1 /* Command line option handling.
2 Copyright (C) 2002-2020 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
36 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
38 /* Indexed by enum debug_info_type. */
39 const char *const debug_type_names
[] =
41 "none", "stabs", "dwarf-2", "xcoff", "vms"
44 /* Parse the -femit-struct-debug-detailed option value
45 and set the flag variables. */
47 #define MATCH( prefix, string ) \
48 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
49 ? ((string += sizeof prefix - 1), 1) : 0)
52 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
55 /* various labels for comparison */
56 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
57 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
58 static const char none_lbl
[] = "none", any_lbl
[] = "any";
59 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
61 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
62 /* Default is to apply to as much as possible. */
63 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
67 if (MATCH (dfn_lbl
, spec
))
68 usage
= DINFO_USAGE_DFN
;
69 else if (MATCH (dir_lbl
, spec
))
70 usage
= DINFO_USAGE_DIR_USE
;
71 else if (MATCH (ind_lbl
, spec
))
72 usage
= DINFO_USAGE_IND_USE
;
74 /* Generics or not? */
75 if (MATCH (ord_lbl
, spec
))
77 else if (MATCH (gen_lbl
, spec
))
80 /* What allowable environment? */
81 if (MATCH (none_lbl
, spec
))
82 files
= DINFO_STRUCT_FILE_NONE
;
83 else if (MATCH (any_lbl
, spec
))
84 files
= DINFO_STRUCT_FILE_ANY
;
85 else if (MATCH (sys_lbl
, spec
))
86 files
= DINFO_STRUCT_FILE_SYS
;
87 else if (MATCH (base_lbl
, spec
))
88 files
= DINFO_STRUCT_FILE_BASE
;
91 "argument %qs to %<-femit-struct-debug-detailed%> "
95 /* Effect the specification. */
96 if (usage
== DINFO_USAGE_NUM_ENUMS
)
100 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
101 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
102 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
106 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
107 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
108 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
114 opts
->x_debug_struct_ordinary
[usage
] = files
;
116 opts
->x_debug_struct_generic
[usage
] = files
;
120 set_struct_debug_option (opts
, loc
, spec
+1);
123 /* No more -femit-struct-debug-detailed specifications.
127 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
129 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
130 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
131 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
132 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
134 "%<-femit-struct-debug-detailed=dir:...%> must allow "
135 "at least as much as "
136 "%<-femit-struct-debug-detailed=ind:...%>");
140 /* Strip off a legitimate source ending from the input string NAME of
141 length LEN. Rather than having to know the names used by all of
142 our front ends, we strip off an ending of a period followed by
143 up to fource characters. (C++ uses ".cpp".) */
146 strip_off_ending (char *name
, int len
)
149 for (i
= 2; i
< 5 && len
> i
; i
++)
151 if (name
[len
- i
] == '.')
153 name
[len
- i
] = '\0';
159 /* Find the base name of a path, stripping off both directories and
160 a single final extension. */
162 base_of_path (const char *path
, const char **base_out
)
164 const char *base
= path
;
166 const char *p
= path
;
170 if (IS_DIR_SEPARATOR (c
))
185 /* What to print when a switch has no documentation. */
186 static const char undocumented_msg
[] = N_("This option lacks documentation.");
187 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
189 typedef char *char_p
; /* For DEF_VEC_P. */
191 static void set_debug_level (enum debug_info_type type
, int extended
,
192 const char *arg
, struct gcc_options
*opts
,
193 struct gcc_options
*opts_set
,
195 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
196 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
197 location_t loc
, diagnostic_context
*dc
);
198 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
200 static void enable_warning_as_error (const char *arg
, int value
,
201 unsigned int lang_mask
,
202 const struct cl_option_handlers
*handlers
,
203 struct gcc_options
*opts
,
204 struct gcc_options
*opts_set
,
206 diagnostic_context
*dc
);
208 /* Handle a back-end option; arguments and return value as for
212 target_handle_option (struct gcc_options
*opts
,
213 struct gcc_options
*opts_set
,
214 const struct cl_decoded_option
*decoded
,
215 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
217 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
218 diagnostic_context
*dc
, void (*) (void))
220 gcc_assert (dc
== global_dc
);
221 gcc_assert (kind
== DK_UNSPECIFIED
);
222 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
225 /* Add comma-separated strings to a char_p vector. */
228 add_comma_separated_to_vector (void **pvec
, const char *arg
)
234 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
236 vec_check_alloc (v
, 1);
238 /* We never free this string. */
251 v
->safe_push (token_start
);
254 if (*r
== '\\' && r
[1] == ',')
264 if (*token_start
!= '\0')
265 v
->safe_push (token_start
);
270 /* Initialize opts_obstack. */
273 init_opts_obstack (void)
275 gcc_obstack_init (&opts_obstack
);
278 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
281 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
283 /* Ensure that opts_obstack has already been initialized by the time
284 that we initialize any gcc_options instances (PR jit/68446). */
285 gcc_assert (opts_obstack
.chunk_size
> 0);
287 *opts
= global_options_init
;
290 memset (opts_set
, 0, sizeof (*opts_set
));
292 /* Initialize whether `char' is signed. */
293 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
294 /* Set this to a special "uninitialized" value. The actual default
295 is set after target options have been processed. */
296 opts
->x_flag_short_enums
= 2;
298 /* Initialize target_flags before default_options_optimization
299 so the latter can modify it. */
300 opts
->x_target_flags
= targetm_common
.default_target_flags
;
302 /* Some targets have ABI-specified unwind tables. */
303 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
305 /* Some targets have other target-specific initialization. */
306 targetm_common
.option_init_struct (opts
);
309 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
310 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
311 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
312 mask LANG_MASK and option handlers HANDLERS. */
315 maybe_default_option (struct gcc_options
*opts
,
316 struct gcc_options
*opts_set
,
317 const struct default_options
*default_opt
,
318 int level
, bool size
, bool fast
, bool debug
,
319 unsigned int lang_mask
,
320 const struct cl_option_handlers
*handlers
,
322 diagnostic_context
*dc
)
324 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
328 gcc_assert (level
== 2);
330 gcc_assert (level
== 3);
332 gcc_assert (level
== 1);
334 switch (default_opt
->levels
)
340 case OPT_LEVELS_0_ONLY
:
341 enabled
= (level
== 0);
344 case OPT_LEVELS_1_PLUS
:
345 enabled
= (level
>= 1);
348 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
349 enabled
= (level
>= 1 && !size
&& !debug
);
352 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
353 enabled
= (level
>= 1 && !debug
);
356 case OPT_LEVELS_2_PLUS
:
357 enabled
= (level
>= 2);
360 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
361 enabled
= (level
>= 2 && !size
&& !debug
);
364 case OPT_LEVELS_3_PLUS
:
365 enabled
= (level
>= 3);
368 case OPT_LEVELS_3_PLUS_AND_SIZE
:
369 enabled
= (level
>= 3 || size
);
372 case OPT_LEVELS_SIZE
:
376 case OPT_LEVELS_FAST
:
380 case OPT_LEVELS_NONE
:
386 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
387 default_opt
->arg
, default_opt
->value
,
388 lang_mask
, DK_UNSPECIFIED
, loc
,
390 else if (default_opt
->arg
== NULL
391 && !option
->cl_reject_negative
392 && !(option
->flags
& CL_PARAMS
))
393 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
394 default_opt
->arg
, !default_opt
->value
,
395 lang_mask
, DK_UNSPECIFIED
, loc
,
399 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
400 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
401 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
402 language mask LANG_MASK and option handlers HANDLERS. */
405 maybe_default_options (struct gcc_options
*opts
,
406 struct gcc_options
*opts_set
,
407 const struct default_options
*default_opts
,
408 int level
, bool size
, bool fast
, bool debug
,
409 unsigned int lang_mask
,
410 const struct cl_option_handlers
*handlers
,
412 diagnostic_context
*dc
)
416 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
417 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
418 level
, size
, fast
, debug
,
419 lang_mask
, handlers
, loc
, dc
);
422 /* Table of options enabled by default at different levels.
