1 /* Command line option handling.
2 Copyright (C) 2002-2020 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
36 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
38 /* Indexed by enum debug_info_type. */
39 const char *const debug_type_names
[] =
41 "none", "stabs", "dwarf-2", "xcoff", "vms"
44 /* Parse the -femit-struct-debug-detailed option value
45 and set the flag variables. */
47 #define MATCH( prefix, string ) \
48 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
49 ? ((string += sizeof prefix - 1), 1) : 0)
52 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
55 /* various labels for comparison */
56 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
57 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
58 static const char none_lbl
[] = "none", any_lbl
[] = "any";
59 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
61 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
62 /* Default is to apply to as much as possible. */
63 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
67 if (MATCH (dfn_lbl
, spec
))
68 usage
= DINFO_USAGE_DFN
;
69 else if (MATCH (dir_lbl
, spec
))
70 usage
= DINFO_USAGE_DIR_USE
;
71 else if (MATCH (ind_lbl
, spec
))
72 usage
= DINFO_USAGE_IND_USE
;
74 /* Generics or not? */
75 if (MATCH (ord_lbl
, spec
))
77 else if (MATCH (gen_lbl
, spec
))
80 /* What allowable environment? */
81 if (MATCH (none_lbl
, spec
))
82 files
= DINFO_STRUCT_FILE_NONE
;
83 else if (MATCH (any_lbl
, spec
))
84 files
= DINFO_STRUCT_FILE_ANY
;
85 else if (MATCH (sys_lbl
, spec
))
86 files
= DINFO_STRUCT_FILE_SYS
;
87 else if (MATCH (base_lbl
, spec
))
88 files
= DINFO_STRUCT_FILE_BASE
;
91 "argument %qs to %<-femit-struct-debug-detailed%> "
95 /* Effect the specification. */
96 if (usage
== DINFO_USAGE_NUM_ENUMS
)
100 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
101 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
102 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
106 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
107 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
108 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
114 opts
->x_debug_struct_ordinary
[usage
] = files
;
116 opts
->x_debug_struct_generic
[usage
] = files
;
120 set_struct_debug_option (opts
, loc
, spec
+1);
123 /* No more -femit-struct-debug-detailed specifications.
127 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
129 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
130 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
131 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
132 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
134 "%<-femit-struct-debug-detailed=dir:...%> must allow "
135 "at least as much as "
136 "%<-femit-struct-debug-detailed=ind:...%>");
140 /* Strip off a legitimate source ending from the input string NAME of
141 length LEN. Rather than having to know the names used by all of
142 our front ends, we strip off an ending of a period followed by
143 up to fource characters. (C++ uses ".cpp".) */
146 strip_off_ending (char *name
, int len
)
149 for (i
= 2; i
< 5 && len
> i
; i
++)
151 if (name
[len
- i
] == '.')
153 name
[len
- i
] = '\0';
159 /* Find the base name of a path, stripping off both directories and
160 a single final extension. */
162 base_of_path (const char *path
, const char **base_out
)
164 const char *base
= path
;
166 const char *p
= path
;
170 if (IS_DIR_SEPARATOR (c
))
185 /* What to print when a switch has no documentation. */
186 static const char undocumented_msg
[] = N_("This option lacks documentation.");
187 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
189 typedef char *char_p
; /* For DEF_VEC_P. */
191 static void set_debug_level (enum debug_info_type type
, int extended
,
192 const char *arg
, struct gcc_options
*opts
,
193 struct gcc_options
*opts_set
,
195 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
196 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
197 location_t loc
, diagnostic_context
*dc
);
198 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
200 static void enable_warning_as_error (const char *arg
, int value
,
201 unsigned int lang_mask
,
202 const struct cl_option_handlers
*handlers
,
203 struct gcc_options
*opts
,
204 struct gcc_options
*opts_set
,
206 diagnostic_context
*dc
);
208 /* Handle a back-end option; arguments and return value as for
212 target_handle_option (struct gcc_options
*opts
,
213 struct gcc_options
*opts_set
,
214 const struct cl_decoded_option
*decoded
,
215 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
217 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
218 diagnostic_context
*dc
, void (*) (void))
220 gcc_assert (dc
== global_dc
);
221 gcc_assert (kind
== DK_UNSPECIFIED
);
222 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
225 /* Add comma-separated strings to a char_p vector. */
228 add_comma_separated_to_vector (void **pvec
, const char *arg
)
234 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
236 vec_check_alloc (v
, 1);
238 /* We never free this string. */
251 v
->safe_push (token_start
);
254 if (*r
== '\\' && r
[1] == ',')
264 if (*token_start
!= '\0')
265 v
->safe_push (token_start
);
270 /* Initialize opts_obstack. */
273 init_opts_obstack (void)
275 gcc_obstack_init (&opts_obstack
);
278 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
281 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
283 /* Ensure that opts_obstack has already been initialized by the time
284 that we initialize any gcc_options instances (PR jit/68446). */
285 gcc_assert (opts_obstack
.chunk_size
> 0);
287 *opts
= global_options_init
;
290 memset (opts_set
, 0, sizeof (*opts_set
));
292 /* Initialize whether `char' is signed. */
293 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
294 /* Set this to a special "uninitialized" value. The actual default
295 is set after target options have been processed. */
296 opts
->x_flag_short_enums
= 2;
298 /* Initialize target_flags before default_options_optimization
299 so the latter can modify it. */
300 opts
->x_target_flags
= targetm_common
.default_target_flags
;
302 /* Some targets have ABI-specified unwind tables. */
303 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
305 /* Some targets have other target-specific initialization. */
306 targetm_common
.option_init_struct (opts
);
309 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
310 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
311 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
312 mask LANG_MASK and option handlers HANDLERS. */
315 maybe_default_option (struct gcc_options
*opts
,
316 struct gcc_options
*opts_set
,
317 const struct default_options
*default_opt
,
318 int level
, bool size
, bool fast
, bool debug
,
319 unsigned int lang_mask
,
320 const struct cl_option_handlers
*handlers
,
322 diagnostic_context
*dc
)
324 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
328 gcc_assert (level
== 2);
330 gcc_assert (level
== 3);
332 gcc_assert (level
== 1);
334 switch (default_opt
->levels
)
340 case OPT_LEVELS_0_ONLY
:
341 enabled
= (level
== 0);
344 case OPT_LEVELS_1_PLUS
:
345 enabled
= (level
>= 1);
348 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
349 enabled
= (level
>= 1 && !size
&& !debug
);
352 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
353 enabled
= (level
>= 1 && !debug
);
356 case OPT_LEVELS_2_PLUS
:
357 enabled
= (level
>= 2);
360 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
361 enabled
= (level
>= 2 && !size
&& !debug
);
364 case OPT_LEVELS_3_PLUS
:
365 enabled
= (level
>= 3);
368 case OPT_LEVELS_3_PLUS_AND_SIZE
:
369 enabled
= (level
>= 3 || size
);
372 case OPT_LEVELS_SIZE
:
376 case OPT_LEVELS_FAST
:
380 case OPT_LEVELS_NONE
:
386 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
387 default_opt
->arg
, default_opt
->value
,
388 lang_mask
, DK_UNSPECIFIED
, loc
,
390 else if (default_opt
->arg
== NULL
391 && !option
->cl_reject_negative
392 && !(option
->flags
& CL_PARAMS
))
393 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
394 default_opt
->arg
, !default_opt
->value
,
395 lang_mask
, DK_UNSPECIFIED
, loc
,
399 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
400 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
401 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
402 language mask LANG_MASK and option handlers HANDLERS. */
405 maybe_default_options (struct gcc_options
*opts
,
406 struct gcc_options
*opts_set
,
407 const struct default_options
*default_opts
,
408 int level
, bool size
, bool fast
, bool debug
,
409 unsigned int lang_mask
,
410 const struct cl_option_handlers
*handlers
,
412 diagnostic_context
*dc
)
416 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
417 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
418 level
, size
, fast
, debug
,
419 lang_mask
, handlers
, loc
, dc
);
422 /* Table of options enabled by default at different levels.
