1 /* Command line option handling.
2 Copyright (C) 2002-2019 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
36 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
38 /* Indexed by enum debug_info_type. */
39 const char *const debug_type_names
[] =
41 "none", "stabs", "dwarf-2", "xcoff", "vms"
44 /* Parse the -femit-struct-debug-detailed option value
45 and set the flag variables. */
47 #define MATCH( prefix, string ) \
48 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
49 ? ((string += sizeof prefix - 1), 1) : 0)
52 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
55 /* various labels for comparison */
56 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
57 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
58 static const char none_lbl
[] = "none", any_lbl
[] = "any";
59 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
61 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
62 /* Default is to apply to as much as possible. */
63 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
67 if (MATCH (dfn_lbl
, spec
))
68 usage
= DINFO_USAGE_DFN
;
69 else if (MATCH (dir_lbl
, spec
))
70 usage
= DINFO_USAGE_DIR_USE
;
71 else if (MATCH (ind_lbl
, spec
))
72 usage
= DINFO_USAGE_IND_USE
;
74 /* Generics or not? */
75 if (MATCH (ord_lbl
, spec
))
77 else if (MATCH (gen_lbl
, spec
))
80 /* What allowable environment? */
81 if (MATCH (none_lbl
, spec
))
82 files
= DINFO_STRUCT_FILE_NONE
;
83 else if (MATCH (any_lbl
, spec
))
84 files
= DINFO_STRUCT_FILE_ANY
;
85 else if (MATCH (sys_lbl
, spec
))
86 files
= DINFO_STRUCT_FILE_SYS
;
87 else if (MATCH (base_lbl
, spec
))
88 files
= DINFO_STRUCT_FILE_BASE
;
91 "argument %qs to %<-femit-struct-debug-detailed%> "
95 /* Effect the specification. */
96 if (usage
== DINFO_USAGE_NUM_ENUMS
)
100 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
101 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
102 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
106 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
107 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
108 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
114 opts
->x_debug_struct_ordinary
[usage
] = files
;
116 opts
->x_debug_struct_generic
[usage
] = files
;
120 set_struct_debug_option (opts
, loc
, spec
+1);
123 /* No more -femit-struct-debug-detailed specifications.
127 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
129 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
130 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
131 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
132 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
134 "%<-femit-struct-debug-detailed=dir:...%> must allow "
135 "at least as much as "
136 "%<-femit-struct-debug-detailed=ind:...%>");
140 /* Strip off a legitimate source ending from the input string NAME of
141 length LEN. Rather than having to know the names used by all of
142 our front ends, we strip off an ending of a period followed by
143 up to fource characters. (C++ uses ".cpp".) */
146 strip_off_ending (char *name
, int len
)
149 for (i
= 2; i
< 5 && len
> i
; i
++)
151 if (name
[len
- i
] == '.')
153 name
[len
- i
] = '\0';
159 /* Find the base name of a path, stripping off both directories and
160 a single final extension. */
162 base_of_path (const char *path
, const char **base_out
)
164 const char *base
= path
;
166 const char *p
= path
;
170 if (IS_DIR_SEPARATOR (c
))
185 /* What to print when a switch has no documentation. */
186 static const char undocumented_msg
[] = N_("This option lacks documentation.");
187 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
189 typedef char *char_p
; /* For DEF_VEC_P. */
191 static void set_debug_level (enum debug_info_type type
, int extended
,
192 const char *arg
, struct gcc_options
*opts
,
193 struct gcc_options
*opts_set
,
195 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
196 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
197 location_t loc
, diagnostic_context
*dc
);
198 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
200 static void enable_warning_as_error (const char *arg
, int value
,
201 unsigned int lang_mask
,
202 const struct cl_option_handlers
*handlers
,
203 struct gcc_options
*opts
,
204 struct gcc_options
*opts_set
,
206 diagnostic_context
*dc
);
208 /* Handle a back-end option; arguments and return value as for
212 target_handle_option (struct gcc_options
*opts
,
213 struct gcc_options
*opts_set
,
214 const struct cl_decoded_option
*decoded
,
215 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
217 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
218 diagnostic_context
*dc
, void (*) (void))
220 gcc_assert (dc
== global_dc
);
221 gcc_assert (kind
== DK_UNSPECIFIED
);
222 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
225 /* Add comma-separated strings to a char_p vector. */
228 add_comma_separated_to_vector (void **pvec
, const char *arg
)
234 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
236 vec_check_alloc (v
, 1);
238 /* We never free this string. */
251 v
->safe_push (token_start
);
254 if (*r
== '\\' && r
[1] == ',')
264 if (*token_start
!= '\0')
265 v
->safe_push (token_start
);
270 /* Initialize opts_obstack. */
273 init_opts_obstack (void)
275 gcc_obstack_init (&opts_obstack
);
278 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
281 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
283 /* Ensure that opts_obstack has already been initialized by the time
284 that we initialize any gcc_options instances (PR jit/68446). */
285 gcc_assert (opts_obstack
.chunk_size
> 0);
287 *opts
= global_options_init
;
290 memset (opts_set
, 0, sizeof (*opts_set
));
292 /* Initialize whether `char' is signed. */
293 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
294 /* Set this to a special "uninitialized" value. The actual default
295 is set after target options have been processed. */
296 opts
->x_flag_short_enums
= 2;
298 /* Initialize target_flags before default_options_optimization
299 so the latter can modify it. */
300 opts
->x_target_flags
= targetm_common
.default_target_flags
;
302 /* Some targets have ABI-specified unwind tables. */
303 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
305 /* Some targets have other target-specific initialization. */
306 targetm_common
.option_init_struct (opts
);
309 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
310 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
311 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
312 mask LANG_MASK and option handlers HANDLERS. */
315 maybe_default_option (struct gcc_options
*opts
,
316 struct gcc_options
*opts_set
,
317 const struct default_options
*default_opt
,
318 int level
, bool size
, bool fast
, bool debug
,
319 unsigned int lang_mask
,
320 const struct cl_option_handlers
*handlers
,
322 diagnostic_context
*dc
)
324 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
328 gcc_assert (level
== 2);
330 gcc_assert (level
== 3);
332 gcc_assert (level
== 1);
334 switch (default_opt
->levels
)
340 case OPT_LEVELS_0_ONLY
:
341 enabled
= (level
== 0);
344 case OPT_LEVELS_1_PLUS
:
345 enabled
= (level
>= 1);
348 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
349 enabled
= (level
>= 1 && !size
&& !debug
);
352 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
353 enabled
= (level
>= 1 && !debug
);
356 case OPT_LEVELS_2_PLUS
:
357 enabled
= (level
>= 2);
360 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
361 enabled
= (level
>= 2 && !size
&& !debug
);
364 case OPT_LEVELS_3_PLUS
:
365 enabled
= (level
>= 3);
368 case OPT_LEVELS_3_PLUS_AND_SIZE
:
369 enabled
= (level
>= 3 || size
);
372 case OPT_LEVELS_SIZE
:
376 case OPT_LEVELS_FAST
:
380 case OPT_LEVELS_NONE
:
386 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
387 default_opt
->arg
, default_opt
->value
,
388 lang_mask
, DK_UNSPECIFIED
, loc
,
390 else if (default_opt
->arg
== NULL
391 && !option
->cl_reject_negative
392 && !(option
->flags
& CL_PARAMS
))
393 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
394 default_opt
->arg
, !default_opt
->value
,
395 lang_mask
, DK_UNSPECIFIED
, loc
,
399 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
400 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
401 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
402 language mask LANG_MASK and option handlers HANDLERS. */
405 maybe_default_options (struct gcc_options
*opts
,
406 struct gcc_options
*opts_set
,
407 const struct default_options
*default_opts
,
408 int level
, bool size
, bool fast
, bool debug
,
409 unsigned int lang_mask
,
410 const struct cl_option_handlers
*handlers
,
412 diagnostic_context
*dc
)
416 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
417 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
418 level
, size
, fast
, debug
,
419 lang_mask
, handlers
, loc
, dc
);
422 /* Table of options enabled by default at different levels.
