wnullability-completeness-on-arrays.
Diagnostic text:
warning: |
|
is missing a nullability type specifier (_Nonnull, _Nullable, or _Null_unspecified) |
-Wnullability-completeness-on-arrays¶
This diagnostic is enabled by default.
Diagnostic text:
warning: array parameter is missing a nullability type specifier (_Nonnull, _Nullable, or _Null_unspecified) |
-Wnullability-declspec¶
This diagnostic is an error by default, but the flag -Wno-nullability-declspec
can be used to disable the error.
Diagnostic text:
error: nullability specifier A cannot be applied to non-pointer type B; did you mean to apply the specifier to the |
|
? |
-Wnullability-extension¶
Diagnostic text:
warning: type nullability specifier A is a Clang extension |
-Wnullability-inferred-on-nested-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: inferring ‘_Nonnull’ for pointer type within |
|
is deprecated |
-Wnullable-to-nonnull-conversion¶
Diagnostic text:
warning: implicit conversion from nullable pointer A to non-nullable pointer type B |
-Wobjc-autosynthesis-property-ivar-name-match¶
This diagnostic is enabled by default.
Diagnostic text:
warning: autosynthesized property A will use |
|
instance variable C, not existing instance variable D |
-Wobjc-circular-container¶
This diagnostic is enabled by default.
Diagnostic text:
warning: adding ‘A’ to ‘B’ might cause circular dependency in container |
-Wobjc-cocoa-api¶
Synonym for -Wobjc-redundant-api-use.
-Wobjc-designated-initializers¶
This diagnostic is enabled by default.
Diagnostic text:
warning: designated initializer missing a ‘super’ call to a designated initializer of the super class |
warning: designated initializer invoked a non-designated initializer |
warning: designated initializer should only invoke a designated initializer on ‘super’ |
warning: method override for the designated initializer of the superclass A not found |
warning: convenience initializer missing a ‘self’ call to another initializer |
warning: convenience initializer should not invoke an initializer on ‘super’ |
-Wobjc-flexible-array¶
This diagnostic is enabled by default.
Diagnostic text:
warning: field A can overwrite instance variable B with variable sized type C in superclass D |
warning: field A with variable sized type B is not visible to subclasses and can conflict with their instance variables |
-Wobjc-forward-class-redefinition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: redefinition of forward class A of a typedef name of an object type is ignored |
-Wobjc-interface-ivars¶
Diagnostic text:
warning: declaration of instance variables in the interface is deprecated |
-Wobjc-literal-compare¶
This diagnostic is enabled by default.
Also controls -Wobjc-string-compare.
Diagnostic text:
warning: direct comparison of |
|
has undefined behavior |
-Wobjc-literal-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicit boolean conversion of Objective-C object literal always evaluates to true |
warning: object of type A is not compatible with |
|
C |
-Wobjc-macro-redefinition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring redefinition of Objective-C qualifier macro |
-Wobjc-method-access¶
This diagnostic is enabled by default.
Diagnostic text:
warning: class method A not found (return type defaults to ‘id’) |
warning: class method A not found (return type defaults to ‘id’); did you mean C? |
warning: instance method A not found (return type defaults to ‘id’) |
warning: instance method A not found (return type defaults to ‘id’); did you mean C? |
warning: instance method A found instead of class method B |
warning: instance method A is being used on ‘Class’ which is not in the root class |
-Wobjc-missing-property-synthesis¶
Diagnostic text:
warning: auto property synthesis is synthesizing property not explicitly synthesized |
-Wobjc-missing-super-calls¶
This diagnostic is enabled by default.
Diagnostic text:
warning: method possibly missing a [super A] call |
-Wobjc-multiple-method-names¶
This diagnostic is enabled by default.
Diagnostic text:
warning: multiple methods named A found |
-Wobjc-noncopy-retain-block-property¶
This diagnostic is enabled by default.
Diagnostic text:
warning: retain’ed block property does not copy the block - use copy attribute instead |
-Wobjc-nonunified-exceptions¶
This diagnostic is enabled by default.
Diagnostic text:
warning: cannot catch an exception thrown with @throw in C++ in the non-unified exception model |
-Wobjc-property-implementation¶
This diagnostic is enabled by default.
Diagnostic text:
warning: class property A requires method B to be defined - use @dynamic or provide a method implementation in this class implementation |
warning: class property A requires method B to be defined - use @dynamic or provide a method implementation in this category |
warning: property A requires method B to be defined - use @synthesize, @dynamic or provide a method implementation in this class implementation |
warning: property A requires method B to be defined - use @dynamic or provide a method implementation in this category |
-Wobjc-property-implicit-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: primary property declaration is implicitly strong while redeclaration in class extension is weak |
-Wobjc-property-matches-cocoa-ownership-rule¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property follows Cocoa naming convention for returning ‘owned’ objects |
-Wobjc-property-no-attribute¶
This diagnostic is enabled by default.
Diagnostic text:
warning: default property attribute ‘assign’ not appropriate for object |
warning: no ‘assign’, ‘retain’, or ‘copy’ attribute is specified - ‘assign’ is assumed |
-Wobjc-property-synthesis¶
This diagnostic is enabled by default.
Diagnostic text:
warning: auto property synthesis will not synthesize property A; it will be implemented by its superclass, use @dynamic to acknowledge intention |
warning: auto property synthesis will not synthesize property A because it is ‘readwrite’ but it will be synthesized ‘readonly’ via another property |
warning: auto property synthesis will not synthesize property A because it cannot share an ivar with another synthesized property |
-Wobjc-protocol-method-implementation¶
This diagnostic is enabled by default.
Diagnostic text:
warning: category is implementing a method which will also be implemented by its primary class |
-Wobjc-protocol-property-synthesis¶
This diagnostic is enabled by default.
Diagnostic text:
warning: auto property synthesis will not synthesize property A declared in protocol B |
-Wobjc-protocol-qualifiers¶
This diagnostic is enabled by default.
Diagnostic text:
warning: parameterized class A already conforms to the protocols listed; did you forget a ‘*’? |
-Wobjc-readonly-with-setter-property¶
This diagnostic is enabled by default.
Diagnostic text:
warning: setter cannot be specified for a readonly property |
-Wobjc-redundant-api-use¶
Synonym for -Wobjc-redundant-literal-use.
-Wobjc-redundant-literal-use¶
This diagnostic is enabled by default.
Diagnostic text:
warning: using A with a literal is redundant |
-Wobjc-root-class¶
This diagnostic is enabled by default.
Diagnostic text:
warning: class A defined without specifying a base class |
-Wobjc-string-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: direct comparison of a string literal has undefined behavior |
-Wobjc-string-concatenation¶
This diagnostic is enabled by default.
Diagnostic text:
warning: concatenated NSString literal for an NSArray expression - possibly missing a comma |
-Wobjc-unsafe-perform-selector¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is incompatible with selectors that return a |
|
type |
-Wodr¶
This diagnostic is enabled by default.
Diagnostic text:
warning: type A has incompatible definitions in different translation units |
-Wold-style-definition¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wopencl-unsupported-rgba¶
This diagnostic is enabled by default.
Diagnostic text:
warning: vector component name ‘A’ is an OpenCL version 2.2 feature |
-Wopenmp-clauses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: aligned clause will be ignored because the requested alignment is not a power of 2 |
warning: zero linear step (A |
|
should probably be const) |
-Wopenmp-loop-form¶
This diagnostic is enabled by default.
Diagnostic text:
warning: initialization clause of OpenMP for loop is not in canonical form (‘var = init’ or ‘T var = init’) |
warning: OpenMP loop iteration variable cannot have more than 64 bits size and will be narrowed |
-Wopenmp-target¶
This diagnostic is enabled by default.
Diagnostic text:
warning: The OpenMP offloading target ‘A’ is similar to target ‘B’ already specified - will be ignored. |
warning: declaration is not declared in any declare target region |
-Woption-ignored¶
This diagnostic is enabled by default.
Diagnostic text:
warning: option ‘-ffine-grained-bitfield-accesses’ cannot be enabled together with a sanitizer; flag ignored |
warning: option ‘A’ was ignored by the PS4 toolchain, using ‘-fPIC’ |
warning: ignoring ‘-mabicalls’ option as it cannot be used with non position-independent code and the N64 ABI |
warning: ignoring ‘-mlong-calls’ option as it is not currently supported with |
|
-mabicalls |
-Wout-of-line-declaration¶
This diagnostic is an error by default, but the flag -Wno-out-of-line-declaration
can be used to disable the error.
Diagnostic text:
error: out-of-line declaration of a member must be a definition |
-Wout-of-scope-function¶
This diagnostic is enabled by default.
Diagnostic text:
warning: use of out-of-scope declaration of A |
|
-Wover-aligned¶
Diagnostic text:
warning: type A requires B bytes of alignment and the default allocator only guarantees C bytes |
-Woverflow¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Woverlength-strings¶
Diagnostic text:
warning: string literal of length A exceeds maximum length B that |
|
compilers are required to support |
-Woverloaded-shift-op-parentheses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overloaded operator |
|
has higher precedence than comparison operator |
-Woverride-module¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overriding the module target triple with A |
-Woverriding-method-mismatch¶
Diagnostic text:
warning: conflicting distributed object modifiers on parameter type in declaration of A |
warning: conflicting parameter types in declaration of A |
warning: conflicting distributed object modifiers on return type in declaration of A |
warning: conflicting return type in declaration of A |
warning: conflicting variadic declaration of method and its implementation |
warning: conflicting parameter types in declaration of A: B vs C |
warning: conflicting return type in declaration of A: B vs C |
-Woverriding-t-option¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overriding ‘A’ option with ‘B’ |
-Wpadded¶
Diagnostic text:
warning: padding |
|
B with C |
|
|
to align anonymous bit-field |
warning: padding |
|
B with C |
|
|
to align E |
warning: padding size of A with B |
|
|
to alignment boundary |
-Wparentheses¶
This diagnostic is enabled by default.
Also controls -Wbitwise-op-parentheses, -Wdangling-else, -Wlogical-not-parentheses, -Wlogical-op-parentheses, -Woverloaded-shift-op-parentheses, -Wparentheses-equality, -Wshift-op-parentheses.
Diagnostic text:
warning: using the result of an assignment as a condition without parentheses |
warning: A has lower precedence than B; B will be evaluated first |
warning: operator ‘?:’ has lower precedence than ‘A’; ‘A’ will be evaluated first |
-Wparentheses-equality¶
This diagnostic is enabled by default.
Diagnostic text:
warning: equality comparison with extraneous parentheses |
-Wpartial-availability¶
Synonym for -Wunguarded-availability.
-Rpass-analysis¶
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
remark: A; allow reordering by specifying ‘#pragma clang loop vectorize(enable)’ before the loop. If the arrays will always be independent specify ‘#pragma clang loop vectorize(assume_safety)’ before the loop or provide the ‘__restrict__’ qualifier with the independent array arguments. Erroneous results will occur if these options are incorrectly applied! |
remark: A; allow reordering by specifying ‘#pragma clang loop vectorize(enable)’ before the loop or by providing the compiler option ‘-ffast-math’. |
-Wpass-failed¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-Wpch-date-time¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
uses __DATE__ or __TIME__ |
-Wpedantic¶
Also controls -Wc++11-extra-semi, -Wc++11-long-long, -Wc++14-binary-literal, -Wc11-extensions, -Wcomplex-component-init, -Wdeclaration-after-statement, -Wdollar-in-identifier-extension, -Wembedded-directive, -Wempty-translation-unit, -Wextended-offsetof, -Wflexible-array-extensions, -Wformat-pedantic, -Wfour-char-constants, -Wgnu-anonymous-struct, -Wgnu-auto-type, -Wgnu-binary-literal, -Wgnu-case-range, -Wgnu-complex-integer, -Wgnu-compound-literal-initializer, -Wgnu-conditional-omitted-operand, -Wgnu-empty-initializer, -Wgnu-empty-struct, -Wgnu-flexible-array-initializer, -Wgnu-flexible-array-union-member, -Wgnu-folding-constant, -Wgnu-imaginary-constant, -Wgnu-include-next, -Wgnu-label-as-value, -Wgnu-redeclared-enum, -Wgnu-statement-expression, -Wgnu-union-cast, -Wgnu-zero-line-directive, -Wgnu-zero-variadic-macro-arguments, -Wimport-preprocessor-directive-pedantic, -Wkeyword-macro, -Wlanguage-extension-token, -Wlong-long, -Wmicrosoft-charize, -Wmicrosoft-comment-paste, -Wmicrosoft-cpp-macro, -Wmicrosoft-end-of-file, -Wmicrosoft-enum-value, -Wmicrosoft-fixed-enum, -Wmicrosoft-flexible-array, -Wmicrosoft-redeclare-static, -Wnested-anon-types, -Wnullability-extension, -Woverlength-strings, -Wretained-language-linkage, -Wundefined-internal-type, -Wvla-extension, -Wzero-length-array.
Diagnostic text:
warning: ‘enable_if’ is a clang extension |
warning: ‘diagnose_if’ is a clang extension |
warning: designated initializers are a C99 feature |
warning: ISO C++ does not allow ‘main’ to be used by a program |
warning: C++98 requires an accessible copy constructor for class C when binding a reference to a temporary; was |
|
warning: anonymous |
|
cannot be ‘B’ |
warning: no viable constructor |
|
of type B; C++98 requires a copy constructor when binding a reference to a temporary |
warning: parameter A was not declared, defaulting to type ‘int’ |
warning: invoking a pointer to a ‘const &’ member function on an rvalue is a C++2a extension |
warning: qualifier in explicit instantiation of A requires a template-id (a typedef is not permitted) |
warning: static |
|
B is used in an inline function with external linkage |
warning: ISO C forbids forward references to ‘enum’ types |
warning: ISO C restricts enumerator values to range of ‘int’ (A is too |
|
) |
warning: size of static array must be an integer constant expression |
warning: initializer for aggregate is not a compile-time constant |
warning: flexible array members are a C99 feature |
warning: invalid application of ‘ |
|
‘ to a function type |
warning: invalid application of ‘ |
|
‘ to a void type |
warning: ISO C90 does not allow subscripting non-lvalue array |
warning: subscript of a pointer to void is a GNU extension |
warning: ISO C forbids taking the address of an expression of type ‘void’ |
warning: ordered comparison between pointer and zero (A and B) is an extension |
warning: equality comparison between function pointer and void pointer (A and B) |
warning: arithmetic on |
|
pointer |
|
to void is a GNU extension |
warning: arithmetic on |
|
pointer |
|
to |
|
function type |
|
B |
|
is a GNU extension |
warning: ISO C does not support ‘++’/’–’ on complex integer type A |
warning: ISO C does not support ‘~’ for complex conjugation of A |
warning: complex numbers are an extension in a freestanding C99 implementation |
warning: cast between pointer-to-function and pointer-to-object is an extension |
warning: implicit conversion from array size expression of type A to |
|
type C is a C++11 extension |
warning: |
|
converts between void pointer and function pointer |
warning: kernel function A is a member function; this may not be accepted by nvcc |
warning: C99 forbids conditional expressions with only one void side |
warning: C99 forbids casting nonscalar type A to the same type |
warning: use of the A attribute is a C++14 extension |
warning: use of the A attribute is a C++17 extension |
warning: types declared in an anonymous |
|
are a Microsoft extension |
warning: void |
|
A should not return void expression |
warning: ’A’ cannot be signed or unsigned |
warning: |
|
array size |
|
is a C99 feature |
warning: extra ‘;’ |
|
warning: ‘__thread’ before ‘A’ |
warning: type-less parameter names in function declaration |
warning: variable declaration in for loop is a C99-specific feature |
warning: compound literals are a C99-specific feature |
warning: commas at the end of enumerator lists are a C99-specific feature |
warning: commas at the end of enumerator lists are a C++11 extension |
warning: enumeration types with a fixed underlying type are a C++11 extension |
warning: use of GNU array range extension |
warning: exception specification of ‘…’ is a Microsoft extension |
warning: attributes on |
|
declaration are a C++17 extension |
warning: extern templates are a C++11 extension |
warning: multi-line // comment |
warning: // comments are not allowed in this language |
warning: no newline at end of file |
warning: use of non-standard escape character ‘\A’ |
warning: hexadecimal floating constants are a C99 feature |
warning: hexadecimal floating literals are a C++17 feature |
warning: #ident is a language extension |
warning: #warning is a language extension |
warning: comma operator in operand of #if |
warning: __VA_ARGS__ can only appear in the expansion of a C99 variadic macro |
warning: variadic macros are a C99 feature |
warning: named variadic macros are a GNU extension |
warning: empty macro arguments are a C99 feature |
warning: C requires #line number to be less than A, allowed as extension |
warning: macro expansion producing ‘defined’ has undefined behavior |
-Wpedantic-core-features¶
Diagnostic text:
warning: OpenCL extension A is core feature or supported optional core feature - ignoring |
-Wpessimizing-move¶
Diagnostic text:
warning: moving a temporary object prevents copy elision |
warning: moving a local object in a return statement prevents copy elision |
-Wpointer-arith¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: arithmetic on |
|
pointer |
|
to |
|
function type |
|
B |
|
is a GNU extension |
warning: subscript of a pointer to void is a GNU extension |
warning: arithmetic on |
|
pointer |
|
to void is a GNU extension |
warning: invalid application of ‘ |
|
‘ to a function type |
warning: invalid application of ‘ |
|
‘ to a void type |
warning: subtraction of pointers to type A of zero size has undefined behavior |
-Wpointer-bool-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: nonnull |
|
’B’ will evaluate to ‘true’ on first encounter |
warning: address of |
|
’B’ will always evaluate to ‘true’ |
-Wpointer-sign¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
converts between pointers to integer types with different sign |
-Wpointer-to-int-cast¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wpointer-type-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: pointer type mismatch |
-Wpotentially-evaluated-expression¶
This diagnostic is enabled by default.
Diagnostic text:
warning: expression with side effects will be evaluated despite being used as an operand to ‘typeid’ |
-Wpragma-clang-attribute¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unused attribute A in ‘#pragma clang attribute push’ region |
-Wpragma-once-outside-header¶
This diagnostic is enabled by default.
Diagnostic text:
warning: #pragma once in main file |
-Wpragma-pack¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wpragma-pack-suspicious-include.
Diagnostic text:
warning: the current #pragma pack aligment value is modified in the included file |
warning: unterminated ‘#pragma pack (push, …)’ at end of file |
-Wpragma-pack-suspicious-include¶
Diagnostic text:
warning: non-default #pragma pack value changes the alignment of struct or union members in the included file |
-Wpragma-system-header-outside-header¶
This diagnostic is enabled by default.
Diagnostic text:
warning: #pragma system_header ignored in main file |
-Wpragmas¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wignored-pragmas, -Wpragma-clang-attribute, -Wpragma-pack, -Wunknown-pragmas.
Diagnostic text:
warning: #pragma redefine_extname is applicable to external C declarations only; not applied to |
|
B |
-Wpredefined-identifier-outside-function¶
This diagnostic is enabled by default.
Diagnostic text:
warning: predefined identifier is only valid inside function |
-Wprivate-extern¶
This diagnostic is enabled by default.
Diagnostic text:
warning: use of __private_extern__ on a declaration may not produce external symbol private to the linkage unit and is deprecated |
-Wprivate-header¶
This diagnostic is an error by default, but the flag -Wno-private-header
can be used to disable the error.
Diagnostic text:
error: use of private header from outside its module: ‘A’ |
-Wprivate-module¶
This diagnostic is enabled by default.
Diagnostic text:
warning: top-level module ‘A’ in private module map, expected a submodule of ‘B’ |
warning: module ‘A’ already re-exported as ‘B’ |
-Wprofile-instr-missing¶
Diagnostic text:
warning: profile data may be incomplete: of A function |
|
, B |
|
no data |
-Wprofile-instr-out-of-date¶
This diagnostic is enabled by default.
Diagnostic text:
warning: profile data may be out of date: of A function |
|
, B |
|
mismatched data that will be ignored |
-Wprofile-instr-unprofiled¶
This diagnostic is enabled by default.
Diagnostic text:
warning: no profile data available for file “A” |
-Wproperty-access-dot-syntax¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property A not found on object of type B; did you mean to access property C? |
-Wproperty-attribute-mismatch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property attribute in class extension does not match the primary class |
warning: ’B’ attribute on property A does not match the property inherited from C |
warning: getter name mismatch between property redeclaration (B) and its original declaration (A) |
warning: attribute ‘readonly’ of property A restricts attribute ‘readwrite’ of property inherited from B |
-Wprotocol¶
This diagnostic is enabled by default.
Diagnostic text:
warning: method A in protocol B not implemented |
-Wprotocol-property-synthesis-ambiguity¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property |
|
was selected for synthesis |
-Wqualified-void-return-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: function cannot return qualified void type A |
-Wrange-loop-analysis¶
Diagnostic text:
warning: loop variable A is initialized with a value of a different type resulting in a copy |
warning: loop variable A of type B creates a copy from type C |
warning: loop variable A is always a copy because the range of type B does not return a reference |
-Wreadonly-iboutlet-property¶
This diagnostic is enabled by default.
Diagnostic text:
warning: readonly IBOutlet property A when auto-synthesized may not work correctly with ‘nib’ loader |
-Wreceiver-expr¶
This diagnostic is enabled by default.
Diagnostic text:
warning: receiver type A is not ‘id’ or interface pointer, consider casting it to ‘id’ |
-Wreceiver-forward-class¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: receiver A is a forward class and corresponding @interface may not exist |
warning: receiver type A for instance message is a forward declaration |
-Wredeclared-class-member¶
This diagnostic is enabled by default.
Diagnostic text:
warning: class member cannot be redeclared |
-Wredundant-decls¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wregister¶
This diagnostic is enabled by default.
Also controls -Wdeprecated-register.
Diagnostic text:
error: ISO C++17 does not allow ‘register’ storage class specifier |
-Wreinterpret-base-class¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ‘reinterpret_cast’ |
|
class A |
|
its |
|
B behaves differently from ‘static_cast’ |
-Wrequires-super-attribute¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A attribute cannot be applied to |
|
-Wreserved-user-defined-literal¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++11-compat-reserved-user-defined-literal.
Diagnostic text:
warning: invalid suffix on literal; C++11 requires a space between literal and identifier |
error: invalid suffix on literal; C++11 requires a space between literal and identifier |
-Wretained-language-linkage¶
Diagnostic text:
warning: friend function A retaining previous language linkage is an extension |
-Wreturn-stack-address¶
This diagnostic is enabled by default.
Diagnostic text:
warning: returning address of label, which is local |
warning: returning |
|
local temporary object |
warning: |
|
stack memory associated with local variable B returned |
-Wreturn-type¶
This diagnostic is enabled by default.
Also controls -Wreturn-type-c-linkage.
Diagnostic text:
error: |
|
A should not return a value |
error: non-void |
|
A should return a value |
warning: control reaches end of coroutine; which is undefined behavior because the promise type A does not declare ‘return_void()’ |
warning: control reaches end of non-void function |
warning: control reaches end of non-void lambda |
warning: control may reach end of coroutine; which is undefined behavior because the promise type A does not declare ‘return_void()’ |
warning: control may reach end of non-void function |
warning: control may reach end of non-void lambda |
error: non-void |
|
A should return a value |
-Wreturn-type-c-linkage¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A has C-linkage specified, but returns user-defined type B which is incompatible with C |
warning: A has C-linkage specified, but returns incomplete type B which could be incompatible with C |
-Wrtti-for-exceptions¶
This diagnostic is enabled by default.
Diagnostic text:
warning: implicitly enabling rtti for exception handling |
-Rsanitize-address¶
Diagnostic text:
remark: -fsanitize-address-field-padding applied to A |
remark: -fsanitize-address-field-padding ignored for A because it |
|
-Wsection¶
This diagnostic is enabled by default.
Diagnostic text:
warning: section attribute is specified on redeclared variable |
warning: section does not match previous declaration |
-Wselector¶
Also controls -Wselector-type-mismatch.
Diagnostic text:
warning: no method with selector A is implemented in this translation unit |
-Wselector-type-mismatch¶
Diagnostic text:
warning: several methods with selector A of mismatched types are found for the @selector expression |
-Wself-assign¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wself-assign-field.
Diagnostic text:
warning: explicitly assigning value of variable of type A to itself |
-Wself-assign-field¶
This diagnostic is enabled by default.
Diagnostic text:
warning: assigning |
|
to itself |
-Wsentinel¶
This diagnostic is enabled by default.
Diagnostic text:
warning: missing sentinel in |
|
warning: not enough variable arguments in A declaration to fit a sentinel |
-Wsequence-point¶
Synonym for -Wunsequenced.
-Wserialized-diagnostics¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unable to open file A for serializing diagnostics (B) |
warning: unable to merge a subprocess’s serialized diagnostics |
-Wshadow¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wshadow-field-in-constructor-modified, -Wshadow-ivar.
Diagnostic text:
warning: declaration shadows a |
|
-Wshadow-all¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wshadow, -Wshadow-field, -Wshadow-field-in-constructor, -Wshadow-uncaptured-local.
-Wshadow-field¶
Diagnostic text:
warning: non-static data member ‘A’ of ‘B’ shadows member inherited from type ‘C’ |
-Wshadow-field-in-constructor¶
Also controls -Wshadow-field-in-constructor-modified.
Diagnostic text:
warning: constructor parameter A shadows the field B of C |
-Wshadow-field-in-constructor-modified¶
Diagnostic text:
warning: modifying constructor parameter A that shadows a field of B |
-Wshadow-ivar¶
This diagnostic is enabled by default.
Diagnostic text:
warning: local declaration of A hides instance variable |
-Wshadow-uncaptured-local¶
Diagnostic text:
warning: declaration shadows a |
|
-Wshift-count-negative¶
This diagnostic is enabled by default.
Diagnostic text:
warning: shift count is negative |
-Wshift-count-overflow¶
This diagnostic is enabled by default.
Diagnostic text:
warning: shift count >= width of type |
-Wshift-negative-value¶
This diagnostic is enabled by default.
Diagnostic text:
warning: shifting a negative signed value is undefined |
-Wshift-op-parentheses¶
This diagnostic is enabled by default.
Diagnostic text:
warning: operator ‘A’ has lower precedence than ‘B’; ‘B’ will be evaluated first |
-Wshift-overflow¶
This diagnostic is enabled by default.
Diagnostic text:
warning: signed shift result (A) requires B bits to represent, but C only has D bits |
-Wshift-sign-overflow¶
Diagnostic text:
warning: signed shift result (A) sets the sign bit of the shift expression’s type (B) and becomes negative |
-Wsign-conversion¶
Diagnostic text:
warning: implicit conversion changes signedness: A to B |
warning: operand of ? changes signedness: A to B |
-Wsign-promo¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wsigned-enum-bitfield¶
Diagnostic text:
warning: enums in the Microsoft ABI are signed integers by default; consider giving the enum A an unsigned underlying type to make this code portable |
-Wsizeof-array-argument¶
This diagnostic is enabled by default.
Diagnostic text:
warning: sizeof on array function parameter will return size of A instead of B |
-Wsizeof-array-decay¶
This diagnostic is enabled by default.
Diagnostic text:
warning: sizeof on pointer operation will return size of A instead of B |
-Wsizeof-pointer-memaccess¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’A’ call operates on objects of type B while the size is based on a different type C |
warning: argument to ‘sizeof’ in A call is the same pointer type B as the |
|
; expected D or an explicit length |
-Wslash-u-filename¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ’/UA’ treated as the ‘/U’ option |
-Wsometimes-uninitialized¶
Diagnostic text:
warning: variable A is |
|
uninitialized whenever |
|
-Wsource-uses-openmp¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: OpenMP only allows an ordered construct with the simd clause nested in a simd construct |
warning: unexpected ‘#pragma omp …’ in program |
-Wstack-protector¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstatic-float-init¶
This diagnostic is enabled by default.
Also controls -Wgnu-static-float-init.
Diagnostic text:
error: in-class initializer for static data member of type A requires ‘constexpr’ specifier |
-Wstatic-in-inline¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: static |
|
B is used in an inline function with external linkage |
warning: static |
|
B is used in an inline function with external linkage |
-Wstatic-inline-explicit-instantiation¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring ‘ |
|
‘ keyword on explicit template instantiation |
-Wstatic-local-in-inline¶
This diagnostic is enabled by default.
Diagnostic text:
warning: non-constant static local variable in inline function may be different in different files |
-Wstatic-self-init¶
This diagnostic is enabled by default.
Diagnostic text:
warning: static variable A is suspiciously used within its own initialization |
-Wstrict-aliasing¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-aliasing=0¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-aliasing=1¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-aliasing=2¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=0¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=1¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=2¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=3¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=4¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-overflow=5¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wstrict-prototypes¶
Diagnostic text:
warning: this |
|
a prototype |
-Wstrict-prototypes¶
Diagnostic text:
warning: this |
|
a prototype |
-Wstring-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: result of comparison against |
|
is unspecified (use strncmp instead) |
-Wstring-conversion¶
Diagnostic text:
warning: implicit conversion turns string literal into bool: A to B |
-Wstring-plus-char¶
This diagnostic is enabled by default.
Diagnostic text:
warning: adding A to a string pointer does not append to the string |
-Wstring-plus-int¶
This diagnostic is enabled by default.
Diagnostic text:
warning: adding A to a string does not append to the string |
-Wstrlcpy-strlcat-size¶
This diagnostic is enabled by default.
Diagnostic text:
warning: size argument in A call appears to be size of the source; expected the size of the destination |
-Wstrncat-size¶
This diagnostic is enabled by default.
Diagnostic text:
warning: the value of the size argument in ‘strncat’ is too large, might lead to a buffer overflow |
warning: size argument in ‘strncat’ call appears to be size of the source |
warning: the value of the size argument to ‘strncat’ is wrong |
-Wsuper-class-method-mismatch¶
Diagnostic text:
warning: method parameter type does not match super class method parameter type |
-Wswitch¶
This diagnostic is enabled by default.
Diagnostic text:
warning: overflow converting case value to switch condition type (A to B) |
warning: |
|
warning: case value not in enumerated type A |
-Wswitch-bool¶
This diagnostic is enabled by default.
Diagnostic text:
warning: switch condition has boolean value |
-Wswitch-default¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wswitch-enum¶
Diagnostic text:
warning: |
|
-Wsync-fetch-and-nand-semantics-changed¶
This diagnostic is enabled by default.
Diagnostic text:
warning: the semantics of this intrinsic changed with GCC version 4.4 - the newer semantics are provided here |
-Wtautological-compare¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wtautological-constant-compare, -Wtautological-overlap-compare, -Wtautological-pointer-compare, -Wtautological-undefined-compare.
Diagnostic text:
warning: |
|
comparison always evaluates to |
|
warning: bitwise comparison always evaluates to |
|
-Wtautological-constant-compare¶
This diagnostic is enabled by default.
Also controls -Wtautological-constant-out-of-range-compare, -Wtautological-unsigned-enum-zero-compare, -Wtautological-unsigned-zero-compare.
Diagnostic text:
warning: comparison |
|
C |
|
is always |
|
-Wtautological-constant-out-of-range-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of |
|
with |
|
is always |
|
-Wtautological-overlap-compare¶
Diagnostic text:
warning: overlapping comparisons always evaluate to |
|
-Wtautological-pointer-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of nonnull |
|
’B’ |
|
equal to a null pointer is ‘ |
|
‘ on first encounter |
warning: comparison of |
|
’B’ |
|
equal to a null pointer is always |
|
-Wtautological-undefined-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: reference cannot be bound to dereferenced null pointer in well-defined C++ code; comparison may be assumed to always evaluate to |
|
warning: ‘this’ pointer cannot be null in well-defined C++ code; comparison may be assumed to always evaluate to |
|
-Wtautological-unsigned-enum-zero-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of |
|
C |
|
is always |
|
-Wtautological-unsigned-zero-compare¶
This diagnostic is enabled by default.
Diagnostic text:
warning: comparison of |
|
C |
|
is always |
|
-Wtentative-definition-incomplete-type¶
This diagnostic is enabled by default.
Diagnostic text:
warning: tentative definition of variable with internal linkage has incomplete non-array type A |
-Wthread-safety¶
Controls -Wthread-safety-analysis, -Wthread-safety-attributes, -Wthread-safety-precise, -Wthread-safety-reference.
-Wthread-safety-analysis¶
Diagnostic text:
warning: A ’B’ must be acquired before ‘C’ |
warning: Cycle in acquired_before/after dependencies, starting with ‘A’ |
warning: cannot resolve lock expression |
warning: acquiring A ’B’ that is already held |
warning: expecting A ’B’ to be held at start of each loop |
warning: expecting A ’B’ to be held at the end of function |
warning: cannot call function ‘B’ while A ’C’ is held |
warning: calling function ‘B’ requires holding A |
|
warning: A ’B’ is acquired exclusively and shared in the same scope |
warning: A ’B’ is not held on every path through here |
warning: A ’B’ is still held at the end of function |
warning: releasing A ’B’ that was not held |
warning: releasing A ’B’ using |
|
access, expected |
|
access |
warning: |
|
the value pointed to by ‘A’ requires holding |
|
warning: |
|
the value pointed to by ‘B’ requires holding A |
|
warning: |
|
variable ‘A’ requires holding |
|
warning: |
|
variable ‘B’ requires holding A |
|
-Wthread-safety-attributes¶
Diagnostic text:
warning: invalid capability name ‘A’; capability name must be ‘mutex’ or ‘role’ |
warning: A attribute requires arguments whose type is annotated with ‘capability’ attribute; type here is B |
warning: A attribute can only be applied in a context annotated with ‘capability(“mutex”)’ attribute |
warning: A only applies to pointer types; type here is B |
warning: ignoring A attribute because its argument is invalid |
-Wthread-safety-negative¶
Diagnostic text:
warning: acquiring A ’B’ requires negative capability ‘C’ |
-Wthread-safety-precise¶
Diagnostic text:
warning: calling function ‘B’ requires holding A |
|
warning: |
|
the value pointed to by ‘B’ requires holding A |
|
warning: |
|
variable ‘B’ requires holding A |
|
-Wthread-safety-reference¶
Diagnostic text:
warning: passing variable ‘B’ by reference requires holding A |
|
warning: passing the value that ‘B’ points to by reference requires holding A |
|
-Wtrigraphs¶
This diagnostic is enabled by default.
Diagnostic text:
warning: trigraph converted to ‘A’ character |
warning: trigraph ends block comment |
warning: trigraph ignored |
warning: ignored trigraph would end block comment |
-Wtype-limits¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wtype-safety¶
This diagnostic is enabled by default.
Diagnostic text:
warning: specified A type tag requires a null pointer |
warning: argument type A doesn’t match specified B type tag |
|
warning: this type tag was not designed to be used with this function |
-Wtypedef-redefinition¶
This diagnostic is enabled by default.
Diagnostic text:
warning: redefinition of typedef A is a C11 feature |
-Wtypename-missing¶
This diagnostic is enabled by default.
Diagnostic text:
warning: missing ‘typename’ prior to dependent type name ‘AB’ |
-Wunable-to-open-stats-file¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unable to open statistics output file ‘A’: ‘B’ |
-Wundeclared-selector¶
Diagnostic text:
warning: undeclared selector A |
warning: undeclared selector A; did you mean B? |
-Wundefined-bool-conversion¶
This diagnostic is enabled by default.
Diagnostic text:
warning: reference cannot be bound to dereferenced null pointer in well-defined C++ code; pointer may be assumed to always convert to true |
warning: ‘this’ pointer cannot be null in well-defined C++ code; pointer may be assumed to always convert to true |
-Wundefined-func-template¶
Diagnostic text:
warning: instantiation of function A required here, but no definition is available |
-Wundefined-inline¶
This diagnostic is enabled by default.
Diagnostic text:
warning: inline function A is not defined |
-Wundefined-internal¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
B has internal linkage but is not defined |
-Wundefined-internal-type¶
Diagnostic text:
warning: ISO C++ requires a definition in this translation unit for |
|
B because its type does not have linkage |
-Wundefined-reinterpret-cast¶
Diagnostic text:
warning: dereference of type B that was reinterpret_cast from type A has undefined behavior |
warning: reinterpret_cast from A to B has undefined behavior |
-Wundefined-var-template¶
This diagnostic is enabled by default.
Diagnostic text:
warning: instantiation of variable A required here, but no definition is available |
-Wunevaluated-expression¶
This diagnostic is enabled by default.
Also controls -Wpotentially-evaluated-expression.
Diagnostic text:
warning: expression with side effects has no effect in an unevaluated context |
-Wunguarded-availability¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wunguarded-availability-new.
Diagnostic text:
warning: A is only available on B C or newer |
-Wunguarded-availability-new¶
This diagnostic is enabled by default.
Diagnostic text:
warning: A is only available on B C or newer |
-Wunicode¶
This diagnostic is enabled by default.
Diagnostic text:
warning: incomplete universal character name; treating as ‘' followed by identifier |
warning: \A used with no following hex digits; treating as ‘' followed by identifier |
warning: universal character name refers to a surrogate character |
warning: universal character names are only valid in C99 or C++; treating as ‘' followed by identifier |
warning: universal character names are only valid in C99 or C++ |
-Wunicode-whitespace¶
This diagnostic is enabled by default.
Diagnostic text:
warning: treating Unicode character as whitespace |
-Wuninitialized¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wsometimes-uninitialized, -Wstatic-self-init.
Diagnostic text:
warning: base class A is uninitialized when used here to access B |
warning: field A is uninitialized when used here |
warning: reference A is not yet bound to a value when used here |
warning: block pointer variable A is uninitialized when captured by block |
warning: variable A is uninitialized when used within its own initialization |
warning: reference A is not yet bound to a value when used within its own initialization |
warning: variable A is uninitialized when |
|
-Wunknown-argument¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unknown argument ignored in clang-cl: ‘A’ |
-Wunknown-attributes¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unknown attribute A ignored |
-Wunknown-escape-sequence¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unknown escape sequence ‘\A’ |
-Wunknown-pragmas¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: expected ‘ON’ or ‘OFF’ or ‘DEFAULT’ in pragma |
warning: expected end of directive in pragma |
warning: unknown pragma in STDC namespace |
warning: pragma diagnostic pop could not pop, no matching push |
warning: pragma diagnostic expected ‘error’, ‘warning’, ‘ignored’, ‘fatal’, ‘push’, or ‘pop’ |
warning: pragma diagnostic expected option name (e.g. “-Wundef”) |
warning: unexpected token in pragma diagnostic |
warning: unknown pragma ignored |
warning: pragma include_alias expected ‘A’ |
warning: pragma include_alias expected include filename |
warning: angle-bracketed include <A> cannot be aliased to double-quoted include “B” |
warning: double-quoted include “A” cannot be aliased to angle-bracketed include <B> |
warning: #pragma warning expected ‘A’ |
warning: #pragma warning expected a warning number |
warning: #pragma warning(push, level) requires a level between 0 and 4 |
warning: #pragma warning expected ‘push’, ‘pop’, ‘default’, ‘disable’, ‘error’, ‘once’, ‘suppress’, 1, 2, 3, or 4 |
warning: pragma STDC FENV_ACCESS ON is not supported, ignoring pragma |
-Wunknown-sanitizers¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unknown sanitizer ‘A’ ignored |
-Wunknown-warning-option¶
This diagnostic is enabled by default.
Diagnostic text:
warning: unknown warning group ‘A’, ignored |
warning: unknown |
|
option ‘B’ |
|
warning: unknown A warning specifier: ‘B’ |
-Wunnamed-type-template-args¶
Some of the diagnostics controlled by this flag are enabled by default.
Also controls -Wc++98-compat-unnamed-type-template-args.
Diagnostic text:
warning: template argument uses unnamed type |
-Wunneeded-internal-declaration¶
Diagnostic text:
warning: |
|
B is not needed and will not be emitted |
warning: ‘static’ function A declared in header file should be declared ‘static inline’ |
-Wunneeded-member-function¶
Diagnostic text:
warning: member function A is not needed and will not be emitted |
-Wunreachable-code¶
Also controls -Wunreachable-code-loop-increment.
Diagnostic text:
warning: code will never be executed |
-Wunreachable-code-aggressive¶
Controls -Wunreachable-code, -Wunreachable-code-break, -Wunreachable-code-return.
-Wunreachable-code-loop-increment¶
Diagnostic text:
warning: loop will run at most once (loop increment never executed) |
-Wunsequenced¶
This diagnostic is enabled by default.
Diagnostic text:
warning: multiple unsequenced modifications to A |
warning: unsequenced modification and access to A |
-Wunsupported-abs¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring ‘-mabs=2008’ option because the ‘A’ architecture does not support it |
warning: ignoring ‘-mabs=legacy’ option because the ‘A’ architecture does not support it |
-Wunsupported-availability-guard¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
does not guard availability here; use if ( |
|
) instead |
-Wunsupported-cb¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring ‘-mcompact-branches=’ option because the ‘A’ architecture does not support it |
-Wunsupported-dll-base-class-template¶
Diagnostic text:
warning: propagating dll attribute to |
|
base class template without dll attribute is not supported |
-Wunsupported-friend¶
This diagnostic is enabled by default.
Diagnostic text:
warning: dependent nested name specifier ‘A’ for friend template declaration is not supported; ignoring this friend declaration |
warning: dependent nested name specifier ‘A’ for friend class declaration is not supported; turning off access control for B |
-Wunsupported-gpopt¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring ‘-mgpopt’ option as it cannot be used with |
|
-mabicalls |
-Wunsupported-nan¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring ‘-mnan=2008’ option because the ‘A’ architecture does not support it |
warning: ignoring ‘-mnan=legacy’ option because the ‘A’ architecture does not support it |
-Wunsupported-visibility¶
This diagnostic is enabled by default.
Diagnostic text:
warning: target does not support ‘protected’ visibility; using ‘default’ |
-Wunusable-partial-specialization¶
This diagnostic is an error by default, but the flag -Wno-unusable-partial-specialization
can be used to disable the error.
Diagnostic text:
error: |
|
template partial specialization contains |
|
that cannot be deduced; this partial specialization will never be used |
-Wunused¶
Some of the diagnostics controlled by this flag are enabled by default.
Controls -Wunused-argument, -Wunused-function, -Wunused-label, -Wunused-lambda-capture, -Wunused-local-typedef, -Wunused-private-field, -Wunused-property-ivar, -Wunused-value, -Wunused-variable.
-Wunused-argument¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wunused-command-line-argument¶
This diagnostic is enabled by default.
Diagnostic text:
warning: argument ‘A’ requires profile-guided optimization information |
warning: joined argument expects additional value: ‘A’ |
warning: A: ‘B’ input unused |
|
warning: A: ‘B’ input unused in cpp mode |
warning: A: previously preprocessed input |
|
warning: argument unused during compilation: ‘A’ |
warning: the flag ‘A’ has been deprecated and will be ignored |
-Wunused-comparison¶
This diagnostic is enabled by default.
Diagnostic text:
warning: |
|
comparison result unused |
-Wunused-function¶
Also controls -Wunneeded-internal-declaration.
Diagnostic text:
warning: unused function A |
-Wunused-getter-return-value¶
This diagnostic is enabled by default.
Diagnostic text:
warning: property access result unused - getters should not be used for side effects |
-Wunused-lambda-capture¶
Diagnostic text:
warning: lambda capture A is not |
|
-Wunused-local-typedefs¶
Synonym for -Wunused-local-typedef.
-Wunused-member-function¶
Also controls -Wunneeded-member-function.
Diagnostic text:
warning: unused member function A |
-Wunused-property-ivar¶
Diagnostic text:
warning: ivar A which backs the property is not referenced in this property’s accessor |
-Wunused-result¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ignoring return value of function declared with A attribute |
-Wunused-template¶
Also controls -Wunneeded-internal-declaration.
Diagnostic text:
warning: unused |
|
template B |
-Wunused-value¶
This diagnostic is enabled by default.
Also controls -Wunevaluated-expression, -Wunused-comparison, -Wunused-result.
Diagnostic text:
warning: ignoring return value of function declared with A attribute |
warning: container access result unused - container access should not be used for side effects |
warning: expression result unused |
warning: expression result unused; should this cast be to ‘void’? |
-Wunused-variable¶
Also controls -Wunused-const-variable.
Diagnostic text:
warning: unused variable A |
-Wunused-volatile-lvalue¶
This diagnostic is enabled by default.
Diagnostic text:
warning: expression result unused; assign into a variable to force a volatile load |
-Wuser-defined-literals¶
This diagnostic is enabled by default.
Diagnostic text:
warning: user-defined literal suffixes not starting with ‘_’ are reserved |
|
-Wuser-defined-warnings¶
This diagnostic is enabled by default.
Diagnostic text:
The text of this diagnostic is not controlled by Clang.
-Wvarargs¶
This diagnostic is enabled by default.
Diagnostic text:
warning: second argument to ‘va_start’ is not the last named parameter |
warning: second argument to ‘va_arg’ is of promotable type A; this va_arg has undefined behavior because arguments will be promoted to B |
warning: passing |
|
to ‘va_start’ has undefined behavior |
-Wvariadic-macros¶
Some of the diagnostics controlled by this flag are enabled by default.
Diagnostic text:
warning: named variadic macros are a GNU extension |
warning: __VA_OPT__ can only appear in the expansion of a variadic macro |
warning: variadic macros are a C99 feature |
-Wvec-elem-size¶
This diagnostic is an error by default, but the flag -Wno-vec-elem-size
can be used to disable the error.
Diagnostic text:
error: vector operands do not have the same elements sizes (A and B) |
-Wvector-conversion¶
Diagnostic text:
warning: incompatible vector types |
|
-Wvector-conversions¶
Synonym for -Wvector-conversion.
-Wvexing-parse¶
This diagnostic is enabled by default.
Diagnostic text:
warning: empty parentheses interpreted as a function declaration |
warning: parentheses were disambiguated as a function declaration |
warning: parentheses were disambiguated as redundant parentheses around declaration of variable named A |
-Wvisibility¶
This diagnostic is enabled by default.
Diagnostic text:
warning: declaration of A will not be visible outside of this function |
warning: redefinition of A will not be visible outside of this function |
-Wvoid-ptr-dereference¶
This diagnostic is enabled by default.
Diagnostic text:
warning: ISO C++ does not allow indirection on operand of type A |
-Wvolatile-register-var¶
This diagnostic flag exists for GCC compatibility, and has no effect in Clang.
-Wweak-template-vtables¶
Diagnostic text:
warning: explicit template instantiation A will emit a vtable in every translation unit |
-Wweak-vtables¶
Diagnostic text:
warning: A has no out-of-line virtual method definitions; its vtable will be emitted in every translation unit |
-Wwritable-strings¶
This diagnostic is enabled by default.
Also controls -Wdeprecated-writable-strings.
Diagnostic text:
warning: ISO C++11 does not allow conversion from string literal to A |
-Wwrite-strings¶
Synonym for -Wwritable-strings.
Cross-compilation using Clang¶
Introduction¶
This document will guide you in choosing the right Clang options for cross-compiling your code to a different architecture. It assumes you already know how to compile the code in question for the host architecture, and that you know how to choose additional include and library paths.
However, this document is not a “how to” and won’t help you setting your build system or Makefiles, nor choosing the right CMake options, etc. Also, it does not cover all the possible options, nor does it contain specific examples for specific architectures. For a concrete example, the instructions for cross-compiling LLVM itself may be of interest.
After reading this document, you should be familiar with the main issues related to cross-compilation, and what main compiler options Clang provides for performing cross-compilation.
Cross compilation issues¶
In GCC world, every host/target combination has its own set of binaries, headers, libraries, etc. So, it’s usually simple to download a package with all files in, unzip to a directory and point the build system to that compiler, that will know about its location and find all it needs to when compiling your code.
On the other hand, Clang/LLVM is natively a cross-compiler, meaning that
one set of programs can compile to all targets by setting the -target
option. That makes it a lot easier for programmers wishing to compile to
different platforms and architectures, and for compiler developers that
only have to maintain one build system, and for OS distributions, that
need only one set of main packages.
But, as is true to any cross-compiler, and given the complexity of different architectures, OS’s and options, it’s not always easy finding the headers, libraries or binutils to generate target specific code. So you’ll need special options to help Clang understand what target you’re compiling to, where your tools are, etc.
Another problem is that compilers come with standard libraries only (like
compiler-rt
, libcxx
, libgcc
, libm
, etc), so you’ll have to
find and make available to the build system, every other library required
to build your software, that is specific to your target. It’s not enough to
have your host’s libraries installed.
Finally, not all toolchains are the same, and consequently, not every Clang
option will work magically. Some options, like --sysroot
(which
effectively changes the logical root for headers and libraries), assume
all your binaries and libraries are in the same directory, which may not
true when your cross-compiler was installed by the distribution’s package
management. So, for each specific case, you may use more than one
option, and in most cases, you’ll end up setting include paths (-I
) and
library paths (-L
) manually.
- To sum up, different toolchains can:
- be host/target specific or more flexible
- be in a single directory, or spread out across your system
- have different sets of libraries and headers by default
- need special options, which your build system won’t be able to figure out by itself
General Cross-Compilation Options in Clang¶
Target Triple¶
The basic option is to define the target architecture. For that, use
-target <triple>
. If you don’t specify the target, CPU names won’t
match (since Clang assumes the host triple), and the compilation will
go ahead, creating code for the host platform, which will break later
on when assembling or linking.
- The triple has the general format
<arch><sub>-<vendor>-<sys>-<abi>
, where: arch
=x86_64
,i386
,arm
,thumb
,mips
, etc.sub
= for ex. on ARM:v5
,v6m
,v7a
,v7m
, etc.vendor
=pc
,apple
,nvidia
,ibm
, etc.sys
=none
,linux
,win32
,darwin
,cuda
, etc.abi
=eabi
,gnu
,android
,macho
,elf
, etc.
The sub-architecture options are available for their own architectures, of course, so “x86v7a” doesn’t make sense. The vendor needs to be specified only if there’s a relevant change, for instance between PC and Apple. Most of the time it can be omitted (and Unknown) will be assumed, which sets the defaults for the specified architecture. The system name is generally the OS (linux, darwin), but could be special like the bare-metal “none”.
When a parameter is not important, it can be omitted, or you can
choose unknown
and the defaults will be used. If you choose a parameter
that Clang doesn’t know, like blerg
, it’ll ignore and assume
unknown
, which is not always desired, so be careful.
Finally, the ABI option is something that will pick default CPU/FPU, define the specific behaviour of your code (PCS, extensions), and also choose the correct library calls, etc.
CPU, FPU, ABI¶
Once your target is specified, it’s time to pick the hardware you’ll be compiling to. For every architecture, a default set of CPU/FPU/ABI will be chosen, so you’ll almost always have to change it via flags.
- Typical flags include:
-mcpu=<cpu-name>
, like x86-64, swift, cortex-a15-mfpu=<fpu-name>
, like SSE3, NEON, controlling the FP unit available-mfloat-abi=<fabi>
, like soft, hard, controlling which registers to use for floating-point
The default is normally the common denominator, so that Clang doesn’t generate code that breaks. But that also means you won’t get the best code for your specific hardware, which may mean orders of magnitude slower than you expect.
For example, if your target is arm-none-eabi
, the default CPU will
be arm7tdmi
using soft float, which is extremely slow on modern cores,
whereas if your triple is armv7a-none-eabi
, it’ll be Cortex-A8 with
NEON, but still using soft-float, which is much better, but still not
great.
Toolchain Options¶
There are three main options to control access to your cross-compiler:
--sysroot
, -I
, and -L
. The two last ones are well known,
but they’re particularly important for additional libraries
and headers that are specific to your target.
There are two main ways to have a cross-compiler:
When you have extracted your cross-compiler from a zip file into a directory, you have to use
--sysroot=<path>
. The path is the root directory where you have unpacked your file, and Clang will look for the directoriesbin
,lib
,include
in there.In this case, your setup should be pretty much done (if no additional headers or libraries are needed), as Clang will find all binaries it needs (assembler, linker, etc) in there.
When you have installed via a package manager (modern Linux distributions have cross-compiler packages available), make sure the target triple you set is also the prefix of your cross-compiler toolchain.
In this case, Clang will find the other binaries (assembler, linker), but not always where the target headers and libraries are. People add system-specific clues to Clang often, but as things change, it’s more likely that it won’t find than the other way around.
So, here, you’ll be a lot safer if you specify the include/library directories manually (via
-I
and-L
).
Target-Specific Libraries¶
All libraries that you compile as part of your build will be
cross-compiled to your target, and your build system will probably
find them in the right place. But all dependencies that are
normally checked against (like libxml
or libz
etc) will match
against the host platform, not the target.
So, if the build system is not aware that you want to cross-compile your code, it will get every dependency wrong, and your compilation will fail during build time, not configure time.
Also, finding the libraries for your target are not as easy
as for your host machine. There aren’t many cross-libraries available
as packages to most OS’s, so you’ll have to either cross-compile them
from source, or download the package for your target platform,
extract the libraries and headers, put them in specific directories
and add -I
and -L
pointing to them.
Also, some libraries have different dependencies on different targets, so configuration tools to find dependencies in the host can get the list wrong for the target platform. This means that the configuration of your build can get things wrong when setting their own library paths, and you’ll have to augment it via additional flags (configure, Make, CMake, etc).
Multilibs¶
When you want to cross-compile to more than one configuration, for example hard-float-ARM and soft-float-ARM, you’ll have to have multiple copies of your libraries and (possibly) headers.
Some Linux distributions have support for Multilib, which handle that
for you in an easier way, but if you’re not careful and, for instance,
forget to specify -ccc-gcc-name armv7l-linux-gnueabihf-gcc
(which
uses hard-float), Clang will pick the armv7l-linux-gnueabi-ld
(which uses soft-float) and linker errors will happen.
The same is true if you’re compiling for different ABIs, like gnueabi
and androideabi
, and might even link and run, but produce run-time
errors, which are much harder to track down and fix.
Thread Safety Analysis¶
Introduction¶
Clang Thread Safety Analysis is a C++ language extension which warns about potential race conditions in code. The analysis is completely static (i.e. compile-time); there is no run-time overhead. The analysis is still under active development, but it is mature enough to be deployed in an industrial setting. It is being developed by Google, in collaboration with CERT/SEI, and is used extensively in Google’s internal code base.
Thread safety analysis works very much like a type system for multi-threaded
programs. In addition to declaring the type of data (e.g. int
, float
,
etc.), the programmer can (optionally) declare how access to that data is
controlled in a multi-threaded environment. For example, if foo
is
guarded by the mutex mu
, then the analysis will issue a warning whenever
a piece of code reads or writes to foo
without first locking mu
.
Similarly, if there are particular routines that should only be called by
the GUI thread, then the analysis will warn if other threads call those
routines.
Getting Started¶
#include "mutex.h"
class BankAccount {
private:
Mutex mu;
int balance GUARDED_BY(mu);
void depositImpl(int amount) {
balance += amount; // WARNING! Cannot write balance without locking mu.
}
void withdrawImpl(int amount) REQUIRES(mu) {
balance -= amount; // OK. Caller must have locked mu.
}
public:
void withdraw(int amount) {
mu.Lock();
withdrawImpl(amount); // OK. We've locked mu.
} // WARNING! Failed to unlock mu.
void transferFrom(BankAccount& b, int amount) {
mu.Lock();
b.withdrawImpl(amount); // WARNING! Calling withdrawImpl() requires locking b.mu.
depositImpl(amount); // OK. depositImpl() has no requirements.
mu.Unlock();
}
};
This example demonstrates the basic concepts behind the analysis. The
GUARDED_BY
attribute declares that a thread must lock mu
before it can
read or write to balance
, thus ensuring that the increment and decrement
operations are atomic. Similarly, REQUIRES
declares that
the calling thread must lock mu
before calling withdrawImpl
.
Because the caller is assumed to have locked mu
, it is safe to modify
balance
within the body of the method.
The depositImpl()
method does not have REQUIRES
, so the
analysis issues a warning. Thread safety analysis is not inter-procedural, so
caller requirements must be explicitly declared.
There is also a warning in transferFrom()
, because although the method
locks this->mu
, it does not lock b.mu
. The analysis understands
that these are two separate mutexes, in two different objects.
Finally, there is a warning in the withdraw()
method, because it fails to
unlock mu
. Every lock must have a corresponding unlock, and the analysis
will detect both double locks, and double unlocks. A function is allowed to
acquire a lock without releasing it, (or vice versa), but it must be annotated
as such (using ACQUIRE
/RELEASE
).
Basic Concepts: Capabilities¶
Thread safety analysis provides a way of protecting resources with capabilities. A resource is either a data member, or a function/method that provides access to some underlying resource. The analysis ensures that the calling thread cannot access the resource (i.e. call the function, or read/write the data) unless it has the capability to do so.
Capabilities are associated with named C++ objects which declare specific
methods to acquire and release the capability. The name of the object serves
to identify the capability. The most common example is a mutex. For example,
if mu
is a mutex, then calling mu.Lock()
causes the calling thread
to acquire the capability to access data that is protected by mu
. Similarly,
calling mu.Unlock()
releases that capability.
A thread may hold a capability either exclusively or shared. An exclusive capability can be held by only one thread at a time, while a shared capability can be held by many threads at the same time. This mechanism enforces a multiple-reader, single-writer pattern. Write operations to protected data require exclusive access, while read operations require only shared access.
At any given moment during program execution, a thread holds a specific set of capabilities (e.g. the set of mutexes that it has locked.) These act like keys or tokens that allow the thread to access a given resource. Just like physical security keys, a thread cannot make copy of a capability, nor can it destroy one. A thread can only release a capability to another thread, or acquire one from another thread. The annotations are deliberately agnostic about the exact mechanism used to acquire and release capabilities; it assumes that the underlying implementation (e.g. the Mutex implementation) does the handoff in an appropriate manner.
The set of capabilities that are actually held by a given thread at a given point in program execution is a run-time concept. The static analysis works by calculating an approximation of that set, called the capability environment. The capability environment is calculated for every program point, and describes the set of capabilities that are statically known to be held, or not held, at that particular point. This environment is a conservative approximation of the full set of capabilities that will actually held by a thread at run-time.
Reference Guide¶
The thread safety analysis uses attributes to declare threading constraints. Attributes must be attached to named declarations, such as classes, methods, and data members. Users are strongly advised to define macros for the various attributes; example definitions can be found in mutex.h, below. The following documentation assumes the use of macros.
For historical reasons, prior versions of thread safety used macro names that were very lock-centric. These macros have since been renamed to fit a more general capability model. The prior names are still in use, and will be mentioned under the tag previously where appropriate.
GUARDED_BY(c) and PT_GUARDED_BY(c)¶
GUARDED_BY
is an attribute on data members, which declares that the data
member is protected by the given capability. Read operations on the data
require shared access, while write operations require exclusive access.
PT_GUARDED_BY
is similar, but is intended for use on pointers and smart
pointers. There is no constraint on the data member itself, but the data that
it points to is protected by the given capability.
Mutex mu;
int *p1 GUARDED_BY(mu);
int *p2 PT_GUARDED_BY(mu);
unique_ptr<int> p3 PT_GUARDED_BY(mu);
void test() {
p1 = 0; // Warning!
*p2 = 42; // Warning!
p2 = new int; // OK.
*p3 = 42; // Warning!
p3.reset(new int); // OK.
}
EXCLUDES(…)¶
Previously: LOCKS_EXCLUDED
EXCLUDES
is an attribute on functions or methods, which declares that
the caller must not hold the given capabilities. This annotation is
used to prevent deadlock. Many mutex implementations are not re-entrant, so
deadlock can occur if the function acquires the mutex a second time.
Mutex mu;
int a GUARDED_BY(mu);
void clear() EXCLUDES(mu) {
mu.Lock();
a = 0;
mu.Unlock();
}
void reset() {
mu.Lock();
clear(); // Warning! Caller cannot hold 'mu'.
mu.Unlock();
}
Unlike REQUIRES
, EXCLUDES
is optional. The analysis will not issue a
warning if the attribute is missing, which can lead to false negatives in some
cases. This issue is discussed further in Negative Capabilities.
NO_THREAD_SAFETY_ANALYSIS¶
NO_THREAD_SAFETY_ANALYSIS
is an attribute on functions or methods, which
turns off thread safety checking for that method. It provides an escape hatch
for functions which are either (1) deliberately thread-unsafe, or (2) are
thread-safe, but too complicated for the analysis to understand. Reasons for
(2) will be described in the Known Limitations, below.
class Counter {
Mutex mu;
int a GUARDED_BY(mu);
void unsafeIncrement() NO_THREAD_SAFETY_ANALYSIS { a++; }
};
Unlike the other attributes, NO_THREAD_SAFETY_ANALYSIS is not part of the
interface of a function, and should thus be placed on the function definition
(in the .cc
or .cpp
file) rather than on the function declaration
(in the header).
RETURN_CAPABILITY(c)¶
Previously: LOCK_RETURNED
RETURN_CAPABILITY
is an attribute on functions or methods, which declares
that the function returns a reference to the given capability. It is used to
annotate getter methods that return mutexes.
class MyClass {
private:
Mutex mu;
int a GUARDED_BY(mu);
public:
Mutex* getMu() RETURN_CAPABILITY(mu) { return μ }
// analysis knows that getMu() == mu
void clear() REQUIRES(getMu()) { a = 0; }
};
ACQUIRED_BEFORE(…), ACQUIRED_AFTER(…)¶
ACQUIRED_BEFORE
and ACQUIRED_AFTER
are attributes on member
declarations, specifically declarations of mutexes or other capabilities.
These declarations enforce a particular order in which the mutexes must be
acquired, in order to prevent deadlock.
