From 2bf54d93f159210d0c05a07c655eb847c069365c Mon Sep 17 00:00:00 2001 From: Richard Biener Date: Tue, 2 May 2017 12:43:47 +0000 Subject: [PATCH] common.opt (fstrict-overflow): Alias negative to fwrapv. 2017-05-02 Richard Biener * common.opt (fstrict-overflow): Alias negative to fwrapv. * doc/invoke.texi (fstrict-overflow): Remove all traces of -fstrict-overflow documentation. * tree.h (TYPE_OVERFLOW_UNDEFINED): Do not test flag_strict_overflow. (POINTER_TYPE_OVERFLOW_UNDEFINED): Test !flag_wrapv instead of flag_strict_overflow. * ipa-inline.c (can_inline_edge_p): Do not test flag_strict_overflow. * lto-opts.c (lto_write_options): Do not stream it. * lto-wrapper.c (merge_and_complain): Do not handle it. * opts.c (default_options_table): Do not set -fstrict-overflow. (finish_options): Likewise do not clear it when sanitizing. * simplify-rtx.c (simplify_const_relational_operation): Do not test flag_strict_overflow. ada/ * gcc-interface/misc.c (gnat_post_options): Do not set -fstrict-overflow. * c-c++-common/Wlogical-op-1.c: Add -fwrapv to restore previous behavior. * gcc.target/i386/pr46253.c: Make i unsigned to avoid warning. From-SVN: r247495 --- gcc/ChangeLog | 16 ++++++++ gcc/ada/ChangeLog | 5 +++ gcc/ada/gcc-interface/misc.c | 4 -- gcc/common.opt | 4 +- gcc/doc/invoke.texi | 45 +++------------------- gcc/ipa-inline.c | 9 +---- gcc/lto-opts.c | 4 -- gcc/lto-wrapper.c | 2 - gcc/opts.c | 6 +-- gcc/simplify-rtx.c | 4 +- gcc/testsuite/ChangeLog | 6 +++ gcc/testsuite/c-c++-common/Wlogical-op-1.c | 4 +- gcc/testsuite/gcc.target/i386/pr46253.c | 2 +- gcc/tree.h | 4 +- 14 files changed, 44 insertions(+), 71 deletions(-) diff --git a/gcc/ChangeLog b/gcc/ChangeLog index c5e07b56d41..194dbe22b12 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,19 @@ +2017-05-02 Richard Biener + + * common.opt (fstrict-overflow): Alias negative to fwrapv. + * doc/invoke.texi (fstrict-overflow): Remove all traces of + -fstrict-overflow documentation. + * tree.h (TYPE_OVERFLOW_UNDEFINED): Do not test flag_strict_overflow. + (POINTER_TYPE_OVERFLOW_UNDEFINED): Test !flag_wrapv instead of + flag_strict_overflow. + * ipa-inline.c (can_inline_edge_p): Do not test flag_strict_overflow. + * lto-opts.c (lto_write_options): Do not stream it. + * lto-wrapper.c (merge_and_complain): Do not handle it. + * opts.c (default_options_table): Do not set -fstrict-overflow. + (finish_options): Likewise do not clear it when sanitizing. + * simplify-rtx.c (simplify_const_relational_operation): Do not + test flag_strict_overflow. + 2017-05-02 Uros Bizjak * config/alpha/alpha.md (*add3_ieee): Merge to add3 diff --git a/gcc/ada/ChangeLog b/gcc/ada/ChangeLog index 2ddf900f5df..a99a53beafc 100644 --- a/gcc/ada/ChangeLog +++ b/gcc/ada/ChangeLog @@ -1,3 +1,8 @@ +2017-05-02 Richard Biener + + * gcc-interface/misc.c (gnat_post_options): Do not set + -fstrict-overflow. + 2017-05-02 Eric Botcazou * gcc-interface/trans.c (assoc_to_constructor): Make sure diff --git a/gcc/ada/gcc-interface/misc.c b/gcc/ada/gcc-interface/misc.c index 1b6b3eb265a..18c825ca13e 100644 --- a/gcc/ada/gcc-interface/misc.c +++ b/gcc/ada/gcc-interface/misc.c @@ -266,10 +266,6 @@ gnat_post_options (const char **pfilename ATTRIBUTE_UNUSED) if (!global_options_set.x_flag_diagnostics_show_caret) global_dc->show_caret = false; - /* Set strict overflow by default for Ada. */ - if (!global_options_set.x_flag_strict_overflow) - global_options.x_flag_strict_overflow = true; - /* Warn only if STABS is not the default: we don't want to emit a warning if the user did not use a -gstabs option. */ if (PREFERRED_DEBUGGING_TYPE != DBX_DEBUG && write_symbols == DBX_DEBUG) diff --git a/gcc/common.opt b/gcc/common.opt index 