423 Please keep this list sorted by level and alphabetized within
424 each level; this makes it easier to keep the documentation
427 static const struct default_options default_options_table
[] =
429 /* -O1 and -Og optimizations. */
430 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
431 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
432 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
433 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
434 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
435 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
436 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
437 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
438 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
439 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference_addressable
, NULL
, 1 },
440 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
441 { OPT_LEVELS_1_PLUS
, OPT_fomit_frame_pointer
, NULL
, 1 },
442 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
443 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
444 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
445 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
446 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
447 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
448 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
449 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
450 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
451 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
452 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
453 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
454 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
455 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
457 /* -O1 (and not -Og) optimizations. */
458 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
460 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdelayed_branch
, NULL
, 1 },
462 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdse
, NULL
, 1 },
463 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
464 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
465 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
466 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
467 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
468 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
469 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_dse
, NULL
, 1 },
470 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
471 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
473 /* -O2 and -Os optimizations. */
474 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
475 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
476 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
477 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
478 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
479 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
480 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
481 { OPT_LEVELS_2_PLUS
, OPT_ffinite_loops
, NULL
, 1 },
482 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
483 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
484 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
485 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
486 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
487 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
488 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
489 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
490 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
491 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
492 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
493 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
494 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
495 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
496 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
497 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
498 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
499 #ifdef INSN_SCHEDULING
500 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
502 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
503 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
504 { OPT_LEVELS_2_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
505 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
506 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
507 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
508 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
509 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_CHEAP
},
510 { OPT_LEVELS_2_PLUS
, OPT_finline_functions
, NULL
, 1 },
511 { OPT_LEVELS_2_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
513 /* -O2 and above optimizations, but not -Os or -Og. */
514 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_functions
, NULL
, 1 },
515 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_jumps
, NULL
, 1 },
516 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_labels
, NULL
, 1 },
517 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_loops
, NULL
, 1 },
518 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
519 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
520 REORDER_BLOCKS_ALGORITHM_STC
},
521 #ifdef INSN_SCHEDULING
522 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
523 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
526 /* -O3 and -Os optimizations. */
528 /* -O3 optimizations. */
529 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
530 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
531 { OPT_LEVELS_3_PLUS
, OPT_floop_interchange
, NULL
, 1 },
532 { OPT_LEVELS_3_PLUS
, OPT_floop_unroll_and_jam
, NULL
, 1 },
533 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
534 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
535 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
536 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
537 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
538 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_vectorize
, NULL
, 1 },
539 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
540 { OPT_LEVELS_3_PLUS
, OPT_ftree_slp_vectorize
, NULL
, 1 },
541 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
542 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
543 { OPT_LEVELS_3_PLUS
, OPT_fversion_loops_for_strides
, NULL
, 1 },
545 /* -O3 parameters. */
546 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_auto_
, NULL
, 30 },
547 { OPT_LEVELS_3_PLUS
, OPT__param_early_inlining_insns_
, NULL
, 14 },
548 { OPT_LEVELS_3_PLUS
, OPT__param_inline_heuristics_hint_percent_
, NULL
, 600 },
549 { OPT_LEVELS_3_PLUS
, OPT__param_inline_min_speedup_
, NULL
, 15 },
550 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_single_
, NULL
, 200 },
552 /* -Ofast adds optimizations to -O3. */
553 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
554 { OPT_LEVELS_FAST
, OPT_fallow_store_data_races
, NULL
, 1 },
556 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
559 /* Default the options in OPTS and OPTS_SET based on the optimization
560 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
562 default_options_optimization (struct gcc_options
*opts
,
563 struct gcc_options
*opts_set
,
564 struct cl_decoded_option
*decoded_options
,
565 unsigned int decoded_options_count
,
567 unsigned int lang_mask
,
568 const struct cl_option_handlers
*handlers
,
569 diagnostic_context
*dc
)
573 bool openacc_mode
= false;
575 /* Scan to see what optimization level has been specified. That will
576 determine the default value of many flags. */
577 for (i
= 1; i
< decoded_options_count
; i
++)
579 struct cl_decoded_option
*opt
= &decoded_options
[i
];
580 switch (opt
->opt_index
)
583 if (*opt
->arg
== '\0')
585 opts
->x_optimize
= 1;
586 opts
->x_optimize_size
= 0;
587 opts
->x_optimize_fast
= 0;
588 opts
->x_optimize_debug
= 0;
592 const int optimize_val
= integral_argument (opt
->arg
);
593 if (optimize_val
== -1)
594 error_at (loc
, "argument to %<-O%> should be a non-negative "
595 "integer, %<g%>, %<s%> or %<fast%>");
598 opts
->x_optimize
= optimize_val
;
599 if ((unsigned int) opts
->x_optimize
> 255)
600 opts
->x_optimize
= 255;
601 opts
->x_optimize_size
= 0;
602 opts
->x_optimize_fast
= 0;
603 opts
->x_optimize_debug
= 0;
609 opts
->x_optimize_size
= 1;
611 /* Optimizing for size forces optimize to be 2. */
612 opts
->x_optimize
= 2;
613 opts
->x_optimize_fast
= 0;
614 opts
->x_optimize_debug
= 0;
618 /* -Ofast only adds flags to -O3. */
619 opts
->x_optimize_size
= 0;
620 opts
->x_optimize
= 3;
621 opts
->x_optimize_fast
= 1;
622 opts
->x_optimize_debug
= 0;
626 /* -Og selects optimization level 1. */
627 opts
->x_optimize_size
= 0;
628 opts
->x_optimize
= 1;
629 opts
->x_optimize_fast
= 0;
630 opts
->x_optimize_debug
= 1;
639 /* Ignore other options in this prescan. */
644 maybe_default_options (opts
, opts_set
, default_options_table
,
645 opts
->x_optimize
, opts
->x_optimize_size
,
646 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
647 lang_mask
, handlers
, loc
, dc
);
649 /* -O2 param settings. */
650 opt2
= (opts
->x_optimize
>= 2);
653 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_pta
, true);
655 /* Track fields in field-sensitive alias analysis. */
657 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_fields_for_field_sensitive
,
660 if (opts
->x_optimize_size
)
661 /* We want to crossjump as much as possible. */
662 SET_OPTION_IF_UNSET (opts
, opts_set
, param_min_crossjump_insns
, 1);
664 /* Restrict the amount of work combine does at -Og while retaining
665 most of its useful transforms. */
666 if (opts
->x_optimize_debug
)
667 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_combine_insns
, 2);
669 /* Allow default optimizations to be specified on a per-machine basis. */
670 maybe_default_options (opts
, opts_set
,
671 targetm_common
.option_optimization_table
,
672 opts
->x_optimize
, opts
->x_optimize_size
,
673 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
674 lang_mask
, handlers
, loc
, dc
);
677 /* Control IPA optimizations based on different live patching LEVEL. */
679 control_options_for_live_patching (struct gcc_options
*opts
,
680 struct gcc_options
*opts_set
,
681 enum live_patching_level level
,
684 gcc_assert (level
> LIVE_PATCHING_NONE
);
688 case LIVE_PATCHING_INLINE_ONLY_STATIC
:
689 if (opts_set
->x_flag_ipa_cp_clone
&& opts
->x_flag_ipa_cp_clone
)
691 "%<-fipa-cp-clone%> is incompatible with "