Mutex m1;
Mutex m2 ACQUIRED_AFTER(m1);
// Alternative declaration
// Mutex m2;
// Mutex m1 ACQUIRED_BEFORE(m2);
void foo() {
m2.Lock();
m1.Lock(); // Warning! m2 must be acquired after m1.
m1.Unlock();
m2.Unlock();
}
CAPABILITY(<string>)¶
Previously: LOCKABLE
CAPABILITY
is an attribute on classes, which specifies that objects of the
class can be used as a capability. The string argument specifies the kind of
capability in error messages, e.g. "mutex"
. See the Container
example
given above, or the Mutex
class in mutex.h.
SCOPED_CAPABILITY¶
Previously: SCOPED_LOCKABLE
SCOPED_CAPABILITY
is an attribute on classes that implement RAII-style
locking, in which a capability is acquired in the constructor, and released in
the destructor. Such classes require special handling because the constructor
and destructor refer to the capability via different names; see the
MutexLocker
class in mutex.h, below.
GUARDED_VAR and PT_GUARDED_VAR¶
Use of these attributes has been deprecated.
Warning flags¶
-Wthread-safety
: Umbrella flag which turns on the following three:-Wthread-safety-attributes
: Sanity checks on attribute syntax.-Wthread-safety-analysis
: The core analysis.-Wthread-safety-precise
: Requires that mutex expressions match precisely.- This warning can be disabled for code which has a lot of aliases.
-Wthread-safety-reference
: Checks when guarded members are passed by reference.
Negative Capabilities are an experimental feature, which are enabled with:
-Wthread-safety-negative
: Negative capabilities. Off by default.
When new features and checks are added to the analysis, they can often introduce additional warnings. Those warnings are initially released as beta warnings for a period of time, after which they are migrated into the standard analysis.
-Wthread-safety-beta
: New features. Off by default.
Negative Capabilities¶
Thread Safety Analysis is designed to prevent both race conditions and deadlock. The GUARDED_BY and REQUIRES attributes prevent race conditions, by ensuring that a capability is held before reading or writing to guarded data, and the EXCLUDES attribute prevents deadlock, by making sure that a mutex is not held.
However, EXCLUDES is an optional attribute, and does not provide the same safety guarantee as REQUIRES. In particular:
- A function which acquires a capability does not have to exclude it.
- A function which calls a function that excludes a capability does not have transitively exclude that capability.
As a result, EXCLUDES can easily produce false negatives:
class Foo {
Mutex mu;
void foo() {
mu.Lock();
bar(); // No warning.
baz(); // No warning.
mu.Unlock();
}
void bar() { // No warning. (Should have EXCLUDES(mu)).
mu.Lock();
// ...
mu.Unlock();
}
void baz() {
bif(); // No warning. (Should have EXCLUDES(mu)).
}
void bif() EXCLUDES(mu);
};
Negative requirements are an alternative EXCLUDES that provide
a stronger safety guarantee. A negative requirement uses the REQUIRES
attribute, in conjunction with the !
operator, to indicate that a capability
should not be held.
For example, using REQUIRES(!mu)
instead of EXCLUDES(mu)
will produce
the appropriate warnings:
class FooNeg {
Mutex mu;
void foo() REQUIRES(!mu) { // foo() now requires !mu.
mu.Lock();
bar();
baz();
mu.Unlock();
}
void bar() {
mu.Lock(); // WARNING! Missing REQUIRES(!mu).
// ...
mu.Unlock();
}
void baz() {
bif(); // WARNING! Missing REQUIRES(!mu).
}
void bif() REQUIRES(!mu);
};
Negative requirements are an experimental feature which is off by default,
because it will produce many warnings in existing code. It can be enabled
by passing -Wthread-safety-negative
.
Frequently Asked Questions¶
- Should I put attributes in the header file, or in the .cc/.cpp/.cxx file?
(A) Attributes are part of the formal interface of a function, and should always go in the header, where they are visible to anything that includes the header. Attributes in the .cpp file are not visible outside of the immediate translation unit, which leads to false negatives and false positives.
- “Mutex is not locked on every path through here?” What does that mean?
- See No conditionally held locks., below.
Known Limitations¶
Lexical scope¶
Thread safety attributes contain ordinary C++ expressions, and thus follow ordinary C++ scoping rules. In particular, this means that mutexes and other capabilities must be declared before they can be used in an attribute. Use-before-declaration is okay within a single class, because attributes are parsed at the same time as method bodies. (C++ delays parsing of method bodies until the end of the class.) However, use-before-declaration is not allowed between classes, as illustrated below.
class Foo;
class Bar {
void bar(Foo* f) REQUIRES(f->mu); // Error: mu undeclared.
};
class Foo {
Mutex mu;
};
Private Mutexes¶
Good software engineering practice dictates that mutexes should be private
members, because the locking mechanism used by a thread-safe class is part of
its internal implementation. However, private mutexes can sometimes leak into
the public interface of a class.
Thread safety attributes follow normal C++ access restrictions, so if mu
is a private member of c
, then it is an error to write c.mu
in an
attribute.
One workaround is to (ab)use the RETURN_CAPABILITY
attribute to provide a
public name for a private mutex, without actually exposing the underlying
mutex. For example:
class MyClass {
private:
Mutex mu;
public:
// For thread safety analysis only. Does not actually return mu.
Mutex* getMu() RETURN_CAPABILITY(mu) { return 0; }
void doSomething() REQUIRES(mu);
};
void doSomethingTwice(MyClass& c) REQUIRES(c.getMu()) {
// The analysis thinks that c.getMu() == c.mu
c.doSomething();
c.doSomething();
}
In the above example, doSomethingTwice()
is an external routine that
requires c.mu
to be locked, which cannot be declared directly because mu
is private. This pattern is discouraged because it
violates encapsulation, but it is sometimes necessary, especially when adding
annotations to an existing code base. The workaround is to define getMu()
as a fake getter method, which is provided only for the benefit of thread
safety analysis.
No conditionally held locks.¶
The analysis must be able to determine whether a lock is held, or not held, at every program point. Thus, sections of code where a lock might be held will generate spurious warnings (false positives). For example:
void foo() {
bool b = needsToLock();
if (b) mu.Lock();
... // Warning! Mutex 'mu' is not held on every path through here.
if (b) mu.Unlock();
}
No checking inside constructors and destructors.¶
The analysis currently does not do any checking inside constructors or
destructors. In other words, every constructor and destructor is treated as
if it was annotated with NO_THREAD_SAFETY_ANALYSIS
.
The reason for this is that during initialization, only one thread typically
has access to the object which is being initialized, and it is thus safe (and
common practice) to initialize guarded members without acquiring any locks.
The same is true of destructors.
Ideally, the analysis would allow initialization of guarded members inside the object being initialized or destroyed, while still enforcing the usual access restrictions on everything else. However, this is difficult to enforce in practice, because in complex pointer-based data structures, it is hard to determine what data is owned by the enclosing object.
No inlining.¶
Thread safety analysis is strictly intra-procedural, just like ordinary type checking. It relies only on the declared attributes of a function, and will not attempt to inline any method calls. As a result, code such as the following will not work:
template<class T>
class AutoCleanup {
T* object;
void (T::*mp)();
public:
AutoCleanup(T* obj, void (T::*imp)()) : object(obj), mp(imp) { }
~AutoCleanup() { (object->*mp)(); }
};
Mutex mu;
void foo() {
mu.Lock();
AutoCleanup<Mutex>(&mu, &Mutex::Unlock);
// ...
} // Warning, mu is not unlocked.
In this case, the destructor of Autocleanup
calls mu.Unlock()
, so
the warning is bogus. However,
thread safety analysis cannot see the unlock, because it does not attempt to
inline the destructor. Moreover, there is no way to annotate the destructor,
because the destructor is calling a function that is not statically known.
This pattern is simply not supported.
No alias analysis.¶
The analysis currently does not track pointer aliases. Thus, there can be false positives if two pointers both point to the same mutex.
class MutexUnlocker {
Mutex* mu;
public:
MutexUnlocker(Mutex* m) RELEASE(m) : mu(m) { mu->Unlock(); }
~MutexUnlocker() ACQUIRE(mu) { mu->Lock(); }
};
Mutex mutex;
void test() REQUIRES(mutex) {
{
MutexUnlocker munl(&mutex); // unlocks mutex
doSomeIO();
} // Warning: locks munl.mu
}
The MutexUnlocker class is intended to be the dual of the MutexLocker class, defined in mutex.h. However, it doesn’t work because the analysis doesn’t know that munl.mu == mutex. The SCOPED_CAPABILITY attribute handles aliasing for MutexLocker, but does so only for that particular pattern.
ACQUIRED_BEFORE(…) and ACQUIRED_AFTER(…) are currently unimplemented.¶
To be fixed in a future update.
mutex.h¶
Thread safety analysis can be used with any threading library, but it does
require that the threading API be wrapped in classes and methods which have the
appropriate annotations. The following code provides mutex.h
as an example;
these methods should be filled in to call the appropriate underlying
implementation.
#ifndef THREAD_SAFETY_ANALYSIS_MUTEX_H
#define THREAD_SAFETY_ANALYSIS_MUTEX_H
// Enable thread safety attributes only with clang.
// The attributes can be safely erased when compiling with other compilers.
#if defined(__clang__) && (!defined(SWIG))
#define THREAD_ANNOTATION_ATTRIBUTE__(x) __attribute__((x))
#else
#define THREAD_ANNOTATION_ATTRIBUTE__(x) // no-op
#endif
#define CAPABILITY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(capability(x))
#define SCOPED_CAPABILITY \
THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
#define GUARDED_BY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(guarded_by(x))
#define PT_GUARDED_BY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(pt_guarded_by(x))
#define ACQUIRED_BEFORE(...) \
THREAD_ANNOTATION_ATTRIBUTE__(acquired_before(__VA_ARGS__))
#define ACQUIRED_AFTER(...) \
THREAD_ANNOTATION_ATTRIBUTE__(acquired_after(__VA_ARGS__))
#define REQUIRES(...) \
THREAD_ANNOTATION_ATTRIBUTE__(requires_capability(__VA_ARGS__))
#define REQUIRES_SHARED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(requires_shared_capability(__VA_ARGS__))
#define ACQUIRE(...) \
THREAD_ANNOTATION_ATTRIBUTE__(acquire_capability(__VA_ARGS__))
#define ACQUIRE_SHARED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(acquire_shared_capability(__VA_ARGS__))
#define RELEASE(...) \
THREAD_ANNOTATION_ATTRIBUTE__(release_capability(__VA_ARGS__))
#define RELEASE_SHARED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(release_shared_capability(__VA_ARGS__))
#define TRY_ACQUIRE(...) \
THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_capability(__VA_ARGS__))
#define TRY_ACQUIRE_SHARED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_shared_capability(__VA_ARGS__))
#define EXCLUDES(...) \
THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
#define ASSERT_CAPABILITY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(assert_capability(x))
#define ASSERT_SHARED_CAPABILITY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(assert_shared_capability(x))
#define RETURN_CAPABILITY(x) \
THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
#define NO_THREAD_SAFETY_ANALYSIS \
THREAD_ANNOTATION_ATTRIBUTE__(no_thread_safety_analysis)
// Defines an annotated interface for mutexes.
// These methods can be implemented to use any internal mutex implementation.
class CAPABILITY("mutex") Mutex {
public:
// Acquire/lock this mutex exclusively. Only one thread can have exclusive
// access at any one time. Write operations to guarded data require an
// exclusive lock.
void Lock() ACQUIRE();
// Acquire/lock this mutex for read operations, which require only a shared
// lock. This assumes a multiple-reader, single writer semantics. Multiple
// threads may acquire the mutex simultaneously as readers, but a writer
// must wait for all of them to release the mutex before it can acquire it
// exclusively.
void ReaderLock() ACQUIRE_SHARED();
// Release/unlock an exclusive mutex.
void Unlock() RELEASE();
// Release/unlock a shared mutex.
void ReaderUnlock() RELEASE_SHARED();
// Try to acquire the mutex. Returns true on success, and false on failure.
bool TryLock() TRY_ACQUIRE(true);
// Try to acquire the mutex for read operations.
bool ReaderTryLock() TRY_ACQUIRE_SHARED(true);
// Assert that this mutex is currently held by the calling thread.
void AssertHeld() ASSERT_CAPABILITY(this);
// Assert that is mutex is currently held for read operations.
void AssertReaderHeld() ASSERT_SHARED_CAPABILITY(this);
// For negative capabilities.
const Mutex& operator!() const { return *this; }
};
// MutexLocker is an RAII class that acquires a mutex in its constructor, and
// releases it in its destructor.
class SCOPED_CAPABILITY MutexLocker {
private:
Mutex* mut;
public:
MutexLocker(Mutex *mu) ACQUIRE(mu) : mut(mu) {
mu->Lock();
}
~MutexLocker() RELEASE() {
mut->Unlock();
}
};
#ifdef USE_LOCK_STYLE_THREAD_SAFETY_ATTRIBUTES
// The original version of thread safety analysis the following attribute
// definitions. These use a lock-based terminology. They are still in use
// by existing thread safety code, and will continue to be supported.
// Deprecated.
#define PT_GUARDED_VAR \
THREAD_ANNOTATION_ATTRIBUTE__(pt_guarded_var)
// Deprecated.
#define GUARDED_VAR \
THREAD_ANNOTATION_ATTRIBUTE__(guarded_var)
// Replaced by REQUIRES
#define EXCLUSIVE_LOCKS_REQUIRED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_locks_required(__VA_ARGS__))
// Replaced by REQUIRES_SHARED
#define SHARED_LOCKS_REQUIRED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(shared_locks_required(__VA_ARGS__))
// Replaced by CAPABILITY
#define LOCKABLE \
THREAD_ANNOTATION_ATTRIBUTE__(lockable)
// Replaced by SCOPED_CAPABILITY
#define SCOPED_LOCKABLE \
THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
// Replaced by ACQUIRE
#define EXCLUSIVE_LOCK_FUNCTION(...) \
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock_function(__VA_ARGS__))
// Replaced by ACQUIRE_SHARED
#define SHARED_LOCK_FUNCTION(...) \
THREAD_ANNOTATION_ATTRIBUTE__(shared_lock_function(__VA_ARGS__))
// Replaced by RELEASE and RELEASE_SHARED
#define UNLOCK_FUNCTION(...) \
THREAD_ANNOTATION_ATTRIBUTE__(unlock_function(__VA_ARGS__))
// Replaced by TRY_ACQUIRE
#define EXCLUSIVE_TRYLOCK_FUNCTION(...) \
THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock_function(__VA_ARGS__))
// Replaced by TRY_ACQUIRE_SHARED
#define SHARED_TRYLOCK_FUNCTION(...) \
THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock_function(__VA_ARGS__))
// Replaced by ASSERT_CAPABILITY
#define ASSERT_EXCLUSIVE_LOCK(...) \
THREAD_ANNOTATION_ATTRIBUTE__(assert_exclusive_lock(__VA_ARGS__))
// Replaced by ASSERT_SHARED_CAPABILITY
#define ASSERT_SHARED_LOCK(...) \
THREAD_ANNOTATION_ATTRIBUTE__(assert_shared_lock(__VA_ARGS__))
// Replaced by EXCLUDE_CAPABILITY.
#define LOCKS_EXCLUDED(...) \
THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
// Replaced by RETURN_CAPABILITY
#define LOCK_RETURNED(x) \
THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
#endif // USE_LOCK_STYLE_THREAD_SAFETY_ATTRIBUTES
#endif // THREAD_SAFETY_ANALYSIS_MUTEX_H
AddressSanitizer¶
Introduction¶
AddressSanitizer is a fast memory error detector. It consists of a compiler instrumentation module and a run-time library. The tool can detect the following types of bugs:
- Out-of-bounds accesses to heap, stack and globals
- Use-after-free
- Use-after-return (runtime flag ASAN_OPTIONS=detect_stack_use_after_return=1)
- Use-after-scope (clang flag -fsanitize-address-use-after-scope)
- Double-free, invalid free
- Memory leaks (experimental)
Typical slowdown introduced by AddressSanitizer is 2x.
How to build¶
Build LLVM/Clang with CMake.
Usage¶
Simply compile and link your program with -fsanitize=address
flag. The
AddressSanitizer run-time library should be linked to the final executable, so
make sure to use clang
(not ld
) for the final link step. When linking
shared libraries, the AddressSanitizer run-time is not linked, so
-Wl,-z,defs
may cause link errors (don’t use it with AddressSanitizer). To
get a reasonable performance add -O1
or higher. To get nicer stack traces
in error messages add -fno-omit-frame-pointer
. To get perfect stack traces
you may need to disable inlining (just use -O1
) and tail call elimination
(-fno-optimize-sibling-calls
).
% cat example_UseAfterFree.cc
int main(int argc, char **argv) {
int *array = new int[100];
delete [] array;
return array[argc]; // BOOM
}
# Compile and link
% clang++ -O1 -g -fsanitize=address -fno-omit-frame-pointer example_UseAfterFree.cc
or:
# Compile
% clang++ -O1 -g -fsanitize=address -fno-omit-frame-pointer -c example_UseAfterFree.cc
# Link
% clang++ -g -fsanitize=address example_UseAfterFree.o
If a bug is detected, the program will print an error message to stderr and exit with a non-zero exit code. AddressSanitizer exits on the first detected error. This is by design:
- This approach allows AddressSanitizer to produce faster and smaller generated code (both by ~5%).
- Fixing bugs becomes unavoidable. AddressSanitizer does not produce false alarms. Once a memory corruption occurs, the program is in an inconsistent state, which could lead to confusing results and potentially misleading subsequent reports.
If your process is sandboxed and you are running on OS X 10.10 or earlier, you
will need to set DYLD_INSERT_LIBRARIES
environment variable and point it to
the ASan library that is packaged with the compiler used to build the
executable. (You can find the library by searching for dynamic libraries with
asan
in their name.) If the environment variable is not set, the process will
try to re-exec. Also keep in mind that when moving the executable to another machine,
the ASan library will also need to be copied over.
Symbolizing the Reports¶
To make AddressSanitizer symbolize its output
you need to set the ASAN_SYMBOLIZER_PATH
environment variable to point to
the llvm-symbolizer
binary (or make sure llvm-symbolizer
is in your
$PATH
):
% ASAN_SYMBOLIZER_PATH=/usr/local/bin/llvm-symbolizer ./a.out
==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
READ of size 4 at 0x7f7ddab8c084 thread T0
#0 0x403c8c in main example_UseAfterFree.cc:4
#1 0x7f7ddabcac4d in __libc_start_main ??:0
0x7f7ddab8c084 is located 4 bytes inside of 400-byte region [0x7f7ddab8c080,0x7f7ddab8c210)
freed by thread T0 here:
#0 0x404704 in operator delete[](void*) ??:0
#1 0x403c53 in main example_UseAfterFree.cc:4
#2 0x7f7ddabcac4d in __libc_start_main ??:0
previously allocated by thread T0 here:
#0 0x404544 in operator new[](unsigned long) ??:0
#1 0x403c43 in main example_UseAfterFree.cc:2
#2 0x7f7ddabcac4d in __libc_start_main ??:0
==9442== ABORTING
If that does not work for you (e.g. your process is sandboxed), you can use a
separate script to symbolize the result offline (online symbolization can be
force disabled by setting ASAN_OPTIONS=symbolize=0
):
% ASAN_OPTIONS=symbolize=0 ./a.out 2> log
% projects/compiler-rt/lib/asan/scripts/asan_symbolize.py / < log | c++filt
==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
READ of size 4 at 0x7f7ddab8c084 thread T0
#0 0x403c8c in main example_UseAfterFree.cc:4
#1 0x7f7ddabcac4d in __libc_start_main ??:0
...
Note that on OS X you may need to run dsymutil
on your binary to have the
file:line info in the AddressSanitizer reports.
Additional Checks¶
Initialization order checking¶
AddressSanitizer can optionally detect dynamic initialization order problems,
when initialization of globals defined in one translation unit uses
globals defined in another translation unit. To enable this check at runtime,
you should set environment variable
ASAN_OPTIONS=check_initialization_order=1
.
Note that this option is not supported on OS X.
Memory leak detection¶
For more information on leak detector in AddressSanitizer, see
LeakSanitizer. The leak detection is turned on by default on Linux,
and can be enabled using ASAN_OPTIONS=detect_leaks=1
on OS X;
however, it is not yet supported on other platforms.
Issue Suppression¶
AddressSanitizer is not expected to produce false positives. If you see one, look again; most likely it is a true positive!
Suppressing Reports in External Libraries¶
Runtime interposition allows AddressSanitizer to find bugs in code that is
not being recompiled. If you run into an issue in external libraries, we
recommend immediately reporting it to the library maintainer so that it
gets addressed. However, you can use the following suppression mechanism
to unblock yourself and continue on with the testing. This suppression
mechanism should only be used for suppressing issues in external code; it
does not work on code recompiled with AddressSanitizer. To suppress errors
in external libraries, set the ASAN_OPTIONS
environment variable to point
to a suppression file. You can either specify the full path to the file or the
path of the file relative to the location of your executable.
ASAN_OPTIONS=suppressions=MyASan.supp
Use the following format to specify the names of the functions or libraries you want to suppress. You can see these in the error report. Remember that the narrower the scope of the suppression, the more bugs you will be able to catch.
interceptor_via_fun:NameOfCFunctionToSuppress
interceptor_via_fun:-[ClassName objCMethodToSuppress:]
interceptor_via_lib:NameOfTheLibraryToSuppress
Conditional Compilation with __has_feature(address_sanitizer)
¶
In some cases one may need to execute different code depending on whether AddressSanitizer is enabled. __has_feature can be used for this purpose.
#if defined(__has_feature)
# if __has_feature(address_sanitizer)
// code that builds only under AddressSanitizer
# endif
#endif
Disabling Instrumentation with __attribute__((no_sanitize("address")))
¶
Some code should not be instrumented by AddressSanitizer. One may use
the attribute __attribute__((no_sanitize("address")))
(which has
deprecated synonyms no_sanitize_address and
no_address_safety_analysis) to disable instrumentation of a
particular function. This attribute may not be supported by other
compilers, so we suggest to use it together with
__has_feature(address_sanitizer)
.
The same attribute used on a global variable prevents AddressSanitizer from adding redzones around it and detecting out of bounds accesses.
Suppressing Errors in Recompiled Code (Blacklist)¶
AddressSanitizer supports src
and fun
entity types in
Sanitizer special case list, that can be used to suppress error reports
in the specified source files or functions. Additionally, AddressSanitizer
introduces global
and type
entity types that can be used to
suppress error reports for out-of-bound access to globals with certain
names and types (you may only specify class or struct types).
You may use an init
category to suppress reports about initialization-order
problems happening in certain source files or with certain global variables.
# Suppress error reports for code in a file or in a function:
src:bad_file.cpp
# Ignore all functions with names containing MyFooBar:
fun:*MyFooBar*
# Disable out-of-bound checks for global:
global:bad_array
# Disable out-of-bound checks for global instances of a given class ...
type:Namespace::BadClassName
# ... or a given struct. Use wildcard to deal with anonymous namespace.
type:Namespace2::*::BadStructName
# Disable initialization-order checks for globals:
global:bad_init_global=init
type:*BadInitClassSubstring*=init
src:bad/init/files/*=init
Suppressing memory leaks¶
Memory leak reports produced by LeakSanitizer (if it is run as a part of AddressSanitizer) can be suppressed by a separate file passed as
LSAN_OPTIONS=suppressions=MyLSan.supp
which contains lines of the form leak:<pattern>. Memory leak will be suppressed if pattern matches any function name, source file name, or library name in the symbolized stack trace of the leak report. See full documentation for more details.
Limitations¶
- AddressSanitizer uses more real memory than a native run. Exact overhead depends on the allocations sizes. The smaller the allocations you make the bigger the overhead is.
- AddressSanitizer uses more stack memory. We have seen up to 3x increase.
- On 64-bit platforms AddressSanitizer maps (but not reserves) 16+ Terabytes of
virtual address space. This means that tools like
ulimit
may not work as usually expected. - Static linking is not supported.
Supported Platforms¶
AddressSanitizer is supported on:
- Linux i386/x86_64 (tested on Ubuntu 12.04)
- OS X 10.7 - 10.11 (i386/x86_64)
- iOS Simulator
- Android ARM
- NetBSD i386/x86_64
- FreeBSD i386/x86_64 (tested on FreeBSD 11-current)
Ports to various other platforms are in progress.
Current Status¶
AddressSanitizer is fully functional on supported platforms starting from LLVM
3.1. The test suite is integrated into CMake build and can be run with make
check-asan
command.
ThreadSanitizer¶
Introduction¶
ThreadSanitizer is a tool that detects data races. It consists of a compiler instrumentation module and a run-time library. Typical slowdown introduced by ThreadSanitizer is about 5x-15x. Typical memory overhead introduced by ThreadSanitizer is about 5x-10x.
Supported Platforms¶
ThreadSanitizer is supported on the following OS:
- Linux
- NetBSD
- FreeBSD
Support for other 64-bit architectures is possible, contributions are welcome. Support for 32-bit platforms is problematic and is not planned.
Usage¶
Simply compile and link your program with -fsanitize=thread
. To get a
reasonable performance add -O1
or higher. Use -g
to get file names
and line numbers in the warning messages.
Example:
% cat projects/compiler-rt/lib/tsan/lit_tests/tiny_race.c
#include <pthread.h>
int Global;
void *Thread1(void *x) {
Global = 42;
return x;
}
int main() {
pthread_t t;
pthread_create(&t, NULL, Thread1, NULL);
Global = 43;
pthread_join(t, NULL);
return Global;
}
$ clang -fsanitize=thread -g -O1 tiny_race.c
If a bug is detected, the program will print an error message to stderr.
Currently, ThreadSanitizer symbolizes its output using an external
addr2line
process (this will be fixed in future).
% ./a.out
WARNING: ThreadSanitizer: data race (pid=19219)
Write of size 4 at 0x7fcf47b21bc0 by thread T1:
#0 Thread1 tiny_race.c:4 (exe+0x00000000a360)
Previous write of size 4 at 0x7fcf47b21bc0 by main thread:
#0 main tiny_race.c:10 (exe+0x00000000a3b4)
Thread T1 (running) created at:
#0 pthread_create tsan_interceptors.cc:705 (exe+0x00000000c790)
#1 main tiny_race.c:9 (exe+0x00000000a3a4)
__has_feature(thread_sanitizer)
¶
In some cases one may need to execute different code depending on whether ThreadSanitizer is enabled. __has_feature can be used for this purpose.
#if defined(__has_feature)
# if __has_feature(thread_sanitizer)
// code that builds only under ThreadSanitizer
# endif
#endif
__attribute__((no_sanitize("thread")))
¶
Some code should not be instrumented by ThreadSanitizer. One may use the
function attribute no_sanitize("thread")
to disable instrumentation of plain
(non-atomic) loads/stores in a particular function. ThreadSanitizer still
instruments such functions to avoid false positives and provide meaningful stack
traces. This attribute may not be supported by other compilers, so we suggest
to use it together with __has_feature(thread_sanitizer)
.
Blacklist¶
ThreadSanitizer supports src
and fun
entity types in
Sanitizer special case list, that can be used to suppress data race reports
in the specified source files or functions. Unlike functions marked with
no_sanitize("thread")
attribute, blacklisted functions are not instrumented
at all. This can lead to false positives due to missed synchronization via
atomic operations and missed stack frames in reports.
Limitations¶
- ThreadSanitizer uses more real memory than a native run. At the default settings the memory overhead is 5x plus 1Mb per each thread. Settings with 3x (less accurate analysis) and 9x (more accurate analysis) overhead are also available.
- ThreadSanitizer maps (but does not reserve) a lot of virtual address space.
This means that tools like
ulimit
may not work as usually expected. - Libc/libstdc++ static linking is not supported.
- Non-position-independent executables are not supported. Therefore, the
fsanitize=thread
flag will cause Clang to act as though the-fPIE
flag had been supplied if compiling without-fPIC
, and as though the-pie
flag had been supplied if linking an executable.
Current Status¶
ThreadSanitizer is in beta stage. It is known to work on large C++ programs
using pthreads, but we do not promise anything (yet). C++11 threading is
supported with llvm libc++. The test suite is integrated into CMake build
and can be run with make check-tsan
command.
We are actively working on enhancing the tool — stay tuned. Any help, especially in the form of minimized standalone tests is more than welcome.
More Information¶
https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual
MemorySanitizer¶
Introduction¶
MemorySanitizer is a detector of uninitialized reads. It consists of a compiler instrumentation module and a run-time library.
Typical slowdown introduced by MemorySanitizer is 3x.
How to build¶
Build LLVM/Clang with CMake.
Usage¶
Simply compile and link your program with -fsanitize=memory
flag.
The MemorySanitizer run-time library should be linked to the final
executable, so make sure to use clang
(not ld
) for the final
link step. When linking shared libraries, the MemorySanitizer run-time
is not linked, so -Wl,-z,defs
may cause link errors (don’t use it
with MemorySanitizer). To get a reasonable performance add -O1
or
higher. To get meaningful stack traces in error messages add
-fno-omit-frame-pointer
. To get perfect stack traces you may need
to disable inlining (just use -O1
) and tail call elimination
(-fno-optimize-sibling-calls
).
% cat umr.cc
#include <stdio.h>
int main(int argc, char** argv) {
int* a = new int[10];
a[5] = 0;
if (a[argc])
printf("xx\n");
return 0;
}
% clang -fsanitize=memory -fno-omit-frame-pointer -g -O2 umr.cc
If a bug is detected, the program will print an error message to stderr and exit with a non-zero exit code.
% ./a.out
WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x7f45944b418a in main umr.cc:6
#1 0x7f45938b676c in __libc_start_main libc-start.c:226
By default, MemorySanitizer exits on the first detected error. If you find the error report hard to understand, try enabling origin tracking.
__has_feature(memory_sanitizer)
¶
In some cases one may need to execute different code depending on whether MemorySanitizer is enabled. __has_feature can be used for this purpose.
#if defined(__has_feature)
# if __has_feature(memory_sanitizer)
// code that builds only under MemorySanitizer
# endif
#endif
__attribute__((no_sanitize("memory")))
¶
Some code should not be checked by MemorySanitizer. One may use the function
attribute no_sanitize("memory")
to disable uninitialized checks in a
particular function. MemorySanitizer may still instrument such functions to
avoid false positives. This attribute may not be supported by other compilers,
so we suggest to use it together with __has_feature(memory_sanitizer)
.
Blacklist¶
MemorySanitizer supports src
and fun
entity types in
Sanitizer special case list, that can be used to relax MemorySanitizer
checks for certain source files and functions. All “Use of uninitialized value”
warnings will be suppressed and all values loaded from memory will be
considered fully initialized.
Report symbolization¶
MemorySanitizer uses an external symbolizer to print files and line numbers in
reports. Make sure that llvm-symbolizer
binary is in PATH
,
or set environment variable MSAN_SYMBOLIZER_PATH
to point to it.
Origin Tracking¶
MemorySanitizer can track origins of uninitialized values, similar to
Valgrind’s –track-origins option. This feature is enabled by
-fsanitize-memory-track-origins=2
(or simply
-fsanitize-memory-track-origins
) Clang option. With the code from
the example above,
% cat umr2.cc
#include <stdio.h>
int main(int argc, char** argv) {
int* a = new int[10];
a[5] = 0;
volatile int b = a[argc];
if (b)
printf("xx\n");
return 0;
}
% clang -fsanitize=memory -fsanitize-memory-track-origins=2 -fno-omit-frame-pointer -g -O2 umr2.cc
% ./a.out
WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x7f7893912f0b in main umr2.cc:7
#1 0x7f789249b76c in __libc_start_main libc-start.c:226
Uninitialized value was stored to memory at
#0 0x7f78938b5c25 in __msan_chain_origin msan.cc:484
#1 0x7f7893912ecd in main umr2.cc:6
Uninitialized value was created by a heap allocation
#0 0x7f7893901cbd in operator new[](unsigned long) msan_new_delete.cc:44
#1 0x7f7893912e06 in main umr2.cc:4
By default, MemorySanitizer collects both allocation points and all intermediate stores the uninitialized value went through. Origin tracking has proved to be very useful for debugging MemorySanitizer reports. It slows down program execution by a factor of 1.5x-2x on top of the usual MemorySanitizer slowdown and increases memory overhead.
Clang option -fsanitize-memory-track-origins=1
enables a slightly
faster mode when MemorySanitizer collects only allocation points but
not intermediate stores.
Use-after-destruction detection¶
You can enable experimental use-after-destruction detection in MemorySanitizer. After invocation of the destructor, the object will be considered no longer readable, and using underlying memory will lead to error reports in runtime.
This feature is still experimental, in order to enable it at runtime you need to:
- Pass addition Clang option
-fsanitize-memory-use-after-dtor
during compilation. - Set environment variable MSAN_OPTIONS=poison_in_dtor=1 before running the program.
Handling external code¶
MemorySanitizer requires that all program code is instrumented. This also includes any libraries that the program depends on, even libc. Failing to achieve this may result in false reports. For the same reason you may need to replace all inline assembly code that writes to memory with a pure C/C++ code.
Full MemorySanitizer instrumentation is very difficult to achieve. To make it easier, MemorySanitizer runtime library includes 70+ interceptors for the most common libc functions. They make it possible to run MemorySanitizer-instrumented programs linked with uninstrumented libc. For example, the authors were able to bootstrap MemorySanitizer-instrumented Clang compiler by linking it with self-built instrumented libc++ (as a replacement for libstdc++).
Limitations¶
- MemorySanitizer uses 2x more real memory than a native run, 3x with origin tracking.
- MemorySanitizer maps (but not reserves) 64 Terabytes of virtual
address space. This means that tools like
ulimit
may not work as usually expected. - Static linking is not supported.
- Older versions of MSan (LLVM 3.7 and older) didn’t work with non-position-independent executables, and could fail on some Linux kernel versions with disabled ASLR. Refer to documentation for older versions for more details.
Current Status¶
MemorySanitizer is known to work on large real-world programs (like Clang/LLVM itself) that can be recompiled from source, including all dependent libraries.
UndefinedBehaviorSanitizer¶
Introduction¶
UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior detector. UBSan modifies the program at compile-time to catch various kinds of undefined behavior during program execution, for example:
- Using misaligned or null pointer
- Signed integer overflow
- Conversion to, from, or between floating-point types which would overflow the destination
See the full list of available checks below.
UBSan has an optional run-time library which provides better error reporting. The checks have small runtime cost and no impact on address space layout or ABI.
How to build¶
Build LLVM/Clang with CMake.
Usage¶
Use clang++
to compile and link your program with -fsanitize=undefined
flag. Make sure to use clang++
(not ld
) as a linker, so that your
executable is linked with proper UBSan runtime libraries. You can use clang
instead of clang++
if you’re compiling/linking C code.
% cat test.cc
int main(int argc, char **argv) {
int k = 0x7fffffff;
k += argc;
return 0;
}
% clang++ -fsanitize=undefined test.cc
% ./a.out
test.cc:3:5: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int'
You can enable only a subset of checks offered by UBSan, and define the desired behavior for each kind of check:
-fsanitize=...
: print a verbose error report and continue execution (default);-fno-sanitize-recover=...
: print a verbose error report and exit the program;-fsanitize-trap=...
: execute a trap instruction (doesn’t require UBSan run-time support).
For example if you compile/link your program as:
% clang++ -fsanitize=signed-integer-overflow,null,alignment -fno-sanitize-recover=null -fsanitize-trap=alignment
the program will continue execution after signed integer overflows, exit after the first invalid use of a null pointer, and trap after the first use of misaligned pointer.
Available checks¶
Available checks are:
-fsanitize=alignment
: Use of a misaligned pointer or creation of a misaligned reference.-fsanitize=bool
: Load of abool
value which is neithertrue
norfalse
.-fsanitize=builtin
: Passing invalid values to compiler builtins.-fsanitize=bounds
: Out of bounds array indexing, in cases where the array bound can be statically determined.-fsanitize=enum
: Load of a value of an enumerated type which is not in the range of representable values for that enumerated type.-fsanitize=float-cast-overflow
: Conversion to, from, or between floating-point types which would overflow the destination.-fsanitize=float-divide-by-zero
: Floating point division by zero.-fsanitize=function
: Indirect call of a function through a function pointer of the wrong type (Darwin/Linux, C++ and x86/x86_64 only).-fsanitize=implicit-integer-truncation
: Implicit conversion from integer of larger bit width to smaller bit width, if that results in data loss. That is, if the demoted value, after casting back to the original width, is not equal to the original value before the downcast. Issues caught by this sanitizer are not undefined behavior, but are often unintentional.-fsanitize=integer-divide-by-zero
: Integer division by zero.-fsanitize=nonnull-attribute
: Passing null pointer as a function parameter which is declared to never be null.-fsanitize=null
: Use of a null pointer or creation of a null reference.-fsanitize=nullability-arg
: Passing null as a function parameter which is annotated with_Nonnull
.-fsanitize=nullability-assign
: Assigning null to an lvalue which is annotated with_Nonnull
.-fsanitize=nullability-return
: Returning null from a function with a return type annotated with_Nonnull
.-fsanitize=object-size
: An attempt to potentially use bytes which the optimizer can determine are not part of the object being accessed. This will also detect some types of undefined behavior that may not directly access memory, but are provably incorrect given the size of the objects involved, such as invalid downcasts and calling methods on invalid pointers. These checks are made in terms of__builtin_object_size
, and consequently may be able to detect more problems at higher optimization levels.-fsanitize=pointer-overflow
: Performing pointer arithmetic which overflows.-fsanitize=return
: In C++, reaching the end of a value-returning function without returning a value.-fsanitize=returns-nonnull-attribute
: Returning null pointer from a function which is declared to never return null.-fsanitize=shift
: Shift operators where the amount shifted is greater or equal to the promoted bit-width of the left hand side or less than zero, or where the left hand side is negative. For a signed left shift, also checks for signed overflow in C, and for unsigned overflow in C++. You can use-fsanitize=shift-base
or-fsanitize=shift-exponent
to check only left-hand side or right-hand side of shift operation, respectively.-fsanitize=signed-integer-overflow
: Signed integer overflow, where the result of a signed integer computation cannot be represented in its type. This includes all the checks covered by-ftrapv
, as well as checks for signed division overflow (INT_MIN/-1
), but not checks for lossy implicit conversions performed before the computation (see-fsanitize=implicit-conversion
). Both of these two issues are handled by-fsanitize=implicit-conversion
group of checks.-fsanitize=unreachable
: If control flow reaches an unreachable program point.-fsanitize=unsigned-integer-overflow
: Unsigned integer overflow, where the result of an unsigned integer computation cannot be represented in its type. Unlike signed integer overflow, this is not undefined behavior, but it is often unintentional. This sanitizer does not check for lossy implicit conversions performed before such a computation (see-fsanitize=implicit-conversion
).-fsanitize=vla-bound
: A variable-length array whose bound does not evaluate to a positive value.-fsanitize=vptr
: Use of an object whose vptr indicates that it is of the wrong dynamic type, or that its lifetime has not begun or has ended. Incompatible with-fno-rtti
. Link must be performed byclang++
, notclang
, to make sure C++-specific parts of the runtime library and C++ standard libraries are present.
- You can also use the following check groups:
-fsanitize=undefined
: All of the checks listed above other thanunsigned-integer-overflow
,implicit-conversion
and thenullability-*
group of checks.-fsanitize=undefined-trap
: Deprecated alias of-fsanitize=undefined
.-fsanitize=integer
: Checks for undefined or suspicious integer behavior (e.g. unsigned integer overflow). Enablessigned-integer-overflow
,unsigned-integer-overflow
,shift
,integer-divide-by-zero
, andimplicit-integer-truncation
.-fsanitize=implicit-conversion
: Checks for suspicious behaviours of implicit conversions. Currently, only-fsanitize=implicit-integer-truncation
is implemented.-fsanitize=nullability
: Enablesnullability-arg
,nullability-assign
, andnullability-return
. While violating nullability does not have undefined behavior, it is often unintentional, so UBSan offers to catch it.
Minimal Runtime¶
There is a minimal UBSan runtime available suitable for use in production
environments. This runtime has a small attack surface. It only provides very
basic issue logging and deduplication, and does not support -fsanitize=vptr
checking.
To use the minimal runtime, add -fsanitize-minimal-runtime
to the clang
command line options. For example, if you’re used to compiling with
-fsanitize=undefined
, you could enable the minimal runtime with
-fsanitize=undefined -fsanitize-minimal-runtime
.
Stack traces and report symbolization¶
If you want UBSan to print symbolized stack trace for each error report, you will need to:
- Compile with
-g
and-fno-omit-frame-pointer
to get proper debug information in your binary. - Run your program with environment variable
UBSAN_OPTIONS=print_stacktrace=1
. - Make sure
llvm-symbolizer
binary is inPATH
.
Silencing Unsigned Integer Overflow¶
To silence reports from unsigned integer overflow, you can set
UBSAN_OPTIONS=silence_unsigned_overflow=1
. This feature, combined with
-fsanitize-recover=unsigned-integer-overflow
, is particularly useful for
providing fuzzing signal without blowing up logs.
Issue Suppression¶
UndefinedBehaviorSanitizer is not expected to produce false positives. If you see one, look again; most likely it is a true positive!
Disabling Instrumentation with __attribute__((no_sanitize("undefined")))
¶
You disable UBSan checks for particular functions with
__attribute__((no_sanitize("undefined")))
. You can use all values of
-fsanitize=
flag in this attribute, e.g. if your function deliberately
contains possible signed integer overflow, you can use
__attribute__((no_sanitize("signed-integer-overflow")))
.
This attribute may not be
supported by other compilers, so consider using it together with
#if defined(__clang__)
.
Suppressing Errors in Recompiled Code (Blacklist)¶
UndefinedBehaviorSanitizer supports src
and fun
entity types in
Sanitizer special case list, that can be used to suppress error reports
in the specified source files or functions.
Runtime suppressions¶
Sometimes you can suppress UBSan error reports for specific files, functions,
or libraries without recompiling the code. You need to pass a path to
suppression file in a UBSAN_OPTIONS
environment variable.
UBSAN_OPTIONS=suppressions=MyUBSan.supp
You need to specify a check you are suppressing and the bug location. For example:
signed-integer-overflow:file-with-known-overflow.cpp
alignment:function_doing_unaligned_access
vptr:shared_object_with_vptr_failures.so
There are several limitations:
- Sometimes your binary must have enough debug info and/or symbol table, so that the runtime could figure out source file or function name to match against the suppression.
- It is only possible to suppress recoverable checks. For the example above,
you can additionally pass
-fsanitize-recover=signed-integer-overflow,alignment,vptr
, although most of UBSan checks are recoverable by default. - Check groups (like
undefined
) can’t be used in suppressions file, only fine-grained checks are supported.
Supported Platforms¶
UndefinedBehaviorSanitizer is supported on the following OS:
- Android
- Linux
- NetBSD
- FreeBSD
- OpenBSD
- OS X 10.6 onwards
Current Status¶
UndefinedBehaviorSanitizer is available on selected platforms starting from LLVM
3.3. The test suite is integrated into the CMake build and can be run with
check-ubsan
command.
Additional Configuration¶
UndefinedBehaviorSanitizer adds static check data for each check unless it is
in trap mode. This check data includes the full file name. The option
-fsanitize-undefined-strip-path-components=N
can be used to trim this
information. If N
is positive, file information emitted by
UndefinedBehaviorSanitizer will drop the first N
components from the file
path. If N
is negative, the last N
components will be kept.
Example¶
For a file called /code/library/file.cpp
, here is what would be emitted:
* Default (No flag, or -fsanitize-undefined-strip-path-components=0
): /code/library/file.cpp
* -fsanitize-undefined-strip-path-components=1
: code/library/file.cpp
* -fsanitize-undefined-strip-path-components=2
: library/file.cpp
* -fsanitize-undefined-strip-path-components=-1
: file.cpp
* -fsanitize-undefined-strip-path-components=-2
: library/file.cpp
More Information¶
- From LLVM project blog: What Every C Programmer Should Know About Undefined Behavior
- From John Regehr’s Embedded in Academia blog: A Guide to Undefined Behavior in C and C++
DataFlowSanitizer¶
DataFlowSanitizer Design Document¶
This document sets out the design for DataFlowSanitizer, a general dynamic data flow analysis. Unlike other Sanitizer tools, this tool is not designed to detect a specific class of bugs on its own. Instead, it provides a generic dynamic data flow analysis framework to be used by clients to help detect application-specific issues within their own code.
DataFlowSanitizer is a program instrumentation which can associate a number of taint labels with any data stored in any memory region accessible by the program. The analysis is dynamic, which means that it operates on a running program, and tracks how the labels propagate through that program. The tool shall support a large (>100) number of labels, such that programs which operate on large numbers of data items may be analysed with each data item being tracked separately.
Use Cases¶
This instrumentation can be used as a tool to help monitor how data flows from a program’s inputs (sources) to its outputs (sinks). This has applications from a privacy/security perspective in that one can audit how a sensitive data item is used within a program and ensure it isn’t exiting the program anywhere it shouldn’t be.
Interface¶
A number of functions are provided which will create taint labels,
attach labels to memory regions and extract the set of labels
associated with a specific memory region. These functions are declared
in the header file sanitizer/dfsan_interface.h
.
/// Creates and returns a base label with the given description and user data.
dfsan_label dfsan_create_label(const char *desc, void *userdata);
/// Sets the label for each address in [addr,addr+size) to \c label.
void dfsan_set_label(dfsan_label label, void *addr, size_t size);
/// Sets the label for each address in [addr,addr+size) to the union of the
/// current label for that address and \c label.
void dfsan_add_label(dfsan_label label, void *addr, size_t size);
/// Retrieves the label associated with the given data.
///
/// The type of 'data' is arbitrary. The function accepts a value of any type,
/// which can be truncated or extended (implicitly or explicitly) as necessary.
/// The truncation/extension operations will preserve the label of the original
/// value.
dfsan_label dfsan_get_label(long data);
/// Retrieves a pointer to the dfsan_label_info struct for the given label.
const struct dfsan_label_info *dfsan_get_label_info(dfsan_label label);
/// Returns whether the given label label contains the label elem.
int dfsan_has_label(dfsan_label label, dfsan_label elem);
/// If the given label label contains a label with the description desc, returns
/// that label, else returns 0.
dfsan_label dfsan_has_label_with_desc(dfsan_label label, const char *desc);
Taint label representation¶
As stated above, the tool must track a large number of taint labels. This poses an implementation challenge, as most multiple-label tainting systems assign one label per bit to shadow storage, and union taint labels using a bitwise or operation. This will not scale to clients which use hundreds or thousands of taint labels, as the label union operation becomes O(n) in the number of supported labels, and data associated with it will quickly dominate the live variable set, causing register spills and hampering performance.
Instead, a low overhead approach is proposed which is best-case O(log2 n) during execution. The underlying assumption is that the required space of label unions is sparse, which is a reasonable assumption to make given that we are optimizing for the case where applications mostly copy data from one place to another, without often invoking the need for an actual union operation. The representation of a taint label is a 16-bit integer, and new labels are allocated sequentially from a pool. The label identifier 0 is special, and means that the data item is unlabelled.
When a label union operation is requested at a join point (any arithmetic or logical operation with two or more operands, such as addition), the code checks whether a union is required, whether the same union has been requested before, and whether one union label subsumes the other. If so, it returns the previously allocated union label. If not, it allocates a new union label from the same pool used for new labels.
Specifically, the instrumentation pass will insert code like this
to decide the union label lu
for a pair of labels l1
and l2
:
if (l1 == l2)
lu = l1;
else
lu = __dfsan_union(l1, l2);
The equality comparison is outlined, to provide an early exit in
the common cases where the program is processing unlabelled data, or
where the two data items have the same label. __dfsan_union
is
a runtime library function which performs all other union computation.
Further optimizations are possible, for example if l1
is known
at compile time to be zero (e.g. it is derived from a constant),
l2
can be used for lu
, and vice versa.
Memory layout and label management¶
The following is the current memory layout for Linux/x86_64:
Start | End | Use |
---|---|---|
0x700000008000 | 0x800000000000 | application memory |
0x200200000000 | 0x700000008000 | unused |
0x200000000000 | 0x200200000000 | union table |
0x000000010000 | 0x200000000000 | shadow memory |
0x000000000000 | 0x000000010000 | reserved by kernel |
Each byte of application memory corresponds to two bytes of shadow memory, which are used to store its taint label. As for LLVM SSA registers, we have not found it necessary to associate a label with each byte or bit of data, as some other tools do. Instead, labels are associated directly with registers. Loads will result in a union of all shadow labels corresponding to bytes loaded (which most of the time will be short circuited by the initial comparison) and stores will result in a copy of the label to the shadow of all bytes stored to.
Propagating labels through arguments¶
In order to propagate labels through function arguments and return values, DataFlowSanitizer changes the ABI of each function in the translation unit. There are currently two supported ABIs:
- Args – Argument and return value labels are passed through additional arguments and by modifying the return type.
- TLS – Argument and return value labels are passed through TLS variables
__dfsan_arg_tls
and__dfsan_retval_tls
.
The main advantage of the TLS ABI is that it is more tolerant of ABI mismatches (TLS storage is not shared with any other form of storage, whereas extra arguments may be stored in registers which under the native ABI are not used for parameter passing and thus could contain arbitrary values). On the other hand the args ABI is more efficient and allows ABI mismatches to be more easily identified by checking for nonzero labels in nominally unlabelled programs.
Implementing the ABI list¶
The ABI list provides a list of functions which conform to the native ABI, each of which is callable from an instrumented program. This is implemented by replacing each reference to a native ABI function with a reference to a function which uses the instrumented ABI. Such functions are automatically-generated wrappers for the native functions. For example, given the ABI list example provided in the user manual, the following wrappers will be generated under the args ABI:
define linkonce_odr { i8*, i16 } @"dfsw$malloc"(i64 %0, i16 %1) {
entry:
%2 = call i8* @malloc(i64 %0)
%3 = insertvalue { i8*, i16 } undef, i8* %2, 0
%4 = insertvalue { i8*, i16 } %3, i16 0, 1
ret { i8*, i16 } %4
}
define linkonce_odr { i32, i16 } @"dfsw$tolower"(i32 %0, i16 %1) {
entry:
%2 = call i32 @tolower(i32 %0)
%3 = insertvalue { i32, i16 } undef, i32 %2, 0
%4 = insertvalue { i32, i16 } %3, i16 %1, 1
ret { i32, i16 } %4
}
define linkonce_odr { i8*, i16 } @"dfsw$memcpy"(i8* %0, i8* %1, i64 %2, i16 %3, i16 %4, i16 %5) {
entry:
%labelreturn = alloca i16
%6 = call i8* @__dfsw_memcpy(i8* %0, i8* %1, i64 %2, i16 %3, i16 %4, i16 %5, i16* %labelreturn)
%7 = load i16* %labelreturn
%8 = insertvalue { i8*, i16 } undef, i8* %6, 0
%9 = insertvalue { i8*, i16 } %8, i16 %7, 1
ret { i8*, i16 } %9
}
As an optimization, direct calls to native ABI functions will call the
native ABI function directly and the pass will compute the appropriate label
internally. This has the advantage of reducing the number of union operations
required when the return value label is known to be zero (i.e. discard
functions, or functional
functions with known unlabelled arguments).
Checking ABI Consistency¶
DFSan changes the ABI of each function in the module. This makes it possible for a function with the native ABI to be called with the instrumented ABI, or vice versa, thus possibly invoking undefined behavior. A simple way of statically detecting instances of this problem is to prepend the prefix “dfs$” to the name of each instrumented-ABI function.
This will not catch every such problem; in particular function pointers passed across the instrumented-native barrier cannot be used on the other side. These problems could potentially be caught dynamically.
Introduction¶
DataFlowSanitizer is a generalised dynamic data flow analysis.
Unlike other Sanitizer tools, this tool is not designed to detect a specific class of bugs on its own. Instead, it provides a generic dynamic data flow analysis framework to be used by clients to help detect application-specific issues within their own code.
Usage¶
With no program changes, applying DataFlowSanitizer to a program will not alter its behavior. To use DataFlowSanitizer, the program uses API functions to apply tags to data to cause it to be tracked, and to check the tag of a specific data item. DataFlowSanitizer manages the propagation of tags through the program according to its data flow.
The APIs are defined in the header file sanitizer/dfsan_interface.h
.
For further information about each function, please refer to the header
file.
ABI List¶
DataFlowSanitizer uses a list of functions known as an ABI list to decide whether a call to a specific function should use the operating system’s native ABI or whether it should use a variant of this ABI that also propagates labels through function parameters and return values. The ABI list file also controls how labels are propagated in the former case. DataFlowSanitizer comes with a default ABI list which is intended to eventually cover the glibc library on Linux but it may become necessary for users to extend the ABI list in cases where a particular library or function cannot be instrumented (e.g. because it is implemented in assembly or another language which DataFlowSanitizer does not support) or a function is called from a library or function which cannot be instrumented.
DataFlowSanitizer’s ABI list file is a Sanitizer special case list.
The pass treats every function in the uninstrumented
category in the
ABI list file as conforming to the native ABI. Unless the ABI list contains
additional categories for those functions, a call to one of those functions
will produce a warning message, as the labelling behavior of the function
is unknown. The other supported categories are discard
, functional
and custom
.
discard
– To the extent that this function writes to (user-accessible) memory, it also updates labels in shadow memory (this condition is trivially satisfied for functions which do not write to user-accessible memory). Its return value is unlabelled.functional
– Likediscard
, except that the label of its return value is the union of the label of its arguments.custom
– Instead of calling the function, a custom wrapper__dfsw_F
is called, whereF
is the name of the function. This function may wrap the original function or provide its own implementation. This category is generally used for uninstrumentable functions which write to user-accessible memory or which have more complex label propagation behavior. The signature of__dfsw_F
is based on that ofF
with each argument having a label of typedfsan_label
appended to the argument list. IfF
is of non-void return type a final argument of typedfsan_label *
is appended to which the custom function can store the label for the return value. For example:
void f(int x);
void __dfsw_f(int x, dfsan_label x_label);
void *memcpy(void *dest, const void *src, size_t n);
void *__dfsw_memcpy(void *dest, const void *src, size_t n,
dfsan_label dest_label, dfsan_label src_label,
dfsan_label n_label, dfsan_label *ret_label);
If a function defined in the translation unit being compiled belongs to the
uninstrumented
category, it will be compiled so as to conform to the
native ABI. Its arguments will be assumed to be unlabelled, but it will
propagate labels in shadow memory.
For example:
# main is called by the C runtime using the native ABI.
fun:main=uninstrumented
fun:main=discard
# malloc only writes to its internal data structures, not user-accessible memory.
fun:malloc=uninstrumented
fun:malloc=discard
# tolower is a pure function.
fun:tolower=uninstrumented
fun:tolower=functional
# memcpy needs to copy the shadow from the source to the destination region.
# This is done in a custom function.
fun:memcpy=uninstrumented
fun:memcpy=custom
Example¶
The following program demonstrates label propagation by checking that the correct labels are propagated.
#include <sanitizer/dfsan_interface.h>
#include <assert.h>
int main(void) {
int i = 1;
dfsan_label i_label = dfsan_create_label("i", 0);
dfsan_set_label(i_label, &i, sizeof(i));
int j = 2;
dfsan_label j_label = dfsan_create_label("j", 0);
dfsan_set_label(j_label, &j, sizeof(j));
int k = 3;
dfsan_label k_label = dfsan_create_label("k", 0);
dfsan_set_label(k_label, &k, sizeof(k));
dfsan_label ij_label = dfsan_get_label(i + j);
assert(dfsan_has_label(ij_label, i_label));
assert(dfsan_has_label(ij_label, j_label));
assert(!dfsan_has_label(ij_label, k_label));
dfsan_label ijk_label = dfsan_get_label(i + j + k);
assert(dfsan_has_label(ijk_label, i_label));
assert(dfsan_has_label(ijk_label, j_label));
assert(dfsan_has_label(ijk_label, k_label));
return 0;
}
Current status¶
DataFlowSanitizer is a work in progress, currently under development for x86_64 Linux.
Design¶
Please refer to the design document.
LeakSanitizer¶
Introduction¶
LeakSanitizer is a run-time memory leak detector. It can be combined with AddressSanitizer to get both memory error and leak detection, or used in a stand-alone mode. LSan adds almost no performance overhead until the very end of the process, at which point there is an extra leak detection phase.
Usage¶
LeakSanitizer is supported on x86_64 Linux and OS X. In order to use it, simply build your program with AddressSanitizer:
$ cat memory-leak.c
#include <stdlib.h>
void *p;
int main() {
p = malloc(7);
p = 0; // The memory is leaked here.
return 0;
}
% clang -fsanitize=address -g memory-leak.c ; ASAN_OPTIONS=detect_leaks=1 ./a.out
==23646==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 7 byte(s) in 1 object(s) allocated from:
#0 0x4af01b in __interceptor_malloc /projects/compiler-rt/lib/asan/asan_malloc_linux.cc:52:3
#1 0x4da26a in main memory-leak.c:4:7
#2 0x7f076fd9cec4 in __libc_start_main libc-start.c:287
SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).
To use LeakSanitizer in stand-alone mode, link your program with
-fsanitize=leak
flag. Make sure to use clang
(not ld
) for the
link step, so that it would link in proper LeakSanitizer run-time library
into the final executable.
SanitizerCoverage¶
Introduction¶
LLVM has a simple code coverage instrumentation built in (SanitizerCoverage). It inserts calls to user-defined functions on function-, basic-block-, and edge- levels. Default implementations of those callbacks are provided and implement simple coverage reporting and visualization, however if you need just coverage visualization you may want to use SourceBasedCodeCoverage instead.
Tracing PCs with guards¶
With -fsanitize-coverage=trace-pc-guard
the compiler will insert the following code
on every edge:
__sanitizer_cov_trace_pc_guard(&guard_variable)
Every edge will have its own guard_variable (uint32_t).
The compler will also insert calls to a module constructor:
// The guards are [start, stop).
// This function will be called at least once per DSO and may be called
// more than once with the same values of start/stop.
__sanitizer_cov_trace_pc_guard_init(uint32_t *start, uint32_t *stop);
With an additional ...=trace-pc,indirect-calls
flag
__sanitizer_cov_trace_pc_indirect(void *callee)
will be inserted on every indirect call.
The functions __sanitizer_cov_trace_pc_* should be defined by the user.
Example:
// trace-pc-guard-cb.cc
#include <stdint.h>
#include <stdio.h>
#include <sanitizer/coverage_interface.h>
// This callback is inserted by the compiler as a module constructor
// into every DSO. 'start' and 'stop' correspond to the
// beginning and end of the section with the guards for the entire
// binary (executable or DSO). The callback will be called at least
// once per DSO and may be called multiple times with the same parameters.
extern "C" void __sanitizer_cov_trace_pc_guard_init(uint32_t *start,
uint32_t *stop) {
static uint64_t N; // Counter for the guards.
if (start == stop || *start) return; // Initialize only once.
printf("INIT: %p %p\n", start, stop);
for (uint32_t *x = start; x < stop; x++)
*x = ++N; // Guards should start from 1.
}
// This callback is inserted by the compiler on every edge in the
// control flow (some optimizations apply).
// Typically, the compiler will emit the code like this:
// if(*guard)
// __sanitizer_cov_trace_pc_guard(guard);
// But for large functions it will emit a simple call:
// __sanitizer_cov_trace_pc_guard(guard);
extern "C" void __sanitizer_cov_trace_pc_guard(uint32_t *guard) {
if (!*guard) return; // Duplicate the guard check.
// If you set *guard to 0 this code will not be called again for this edge.
// Now you can get the PC and do whatever you want:
// store it somewhere or symbolize it and print right away.
// The values of `*guard` are as you set them in
// __sanitizer_cov_trace_pc_guard_init and so you can make them consecutive
// and use them to dereference an array or a bit vector.
void *PC = __builtin_return_address(0);
char PcDescr[1024];
// This function is a part of the sanitizer run-time.
// To use it, link with AddressSanitizer or other sanitizer.
__sanitizer_symbolize_pc(PC, "%p %F %L", PcDescr, sizeof(PcDescr));
printf("guard: %p %x PC %s\n", guard, *guard, PcDescr);
}
// trace-pc-guard-example.cc
void foo() { }
int main(int argc, char **argv) {
if (argc > 1) foo();
}
clang++ -g -fsanitize-coverage=trace-pc-guard trace-pc-guard-example.cc -c
clang++ trace-pc-guard-cb.cc trace-pc-guard-example.o -fsanitize=address
ASAN_OPTIONS=strip_path_prefix=`pwd`/ ./a.out
INIT: 0x71bcd0 0x71bce0
guard: 0x71bcd4 2 PC 0x4ecd5b in main trace-pc-guard-example.cc:2
guard: 0x71bcd8 3 PC 0x4ecd9e in main trace-pc-guard-example.cc:3:7
ASAN_OPTIONS=strip_path_prefix=`pwd`/ ./a.out with-foo
INIT: 0x71bcd0 0x71bce0
guard: 0x71bcd4 2 PC 0x4ecd5b in main trace-pc-guard-example.cc:3
guard: 0x71bcdc 4 PC 0x4ecdc7 in main trace-pc-guard-example.cc:4:17
guard: 0x71bcd0 1 PC 0x4ecd20 in foo() trace-pc-guard-example.cc:2:14
Inline 8bit-counters¶
Experimental, may change or disappear in future
With -fsanitize-coverage=inline-8bit-counters
the compiler will insert
inline counter increments on every edge.