423 Please keep this list sorted by level and alphabetized within
424 each level; this makes it easier to keep the documentation
427 static const struct default_options default_options_table
[] =
429 /* -O1 and -Og optimizations. */
430 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
431 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
432 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
433 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
434 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
435 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
436 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
437 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
438 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
439 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference_addressable
, NULL
, 1 },
440 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
441 { OPT_LEVELS_1_PLUS
, OPT_fomit_frame_pointer
, NULL
, 1 },
442 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
443 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
444 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
445 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
446 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
447 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
448 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
449 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
450 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
451 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
452 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
453 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
454 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
455 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
457 /* -O1 (and not -Og) optimizations. */
458 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
460 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdelayed_branch
, NULL
, 1 },
462 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdse
, NULL
, 1 },
463 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
464 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
465 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
466 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
467 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
468 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
469 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_dse
, NULL
, 1 },
470 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
471 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
473 /* -O2 and -Os optimizations. */
474 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
475 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
476 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
477 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
478 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
479 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
480 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
481 { OPT_LEVELS_2_PLUS
, OPT_ffinite_loops
, NULL
, 1 },
482 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
483 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
484 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
485 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
486 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
487 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
488 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
489 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
490 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
491 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
492 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
493 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
494 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
495 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
496 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
497 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
498 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
499 #ifdef INSN_SCHEDULING
500 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
502 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
503 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
504 { OPT_LEVELS_2_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
505 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
506 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
507 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
508 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
509 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_CHEAP
},
510 { OPT_LEVELS_2_PLUS
, OPT_finline_functions
, NULL
, 1 },
511 { OPT_LEVELS_2_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
513 /* -O2 and above optimizations, but not -Os or -Og. */
514 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_functions
, NULL
, 1 },
515 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_jumps
, NULL
, 1 },
516 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_labels
, NULL
, 1 },
517 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_loops
, NULL
, 1 },
518 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
519 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
520 REORDER_BLOCKS_ALGORITHM_STC
},
521 #ifdef INSN_SCHEDULING
522 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
523 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
526 /* -O3 and -Os optimizations. */
528 /* -O3 optimizations. */
529 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
530 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
531 { OPT_LEVELS_3_PLUS
, OPT_floop_interchange
, NULL
, 1 },
532 { OPT_LEVELS_3_PLUS
, OPT_floop_unroll_and_jam
, NULL
, 1 },
533 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
534 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
535 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
536 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
537 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
538 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_vectorize
, NULL
, 1 },
539 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
540 { OPT_LEVELS_3_PLUS
, OPT_ftree_slp_vectorize
, NULL
, 1 },
541 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
542 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
543 { OPT_LEVELS_3_PLUS
, OPT_fversion_loops_for_strides
, NULL
, 1 },
545 /* -O3 parameters. */
546 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_auto_
, NULL
, 30 },
547 { OPT_LEVELS_3_PLUS
, OPT__param_early_inlining_insns_
, NULL
, 14 },
548 { OPT_LEVELS_3_PLUS
, OPT__param_inline_heuristics_hint_percent_
, NULL
, 600 },
549 { OPT_LEVELS_3_PLUS
, OPT__param_inline_min_speedup_
, NULL
, 15 },
550 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_single_
, NULL
, 200 },
552 /* -Ofast adds optimizations to -O3. */
553 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
554 { OPT_LEVELS_FAST
, OPT_fallow_store_data_races
, NULL
, 1 },
556 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
559 /* Default the options in OPTS and OPTS_SET based on the optimization
560 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
562 default_options_optimization (struct gcc_options
*opts
,
563 struct gcc_options
*opts_set
,
564 struct cl_decoded_option
*decoded_options
,
565 unsigned int decoded_options_count
,
567 unsigned int lang_mask
,
568 const struct cl_option_handlers
*handlers
,
569 diagnostic_context
*dc
)
573 bool openacc_mode
= false;
575 /* Scan to see what optimization level has been specified. That will
576 determine the default value of many flags. */
577 for (i
= 1; i
< decoded_options_count
; i
++)
579 struct cl_decoded_option
*opt
= &decoded_options
[i
];
580 switch (opt
->opt_index
)
583 if (*opt
->arg
== '\0')
585 opts
->x_optimize
= 1;
586 opts
->x_optimize_size
= 0;
587 opts
->x_optimize_fast
= 0;
588 opts
->x_optimize_debug
= 0;
592 const int optimize_val
= integral_argument (opt
->arg
);
593 if (optimize_val
== -1)
594 error_at (loc
, "argument to %<-O%> should be a non-negative "
595 "integer, %<g%>, %<s%> or %<fast%>");
598 opts
->x_optimize
= optimize_val
;
599 if ((unsigned int) opts
->x_optimize
> 255)
600 opts
->x_optimize
= 255;
601 opts
->x_optimize_size
= 0;
602 opts
->x_optimize_fast
= 0;
603 opts
->x_optimize_debug
= 0;
609 opts
->x_optimize_size
= 1;
611 /* Optimizing for size forces optimize to be 2. */
612 opts
->x_optimize
= 2;
613 opts
->x_optimize_fast
= 0;
614 opts
->x_optimize_debug
= 0;
618 /* -Ofast only adds flags to -O3. */
619 opts
->x_optimize_size
= 0;
620 opts
->x_optimize
= 3;
621 opts
->x_optimize_fast
= 1;
622 opts
->x_optimize_debug
= 0;
626 /* -Og selects optimization level 1. */
627 opts
->x_optimize_size
= 0;
628 opts
->x_optimize
= 1;
629 opts
->x_optimize_fast
= 0;
630 opts
->x_optimize_debug
= 1;
639 /* Ignore other options in this prescan. */
644 maybe_default_options (opts
, opts_set
, default_options_table
,
645 opts
->x_optimize
, opts
->x_optimize_size
,
646 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
647 lang_mask
, handlers
, loc
, dc
);
649 /* -O2 param settings. */
650 opt2
= (opts
->x_optimize
>= 2);
653 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_pta
, true);
655 /* Track fields in field-sensitive alias analysis. */
657 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_fields_for_field_sensitive
,
660 if (opts
->x_optimize_size
)
661 /* We want to crossjump as much as possible. */
662 SET_OPTION_IF_UNSET (opts
, opts_set
, param_min_crossjump_insns
, 1);
664 /* Restrict the amount of work combine does at -Og while retaining
665 most of its useful transforms. */
666 if (opts
->x_optimize_debug
)
667 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_combine_insns
, 2);
669 /* Allow default optimizations to be specified on a per-machine basis. */
670 maybe_default_options (opts
, opts_set
,
671 targetm_common
.option_optimization_table
,
672 opts
->x_optimize
, opts
->x_optimize_size
,
673 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
674 lang_mask
, handlers
, loc
, dc
);
677 /* Control IPA optimizations based on different live patching LEVEL. */
679 control_options_for_live_patching (struct gcc_options
*opts
,
680 struct gcc_options
*opts_set
,
681 enum live_patching_level level
,
684 gcc_assert (level
> LIVE_PATCHING_NONE
);
688 case LIVE_PATCHING_INLINE_ONLY_STATIC
:
689 if (opts_set
->x_flag_ipa_cp_clone
&& opts
->x_flag_ipa_cp_clone
)
691 "%<-fipa-cp-clone%> is incompatible with "
692 "%<-flive-patching=inline-only-static%>");
694 opts
->x_flag_ipa_cp_clone
= 0;
696 if (opts_set
->x_flag_ipa_sra
&& opts
->x_flag_ipa_sra
)
698 "%<-fipa-sra%> is incompatible with "
699 "%<-flive-patching=inline-only-static%>");
701 opts
->x_flag_ipa_sra
= 0;
703 if (opts_set
->x_flag_partial_inlining
&& opts
->x_flag_partial_inlining
)
705 "%<-fpartial-inlining%> is incompatible with "
706 "%<-flive-patching=inline-only-static%>");
708 opts
->x_flag_partial_inlining
= 0;
710 if (opts_set
->x_flag_ipa_cp
&& opts
->x_flag_ipa_cp
)
712 "%<-fipa-cp%> is incompatible with "
713 "%<-flive-patching=inline-only-static%>");
715 opts
->x_flag_ipa_cp
= 0;
718 case LIVE_PATCHING_INLINE_CLONE
:
719 /* live patching should disable whole-program optimization. */
720 if (opts_set
->x_flag_whole_program
&& opts
->x_flag_whole_program
)
722 "%<-fwhole-program%> is incompatible with "
723 "%<-flive-patching=inline-only-static|inline-clone%>");
725 opts
->x_flag_whole_program
= 0;
727 /* visibility change should be excluded by !flag_whole_program
728 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
729 && !flag_partial_inlining. */
731 if (opts_set
->x_flag_ipa_pta
&& opts
->x_flag_ipa_pta
)
733 "%<-fipa-pta%> is incompatible with "
734 "%<-flive-patching=inline-only-static|inline-clone%>");
736 opts
->x_flag_ipa_pta
= 0;
738 if (opts_set
->x_flag_ipa_reference
&& opts
->x_flag_ipa_reference
)
740 "%<-fipa-reference%> is incompatible with "
741 "%<-flive-patching=inline-only-static|inline-clone%>");
743 opts
->x_flag_ipa_reference
= 0;
745 if (opts_set
->x_flag_ipa_ra
&& opts
->x_flag_ipa_ra
)
747 "%<-fipa-ra%> is incompatible with "
748 "%<-flive-patching=inline-only-static|inline-clone%>");
750 opts
->x_flag_ipa_ra
= 0;
752 if (opts_set
->x_flag_ipa_icf
&& opts
->x_flag_ipa_icf
)
754 "%<-fipa-icf%> is incompatible with "
755 "%<-flive-patching=inline-only-static|inline-clone%>");
757 opts
->x_flag_ipa_icf
= 0;
759 if (opts_set
->x_flag_ipa_icf_functions
&& opts
->x_flag_ipa_icf_functions
)
761 "%<-fipa-icf-functions%> is incompatible with "
762 "%<-flive-patching=inline-only-static|inline-clone%>");
764 opts
->x_flag_ipa_icf_functions
= 0;
766 if (opts_set
->x_flag_ipa_icf_variables
&& opts
->x_flag_ipa_icf_variables
)
768 "%<-fipa-icf-variables%> is incompatible with "
769 "%<-flive-patching=inline-only-static|inline-clone%>");
771 opts
->x_flag_ipa_icf_variables
= 0;
773 if (opts_set
->x_flag_ipa_bit_cp
&& opts
->x_flag_ipa_bit_cp
)
775 "%<-fipa-bit-cp%> is incompatible with "
776 "%<-flive-patching=inline-only-static|inline-clone%>");
778 opts
->x_flag_ipa_bit_cp
= 0;
780 if (opts_set
->x_flag_ipa_vrp
&& opts
->x_flag_ipa_vrp
)
782 "%<-fipa-vrp%> is incompatible with "
783 "%<-flive-patching=inline-only-static|inline-clone%>");
785 opts
->x_flag_ipa_vrp
= 0;
787 if (opts_set
->x_flag_ipa_pure_const
&& opts
->x_flag_ipa_pure_const
)
789 "%<-fipa-pure-const%> is incompatible with "
790 "%<-flive-patching=inline-only-static|inline-clone%>");
792 opts
->x_flag_ipa_pure_const
= 0;
794 /* FIXME: disable unreachable code removal. */
796 /* discovery of functions/variables with no address taken. */
797 if (opts_set
->x_flag_ipa_reference_addressable
798 && opts
->x_flag_ipa_reference_addressable
)
800 "%<-fipa-reference-addressable%> is incompatible with "
801 "%<-flive-patching=inline-only-static|inline-clone%>");
803 opts
->x_flag_ipa_reference_addressable
= 0;
805 /* ipa stack alignment propagation. */
806 if (opts_set
->x_flag_ipa_stack_alignment
807 && opts
->x_flag_ipa_stack_alignment
)
809 "%<-fipa-stack-alignment%> is incompatible with "
810 "%<-flive-patching=inline-only-static|inline-clone%>");
812 opts
->x_flag_ipa_stack_alignment
= 0;
819 /* --help option argument if set. */
820 vec
<const char *> help_option_arguments
;
823 /* After all options at LOC have been read into OPTS and OPTS_SET,
824 finalize settings of those options and diagnose incompatible
827 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
830 enum unwind_info_type ui_except
;
832 if (opts
->x_dump_base_name
833 && ! opts
->x_dump_base_name_prefixed
)
835 const char *sep
= opts
->x_dump_base_name
;
838 if (IS_DIR_SEPARATOR (*sep
))
842 /* If dump_base_path contains subdirectories, don't prepend
844 else if (opts
->x_dump_dir_name
)
845 /* We have a DUMP_DIR_NAME, prepend that. */
846 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
847 opts
->x_dump_base_name
, NULL
);
848 else if (opts
->x_aux_base_name
849 && strcmp (opts
->x_aux_base_name
, HOST_BIT_BUCKET
) != 0)
850 /* AUX_BASE_NAME is set and is not the bit bucket. If it
851 contains a directory component, prepend those directories.