423 Please keep this list sorted by level and alphabetized within
424 each level; this makes it easier to keep the documentation
427 static const struct default_options default_options_table
[] =
429 /* -O1 and -Og optimizations. */
430 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
431 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
432 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
433 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
434 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
435 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
436 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
437 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
438 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
439 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference_addressable
, NULL
, 1 },
440 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
441 { OPT_LEVELS_1_PLUS
, OPT_fomit_frame_pointer
, NULL
, 1 },
442 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
443 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
444 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
445 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
446 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
447 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
448 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
449 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
450 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
451 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
452 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
453 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
454 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
455 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
457 /* -O1 (and not -Og) optimizations. */
458 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
460 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdelayed_branch
, NULL
, 1 },
462 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdse
, NULL
, 1 },
463 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
464 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
465 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
466 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
467 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
468 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
469 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_dse
, NULL
, 1 },
470 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
471 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
473 /* -O2 and -Os optimizations. */
474 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
475 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
476 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
477 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
478 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
479 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
480 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
481 { OPT_LEVELS_2_PLUS
, OPT_ffinite_loops
, NULL
, 1 },
482 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
483 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
484 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
485 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
486 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
487 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
488 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
489 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
490 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
491 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
492 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
493 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
494 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
495 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
496 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
497 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
498 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
499 #ifdef INSN_SCHEDULING
500 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
502 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
503 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
504 { OPT_LEVELS_2_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
505 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
506 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
507 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
508 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
509 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_CHEAP
},
510 { OPT_LEVELS_2_PLUS
, OPT_finline_functions
, NULL
, 1 },
511 { OPT_LEVELS_2_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
513 /* -O2 and above optimizations, but not -Os or -Og. */
514 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_functions
, NULL
, 1 },
515 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_jumps
, NULL
, 1 },
516 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_labels
, NULL
, 1 },
517 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_loops
, NULL
, 1 },
518 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
519 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
520 REORDER_BLOCKS_ALGORITHM_STC
},
521 #ifdef INSN_SCHEDULING
522 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
523 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
526 /* -O3 and -Os optimizations. */
528 /* -O3 optimizations. */
529 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
530 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
531 { OPT_LEVELS_3_PLUS
, OPT_floop_interchange
, NULL
, 1 },
532 { OPT_LEVELS_3_PLUS
, OPT_floop_unroll_and_jam
, NULL
, 1 },
533 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
534 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
535 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
536 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
537 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
538 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_vectorize
, NULL
, 1 },
539 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
540 { OPT_LEVELS_3_PLUS
, OPT_ftree_slp_vectorize
, NULL
, 1 },
541 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
542 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
543 { OPT_LEVELS_3_PLUS
, OPT_fversion_loops_for_strides
, NULL
, 1 },
545 /* -O3 parameters. */
546 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_auto_
, NULL
, 30 },
547 { OPT_LEVELS_3_PLUS
, OPT__param_early_inlining_insns_
, NULL
, 14 },
548 { OPT_LEVELS_3_PLUS
, OPT__param_inline_heuristics_hint_percent_
, NULL
, 600 },
549 { OPT_LEVELS_3_PLUS
, OPT__param_inline_min_speedup_
, NULL
, 15 },
550 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_single_
, NULL
, 200 },
552 /* -Ofast adds optimizations to -O3. */
553 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
554 { OPT_LEVELS_FAST
, OPT_fallow_store_data_races
, NULL
, 1 },
556 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
559 /* Default the options in OPTS and OPTS_SET based on the optimization
560 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
562 default_options_optimization (struct gcc_options
*opts
,
563 struct gcc_options
*opts_set
,
564 struct cl_decoded_option
*decoded_options
,
565 unsigned int decoded_options_count
,
567 unsigned int lang_mask
,
568 const struct cl_option_handlers
*handlers
,
569 diagnostic_context
*dc
)
573 bool openacc_mode
= false;
575 /* Scan to see what optimization level has been specified. That will
576 determine the default value of many flags. */
577 for (i
= 1; i
< decoded_options_count
; i
++)
579 struct cl_decoded_option
*opt
= &decoded_options
[i
];
580 switch (opt
->opt_index
)
583 if (*opt
->arg
== '\0')
585 opts
->x_optimize
= 1;
586 opts
->x_optimize_size
= 0;
587 opts
->x_optimize_fast
= 0;
588 opts
->x_optimize_debug
= 0;
592 const int optimize_val
= integral_argument (opt
->arg
);
593 if (optimize_val
== -1)
594 error_at (loc
, "argument to %<-O%> should be a non-negative "
595 "integer, %<g%>, %<s%> or %<fast%>");
598 opts
->x_optimize
= optimize_val
;
599 if ((unsigned int) opts
->x_optimize
> 255)
600 opts
->x_optimize
= 255;
601 opts
->x_optimize_size
= 0;
602 opts
->x_optimize_fast
= 0;
603 opts
->x_optimize_debug
= 0;
609 opts
->x_optimize_size
= 1;
611 /* Optimizing for size forces optimize to be 2. */
612 opts
->x_optimize
= 2;
613 opts
->x_optimize_fast
= 0;
614 opts
->x_optimize_debug
= 0;
618 /* -Ofast only adds flags to -O3. */
619 opts
->x_optimize_size
= 0;
620 opts
->x_optimize
= 3;
621 opts
->x_optimize_fast
= 1;
622 opts
->x_optimize_debug
= 0;
626 /* -Og selects optimization level 1. */
627 opts
->x_optimize_size
= 0;
628 opts
->x_optimize
= 1;
629 opts
->x_optimize_fast
= 0;
630 opts
->x_optimize_debug
= 1;
639 /* Ignore other options in this prescan. */
644 maybe_default_options (opts
, opts_set
, default_options_table
,
645 opts
->x_optimize
, opts
->x_optimize_size
,
646 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
647 lang_mask
, handlers
, loc
, dc
);
649 /* -O2 param settings. */
650 opt2
= (opts
->x_optimize
>= 2);
653 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_pta
, true);
655 /* Track fields in field-sensitive alias analysis. */
657 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_fields_for_field_sensitive
,
660 if (opts
->x_optimize_size
)
661 /* We want to crossjump as much as possible. */
662 SET_OPTION_IF_UNSET (opts
, opts_set
, param_min_crossjump_insns
, 1);
664 /* Restrict the amount of work combine does at -Og while retaining
665 most of its useful transforms. */
666 if (opts
->x_optimize_debug
)
667 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_combine_insns
, 2);
669 /* Allow default optimizations to be specified on a per-machine basis. */
670 maybe_default_options (opts
, opts_set
,
671 targetm_common
.option_optimization_table
,
672 opts
->x_optimize
, opts
->x_optimize_size
,
673 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
674 lang_mask
, handlers
, loc
, dc
);
677 /* Control IPA optimizations based on different live patching LEVEL. */
679 control_options_for_live_patching (struct gcc_options
*opts
,
680 struct gcc_options
*opts_set
,
681 enum live_patching_level level
,
684 gcc_assert (level
> LIVE_PATCHING_NONE
);
688 case LIVE_PATCHING_INLINE_ONLY_STATIC
:
689 if (opts_set
->x_flag_ipa_cp_clone
&& opts
->x_flag_ipa_cp_clone
)
691 "%<-fipa-cp-clone%> is incompatible with "
692 "%<-flive-patching=inline-only-static%>");
694 opts
->x_flag_ipa_cp_clone
= 0;
696 if (opts_set
->x_flag_ipa_sra
&& opts
->x_flag_ipa_sra
)
698 "%<-fipa-sra%> is incompatible with "
699 "%<-flive-patching=inline-only-static%>");
701 opts
->x_flag_ipa_sra
= 0;
703 if (opts_set
->x_flag_partial_inlining
&& opts
->x_flag_partial_inlining
)
705 "%<-fpartial-inlining%> is incompatible with "
706 "%<-flive-patching=inline-only-static%>");
708 opts
->x_flag_partial_inlining
= 0;
710 if (opts_set
->x_flag_ipa_cp
&& opts
->x_flag_ipa_cp
)
712 "%<-fipa-cp%> is incompatible with "
713 "%<-flive-patching=inline-only-static%>");
715 opts
->x_flag_ipa_cp
= 0;
718 case LIVE_PATCHING_INLINE_CLONE
:
719 /* live patching should disable whole-program optimization. */
720 if (opts_set
->x_flag_whole_program
&& opts
->x_flag_whole_program
)
722 "%<-fwhole-program%> is incompatible with "
723 "%<-flive-patching=inline-only-static|inline-clone%>");
725 opts
->x_flag_whole_program
= 0;
727 /* visibility change should be excluded by !flag_whole_program
728 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
729 && !flag_partial_inlining. */
731 if (opts_set
->x_flag_ipa_pta
&& opts
->x_flag_ipa_pta
)
733 "%<-fipa-pta%> is incompatible with "
734 "%<-flive-patching=inline-only-static|inline-clone%>");
736 opts
->x_flag_ipa_pta
= 0;
738 if (opts_set
->x_flag_ipa_reference
&& opts
->x_flag_ipa_reference
)
740 "%<-fipa-reference%> is incompatible with "
741 "%<-flive-patching=inline-only-static|inline-clone%>");
743 opts
->x_flag_ipa_reference
= 0;
745 if (opts_set
->x_flag_ipa_ra
&& opts
->x_flag_ipa_ra
)
747 "%<-fipa-ra%> is incompatible with "
748 "%<-flive-patching=inline-only-static|inline-clone%>");
750 opts
->x_flag_ipa_ra
= 0;
752 if (opts_set
->x_flag_ipa_icf
&& opts
->x_flag_ipa_icf
)
754 "%<-fipa-icf%> is incompatible with "
755 "%<-flive-patching=inline-only-static|inline-clone%>");
757 opts
->x_flag_ipa_icf
= 0;
759 if (opts_set
->x_flag_ipa_icf_functions
&& opts
->x_flag_ipa_icf_functions
)
761 "%<-fipa-icf-functions%> is incompatible with "
762 "%<-flive-patching=inline-only-static|inline-clone%>");
764 opts
->x_flag_ipa_icf_functions
= 0;
766 if (opts_set
->x_flag_ipa_icf_variables
&& opts
->x_flag_ipa_icf_variables
)
768 "%<-fipa-icf-variables%> is incompatible with "
769 "%<-flive-patching=inline-only-static|inline-clone%>");
771 opts
->x_flag_ipa_icf_variables
= 0;
773 if (opts_set
->x_flag_ipa_bit_cp
&& opts
->x_flag_ipa_bit_cp
)
775 "%<-fipa-bit-cp%> is incompatible with "
776 "%<-flive-patching=inline-only-static|inline-clone%>");
778 opts
->x_flag_ipa_bit_cp
= 0;
780 if (opts_set
->x_flag_ipa_vrp
&& opts
->x_flag_ipa_vrp
)
782 "%<-fipa-vrp%> is incompatible with "
783 "%<-flive-patching=inline-only-static|inline-clone%>");
785 opts
->x_flag_ipa_vrp
= 0;
787 if (opts_set
->x_flag_ipa_pure_const
&& opts
->x_flag_ipa_pure_const
)
789 "%<-fipa-pure-const%> is incompatible with "
790 "%<-flive-patching=inline-only-static|inline-clone%>");
792 opts
->x_flag_ipa_pure_const
= 0;
794 /* FIXME: disable unreachable code removal. */
796 /* discovery of functions/variables with no address taken. */
797 if (opts_set
->x_flag_ipa_reference_addressable
798 && opts
->x_flag_ipa_reference_addressable
)
800 "%<-fipa-reference-addressable%> is incompatible with "
801 "%<-flive-patching=inline-only-static|inline-clone%>");
803 opts
->x_flag_ipa_reference_addressable
= 0;
805 /* ipa stack alignment propagation. */
806 if (opts_set
->x_flag_ipa_stack_alignment
807 && opts
->x_flag_ipa_stack_alignment
)
809 "%<-fipa-stack-alignment%> is incompatible with "
810 "%<-flive-patching=inline-only-static|inline-clone%>");
812 opts
->x_flag_ipa_stack_alignment
= 0;
819 /* --help option argument if set. */
820 vec
<const char *> help_option_arguments
;
823 /* After all options at LOC have been read into OPTS and OPTS_SET,
824 finalize settings of those options and diagnose incompatible
827 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
830 enum unwind_info_type ui_except
;
832 if (opts
->x_dump_base_name
833 && ! opts
->x_dump_base_name_prefixed
)
835 const char *sep
= opts
->x_dump_base_name
;
838 if (IS_DIR_SEPARATOR (*sep
))
842 /* If dump_base_path contains subdirectories, don't prepend
844 else if (opts
->x_dump_dir_name
)
845 /* We have a DUMP_DIR_NAME, prepend that. */
846 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
847 opts
->x_dump_base_name
, NULL
);
848 else if (opts
->x_aux_base_name
849 && strcmp (opts
->x_aux_base_name
, HOST_BIT_BUCKET
) != 0)
850 /* AUX_BASE_NAME is set and is not the bit bucket. If it
851 contains a directory component, prepend those directories.