This is similar to -fsanitize-coverage=trace-pc-guard
but instead of a
callback the instrumentation simply increments a counter.
Users need to implement a single function to capture the counters at startup.
extern "C"
void __sanitizer_cov_8bit_counters_init(char *start, char *end) {
// [start,end) is the array of 8-bit counters created for the current DSO.
// Capture this array in order to read/modify the counters.
}
PC-Table¶
Experimental, may change or disappear in future
With -fsanitize-coverage=pc-table
the compiler will create a table of
instrumented PCs. Requires either -fsanitize-coverage=inline-8bit-counters
or
-fsanitize-coverage=trace-pc-guard
.
Users need to implement a single function to capture the PC table at startup:
extern "C"
void __sanitizer_cov_pcs_init(const uintptr_t *pcs_beg,
const uintptr_t *pcs_end) {
// [pcs_beg,pcs_end) is the array of ptr-sized integers representing
// pairs [PC,PCFlags] for every instrumented block in the current DSO.
// Capture this array in order to read the PCs and their Flags.
// The number of PCs and PCFlags for a given DSO is the same as the number
// of 8-bit counters (-fsanitize-coverage=inline-8bit-counters) or
// trace_pc_guard callbacks (-fsanitize-coverage=trace-pc-guard)
// A PCFlags describes the basic block:
// * bit0: 1 if the block is the function entry block, 0 otherwise.
}
Tracing PCs¶
With -fsanitize-coverage=trace-pc
the compiler will insert
__sanitizer_cov_trace_pc()
on every edge.
With an additional ...=trace-pc,indirect-calls
flag
__sanitizer_cov_trace_pc_indirect(void *callee)
will be inserted on every indirect call.
These callbacks are not implemented in the Sanitizer run-time and should be defined
by the user.
This mechanism is used for fuzzing the Linux kernel
(https://github.com/google/syzkaller).
Instrumentation points¶
Sanitizer Coverage offers different levels of instrumentation.
edge
(default): edges are instrumented (see below).bb
: basic blocks are instrumented.func
: only the entry block of every function will be instrumented.
Use these flags together with trace-pc-guard
or trace-pc
,
like this: -fsanitize-coverage=func,trace-pc-guard
.
When edge
or bb
is used, some of the edges/blocks may still be left
uninstrumented (pruned) if such instrumentation is considered redundant.
Use no-prune
(e.g. -fsanitize-coverage=bb,no-prune,trace-pc-guard
)
to disable pruning. This could be useful for better coverage visualization.
Edge coverage¶
Consider this code:
void foo(int *a) {
if (a)
*a = 0;
}
It contains 3 basic blocks, let’s name them A, B, C:
A
|\
| \
| B
| /
|/
C
If blocks A, B, and C are all covered we know for certain that the edges A=>B and B=>C were executed, but we still don’t know if the edge A=>C was executed. Such edges of control flow graph are called critical. The edge-level coverage simply splits all critical edges by introducing new dummy blocks and then instruments those blocks:
A
|\
| \
D B
| /
|/
C
Tracing data flow¶
Support for data-flow-guided fuzzing.
With -fsanitize-coverage=trace-cmp
the compiler will insert extra instrumentation
around comparison instructions and switch statements.
Similarly, with -fsanitize-coverage=trace-div
the compiler will instrument
integer division instructions (to capture the right argument of division)
and with -fsanitize-coverage=trace-gep
–
the LLVM GEP instructions
(to capture array indices).
// Called before a comparison instruction.
// Arg1 and Arg2 are arguments of the comparison.
void __sanitizer_cov_trace_cmp1(uint8_t Arg1, uint8_t Arg2);
void __sanitizer_cov_trace_cmp2(uint16_t Arg1, uint16_t Arg2);
void __sanitizer_cov_trace_cmp4(uint32_t Arg1, uint32_t Arg2);
void __sanitizer_cov_trace_cmp8(uint64_t Arg1, uint64_t Arg2);
// Called before a comparison instruction if exactly one of the arguments is constant.
// Arg1 and Arg2 are arguments of the comparison, Arg1 is a compile-time constant.
// These callbacks are emitted by -fsanitize-coverage=trace-cmp since 2017-08-11
void __sanitizer_cov_trace_const_cmp1(uint8_t Arg1, uint8_t Arg2);
void __sanitizer_cov_trace_const_cmp2(uint16_t Arg1, uint16_t Arg2);
void __sanitizer_cov_trace_const_cmp4(uint32_t Arg1, uint32_t Arg2);
void __sanitizer_cov_trace_const_cmp8(uint64_t Arg1, uint64_t Arg2);
// Called before a switch statement.
// Val is the switch operand.
// Cases[0] is the number of case constants.
// Cases[1] is the size of Val in bits.
// Cases[2:] are the case constants.
void __sanitizer_cov_trace_switch(uint64_t Val, uint64_t *Cases);
// Called before a division statement.
// Val is the second argument of division.
void __sanitizer_cov_trace_div4(uint32_t Val);
void __sanitizer_cov_trace_div8(uint64_t Val);
// Called before a GetElemementPtr (GEP) instruction
// for every non-constant array index.
void __sanitizer_cov_trace_gep(uintptr_t Idx);
Default implementation¶
The sanitizer run-time (AddressSanitizer, MemorySanitizer, etc) provide a default implementations of some of the coverage callbacks. You may use this implementation to dump the coverage on disk at the process exit.
Example:
% cat -n cov.cc
1 #include <stdio.h>
2 __attribute__((noinline))
3 void foo() { printf("foo\n"); }
4
5 int main(int argc, char **argv) {
6 if (argc == 2)
7 foo();
8 printf("main\n");
9 }
% clang++ -g cov.cc -fsanitize=address -fsanitize-coverage=trace-pc-guard
% ASAN_OPTIONS=coverage=1 ./a.out; wc -c *.sancov
main
SanitizerCoverage: ./a.out.7312.sancov 2 PCs written
24 a.out.7312.sancov
% ASAN_OPTIONS=coverage=1 ./a.out foo ; wc -c *.sancov
foo
main
SanitizerCoverage: ./a.out.7316.sancov 3 PCs written
24 a.out.7312.sancov
32 a.out.7316.sancov
Every time you run an executable instrumented with SanitizerCoverage
one *.sancov
file is created during the process shutdown.
If the executable is dynamically linked against instrumented DSOs,
one *.sancov
file will be also created for every DSO.
Sancov data format¶
The format of *.sancov
files is very simple: the first 8 bytes is the magic,
one of 0xC0BFFFFFFFFFFF64
and 0xC0BFFFFFFFFFFF32
. The last byte of the
magic defines the size of the following offsets. The rest of the data is the
offsets in the corresponding binary/DSO that were executed during the run.
Sancov Tool¶
An simple sancov
tool is provided to process coverage files.
The tool is part of LLVM project and is currently supported only on Linux.
It can handle symbolization tasks autonomously without any extra support
from the environment. You need to pass .sancov files (named
<module_name>.<pid>.sancov
and paths to all corresponding binary elf files.
Sancov matches these files using module names and binaries file names.
USAGE: sancov [options] <action> (<binary file>|<.sancov file>)...
Action (required)
-print - Print coverage addresses
-covered-functions - Print all covered functions.
-not-covered-functions - Print all not covered functions.
-symbolize - Symbolizes the report.
Options
-blacklist=<string> - Blacklist file (sanitizer blacklist format).
-demangle - Print demangled function name.
-strip_path_prefix=<string> - Strip this prefix from file paths in reports
Coverage Reports¶
Experimental
.sancov
files do not contain enough information to generate a source-level
coverage report. The missing information is contained
in debug info of the binary. Thus the .sancov
has to be symbolized
to produce a .symcov
file first:
sancov -symbolize my_program.123.sancov my_program > my_program.123.symcov
The .symcov
file can be browsed overlayed over the source code by
running tools/sancov/coverage-report-server.py
script that will start
an HTTP server.
Output directory¶
By default, .sancov files are created in the current working directory.
This can be changed with ASAN_OPTIONS=coverage_dir=/path
:
% ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
% ls -l /tmp/cov/*sancov
-rw-r----- 1 kcc eng 4 Nov 27 12:21 a.out.22673.sancov
-rw-r----- 1 kcc eng 8 Nov 27 12:21 a.out.22679.sancov
SanitizerStats¶
Introduction¶
The sanitizers support a simple mechanism for gathering profiling statistics to help understand the overhead associated with sanitizers.
How to build and run¶
SanitizerStats can currently only be used with Control Flow Integrity.
In addition to -fsanitize=cfi*
, pass the -fsanitize-stats
flag.
This will cause the program to count the number of times that each control
flow integrity check in the program fires.
At run time, set the SANITIZER_STATS_PATH
environment variable to direct
statistics output to a file. The file will be written on process exit.
The following substitutions will be applied to the environment variable:
%b
– The executable basename.%p
– The process ID.
You can also send the SIGUSR2
signal to a process to make it write
sanitizer statistics immediately.
The sanstats
program can be used to dump statistics. It takes as a
command line argument the path to a statistics file produced by a program
compiled with -fsanitize-stats
.
The output of sanstats
is in four columns, separated by spaces. The first
column is the file and line number of the call site. The second column is
the function name. The third column is the type of statistic gathered (in
this case, the type of control flow integrity check). The fourth column is
the call count.
Example:
$ cat -n vcall.cc
1 struct A {
2 virtual void f() {}
3 };
4
5 __attribute__((noinline)) void g(A *a) {
6 a->f();
7 }
8
9 int main() {
10 A a;
11 g(&a);
12 }
$ clang++ -fsanitize=cfi -fvisibility=hidden -flto -fuse-ld=gold vcall.cc -fsanitize-stats -g
$ SANITIZER_STATS_PATH=a.stats ./a.out
$ sanstats a.stats
vcall.cc:6 _Z1gP1A cfi-vcall 1
Sanitizer special case list¶
Introduction¶
This document describes the way to disable or alter the behavior of sanitizer tools for certain source-level entities by providing a special file at compile-time.
Goal and usage¶
User of sanitizer tools, such as AddressSanitizer, ThreadSanitizer or MemorySanitizer may want to disable or alter some checks for certain source-level entities to:
- speedup hot function, which is known to be correct;
- ignore a function that does some low-level magic (e.g. walks through the thread stack, bypassing the frame boundaries);
- ignore a known problem.
To achieve this, user may create a file listing the entities they want to
ignore, and pass it to clang at compile-time using
-fsanitize-blacklist
flag. See Clang Compiler User’s Manual for details.
Example¶
$ cat foo.c
#include <stdlib.h>
void bad_foo() {
int *a = (int*)malloc(40);
a[10] = 1;
}
int main() { bad_foo(); }
$ cat blacklist.txt
# Ignore reports from bad_foo function.
fun:bad_foo
$ clang -fsanitize=address foo.c ; ./a.out
# AddressSanitizer prints an error report.
$ clang -fsanitize=address -fsanitize-blacklist=blacklist.txt foo.c ; ./a.out
# No error report here.
Format¶
Blacklists consist of entries, optionally grouped into sections. Empty lines and lines starting with “#” are ignored.
Section names are regular expressions written in square brackets that denote
which sanitizer the following entries apply to. For example, [address]
specifies AddressSanitizer while [cfi-vcall|cfi-icall]
specifies Control
Flow Integrity virtual and indirect call checking. Entries without a section
will be placed under the [*]
section applying to all enabled sanitizers.
Entries contain an entity type, followed by a colon and a regular expression,
specifying the names of the entities, optionally followed by an equals sign and
a tool-specific category, e.g. fun:*ExampleFunc=example_category
. The
meaning of *
in regular expression for entity names is different - it is
treated as in shell wildcarding. Two generic entity types are src
and
fun
, which allow users to specify source files and functions, respectively.
Some sanitizer tools may introduce custom entity types and categories - refer to
tool-specific docs.
# Lines starting with # are ignored.
# Turn off checks for the source file (use absolute path or path relative
# to the current working directory):
src:/path/to/source/file.c
# Turn off checks for a particular functions (use mangled names):
fun:MyFooBar
fun:_Z8MyFooBarv
# Extended regular expressions are supported:
fun:bad_(foo|bar)
src:bad_source[1-9].c
# Shell like usage of * is supported (* is treated as .*):
src:bad/sources/*
fun:*BadFunction*
# Specific sanitizer tools may introduce categories.
src:/special/path/*=special_sources
# Sections can be used to limit blacklist entries to specific sanitizers
[address]
fun:*BadASanFunc*
# Section names are regular expressions
[cfi-vcall|cfi-icall]
fun:*BadCfiCall
# Entries without sections are placed into [*] and apply to all sanitizers
Control Flow Integrity¶
Control Flow Integrity Design Documentation¶
This page documents the design of the Control Flow Integrity schemes supported by Clang.
Forward-Edge CFI for Virtual Calls¶
This scheme works by allocating, for each static type used to make a virtual call, a region of read-only storage in the object file holding a bit vector that maps onto to the region of storage used for those virtual tables. Each set bit in the bit vector corresponds to the address point for a virtual table compatible with the static type for which the bit vector is being built.
For example, consider the following three C++ classes:
struct A {
virtual void f1();
virtual void f2();
virtual void f3();
};
struct B : A {
virtual void f1();
virtual void f2();
virtual void f3();
};
struct C : A {
virtual void f1();
virtual void f2();
virtual void f3();
};
The scheme will cause the virtual tables for A, B and C to be laid out consecutively:
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A::offset-to-top | &A::rtti | &A::f1 | &A::f2 | &A::f3 | B::offset-to-top | &B::rtti | &B::f1 | &B::f2 | &B::f3 | C::offset-to-top | &C::rtti | &C::f1 | &C::f2 | &C::f3 |
The bit vector for static types A, B and C will look like this:
Class | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
B | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
C | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Bit vectors are represented in the object file as byte arrays. By loading from indexed offsets into the byte array and applying a mask, a program can test bits from the bit set with a relatively short instruction sequence. Bit vectors may overlap so long as they use different bits. For the full details, see the ByteArrayBuilder class.
In this case, assuming A is laid out at offset 0 in bit 0, B at offset 0 in bit 1 and C at offset 0 in bit 2, the byte array would look like this:
char bits[] = { 0, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0, 5, 0, 0 };
To emit a virtual call, the compiler will assemble code that checks that the object’s virtual table pointer is in-bounds and aligned and that the relevant bit is set in the bit vector.
For example on x86 a typical virtual call may look like this:
ca7fbb: 48 8b 0f mov (%rdi),%rcx
ca7fbe: 48 8d 15 c3 42 fb 07 lea 0x7fb42c3(%rip),%rdx
ca7fc5: 48 89 c8 mov %rcx,%rax
ca7fc8: 48 29 d0 sub %rdx,%rax
ca7fcb: 48 c1 c0 3d rol $0x3d,%rax
ca7fcf: 48 3d 7f 01 00 00 cmp $0x17f,%rax
ca7fd5: 0f 87 36 05 00 00 ja ca8511
ca7fdb: 48 8d 15 c0 0b f7 06 lea 0x6f70bc0(%rip),%rdx
ca7fe2: f6 04 10 10 testb $0x10,(%rax,%rdx,1)
ca7fe6: 0f 84 25 05 00 00 je ca8511
ca7fec: ff 91 98 00 00 00 callq *0x98(%rcx)
[...]
ca8511: 0f 0b ud2
The compiler relies on co-operation from the linker in order to assemble the bit vectors for the whole program. It currently does this using LLVM’s type metadata mechanism together with link-time optimization.
Optimizations¶
The scheme as described above is the fully general variant of the scheme. Most of the time we are able to apply one or more of the following optimizations to improve binary size or performance.
In fact, if you try the above example with the current version of the compiler, you will probably find that it will not use the described virtual table layout or machine instructions. Some of the optimizations we are about to introduce cause the compiler to use a different layout or a different sequence of machine instructions.
Stripping Leading/Trailing Zeros in Bit Vectors¶
If a bit vector contains leading or trailing zeros, we can strip them from the vector. The compiler will emit code to check if the pointer is in range of the region covered by ones, and perform the bit vector check using a truncated version of the bit vector. For example, the bit vectors for our example class hierarchy will be emitted like this:
Class | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | ||||
B | 1 | ||||||||||||||
C | 1 |
Short Inline Bit Vectors¶
If the vector is sufficiently short, we can represent it as an inline constant on x86. This saves us a few instructions when reading the correct element of the bit vector.
If the bit vector fits in 32 bits, the code looks like this:
dc2: 48 8b 03 mov (%rbx),%rax
dc5: 48 8d 15 14 1e 00 00 lea 0x1e14(%rip),%rdx
dcc: 48 89 c1 mov %rax,%rcx
dcf: 48 29 d1 sub %rdx,%rcx
dd2: 48 c1 c1 3d rol $0x3d,%rcx
dd6: 48 83 f9 03 cmp $0x3,%rcx
dda: 77 2f ja e0b <main+0x9b>
ddc: ba 09 00 00 00 mov $0x9,%edx
de1: 0f a3 ca bt %ecx,%edx
de4: 73 25 jae e0b <main+0x9b>
de6: 48 89 df mov %rbx,%rdi
de9: ff 10 callq *(%rax)
[...]
e0b: 0f 0b ud2
Or if the bit vector fits in 64 bits:
11a6: 48 8b 03 mov (%rbx),%rax
11a9: 48 8d 15 d0 28 00 00 lea 0x28d0(%rip),%rdx
11b0: 48 89 c1 mov %rax,%rcx
11b3: 48 29 d1 sub %rdx,%rcx
11b6: 48 c1 c1 3d rol $0x3d,%rcx
11ba: 48 83 f9 2a cmp $0x2a,%rcx
11be: 77 35 ja 11f5 <main+0xb5>
11c0: 48 ba 09 00 00 00 00 movabs $0x40000000009,%rdx
11c7: 04 00 00
11ca: 48 0f a3 ca bt %rcx,%rdx
11ce: 73 25 jae 11f5 <main+0xb5>
11d0: 48 89 df mov %rbx,%rdi
11d3: ff 10 callq *(%rax)
[...]
11f5: 0f 0b ud2
If the bit vector consists of a single bit, there is only one possible virtual table, and the check can consist of a single equality comparison:
9a2: 48 8b 03 mov (%rbx),%rax
9a5: 48 8d 0d a4 13 00 00 lea 0x13a4(%rip),%rcx
9ac: 48 39 c8 cmp %rcx,%rax
9af: 75 25 jne 9d6 <main+0x86>
9b1: 48 89 df mov %rbx,%rdi
9b4: ff 10 callq *(%rax)
[...]
9d6: 0f 0b ud2
Virtual Table Layout¶
The compiler lays out classes of disjoint hierarchies in separate regions of the object file. At worst, bit vectors in disjoint hierarchies only need to cover their disjoint hierarchy. But the closer that classes in sub-hierarchies are laid out to each other, the smaller the bit vectors for those sub-hierarchies need to be (see “Stripping Leading/Trailing Zeros in Bit Vectors” above). The GlobalLayoutBuilder class is responsible for laying out the globals efficiently to minimize the sizes of the underlying bitsets.
Alignment¶
If all gaps between address points in a particular bit vector are multiples of powers of 2, the compiler can compress the bit vector by strengthening the alignment requirements of the virtual table pointer. For example, given this class hierarchy:
struct A {
virtual void f1();
virtual void f2();
};
struct B : A {
virtual void f1();
virtual void f2();
virtual void f3();
virtual void f4();
virtual void f5();
virtual void f6();
};
struct C : A {
virtual void f1();
virtual void f2();
};
The virtual tables will be laid out like this:
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A::offset-to-top | &A::rtti | &A::f1 | &A::f2 | B::offset-to-top | &B::rtti | &B::f1 | &B::f2 | &B::f3 | &B::f4 | &B::f5 | &B::f6 | C::offset-to-top | &C::rtti | &C::f1 | &C::f2 |
Notice that each address point for A is separated by 4 words. This lets us emit a compressed bit vector for A that looks like this:
2 | 6 | 10 | 14 |
---|---|---|---|
1 | 1 | 0 | 1 |
At call sites, the compiler will strengthen the alignment requirements by
using a different rotate count. For example, on a 64-bit machine where the
address points are 4-word aligned (as in A from our example), the rol
instruction may look like this:
dd2: 48 c1 c1 3b rol $0x3b,%rcx
Padding to Powers of 2¶
Of course, this alignment scheme works best if the address points are in fact aligned correctly. To make this more likely to happen, we insert padding between virtual tables that in many cases aligns address points to a power of 2. Specifically, our padding aligns virtual tables to the next highest power of 2 bytes; because address points for specific base classes normally appear at fixed offsets within the virtual table, this normally has the effect of aligning the address points as well.
This scheme introduces tradeoffs between decreased space overhead for instructions and bit vectors and increased overhead in the form of padding. We therefore limit the amount of padding so that we align to no more than 128 bytes. This number was found experimentally to provide a good tradeoff.
Eliminating Bit Vector Checks for All-Ones Bit Vectors¶
If the bit vector is all ones, the bit vector check is redundant; we simply need to check that the address is in range and well aligned. This is more likely to occur if the virtual tables are padded.
Forward-Edge CFI for Indirect Function Calls¶
Under forward-edge CFI for indirect function calls, each unique function type has its own bit vector, and at each call site we need to check that the function pointer is a member of the function type’s bit vector. This scheme works in a similar way to forward-edge CFI for virtual calls, the distinction being that we need to build bit vectors of function entry points rather than of virtual tables.
Unlike when re-arranging global variables, we cannot re-arrange functions in a particular order and base our calculations on the layout of the functions’ entry points, as we have no idea how large a particular function will end up being (the function sizes could even depend on how we arrange the functions). Instead, we build a jump table, which is a block of code consisting of one branch instruction for each of the functions in the bit set that branches to the target function, and redirect any taken function addresses to the corresponding jump table entry. In this way, the distance between function entry points is predictable and controllable. In the object file’s symbol table, the symbols for the target functions also refer to the jump table entries, so that addresses taken outside the module will pass any verification done inside the module.
In more concrete terms, suppose we have three functions f
, g
,
h
which are all of the same type, and a function foo that returns their
addresses:
f:
mov 0, %eax
ret
g:
mov 1, %eax
ret
h:
mov 2, %eax
ret
foo:
mov f, %eax
mov g, %edx
mov h, %ecx
ret
Our jump table will (conceptually) look like this:
f:
jmp .Ltmp0 ; 5 bytes
int3 ; 1 byte
int3 ; 1 byte
int3 ; 1 byte
g:
jmp .Ltmp1 ; 5 bytes
int3 ; 1 byte
int3 ; 1 byte
int3 ; 1 byte
h:
jmp .Ltmp2 ; 5 bytes
int3 ; 1 byte
int3 ; 1 byte
int3 ; 1 byte
.Ltmp0:
mov 0, %eax
ret
.Ltmp1:
mov 1, %eax
ret
.Ltmp2:
mov 2, %eax
ret
foo:
mov f, %eax
mov g, %edx
mov h, %ecx
ret
Because the addresses of f
, g
, h
are evenly spaced at a power of
2, and function types do not overlap (unlike class types with base classes),
we can normally apply the Alignment and Eliminating Bit Vector Checks
for All-Ones Bit Vectors optimizations thus simplifying the check at each
call site to a range and alignment check.
Backward-edge CFI for return statements (RCFI)¶
This section is a proposal. As of March 2017 it is not implemented.
Backward-edge control flow (RET instructions) can be hijacked via overwriting the return address (RA) on stack. Various mitigation techniques (e.g. SafeStack, RFG, Intel CET) try to detect or prevent RA corruption on stack.
RCFI enforces the expected control flow in several different ways described below. RCFI heavily relies on LTO.
Leaf Functions¶
If f() is a leaf function (i.e. it has no calls except maybe no-return calls) it can be called using a special calling convention that stores RA in a dedicated register R before the CALL instruction. f() does not spill R and does not use the RET instruction, instead it uses the value in R to JMP to RA.
This flavour of CFI is precise, i.e. the function is guaranteed to return to the point exactly following the call.
An alternative approach is to copy RA from stack to R in the first instruction of f(), then JMP to R. This approach is simpler to implement (does not require changing the caller) but weaker (there is a small window when RA is actually stored on stack).
Functions called once¶
Suppose f() is called in just one place in the program (assuming we can verify this in LTO mode). In this case we can replace the RET instruction with a JMP instruction with the immediate constant for RA. This will precisely enforce the return control flow no matter what is stored on stack.
Another variant is to compare RA on stack with the known constant and abort if they don’t match; then JMP to the known constant address.
Functions called in a small number of call sites¶
We may extend the above approach to cases where f() is called more than once (but still a small number of times). With LTO we know all possible values of RA and we check them one-by-one (or using binary search) against the value on stack. If the match is found, we JMP to the known constant address, otherwise abort.
This protection is near-precise, i.e. it guarantees that the control flow will be transferred to one of the valid return addresses for this function, but not necessary to the point of the most recent CALL.
General case¶
For functions called multiple times a return jump table is constructed in the same manner as jump tables for indirect function calls (see above). The correct jump table entry (or it’s index) is passed by CALL to f() (as an extra argument) and then spilled to stack. The RET instruction is replaced with a load of the jump table entry, jump table range check, and JMP to the jump table entry.
This protection is also near-precise.
Returns from functions called indirectly¶
If a function is called indirectly, the return jump table is constructed for the equivalence class of functions instead of a single function.
Cross-DSO calls¶
Consider two instrumented DSOs, A and B. A defines f() and B calls it.
This case will be handled similarly to the cross-DSO scheme using the slow path callback.
Non-goals¶
- RCFI does not protect RET instructions:
- in non-instrumented DSOs,
- in instrumented DSOs for functions that are called from non-instrumented DSOs,
- embedded into other instructions (e.g. 0f4fc3 cmovg %ebx,%eax).
Hardware support¶
We believe that the above design can be efficiently implemented in hardware. A single new instruction added to an ISA would allow to perform the forward-edge CFI check with fewer bytes per check (smaller code size overhead) and potentially more efficiently. The current software-only instrumentation requires at least 32-bytes per check (on x86_64). A hardware instruction may probably be less than ~ 12 bytes. Such instruction would check that the argument pointer is in-bounds, and is properly aligned, and if the checks fail it will either trap (in monolithic scheme) or call the slow path function (cross-DSO scheme). The bit vector lookup is probably too complex for a hardware implementation.
// This instruction checks that 'Ptr'
// * is aligned by (1 << kAlignment) and
// * is inside [kRangeBeg, kRangeBeg+(kRangeSize<<kAlignment))
// and if the check fails it jumps to the given target (slow path).
//
// 'Ptr' is a register, pointing to the virtual function table
// or to the function which we need to check. We may require an explicit
// fixed register to be used.
// 'kAlignment' is a 4-bit constant.
// 'kRangeSize' is a ~20-bit constant.
// 'kRangeBeg' is a PC-relative constant (~28 bits)
// pointing to the beginning of the allowed range for 'Ptr'.
// 'kFailedCheckTarget': is a PC-relative constant (~28 bits)
// representing the target to branch to when the check fails.
// If kFailedCheckTarget==0, the process will trap
// (monolithic binary scheme).
// Otherwise it will jump to a handler that implements `CFI_SlowPath`
// (cross-DSO scheme).
CFI_Check(Ptr, kAlignment, kRangeSize, kRangeBeg, kFailedCheckTarget) {
if (Ptr < kRangeBeg ||
Ptr >= kRangeBeg + (kRangeSize << kAlignment) ||
Ptr & ((1 << kAlignment) - 1))
Jump(kFailedCheckTarget);
}
An alternative and more compact encoding would not use kFailedCheckTarget, and will trap on check failure instead. This will allow us to fit the instruction into 8-9 bytes. The cross-DSO checks will be performed by a trap handler and performance-critical ones will have to be black-listed and checked using the software-only scheme.
Note that such hardware extension would be complementary to checks at the callee side, such as e.g. Intel ENDBRANCH. Moreover, CFI would have two benefits over ENDBRANCH: a) precision and b) ability to protect against invalid casts between polymorphic types.
Introduction¶
Clang includes an implementation of a number of control flow integrity (CFI) schemes, which are designed to abort the program upon detecting certain forms of undefined behavior that can potentially allow attackers to subvert the program’s control flow. These schemes have been optimized for performance, allowing developers to enable them in release builds.
To enable Clang’s available CFI schemes, use the flag -fsanitize=cfi
.
You can also enable a subset of available schemes.
As currently implemented, all schemes rely on link-time optimization (LTO);
so it is required to specify -flto
, and the linker used must support LTO,
for example via the gold plugin.
To allow the checks to be implemented efficiently, the program must be structured such that certain object files are compiled with CFI enabled, and are statically linked into the program. This may preclude the use of shared libraries in some cases.
The compiler will only produce CFI checks for a class if it can infer hidden LTO visibility for that class. LTO visibility is a property of a class that is inferred from flags and attributes. For more details, see the documentation for LTO visibility.
The -fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}
flags
require that a -fvisibility=
flag also be specified. This is because the
default visibility setting is -fvisibility=default
, which would disable
CFI checks for classes without visibility attributes. Most users will want
to specify -fvisibility=hidden
, which enables CFI checks for such classes.
Experimental support for cross-DSO control flow integrity exists that does not require classes to have hidden LTO visibility. This cross-DSO support has unstable ABI at this time.
Available schemes¶
Available schemes are:
-fsanitize=cfi-cast-strict
: Enables strict cast checks.-fsanitize=cfi-derived-cast
: Base-to-derived cast to the wrong dynamic type.-fsanitize=cfi-unrelated-cast
: Cast fromvoid*
or another unrelated type to the wrong dynamic type.-fsanitize=cfi-nvcall
: Non-virtual call via an object whose vptr is of the wrong dynamic type.-fsanitize=cfi-vcall
: Virtual call via an object whose vptr is of the wrong dynamic type.-fsanitize=cfi-icall
: Indirect call of a function with wrong dynamic type.-fsanitize=cfi-mfcall
: Indirect call via a member function pointer with wrong dynamic type.
You can use -fsanitize=cfi
to enable all the schemes and use
-fno-sanitize
flag to narrow down the set of schemes as desired.
For example, you can build your program with
-fsanitize=cfi -fno-sanitize=cfi-nvcall,cfi-icall
to use all schemes except for non-virtual member function call and indirect call
checking.
Remember that you have to provide -flto
if at least one CFI scheme is
enabled.
Trapping and Diagnostics¶
By default, CFI will abort the program immediately upon detecting a control flow integrity violation. You can use the -fno-sanitize-trap= flag to cause CFI to print a diagnostic similar to the one below before the program aborts.
bad-cast.cpp:109:7: runtime error: control flow integrity check for type 'B' failed during base-to-derived cast (vtable address 0x000000425a50)
0x000000425a50: note: vtable is of type 'A'
00 00 00 00 f0 f1 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 5a 42 00
^
If diagnostics are enabled, you can also configure CFI to continue program execution instead of aborting by using the -fsanitize-recover= flag.
Forward-Edge CFI for Virtual Calls¶
This scheme checks that virtual calls take place using a vptr of the correct
dynamic type; that is, the dynamic type of the called object must be a
derived class of the static type of the object used to make the call.
This CFI scheme can be enabled on its own using -fsanitize=cfi-vcall
.
For this scheme to work, all translation units containing the definition
of a virtual member function (whether inline or not), other than members
of blacklisted types or types with public LTO
visibility, must be compiled with -flto
or -flto=thin
enabled and be statically linked into the program.
Performance¶
A performance overhead of less than 1% has been measured by running the Dromaeo benchmark suite against an instrumented version of the Chromium web browser. Another good performance benchmark for this mechanism is the virtual-call-heavy SPEC 2006 xalancbmk.
Note that this scheme has not yet been optimized for binary size; an increase of up to 15% has been observed for Chromium.
Bad Cast Checking¶
This scheme checks that pointer casts are made to an object of the correct dynamic type; that is, the dynamic type of the object must be a derived class of the pointee type of the cast. The checks are currently only introduced where the class being casted to is a polymorphic class.
Bad casts are not in themselves control flow integrity violations, but they can also create security vulnerabilities, and the implementation uses many of the same mechanisms.
There are two types of bad cast that may be forbidden: bad casts
from a base class to a derived class (which can be checked with
-fsanitize=cfi-derived-cast
), and bad casts from a pointer of
type void*
or another unrelated type (which can be checked with
-fsanitize=cfi-unrelated-cast
).
The difference between these two types of casts is that the first is defined
by the C++ standard to produce an undefined value, while the second is not
in itself undefined behavior (it is well defined to cast the pointer back
to its original type) unless the object is uninitialized and the cast is a
static_cast
(see C++14 [basic.life]p5).
If a program as a matter of policy forbids the second type of cast, that
restriction can normally be enforced. However it may in some cases be necessary
for a function to perform a forbidden cast to conform with an external API
(e.g. the allocate
member function of a standard library allocator). Such
functions may be blacklisted.
For this scheme to work, all translation units containing the definition
of a virtual member function (whether inline or not), other than members
of blacklisted types or types with public LTO
visibility, must be compiled with -flto
or -flto=thin
enabled and be statically linked into the program.
Non-Virtual Member Function Call Checking¶
This scheme checks that non-virtual calls take place using an object of
the correct dynamic type; that is, the dynamic type of the called object
must be a derived class of the static type of the object used to make the
call. The checks are currently only introduced where the object is of a
polymorphic class type. This CFI scheme can be enabled on its own using
-fsanitize=cfi-nvcall
.
For this scheme to work, all translation units containing the definition
of a virtual member function (whether inline or not), other than members
of blacklisted types or types with public LTO
visibility, must be compiled with -flto
or -flto=thin
enabled and be statically linked into the program.
Strictness¶
If a class has a single non-virtual base and does not introduce or override virtual member functions or fields other than an implicitly defined virtual destructor, it will have the same layout and virtual function semantics as its base. By default, casts to such classes are checked as if they were made to the least derived such class.
Casting an instance of a base class to such a derived class is technically
undefined behavior, but it is a relatively common hack for introducing
member functions on class instances with specific properties that works under
most compilers and should not have security implications, so we allow it by
default. It can be disabled with -fsanitize=cfi-cast-strict
.
Indirect Function Call Checking¶
This scheme checks that function calls take place using a function of the
correct dynamic type; that is, the dynamic type of the function must match
the static type used at the call. This CFI scheme can be enabled on its own
using -fsanitize=cfi-icall
.
For this scheme to work, each indirect function call in the program, other
than calls in blacklisted functions, must call a
function which was either compiled with -fsanitize=cfi-icall
enabled,
or whose address was taken by a function in a translation unit compiled with
-fsanitize=cfi-icall
.
If a function in a translation unit compiled with -fsanitize=cfi-icall
takes the address of a function not compiled with -fsanitize=cfi-icall
,
that address may differ from the address taken by a function in a translation
unit not compiled with -fsanitize=cfi-icall
. This is technically a
violation of the C and C++ standards, but it should not affect most programs.
Each translation unit compiled with -fsanitize=cfi-icall
must be
statically linked into the program or shared library, and calls across
shared library boundaries are handled as if the callee was not compiled with
-fsanitize=cfi-icall
.
This scheme is currently only supported on the x86 and x86_64 architectures.
-fsanitize-cfi-icall-generalize-pointers
¶
Mismatched pointer types are a common cause of cfi-icall check failures.
Translation units compiled with the -fsanitize-cfi-icall-generalize-pointers
flag relax pointer type checking for call sites in that translation unit,
applied across all functions compiled with -fsanitize=cfi-icall
.
Specifically, pointers in return and argument types are treated as equivalent as
long as the qualifiers for the type they point to match. For example, char*
,
char**
, and int*
are considered equivalent types. However, char*
and
const char*
are considered separate types.
-fsanitize-cfi-icall-generalize-pointers
is not compatible with
-fsanitize-cfi-cross-dso
.
-fsanitize=cfi-icall
and -fsanitize=function
¶
This tool is similar to -fsanitize=function
in that both tools check
the types of function calls. However, the two tools occupy different points
on the design space; -fsanitize=function
is a developer tool designed
to find bugs in local development builds, whereas -fsanitize=cfi-icall
is a security hardening mechanism designed to be deployed in release builds.
-fsanitize=function
has a higher space and time overhead due to a more
complex type check at indirect call sites, as well as a need for run-time
type information (RTTI), which may make it unsuitable for deployment. Because
of the need for RTTI, -fsanitize=function
can only be used with C++
programs, whereas -fsanitize=cfi-icall
can protect both C and C++ programs.
On the other hand, -fsanitize=function
conforms more closely with the C++
standard and user expectations around interaction with shared libraries;
the identity of function pointers is maintained, and calls across shared
library boundaries are no different from calls within a single program or
shared library.
Member Function Pointer Call Checking¶
This scheme checks that indirect calls via a member function pointer
take place using an object of the correct dynamic type. Specifically, we
check that the dynamic type of the member function referenced by the member
function pointer matches the “function pointer” part of the member function
pointer, and that the member function’s class type is related to the base
type of the member function. This CFI scheme can be enabled on its own using
-fsanitize=cfi-mfcall
.
The compiler will only emit a full CFI check if the member function pointer’s
base type is complete. This is because the complete definition of the base
type contains information that is necessary to correctly compile the CFI
check. To ensure that the compiler always emits a full CFI check, it is
recommended to also pass the flag -fcomplete-member-pointers
, which
enables a non-conforming language extension that requires member pointer
base types to be complete if they may be used for a call.
For this scheme to work, all translation units containing the definition
of a virtual member function (whether inline or not), other than members
of blacklisted types or types with public LTO
visibility, must be compiled with -flto
or -flto=thin
enabled and be statically linked into the program.
This scheme is currently not compatible with cross-DSO CFI or the Microsoft ABI.
Blacklist¶
A Sanitizer special case list can be used to relax CFI checks for certain
source files, functions and types using the src
, fun
and type
entity types. Specific CFI modes can be be specified using [section]
headers.
# Suppress all CFI checking for code in a file.
src:bad_file.cpp
src:bad_header.h
# Ignore all functions with names containing MyFooBar.
fun:*MyFooBar*
# Ignore all types in the standard library.
type:std::*
# Disable only unrelated cast checks for this function
[cfi-unrelated-cast]
fun:*UnrelatedCast*
# Disable CFI call checks for this function without affecting cast checks
[cfi-vcall|cfi-nvcall|cfi-icall]
fun:*BadCall*
Design¶
Please refer to the design document.
Publications¶
Control-Flow Integrity: Principles, Implementations, and Applications. Martin Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti.
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike.
LTO Visibility¶
LTO visibility is a property of an entity that specifies whether it can be referenced from outside the current LTO unit. A linkage unit is a set of translation units linked together into an executable or DSO, and a linkage unit’s LTO unit is the subset of the linkage unit that is linked together using link-time optimization; in the case where LTO is not being used, the linkage unit’s LTO unit is empty. Each linkage unit has only a single LTO unit.
The LTO visibility of a class is used by the compiler to determine which
classes the whole-program devirtualization (-fwhole-program-vtables
) and
control flow integrity (-fsanitize=cfi-vcall
and -fsanitize=cfi-mfcall
)
features apply to. These features use whole-program information, so they
require the entire class hierarchy to be visible in order to work correctly.
If any translation unit in the program uses either of the whole-program devirtualization or control flow integrity features, it is effectively an ODR violation to define a class with hidden LTO visibility in multiple linkage units. A class with public LTO visibility may be defined in multiple linkage units, but the tradeoff is that the whole-program devirtualization and control flow integrity features can only be applied to classes with hidden LTO visibility. A class’s LTO visibility is treated as an ODR-relevant property of its definition, so it must be consistent between translation units.
In translation units built with LTO, LTO visibility is based on the
class’s symbol visibility as expressed at the source level (i.e. the
__attribute__((visibility("...")))
attribute, or the -fvisibility=
flag) or, on the Windows platform, the dllimport and dllexport attributes. When
targeting non-Windows platforms, classes with a visibility other than hidden
visibility receive public LTO visibility. When targeting Windows, classes
with dllimport or dllexport attributes receive public LTO visibility. All
other classes receive hidden LTO visibility. Classes with internal linkage
(e.g. classes declared in unnamed namespaces) also receive hidden LTO
visibility.
A class defined in a translation unit built without LTO receives public LTO visibility regardless of its object file visibility, linkage or other attributes.
This mechanism will produce the correct result in most cases, but there are two cases where it may wrongly infer hidden LTO visibility.
- As a corollary of the above rules, if a linkage unit is produced from a combination of LTO object files and non-LTO object files, any hidden visibility class defined in both a translation unit built with LTO and a translation unit built without LTO must be defined with public LTO visibility in order to avoid an ODR violation.
- Some ABIs provide the ability to define an abstract base class without visibility attributes in multiple linkage units and have virtual calls to derived classes in other linkage units work correctly. One example of this is COM on Windows platforms. If the ABI allows this, any base class used in this way must be defined with public LTO visibility.
Classes that fall into either of these categories can be marked up with the
[[clang::lto_visibility_public]]
attribute. To specifically handle the
COM case, classes with the __declspec(uuid())
attribute receive public
LTO visibility. On Windows platforms, clang-cl’s /MT
and /MTd
flags statically link the program against a prebuilt standard library;
these flags imply public LTO visibility for every class declared in the
std
and stdext
namespaces.
Example¶
The following example shows how LTO visibility works in practice in several
cases involving two linkage units, main
and dso.so
.
+-----------------------------------------------------------+ +----------------------------------------------------+
| main (clang++ -fvisibility=hidden): | | dso.so (clang++ -fvisibility=hidden): |
| | | |
| +-----------------------------------------------------+ | | struct __attribute__((visibility("default"))) C { |
| | LTO unit (clang++ -fvisibility=hidden -flto): | | | virtual void f(); |
| | | | | } |
| | struct A { ... }; | | | void C::f() {} |
| | struct [[clang::lto_visibility_public]] B { ... }; | | | struct D { |
| | struct __attribute__((visibility("default"))) C { | | | virtual void g() = 0; |
| | virtual void f(); | | | }; |
| | }; | | | struct E : D { |
| | struct [[clang::lto_visibility_public]] D { | | | virtual void g() { ... } |
| | virtual void g() = 0; | | | }; |
| | }; | | | __attribute__(visibility("default"))) D *mkE() { |
| | | | | return new E; |
| +-----------------------------------------------------+ | | } |
| | | |
| struct B { ... }; | +----------------------------------------------------+
| |
+-----------------------------------------------------------+
We will now describe the LTO visibility of each of the classes defined in these linkage units.
Class A
is not defined outside of main
’s LTO unit, so it can have
hidden LTO visibility. This is inferred from the object file visibility
specified on the command line.
Class B
is defined in main
, both inside and outside its LTO unit. The
definition outside the LTO unit has public LTO visibility, so the definition
inside the LTO unit must also have public LTO visibility in order to avoid
an ODR violation.
Class C
is defined in both main
and dso.so
and therefore must
have public LTO visibility. This is correctly inferred from the visibility
attribute.
Class D
is an abstract base class with a derived class E
defined
in dso.so
. This is an example of the COM scenario; the definition of
D
in main
’s LTO unit must have public LTO visibility in order to be
compatible with the definition of D
in dso.so
, which is observable
by calling the function mkE
.
SafeStack¶
Introduction¶
SafeStack is an instrumentation pass that protects programs against attacks based on stack buffer overflows, without introducing any measurable performance overhead. It works by separating the program stack into two distinct regions: the safe stack and the unsafe stack. The safe stack stores return addresses, register spills, and local variables that are always accessed in a safe way, while the unsafe stack stores everything else. This separation ensures that buffer overflows on the unsafe stack cannot be used to overwrite anything on the safe stack.
SafeStack is a part of the Code-Pointer Integrity (CPI) Project.
Performance¶
The performance overhead of the SafeStack instrumentation is less than 0.1% on average across a variety of benchmarks (see the Code-Pointer Integrity paper for details). This is mainly because most small functions do not have any variables that require the unsafe stack and, hence, do not need unsafe stack frames to be created. The cost of creating unsafe stack frames for large functions is amortized by the cost of executing the function.
In some cases, SafeStack actually improves the performance. Objects that end up being moved to the unsafe stack are usually large arrays or variables that are used through multiple stack frames. Moving such objects away from the safe stack increases the locality of frequently accessed values on the stack, such as register spills, return addresses, and small local variables.
Compatibility¶
Most programs, static libraries, or individual files can be compiled with SafeStack as is. SafeStack requires basic runtime support, which, on most platforms, is implemented as a compiler-rt library that is automatically linked in when the program is compiled with SafeStack.
Linking a DSO with SafeStack is not currently supported.
Known compatibility limitations¶
Certain code that relies on low-level stack manipulations requires adaption to work with SafeStack. One example is mark-and-sweep garbage collection implementations for C/C++ (e.g., Oilpan in chromium/blink), which must be changed to look for the live pointers on both safe and unsafe stacks.
SafeStack supports linking statically modules that are compiled with and without SafeStack. An executable compiled with SafeStack can load dynamic libraries that are not compiled with SafeStack. At the moment, compiling dynamic libraries with SafeStack is not supported.
Signal handlers that use sigaltstack()
must not use the unsafe stack (see
__attribute__((no_sanitize("safe-stack")))
below).
Programs that use APIs from ucontext.h
are not supported yet.
Security¶
SafeStack protects return addresses, spilled registers and local variables that are always accessed in a safe way by separating them in a dedicated safe stack region. The safe stack is automatically protected against stack-based buffer overflows, since it is disjoint from the unsafe stack in memory, and it itself is always accessed in a safe way. In the current implementation, the safe stack is protected against arbitrary memory write vulnerabilities though randomization and information hiding: the safe stack is allocated at a random address and the instrumentation ensures that no pointers to the safe stack are ever stored outside of the safe stack itself (see limitations below).
Known security limitations¶
A complete protection against control-flow hijack attacks requires combining SafeStack with another mechanism that enforces the integrity of code pointers that are stored on the heap or the unsafe stack, such as CPI, or a forward-edge control flow integrity mechanism that enforces correct calling conventions at indirect call sites, such as IFCC with arity checks. Clang has control-flow integrity protection scheme for C++ virtual calls, but not non-virtual indirect calls. With SafeStack alone, an attacker can overwrite a function pointer on the heap or the unsafe stack and cause a program to call arbitrary location, which in turn might enable stack pivoting and return-oriented programming.
In its current implementation, SafeStack provides precise protection against
stack-based buffer overflows, but protection against arbitrary memory write
vulnerabilities is probabilistic and relies on randomization and information
hiding. The randomization is currently based on system-enforced ASLR and shares
its known security limitations. The safe stack pointer hiding is not perfect
yet either: system library functions such as swapcontext
, exception
handling mechanisms, intrinsics such as __builtin_frame_address
, or
low-level bugs in runtime support could leak the safe stack pointer. In the
future, such leaks could be detected by static or dynamic analysis tools and
prevented by adjusting such functions to either encrypt the stack pointer when
storing it in the heap (as already done e.g., by setjmp
/longjmp
implementation in glibc), or store it in a safe region instead.
The CPI paper describes two alternative, stronger safe stack protection mechanisms, that rely on software fault isolation, or hardware segmentation (as available on x86-32 and some x86-64 CPUs).
At the moment, SafeStack assumes that the compiler’s implementation is correct. This has not been verified except through manual code inspection, and could always regress in the future. It’s therefore desirable to have a separate static or dynamic binary verification tool that would check the correctness of the SafeStack instrumentation in final binaries.
Usage¶
To enable SafeStack, just pass -fsanitize=safe-stack
flag to both compile
and link command lines.
Supported Platforms¶
SafeStack was tested on Linux, NetBSD, FreeBSD and MacOSX.
Low-level API¶
__has_feature(safe_stack)
¶
In some rare cases one may need to execute different code depending on
whether SafeStack is enabled. The macro __has_feature(safe_stack)
can
be used for this purpose.
#if __has_feature(safe_stack)
// code that builds only under SafeStack
#endif
__attribute__((no_sanitize("safe-stack")))
¶
Use __attribute__((no_sanitize("safe-stack")))
on a function declaration
to specify that the safe stack instrumentation should not be applied to that
function, even if enabled globally (see -fsanitize=safe-stack
flag). This
attribute may be required for functions that make assumptions about the
exact layout of their stack frames.
All local variables in functions with this attribute will be stored on the safe stack. The safe stack remains unprotected against memory errors when accessing these variables, so extra care must be taken to manually ensure that all such accesses are safe. Furthermore, the addresses of such local variables should never be stored on the heap, as it would leak the location of the SafeStack.
__builtin___get_unsafe_stack_ptr()
¶
This builtin function returns current unsafe stack pointer of the current thread.
__builtin___get_unsafe_stack_bottom()
¶
This builtin function returns a pointer to the bottom of the unsafe stack of the current thread.
__builtin___get_unsafe_stack_top()
¶
This builtin function returns a pointer to the top of the unsafe stack of the current thread.
__builtin___get_unsafe_stack_start()
¶
Deprecated: This builtin function is an alias for
__builtin___get_unsafe_stack_bottom()
.
Design¶
Please refer to the Code-Pointer Integrity project page for more information about the design of the SafeStack and its related technologies.
setjmp and exception handling¶
The OSDI‘14 paper mentions that
on Linux the instrumentation pass finds calls to setjmp or functions that
may throw an exception, and inserts required instrumentation at their call
sites. Specifically, the instrumentation pass saves the shadow stack pointer
on the safe stack before the call site, and restores it either after the
call to setjmp or after an exception has been caught. This is implemented
in the function SafeStack::createStackRestorePoints
.
Publications¶
Code-Pointer Integrity. Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song. USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, October 2014
ShadowCallStack¶
Introduction¶
ShadowCallStack is an experimental instrumentation pass, currently only implemented for x86_64 and aarch64, that protects programs against return address overwrites (e.g. stack buffer overflows.) It works by saving a function’s return address to a separately allocated ‘shadow call stack’ in the function prolog and checking the return address on the stack against the shadow call stack in the function epilog.
Comparison¶
To optimize for memory consumption and cache locality, the shadow call stack stores an index followed by an array of return addresses. This is in contrast to other schemes, like SafeStack, that mirror the entire stack and trade-off consuming more memory for shorter function prologs and epilogs with fewer memory accesses. Similarly, Return Flow Guard consumes more memory with shorter function prologs and epilogs than ShadowCallStack but suffers from the same race conditions (see Security). Intel Control-flow Enforcement Technology (CET) is a proposed hardware extension that would add native support to use a shadow stack to store/check return addresses at call/return time. It would not suffer from race conditions at calls and returns and not incur the overhead of function instrumentation, but it does require operating system support.
Compatibility¶
ShadowCallStack currently only supports x86_64 and aarch64. A runtime is not currently provided in compiler-rt so one must be provided by the compiled application.
On aarch64, the instrumentation makes use of the platform register x18
.
On some platforms, x18
is reserved, and on others, it is designated as
a scratch register. This generally means that any code that may run on the
same thread as code compiled with ShadowCallStack must either target one
of the platforms whose ABI reserves x18
(currently Darwin, Fuchsia and
Windows) or be compiled with the flag -ffixed-x18
.
Security¶
ShadowCallStack is intended to be a stronger alternative to
-fstack-protector
. It protects from non-linear overflows and arbitrary
memory writes to the return address slot; however, similarly to
-fstack-protector
this protection suffers from race conditions because of
the call-return semantics on x86_64. There is a short race between the call
instruction and the first instruction in the function that reads the return
address where an attacker could overwrite the return address and bypass
ShadowCallStack. Similarly, there is a time-of-check-to-time-of-use race in the
function epilog where an attacker could overwrite the return address after it
has been checked and before it has been returned to. Modifying the call-return
semantics to fix this on x86_64 would incur an unacceptable performance overhead
due to return branch prediction.
The instrumentation makes use of the gs
segment register on x86_64,
or the x18
register on aarch64, to reference the shadow call stack
meaning that references to the shadow call stack do not have to be stored in
memory. This makes it possible to implement a runtime that avoids exposing
the address of the shadow call stack to attackers that can read arbitrary
memory. However, attackers could still try to exploit side channels exposed
by the operating system [1] [2] or processor [3] to discover the
address of the shadow call stack.
On x86_64, leaf functions are optimized to store the return address in a free register and avoid writing to the shadow call stack if a register is available. Very short leaf functions are uninstrumented if their execution is judged to be shorter than the race condition window intrinsic to the instrumentation.
On aarch64, the architecture’s call and return instructions (bl
and
ret
) operate on a register rather than the stack, which means that
leaf functions are generally protected from return address overwrites even
without ShadowCallStack. It also means that ShadowCallStack on aarch64 is not
vulnerable to the same types of time-of-check-to-time-of-use races as x86_64.
Usage¶
To enable ShadowCallStack, just pass the -fsanitize=shadow-call-stack
flag to both compile and link command lines. On aarch64, you also need to pass
-ffixed-x18
unless your target already reserves x18
.
Low-level API¶
__has_feature(shadow_call_stack)
¶
In some cases one may need to execute different code depending on whether
ShadowCallStack is enabled. The macro __has_feature(shadow_call_stack)
can
be used for this purpose.
#if defined(__has_feature)
# if __has_feature(shadow_call_stack)
// code that builds only under ShadowCallStack
# endif
#endif
__attribute__((no_sanitize("shadow-call-stack")))
¶
Use __attribute__((no_sanitize("shadow-call-stack")))
on a function
declaration to specify that the shadow call stack instrumentation should not be
applied to that function, even if enabled globally.
Example¶
The following example code:
int foo() {
return bar() + 1;
}
Generates the following x86_64 assembly when compiled with -O2
:
push %rax
callq bar
add $0x1,%eax
pop %rcx
retq
or the following aarch64 assembly:
stp x29, x30, [sp, #-16]!
mov x29, sp
bl bar
add w0, w0, #1
ldp x29, x30, [sp], #16
ret
Adding -fsanitize=shadow-call-stack
would output the following x86_64
assembly:
mov (%rsp),%r10
xor %r11,%r11
addq $0x8,%gs:(%r11)
mov %gs:(%r11),%r11
mov %r10,%gs:(%r11)
push %rax
callq bar
add $0x1,%eax
pop %rcx
xor %r11,%r11
mov %gs:(%r11),%r10
mov %gs:(%r10),%r10
subq $0x8,%gs:(%r11)
cmp %r10,(%rsp)
jne trap
retq
trap:
ud2
or the following aarch64 assembly:
str x30, [x18], #8
stp x29, x30, [sp, #-16]!
mov x29, sp
bl bar
add w0, w0, #1
ldp x29, x30, [sp], #16
ldr x30, [x18, #-8]!
ret
Source-based Code Coverage¶
- Introduction
- The code coverage workflow
- Compiling with coverage enabled
- Running the instrumented program
- Creating coverage reports
- Exporting coverage data
- Interpreting reports
- Format compatibility guarantees
- Using the profiling runtime without static initializers
- Collecting coverage reports for the llvm project
- Drawbacks and limitations
Introduction¶
This document explains how to use clang’s source-based code coverage feature. It’s called “source-based” because it operates on AST and preprocessor information directly. This allows it to generate very precise coverage data.
Clang ships two other code coverage implementations:
- SanitizerCoverage - A low-overhead tool meant for use alongside the various sanitizers. It can provide up to edge-level coverage.
- gcov - A GCC-compatible coverage implementation which operates on DebugInfo.
This is enabled by
-ftest-coverage
or--coverage
.
From this point onwards “code coverage” will refer to the source-based kind.
The code coverage workflow¶
The code coverage workflow consists of three main steps:
- Compiling with coverage enabled.
- Running the instrumented program.
- Creating coverage reports.
The next few sections work through a complete, copy-‘n-paste friendly example based on this program:
% cat <<EOF > foo.cc
#define BAR(x) ((x) || (x))
template <typename T> void foo(T x) {
for (unsigned I = 0; I < 10; ++I) { BAR(I); }
}
int main() {
foo<int>(0);
foo<float>(0);
return 0;
}
EOF
Compiling with coverage enabled¶
To compile code with coverage enabled, pass -fprofile-instr-generate
-fcoverage-mapping
to the compiler:
# Step 1: Compile with coverage enabled.
% clang++ -fprofile-instr-generate -fcoverage-mapping foo.cc -o foo
Note that linking together code with and without coverage instrumentation is supported. Uninstrumented code simply won’t be accounted for in reports.
Running the instrumented program¶
The next step is to run the instrumented program. When the program exits it
will write a raw profile to the path specified by the LLVM_PROFILE_FILE
environment variable. If that variable does not exist, the profile is written
to default.profraw
in the current directory of the program. If
LLVM_PROFILE_FILE
contains a path to a non-existent directory, the missing
directory structure will be created. Additionally, the following special
pattern strings are rewritten:
- “%p” expands out to the process ID.
- “%h” expands out to the hostname of the machine running the program.
- “%Nm” expands out to the instrumented binary’s signature. When this pattern
is specified, the runtime creates a pool of N raw profiles which are used for
on-line profile merging. The runtime takes care of selecting a raw profile
from the pool, locking it, and updating it before the program exits. If N is
not specified (i.e the pattern is “%m”), it’s assumed that
N = 1
. N must be between 1 and 9. The merge pool specifier can only occur once per filename pattern.
# Step 2: Run the program.
% LLVM_PROFILE_FILE="foo.profraw" ./foo
Creating coverage reports¶
Raw profiles have to be indexed before they can be used to generate
coverage reports. This is done using the “merge” tool in llvm-profdata
(which can combine multiple raw profiles and index them at the same time):
# Step 3(a): Index the raw profile.
% llvm-profdata merge -sparse foo.profraw -o foo.profdata
There are multiple different ways to render coverage reports. The simplest option is to generate a line-oriented report:
# Step 3(b): Create a line-oriented coverage report.
% llvm-cov show ./foo -instr-profile=foo.profdata
This report includes a summary view as well as dedicated sub-views for
templated functions and their instantiations. For our example program, we get
distinct views for foo<int>(...)
and foo<float>(...)
. If
-show-line-counts-or-regions
is enabled, llvm-cov
displays sub-line
region counts (even in macro expansions):
1| 20|#define BAR(x) ((x) || (x))
^20 ^2
2| 2|template <typename T> void foo(T x) {
3| 22| for (unsigned I = 0; I < 10; ++I) { BAR(I); }
^22 ^20 ^20^20
4| 2|}
------------------
| void foo<int>(int):
| 2| 1|template <typename T> void foo(T x) {
| 3| 11| for (unsigned I = 0; I < 10; ++I) { BAR(I); }
| ^11 ^10 ^10^10
| 4| 1|}
------------------
| void foo<float>(int):
| 2| 1|template <typename T> void foo(T x) {
| 3| 11| for (unsigned I = 0; I < 10; ++I) { BAR(I); }
| ^11 ^10 ^10^10
| 4| 1|}
------------------
To generate a file-level summary of coverage statistics instead of a line-oriented report, try:
# Step 3(c): Create a coverage summary.
% llvm-cov report ./foo -instr-profile=foo.profdata
Filename Regions Missed Regions Cover Functions Missed Functions Executed Lines Missed Lines Cover
--------------------------------------------------------------------------------------------------------------------------------------
/tmp/foo.cc 13 0 100.00% 3 0 100.00% 13 0 100.00%
--------------------------------------------------------------------------------------------------------------------------------------
TOTAL 13 0 100.00% 3 0 100.00% 13 0 100.00%
The llvm-cov
tool supports specifying a custom demangler, writing out
reports in a directory structure, and generating html reports. For the full
list of options, please refer to the command guide.
A few final notes:
The
-sparse
flag is optional but can result in dramatically smaller indexed profiles. This option should not be used if the indexed profile will be reused for PGO.Raw profiles can be discarded after they are indexed. Advanced use of the profile runtime library allows an instrumented program to merge profiling information directly into an existing raw profile on disk. The details are out of scope.
The
llvm-profdata
tool can be used to merge together multiple raw or indexed profiles. To combine profiling data from multiple runs of a program, try e.g:% llvm-profdata merge -sparse foo1.profraw foo2.profdata -o foo3.profdata
Exporting coverage data¶
Coverage data can be exported into JSON using the llvm-cov export
sub-command. There is a comprehensive reference which defines the structure of
the exported data at a high level in the llvm-cov source code.
Interpreting reports¶
There are four statistics tracked in a coverage summary:
- Function coverage is the percentage of functions which have been executed at least once. A function is considered to be executed if any of its instantiations are executed.
- Instantiation coverage is the percentage of function instantiations which have been executed at least once. Template functions and static inline functions from headers are two kinds of functions which may have multiple instantiations.
- Line coverage is the percentage of code lines which have been executed at least once. Only executable lines within function bodies are considered to be code lines.
- Region coverage is the percentage of code regions which have been executed at least once. A code region may span multiple lines (e.g in a large function body with no control flow). However, it’s also possible for a single line to contain multiple code regions (e.g in “return x || y && z”).
Of these four statistics, function coverage is usually the least granular while region coverage is the most granular. The project-wide totals for each statistic are listed in the summary.
Format compatibility guarantees¶
- There are no backwards or forwards compatibility guarantees for the raw profile format. Raw profiles may be dependent on the specific compiler revision used to generate them. It’s inadvisable to store raw profiles for long periods of time.
- Tools must retain backwards compatibility with indexed profile formats. These formats are not forwards-compatible: i.e, a tool which uses format version X will not be able to understand format version (X+k).
- Tools must also retain backwards compatibility with the format of the coverage mappings emitted into instrumented binaries. These formats are not forwards-compatible.
- The JSON coverage export format has a (major, minor, patch) version triple. Only a major version increment indicates a backwards-incompatible change. A minor version increment is for added functionality, and patch version increments are for bugfixes.