852 Typically this places things in the same directory as the
855 const char *aux_base
;
857 base_of_path (opts
->x_aux_base_name
, &aux_base
);
858 if (opts
->x_aux_base_name
!= aux_base
)
860 int dir_len
= aux_base
- opts
->x_aux_base_name
;
861 char *new_dump_base_name
862 = XOBNEWVEC (&opts_obstack
, char,
863 strlen (opts
->x_dump_base_name
) + dir_len
+ 1);
865 /* Copy directory component from OPTS->X_AUX_BASE_NAME. */
866 memcpy (new_dump_base_name
, opts
->x_aux_base_name
, dir_len
);
867 /* Append existing OPTS->X_DUMP_BASE_NAME. */
868 strcpy (new_dump_base_name
+ dir_len
, opts
->x_dump_base_name
);
869 opts
->x_dump_base_name
= new_dump_base_name
;
873 /* It is definitely prefixed now. */
874 opts
->x_dump_base_name_prefixed
= true;
877 /* Handle related options for unit-at-a-time, toplevel-reorder, and
879 if (!opts
->x_flag_unit_at_a_time
)
881 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
882 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
884 opts
->x_flag_section_anchors
= 0;
885 if (opts
->x_flag_toplevel_reorder
== 1)
886 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
888 opts
->x_flag_toplevel_reorder
= 0;
891 /* -fself-test depends on the state of the compiler prior to
892 compiling anything. Ideally it should be run on an empty source
893 file. However, in case we get run with actual source, assume
894 -fsyntax-only which will inhibit any compiler initialization
895 which may confuse the self tests. */
896 if (opts
->x_flag_self_test
)
897 opts
->x_flag_syntax_only
= 1;
899 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
900 sorry ("transactional memory is not supported with non-call exceptions");
902 /* Unless the user has asked for section anchors, we disable toplevel
903 reordering at -O0 to disable transformations that might be surprising
904 to end users and to get -fno-toplevel-reorder tested. */
905 if (!opts
->x_optimize
906 && opts
->x_flag_toplevel_reorder
== 2
907 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
909 opts
->x_flag_toplevel_reorder
= 0;
910 opts
->x_flag_section_anchors
= 0;
912 if (!opts
->x_flag_toplevel_reorder
)
914 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
915 error_at (loc
, "section anchors must be disabled when toplevel reorder"
917 opts
->x_flag_section_anchors
= 0;
920 if (!opts
->x_flag_opts_finished
)
922 /* We initialize opts->x_flag_pie to -1 so that targets can set a
924 if (opts
->x_flag_pie
== -1)
926 /* We initialize opts->x_flag_pic to -1 so that we can tell if
927 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
928 if (opts
->x_flag_pic
== -1)
929 opts
->x_flag_pie
= DEFAULT_FLAG_PIE
;
931 opts
->x_flag_pie
= 0;
933 /* If -fPIE or -fpie is used, turn on PIC. */
934 if (opts
->x_flag_pie
)
935 opts
->x_flag_pic
= opts
->x_flag_pie
;
936 else if (opts
->x_flag_pic
== -1)
937 opts
->x_flag_pic
= 0;
938 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
939 opts
->x_flag_shlib
= 1;
940 opts
->x_flag_opts_finished
= true;
943 /* We initialize opts->x_flag_stack_protect to -1 so that targets
944 can set a default value. */
945 if (opts
->x_flag_stack_protect
== -1)
946 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
948 if (opts
->x_optimize
== 0)
950 /* Inlining does not work if not optimizing,
951 so force it not to be done. */
952 opts
->x_warn_inline
= 0;
953 opts
->x_flag_no_inline
= 1;
956 /* The optimization to partition hot and cold basic blocks into separate
957 sections of the .o and executable files does not work (currently)
958 with exception handling. This is because there is no support for
959 generating unwind info. If opts->x_flag_exceptions is turned on
960 we need to turn off the partitioning optimization. */
962 ui_except
= targetm_common
.except_unwind_info (opts
);
964 if (opts
->x_flag_exceptions
965 && opts
->x_flag_reorder_blocks_and_partition
966 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
968 if (opts_set
->x_flag_reorder_blocks_and_partition
)
970 "%<-freorder-blocks-and-partition%> does not work "
971 "with exceptions on this architecture");
972 opts
->x_flag_reorder_blocks_and_partition
= 0;
973 opts
->x_flag_reorder_blocks
= 1;
976 /* If user requested unwind info, then turn off the partitioning
979 if (opts
->x_flag_unwind_tables
980 && !targetm_common
.unwind_tables_default
981 && opts
->x_flag_reorder_blocks_and_partition
982 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
984 if (opts_set
->x_flag_reorder_blocks_and_partition
)
986 "%<-freorder-blocks-and-partition%> does not support "
987 "unwind info on this architecture");
988 opts
->x_flag_reorder_blocks_and_partition
= 0;
989 opts
->x_flag_reorder_blocks
= 1;
992 /* If the target requested unwind info, then turn off the partitioning
993 optimization with a different message. Likewise, if the target does not
994 support named sections. */
996 if (opts
->x_flag_reorder_blocks_and_partition
997 && (!targetm_common
.have_named_sections
998 || (opts
->x_flag_unwind_tables
999 && targetm_common
.unwind_tables_default
1000 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
1002 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1004 "%<-freorder-blocks-and-partition%> does not work "
1005 "on this architecture");
1006 opts
->x_flag_reorder_blocks_and_partition
= 0;
1007 opts
->x_flag_reorder_blocks
= 1;
1011 /* Pipelining of outer loops is only possible when general pipelining
1012 capabilities are requested. */
1013 if (!opts
->x_flag_sel_sched_pipelining
)
1014 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
1016 if (opts
->x_flag_conserve_stack
)
1018 SET_OPTION_IF_UNSET (opts
, opts_set
, param_large_stack_frame
, 100);
1019 SET_OPTION_IF_UNSET (opts
, opts_set
, param_stack_frame_growth
, 40);
1022 if (opts
->x_flag_lto
)
1025 opts
->x_flag_generate_lto
= 1;
1027 /* When generating IL, do not operate in whole-program mode.