437db8e8615..b7ece0c73e1 100644 --- a/gcc/common.opt +++ b/gcc/common.opt @@ -2342,8 +2342,8 @@ Common Report Var(flag_strict_aliasing) Optimization Assume strict aliasing rules apply. fstrict-overflow -Common Report Var(flag_strict_overflow) Optimization -Treat signed overflow as undefined. +Common NegativeAlias Alias(fwrapv) +Treat signed overflow as undefined. Negated as -fwrapv. fsync-libcalls Common Report Var(flag_sync_libcalls) Init(1) diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 1f780640e0c..65308c9d933 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -420,7 +420,7 @@ Objective-C and Objective-C++ Dialects}. -fsplit-paths @gol -fsplit-wide-types -fssa-backprop -fssa-phiopt @gol -fstdarg-opt -fstore-merging -fstrict-aliasing @gol --fstrict-overflow -fthread-jumps -ftracer -ftree-bit-ccp @gol +-fthread-jumps -ftracer -ftree-bit-ccp @gol -ftree-builtin-call-dce -ftree-ccp -ftree-ch @gol -ftree-coalesce-vars -ftree-copy-prop -ftree-dce -ftree-dominator-opts @gol -ftree-dse -ftree-forwprop -ftree-fre -fcode-hoisting @gol @@ -4937,7 +4937,7 @@ Does not warn about incomplete types. @itemx -Wstrict-overflow=@var{n} @opindex Wstrict-overflow @opindex Wno-strict-overflow -This option is only active when @option{-fstrict-overflow} is active. +This option is only active when signed overflow is undefined. It warns about cases where the compiler optimizes based on the assumption that signed overflow does not occur. Note that it does not warn about all cases where the code might overflow: it only warns @@ -4957,7 +4957,7 @@ executed at all. @table @gcctabopt @item -Wstrict-overflow=1 Warn about cases that are both questionable and easy to avoid. For -example, with @option{-fstrict-overflow}, the compiler simplifies +example the compiler simplifies @code{x + 1 > x} to @code{1}. This level of @option{-Wstrict-overflow} is enabled by @option{-Wall}; higher levels are not, and must be explicitly requested. @@ -4965,7 +4965,7 @@ are not, and must be explicitly requested. @item -Wstrict-overflow=2 Also warn about other cases where a comparison is simplified to a constant. For example: @code{abs (x) >= 0}. This can only be -simplified when @option{-fstrict-overflow} is in effect, because +simplified when signed integer overflow is undefined, because @code{abs (INT_MIN)} overflows to @code{INT_MIN}, which is less than zero. @option{-Wstrict-overflow} (with no level) is the same as @option{-Wstrict-overflow=2}. @@ -7113,7 +7113,7 @@ also turns on the following optimization flags: -fsched-interblock -fsched-spec @gol -fschedule-insns -fschedule-insns2 @gol -fstore-merging @gol --fstrict-aliasing -fstrict-overflow @gol +-fstrict-aliasing @gol -ftree-builtin-call-dce @gol -ftree-switch-conversion -ftree-tail-merge @gol -fcode-hoisting @gol @@ -8649,41 +8649,6 @@ int f() @{ The @option{-fstrict-aliasing} option is enabled at levels @option{-O2}, @option{-O3}, @option{-Os}. -@item -fstrict-overflow -@opindex fstrict-overflow -Allow the compiler to assume strict signed overflow rules, depending -on the language being compiled. For C (and C++) this means that -overflow when doing arithmetic with signed numbers is undefined, which -means that the compiler may assume that it does not happen. This -permits various optimizations. For example, the compiler assumes -that an expression like @code{i + 10 > i} is always true for -signed @code{i}. This assumption is only valid if signed overflow is -undefined, as the expression is false if @code{i + 10} overflows when -using twos complement arithmetic. When this option is in effect any -attempt to determine whether an operation on signed numbers -overflows must be written carefully to not actually involve