852 Typically this places things in the same directory as the
855 const char *aux_base
;
857 base_of_path (opts
->x_aux_base_name
, &aux_base
);
858 if (opts
->x_aux_base_name
!= aux_base
)
860 int dir_len
= aux_base
- opts
->x_aux_base_name
;
861 char *new_dump_base_name
862 = XOBNEWVEC (&opts_obstack
, char,
863 strlen (opts
->x_dump_base_name
) + dir_len
+ 1);
865 /* Copy directory component from OPTS->X_AUX_BASE_NAME. */
866 memcpy (new_dump_base_name
, opts
->x_aux_base_name
, dir_len
);
867 /* Append existing OPTS->X_DUMP_BASE_NAME. */
868 strcpy (new_dump_base_name
+ dir_len
, opts
->x_dump_base_name
);
869 opts
->x_dump_base_name
= new_dump_base_name
;
873 /* It is definitely prefixed now. */
874 opts
->x_dump_base_name_prefixed
= true;
877 /* Handle related options for unit-at-a-time, toplevel-reorder, and
879 if (!opts
->x_flag_unit_at_a_time
)
881 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
882 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
884 opts
->x_flag_section_anchors
= 0;
885 if (opts
->x_flag_toplevel_reorder
== 1)
886 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
888 opts
->x_flag_toplevel_reorder
= 0;
891 /* -fself-test depends on the state of the compiler prior to
892 compiling anything. Ideally it should be run on an empty source
893 file. However, in case we get run with actual source, assume
894 -fsyntax-only which will inhibit any compiler initialization
895 which may confuse the self tests. */
896 if (opts
->x_flag_self_test
)
897 opts
->x_flag_syntax_only
= 1;
899 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
900 sorry ("transactional memory is not supported with non-call exceptions");
902 /* Unless the user has asked for section anchors, we disable toplevel
903 reordering at -O0 to disable transformations that might be surprising
904 to end users and to get -fno-toplevel-reorder tested. */
905 if (!opts
->x_optimize
906 && opts
->x_flag_toplevel_reorder
== 2
907 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
909 opts
->x_flag_toplevel_reorder
= 0;
910 opts
->x_flag_section_anchors
= 0;
912 if (!opts
->x_flag_toplevel_reorder
)
914 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
915 error_at (loc
, "section anchors must be disabled when toplevel reorder"
917 opts
->x_flag_section_anchors
= 0;
920 if (!opts
->x_flag_opts_finished
)
922 /* We initialize opts->x_flag_pie to -1 so that targets can set a
924 if (opts
->x_flag_pie
== -1)
926 /* We initialize opts->x_flag_pic to -1 so that we can tell if
927 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
928 if (opts
->x_flag_pic
== -1)
929 opts
->x_flag_pie
= DEFAULT_FLAG_PIE
;
931 opts
->x_flag_pie
= 0;
933 /* If -fPIE or -fpie is used, turn on PIC. */
934 if (opts
->x_flag_pie
)
935 opts
->x_flag_pic
= opts
->x_flag_pie
;
936 else if (opts
->x_flag_pic
== -1)
937 opts
->x_flag_pic
= 0;
938 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
939 opts
->x_flag_shlib
= 1;
940 opts
->x_flag_opts_finished
= true;
943 /* We initialize opts->x_flag_stack_protect to -1 so that targets
944 can set a default value. */
945 if (opts
->x_flag_stack_protect
== -1)
946 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
948 if (opts
->x_optimize
== 0)
950 /* Inlining does not work if not optimizing,
951 so force it not to be done. */
952 opts
->x_warn_inline
= 0;
953 opts
->x_flag_no_inline
= 1;
956 /* The optimization to partition hot and cold basic blocks into separate
957 sections of the .o and executable files does not work (currently)
958 with exception handling. This is because there is no support for
959 generating unwind info. If opts->x_flag_exceptions is turned on
960 we need to turn off the partitioning optimization. */
962 ui_except
= targetm_common
.except_unwind_info (opts
);
964 if (opts
->x_flag_exceptions
965 && opts
->x_flag_reorder_blocks_and_partition
966 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
968 if (opts_set
->x_flag_reorder_blocks_and_partition
)
970 "%<-freorder-blocks-and-partition%> does not work "
971 "with exceptions on this architecture");
972 opts
->x_flag_reorder_blocks_and_partition
= 0;
973 opts
->x_flag_reorder_blocks
= 1;
976 /* If user requested unwind info, then turn off the partitioning
979 if (opts
->x_flag_unwind_tables
980 && !targetm_common
.unwind_tables_default
981 && opts
->x_flag_reorder_blocks_and_partition
982 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
984 if (opts_set
->x_flag_reorder_blocks_and_partition
)
986 "%<-freorder-blocks-and-partition%> does not support "
987 "unwind info on this architecture");
988 opts
->x_flag_reorder_blocks_and_partition
= 0;
989 opts
->x_flag_reorder_blocks
= 1;
992 /* If the target requested unwind info, then turn off the partitioning
993 optimization with a different message. Likewise, if the target does not
994 support named sections. */
996 if (opts
->x_flag_reorder_blocks_and_partition
997 && (!targetm_common
.have_named_sections
998 || (opts
->x_flag_unwind_tables
999 && targetm_common
.unwind_tables_default
1000 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
1002 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1004 "%<-freorder-blocks-and-partition%> does not work "
1005 "on this architecture");
1006 opts
->x_flag_reorder_blocks_and_partition
= 0;
1007 opts
->x_flag_reorder_blocks
= 1;
1011 /* Pipelining of outer loops is only possible when general pipelining
1012 capabilities are requested. */
1013 if (!opts
->x_flag_sel_sched_pipelining
)
1014 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
1016 if (opts
->x_flag_conserve_stack
)
1018 SET_OPTION_IF_UNSET (opts
, opts_set
, param_large_stack_frame
, 100);
1019 SET_OPTION_IF_UNSET (opts
, opts_set
, param_stack_frame_growth
, 40);
1022 if (opts
->x_flag_lto
)
1025 opts
->x_flag_generate_lto
= 1;
1027 /* When generating IL, do not operate in whole-program mode.