1028 Otherwise, symbols will be privatized too early, causing link
1030 opts
->x_flag_whole_program
= 0;
1032 error_at (loc
, "LTO support has not been enabled in this configuration");
1034 if (!opts
->x_flag_fat_lto_objects
1035 && (!HAVE_LTO_PLUGIN
1036 || (opts_set
->x_flag_use_linker_plugin
1037 && !opts
->x_flag_use_linker_plugin
)))
1039 if (opts_set
->x_flag_fat_lto_objects
)
1040 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
1042 opts
->x_flag_fat_lto_objects
= 1;
1045 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1046 if (opts
->x_dwarf_split_debug_info
)
1048 inform (loc
, "%<-gsplit-dwarf%> is not supported with LTO,"
1050 opts
->x_dwarf_split_debug_info
= 0;
1054 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1055 default value if they choose based on other options. */
1056 if (opts
->x_flag_split_stack
== -1)
1057 opts
->x_flag_split_stack
= 0;
1058 else if (opts
->x_flag_split_stack
)
1060 if (!targetm_common
.supports_split_stack (true, opts
))
1062 error_at (loc
, "%<-fsplit-stack%> is not supported by "
1063 "this compiler configuration");
1064 opts
->x_flag_split_stack
= 0;
1068 /* If stack splitting is turned on, and the user did not explicitly
1069 request function partitioning, turn off partitioning, as it
1070 confuses the linker when trying to handle partitioned split-stack
1071 code that calls a non-split-stack functions. But if partitioning
1072 was turned on explicitly just hope for the best. */
1073 if (opts
->x_flag_split_stack
1074 && opts
->x_flag_reorder_blocks_and_partition
)
1075 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_blocks_and_partition
, 0);
1077 if (opts
->x_flag_reorder_blocks_and_partition
)
1078 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_functions
, 1);
1080 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1081 if (opts
->x_dwarf_split_debug_info
)
1082 opts
->x_debug_generate_pub_sections
= 2;
1084 if ((opts
->x_flag_sanitize
1085 & (SANITIZE_USER_ADDRESS
| SANITIZE_KERNEL_ADDRESS
)) == 0)
1087 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_COMPARE
)
1089 "%<-fsanitize=pointer-compare%> must be combined with "
1090 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1091 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_SUBTRACT
)
1093 "%<-fsanitize=pointer-subtract%> must be combined with "
1094 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1097 /* Userspace and kernel ASan conflict with each other. */
1098 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1099 && (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
))
1101 "%<-fsanitize=address%> is incompatible with "
1102 "%<-fsanitize=kernel-address%>");
1104 /* And with TSan. */
1105 if ((opts
->x_flag_sanitize
& SANITIZE_ADDRESS
)
1106 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1108 "%<-fsanitize=address%> and %<-fsanitize=kernel-address%> "
1109 "are incompatible with %<-fsanitize=thread%>");
1111 if ((opts
->x_flag_sanitize
& SANITIZE_LEAK
)
1112 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1114 "%<-fsanitize=leak%> is incompatible with %<-fsanitize=thread%>");
1116 /* Check error recovery for -fsanitize-recover option. */
1117 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1118 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
1119 && !sanitizer_opts
[i
].can_recover
)
1120 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
1121 sanitizer_opts
[i
].name
);
1123 /* When instrumenting the pointers, we don't want to remove
1124 the null pointer checks. */
1125 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
1126 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
1127 opts
->x_flag_delete_null_pointer_checks
= 0;
1129 /* Aggressive compiler optimizations may cause false negatives. */
1130 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
1131 opts
->x_flag_aggressive_loop_optimizations
= 0;
1133 /* Enable -fsanitize-address-use-after-scope if address sanitizer is
1135 if (opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1136 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_sanitize_address_use_after_scope
,
1139 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1141 if (opts
->x_flag_sanitize_address_use_after_scope
)
1143 if (opts
->x_flag_stack_reuse
!= SR_NONE
1144 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1146 "%<-fsanitize-address-use-after-scope%> requires "
1147 "%<-fstack-reuse=none%> option");
1149 opts
->x_flag_stack_reuse
= SR_NONE
;
1152 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1153 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1155 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1156 sorry ("transactional memory is not supported with "
1157 "%<-fsanitize=kernel-address%>");
1159 /* Currently live patching is not support for LTO. */
1160 if (opts
->x_flag_live_patching
&& opts
->x_flag_lto
)
1161 sorry ("live patching is not supported with LTO");
1163 /* Currently vtable verification is not supported for LTO */
1164 if (opts
->x_flag_vtable_verify
&& opts
->x_flag_lto
)
1165 sorry ("vtable verification is not supported with LTO");
1167 /* Control IPA optimizations based on different -flive-patching level. */
1168 if (opts
->x_flag_live_patching
)
1170 control_options_for_live_patching (opts
, opts_set
,
1171 opts
->x_flag_live_patching
,
1176 #define LEFT_COLUMN 27
1178 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1179 followed by word-wrapped HELP in a second column. */
1181 wrap_help (const char *help
,
1183 unsigned int item_width
,
1184 unsigned int columns
)
1186 unsigned int col_width
= LEFT_COLUMN
;
1187 unsigned int remaining
, room
, len
;
1189 remaining
= strlen (help
);
1193 room
= columns
- 3 - MAX (col_width
, item_width
);
1202 for (i
= 0; help
[i
]; i
++)
1204 if (i
>= room
&& len
!= remaining
)
1208 else if ((help
[i
] == '-' || help
[i
] == '/')
1209 && help
[i
+ 1] != ' '
1210 && i
> 0 && ISALPHA (help
[i
- 1]))
1215 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1217 while (help
[len
] == ' ')
1225 /* Data structure used to print list of valid option values. */
1227 class option_help_tuple
1230 option_help_tuple (int code
, vec
<const char *> values
):
1231 m_code (code
), m_values (values
)
1234 /* Code of an option. */
1237 /* List of possible values. */
1238 vec
<const char *> m_values
;
1241 /* Print help for a specific front-end, etc. */
1243 print_filtered_help (unsigned int include_flags
,
1244 unsigned int exclude_flags
,
1245 unsigned int any_flags
,
1246 unsigned int columns
,
1247 struct gcc_options
*opts
,
1248 unsigned int lang_mask
)
1253 bool displayed
= false;
1256 if (!opts
->x_help_printed
)
1257 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1259 if (!opts
->x_help_enum_printed
)
1260 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1262 auto_vec
<option_help_tuple
> help_tuples
;
1264 for (i
= 0; i
< cl_options_count
; i
++)
1266 const struct cl_option
*option
= cl_options
+ i
;
1271 if (include_flags
== 0
1272 || ((option
->flags
& include_flags
) != include_flags
))
1274 if ((option
->flags
& any_flags
) == 0)
1278 /* Skip unwanted switches. */
1279 if ((option
->flags
& exclude_flags
) != 0)
1282 /* The driver currently prints its own help text. */
1283 if ((option
->flags
& CL_DRIVER
) != 0
1284 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1285 | CL_COMMON
| CL_TARGET
)) == 0)
1289 /* Skip switches that have already been printed. */
1290 if (opts
->x_help_printed
[i
])
1293 opts
->x_help_printed
[i
] = true;
1295 help
= option
->help
;
1298 if (exclude_flags
& CL_UNDOCUMENTED
)
1301 help
= undocumented_msg
;
1304 if (option
->alias_target
< N_OPTS
1305 && cl_options
[option
->alias_target
].help
)
1307 if (help
== undocumented_msg
)
1309 /* For undocumented options that are aliases for other options
1310 that are documented, point the reader to the other option in
1311 preference of the former. */
1312 snprintf (new_help
, sizeof new_help
,
1313 _("Same as %s. Use the latter option instead."),
1314 cl_options
[option
->alias_target
].opt_text
);
1318 /* For documented options with aliases, mention the aliased
1319 option's name for reference. */
1320 snprintf (new_help
, sizeof new_help
,
1321 _("%s Same as %s."),
1322 help
, cl_options
[option
->alias_target
].opt_text
);
1328 if (option
->warn_message
)
1330 /* Mention that the use of the option will trigger a warning. */
1331 if (help
== new_help
)
1332 snprintf (new_help
+ strlen (new_help
),
1333 sizeof new_help
- strlen (new_help
),
1334 " %s", _(use_diagnosed_msg
));
1336 snprintf (new_help
, sizeof new_help
,
1337 "%s %s", help
, _(use_diagnosed_msg
));
1342 /* Get the translation. */
1345 /* Find the gap between the name of the
1346 option and its descriptive text. */
1347 tab
= strchr (help
, '\t');
1356 opt
= option
->opt_text
;
1360 /* With the -Q option enabled we change the descriptive text associated
1361 with an option to be an indication of its current setting. */
1362 if (!opts
->x_quiet_flag
)
1364 void *flag_var
= option_flag_var (i
, opts
);
1366 if (len
< (LEFT_COLUMN
+ 2))
1367 strcpy (new_help
, "\t\t");
1369 strcpy (new_help
, "\t");
1371 /* Set to print whether the option is enabled or disabled,
1372 or, if it's an alias for another option, the name of
1373 the aliased option. */
1374 bool print_state
= false;
1376 if (flag_var
!= NULL
1377 && option
->var_type
!= CLVC_DEFER
)
1379 /* If OPTION is only available for a specific subset
1380 of languages other than this one, mention them. */
1381 bool avail_for_lang
= true;
1382 if (unsigned langset
= option
->flags
& CL_LANG_ALL
)
1384 if (!(langset
& lang_mask
))
1386 avail_for_lang
= false;
1387 strcat (new_help
, _("[available in "));
1388 for (unsigned i
= 0, n
= 0; (1U << i
) < CL_LANG_ALL
; ++i
)
1389 if (langset
& (1U << i
))
1392 strcat (new_help
, ", ");
1393 strcat (new_help
, lang_names
[i
]);
1395 strcat (new_help
, "]");
1398 if (!avail_for_lang
)
1399 ; /* Print nothing else if the option is not available
1400 in the current language. */
1401 else if (option
->flags
& CL_JOINED
)
1403 if (option
->var_type
== CLVC_STRING
)
1405 if (* (const char **) flag_var
!= NULL
)
1406 snprintf (new_help
+ strlen (new_help
),
1407 sizeof (new_help
) - strlen (new_help
),
1408 "%s", * (const char **) flag_var
);
1410 else if (option
->var_type
== CLVC_ENUM
)
1412 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1414 const char *arg
= NULL
;
1416 value
= e
->get (flag_var
);
1417 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1419 arg
= _("[default]");
1420 snprintf (new_help
+ strlen (new_help
),
1421 sizeof (new_help
) - strlen (new_help
),
1426 if (option
->cl_host_wide_int
)
1427 sprintf (new_help
+ strlen (new_help
),
1428 _("%llu bytes"), (unsigned long long)
1429 *(unsigned HOST_WIDE_INT
*) flag_var
);
1431 sprintf (new_help
+ strlen (new_help
),
1432 "%i", * (int *) flag_var
);
1439 /* When there is no argument, print the option state only
1440 if the option takes no argument. */
1441 print_state
= !(option
->flags
& CL_JOINED
);
1445 if (option
->alias_target
< N_OPTS
1446 && option
->alias_target
!= OPT_SPECIAL_warn_removed
1447 && option
->alias_target
!= OPT_SPECIAL_ignore
1448 && option
->alias_target
!= OPT_SPECIAL_input_file
1449 && option
->alias_target
!= OPT_SPECIAL_program_name
1450 && option
->alias_target
!= OPT_SPECIAL_unknown
)
1452 const struct cl_option
*target
1453 = &cl_options
[option
->alias_target
];
1454 sprintf (new_help
+ strlen (new_help
), "%s%s",
1456 option
->alias_arg
? option
->alias_arg
: "");
1458 else if (option
->alias_target
== OPT_SPECIAL_ignore
)
1459 strcat (new_help
, ("[ignored]"));
1462 /* Print the state for an on/off option. */
1463 int ena
= option_enabled (i
, lang_mask
, opts
);
1465 strcat (new_help
, _("[enabled]"));
1467 strcat (new_help
, _("[disabled]"));
1474 if (option
->range_max
!= -1)
1477 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1479 opt
= concat (opt
, b
, NULL
);
1483 wrap_help (help
, opt
, len
, columns
);
1486 if (option
->var_type
== CLVC_ENUM
1487 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1488 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1491 vec
<const char *> option_values
1492 = targetm_common
.get_valid_option_values (i
, NULL
);
1493 if (!option_values
.is_empty ())
1494 help_tuples
.safe_push (option_help_tuple (i
, option_values
));
1500 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1503 printf (_(" No options with the desired characteristics were found\n"));
1508 /* PR 31349: Tell the user how to see all of the
1509 options supported by a specific front end. */
1510 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1511 if ((1U << i
) & langs
)
1512 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1513 lang_names
[i
], lang_names
[i
]);
1517 else if (! displayed
)
1518 printf (_(" All options with the desired characteristics have already been displayed\n"));
1522 /* Print details of enumerated option arguments, if those
1523 enumerations have help text headings provided. If no help text
1524 is provided, presume that the possible values are listed in the
1525 help text for the relevant options. */
1526 for (i
= 0; i
< cl_enums_count
; i
++)
1528 unsigned int j
, pos
;
1530 if (opts
->x_help_enum_printed
[i
] != 1)
1532 if (cl_enums
[i
].help
== NULL
)
1534 printf (" %s\n ", _(cl_enums
[i
].help
));
1536 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1538 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1540 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1542 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1552 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1557 opts
->x_help_enum_printed
[i
] = 2;
1560 for (unsigned i
= 0; i
< help_tuples
.length (); i
++)
1562 const struct cl_option
*option
= cl_options
+ help_tuples
[i
].m_code
;
1563 printf (_(" Known valid arguments for %s option:\n "),
1565 for (unsigned j
= 0; j
< help_tuples
[i
].m_values
.length (); j
++)
1566 printf (" %s", help_tuples
[i
].m_values
[j
]);
1571 /* Display help for a specified type of option.
