Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 1 | .. _using-libcxx: |
| 2 | |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 3 | ============ |
| 4 | Using libc++ |
| 5 | ============ |
| 6 | |
| 7 | .. contents:: |
| 8 | :local: |
| 9 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 10 | Usually, libc++ is packaged and shipped by a vendor through some delivery vehicle |
| 11 | (operating system distribution, SDK, toolchain, etc) and users don't need to do |
| 12 | anything special in order to use the library. |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 13 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 14 | This page contains information about configuration knobs that can be used by |
| 15 | users when they know libc++ is used by their toolchain, and how to use libc++ |
| 16 | when it is not the default library used by their toolchain. |
| 17 | |
| 18 | |
| 19 | Using a different version of the C++ Standard |
| 20 | ============================================= |
| 21 | |
| 22 | Libc++ implements the various versions of the C++ Standard. Changing the version of |
| 23 | the standard can be done by passing ``-std=c++XY`` to the compiler. Libc++ will |
| 24 | automatically detect what Standard is being used and will provide functionality that |
| 25 | matches that Standard in the library. |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 26 | |
| 27 | .. code-block:: bash |
| 28 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 29 | $ clang++ -std=c++17 test.cpp |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 30 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 31 | .. warning:: |
| 32 | Using ``-std=c++XY`` with a version of the Standard that has not been ratified yet |
| 33 | is considered unstable. Libc++ reserves the right to make breaking changes to the |
| 34 | library until the standard has been ratified. |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 35 | |
Eric Fiselier | 02cea5e | 2018-07-27 03:07:09 +0000 | [diff] [blame] | 36 | |
Eric Fiselier | fa43a5c | 2016-05-03 22:32:08 +0000 | [diff] [blame] | 37 | Using libc++experimental and ``<experimental/...>`` |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 38 | =================================================== |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 39 | |
Eric Fiselier | fa43a5c | 2016-05-03 22:32:08 +0000 | [diff] [blame] | 40 | Libc++ provides implementations of experimental technical specifications |
| 41 | in a separate library, ``libc++experimental.a``. Users of ``<experimental/...>`` |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 42 | headers may be required to link ``-lc++experimental``. Note that not all |
| 43 | vendors ship ``libc++experimental.a``, and as a result, you may not be |
| 44 | able to use those experimental features. |
Eric Fiselier | fa43a5c | 2016-05-03 22:32:08 +0000 | [diff] [blame] | 45 | |
| 46 | .. code-block:: bash |
| 47 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 48 | $ clang++ test.cpp -lc++experimental |
Eric Fiselier | fa43a5c | 2016-05-03 22:32:08 +0000 | [diff] [blame] | 49 | |
| 50 | .. warning:: |
| 51 | Experimental libraries are Experimental. |
| 52 | * The contents of the ``<experimental/...>`` headers and ``libc++experimental.a`` |
| 53 | library will not remain compatible between versions. |
| 54 | * No guarantees of API or ABI stability are provided. |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 55 | * When the standardized version of an experimental feature is implemented, |
Louis Dionne | 3767713 | 2019-06-11 14:48:40 +0000 | [diff] [blame] | 56 | the experimental feature is removed two releases after the non-experimental |