692 "%<-flive-patching=inline-only-static%>");
694 opts
->x_flag_ipa_cp_clone
= 0;
696 if (opts_set
->x_flag_ipa_sra
&& opts
->x_flag_ipa_sra
)
698 "%<-fipa-sra%> is incompatible with "
699 "%<-flive-patching=inline-only-static%>");
701 opts
->x_flag_ipa_sra
= 0;
703 if (opts_set
->x_flag_partial_inlining
&& opts
->x_flag_partial_inlining
)
705 "%<-fpartial-inlining%> is incompatible with "
706 "%<-flive-patching=inline-only-static%>");
708 opts
->x_flag_partial_inlining
= 0;
710 if (opts_set
->x_flag_ipa_cp
&& opts
->x_flag_ipa_cp
)
712 "%<-fipa-cp%> is incompatible with "
713 "%<-flive-patching=inline-only-static%>");
715 opts
->x_flag_ipa_cp
= 0;
718 case LIVE_PATCHING_INLINE_CLONE
:
719 /* live patching should disable whole-program optimization. */
720 if (opts_set
->x_flag_whole_program
&& opts
->x_flag_whole_program
)
722 "%<-fwhole-program%> is incompatible with "
723 "%<-flive-patching=inline-only-static|inline-clone%>");
725 opts
->x_flag_whole_program
= 0;
727 /* visibility change should be excluded by !flag_whole_program
728 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
729 && !flag_partial_inlining. */
731 if (opts_set
->x_flag_ipa_pta
&& opts
->x_flag_ipa_pta
)
733 "%<-fipa-pta%> is incompatible with "
734 "%<-flive-patching=inline-only-static|inline-clone%>");
736 opts
->x_flag_ipa_pta
= 0;
738 if (opts_set
->x_flag_ipa_reference
&& opts
->x_flag_ipa_reference
)
740 "%<-fipa-reference%> is incompatible with "
741 "%<-flive-patching=inline-only-static|inline-clone%>");
743 opts
->x_flag_ipa_reference
= 0;
745 if (opts_set
->x_flag_ipa_ra
&& opts
->x_flag_ipa_ra
)
747 "%<-fipa-ra%> is incompatible with "
748 "%<-flive-patching=inline-only-static|inline-clone%>");
750 opts
->x_flag_ipa_ra
= 0;
752 if (opts_set
->x_flag_ipa_icf
&& opts
->x_flag_ipa_icf
)
754 "%<-fipa-icf%> is incompatible with "
755 "%<-flive-patching=inline-only-static|inline-clone%>");
757 opts
->x_flag_ipa_icf
= 0;
759 if (opts_set
->x_flag_ipa_icf_functions
&& opts
->x_flag_ipa_icf_functions
)
761 "%<-fipa-icf-functions%> is incompatible with "
762 "%<-flive-patching=inline-only-static|inline-clone%>");
764 opts
->x_flag_ipa_icf_functions
= 0;
766 if (opts_set
->x_flag_ipa_icf_variables
&& opts
->x_flag_ipa_icf_variables
)
768 "%<-fipa-icf-variables%> is incompatible with "
769 "%<-flive-patching=inline-only-static|inline-clone%>");
771 opts
->x_flag_ipa_icf_variables
= 0;
773 if (opts_set
->x_flag_ipa_bit_cp
&& opts
->x_flag_ipa_bit_cp
)
775 "%<-fipa-bit-cp%> is incompatible with "
776 "%<-flive-patching=inline-only-static|inline-clone%>");
778 opts
->x_flag_ipa_bit_cp
= 0;
780 if (opts_set
->x_flag_ipa_vrp
&& opts
->x_flag_ipa_vrp
)
782 "%<-fipa-vrp%> is incompatible with "
783 "%<-flive-patching=inline-only-static|inline-clone%>");
785 opts
->x_flag_ipa_vrp
= 0;
787 if (opts_set
->x_flag_ipa_pure_const
&& opts
->x_flag_ipa_pure_const
)
789 "%<-fipa-pure-const%> is incompatible with "
790 "%<-flive-patching=inline-only-static|inline-clone%>");
792 opts
->x_flag_ipa_pure_const
= 0;
794 /* FIXME: disable unreachable code removal. */
796 /* discovery of functions/variables with no address taken. */
797 if (opts_set
->x_flag_ipa_reference_addressable
798 && opts
->x_flag_ipa_reference_addressable
)
800 "%<-fipa-reference-addressable%> is incompatible with "
801 "%<-flive-patching=inline-only-static|inline-clone%>");
803 opts
->x_flag_ipa_reference_addressable
= 0;
805 /* ipa stack alignment propagation. */
806 if (opts_set
->x_flag_ipa_stack_alignment
807 && opts
->x_flag_ipa_stack_alignment
)
809 "%<-fipa-stack-alignment%> is incompatible with "
810 "%<-flive-patching=inline-only-static|inline-clone%>");
812 opts
->x_flag_ipa_stack_alignment
= 0;
819 /* --help option argument if set. */
820 vec
<const char *> help_option_arguments
;
823 /* After all options at LOC have been read into OPTS and OPTS_SET,
824 finalize settings of those options and diagnose incompatible
827 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
830 enum unwind_info_type ui_except
;
832 if (opts
->x_dump_base_name
833 && ! opts
->x_dump_base_name_prefixed
)
835 const char *sep
= opts
->x_dump_base_name
;
838 if (IS_DIR_SEPARATOR (*sep
))
842 /* If dump_base_path contains subdirectories, don't prepend
844 else if (opts
->x_dump_dir_name
)
845 /* We have a DUMP_DIR_NAME, prepend that. */
846 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
847 opts
->x_dump_base_name
, NULL
);
848 else if (opts
->x_aux_base_name
849 && strcmp (opts
->x_aux_base_name
, HOST_BIT_BUCKET
) != 0)
850 /* AUX_BASE_NAME is set and is not the bit bucket. If it
851 contains a directory component, prepend those directories.
852 Typically this places things in the same directory as the
855 const char *aux_base
;
857 base_of_path (opts
->x_aux_base_name
, &aux_base
);
858 if (opts
->x_aux_base_name
!= aux_base
)
860 int dir_len
= aux_base
- opts
->x_aux_base_name
;
861 char *new_dump_base_name
862 = XOBNEWVEC (&opts_obstack
, char,
863 strlen (opts
->x_dump_base_name
) + dir_len
+ 1);
865 /* Copy directory component from OPTS->X_AUX_BASE_NAME. */
866 memcpy (new_dump_base_name
, opts
->x_aux_base_name
, dir_len
);
867 /* Append existing OPTS->X_DUMP_BASE_NAME. */
868 strcpy (new_dump_base_name
+ dir_len
, opts
->x_dump_base_name
);
869 opts
->x_dump_base_name
= new_dump_base_name
;
873 /* It is definitely prefixed now. */
874 opts
->x_dump_base_name_prefixed
= true;
877 /* Handle related options for unit-at-a-time, toplevel-reorder, and
879 if (!opts
->x_flag_unit_at_a_time
)
881 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
882 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
884 opts
->x_flag_section_anchors
= 0;
885 if (opts
->x_flag_toplevel_reorder
== 1)
886 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
888 opts
->x_flag_toplevel_reorder
= 0;
891 /* -fself-test depends on the state of the compiler prior to
892 compiling anything. Ideally it should be run on an empty source
893 file. However, in case we get run with actual source, assume
894 -fsyntax-only which will inhibit any compiler initialization
895 which may confuse the self tests. */
896 if (opts
->x_flag_self_test
)
897 opts
->x_flag_syntax_only
= 1;
899 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
900 sorry ("transactional memory is not supported with non-call exceptions");
902 /* Unless the user has asked for section anchors, we disable toplevel
903 reordering at -O0 to disable transformations that might be surprising
904 to end users and to get -fno-toplevel-reorder tested. */
905 if (!opts
->x_optimize
906 && opts
->x_flag_toplevel_reorder
== 2
907 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
909 opts
->x_flag_toplevel_reorder
= 0;
910 opts
->x_flag_section_anchors
= 0;
912 if (!opts
->x_flag_toplevel_reorder
)
914 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
915 error_at (loc
, "section anchors must be disabled when toplevel reorder"
917 opts
->x_flag_section_anchors
= 0;
920 if (!opts
->x_flag_opts_finished
)
922 /* We initialize opts->x_flag_pie to -1 so that targets can set a
924 if (opts
->x_flag_pie
== -1)
926 /* We initialize opts->x_flag_pic to -1 so that we can tell if
927 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
928 if (opts
->x_flag_pic
== -1)
929 opts
->x_flag_pie
= DEFAULT_FLAG_PIE
;
931 opts
->x_flag_pie
= 0;
933 /* If -fPIE or -fpie is used, turn on PIC. */
934 if (opts
->x_flag_pie
)
935 opts
->x_flag_pic
= opts
->x_flag_pie
;
936 else if (opts
->x_flag_pic
== -1)
937 opts
->x_flag_pic
= 0;
938 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
939 opts
->x_flag_shlib
= 1;
940 opts
->x_flag_opts_finished
= true;
943 /* We initialize opts->x_flag_stack_protect to -1 so that targets
944 can set a default value. */
945 if (opts
->x_flag_stack_protect
== -1)
946 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
948 if (opts
->x_optimize
== 0)
950 /* Inlining does not work if not optimizing,
951 so force it not to be done. */
952 opts
->x_warn_inline
= 0;
953 opts
->x_flag_no_inline
= 1;
956 /* The optimization to partition hot and cold basic blocks into separate
957 sections of the .o and executable files does not work (currently)
958 with exception handling. This is because there is no support for
959 generating unwind info. If opts->x_flag_exceptions is turned on
960 we need to turn off the partitioning optimization. */
962 ui_except
= targetm_common
.except_unwind_info (opts
);
964 if (opts
->x_flag_exceptions
965 && opts
->x_flag_reorder_blocks_and_partition
966 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
968 if (opts_set
->x_flag_reorder_blocks_and_partition
)
970 "%<-freorder-blocks-and-partition%> does not work "
971 "with exceptions on this architecture");
972 opts
->x_flag_reorder_blocks_and_partition
= 0;
973 opts
->x_flag_reorder_blocks
= 1;
976 /* If user requested unwind info, then turn off the partitioning
979 if (opts
->x_flag_unwind_tables
980 && !targetm_common
.unwind_tables_default
981 && opts
->x_flag_reorder_blocks_and_partition
982 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
984 if (opts_set
->x_flag_reorder_blocks_and_partition
)
986 "%<-freorder-blocks-and-partition%> does not support "
987 "unwind info on this architecture");
988 opts
->x_flag_reorder_blocks_and_partition
= 0;
989 opts
->x_flag_reorder_blocks
= 1;
992 /* If the target requested unwind info, then turn off the partitioning
993 optimization with a different message. Likewise, if the target does not
994 support named sections. */
996 if (opts
->x_flag_reorder_blocks_and_partition
997 && (!targetm_common
.have_named_sections
998 || (opts
->x_flag_unwind_tables
999 && targetm_common
.unwind_tables_default
1000 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
1002 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1004 "%<-freorder-blocks-and-partition%> does not work "
1005 "on this architecture");
1006 opts
->x_flag_reorder_blocks_and_partition
= 0;
1007 opts
->x_flag_reorder_blocks
= 1;
1011 /* Pipelining of outer loops is only possible when general pipelining
1012 capabilities are requested. */
1013 if (!opts
->x_flag_sel_sched_pipelining
)
1014 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
1016 if (opts
->x_flag_conserve_stack
)
1018 SET_OPTION_IF_UNSET (opts
, opts_set
, param_large_stack_frame
, 100);
1019 SET_OPTION_IF_UNSET (opts
, opts_set
, param_stack_frame_growth
, 40);
1022 if (opts
->x_flag_lto
)
1025 opts
->x_flag_generate_lto
= 1;
1027 /* When generating IL, do not operate in whole-program mode.