1572 The options must have ALL of the INCLUDE_FLAGS set
1573 ANY of the flags in the ANY_FLAGS set
1574 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1575 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1577 print_specific_help (unsigned int include_flags
,
1578 unsigned int exclude_flags
,
1579 unsigned int any_flags
,
1580 struct gcc_options
*opts
,
1581 unsigned int lang_mask
)
1583 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1584 const char * description
= NULL
;
1585 const char * descrip_extra
= "";
1589 /* Sanity check: Make sure that we do not have more
1590 languages than we have bits available to enumerate them. */
1591 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1593 /* If we have not done so already, obtain
1594 the desired maximum width of the output. */
1595 if (opts
->x_help_columns
== 0)
1597 opts
->x_help_columns
= get_terminal_width ();
1598 if (opts
->x_help_columns
== INT_MAX
)
1599 /* Use a reasonable default. */
1600 opts
->x_help_columns
= 80;
1603 /* Decide upon the title for the options that we are going to display. */
1604 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1606 switch (flag
& include_flags
)
1613 description
= _("The following options are target specific");
1616 description
= _("The following options control compiler warning messages");
1618 case CL_OPTIMIZATION
:
1619 description
= _("The following options control optimizations");
1622 description
= _("The following options are language-independent");
1625 description
= _("The following options control parameters");
1628 if (i
>= cl_lang_count
)
1630 if (exclude_flags
& all_langs_mask
)
1631 description
= _("The following options are specific to just the language ");
1633 description
= _("The following options are supported by the language ");
1634 descrip_extra
= lang_names
[i
];
1639 if (description
== NULL
)
1643 if (include_flags
& CL_UNDOCUMENTED
)
1644 description
= _("The following options are not documented");
1645 else if (include_flags
& CL_SEPARATE
)
1646 description
= _("The following options take separate arguments");
1647 else if (include_flags
& CL_JOINED
)
1648 description
= _("The following options take joined arguments");
1651 internal_error ("unrecognized %<include_flags 0x%x%> passed "
1652 "to %<print_specific_help%>",
1659 if (any_flags
& all_langs_mask
)
1660 description
= _("The following options are language-related");
1662 description
= _("The following options are language-independent");
1666 printf ("%s%s:\n", description
, descrip_extra
);
1667 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
1668 opts
->x_help_columns
, opts
, lang_mask
);
1671 /* Enable FDO-related flags. */
1674 enable_fdo_optimizations (struct gcc_options
*opts
,
1675 struct gcc_options
*opts_set
,
1678 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_branch_probabilities
, value
);
1679 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
1680 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_loops
, value
);
1681 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_peel_loops
, value
);
1682 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tracer
, value
);
1683 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_value_profile_transformations
,
1685 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
1686 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp
, value
);
1689 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp_clone
, 1);
1690 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, 1);
1692 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_predictive_commoning
, value
);
1693 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_split_loops
, value
);
1694 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unswitch_loops
, value
);
1695 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_gcse_after_reload
, value
);
1696 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_vectorize
, value
);
1697 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_slp_vectorize
, value
);
1698 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_version_loops_for_strides
, value
);
1699 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
1700 VECT_COST_MODEL_DYNAMIC
);
1701 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribute_patterns
,
1703 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_loop_interchange
, value
);
1704 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_jam
, value
);
1705 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribution
, value
);
1708 /* -f{,no-}sanitize{,-recover}= suboptions. */
1709 const struct sanitizer_opts_s sanitizer_opts
[] =
1711 #define SANITIZER_OPT(name, flags, recover) \
1712 { #name, flags, sizeof #name - 1, recover }
1713 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true),
1714 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
1716 SANITIZER_OPT (pointer
-compare
, SANITIZE_POINTER_COMPARE
, true),
1717 SANITIZER_OPT (pointer
-subtract
, SANITIZE_POINTER_SUBTRACT
, true),
1718 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false),
1719 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false),
1720 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true),
1721 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true),
1722 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true),
1723 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true),
1724 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true),
1725 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false),
1726 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true),
1727 SANITIZER_OPT (return, SANITIZE_RETURN
, false),
1728 SANITIZER_OPT (null
, SANITIZE_NULL
, true),
1729 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true),
1730 SANITIZER_OPT (bool, SANITIZE_BOOL
, true),
1731 SANITIZER_OPT (enum, SANITIZE_ENUM
, true),
1732 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true),
1733 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true),
1734 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true),
1735 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true),
1736 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true),
1737 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true),
1738 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
1740 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true),
1741 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true),
1742 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true),
1743 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true),
1744 SANITIZER_OPT (all
, ~0U, true),
1745 #undef SANITIZER_OPT
1746 { NULL
, 0U, 0UL, false }
1749 /* -f{,no-}sanitize-coverage= suboptions. */
1750 const struct sanitizer_opts_s coverage_sanitizer_opts
[] =
1752 #define COVERAGE_SANITIZER_OPT(name, flags) \
1753 { #name, flags, sizeof #name - 1, true }
1754 COVERAGE_SANITIZER_OPT (trace
-pc
, SANITIZE_COV_TRACE_PC
),
1755 COVERAGE_SANITIZER_OPT (trace
-cmp
, SANITIZE_COV_TRACE_CMP
),
1756 #undef COVERAGE_SANITIZER_OPT
1757 { NULL
, 0U, 0UL, false }
1760 /* A struct for describing a run of chars within a string. */
1762 class string_fragment
1765 string_fragment (const char *start
, size_t len
)
1766 : m_start (start
), m_len (len
) {}
1768 const char *m_start
;
1772 /* Specialization of edit_distance_traits for string_fragment,
1773 for use by get_closest_sanitizer_option. */
1776 struct edit_distance_traits
<const string_fragment
&>
1778 static size_t get_length (const string_fragment
&fragment
)
1780 return fragment
.m_len
;
1783 static const char *get_string (const string_fragment
&fragment
)
1785 return fragment
.m_start
;
1789 /* Given ARG, an unrecognized sanitizer option, return the best
1790 matching sanitizer option, or NULL if there isn't one.
1791 OPTS is array of candidate sanitizer options.
1792 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or
1793 OPT_fsanitize_coverage_.
1794 VALUE is non-zero for the regular form of the option, zero
1795 for the "no-" form (e.g. "-fno-sanitize-recover="). */
1798 get_closest_sanitizer_option (const string_fragment
&arg
,
1799 const struct sanitizer_opts_s
*opts
,
1800 enum opt_code code
, int value
)
1802 best_match
<const string_fragment
&, const char*> bm (arg
);
1803 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
1805 /* -fsanitize=all is not valid, so don't offer it. */
1806 if (code
== OPT_fsanitize_
1807 && opts
[i
].flag
== ~0U
1811 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
1812 don't offer the non-recoverable options. */
1813 if (code
== OPT_fsanitize_recover_
1814 && !opts
[i
].can_recover
1818 bm
.consider (opts
[i
].name
);
1820 return bm
.get_best_meaningful_candidate ();
1823 /* Parse comma separated sanitizer suboptions from P for option SCODE,
1824 adjust previous FLAGS and return new ones. If COMPLAIN is false,
1825 don't issue diagnostics. */
1828 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
1829 unsigned int flags
, int value
, bool complain
)
1831 enum opt_code code
= (enum opt_code
) scode
;
1833 const struct sanitizer_opts_s
*opts
;
1834 if (code
== OPT_fsanitize_coverage_
)
1835 opts
= coverage_sanitizer_opts
;
1837 opts
= sanitizer_opts
;
1843 const char *comma
= strchr (p
, ',');
1855 /* Check to see if the string matches an option class name. */
1856 for (i
= 0; opts
[i
].name
!= NULL
; ++i
)
1857 if (len
== opts
[i
].len
&& memcmp (p
, opts
[i
].name
, len
) == 0)
1859 /* Handle both -fsanitize and -fno-sanitize cases. */
1860 if (value
&& opts
[i
].flag
== ~0U)
1862 if (code
== OPT_fsanitize_
)
1865 error_at (loc
, "%<-fsanitize=all%> option is not valid");
1868 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
1869 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
1873 /* Do not enable -fsanitize-recover=unreachable and
1874 -fsanitize-recover=return if -fsanitize-recover=undefined
1876 if (code
== OPT_fsanitize_recover_
1877 && opts
[i
].flag
== SANITIZE_UNDEFINED
)
1878 flags
|= (SANITIZE_UNDEFINED
1879 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
1881 flags
|= opts
[i
].flag
;
1884 flags
&= ~opts
[i
].flag
;
1889 if (! found
&& complain
)
1892 = get_closest_sanitizer_option (string_fragment (p
, len
),
1896 if (code
== OPT_fsanitize_recover_
)
1897 suffix
= "-recover";
1898 else if (code
== OPT_fsanitize_coverage_
)
1899 suffix
= "-coverage";
1905 "unrecognized argument to %<-f%ssanitize%s=%> "
1906 "option: %q.*s; did you mean %qs?",
1908 suffix
, (int) len
, p
, hint
);
1911 "unrecognized argument to %<-f%ssanitize%s=%> option: "
1912 "%q.*s", value
? "" : "no-",
1913 suffix
, (int) len
, p
);
1923 /* Parse string values of no_sanitize attribute passed in VALUE.