Using the profiling runtime without static initializers¶
By default the compiler runtime uses a static initializer to determine the profile output path and to register a writer function. To collect profiles without using static initializers, do this manually:
- Export a
int __llvm_profile_runtime
symbol from each instrumented shared library and executable. When the linker finds a definition of this symbol, it knows to skip loading the object which contains the profiling runtime’s static initializer. - Forward-declare
void __llvm_profile_initialize_file(void)
and call it once from each instrumented executable. This function parsesLLVM_PROFILE_FILE
, sets the output path, and truncates any existing files at that path. To get the same behavior without truncating existing files, pass a filename pattern string tovoid __llvm_profile_set_filename(char *)
. These calls can be placed anywhere so long as they precede all calls to__llvm_profile_write_file
. - Forward-declare
int __llvm_profile_write_file(void)
and call it to write out a profile. This function returns 0 when it succeeds, and a non-zero value otherwise. Calling this function multiple times appends profile data to an existing on-disk raw profile.
In C++ files, declare these as extern "C"
.
Collecting coverage reports for the llvm project¶
To prepare a coverage report for llvm (and any of its sub-projects), add
-DLLVM_BUILD_INSTRUMENTED_COVERAGE=On
to the cmake configuration. Raw
profiles will be written to $BUILD_DIR/profiles/
. To prepare an html
report, run llvm/utils/prepare-code-coverage-artifact.py
.
To specify an alternate directory for raw profiles, use
-DLLVM_PROFILE_DATA_DIR
. To change the size of the profile merge pool, use
-DLLVM_PROFILE_MERGE_POOL_SIZE
.
Drawbacks and limitations¶
Prior to version 2.26, the GNU binutils BFD linker is not able link programs compiled with
-fcoverage-mapping
in its--gc-sections
mode. Possible workarounds include disabling--gc-sections
, upgrading to a newer version of BFD, or using the Gold linker.Code coverage does not handle unpredictable changes in control flow or stack unwinding in the presence of exceptions precisely. Consider the following function:
int f() { may_throw(); return 0; }
If the call to
may_throw()
propagates an exception intof
, the code coverage tool may mark thereturn
statement as executed even though it is not. A call tolongjmp()
can have similar effects.
Modules¶
Introduction¶
Most software is built using a number of software libraries, including libraries supplied by the platform, internal libraries built as part of the software itself to provide structure, and third-party libraries. For each library, one needs to access both its interface (API) and its implementation. In the C family of languages, the interface to a library is accessed by including the appropriate header files(s):
#include <SomeLib.h>
The implementation is handled separately by linking against the appropriate library. For example, by passing -lSomeLib
to the linker.
Modules provide an alternative, simpler way to use software libraries that provides better compile-time scalability and eliminates many of the problems inherent to using the C preprocessor to access the API of a library.
Problems with the current model¶
The #include
mechanism provided by the C preprocessor is a very poor way to access the API of a library, for a number of reasons:
- Compile-time scalability: Each time a header is included, the compiler must preprocess and parse the text in that header and every header it includes, transitively. This process must be repeated for every translation unit in the application, which involves a huge amount of redundant work. In a project with N translation units and M headers included in each translation unit, the compiler is performing M x N work even though most of the M headers are shared among multiple translation units. C++ is particularly bad, because the compilation model for templates forces a huge amount of code into headers.
- Fragility:
#include
directives are treated as textual inclusion by the preprocessor, and are therefore subject to any active macro definitions at the time of inclusion. If any of the active macro definitions happens to collide with a name in the library, it can break the library API or cause compilation failures in the library header itself. For an extreme example,#define std "The C++ Standard"
and then include a standard library header: the result is a horrific cascade of failures in the C++ Standard Library’s implementation. More subtle real-world problems occur when the headers for two different libraries interact due to macro collisions, and users are forced to reorder#include
directives or introduce#undef
directives to break the (unintended) dependency. - Conventional workarounds: C programmers have
adopted a number of conventions to work around the fragility of the
C preprocessor model. Include guards, for example, are required for
the vast majority of headers to ensure that multiple inclusion
doesn’t break the compile. Macro names are written with
LONG_PREFIXED_UPPERCASE_IDENTIFIERS
to avoid collisions, and some library/framework developers even use__underscored
names in headers to avoid collisions with “normal” names that (by convention) shouldn’t even be macros. These conventions are a barrier to entry for developers coming from non-C languages, are boilerplate for more experienced developers, and make our headers far uglier than they should be. - Tool confusion: In a C-based language, it is hard to build tools that work well with software libraries, because the boundaries of the libraries are not clear. Which headers belong to a particular library, and in what order should those headers be included to guarantee that they compile correctly? Are the headers C, C++, Objective-C++, or one of the variants of these languages? What declarations in those headers are actually meant to be part of the API, and what declarations are present only because they had to be written as part of the header file?
Semantic import¶
Modules improve access to the API of software libraries by replacing the textual preprocessor inclusion model with a more robust, more efficient semantic model. From the user’s perspective, the code looks only slightly different, because one uses an import
declaration rather than a #include
preprocessor directive:
import std.io; // pseudo-code; see below for syntax discussion
However, this module import behaves quite differently from the corresponding #include <stdio.h>
: when the compiler sees the module import above, it loads a binary representation of the std.io
module and makes its API available to the application directly. Preprocessor definitions that precede the import declaration have no impact on the API provided by std.io
, because the module itself was compiled as a separate, standalone module. Additionally, any linker flags required to use the std.io
module will automatically be provided when the module is imported [1]
This semantic import model addresses many of the problems of the preprocessor inclusion model:
- Compile-time scalability: The
std.io
module is only compiled once, and importing the module into a translation unit is a constant-time operation (independent of module system). Thus, the API of each software library is only parsed once, reducing the M x N compilation problem to an M + N problem. - Fragility: Each module is parsed as a standalone entity, so it has a consistent preprocessor environment. This completely eliminates the need for
__underscored
names and similarly defensive tricks. Moreover, the current preprocessor definitions when an import declaration is encountered are ignored, so one software library can not affect how another software library is compiled, eliminating include-order dependencies. - Tool confusion: Modules describe the API of software libraries, and tools can reason about and present a module as a representation of that API. Because modules can only be built standalone, tools can rely on the module definition to ensure that they get the complete API for the library. Moreover, modules can specify which languages they work with, so, e.g., one can not accidentally attempt to load a C++ module into a C program.
Problems modules do not solve¶
Many programming languages have a module or package system, and because of the variety of features provided by these languages it is important to define what modules do not do. In particular, all of the following are considered out-of-scope for modules:
- Rewrite the world’s code: It is not realistic to require applications or software libraries to make drastic or non-backward-compatible changes, nor is it feasible to completely eliminate headers. Modules must interoperate with existing software libraries and allow a gradual transition.
- Versioning: Modules have no notion of version information. Programmers must still rely on the existing versioning mechanisms of the underlying language (if any exist) to version software libraries.
- Namespaces: Unlike in some languages, modules do not imply any notion of namespaces. Thus, a struct declared in one module will still conflict with a struct of the same name declared in a different module, just as they would if declared in two different headers. This aspect is important for backward compatibility, because (for example) the mangled names of entities in software libraries must not change when introducing modules.
- Binary distribution of modules: Headers (particularly C++ headers) expose the full complexity of the language. Maintaining a stable binary module format across architectures, compiler versions, and compiler vendors is technically infeasible.
Using Modules¶
To enable modules, pass the command-line flag -fmodules
. This will make any modules-enabled software libraries available as modules as well as introducing any modules-specific syntax. Additional command-line parameters are described in a separate section later.
Objective-C Import declaration¶
Objective-C provides syntax for importing a module via an @import declaration, which imports the named module:
@import std;
The @import
declaration above imports the entire contents of the std
module (which would contain, e.g., the entire C or C++ standard library) and make its API available within the current translation unit. To import only part of a module, one may use dot syntax to specific a particular submodule, e.g.,
@import std.io;
Redundant import declarations are ignored, and one is free to import modules at any point within the translation unit, so long as the import declaration is at global scope.
At present, there is no C or C++ syntax for import declarations. Clang will track the modules proposal in the C++ committee. See the section Includes as imports to see how modules get imported today.
Includes as imports¶
The primary user-level feature of modules is the import operation, which provides access to the API of software libraries. However, today’s programs make extensive use of #include
, and it is unrealistic to assume that all of this code will change overnight. Instead, modules automatically translate #include
directives into the corresponding module import. For example, the include directive
#include <stdio.h>
will be automatically mapped to an import of the module std.io
. Even with specific import
syntax in the language, this particular feature is important for both adoption and backward compatibility: automatic translation of #include
to import
allows an application to get the benefits of modules (for all modules-enabled libraries) without any changes to the application itself. Thus, users can easily use modules with one compiler while falling back to the preprocessor-inclusion mechanism with other compilers.
Note
The automatic mapping of #include
to import
also solves an implementation problem: importing a module with a definition of some entity (say, a struct Point
) and then parsing a header containing another definition of struct Point
would cause a redefinition error, even if it is the same struct Point
. By mapping #include
to import
, the compiler can guarantee that it always sees just the already-parsed definition from the module.
While building a module, #include_next
is also supported, with one caveat.
The usual behavior of #include_next
is to search for the specified filename
in the list of include paths, starting from the path after the one
in which the current file was found.
Because files listed in module maps are not found through include paths, a
different strategy is used for #include_next
directives in such files: the
list of include paths is searched for the specified header name, to find the
first include path that would refer to the current file. #include_next
is
interpreted as if the current file had been found in that path.
If this search finds a file named by a module map, the #include_next
directive is translated into an import, just like for a #include
directive.``
Module maps¶
The crucial link between modules and headers is described by a module map, which describes how a collection of existing headers maps on to the (logical) structure of a module. For example, one could imagine a module std
covering the C standard library. Each of the C standard library headers (<stdio.h>
, <stdlib.h>
, <math.h>
, etc.) would contribute to the std
module, by placing their respective APIs into the corresponding submodule (std.io
, std.lib
, std.math
, etc.). Having a list of the headers that are part of the std
module allows the compiler to build the std
module as a standalone entity, and having the mapping from header names to (sub)modules allows the automatic translation of #include
directives to module imports.
Module maps are specified as separate files (each named module.modulemap
) alongside the headers they describe, which allows them to be added to existing software libraries without having to change the library headers themselves (in most cases [2]). The actual Module map language is described in a later section.
Note
To actually see any benefits from modules, one first has to introduce module maps for the underlying C standard library and the libraries and headers on which it depends. The section Modularizing a Platform describes the steps one must take to write these module maps.
One can use module maps without modules to check the integrity of the use of header files. To do this, use the -fimplicit-module-maps
option instead of the -fmodules
option, or use -fmodule-map-file=
option to explicitly specify the module map files to load.
Compilation model¶
The binary representation of modules is automatically generated by the compiler on an as-needed basis. When a module is imported (e.g., by an #include
of one of the module’s headers), the compiler will spawn a second instance of itself [3], with a fresh preprocessing context [4], to parse just the headers in that module. The resulting Abstract Syntax Tree (AST) is then persisted into the binary representation of the module that is then loaded into translation unit where the module import was encountered.
The binary representation of modules is persisted in the module cache. Imports of a module will first query the module cache and, if a binary representation of the required module is already available, will load that representation directly. Thus, a module’s headers will only be parsed once per language configuration, rather than once per translation unit that uses the module.
Modules maintain references to each of the headers that were part of the module build. If any of those headers changes, or if any of the modules on which a module depends change, then the module will be (automatically) recompiled. The process should never require any user intervention.
Command-line parameters¶
-fmodules
- Enable the modules feature.
-fbuiltin-module-map
- Load the Clang builtins module map file. (Equivalent to
-fmodule-map-file=<resource dir>/include/module.modulemap
) -fimplicit-module-maps
- Enable implicit search for module map files named
module.modulemap
and similar. This option is implied by-fmodules
. If this is disabled with-fno-implicit-module-maps
, module map files will only be loaded if they are explicitly specified via-fmodule-map-file
or transitively used by another module map file. -fmodules-cache-path=<directory>
- Specify the path to the modules cache. If not provided, Clang will select a system-appropriate default.
-fno-autolink
- Disable automatic linking against the libraries associated with imported modules.
-fmodules-ignore-macro=macroname
- Instruct modules to ignore the named macro when selecting an appropriate module variant. Use this for macros defined on the command line that don’t affect how modules are built, to improve sharing of compiled module files.
-fmodules-prune-interval=seconds
- Specify the minimum delay (in seconds) between attempts to prune the module cache. Module cache pruning attempts to clear out old, unused module files so that the module cache itself does not grow without bound. The default delay is large (604,800 seconds, or 7 days) because this is an expensive operation. Set this value to 0 to turn off pruning.
-fmodules-prune-after=seconds
- Specify the minimum time (in seconds) for which a file in the module cache must be unused (according to access time) before module pruning will remove it. The default delay is large (2,678,400 seconds, or 31 days) to avoid excessive module rebuilding.
-module-file-info <module file name>
- Debugging aid that prints information about a given module file (with a
.pcm
extension), including the language and preprocessor options that particular module variant was built with. -fmodules-decluse
- Enable checking of module
use
declarations. -fmodule-name=module-id
- Consider a source file as a part of the given module.
-fmodule-map-file=<file>
- Load the given module map file if a header from its directory or one of its subdirectories is loaded.
-fmodules-search-all
- If a symbol is not found, search modules referenced in the current module maps but not imported for symbols, so the error message can reference the module by name. Note that if the global module index has not been built before, this might take some time as it needs to build all the modules. Note that this option doesn’t apply in module builds, to avoid the recursion.
-fno-implicit-modules
- All modules used by the build must be specified with
-fmodule-file
. -fmodule-file=[<name>=]<file>
- Specify the mapping of module names to precompiled module files. If the
name is omitted, then the module file is loaded whether actually required
or not. If the name is specified, then the mapping is treated as another
prebuilt module search mechanism (in addition to
-fprebuilt-module-path
) and the module is only loaded if required. Note that in this case the specified file also overrides this module’s paths that might be embedded in other precompiled module files. -fprebuilt-module-path=<directory>
- Specify the path to the prebuilt modules. If specified, we will look for modules in this directory for a given top-level module name. We don’t need a module map for loading prebuilt modules in this directory and the compiler will not try to rebuild these modules. This can be specified multiple times.
Module Semantics¶
Modules are modeled as if each submodule were a separate translation unit, and a module import makes names from the other translation unit visible. Each submodule starts with a new preprocessor state and an empty translation unit.
Note
This behavior is currently only approximated when building a module with submodules. Entities within a submodule that has already been built are visible when building later submodules in that module. This can lead to fragile modules that depend on the build order used for the submodules of the module, and should not be relied upon. This behavior is subject to change.
As an example, in C, this implies that if two structs are defined in different submodules with the same name, those two types are distinct types (but may be compatible types if their definitions match). In C++, two structs defined with the same name in different submodules are the same type, and must be equivalent under C++’s One Definition Rule.
Note
Clang currently only performs minimal checking for violations of the One Definition Rule.
If any submodule of a module is imported into any part of a program, the entire top-level module is considered to be part of the program. As a consequence of this, Clang may diagnose conflicts between an entity declared in an unimported submodule and an entity declared in the current translation unit, and Clang may inline or devirtualize based on knowledge from unimported submodules.
Macros¶
The C and C++ preprocessor assumes that the input text is a single linear buffer, but with modules this is not the case. It is possible to import two modules that have conflicting definitions for a macro (or where one #define
s a macro and the other #undef
ines it). The rules for handling macro definitions in the presence of modules are as follows:
- Each definition and undefinition of a macro is considered to be a distinct entity.
- Such entities are visible if they are from the current submodule or translation unit, or if they were exported from a submodule that has been imported.
- A
#define X
or#undef X
directive overrides all definitions ofX
that are visible at the point of the directive. - A
#define
or#undef
directive is active if it is visible and no visible directive overrides it. - A set of macro directives is consistent if it consists of only
#undef
directives, or if all#define
directives in the set define the macro name to the same sequence of tokens (following the usual rules for macro redefinitions). - If a macro name is used and the set of active directives is not consistent, the program is ill-formed. Otherwise, the (unique) meaning of the macro name is used.
For example, suppose:
<stdio.h>
defines a macrogetc
(and exports its#define
)<cstdio>
imports the<stdio.h>
module and undefines the macro (and exports its#undef
)
The #undef
overrides the #define
, and a source file that imports both modules in any order will not see getc
defined as a macro.
Module Map Language¶
Warning
The module map language is not currently guaranteed to be stable between major revisions of Clang.
The module map language describes the mapping from header files to the
logical structure of modules. To enable support for using a library as
a module, one must write a module.modulemap
file for that library. The
module.modulemap
file is placed alongside the header files themselves,
and is written in the module map language described below.
Note
For compatibility with previous releases, if a module map file named
module.modulemap
is not found, Clang will also search for a file named
module.map
. This behavior is deprecated and we plan to eventually
remove it.
As an example, the module map file for the C standard library might look a bit like this:
module std [system] [extern_c] {
module assert {
textual header "assert.h"
header "bits/assert-decls.h"
export *
}
module complex {
header "complex.h"
export *
}
module ctype {
header "ctype.h"
export *
}
module errno {
header "errno.h"
header "sys/errno.h"
export *
}
module fenv {
header "fenv.h"
export *
}
// ...more headers follow...
}
Here, the top-level module std
encompasses the whole C standard library. It has a number of submodules containing different parts of the standard library: complex
for complex numbers, ctype
for character types, etc. Each submodule lists one of more headers that provide the contents for that submodule. Finally, the export *
command specifies that anything included by that submodule will be automatically re-exported.
Lexical structure¶
Module map files use a simplified form of the C99 lexer, with the same rules for identifiers, tokens, string literals, /* */
and //
comments. The module map language has the following reserved words; all other C identifiers are valid identifiers.
config_macros
export_as
private
conflict
framework
requires
exclude
header
textual
explicit
link
umbrella
extern
module
use
export
Module map file¶
A module map file consists of a series of module declarations:
module-map-file: module-declaration*
Within a module map file, modules are referred to by a module-id, which uses periods to separate each part of a module’s name:
module-id: identifier ('.' identifier)*
Module declaration¶
A module declaration describes a module, including the headers that contribute to that module, its submodules, and other aspects of the module.
module-declaration:explicit
optframework
optmodule
module-id attributesopt '{' module-member* '}'extern
module
module-id string-literal
The module-id should consist of only a single identifier, which provides the name of the module being defined. Each module shall have a single definition.
The explicit
qualifier can only be applied to a submodule, i.e., a module that is nested within another module. The contents of explicit submodules are only made available when the submodule itself was explicitly named in an import declaration or was re-exported from an imported module.
The framework
qualifier specifies that this module corresponds to a Darwin-style framework. A Darwin-style framework (used primarily on Mac OS X and iOS) is contained entirely in directory Name.framework
, where Name
is the name of the framework (and, therefore, the name of the module). That directory has the following layout:
Name.framework/
Modules/module.modulemap Module map for the framework
Headers/ Subdirectory containing framework headers
PrivateHeaders/ Subdirectory containing framework private headers
Frameworks/ Subdirectory containing embedded frameworks
Resources/ Subdirectory containing additional resources
Name Symbolic link to the shared library for the framework
The system
attribute specifies that the module is a system module. When a system module is rebuilt, all of the module’s headers will be considered system headers, which suppresses warnings. This is equivalent to placing #pragma GCC system_header
in each of the module’s headers. The form of attributes is described in the section Attributes, below.
The extern_c
attribute specifies that the module contains C code that can be used from within C++. When such a module is built for use in C++ code, all of the module’s headers will be treated as if they were contained within an implicit extern "C"
block. An import for a module with this attribute can appear within an extern "C"
block. No other restrictions are lifted, however: the module currently cannot be imported within an extern "C"
block in a namespace.
The no_undeclared_includes
attribute specifies that the module can only reach non-modular headers and headers from used modules. Since some headers could be present in more than one search path and map to different modules in each path, this mechanism helps clang to find the right header, i.e., prefer the one for the current module or in a submodule instead of the first usual match in the search paths.
Modules can have a number of different kinds of members, each of which is described below:
module-member: requires-declaration header-declaration umbrella-dir-declaration submodule-declaration export-declaration export-as-declaration use-declaration link-declaration config-macros-declaration conflict-declaration
An extern module references a module defined by the module-id in a file given by the string-literal. The file can be referenced either by an absolute path or by a path relative to the current map file.
Requires declaration¶
A requires-declaration specifies the requirements that an importing translation unit must satisfy to use the module.
requires-declaration:requires
feature-list feature-list: feature (',' feature)* feature:!
opt identifier
The requirements clause allows specific modules or submodules to specify that they are only accessible with certain language dialects or on certain platforms. The feature list is a set of identifiers, defined below. If any of the features is not available in a given translation unit, that translation unit shall not import the module. When building a module for use by a compilation, submodules requiring unavailable features are ignored. The optional !
indicates that a feature is incompatible with the module.
The following features are defined:
- altivec
- The target supports AltiVec.
- blocks
- The “blocks” language feature is available.
- coroutines
- Support for the coroutines TS is available.
- cplusplus
- C++ support is available.
- cplusplus11
- C++11 support is available.
- cplusplus14
- C++14 support is available.
- cplusplus17
- C++17 support is available.
- c99
- C99 support is available.
- c11
- C11 support is available.
- c17
- C17 support is available.
- freestanding
- A freestanding environment is available.
- gnuinlineasm
- GNU inline ASM is available.
- objc
- Objective-C support is available.
- objc_arc
- Objective-C Automatic Reference Counting (ARC) is available
- opencl
- OpenCL is available
- tls
- Thread local storage is available.
- target feature
- A specific target feature (e.g.,
sse4
,avx
,neon
) is available.
Example: The std
module can be extended to also include C++ and C++11 headers using a requires-declaration:
module std {
// C standard library...
module vector {
requires cplusplus
header "vector"
}
module type_traits {
requires cplusplus11
header "type_traits"
}
}
Header declaration¶
A header declaration specifies that a particular header is associated with the enclosing module.
header-declaration:private
opttextual
optheader
string-literal header-attrsoptumbrella
header
string-literal header-attrsoptexclude
header
string-literal header-attrsopt header-attrs: '{' header-attr* '}' header-attr:size
integer-literalmtime
integer-literal
A header declaration that does not contain exclude
nor textual
specifies a header that contributes to the enclosing module. Specifically, when the module is built, the named header will be parsed and its declarations will be (logically) placed into the enclosing submodule.
A header with the umbrella
specifier is called an umbrella header. An umbrella header includes all of the headers within its directory (and any subdirectories), and is typically used (in the #include
world) to easily access the full API provided by a particular library. With modules, an umbrella header is a convenient shortcut that eliminates the need to write out header
declarations for every library header. A given directory can only contain a single umbrella header.
Note
Any headers not included by the umbrella header should have
explicit header
declarations. Use the
-Wincomplete-umbrella
warning option to ask Clang to complain
about headers not covered by the umbrella header or the module map.
A header with the private
specifier may not be included from outside the module itself.
A header with the textual
specifier will not be compiled when the module is
built, and will be textually included if it is named by a #include
directive. However, it is considered to be part of the module for the purpose
of checking use-declarations, and must still be a lexically-valid header
file. In the future, we intend to pre-tokenize such headers and include the
token sequence within the prebuilt module representation.
A header with the exclude
specifier is excluded from the module. It will not be included when the module is built, nor will it be considered to be part of the module, even if an umbrella
header or directory would otherwise make it part of the module.
Example: The C header assert.h
is an excellent candidate for a textual header, because it is meant to be included multiple times (possibly with different NDEBUG
settings). However, declarations within it should typically be split into a separate modular header.
module std [system] {
textual header "assert.h"
}
A given header shall not be referenced by more than one header-declaration.
Two header-declarations, or a header-declaration and a #include
, are
considered to refer to the same file if the paths resolve to the same file
and the specified header-attrs (if any) match the attributes of that file,
even if the file is named differently (for instance, by a relative path or
via symlinks).
Note
The use of header-attrs avoids the need for Clang to speculatively
stat
every header referenced by a module map. It is recommended that
header-attrs only be used in machine-generated module maps, to avoid
mismatches between attribute values and the corresponding files.
Umbrella directory declaration¶
An umbrella directory declaration specifies that all of the headers in the specified directory should be included within the module.
umbrella-dir-declaration:
umbrella
string-literal
The string-literal refers to a directory. When the module is built, all of the header files in that directory (and its subdirectories) are included in the module.
An umbrella-dir-declaration shall not refer to the same directory as the location of an umbrella header-declaration. In other words, only a single kind of umbrella can be specified for a given directory.
Note
Umbrella directories are useful for libraries that have a large number of headers but do not have an umbrella header.
Submodule declaration¶
Submodule declarations describe modules that are nested within their enclosing module.
submodule-declaration: module-declaration inferred-submodule-declaration
A submodule-declaration that is a module-declaration is a nested module. If the module-declaration has a framework
specifier, the enclosing module shall have a framework
specifier; the submodule’s contents shall be contained within the subdirectory Frameworks/SubName.framework
, where SubName
is the name of the submodule.
A submodule-declaration that is an inferred-submodule-declaration describes a set of submodules that correspond to any headers that are part of the module but are not explicitly described by a header-declaration.
inferred-submodule-declaration:explicit
optframework
optmodule
'*' attributesopt '{' inferred-submodule-member* '}' inferred-submodule-member:export
'*'
A module containing an inferred-submodule-declaration shall have either an umbrella header or an umbrella directory. The headers to which the inferred-submodule-declaration applies are exactly those headers included by the umbrella header (transitively) or included in the module because they reside within the umbrella directory (or its subdirectories).
For each header included by the umbrella header or in the umbrella directory that is not named by a header-declaration, a module declaration is implicitly generated from the inferred-submodule-declaration. The module will:
- Have the same name as the header (without the file extension)
- Have the
explicit
specifier, if the inferred-submodule-declaration has theexplicit
specifier - Have the
framework
specifier, if the inferred-submodule-declaration has theframework
specifier - Have the attributes specified by the inferred-submodule-declaration
- Contain a single header-declaration naming that header
- Contain a single export-declaration
export *
, if the inferred-submodule-declaration contains the inferred-submodule-memberexport *
Example: If the subdirectory “MyLib” contains the headers A.h
and B.h
, then the following module map:
module MyLib {
umbrella "MyLib"
explicit module * {
export *
}
}
is equivalent to the (more verbose) module map:
module MyLib {
explicit module A {
header "A.h"
export *
}
explicit module B {
header "B.h"
export *
}
}
Export declaration¶
An export-declaration specifies which imported modules will automatically be re-exported as part of a given module’s API.
export-declaration:
export
wildcard-module-id
wildcard-module-id:
identifier
'*'
identifier '.' wildcard-module-id
The export-declaration names a module or a set of modules that will be re-exported to any translation unit that imports the enclosing module. Each imported module that matches the wildcard-module-id up to, but not including, the first *
will be re-exported.
Example: In the following example, importing MyLib.Derived
also provides the API for MyLib.Base
:
module MyLib {
module Base {
header "Base.h"
}
module Derived {
header "Derived.h"
export Base
}
}
Note that, if Derived.h
includes Base.h
, one can simply use a wildcard export to re-export everything Derived.h
includes:
module MyLib {
module Base {
header "Base.h"
}
module Derived {
header "Derived.h"
export *
}
}
Note
The wildcard export syntax export *
re-exports all of the
modules that were imported in the actual header file. Because
#include
directives are automatically mapped to module imports,
export *
provides the same transitive-inclusion behavior
provided by the C preprocessor, e.g., importing a given module
implicitly imports all of the modules on which it depends.
Therefore, liberal use of export *
provides excellent backward
compatibility for programs that rely on transitive inclusion (i.e.,
all of them).
Re-export Declaration¶
An export-as-declaration specifies that the current module will have its interface re-exported by the named module.
export-as-declaration:
export_as
identifier
The export-as-declaration names the module that the current module will be re-exported through. Only top-level modules can be re-exported, and any given module may only be re-exported through a single module.
Example: In the following example, the module MyFrameworkCore
will be re-exported via the module MyFramework
:
module MyFrameworkCore {
export_as MyFramework
}
Use declaration¶
A use-declaration specifies another module that the current top-level module intends to use. When the option -fmodules-decluse is specified, a module can only use other modules that are explicitly specified in this way.
use-declaration:
use
module-id
Example: In the following example, use of A from C is not declared, so will trigger a warning.
module A {
header "a.h"
}
module B {
header "b.h"
}
module C {
header "c.h"
use B
}
When compiling a source file that implements a module, use the option
-fmodule-name=module-id
to indicate that the source file is logically part
of that module.
The compiler at present only applies restrictions to the module directly being built.
Link declaration¶
A link-declaration specifies a library or framework against which a program should be linked if the enclosing module is imported in any translation unit in that program.
link-declaration:link
framework
opt string-literal
The string-literal specifies the name of the library or framework against which the program should be linked. For example, specifying “clangBasic” would instruct the linker to link with -lclangBasic
for a Unix-style linker.
A link-declaration with the framework
specifies that the linker should link against the named framework, e.g., with -framework MyFramework
.
Note
Automatic linking with the link
directive is not yet widely
implemented, because it requires support from both the object file
format and the linker. The notion is similar to Microsoft Visual
Studio’s #pragma comment(lib...)
.
Configuration macros declaration¶
The config-macros-declaration specifies the set of configuration macros that have an effect on the API of the enclosing module.
config-macros-declaration:
config_macros
attributesopt config-macro-listopt
config-macro-list:
identifier (',' identifier)*
Each identifier in the config-macro-list specifies the name of a macro. The compiler is required to maintain different variants of the given module for differing definitions of any of the named macros.
A config-macros-declaration shall only be present on a top-level module, i.e., a module that is not nested within an enclosing module.
The exhaustive
attribute specifies that the list of macros in the config-macros-declaration is exhaustive, meaning that no other macro definition is intended to have an effect on the API of that module.
Note
The exhaustive
attribute implies that any macro definitions
for macros not listed as configuration macros should be ignored
completely when building the module. As an optimization, the
compiler could reduce the number of unique module variants by not
considering these non-configuration macros. This optimization is not
yet implemented in Clang.
A translation unit shall not import the same module under different definitions of the configuration macros.
Note
Clang implements a weak form of this requirement: the definitions
used for configuration macros are fixed based on the definitions
provided by the command line. If an import occurs and the definition
of any configuration macro has changed, the compiler will produce a
warning (under the control of -Wconfig-macros
).
Example: A logging library might provide different API (e.g., in the form of different definitions for a logging macro) based on the NDEBUG
macro setting:
module MyLogger {
umbrella header "MyLogger.h"
config_macros [exhaustive] NDEBUG
}
Conflict declarations¶
A conflict-declaration describes a case where the presence of two different modules in the same translation unit is likely to cause a problem. For example, two modules may provide similar-but-incompatible functionality.
conflict-declaration:
conflict
module-id ',' string-literal
The module-id of the conflict-declaration specifies the module with which the enclosing module conflicts. The specified module shall not have been imported in the translation unit when the enclosing module is imported.
The string-literal provides a message to be provided as part of the compiler diagnostic when two modules conflict.
Note
Clang emits a warning (under the control of -Wmodule-conflict
)
when a module conflict is discovered.
Example:
module Conflicts {
explicit module A {
header "conflict_a.h"
conflict B, "we just don't like B"
}
module B {
header "conflict_b.h"
}
}
Attributes¶
Attributes are used in a number of places in the grammar to describe specific behavior of other declarations. The format of attributes is fairly simple.
attributes:
attribute attributesopt
attribute:
'[' identifier ']'
Any identifier can be used as an attribute, and each declaration specifies what attributes can be applied to it.
Private Module Map Files¶
Module map files are typically named module.modulemap
and live
either alongside the headers they describe or in a parent directory of
the headers they describe. These module maps typically describe all of
the API for the library.
However, in some cases, the presence or absence of particular headers
is used to distinguish between the “public” and “private” APIs of a
particular library. For example, a library may contain the headers
Foo.h
and Foo_Private.h
, providing public and private APIs,
respectively. Additionally, Foo_Private.h
may only be available on
some versions of library, and absent in others. One cannot easily
express this with a single module map file in the library:
module Foo {
header "Foo.h"
...
}
module Foo_Private {
header "Foo_Private.h"
...
}
because the header Foo_Private.h
won’t always be available. The
module map file could be customized based on whether
Foo_Private.h
is available or not, but doing so requires custom
build machinery.
Private module map files, which are named module.private.modulemap
(or, for backward compatibility, module_private.map
), allow one to
augment the primary module map file with an additional modules. For
example, we would split the module map file above into two module map
files:
/* module.modulemap */
module Foo {
header "Foo.h"
}
/* module.private.modulemap */
module Foo_Private {
header "Foo_Private.h"
}
When a module.private.modulemap
file is found alongside a
module.modulemap
file, it is loaded after the module.modulemap
file. In our example library, the module.private.modulemap
file
would be available when Foo_Private.h
is available, making it
easier to split a library’s public and private APIs along header
boundaries.
When writing a private module as part of a framework, it’s recommended that:
- Headers for this module are present in the
PrivateHeaders
framework subdirectory. - The private module is defined as a top level module with the name of the
public framework prefixed, like
Foo_Private
above. Clang has extra logic to work with this naming, usingFooPrivate
orFoo.Private
(submodule) trigger warnings and might not work as expected.
Modularizing a Platform¶
To get any benefit out of modules, one needs to introduce module maps for software libraries starting at the bottom of the stack. This typically means introducing a module map covering the operating system’s headers and the C standard library headers (in /usr/include
, for a Unix system).
The module maps will be written using the module map language, which provides the tools necessary to describe the mapping between headers and modules. Because the set of headers differs from one system to the next, the module map will likely have to be somewhat customized for, e.g., a particular distribution and version of the operating system. Moreover, the system headers themselves may require some modification, if they exhibit any anti-patterns that break modules. Such common patterns are described below.
- Macro-guarded copy-and-pasted definitions
System headers vend core types such as
size_t
for users. These types are often needed in a number of system headers, and are almost trivial to write. Hence, it is fairly common to see a definition such as the following copy-and-pasted throughout the headers:#ifndef _SIZE_T #define _SIZE_T typedef __SIZE_TYPE__ size_t; #endif
Unfortunately, when modules compiles all of the C library headers together into a single module, only the first actual type definition of
size_t
will be visible, and then only in the submodule corresponding to the lucky first header. Any other headers that have copy-and-pasted versions of this pattern will not have a definition ofsize_t
. Importing the submodule corresponding to one of those headers will therefore not yieldsize_t
as part of the API, because it wasn’t there when the header was parsed. The fix for this problem is either to pull the copied declarations into a common header that gets included everywheresize_t
is part of the API, or to eliminate the#ifndef
and redefine thesize_t
type. The latter works for C++ headers and C11, but will cause an error for non-modules C90/C99, where redefinition oftypedefs
is not permitted.- Conflicting definitions
- Different system headers may provide conflicting definitions for various macros, functions, or types. These conflicting definitions don’t tend to cause problems in a pre-modules world unless someone happens to include both headers in one translation unit. Since the fix is often simply “don’t do that”, such problems persist. Modules requires that the conflicting definitions be eliminated or that they be placed in separate modules (the former is generally the better answer).
- Missing includes
- Headers are often missing
#include
directives for headers that they actually depend on. As with the problem of conflicting definitions, this only affects unlucky users who don’t happen to include headers in the right order. With modules, the headers of a particular module will be parsed in isolation, so the module may fail to build if there are missing includes. - Headers that vend multiple APIs at different times
- Some systems have headers that contain a number of different kinds of API definitions, only some of which are made available with a given include. For example, the header may vend
size_t
only when the macro__need_size_t
is defined before that header is included, and also vendwchar_t
only when the macro__need_wchar_t
is defined. Such headers are often included many times in a single translation unit, and will have no include guards. There is no sane way to map this header to a submodule. One can either eliminate the header (e.g., by splitting it into separate headers, one per actual API) or simplyexclude
it in the module map.
To detect and help address some of these problems, the clang-tools-extra
repository contains a modularize
tool that parses a set of given headers and attempts to detect these problems and produce a report. See the tool’s in-source documentation for information on how to check your system or library headers.
Future Directions¶
Modules support is under active development, and there are many opportunities remaining to improve it. Here are a few ideas:
- Detect unused module imports
- Unlike with
#include
directives, it should be fairly simple to track whether a directly-imported module has ever been used. By doing so, Clang can emitunused import
orunused #include
diagnostics, including Fix-Its to remove the useless imports/includes. - Fix-Its for missing imports
- It’s fairly common for one to make use of some API while writing code, only to get a compiler error about “unknown type” or “no function named” because the corresponding header has not been included. Clang can detect such cases and auto-import the required module, but should provide a Fix-It to add the import.
- Improve modularize
- The modularize tool is both extremely important (for deployment) and extremely crude. It needs better UI, better detection of problems (especially for C++), and perhaps an assistant mode to help write module maps for you.
Where To Learn More About Modules¶
The Clang source code provides additional information about modules:
clang/lib/Headers/module.modulemap
- Module map for Clang’s compiler-specific header files.
clang/test/Modules/
- Tests specifically related to modules functionality.
clang/include/clang/Basic/Module.h
- The
Module
class in this header describes a module, and is used throughout the compiler to implement modules. clang/include/clang/Lex/ModuleMap.h
- The
ModuleMap
class in this header describes the full module map, consisting of all of the module map files that have been parsed, and providing facilities for looking up module maps and mapping between modules and headers (in both directions). - PCHInternals
- Information about the serialized AST format used for precompiled headers and modules. The actual implementation is in the
clangSerialization
library.
[1] | Automatic linking against the libraries of modules requires specific linker support, which is not widely available. |
[2] | There are certain anti-patterns that occur in headers, particularly system headers, that cause problems for modules. The section Modularizing a Platform describes some of them. |
[3] | The second instance is actually a new thread within the current process, not a separate process. However, the original compiler instance is blocked on the execution of this thread. |
[4] | The preprocessing context in which the modules are parsed is actually dependent on the command-line options provided to the compiler, including the language dialect and any -D options. However, the compiled modules for different command-line options are kept distinct, and any preprocessor directives that occur within the translation unit are ignored. See the section on the Configuration macros declaration for more information. |
MSVC compatibility¶
When Clang compiles C++ code for Windows, it attempts to be compatible with MSVC. There are multiple dimensions to compatibility.
First, Clang attempts to be ABI-compatible, meaning that Clang-compiled code should be able to link against MSVC-compiled code successfully. However, C++ ABIs are particularly large and complicated, and Clang’s support for MSVC’s C++ ABI is a work in progress. If you don’t require MSVC ABI compatibility or don’t want to use Microsoft’s C and C++ runtimes, the mingw32 toolchain might be a better fit for your project.
Second, Clang implements many MSVC language extensions, such as
__declspec(dllexport)
and a handful of pragmas. These are typically
controlled by -fms-extensions
.
Third, MSVC accepts some C++ code that Clang will typically diagnose as
invalid. When these constructs are present in widely included system headers,
Clang attempts to recover and continue compiling the user’s program. Most
parsing and semantic compatibility tweaks are controlled by
-fms-compatibility
and -fdelayed-template-parsing
, and they are a work
in progress.
Finally, there is clang-cl, a driver program for clang that attempts to be compatible with MSVC’s cl.exe.
ABI features¶
The status of major ABI-impacting C++ features:
- Record layout: Complete. We’ve tested this with a fuzzer and have fixed all known bugs.
- Class inheritance: Mostly complete. This covers all of the standard OO features you would expect: virtual method inheritance, multiple inheritance, and virtual inheritance. Every so often we uncover a bug where our tables are incompatible, but this is pretty well in hand. This feature has also been fuzz tested.
- Name mangling: Ongoing. Every new C++ feature generally needs its own mangling. For example, member pointer template arguments have an interesting and distinct mangling. Fortunately, incorrect manglings usually do not result in runtime errors. Non-inline functions with incorrect manglings usually result in link errors, which are relatively easy to diagnose. Incorrect manglings for inline functions and templates result in multiple copies in the final image. The C++ standard requires that those addresses be equal, but few programs rely on this.
- Member pointers: Mostly complete. Standard C++ member pointers are fully implemented and should be ABI compatible. Both #pragma pointers_to_members and the /vm flags are supported. However, MSVC supports an extension to allow creating a pointer to a member of a virtual base class. Clang does not yet support this.
- Debug info: Mostly complete. Clang emits relatively complete CodeView
debug information if
/Z7
or/Zi
is passed. Microsoft’s link.exe will transform the CodeView debug information into a PDB that works in Windows debuggers and other tools that consume PDB files like ETW. Work to teach lld about CodeView and PDBs is ongoing. - RTTI: Complete. Generation of RTTI data structures has been
finished, along with support for the
/GR
flag. - C++ Exceptions: Mostly complete. Support for
C++ exceptions (
try
/catch
/throw
) have been implemented for x86 and x64. Our implementation has been well tested but we still get the odd bug report now and again. C++ exception specifications are ignored, but this is consistent with Visual C++.
- Asynchronous Exceptions (SEH): Partial.
Structured exceptions (
__try
/__except
/__finally
) mostly work on x86 and x64. LLVM does not model asynchronous exceptions, so it is currently impossible to catch an asynchronous exception generated in the same frame as the catching__try
. - Thread-safe initialization of local statics: Complete. MSVC 2015 added support for thread-safe initialization of such variables by taking an ABI break. We are ABI compatible with both the MSVC 2013 and 2015 ABI for static local variables.
- Lambdas: Mostly complete. Clang is compatible with Microsoft’s implementation of lambdas except for providing overloads for conversion to function pointer for different calling conventions. However, Microsoft’s extension is non-conforming.
Template instantiation and name lookup¶
MSVC allows many invalid constructs in class templates that Clang has historically rejected. In order to parse widely distributed headers for libraries such as the Active Template Library (ATL) and Windows Runtime Library (WRL), some template rules have been relaxed or extended in Clang on Windows.
The first major semantic difference is that MSVC appears to defer all parsing
an analysis of inline method bodies in class templates until instantiation
time. By default on Windows, Clang attempts to follow suit. This behavior is
controlled by the -fdelayed-template-parsing
flag. While Clang delays
parsing of method bodies, it still parses the bodies before template argument
substitution, which is not what MSVC does. The following compatibility tweaks
are necessary to parse the template in those cases.
MSVC allows some name lookup into dependent base classes. Even on other
platforms, this has been a frequently asked question for Clang users. A
dependent base class is a base class that depends on the value of a template
parameter. Clang cannot see any of the names inside dependent bases while it
is parsing your template, so the user is sometimes required to use the
typename
keyword to assist the parser. On Windows, Clang attempts to
follow the normal lookup rules, but if lookup fails, it will assume that the
user intended to find the name in a dependent base. While parsing the
following program, Clang will recover as if the user had written the
commented-out code:
template <typename T>
struct Foo : T {
void f() {
/*typename*/ T::UnknownType x = /*this->*/unknownMember;
}
};
After recovery, Clang warns the user that this code is non-standard and issues a hint suggesting how to fix the problem.
As of this writing, Clang is able to compile a simple ATL hello world application. There are still issues parsing WRL headers for modern Windows 8 apps, but they should be addressed soon.
OpenMP Support¶
Clang fully supports OpenMP 4.5. Clang supports offloading to X86_64, AArch64, PPC64[LE] and has basic support for Cuda devices.
Standalone directives¶
- #pragma omp [for] simd: Complete.
- #pragma omp declare simd: Partial. We support parsing/semantic analysis + generation of special attributes for X86 target, but still missing the LLVM pass for vectorization.
- #pragma omp taskloop [simd]: Complete.
- #pragma omp target [enter|exit] data: Complete.
- #pragma omp target update: Complete.
- #pragma omp target: Complete.
- #pragma omp declare target: Complete.
- #pragma omp teams: Complete.
- #pragma omp distribute [simd]: Complete.
- #pragma omp distribute parallel for [simd]: Complete.
Combined directives¶
- #pragma omp parallel for simd: Complete.
- #pragma omp target parallel: Complete.
- #pragma omp target parallel for [simd]: Complete.
- #pragma omp target simd: Complete.
- #pragma omp target teams: Complete.
- #pragma omp teams distribute [simd]: Complete.
- #pragma omp target teams distribute [simd]: Complete.
- #pragma omp teams distribute parallel for [simd]: Complete.
- #pragma omp target teams distribute parallel for [simd]: Complete.
Clang does not support any constructs/updates from upcoming OpenMP 5.0 except for reduction-based clauses in the task and target-based directives.
In addition, the LLVM OpenMP runtime libomp supports the OpenMP Tools Interface (OMPT) on x86, x86_64, AArch64, and PPC64 on Linux, Windows, and mac OS. ows, and mac OS.
Cuda devices support¶
Directives execution modes¶
Clang code generation for target regions supports two modes: the SPMD and non-SPMD modes. Clang chooses one of these two modes automatically based on the way directives and clauses on those directives are used. The SPMD mode uses a simplified set of runtime functions thus increasing performance at the cost of supporting some OpenMP features. The non-SPMD mode is the most generic mode and supports all currently available OpenMP features. The compiler will always attempt to use the SPMD mode wherever possible. SPMD mode will not be used if:
- The target region contains an if() clause that refers to a parallel directive.
- The target region contains a parallel directive with a num_threads() clause.
- The target region contains user code (other than OpenMP-specific directives) in between the target and the parallel directives.
Data-sharing modes¶
Clang supports two data-sharing models for Cuda devices: Generic and Cuda modes. The default mode is Generic. Cuda mode can give an additional performance and can be activated using the -fopenmp-cuda-mode flag. In Generic mode all local variables that can be shared in the parallel regions are stored in the global memory. In Cuda mode local variables are not shared between the threads and it is user responsibility to share the required data between the threads in the parallel regions.
Features not supported or with limited support for Cuda devices¶
- Reductions across the teams are not supported yet.
- Cancellation constructs are not supported.
- Doacross loop nest is not supported.
- User-defined reductions are supported only for trivial types.
- Nested parallelism: inner parallel regions are executed sequentially.
- Static linking of libraries containing device code is not supported yet.
- Automatic translation of math functions in target regions to device-specific math functions is not implemented yet.
- Debug information for OpenMP target regions is not supported yet.
ThinLTO¶
Introduction¶
ThinLTO compilation is a new type of LTO that is both scalable and incremental. LTO (Link Time Optimization) achieves better runtime performance through whole-program analysis and cross-module optimization. However, monolithic LTO implements this by merging all input into a single module, which is not scalable in time or memory, and also prevents fast incremental compiles.
In ThinLTO mode, as with regular LTO, clang emits LLVM bitcode after the compile phase. The ThinLTO bitcode is augmented with a compact summary of the module. During the link step, only the summaries are read and merged into a combined summary index, which includes an index of function locations for later cross-module function importing. Fast and efficient whole-program analysis is then performed on the combined summary index.
However, all transformations, including function importing, occur later when the modules are optimized in fully parallel backends. By default, linkers that support ThinLTO are set up to launch the ThinLTO backends in threads. So the usage model is not affected as the distinction between the fast serial thin link step and the backends is transparent to the user.
For more information on the ThinLTO design and current performance, see the LLVM blog post ThinLTO: Scalable and Incremental LTO. While tuning is still in progress, results in the blog post show that ThinLTO already performs well compared to LTO, in many cases matching the performance improvement.
Current Status¶
Clang/LLVM¶
The 3.9 release of clang includes ThinLTO support. However, ThinLTO is under active development, and new features, improvements and bugfixes are being added for the next release. For the latest ThinLTO support, build a recent version of clang and LLVM.
Linkers¶
ThinLTO is currently supported for the following linkers:
- gold (via the gold-plugin): Similar to monolithic LTO, this requires using a gold linker configured with plugins enabled.
- ld64: Starting with Xcode 8.
- lld: Starting with r284050 for ELF, r298942 for COFF.
Usage¶
Basic¶
To utilize ThinLTO, simply add the -flto=thin option to compile and link. E.g.
% clang -flto=thin -O2 file1.c file2.c -c
% clang -flto=thin -O2 file1.o file2.o -o a.out
When using lld-link, the -flto option need only be added to the compile step:
% clang-cl -flto=thin -O2 -c file1.c file2.c
% lld-link /out:a.exe file1.obj file2.obj
As mentioned earlier, by default the linkers will launch the ThinLTO backend threads in parallel, passing the resulting native object files back to the linker for the final native link. As such, the usage model the same as non-LTO.
With gold, if you see an error during the link of the form:
/usr/bin/ld: error: /path/to/clang/bin/../lib/LLVMgold.so: could not load plugin library: /path/to/clang/bin/../lib/LLVMgold.so: cannot open shared object file: No such file or directory
Then either gold was not configured with plugins enabled, or clang
was not built with -DLLVM_BINUTILS_INCDIR
set properly. See
the instructions for the
LLVM gold plugin.
Controlling Backend Parallelism¶
By default, the ThinLTO link step will launch up to
std::thread::hardware_concurrency
number of threads in parallel.
For machines with hyper-threading, this is the total number of
virtual cores. For some applications and machine configurations this
may be too aggressive, in which case the amount of parallelism can
be reduced to N
via:
- gold:
-Wl,-plugin-opt,jobs=N
- ld64:
-Wl,-mllvm,-threads=N
- lld:
-Wl,--thinlto-jobs=N
- lld-link:
/opt:lldltojobs=N
Incremental¶
ThinLTO supports fast incremental builds through the use of a cache, which currently must be enabled through a linker option.
- gold (as of LLVM 4.0):
-Wl,-plugin-opt,cache-dir=/path/to/cache
- ld64 (support in clang 3.9 and Xcode 8):
-Wl,-cache_path_lto,/path/to/cache
- ELF lld (as of LLVM 5.0):
-Wl,--thinlto-cache-dir=/path/to/cache
- COFF lld-link (as of LLVM 6.0):
/lldltocache:/path/to/cache
Cache Pruning¶
To help keep the size of the cache under control, ThinLTO supports cache pruning. Cache pruning is supported with gold, ld64 and ELF and COFF lld, but currently only gold, ELF and COFF lld allow you to control the policy with a policy string. The cache policy must be specified with a linker option.
- gold (as of LLVM 6.0):
-Wl,-plugin-opt,cache-policy=POLICY
- ELF lld (as of LLVM 5.0):
-Wl,--thinlto-cache-policy,POLICY
- COFF lld-link (as of LLVM 6.0):
/lldltocachepolicy:POLICY
A policy string is a series of key-value pairs separated by :
characters.
Possible key-value pairs are:
cache_size=X%
: The maximum size for the cache directory isX
percent of the available space on the disk. Set to 100 to indicate no limit, 50 to indicate that the cache size will not be left over half the available disk space. A value over 100 is invalid. A value of 0 disables the percentage size-based pruning. The default is 75%.cache_size_bytes=X
,cache_size_bytes=Xk
,cache_size_bytes=Xm
,cache_size_bytes=Xg
: Sets the maximum size for the cache directory toX
bytes (or KB, MB, GB respectively). A value over the amount of available space on the disk will be reduced to the amount of available space. A value of 0 disables the byte size-based pruning. The default is no byte size-based pruning.Note that ThinLTO will apply both size-based pruning policies simultaneously, and changing one does not affect the other. For example, a policy of
cache_size_bytes=1g
on its own will cause both the 1GB and default 75% policies to be applied unless the defaultcache_size
is overridden.cache_size_files=X
: Set the maximum number of files in the cache directory. Set to 0 to indicate no limit. The default is 1000000 files.prune_after=Xs
,prune_after=Xm
,prune_after=Xh
: Sets the expiration time for cache files toX
seconds (or minutes, hours respectively). When a file hasn’t been accessed forprune_after
seconds, it is removed from the cache. A value of 0 disables the expiration-based pruning. The default is 1 week.prune_interval=Xs
,prune_interval=Xm
,prune_interval=Xh
: Sets the pruning interval toX
seconds (or minutes, hours respectively). This is intended to be used to avoid scanning the directory too often. It does not impact the decision of which files to prune. A value of 0 forces the scan to occur. The default is every 20 minutes.
Clang Bootstrap¶
To bootstrap clang/LLVM with ThinLTO, follow these steps:
- The host compiler must be a version of clang that supports ThinLTO.
- The host linker must support ThinLTO (and in the case of gold, must be configured with plugins enabled.
- Use the following additional CMake variables when configuring the bootstrap compiler build:
-DLLVM_ENABLE_LTO=Thin
-DCMAKE_C_COMPILER=/path/to/host/clang
-DCMAKE_CXX_COMPILER=/path/to/host/clang++
-DCMAKE_RANLIB=/path/to/host/llvm-ranlib
-DCMAKE_AR=/path/to/host/llvm-ar
Or, on Windows:
-DLLVM_ENABLE_LTO=Thin
-DCMAKE_C_COMPILER=/path/to/host/clang-cl.exe
-DCMAKE_CXX_COMPILER=/path/to/host/clang-cl.exe
-DCMAKE_LINKER=/path/to/host/lld-link.exe
-DCMAKE_RANLIB=/path/to/host/llvm-ranlib.exe
-DCMAKE_AR=/path/to/host/llvm-ar.exe
- To use additional linker arguments for controlling the backend
parallelism or enabling incremental builds of the bootstrap compiler,
after configuring the build, modify the resulting CMakeCache.txt file in the
build directory. Specify any additional linker options after
CMAKE_EXE_LINKER_FLAGS:STRING=
. Note the configure may fail if linker plugin options are instead specified directly in the previous step.
More Information¶
- From LLVM project blog: ThinLTO: Scalable and Incremental LTO
Clang “man” pages¶
The following documents are command descriptions for all of the Clang tools.
These pages describe how to use the Clang commands and what their options are.
Note that these pages do not describe all of the options available for all
tools. To get a complete listing, pass the --help
(general options) or
--help-hidden
(general and debugging options) arguments to the tool you are
interested in.
Basic Commands¶
clang - the Clang C, C++, and Objective-C compiler¶
SYNOPSIS¶
clang [options] filename …
DESCRIPTION¶
clang is a C, C++, and Objective-C compiler which encompasses preprocessing, parsing, optimization, code generation, assembly, and linking. Depending on which high-level mode setting is passed, Clang will stop before doing a full link. While Clang is highly integrated, it is important to understand the stages of compilation, to understand how to invoke it. These stages are:
- Driver
- The clang executable is actually a small driver which controls the overall execution of other tools such as the compiler, assembler and linker. Typically you do not need to interact with the driver, but you transparently use it to run the other tools.
- Preprocessing
- This stage handles tokenization of the input source file, macro expansion, #include expansion and handling of other preprocessor directives. The output of this stage is typically called a “.i” (for C), “.ii” (for C++), “.mi” (for Objective-C), or “.mii” (for Objective-C++) file.
- Parsing and Semantic Analysis
- This stage parses the input file, translating preprocessor tokens into a parse tree. Once in the form of a parse tree, it applies semantic analysis to compute types for expressions as well and determine whether the code is well formed. This stage is responsible for generating most of the compiler warnings as well as parse errors. The output of this stage is an “Abstract Syntax Tree” (AST).
- Code Generation and Optimization
This stage translates an AST into low-level intermediate code (known as “LLVM IR”) and ultimately to machine code. This phase is responsible for optimizing the generated code and handling target-specific code generation. The output of this stage is typically called a “.s” file or “assembly” file.
Clang also supports the use of an integrated assembler, in which the code generator produces object files directly. This avoids the overhead of generating the “.s” file and of calling the target assembler.
- Assembler
- This stage runs the target assembler to translate the output of the compiler into a target object file. The output of this stage is typically called a “.o” file or “object” file.
- Linker
- This stage runs the target linker to merge multiple object files into an executable or dynamic library. The output of this stage is typically called an “a.out”, “.dylib” or “.so” file.
Clang Static Analyzer
The Clang Static Analyzer is a tool that scans source code to try to find bugs through code analysis. This tool uses many parts of Clang and is built into the same driver. Please see <http://clang-analyzer.llvm.org> for more details on how to use the static analyzer.
OPTIONS¶
Stage Selection Options¶
-
-E
¶
Run the preprocessor stage.
-
-fsyntax-only
¶
Run the preprocessor, parser and type checking stages.
-
-S
¶
Run the previous stages as well as LLVM generation and optimization stages and target-specific code generation, producing an assembly file.
-
-c
¶
Run all of the above, plus the assembler, generating a target “.o” object file.
-
no
stage selection option
¶ If no stage selection option is specified, all stages above are run, and the linker is run to combine the results into an executable or shared library.
Language Selection and Mode Options¶
-
-x
<language>
¶ Treat subsequent input files as having type language.
-
-std
=<standard>
¶ Specify the language standard to compile for.
Supported values for the C language are:
c89
c90
iso9899:1990
ISO C 1990iso9899:199409
ISO C 1990 with amendment 1gnu89
gnu90
ISO C 1990 with GNU extensionsc99
iso9899:1999
ISO C 1999gnu99
ISO C 1999 with GNU extensionsc11
iso9899:2011
ISO C 2011gnu11
ISO C 2011 with GNU extensionsc17
iso9899:2017
ISO C 2017gnu17
ISO C 2017 with GNU extensionsThe default C language standard is
gnu11
, except on PS4, where it isgnu99
.Supported values for the C++ language are:
c++98
c++03
ISO C++ 1998 with amendmentsgnu++98
gnu++03
ISO C++ 1998 with amendments and GNU extensionsc++11
ISO C++ 2011 with amendmentsgnu++11
ISO C++ 2011 with amendments and GNU extensionsc++14
ISO C++ 2014 with amendmentsgnu++14
ISO C++ 2014 with amendments and GNU extensionsc++17
ISO C++ 2017 with amendmentsgnu++17
ISO C++ 2017 with amendments and GNU extensionsc++2a
Working draft for ISO C++ 2020gnu++2a
Working draft for ISO C++ 2020 with GNU extensionsThe default C++ language standard is
gnu++14
.Supported values for the OpenCL language are:
cl1.0
OpenCL 1.0cl1.1
OpenCL 1.1cl1.2
OpenCL 1.2cl2.0
OpenCL 2.0The default OpenCL language standard is
cl1.0
.Supported values for the CUDA language are:
cuda
NVIDIA CUDA(tm)
-
-stdlib
=<library>
¶ Specify the C++ standard library to use; supported options are libstdc++ and libc++. If not specified, platform default will be used.
-
-rtlib
=<library>
¶ Specify the compiler runtime library to use; supported options are libgcc and compiler-rt. If not specified, platform default will be used.
-
-ansi
¶
Same as -std=c89.
-
-ObjC
,
-ObjC++
¶
Treat source input files as Objective-C and Object-C++ inputs respectively.
-
-trigraphs
¶
Enable trigraphs.
-
-ffreestanding
¶
Indicate that the file should be compiled for a freestanding, not a hosted, environment.
-
-fno-builtin
¶
Disable special handling and optimizations of builtin functions like
strlen()
andmalloc()
.
-
-fmath-errno
¶
Indicate that math functions should be treated as updating
errno
.
-
-fpascal-strings
¶
Enable support for Pascal-style strings with “\pfoo”.
-
-fms-extensions
¶
Enable support for Microsoft extensions.
-
-fmsc-version
=
¶ Set _MSC_VER. Defaults to 1300 on Windows. Not set otherwise.
-
-fborland-extensions
¶
Enable support for Borland extensions.
-
-fwritable-strings
¶
Make all string literals default to writable. This disables uniquing of strings and other optimizations.
-
-flax-vector-conversions
¶
Allow loose type checking rules for implicit vector conversions.
-
-fblocks
¶
Enable the “Blocks” language feature.
-
-fobjc-abi-version
=version
¶ Select the Objective-C ABI version to use. Available versions are 1 (legacy “fragile” ABI), 2 (non-fragile ABI 1), and 3 (non-fragile ABI 2).
-
-fobjc-nonfragile-abi-version
=<version>
¶ Select the Objective-C non-fragile ABI version to use by default. This will only be used as the Objective-C ABI when the non-fragile ABI is enabled (either via
-fobjc-nonfragile-abi
, or because it is the platform default).
-
-fobjc-nonfragile-abi
,
-fno-objc-nonfragile-abi
¶
Enable use of the Objective-C non-fragile ABI. On platforms for which this is the default ABI, it can be disabled with
-fno-objc-nonfragile-abi
.
Target Selection Options¶
Clang fully supports cross compilation as an inherent part of its design. Depending on how your version of Clang is configured, it may have support for a number of cross compilers, or may only support a native target.
-
-arch
<architecture>
¶ Specify the architecture to build for.
-
-mmacosx-version-min
=<version>
¶ When building for Mac OS X, specify the minimum version supported by your application.
-
-miphoneos-version-min
¶
When building for iPhone OS, specify the minimum version supported by your application.
-
-march
=<cpu>
¶ Specify that Clang should generate code for a specific processor family member and later. For example, if you specify -march=i486, the compiler is allowed to generate instructions that are valid on i486 and later processors, but which may not exist on earlier ones.