1028 Otherwise, symbols will be privatized too early, causing link
1030 opts
->x_flag_whole_program
= 0;
1032 error_at (loc
, "LTO support has not been enabled in this configuration");
1034 if (!opts
->x_flag_fat_lto_objects
1035 && (!HAVE_LTO_PLUGIN
1036 || (opts_set
->x_flag_use_linker_plugin
1037 && !opts
->x_flag_use_linker_plugin
)))
1039 if (opts_set
->x_flag_fat_lto_objects
)
1040 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
1042 opts
->x_flag_fat_lto_objects
= 1;
1045 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1046 if (opts
->x_dwarf_split_debug_info
)
1048 inform (loc
, "%<-gsplit-dwarf%> is not supported with LTO,"
1050 opts
->x_dwarf_split_debug_info
= 0;
1054 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1055 default value if they choose based on other options. */
1056 if (opts
->x_flag_split_stack
== -1)
1057 opts
->x_flag_split_stack
= 0;
1058 else if (opts
->x_flag_split_stack
)
1060 if (!targetm_common
.supports_split_stack (true, opts
))
1062 error_at (loc
, "%<-fsplit-stack%> is not supported by "
1063 "this compiler configuration");
1064 opts
->x_flag_split_stack
= 0;
1068 /* If stack splitting is turned on, and the user did not explicitly
1069 request function partitioning, turn off partitioning, as it
1070 confuses the linker when trying to handle partitioned split-stack
1071 code that calls a non-split-stack functions. But if partitioning
1072 was turned on explicitly just hope for the best. */
1073 if (opts
->x_flag_split_stack
1074 && opts
->x_flag_reorder_blocks_and_partition
)
1075 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_blocks_and_partition
, 0);
1077 if (opts
->x_flag_reorder_blocks_and_partition
)
1078 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_functions
, 1);
1080 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1081 if (opts
->x_dwarf_split_debug_info
)
1082 opts
->x_debug_generate_pub_sections
= 2;
1084 if ((opts
->x_flag_sanitize
1085 & (SANITIZE_USER_ADDRESS
| SANITIZE_KERNEL_ADDRESS
)) == 0)
1087 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_COMPARE
)
1089 "%<-fsanitize=pointer-compare%> must be combined with "
1090 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1091 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_SUBTRACT
)
1093 "%<-fsanitize=pointer-subtract%> must be combined with "
1094 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1097 /* Userspace and kernel ASan conflict with each other. */
1098 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1099 && (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
))
1101 "%<-fsanitize=address%> is incompatible with "
1102 "%<-fsanitize=kernel-address%>");
1104 /* And with TSan. */
1105 if ((opts
->x_flag_sanitize
& SANITIZE_ADDRESS
)
1106 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1108 "%<-fsanitize=address%> and %<-fsanitize=kernel-address%> "
1109 "are incompatible with %<-fsanitize=thread%>");
1111 if ((opts
->x_flag_sanitize
& SANITIZE_LEAK
)
1112 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
1114 "%<-fsanitize=leak%> is incompatible with %<-fsanitize=thread%>");
1116 /* Check error recovery for -fsanitize-recover option. */
1117 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1118 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
1119 && !sanitizer_opts
[i
].can_recover
)
1120 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
1121 sanitizer_opts
[i
].name
);
1123 /* When instrumenting the pointers, we don't want to remove
1124 the null pointer checks. */
1125 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
1126 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
1127 opts
->x_flag_delete_null_pointer_checks
= 0;
1129 /* Aggressive compiler optimizations may cause false negatives. */
1130 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
1131 opts
->x_flag_aggressive_loop_optimizations
= 0;
1133 /* Enable -fsanitize-address-use-after-scope if address sanitizer is
1135 if (opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
1136 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_sanitize_address_use_after_scope
,
1139 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1141 if (opts
->x_flag_sanitize_address_use_after_scope
)
1143 if (opts
->x_flag_stack_reuse
!= SR_NONE
1144 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1146 "%<-fsanitize-address-use-after-scope%> requires "
1147 "%<-fstack-reuse=none%> option");
1149 opts
->x_flag_stack_reuse
= SR_NONE
;
1152 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1153 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1155 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1156 sorry ("transactional memory is not supported with "
1157 "%<-fsanitize=kernel-address%>");
1159 /* Currently live patching is not support for LTO. */
1160 if (opts
->x_flag_live_patching
&& opts
->x_flag_lto
)
1161 sorry ("live patching is not supported with LTO");
1163 /* Currently vtable verification is not supported for LTO */
1164 if (opts
->x_flag_vtable_verify
&& opts
->x_flag_lto
)
1165 sorry ("vtable verification is not supported with LTO");
1167 /* Control IPA optimizations based on different -flive-patching level. */
1168 if (opts
->x_flag_live_patching
)
1170 control_options_for_live_patching (opts
, opts_set
,
1171 opts
->x_flag_live_patching
,
1176 #define LEFT_COLUMN 27
1178 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1179 followed by word-wrapped HELP in a second column. */
1181 wrap_help (const char *help
,
1183 unsigned int item_width
,
1184 unsigned int columns
)
1186 unsigned int col_width
= LEFT_COLUMN
;
1187 unsigned int remaining
, room
, len
;
1189 remaining
= strlen (help
);
1193 room
= columns
- 3 - MAX (col_width
, item_width
);
1202 for (i
= 0; help
[i
]; i
++)
1204 if (i
>= room
&& len
!= remaining
)
1208 else if ((help
[i
] == '-' || help
[i
] == '/')
1209 && help
[i
+ 1] != ' '
1210 && i
> 0 && ISALPHA (help
[i
- 1]))
1215 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1217 while (help
[len
] == ' ')
1225 /* Data structure used to print list of valid option values. */
1227 class option_help_tuple
1230 option_help_tuple (int code
, vec
<const char *> values
):
1231 m_code (code
), m_values (values
)
1234 /* Code of an option. */
1237 /* List of possible values. */
1238 vec
<const char *> m_values
;
1241 /* Print help for a specific front-end, etc. */
1243 print_filtered_help (unsigned int include_flags
,
1244 unsigned int exclude_flags
,
1245 unsigned int any_flags
,
1246 unsigned int columns
,
1247 struct gcc_options
*opts
,
1248 unsigned int lang_mask
)
1253 bool displayed
= false;
1256 if (!opts
->x_help_printed
)
1257 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1259 if (!opts
->x_help_enum_printed
)
1260 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1262 auto_vec
<option_help_tuple
> help_tuples
;
1264 for (i
= 0; i
< cl_options_count
; i
++)
1266 const struct cl_option
*option
= cl_options
+ i
;
1271 if (include_flags
== 0
1272 || ((option
->flags
& include_flags
) != include_flags
))
1274 if ((option
->flags
& any_flags
) == 0)
1278 /* Skip unwanted switches. */
1279 if ((option
->flags
& exclude_flags
) != 0)
1282 /* The driver currently prints its own help text. */
1283 if ((option
->flags
& CL_DRIVER
) != 0
1284 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1285 | CL_COMMON
| CL_TARGET
)) == 0)
1289 /* Skip switches that have already been printed. */
1290 if (opts
->x_help_printed
[i
])
1293 opts
->x_help_printed
[i
] = true;
1295 help
= option
->help
;
1298 if (exclude_flags
& CL_UNDOCUMENTED
)
1301 help
= undocumented_msg
;
1304 if (option
->alias_target
< N_OPTS
1305 && cl_options
[option
->alias_target
].help
)
1307 if (help
== undocumented_msg
)
1309 /* For undocumented options that are aliases for other options
1310 that are documented, point the reader to the other option in
1311 preference of the former. */
1312 snprintf (new_help
, sizeof new_help
,
1313 _("Same as %s. Use the latter option instead."),
1314 cl_options
[option
->alias_target
].opt_text
);
1318 /* For documented options with aliases, mention the aliased
1319 option's name for reference. */
1320 snprintf (new_help
, sizeof new_help
,
1321 _("%s Same as %s."),
1322 help
, cl_options
[option
->alias_target
].opt_text
);
1328 if (option
->warn_message
)
1330 /* Mention that the use of the option will trigger a warning. */
1331 if (help
== new_help
)
1332 snprintf (new_help
+ strlen (new_help
),
1333 sizeof new_help
- strlen (new_help
),
1334 " %s", _(use_diagnosed_msg
));
1336 snprintf (new_help
, sizeof new_help
,
1337 "%s %s", help
, _(use_diagnosed_msg
));
1342 /* Get the translation. */
1345 /* Find the gap between the name of the
1346 option and its descriptive text. */
1347 tab
= strchr (help
, '\t');
1356 opt
= option
->opt_text
;
1360 /* With the -Q option enabled we change the descriptive text associated
1361 with an option to be an indication of its current setting. */
1362 if (!opts
->x_quiet_flag
)
1364 void *flag_var
= option_flag_var (i
, opts
);
1366 if (len
< (LEFT_COLUMN
+ 2))