| 57 | version has shipped. The full policy is explained :ref:`here <experimental features>`. |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 58 | |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 59 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 60 | Using libc++ when it is not the system default |
| 61 | ============================================== |
| 62 | |
| 63 | On systems where libc++ is provided but is not the default, Clang provides a flag |
| 64 | called ``-stdlib=`` that can be used to decide which standard library is used. |
| 65 | Using ``-stdlib=libc++`` will select libc++: |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 66 | |
| 67 | .. code-block:: bash |
| 68 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 69 | $ clang++ -stdlib=libc++ test.cpp |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 70 | |
Louis Dionne | e474551 | 2021-09-07 12:55:48 -0400 | [diff] [blame] | 71 | On systems where libc++ is the library in use by default such as macOS and FreeBSD, |
| 72 | this flag is not required. |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 73 | |
| 74 | |
| 75 | .. _alternate libcxx: |
| 76 | |
| 77 | Using a custom built libc++ |
| 78 | =========================== |
| 79 | |
| 80 | Most compilers provide a way to disable the default behavior for finding the |
| 81 | standard library and to override it with custom paths. With Clang, this can |
| 82 | be done with: |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 83 | |
| 84 | .. code-block:: bash |
| 85 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 86 | $ clang++ -nostdinc++ -nostdlib++ \ |
| 87 | -isystem <install>/include/c++/v1 \ |
| 88 | -L <install>/lib \ |
| 89 | -Wl,-rpath,<install>/lib \ |
| 90 | -lc++ \ |
| 91 | test.cpp |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 92 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 93 | The option ``-Wl,-rpath,<install>/lib`` adds a runtime library search path, |
| 94 | which causes the system's dynamic linker to look for libc++ in ``<install>/lib`` |
| 95 | whenever the program is loaded. |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 96 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 97 | GCC does not support the ``-nostdlib++`` flag, so one must use ``-nodefaultlibs`` |
| 98 | instead. Since that removes all the standard system libraries and not just libc++, |
| 99 | the system libraries must be re-added manually. For example: |
Eric Fiselier | d720d1f | 2015-08-22 19:40:49 +0000 | [diff] [blame] | 100 | |
| 101 | .. code-block:: bash |
| 102 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 103 | $ g++ -nostdinc++ -nodefaultlibs \ |
| 104 | -isystem <install>/include/c++/v1 \ |
| 105 | -L <install>/lib \ |
| 106 | -Wl,-rpath,<install>/lib \ |
| 107 | -lc++ -lc++abi -lm -lc -lgcc_s -lgcc \ |
| 108 | test.cpp |
Eric Fiselier | 41ee431 | 2016-01-20 01:26:30 +0000 | [diff] [blame] | 109 | |
| 110 | |
| 111 | GDB Pretty printers for libc++ |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 112 | ============================== |
Eric Fiselier | 41ee431 | 2016-01-20 01:26:30 +0000 | [diff] [blame] | 113 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 114 | GDB does not support pretty-printing of libc++ symbols by default. However, libc++ does |
| 115 | provide pretty-printers itself. Those can be used as: |
Eric Fiselier | 41ee431 | 2016-01-20 01:26:30 +0000 | [diff] [blame] | 116 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 117 | .. code-block:: bash |
Eric Fiselier | 41ee431 | 2016-01-20 01:26:30 +0000 | [diff] [blame] | 118 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 119 | $ gdb -ex "source <libcxx>/utils/gdb/libcxx/printers.py" \ |
| 120 | -ex "python register_libcxx_printer_loader()" \ |
| 121 | <args> |
Eric Fiselier | b382530 | 2016-11-13 23:00:30 +0000 | [diff] [blame] | 122 | |
| 123 | |
Louis Dionne | 6e8eb55 | 2022-03-03 17:37:03 -0500 | [diff] [blame] | 124 | .. _assertions-mode: |