1028 Otherwise, symbols will be privatized too early, causing link
1030 opts
->x_flag_whole_program
= 0;
1032 error_at (loc
, "LTO support has not been enabled in this configuration");
1034 if (!opts
->x_flag_fat_lto_objects
1035 && (!HAVE_LTO_PLUGIN
1036 || (opts_set
->x_flag_use_linker_plugin
1037 && !opts
->x_flag_use_linker_plugin
)))
1039 if (opts_set
->x_flag_fat_lto_objects
)
1040 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
1042 opts
->x_flag_fat_lto_objects
= 1;
1045 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1046 if (opts
->x_dwarf_split_debug_info
)
1048 inform (loc
, "%<-gsplit-dwarf%> is not supported with LTO,"
1050 opts
->x_dwarf_split_debug_info
= 0;
1054 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1055 default value if they choose based on other options. */
1056 if (opts
->x_flag_split_stack
== -1)
1057 opts
->x_flag_split_stack
= 0;
1058 else if (opts
->x_flag_split_stack
)
1060 if (!targetm_common
.supports_split_stack (true, opts
))
1062 error_at (loc
, "%<-fsplit-stack%> is not supported by "
1063 "this compiler configuration");
1064 opts
->x_flag_split_stack
= 0;
1068 /* If stack splitting is turned on, and the user did not explicitly
1069 request function partitioning, turn off partitioning, as it
1070 confuses the linker when trying to handle partitioned split-stack
1071 code that calls a non-split-stack functions. But if partitioning
1072 was turned on explicitly just hope for the best. */
1073 if (opts
->x_flag_split_stack
1074 && opts
->x_flag_reorder_blocks_and_partition
)
1075 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_blocks_and_partition
, 0);
1077 if (opts
->x_flag_reorder_blocks_and_partition
)
1078 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_functions
, 1);
1080 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1081 if (opts
->x_dwarf_split_debug_info
)
1082 opts
->x_debug_generate_pub_sections
= 2;
1084 if ((opts
->x_flag_sanitize
1085 & (SANITIZE_USER_ADDRESS
| SANITIZE_KERNEL_ADDRESS
)) == 0)
1087 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_COMPARE
)
1089 "%<-fsanitize=pointer-compare%> must be combined with "
1090 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1091 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_SUBTRACT
)
1093 "%<-fsanitize=pointer-subtract%> must be combined with "
1094 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1097 /* Userspace and kernel ASan conflict with each other. */
1098 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1099 && (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
))
1101 "%<-fsanitize=address%> is incompatible with "
1102 "%<-fsanitize=kernel-address%>");
1104 /* And with TSan. */
1105 if ((opts
->x_flag_sanitize
& SANITIZE_ADDRESS
)
1106 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1108 "%<-fsanitize=address%> and %<-fsanitize=kernel-address%> "
1109 "are incompatible with %<-fsanitize=thread%>");
1111 if ((opts
->x_flag_sanitize
& SANITIZE_LEAK
)
1112 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1114 "%<-fsanitize=leak%> is incompatible with %<-fsanitize=thread%>");
1116 /* Check error recovery for -fsanitize-recover option. */
1117 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1118 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
1119 && !sanitizer_opts
[i
].can_recover
)
1120 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
1121 sanitizer_opts
[i
].name
);
1123 /* When instrumenting the pointers, we don't want to remove
1124 the null pointer checks. */
1125 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
1126 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
1127 opts
->x_flag_delete_null_pointer_checks
= 0;
1129 /* Aggressive compiler optimizations may cause false negatives. */
1130 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
1131 opts
->x_flag_aggressive_loop_optimizations
= 0;
1133 /* Enable -fsanitize-address-use-after-scope if address sanitizer is
1135 if (opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1136 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_sanitize_address_use_after_scope
,
1139 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1141 if (opts
->x_flag_sanitize_address_use_after_scope
)
1143 if (opts
->x_flag_stack_reuse
!= SR_NONE
1144 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1146 "%<-fsanitize-address-use-after-scope%> requires "
1147 "%<-fstack-reuse=none%> option");
1149 opts
->x_flag_stack_reuse
= SR_NONE
;
1152 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1153 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1155 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1156 sorry ("transactional memory is not supported with "
1157 "%<-fsanitize=kernel-address%>");
1159 /* Currently live patching is not support for LTO. */
1160 if (opts
->x_flag_live_patching
&& opts
->x_flag_lto
)
1161 sorry ("live patching is not supported with LTO");
1163 /* Currently vtable verification is not supported for LTO */
1164 if (opts
->x_flag_vtable_verify
&& opts
->x_flag_lto
)
1165 sorry ("vtable verification is not supported with LTO");
1167 /* Control IPA optimizations based on different -flive-patching level. */
1168 if (opts
->x_flag_live_patching
)
1170 control_options_for_live_patching (opts
, opts_set
,
1171 opts
->x_flag_live_patching
,
1176 #define LEFT_COLUMN 27
1178 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1179 followed by word-wrapped HELP in a second column. */
1181 wrap_help (const char *help
,
1183 unsigned int item_width
,
1184 unsigned int columns
)
1186 unsigned int col_width
= LEFT_COLUMN
;
1187 unsigned int remaining
, room
, len
;
1189 remaining
= strlen (help
);
1193 room
= columns
- 3 - MAX (col_width
, item_width
);
1202 for (i
= 0; help
[i
]; i
++)
1204 if (i
>= room
&& len
!= remaining
)
1208 else if ((help
[i
] == '-' || help
[i
] == '/')
1209 && help
[i
+ 1] != ' '
1210 && i
> 0 && ISALPHA (help
[i
- 1]))
1215 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1217 while (help
[len
] == ' ')
1225 /* Data structure used to print list of valid option values. */
1227 class option_help_tuple
1230 option_help_tuple (int code
, vec
<const char *> values
):
1231 m_code (code
), m_values (values
)
1234 /* Code of an option. */
1237 /* List of possible values. */
1238 vec
<const char *> m_values
;
1241 /* Print help for a specific front-end, etc. */
1243 print_filtered_help (unsigned int include_flags
,
1244 unsigned int exclude_flags
,
1245 unsigned int any_flags
,
1246 unsigned int columns
,
1247 struct gcc_options
*opts
,
1248 unsigned int lang_mask
)
1253 bool displayed
= false;
1256 if (!opts
->x_help_printed
)
1257 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1259 if (!opts
->x_help_enum_printed
)
1260 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1262 auto_vec
<option_help_tuple
> help_tuples
;
1264 for (i
= 0; i
< cl_options_count
; i
++)
1266 const struct cl_option
*option
= cl_options
+ i
;
1271 if (include_flags
== 0
1272 || ((option
->flags
& include_flags
) != include_flags
))
1274 if ((option
->flags
& any_flags
) == 0)
1278 /* Skip unwanted switches. */
1279 if ((option
->flags
& exclude_flags
) != 0)
1282 /* The driver currently prints its own help text. */
1283 if ((option
->flags
& CL_DRIVER
) != 0
1284 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1285 | CL_COMMON
| CL_TARGET
)) == 0)
1288 /* If an option contains a language specification,
1289 exclude it from common unless all languages are present. */
1290 if ((include_flags
& CL_COMMON
)
1291 && !(option
->flags
& CL_DRIVER
)
1292 && (option
->flags
& CL_LANG_ALL
)
1293 && (option
->flags
& CL_LANG_ALL
) != CL_LANG_ALL
)
1297 /* Skip switches that have already been printed. */
1298 if (opts
->x_help_printed
[i
])
1301 opts
->x_help_printed
[i
] = true;
1303 help
= option
->help
;
1306 if (exclude_flags
& CL_UNDOCUMENTED
)
1309 help
= undocumented_msg
;
1312 /* Get the translation. */
1315 if (option
->alias_target
< N_OPTS
1316 && cl_options
[option
->alias_target
].help
)
1318 if (option
->help
== NULL
)
1320 /* For undocumented options that are aliases for other options
1321 that are documented, point the reader to the other option in
1322 preference of the former. */
1323 snprintf (new_help
, sizeof new_help
,
1324 _("Same as %s. Use the latter option instead."),
1325 cl_options
[option
->alias_target
].opt_text
);
1329 /* For documented options with aliases, mention the aliased
1330 option's name for reference. */
1331 snprintf (new_help
, sizeof new_help
,
1332 _("%s Same as %s."),
1333 help
, cl_options
[option
->alias_target
].opt_text
);
1339 if (option
->warn_message
)
1341 /* Mention that the use of the option will trigger a warning. */
1342 if (help
== new_help
)
1343 snprintf (new_help
+ strlen (new_help
),
1344 sizeof new_help
- strlen (new_help
),
1345 " %s", _(use_diagnosed_msg
));
1347 snprintf (new_help
, sizeof new_help
,
1348 "%s %s", help
, _(use_diagnosed_msg
));
1353 /* Find the gap between the name of the
1354 option and its descriptive text. */
1355 tab
= strchr (help
, '\t');
1364 opt
= option
->opt_text
;
1368 /* With the -Q option enabled we change the descriptive text associated
1369 with an option to be an indication of its current setting. */
1370 if (!opts
->x_quiet_flag
)
1372 void *flag_var
= option_flag_var (i
, opts
);
1374 if (len
< (LEFT_COLUMN
+ 2))
1375 strcpy (new_help
, "\t\t");
1377 strcpy (new_help
, "\t");
1379 /* Set to print whether the option is enabled or disabled,
1380 or, if it's an alias for another option, the name of
1381 the aliased option. */
1382 bool print_state
= false;
1384 if (flag_var
!= NULL
1385 && option
->var_type
!= CLVC_DEFER
)
1387 /* If OPTION is only available for a specific subset
1388 of languages other than this one, mention them. */
1389 bool avail_for_lang
= true;
1390 if (unsigned langset
= option
->flags
& CL_LANG_ALL
)
1392 if (!(langset
& lang_mask
))
1394 avail_for_lang
= false;
1395 strcat (new_help
, _("[available in "));
1396 for (unsigned i
= 0, n
= 0; (1U << i
) < CL_LANG_ALL
; ++i
)
1397 if (langset
& (1U << i
))
1400 strcat (new_help
, ", ");
1401 strcat (new_help
, lang_names
[i
]);
1403 strcat (new_help
, "]");
1406 if (!avail_for_lang
)
1407 ; /* Print nothing else if the option is not available
1408 in the current language. */
1409 else if (option
->flags
& CL_JOINED
)
1411 if (option
->var_type
== CLVC_STRING
)
1413 if (* (const char **) flag_var
!= NULL
)
1414 snprintf (new_help
+ strlen (new_help
),
1415 sizeof (new_help
) - strlen (new_help
),
1416 "%s", * (const char **) flag_var
);
1418 else if (option
->var_type
== CLVC_ENUM
)
1420 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1422 const char *arg
= NULL
;
1424 value
= e
->get (flag_var
);
1425 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1427 arg
= _("[default]");
1428 snprintf (new_help
+ strlen (new_help
),
1429 sizeof (new_help
) - strlen (new_help
),
1434 if (option
->cl_host_wide_int
)
1435 sprintf (new_help
+ strlen (new_help
),
1436 _("%llu bytes"), (unsigned long long)
1437 *(unsigned HOST_WIDE_INT
*) flag_var
);
1439 sprintf (new_help
+ strlen (new_help
),
1440 "%i", * (int *) flag_var
);
1447 /* When there is no argument, print the option state only
1448 if the option takes no argument. */
1449 print_state
= !(option
->flags
& CL_JOINED
);
1453 if (option
->alias_target
< N_OPTS
1454 && option
->alias_target
!= OPT_SPECIAL_warn_removed
1455 && option
->alias_target
!= OPT_SPECIAL_ignore
1456 && option
->alias_target
!= OPT_SPECIAL_input_file
1457 && option
->alias_target
!= OPT_SPECIAL_program_name
1458 && option
->alias_target
!= OPT_SPECIAL_unknown
)
1460 const struct cl_option
*target
1461 = &cl_options
[option
->alias_target
];
1462 sprintf (new_help
+ strlen (new_help
), "%s%s",
1464 option
->alias_arg
? option
->alias_arg
: "");
1466 else if (option
->alias_target
== OPT_SPECIAL_ignore
)
1467 strcat (new_help
, ("[ignored]"));
1470 /* Print the state for an on/off option. */
1471 int ena
= option_enabled (i
, lang_mask
, opts
);
1473 strcat (new_help
, _("[enabled]"));
1475 strcat (new_help
, _("[disabled]"));
1482 if (option
->range_max
!= -1)
1485 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1487 opt
= concat (opt
, b
, NULL
);
1491 wrap_help (help
, opt
, len
, columns
);
1494 if (option
->var_type
== CLVC_ENUM
1495 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1496 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1499 vec
<const char *> option_values
1500 = targetm_common
.get_valid_option_values (i
, NULL
);
1501 if (!option_values
.is_empty ())
1502 help_tuples
.safe_push (option_help_tuple (i
, option_values
));
1508 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1511 printf (_(" No options with the desired characteristics were found\n"));
1516 /* PR 31349: Tell the user how to see all of the
1517 options supported by a specific front end. */
1518 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1519 if ((1U << i
) & langs
)
1520 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1521 lang_names
[i
], lang_names
[i
]);
1525 else if (! displayed
)
1526 printf (_(" All options with the desired characteristics have already been displayed\n"));
1530 /* Print details of enumerated option arguments, if those
1531 enumerations have help text headings provided. If no help text
1532 is provided, presume that the possible values are listed in the
1533 help text for the relevant options. */
1534 for (i
= 0; i
< cl_enums_count
; i
++)
1536 unsigned int j
, pos
;
1538 if (opts
->x_help_enum_printed
[i
] != 1)
1540 if (cl_enums
[i
].help
== NULL
)
1542 printf (" %s\n ", _(cl_enums
[i
].help
));
1544 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1546 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1548 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1550 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1560 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1565 opts
->x_help_enum_printed
[i
] = 2;
1568 for (unsigned i
= 0; i
< help_tuples
.length (); i
++)
1570 const struct cl_option
*option
= cl_options
+ help_tuples
[i
].m_code
;
1571 printf (_(" Known valid arguments for %s option:\n "),
1573 for (unsigned j
= 0; j
< help_tuples
[i
].m_values
.length (); j
++)
1574 printf (" %s", help_tuples
[i
].m_values
[j
]);
1579 /* Display help for a specified type of option.