1367 strcpy (new_help
, "\t\t");
1369 strcpy (new_help
, "\t");
1371 /* Set to print whether the option is enabled or disabled,
1372 or, if it's an alias for another option, the name of
1373 the aliased option. */
1374 bool print_state
= false;
1376 if (flag_var
!= NULL
1377 && option
->var_type
!= CLVC_DEFER
)
1379 /* If OPTION is only available for a specific subset
1380 of languages other than this one, mention them. */
1381 bool avail_for_lang
= true;
1382 if (unsigned langset
= option
->flags
& CL_LANG_ALL
)
1384 if (!(langset
& lang_mask
))
1386 avail_for_lang
= false;
1387 strcat (new_help
, _("[available in "));
1388 for (unsigned i
= 0, n
= 0; (1U << i
) < CL_LANG_ALL
; ++i
)
1389 if (langset
& (1U << i
))
1392 strcat (new_help
, ", ");
1393 strcat (new_help
, lang_names
[i
]);
1395 strcat (new_help
, "]");
1398 if (!avail_for_lang
)
1399 ; /* Print nothing else if the option is not available
1400 in the current language. */
1401 else if (option
->flags
& CL_JOINED
)
1403 if (option
->var_type
== CLVC_STRING
)
1405 if (* (const char **) flag_var
!= NULL
)
1406 snprintf (new_help
+ strlen (new_help
),
1407 sizeof (new_help
) - strlen (new_help
),
1408 "%s", * (const char **) flag_var
);
1410 else if (option
->var_type
== CLVC_ENUM
)
1412 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1414 const char *arg
= NULL
;
1416 value
= e
->get (flag_var
);
1417 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1419 arg
= _("[default]");
1420 snprintf (new_help
+ strlen (new_help
),
1421 sizeof (new_help
) - strlen (new_help
),
1426 if (option
->cl_host_wide_int
)
1427 sprintf (new_help
+ strlen (new_help
),
1428 _("%llu bytes"), (unsigned long long)
1429 *(unsigned HOST_WIDE_INT
*) flag_var
);
1431 sprintf (new_help
+ strlen (new_help
),
1432 "%i", * (int *) flag_var
);
1439 /* When there is no argument, print the option state only
1440 if the option takes no argument. */
1441 print_state
= !(option
->flags
& CL_JOINED
);
1445 if (option
->alias_target
< N_OPTS
1446 && option
->alias_target
!= OPT_SPECIAL_warn_removed
1447 && option
->alias_target
!= OPT_SPECIAL_ignore
1448 && option
->alias_target
!= OPT_SPECIAL_input_file
1449 && option
->alias_target
!= OPT_SPECIAL_program_name
1450 && option
->alias_target
!= OPT_SPECIAL_unknown
)
1452 const struct cl_option
*target
1453 = &cl_options
[option
->alias_target
];
1454 sprintf (new_help
+ strlen (new_help
), "%s%s",
1456 option
->alias_arg
? option
->alias_arg
: "");
1458 else if (option
->alias_target
== OPT_SPECIAL_ignore
)
1459 strcat (new_help
, ("[ignored]"));
1462 /* Print the state for an on/off option. */
1463 int ena
= option_enabled (i
, lang_mask
, opts
);
1465 strcat (new_help
, _("[enabled]"));
1467 strcat (new_help
, _("[disabled]"));
1474 if (option
->range_max
!= -1)
1477 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1479 opt
= concat (opt
, b
, NULL
);
1483 wrap_help (help
, opt
, len
, columns
);
1486 if (option
->var_type
== CLVC_ENUM
1487 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1488 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1491 vec
<const char *> option_values
1492 = targetm_common
.get_valid_option_values (i
, NULL
);
1493 if (!option_values
.is_empty ())
1494 help_tuples
.safe_push (option_help_tuple (i
, option_values
));
1500 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1503 printf (_(" No options with the desired characteristics were found\n"));
1508 /* PR 31349: Tell the user how to see all of the
1509 options supported by a specific front end. */
1510 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1511 if ((1U << i
) & langs
)
1512 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1513 lang_names
[i
], lang_names
[i
]);
1517 else if (! displayed
)
1518 printf (_(" All options with the desired characteristics have already been displayed\n"));
1522 /* Print details of enumerated option arguments, if those
1523 enumerations have help text headings provided. If no help text
1524 is provided, presume that the possible values are listed in the
1525 help text for the relevant options. */
1526 for (i
= 0; i
< cl_enums_count
; i
++)
1528 unsigned int j
, pos
;
1530 if (opts
->x_help_enum_printed
[i
] != 1)
1532 if (cl_enums
[i
].help
== NULL
)
1534 printf (" %s\n ", _(cl_enums
[i
].help
));
1536 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1538 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1540 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1542 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1552 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1557 opts
->x_help_enum_printed
[i
] = 2;
1560 for (unsigned i
= 0; i
< help_tuples
.length (); i
++)
1562 const struct cl_option
*option
= cl_options
+ help_tuples
[i
].m_code
;
1563 printf (_(" Known valid arguments for %s option:\n "),
1565 for (unsigned j
= 0; j
< help_tuples
[i
].m_values
.length (); j
++)
1566 printf (" %s", help_tuples
[i
].m_values
[j
]);
1571 /* Display help for a specified type of option.
1572 The options must have ALL of the INCLUDE_FLAGS set
1573 ANY of the flags in the ANY_FLAGS set
1574 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1575 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1577 print_specific_help (unsigned int include_flags
,
1578 unsigned int exclude_flags
,
1579 unsigned int any_flags
,
1580 struct gcc_options
*opts
,
1581 unsigned int lang_mask
)
1583 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1584 const char * description
= NULL
;
1585 const char * descrip_extra
= "";
1589 /* Sanity check: Make sure that we do not have more
1590 languages than we have bits available to enumerate them. */
1591 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1593 /* If we have not done so already, obtain
1594 the desired maximum width of the output. */
1595 if (opts
->x_help_columns
== 0)
1597 opts
->x_help_columns
= get_terminal_width ();
1598 if (opts
->x_help_columns
== INT_MAX
)
1599 /* Use a reasonable default. */
1600 opts
->x_help_columns
= 80;
1603 /* Decide upon the title for the options that we are going to display. */
1604 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1606 switch (flag
& include_flags
)
1613 description
= _("The following options are target specific");
1616 description
= _("The following options control compiler warning messages");
1618 case CL_OPTIMIZATION
:
1619 description
= _("The following options control optimizations");
1622 description
= _("The following options are language-independent");
1625 description
= _("The following options control parameters");
1628 if (i
>= cl_lang_count
)
1630 if (exclude_flags
& all_langs_mask
)
1631 description
= _("The following options are specific to just the language ");
1633 description
= _("The following options are supported by the language ");
1634 descrip_extra
= lang_names
[i
];
1639 if (description
== NULL
)
1643 if (include_flags
& CL_UNDOCUMENTED
)
1644 description
= _("The following options are not documented");
1645 else if (include_flags
& CL_SEPARATE
)
1646 description
= _("The following options take separate arguments");
1647 else if (include_flags
& CL_JOINED
)
1648 description
= _("The following options take joined arguments");
1651 internal_error ("unrecognized %<include_flags 0x%x%> passed "
1652 "to %<print_specific_help%>",
1659 if (any_flags
& all_langs_mask
)
1660 description
= _("The following options are language-related");
1662 description
= _("The following options are language-independent");
1666 printf ("%s%s:\n", description
, descrip_extra
);
1667 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
1668 opts
->x_help_columns
, opts
, lang_mask
);
1671 /* Enable FDO-related flags. */
1674 enable_fdo_optimizations (struct gcc_options
*opts
,
1675 struct gcc_options
*opts_set
,
1678 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_branch_probabilities
, value
);
1679 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
1680 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_loops
, value
);
1681 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_peel_loops
, value
);
1682 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tracer
, value
);
1683 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_value_profile_transformations
,
1685 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
1686 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp
, value
);
1689 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp_clone
, 1);
1690 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, 1);
1692 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_predictive_commoning
, value
);
1693 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_split_loops
, value
);
1694 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unswitch_loops
, value
);
1695 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_gcse_after_reload
, value
);
1696 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_vectorize
, value
);
1697 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_slp_vectorize
, value
);
1698 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_version_loops_for_strides