| 125 | |
| 126 | Enabling the "safe libc++" mode |
| 127 | =============================== |
| 128 | |
| 129 | Libc++ contains a number of assertions whose goal is to catch undefined behavior in the |
| 130 | library, usually caused by precondition violations. Those assertions do not aim to be |
| 131 | exhaustive -- instead they aim to provide a good balance between safety and performance. |
| 132 | In particular, these assertions do not change the complexity of algorithms. However, they |
| 133 | might, in some cases, interfere with compiler optimizations. |
| 134 | |
| 135 | By default, these assertions are turned off. Vendors can decide to turn them on while building |
| 136 | the compiled library by defining ``LIBCXX_ENABLE_ASSERTIONS=ON`` at CMake configuration time. |
| 137 | When ``LIBCXX_ENABLE_ASSERTIONS`` is used, the compiled library will be built with assertions |
| 138 | enabled, **and** user code will be built with assertions enabled by default. If |
| 139 | ``LIBCXX_ENABLE_ASSERTIONS=OFF`` at CMake configure time, the compiled library will not contain |
| 140 | assertions and the default when building user code will be to have assertions disabled. |
| 141 | As a user, you can consult your vendor to know whether assertions are enabled by default. |
| 142 | |
| 143 | Furthermore, independently of any vendor-selected default, users can always control whether |
| 144 | assertions are enabled in their code by defining ``_LIBCPP_ENABLE_ASSERTIONS=0|1`` before |
| 145 | including any libc++ header (we recommend passing ``-D_LIBCPP_ENABLE_ASSERTIONS=X`` to the |
| 146 | compiler). Note that if the compiled library was built by the vendor without assertions, |
| 147 | functions compiled inside the static or shared library won't have assertions enabled even |
| 148 | if the user defines ``_LIBCPP_ENABLE_ASSERTIONS=1`` (the same is true for the inverse case |
| 149 | where the static or shared library was compiled **with** assertions but the user tries to |
| 150 | disable them). However, most of the code in libc++ is in the headers, so the user-selected |
| 151 | value for ``_LIBCPP_ENABLE_ASSERTIONS`` (if any) will usually be respected. |
| 152 | |
| 153 | When an assertion fails, an assertion handler function is called. The library provides a default |
| 154 | assertion handler that prints an error message and calls ``std::abort()``. Note that this assertion |
| 155 | handler is provided by the static or shared library, so it is only available when deploying to a |
| 156 | platform where the compiled library is sufficiently recent. However, users can also override that |
| 157 | assertion handler with their own, which can be useful to provide custom behavior, or when deploying |
| 158 | to older platforms where the default assertion handler isn't available. |
| 159 | |
| 160 | Replacing the default assertion handler is done by defining the following function: |
| 161 | |
| 162 | .. code-block:: cpp |
| 163 | |
| 164 | void __libcpp_assertion_handler(char const* file, int line, char const* expression, char const* message) |
| 165 | |
| 166 | This mechanism is similar to how one can replace the default definition of ``operator new`` |
| 167 | and ``operator delete``. For example: |
| 168 | |
| 169 | .. code-block:: cpp |
| 170 | |
| 171 | // In HelloWorldHandler.cpp |
Louis Dionne | b4fce35 | 2022-03-25 12:55:36 -0400 | [diff] [blame] | 172 | #include <version> // must include any libc++ header before defining the handler (C compatibility headers excluded) |
Louis Dionne | 6e8eb55 | 2022-03-03 17:37:03 -0500 | [diff] [blame] | 173 | |
| 174 | void std::__libcpp_assertion_handler(char const* file, int line, char const* expression, char const* message) { |
| 175 | std::printf("Assertion %s failed at %s:%d, more info: %s", expression, file, line, message); |