1924 Values are separated with comma. */
1927 parse_no_sanitize_attribute (char *value
)
1929 unsigned int flags
= 0;
1931 char *q
= strtok (value
, ",");
1935 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1936 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
1938 flags
|= sanitizer_opts
[i
].flag
;
1939 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
1940 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
1944 if (sanitizer_opts
[i
].name
== NULL
)
1945 warning (OPT_Wattributes
,
1946 "%qs attribute directive ignored", q
);
1948 q
= strtok (NULL
, ",");
1954 /* Parse -falign-NAME format for a FLAG value. Return individual
1955 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
1956 set, print error message at LOC location. */
1959 parse_and_check_align_values (const char *flag
,
1961 auto_vec
<unsigned> &result_values
,
1965 char *str
= xstrdup (flag
);
1966 for (char *p
= strtok (str
, ":"); p
; p
= strtok (NULL
, ":"))
1969 int v
= strtol (p
, &end
, 10);
1970 if (*end
!= '\0' || v
< 0)
1973 error_at (loc
, "invalid arguments for %<-falign-%s%> option: %qs",
1979 result_values
.safe_push ((unsigned)v
);
1984 /* Check that we have a correct number of values. */
1985 if (result_values
.is_empty () || result_values
.length () > 4)
1988 error_at (loc
, "invalid number of arguments for %<-falign-%s%> "
1989 "option: %qs", name
, flag
);
1993 for (unsigned i
= 0; i
< result_values
.length (); i
++)
1994 if (result_values
[i
] > MAX_CODE_ALIGN_VALUE
)
1997 error_at (loc
, "%<-falign-%s%> is not between 0 and %d",
1998 name
, MAX_CODE_ALIGN_VALUE
);
2005 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2009 check_alignment_argument (location_t loc
, const char *flag
, const char *name
)
2011 auto_vec
<unsigned> align_result
;
2012 parse_and_check_align_values (flag
, name
, align_result
, true, loc
);
2015 /* Print help when OPT__help_ is set. */
2018 print_help (struct gcc_options
*opts
, unsigned int lang_mask
,
2019 const char *help_option_argument
)
2021 const char *a
= help_option_argument
;
2022 unsigned int include_flags
= 0;
2023 /* Note - by default we include undocumented options when listing
2024 specific classes. If you only want to see documented options
2025 then add ",^undocumented" to the --help= option. E.g.:
2027 --help=target,^undocumented */
2028 unsigned int exclude_flags
= 0;
2030 if (lang_mask
== CL_DRIVER
)
2033 /* Walk along the argument string, parsing each word in turn.
2035 arg = [^]{word}[,{arg}]
2036 word = {optimizers|target|warnings|undocumented|
2037 params|common|<language>} */
2047 { "optimizers", CL_OPTIMIZATION
},
2048 { "target", CL_TARGET
},
2049 { "warnings", CL_WARNING
},
2050 { "undocumented", CL_UNDOCUMENTED
},
2051 { "params", CL_PARAMS
},
2052 { "joined", CL_JOINED
},
2053 { "separate", CL_SEPARATE
},
2054 { "common", CL_COMMON
},
2057 unsigned int *pflags
;
2059 unsigned int lang_flag
, specific_flag
;
2068 error ("missing argument to %qs", "--help=^");
2071 pflags
= &exclude_flags
;
2074 pflags
= &include_flags
;
2076 comma
= strchr (a
, ',');
2087 /* Check to see if the string matches an option class name. */
2088 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
2089 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
2091 specific_flag
= specifics
[i
].flag
;
2095 /* Check to see if the string matches a language name.
2096 Note - we rely upon the alpha-sorted nature of the entries in
2097 the lang_names array, specifically that shorter names appear
2098 before their longer variants. (i.e. C before C++). That way
2099 when we are attempting to match --help=c for example we will
2100 match with C first and not C++. */
2101 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
2102 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
2104 lang_flag
= 1U << i
;
2108 if (specific_flag
!= 0)
2111 *pflags
|= specific_flag
;
2114 /* The option's argument matches both the start of a
2115 language name and the start of an option class name.
2116 We have a special case for when the user has
2117 specified "--help=c", but otherwise we have to issue
2119 if (strncasecmp (a
, "c", len
) == 0)
2120 *pflags
|= lang_flag
;
2123 "%<--help%> argument %q.*s is ambiguous, "
2124 "please be more specific",
2128 else if (lang_flag
!= 0)
2129 *pflags
|= lang_flag
;
2132 "unrecognized argument to %<--help=%> option: %q.*s",
2140 /* We started using PerFunction/Optimization for parameters and
2141 a warning. We should exclude these from optimization options. */
2142 if (include_flags
& CL_OPTIMIZATION
)
2143 exclude_flags
|= CL_WARNING
;
2144 if (!(include_flags
& CL_PARAMS
))
2145 exclude_flags
|= CL_PARAMS
;
2148 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
2152 /* Handle target- and language-independent options. Return zero to
2153 generate an "unknown option" message. Only options that need
2154 extra handling need to be listed here; if you simply want
2155 DECODED->value assigned to a variable, it happens automatically. */
2158 common_handle_option (struct gcc_options
*opts
,
2159 struct gcc_options
*opts_set
,
2160 const struct cl_decoded_option
*decoded
,
2161 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
2163 const struct cl_option_handlers
*handlers
,
2164 diagnostic_context
*dc
,
2165 void (*target_option_override_hook
) (void))
2167 size_t scode
= decoded
->opt_index
;
2168 const char *arg
= decoded
->arg
;
2169 HOST_WIDE_INT value
= decoded
->value
;
2170 enum opt_code code
= (enum opt_code
) scode
;
2172 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
2178 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
2179 unsigned int undoc_mask
;
2182 if (lang_mask
== CL_DRIVER
)
2185 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
2188 target_option_override_hook ();
2189 /* First display any single language specific options. */
2190 for (i
= 0; i
< cl_lang_count
; i
++)
2192 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
2194 /* Next display any multi language specific options. */
2195 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
2196 /* Then display any remaining, non-language options. */
2197 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
2199 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
2200 opts
->x_exit_after_options
= true;
2204 case OPT__target_help
:
2205 if (lang_mask
== CL_DRIVER
)
2208 target_option_override_hook ();
2209 print_specific_help (CL_TARGET
, CL_UNDOCUMENTED
, 0, opts
, lang_mask
);
2210 opts
->x_exit_after_options
= true;
2215 help_option_arguments
.safe_push (arg
);
2216 opts
->x_exit_after_options
= true;
2221 if (lang_mask
== CL_DRIVER
)
2224 opts
->x_exit_after_options
= true;
2227 case OPT__completion_
:
2230 case OPT_fsanitize_
:
2231 opts
->x_flag_sanitize
2232 = parse_sanitizer_options (arg
, loc
, code
,
2233 opts
->x_flag_sanitize
, value
, true);
2235 /* Kernel ASan implies normal ASan but does not yet support
2237 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
2239 SET_OPTION_IF_UNSET (opts
, opts_set
,
2240 param_asan_instrumentation_with_call_threshold
,
2242 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_globals
, 0);
2243 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_stack
, 0);
2244 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_protect_allocas
, 0);
2245 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_use_after_return
, 0);
2249 case OPT_fsanitize_recover_
:
2250 opts
->x_flag_sanitize_recover
2251 = parse_sanitizer_options (arg
, loc
, code
,
2252 opts
->x_flag_sanitize_recover
, value
, true);
2255 case OPT_fasan_shadow_offset_
:
2259 case OPT_fsanitize_address_use_after_scope
:
2260 opts
->x_flag_sanitize_address_use_after_scope
= value
;
2263 case OPT_fsanitize_recover
:
2265 opts
->x_flag_sanitize_recover
2266 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
2267 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
2269 opts
->x_flag_sanitize_recover
2270 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2273 case OPT_fsanitize_coverage_
:
2274 opts
->x_flag_sanitize_coverage
2275 = parse_sanitizer_options (arg
, loc
, code
,
2276 opts
->x_flag_sanitize_coverage
, value
, true);
2283 /* Currently handled in a prescan. */
2287 dc
->warning_as_error_requested
= value
;
2291 if (lang_mask
== CL_DRIVER
)
2294 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2295 opts
, opts_set
, loc
, dc
);
2298 case OPT_Wfatal_errors
:
2299 dc
->fatal_errors
= value
;
2302 case OPT_Wstack_usage_
:
2303 opts
->x_flag_stack_usage_info
= value
!= -1;
2306 case OPT_Wstrict_aliasing
:
2307 set_Wstrict_aliasing (opts
, value
);
2310 case OPT_Wstrict_overflow
:
2311 opts
->x_warn_strict_overflow
= (value
2312 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2316 case OPT_Wsystem_headers
:
2317 dc
->dc_warn_system_headers
= value
;
2321 opts
->x_flag_gen_aux_info
= 1;
2324 case OPT_auxbase_strip
:
2326 char *tmp
= xstrdup (arg
);
2327 strip_off_ending (tmp
, strlen (tmp
));
2329 opts
->x_aux_base_name
= tmp
;
2336 decode_d_option (arg
, opts
, loc
, dc
);
2339 case OPT_fcall_used_
:
2340 case OPT_fcall_saved_
:
2348 case OPT_fdbg_cnt_list
:
2350 opts
->x_exit_after_options
= true;
2353 case OPT_fdebug_prefix_map_
:
2354 case OPT_ffile_prefix_map_
:
2358 case OPT_fcallgraph_info
:
2359 opts
->x_flag_callgraph_info
= CALLGRAPH_INFO_NAKED
;
2362 case OPT_fcallgraph_info_
:
2365 my_arg
= xstrdup (arg
);
2366 p
= strtok (my_arg
, ",");
2369 if (strcmp (p