, value
);
1699 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
1700 VECT_COST_MODEL_DYNAMIC
);
1701 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribute_patterns
,
1703 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_loop_interchange
, value
);
1704 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_jam
, value
);
1705 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribution
, value
);
1708 /* -f{,no-}sanitize{,-recover}= suboptions. */
1709 const struct sanitizer_opts_s sanitizer_opts
[] =
1711 #define SANITIZER_OPT(name, flags, recover) \
1712 { #name, flags, sizeof #name - 1, recover }
1713 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true),
1714 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
1716 SANITIZER_OPT (pointer
-compare
, SANITIZE_POINTER_COMPARE
, true),
1717 SANITIZER_OPT (pointer
-subtract
, SANITIZE_POINTER_SUBTRACT
, true),
1718 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false),
1719 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false),
1720 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true),
1721 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true),
1722 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true),
1723 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true),
1724 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true),
1725 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false),
1726 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true),
1727 SANITIZER_OPT (return, SANITIZE_RETURN
, false),
1728 SANITIZER_OPT (null
, SANITIZE_NULL
, true),
1729 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true),
1730 SANITIZER_OPT (bool, SANITIZE_BOOL
, true),
1731 SANITIZER_OPT (enum, SANITIZE_ENUM
, true),
1732 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true),
1733 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true),
1734 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true),
1735 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true),
1736 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true),
1737 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true),
1738 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
1740 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true),
1741 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true),
1742 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true),
1743 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true),
1744 SANITIZER_OPT (all
, ~0U, true),
1745 #undef SANITIZER_OPT
1746 { NULL
, 0U, 0UL, false }
1749 /* -f{,no-}sanitize-coverage= suboptions. */
1750 const struct sanitizer_opts_s coverage_sanitizer_opts
[] =
1752 #define COVERAGE_SANITIZER_OPT(name, flags) \
1753 { #name, flags, sizeof #name - 1, true }
1754 COVERAGE_SANITIZER_OPT (trace
-pc
, SANITIZE_COV_TRACE_PC
),
1755 COVERAGE_SANITIZER_OPT (trace
-cmp
, SANITIZE_COV_TRACE_CMP
),
1756 #undef COVERAGE_SANITIZER_OPT
1757 { NULL
, 0U, 0UL, false }
1760 /* A struct for describing a run of chars within a string. */
1762 class string_fragment
1765 string_fragment (const char *start
, size_t len
)
1766 : m_start (start
), m_len (len
) {}
1768 const char *m_start
;
1772 /* Specialization of edit_distance_traits for string_fragment,
1773 for use by get_closest_sanitizer_option. */
1776 struct edit_distance_traits
<const string_fragment
&>
1778 static size_t get_length (const string_fragment
&fragment
)
1780 return fragment
.m_len
;
1783 static const char *get_string (const string_fragment
&fragment
)
1785 return fragment
.m_start
;
1789 /* Given ARG, an unrecognized sanitizer option, return the best
1790 matching sanitizer option, or NULL if there isn't one.
1791 OPTS is array of candidate sanitizer options.
1792 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or
1793 OPT_fsanitize_coverage_.
1794 VALUE is non-zero for the regular form of the option, zero
1795 for the "no-" form (e.g. "-fno-sanitize-recover="). */
1798 get_closest_sanitizer_option (const string_fragment
&arg
,
1799 const struct sanitizer_opts_s
*opts
,
1800 enum opt_code code
, int value
)
1802 best_match
<const string_fragment
&, const char*> bm (arg
);
1803 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
1805 /* -fsanitize=all is not valid, so don't offer it. */
1806 if (code
== OPT_fsanitize_
1807 && opts
[i
].flag
== ~0U
1811 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
1812 don't offer the non-recoverable options. */
1813 if (code
== OPT_fsanitize_recover_
1814 && !opts
[i
].can_recover
1818 bm
.consider (opts
[i
].name
);
1820 return bm
.get_best_meaningful_candidate ();
1823 /* Parse comma separated sanitizer suboptions from P for option SCODE,
1824 adjust previous FLAGS and return new ones. If COMPLAIN is false,
1825 don't issue diagnostics. */
1828 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
1829 unsigned int flags
, int value
, bool complain
)
1831 enum opt_code code
= (enum opt_code
) scode
;
1833 const struct sanitizer_opts_s
*opts
;
1834 if (code
== OPT_fsanitize_coverage_
)
1835 opts
= coverage_sanitizer_opts
;
1837 opts
= sanitizer_opts
;
1843 const char *comma
= strchr (p
, ',');
1855 /* Check to see if the string matches an option class name. */
1856 for (i
= 0; opts
[i
].name
!= NULL
; ++i
)
1857 if (len
== opts
[i
].len
&& memcmp (p
, opts
[i
].name
, len
) == 0)
1859 /* Handle both -fsanitize and -fno-sanitize cases. */
1860 if (value
&& opts
[i
].flag
== ~0U)
1862 if (code
== OPT_fsanitize_
)
1865 error_at (loc
, "%<-fsanitize=all%> option is not valid");
1868 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
1869 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
1873 /* Do not enable -fsanitize-recover=unreachable and
1874 -fsanitize-recover=return if -fsanitize-recover=undefined
1876 if (code
== OPT_fsanitize_recover_
1877 && opts
[i
].flag
== SANITIZE_UNDEFINED
)
1878 flags
|= (SANITIZE_UNDEFINED
1879 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
1881 flags
|= opts
[i
].flag
;
1884 flags
&= ~opts
[i
].flag
;
1889 if (! found
&& complain
)
1892 = get_closest_sanitizer_option (string_fragment (p
, len
),
1896 if (code
== OPT_fsanitize_recover_
)
1897 suffix
= "-recover";
1898 else if (code
== OPT_fsanitize_coverage_
)
1899 suffix
= "-coverage";
1905 "unrecognized argument to %<-f%ssanitize%s=%> "
1906 "option: %q.*s; did you mean %qs?",
1908 suffix
, (int) len
, p
, hint
);
1911 "unrecognized argument to %<-f%ssanitize%s=%> option: "
1912 "%q.*s", value
? "" : "no-",
1913 suffix
, (int) len
, p
);
1923 /* Parse string values of no_sanitize attribute passed in VALUE.
1924 Values are separated with comma. */
1927 parse_no_sanitize_attribute (char *value
)
1929 unsigned int flags
= 0;
1931 char *q
= strtok (value
, ",");
1935 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1936 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
1938 flags
|= sanitizer_opts
[i
].flag
;
1939 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
1940 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
1944 if (sanitizer_opts
[i
].name
== NULL
)
1945 warning (OPT_Wattributes
,
1946 "%qs attribute directive ignored", q
);
1948 q
= strtok (NULL
, ",");
1954 /* Parse -falign-NAME format for a FLAG value. Return individual
1955 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
1956 set, print error message at LOC location. */
1959 parse_and_check_align_values (const char *flag
,
1961 auto_vec
<unsigned> &result_values
,
1965 char *str
= xstrdup (flag
);
1966 for (char *p
= strtok (str
, ":"); p
; p
= strtok (NULL
, ":"))
1969 int v
= strtol (p
, &end
, 10);
1970 if (*end
!= '\0' || v
< 0)
1973 error_at (loc
, "invalid arguments for %<-falign-%s%> option: %qs",
1979 result_values
.safe_push ((unsigned)v
);
1984 /* Check that we have a correct number of values. */
1985 if (result_values
.is_empty () || result_values
.length () > 4)
1988 error_at (loc
, "invalid number of arguments for %<-falign-%s%> "
1989 "option: %qs", name
, flag
);
1993 for (unsigned i
= 0; i
< result_values
.length (); i
++)
1994 if (result_values
[i
] > MAX_CODE_ALIGN_VALUE
)
1997 error_at (loc
, "%<-falign-%s%> is not between 0 and %d",
1998 name
, MAX_CODE_ALIGN_VALUE
);
2005 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2009 check_alignment_argument (location_t loc
, const char *flag
, const char *name
)
2011 auto_vec
<unsigned> align_result
;
2012 parse_and_check_align_values (flag
, name
, align_result
, true, loc
);
2015 /* Print help when OPT__help_ is set. */
2018 print_help (struct gcc_options
*opts
, unsigned int lang_mask
,
2019 const char *help_option_argument
)
2021 const char *a
= help_option_argument
;
2022 unsigned int include_flags
= 0;
2023 /* Note - by default we include undocumented options when listing
2024 specific classes. If you only want to see documented options
2025 then add ",^undocumented" to the --help= option. E.g.:
2027 --help=target,^undocumented */
2028 unsigned int exclude_flags
= 0;
2030 if (lang_mask
== CL_DRIVER
)
2033 /* Walk along the argument string, parsing each word in turn.