| 176 | std::abort(); |
| 177 | } |
| 178 | |
| 179 | // In HelloWorld.cpp |
| 180 | #include <vector> |
| 181 | |
| 182 | int main() { |
| 183 | std::vector<int> v; |
| 184 | int& x = v[0]; // Your assertion handler will be called here if _LIBCPP_ENABLE_ASSERTIONS=1 |
| 185 | } |
| 186 | |
| 187 | Also note that the assertion handler should usually not return. Since the assertions in libc++ |
| 188 | catch undefined behavior, your code will proceed with undefined behavior if your assertion |
| 189 | handler is called and does return. |
| 190 | |
| 191 | Furthermore, throwing an exception from the assertion handler is not recommended. Indeed, many |
| 192 | functions in the library are ``noexcept``, and any exception thrown from the assertion handler |
| 193 | will result in ``std::terminate`` being called. |
| 194 | |
| 195 | Back-deploying with a custom assertion handler |
| 196 | ---------------------------------------------- |
| 197 | When deploying to an older platform that does not provide a default assertion handler, the |
| 198 | compiler will diagnose the usage of ``std::__libcpp_assertion_handler`` with an error. This |
| 199 | is done to avoid the load-time error that would otherwise happen if the code was being deployed |
| 200 | on the older system. |
| 201 | |
| 202 | If you are providing a custom assertion handler, this error is effectively a false positive. |
| 203 | To let the library know that you are providing a custom assertion handler in back-deployment |
| 204 | scenarios, you must define the ``_LIBCPP_AVAILABILITY_CUSTOM_ASSERTION_HANDLER_PROVIDED`` macro, |
| 205 | and the library will assume that you are providing your own definition. If no definition is |
| 206 | provided and the code is back-deployed to the older platform, it will fail to load when the |
| 207 | dynamic linker fails to find a definition for ``std::__libcpp_assertion_handler``, so you |
| 208 | should only remove the guard rails if you really mean it! |
| 209 | |
Eric Fiselier | b382530 | 2016-11-13 23:00:30 +0000 | [diff] [blame] | 210 | Libc++ Configuration Macros |
| 211 | =========================== |
| 212 | |
| 213 | Libc++ provides a number of configuration macros which can be used to enable |
| 214 | or disable extended libc++ behavior, including enabling "debug mode" or |
| 215 | thread safety annotations. |
| 216 | |
Eric Fiselier | b382530 | 2016-11-13 23:00:30 +0000 | [diff] [blame] | 217 | **_LIBCPP_ENABLE_THREAD_SAFETY_ANNOTATIONS**: |
| 218 | This macro is used to enable -Wthread-safety annotations on libc++'s |
Jennifer Chukwu | b978809 | 2021-04-17 20:34:06 +0530 | [diff] [blame] | 219 | ``std::mutex`` and ``std::lock_guard``. By default, these annotations are |
Eric Fiselier | b382530 | 2016-11-13 23:00:30 +0000 | [diff] [blame] | 220 | disabled and must be manually enabled by the user. |
Shoaib Meenai | f36e988 | 2016-12-05 19:40:12 +0000 | [diff] [blame] | 221 | |
| 222 | **_LIBCPP_DISABLE_VISIBILITY_ANNOTATIONS**: |
| 223 | This macro is used to disable all visibility annotations inside libc++. |
| 224 | Defining this macro and then building libc++ with hidden visibility gives a |
| 225 | build of libc++ which does not export any symbols, which can be useful when |
| 226 | building statically for inclusion into another library. |
Eric Fiselier | 41b686e | 2016-12-08 23:57:08 +0000 | [diff] [blame] | 227 | |
Eric Fiselier | a7a14ed | 2017-01-13 22:02:08 +0000 | [diff] [blame] | 228 | **_LIBCPP_DISABLE_ADDITIONAL_DIAGNOSTICS**: |
| 229 | This macro disables the additional diagnostics generated by libc++ using the |
| 230 | `diagnose_if` attribute. These additional diagnostics include checks for: |
| 231 | |
Louis Dionne | 878a3a8 | 2018-12-06 21:46:17 +0000 | [diff] [blame] | 232 | * Giving `set`, `map`, `multiset`, `multimap` and their `unordered_` |