1580 The options must have ALL of the INCLUDE_FLAGS set
1581 ANY of the flags in the ANY_FLAGS set
1582 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1583 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1585 print_specific_help (unsigned int include_flags
,
1586 unsigned int exclude_flags
,
1587 unsigned int any_flags
,
1588 struct gcc_options
*opts
,
1589 unsigned int lang_mask
)
1591 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1592 const char * description
= NULL
;
1593 const char * descrip_extra
= "";
1597 /* Sanity check: Make sure that we do not have more
1598 languages than we have bits available to enumerate them. */
1599 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1601 /* If we have not done so already, obtain
1602 the desired maximum width of the output. */
1603 if (opts
->x_help_columns
== 0)
1605 opts
->x_help_columns
= get_terminal_width ();
1606 if (opts
->x_help_columns
== INT_MAX
)
1607 /* Use a reasonable default. */
1608 opts
->x_help_columns
= 80;
1611 /* Decide upon the title for the options that we are going to display. */
1612 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1614 switch (flag
& include_flags
)
1621 description
= _("The following options are target specific");
1624 description
= _("The following options control compiler warning messages");
1626 case CL_OPTIMIZATION
:
1627 description
= _("The following options control optimizations");
1630 description
= _("The following options are language-independent");
1633 description
= _("The following options control parameters");
1636 if (i
>= cl_lang_count
)
1638 if (exclude_flags
& all_langs_mask
)
1639 description
= _("The following options are specific to just the language ");
1641 description
= _("The following options are supported by the language ");
1642 descrip_extra
= lang_names
[i
];
1647 if (description
== NULL
)
1651 if (include_flags
& CL_UNDOCUMENTED
)
1652 description
= _("The following options are not documented");
1653 else if (include_flags
& CL_SEPARATE
)
1654 description
= _("The following options take separate arguments");
1655 else if (include_flags
& CL_JOINED
)
1656 description
= _("The following options take joined arguments");
1659 internal_error ("unrecognized %<include_flags 0x%x%> passed "
1660 "to %<print_specific_help%>",
1667 if (any_flags
& all_langs_mask
)
1668 description
= _("The following options are language-related");
1670 description
= _("The following options are language-independent");
1674 printf ("%s%s:\n", description
, descrip_extra
);
1675 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
1676 opts
->x_help_columns
, opts
, lang_mask
);
1679 /* Enable FDO-related flags. */
1682 enable_fdo_optimizations (struct gcc_options
*opts
,
1683 struct gcc_options
*opts_set
,
1686 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_branch_probabilities
, value
);
1687 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
1688 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_loops
, value
);
1689 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_peel_loops
, value
);
1690 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tracer
, value
);
1691 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_value_profile_transformations
,
1693 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
1694 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp
, value
);
1697 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp_clone
, 1);
1698 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, 1);
1700 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_predictive_commoning
, value
);
1701 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_split_loops
, value
);
1702 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unswitch_loops
, value
);
1703 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_gcse_after_reload
, value
);
1704 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_vectorize
, value
);
1705 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_slp_vectorize
, value
);
1706 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_version_loops_for_strides
, value
);
1707 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
1708 VECT_COST_MODEL_DYNAMIC
);
1709 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribute_patterns
,
1711 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_loop_interchange
, value
);
1712 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_jam
, value
);
1713 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribution
, value
);
1716 /* -f{,no-}sanitize{,-recover}= suboptions. */
1717 const struct sanitizer_opts_s sanitizer_opts
[] =
1719 #define SANITIZER_OPT(name, flags, recover) \
1720 { #name, flags, sizeof #name - 1, recover }
1721 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true),
1722 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
1724 SANITIZER_OPT (pointer
-compare
, SANITIZE_POINTER_COMPARE
, true),
1725 SANITIZER_OPT (pointer
-subtract
, SANITIZE_POINTER_SUBTRACT
, true),
1726 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false),
1727 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false),
1728 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true),
1729 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true),
1730 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true),
1731 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true),
1732 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true),
1733 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false),
1734 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true),
1735 SANITIZER_OPT (return, SANITIZE_RETURN
, false),
1736 SANITIZER_OPT (null
, SANITIZE_NULL
, true),
1737 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true),
1738 SANITIZER_OPT (bool, SANITIZE_BOOL
, true),
1739 SANITIZER_OPT (enum, SANITIZE_ENUM
, true),
1740 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true),
1741 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true),
1742 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true),
1743 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true),
1744 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true),
1745 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true),
1746 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
1748 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true),
1749 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true),
1750 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true),
1751 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true),
1752 SANITIZER_OPT (all
, ~0U, true),
1753 #undef SANITIZER_OPT
1754 { NULL
, 0U, 0UL, false }
1757 /* -f{,no-}sanitize-coverage= suboptions. */
1758 const struct sanitizer_opts_s coverage_sanitizer_opts
[] =
1760 #define COVERAGE_SANITIZER_OPT(name, flags) \
1761 { #name, flags, sizeof #name - 1, true }
1762 COVERAGE_SANITIZER_OPT (trace
-pc
, SANITIZE_COV_TRACE_PC
),
1763 COVERAGE_SANITIZER_OPT (trace
-cmp
, SANITIZE_COV_TRACE_CMP
),
1764 #undef COVERAGE_SANITIZER_OPT
1765 { NULL
, 0U, 0UL, false }
1768 /* A struct for describing a run of chars within a string. */
1770 class string_fragment
1773 string_fragment (const char *start
, size_t len
)
1774 : m_start (start
), m_len (len
) {}
1776 const char *m_start
;
1780 /* Specialization of edit_distance_traits for string_fragment,
1781 for use by get_closest_sanitizer_option. */
1784 struct edit_distance_traits
<const string_fragment
&>
1786 static size_t get_length (const string_fragment
&fragment
)
1788 return fragment
.m_len
;
1791 static const char *get_string (const string_fragment
&fragment
)
1793 return fragment
.m_start
;
1797 /* Given ARG, an unrecognized sanitizer option, return the best
1798 matching sanitizer option, or NULL if there isn't one.
1799 OPTS is array of candidate sanitizer options.
1800 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or
1801 OPT_fsanitize_coverage_.
1802 VALUE is non-zero for the regular form of the option, zero
1803 for the "no-" form (e.g. "-fno-sanitize-recover="). */
1806 get_closest_sanitizer_option (const string_fragment
&arg
,
1807 const struct sanitizer_opts_s
*opts
,
1808 enum opt_code code
, int value
)
1810 best_match
<const string_fragment
&, const char*> bm (arg
);
1811 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
1813 /* -fsanitize=all is not valid, so don't offer it. */
1814 if (code
== OPT_fsanitize_
1815 && opts
[i
].flag
== ~0U
1819 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
1820 don't offer the non-recoverable options. */
1821 if (code
== OPT_fsanitize_recover_
1822 && !opts
[i
].can_recover
1826 bm
.consider (opts
[i
].name
);
1828 return bm
.get_best_meaningful_candidate ();
1831 /* Parse comma separated sanitizer suboptions from P for option SCODE,
1832 adjust previous FLAGS and return new ones. If COMPLAIN is false,
1833 don't issue diagnostics. */
1836 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
1837 unsigned int flags
, int value
, bool complain
)
1839 enum opt_code code
= (enum opt_code
) scode
;
1841 const struct sanitizer_opts_s
*opts
;
1842 if (code
== OPT_fsanitize_coverage_
)
1843 opts
= coverage_sanitizer_opts
;
1845 opts
= sanitizer_opts
;
1851 const char *comma
= strchr (p
, ',');
1863 /* Check to see if the string matches an option class name. */
1864 for (i
= 0; opts
[i
].name
!= NULL
; ++i
)
1865 if (len
== opts
[i
].len
&& memcmp (p
, opts
[i
].name
, len
) == 0)
1867 /* Handle both -fsanitize and -fno-sanitize cases. */
1868 if (value
&& opts
[i
].flag
== ~0U)
1870 if (code
== OPT_fsanitize_
)
1873 error_at (loc
, "%<-fsanitize=all%> option is not valid");
1876 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
1877 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
1881 /* Do not enable -fsanitize-recover=unreachable and
1882 -fsanitize-recover=return if -fsanitize-recover=undefined
1884 if (code
== OPT_fsanitize_recover_
1885 && opts
[i
].flag
== SANITIZE_UNDEFINED
)
1886 flags
|= (SANITIZE_UNDEFINED
1887 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
1889 flags
|= opts
[i
].flag
;
1892 flags
&= ~opts
[i
].flag
;
1897 if (! found
&& complain
)
1900 = get_closest_sanitizer_option (string_fragment (p
, len
),
1904 if (code
== OPT_fsanitize_recover_
)
1905 suffix
= "-recover";
1906 else if (code
== OPT_fsanitize_coverage_
)
1907 suffix
= "-coverage";
1913 "unrecognized argument to %<-f%ssanitize%s=%> "
1914 "option: %q.*s; did you mean %qs?",
1916 suffix
, (int) len
, p
, hint
);
1919 "unrecognized argument to %<-f%ssanitize%s=%> option: "
1920 "%q.*s", value
? "" : "no-",
1921 suffix
, (int) len
, p
);
1931 /* Parse string values of no_sanitize attribute passed in VALUE.