overflow. - -This option also allows the compiler to assume strict pointer -semantics: given a pointer to an object, if adding an offset to that -pointer does not produce a pointer to the same object, the addition is -undefined. This permits the compiler to conclude that @code{p + u > -p} is always true for a pointer @code{p} and unsigned integer -@code{u}. This assumption is only valid because pointer wraparound is -undefined, as the expression is false if @code{p + u} overflows using -twos complement arithmetic. - -See also the @option{-fwrapv} option. Using @option{-fwrapv} means -that integer signed overflow is fully defined: it wraps. When -@option{-fwrapv} is used, there is no difference between -@option{-fstrict-overflow} and @option{-fno-strict-overflow} for -integers. With @option{-fwrapv} certain types of overflow are -permitted. For example, if the compiler gets an overflow when doing -arithmetic on constants, the overflowed value can still be used with -@option{-fwrapv}, but not otherwise. - -The @option{-fstrict-overflow} option is enabled at levels -@option{-O2}, @option{-O3}, @option{-Os}. - @item -falign-functions @itemx -falign-functions=@var{n} @opindex falign-functions diff --git a/gcc/ipa-inline.c b/gcc/ipa-inline.c index dedacc9df68..2be02b627c2 100644 --- a/gcc/ipa-inline.c +++ b/gcc/ipa-inline.c @@ -404,14 +404,7 @@ can_inline_edge_p (struct cgraph_edge *e, bool report, /* There are some options that change IL semantics which means we cannot inline in these cases for correctness reason. Not even for always_inline declared functions. */ - /* Strictly speaking only when the callee contains signed integer - math where overflow is undefined. */ - else if ((check_maybe_up (flag_strict_overflow) - /* this flag is set by optimize. Allow inlining across - optimize boundary. */ - && (!opt_for_fn (caller->decl, optimize) - == !opt_for_fn (callee->decl, optimize) || !always_inline)) - || check_match (flag_wrapv) + else if (check_match (flag_wrapv) || check_match (flag_trapv) /* When caller or callee does FP math, be sure FP codegen flags compatible. */ diff --git a/gcc/lto-opts.c b/gcc/lto-opts.c index 65a71b2d0ba..9618bfb318f 100644 --- a/gcc/lto-opts.c +++ b/gcc/lto-opts.c @@ -133,10 +133,6 @@ lto_write_options (void) if (!global_options_set.x_flag_trapv && !global_options.x_flag_trapv) append_to_collect_gcc_options (&temporary_obstack, &first_p, "-fno-trapv"); - if (!global_options_set.x_flag_strict_overflow - && !global_options.x_flag_strict_overflow) - append_to_collect_gcc_options (&temporary_obstack, &first_p, - "-fno-strict-overflow"); if (!global_options_set.x_flag_openmp && !global_options.x_flag_openmp) diff --git a/gcc/lto-wrapper.c b/gcc/lto-wrapper.c index 2c81176913e..4b86f939ca2 100644 --- a/gcc/lto-wrapper.c +++ b/gcc/lto-wrapper.c @@ -258,7 +258,6 @@ merge_and_complain (struct cl_decoded_option **decoded_options, break; case OPT_ftrapv: - case OPT_fstrict_overflow: case OPT_ffp_contract_: /* For selected options we can merge conservatively. */ for (j = 0; j < *decoded_options_count; ++j) @@ -522,7 +521,6 @@ append_compiler_options (obstack *argv_obstack, struct cl_decoded_option *opts, case OPT_fopenacc_dim_: case OPT_fcilkplus: case OPT_ftrapv: - case OPT_fstrict_overflow: case OPT_foffload_abi_: case OPT_O: case OPT_Ofast: diff --git a/gcc/opts.c b/gcc/opts.c index 6ea57af916e..ffedb10f18f 100644 --- a/gcc/opts.c +++ b/gcc/opts.c @@ -496,7 +496,6 @@ static const struct default_options default_options_table[] = { OPT_LEVELS_2_PLUS, OPT_fschedule_insns2, NULL, 1 }, #endif { OPT_LEVELS_2_PLUS, OPT_fstrict_aliasing, NULL, 1 }, - { OPT_LEVELS_2_PLUS, OPT_fstrict_overflow, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_freorder_blocks_algorithm_, NULL, REORDER_BLOCKS_ALGORITHM_STC }, { OPT_LEVELS_2_PLUS, OPT_freorder_functions, NULL, 1 }, @@ -984,10 +983,7 @@ finish_options (struct gcc_options *opts, struct gcc_options *opts_set, /* Aggressive compiler optimizations may cause false negatives. */ if (opts->x_flag_sanitize & ~(SANITIZE_LEAK | SANITIZE_UNREACHABLE)) - { - opts->x_flag_aggressive_loop_optimizations = 0; - opts->x_flag_strict_overflow = 0; - } + opts->x_flag_aggressive_loop_optimizations = 0; /* Enable -fsanitize-address-use-after-scope if address sanitizer is enabled. */ diff --git a/gcc/simplify-rtx.c b/gcc/simplify-rtx.c index ce632aeabb8..b4534197317 100644 --- a/gcc/simplify-rtx.c +++ b/gcc/simplify-rtx.c @@ -5316,7 +5316,7 @@ simplify_const_relational_operation (enum rtx_code code, /* Optimize abs(x) < 0.0. */ if (!HONOR_SNANS (mode) && (!INTEGRAL_MODE_P (mode) - || (!flag_wrapv && !flag_trapv && flag_strict_overflow))) + || (!flag_wrapv && !flag_trapv))) { if (INTEGRAL_MODE_P (mode) && (issue_strict_overflow_warning @@ -5332,7 +5332,7 @@ simplify_const_relational_operation (enum rtx_code code, /* Optimize abs(x) >= 0.0. */ if (!HONOR_NANS (mode) && (!INTEGRAL_MODE_P (mode) - || (!flag_wrapv && !flag_trapv && flag_strict_overflow))) + || (!flag_wrapv && !flag_trapv))) { if (INTEGRAL_MODE_P (mode) && (issue_strict_overflow_warning diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 84f2c309f4c..31020af78bf 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,9 @@ +2017-05-02 Richard Biener + + * c-c++-common/Wlogical-op-1.c: Add -fwrapv to restore previous + behavior. + * gcc.target/i386/pr46253.c: Make i unsigned to avoid warning. + 2017-05-02 Richard Biener PR tree-optimization/80591 diff --git a/gcc/testsuite/c-c++-common/Wlogical-op-1.c b/gcc/testsuite/c-c++-common/Wlogical-op-1.c index c5f992a4007..e89a35a5e8f 100644 --- a/gcc/testsuite/c-c++-common/Wlogical-op-1.c +++ b/gcc/testsuite/c-c++-common/Wlogical-op-1.c @@ -1,6 +1,8 @@ /* PR c/63357 */ /* { dg-do compile } */ -/* { dg-options "-Wlogical-op" } */ +/* For -fwrapv see PR80525, xfailing the subtest isn't possible as it passes + with the C++ FE which doesn't have maybe_const_expr. */ +/* { dg-options "-fwrapv -Wlogical-op" } */ #ifndef __cplusplus # define bool _Bool diff --git a/gcc/testsuite/gcc.target/i386/pr46253.c b/gcc/testsuite/gcc.target/i386/pr46253.c index 93d5f1f18e6..4606c671fe6 100644 --- a/gcc/testsuite/gcc.target/i386/pr46253.c +++ b/gcc/testsuite/gcc.target/i386/pr46253.c @@ -6,7 +6,7 @@ typedef int __m256i __attribute__ ((__vector_size__ (32))); __m256i bar (void); void foo (void) { - int i = 0; + unsigned int i = 0; bar (); __builtin_ia32_vzeroupper (); while (++i); diff --git a/gcc/tree.h b/gcc/tree.h index 3bca90a38a5..5d02dc7a7d4 100644 --- a/gcc/tree.h +++ b/gcc/tree.h @@ -846,7 +846,7 @@ extern void omp_clause_range_check_failed (const_tree, const char *, int, caller decide whether a warning is appropriate or not. */ #define TYPE_OVERFLOW_UNDEFINED(TYPE) \ (!ANY_INTEGRAL_TYPE_CHECK(TYPE)->base.u.bits.unsigned_flag \ - && !flag_wrapv && !flag_trapv && flag_strict_overflow) + && !flag_wrapv && !flag_trapv) /* True if overflow for the given integral type should issue a trap. */ @@ -860,7 +860,7 @@ extern void omp_clause_range_check_failed (const_tree, const char *, int, && (flag_sanitize & SANITIZE_SI_OVERFLOW)) /* True if pointer types have undefined overflow. */ -#define POINTER_TYPE_OVERFLOW_UNDEFINED (flag_strict_overflow) +#define POINTER_TYPE_OVERFLOW_UNDEFINED (!flag_wrapv) /* Nonzero in a VAR_DECL or STRING_CST means assembler code has been written. Nonzero in a FUNCTION_DECL means that the function has been compiled. -- 2.30.2