| 233 | counterparts a comparator which is not const callable. |
| 234 | * Giving an unordered associative container a hasher that is not const |
| 235 | callable. |
Eric Fiselier | a7a14ed | 2017-01-13 22:02:08 +0000 | [diff] [blame] | 236 | |
Shoaib Meenai | cfd1960 | 2017-10-09 19:25:17 +0000 | [diff] [blame] | 237 | **_LIBCPP_NO_VCRUNTIME**: |
| 238 | Microsoft's C and C++ headers are fairly entangled, and some of their C++ |
| 239 | headers are fairly hard to avoid. In particular, `vcruntime_new.h` gets pulled |
| 240 | in from a lot of other headers and provides definitions which clash with |
| 241 | libc++ headers, such as `nothrow_t` (note that `nothrow_t` is a struct, so |
| 242 | there's no way for libc++ to provide a compatible definition, since you can't |
| 243 | have multiple definitions). |
| 244 | |
| 245 | By default, libc++ solves this problem by deferring to Microsoft's vcruntime |
| 246 | headers where needed. However, it may be undesirable to depend on vcruntime |
| 247 | headers, since they may not always be available in cross-compilation setups, |
| 248 | or they may clash with other headers. The `_LIBCPP_NO_VCRUNTIME` macro |
| 249 | prevents libc++ from depending on vcruntime headers. Consequently, it also |
| 250 | prevents libc++ headers from being interoperable with vcruntime headers (from |
| 251 | the aforementioned clashes), so users of this macro are promising to not |
| 252 | attempt to combine libc++ headers with the problematic vcruntime headers. This |
| 253 | macro also currently prevents certain `operator new`/`operator delete` |
| 254 | replacement scenarios from working, e.g. replacing `operator new` and |
| 255 | expecting a non-replaced `operator new[]` to call the replaced `operator new`. |
| 256 | |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 257 | **_LIBCPP_ENABLE_NODISCARD**: |
| 258 | Allow the library to add ``[[nodiscard]]`` attributes to entities not specified |
| 259 | as ``[[nodiscard]]`` by the current language dialect. This includes |
| 260 | backporting applications of ``[[nodiscard]]`` from newer dialects and |
| 261 | additional extended applications at the discretion of the library. All |
| 262 | additional applications of ``[[nodiscard]]`` are disabled by default. |
| 263 | See :ref:`Extended Applications of [[nodiscard]] <nodiscard extension>` for |
| 264 | more information. |
| 265 | |
| 266 | **_LIBCPP_DISABLE_NODISCARD_EXT**: |
| 267 | This macro prevents the library from applying ``[[nodiscard]]`` to entities |
| 268 | purely as an extension. See :ref:`Extended Applications of [[nodiscard]] <nodiscard extension>` |
| 269 | for more information. |
| 270 | |
Louis Dionne | ded5b77 | 2019-03-12 20:10:06 +0000 | [diff] [blame] | 271 | **_LIBCPP_DISABLE_DEPRECATION_WARNINGS**: |
| 272 | This macro disables warnings when using deprecated components. For example, |
| 273 | using `std::auto_ptr` when compiling in C++11 mode will normally trigger a |
| 274 | warning saying that `std::auto_ptr` is deprecated. If the macro is defined, |
| 275 | no warning will be emitted. By default, this macro is not defined. |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 276 | |
Eric Fiselier | ddd7779 | 2017-02-17 03:25:08 +0000 | [diff] [blame] | 277 | C++17 Specific Configuration Macros |
| 278 | ----------------------------------- |
| 279 | **_LIBCPP_ENABLE_CXX17_REMOVED_FEATURES**: |
| 280 | This macro is used to re-enable all the features removed in C++17. The effect |
| 281 | is equivalent to manually defining each macro listed below. |
| 282 | |
Eric Fiselier | 65d5b4c | 2017-02-17 03:30:25 +0000 | [diff] [blame] | 283 | **_LIBCPP_ENABLE_CXX17_REMOVED_AUTO_PTR**: |
Arthur O'Dwyer | a6b5107 | 2021-05-24 18:36:17 -0400 | [diff] [blame] | 284 | This macro is used to re-enable `auto_ptr`. |