Code Generation Options¶
-
-O0
,
-O1
,
-O2
,
-O3
,
-Ofast
,
-Os
,
-Oz
,
-Og
,
-O
,
-O4
¶
Specify which optimization level to use:
-O0
Means “no optimization”: this level compiles the fastest and generates the most debuggable code.-O1
Somewhere between-O0
and-O2
.-O2
Moderate level of optimization which enables most optimizations.-O3
Like-O2
, except that it enables optimizations that take longer to perform or that may generate larger code (in an attempt to make the program run faster).-Ofast
Enables all the optimizations from-O3
along with other aggressive optimizations that may violate strict compliance with language standards.-Os
Like-O2
with extra optimizations to reduce code size.-Oz
Like-Os
(and thus-O2
), but reduces code size further.-Og
Like-O1
. In future versions, this option might disable different optimizations in order to improve debuggability.-O4
and higherCurrently equivalent to-O3
-
-g
,
-gline-tables-only
,
-gmodules
¶
Control debug information output. Note that Clang debug information works best at
-O0
. When more than one option starting with -g is specified, the last one wins:-g
Generate debug information.-gline-tables-only
Generate only line table debug information. This allows for symbolicated backtraces with inlining information, but does not include any information about variables, their locations or types.-gmodules
Generate debug information that contains external references to types defined in Clang modules or precompiled headers instead of emitting redundant debug type information into every object file. This option transparently switches the Clang module format to object file containers that hold the Clang module together with the debug information. When compiling a program that uses Clang modules or precompiled headers, this option produces complete debug information with faster compile times and much smaller object files.This option should not be used when building static libraries for distribution to other machines because the debug info will contain references to the module cache on the machine the object files in the library were built on.
-
-fstandalone-debug
-fno-standalone-debug
¶ Clang supports a number of optimizations to reduce the size of debug information in the binary. They work based on the assumption that the debug type information can be spread out over multiple compilation units. For instance, Clang will not emit type definitions for types that are not needed by a module and could be replaced with a forward declaration. Further, Clang will only emit type info for a dynamic C++ class in the module that contains the vtable for the class.
The
-fstandalone-debug
option turns off these optimizations. This is useful when working with 3rd-party libraries that don’t come with debug information. This is the default on Darwin. Note that Clang will never emit type information for types that are not referenced at all by the program.
-
-fexceptions
¶
Enable generation of unwind information. This allows exceptions to be thrown through Clang compiled stack frames. This is on by default in x86-64.
-
-ftrapv
¶
Generate code to catch integer overflow errors. Signed integer overflow is undefined in C. With this flag, extra code is generated to detect this and abort when it happens.
-
-fvisibility
¶
This flag sets the default visibility level.
-
-fcommon
,
-fno-common
¶
This flag specifies that variables without initializers get common linkage. It can be disabled with
-fno-common
.
-
-ftls-model
=<model>
¶ Set the default thread-local storage (TLS) model to use for thread-local variables. Valid values are: “global-dynamic”, “local-dynamic”, “initial-exec” and “local-exec”. The default is “global-dynamic”. The default model can be overridden with the tls_model attribute. The compiler will try to choose a more efficient model if possible.
-
-flto
,
-flto
=full
,
-flto
=thin
,
-emit-llvm
¶
Generate output files in LLVM formats, suitable for link time optimization. When used with
-S
this generates LLVM intermediate language assembly files, otherwise this generates LLVM bitcode format object files (which may be passed to the linker depending on the stage selection options).The default for
-flto
is “full”, in which the LLVM bitcode is suitable for monolithic Link Time Optimization (LTO), where the linker merges all such modules into a single combined module for optimization. With “thin”, ThinLTO compilation is invoked instead.
Driver Options¶
-
-###
¶
Print (but do not run) the commands to run for this compilation.
-
--help
¶
Display available options.
-
-Qunused-arguments
¶
Do not emit any warnings for unused driver arguments.
-
-Wa,<args>
¶
Pass the comma separated arguments in args to the assembler.
-
-Wl,<args>
¶
Pass the comma separated arguments in args to the linker.
-
-Wp,<args>
¶
Pass the comma separated arguments in args to the preprocessor.
-
-Xanalyzer
<arg>
¶ Pass arg to the static analyzer.
-
-Xassembler
<arg>
¶ Pass arg to the assembler.
-
-Xlinker
<arg>
¶ Pass arg to the linker.
-
-Xpreprocessor
<arg>
¶ Pass arg to the preprocessor.
-
-o
<file>
¶ Write output to file.
-
-print-file-name
=<file>
¶ Print the full library path of file.
-
-print-libgcc-file-name
¶
Print the library path for the currently used compiler runtime library (“libgcc.a” or “libclang_rt.builtins.*.a”).
-
-print-prog-name
=<name>
¶ Print the full program path of name.
-
-print-search-dirs
¶
Print the paths used for finding libraries and programs.
-
-save-temps
¶
Save intermediate compilation results.
-
-save-stats
,
-save-stats
=cwd
,
-save-stats
=obj
¶ Save internal code generation (LLVM) statistics to a file in the current directory (
-save-stats
/”-save-stats=cwd”) or the directory of the output file (“-save-state=obj”).
-
-integrated-as
,
-no-integrated-as
¶
Used to enable and disable, respectively, the use of the integrated assembler. Whether the integrated assembler is on by default is target dependent.
-
-time
¶
Time individual commands.
-
-ftime-report
¶
Print timing summary of each stage of compilation.
-
-v
¶
Show commands to run and use verbose output.
Diagnostics Options¶
-
-fshow-column
,
-fshow-source-location
,
-fcaret-diagnostics
,
-fdiagnostics-fixit-info
,
-fdiagnostics-parseable-fixits
,
-fdiagnostics-print-source-range-info
,
-fprint-source-range-info
,
-fdiagnostics-show-option
,
-fmessage-length
¶
These options control how Clang prints out information about diagnostics (errors and warnings). Please see the Clang User’s Manual for more information.
Preprocessor Options¶
-
-D<macroname>
=<value>
¶ Adds an implicit #define into the predefines buffer which is read before the source file is preprocessed.
-
-U<macroname>
¶
Adds an implicit #undef into the predefines buffer which is read before the source file is preprocessed.
-
-include
<filename>
¶ Adds an implicit #include into the predefines buffer which is read before the source file is preprocessed.
-
-I<directory>
¶
Add the specified directory to the search path for include files.
-
-F<directory>
¶
Add the specified directory to the search path for framework include files.
-
-nostdinc
¶
Do not search the standard system directories or compiler builtin directories for include files.
-
-nostdlibinc
¶
Do not search the standard system directories for include files, but do search compiler builtin include directories.
-
-nobuiltininc
¶
Do not search clang’s builtin directory for include files.
ENVIRONMENT¶
-
TMPDIR, TEMP, TMP
¶ These environment variables are checked, in order, for the location to write temporary files used during the compilation process.
-
CPATH
¶ If this environment variable is present, it is treated as a delimited list of paths to be added to the default system include path list. The delimiter is the platform dependent delimiter, as used in the PATH environment variable.
Empty components in the environment variable are ignored.
-
C_INCLUDE_PATH, OBJC_INCLUDE_PATH, CPLUS_INCLUDE_PATH, OBJCPLUS_INCLUDE_PATH
¶ These environment variables specify additional paths, as for
CPATH
, which are only used when processing the appropriate language.
-
MACOSX_DEPLOYMENT_TARGET
¶ If
-mmacosx-version-min
is unspecified, the default deployment target is read from this environment variable. This option only affects Darwin targets.
BUGS¶
To report bugs, please visit <http://llvm.org/bugs/>. Most bug reports should
include preprocessed source files (use the -E
option) and the full
output of the compiler, along with information to reproduce.
SEE ALSO¶
as(1), ld(1)
diagtool - clang diagnostics tool¶
SYNOPSIS¶
diagtool command [args]
DESCRIPTION¶
diagtool is a combination of four tool for dealing with diagnostics in clang.
SUBCOMMANDS¶
diagtool is separated into several subcommands each tailored to a different purpose. A brief summary of each command follows, with more detail in the sections that follow.
- find-diagnostic-id - Print the id of the given diagnostic.
- list-warnings - List warnings and their corresponding flags.
- show-enabled - Show which warnings are enabled for a given command line.
- tree - Show warning flags in a tree view.
find-diagnostic-id¶
diagtool find-diagnostic-id diagnostic-name
list-warnings¶
diagtool list-warnings
show-enabled¶
diagtool show-enabled [options] filename …
tree¶
diagtool tree [diagnostic-group]
Frequently Asked Questions (FAQ)¶
Driver¶
I run clang -cc1 ...
and get weird errors about missing headers¶
Given this source file:
#include <stdio.h>
int main() {
printf("Hello world\n");
}
If you run:
$ clang -cc1 hello.c
hello.c:1:10: fatal error: 'stdio.h' file not found
#include <stdio.h>
^
1 error generated.
clang -cc1
is the frontend, clang
is the driver. The driver invokes the frontend with options appropriate
for your system. To see these options, run:
$ clang -### -c hello.c
Some clang command line options are driver-only options, some are frontend-only
options. Frontend-only options are intended to be used only by clang developers.
Users should not run clang -cc1
directly, because -cc1
options are not
guaranteed to be stable.
If you want to use a frontend-only option (“a -cc1
option”), for example
-ast-dump
, then you need to take the clang -cc1
line generated by the
driver and add the option you need. Alternatively, you can run
clang -Xclang <option> ...
to force the driver pass <option>
to
clang -cc1
.
I get errors about some headers being missing (stddef.h
, stdarg.h
)¶
Some header files (stddef.h
, stdarg.h
, and others) are shipped with
Clang — these are called builtin includes. Clang searches for them in a
directory relative to the location of the clang
binary. If you moved the
clang
binary, you need to move the builtin headers, too.
More information can be found in the Builtin includes section.
Using Clang as a Library¶
Choosing the Right Interface for Your Application¶
Clang provides infrastructure to write tools that need syntactic and semantic information about a program. This document will give a short introduction of the different ways to write clang tools, and their pros and cons.
LibClang¶
LibClang is a stable high level C interface to clang. When in doubt LibClang is probably the interface you want to use. Consider the other interfaces only when you have a good reason not to use LibClang.
Canonical examples of when to use LibClang:
- Xcode
- Clang Python Bindings
Use LibClang when you…:
- want to interface with clang from other languages than C++
- need a stable interface that takes care to be backwards compatible
- want powerful high-level abstractions, like iterating through an AST with a cursor, and don’t want to learn all the nitty gritty details of Clang’s AST.
Do not use LibClang when you…:
- want full control over the Clang AST
Clang Plugins¶
Clang Plugins allow you to run additional actions on the AST as part of a compilation. Plugins are dynamic libraries that are loaded at runtime by the compiler, and they’re easy to integrate into your build environment.
Canonical examples of when to use Clang Plugins:
- special lint-style warnings or errors for your project
- creating additional build artifacts from a single compile step
Use Clang Plugins when you…:
- need your tool to rerun if any of the dependencies change
- want your tool to make or break a build
- need full control over the Clang AST
Do not use Clang Plugins when you…:
- want to run tools outside of your build environment
- want full control on how Clang is set up, including mapping of in-memory virtual files
- need to run over a specific subset of files in your project which is not necessarily related to any changes which would trigger rebuilds
LibTooling¶
LibTooling is a C++ interface aimed at writing standalone tools, as well as integrating into services that run clang tools. Canonical examples of when to use LibTooling:
- a simple syntax checker
- refactoring tools
Use LibTooling when you…:
- want to run tools over a single file, or a specific subset of files, independently of the build system
- want full control over the Clang AST
- want to share code with Clang Plugins
Do not use LibTooling when you…:
- want to run as part of the build triggered by dependency changes
- want a stable interface so you don’t need to change your code when the AST API changes
- want high level abstractions like cursors and code completion out of the box
- do not want to write your tools in C++
Clang tools are a collection of specific developer tools built on top of the LibTooling infrastructure as part of the Clang project. They are targeted at automating and improving core development activities of C/C++ developers.
Examples of tools we are building or planning as part of the Clang project:
- Syntax checking (clang-check)
- Automatic fixing of compile errors (clang-fixit)
- Automatic code formatting (clang-format)
- Migration tools for new features in new language standards
- Core refactoring tools
External Clang Examples¶
Introduction¶
This page provides some examples of the kinds of things that people have done with Clang that might serve as useful guides (or starting points) from which to develop your own tools. They may be helpful even for something as banal (but necessary) as how to set up your build to integrate Clang.
Clang’s library-based design is deliberately aimed at facilitating use by external projects, and we are always interested in improving Clang to better serve our external users. Some typical categories of applications where Clang is used are:
- Static analysis.
- Documentation/cross-reference generation.
If you know of (or wrote!) a tool or project using Clang, please send an email to Clang’s development discussion mailing list to have it added. (or if you are already a Clang contributor, feel free to directly commit additions). Since the primary purpose of this page is to provide examples that can help developers, generally they must have code available.
List of projects and tools¶
- https://github.com/Andersbakken/rtags/
- “RTags is a client/server application that indexes c/c++ code and keeps a persistent in-memory database of references, symbolnames, completions etc.”
- http://rprichard.github.com/sourceweb/
- “A C/C++ source code indexer and navigator”
- https://github.com/etaoins/qconnectlint
- “qconnectlint is a Clang tool for statically verifying the consistency
of signal and slot connections made with Qt’s
QObject::connect
.” - https://github.com/woboq/woboq_codebrowser
- “The Woboq Code Browser is a web-based code browser for C/C++ projects. Check out http://code.woboq.org/ for an example!”
- https://github.com/mozilla/dxr
- “DXR is a source code cross-reference tool that uses static analysis data collected by instrumented compilers.”
- https://github.com/eschulte/clang-mutate
- “This tool performs a number of operations on C-language source files.”
- https://github.com/gmarpons/Crisp
- “A coding rule validation add-on for LLVM/clang. Crisp rules are written in Prolog. A high-level declarative DSL to easily write new rules is under development. It will be called CRISP, an acronym for Coding Rules in Sugared Prolog.”
- https://github.com/drothlis/clang-ctags
- “Generate tag file for C++ source code.”
- https://github.com/exclipy/clang_indexer
- “This is an indexer for C and C++ based on the libclang library.”
- https://github.com/holtgrewe/linty
- “Linty - C/C++ Style Checking with Python & libclang.”
- https://github.com/axw/cmonster
- “cmonster is a Python wrapper for the Clang C++ parser.”
- https://github.com/rizsotto/Constantine
- “Constantine is a toy project to learn how to write clang plugin. Implements pseudo const analysis. Generates warnings about variables, which were declared without const qualifier.”
- https://github.com/jessevdk/cldoc
- “cldoc is a Clang based documentation generator for C and C++. cldoc tries to solve the issue of writing C/C++ software documentation with a modern, non-intrusive and robust approach.”
- https://github.com/AlexDenisov/ToyClangPlugin
- “The simplest Clang plugin implementing a semantic check for Objective-C.
This example shows how to use the
DiagnosticsEngine
(emit warnings, errors, fixit hints). See also http://l.rw.rw/clang_plugin for step-by-step instructions.” - https://phabricator.kde.org/source/clazy
- “clazy is a compiler plugin which allows clang to understand Qt semantics. You get more than 50 Qt related compiler warnings, ranging from unneeded memory allocations to misusage of API, including fix-its for automatic refactoring.”
- https://gerrit.libreoffice.org/gitweb?p=core.git;a=blob_plain;f=compilerplugins/README;hb=HEAD
- “LibreOffice uses a Clang plugin infrastructure to check during the build various things, some more, some less specific to the LibreOffice source code. There are currently around 50 such checkers, from flagging C-style casts and uses of reserved identifiers to ensuring that code adheres to lifecycle protocols for certain LibreOffice-specific classes. They may serve as examples for writing RecursiveASTVisitor-based plugins.”
Introduction to the Clang AST¶
This document gives a gentle introduction to the mysteries of the Clang AST. It is targeted at developers who either want to contribute to Clang, or use tools that work based on Clang’s AST, like the AST matchers.
Introduction¶
Clang’s AST is different from ASTs produced by some other compilers in that it closely resembles both the written C++ code and the C++ standard. For example, parenthesis expressions and compile time constants are available in an unreduced form in the AST. This makes Clang’s AST a good fit for refactoring tools.
Documentation for all Clang AST nodes is available via the generated Doxygen. The doxygen online documentation is also indexed by your favorite search engine, which will make a search for clang and the AST node’s class name usually turn up the doxygen of the class you’re looking for (for example, search for: clang ParenExpr).
Examining the AST¶
A good way to familarize yourself with the Clang AST is to actually look
at it on some simple example code. Clang has a builtin AST-dump mode,
which can be enabled with the flag -ast-dump
.
Let’s look at a simple example AST:
$ cat test.cc
int f(int x) {
int result = (x / 42);
return result;
}
# Clang by default is a frontend for many tools; -Xclang is used to pass
# options directly to the C++ frontend.
$ clang -Xclang -ast-dump -fsyntax-only test.cc
TranslationUnitDecl 0x5aea0d0 <<invalid sloc>>
... cutting out internal declarations of clang ...
`-FunctionDecl 0x5aeab50 <test.cc:1:1, line:4:1> f 'int (int)'
|-ParmVarDecl 0x5aeaa90 <line:1:7, col:11> x 'int'
`-CompoundStmt 0x5aead88 <col:14, line:4:1>
|-DeclStmt 0x5aead10 <line:2:3, col:24>
| `-VarDecl 0x5aeac10 <col:3, col:23> result 'int'
| `-ParenExpr 0x5aeacf0 <col:16, col:23> 'int'
| `-BinaryOperator 0x5aeacc8 <col:17, col:21> 'int' '/'
| |-ImplicitCastExpr 0x5aeacb0 <col:17> 'int' <LValueToRValue>
| | `-DeclRefExpr 0x5aeac68 <col:17> 'int' lvalue ParmVar 0x5aeaa90 'x' 'int'
| `-IntegerLiteral 0x5aeac90 <col:21> 'int' 42
`-ReturnStmt 0x5aead68 <line:3:3, col:10>
`-ImplicitCastExpr 0x5aead50 <col:10> 'int' <LValueToRValue>
`-DeclRefExpr 0x5aead28 <col:10> 'int' lvalue Var 0x5aeac10 'result' 'int'
The toplevel declaration in
a translation unit is always the translation unit
declaration.
In this example, our first user written declaration is the function
declaration
of “f
”. The body of “f
” is a compound
statement,
whose child nodes are a declaration
statement
that declares our result variable, and the return
statement.
AST Context¶
All information about the AST for a translation unit is bundled up in the class ASTContext. It allows traversal of the whole translation unit starting from getTranslationUnitDecl, or to access Clang’s table of identifiers for the parsed translation unit.
AST Nodes¶
Clang’s AST nodes are modeled on a class hierarchy that does not have a common ancestor. Instead, there are multiple larger hierarchies for basic node types like Decl and Stmt. Many important AST nodes derive from Type, Decl, DeclContext or Stmt, with some classes deriving from both Decl and DeclContext.
There are also a multitude of nodes in the AST that are not part of a larger hierarchy, and are only reachable from specific other nodes, like CXXBaseSpecifier.
Thus, to traverse the full AST, one starts from the TranslationUnitDecl and then recursively traverses everything that can be reached from that node - this information has to be encoded for each specific node type. This algorithm is encoded in the RecursiveASTVisitor. See the RecursiveASTVisitor tutorial.
The two most basic nodes in the Clang AST are statements (Stmt) and declarations (Decl). Note that expressions (Expr) are also statements in Clang’s AST.
LibTooling¶
LibTooling is a library to support writing standalone tools based on Clang. This document will provide a basic walkthrough of how to write a tool using LibTooling.
For the information on how to setup Clang Tooling for LLVM see How To Setup Clang Tooling For LLVM
Introduction¶
Tools built with LibTooling, like Clang Plugins, run FrontendActions
over
code.
In this tutorial, we’ll demonstrate the different ways of running Clang’s
SyntaxOnlyAction
, which runs a quick syntax check, over a bunch of code.
Parsing a code snippet in memory¶
If you ever wanted to run a FrontendAction
over some sample code, for
example to unit test parts of the Clang AST, runToolOnCode
is what you
looked for. Let me give you an example:
#include "clang/Tooling/Tooling.h"
TEST(runToolOnCode, CanSyntaxCheckCode) {
// runToolOnCode returns whether the action was correctly run over the
// given code.
EXPECT_TRUE(runToolOnCode(new clang::SyntaxOnlyAction, "class X {};"));
}
Writing a standalone tool¶
Once you unit tested your FrontendAction
to the point where it cannot
possibly break, it’s time to create a standalone tool. For a standalone tool
to run clang, it first needs to figure out what command line arguments to use
for a specified file. To that end we create a CompilationDatabase
. There
are different ways to create a compilation database, and we need to support all
of them depending on command-line options. There’s the CommonOptionsParser
class that takes the responsibility to parse command-line parameters related to
compilation databases and inputs, so that all tools share the implementation.
Parsing common tools options¶
CompilationDatabase
can be read from a build directory or the command line.
Using CommonOptionsParser
allows for explicit specification of a compile
command line, specification of build path using the -p
command-line option,
and automatic location of the compilation database using source files paths.
#include "clang/Tooling/CommonOptionsParser.h"
#include "llvm/Support/CommandLine.h"
using namespace clang::tooling;
// Apply a custom category to all command-line options so that they are the
// only ones displayed.
static llvm::cl::OptionCategory MyToolCategory("my-tool options");
int main(int argc, const char **argv) {
// CommonOptionsParser constructor will parse arguments and create a
// CompilationDatabase. In case of error it will terminate the program.
CommonOptionsParser OptionsParser(argc, argv, MyToolCategory);
// Use OptionsParser.getCompilations() and OptionsParser.getSourcePathList()
// to retrieve CompilationDatabase and the list of input file paths.
}
Creating and running a ClangTool¶
Once we have a CompilationDatabase
, we can create a ClangTool
and run
our FrontendAction
over some code. For example, to run the
SyntaxOnlyAction
over the files “a.cc” and “b.cc” one would write:
// A clang tool can run over a number of sources in the same process...
std::vector<std::string> Sources;
Sources.push_back("a.cc");
Sources.push_back("b.cc");
// We hand the CompilationDatabase we created and the sources to run over into
// the tool constructor.
ClangTool Tool(OptionsParser.getCompilations(), Sources);
// The ClangTool needs a new FrontendAction for each translation unit we run
// on. Thus, it takes a FrontendActionFactory as parameter. To create a
// FrontendActionFactory from a given FrontendAction type, we call
// newFrontendActionFactory<clang::SyntaxOnlyAction>().
int result = Tool.run(newFrontendActionFactory<clang::SyntaxOnlyAction>().get());
Putting it together — the first tool¶
Now we combine the two previous steps into our first real tool. A more advanced
version of this example tool is also checked into the clang tree at
tools/clang-check/ClangCheck.cpp
.
// Declares clang::SyntaxOnlyAction.
#include "clang/Frontend/FrontendActions.h"
#include "clang/Tooling/CommonOptionsParser.h"
#include "clang/Tooling/Tooling.h"
// Declares llvm::cl::extrahelp.
#include "llvm/Support/CommandLine.h"
using namespace clang::tooling;
using namespace llvm;
// Apply a custom category to all command-line options so that they are the
// only ones displayed.
static cl::OptionCategory MyToolCategory("my-tool options");
// CommonOptionsParser declares HelpMessage with a description of the common
// command-line options related to the compilation database and input files.
// It's nice to have this help message in all tools.
static cl::extrahelp CommonHelp(CommonOptionsParser::HelpMessage);
// A help message for this specific tool can be added afterwards.
static cl::extrahelp MoreHelp("\nMore help text...\n");
int main(int argc, const char **argv) {
CommonOptionsParser OptionsParser(argc, argv, MyToolCategory);
ClangTool Tool(OptionsParser.getCompilations(),
OptionsParser.getSourcePathList());
return Tool.run(newFrontendActionFactory<clang::SyntaxOnlyAction>().get());
}
Running the tool on some code¶
When you check out and build clang, clang-check is already built and available to you in bin/clang-check inside your build directory.
You can run clang-check on a file in the llvm repository by specifying all the
needed parameters after a “--
” separator:
$ cd /path/to/source/llvm
$ export BD=/path/to/build/llvm
$ $BD/bin/clang-check tools/clang/tools/clang-check/ClangCheck.cpp -- \
clang++ -D__STDC_CONSTANT_MACROS -D__STDC_LIMIT_MACROS \
-Itools/clang/include -I$BD/include -Iinclude \
-Itools/clang/lib/Headers -c
As an alternative, you can also configure cmake to output a compile command database into its build directory:
# Alternatively to calling cmake, use ccmake, toggle to advanced mode and
# set the parameter CMAKE_EXPORT_COMPILE_COMMANDS from the UI.
$ cmake -DCMAKE_EXPORT_COMPILE_COMMANDS=ON .
This creates a file called compile_commands.json
in the build directory.
Now you can run clang-check over files in the project by specifying
the build path as first argument and some source files as further positional
arguments:
$ cd /path/to/source/llvm
$ export BD=/path/to/build/llvm
$ $BD/bin/clang-check -p $BD tools/clang/tools/clang-check/ClangCheck.cpp
Builtin includes¶
Clang tools need their builtin headers and search for them the same way Clang
does. Thus, the default location to look for builtin headers is in a path
$(dirname /path/to/tool)/../lib/clang/3.3/include
relative to the tool
binary. This works out-of-the-box for tools running from llvm’s toplevel
binary directory after building clang-headers, or if the tool is running from
the binary directory of a clang install next to the clang binary.
Tips: if your tool fails to find stddef.h
or similar headers, call the tool
with -v
and look at the search paths it looks through.
Linking¶
For a list of libraries to link, look at one of the tools’ Makefiles (for example clang-check/Makefile).
LibFormat¶
LibFormat is a library that implements automatic source code formatting based on Clang. This documents describes the LibFormat interface and design as well as some basic style discussions.
If you just want to use clang-format as a tool or integrated into an editor, checkout ClangFormat.
Design¶
FIXME: Write up design.
Interface¶
The core routine of LibFormat is reformat()
:
tooling::Replacements reformat(const FormatStyle &Style, Lexer &Lex,
SourceManager &SourceMgr,
std::vector<CharSourceRange> Ranges);
This reads a token stream out of the lexer Lex
and reformats all the code
ranges in Ranges
. The FormatStyle
controls basic decisions made during
formatting. A list of options can be found under Style Options.
The style options are described in Clang-Format Style Options.
Style Options¶
The style options describe specific formatting options that can be used in order to make ClangFormat comply with different style guides. Currently, two style guides are hard-coded:
/// Returns a format style complying with the LLVM coding standards:
/// http://llvm.org/docs/CodingStandards.html.
FormatStyle getLLVMStyle();
/// Returns a format style complying with Google's C++ style guide:
/// http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml.
FormatStyle getGoogleStyle();
These options are also exposed in the standalone tools through the -style option.
In the future, we plan on making this configurable.
Clang Plugins¶
Clang Plugins make it possible to run extra user defined actions during a compilation. This document will provide a basic walkthrough of how to write and run a Clang Plugin.
Introduction¶
Clang Plugins run FrontendActions over code. See the FrontendAction
tutorial on how to write a FrontendAction
using the
RecursiveASTVisitor
. In this tutorial, we’ll demonstrate how to write a
simple clang plugin.
Writing a PluginASTAction
¶
The main difference from writing normal FrontendActions
is that you can
handle plugin command line options. The PluginASTAction
base class declares
a ParseArgs
method which you have to implement in your plugin.
bool ParseArgs(const CompilerInstance &CI,
const std::vector<std::string>& args) {
for (unsigned i = 0, e = args.size(); i != e; ++i) {
if (args[i] == "-some-arg") {
// Handle the command line argument.
}
}
return true;
}
Registering a plugin¶
A plugin is loaded from a dynamic library at runtime by the compiler. To
register a plugin in a library, use FrontendPluginRegistry::Add<>
:
static FrontendPluginRegistry::Add<MyPlugin> X("my-plugin-name", "my plugin description");
Defining pragmas¶
Plugins can also define pragmas by declaring a PragmaHandler
and
registering it using PragmaHandlerRegistry::Add<>
:
// Define a pragma handler for #pragma example_pragma
class ExamplePragmaHandler : public PragmaHandler {
public:
ExamplePragmaHandler() : PragmaHandler("example_pragma") { }
void HandlePragma(Preprocessor &PP, PragmaIntroducerKind Introducer,
Token &PragmaTok) {
// Handle the pragma
}
};
static PragmaHandlerRegistry::Add<ExamplePragmaHandler> Y("example_pragma","example pragma description");
Putting it all together¶
Let’s look at an example plugin that prints top-level function names. This example is checked into the clang repository; please take a look at the latest version of PrintFunctionNames.cpp.
Running the plugin¶
Using the cc1 command line¶
To run a plugin, the dynamic library containing the plugin registry must be loaded via the -load command line option. This will load all plugins that are registered, and you can select the plugins to run by specifying the -plugin option. Additional parameters for the plugins can be passed with -plugin-arg-<plugin-name>.
Note that those options must reach clang’s cc1 process. There are two ways to do so:
- Directly call the parsing process by using the -cc1 option; this has the downside of not configuring the default header search paths, so you’ll need to specify the full system path configuration on the command line.
- Use clang as usual, but prefix all arguments to the cc1 process with -Xclang.
For example, to run the print-function-names
plugin over a source file in
clang, first build the plugin, and then call clang with the plugin from the
source tree:
$ export BD=/path/to/build/directory
$ (cd $BD && make PrintFunctionNames )
$ clang++ -D_GNU_SOURCE -D_DEBUG -D__STDC_CONSTANT_MACROS \
-D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS -D_GNU_SOURCE \
-I$BD/tools/clang/include -Itools/clang/include -I$BD/include -Iinclude \
tools/clang/tools/clang-check/ClangCheck.cpp -fsyntax-only \
-Xclang -load -Xclang $BD/lib/PrintFunctionNames.so -Xclang \
-plugin -Xclang print-fns
Also see the print-function-name plugin example’s README
Using the clang command line¶
Using -fplugin=plugin on the clang command line passes the plugin
through as an argument to -load on the cc1 command line. If the plugin
class implements the getActionType
method then the plugin is run
automatically. For example, to run the plugin automatically after the main AST
action (i.e. the same as using -add-plugin):
// Automatically run the plugin after the main AST action
PluginASTAction::ActionType getActionType() override {
return AddAfterMainAction;
}
How to write RecursiveASTVisitor based ASTFrontendActions.¶
Introduction¶
In this tutorial you will learn how to create a FrontendAction that uses a RecursiveASTVisitor to find CXXRecordDecl AST nodes with a specified name.
Creating a FrontendAction¶
When writing a clang based tool like a Clang Plugin or a standalone tool based on LibTooling, the common entry point is the FrontendAction. FrontendAction is an interface that allows execution of user specific actions as part of the compilation. To run tools over the AST clang provides the convenience interface ASTFrontendAction, which takes care of executing the action. The only part left is to implement the CreateASTConsumer method that returns an ASTConsumer per translation unit.
class FindNamedClassAction : public clang::ASTFrontendAction {
public:
virtual std::unique_ptr<clang::ASTConsumer> CreateASTConsumer(
clang::CompilerInstance &Compiler, llvm::StringRef InFile) {
return std::unique_ptr<clang::ASTConsumer>(
new FindNamedClassConsumer);
}
};
Creating an ASTConsumer¶
ASTConsumer is an interface used to write generic actions on an AST, regardless of how the AST was produced. ASTConsumer provides many different entry points, but for our use case the only one needed is HandleTranslationUnit, which is called with the ASTContext for the translation unit.
class FindNamedClassConsumer : public clang::ASTConsumer {
public:
virtual void HandleTranslationUnit(clang::ASTContext &Context) {
// Traversing the translation unit decl via a RecursiveASTVisitor
// will visit all nodes in the AST.
Visitor.TraverseDecl(Context.getTranslationUnitDecl());
}
private:
// A RecursiveASTVisitor implementation.
FindNamedClassVisitor Visitor;
};
Using the RecursiveASTVisitor¶
Now that everything is hooked up, the next step is to implement a RecursiveASTVisitor to extract the relevant information from the AST.
The RecursiveASTVisitor provides hooks of the form bool VisitNodeType(NodeType *) for most AST nodes; the exception are TypeLoc nodes, which are passed by-value. We only need to implement the methods for the relevant node types.
Let’s start by writing a RecursiveASTVisitor that visits all CXXRecordDecl’s.
class FindNamedClassVisitor
: public RecursiveASTVisitor<FindNamedClassVisitor> {
public:
bool VisitCXXRecordDecl(CXXRecordDecl *Declaration) {
// For debugging, dumping the AST nodes will show which nodes are already
// being visited.
Declaration->dump();
// The return value indicates whether we want the visitation to proceed.
// Return false to stop the traversal of the AST.
return true;
}
};
In the methods of our RecursiveASTVisitor we can now use the full power of the Clang AST to drill through to the parts that are interesting for us. For example, to find all class declaration with a certain name, we can check for a specific qualified name:
bool VisitCXXRecordDecl(CXXRecordDecl *Declaration) {
if (Declaration->getQualifiedNameAsString() == "n::m::C")
Declaration->dump();
return true;
}
Accessing the SourceManager and ASTContext¶
Some of the information about the AST, like source locations and global identifier information, are not stored in the AST nodes themselves, but in the ASTContext and its associated source manager. To retrieve them we need to hand the ASTContext into our RecursiveASTVisitor implementation.
The ASTContext is available from the CompilerInstance during the call to CreateASTConsumer. We can thus extract it there and hand it into our freshly created FindNamedClassConsumer:
virtual std::unique_ptr<clang::ASTConsumer> CreateASTConsumer(
clang::CompilerInstance &Compiler, llvm::StringRef InFile) {
return std::unique_ptr<clang::ASTConsumer>(
new FindNamedClassConsumer(&Compiler.getASTContext()));
}
Now that the ASTContext is available in the RecursiveASTVisitor, we can do more interesting things with AST nodes, like looking up their source locations:
bool VisitCXXRecordDecl(CXXRecordDecl *Declaration) {
if (Declaration->getQualifiedNameAsString() == "n::m::C") {
// getFullLoc uses the ASTContext's SourceManager to resolve the source
// location and break it up into its line and column parts.
FullSourceLoc FullLocation = Context->getFullLoc(Declaration->getBeginLoc());
if (FullLocation.isValid())
llvm::outs() << "Found declaration at "
<< FullLocation.getSpellingLineNumber() << ":"
<< FullLocation.getSpellingColumnNumber() << "\n";
}
return true;
}
Putting it all together¶
Now we can combine all of the above into a small example program:
#include "clang/AST/ASTConsumer.h"
#include "clang/AST/RecursiveASTVisitor.h"
#include "clang/Frontend/CompilerInstance.h"
#include "clang/Frontend/FrontendAction.h"
#include "clang/Tooling/Tooling.h"
using namespace clang;
class FindNamedClassVisitor
: public RecursiveASTVisitor<FindNamedClassVisitor> {
public:
explicit FindNamedClassVisitor(ASTContext *Context)
: Context(Context) {}
bool VisitCXXRecordDecl(CXXRecordDecl *Declaration) {
if (Declaration->getQualifiedNameAsString() == "n::m::C") {
FullSourceLoc FullLocation = Context->getFullLoc(Declaration->getBeginLoc());
if (FullLocation.isValid())
llvm::outs() << "Found declaration at "
<< FullLocation.getSpellingLineNumber() << ":"
<< FullLocation.getSpellingColumnNumber() << "\n";
}
return true;
}
private:
ASTContext *Context;
};
class FindNamedClassConsumer : public clang::ASTConsumer {
public:
explicit FindNamedClassConsumer(ASTContext *Context)
: Visitor(Context) {}
virtual void HandleTranslationUnit(clang::ASTContext &Context) {
Visitor.TraverseDecl(Context.getTranslationUnitDecl());
}
private:
FindNamedClassVisitor Visitor;
};
class FindNamedClassAction : public clang::ASTFrontendAction {
public:
virtual std::unique_ptr<clang::ASTConsumer> CreateASTConsumer(
clang::CompilerInstance &Compiler, llvm::StringRef InFile) {
return std::unique_ptr<clang::ASTConsumer>(
new FindNamedClassConsumer(&Compiler.getASTContext()));
}
};
int main(int argc, char **argv) {
if (argc > 1) {
clang::tooling::runToolOnCode(new FindNamedClassAction, argv[1]);
}
}
We store this into a file called FindClassDecls.cpp and create the following CMakeLists.txt to link it:
add_clang_executable(find-class-decls FindClassDecls.cpp)
target_link_libraries(find-class-decls clangTooling)
When running this tool over a small code snippet it will output all declarations of a class n::m::C it found:
$ ./bin/find-class-decls "namespace n { namespace m { class C {}; } }"
Found declaration at 1:29
Tutorial for building tools using LibTooling and LibASTMatchers¶
This document is intended to show how to build a useful source-to-source translation tool based on Clang’s LibTooling. It is explicitly aimed at people who are new to Clang, so all you should need is a working knowledge of C++ and the command line.
In order to work on the compiler, you need some basic knowledge of the abstract syntax tree (AST). To this end, the reader is incouraged to skim the Introduction to the Clang AST
Step 0: Obtaining Clang¶
As Clang is part of the LLVM project, you’ll need to download LLVM’s source code first. Both Clang and LLVM are maintained as Subversion repositories, but we’ll be accessing them through the git mirror. For further information, see the getting started guide.
mkdir ~/clang-llvm && cd ~/clang-llvm
git clone http://llvm.org/git/llvm.git
cd llvm/tools
git clone http://llvm.org/git/clang.git
cd clang/tools
git clone http://llvm.org/git/clang-tools-extra.git extra
Next you need to obtain the CMake build system and Ninja build tool. You may already have CMake installed, but current binary versions of CMake aren’t built with Ninja support.
cd ~/clang-llvm
git clone https://github.com/martine/ninja.git
cd ninja
git checkout release
./bootstrap.py
sudo cp ninja /usr/bin/
cd ~/clang-llvm
git clone git://cmake.org/stage/cmake.git
cd cmake
git checkout next
./bootstrap
make
sudo make install
Okay. Now we’ll build Clang!
cd ~/clang-llvm
mkdir build && cd build
cmake -G Ninja ../llvm -DLLVM_BUILD_TESTS=ON # Enable tests; default is off.
ninja
ninja check # Test LLVM only.
ninja clang-test # Test Clang only.
ninja install
And we’re live.
All of the tests should pass, though there is a (very) small chance that
you can catch LLVM and Clang out of sync. Running 'git svn rebase'
in both the llvm and clang directories should fix any problems.
Finally, we want to set Clang as its own compiler.
cd ~/clang-llvm/build
ccmake ../llvm
The second command will bring up a GUI for configuring Clang. You need
to set the entry for CMAKE_CXX_COMPILER
. Press 't'
to turn on
advanced mode. Scroll down to CMAKE_CXX_COMPILER
, and set it to
/usr/bin/clang++
, or wherever you installed it. Press 'c'
to
configure, then 'g'
to generate CMake’s files.
Finally, run ninja one last time, and you’re done.
Step 1: Create a ClangTool¶
Now that we have enough background knowledge, it’s time to create the
simplest productive ClangTool in existence: a syntax checker. While this
already exists as clang-check
, it’s important to understand what’s
going on.
First, we’ll need to create a new directory for our tool and tell CMake
that it exists. As this is not going to be a core clang tool, it will
live in the tools/extra
repository.
cd ~/clang-llvm/llvm/tools/clang
mkdir tools/extra/loop-convert
echo 'add_subdirectory(loop-convert)' >> tools/extra/CMakeLists.txt
vim tools/extra/loop-convert/CMakeLists.txt
CMakeLists.txt should have the following contents:
set(LLVM_LINK_COMPONENTS support)
add_clang_executable(loop-convert
LoopConvert.cpp
)
target_link_libraries(loop-convert
clangTooling
clangBasic
clangASTMatchers
)
With that done, Ninja will be able to compile our tool. Let’s give it
something to compile! Put the following into
tools/extra/loop-convert/LoopConvert.cpp
. A detailed explanation of
why the different parts are needed can be found in the LibTooling
documentation.
// Declares clang::SyntaxOnlyAction.
#include "clang/Frontend/FrontendActions.h"
#include "clang/Tooling/CommonOptionsParser.h"
#include "clang/Tooling/Tooling.h"
// Declares llvm::cl::extrahelp.
#include "llvm/Support/CommandLine.h"
using namespace clang::tooling;
using namespace llvm;
// Apply a custom category to all command-line options so that they are the
// only ones displayed.
static llvm::cl::OptionCategory MyToolCategory("my-tool options");
// CommonOptionsParser declares HelpMessage with a description of the common
// command-line options related to the compilation database and input files.
// It's nice to have this help message in all tools.
static cl::extrahelp CommonHelp(CommonOptionsParser::HelpMessage);
// A help message for this specific tool can be added afterwards.
static cl::extrahelp MoreHelp("\nMore help text...\n");
int main(int argc, const char **argv) {
CommonOptionsParser OptionsParser(argc, argv, MyToolCategory);
ClangTool Tool(OptionsParser.getCompilations(),
OptionsParser.getSourcePathList());
return Tool.run(newFrontendActionFactory<clang::SyntaxOnlyAction>().get());
}
And that’s it! You can compile our new tool by running ninja from the
build
directory.
cd ~/clang-llvm/build
ninja
You should now be able to run the syntax checker, which is located in
~/clang-llvm/build/bin
, on any source file. Try it!
echo "int main() { return 0; }" > test.cpp
bin/loop-convert test.cpp --
Note the two dashes after we specify the source file. The additional options for the compiler are passed after the dashes rather than loading them from a compilation database - there just aren’t any options needed right now.
Intermezzo: Learn AST matcher basics¶
Clang recently introduced the ASTMatcher library to provide a simple, powerful, and concise way to describe specific patterns in the AST. Implemented as a DSL powered by macros and templates (see ASTMatchers.h if you’re curious), matchers offer the feel of algebraic data types common to functional programming languages.
For example, suppose you wanted to examine only binary operators. There
is a matcher to do exactly that, conveniently named binaryOperator
.
I’ll give you one guess what this matcher does:
binaryOperator(hasOperatorName("+"), hasLHS(integerLiteral(equals(0))))
Shockingly, it will match against addition expressions whose left hand
side is exactly the literal 0. It will not match against other forms of
0, such as '\0'
or NULL
, but it will match against macros that
expand to 0. The matcher will also not match against calls to the
overloaded operator '+'
, as there is a separate operatorCallExpr
matcher to handle overloaded operators.
There are AST matchers to match all the different nodes of the AST, narrowing matchers to only match AST nodes fulfilling specific criteria, and traversal matchers to get from one kind of AST node to another. For a complete list of AST matchers, take a look at the AST Matcher References
All matcher that are nouns describe entities in the AST and can be
bound, so that they can be referred to whenever a match is found. To do
so, simply call the method bind
on these matchers, e.g.:
variable(hasType(isInteger())).bind("intvar")
Step 2: Using AST matchers¶
Okay, on to using matchers for real. Let’s start by defining a matcher
which will capture all for
statements that define a new variable
initialized to zero. Let’s start with matching all for
loops:
forStmt()
Next, we want to specify that a single variable is declared in the first portion of the loop, so we can extend the matcher to
forStmt(hasLoopInit(declStmt(hasSingleDecl(varDecl()))))
Finally, we can add the condition that the variable is initialized to zero.
forStmt(hasLoopInit(declStmt(hasSingleDecl(varDecl(
hasInitializer(integerLiteral(equals(0))))))))
It is fairly easy to read and understand the matcher definition (“match
loops whose init portion declares a single variable which is initialized
to the integer literal 0”), but deciding that every piece is necessary
is more difficult. Note that this matcher will not match loops whose
variables are initialized to '\0'
, 0.0
, NULL
, or any form of
zero besides the integer 0.
The last step is giving the matcher a name and binding the ForStmt
as we will want to do something with it:
StatementMatcher LoopMatcher =
forStmt(hasLoopInit(declStmt(hasSingleDecl(varDecl(
hasInitializer(integerLiteral(equals(0)))))))).bind("forLoop");
Once you have defined your matchers, you will need to add a little more
scaffolding in order to run them. Matchers are paired with a
MatchCallback
and registered with a MatchFinder
object, then run
from a ClangTool
. More code!
Add the following to LoopConvert.cpp
:
#include "clang/ASTMatchers/ASTMatchers.h"
#include "clang/ASTMatchers/ASTMatchFinder.h"
using namespace clang;
using namespace clang::ast_matchers;
StatementMatcher LoopMatcher =
forStmt(hasLoopInit(declStmt(hasSingleDecl(varDecl(
hasInitializer(integerLiteral(equals(0)))))))).bind("forLoop");
class LoopPrinter : public MatchFinder::MatchCallback {
public :
virtual void run(const MatchFinder::MatchResult &Result) {
if (const ForStmt *FS = Result.Nodes.getNodeAs<clang::ForStmt>("forLoop"))
FS->dump();
}
};
And change main()
to:
int main(int argc, const char **argv) {
CommonOptionsParser OptionsParser(argc, argv, MyToolCategory);
ClangTool Tool(OptionsParser.getCompilations(),
OptionsParser.getSourcePathList());
LoopPrinter Printer;
MatchFinder Finder;
Finder.addMatcher(LoopMatcher, &Printer);
return Tool.run(newFrontendActionFactory(&Finder).get());
}
Now, you should be able to recompile and run the code to discover for loops. Create a new file with a few examples, and test out our new handiwork:
cd ~/clang-llvm/llvm/llvm_build/
ninja loop-convert
vim ~/test-files/simple-loops.cc
bin/loop-convert ~/test-files/simple-loops.cc
Step 3.5: More Complicated Matchers¶
Our simple matcher is capable of discovering for loops, but we would still need to filter out many more ourselves. We can do a good portion of the remaining work with some cleverly chosen matchers, but first we need to decide exactly which properties we want to allow.
How can we characterize for loops over arrays which would be eligible
for translation to range-based syntax? Range based loops over arrays of
size N
that:
- start at index
0
- iterate consecutively
- end at index
N-1
We already check for (1), so all we need to add is a check to the loop’s
condition to ensure that the loop’s index variable is compared against
N
and another check to ensure that the increment step just
increments this same variable. The matcher for (2) is straightforward:
require a pre- or post-increment of the same variable declared in the
init portion.
Unfortunately, such a matcher is impossible to write. Matchers contain no logic for comparing two arbitrary AST nodes and determining whether or not they are equal, so the best we can do is matching more than we would like to allow, and punting extra comparisons to the callback.
In any case, we can start building this sub-matcher. We can require that the increment step be a unary increment like this:
hasIncrement(unaryOperator(hasOperatorName("++")))
Specifying what is incremented introduces another quirk of Clang’s AST:
Usages of variables are represented as DeclRefExpr
’s (“declaration
reference expressions”) because they are expressions which refer to
variable declarations. To find a unaryOperator
that refers to a
specific declaration, we can simply add a second condition to it:
hasIncrement(unaryOperator(
hasOperatorName("++"),
hasUnaryOperand(declRefExpr())))
Furthermore, we can restrict our matcher to only match if the incremented variable is an integer:
hasIncrement(unaryOperator(
hasOperatorName("++"),
hasUnaryOperand(declRefExpr(to(varDecl(hasType(isInteger())))))))
And the last step will be to attach an identifier to this variable, so that we can retrieve it in the callback:
hasIncrement(unaryOperator(
hasOperatorName("++"),
hasUnaryOperand(declRefExpr(to(
varDecl(hasType(isInteger())).bind("incrementVariable"))))))
We can add this code to the definition of LoopMatcher
and make sure
that our program, outfitted with the new matcher, only prints out loops
that declare a single variable initialized to zero and have an increment
step consisting of a unary increment of some variable.
Now, we just need to add a matcher to check if the condition part of the
for
loop compares a variable against the size of the array. There is
only one problem - we don’t know which array we’re iterating over
without looking at the body of the loop! We are again restricted to
approximating the result we want with matchers, filling in the details
in the callback. So we start with:
hasCondition(binaryOperator(hasOperatorName("<"))
It makes sense to ensure that the left-hand side is a reference to a variable, and that the right-hand side has integer type.
hasCondition(binaryOperator(
hasOperatorName("<"),
hasLHS(declRefExpr(to(varDecl(hasType(isInteger()))))),
hasRHS(expr(hasType(isInteger())))))
Why? Because it doesn’t work. Of the three loops provided in
test-files/simple.cpp
, zero of them have a matching condition. A
quick look at the AST dump of the first for loop, produced by the
previous iteration of loop-convert, shows us the answer:
(ForStmt 0x173b240
(DeclStmt 0x173afc8
0x173af50 "int i =
(IntegerLiteral 0x173afa8 'int' 0)")
<<>>
(BinaryOperator 0x173b060 '_Bool' '<'
(ImplicitCastExpr 0x173b030 'int'
(DeclRefExpr 0x173afe0 'int' lvalue Var 0x173af50 'i' 'int'))
(ImplicitCastExpr 0x173b048 'int'
(DeclRefExpr 0x173b008 'const int' lvalue Var 0x170fa80 'N' 'const int')))
(UnaryOperator 0x173b0b0 'int' lvalue prefix '++'
(DeclRefExpr 0x173b088 'int' lvalue Var 0x173af50 'i' 'int'))
(CompoundStatement ...
We already know that the declaration and increments both match, or this
loop wouldn’t have been dumped. The culprit lies in the implicit cast
applied to the first operand (i.e. the LHS) of the less-than operator,
an L-value to R-value conversion applied to the expression referencing
i
. Thankfully, the matcher library offers a solution to this problem
in the form of ignoringParenImpCasts
, which instructs the matcher to
ignore implicit casts and parentheses before continuing to match.
Adjusting the condition operator will restore the desired match.
hasCondition(binaryOperator(
hasOperatorName("<"),
hasLHS(ignoringParenImpCasts(declRefExpr(
to(varDecl(hasType(isInteger())))))),
hasRHS(expr(hasType(isInteger())))))
After adding binds to the expressions we wished to capture and extracting the identifier strings into variables, we have array-step-2 completed.
Step 4: Retrieving Matched Nodes¶
So far, the matcher callback isn’t very interesting: it just dumps the loop’s AST. At some point, we will need to make changes to the input source code. Next, we’ll work on using the nodes we bound in the previous step.
The MatchFinder::run()
callback takes a
MatchFinder::MatchResult&
as its parameter. We’re most interested in
its Context
and Nodes
members. Clang uses the ASTContext
class to represent contextual information about the AST, as the name
implies, though the most functionally important detail is that several
operations require an ASTContext*
parameter. More immediately useful
is the set of matched nodes, and how we retrieve them.
Since we bind three variables (identified by ConditionVarName,
InitVarName, and IncrementVarName), we can obtain the matched nodes by
using the getNodeAs()
member function.
In LoopConvert.cpp
add
#include "clang/AST/ASTContext.h"
Change LoopMatcher
to
StatementMatcher LoopMatcher =
forStmt(hasLoopInit(declStmt(
hasSingleDecl(varDecl(hasInitializer(integerLiteral(equals(0))))
.bind("initVarName")))),
hasIncrement(unaryOperator(
hasOperatorName("++"),
hasUnaryOperand(declRefExpr(
to(varDecl(hasType(isInteger())).bind("incVarName")))))),
hasCondition(binaryOperator(
hasOperatorName("<"),
hasLHS(ignoringParenImpCasts(declRefExpr(
to(varDecl(hasType(isInteger())).bind("condVarName"))))),
hasRHS(expr(hasType(isInteger())))))).bind("forLoop");
And change LoopPrinter::run
to
void LoopPrinter::run(const MatchFinder::MatchResult &Result) {
ASTContext *Context = Result.Context;
const ForStmt *FS = Result.Nodes.getNodeAs<ForStmt>("forLoop");
// We do not want to convert header files!
if (!FS || !Context->getSourceManager().isWrittenInMainFile(FS->getForLoc()))
return;
const VarDecl *IncVar = Result.Nodes.getNodeAs<VarDecl>("incVarName");
const VarDecl *CondVar = Result.Nodes.getNodeAs<VarDecl>("condVarName");
const VarDecl *InitVar = Result.Nodes.getNodeAs<VarDecl>("initVarName");
if (!areSameVariable(IncVar, CondVar) || !areSameVariable(IncVar, InitVar))
return;
llvm::outs() << "Potential array-based loop discovered.\n";
}
Clang associates a VarDecl
with each variable to represent the variable’s
declaration. Since the “canonical” form of each declaration is unique by
address, all we need to do is make sure neither ValueDecl
(base class of
VarDecl
) is NULL
and compare the canonical Decls.
static bool areSameVariable(const ValueDecl *First, const ValueDecl *Second) {
return First && Second &&
First->getCanonicalDecl() == Second->getCanonicalDecl();
}
If execution reaches the end of LoopPrinter::run()
, we know that the
loop shell that looks like
for (int i= 0; i < expr(); ++i) { ... }
For now, we will just print a message explaining that we found a loop. The next section will deal with recursively traversing the AST to discover all changes needed.
As a side note, it’s not as trivial to test if two expressions are the same, though Clang has already done the hard work for us by providing a way to canonicalize expressions:
static bool areSameExpr(ASTContext *Context, const Expr *First,
const Expr *Second) {
if (!First || !Second)
return false;
llvm::FoldingSetNodeID FirstID, SecondID;
First->Profile(FirstID, *Context, true);
Second->Profile(SecondID, *Context, true);
return FirstID == SecondID;
}
This code relies on the comparison between two
llvm::FoldingSetNodeIDs
. As the documentation for
Stmt::Profile()
indicates, the Profile()
member function builds
a description of a node in the AST, based on its properties, along with
those of its children. FoldingSetNodeID
then serves as a hash we can
use to compare expressions. We will need areSameExpr
later. Before
you run the new code on the additional loops added to
test-files/simple.cpp, try to figure out which ones will be considered
potentially convertible.
Matching the Clang AST¶
This document explains how to use Clang’s LibASTMatchers to match interesting nodes of the AST and execute code that uses the matched nodes. Combined with LibTooling, LibASTMatchers helps to write code-to-code transformation tools or query tools.
We assume basic knowledge about the Clang AST. See the Introduction to the Clang AST if you want to learn more about how the AST is structured.
Introduction¶
LibASTMatchers provides a domain specific language to create predicates on Clang’s AST. This DSL is written in and can be used from C++, allowing users to write a single program to both match AST nodes and access the node’s C++ interface to extract attributes, source locations, or any other information provided on the AST level.
AST matchers are predicates on nodes in the AST. Matchers are created by calling creator functions that allow building up a tree of matchers, where inner matchers are used to make the match more specific.
For example, to create a matcher that matches all class or union declarations
in the AST of a translation unit, you can call recordDecl(). To narrow the match down,
for example to find all class or union declarations with the name “Foo
”,
insert a hasName matcher: the
call recordDecl(hasName("Foo"))
returns a matcher that matches classes or
unions that are named “Foo
”, in any namespace. By default, matchers that
accept multiple inner matchers use an implicit allOf(). This allows further narrowing
down the match, for example to match all classes that are derived from
“Bar
”: recordDecl(hasName("Foo"), isDerivedFrom("Bar"))
.
How to create a matcher¶
With more than a thousand classes in the Clang AST, one can quickly get lost when trying to figure out how to create a matcher for a specific pattern. This section will teach you how to use a rigorous step-by-step pattern to build the matcher you are interested in. Note that there will always be matchers missing for some part of the AST. See the section about how to write your own AST matchers later in this document.
The precondition to using the matchers is to understand how the AST for what you want to match looks like. The Introduction to the Clang AST teaches you how to dump a translation unit’s AST into a human readable format.
In general, the strategy to create the right matchers is:
- Find the outermost class in Clang’s AST you want to match.
- Look at the AST Matcher Reference for matchers that either match the node you’re interested in or narrow down attributes on the node.
- Create your outer match expression. Verify that it works as expected.
- Examine the matchers for what the next inner node you want to match is.
- Repeat until the matcher is finished.
Binding nodes in match expressions¶
Matcher expressions allow you to specify which parts of the AST are interesting for a certain task. Often you will want to then do something with the nodes that were matched, like building source code transformations.
To that end, matchers that match specific AST nodes (so called node matchers)
are bindable; for example, recordDecl(hasName("MyClass")).bind("id")
will
bind the matched recordDecl
node to the string “id
”, to be later
retrieved in the match callback.
Writing your own matchers¶
There are multiple different ways to define a matcher, depending on its type and flexibility.
VariadicDynCastAllOfMatcher<Base, Derived>
¶
Those match all nodes of type Base if they can be dynamically casted to
Derived. The names of those matchers are nouns, which closely resemble
Derived. VariadicDynCastAllOfMatchers
are the backbone of the matcher
hierarchy. Most often, your match expression will start with one of them, and
you can bind the node they represent to ids for later
processing.
VariadicDynCastAllOfMatchers
are callable classes that model variadic
template functions in C++03. They take an arbitrary number of
Matcher<Derived>
and return a Matcher<Base>
.
AST_MATCHER_P(Type, Name, ParamType, Param)
¶
Most matcher definitions use the matcher creation macros. Those define both
the matcher of type Matcher<Type>
itself, and a matcher-creation function
named Name that takes a parameter of type ParamType and returns the
corresponding matcher.
There are multiple matcher definition macros that deal with polymorphic return values and different parameter counts. See ASTMatchersMacros.h.
Matcher creation functions¶
Matchers are generated by nesting calls to matcher creation functions. Most of
the time those functions are either created by using
VariadicDynCastAllOfMatcher
or the matcher creation macros (see below).
The free-standing functions are an indication that this matcher is just a
combination of other matchers, as is for example the case with callee.
How To Setup Clang Tooling For LLVM¶
Clang Tooling provides infrastructure to write tools that need syntactic
and semantic information about a program. This term also relates to a set
of specific tools using this infrastructure (e.g. clang-check
). This
document provides information on how to set up and use Clang Tooling for
the LLVM source code.
Introduction¶
Clang Tooling needs a compilation database to figure out specific build
options for each file. Currently it can create a compilation database
from the compile_commands.json
file, generated by CMake. When
invoking clang tools, you can either specify a path to a build directory
using a command line parameter -p
or let Clang Tooling find this
file in your source tree. In either case you need to configure your
build using CMake to use clang tools.
Setup Clang Tooling Using CMake and Make¶
If you intend to use make to build LLVM, you should have CMake 2.8.6 or later installed (can be found here).
First, you need to generate Makefiles for LLVM with CMake. You need to make a build directory and run CMake from it:
$ mkdir your/build/directory
$ cd your/build/directory
$ cmake -DCMAKE_EXPORT_COMPILE_COMMANDS=ON path/to/llvm/sources
If you want to use clang instead of GCC, you can add
-DCMAKE_C_COMPILER=/path/to/clang -DCMAKE_CXX_COMPILER=/path/to/clang++
.
You can also use ccmake
, which provides a curses interface to configure
CMake variables for lazy people.
As a result, the new compile_commands.json
file should appear in the
current directory. You should link it to the LLVM source tree so that
Clang Tooling is able to use it:
$ ln -s $PWD/compile_commands.json path/to/llvm/source/
Now you are ready to build and test LLVM using make:
$ make check-all
Using Clang Tools¶
After you completed the previous steps, you are ready to run clang tools. If
you have a recent clang installed, you should have clang-check
in
$PATH
. Try to run it on any .cpp
file inside the LLVM source tree:
$ clang-check tools/clang/lib/Tooling/CompilationDatabase.cpp
If you’re using vim, it’s convenient to have clang-check integrated. Put
this into your .vimrc
:
function! ClangCheckImpl(cmd)
if &autowrite | wall | endif
echo "Running " . a:cmd . " ..."
let l:output = system(a:cmd)
cexpr l:output
cwindow
let w:quickfix_title = a:cmd
if v:shell_error != 0
cc
endif
let g:clang_check_last_cmd = a:cmd
endfunction
function! ClangCheck()
let l:filename = expand('%')
if l:filename =~ '\.\(cpp\|cxx\|cc\|c\)$'
call ClangCheckImpl("clang-check " . l:filename)
elseif exists("g:clang_check_last_cmd")
call ClangCheckImpl(g:clang_check_last_cmd)
else
echo "Can't detect file's compilation arguments and no previous clang-check invocation!"
endif
endfunction
nmap <silent> <F5> :call ClangCheck()<CR><CR>
When editing a .cpp/.cxx/.cc/.c file, hit F5 to reparse the file. In
case the current file has a different extension (for example, .h), F5
will re-run the last clang-check invocation made from this vim instance
(if any). The output will go into the error window, which is opened
automatically when clang-check finds errors, and can be re-opened with
:cope
.
Other clang-check
options that can be useful when working with clang
AST:
-ast-print
— Build ASTs and then pretty-print them.-ast-dump
— Build ASTs and then debug dump them.-ast-dump-filter=<string>
— Use with-ast-dump
or-ast-print
to dump/print only AST declaration nodes having a certain substring in a qualified name. Use-ast-list
to list all filterable declaration node names.-ast-list
— Build ASTs and print the list of declaration node qualified names.
Examples:
$ clang-check tools/clang/tools/clang-check/ClangCheck.cpp -ast-dump -ast-dump-filter ActionFactory::newASTConsumer
Processing: tools/clang/tools/clang-check/ClangCheck.cpp.
Dumping ::ActionFactory::newASTConsumer:
clang::ASTConsumer *newASTConsumer() (CompoundStmt 0x44da290 </home/alexfh/local/llvm/tools/clang/tools/clang-check/ClangCheck.cpp:64:40, line:72:3>
(IfStmt 0x44d97c8 <line:65:5, line:66:45>
<<<NULL>>>
(ImplicitCastExpr 0x44d96d0 <line:65:9> '_Bool':'_Bool' <UserDefinedConversion>
...
$ clang-check tools/clang/tools/clang-check/ClangCheck.cpp -ast-print -ast-dump-filter ActionFactory::newASTConsumer
Processing: tools/clang/tools/clang-check/ClangCheck.cpp.