2035 arg = [^]{word}[,{arg}]
2036 word = {optimizers|target|warnings|undocumented|
2037 params|common|<language>} */
2047 { "optimizers", CL_OPTIMIZATION
},
2048 { "target", CL_TARGET
},
2049 { "warnings", CL_WARNING
},
2050 { "undocumented", CL_UNDOCUMENTED
},
2051 { "params", CL_PARAMS
},
2052 { "joined", CL_JOINED
},
2053 { "separate", CL_SEPARATE
},
2054 { "common", CL_COMMON
},
2057 unsigned int *pflags
;
2059 unsigned int lang_flag
, specific_flag
;
2068 error ("missing argument to %qs", "--help=^");
2071 pflags
= &exclude_flags
;
2074 pflags
= &include_flags
;
2076 comma
= strchr (a
, ',');
2087 /* Check to see if the string matches an option class name. */
2088 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
2089 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
2091 specific_flag
= specifics
[i
].flag
;
2095 /* Check to see if the string matches a language name.
2096 Note - we rely upon the alpha-sorted nature of the entries in
2097 the lang_names array, specifically that shorter names appear
2098 before their longer variants. (i.e. C before C++). That way
2099 when we are attempting to match --help=c for example we will
2100 match with C first and not C++. */
2101 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
2102 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
2104 lang_flag
= 1U << i
;
2108 if (specific_flag
!= 0)
2111 *pflags
|= specific_flag
;
2114 /* The option's argument matches both the start of a
2115 language name and the start of an option class name.
2116 We have a special case for when the user has
2117 specified "--help=c", but otherwise we have to issue
2119 if (strncasecmp (a
, "c", len
) == 0)
2120 *pflags
|= lang_flag
;
2123 "%<--help%> argument %q.*s is ambiguous, "
2124 "please be more specific",
2128 else if (lang_flag
!= 0)
2129 *pflags
|= lang_flag
;
2132 "unrecognized argument to %<--help=%> option: %q.*s",
2141 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
2145 /* Handle target- and language-independent options. Return zero to
2146 generate an "unknown option" message. Only options that need
2147 extra handling need to be listed here; if you simply want
2148 DECODED->value assigned to a variable, it happens automatically. */
2151 common_handle_option (struct gcc_options
*opts
,
2152 struct gcc_options
*opts_set
,
2153 const struct cl_decoded_option
*decoded
,
2154 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
2156 const struct cl_option_handlers
*handlers
,
2157 diagnostic_context
*dc
,
2158 void (*target_option_override_hook
) (void))
2160 size_t scode
= decoded
->opt_index
;
2161 const char *arg
= decoded
->arg
;
2162 HOST_WIDE_INT value
= decoded
->value
;
2163 enum opt_code code
= (enum opt_code
) scode
;
2165 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
2171 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
2172 unsigned int undoc_mask
;
2175 if (lang_mask
== CL_DRIVER
)
2178 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
2181 target_option_override_hook ();
2182 /* First display any single language specific options. */
2183 for (i
= 0; i
< cl_lang_count
; i
++)
2185 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
2187 /* Next display any multi language specific options. */
2188 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
2189 /* Then display any remaining, non-language options. */
2190 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
2192 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
2193 opts
->x_exit_after_options
= true;
2197 case OPT__target_help
:
2198 if (lang_mask
== CL_DRIVER
)
2201 target_option_override_hook ();
2202 print_specific_help (CL_TARGET
, CL_UNDOCUMENTED
, 0, opts
, lang_mask
);
2203 opts
->x_exit_after_options
= true;
2208 help_option_arguments
.safe_push (arg
);
2209 opts
->x_exit_after_options
= true;
2214 if (lang_mask
== CL_DRIVER
)
2217 opts
->x_exit_after_options
= true;
2220 case OPT__completion_
:
2223 case OPT_fsanitize_
:
2224 opts
->x_flag_sanitize
2225 = parse_sanitizer_options (arg
, loc
, code
,
2226 opts
->x_flag_sanitize
, value
, true);
2228 /* Kernel ASan implies normal ASan but does not yet support
2230 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
2232 SET_OPTION_IF_UNSET (opts
, opts_set
,
2233 param_asan_instrumentation_with_call_threshold
,
2235 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_globals
, 0);
2236 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_stack
, 0);
2237 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_protect_allocas
, 0);
2238 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_use_after_return
, 0);
2242 case OPT_fsanitize_recover_
:
2243 opts
->x_flag_sanitize_recover
2244 = parse_sanitizer_options (arg
, loc
, code
,
2245 opts
->x_flag_sanitize_recover
, value
, true);
2248 case OPT_fasan_shadow_offset_
:
2252 case OPT_fsanitize_address_use_after_scope
:
2253 opts
->x_flag_sanitize_address_use_after_scope
= value
;
2256 case OPT_fsanitize_recover
:
2258 opts
->x_flag_sanitize_recover
2259 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
2260 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
2262 opts
->x_flag_sanitize_recover
2263 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2266 case OPT_fsanitize_coverage_
:
2267 opts
->x_flag_sanitize_coverage
2268 = parse_sanitizer_options (arg
, loc
, code
,
2269 opts
->x_flag_sanitize_coverage
, value
, true);
2276 /* Currently handled in a prescan. */
2280 dc
->warning_as_error_requested
= value
;
2284 if (lang_mask
== CL_DRIVER
)
2287 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2288 opts
, opts_set
, loc
, dc
);
2291 case OPT_Wfatal_errors
:
2292 dc
->fatal_errors
= value
;
2295 case OPT_Wstack_usage_
:
2296 opts
->x_flag_stack_usage_info
= value
!= -1;
2299 case OPT_Wstrict_aliasing
:
2300 set_Wstrict_aliasing (opts
, value
);
2303 case OPT_Wstrict_overflow
:
2304 opts
->x_warn_strict_overflow
= (value
2305 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2309 case OPT_Wsystem_headers
:
2310 dc
->dc_warn_system_headers
= value
;
2314 opts
->x_flag_gen_aux_info
= 1;
2317 case OPT_auxbase_strip
:
2319 char *tmp
= xstrdup (arg
);
2320 strip_off_ending (tmp
, strlen (tmp
));
2322 opts
->x_aux_base_name
= tmp
;
2329 decode_d_option (arg
, opts
, loc
, dc
);
2332 case OPT_fcall_used_
:
2333 case OPT_fcall_saved_
:
2341 case OPT_fdbg_cnt_list
:
2343 opts
->x_exit_after_options
= true;
2346 case OPT_fdebug_prefix_map_
:
2347 case OPT_ffile_prefix_map_
:
2351 case OPT_fcallgraph_info
:
2352 opts
->x_flag_callgraph_info
= CALLGRAPH_INFO_NAKED
;
2355 case OPT_fcallgraph_info_
:
2358 my_arg
= xstrdup (arg
);
2359 p
= strtok (my_arg
, ",");
2362 if (strcmp (p
, "su") == 0)
2364 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_STACK_USAGE
;
2365 opts
->x_flag_stack_usage_info
= true;
2367 else if (strcmp (p
, "da") == 0)
2368 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_DYNAMIC_ALLOC
;
2371 p
= strtok (NULL
, ",");
2377 case OPT_fdiagnostics_show_location_
:
2378 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2381 case OPT_fdiagnostics_show_caret
:
2382 dc
->show_caret
= value
;
2385 case OPT_fdiagnostics_show_labels
:
2386 dc
->show_labels_p
= value
;
2389 case OPT_fdiagnostics_show_line_numbers
:
2390 dc
->show_line_numbers_p
= value
;
2393 case OPT_fdiagnostics_color_
:
2394 diagnostic_color_init (dc
, value
);
2397 case OPT_fdiagnostics_urls_
:
2398 diagnostic_urls_init (dc
, value
);
2401 case OPT_fdiagnostics_format_
:
2402 diagnostic_output_format_init (dc
,
2403 (enum diagnostics_output_format
)value
);
2406 case OPT_fdiagnostics_parseable_fixits
:
2407 dc
->parseable_fixits_p
= value
;
2410 case OPT_fdiagnostics_show_cwe
:
2411 dc
->show_cwe
= value
;
2414 case OPT_fdiagnostics_show_option
:
2415 dc
->show_option_requested
= value
;
2418 case OPT_fdiagnostics_minimum_margin_width_
:
2419 dc
->min_margin_width
= value
;
2426 case OPT_ffast_math
:
2427 set_fast_math_flags (opts
, value
);
2430 case OPT_funsafe_math_optimizations
:
2431 set_unsafe_math_optimizations_flags (opts
, value
);
2438 case OPT_finline_limit_
:
2439 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_single
,
2441 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_auto
,
2445 case OPT_finstrument_functions_exclude_function_list_
:
2446 add_comma_separated_to_vector
2447 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
2450 case OPT_finstrument_functions_exclude_file_list_
:
2451 add_comma_separated_to_vector