| 285 | |
| 286 | **_LIBCPP_ENABLE_CXX17_REMOVED_BINDERS**: |
| 287 | This macro is used to re-enable the `binder1st`, `binder2nd`, |
| 288 | `pointer_to_unary_function`, `pointer_to_binary_function`, `mem_fun_t`, |
| 289 | `mem_fun1_t`, `mem_fun_ref_t`, `mem_fun1_ref_t`, `const_mem_fun_t`, |
| 290 | `const_mem_fun1_t`, `const_mem_fun_ref_t`, and `const_mem_fun1_ref_t` |
| 291 | class templates, and the `bind1st`, `bind2nd`, `mem_fun`, `mem_fun_ref`, |
| 292 | and `ptr_fun` functions. |
| 293 | |
| 294 | **_LIBCPP_ENABLE_CXX17_REMOVED_RANDOM_SHUFFLE**: |
| 295 | This macro is used to re-enable the `random_shuffle` algorithm. |
| 296 | |
| 297 | **_LIBCPP_ENABLE_CXX17_REMOVED_UNEXPECTED_FUNCTIONS**: |
| 298 | This macro is used to re-enable `set_unexpected`, `get_unexpected`, and |
| 299 | `unexpected`. |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 300 | |
Marek Kurdej | 24b4c51 | 2021-01-07 12:29:04 +0100 | [diff] [blame] | 301 | C++20 Specific Configuration Macros: |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 302 | ------------------------------------ |
| 303 | **_LIBCPP_DISABLE_NODISCARD_AFTER_CXX17**: |
| 304 | This macro can be used to disable diagnostics emitted from functions marked |
| 305 | ``[[nodiscard]]`` in dialects after C++17. See :ref:`Extended Applications of [[nodiscard]] <nodiscard extension>` |
| 306 | for more information. |
| 307 | |
Arthur O'Dwyer | a6b5107 | 2021-05-24 18:36:17 -0400 | [diff] [blame] | 308 | **_LIBCPP_ENABLE_CXX20_REMOVED_FEATURES**: |
| 309 | This macro is used to re-enable all the features removed in C++20. The effect |
| 310 | is equivalent to manually defining each macro listed below. |
| 311 | |
| 312 | **_LIBCPP_ENABLE_CXX20_REMOVED_ALLOCATOR_MEMBERS**: |
| 313 | This macro is used to re-enable redundant members of `allocator<T>`, |
| 314 | including `pointer`, `reference`, `rebind`, `address`, `max_size`, |
| 315 | `construct`, `destroy`, and the two-argument overload of `allocate`. |
Arthur O'Dwyer | a6b5107 | 2021-05-24 18:36:17 -0400 | [diff] [blame] | 316 | |
Arthur O'Dwyer | f5486c8 | 2021-05-25 14:34:18 -0400 | [diff] [blame] | 317 | **_LIBCPP_ENABLE_CXX20_REMOVED_BINDER_TYPEDEFS**: |
| 318 | This macro is used to re-enable the `argument_type`, `result_type`, |
| 319 | `first_argument_type`, and `second_argument_type` members of class |
| 320 | templates such as `plus`, `logical_not`, `hash`, and `owner_less`. |
| 321 | |
Arthur O'Dwyer | a6b5107 | 2021-05-24 18:36:17 -0400 | [diff] [blame] | 322 | **_LIBCPP_ENABLE_CXX20_REMOVED_NEGATORS**: |
| 323 | This macro is used to re-enable `not1`, `not2`, `unary_negate`, |
| 324 | and `binary_negate`. |
| 325 | |
| 326 | **_LIBCPP_ENABLE_CXX20_REMOVED_RAW_STORAGE_ITERATOR**: |
| 327 | This macro is used to re-enable `raw_storage_iterator`. |
| 328 | |
wmbat | f5b3376 | 2021-07-02 17:08:36 +0000 | [diff] [blame] | 329 | **_LIBCPP_ENABLE_CXX20_REMOVED_TYPE_TRAITS**: |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 330 | This macro is used to re-enable `is_literal_type`, `is_literal_type_v`, |
wmbat | f5b3376 | 2021-07-02 17:08:36 +0000 | [diff] [blame] | 331 | `result_of` and `result_of_t`. |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 332 | |
Louis Dionne | 4b1b70d | 2021-07-06 10:39:01 -0400 | [diff] [blame] | 333 | |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 334 | Libc++ Extensions |
| 335 | ================= |
| 336 | |
| 337 | This section documents various extensions provided by libc++, how they're |
| 338 | provided, and any information regarding how to use them. |
| 339 | |
| 340 | .. _nodiscard extension: |
| 341 | |
| 342 | Extended applications of ``[[nodiscard]]`` |
| 343 | ------------------------------------------ |
| 344 | |
| 345 | The ``[[nodiscard]]`` attribute is intended to help users find bugs where |