Printing <anonymous namespace>::ActionFactory::newASTConsumer:
clang::ASTConsumer *newASTConsumer() {
if (this->ASTList.operator _Bool())
return clang::CreateASTDeclNodeLister();
if (this->ASTDump.operator _Bool())
return clang::CreateASTDumper(nullptr /*Dump to stdout.*/,
this->ASTDumpFilter);
if (this->ASTPrint.operator _Bool())
return clang::CreateASTPrinter(&llvm::outs(), this->ASTDumpFilter);
return new clang::ASTConsumer();
}
(Experimental) Using Ninja Build System¶
Optionally you can use the Ninja build system instead of make. It is aimed at making your builds faster. Currently this step will require building Ninja from sources.
To take advantage of using Clang Tools along with Ninja build you need at least CMake 2.8.9.
Clone the Ninja git repository and build Ninja from sources:
$ git clone git://github.com/martine/ninja.git
$ cd ninja/
$ ./bootstrap.py
This will result in a single binary ninja
in the current directory.
It doesn’t require installation and can just be copied to any location
inside $PATH
, say /usr/local/bin/
:
$ sudo cp ninja /usr/local/bin/
$ sudo chmod a+rx /usr/local/bin/ninja
After doing all of this, you’ll need to generate Ninja build files for LLVM with CMake. You need to make a build directory and run CMake from it:
$ mkdir your/build/directory
$ cd your/build/directory
$ cmake -G Ninja -DCMAKE_EXPORT_COMPILE_COMMANDS=ON path/to/llvm/sources
If you want to use clang instead of GCC, you can add
-DCMAKE_C_COMPILER=/path/to/clang -DCMAKE_CXX_COMPILER=/path/to/clang++
.
You can also use ccmake
, which provides a curses interface to configure
CMake variables in an interactive manner.
As a result, the new compile_commands.json
file should appear in the
current directory. You should link it to the LLVM source tree so that
Clang Tooling is able to use it:
$ ln -s $PWD/compile_commands.json path/to/llvm/source/
Now you are ready to build and test LLVM using Ninja:
$ ninja check-all
Other target names can be used in the same way as with make.
JSON Compilation Database Format Specification¶
This document describes a format for specifying how to replay single compilations independently of the build system.
Background¶
Tools based on the C++ Abstract Syntax Tree need full information how to parse a translation unit. Usually this information is implicitly available in the build system, but running tools as part of the build system is not necessarily the best solution:
- Build systems are inherently change driven, so running multiple tools over the same code base without changing the code does not fit into the architecture of many build systems.
- Figuring out whether things have changed is often an IO bound process; this makes it hard to build low latency end user tools based on the build system.
- Build systems are inherently sequential in the build graph, for example due to generated source code. While tools that run independently of the build still need the generated source code to exist, running tools multiple times over unchanging source does not require serialization of the runs according to the build dependency graph.
Supported Systems¶
Currently CMake (since 2.8.5) supports generation
of compilation databases for Unix Makefile builds (Ninja builds in the
works) with the option CMAKE_EXPORT_COMPILE_COMMANDS
.
For projects on Linux, there is an alternative to intercept compiler calls with a tool called Bear.
Clang’s tooling interface supports reading compilation databases; see the LibTooling documentation. libclang and its python bindings also support this (since clang 3.2); see CXCompilationDatabase.h.
Format¶
A compilation database is a JSON file, which consist of an array of “command objects”, where each command object specifies one way a translation unit is compiled in the project.
Each command object contains the translation unit’s main file, the working directory of the compile run and the actual compile command.
Example:
[
{ "directory": "/home/user/llvm/build",
"command": "/usr/bin/clang++ -Irelative -DSOMEDEF=\"With spaces, quotes and \\-es.\" -c -o file.o file.cc",
"file": "file.cc" },
...
]
The contracts for each field in the command object are:
- directory: The working directory of the compilation. All paths specified in the command or file fields must be either absolute or relative to this directory.
- file: The main translation unit source processed by this compilation step. This is used by tools as the key into the compilation database. There can be multiple command objects for the same file, for example if the same source file is compiled with different configurations.
- command: The compile command executed. After JSON unescaping,
this must be a valid command to rerun the exact compilation step for
the translation unit in the environment the build system uses.
Parameters use shell quoting and shell escaping of quotes, with ‘
"
’ and ‘\
’ being the only special characters. Shell expansion is not supported. - arguments: The compile command executed as list of strings. Either arguments or command is required.
- output: The name of the output created by this compilation step. This field is optional. It can be used to distinguish different processing modes of the same input file.
Build System Integration¶
The convention is to name the file compile_commands.json and put it at the top of the build directory. Clang tools are pointed to the top of the build directory to detect the file and use the compilation database to parse C++ code in the source tree.
Alternatives¶
For simple projects, Clang tools also recognize a compile_flags.txt file. This should contain one flag per line. The same flags will be used to compile any file.
Clang’s refactoring engine¶
This document describes the design of Clang’s refactoring engine and provides a couple of examples that show how various primitives in the refactoring API can be used to implement different refactoring actions. The LibTooling library provides several other APIs that are used when developing a refactoring action.
Refactoring engine can be used to implement local refactorings that are initiated using a selection in an editor or an IDE. You can combine AST matchers and the refactoring engine to implement refactorings that don’t lend themselves well to source selection and/or have to query ASTs for some particular nodes.
We assume basic knowledge about the Clang AST. See the Introduction to the Clang AST if you want to learn more about how the AST is structured.
Introduction¶
Clang’s refactoring engine defines a set refactoring actions that implement
a number of different source transformations. The clang-refactor
command-line tool can be used to perform these refactorings. Certain
refactorings are also available in other clients like text editors and IDEs.
A refactoring action is a class that defines a list of related refactoring
operations (rules). These rules are grouped under a common umbrella - a single
clang-refactor
command. In addition to rules, the refactoring action
provides the action’s command name and description to clang-refactor
.
Each action must implement the RefactoringAction
interface. Here’s an
outline of a local-rename
action:
class LocalRename final : public RefactoringAction {
public:
StringRef getCommand() const override { return "local-rename"; }
StringRef getDescription() const override {
return "Finds and renames symbols in code with no indexer support";
}
RefactoringActionRules createActionRules() const override {
...
}
};
Refactoring Action Rules¶
An individual refactoring action is responsible for creating the set of grouped refactoring action rules that represent one refactoring operation. Although the rules in one action may have a number of different implementations, they should strive to produce a similar result. It should be easy for users to identify which refactoring action produced the result regardless of which refactoring action rule was used.
The distinction between actions and rules enables the creation of actions
that define a set of different rules that produce similar results. For example,
the “add missing switch cases” refactoring operation typically adds missing
cases to one switch at a time. However, it could be useful to have a
refactoring that works on all switches that operate on a particular enum, as
one could then automatically update all of them after adding a new enum
constant. To achieve that, we can create two different rules that will use one
clang-refactor
subcommand. The first rule will describe a local operation
that’s initiated when the user selects a single switch. The second rule will
describe a global operation that works across translation units and is initiated
when the user provides the name of the enum to clang-refactor (or the user could
select the enum declaration instead). The clang-refactor tool will then analyze
the selection and other options passed to the refactoring action, and will pick
the most appropriate rule for the given selection and other options.
Rule Types¶
Clang’s refactoring engine supports several different refactoring rules:
SourceChangeRefactoringRule
produces source replacements that are applied to the source files. Subclasses that choose to implement this rule have to implement thecreateSourceReplacements
member function. This type of rule is typically used to implement local refactorings that transform the source in one translation unit only.FindSymbolOccurrencesRefactoringRule
produces a “partial” refactoring result: a set of occurrences that refer to a particular symbol. This type of rule is typically used to implement an interactive renaming action that allows users to specify which occurrences should be renamed during the refactoring. Subclasses that choose to implement this rule have to implement thefindSymbolOccurrences
member function.
The following set of quick checks might help if you are unsure about the type of rule you should use:
- If you would like to transform the source in one translation unit and if
you don’t need any cross-TU information, then the
SourceChangeRefactoringRule
should work for you. - If you would like to implement a rename-like operation with potential
interactive components, then
FindSymbolOccurrencesRefactoringRule
might work for you.
How to Create a Rule¶
Once you determine which type of rule is suitable for your needs you can
implement the refactoring by subclassing the rule and implementing its
interface. The subclass should have a constructor that takes the inputs that
are needed to perform the refactoring. For example, if you want to implement a
rule that simply deletes a selection, you should create a subclass of
SourceChangeRefactoringRule
with a constructor that accepts the selection
range:
class DeleteSelectedRange final : public SourceChangeRefactoringRule {
public:
DeleteSelection(SourceRange Selection) : Selection(Selection) {}
Expected<AtomicChanges>
createSourceReplacements(RefactoringRuleContext &Context) override {
AtomicChange Replacement(Context.getSources(), Selection.getBegin());
Replacement.replace(Context.getSource,
CharSourceRange::getCharRange(Selection), "");
return { Replacement };
}
private:
SourceRange Selection;
};
The rule’s subclass can then be added to the list of refactoring action’s
rules for a particular action using the createRefactoringActionRule
function. For example, the class that’s shown above can be added to the
list of action rules using the following code:
RefactoringActionRules Rules;
Rules.push_back(
createRefactoringActionRule<DeleteSelectedRange>(
SourceRangeSelectionRequirement())
);
The createRefactoringActionRule
function takes in a list of refactoring
action rule requirement values. These values describe the initiation
requirements that have to be satisfied by the refactoring engine before the
provided action rule can be constructed and invoked. The next section
describes how these requirements are evaluated and lists all the possible
requirements that can be used to construct a refactoring action rule.
Refactoring Action Rule Requirements¶
A refactoring action rule requirement is a value whose type derives from the
RefactoringActionRuleRequirement
class. The type must define an
evaluate
member function that returns a value of type Expected<...>
.
When a requirement value is used as an argument to
createRefactoringActionRule
, that value is evaluated during the initiation
of the action rule. The evaluated result is then passed to the rule’s
constructor unless the evaluation produced an error. For example, the
DeleteSelectedRange
sample rule that’s defined in the previous section
will be evaluated using the following steps:
SourceRangeSelectionRequirement
’sevaluate
member function will be called first. It will return anExpected<SourceRange>
.- If the return value is an error the initiation will fail and the error will be reported to the client. Note that the client may not report the error to the user.
- Otherwise the source range return value will be used to construct the
DeleteSelectedRange
rule. The rule will then be invoked as the initiation succeeded (all requirements were evaluated successfully).
The same series of steps applies to any refactoring rule. Firstly, the engine will evaluate all of the requirements. Then it will check if these requirements are satisfied (they should not produce an error). Then it will construct the rule and invoke it.
The separation of requirements, their evaluation and the invocation of the refactoring action rule allows the refactoring clients to:
- Disable refactoring action rules whose requirements are not supported.
- Gather the set of options and define a command-line / visual interface that allows users to input these options without ever invoking the action.
Selection Requirements¶
The refactoring rule requirements that require some form of source selection are listed below:
SourceRangeSelectionRequirement
evaluates to a source range when the action is invoked with some sort of selection. This requirement should be satisfied when a refactoring is initiated in an editor, even when the user has not selected anything (the range will contain the cursor’s location in that case).
Other Requirements¶
There are several other requirements types that can be used when creating a refactoring rule:
- The
RefactoringOptionsRequirement
requirement is an abstract class that should be subclassed by requirements working with options. The more concreteOptionRequirement
requirement is a simple implementation of the aforementioned class that returns the value of the specified option when it’s evaluated. The next section talks more about refactoring options and how they can be used when creating a rule.
Refactoring Options¶
Refactoring options are values that affect a refactoring operation and are
specified either using command-line options or another client-specific
mechanism. Options should be created using a class that derives either from
the OptionalRequiredOption
or RequiredRefactoringOption
. The following
example shows how one can created a required string option that corresponds to
the -new-name
command-line option in clang-refactor:
class NewNameOption : public RequiredRefactoringOption<std::string> {
public:
StringRef getName() const override { return "new-name"; }
StringRef getDescription() const override {
return "The new name to change the symbol to";
}
};
The option that’s shown in the example above can then be used to create
a requirement for a refactoring rule using a requirement like
OptionRequirement
:
createRefactoringActionRule<RenameOccurrences>(
...,
OptionRequirement<NewNameOption>())
);
Using Clang Tools¶
Overview¶
Clang Tools are standalone command line (and potentially GUI) tools designed for use by C++ developers who are already using and enjoying Clang as their compiler. These tools provide developer-oriented functionality such as fast syntax checking, automatic formatting, refactoring, etc.
Only a couple of the most basic and fundamental tools are kept in the primary Clang Subversion project. The rest of the tools are kept in a side-project so that developers who don’t want or need to build them don’t. If you want to get access to the extra Clang Tools repository, simply check it out into the tools tree of your Clang checkout and follow the usual process for building and working with a combined LLVM/Clang checkout:
- With Subversion:
cd llvm/tools/clang/tools
svn co http://llvm.org/svn/llvm-project/clang-tools-extra/trunk extra
- Or with Git:
cd llvm/tools/clang/tools
git clone http://llvm.org/git/clang-tools-extra.git extra
This document describes a high-level overview of the organization of Clang Tools within the project as well as giving an introduction to some of the more important tools. However, it should be noted that this document is currently focused on Clang and Clang Tool developers, not on end users of these tools.
Clang Tools Organization¶
Clang Tools are CLI or GUI programs that are intended to be directly used by C++ developers. That is they are not primarily for use by Clang developers, although they are hopefully useful to C++ developers who happen to work on Clang, and we try to actively dogfood their functionality. They are developed in three components: the underlying infrastructure for building a standalone tool based on Clang, core shared logic used by many different tools in the form of refactoring and rewriting libraries, and the tools themselves.
The underlying infrastructure for Clang Tools is the LibTooling platform. See its documentation for much more detailed information about how this infrastructure works. The common refactoring and rewriting toolkit-style library is also part of LibTooling organizationally.
A few Clang Tools are developed along side the core Clang libraries as examples and test cases of fundamental functionality. However, most of the tools are developed in a side repository to provide easy separation from the core libraries. We intentionally do not support public libraries in the side repository, as we want to carefully review and find good APIs for libraries as they are lifted out of a few tools and into the core Clang library set.
Regardless of which repository Clang Tools’ code resides in, the development process and practices for all Clang Tools are exactly those of Clang itself. They are entirely within the Clang project, regardless of the version control scheme.
Core Clang Tools¶
The core set of Clang tools that are within the main repository are tools that very specifically complement, and allow use and testing of Clang specific functionality.
clang-check
¶
ClangCheck combines the LibTooling framework for running a Clang tool with the basic Clang diagnostics by syntax checking specific files in a fast, command line interface. It can also accept flags to re-display the diagnostics in different formats with different flags, suitable for use driving an IDE or editor. Furthermore, it can be used in fixit-mode to directly apply fixit-hints offered by clang. See How To Setup Clang Tooling For LLVM for instructions on how to setup and used clang-check.
clang-format
¶
Clang-format is both a library and a stand-alone tool with the goal of automatically reformatting C++ sources files
according to configurable style guides. To do so, clang-format uses Clang’s
Lexer
to transform an input file into a token stream and then changes all
the whitespace around those tokens. The goal is for clang-format to serve both
as a user tool (ideally with powerful IDE integrations) and as part of other
refactoring tools, e.g. to do a reformatting of all the lines changed during a
renaming.
Extra Clang Tools¶
As various categories of Clang Tools are added to the extra repository, they’ll be tracked here. The focus of this documentation is on the scope and features of the tools for other tool developers; each tool should provide its own user-focused documentation.
clang-tidy
¶
clang-tidy is a clang-based C++ linter tool. It provides an extensible framework for building compiler-based static analyses detecting and fixing bug-prone patterns, performance, portability and maintainability issues.
Ideas for new Tools¶
C++ cast conversion tool. Will convert C-style casts (
(type) value
) to appropriate C++ cast (static_cast
,const_cast
orreinterpret_cast
).Non-member
begin()
andend()
conversion tool. Will convertfoo.begin()
intobegin(foo)
and similarly forend()
, wherefoo
is a standard container. We could also detect similar patterns for arrays.tr1
removal tool. Will migrate source code from using TR1 library features to C++11 library. For example:#include <tr1/unordered_map> int main() { std::tr1::unordered_map <int, int> ma; std::cout << ma.size () << std::endl; return 0; }
should be rewritten to:
#include <unordered_map> int main() { std::unordered_map <int, int> ma; std::cout << ma.size () << std::endl; return 0; }
A tool to remove
auto
. Will convertauto
to an explicit type or add comments with deduced types. The motivation is that there are developers that don’t want to useauto
because they are afraid that they might lose control over their code.C++14: less verbose operator function objects (N3421). For example:
sort(v.begin(), v.end(), greater<ValueType>());
should be rewritten to:
sort(v.begin(), v.end(), greater<>());
ClangCheck¶
ClangCheck is a small wrapper around LibTooling which can be used to do basic error checking and AST dumping.
$ cat <<EOF > snippet.cc
> void f() {
> int a = 0
> }
> EOF
$ ~/clang/build/bin/clang-check snippet.cc -ast-dump --
Processing: /Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc.
/Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:2:12: error: expected ';' at end of
declaration
int a = 0
^
;
(TranslationUnitDecl 0x7ff3a3029ed0 <<invalid sloc>>
(TypedefDecl 0x7ff3a302a410 <<invalid sloc>> __int128_t '__int128')
(TypedefDecl 0x7ff3a302a470 <<invalid sloc>> __uint128_t 'unsigned __int128')
(TypedefDecl 0x7ff3a302a830 <<invalid sloc>> __builtin_va_list '__va_list_tag [1]')
(FunctionDecl 0x7ff3a302a8d0 </Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:1:1, line:3:1> f 'void (void)'
(CompoundStmt 0x7ff3a302aa10 <line:1:10, line:3:1>
(DeclStmt 0x7ff3a302a9f8 <line:2:3, line:3:1>
(VarDecl 0x7ff3a302a980 <line:2:3, col:11> a 'int'
(IntegerLiteral 0x7ff3a302a9d8 <col:11> 'int' 0))))))
1 error generated.
Error while processing snippet.cc.
The ‘–’ at the end is important as it prevents clang-check from searching for a compilation database. For more information on how to setup and use clang-check in a project, see How To Setup Clang Tooling For LLVM.
ClangFormat¶
ClangFormat describes a set of tools that are built on top of LibFormat. It can support your workflow in a variety of ways including a standalone tool and editor integrations.
Standalone Tool¶
clang-format is located in clang/tools/clang-format and can be used to format C/C++/Java/JavaScript/Objective-C/Protobuf code.
$ clang-format -help
OVERVIEW: A tool to format C/C++/Java/JavaScript/Objective-C/Protobuf code.
If no arguments are specified, it formats the code from standard input
and writes the result to the standard output.
If <file>s are given, it reformats the files. If -i is specified
together with <file>s, the files are edited in-place. Otherwise, the
result is written to the standard output.
USAGE: clang-format [options] [<file> ...]
OPTIONS:
Clang-format options:
-assume-filename=<string> - When reading from stdin, clang-format assumes this
filename to look for a style config file (with
-style=file) and to determine the language.
-cursor=<uint> - The position of the cursor when invoking
clang-format from an editor integration
-dump-config - Dump configuration options to stdout and exit.
Can be used with -style option.
-fallback-style=<string> - The name of the predefined style used as a
fallback in case clang-format is invoked with
-style=file, but can not find the .clang-format
file to use.
Use -fallback-style=none to skip formatting.
-i - Inplace edit <file>s, if specified.
-length=<uint> - Format a range of this length (in bytes).
Multiple ranges can be formatted by specifying
several -offset and -length pairs.
When only a single -offset is specified without
-length, clang-format will format up to the end
of the file.
Can only be used with one input file.
-lines=<string> - <start line>:<end line> - format a range of
lines (both 1-based).
Multiple ranges can be formatted by specifying
several -lines arguments.
Can't be used with -offset and -length.
Can only be used with one input file.
-offset=<uint> - Format a range starting at this byte offset.
Multiple ranges can be formatted by specifying
several -offset and -length pairs.
Can only be used with one input file.
-output-replacements-xml - Output replacements as XML.
-sort-includes - Sort touched include lines
-style=<string> - Coding style, currently supports:
LLVM, Google, Chromium, Mozilla, WebKit.
Use -style=file to load style configuration from
.clang-format file located in one of the parent
directories of the source file (or current
directory for stdin).
Use -style="{key: value, ...}" to set specific
parameters, e.g.:
-style="{BasedOnStyle: llvm, IndentWidth: 8}"
-verbose - If set, shows the list of processed files
Generic Options:
-help - Display available options (-help-hidden for more)
-help-list - Display list of available options (-help-list-hidden for more)
-version - Display the version of this program
When the desired code formatting style is different from the available options,
the style can be customized using the -style="{key: value, ...}"
option or
by putting your style configuration in the .clang-format
or _clang-format
file in your project’s directory and using clang-format -style=file
.
An easy way to create the .clang-format
file is:
clang-format -style=llvm -dump-config > .clang-format
Available style options are described in Clang-Format Style Options.
Vim Integration¶
There is an integration for vim which lets you run the clang-format standalone tool on your current buffer, optionally selecting regions to reformat. The integration has the form of a python-file which can be found under clang/tools/clang-format/clang-format.py.
This can be integrated by adding the following to your .vimrc:
map <C-K> :pyf <path-to-this-file>/clang-format.py<cr>
imap <C-K> <c-o>:pyf <path-to-this-file>/clang-format.py<cr>
The first line enables clang-format for NORMAL and VISUAL mode, the second line adds support for INSERT mode. Change “C-K” to another binding if you need clang-format on a different key (C-K stands for Ctrl+k).
With this integration you can press the bound key and clang-format will format the current line in NORMAL and INSERT mode or the selected region in VISUAL mode. The line or region is extended to the next bigger syntactic entity.
It operates on the current, potentially unsaved buffer and does not create or save any files. To revert a formatting, just undo.
An alternative option is to format changes when saving a file and thus to have a zero-effort integration into the coding workflow. To do this, add this to your .vimrc:
function! Formatonsave()
let l:formatdiff = 1
pyf ~/llvm/tools/clang/tools/clang-format/clang-format.py
endfunction
autocmd BufWritePre *.h,*.cc,*.cpp call Formatonsave()
Emacs Integration¶
Similar to the integration for vim, there is an integration for emacs. It can be found at clang/tools/clang-format/clang-format.el and used by adding this to your .emacs:
(load "<path-to-clang>/tools/clang-format/clang-format.el")
(global-set-key [C-M-tab] 'clang-format-region)
This binds the function clang-format-region to C-M-tab, which then formats the current line or selected region.
BBEdit Integration¶
clang-format cannot be used as a text filter with BBEdit, but works well via a script. The AppleScript to do this integration can be found at clang/tools/clang-format/clang-format-bbedit.applescript; place a copy in ~/Library/Application Support/BBEdit/Scripts, and edit the path within it to point to your local copy of clang-format.
With this integration you can select the script from the Script menu and clang-format will format the selection. Note that you can rename the menu item by renaming the script, and can assign the menu item a keyboard shortcut in the BBEdit preferences, under Menus & Shortcuts.
Visual Studio Integration¶
Download the latest Visual Studio extension from the alpha build site. The default key-binding is Ctrl-R,Ctrl-F.
Script for patch reformatting¶
The python script clang/tools/clang-format/clang-format-diff.py parses the output of a unified diff and reformats all contained lines with clang-format.
usage: clang-format-diff.py [-h] [-i] [-p NUM] [-regex PATTERN] [-style STYLE]
Reformat changed lines in diff. Without -i option just output the diff that
would be introduced.
optional arguments:
-h, --help show this help message and exit
-i apply edits to files instead of displaying a diff
-p NUM strip the smallest prefix containing P slashes
-regex PATTERN custom pattern selecting file paths to reformat
-style STYLE formatting style to apply (LLVM, Google, Chromium, Mozilla,
WebKit)
So to reformat all the lines in the latest git commit, just do:
git diff -U0 --no-color HEAD^ | clang-format-diff.py -i -p1
In an SVN client, you can do:
svn diff --diff-cmd=diff -x -U0 | clang-format-diff.py -i
The option -U0 will create a diff without context lines (the script would format those as well).
Clang-Format Style Options¶
Clang-Format Style Options describes configurable formatting style options supported by LibFormat and ClangFormat.
When using clang-format command line utility or
clang::format::reformat(...)
functions from code, one can either use one of
the predefined styles (LLVM, Google, Chromium, Mozilla, WebKit) or create a
custom style by configuring specific style options.
Configuring Style with clang-format¶
clang-format supports two ways to provide custom style options:
directly specify style configuration in the -style=
command line option or
use -style=file
and put style configuration in the .clang-format
or
_clang-format
file in the project directory.
When using -style=file
, clang-format for each input file will
try to find the .clang-format
file located in the closest parent directory
of the input file. When the standard input is used, the search is started from
the current directory.
The .clang-format
file uses YAML format:
key1: value1
key2: value2
# A comment.
...
The configuration file can consist of several sections each having different
Language:
parameter denoting the programming language this section of the
configuration is targeted at. See the description of the Language option
below for the list of supported languages. The first section may have no
language set, it will set the default style options for all lanugages.
Configuration sections for specific language will override options set in the
default section.
When clang-format formats a file, it auto-detects the language using
the file name. When formatting standard input or a file that doesn’t have the
extension corresponding to its language, -assume-filename=
option can be
used to override the file name clang-format uses to detect the
language.
An example of a configuration file for multiple languages:
---
# We'll use defaults from the LLVM style, but with 4 columns indentation.
BasedOnStyle: LLVM
IndentWidth: 4
---
Language: Cpp
# Force pointers to the type for C++.
DerivePointerAlignment: false
PointerAlignment: Left
---
Language: JavaScript
# Use 100 columns for JS.
ColumnLimit: 100
---
Language: Proto
# Don't format .proto files.
DisableFormat: true
...
An easy way to get a valid .clang-format
file containing all configuration
options of a certain predefined style is:
clang-format -style=llvm -dump-config > .clang-format
When specifying configuration in the -style=
option, the same configuration
is applied for all input files. The format of the configuration is:
-style='{key1: value1, key2: value2, ...}'
Disabling Formatting on a Piece of Code¶
Clang-format understands also special comments that switch formatting in a
delimited range. The code between a comment // clang-format off
or
/* clang-format off */
up to a comment // clang-format on
or
/* clang-format on */
will not be formatted. The comments themselves
will be formatted (aligned) normally.
int formatted_code;
// clang-format off
void unformatted_code ;
// clang-format on
void formatted_code_again;
Configuring Style in Code¶
When using clang::format::reformat(...)
functions, the format is specified
by supplying the clang::format::FormatStyle
structure.
Configurable Format Style Options¶
This section lists the supported style options. Value type is specified for
each option. For enumeration types possible values are specified both as a C++
enumeration member (with a prefix, e.g. LS_Auto
), and as a value usable in
the configuration (without a prefix: Auto
).
- BasedOnStyle (
string
) The style used for all options not specifically set in the configuration.
This option is supported only in the clang-format configuration (both within
-style='{...}'
and the.clang-format
file).Possible values:
LLVM
A style complying with the LLVM coding standardsGoogle
A style complying with Google’s C++ style guideChromium
A style complying with Chromium’s style guideMozilla
A style complying with Mozilla’s style guideWebKit
A style complying with WebKit’s style guide
- AccessModifierOffset (
int
) - The extra indent or outdent of access modifiers, e.g.
public:
. - AlignAfterOpenBracket (
BracketAlignmentStyle
) If
true
, horizontally aligns arguments after an open bracket.This applies to round brackets (parentheses), angle brackets and square brackets.
Possible values:
BAS_Align
(in configuration:Align
) Align parameters on the open bracket, e.g.:someLongFunction(argument1, argument2);
BAS_DontAlign
(in configuration:DontAlign
) Don’t align, instead useContinuationIndentWidth
, e.g.:someLongFunction(argument1, argument2);
BAS_AlwaysBreak
(in configuration:AlwaysBreak
) Always break after an open bracket, if the parameters don’t fit on a single line, e.g.:someLongFunction( argument1, argument2);
- AlignConsecutiveAssignments (
bool
) If
true
, aligns consecutive assignments.This will align the assignment operators of consecutive lines. This will result in formattings like
int aaaa = 12; int b = 23; int ccc = 23;
- AlignConsecutiveDeclarations (
bool
) If
true
, aligns consecutive declarations.This will align the declaration names of consecutive lines. This will result in formattings like
int aaaa = 12; float b = 23; std::string ccc = 23;
- AlignEscapedNewlines (
EscapedNewlineAlignmentStyle
) Options for aligning backslashes in escaped newlines.
Possible values:
ENAS_DontAlign
(in configuration:DontAlign
) Don’t align escaped newlines.#define A \ int aaaa; \ int b; \ int dddddddddd;
ENAS_Left
(in configuration:Left
) Align escaped newlines as far left as possible.true: #define A \ int aaaa; \ int b; \ int dddddddddd; false:
ENAS_Right
(in configuration:Right
) Align escaped newlines in the right-most column.#define A \ int aaaa; \ int b; \ int dddddddddd;
- AlignOperands (
bool
) If
true
, horizontally align operands of binary and ternary expressions.Specifically, this aligns operands of a single expression that needs to be split over multiple lines, e.g.:
int aaa = bbbbbbbbbbbbbbb + ccccccccccccccc;
- AlignTrailingComments (
bool
) If
true
, aligns trailing comments.true: false: int a; // My comment a vs. int a; // My comment a int b = 2; // comment b int b = 2; // comment about b
- AllowAllParametersOfDeclarationOnNextLine (
bool
) If the function declaration doesn’t fit on a line, allow putting all parameters of a function declaration onto the next line even if
BinPackParameters
isfalse
.true: void myFunction( int a, int b, int c, int d, int e); false: void myFunction(int a, int b, int c, int d, int e);
- AllowShortBlocksOnASingleLine (
bool
) Allows contracting simple braced statements to a single line.
E.g., this allows
if (a) { return; }
to be put on a single line.- AllowShortCaseLabelsOnASingleLine (
bool
) If
true
, short case labels will be contracted to a single line.true: false: switch (a) { vs. switch (a) { case 1: x = 1; break; case 1: case 2: return; x = 1; } break; case 2: return; }
- AllowShortFunctionsOnASingleLine (
ShortFunctionStyle
) Dependent on the value,
int f() { return 0; }
can be put on a single line.Possible values:
SFS_None
(in configuration:None
) Never merge functions into a single line.SFS_InlineOnly
(in configuration:InlineOnly
) Only merge functions defined inside a class. Same as “inline”, except it does not implies “empty”: i.e. top level empty functions are not merged either.class Foo { void f() { foo(); } }; void f() { foo(); } void f() { }
SFS_Empty
(in configuration:Empty
) Only merge empty functions.void f() {} void f2() { bar2(); }
SFS_Inline
(in configuration:Inline
) Only merge functions defined inside a class. Implies “empty”.class Foo { void f() { foo(); } }; void f() { foo(); } void f() {}
SFS_All
(in configuration:All
) Merge all functions fitting on a single line.class Foo { void f() { foo(); } }; void f() { bar(); }
- AllowShortIfStatementsOnASingleLine (
bool
) - If
true
,if (a) return;
can be put on a single line. - AllowShortLoopsOnASingleLine (
bool
) - If
true
,while (true) continue;
can be put on a single line. - AlwaysBreakAfterDefinitionReturnType (
DefinitionReturnTypeBreakingStyle
) The function definition return type breaking style to use. This option is deprecated and is retained for backwards compatibility.
Possible values:
DRTBS_None
(in configuration:None
) Break after return type automatically.PenaltyReturnTypeOnItsOwnLine
is taken into account.DRTBS_All
(in configuration:All
) Always break after the return type.DRTBS_TopLevel
(in configuration:TopLevel
) Always break after the return types of top-level functions.
- AlwaysBreakAfterReturnType (
ReturnTypeBreakingStyle
) The function declaration return type breaking style to use.
Possible values:
RTBS_None
(in configuration:None
) Break after return type automatically.PenaltyReturnTypeOnItsOwnLine
is taken into account.class A { int f() { return 0; }; }; int f(); int f() { return 1; }
RTBS_All
(in configuration:All
) Always break after the return type.class A { int f() { return 0; }; }; int f(); int f() { return 1; }
RTBS_TopLevel
(in configuration:TopLevel
) Always break after the return types of top-level functions.class A { int f() { return 0; }; }; int f(); int f() { return 1; }
RTBS_AllDefinitions
(in configuration:AllDefinitions
) Always break after the return type of function definitions.class A { int f() { return 0; }; }; int f(); int f() { return 1; }
RTBS_TopLevelDefinitions
(in configuration:TopLevelDefinitions
) Always break after the return type of top-level definitions.class A { int f() { return 0; }; }; int f(); int f() { return 1; }
- AlwaysBreakBeforeMultilineStrings (
bool
) If
true
, always break before multiline string literals.This flag is mean to make cases where there are multiple multiline strings in a file look more consistent. Thus, it will only take effect if wrapping the string at that point leads to it being indented
ContinuationIndentWidth
spaces from the start of the line.true: false: aaaa = vs. aaaa = "bbbb" "bbbb" "cccc"; "cccc";
- AlwaysBreakTemplateDeclarations (
BreakTemplateDeclarationsStyle
) The template declaration breaking style to use.
Possible values:
BTDS_No
(in configuration:No
) Do not force break before declaration.PenaltyBreakTemplateDeclaration
is taken into account.template <typename T> T foo() { } template <typename T> T foo(int aaaaaaaaaaaaaaaaaaaaa, int bbbbbbbbbbbbbbbbbbbbb) { }
BTDS_MultiLine
(in configuration:MultiLine
) Force break after template declaration only when the following declaration spans multiple lines.template <typename T> T foo() { } template <typename T> T foo(int aaaaaaaaaaaaaaaaaaaaa, int bbbbbbbbbbbbbbbbbbbbb) { }
BTDS_Yes
(in configuration:Yes
) Always break after template declaration.template <typename T> T foo() { } template <typename T> T foo(int aaaaaaaaaaaaaaaaaaaaa, int bbbbbbbbbbbbbbbbbbbbb) { }
- BinPackArguments (
bool
) If
false
, a function call’s arguments will either be all on the same line or will have one line each.true: void f() { f(aaaaaaaaaaaaaaaaaaaa, aaaaaaaaaaaaaaaaaaaa, aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa); } false: void f() { f(aaaaaaaaaaaaaaaaaaaa, aaaaaaaaaaaaaaaaaaaa, aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa); }
- BinPackParameters (
bool
) If
false
, a function declaration’s or function definition’s parameters will either all be on the same line or will have one line each.true: void f(int aaaaaaaaaaaaaaaaaaaa, int aaaaaaaaaaaaaaaaaaaa, int aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa) {} false: void f(int aaaaaaaaaaaaaaaaaaaa, int aaaaaaaaaaaaaaaaaaaa, int aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa) {}
- BraceWrapping (
BraceWrappingFlags
) Control of individual brace wrapping cases.
If
BreakBeforeBraces
is set toBS_Custom
, use this to specify how each individual brace case should be handled. Otherwise, this is ignored.# Example of usage: BreakBeforeBraces: Custom BraceWrapping: AfterEnum: true AfterStruct: false SplitEmptyFunction: false
Nested configuration flags:
bool AfterClass
Wrap class definitions.true: class foo {}; false: class foo {};
bool AfterControlStatement
Wrap control statements (if
/for
/while
/switch
/..).true: if (foo()) { } else {} for (int i = 0; i < 10; ++i) {} false: if (foo()) { } else { } for (int i = 0; i < 10; ++i) { }
bool AfterEnum
Wrap enum definitions.true: enum X : int { B }; false: enum X : int { B };
bool AfterFunction
Wrap function definitions.true: void foo() { bar(); bar2(); } false: void foo() { bar(); bar2(); }
bool AfterNamespace
Wrap namespace definitions.true: namespace { int foo(); int bar(); } false: namespace { int foo(); int bar(); }
bool AfterObjCDeclaration
Wrap ObjC definitions (interfaces, implementations…). @autoreleasepool and @synchronized blocks are wrapped according to AfterControlStatement flag.bool AfterStruct
Wrap struct definitions.true: struct foo { int x; }; false: struct foo { int x; };
bool AfterUnion
Wrap union definitions.true: union foo { int x; } false: union foo { int x; }
bool AfterExternBlock
Wrap extern blocks.true: extern "C" { int foo(); } false: extern "C" { int foo(); }
bool BeforeCatch
Wrap beforecatch
.true: try { foo(); } catch () { } false: try { foo(); } catch () { }
bool BeforeElse
Wrap beforeelse
.true: if (foo()) { } else { } false: if (foo()) { } else { }
bool IndentBraces
Indent the wrapped braces themselves.bool SplitEmptyFunction
Iffalse
, empty function body can be put on a single line. This option is used only if the opening brace of the function has already been wrapped, i.e. the AfterFunction brace wrapping mode is set, and the function could/should not be put on a single line (as per AllowShortFunctionsOnASingleLine and constructor formatting options).int f() vs. inf f() {} { }
bool SplitEmptyRecord
Iffalse
, empty record (e.g. class, struct or union) body can be put on a single line. This option is used only if the opening brace of the record has already been wrapped, i.e. the AfterClass (for classes) brace wrapping mode is set.class Foo vs. class Foo {} { }
bool SplitEmptyNamespace
Iffalse
, empty namespace body can be put on a single line. This option is used only if the opening brace of the namespace has already been wrapped, i.e. the AfterNamespace brace wrapping mode is set.namespace Foo vs. namespace Foo {} { }
- BreakAfterJavaFieldAnnotations (
bool
) Break after each annotation on a field in Java files.
true: false: @Partial vs. @Partial @Mock DataLoad loader; @Mock DataLoad loader;
- BreakBeforeBinaryOperators (
BinaryOperatorStyle
) The way to wrap binary operators.
Possible values:
BOS_None
(in configuration:None
) Break after operators.LooooooooooongType loooooooooooooooooooooongVariable = someLooooooooooooooooongFunction(); bool value = aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa + aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa == aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa && aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa > ccccccccccccccccccccccccccccccccccccccccc;
BOS_NonAssignment
(in configuration:NonAssignment
) Break before operators that aren’t assignments.LooooooooooongType loooooooooooooooooooooongVariable = someLooooooooooooooooongFunction(); bool value = aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa + aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa == aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa && aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa > ccccccccccccccccccccccccccccccccccccccccc;
BOS_All
(in configuration:All
) Break before operators.LooooooooooongType loooooooooooooooooooooongVariable = someLooooooooooooooooongFunction(); bool value = aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa + aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa == aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa && aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa > ccccccccccccccccccccccccccccccccccccccccc;
- BreakBeforeBraces (
BraceBreakingStyle
) The brace breaking style to use.
Possible values:
BS_Attach
(in configuration:Attach
) Always attach braces to surrounding context.try { foo(); } catch () { } void foo() { bar(); } class foo {}; if (foo()) { } else { } enum X : int { A, B };
BS_Linux
(in configuration:Linux
) LikeAttach
, but break before braces on function, namespace and class definitions.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_Mozilla
(in configuration:Mozilla
) LikeAttach
, but break before braces on enum, function, and record definitions.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_Stroustrup
(in configuration:Stroustrup
) LikeAttach
, but break before function definitions,catch
, andelse
.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_Allman
(in configuration:Allman
) Always break before braces.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_GNU
(in configuration:GNU
) Always break before braces and add an extra level of indentation to braces of control statements, not to those of class, function or other definitions.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_WebKit
(in configuration:WebKit
) LikeAttach
, but break before functions.try { foo(); } catch () { } void foo() { bar(); } class foo { }; if (foo()) { } else { } enum X : int { A, B };
BS_Custom
(in configuration:Custom
) Configure each individual brace in BraceWrapping.
- BreakBeforeTernaryOperators (
bool
) If
true
, ternary operators will be placed after line breaks.true: veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongDescription ? firstValue : SecondValueVeryVeryVeryVeryLong; false: veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongDescription ? firstValue : SecondValueVeryVeryVeryVeryLong;
- BreakConstructorInitializers (
BreakConstructorInitializersStyle
) The constructor initializers style to use.
Possible values:
BCIS_BeforeColon
(in configuration:BeforeColon
) Break constructor initializers before the colon and after the commas.Constructor() : initializer1(), initializer2()
BCIS_BeforeComma
(in configuration:BeforeComma
) Break constructor initializers before the colon and commas, and align the commas with the colon.Constructor() : initializer1() , initializer2()
BCIS_AfterColon
(in configuration:AfterColon
) Break constructor initializers after the colon and commas.Constructor() : initializer1(), initializer2()
- BreakInheritanceList (
BreakInheritanceListStyle
) The inheritance list style to use.
Possible values:
BILS_BeforeColon
(in configuration:BeforeColon
) Break inheritance list before the colon and after the commas.class Foo : Base1, Base2 {};
BILS_BeforeComma
(in configuration:BeforeComma
) Break inheritance list before the colon and commas, and align the commas with the colon.class Foo : Base1 , Base2 {};
BILS_AfterColon
(in configuration:AfterColon
) Break inheritance list after the colon and commas.class Foo : Base1, Base2 {};
- BreakStringLiterals (
bool
) - Allow breaking string literals when formatting.
- ColumnLimit (
unsigned
) The column limit.
A column limit of
0
means that there is no column limit. In this case, clang-format will respect the input’s line breaking decisions within statements unless they contradict other rules.- CommentPragmas (
std::string
) A regular expression that describes comments with special meaning, which should not be split into lines or otherwise changed.
// CommentPragmas: '^ FOOBAR pragma:' // Will leave the following line unaffected #include <vector> // FOOBAR pragma: keep
- CompactNamespaces (
bool
) If
true
, consecutive namespace declarations will be on the same line. Iffalse
, each namespace is declared on a new line.true: namespace Foo { namespace Bar { }} false: namespace Foo { namespace Bar { } }
If it does not fit on a single line, the overflowing namespaces get wrapped:
namespace Foo { namespace Bar { namespace Extra { }}}
- ConstructorInitializerAllOnOneLineOrOnePerLine (
bool
) If the constructor initializers don’t fit on a line, put each initializer on its own line.
true: FitsOnOneLine::Constructor() : aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa) {} DoesntFit::Constructor() : aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa) {} false: FitsOnOneLine::Constructor() : aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa) {} DoesntFit::Constructor() : aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa), aaaaaaaaaaaaa(aaaaaaaaaaaaaa) {}
- ConstructorInitializerIndentWidth (
unsigned
) - The number of characters to use for indentation of constructor initializer lists as well as inheritance lists.
- ContinuationIndentWidth (
unsigned
) Indent width for line continuations.
ContinuationIndentWidth: 2 int i = // VeryVeryVeryVeryVeryLongComment longFunction( // Again a long comment arg);
- Cpp11BracedListStyle (
bool
) If
true
, format braced lists as best suited for C++11 braced lists.Important differences: - No spaces inside the braced list. - No line break before the closing brace. - Indentation with the continuation indent, not with the block indent.
Fundamentally, C++11 braced lists are formatted exactly like function calls would be formatted in their place. If the braced list follows a name (e.g. a type or variable name), clang-format formats as if the
{}
were the parentheses of a function call with that name. If there is no name, a zero-length name is assumed.true: false: vector<int> x{1, 2, 3, 4}; vs. vector<int> x{ 1, 2, 3, 4 }; vector<T> x{{}, {}, {}, {}}; vector<T> x{ {}, {}, {}, {} }; f(MyMap[{composite, key}]); f(MyMap[{ composite, key }]); new int[3]{1, 2, 3}; new int[3]{ 1, 2, 3 };
- DerivePointerAlignment (
bool
) - If
true
, analyze the formatted file for the most common alignment of&
and*
. Pointer and reference alignment styles are going to be updated according to the preferences found in the file.PointerAlignment
is then used only as fallback. - DisableFormat (
bool
) - Disables formatting completely.
- ExperimentalAutoDetectBinPacking (
bool
) If
true
, clang-format detects whether function calls and definitions are formatted with one parameter per line.Each call can be bin-packed, one-per-line or inconclusive. If it is inconclusive, e.g. completely on one line, but a decision needs to be made, clang-format analyzes whether there are other bin-packed cases in the input file and act accordingly.
NOTE: This is an experimental flag, that might go away or be renamed. Do not use this in config files, etc. Use at your own risk.
- FixNamespaceComments (
bool
) If
true
, clang-format adds missing namespace end comments and fixes invalid existing ones.true: false: namespace a { vs. namespace a { foo(); foo(); } // namespace a; }
- ForEachMacros (
std::vector<std::string>
) A vector of macros that should be interpreted as foreach loops instead of as function calls.
These are expected to be macros of the form:
FOREACH(<variable-declaration>, ...) <loop-body>
In the .clang-format configuration file, this can be configured like:
ForEachMacros: ['RANGES_FOR', 'FOREACH']
For example: BOOST_FOREACH.
- IncludeBlocks (
IncludeBlocksStyle
) Dependent on the value, multiple
#include
blocks can be sorted as one and divided based on category.Possible values:
IBS_Preserve
(in configuration:Preserve
) Sort each#include
block separately.#include "b.h" into #include "b.h" #include <lib/main.h> #include "a.h" #include "a.h" #include <lib/main.h>
IBS_Merge
(in configuration:Merge
) Merge multiple#include
blocks together and sort as one.#include "b.h" into #include "a.h" #include "b.h" #include <lib/main.h> #include <lib/main.h> #include "a.h"
IBS_Regroup
(in configuration:Regroup
) Merge multiple#include
blocks together and sort as one. Then split into groups based on category priority. SeeIncludeCategories
.#include "b.h" into #include "a.h" #include "b.h" #include <lib/main.h> #include "a.h" #include <lib/main.h>
- IncludeCategories (
std::vector<IncludeCategory>
) Regular expressions denoting the different
#include
categories used for ordering#includes
.POSIX extended regular expressions are supported.
These regular expressions are matched against the filename of an include (including the <> or “”) in order. The value belonging to the first matching regular expression is assigned and
#includes
are sorted first according to increasing category number and then alphabetically within each category.If none of the regular expressions match, INT_MAX is assigned as category. The main header for a source file automatically gets category 0. so that it is generally kept at the beginning of the
#includes
(http://llvm.org/docs/CodingStandards.html#include-style). However, you can also assign negative priorities if you have certain headers that always need to be first.To configure this in the .clang-format file, use:
IncludeCategories: - Regex: '^"(llvm|llvm-c|clang|clang-c)/' Priority: 2 - Regex: '^(<|"(gtest|gmock|isl|json)/)' Priority: 3 - Regex: '<[[:alnum:].]+>' Priority: 4 - Regex: '.*' Priority: 1
- IncludeIsMainRegex (
std::string
) Specify a regular expression of suffixes that are allowed in the file-to-main-include mapping.
When guessing whether a #include is the “main” include (to assign category 0, see above), use this regex of allowed suffixes to the header stem. A partial match is done, so that: - “” means “arbitrary suffix” - “$” means “no suffix”
For example, if configured to “(_test)?$”, then a header a.h would be seen as the “main” include in both a.cc and a_test.cc.
- IndentCaseLabels (
bool
) Indent case labels one level from the switch statement.
When
false
, use the same indentation level as for the switch statement. Switch statement body is always indented one level more than case labels.false: true: switch (fool) { vs. switch (fool) { case 1: case 1: bar(); bar(); break; break; default: default: plop(); plop(); } }
- IndentPPDirectives (
PPDirectiveIndentStyle
) The preprocessor directive indenting style to use.
Possible values:
PPDIS_None
(in configuration:None
) Does not indent any directives.#if FOO #if BAR #include <foo> #endif #endif
PPDIS_AfterHash
(in configuration:AfterHash
) Indents directives after the hash.#if FOO # if BAR # include <foo> # endif #endif
- IndentWidth (
unsigned
) The number of columns to use for indentation.
IndentWidth: 3 void f() { someFunction(); if (true, false) { f(); } }
- IndentWrappedFunctionNames (
bool
) Indent if a function definition or declaration is wrapped after the type.
true: LoooooooooooooooooooooooooooooooooooooooongReturnType LoooooooooooooooooooooooooooooooongFunctionDeclaration(); false: LoooooooooooooooooooooooooooooooooooooooongReturnType LoooooooooooooooooooooooooooooooongFunctionDeclaration();
- JavaScriptQuotes (
JavaScriptQuoteStyle
) The JavaScriptQuoteStyle to use for JavaScript strings.
Possible values:
JSQS_Leave
(in configuration:Leave
) Leave string quotes as they are.string1 = "foo"; string2 = 'bar';
JSQS_Single
(in configuration:Single
) Always use single quotes.string1 = 'foo'; string2 = 'bar';
JSQS_Double
(in configuration:Double
) Always use double quotes.string1 = "foo"; string2 = "bar";
- JavaScriptWrapImports (
bool
) Whether to wrap JavaScript import/export statements.
true: import { VeryLongImportsAreAnnoying, VeryLongImportsAreAnnoying, VeryLongImportsAreAnnoying, } from 'some/module.js' false: import {VeryLongImportsAreAnnoying, VeryLongImportsAreAnnoying, VeryLongImportsAreAnnoying,} from "some/module.js"
- KeepEmptyLinesAtTheStartOfBlocks (
bool
) If true, the empty line at the start of blocks is kept.
true: false: if (foo) { vs. if (foo) { bar(); bar(); } }
- Language (
LanguageKind
) Language, this format style is targeted at.
Possible values:
LK_None
(in configuration:None
) Do not use.LK_Cpp
(in configuration:Cpp
) Should be used for C, C++.LK_Java
(in configuration:Java
) Should be used for Java.LK_JavaScript
(in configuration:JavaScript
) Should be used for JavaScript.LK_ObjC
(in configuration:ObjC
) Should be used for Objective-C, Objective-C++.LK_Proto
(in configuration:Proto
) Should be used for Protocol Buffers (https://developers.google.com/protocol-buffers/).LK_TableGen
(in configuration:TableGen
) Should be used for TableGen code.LK_TextProto
(in configuration:TextProto
) Should be used for Protocol Buffer messages in text format (https://developers.google.com/protocol-buffers/).
- MacroBlockBegin (
std::string
) A regular expression matching macros that start a block.
# With: MacroBlockBegin: "^NS_MAP_BEGIN|\ NS_TABLE_HEAD$" MacroBlockEnd: "^\ NS_MAP_END|\ NS_TABLE_.*_END$" NS_MAP_BEGIN foo(); NS_MAP_END NS_TABLE_HEAD bar(); NS_TABLE_FOO_END # Without: NS_MAP_BEGIN foo(); NS_MAP_END NS_TABLE_HEAD bar(); NS_TABLE_FOO_END
- MacroBlockEnd (
std::string
) - A regular expression matching macros that end a block.
- MaxEmptyLinesToKeep (
unsigned
) The maximum number of consecutive empty lines to keep.
MaxEmptyLinesToKeep: 1 vs. MaxEmptyLinesToKeep: 0 int f() { int f() { int = 1; int i = 1; i = foo(); i = foo(); return i; } return i; }
- NamespaceIndentation (
NamespaceIndentationKind
) The indentation used for namespaces.
Possible values:
NI_None
(in configuration:None
) Don’t indent in namespaces.namespace out { int i; namespace in { int i; } }
NI_Inner
(in configuration:Inner
) Indent only in inner namespaces (nested in other namespaces).namespace out { int i; namespace in { int i; } }
NI_All
(in configuration:All
) Indent in all namespaces.namespace out { int i; namespace in { int i; } }
- ObjCBinPackProtocolList (
BinPackStyle
) Controls bin-packing Objective-C protocol conformance list items into as few lines as possible when they go over
ColumnLimit
.If
Auto
(the default), delegates to the value inBinPackParameters
. If that istrue
, bin-packs Objective-C protocol conformance list items into as few lines as possible whenever they go overColumnLimit
.If
Always
, always bin-packs Objective-C protocol conformance list items into as few lines as possible whenever they go overColumnLimit
.If
Never
, lays out Objective-C protocol conformance list items onto individual lines whenever they go overColumnLimit
.Always (or Auto, if BinPackParameters=true): @interface ccccccccccccc () < ccccccccccccc, ccccccccccccc, ccccccccccccc, ccccccccccccc> { } Never (or Auto, if BinPackParameters=false): @interface ddddddddddddd () < ddddddddddddd, ddddddddddddd, ddddddddddddd, ddddddddddddd> { }
Possible values:
BPS_Auto
(in configuration:Auto
) Automatically determine parameter bin-packing behavior.BPS_Always
(in configuration:Always
) Always bin-pack parameters.BPS_Never
(in configuration:Never
) Never bin-pack parameters.
- ObjCBlockIndentWidth (
unsigned
) The number of characters to use for indentation of ObjC blocks.
ObjCBlockIndentWidth: 4 [operation setCompletionBlock:^{ [self onOperationDone]; }];
- ObjCSpaceAfterProperty (
bool
) - Add a space after
@property
in Objective-C, i.e. use@property (readonly)
instead of@property(readonly)
. - ObjCSpaceBeforeProtocolList (
bool
) - Add a space in front of an Objective-C protocol list, i.e. use
Foo <Protocol>
instead ofFoo<Protocol>
. - PenaltyBreakAssignment (
unsigned
) - The penalty for breaking around an assignment operator.
- PenaltyBreakBeforeFirstCallParameter (
unsigned
) - The penalty for breaking a function call after
call(
. - PenaltyBreakComment (
unsigned
) - The penalty for each line break introduced inside a comment.
- PenaltyBreakFirstLessLess (
unsigned
) - The penalty for breaking before the first
<<
. - PenaltyBreakString (
unsigned
) - The penalty for each line break introduced inside a string literal.
- PenaltyBreakTemplateDeclaration (
unsigned
) - The penalty for breaking after template declaration.
- PenaltyExcessCharacter (
unsigned
) - The penalty for each character outside of the column limit.
- PenaltyReturnTypeOnItsOwnLine (
unsigned
) - Penalty for putting the return type of a function onto its own line.
- PointerAlignment (
PointerAlignmentStyle
) Pointer and reference alignment style.
Possible values:
PAS_Left
(in configuration:Left
) Align pointer to the left.int* a;
PAS_Right
(in configuration:Right
) Align pointer to the right.int *a;
PAS_Middle
(in configuration:Middle
) Align pointer in the middle.int * a;
- RawStringFormats (
std::vector<RawStringFormat>
) Defines hints for detecting supported languages code blocks in raw strings.
A raw string with a matching delimiter or a matching enclosing function name will be reformatted assuming the specified language based on the style for that language defined in the .clang-format file. If no style has been defined in the .clang-format file for the specific language, a predefined style given by ‘BasedOnStyle’ is used. If ‘BasedOnStyle’ is not found, the formatting is based on llvm style. A matching delimiter takes precedence over a matching enclosing function name for determining the language of the raw string contents.
If a canonical delimiter is specified, occurrences of other delimiters for the same language will be updated to the canonical if possible.
There should be at most one specification per language and each delimiter and enclosing function should not occur in multiple specifications.
To configure this in the .clang-format file, use:
RawStringFormats: - Language: TextProto Delimiters: - 'pb' - 'proto' EnclosingFunctions: - 'PARSE_TEXT_PROTO' BasedOnStyle: google - Language: Cpp Delimiters: - 'cc' - 'cpp' BasedOnStyle: llvm CanonicalDelimiter: 'cc'
- ReflowComments (
bool
) If
true
, clang-format will attempt to re-flow comments.false: // veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongComment with plenty of information /* second veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongComment with plenty of information */ true: // veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongComment with plenty of // information /* second veryVeryVeryVeryVeryVeryVeryVeryVeryVeryVeryLongComment with plenty of * information */
- SortIncludes (
bool
) If
true
, clang-format will sort#includes
.false: true: #include "b.h" vs. #include "a.h" #include "a.h" #include "b.h"
- SortUsingDeclarations (
bool
) If
true
, clang-format will sort using declarations.The order of using declarations is defined as follows: Split the strings by “::” and discard any initial empty strings. The last element of each list is a non-namespace name; all others are namespace names. Sort the lists of names lexicographically, where the sort order of individual names is that all non-namespace names come before all namespace names, and within those groups, names are in case-insensitive lexicographic order.
false: true: using std::cout; vs. using std::cin; using std::cin; using std::cout;
- SpaceAfterCStyleCast (
bool
) If
true
, a space is inserted after C style casts.true: false: (int) i; vs. (int)i;
- SpaceAfterTemplateKeyword (
bool
) If
true
, a space will be inserted after the ‘template’ keyword.true: false: template <int> void foo(); vs. template<int> void foo();
- SpaceBeforeAssignmentOperators (
bool
) If
false
, spaces will be removed before assignment operators.true: false: int a = 5; vs. int a=5; a += 42 a+=42;
- SpaceBeforeCpp11BracedList (
bool
) If
true
, a space will be inserted before a C++11 braced list used to initialize an object (after the preceding identifier or type).true: false: Foo foo { bar }; vs. Foo foo{ bar }; Foo {}; Foo{}; vector<int> { 1, 2, 3 }; vector<int>{ 1, 2, 3 }; new int[3] { 1, 2, 3 }; new int[3]{ 1, 2, 3 };
- SpaceBeforeCtorInitializerColon (
bool
) If
false
, spaces will be removed before constructor initializer colon.true: false: Foo::Foo() : a(a) {} Foo::Foo(): a(a) {}
- SpaceBeforeInheritanceColon (
bool
) If
false
, spaces will be removed before inheritance colon.true: false: class Foo : Bar {} vs. class Foo: Bar {}
- SpaceBeforeParens (
SpaceBeforeParensOptions
) Defines in which cases to put a space before opening parentheses.
Possible values:
SBPO_Never
(in configuration:Never
) Never put a space before opening parentheses.void f() { if(true) { f(); } }
SBPO_ControlStatements
(in configuration:ControlStatements
) Put a space before opening parentheses only after control statement keywords (for/if/while...
).void f() { if (true) { f(); } }
SBPO_Always
(in configuration:Always
) Always put a space before opening parentheses, except when it’s prohibited by the syntax rules (in function-like macro definitions) or when determined by other style rules (after unary operators, opening parentheses, etc.)void f () { if (true) { f (); } }
- SpaceBeforeRangeBasedForLoopColon (
bool
) If
false
, spaces will be removed before range-based for loop colon.true: false: for (auto v : values) {} vs. for(auto v: values) {}
- SpaceInEmptyParentheses (
bool
) If
true
, spaces may be inserted into()
.true: false: void f( ) { vs. void f() { int x[] = {foo( ), bar( )}; int x[] = {foo(), bar()}; if (true) { if (true) { f( ); f(); } } } }
- SpacesBeforeTrailingComments (
unsigned
) The number of spaces before trailing line comments (
//
- comments).This does not affect trailing block comments (
/*
- comments) as those commonly have different usage patterns and a number of special cases.SpacesBeforeTrailingComments: 3 void f() { if (true) { // foo1 f(); // bar } // foo }
- SpacesInAngles (
bool
) If
true
, spaces will be inserted after<
and before>
in template argument lists.true: false: static_cast< int >(arg); vs. static_cast<int>(arg); std::function< void(int) > fct; std::function<void(int)> fct;
- SpacesInCStyleCastParentheses (
bool
) If
true
, spaces may be inserted into C style casts.true: false: x = ( int32 )y vs. x = (int32)y
- SpacesInContainerLiterals (
bool
) If
true
, spaces are inserted inside container literals (e.g. ObjC and Javascript array and dict literals).true: false: var arr = [ 1, 2, 3 ]; vs. var arr = [1, 2, 3]; f({a : 1, b : 2, c : 3}); f({a: 1, b: 2, c: 3});
- SpacesInParentheses (
bool
) If
true
, spaces will be inserted after(
and before)
.true: false: t f( Deleted & ) & = delete; vs. t f(Deleted &) & = delete;
- SpacesInSquareBrackets (
bool
) If
true
, spaces will be inserted after[
and before]
. Lambdas or unspecified size array declarations will not be affected.true: false: int a[ 5 ]; vs. int a[5]; std::unique_ptr<int[]> foo() {} // Won't be affected
- Standard (
LanguageStandard
) Format compatible with this standard, e.g. use
A<A<int> >
instead ofA<A<int>>
forLS_Cpp03
.Possible values:
LS_Cpp03
(in configuration:Cpp03
) Use C++03-compatible syntax.LS_Cpp11
(in configuration:Cpp11
) Use features of C++11, C++14 and C++1z (e.g.A<A<int>>
instead ofA<A<int> >
).LS_Auto
(in configuration:Auto
) Automatic detection based on the input.
- TabWidth (
unsigned
) - The number of columns used for tab stops.
- UseTab (
UseTabStyle
) The way to use tab characters in the resulting file.
Possible values:
UT_Never
(in configuration:Never
) Never use tab.UT_ForIndentation
(in configuration:ForIndentation
) Use tabs only for indentation.UT_ForContinuationAndIndentation
(in configuration:ForContinuationAndIndentation
) Use tabs only for line continuation and indentation.UT_Always
(in configuration:Always
) Use tabs whenever we need to fill whitespace that spans at least from one tab stop to the next one.
Adding additional style options¶
Each additional style option adds costs to the clang-format project. Some of these costs affect the clang-format development itself, as we need to make sure that any given combination of options work and that new features don’t break any of the existing options in any way. There are also costs for end users as options become less discoverable and people have to think about and make a decision on options they don’t really care about.
The goal of the clang-format project is more on the side of supporting a limited set of styles really well as opposed to supporting every single style used by a codebase somewhere in the wild. Of course, we do want to support all major projects and thus have established the following bar for adding style options. Each new style option must ..