, "su") == 0)
2371 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_STACK_USAGE
;
2372 opts
->x_flag_stack_usage_info
= true;
2374 else if (strcmp (p
, "da") == 0)
2375 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_DYNAMIC_ALLOC
;
2378 p
= strtok (NULL
, ",");
2384 case OPT_fdiagnostics_show_location_
:
2385 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2388 case OPT_fdiagnostics_show_caret
:
2389 dc
->show_caret
= value
;
2392 case OPT_fdiagnostics_show_labels
:
2393 dc
->show_labels_p
= value
;
2396 case OPT_fdiagnostics_show_line_numbers
:
2397 dc
->show_line_numbers_p
= value
;
2400 case OPT_fdiagnostics_color_
:
2401 diagnostic_color_init (dc
, value
);
2404 case OPT_fdiagnostics_urls_
:
2405 diagnostic_urls_init (dc
, value
);
2408 case OPT_fdiagnostics_format_
:
2409 diagnostic_output_format_init (dc
,
2410 (enum diagnostics_output_format
)value
);
2413 case OPT_fdiagnostics_parseable_fixits
:
2414 dc
->parseable_fixits_p
= value
;
2417 case OPT_fdiagnostics_show_cwe
:
2418 dc
->show_cwe
= value
;
2421 case OPT_fdiagnostics_path_format_
:
2422 dc
->path_format
= (enum diagnostic_path_format
)value
;
2425 case OPT_fdiagnostics_show_path_depths
:
2426 dc
->show_path_depths
= value
;
2429 case OPT_fdiagnostics_show_option
:
2430 dc
->show_option_requested
= value
;
2433 case OPT_fdiagnostics_minimum_margin_width_
:
2434 dc
->min_margin_width
= value
;
2441 case OPT_ffast_math
:
2442 set_fast_math_flags (opts
, value
);
2445 case OPT_funsafe_math_optimizations
:
2446 set_unsafe_math_optimizations_flags (opts
, value
);
2453 case OPT_finline_limit_
:
2454 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_single
,
2456 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_auto
,
2460 case OPT_finstrument_functions_exclude_function_list_
:
2461 add_comma_separated_to_vector
2462 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
2465 case OPT_finstrument_functions_exclude_file_list_
:
2466 add_comma_separated_to_vector
2467 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
2470 case OPT_fmessage_length_
:
2471 pp_set_line_maximum_length (dc
->printer
, value
);
2472 diagnostic_set_caret_max_width (dc
, value
);
2476 case OPT_fopt_info_
:
2482 const char *p
= arg
;
2483 opts
->x_flag_disable_hsa
= true;
2486 const char *comma
= strchr (p
, ',');
2488 if ((strncmp (p
, "disable", 7) == 0)
2489 && (p
[7] == ',' || p
[7] == '\0'))
2491 opts
->x_flag_disable_hsa
= true;
2495 if ((strncmp (p
, "hsa", 3) == 0)
2496 && (p
[3] == ',' || p
[3] == '\0'))
2499 opts
->x_flag_disable_hsa
= false;
2501 sorry ("HSA has not been enabled during configuration");
2511 #ifndef ACCEL_COMPILER
2512 case OPT_foffload_abi_
:
2513 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
2514 "offload compiler");
2518 case OPT_fpack_struct_
:
2519 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
2521 "structure alignment must be a small power of two, not %wu",
2524 opts
->x_initial_max_fld_align
= value
;
2528 case OPT_fplugin_arg_
:
2532 case OPT_fprofile_use_
:
2533 opts
->x_profile_data_prefix
= xstrdup (arg
);
2534 opts
->x_flag_profile_use
= true;
2536 /* No break here - do -fprofile-use processing. */
2538 case OPT_fprofile_use
:
2539 enable_fdo_optimizations (opts
, opts_set
, value
);
2540 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_reorder_functions
,
2542 /* Indirect call profiling should do all useful transformations
2543 speculative devirtualization does. */
2544 if (opts
->x_flag_value_profile_transformations
)
2545 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_devirtualize_speculatively
,
2549 case OPT_fauto_profile_
:
2550 opts
->x_auto_profile_file
= xstrdup (arg
);
2551 opts
->x_flag_auto_profile
= true;
2553 /* No break here - do -fauto-profile processing. */
2555 case OPT_fauto_profile
:
2556 enable_fdo_optimizations (opts
, opts_set
, value
);
2557 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_correction
, value
);
2558 SET_OPTION_IF_UNSET (opts
, opts_set
,
2559 param_early_inliner_max_iterations
, 10);
2562 case OPT_fprofile_generate_
:
2563 opts
->x_profile_data_prefix
= xstrdup (arg
);
2565 /* No break here - do -fprofile-generate processing. */
2567 case OPT_fprofile_generate
:
2568 SET_OPTION_IF_UNSET (opts
, opts_set
, profile_arc_flag
, value
);
2569 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
2570 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
2571 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, value
);
2574 case OPT_fpatchable_function_entry_
:
2576 char *patch_area_arg
= xstrdup (arg
);
2577 char *comma
= strchr (patch_area_arg
, ',');
2581 function_entry_patch_area_size
=
2582 integral_argument (patch_area_arg
);
2583 function_entry_patch_area_start
=
2584 integral_argument (comma
+ 1);
2588 function_entry_patch_area_size
=
2589 integral_argument (patch_area_arg
);
2590 function_entry_patch_area_start
= 0;
2592 if (function_entry_patch_area_size
< 0
2593 || function_entry_patch_area_start
< 0
2594 || function_entry_patch_area_size
2595 < function_entry_patch_area_start
)
2596 error ("invalid arguments for %<-fpatchable_function_entry%>");
2597 free (patch_area_arg
);
2601 case OPT_ftree_vectorize
:
2602 /* Automatically sets -ftree-loop-vectorize and
2603 -ftree-slp-vectorize. Nothing more to do here. */
2605 case OPT_fshow_column
:
2606 dc
->show_column
= value
;
2609 case OPT_frandom_seed
:
2610 /* The real switch is -fno-random-seed. */
2616 case OPT_frandom_seed_
:
2620 case OPT_fsched_verbose_
:
2621 #ifdef INSN_SCHEDULING
2622 /* Handled with Var in common.opt. */
2628 case OPT_fsched_stalled_insns_
:
2629 opts
->x_flag_sched_stalled_insns
= value
;
2630 if (opts
->x_flag_sched_stalled_insns
== 0)
2631 opts
->x_flag_sched_stalled_insns
= -1;
2634 case OPT_fsched_stalled_insns_dep_
:
2635 opts
->x_flag_sched_stalled_insns_dep
= value
;
2638 case OPT_fstack_check_
:
2639 if (!strcmp (arg
, "no"))
2640 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
2641 else if (!strcmp (arg
, "generic"))
2642 /* This is the old stack checking method. */
2643 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2644 ? FULL_BUILTIN_STACK_CHECK
2645 : GENERIC_STACK_CHECK
;
2646 else if (!strcmp (arg
, "specific"))
2647 /* This is the new stack checking method. */
2648 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2649 ? FULL_BUILTIN_STACK_CHECK
2650 : STACK_CHECK_STATIC_BUILTIN
2651 ? STATIC_BUILTIN_STACK_CHECK
2652 : GENERIC_STACK_CHECK
;
2654 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
2657 case OPT_fstack_limit
:
2658 /* The real switch is -fno-stack-limit. */
2664 case OPT_fstack_limit_register_
:
2665 case OPT_fstack_limit_symbol_
:
2669 case OPT_fstack_usage
:
2670 opts
->x_flag_stack_usage
= value
;
2671 opts
->x_flag_stack_usage_info
= value
!= 0;
2675 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
2680 if (arg
&& strlen (arg
) != 0)
2682 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
2683 "use %<-gdwarf-%s%> for DWARF version "
2684 "or %<-gdwarf%> %<-g%s%> for debug level", arg
, arg
, arg
);
2688 value
= opts
->x_dwarf_version
;
2692 if (value
< 2 || value
> 5)
2693 error_at (loc
, "dwarf version %wu is not supported", value
);
2695 opts
->x_dwarf_version
= value
;
2696 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
2699 case OPT_gsplit_dwarf
:
2700 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, "", opts
, opts_set
,
2705 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
2710 set_debug_level (DBX_DEBUG
, code
== OPT_gstabs_
, arg
, opts
, opts_set
,
2715 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
2720 set_debug_level (XCOFF_DEBUG
, code
== OPT_gxcoff_
, arg
, opts
, opts_set
,
2726 /* Handled completely via specs. */
2729 case OPT_pedantic_errors
:
2730 dc
->pedantic_errors
= 1;
2731 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
2733 handlers
, opts
, opts_set
,
2738 opts
->x_flag_lto
= value
? "" : NULL
;
2742 if (strcmp (arg
, "none") != 0
2743 && strcmp (arg
, "jobserver") != 0
2744 && strcmp (arg
, "auto") != 0
2747 "unrecognized argument to %<-flto=%> option: %qs", arg
);
2751 dc
->dc_inhibit_warnings
= true;
2754 case OPT_fmax_errors_
:
2755 dc
->max_errors
= value
;
2758 case OPT_fuse_ld_bfd
:
2759 case OPT_fuse_ld_gold
:
2760 case OPT_fuse_ld_lld
:
2761 case OPT_fuse_linker_plugin
:
2762 /* No-op. Used by the driver and passed to us because it starts with f.*/
2767 opts
->x_flag_trapv
= 0;
2772 opts
->x_flag_wrapv
= 0;
2775 case OPT_fstrict_overflow
:
2776 opts
->x_flag_wrapv
= !value
;
2777 opts
->x_flag_wrapv_pointer
= !value
;
2779 opts
->x_flag_trapv
= 0;
2783 opts
->x_flag_ipa_icf_functions
= value
;
2784 opts
->x_flag_ipa_icf_variables
= value
;
2787 case OPT_falign_loops_
:
2788 check_alignment_argument (loc
, arg
, "loops");
2791 case OPT_falign_jumps_
:
2792 check_alignment_argument (loc
, arg
, "jumps");
2795 case OPT_falign_labels_
:
2796 check_alignment_argument (loc
, arg
, "labels");
2799 case OPT_falign_functions_
:
2800 check_alignment_argument (loc
, arg
, "functions");
2804 /* If the flag was handled in a standard way, assume the lack of
2805 processing here is intentional. */
2806 gcc_assert (option_flag_var (scode
, opts
));
2810 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
2815 /* Used to set the level of strict aliasing warnings in OPTS,
2816 when no level is specified (i.e., when -Wstrict-aliasing, and not
2817 -Wstrict-aliasing=level was given).