1932 Values are separated with comma. */
1935 parse_no_sanitize_attribute (char *value
)
1937 unsigned int flags
= 0;
1939 char *q
= strtok (value
, ",");
1943 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1944 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
1946 flags
|= sanitizer_opts
[i
].flag
;
1947 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
1948 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
1952 if (sanitizer_opts
[i
].name
== NULL
)
1953 warning (OPT_Wattributes
,
1954 "%qs attribute directive ignored", q
);
1956 q
= strtok (NULL
, ",");
1962 /* Parse -falign-NAME format for a FLAG value. Return individual
1963 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
1964 set, print error message at LOC location. */
1967 parse_and_check_align_values (const char *flag
,
1969 auto_vec
<unsigned> &result_values
,
1973 char *str
= xstrdup (flag
);
1974 for (char *p
= strtok (str
, ":"); p
; p
= strtok (NULL
, ":"))
1977 int v
= strtol (p
, &end
, 10);
1978 if (*end
!= '\0' || v
< 0)
1981 error_at (loc
, "invalid arguments for %<-falign-%s%> option: %qs",
1987 result_values
.safe_push ((unsigned)v
);
1992 /* Check that we have a correct number of values. */
1993 if (result_values
.is_empty () || result_values
.length () > 4)
1996 error_at (loc
, "invalid number of arguments for %<-falign-%s%> "
1997 "option: %qs", name
, flag
);
2001 for (unsigned i
= 0; i
< result_values
.length (); i
++)
2002 if (result_values
[i
] > MAX_CODE_ALIGN_VALUE
)
2005 error_at (loc
, "%<-falign-%s%> is not between 0 and %d",
2006 name
, MAX_CODE_ALIGN_VALUE
);
2013 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2017 check_alignment_argument (location_t loc
, const char *flag
, const char *name
)
2019 auto_vec
<unsigned> align_result
;
2020 parse_and_check_align_values (flag
, name
, align_result
, true, loc
);
2023 /* Print help when OPT__help_ is set. */
2026 print_help (struct gcc_options
*opts
, unsigned int lang_mask
,
2027 const char *help_option_argument
)
2029 const char *a
= help_option_argument
;
2030 unsigned int include_flags
= 0;
2031 /* Note - by default we include undocumented options when listing
2032 specific classes. If you only want to see documented options
2033 then add ",^undocumented" to the --help= option. E.g.:
2035 --help=target,^undocumented */
2036 unsigned int exclude_flags
= 0;
2038 if (lang_mask
== CL_DRIVER
)
2041 /* Walk along the argument string, parsing each word in turn.
2043 arg = [^]{word}[,{arg}]
2044 word = {optimizers|target|warnings|undocumented|
2045 params|common|<language>} */
2055 { "optimizers", CL_OPTIMIZATION
},
2056 { "target", CL_TARGET
},
2057 { "warnings", CL_WARNING
},
2058 { "undocumented", CL_UNDOCUMENTED
},
2059 { "params", CL_PARAMS
},
2060 { "joined", CL_JOINED
},
2061 { "separate", CL_SEPARATE
},
2062 { "common", CL_COMMON
},
2065 unsigned int *pflags
;
2067 unsigned int lang_flag
, specific_flag
;
2076 error ("missing argument to %qs", "--help=^");
2079 pflags
= &exclude_flags
;
2082 pflags
= &include_flags
;
2084 comma
= strchr (a
, ',');
2095 /* Check to see if the string matches an option class name. */
2096 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
2097 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
2099 specific_flag
= specifics
[i
].flag
;
2103 /* Check to see if the string matches a language name.
2104 Note - we rely upon the alpha-sorted nature of the entries in
2105 the lang_names array, specifically that shorter names appear
2106 before their longer variants. (i.e. C before C++). That way
2107 when we are attempting to match --help=c for example we will
2108 match with C first and not C++. */
2109 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
2110 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
2112 lang_flag
= 1U << i
;
2116 if (specific_flag
!= 0)
2119 *pflags
|= specific_flag
;
2122 /* The option's argument matches both the start of a
2123 language name and the start of an option class name.
2124 We have a special case for when the user has
2125 specified "--help=c", but otherwise we have to issue
2127 if (strncasecmp (a
, "c", len
) == 0)
2128 *pflags
|= lang_flag
;
2131 "%<--help%> argument %q.*s is ambiguous, "
2132 "please be more specific",
2136 else if (lang_flag
!= 0)
2137 *pflags
|= lang_flag
;
2140 "unrecognized argument to %<--help=%> option: %q.*s",
2148 /* We started using PerFunction/Optimization for parameters and
2149 a warning. We should exclude these from optimization options. */
2150 if (include_flags
& CL_OPTIMIZATION
)
2151 exclude_flags
|= CL_WARNING
;
2152 if (!(include_flags
& CL_PARAMS
))
2153 exclude_flags
|= CL_PARAMS
;
2156 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
2160 /* Handle target- and language-independent options. Return zero to
2161 generate an "unknown option" message. Only options that need
2162 extra handling need to be listed here; if you simply want
2163 DECODED->value assigned to a variable, it happens automatically. */
2166 common_handle_option (struct gcc_options
*opts
,
2167 struct gcc_options
*opts_set
,
2168 const struct cl_decoded_option
*decoded
,
2169 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
2171 const struct cl_option_handlers
*handlers
,
2172 diagnostic_context
*dc
,
2173 void (*target_option_override_hook
) (void))
2175 size_t scode
= decoded
->opt_index
;
2176 const char *arg
= decoded
->arg
;
2177 HOST_WIDE_INT value
= decoded
->value
;
2178 enum opt_code code
= (enum opt_code
) scode
;
2180 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
2186 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
2187 unsigned int undoc_mask
;
2190 if (lang_mask
== CL_DRIVER
)
2193 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
2196 target_option_override_hook ();
2197 /* First display any single language specific options. */
2198 for (i
= 0; i
< cl_lang_count
; i
++)
2200 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
2202 /* Next display any multi language specific options. */
2203 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
2204 /* Then display any remaining, non-language options. */
2205 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
2207 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
2208 opts
->x_exit_after_options
= true;
2212 case OPT__target_help
:
2213 if (lang_mask
== CL_DRIVER
)
2216 target_option_override_hook ();
2217 print_specific_help (CL_TARGET
, CL_UNDOCUMENTED
, 0, opts
, lang_mask
);
2218 opts
->x_exit_after_options
= true;
2223 help_option_arguments
.safe_push (arg
);
2224 opts
->x_exit_after_options
= true;
2229 if (lang_mask
== CL_DRIVER
)
2232 opts
->x_exit_after_options
= true;
2235 case OPT__completion_
:
2238 case OPT_fsanitize_
:
2239 opts
->x_flag_sanitize
2240 = parse_sanitizer_options (arg
, loc
, code
,
2241 opts
->x_flag_sanitize
, value
, true);
2243 /* Kernel ASan implies normal ASan but does not yet support
2245 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
2247 SET_OPTION_IF_UNSET (opts
, opts_set
,
2248 param_asan_instrumentation_with_call_threshold
,
2250 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_globals
, 0);
2251 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_stack
, 0);
2252 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_protect_allocas
, 0);
2253 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_use_after_return
, 0);
2257 case OPT_fsanitize_recover_
:
2258 opts
->x_flag_sanitize_recover
2259 = parse_sanitizer_options (arg
, loc
, code
,
2260 opts
->x_flag_sanitize_recover
, value
, true);
2263 case OPT_fasan_shadow_offset_
:
2267 case OPT_fsanitize_address_use_after_scope
:
2268 opts
->x_flag_sanitize_address_use_after_scope
= value
;
2271 case OPT_fsanitize_recover
:
2273 opts
->x_flag_sanitize_recover
2274 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
2275 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
2277 opts
->x_flag_sanitize_recover
2278 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2281 case OPT_fsanitize_coverage_
:
2282 opts
->x_flag_sanitize_coverage
2283 = parse_sanitizer_options (arg
, loc
, code
,
2284 opts
->x_flag_sanitize_coverage
, value
, true);
2291 /* Currently handled in a prescan. */
2295 dc
->warning_as_error_requested
= value
;
2299 if (lang_mask
== CL_DRIVER
)
2302 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2303 opts
, opts_set
, loc
, dc
);
2306 case OPT_Wfatal_errors
:
2307 dc
->fatal_errors
= value
;
2310 case OPT_Wstack_usage_
:
2311 opts
->x_flag_stack_usage_info
= value
!= -1;
2314 case OPT_Wstrict_aliasing
:
2315 set_Wstrict_aliasing (opts
, value
);
2318 case OPT_Wstrict_overflow
:
2319 opts
->x_warn_strict_overflow
= (value
2320 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2324 case OPT_Wsystem_headers
:
2325 dc
->dc_warn_system_headers
= value
;
2329 opts
->x_flag_gen_aux_info
= 1;
2332 case OPT_auxbase_strip
:
2334 char *tmp
= xstrdup (arg
);
2335 strip_off_ending (tmp
, strlen (tmp
));
2337 opts
->x_aux_base_name
= tmp
;
2344 decode_d_option (arg
, opts
, loc
, dc
);
2347 case OPT_fcall_used_
:
2348 case OPT_fcall_saved_
:
2356 case OPT_fdbg_cnt_list
:
2358 opts
->x_exit_after_options
= true;
2361 case OPT_fdebug_prefix_map_
:
2362 case OPT_ffile_prefix_map_
:
2366 case OPT_fcallgraph_info
:
2367 opts
->x_flag_callgraph_info
= CALLGRAPH_INFO_NAKED
;
2370 case OPT_fcallgraph_info_
:
2373 my_arg
= xstrdup (arg
);
2374 p
= strtok (my_arg
, ",");
2377 if (strcmp (p