- be used in a project of significant size (have dozens of contributors)
- have a publicly accessible style guide
- have a person willing to contribute and maintain patches
Examples¶
A style similar to the Linux Kernel style:
BasedOnStyle: LLVM
IndentWidth: 8
UseTab: Always
BreakBeforeBraces: Linux
AllowShortIfStatementsOnASingleLine: false
IndentCaseLabels: false
The result is (imagine that tabs are used for indentation here):
void test()
{
switch (x) {
case 0:
case 1:
do_something();
break;
case 2:
do_something_else();
break;
default:
break;
}
if (condition)
do_something_completely_different();
if (x == y) {
q();
} else if (x > y) {
w();
} else {
r();
}
}
A style similar to the default Visual Studio formatting style:
UseTab: Never
IndentWidth: 4
BreakBeforeBraces: Allman
AllowShortIfStatementsOnASingleLine: false
IndentCaseLabels: false
ColumnLimit: 0
The result is:
void test()
{
switch (suffix)
{
case 0:
case 1:
do_something();
break;
case 2:
do_something_else();
break;
default:
break;
}
if (condition)
do_somthing_completely_different();
if (x == y)
{
q();
}
else if (x > y)
{
w();
}
else
{
r();
}
}
Design Documents¶
“Clang” CFE Internals Manual¶
- Introduction
- LLVM Support Library
- The Clang “Basic” Library
- The Driver Library
- Precompiled Headers
- The Frontend Library
- The Lexer and Preprocessor Library
- The Parser Library
- The AST Library
- The Sema Library
- The CodeGen Library
- How to change Clang
Introduction¶
This document describes some of the more important APIs and internal design decisions made in the Clang C front-end. The purpose of this document is to both capture some of this high level information and also describe some of the design decisions behind it. This is meant for people interested in hacking on Clang, not for end-users. The description below is categorized by libraries, and does not describe any of the clients of the libraries.
LLVM Support Library¶
The LLVM libSupport
library provides many underlying libraries and
data-structures, including
command line option processing, various containers and a system abstraction
layer, which is used for file system access.
The Clang “Basic” Library¶
This library certainly needs a better name. The “basic” library contains a number of low-level utilities for tracking and manipulating source buffers, locations within the source buffers, diagnostics, tokens, target abstraction, and information about the subset of the language being compiled for.
Part of this infrastructure is specific to C (such as the TargetInfo
class), other parts could be reused for other non-C-based languages
(SourceLocation
, SourceManager
, Diagnostics
, FileManager
).
When and if there is future demand we can figure out if it makes sense to
introduce a new library, move the general classes somewhere else, or introduce
some other solution.
We describe the roles of these classes in order of their dependencies.
The Diagnostics Subsystem¶
The Clang Diagnostics subsystem is an important part of how the compiler
communicates with the human. Diagnostics are the warnings and errors produced
when the code is incorrect or dubious. In Clang, each diagnostic produced has
(at the minimum) a unique ID, an English translation associated with it, a
SourceLocation to “put the caret”, and a severity
(e.g., WARNING
or ERROR
). They can also optionally include a number of
arguments to the diagnostic (which fill in “%0“‘s in the string) as well as a
number of source ranges that related to the diagnostic.
In this section, we’ll be giving examples produced by the Clang command line
driver, but diagnostics can be rendered in many different ways depending on how the DiagnosticConsumer
interface is
implemented. A representative example of a diagnostic is:
t.c:38:15: error: invalid operands to binary expression ('int *' and '_Complex float')
P = (P-42) + Gamma*4;
~~~~~~ ^ ~~~~~~~
In this example, you can see the English translation, the severity (error), you
can see the source location (the caret (“^
”) and file/line/column info),
the source ranges “~~~~
”, arguments to the diagnostic (“int*
” and
“_Complex float
”). You’ll have to believe me that there is a unique ID
backing the diagnostic :).
Getting all of this to happen has several steps and involves many moving pieces, this section describes them and talks about best practices when adding a new diagnostic.
The Diagnostic*Kinds.td
files¶
Diagnostics are created by adding an entry to one of the
clang/Basic/Diagnostic*Kinds.td
files, depending on what library will be
using it. From this file, tblgen generates the unique ID of the
diagnostic, the severity of the diagnostic and the English translation + format
string.
There is little sanity with the naming of the unique ID’s right now. Some
start with err_
, warn_
, ext_
to encode the severity into the name.
Since the enum is referenced in the C++ code that produces the diagnostic, it
is somewhat useful for it to be reasonably short.
The severity of the diagnostic comes from the set {NOTE
, REMARK
,
WARNING
,
EXTENSION
, EXTWARN
, ERROR
}. The ERROR
severity is used for
diagnostics indicating the program is never acceptable under any circumstances.
When an error is emitted, the AST for the input code may not be fully built.
The EXTENSION
and EXTWARN
severities are used for extensions to the
language that Clang accepts. This means that Clang fully understands and can
represent them in the AST, but we produce diagnostics to tell the user their
code is non-portable. The difference is that the former are ignored by
default, and the later warn by default. The WARNING
severity is used for
constructs that are valid in the currently selected source language but that
are dubious in some way. The REMARK
severity provides generic information
about the compilation that is not necessarily related to any dubious code. The
NOTE
level is used to staple more information onto previous diagnostics.
These severities are mapped into a smaller set (the Diagnostic::Level
enum, {Ignored
, Note
, Remark
, Warning
, Error
, Fatal
}) of
output
levels by the diagnostics subsystem based on various configuration options.
Clang internally supports a fully fine grained mapping mechanism that allows
you to map almost any diagnostic to the output level that you want. The only
diagnostics that cannot be mapped are NOTE
s, which always follow the
severity of the previously emitted diagnostic and ERROR
s, which can only
be mapped to Fatal
(it is not possible to turn an error into a warning, for
example).
Diagnostic mappings are used in many ways. For example, if the user specifies
-pedantic
, EXTENSION
maps to Warning
, if they specify
-pedantic-errors
, it turns into Error
. This is used to implement
options like -Wunused_macros
, -Wundef
etc.
Mapping to Fatal
should only be used for diagnostics that are considered so
severe that error recovery won’t be able to recover sensibly from them (thus
spewing a ton of bogus errors). One example of this class of error are failure
to #include
a file.
The Format String¶
The format string for the diagnostic is very simple, but it has some power. It takes the form of a string in English with markers that indicate where and how arguments to the diagnostic are inserted and formatted. For example, here are some simple format strings:
"binary integer literals are an extension"
"format string contains '\\0' within the string body"
"more '%%' conversions than data arguments"
"invalid operands to binary expression (%0 and %1)"
"overloaded '%0' must be a %select{unary|binary|unary or binary}2 operator"
" (has %1 parameter%s1)"
These examples show some important points of format strings. You can use any
plain ASCII character in the diagnostic string except “%
” without a
problem, but these are C strings, so you have to use and be aware of all the C
escape sequences (as in the second example). If you want to produce a “%
”
in the output, use the “%%
” escape sequence, like the third diagnostic.
Finally, Clang uses the “%...[digit]
” sequences to specify where and how
arguments to the diagnostic are formatted.
Arguments to the diagnostic are numbered according to how they are specified by
the C++ code that produces them, and are
referenced by %0
.. %9
. If you have more than 10 arguments to your
diagnostic, you are doing something wrong :). Unlike printf
, there is no
requirement that arguments to the diagnostic end up in the output in the same
order as they are specified, you could have a format string with “%1 %0
”
that swaps them, for example. The text in between the percent and digit are
formatting instructions. If there are no instructions, the argument is just
turned into a string and substituted in.
Here are some “best practices” for writing the English format string:
- Keep the string short. It should ideally fit in the 80 column limit of the
DiagnosticKinds.td
file. This avoids the diagnostic wrapping when printed, and forces you to think about the important point you are conveying with the diagnostic. - Take advantage of location information. The user will be able to see the line and location of the caret, so you don’t need to tell them that the problem is with the 4th argument to the function: just point to it.
- Do not capitalize the diagnostic string, and do not end it with a period.
- If you need to quote something in the diagnostic string, use single quotes.
Diagnostics should never take random English strings as arguments: you
shouldn’t use “you have a problem with %0
” and pass in things like “your
argument
” or “your return value
” as arguments. Doing this prevents
translating the Clang diagnostics to other
languages (because they’ll get random English words in their otherwise
localized diagnostic). The exceptions to this are C/C++ language keywords
(e.g., auto
, const
, mutable
, etc) and C/C++ operators (/=
).
Note that things like “pointer” and “reference” are not keywords. On the other
hand, you can include anything that comes from the user’s source code,
including variable names, types, labels, etc. The “select
” format can be
used to achieve this sort of thing in a localizable way, see below.
Formatting a Diagnostic Argument¶
Arguments to diagnostics are fully typed internally, and come from a couple
different classes: integers, types, names, and random strings. Depending on
the class of the argument, it can be optionally formatted in different ways.
This gives the DiagnosticConsumer
information about what the argument means
without requiring it to use a specific presentation (consider this MVC for
Clang :).
Here are the different diagnostic argument formats currently supported by Clang:
“s” format
- Example:
"requires %1 parameter%s1"
- Class:
- Integers
- Description:
- This is a simple formatter for integers that is useful when producing English
diagnostics. When the integer is 1, it prints as nothing. When the integer
is not 1, it prints as “
s
”. This allows some simple grammatical forms to be to be handled correctly, and eliminates the need to use gross things like"requires %1 parameter(s)"
.
“select” format
- Example:
"must be a %select{unary|binary|unary or binary}2 operator"
- Class:
- Integers
- Description:
- This format specifier is used to merge multiple related diagnostics together
into one common one, without requiring the difference to be specified as an
English string argument. Instead of specifying the string, the diagnostic
gets an integer argument and the format string selects the numbered option.
In this case, the “
%2
” value must be an integer in the range [0..2]. If it is 0, it prints “unary”, if it is 1 it prints “binary” if it is 2, it prints “unary or binary”. This allows other language translations to substitute reasonable words (or entire phrases) based on the semantics of the diagnostic instead of having to do things textually. The selected string does undergo formatting.
“plural” format
- Example:
"you have %1 %plural{1:mouse|:mice}1 connected to your computer"
- Class:
- Integers
- Description:
This is a formatter for complex plural forms. It is designed to handle even the requirements of languages with very complex plural forms, as many Baltic languages have. The argument consists of a series of expression/form pairs, separated by “:”, where the first form whose expression evaluates to true is the result of the modifier.
An expression can be empty, in which case it is always true. See the example at the top. Otherwise, it is a series of one or more numeric conditions, separated by “,”. If any condition matches, the expression matches. Each numeric condition can take one of three forms.
- number: A simple decimal number matches if the argument is the same as the
number. Example:
"%plural{1:mouse|:mice}4"
- range: A range in square brackets matches if the argument is within the
range. Then range is inclusive on both ends. Example:
"%plural{0:none|1:one|[2,5]:some|:many}2"
- modulo: A modulo operator is followed by a number, and equals sign and
either a number or a range. The tests are the same as for plain numbers
and ranges, but the argument is taken modulo the number first. Example:
"%plural{%100=0:even hundred|%100=[1,50]:lower half|:everything else}1"
The parser is very unforgiving. A syntax error, even whitespace, will abort, as will a failure to match the argument against any expression.
- number: A simple decimal number matches if the argument is the same as the
number. Example:
“ordinal” format
- Example:
"ambiguity in %ordinal0 argument"
- Class:
- Integers
- Description:
- This is a formatter which represents the argument number as an ordinal: the
value
1
becomes1st
,3
becomes3rd
, and so on. Values less than1
are not supported. This formatter is currently hard-coded to use English ordinals.
“objcclass” format
- Example:
"method %objcclass0 not found"
- Class:
DeclarationName
- Description:
- This is a simple formatter that indicates the
DeclarationName
corresponds to an Objective-C class method selector. As such, it prints the selector with a leading “+
”.
“objcinstance” format
- Example:
"method %objcinstance0 not found"
- Class:
DeclarationName
- Description:
- This is a simple formatter that indicates the
DeclarationName
corresponds to an Objective-C instance method selector. As such, it prints the selector with a leading “-
“.
“q” format
- Example:
"candidate found by name lookup is %q0"
- Class:
NamedDecl *
- Description:
- This formatter indicates that the fully-qualified name of the declaration
should be printed, e.g., “
std::vector
” rather than “vector
”.
“diff” format
- Example:
"no known conversion %diff{from $ to $|from argument type to parameter type}1,2"
- Class:
QualType
- Description:
- This formatter takes two
QualType
s and attempts to print a template difference between the two. If tree printing is off, the text inside the braces before the pipe is printed, with the formatted text replacing the $. If tree printing is on, the text after the pipe is printed and a type tree is printed after the diagnostic message.
It is really easy to add format specifiers to the Clang diagnostics system, but they should be discussed before they are added. If you are creating a lot of repetitive diagnostics and/or have an idea for a useful formatter, please bring it up on the cfe-dev mailing list.
“sub” format
- Example:
Given the following record definition of type
TextSubstitution
:def select_ovl_candidate : TextSubstitution< "%select{function|constructor}0%select{| template| %2}1">;
which can be used as
def note_ovl_candidate : Note< "candidate %sub{select_ovl_candidate}3,2,1 not viable">;
and will act as if it was written
"candidate %select{function|constructor}3%select{| template| %1}2 not viable"
.- Description:
- This format specifier is used to avoid repeating strings verbatim in multiple
diagnostics. The argument to
%sub
must name aTextSubstitution
tblgen record. The substitution must specify all arguments used by the substitution, and the modifier indexes in the substitution are re-numbered accordingly. The substituted text must itself be a valid format string before substitution.
Producing the Diagnostic¶
Now that you’ve created the diagnostic in the Diagnostic*Kinds.td
file, you
need to write the code that detects the condition in question and emits the new
diagnostic. Various components of Clang (e.g., the preprocessor, Sema
,
etc.) provide a helper function named “Diag
”. It creates a diagnostic and
accepts the arguments, ranges, and other information that goes along with it.
For example, the binary expression error comes from code like this:
if (various things that are bad)
Diag(Loc, diag::err_typecheck_invalid_operands)
<< lex->getType() << rex->getType()
<< lex->getSourceRange() << rex->getSourceRange();
This shows that use of the Diag
method: it takes a location (a
SourceLocation object) and a diagnostic enum value
(which matches the name from Diagnostic*Kinds.td
). If the diagnostic takes
arguments, they are specified with the <<
operator: the first argument
becomes %0
, the second becomes %1
, etc. The diagnostic interface
allows you to specify arguments of many different types, including int
and
unsigned
for integer arguments, const char*
and std::string
for
string arguments, DeclarationName
and const IdentifierInfo *
for names,
QualType
for types, etc. SourceRange
s are also specified with the
<<
operator, but do not have a specific ordering requirement.
As you can see, adding and producing a diagnostic is pretty straightforward. The hard part is deciding exactly what you need to say to help the user, picking a suitable wording, and providing the information needed to format it correctly. The good news is that the call site that issues a diagnostic should be completely independent of how the diagnostic is formatted and in what language it is rendered.
Fix-It Hints¶
In some cases, the front end emits diagnostics when it is clear that some small change to the source code would fix the problem. For example, a missing semicolon at the end of a statement or a use of deprecated syntax that is easily rewritten into a more modern form. Clang tries very hard to emit the diagnostic and recover gracefully in these and other cases.
However, for these cases where the fix is obvious, the diagnostic can be annotated with a hint (referred to as a “fix-it hint”) that describes how to change the code referenced by the diagnostic to fix the problem. For example, it might add the missing semicolon at the end of the statement or rewrite the use of a deprecated construct into something more palatable. Here is one such example from the C++ front end, where we warn about the right-shift operator changing meaning from C++98 to C++11:
test.cpp:3:7: warning: use of right-shift operator ('>>') in template argument
will require parentheses in C++11
A<100 >> 2> *a;
^
( )
Here, the fix-it hint is suggesting that parentheses be added, and showing exactly where those parentheses would be inserted into the source code. The fix-it hints themselves describe what changes to make to the source code in an abstract manner, which the text diagnostic printer renders as a line of “insertions” below the caret line. Other diagnostic clients might choose to render the code differently (e.g., as markup inline) or even give the user the ability to automatically fix the problem.
Fix-it hints on errors and warnings need to obey these rules:
- Since they are automatically applied if
-Xclang -fixit
is passed to the driver, they should only be used when it’s very likely they match the user’s intent. - Clang must recover from errors as if the fix-it had been applied.
If a fix-it can’t obey these rules, put the fix-it on a note. Fix-its on notes are not applied automatically.
All fix-it hints are described by the FixItHint
class, instances of which
should be attached to the diagnostic using the <<
operator in the same way
that highlighted source ranges and arguments are passed to the diagnostic.
Fix-it hints can be created with one of three constructors:
FixItHint::CreateInsertion(Loc, Code)
Specifies that the given
Code
(a string) should be inserted before the source locationLoc
.FixItHint::CreateRemoval(Range)
Specifies that the code in the given source
Range
should be removed.FixItHint::CreateReplacement(Range, Code)
Specifies that the code in the given source
Range
should be removed, and replaced with the givenCode
string.
The DiagnosticConsumer
Interface¶
Once code generates a diagnostic with all of the arguments and the rest of the
relevant information, Clang needs to know what to do with it. As previously
mentioned, the diagnostic machinery goes through some filtering to map a
severity onto a diagnostic level, then (assuming the diagnostic is not mapped
to “Ignore
”) it invokes an object that implements the DiagnosticConsumer
interface with the information.
It is possible to implement this interface in many different ways. For
example, the normal Clang DiagnosticConsumer
(named
TextDiagnosticPrinter
) turns the arguments into strings (according to the
various formatting rules), prints out the file/line/column information and the
string, then prints out the line of code, the source ranges, and the caret.
However, this behavior isn’t required.
Another implementation of the DiagnosticConsumer
interface is the
TextDiagnosticBuffer
class, which is used when Clang is in -verify
mode. Instead of formatting and printing out the diagnostics, this
implementation just captures and remembers the diagnostics as they fly by.
Then -verify
compares the list of produced diagnostics to the list of
expected ones. If they disagree, it prints out its own output. Full
documentation for the -verify
mode can be found in the Clang API
documentation for VerifyDiagnosticConsumer.
There are many other possible implementations of this interface, and this is why we prefer diagnostics to pass down rich structured information in arguments. For example, an HTML output might want declaration names be linkified to where they come from in the source. Another example is that a GUI might let you click on typedefs to expand them. This application would want to pass significantly more information about types through to the GUI than a simple flat string. The interface allows this to happen.
Adding Translations to Clang¶
Not possible yet! Diagnostic strings should be written in UTF-8, the client can translate to the relevant code page if needed. Each translation completely replaces the format string for the diagnostic.
The SourceLocation
and SourceManager
classes¶
Strangely enough, the SourceLocation
class represents a location within the
source code of the program. Important design points include:
sizeof(SourceLocation)
must be extremely small, as these are embedded into many AST nodes and are passed around often. Currently it is 32 bits.SourceLocation
must be a simple value object that can be efficiently copied.- We should be able to represent a source location for any byte of any input file. This includes in the middle of tokens, in whitespace, in trigraphs, etc.
- A
SourceLocation
must encode the current#include
stack that was active when the location was processed. For example, if the location corresponds to a token, it should contain the set of#include
s active when the token was lexed. This allows us to print the#include
stack for a diagnostic. SourceLocation
must be able to describe macro expansions, capturing both the ultimate instantiation point and the source of the original character data.
In practice, the SourceLocation
works together with the SourceManager
class to encode two pieces of information about a location: its spelling
location and its expansion location. For most tokens, these will be the
same. However, for a macro expansion (or tokens that came from a _Pragma
directive) these will describe the location of the characters corresponding to
the token and the location where the token was used (i.e., the macro
expansion point or the location of the _Pragma
itself).
The Clang front-end inherently depends on the location of a token being tracked
correctly. If it is ever incorrect, the front-end may get confused and die.
The reason for this is that the notion of the “spelling” of a Token
in
Clang depends on being able to find the original input characters for the
token. This concept maps directly to the “spelling location” for the token.
SourceRange
and CharSourceRange
¶
Clang represents most source ranges by [first, last], where “first” and “last”
each point to the beginning of their respective tokens. For example consider
the SourceRange
of the following statement:
x = foo + bar;
^first ^last
To map from this representation to a character-based representation, the “last”
location needs to be adjusted to point to (or past) the end of that token with
either Lexer::MeasureTokenLength()
or Lexer::getLocForEndOfToken()
. For
the rare cases where character-level source ranges information is needed we use
the CharSourceRange
class.
The Driver Library¶
The clang Driver and library are documented here.
Precompiled Headers¶
Clang supports two implementations of precompiled headers. The default implementation, precompiled headers (PCH) uses a serialized representation of Clang’s internal data structures, encoded with the LLVM bitstream format. Pretokenized headers (PTH), on the other hand, contain a serialized representation of the tokens encountered when preprocessing a header (and anything that header includes).
The Frontend Library¶
The Frontend library contains functionality useful for building tools on top of the Clang libraries, for example several methods for outputting diagnostics.
The Lexer and Preprocessor Library¶
The Lexer library contains several tightly-connected classes that are involved
with the nasty process of lexing and preprocessing C source code. The main
interface to this library for outside clients is the large Preprocessor
class. It contains the various pieces of state that are required to coherently
read tokens out of a translation unit.
The core interface to the Preprocessor
object (once it is set up) is the
Preprocessor::Lex
method, which returns the next Token from
the preprocessor stream. There are two types of token providers that the
preprocessor is capable of reading from: a buffer lexer (provided by the
Lexer class) and a buffered token stream (provided by the
TokenLexer class).
The Token class¶
The Token
class is used to represent a single lexed token. Tokens are
intended to be used by the lexer/preprocess and parser libraries, but are not
intended to live beyond them (for example, they should not live in the ASTs).
Tokens most often live on the stack (or some other location that is efficient
to access) as the parser is running, but occasionally do get buffered up. For
example, macro definitions are stored as a series of tokens, and the C++
front-end periodically needs to buffer tokens up for tentative parsing and
various pieces of look-ahead. As such, the size of a Token
matters. On a
32-bit system, sizeof(Token)
is currently 16 bytes.
Tokens occur in two forms: annotation tokens and normal tokens. Normal tokens are those returned by the lexer, annotation tokens represent semantic information and are produced by the parser, replacing normal tokens in the token stream. Normal tokens contain the following information:
- A SourceLocation — This indicates the location of the start of the token.
- A length — This stores the length of the token as stored in the
SourceBuffer
. For tokens that include them, this length includes trigraphs and escaped newlines which are ignored by later phases of the compiler. By pointing into the original source buffer, it is always possible to get the original spelling of a token completely accurately. - IdentifierInfo — If a token takes the form of an identifier, and if
identifier lookup was enabled when the token was lexed (e.g., the lexer was
not reading in “raw” mode) this contains a pointer to the unique hash value
for the identifier. Because the lookup happens before keyword
identification, this field is set even for language keywords like “
for
”. - TokenKind — This indicates the kind of token as classified by the
lexer. This includes things like
tok::starequal
(for the “*=
” operator),tok::ampamp
for the “&&
” token, and keyword values (e.g.,tok::kw_for
) for identifiers that correspond to keywords. Note that some tokens can be spelled multiple ways. For example, C++ supports “operator keywords”, where things like “and
” are treated exactly like the “&&
” operator. In these cases, the kind value is set totok::ampamp
, which is good for the parser, which doesn’t have to consider both forms. For something that cares about which form is used (e.g., the preprocessor “stringize” operator) the spelling indicates the original form. - Flags — There are currently four flags tracked by the
lexer/preprocessor system on a per-token basis:
- StartOfLine — This was the first token that occurred on its input source line.
- LeadingSpace — There was a space character either immediately before the token or transitively before the token as it was expanded through a macro. The definition of this flag is very closely defined by the stringizing requirements of the preprocessor.
- DisableExpand — This flag is used internally to the preprocessor to represent identifier tokens which have macro expansion disabled. This prevents them from being considered as candidates for macro expansion ever in the future.
- NeedsCleaning — This flag is set if the original spelling for the token includes a trigraph or escaped newline. Since this is uncommon, many pieces of code can fast-path on tokens that did not need cleaning.
One interesting (and somewhat unusual) aspect of normal tokens is that they don’t contain any semantic information about the lexed value. For example, if the token was a pp-number token, we do not represent the value of the number that was lexed (this is left for later pieces of code to decide). Additionally, the lexer library has no notion of typedef names vs variable names: both are returned as identifiers, and the parser is left to decide whether a specific identifier is a typedef or a variable (tracking this requires scope information among other things). The parser can do this translation by replacing tokens returned by the preprocessor with “Annotation Tokens”.
Annotation Tokens¶
Annotation tokens are tokens that are synthesized by the parser and injected
into the preprocessor’s token stream (replacing existing tokens) to record
semantic information found by the parser. For example, if “foo
” is found
to be a typedef, the “foo
” tok::identifier
token is replaced with an
tok::annot_typename
. This is useful for a couple of reasons: 1) this makes
it easy to handle qualified type names (e.g., “foo::bar::baz<42>::t
”) in
C++ as a single “token” in the parser. 2) if the parser backtracks, the
reparse does not need to redo semantic analysis to determine whether a token
sequence is a variable, type, template, etc.
Annotation tokens are created by the parser and reinjected into the parser’s
token stream (when backtracking is enabled). Because they can only exist in
tokens that the preprocessor-proper is done with, it doesn’t need to keep
around flags like “start of line” that the preprocessor uses to do its job.
Additionally, an annotation token may “cover” a sequence of preprocessor tokens
(e.g., “a::b::c
” is five preprocessor tokens). As such, the valid fields
of an annotation token are different than the fields for a normal token (but
they are multiplexed into the normal Token
fields):
- SourceLocation “Location” — The
SourceLocation
for the annotation token indicates the first token replaced by the annotation token. In the example above, it would be the location of the “a
” identifier. - SourceLocation “AnnotationEndLoc” — This holds the location of the last
token replaced with the annotation token. In the example above, it would be
the location of the “
c
” identifier. - void* “AnnotationValue” — This contains an opaque object that the
parser gets from
Sema
. The parser merely preserves the information forSema
to later interpret based on the annotation token kind. - TokenKind “Kind” — This indicates the kind of Annotation token this is. See below for the different valid kinds.
Annotation tokens currently come in three kinds:
- tok::annot_typename: This annotation token represents a resolved
typename token that is potentially qualified. The
AnnotationValue
field contains theQualType
returned bySema::getTypeName()
, possibly with source location information attached. - tok::annot_cxxscope: This annotation token represents a C++ scope
specifier, such as “
A::B::
”. This corresponds to the grammar productions “::” and “:: [opt] nested-name-specifier”. TheAnnotationValue
pointer is aNestedNameSpecifier *
returned by theSema::ActOnCXXGlobalScopeSpecifier
andSema::ActOnCXXNestedNameSpecifier
callbacks. - tok::annot_template_id: This annotation token represents a C++
template-id such as “
foo<int, 4>
”, where “foo
” is the name of a template. TheAnnotationValue
pointer is a pointer to amalloc
’dTemplateIdAnnotation
object. Depending on the context, a parsed template-id that names a type might become a typename annotation token (if all we care about is the named type, e.g., because it occurs in a type specifier) or might remain a template-id token (if we want to retain more source location information or produce a new type, e.g., in a declaration of a class template specialization). template-id annotation tokens that refer to a type can be “upgraded” to typename annotation tokens by the parser.
As mentioned above, annotation tokens are not returned by the preprocessor,
they are formed on demand by the parser. This means that the parser has to be
aware of cases where an annotation could occur and form it where appropriate.
This is somewhat similar to how the parser handles Translation Phase 6 of C99:
String Concatenation (see C99 5.1.1.2). In the case of string concatenation,
the preprocessor just returns distinct tok::string_literal
and
tok::wide_string_literal
tokens and the parser eats a sequence of them
wherever the grammar indicates that a string literal can occur.
In order to do this, whenever the parser expects a tok::identifier
or
tok::coloncolon
, it should call the TryAnnotateTypeOrScopeToken
or
TryAnnotateCXXScopeToken
methods to form the annotation token. These
methods will maximally form the specified annotation tokens and replace the
current token with them, if applicable. If the current tokens is not valid for
an annotation token, it will remain an identifier or “::
” token.
The Lexer
class¶
The Lexer
class provides the mechanics of lexing tokens out of a source
buffer and deciding what they mean. The Lexer
is complicated by the fact
that it operates on raw buffers that have not had spelling eliminated (this is
a necessity to get decent performance), but this is countered with careful
coding as well as standard performance techniques (for example, the comment
handling code is vectorized on X86 and PowerPC hosts).
The lexer has a couple of interesting modal features:
- The lexer can operate in “raw” mode. This mode has several features that
make it possible to quickly lex the file (e.g., it stops identifier lookup,
doesn’t specially handle preprocessor tokens, handles EOF differently, etc).
This mode is used for lexing within an “
#if 0
” block, for example. - The lexer can capture and return comments as tokens. This is required to
support the
-C
preprocessor mode, which passes comments through, and is used by the diagnostic checker to identifier expect-error annotations. - The lexer can be in
ParsingFilename
mode, which happens when preprocessing after reading a#include
directive. This mode changes the parsing of “<
” to return an “angled string” instead of a bunch of tokens for each thing within the filename. - When parsing a preprocessor directive (after “
#
”) theParsingPreprocessorDirective
mode is entered. This changes the parser to return EOD at a newline. - The
Lexer
uses aLangOptions
object to know whether trigraphs are enabled, whether C++ or ObjC keywords are recognized, etc.
In addition to these modes, the lexer keeps track of a couple of other features that are local to a lexed buffer, which change as the buffer is lexed:
- The
Lexer
usesBufferPtr
to keep track of the current character being lexed. - The
Lexer
usesIsAtStartOfLine
to keep track of whether the next lexed token will start with its “start of line” bit set. - The
Lexer
keeps track of the current “#if
” directives that are active (which can be nested). - The
Lexer
keeps track of an MultipleIncludeOpt object, which is used to detect whether the buffer uses the standard “#ifndef XX
/#define XX
” idiom to prevent multiple inclusion. If a buffer does, subsequent includes can be ignored if the “XX
” macro is defined.
The TokenLexer
class¶
The TokenLexer
class is a token provider that returns tokens from a list of
tokens that came from somewhere else. It typically used for two things: 1)
returning tokens from a macro definition as it is being expanded 2) returning
tokens from an arbitrary buffer of tokens. The later use is used by
_Pragma
and will most likely be used to handle unbounded look-ahead for the
C++ parser.
The MultipleIncludeOpt
class¶
The MultipleIncludeOpt
class implements a really simple little state
machine that is used to detect the standard “#ifndef XX
/ #define XX
”
idiom that people typically use to prevent multiple inclusion of headers. If a
buffer uses this idiom and is subsequently #include
’d, the preprocessor can
simply check to see whether the guarding condition is defined or not. If so,
the preprocessor can completely ignore the include of the header.
The Parser Library¶
This library contains a recursive-descent parser that polls tokens from the preprocessor and notifies a client of the parsing progress.
Historically, the parser used to talk to an abstract Action
interface that
had virtual methods for parse events, for example ActOnBinOp()
. When Clang
grew C++ support, the parser stopped supporting general Action
clients –
it now always talks to the Sema library. However, the Parser
still accesses AST objects only through opaque types like ExprResult
and
StmtResult
. Only Sema looks at the AST node contents of these
wrappers.
The AST Library¶
The Type
class and its subclasses¶
The Type
class (and its subclasses) are an important part of the AST.
Types are accessed through the ASTContext
class, which implicitly creates
and uniques them as they are needed. Types have a couple of non-obvious
features: 1) they do not capture type qualifiers like const
or volatile
(see QualType), and 2) they implicitly capture typedef
information. Once created, types are immutable (unlike decls).
Typedefs in C make semantic analysis a bit more complex than it would be without them. The issue is that we want to capture typedef information and represent it in the AST perfectly, but the semantics of operations need to “see through” typedefs. For example, consider this code:
void func() {
typedef int foo;
foo X, *Y;
typedef foo *bar;
bar Z;
*X; // error
**Y; // error
**Z; // error
}
The code above is illegal, and thus we expect there to be diagnostics emitted on the annotated lines. In this example, we expect to get:
test.c:6:1: error: indirection requires pointer operand ('foo' invalid)
*X; // error
^~
test.c:7:1: error: indirection requires pointer operand ('foo' invalid)
**Y; // error
^~~
test.c:8:1: error: indirection requires pointer operand ('foo' invalid)
**Z; // error
^~~
While this example is somewhat silly, it illustrates the point: we want to
retain typedef information where possible, so that we can emit errors about
“std::string
” instead of “std::basic_string<char, std:...
”. Doing this
requires properly keeping typedef information (for example, the type of X
is “foo
”, not “int
”), and requires properly propagating it through the
various operators (for example, the type of *Y
is “foo
”, not
“int
”). In order to retain this information, the type of these expressions
is an instance of the TypedefType
class, which indicates that the type of
these expressions is a typedef for “foo
”.
Representing types like this is great for diagnostics, because the user-specified type is always immediately available. There are two problems with this: first, various semantic checks need to make judgements about the actual structure of a type, ignoring typedefs. Second, we need an efficient way to query whether two types are structurally identical to each other, ignoring typedefs. The solution to both of these problems is the idea of canonical types.
Canonical Types¶
Every instance of the Type
class contains a canonical type pointer. For
simple types with no typedefs involved (e.g., “int
”, “int*
”,
“int**
”), the type just points to itself. For types that have a typedef
somewhere in their structure (e.g., “foo
”, “foo*
”, “foo**
”,
“bar
”), the canonical type pointer points to their structurally equivalent
type without any typedefs (e.g., “int
”, “int*
”, “int**
”, and
“int*
” respectively).
This design provides a constant time operation (dereferencing the canonical type
pointer) that gives us access to the structure of types. For example, we can
trivially tell that “bar
” and “foo*
” are the same type by dereferencing
their canonical type pointers and doing a pointer comparison (they both point
to the single “int*
” type).
Canonical types and typedef types bring up some complexities that must be
carefully managed. Specifically, the isa
/cast
/dyn_cast
operators
generally shouldn’t be used in code that is inspecting the AST. For example,
when type checking the indirection operator (unary “*
” on a pointer), the
type checker must verify that the operand has a pointer type. It would not be
correct to check that with “isa<PointerType>(SubExpr->getType())
”, because
this predicate would fail if the subexpression had a typedef type.
The solution to this problem are a set of helper methods on Type
, used to
check their properties. In this case, it would be correct to use
“SubExpr->getType()->isPointerType()
” to do the check. This predicate will
return true if the canonical type is a pointer, which is true any time the
type is structurally a pointer type. The only hard part here is remembering
not to use the isa
/cast
/dyn_cast
operations.
The second problem we face is how to get access to the pointer type once we
know it exists. To continue the example, the result type of the indirection
operator is the pointee type of the subexpression. In order to determine the
type, we need to get the instance of PointerType
that best captures the
typedef information in the program. If the type of the expression is literally
a PointerType
, we can return that, otherwise we have to dig through the
typedefs to find the pointer type. For example, if the subexpression had type
“foo*
”, we could return that type as the result. If the subexpression had
type “bar
”, we want to return “foo*
” (note that we do not want
“int*
”). In order to provide all of this, Type
has a
getAsPointerType()
method that checks whether the type is structurally a
PointerType
and, if so, returns the best one. If not, it returns a null
pointer.
This structure is somewhat mystical, but after meditating on it, it will make sense to you :).
The QualType
class¶
The QualType
class is designed as a trivial value class that is small,
passed by-value and is efficient to query. The idea of QualType
is that it
stores the type qualifiers (const
, volatile
, restrict
, plus some
extended qualifiers required by language extensions) separately from the types
themselves. QualType
is conceptually a pair of “Type*
” and the bits
for these type qualifiers.
By storing the type qualifiers as bits in the conceptual pair, it is extremely
efficient to get the set of qualifiers on a QualType
(just return the field
of the pair), add a type qualifier (which is a trivial constant-time operation
that sets a bit), and remove one or more type qualifiers (just return a
QualType
with the bitfield set to empty).
Further, because the bits are stored outside of the type itself, we do not need
to create duplicates of types with different sets of qualifiers (i.e. there is
only a single heap allocated “int
” type: “const int
” and “volatile
const int
” both point to the same heap allocated “int
” type). This
reduces the heap size used to represent bits and also means we do not have to
consider qualifiers when uniquing types (Type does not even
contain qualifiers).
In practice, the two most common type qualifiers (const
and restrict
)
are stored in the low bits of the pointer to the Type
object, together with
a flag indicating whether extended qualifiers are present (which must be
heap-allocated). This means that QualType
is exactly the same size as a
pointer.
Declaration names¶
The DeclarationName
class represents the name of a declaration in Clang.
Declarations in the C family of languages can take several different forms.
Most declarations are named by simple identifiers, e.g., “f
” and “x
” in
the function declaration f(int x)
. In C++, declaration names can also name
class constructors (“Class
” in struct Class { Class(); }
), class
destructors (“~Class
”), overloaded operator names (“operator+
”), and
conversion functions (“operator void const *
”). In Objective-C,
declaration names can refer to the names of Objective-C methods, which involve
the method name and the parameters, collectively called a selector, e.g.,
“setWidth:height:
”. Since all of these kinds of entities — variables,
functions, Objective-C methods, C++ constructors, destructors, and operators
— are represented as subclasses of Clang’s common NamedDecl
class,
DeclarationName
is designed to efficiently represent any kind of name.
Given a DeclarationName
N
, N.getNameKind()
will produce a value
that describes what kind of name N
stores. There are 10 options (all of
the names are inside the DeclarationName
class).
Identifier
The name is a simple identifier. UseN.getAsIdentifierInfo()
to retrieve the correspondingIdentifierInfo*
pointing to the actual identifier.
ObjCZeroArgSelector
, ObjCOneArgSelector
, ObjCMultiArgSelector
The name is an Objective-C selector, which can be retrieved as aSelector
instance viaN.getObjCSelector()
. The three possible name kinds for Objective-C reflect an optimization within theDeclarationName
class: both zero- and one-argument selectors are stored as a maskedIdentifierInfo
pointer, and therefore require very little space, since zero- and one-argument selectors are far more common than multi-argument selectors (which use a different structure).
CXXConstructorName
The name is a C++ constructor name. UseN.getCXXNameType()
to retrieve the type that this constructor is meant to construct. The type is always the canonical type, since all constructors for a given type have the same name.
CXXDestructorName
The name is a C++ destructor name. UseN.getCXXNameType()
to retrieve the type whose destructor is being named. This type is always a canonical type.
CXXConversionFunctionName
The name is a C++ conversion function. Conversion functions are named according to the type they convert to, e.g., “operator void const *
”. UseN.getCXXNameType()
to retrieve the type that this conversion function converts to. This type is always a canonical type.
CXXOperatorName
The name is a C++ overloaded operator name. Overloaded operators are named according to their spelling, e.g., “operator+
” or “operator new []
”. UseN.getCXXOverloadedOperator()
to retrieve the overloaded operator (a value of typeOverloadedOperatorKind
).
CXXLiteralOperatorName
The name is a C++11 user defined literal operator. User defined Literal operators are named according to the suffix they define, e.g., “_foo
” for “operator "" _foo
”. UseN.getCXXLiteralIdentifier()
to retrieve the correspondingIdentifierInfo*
pointing to the identifier.
CXXUsingDirective
The name is a C++ using directive. Using directives are not really NamedDecls, in that they all have the same name, but they are implemented as such in order to store them in DeclContext effectively.
DeclarationName
s are cheap to create, copy, and compare. They require
only a single pointer’s worth of storage in the common cases (identifiers,
zero- and one-argument Objective-C selectors) and use dense, uniqued storage
for the other kinds of names. Two DeclarationName
s can be compared for
equality (==
, !=
) using a simple bitwise comparison, can be ordered
with <
, >
, <=
, and >=
(which provide a lexicographical ordering
for normal identifiers but an unspecified ordering for other kinds of names),
and can be placed into LLVM DenseMap
s and DenseSet
s.
DeclarationName
instances can be created in different ways depending on
what kind of name the instance will store. Normal identifiers
(IdentifierInfo
pointers) and Objective-C selectors (Selector
) can be
implicitly converted to DeclarationNames
. Names for C++ constructors,
destructors, conversion functions, and overloaded operators can be retrieved
from the DeclarationNameTable
, an instance of which is available as
ASTContext::DeclarationNames
. The member functions
getCXXConstructorName
, getCXXDestructorName
,
getCXXConversionFunctionName
, and getCXXOperatorName
, respectively,
return DeclarationName
instances for the four kinds of C++ special function
names.
Declaration contexts¶
Every declaration in a program exists within some declaration context, such
as a translation unit, namespace, class, or function. Declaration contexts in
Clang are represented by the DeclContext
class, from which the various
declaration-context AST nodes (TranslationUnitDecl
, NamespaceDecl
,
RecordDecl
, FunctionDecl
, etc.) will derive. The DeclContext
class
provides several facilities common to each declaration context:
Source-centric vs. Semantics-centric View of Declarations
DeclContext
provides two views of the declarations stored within a declaration context. The source-centric view accurately represents the program source code as written, including multiple declarations of entities where present (see the section Redeclarations and Overloads), while the semantics-centric view represents the program semantics. The two views are kept synchronized by semantic analysis while the ASTs are being constructed.
Storage of declarations within that context
Every declaration context can contain some number of declarations. For example, a C++ class (represented byRecordDecl
) contains various member functions, fields, nested types, and so on. All of these declarations will be stored within theDeclContext
, and one can iterate over the declarations via [DeclContext::decls_begin()
,DeclContext::decls_end()
). This mechanism provides the source-centric view of declarations in the context.
Lookup of declarations within that context
TheDeclContext
structure provides efficient name lookup for names within that declaration context. For example, ifN
is a namespace we can look for the nameN::f
usingDeclContext::lookup
. The lookup itself is based on a lazily-constructed array (for declaration contexts with a small number of declarations) or hash table (for declaration contexts with more declarations). The lookup operation provides the semantics-centric view of the declarations in the context.
Ownership of declarations
TheDeclContext
owns all of the declarations that were declared within its declaration context, and is responsible for the management of their memory as well as their (de-)serialization.
All declarations are stored within a declaration context, and one can query
information about the context in which each declaration lives. One can
retrieve the DeclContext
that contains a particular Decl
using
Decl::getDeclContext
. However, see the section
Lexical and Semantic Contexts for more information about how to interpret
this context information.
Redeclarations and Overloads¶
Within a translation unit, it is common for an entity to be declared several
times. For example, we might declare a function “f
” and then later
re-declare it as part of an inlined definition:
void f(int x, int y, int z = 1);
inline void f(int x, int y, int z) { /* ... */ }
The representation of “f
” differs in the source-centric and
semantics-centric views of a declaration context. In the source-centric view,
all redeclarations will be present, in the order they occurred in the source
code, making this view suitable for clients that wish to see the structure of
the source code. In the semantics-centric view, only the most recent “f
”
will be found by the lookup, since it effectively replaces the first
declaration of “f
”.
In the semantics-centric view, overloading of functions is represented
explicitly. For example, given two declarations of a function “g
” that are
overloaded, e.g.,
void g();
void g(int);
the DeclContext::lookup
operation will return a
DeclContext::lookup_result
that contains a range of iterators over
declarations of “g
”. Clients that perform semantic analysis on a program
that is not concerned with the actual source code will primarily use this
semantics-centric view.
Lexical and Semantic Contexts¶
Each declaration has two potentially different declaration contexts: a
lexical context, which corresponds to the source-centric view of the
declaration context, and a semantic context, which corresponds to the
semantics-centric view. The lexical context is accessible via
Decl::getLexicalDeclContext
while the semantic context is accessible via
Decl::getDeclContext
, both of which return DeclContext
pointers. For
most declarations, the two contexts are identical. For example:
class X {
public:
void f(int x);
};
Here, the semantic and lexical contexts of X::f
are the DeclContext
associated with the class X
(itself stored as a RecordDecl
AST node).
However, we can now define X::f
out-of-line:
void X::f(int x = 17) { /* ... */ }
This definition of “f
” has different lexical and semantic contexts. The
lexical context corresponds to the declaration context in which the actual
declaration occurred in the source code, e.g., the translation unit containing
X
. Thus, this declaration of X::f
can be found by traversing the
declarations provided by [decls_begin()
, decls_end()
) in the
translation unit.
The semantic context of X::f
corresponds to the class X
, since this
member function is (semantically) a member of X
. Lookup of the name f
into the DeclContext
associated with X
will then return the definition
of X::f
(including information about the default argument).
Transparent Declaration Contexts¶
In C and C++, there are several contexts in which names that are logically declared inside another declaration will actually “leak” out into the enclosing scope from the perspective of name lookup. The most obvious instance of this behavior is in enumeration types, e.g.,
enum Color {
Red,
Green,
Blue
};
Here, Color
is an enumeration, which is a declaration context that contains
the enumerators Red
, Green
, and Blue
. Thus, traversing the list of
declarations contained in the enumeration Color
will yield Red
,
Green
, and Blue
. However, outside of the scope of Color
one can
name the enumerator Red
without qualifying the name, e.g.,
Color c = Red;
There are other entities in C++ that provide similar behavior. For example, linkage specifications that use curly braces:
extern "C" {
void f(int);
void g(int);
}
// f and g are visible here
For source-level accuracy, we treat the linkage specification and enumeration
type as a declaration context in which its enclosed declarations (“Red
”,
“Green
”, and “Blue
”; “f
” and “g
”) are declared. However, these
declarations are visible outside of the scope of the declaration context.
These language features (and several others, described below) have roughly the
same set of requirements: declarations are declared within a particular lexical
context, but the declarations are also found via name lookup in scopes
enclosing the declaration itself. This feature is implemented via
transparent declaration contexts (see
DeclContext::isTransparentContext()
), whose declarations are visible in the
nearest enclosing non-transparent declaration context. This means that the
lexical context of the declaration (e.g., an enumerator) will be the
transparent DeclContext
itself, as will the semantic context, but the
declaration will be visible in every outer context up to and including the
first non-transparent declaration context (since transparent declaration
contexts can be nested).
The transparent DeclContext
s are:
Enumerations (but not C++11 “scoped enumerations”):
enum Color { Red, Green, Blue }; // Red, Green, and Blue are in scope
C++ linkage specifications:
extern "C" { void f(int); void g(int); } // f and g are in scope
Anonymous unions and structs:
struct LookupTable { bool IsVector; union { std::vector<Item> *Vector; std::set<Item> *Set; }; }; LookupTable LT; LT.Vector = 0; // Okay: finds Vector inside the unnamed union
C++11 inline namespaces:
namespace mylib { inline namespace debug { class X; } } mylib::X *xp; // okay: mylib::X refers to mylib::debug::X
Multiply-Defined Declaration Contexts¶
C++ namespaces have the interesting — and, so far, unique — property that the namespace can be defined multiple times, and the declarations provided by each namespace definition are effectively merged (from the semantic point of view). For example, the following two code snippets are semantically indistinguishable:
// Snippet #1:
namespace N {
void f();
}
namespace N {
void f(int);
}
// Snippet #2:
namespace N {
void f();
void f(int);
}
In Clang’s representation, the source-centric view of declaration contexts will
actually have two separate NamespaceDecl
nodes in Snippet #1, each of which
is a declaration context that contains a single declaration of “f
”.
However, the semantics-centric view provided by name lookup into the namespace
N
for “f
” will return a DeclContext::lookup_result
that contains a
range of iterators over declarations of “f
”.
DeclContext
manages multiply-defined declaration contexts internally. The
function DeclContext::getPrimaryContext
retrieves the “primary” context for
a given DeclContext
instance, which is the DeclContext
responsible for
maintaining the lookup table used for the semantics-centric view. Given a
DeclContext, one can obtain the set of declaration contexts that are
semantically connected to this declaration context, in source order, including
this context (which will be the only result, for non-namespace contexts) via
DeclContext::collectAllContexts
. Note that these functions are used
internally within the lookup and insertion methods of the DeclContext
, so
the vast majority of clients can ignore them.
The CFG
class¶
The CFG
class is designed to represent a source-level control-flow graph
for a single statement (Stmt*
). Typically instances of CFG
are
constructed for function bodies (usually an instance of CompoundStmt
), but
can also be instantiated to represent the control-flow of any class that
subclasses Stmt
, which includes simple expressions. Control-flow graphs
are especially useful for performing flow- or path-sensitive program
analyses on a given function.
Basic Blocks¶
Concretely, an instance of CFG
is a collection of basic blocks. Each basic
block is an instance of CFGBlock
, which simply contains an ordered sequence
of Stmt*
(each referring to statements in the AST). The ordering of
statements within a block indicates unconditional flow of control from one
statement to the next. Conditional control-flow is represented using edges between basic blocks. The
statements within a given CFGBlock
can be traversed using the
CFGBlock::*iterator
interface.
A CFG
object owns the instances of CFGBlock
within the control-flow
graph it represents. Each CFGBlock
within a CFG is also uniquely numbered
(accessible via CFGBlock::getBlockID()
). Currently the number is based on
the ordering the blocks were created, but no assumptions should be made on how
CFGBlocks
are numbered other than their numbers are unique and that they
are numbered from 0..N-1 (where N is the number of basic blocks in the CFG).
Entry and Exit Blocks¶
Each instance of CFG
contains two special blocks: an entry block
(accessible via CFG::getEntry()
), which has no incoming edges, and an
exit block (accessible via CFG::getExit()
), which has no outgoing edges.
Neither block contains any statements, and they serve the role of providing a
clear entrance and exit for a body of code such as a function body. The
presence of these empty blocks greatly simplifies the implementation of many
analyses built on top of CFGs.
Conditional Control-Flow¶
Conditional control-flow (such as those induced by if-statements and loops) is
represented as edges between CFGBlocks
. Because different C language
constructs can induce control-flow, each CFGBlock
also records an extra
Stmt*
that represents the terminator of the block. A terminator is
simply the statement that caused the control-flow, and is used to identify the
nature of the conditional control-flow between blocks. For example, in the
case of an if-statement, the terminator refers to the IfStmt
object in the
AST that represented the given branch.
To illustrate, consider the following code example:
int foo(int x) {
x = x + 1;
if (x > 2)
x++;
else {
x += 2;
x *= 2;
}
return x;
}
After invoking the parser+semantic analyzer on this code fragment, the AST of
the body of foo
is referenced by a single Stmt*
. We can then construct
an instance of CFG
representing the control-flow graph of this function
body by single call to a static class method:
Stmt *FooBody = ...
std::unique_ptr<CFG> FooCFG = CFG::buildCFG(FooBody);
Along with providing an interface to iterate over its CFGBlocks
, the
CFG
class also provides methods that are useful for debugging and
visualizing CFGs. For example, the method CFG::dump()
dumps a
pretty-printed version of the CFG to standard error. This is especially useful
when one is using a debugger such as gdb. For example, here is the output of
FooCFG->dump()
:
[ B5 (ENTRY) ]
Predecessors (0):
Successors (1): B4
[ B4 ]
1: x = x + 1
2: (x > 2)
T: if [B4.2]
Predecessors (1): B5
Successors (2): B3 B2
[ B3 ]
1: x++
Predecessors (1): B4
Successors (1): B1
[ B2 ]
1: x += 2
2: x *= 2
Predecessors (1): B4
Successors (1): B1
[ B1 ]
1: return x;
Predecessors (2): B2 B3
Successors (1): B0
[ B0 (EXIT) ]
Predecessors (1): B1
Successors (0):
For each block, the pretty-printed output displays for each block the number of predecessor blocks (blocks that have outgoing control-flow to the given block) and successor blocks (blocks that have control-flow that have incoming control-flow from the given block). We can also clearly see the special entry and exit blocks at the beginning and end of the pretty-printed output. For the entry block (block B5), the number of predecessor blocks is 0, while for the exit block (block B0) the number of successor blocks is 0.
The most interesting block here is B4, whose outgoing control-flow represents
the branching caused by the sole if-statement in foo
. Of particular
interest is the second statement in the block, (x > 2)
, and the terminator,
printed as if [B4.2]
. The second statement represents the evaluation of
the condition of the if-statement, which occurs before the actual branching of
control-flow. Within the CFGBlock
for B4, the Stmt*
for the second
statement refers to the actual expression in the AST for (x > 2)
. Thus
pointers to subclasses of Expr
can appear in the list of statements in a
block, and not just subclasses of Stmt
that refer to proper C statements.
The terminator of block B4 is a pointer to the IfStmt
object in the AST.
The pretty-printer outputs if [B4.2]
because the condition expression of
the if-statement has an actual place in the basic block, and thus the
terminator is essentially referring to the expression that is the second
statement of block B4 (i.e., B4.2). In this manner, conditions for
control-flow (which also includes conditions for loops and switch statements)
are hoisted into the actual basic block.
Constant Folding in the Clang AST¶
There are several places where constants and constant folding matter a lot to
the Clang front-end. First, in general, we prefer the AST to retain the source
code as close to how the user wrote it as possible. This means that if they
wrote “5+4
”, we want to keep the addition and two constants in the AST, we
don’t want to fold to “9
”. This means that constant folding in various
ways turns into a tree walk that needs to handle the various cases.
However, there are places in both C and C++ that require constants to be
folded. For example, the C standard defines what an “integer constant
expression” (i-c-e) is with very precise and specific requirements. The
language then requires i-c-e’s in a lot of places (for example, the size of a
bitfield, the value for a case statement, etc). For these, we have to be able
to constant fold the constants, to do semantic checks (e.g., verify bitfield
size is non-negative and that case statements aren’t duplicated). We aim for
Clang to be very pedantic about this, diagnosing cases when the code does not
use an i-c-e where one is required, but accepting the code unless running with
-pedantic-errors
.
Things get a little bit more tricky when it comes to compatibility with
real-world source code. Specifically, GCC has historically accepted a huge
superset of expressions as i-c-e’s, and a lot of real world code depends on
this unfortunate accident of history (including, e.g., the glibc system
headers). GCC accepts anything its “fold” optimizer is capable of reducing to
an integer constant, which means that the definition of what it accepts changes
as its optimizer does. One example is that GCC accepts things like “case
X-X:
” even when X
is a variable, because it can fold this to 0.
Another issue are how constants interact with the extensions we support, such
as __builtin_constant_p
, __builtin_inf
, __extension__
and many
others. C99 obviously does not specify the semantics of any of these
extensions, and the definition of i-c-e does not include them. However, these
extensions are often used in real code, and we have to have a way to reason
about them.
Finally, this is not just a problem for semantic analysis. The code generator
and other clients have to be able to fold constants (e.g., to initialize global
variables) and has to handle a superset of what C99 allows. Further, these
clients can benefit from extended information. For example, we know that
“foo() || 1
” always evaluates to true
, but we can’t replace the
expression with true
because it has side effects.
Implementation Approach¶
After trying several different approaches, we’ve finally converged on a design
(Note, at the time of this writing, not all of this has been implemented,
consider this a design goal!). Our basic approach is to define a single
recursive evaluation method (Expr::Evaluate
), which is implemented
in AST/ExprConstant.cpp
. Given an expression with “scalar” type (integer,
fp, complex, or pointer) this method returns the following information:
- Whether the expression is an integer constant expression, a general constant that was folded but has no side effects, a general constant that was folded but that does have side effects, or an uncomputable/unfoldable value.
- If the expression was computable in any way, this method returns the
APValue
for the result of the expression. - If the expression is not evaluatable at all, this method returns information
on one of the problems with the expression. This includes a
SourceLocation
for where the problem is, and a diagnostic ID that explains the problem. The diagnostic should haveERROR
type. - If the expression is not an integer constant expression, this method returns
information on one of the problems with the expression. This includes a
SourceLocation
for where the problem is, and a diagnostic ID that explains the problem. The diagnostic should haveEXTENSION
type.
This information gives various clients the flexibility that they want, and we
will eventually have some helper methods for various extensions. For example,
Sema
should have a Sema::VerifyIntegerConstantExpression
method, which
calls Evaluate
on the expression. If the expression is not foldable, the
error is emitted, and it would return true
. If the expression is not an
i-c-e, the EXTENSION
diagnostic is emitted. Finally it would return
false
to indicate that the AST is OK.
Other clients can use the information in other ways, for example, codegen can just use expressions that are foldable in any way.
Extensions¶
This section describes how some of the various extensions Clang supports interacts with constant evaluation:
__extension__
: The expression form of this extension causes any evaluatable subexpression to be accepted as an integer constant expression.__builtin_constant_p
: This returns true (as an integer constant expression) if the operand evaluates to either a numeric value (that is, not a pointer cast to integral type) of integral, enumeration, floating or complex type, or if it evaluates to the address of the first character of a string literal (possibly cast to some other type). As a special case, if__builtin_constant_p
is the (potentially parenthesized) condition of a conditional operator expression (“?:
”), only the true side of the conditional operator is considered, and it is evaluated with full constant folding.__builtin_choose_expr
: The condition is required to be an integer constant expression, but we accept any constant as an “extension of an extension”. This only evaluates one operand depending on which way the condition evaluates.__builtin_classify_type
: This always returns an integer constant expression.__builtin_inf, nan, ...
: These are treated just like a floating-point literal.__builtin_abs, copysign, ...
: These are constant folded as general constant expressions.__builtin_strlen
andstrlen
: These are constant folded as integer constant expressions if the argument is a string literal.
The Sema Library¶
This library is called by the Parser library during parsing to do semantic analysis of the input. For valid programs, Sema builds an AST for parsed constructs.
The CodeGen Library¶
CodeGen takes an AST as input and produces LLVM IR code from it.
How to change Clang¶
How to add an attribute¶
Attributes are a form of metadata that can be attached to a program construct, allowing the programmer to pass semantic information along to the compiler for various uses. For example, attributes may be used to alter the code generation for a program construct, or to provide extra semantic information for static analysis. This document explains how to add a custom attribute to Clang. Documentation on existing attributes can be found here.
Attribute Basics¶
Attributes in Clang are handled in three stages: parsing into a parsed attribute representation, conversion from a parsed attribute into a semantic attribute, and then the semantic handling of the attribute.
Parsing of the attribute is determined by the various syntactic forms attributes
can take, such as GNU, C++11, and Microsoft style attributes, as well as other
information provided by the table definition of the attribute. Ultimately, the
parsed representation of an attribute object is an ParsedAttr
object.
These parsed attributes chain together as a list of parsed attributes attached
to a declarator or declaration specifier. The parsing of attributes is handled
automatically by Clang, except for attributes spelled as keywords. When
implementing a keyword attribute, the parsing of the keyword and creation of the
ParsedAttr
object must be done manually.
Eventually, Sema::ProcessDeclAttributeList()
is called with a Decl
and
an ParsedAttr
, at which point the parsed attribute can be transformed
into a semantic attribute. The process by which a parsed attribute is converted
into a semantic attribute depends on the attribute definition and semantic
requirements of the attribute. The end result, however, is that the semantic
attribute object is attached to the Decl
object, and can be obtained by a
call to Decl::getAttr<T>()
.
The structure of the semantic attribute is also governed by the attribute
definition given in Attr.td. This definition is used to automatically generate
functionality used for the implementation of the attribute, such as a class
derived from clang::Attr
, information for the parser to use, automated
semantic checking for some attributes, etc.
include/clang/Basic/Attr.td
¶
The first step to adding a new attribute to Clang is to add its definition to
include/clang/Basic/Attr.td.
This tablegen definition must derive from the Attr
(tablegen, not
semantic) type, or one of its derivatives. Most attributes will derive from the
InheritableAttr
type, which specifies that the attribute can be inherited by
later redeclarations of the Decl
it is associated with.
InheritableParamAttr
is similar to InheritableAttr
, except that the
attribute is written on a parameter instead of a declaration. If the attribute
is intended to apply to a type instead of a declaration, such an attribute
should derive from TypeAttr
, and will generally not be given an AST
representation. (Note that this document does not cover the creation of type
attributes.) An attribute that inherits from IgnoredAttr
is parsed, but will
generate an ignored attribute diagnostic when used, which may be useful when an
attribute is supported by another vendor but not supported by clang.
The definition will specify several key pieces of information, such as the
semantic name of the attribute, the spellings the attribute supports, the
arguments the attribute expects, and more. Most members of the Attr
tablegen
type do not require definitions in the derived definition as the default
suffice. However, every attribute must specify at least a spelling list, a
subject list, and a documentation list.
Spellings¶
All attributes are required to specify a spelling list that denotes the ways in which the attribute can be spelled. For instance, a single semantic attribute may have a keyword spelling, as well as a C++11 spelling and a GNU spelling. An empty spelling list is also permissible and may be useful for attributes which are created implicitly. The following spellings are accepted:
Spelling Description GNU
Spelled with a GNU-style __attribute__((attr))
syntax and placement.CXX11
Spelled with a C++-style [[attr]]
syntax. If the attribute is meant to be used by Clang, it should set the namespace to"clang"
.Declspec
Spelled with a Microsoft-style __declspec(attr)
syntax.Keyword
The attribute is spelled as a keyword, and required custom parsing. GCC
Specifies two spellings: the first is a GNU-style spelling, and the second is a C++-style spelling with the gnu
namespace. Attributes should only specify this spelling for attributes supported by GCC.Pragma
The attribute is spelled as a #pragma
, and requires custom processing within the preprocessor. If the attribute is meant to be used by Clang, it should set the namespace to"clang"
. Note that this spelling is not used for declaration attributes.
Subjects¶
Attributes appertain to one or more Decl
subjects. If the attribute attempts
to attach to a subject that is not in the subject list, a diagnostic is issued
automatically. Whether the diagnostic is a warning or an error depends on how
the attribute’s SubjectList
is defined, but the default behavior is to warn.