2818 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
2819 and 0 otherwise. After calling this function, wstrict_aliasing will be
2820 set to the default value of -Wstrict_aliasing=level, currently 3. */
2822 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
2824 gcc_assert (onoff
== 0 || onoff
== 1);
2826 opts
->x_warn_strict_aliasing
= 3;
2828 opts
->x_warn_strict_aliasing
= 0;
2831 /* The following routines are useful in setting all the flags that
2832 -ffast-math and -fno-fast-math imply. */
2834 set_fast_math_flags (struct gcc_options
*opts
, int set
)
2836 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
2838 opts
->x_flag_unsafe_math_optimizations
= set
;
2839 set_unsafe_math_optimizations_flags (opts
, set
);
2841 if (!opts
->frontend_set_flag_finite_math_only
)
2842 opts
->x_flag_finite_math_only
= set
;
2843 if (!opts
->frontend_set_flag_errno_math
)
2844 opts
->x_flag_errno_math
= !set
;
2847 if (opts
->frontend_set_flag_excess_precision
== EXCESS_PRECISION_DEFAULT
)
2848 opts
->x_flag_excess_precision
2849 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
2850 if (!opts
->frontend_set_flag_signaling_nans
)
2851 opts
->x_flag_signaling_nans
= 0;
2852 if (!opts
->frontend_set_flag_rounding_math
)
2853 opts
->x_flag_rounding_math
= 0;
2854 if (!opts
->frontend_set_flag_cx_limited_range
)
2855 opts
->x_flag_cx_limited_range
= 1;
2859 /* When -funsafe-math-optimizations is set the following
2860 flags are set as well. */
2862 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
2864 if (!opts
->frontend_set_flag_trapping_math
)
2865 opts
->x_flag_trapping_math
= !set
;
2866 if (!opts
->frontend_set_flag_signed_zeros
)
2867 opts
->x_flag_signed_zeros
= !set
;
2868 if (!opts
->frontend_set_flag_associative_math
)
2869 opts
->x_flag_associative_math
= set
;
2870 if (!opts
->frontend_set_flag_reciprocal_math
)
2871 opts
->x_flag_reciprocal_math
= set
;
2874 /* Return true iff flags in OPTS are set as if -ffast-math. */
2876 fast_math_flags_set_p (const struct gcc_options
*opts
)
2878 return (!opts
->x_flag_trapping_math
2879 && opts
->x_flag_unsafe_math_optimizations
2880 && opts
->x_flag_finite_math_only
2881 && !opts
->x_flag_signed_zeros
2882 && !opts
->x_flag_errno_math
2883 && opts
->x_flag_excess_precision
== EXCESS_PRECISION_FAST
);
2886 /* Return true iff flags are set as if -ffast-math but using the flags stored
2887 in the struct cl_optimization structure. */
2889 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
2891 return (!opt
->x_flag_trapping_math
2892 && opt
->x_flag_unsafe_math_optimizations
2893 && opt
->x_flag_finite_math_only
2894 && !opt
->x_flag_signed_zeros
2895 && !opt
->x_flag_errno_math
);
2898 /* Handle a debug output -g switch for options OPTS
2899 (OPTS_SET->x_write_symbols storing whether a debug type was passed
2900 explicitly), location LOC. EXTENDED is true or false to support
2901 extended output (2 is special and means "-ggdb" was given). */
2903 set_debug_level (enum debug_info_type type
, int extended
, const char *arg
,
2904 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
2907 opts
->x_use_gnu_debug_info_extensions
= extended
;
2909 if (type
== NO_DEBUG
)
2911 if (opts
->x_write_symbols
== NO_DEBUG
)
2913 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
2917 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
2918 opts
->x_write_symbols
= DWARF2_DEBUG
;
2919 #elif defined DBX_DEBUGGING_INFO
2920 opts
->x_write_symbols
= DBX_DEBUG
;
2924 if (opts
->x_write_symbols
== NO_DEBUG
)
2925 warning_at (loc
, 0, "target system does not support debug output");
2930 /* Does it conflict with an already selected type? */
2931 if (opts_set
->x_write_symbols
!= NO_DEBUG
2932 && opts
->x_write_symbols
!= NO_DEBUG
2933 && type
!= opts
->x_write_symbols
)
2934 error_at (loc
, "debug format %qs conflicts with prior selection",
2935 debug_type_names
[type
]);
2936 opts
->x_write_symbols
= type
;
2937 opts_set
->x_write_symbols
= type
;
2940 /* A debug flag without a level defaults to level 2.
2941 If off or at level 1, set it to level 2, but if already
2942 at level 3, don't lower it. */
2945 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
2946 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
2950 int argval
= integral_argument (arg
);
2952 error_at (loc
, "unrecognized debug output level %qs", arg
);
2953 else if (argval
> 3)
2954 error_at (loc
, "debug output level %qs is too high", arg
);
2956 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
2960 /* Arrange to dump core on error for diagnostic context DC. (The
2961 regular error message is still printed first, except in the case of
2965 setup_core_dumping (diagnostic_context
*dc
)
2968 signal (SIGABRT
, SIG_DFL
);
2970 #if defined(HAVE_SETRLIMIT)
2973 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
2974 fatal_error (input_location
, "getting core file size maximum limit: %m");
2975 rlim
.rlim_cur
= rlim
.rlim_max
;
2976 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
2977 fatal_error (input_location
,
2978 "setting core file size limit to maximum: %m");
2981 diagnostic_abort_on_error (dc
);
2984 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
2985 diagnostic context DC. */
2988 decode_d_option (const char *arg
, struct gcc_options
*opts
,
2989 location_t loc
, diagnostic_context
*dc
)
2997 opts
->x_flag_debug_asm
= 1;
3000 opts
->x_flag_print_asm_name
= 1;
3003 opts
->x_flag_dump_rtl_in_asm
= 1;
3004 opts
->x_flag_print_asm_name
= 1;
3007 opts
->x_rtl_dump_and_exit
= 1;
3009 case 'D': /* These are handled by the preprocessor. */
3016 setup_core_dumping (dc
);
3019 opts
->x_flag_dump_all_passed
= true;
3023 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
3028 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3029 mask LANG_MASK, option handlers HANDLERS) as an error for option
3030 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3031 NULL), location LOC. This is used by -Werror=. */
3034 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
3035 const struct cl_option_handlers
*handlers
,
3036 struct gcc_options
*opts
,
3037 struct gcc_options
*opts_set
,
3038 location_t loc
, diagnostic_context
*dc
)
3043 new_option
= XNEWVEC (char, strlen (arg
) + 2);
3044 new_option
[0] = 'W';
3045 strcpy (new_option
+ 1, arg
);
3046 option_index
= find_opt (new_option
, lang_mask
);
3047 if (option_index
== OPT_SPECIAL_unknown
)
3050 const char *hint
= op
.suggest_option (new_option
);
3052 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>;"
3053 " did you mean %<-%s%>?", value
? "" : "no-",
3054 arg
, new_option
, hint
);
3056 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>",
3057 value
? "" : "no-", arg
, new_option
);
3059 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
3060 error_at (loc
, "%<-Werror=%s%>: %<-%s%> is not an option that "
3061 "controls warnings", arg
, new_option
);
3064 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
3065 const char *arg
= NULL
;
3067 if (cl_options
[option_index
].flags
& CL_JOINED
)
3068 arg
= new_option
+ cl_options
[option_index
].opt_len
;
3069 control_warning_option (option_index
, (int) kind
, arg
, value
,
3071 handlers
, opts
, opts_set
, dc
);
3076 /* Return malloced memory for the name of the option OPTION_INDEX
3077 which enabled a diagnostic (context CONTEXT), originally of type
3078 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3082 option_name (diagnostic_context
*context
, int option_index
,
3083 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
3087 /* A warning classified as an error. */
3088 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
3089 && diag_kind
== DK_ERROR
)
3090 return concat (cl_options
[OPT_Werror_
].opt_text
,
3091 /* Skip over "-W". */
3092 cl_options
[option_index
].opt_text
+ 2,
3094 /* A warning with option. */
3096 return xstrdup (cl_options
[option_index
].opt_text
);
3098 /* A warning without option classified as an error. */
3099 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
3100 || diag_kind
== DK_WARNING
)
3101 && context
->warning_as_error_requested
)
3102 return xstrdup (cl_options
[OPT_Werror
].opt_text
);
3107 /* Return malloced memory for a URL describing the option OPTION_INDEX
3108 which enabled a diagnostic (context CONTEXT). */
3111 get_option_url (diagnostic_context
*, int option_index
)
3114 /* DOCUMENTATION_ROOT_URL should be supplied via -D by the Makefile
3115 (see --with-documentation-root-url).
3117 Expect an anchor of the form "index-Wfoo" e.g.
3118 <a name="index-Wformat"></a>, and thus an id within
3119 the URL of "#index-Wformat". */
3120 return concat (DOCUMENTATION_ROOT_URL
,
3121 "Warning-Options.html",
3122 "#index", cl_options
[option_index
].opt_text
,