, "su") == 0)
2379 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_STACK_USAGE
;
2380 opts
->x_flag_stack_usage_info
= true;
2382 else if (strcmp (p
, "da") == 0)
2383 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_DYNAMIC_ALLOC
;
2386 p
= strtok (NULL
, ",");
2392 case OPT_fdiagnostics_show_location_
:
2393 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2396 case OPT_fdiagnostics_show_caret
:
2397 dc
->show_caret
= value
;
2400 case OPT_fdiagnostics_show_labels
:
2401 dc
->show_labels_p
= value
;
2404 case OPT_fdiagnostics_show_line_numbers
:
2405 dc
->show_line_numbers_p
= value
;
2408 case OPT_fdiagnostics_color_
:
2409 diagnostic_color_init (dc
, value
);
2412 case OPT_fdiagnostics_urls_
:
2413 diagnostic_urls_init (dc
, value
);
2416 case OPT_fdiagnostics_format_
:
2417 diagnostic_output_format_init (dc
,
2418 (enum diagnostics_output_format
)value
);
2421 case OPT_fdiagnostics_parseable_fixits
:
2422 dc
->parseable_fixits_p
= value
;
2425 case OPT_fdiagnostics_show_cwe
:
2426 dc
->show_cwe
= value
;
2429 case OPT_fdiagnostics_path_format_
:
2430 dc
->path_format
= (enum diagnostic_path_format
)value
;
2433 case OPT_fdiagnostics_show_path_depths
:
2434 dc
->show_path_depths
= value
;
2437 case OPT_fdiagnostics_show_option
:
2438 dc
->show_option_requested
= value
;
2441 case OPT_fdiagnostics_minimum_margin_width_
:
2442 dc
->min_margin_width
= value
;
2449 case OPT_ffast_math
:
2450 set_fast_math_flags (opts
, value
);
2453 case OPT_funsafe_math_optimizations
:
2454 set_unsafe_math_optimizations_flags (opts
, value
);
2461 case OPT_finline_limit_
:
2462 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_single
,
2464 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_auto
,
2468 case OPT_finstrument_functions_exclude_function_list_
:
2469 add_comma_separated_to_vector
2470 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
2473 case OPT_finstrument_functions_exclude_file_list_
:
2474 add_comma_separated_to_vector
2475 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
2478 case OPT_fmessage_length_
:
2479 pp_set_line_maximum_length (dc
->printer
, value
);
2480 diagnostic_set_caret_max_width (dc
, value
);
2484 case OPT_fopt_info_
:
2490 const char *p
= arg
;
2491 opts
->x_flag_disable_hsa
= true;
2494 const char *comma
= strchr (p
, ',');
2496 if ((strncmp (p
, "disable", 7) == 0)
2497 && (p
[7] == ',' || p
[7] == '\0'))
2499 opts
->x_flag_disable_hsa
= true;
2503 if ((strncmp (p
, "hsa", 3) == 0)
2504 && (p
[3] == ',' || p
[3] == '\0'))
2507 opts
->x_flag_disable_hsa
= false;
2509 sorry ("HSA has not been enabled during configuration");
2519 #ifndef ACCEL_COMPILER
2520 case OPT_foffload_abi_
:
2521 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
2522 "offload compiler");
2526 case OPT_fpack_struct_
:
2527 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
2529 "structure alignment must be a small power of two, not %wu",
2532 opts
->x_initial_max_fld_align
= value
;
2536 case OPT_fplugin_arg_
:
2540 case OPT_fprofile_use_
:
2541 opts
->x_profile_data_prefix
= xstrdup (arg
);
2542 opts
->x_flag_profile_use
= true;
2544 /* No break here - do -fprofile-use processing. */
2546 case OPT_fprofile_use
:
2547 enable_fdo_optimizations (opts
, opts_set
, value
);
2548 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_reorder_functions
,
2550 /* Indirect call profiling should do all useful transformations
2551 speculative devirtualization does. */
2552 if (opts
->x_flag_value_profile_transformations
)
2553 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_devirtualize_speculatively
,
2557 case OPT_fauto_profile_
:
2558 opts
->x_auto_profile_file
= xstrdup (arg
);
2559 opts
->x_flag_auto_profile
= true;
2561 /* No break here - do -fauto-profile processing. */
2563 case OPT_fauto_profile
:
2564 enable_fdo_optimizations (opts
, opts_set
, value
);
2565 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_correction
, value
);
2566 SET_OPTION_IF_UNSET (opts
, opts_set
,
2567 param_early_inliner_max_iterations
, 10);
2570 case OPT_fprofile_generate_
:
2571 opts
->x_profile_data_prefix
= xstrdup (arg
);
2573 /* No break here - do -fprofile-generate processing. */
2575 case OPT_fprofile_generate
:
2576 SET_OPTION_IF_UNSET (opts
, opts_set
, profile_arc_flag
, value
);
2577 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
2578 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
2579 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, value
);
2582 case OPT_fpatchable_function_entry_
:
2584 char *patch_area_arg
= xstrdup (arg
);
2585 char *comma
= strchr (patch_area_arg
, ',');
2589 function_entry_patch_area_size
=
2590 integral_argument (patch_area_arg
);
2591 function_entry_patch_area_start
=
2592 integral_argument (comma
+ 1);
2596 function_entry_patch_area_size
=
2597 integral_argument (patch_area_arg
);
2598 function_entry_patch_area_start
= 0;
2600 if (function_entry_patch_area_size
< 0
2601 || function_entry_patch_area_start
< 0
2602 || function_entry_patch_area_size
2603 < function_entry_patch_area_start
)
2604 error ("invalid arguments for %<-fpatchable_function_entry%>");
2605 free (patch_area_arg
);
2609 case OPT_ftree_vectorize
:
2610 /* Automatically sets -ftree-loop-vectorize and
2611 -ftree-slp-vectorize. Nothing more to do here. */
2613 case OPT_fshow_column
:
2614 dc
->show_column
= value
;
2617 case OPT_frandom_seed
:
2618 /* The real switch is -fno-random-seed. */
2624 case OPT_frandom_seed_
:
2628 case OPT_fsched_verbose_
:
2629 #ifdef INSN_SCHEDULING
2630 /* Handled with Var in common.opt. */
2636 case OPT_fsched_stalled_insns_
:
2637 opts
->x_flag_sched_stalled_insns
= value
;
2638 if (opts
->x_flag_sched_stalled_insns
== 0)
2639 opts
->x_flag_sched_stalled_insns
= -1;
2642 case OPT_fsched_stalled_insns_dep_
:
2643 opts
->x_flag_sched_stalled_insns_dep
= value
;
2646 case OPT_fstack_check_
:
2647 if (!strcmp (arg
, "no"))
2648 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
2649 else if (!strcmp (arg
, "generic"))
2650 /* This is the old stack checking method. */
2651 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2652 ? FULL_BUILTIN_STACK_CHECK
2653 : GENERIC_STACK_CHECK
;
2654 else if (!strcmp (arg
, "specific"))
2655 /* This is the new stack checking method. */
2656 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2657 ? FULL_BUILTIN_STACK_CHECK
2658 : STACK_CHECK_STATIC_BUILTIN
2659 ? STATIC_BUILTIN_STACK_CHECK
2660 : GENERIC_STACK_CHECK
;
2662 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
2665 case OPT_fstack_limit
:
2666 /* The real switch is -fno-stack-limit. */
2672 case OPT_fstack_limit_register_
:
2673 case OPT_fstack_limit_symbol_
:
2677 case OPT_fstack_usage
:
2678 opts
->x_flag_stack_usage
= value
;
2679 opts
->x_flag_stack_usage_info
= value
!= 0;
2683 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
2688 if (arg
&& strlen (arg
) != 0)
2690 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
2691 "use %<-gdwarf-%s%> for DWARF version "
2692 "or %<-gdwarf%> %<-g%s%> for debug level", arg
, arg
, arg
);
2696 value
= opts
->x_dwarf_version
;
2700 if (value
< 2 || value
> 5)
2701 error_at (loc
, "dwarf version %wu is not supported", value
);
2703 opts
->x_dwarf_version
= value
;
2704 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
2707 case OPT_gsplit_dwarf
:
2708 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, "", opts
, opts_set
,
2713 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
2718 set_debug_level (DBX_DEBUG
, code
== OPT_gstabs_
, arg
, opts
, opts_set
,
2723 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
2728 set_debug_level (XCOFF_DEBUG
, code
== OPT_gxcoff_
, arg
, opts
, opts_set
,
2734 /* Handled completely via specs. */
2737 case OPT_pedantic_errors
:
2738 dc
->pedantic_errors
= 1;
2739 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
2741 handlers
, opts
, opts_set
,
2746 opts
->x_flag_lto
= value
? "" : NULL
;
2750 if (strcmp (arg
, "none") != 0
2751 && strcmp (arg
, "jobserver") != 0
2752 && strcmp (arg
, "auto") != 0
2755 "unrecognized argument to %<-flto=%> option: %qs", arg
);
2759 dc
->dc_inhibit_warnings
= true;
2762 case OPT_fmax_errors_
:
2763 dc
->max_errors
= value
;
2766 case OPT_fuse_ld_bfd
:
2767 case OPT_fuse_ld_gold
:
2768 case OPT_fuse_ld_lld
:
2769 case OPT_fuse_linker_plugin
:
2770 /* No-op. Used by the driver and passed to us because it starts with f.*/
2775 opts
->x_flag_trapv
= 0;
2780 opts
->x_flag_wrapv
= 0;
2783 case OPT_fstrict_overflow
:
2784 opts
->x_flag_wrapv
= !value
;
2785 opts
->x_flag_wrapv_pointer
= !value
;
2787 opts
->x_flag_trapv
= 0;
2791 opts
->x_flag_ipa_icf_functions
= value
;
2792 opts
->x_flag_ipa_icf_variables
= value
;
2795 case OPT_falign_loops_
:
2796 check_alignment_argument (loc
, arg
, "loops");
2799 case OPT_falign_jumps_
:
2800 check_alignment_argument (loc
, arg
, "jumps");
2803 case OPT_falign_labels_
:
2804 check_alignment_argument (loc
, arg
, "labels");
2807 case OPT_falign_functions_
:
2808 check_alignment_argument (loc
, arg
, "functions");
2812 /* If the flag was handled in a standard way, assume the lack of
2813 processing here is intentional. */
2814 gcc_assert (option_flag_var (scode
, opts
));
2818 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
2823 /* Used to set the level of strict aliasing warnings in OPTS,
2824 when no level is specified (i.e., when -Wstrict-aliasing, and not
2825 -Wstrict-aliasing=level was given).