The diagnostics displayed to the user are automatically determined based on the
subjects in the list, but a custom diagnostic parameter can also be specified in
the SubjectList
. The diagnostics generated for subject list violations are
either diag::warn_attribute_wrong_decl_type
or
diag::err_attribute_wrong_decl_type
, and the parameter enumeration is found
in include/clang/Sema/ParsedAttr.h
If a previously unused Decl node is added to the SubjectList
, the logic used
to automatically determine the diagnostic parameter in utils/TableGen/ClangAttrEmitter.cpp
may need to be updated.
By default, all subjects in the SubjectList must either be a Decl node defined
in DeclNodes.td
, or a statement node defined in StmtNodes.td
. However,
more complex subjects can be created by creating a SubsetSubject
object.
Each such object has a base subject which it appertains to (which must be a
Decl or Stmt node, and not a SubsetSubject node), and some custom code which is
called when determining whether an attribute appertains to the subject. For
instance, a NonBitField
SubsetSubject appertains to a FieldDecl
, and
tests whether the given FieldDecl is a bit field. When a SubsetSubject is
specified in a SubjectList, a custom diagnostic parameter must also be provided.
Diagnostic checking for attribute subject lists is automated except when
HasCustomParsing
is set to 1
.
Documentation¶
All attributes must have some form of documentation associated with them. Documentation is table generated on the public web server by a server-side process that runs daily. Generally, the documentation for an attribute is a stand-alone definition in include/clang/Basic/AttrDocs.td that is named after the attribute being documented.
If the attribute is not for public consumption, or is an implicitly-created
attribute that has no visible spelling, the documentation list can specify the
Undocumented
object. Otherwise, the attribute should have its documentation
added to AttrDocs.td.
Documentation derives from the Documentation
tablegen type. All derived
types must specify a documentation category and the actual documentation itself.
Additionally, it can specify a custom heading for the attribute, though a
default heading will be chosen when possible.
There are four predefined documentation categories: DocCatFunction
for
attributes that appertain to function-like subjects, DocCatVariable
for
attributes that appertain to variable-like subjects, DocCatType
for type
attributes, and DocCatStmt
for statement attributes. A custom documentation
category should be used for groups of attributes with similar functionality.
Custom categories are good for providing overview information for the attributes
grouped under it. For instance, the consumed annotation attributes define a
custom category, DocCatConsumed
, that explains what consumed annotations are
at a high level.
Documentation content (whether it is for an attribute or a category) is written using reStructuredText (RST) syntax.
After writing the documentation for the attribute, it should be locally tested to ensure that there are no issues generating the documentation on the server. Local testing requires a fresh build of clang-tblgen. To generate the attribute documentation, execute the following command:
clang-tblgen -gen-attr-docs -I /path/to/clang/include /path/to/clang/include/clang/Basic/Attr.td -o /path/to/clang/docs/AttributeReference.rst
When testing locally, do not commit changes to AttributeReference.rst
.
This file is generated by the server automatically, and any changes made to this
file will be overwritten.
Arguments¶
Attributes may optionally specify a list of arguments that can be passed to the
attribute. Attribute arguments specify both the parsed form and the semantic
form of the attribute. For example, if Args
is
[StringArgument<"Arg1">, IntArgument<"Arg2">]
then
__attribute__((myattribute("Hello", 3)))
will be a valid use; it requires
two arguments while parsing, and the Attr subclass’ constructor for the
semantic attribute will require a string and integer argument.
All arguments have a name and a flag that specifies whether the argument is optional. The associated C++ type of the argument is determined by the argument definition type. If the existing argument types are insufficient, new types can be created, but it requires modifying utils/TableGen/ClangAttrEmitter.cpp to properly support the type.
Other Properties¶
The Attr
definition has other members which control the behavior of the
attribute. Many of them are special-purpose and beyond the scope of this
document, however a few deserve mention.
If the parsed form of the attribute is more complex, or differs from the
semantic form, the HasCustomParsing
bit can be set to 1
for the class,
and the parsing code in Parser::ParseGNUAttributeArgs()
can be updated for the special case. Note that this only applies to arguments
with a GNU spelling – attributes with a __declspec spelling currently ignore
this flag and are handled by Parser::ParseMicrosoftDeclSpec
.
Note that setting this member to 1 will opt out of common attribute semantic handling, requiring extra implementation efforts to ensure the attribute appertains to the appropriate subject, etc.
If the attribute should not be propagated from a template declaration to an
instantiation of the template, set the Clone
member to 0. By default, all
attributes will be cloned to template instantiations.
Attributes that do not require an AST node should set the ASTNode
field to
0
to avoid polluting the AST. Note that anything inheriting from
TypeAttr
or IgnoredAttr
automatically do not generate an AST node. All
other attributes generate an AST node by default. The AST node is the semantic
representation of the attribute.
The LangOpts
field specifies a list of language options required by the
attribute. For instance, all of the CUDA-specific attributes specify [CUDA]
for the LangOpts
field, and when the CUDA language option is not enabled, an
“attribute ignored” warning diagnostic is emitted. Since language options are
not table generated nodes, new language options must be created manually and
should specify the spelling used by LangOptions
class.
Custom accessors can be generated for an attribute based on the spelling list
for that attribute. For instance, if an attribute has two different spellings:
‘Foo’ and ‘Bar’, accessors can be created:
[Accessor<"isFoo", [GNU<"Foo">]>, Accessor<"isBar", [GNU<"Bar">]>]
These accessors will be generated on the semantic form of the attribute,
accepting no arguments and returning a bool
.
Attributes that do not require custom semantic handling should set the
SemaHandler
field to 0
. Note that anything inheriting from
IgnoredAttr
automatically do not get a semantic handler. All other
attributes are assumed to use a semantic handler by default. Attributes
without a semantic handler are not given a parsed attribute Kind
enumerator.
Target-specific attributes may share a spelling with other attributes in
different targets. For instance, the ARM and MSP430 targets both have an
attribute spelled GNU<"interrupt">
, but with different parsing and semantic
requirements. To support this feature, an attribute inheriting from
TargetSpecificAttribute
may specify a ParseKind
field. This field
should be the same value between all arguments sharing a spelling, and
corresponds to the parsed attribute’s Kind
enumerator. This allows
attributes to share a parsed attribute kind, but have distinct semantic
attribute classes. For instance, ParsedAttr
is the shared
parsed attribute kind, but ARMInterruptAttr and MSP430InterruptAttr are the
semantic attributes generated.
By default, attribute arguments are parsed in an evaluated context. If the
arguments for an attribute should be parsed in an unevaluated context (akin to
the way the argument to a sizeof
expression is parsed), set
ParseArgumentsAsUnevaluated
to 1
.
If additional functionality is desired for the semantic form of the attribute,
the AdditionalMembers
field specifies code to be copied verbatim into the
semantic attribute class object, with public
access.
Boilerplate¶
All semantic processing of declaration attributes happens in lib/Sema/SemaDeclAttr.cpp,
and generally starts in the ProcessDeclAttribute()
function. If the
attribute is a “simple” attribute – meaning that it requires no custom semantic
processing aside from what is automatically provided, add a call to
handleSimpleAttribute<YourAttr>(S, D, Attr);
to the switch statement.
Otherwise, write a new handleYourAttr()
function, and add that to the switch
statement. Please do not implement handling logic directly in the case
for
the attribute.
Unless otherwise specified by the attribute definition, common semantic checking
of the parsed attribute is handled automatically. This includes diagnosing
parsed attributes that do not appertain to the given Decl
, ensuring the
correct minimum number of arguments are passed, etc.
If the attribute adds additional warnings, define a DiagGroup
in
include/clang/Basic/DiagnosticGroups.td
named after the attribute’s Spelling
with “_”s replaced by “-“s. If there
is only a single diagnostic, it is permissible to use InGroup<DiagGroup<"your-attribute">>
directly in DiagnosticSemaKinds.td
All semantic diagnostics generated for your attribute, including automatically- generated ones (such as subjects and argument counts), should have a corresponding test case.
Semantic handling¶
Most attributes are implemented to have some effect on the compiler. For instance, to modify the way code is generated, or to add extra semantic checks for an analysis pass, etc. Having added the attribute definition and conversion to the semantic representation for the attribute, what remains is to implement the custom logic requiring use of the attribute.
The clang::Decl
object can be queried for the presence or absence of an
attribute using hasAttr<T>()
. To obtain a pointer to the semantic
representation of the attribute, getAttr<T>
may be used.
How to add an expression or statement¶
Expressions and statements are one of the most fundamental constructs within a compiler, because they interact with many different parts of the AST, semantic analysis, and IR generation. Therefore, adding a new expression or statement kind into Clang requires some care. The following list details the various places in Clang where an expression or statement needs to be introduced, along with patterns to follow to ensure that the new expression or statement works well across all of the C languages. We focus on expressions, but statements are similar.
- Introduce parsing actions into the parser. Recursive-descent parsing is
mostly self-explanatory, but there are a few things that are worth keeping
in mind:
- Keep as much source location information as possible! You’ll want it later to produce great diagnostics and support Clang’s various features that map between source code and the AST.
- Write tests for all of the “bad” parsing cases, to make sure your recovery
is good. If you have matched delimiters (e.g., parentheses, square
brackets, etc.), use
Parser::BalancedDelimiterTracker
to give nice diagnostics when things go wrong.
- Introduce semantic analysis actions into
Sema
. Semantic analysis should always involve two functions: anActOnXXX
function that will be called directly from the parser, and aBuildXXX
function that performs the actual semantic analysis and will (eventually!) build the AST node. It’s fairly common for theActOnCXX
function to do very little (often just some minor translation from the parser’s representation toSema
’s representation of the same thing), but the separation is still important: C++ template instantiation, for example, should always call theBuildXXX
variant. Several notes on semantic analysis before we get into construction of the AST:- Your expression probably involves some types and some subexpressions. Make sure to fully check that those types, and the types of those subexpressions, meet your expectations. Add implicit conversions where necessary to make sure that all of the types line up exactly the way you want them. Write extensive tests to check that you’re getting good diagnostics for mistakes and that you can use various forms of subexpressions with your expression.
- When type-checking a type or subexpression, make sure to first check
whether the type is “dependent” (
Type::isDependentType()
) or whether a subexpression is type-dependent (Expr::isTypeDependent()
). If any of these returntrue
, then you’re inside a template and you can’t do much type-checking now. That’s normal, and your AST node (when you get there) will have to deal with this case. At this point, you can write tests that use your expression within templates, but don’t try to instantiate the templates. - For each subexpression, be sure to call
Sema::CheckPlaceholderExpr()
to deal with “weird” expressions that don’t behave well as subexpressions. Then, determine whether you need to perform lvalue-to-rvalue conversions (Sema::DefaultLvalueConversions
) or the usual unary conversions (Sema::UsualUnaryConversions
), for places where the subexpression is producing a value you intend to use. - Your
BuildXXX
function will probably just returnExprError()
at this point, since you don’t have an AST. That’s perfectly fine, and shouldn’t impact your testing.
- Introduce an AST node for your new expression. This starts with declaring
the node in
include/Basic/StmtNodes.td
and creating a new class for your expression in the appropriateinclude/AST/Expr*.h
header. It’s best to look at the class for a similar expression to get ideas, and there are some specific things to watch for:- If you need to allocate memory, use the
ASTContext
allocator to allocate memory. Never use rawmalloc
ornew
, and never hold any resources in an AST node, because the destructor of an AST node is never called. - Make sure that
getSourceRange()
covers the exact source range of your expression. This is needed for diagnostics and for IDE support. - Make sure that
children()
visits all of the subexpressions. This is important for a number of features (e.g., IDE support, C++ variadic templates). If you have sub-types, you’ll also need to visit those sub-types inRecursiveASTVisitor
. - Add printing support (
StmtPrinter.cpp
) for your expression. - Add profiling support (
StmtProfile.cpp
) for your AST node, noting the distinguishing (non-source location) characteristics of an instance of your expression. Omitting this step will lead to hard-to-diagnose failures regarding matching of template declarations. - Add serialization support (
ASTReaderStmt.cpp
,ASTWriterStmt.cpp
) for your AST node.
- If you need to allocate memory, use the
- Teach semantic analysis to build your AST node. At this point, you can wire
up your
Sema::BuildXXX
function to actually create your AST. A few things to check at this point:- If your expression can construct a new C++ class or return a new
Objective-C object, be sure to update and then call
Sema::MaybeBindToTemporary
for your just-created AST node to be sure that the object gets properly destructed. An easy way to test this is to return a C++ class with a private destructor: semantic analysis should flag an error here with the attempt to call the destructor. - Inspect the generated AST by printing it using
clang -cc1 -ast-print
, to make sure you’re capturing all of the important information about how the AST was written. - Inspect the generated AST under
clang -cc1 -ast-dump
to verify that all of the types in the generated AST line up the way you want them. Remember that clients of the AST should never have to “think” to understand what’s going on. For example, all implicit conversions should show up explicitly in the AST. - Write tests that use your expression as a subexpression of other, well-known expressions. Can you call a function using your expression as an argument? Can you use the ternary operator?
- If your expression can construct a new C++ class or return a new
Objective-C object, be sure to update and then call
- Teach code generation to create IR to your AST node. This step is the first
(and only) that requires knowledge of LLVM IR. There are several things to
keep in mind:
- Code generation is separated into scalar/aggregate/complex and lvalue/rvalue paths, depending on what kind of result your expression produces. On occasion, this requires some careful factoring of code to avoid duplication.
CodeGenFunction
contains functionsConvertType
andConvertTypeForMem
that convert Clang’s types (clang::Type*
orclang::QualType
) to LLVM types. Use the former for values, and the latter for memory locations: test with the C++ “bool
” type to check this. If you find that you are having to use LLVM bitcasts to make the subexpressions of your expression have the type that your expression expects, STOP! Go fix semantic analysis and the AST so that you don’t need these bitcasts.- The
CodeGenFunction
class has a number of helper functions to make certain operations easy, such as generating code to produce an lvalue or an rvalue, or to initialize a memory location with a given value. Prefer to use these functions rather than directly writing loads and stores, because these functions take care of some of the tricky details for you (e.g., for exceptions). - If your expression requires some special behavior in the event of an
exception, look at the
push*Cleanup
functions inCodeGenFunction
to introduce a cleanup. You shouldn’t have to deal with exception-handling directly. - Testing is extremely important in IR generation. Use
clang -cc1 -emit-llvm
and FileCheck to verify that you’re generating the right IR.
- Teach template instantiation how to cope with your AST node, which requires
some fairly simple code:
- Make sure that your expression’s constructor properly computes the flags for type dependence (i.e., the type your expression produces can change from one instantiation to the next), value dependence (i.e., the constant value your expression produces can change from one instantiation to the next), instantiation dependence (i.e., a template parameter occurs anywhere in your expression), and whether your expression contains a parameter pack (for variadic templates). Often, computing these flags just means combining the results from the various types and subexpressions.
- Add
TransformXXX
andRebuildXXX
functions to theTreeTransform
class template inSema
.TransformXXX
should (recursively) transform all of the subexpressions and types within your expression, usinggetDerived().TransformYYY
. If all of the subexpressions and types transform without error, it will then call theRebuildXXX
function, which will in turn callgetSema().BuildXXX
to perform semantic analysis and build your expression. - To test template instantiation, take those tests you wrote to make sure that you were type checking with type-dependent expressions and dependent types (from step #2) and instantiate those templates with various types, some of which type-check and some that don’t, and test the error messages in each case.
- There are some “extras” that make other features work better. It’s worth
handling these extras to give your expression complete integration into
Clang:
- Add code completion support for your expression in
SemaCodeComplete.cpp
. - If your expression has types in it, or has any “interesting” features
other than subexpressions, extend libclang’s
CursorVisitor
to provide proper visitation for your expression, enabling various IDE features such as syntax highlighting, cross-referencing, and so on. Thec-index-test
helper program can be used to test these features.
- Add code completion support for your expression in
Driver Design & Internals¶
Introduction¶
This document describes the Clang driver. The purpose of this document is to describe both the motivation and design goals for the driver, as well as details of the internal implementation.
Features and Goals¶
The Clang driver is intended to be a production quality compiler driver providing access to the Clang compiler and tools, with a command line interface which is compatible with the gcc driver.
Although the driver is part of and driven by the Clang project, it is logically a separate tool which shares many of the same goals as Clang:
Features
GCC Compatibility¶
The number one goal of the driver is to ease the adoption of Clang by allowing users to drop Clang into a build system which was designed to call GCC. Although this makes the driver much more complicated than might otherwise be necessary, we decided that being very compatible with the gcc command line interface was worth it in order to allow users to quickly test clang on their projects.
Flexible¶
The driver was designed to be flexible and easily accommodate new uses as we grow the clang and LLVM infrastructure. As one example, the driver can easily support the introduction of tools which have an integrated assembler; something we hope to add to LLVM in the future.
Similarly, most of the driver functionality is kept in a library which can be used to build other tools which want to implement or accept a gcc like interface.
Low Overhead¶
The driver should have as little overhead as possible. In practice, we found that the gcc driver by itself incurred a small but meaningful overhead when compiling many small files. The driver doesn’t do much work compared to a compilation, but we have tried to keep it as efficient as possible by following a few simple principles:
- Avoid memory allocation and string copying when possible.
- Don’t parse arguments more than once.
- Provide a few simple interfaces for efficiently searching arguments.
Simple¶
Finally, the driver was designed to be “as simple as possible”, given the other goals. Notably, trying to be completely compatible with the gcc driver adds a significant amount of complexity. However, the design of the driver attempts to mitigate this complexity by dividing the process into a number of independent stages instead of a single monolithic task.
Internal Design and Implementation¶
Internals Introduction¶
In order to satisfy the stated goals, the driver was designed to completely subsume the functionality of the gcc executable; that is, the driver should not need to delegate to gcc to perform subtasks. On Darwin, this implies that the Clang driver also subsumes the gcc driver-driver, which is used to implement support for building universal images (binaries and object files). This also implies that the driver should be able to call the language specific compilers (e.g. cc1) directly, which means that it must have enough information to forward command line arguments to child processes correctly.
Design Overview¶
The diagram below shows the significant components of the driver architecture and how they relate to one another. The orange components represent concrete data structures built by the driver, the green components indicate conceptually distinct stages which manipulate these data structures, and the blue components are important helper classes.

Driver Stages¶
The driver functionality is conceptually divided into five stages:
Parse: Option Parsing
The command line argument strings are decomposed into arguments (
Arg
instances). The driver expects to understand all available options, although there is some facility for just passing certain classes of options through (like-Wl,
).Each argument corresponds to exactly one abstract
Option
definition, which describes how the option is parsed along with some additional metadata. The Arg instances themselves are lightweight and merely contain enough information for clients to determine which option they correspond to and their values (if they have additional parameters).For example, a command line like “-Ifoo -I foo” would parse to two Arg instances (a JoinedArg and a SeparateArg instance), but each would refer to the same Option.
Options are lazily created in order to avoid populating all Option classes when the driver is loaded. Most of the driver code only needs to deal with options by their unique ID (e.g.,
options::OPT_I
),Arg instances themselves do not generally store the values of parameters. In many cases, this would simply result in creating unnecessary string copies. Instead, Arg instances are always embedded inside an ArgList structure, which contains the original vector of argument strings. Each Arg itself only needs to contain an index into this vector instead of storing its values directly.
The clang driver can dump the results of this stage using the
-###
flag (which must precede any actual command line arguments). For example:$ clang -### -Xarch_i386 -fomit-frame-pointer -Wa,-fast -Ifoo -I foo t.c Option 0 - Name: "-Xarch_", Values: {"i386", "-fomit-frame-pointer"} Option 1 - Name: "-Wa,", Values: {"-fast"} Option 2 - Name: "-I", Values: {"foo"} Option 3 - Name: "-I", Values: {"foo"} Option 4 - Name: "<input>", Values: {"t.c"}
After this stage is complete the command line should be broken down into well defined option objects with their appropriate parameters. Subsequent stages should rarely, if ever, need to do any string processing.
Pipeline: Compilation Action Construction
Once the arguments are parsed, the tree of subprocess jobs needed for the desired compilation sequence are constructed. This involves determining the input files and their types, what work is to be done on them (preprocess, compile, assemble, link, etc.), and constructing a list of Action instances for each task. The result is a list of one or more top-level actions, each of which generally corresponds to a single output (for example, an object or linked executable).
The majority of Actions correspond to actual tasks, however there are two special Actions. The first is InputAction, which simply serves to adapt an input argument for use as an input to other Actions. The second is BindArchAction, which conceptually alters the architecture to be used for all of its input Actions.
The clang driver can dump the results of this stage using the
-ccc-print-phases
flag. For example:$ clang -ccc-print-phases -x c t.c -x assembler t.s 0: input, "t.c", c 1: preprocessor, {0}, cpp-output 2: compiler, {1}, assembler 3: assembler, {2}, object 4: input, "t.s", assembler 5: assembler, {4}, object 6: linker, {3, 5}, image
Here the driver is constructing seven distinct actions, four to compile the “t.c” input into an object file, two to assemble the “t.s” input, and one to link them together.
A rather different compilation pipeline is shown here; in this example there are two top level actions to compile the input files into two separate object files, where each object file is built using
lipo
to merge results built for two separate architectures.$ clang -ccc-print-phases -c -arch i386 -arch x86_64 t0.c t1.c 0: input, "t0.c", c 1: preprocessor, {0}, cpp-output 2: compiler, {1}, assembler 3: assembler, {2}, object 4: bind-arch, "i386", {3}, object 5: bind-arch, "x86_64", {3}, object 6: lipo, {4, 5}, object 7: input, "t1.c", c 8: preprocessor, {7}, cpp-output 9: compiler, {8}, assembler 10: assembler, {9}, object 11: bind-arch, "i386", {10}, object 12: bind-arch, "x86_64", {10}, object 13: lipo, {11, 12}, object
After this stage is complete the compilation process is divided into a simple set of actions which need to be performed to produce intermediate or final outputs (in some cases, like
-fsyntax-only
, there is no “real” final output). Phases are well known compilation steps, such as “preprocess”, “compile”, “assemble”, “link”, etc.Bind: Tool & Filename Selection
This stage (in conjunction with the Translate stage) turns the tree of Actions into a list of actual subprocess to run. Conceptually, the driver performs a top down matching to assign Action(s) to Tools. The ToolChain is responsible for selecting the tool to perform a particular action; once selected the driver interacts with the tool to see if it can match additional actions (for example, by having an integrated preprocessor).
Once Tools have been selected for all actions, the driver determines how the tools should be connected (for example, using an inprocess module, pipes, temporary files, or user provided filenames). If an output file is required, the driver also computes the appropriate file name (the suffix and file location depend on the input types and options such as
-save-temps
).The driver interacts with a ToolChain to perform the Tool bindings. Each ToolChain contains information about all the tools needed for compilation for a particular architecture, platform, and operating system. A single driver invocation may query multiple ToolChains during one compilation in order to interact with tools for separate architectures.
The results of this stage are not computed directly, but the driver can print the results via the
-ccc-print-bindings
option. For example:$ clang -ccc-print-bindings -arch i386 -arch ppc t0.c # "i386-apple-darwin9" - "clang", inputs: ["t0.c"], output: "/tmp/cc-Sn4RKF.s" # "i386-apple-darwin9" - "darwin::Assemble", inputs: ["/tmp/cc-Sn4RKF.s"], output: "/tmp/cc-gvSnbS.o" # "i386-apple-darwin9" - "darwin::Link", inputs: ["/tmp/cc-gvSnbS.o"], output: "/tmp/cc-jgHQxi.out" # "ppc-apple-darwin9" - "gcc::Compile", inputs: ["t0.c"], output: "/tmp/cc-Q0bTox.s" # "ppc-apple-darwin9" - "gcc::Assemble", inputs: ["/tmp/cc-Q0bTox.s"], output: "/tmp/cc-WCdicw.o" # "ppc-apple-darwin9" - "gcc::Link", inputs: ["/tmp/cc-WCdicw.o"], output: "/tmp/cc-HHBEBh.out" # "i386-apple-darwin9" - "darwin::Lipo", inputs: ["/tmp/cc-jgHQxi.out", "/tmp/cc-HHBEBh.out"], output: "a.out"
This shows the tool chain, tool, inputs and outputs which have been bound for this compilation sequence. Here clang is being used to compile t0.c on the i386 architecture and darwin specific versions of the tools are being used to assemble and link the result, but generic gcc versions of the tools are being used on PowerPC.
Translate: Tool Specific Argument Translation
Once a Tool has been selected to perform a particular Action, the Tool must construct concrete Commands which will be executed during compilation. The main work is in translating from the gcc style command line options to whatever options the subprocess expects.
Some tools, such as the assembler, only interact with a handful of arguments and just determine the path of the executable to call and pass on their input and output arguments. Others, like the compiler or the linker, may translate a large number of arguments in addition.
The ArgList class provides a number of simple helper methods to assist with translating arguments; for example, to pass on only the last of arguments corresponding to some option, or all arguments for an option.
The result of this stage is a list of Commands (executable paths and argument strings) to execute.
Execute
Finally, the compilation pipeline is executed. This is mostly straightforward, although there is some interaction with options like
-pipe
,-pass-exit-codes
and-time
.
Additional Notes¶
The Compilation Object¶
The driver constructs a Compilation object for each set of command line arguments. The Driver itself is intended to be invariant during construction of a Compilation; an IDE should be able to construct a single long lived driver instance to use for an entire build, for example.
The Compilation object holds information that is particular to each compilation sequence. For example, the list of used temporary files (which must be removed once compilation is finished) and result files (which should be removed if compilation fails).
Unified Parsing & Pipelining¶
Parsing and pipelining both occur without reference to a Compilation instance. This is by design; the driver expects that both of these phases are platform neutral, with a few very well defined exceptions such as whether the platform uses a driver driver.
ToolChain Argument Translation¶
In order to match gcc very closely, the clang driver currently allows tool chains to perform their own translation of the argument list (into a new ArgList data structure). Although this allows the clang driver to match gcc easily, it also makes the driver operation much harder to understand (since the Tools stop seeing some arguments the user provided, and see new ones instead).
For example, on Darwin -gfull
gets translated into two separate
arguments, -g
and -fno-eliminate-unused-debug-symbols
. Trying to
write Tool logic to do something with -gfull
will not work, because
Tool argument translation is done after the arguments have been
translated.
A long term goal is to remove this tool chain specific translation, and instead force each tool to change its own logic to do the right thing on the untranslated original arguments.
Unused Argument Warnings¶
The driver operates by parsing all arguments but giving Tools the opportunity to choose which arguments to pass on. One downside of this infrastructure is that if the user misspells some option, or is confused about which options to use, some command line arguments the user really cared about may go unused. This problem is particularly important when using clang as a compiler, since the clang compiler does not support anywhere near all the options that gcc does, and we want to make sure users know which ones are being used.
To support this, the driver maintains a bit associated with each argument of whether it has been used (at all) during the compilation. This bit usually doesn’t need to be set by hand, as the key ArgList accessors will set it automatically.
When a compilation is successful (there are no errors), the driver checks the bit and emits an “unused argument” warning for any arguments which were never accessed. This is conservative (the argument may not have been used to do what the user wanted) but still catches the most obvious cases.
Relation to GCC Driver Concepts¶
For those familiar with the gcc driver, this section provides a brief overview of how things from the gcc driver map to the clang driver.
Driver Driver
The driver driver is fully integrated into the clang driver. The driver simply constructs additional Actions to bind the architecture during the Pipeline phase. The tool chain specific argument translation is responsible for handling
-Xarch_
.The one caveat is that this approach requires
-Xarch_
not be used to alter the compilation itself (for example, one cannot provide-S
as an-Xarch_
argument). The driver attempts to reject such invocations, and overall there isn’t a good reason to abuse-Xarch_
to that end in practice.The upside is that the clang driver is more efficient and does little extra work to support universal builds. It also provides better error reporting and UI consistency.
Specs
The clang driver has no direct correspondent for “specs”. The majority of the functionality that is embedded in specs is in the Tool specific argument translation routines. The parts of specs which control the compilation pipeline are generally part of the Pipeline stage.
Toolchains
The gcc driver has no direct understanding of tool chains. Each gcc binary roughly corresponds to the information which is embedded inside a single ToolChain.
The clang driver is intended to be portable and support complex compilation environments. All platform and tool chain specific code should be protected behind either abstract or well defined interfaces (such as whether the platform supports use as a driver driver).
Pretokenized Headers (PTH)¶
This document first describes the low-level interface for using PTH and then briefly elaborates on its design and implementation. If you are interested in the end-user view, please see the User’s Manual.
Using Pretokenized Headers with clang
(Low-level Interface)¶
The Clang compiler frontend, clang -cc1
, supports three command line
options for generating and using PTH files.
To generate PTH files using clang -cc1
, use the option -emit-pth
:
$ clang -cc1 test.h -emit-pth -o test.h.pth
This option is transparently used by clang
when generating PTH
files. Similarly, PTH files can be used as prefix headers using the
-include-pth
option:
$ clang -cc1 -include-pth test.h.pth test.c -o test.s
Alternatively, Clang’s PTH files can be used as a raw “token-cache” (or
“content” cache) of the source included by the original header file.
This means that the contents of the PTH file are searched as substitutes
for any source files that are used by clang -cc1
to process a
source file. This is done by specifying the -token-cache
option:
$ cat test.h
#include <stdio.h>
$ clang -cc1 -emit-pth test.h -o test.h.pth
$ cat test.c
#include "test.h"
$ clang -cc1 test.c -o test -token-cache test.h.pth
In this example the contents of stdio.h
(and the files it includes)
will be retrieved from test.h.pth
, as the PTH file is being used in
this case as a raw cache of the contents of test.h
. This is a
low-level interface used to both implement the high-level PTH interface
as well as to provide alternative means to use PTH-style caching.
PTH Design and Implementation¶
Unlike GCC’s precompiled headers, which cache the full ASTs and preprocessor state of a header file, Clang’s pretokenized header files mainly cache the raw lexer tokens that are needed to segment the stream of characters in a source file into keywords, identifiers, and operators. Consequently, PTH serves to mainly directly speed up the lexing and preprocessing of a source file, while parsing and type-checking must be completely redone every time a PTH file is used.
Basic Design Tradeoffs¶
In the long term there are plans to provide an alternate PCH implementation for Clang that also caches the work for parsing and type checking the contents of header files. The current implementation of PCH in Clang as pretokenized header files was motivated by the following factors:
- Language independence
- PTH files work with any language that Clang’s lexer can handle, including C, Objective-C, and (in the early stages) C++. This means development on language features at the parsing level or above (which is basically almost all interesting pieces) does not require PTH to be modified.
- Simple design
- Relatively speaking, PTH has a simple design and implementation, making it easy to test. Further, because the machinery for PTH resides at the lower-levels of the Clang library stack it is fairly straightforward to profile and optimize.
Further, compared to GCC’s PCH implementation (which is the dominate precompiled header file implementation that Clang can be directly compared against) the PTH design in Clang yields several attractive features:
- Architecture independence
In contrast to GCC’s PCH files (and those of several other compilers), Clang’s PTH files are architecture independent, requiring only a single PTH file when building a program for multiple architectures.
For example, on Mac OS X one may wish to compile a “universal binary” that runs on PowerPC, 32-bit Intel (i386), and 64-bit Intel architectures. In contrast, GCC requires a PCH file for each architecture, as the definitions of types in the AST are architecture-specific. Since a Clang PTH file essentially represents a lexical cache of header files, a single PTH file can be safely used when compiling for multiple architectures. This can also reduce compile times because only a single PTH file needs to be generated during a build instead of several.
- Reduced memory pressure
- Similar to GCC, Clang reads PTH files
via the use of memory mapping (i.e.,
mmap
). Clang, however, memory maps PTH files as read-only, meaning that multiple invocations ofclang -cc1
can share the same pages in memory from a memory-mapped PTH file. In comparison, GCC also memory maps its PCH files but also modifies those pages in memory, incurring the copy-on-write costs. The read-only nature of PTH can greatly reduce memory pressure for builds involving multiple cores, thus improving overall scalability. - Fast generation
- PTH files can be generated in a small fraction of the time needed to generate GCC’s PCH files. Since PTH/PCH generation is a serial operation that typically blocks progress during a build, faster generation time leads to improved processor utilization with parallel builds on multicore machines.
Despite these strengths, PTH’s simple design suffers some algorithmic handicaps compared to other PCH strategies such as those used by GCC. While PTH can greatly speed up the processing time of a header file, the amount of work required to process a header file is still roughly linear in the size of the header file. In contrast, the amount of work done by GCC to process a precompiled header is (theoretically) constant (the ASTs for the header are literally memory mapped into the compiler). This means that only the pieces of the header file that are referenced by the source file including the header are the only ones the compiler needs to process during actual compilation. While GCC’s particular implementation of PCH mitigates some of these algorithmic strengths via the use of copy-on-write pages, the approach itself can fundamentally dominate at an algorithmic level, especially when one considers header files of arbitrary size.
There is also a PCH implementation for Clang based on the lazy deserialization of ASTs. This approach theoretically has the same constant-time algorithmic advantages just mentioned but also retains some of the strengths of PTH such as reduced memory pressure (ideal for multi-core builds).
Internal PTH Optimizations¶
While the main optimization employed by PTH is to reduce lexing time of header files by caching pre-lexed tokens, PTH also employs several other optimizations to speed up the processing of header files:
stat
caching: PTH files cache information obtained via calls tostat
thatclang -cc1
uses to resolve which files are included by#include
directives. This greatly reduces the overhead involved in context-switching to the kernel to resolve included files.- Fast skipping of
#ifdef
…#endif
chains: PTH files record the basic structure of nested preprocessor blocks. When the condition of the preprocessor block is false, all of its tokens are immediately skipped instead of requiring them to be handled by Clang’s preprocessor.
Precompiled Header and Modules Internals¶
This document describes the design and implementation of Clang’s precompiled headers (PCH) and modules. If you are interested in the end-user view, please see the User’s Manual.
Using Precompiled Headers with clang
¶
The Clang compiler frontend, clang -cc1
, supports two command line options
for generating and using PCH files.
To generate PCH files using clang -cc1
, use the option -emit-pch:
$ clang -cc1 test.h -emit-pch -o test.h.pch
This option is transparently used by clang
when generating PCH files. The
resulting PCH file contains the serialized form of the compiler’s internal
representation after it has completed parsing and semantic analysis. The PCH
file can then be used as a prefix header with the -include-pch
option:
$ clang -cc1 -include-pch test.h.pch test.c -o test.s
Design Philosophy¶
Precompiled headers are meant to improve overall compile times for projects, so the design of precompiled headers is entirely driven by performance concerns. The use case for precompiled headers is relatively simple: when there is a common set of headers that is included in nearly every source file in the project, we precompile that bundle of headers into a single precompiled header (PCH file). Then, when compiling the source files in the project, we load the PCH file first (as a prefix header), which acts as a stand-in for that bundle of headers.
A precompiled header implementation improves performance when:
- Loading the PCH file is significantly faster than re-parsing the bundle of headers stored within the PCH file. Thus, a precompiled header design attempts to minimize the cost of reading the PCH file. Ideally, this cost should not vary with the size of the precompiled header file.
- The cost of generating the PCH file initially is not so large that it counters the per-source-file performance improvement due to eliminating the need to parse the bundled headers in the first place. This is particularly important on multi-core systems, because PCH file generation serializes the build when all compilations require the PCH file to be up-to-date.
Modules, as implemented in Clang, use the same mechanisms as precompiled headers to save a serialized AST file (one per module) and use those AST modules. From an implementation standpoint, modules are a generalization of precompiled headers, lifting a number of restrictions placed on precompiled headers. In particular, there can only be one precompiled header and it must be included at the beginning of the translation unit. The extensions to the AST file format required for modules are discussed in the section on modules.
Clang’s AST files are designed with a compact on-disk representation, which minimizes both creation time and the time required to initially load the AST file. The AST file itself contains a serialized representation of Clang’s abstract syntax trees and supporting data structures, stored using the same compressed bitstream as LLVM’s bitcode file format.
Clang’s AST files are loaded “lazily” from disk. When an AST file is initially loaded, Clang reads only a small amount of data from the AST file to establish where certain important data structures are stored. The amount of data read in this initial load is independent of the size of the AST file, such that a larger AST file does not lead to longer AST load times. The actual header data in the AST file — macros, functions, variables, types, etc. — is loaded only when it is referenced from the user’s code, at which point only that entity (and those entities it depends on) are deserialized from the AST file. With this approach, the cost of using an AST file for a translation unit is proportional to the amount of code actually used from the AST file, rather than being proportional to the size of the AST file itself.
When given the -print-stats option, Clang produces statistics
describing how much of the AST file was actually loaded from disk. For a
simple “Hello, World!” program that includes the Apple Cocoa.h
header
(which is built as a precompiled header), this option illustrates how little of
the actual precompiled header is required:
*** AST File Statistics:
895/39981 source location entries read (2.238563%)
19/15315 types read (0.124061%)
20/82685 declarations read (0.024188%)
154/58070 identifiers read (0.265197%)
0/7260 selectors read (0.000000%)
0/30842 statements read (0.000000%)
4/8400 macros read (0.047619%)
1/4995 lexical declcontexts read (0.020020%)
0/4413 visible declcontexts read (0.000000%)
0/7230 method pool entries read (0.000000%)
0 method pool misses
For this small program, only a tiny fraction of the source locations, types, declarations, identifiers, and macros were actually deserialized from the precompiled header. These statistics can be useful to determine whether the AST file implementation can be improved by making more of the implementation lazy.
Precompiled headers can be chained. When you create a PCH while including an existing PCH, Clang can create the new PCH by referencing the original file and only writing the new data to the new file. For example, you could create a PCH out of all the headers that are very commonly used throughout your project, and then create a PCH for every single source file in the project that includes the code that is specific to that file, so that recompiling the file itself is very fast, without duplicating the data from the common headers for every file. The mechanisms behind chained precompiled headers are discussed in a later section.
AST File Contents¶
An AST file produced by clang is an object file container with a clangast
(COFF) or __clangast
(ELF and Mach-O) section containing the serialized AST.
Other target-specific sections in the object file container are used to hold
debug information for the data types defined in the AST. Tools built on top of
libclang that do not need debug information may also produce raw AST files that
only contain the serialized AST.
The clangast
section is organized into several different blocks, each of
which contains the serialized representation of a part of Clang’s internal
representation. Each of the blocks corresponds to either a block or a record
within LLVM’s bitstream format.
The contents of each of these logical blocks are described below.

The llvm-objdump
utility provides a -raw-clang-ast
option to extract the
binary contents of the AST section from an object file container.
The llvm-bcanalyzer utility can be used to examine the actual structure of the bitstream for the AST section. This information can be used both to help understand the structure of the AST section and to isolate areas where the AST representation can still be optimized, e.g., through the introduction of abbreviations.
Metadata Block¶
The metadata block contains several records that provide information about how the AST file was built. This metadata is primarily used to validate the use of an AST file. For example, a precompiled header built for a 32-bit x86 target cannot be used when compiling for a 64-bit x86 target. The metadata block contains information about:
- Language options
- Describes the particular language dialect used to compile the AST file,
including major options (e.g., Objective-C support) and more minor options
(e.g., support for “
//
” comments). The contents of this record correspond to theLangOptions
class. - Target architecture
- The target triple that describes the architecture, platform, and ABI for
which the AST file was generated, e.g.,
i386-apple-darwin9
. - AST version
- The major and minor version numbers of the AST file format. Changes in the minor version number should not affect backward compatibility, while changes in the major version number imply that a newer compiler cannot read an older precompiled header (and vice-versa).
- Original file name
- The full path of the header that was used to generate the AST file.
- Predefines buffer
- Although not explicitly stored as part of the metadata, the predefines buffer
is used in the validation of the AST file. The predefines buffer itself
contains code generated by the compiler to initialize the preprocessor state
according to the current target, platform, and command-line options. For
example, the predefines buffer will contain “
#define __STDC__ 1
” when we are compiling C without Microsoft extensions. The predefines buffer itself is stored within the Source Manager Block, but its contents are verified along with the rest of the metadata.
A chained PCH file (that is, one that references another PCH) and a module (which may import other modules) have additional metadata containing the list of all AST files that this AST file depends on. Each of those files will be loaded along with this AST file.
For chained precompiled headers, the language options, target architecture and predefines buffer data is taken from the end of the chain, since they have to match anyway.
Source Manager Block¶
The source manager block contains the serialized representation of Clang’s SourceManager class, which handles the mapping from source locations (as represented in Clang’s abstract syntax tree) into actual column/line positions within a source file or macro instantiation. The AST file’s representation of the source manager also includes information about all of the headers that were (transitively) included when building the AST file.
The bulk of the source manager block is dedicated to information about the various files, buffers, and macro instantiations into which a source location can refer. Each of these is referenced by a numeric “file ID”, which is a unique number (allocated starting at 1) stored in the source location. Clang serializes the information for each kind of file ID, along with an index that maps file IDs to the position within the AST file where the information about that file ID is stored. The data associated with a file ID is loaded only when required by the front end, e.g., to emit a diagnostic that includes a macro instantiation history inside the header itself.
The source manager block also contains information about all of the headers
that were included when building the AST file. This includes information about
the controlling macro for the header (e.g., when the preprocessor identified
that the contents of the header dependent on a macro like
LLVM_CLANG_SOURCEMANAGER_H
).
Preprocessor Block¶
The preprocessor block contains the serialized representation of the preprocessor. Specifically, it contains all of the macros that have been defined by the end of the header used to build the AST file, along with the token sequences that comprise each macro. The macro definitions are only read from the AST file when the name of the macro first occurs in the program. This lazy loading of macro definitions is triggered by lookups into the identifier table.
Types Block¶
The types block contains the serialized representation of all of the types
referenced in the translation unit. Each Clang type node (PointerType
,
FunctionProtoType
, etc.) has a corresponding record type in the AST file.
When types are deserialized from the AST file, the data within the record is
used to reconstruct the appropriate type node using the AST context.
Each type has a unique type ID, which is an integer that uniquely identifies
that type. Type ID 0 represents the NULL type, type IDs less than
NUM_PREDEF_TYPE_IDS
represent predefined types (void
, float
, etc.),
while other “user-defined” type IDs are assigned consecutively from
NUM_PREDEF_TYPE_IDS
upward as the types are encountered. The AST file has
an associated mapping from the user-defined types block to the location within
the types block where the serialized representation of that type resides,
enabling lazy deserialization of types. When a type is referenced from within
the AST file, that reference is encoded using the type ID shifted left by 3
bits. The lower three bits are used to represent the const
, volatile
,
and restrict
qualifiers, as in Clang’s QualType class.
Declarations Block¶
The declarations block contains the serialized representation of all of the
declarations referenced in the translation unit. Each Clang declaration node
(VarDecl
, FunctionDecl
, etc.) has a corresponding record type in the
AST file. When declarations are deserialized from the AST file, the data
within the record is used to build and populate a new instance of the
corresponding Decl
node. As with types, each declaration node has a
numeric ID that is used to refer to that declaration within the AST file. In
addition, a lookup table provides a mapping from that numeric ID to the offset
within the precompiled header where that declaration is described.
Declarations in Clang’s abstract syntax trees are stored hierarchically. At
the top of the hierarchy is the translation unit (TranslationUnitDecl
),
which contains all of the declarations in the translation unit but is not
actually written as a specific declaration node. Its child declarations (such
as functions or struct types) may also contain other declarations inside them,
and so on. Within Clang, each declaration is stored within a declaration
context, as represented by the DeclContext
class.
Declaration contexts provide the mechanism to perform name lookup within a
given declaration (e.g., find the member named x
in a structure) and
iterate over the declarations stored within a context (e.g., iterate over all
of the fields of a structure for structure layout).
In Clang’s AST file format, deserializing a declaration that is a
DeclContext
is a separate operation from deserializing all of the
declarations stored within that declaration context. Therefore, Clang will
deserialize the translation unit declaration without deserializing the
declarations within that translation unit. When required, the declarations
stored within a declaration context will be deserialized. There are two
representations of the declarations within a declaration context, which
correspond to the name-lookup and iteration behavior described above:
- When the front end performs name lookup to find a name
x
within a given declaration context (for example, during semantic analysis of the expressionp->x
, wherep
’s type is defined in the precompiled header), Clang refers to an on-disk hash table that maps from the names within that declaration context to the declaration IDs that represent each visible declaration with that name. The actual declarations will then be deserialized to provide the results of name lookup. - When the front end performs iteration over all of the declarations within a declaration context, all of those declarations are immediately de-serialized. For large declaration contexts (e.g., the translation unit), this operation is expensive; however, large declaration contexts are not traversed in normal compilation, since such a traversal is unnecessary. However, it is common for the code generator and semantic analysis to traverse declaration contexts for structs, classes, unions, and enumerations, although those contexts contain relatively few declarations in the common case.
Statements and Expressions¶
Statements and expressions are stored in the AST file in both the types and the declarations blocks, because every statement or expression will be associated with either a type or declaration. The actual statement and expression records are stored immediately following the declaration or type that owns the statement or expression. For example, the statement representing the body of a function will be stored directly following the declaration of the function.
As with types and declarations, each statement and expression kind in Clang’s
abstract syntax tree (ForStmt
, CallExpr
, etc.) has a corresponding
record type in the AST file, which contains the serialized representation of
that statement or expression. Each substatement or subexpression within an
expression is stored as a separate record (which keeps most records to a fixed
size). Within the AST file, the subexpressions of an expression are stored, in
reverse order, prior to the expression that owns those expression, using a form
of Reverse Polish Notation. For example, an
expression 3 - 4 + 5
would be represented as follows:
IntegerLiteral(5) |
IntegerLiteral(4) |
IntegerLiteral(3) |
IntegerLiteral(-) |
IntegerLiteral(+) |
STOP |
When reading this representation, Clang evaluates each expression record it
encounters, builds the appropriate abstract syntax tree node, and then pushes
that expression on to a stack. When a record contains N subexpressions —
BinaryOperator
has two of them — those expressions are popped from the
top of the stack. The special STOP code indicates that we have reached the end
of a serialized expression or statement; other expression or statement records
may follow, but they are part of a different expression.
Identifier Table Block¶
The identifier table block contains an on-disk hash table that maps each
identifier mentioned within the AST file to the serialized representation of
the identifier’s information (e.g, the IdentifierInfo
structure). The
serialized representation contains:
- The actual identifier string.
- Flags that describe whether this identifier is the name of a built-in, a poisoned identifier, an extension token, or a macro.
- If the identifier names a macro, the offset of the macro definition within the Preprocessor Block.
- If the identifier names one or more declarations visible from translation unit scope, the declaration IDs of these declarations.
When an AST file is loaded, the AST file reader mechanism introduces itself
into the identifier table as an external lookup source. Thus, when the user
program refers to an identifier that has not yet been seen, Clang will perform
a lookup into the identifier table. If an identifier is found, its contents
(macro definitions, flags, top-level declarations, etc.) will be deserialized,
at which point the corresponding IdentifierInfo
structure will have the
same contents it would have after parsing the headers in the AST file.
Within the AST file, the identifiers used to name declarations are represented with an integral value. A separate table provides a mapping from this integral value (the identifier ID) to the location within the on-disk hash table where that identifier is stored. This mapping is used when deserializing the name of a declaration, the identifier of a token, or any other construct in the AST file that refers to a name.
Method Pool Block¶
The method pool block is represented as an on-disk hash table that serves two
purposes: it provides a mapping from the names of Objective-C selectors to the
set of Objective-C instance and class methods that have that particular
selector (which is required for semantic analysis in Objective-C) and also
stores all of the selectors used by entities within the AST file. The design
of the method pool is similar to that of the identifier table: the first time a particular selector is formed
during the compilation of the program, Clang will search in the on-disk hash
table of selectors; if found, Clang will read the Objective-C methods
associated with that selector into the appropriate front-end data structure
(Sema::InstanceMethodPool
and Sema::FactoryMethodPool
for instance and
class methods, respectively).
As with identifiers, selectors are represented by numeric values within the AST file. A separate index maps these numeric selector values to the offset of the selector within the on-disk hash table, and will be used when de-serializing an Objective-C method declaration (or other Objective-C construct) that refers to the selector.
AST Reader Integration Points¶
The “lazy” deserialization behavior of AST files requires their integration into several completely different submodules of Clang. For example, lazily deserializing the declarations during name lookup requires that the name-lookup routines be able to query the AST file to find entities stored there.
For each Clang data structure that requires direct interaction with the AST
reader logic, there is an abstract class that provides the interface between
the two modules. The ASTReader
class, which handles the loading of an AST
file, inherits from all of these abstract classes to provide lazy
deserialization of Clang’s data structures. ASTReader
implements the
following abstract classes:
ExternalSLocEntrySource
- This abstract interface is associated with the
SourceManager
class, and is used whenever the source manager needs to load the details of a file, buffer, or macro instantiation. IdentifierInfoLookup
- This abstract interface is associated with the
IdentifierTable
class, and is used whenever the program source refers to an identifier that has not yet been seen. In this case, the AST reader searches for this identifier within its identifier table to load any top-level declarations or macros associated with that identifier. ExternalASTSource
- This abstract interface is associated with the
ASTContext
class, and is used whenever the abstract syntax tree nodes need to loaded from the AST file. It provides the ability to de-serialize declarations and types identified by their numeric values, read the bodies of functions when required, and read the declarations stored within a declaration context (either for iteration or for name lookup). ExternalSemaSource
- This abstract interface is associated with the
Sema
class, and is used whenever semantic analysis needs to read information from the global method pool.
Chained precompiled headers¶
Chained precompiled headers were initially intended to improve the performance
of IDE-centric operations such as syntax highlighting and code completion while
a particular source file is being edited by the user. To minimize the amount
of reparsing required after a change to the file, a form of precompiled header
— called a precompiled preamble — is automatically generated by parsing
all of the headers in the source file, up to and including the last
#include
. When only the source file changes (and none of the headers it
depends on), reparsing of that source file can use the precompiled preamble and
start parsing after the #include
s, so parsing time is proportional to the
size of the source file (rather than all of its includes). However, the
compilation of that translation unit may already use a precompiled header: in
this case, Clang will create the precompiled preamble as a chained precompiled
header that refers to the original precompiled header. This drastically
reduces the time needed to serialize the precompiled preamble for use in
reparsing.
Chained precompiled headers get their name because each precompiled header can
depend on one other precompiled header, forming a chain of dependencies. A
translation unit will then include the precompiled header that starts the chain
(i.e., nothing depends on it). This linearity of dependencies is important for
the semantic model of chained precompiled headers, because the most-recent
precompiled header can provide information that overrides the information
provided by the precompiled headers it depends on, just like a header file
B.h
that includes another header A.h
can modify the state produced by
parsing A.h
, e.g., by #undef
’ing a macro defined in A.h
.
There are several ways in which chained precompiled headers generalize the AST file model:
- Numbering of IDs
- Many different kinds of entities — identifiers, declarations, types, etc. — have ID numbers that start at 1 or some other predefined constant and grow upward. Each precompiled header records the maximum ID number it has assigned in each category. Then, when a new precompiled header is generated that depends on (chains to) another precompiled header, it will start counting at the next available ID number. This way, one can determine, given an ID number, which AST file actually contains the entity.
- Name lookup
- When writing a chained precompiled header, Clang attempts to write only information that has changed from the precompiled header on which it is based. This changes the lookup algorithm for the various tables, such as the identifier table: the search starts at the most-recent precompiled header. If no entry is found, lookup then proceeds to the identifier table in the precompiled header it depends on, and so one. Once a lookup succeeds, that result is considered definitive, overriding any results from earlier precompiled headers.
- Update records
- There are various ways in which a later precompiled header can modify the entities described in an earlier precompiled header. For example, later precompiled headers can add entries into the various name-lookup tables for the translation unit or namespaces, or add new categories to an Objective-C class. Each of these updates is captured in an “update record” that is stored in the chained precompiled header file and will be loaded along with the original entity.
Modules¶
Modules generalize the chained precompiled header model yet further, from a linear chain of precompiled headers to an arbitrary directed acyclic graph (DAG) of AST files. All of the same techniques used to make chained precompiled headers work — ID number, name lookup, update records — are shared with modules. However, the DAG nature of modules introduce a number of additional complications to the model:
- Numbering of IDs
- The simple, linear numbering scheme used in chained precompiled headers falls apart with the module DAG, because different modules may end up with different numbering schemes for entities they imported from common shared modules. To account for this, each module file provides information about which modules it depends on and which ID numbers it assigned to the entities in those modules, as well as which ID numbers it took for its own new entities. The AST reader then maps these “local” ID numbers into a “global” ID number space for the current translation unit, providing a 1-1 mapping between entities (in whatever AST file they inhabit) and global ID numbers. If that translation unit is then serialized into an AST file, this mapping will be stored for use when the AST file is imported.
- Declaration merging
- It is possible for a given entity (from the language’s perspective) to be
declared multiple times in different places. For example, two different
headers can have the declaration of
printf
or could forward-declarestruct stat
. If each of those headers is included in a module, and some third party imports both of those modules, there is a potentially serious problem: name lookup forprintf
orstruct stat
will find both declarations, but the AST nodes are unrelated. This would result in a compilation error, due to an ambiguity in name lookup. Therefore, the AST reader performs declaration merging according to the appropriate language semantics, ensuring that the two disjoint declarations are merged into a single redeclaration chain (with a common canonical declaration), so that it is as if one of the headers had been included before the other. - Name Visibility
- Modules allow certain names that occur during module creation to be “hidden”, so that they are not part of the public interface of the module and are not visible to its clients. The AST reader maintains a “visible” bit on various AST nodes (declarations, macros, etc.) to indicate whether that particular AST node is currently visible; the various name lookup mechanisms in Clang inspect the visible bit to determine whether that entity, which is still in the AST (because other, visible AST nodes may depend on it), can actually be found by name lookup. When a new (sub)module is imported, it may make existing, non-visible, already-deserialized AST nodes visible; it is the responsibility of the AST reader to find and update these AST nodes when it is notified of the import.
ABI tags¶
Introduction¶
This text tries to describe gcc semantic for mangling “abi_tag” attributes described in https://gcc.gnu.org/onlinedocs/gcc/C_002b_002b-Attributes.html
There is no guarantee the following rules are correct, complete or make sense in any way as they were determined empirically by experiments with gcc5.
Declaration¶
ABI tags are declared in an abi_tag attribute and can be applied to a function, variable, class or inline namespace declaration. The attribute takes one or more strings (called tags); the order does not matter.
See https://gcc.gnu.org/onlinedocs/gcc/C_002b_002b-Attributes.html for details.
Tags on an inline namespace are called “implicit tags”, all other tags are “explicit tags”.
Mangling¶
All tags that are “active” on an <unqualified-name> are emitted after the <unqualified-name>, before <template-args> or <discriminator>, and are part of the same <substitution> the <unqualified-name> is.
They are mangled as:
<abi-tags> ::= <abi-tag>* # sort by name
<abi-tag> ::= B <tag source-name>
Example:
__attribute__((abi_tag("test")))
void Func();
// gets mangled as: _Z4FuncB4testv (prettified as `Func[abi:test]()`)
Active tags¶
A namespace does not have any active tags. For types (class / struct / union / enum), the explicit tags are the active tags.
For variables and functions, the active tags are the explicit tags plus any “required tags” which are not in the “available tags” set:
derived-tags := (required-tags - available-tags)
active-tags := explicit-tags + derived-tags
Required tags for a function¶
If a function is used as a local scope for another name, and is part of another function as local scope, it doesn’t have any required tags.
If a function is used as a local scope for a guard variable name, it doesn’t have any required tags.
Otherwise the function requires any implicit or explicit tag used in the name for the return type.
Example:
namespace A {
inline namespace B __attribute__((abi_tag)) {
struct C { int x; };
}
}
A::C foo(); // gets mangled as: _Z3fooB1Bv (prettified as `foo[abi:B]()`)
Required tags for a variable¶
A variable requires any implicit or explicit tag used in its type.
Available tags¶
All tags used in the prefix and in the template arguments for a name are available. Also, for functions, all tags from the <bare-function-type> (which might include the return type for template functions) are available.
For <local-name>s all active tags used in the local part (<function- encoding>) are available, but not implicit tags which were not active.
Implicit and explicit tags used in the <unqualified-name> for a function (as in the type of a cast operator) are NOT available.
Example: a cast operator to std::string (which is std::__cxx11::basic_string<…>) will use ‘cxx11’ as an active tag, as it is required from the return type std::string but not available.
Hardware-assisted AddressSanitizer Design Documentation¶
This page is a design document for hardware-assisted AddressSanitizer (or HWASAN) a tool similar to AddressSanitizer, but based on partial hardware assistance.
Introduction¶
AddressSanitizer tags every 8 bytes of the application memory with a 1 byte tag (using shadow memory), uses redzones to find buffer-overflows and quarantine to find use-after-free. The redzones, the quarantine, and, to a less extent, the shadow, are the sources of AddressSanitizer’s memory overhead. See the AddressSanitizer paper for details.
AArch64 has the Address Tagging (or top-byte-ignore, TBI), a hardware feature that allows software to use 8 most significant bits of a 64-bit pointer as a tag. HWASAN uses Address Tagging to implement a memory safety tool, similar to AddressSanitizer, but with smaller memory overhead and slightly different (mostly better) accuracy guarantees.
Algorithm¶
- Every heap/stack/global memory object is forcibly aligned by TG bytes (TG is e.g. 16 or 64). We call TG the tagging granularity.
- For every such object a random TS-bit tag T is chosen (TS, or tag size, is e.g. 4 or 8)
- The pointer to the object is tagged with T.
- The memory for the object is also tagged with T (using a TG=>1 shadow memory)
- Every load and store is instrumented to read the memory tag and compare it with the pointer tag, exception is raised on tag mismatch.
For a more detailed discussion of this approach see https://arxiv.org/pdf/1802.09517.pdf
Instrumentation¶
Memory Accesses¶
All memory accesses are prefixed with an inline instruction sequence that verifies the tags. Currently, the following sequence is used:
// int foo(int *a) { return *a; }
// clang -O2 --target=aarch64-linux -fsanitize=hwaddress -c load.c
foo:
0: 08 00 00 90 adrp x8, 0 <__hwasan_shadow>
4: 08 01 40 f9 ldr x8, [x8] // shadow base (to be resolved by the loader)
8: 09 dc 44 d3 ubfx x9, x0, #4, #52 // shadow offset
c: 28 69 68 38 ldrb w8, [x9, x8] // load shadow tag
10: 09 fc 78 d3 lsr x9, x0, #56 // extract address tag
14: 3f 01 08 6b cmp w9, w8 // compare tags
18: 61 00 00 54 b.ne 24 // jump on mismatch
1c: 00 00 40 b9 ldr w0, [x0] // original load
20: c0 03 5f d6 ret
24: 40 20 21 d4 brk #0x902 // trap
Alternatively, memory accesses are prefixed with a function call.
Heap¶
Tagging the heap memory/pointers is done by malloc. This can be based on any malloc that forces all objects to be TG-aligned. free tags the memory with a different tag.
Stack¶
Stack frames are instrumented by aligning all non-promotable allocas by TG and tagging stack memory in function prologue and epilogue.
Tags for different allocas in one function are not generated independently; doing that in a function with M allocas would require maintaining M live stack pointers, significantly increasing register pressure. Instead we generate a single base tag value in the prologue, and build the tag for alloca number M as ReTag(BaseTag, M), where ReTag can be as simple as exclusive-or with constant M.
Stack instrumentation is expected to be a major source of overhead, but could be optional.
Globals¶
TODO: details.
Error reporting¶
Errors are generated by the HLT instruction and are handled by a signal handler.
Attribute¶
HWASAN uses its own LLVM IR Attribute sanitize_hwaddress and a matching C function attribute. An alternative would be to re-use ASAN’s attribute sanitize_address. The reasons to use a separate attribute are:
- Users may need to disable ASAN but not HWASAN, or vise versa, because the tools have different trade-offs and compatibility issues.
- LLVM (ideally) does not use flags to decide which pass is being used, ASAN or HWASAN are being applied, based on the function attributes.
This does mean that users of HWASAN may need to add the new attribute to the code that already uses the old attribute.
Comparison with AddressSanitizer¶
- HWASAN:
- Is less portable than AddressSanitizer as it relies on hardware Address Tagging (AArch64). Address Tagging can be emulated with compiler instrumentation, but it will require the instrumentation to remove the tags before any load or store, which is infeasible in any realistic environment that contains non-instrumented code.
- May have compatibility problems if the target code uses higher pointer bits for other purposes.
- May require changes in the OS kernels (e.g. Linux seems to dislike tagged pointers passed from address space: https://www.kernel.org/doc/Documentation/arm64/tagged-pointers.txt).
- Does not require redzones to detect buffer overflows, but the buffer overflow detection is probabilistic, with roughly (2**TS-1)/(2**TS) probability of catching a bug.
- Does not require quarantine to detect heap-use-after-free, or stack-use-after-return. The detection is similarly probabilistic.
The memory overhead of HWASAN is expected to be much smaller than that of AddressSanitizer: 1/TG extra memory for the shadow and some overhead due to TG-aligning all objects.
Supported architectures¶
HWASAN relies on Address Tagging which is only available on AArch64. For other 64-bit architectures it is possible to remove the address tags before every load and store by compiler instrumentation, but this variant will have limited deployability since not all of the code is typically instrumented.
The HWASAN’s approach is not applicable to 32-bit architectures.