| 346 | function return values are ignored when they shouldn't be. After C++17 the |
| 347 | C++ standard has started to declared such library functions as ``[[nodiscard]]``. |
| 348 | However, this application is limited and applies only to dialects after C++17. |
| 349 | Users who want help diagnosing misuses of STL functions may desire a more |
| 350 | liberal application of ``[[nodiscard]]``. |
| 351 | |
| 352 | For this reason libc++ provides an extension that does just that! The |
| 353 | extension must be enabled by defining ``_LIBCPP_ENABLE_NODISCARD``. The extended |
| 354 | applications of ``[[nodiscard]]`` takes two forms: |
| 355 | |
| 356 | 1. Backporting ``[[nodiscard]]`` to entities declared as such by the |
| 357 | standard in newer dialects, but not in the present one. |
| 358 | |
Arthur O'Dwyer | 108facb | 2021-04-05 14:56:03 -0400 | [diff] [blame] | 359 | 2. Extended applications of ``[[nodiscard]]``, at the library's discretion, |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 360 | applied to entities never declared as such by the standard. |
| 361 | |
| 362 | Users may also opt-out of additional applications ``[[nodiscard]]`` using |
| 363 | additional macros. |
| 364 | |
| 365 | Applications of the first form, which backport ``[[nodiscard]]`` from a newer |
Arthur O'Dwyer | 108facb | 2021-04-05 14:56:03 -0400 | [diff] [blame] | 366 | dialect, may be disabled using macros specific to the dialect in which it was |
| 367 | added. For example, ``_LIBCPP_DISABLE_NODISCARD_AFTER_CXX17``. |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 368 | |
| 369 | Applications of the second form, which are pure extensions, may be disabled |
| 370 | by defining ``_LIBCPP_DISABLE_NODISCARD_EXT``. |
| 371 | |
| 372 | |
| 373 | Entities declared with ``_LIBCPP_NODISCARD_EXT`` |
| 374 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 375 | |
| 376 | This section lists all extended applications of ``[[nodiscard]]`` to entities |
| 377 | which no dialect declares as such (See the second form described above). |
| 378 | |
Nico Weber | 471b10a | 2019-04-03 18:13:08 +0000 | [diff] [blame] | 379 | * ``adjacent_find`` |
| 380 | * ``all_of`` |
| 381 | * ``any_of`` |
| 382 | * ``binary_search`` |
| 383 | * ``clamp`` |
| 384 | * ``count_if`` |
| 385 | * ``count`` |
| 386 | * ``equal_range`` |
| 387 | * ``equal`` |
| 388 | * ``find_end`` |
| 389 | * ``find_first_of`` |
| 390 | * ``find_if_not`` |
| 391 | * ``find_if`` |
| 392 | * ``find`` |
Roman Lebedev | b5959fa | 2018-09-22 17:54:48 +0000 | [diff] [blame] | 393 | * ``get_temporary_buffer`` |
Nico Weber | 471b10a | 2019-04-03 18:13:08 +0000 | [diff] [blame] | 394 | * ``includes`` |
| 395 | * ``is_heap_until`` |
| 396 | * ``is_heap`` |
| 397 | * ``is_partitioned`` |
| 398 | * ``is_permutation`` |
| 399 | * ``is_sorted_until`` |
| 400 | * ``is_sorted`` |
| 401 | * ``lexicographical_compare`` |
| 402 | * ``lower_bound`` |
| 403 | * ``max_element`` |
| 404 | * ``max`` |
| 405 | * ``min_element`` |
| 406 | * ``min`` |
| 407 | * ``minmax_element`` |
| 408 | * ``minmax`` |
| 409 | * ``mismatch`` |
| 410 | * ``none_of`` |
| 411 | * ``remove_if`` |
| 412 | * ``remove`` |
| 413 | * ``search_n`` |
| 414 | * ``search`` |
| 415 | * ``unique`` |
| 416 | * ``upper_bound`` |
Louis Dionne | 346587e | 2019-08-13 11:12:28 +0000 | [diff] [blame] | 417 | * ``lock_guard``'s constructors |
Arthur O'Dwyer | 108facb | 2021-04-05 14:56:03 -0400 | [diff] [blame] | 418 | * ``as_const`` |
Louis Dionne | 1462d4d | 2020-05-28 14:28:38 -0400 | [diff] [blame] | 419 | * ``bit_cast`` |
Arthur O'Dwyer | 108facb | 2021-04-05 14:56:03 -0400 | [diff] [blame] | 420 | * ``forward`` |
| 421 | * ``move`` |
| 422 | * ``move_if_noexcept`` |
| 423 | * ``identity::operator()`` |
| 424 | * ``to_integer`` |
| 425 | * ``to_underlying`` |