2826 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
2827 and 0 otherwise. After calling this function, wstrict_aliasing will be
2828 set to the default value of -Wstrict_aliasing=level, currently 3. */
2830 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
2832 gcc_assert (onoff
== 0 || onoff
== 1);
2834 opts
->x_warn_strict_aliasing
= 3;
2836 opts
->x_warn_strict_aliasing
= 0;
2839 /* The following routines are useful in setting all the flags that
2840 -ffast-math and -fno-fast-math imply. */
2842 set_fast_math_flags (struct gcc_options
*opts
, int set
)
2844 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
2846 opts
->x_flag_unsafe_math_optimizations
= set
;
2847 set_unsafe_math_optimizations_flags (opts
, set
);
2849 if (!opts
->frontend_set_flag_finite_math_only
)
2850 opts
->x_flag_finite_math_only
= set
;
2851 if (!opts
->frontend_set_flag_errno_math
)
2852 opts
->x_flag_errno_math
= !set
;
2855 if (opts
->frontend_set_flag_excess_precision
== EXCESS_PRECISION_DEFAULT
)
2856 opts
->x_flag_excess_precision
2857 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
2858 if (!opts
->frontend_set_flag_signaling_nans
)
2859 opts
->x_flag_signaling_nans
= 0;
2860 if (!opts
->frontend_set_flag_rounding_math
)
2861 opts
->x_flag_rounding_math
= 0;
2862 if (!opts
->frontend_set_flag_cx_limited_range
)
2863 opts
->x_flag_cx_limited_range
= 1;
2867 /* When -funsafe-math-optimizations is set the following
2868 flags are set as well. */
2870 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
2872 if (!opts
->frontend_set_flag_trapping_math
)
2873 opts
->x_flag_trapping_math
= !set
;
2874 if (!opts
->frontend_set_flag_signed_zeros
)
2875 opts
->x_flag_signed_zeros
= !set
;
2876 if (!opts
->frontend_set_flag_associative_math
)
2877 opts
->x_flag_associative_math
= set
;
2878 if (!opts
->frontend_set_flag_reciprocal_math
)
2879 opts
->x_flag_reciprocal_math
= set
;
2882 /* Return true iff flags in OPTS are set as if -ffast-math. */
2884 fast_math_flags_set_p (const struct gcc_options
*opts
)
2886 return (!opts
->x_flag_trapping_math
2887 && opts
->x_flag_unsafe_math_optimizations
2888 && opts
->x_flag_finite_math_only
2889 && !opts
->x_flag_signed_zeros
2890 && !opts
->x_flag_errno_math
2891 && opts
->x_flag_excess_precision
== EXCESS_PRECISION_FAST
);
2894 /* Return true iff flags are set as if -ffast-math but using the flags stored
2895 in the struct cl_optimization structure. */
2897 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
2899 return (!opt
->x_flag_trapping_math
2900 && opt
->x_flag_unsafe_math_optimizations
2901 && opt
->x_flag_finite_math_only
2902 && !opt
->x_flag_signed_zeros
2903 && !opt
->x_flag_errno_math
);
2906 /* Handle a debug output -g switch for options OPTS
2907 (OPTS_SET->x_write_symbols storing whether a debug type was passed
2908 explicitly), location LOC. EXTENDED is true or false to support
2909 extended output (2 is special and means "-ggdb" was given). */
2911 set_debug_level (enum debug_info_type type
, int extended
, const char *arg
,
2912 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
2915 opts
->x_use_gnu_debug_info_extensions
= extended
;
2917 if (type
== NO_DEBUG
)
2919 if (opts
->x_write_symbols
== NO_DEBUG
)
2921 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
2925 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
2926 opts
->x_write_symbols
= DWARF2_DEBUG
;
2927 #elif defined DBX_DEBUGGING_INFO
2928 opts
->x_write_symbols
= DBX_DEBUG
;
2932 if (opts
->x_write_symbols
== NO_DEBUG
)
2933 warning_at (loc
, 0, "target system does not support debug output");
2938 /* Does it conflict with an already selected type? */
2939 if (opts_set
->x_write_symbols
!= NO_DEBUG
2940 && opts
->x_write_symbols
!= NO_DEBUG
2941 && type
!= opts
->x_write_symbols
)
2942 error_at (loc
, "debug format %qs conflicts with prior selection",
2943 debug_type_names
[type
]);
2944 opts
->x_write_symbols
= type
;
2945 opts_set
->x_write_symbols
= type
;
2948 /* A debug flag without a level defaults to level 2.
2949 If off or at level 1, set it to level 2, but if already
2950 at level 3, don't lower it. */
2953 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
2954 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
2958 int argval
= integral_argument (arg
);
2960 error_at (loc
, "unrecognized debug output level %qs", arg
);
2961 else if (argval
> 3)
2962 error_at (loc
, "debug output level %qs is too high", arg
);
2964 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
2968 /* Arrange to dump core on error for diagnostic context DC. (The
2969 regular error message is still printed first, except in the case of
2973 setup_core_dumping (diagnostic_context
*dc
)
2976 signal (SIGABRT
, SIG_DFL
);
2978 #if defined(HAVE_SETRLIMIT)
2981 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
2982 fatal_error (input_location
, "getting core file size maximum limit: %m");
2983 rlim
.rlim_cur
= rlim
.rlim_max
;
2984 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
2985 fatal_error (input_location
,
2986 "setting core file size limit to maximum: %m");
2989 diagnostic_abort_on_error (dc
);
2992 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
2993 diagnostic context DC. */
2996 decode_d_option (const char *arg
, struct gcc_options
*opts
,
2997 location_t loc
, diagnostic_context
*dc
)
3005 opts
->x_flag_debug_asm
= 1;
3008 opts
->x_flag_print_asm_name
= 1;
3011 opts
->x_flag_dump_rtl_in_asm
= 1;
3012 opts
->x_flag_print_asm_name
= 1;
3015 opts
->x_rtl_dump_and_exit
= 1;
3017 case 'D': /* These are handled by the preprocessor. */
3024 setup_core_dumping (dc
);
3027 opts
->x_flag_dump_all_passed
= true;
3031 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
3036 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3037 mask LANG_MASK, option handlers HANDLERS) as an error for option
3038 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3039 NULL), location LOC. This is used by -Werror=. */
3042 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
3043 const struct cl_option_handlers
*handlers
,
3044 struct gcc_options
*opts
,
3045 struct gcc_options
*opts_set
,
3046 location_t loc
, diagnostic_context
*dc
)
3051 new_option
= XNEWVEC (char, strlen (arg
) + 2);
3052 new_option
[0] = 'W';
3053 strcpy (new_option
+ 1, arg
);
3054 option_index
= find_opt (new_option
, lang_mask
);
3055 if (option_index
== OPT_SPECIAL_unknown
)
3058 const char *hint
= op
.suggest_option (new_option
);
3060 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>;"
3061 " did you mean %<-%s%>?", value
? "" : "no-",
3062 arg
, new_option
, hint
);
3064 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>",
3065 value
? "" : "no-", arg
, new_option
);
3067 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
3068 error_at (loc
, "%<-Werror=%s%>: %<-%s%> is not an option that "
3069 "controls warnings", arg
, new_option
);
3072 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
3073 const char *arg
= NULL
;
3075 if (cl_options
[option_index
].flags
& CL_JOINED
)
3076 arg
= new_option
+ cl_options
[option_index
].opt_len
;
3077 control_warning_option (option_index
, (int) kind
, arg
, value
,
3079 handlers
, opts
, opts_set
, dc
);
3084 /* Return malloced memory for the name of the option OPTION_INDEX
3085 which enabled a diagnostic (context CONTEXT), originally of type
3086 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3090 option_name (diagnostic_context
*context
, int option_index
,
3091 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
3095 /* A warning classified as an error. */
3096 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
3097 && diag_kind
== DK_ERROR
)
3098 return concat (cl_options
[OPT_Werror_
].opt_text
,
3099 /* Skip over "-W". */
3100 cl_options
[option_index
].opt_text
+ 2,
3102 /* A warning with option. */
3104 return xstrdup (cl_options
[option_index
].opt_text
);
3106 /* A warning without option classified as an error. */
3107 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
3108 || diag_kind
== DK_WARNING
)
3109 && context
->warning_as_error_requested
)
3110 return xstrdup (cl_options
[OPT_Werror
].opt_text
);
3115 /* Return malloced memory for a URL describing the option OPTION_INDEX
3116 which enabled a diagnostic (context CONTEXT). */
3119 get_option_url (diagnostic_context
*, int option_index
)
3122 /* DOCUMENTATION_ROOT_URL should be supplied via -D by the Makefile
3123 (see --with-documentation-root-url).
3125 Expect an anchor of the form "index-Wfoo" e.g.
3126 <a name="index-Wformat"></a>, and thus an id within
3127 the URL of "#index-Wformat". */
3128 return concat (DOCUMENTATION_ROOT_URL
,
3129 "Warning-Options.html",
3130 "#index", cl_options
[option_index
].opt_text
,