2452 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
2455 case OPT_fmessage_length_
:
2456 pp_set_line_maximum_length (dc
->printer
, value
);
2457 diagnostic_set_caret_max_width (dc
, value
);
2461 case OPT_fopt_info_
:
2467 const char *p
= arg
;
2468 opts
->x_flag_disable_hsa
= true;
2471 const char *comma
= strchr (p
, ',');
2473 if ((strncmp (p
, "disable", 7) == 0)
2474 && (p
[7] == ',' || p
[7] == '\0'))
2476 opts
->x_flag_disable_hsa
= true;
2480 if ((strncmp (p
, "hsa", 3) == 0)
2481 && (p
[3] == ',' || p
[3] == '\0'))
2484 opts
->x_flag_disable_hsa
= false;
2486 sorry ("HSA has not been enabled during configuration");
2496 #ifndef ACCEL_COMPILER
2497 case OPT_foffload_abi_
:
2498 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
2499 "offload compiler");
2503 case OPT_fpack_struct_
:
2504 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
2506 "structure alignment must be a small power of two, not %wu",
2509 opts
->x_initial_max_fld_align
= value
;
2513 case OPT_fplugin_arg_
:
2517 case OPT_fprofile_use_
:
2518 opts
->x_profile_data_prefix
= xstrdup (arg
);
2519 opts
->x_flag_profile_use
= true;
2521 /* No break here - do -fprofile-use processing. */
2523 case OPT_fprofile_use
:
2524 enable_fdo_optimizations (opts
, opts_set
, value
);
2525 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_reorder_functions
,
2527 /* Indirect call profiling should do all useful transformations
2528 speculative devirtualization does. */
2529 if (opts
->x_flag_value_profile_transformations
)
2530 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_devirtualize_speculatively
,
2534 case OPT_fauto_profile_
:
2535 opts
->x_auto_profile_file
= xstrdup (arg
);
2536 opts
->x_flag_auto_profile
= true;
2538 /* No break here - do -fauto-profile processing. */
2540 case OPT_fauto_profile
:
2541 enable_fdo_optimizations (opts
, opts_set
, value
);
2542 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_correction
, value
);
2543 SET_OPTION_IF_UNSET (opts
, opts_set
,
2544 param_early_inliner_max_iterations
, 10);
2547 case OPT_fprofile_generate_
:
2548 opts
->x_profile_data_prefix
= xstrdup (arg
);
2550 /* No break here - do -fprofile-generate processing. */
2552 case OPT_fprofile_generate
:
2553 SET_OPTION_IF_UNSET (opts
, opts_set
, profile_arc_flag
, value
);
2554 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
2555 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
2556 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, value
);
2559 case OPT_fpatchable_function_entry_
:
2561 char *patch_area_arg
= xstrdup (arg
);
2562 char *comma
= strchr (patch_area_arg
, ',');
2566 function_entry_patch_area_size
=
2567 integral_argument (patch_area_arg
);
2568 function_entry_patch_area_start
=
2569 integral_argument (comma
+ 1);
2573 function_entry_patch_area_size
=
2574 integral_argument (patch_area_arg
);
2575 function_entry_patch_area_start
= 0;
2577 if (function_entry_patch_area_size
< 0
2578 || function_entry_patch_area_start
< 0
2579 || function_entry_patch_area_size
2580 < function_entry_patch_area_start
)
2581 error ("invalid arguments for %<-fpatchable_function_entry%>");
2582 free (patch_area_arg
);
2586 case OPT_ftree_vectorize
:
2587 /* Automatically sets -ftree-loop-vectorize and
2588 -ftree-slp-vectorize. Nothing more to do here. */
2590 case OPT_fshow_column
:
2591 dc
->show_column
= value
;
2594 case OPT_frandom_seed
:
2595 /* The real switch is -fno-random-seed. */
2601 case OPT_frandom_seed_
:
2605 case OPT_fsched_verbose_
:
2606 #ifdef INSN_SCHEDULING
2607 /* Handled with Var in common.opt. */
2613 case OPT_fsched_stalled_insns_
:
2614 opts
->x_flag_sched_stalled_insns
= value
;
2615 if (opts
->x_flag_sched_stalled_insns
== 0)
2616 opts
->x_flag_sched_stalled_insns
= -1;
2619 case OPT_fsched_stalled_insns_dep_
:
2620 opts
->x_flag_sched_stalled_insns_dep
= value
;
2623 case OPT_fstack_check_
:
2624 if (!strcmp (arg
, "no"))
2625 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
2626 else if (!strcmp (arg
, "generic"))
2627 /* This is the old stack checking method. */
2628 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2629 ? FULL_BUILTIN_STACK_CHECK
2630 : GENERIC_STACK_CHECK
;
2631 else if (!strcmp (arg
, "specific"))
2632 /* This is the new stack checking method. */
2633 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2634 ? FULL_BUILTIN_STACK_CHECK
2635 : STACK_CHECK_STATIC_BUILTIN
2636 ? STATIC_BUILTIN_STACK_CHECK
2637 : GENERIC_STACK_CHECK
;
2639 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
2642 case OPT_fstack_limit
:
2643 /* The real switch is -fno-stack-limit. */
2649 case OPT_fstack_limit_register_
:
2650 case OPT_fstack_limit_symbol_
:
2654 case OPT_fstack_usage
:
2655 opts
->x_flag_stack_usage
= value
;
2656 opts
->x_flag_stack_usage_info
= value
!= 0;
2660 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
2665 if (arg
&& strlen (arg
) != 0)
2667 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
2668 "use %<-gdwarf-%s%> for DWARF version "
2669 "or %<-gdwarf%> %<-g%s%> for debug level", arg
, arg
, arg
);
2673 value
= opts
->x_dwarf_version
;
2677 if (value
< 2 || value
> 5)
2678 error_at (loc
, "dwarf version %wu is not supported", value
);
2680 opts
->x_dwarf_version
= value
;
2681 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
2684 case OPT_gsplit_dwarf
:
2685 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, "", opts
, opts_set
,
2690 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
2695 set_debug_level (DBX_DEBUG
, code
== OPT_gstabs_
, arg
, opts
, opts_set
,
2700 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
2705 set_debug_level (XCOFF_DEBUG
, code
== OPT_gxcoff_
, arg
, opts
, opts_set
,
2711 /* Handled completely via specs. */
2714 case OPT_pedantic_errors
:
2715 dc
->pedantic_errors
= 1;
2716 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
2718 handlers
, opts
, opts_set
,
2723 opts
->x_flag_lto
= value
? "" : NULL
;
2727 if (strcmp (arg
, "none") != 0
2728 && strcmp (arg
, "jobserver") != 0
2729 && strcmp (arg
, "auto") != 0
2732 "unrecognized argument to %<-flto=%> option: %qs", arg
);
2736 dc
->dc_inhibit_warnings
= true;
2739 case OPT_fmax_errors_
:
2740 dc
->max_errors
= value
;
2743 case OPT_fuse_ld_bfd
:
2744 case OPT_fuse_ld_gold
:
2745 case OPT_fuse_ld_lld
:
2746 case OPT_fuse_linker_plugin
:
2747 /* No-op. Used by the driver and passed to us because it starts with f.*/
2752 opts
->x_flag_trapv
= 0;
2757 opts
->x_flag_wrapv
= 0;
2760 case OPT_fstrict_overflow
:
2761 opts
->x_flag_wrapv
= !value
;
2762 opts
->x_flag_wrapv_pointer
= !value
;
2764 opts
->x_flag_trapv
= 0;
2768 opts
->x_flag_ipa_icf_functions
= value
;
2769 opts
->x_flag_ipa_icf_variables
= value
;
2772 case OPT_falign_loops_
:
2773 check_alignment_argument (loc
, arg
, "loops");
2776 case OPT_falign_jumps_
:
2777 check_alignment_argument (loc
, arg
, "jumps");
2780 case OPT_falign_labels_
:
2781 check_alignment_argument (loc
, arg
, "labels");
2784 case OPT_falign_functions_
:
2785 check_alignment_argument (loc
, arg
, "functions");
2789 /* If the flag was handled in a standard way, assume the lack of
2790 processing here is intentional. */
2791 gcc_assert (option_flag_var (scode
, opts
));
2795 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
2800 /* Used to set the level of strict aliasing warnings in OPTS,
2801 when no level is specified (i.e., when -Wstrict-aliasing, and not
2802 -Wstrict-aliasing=level was given).
2803 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
2804 and 0 otherwise. After calling this function, wstrict_aliasing will be
2805 set to the default value of -Wstrict_aliasing=level, currently 3. */
2807 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
2809 gcc_assert (onoff
== 0 || onoff
== 1);
2811 opts
->x_warn_strict_aliasing
= 3;
2813 opts
->x_warn_strict_aliasing
= 0;
2816 /* The following routines are useful in setting all the flags that
2817 -ffast-math and -fno-fast-math imply. */
2819 set_fast_math_flags (struct gcc_options
*opts
, int set
)
2821 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
2823 opts
->x_flag_unsafe_math_optimizations
= set
;
2824 set_unsafe_math_optimizations_flags (opts
, set
);
2826 if (!opts
->frontend_set_flag_finite_math_only
)
2827 opts
->x_flag_finite_math_only
= set
;
2828 if (!opts
->frontend_set_flag_errno_math
)
2829 opts
->x_flag_errno_math
= !set
;
2832 if (opts
->frontend_set_flag_excess_precision
== EXCESS_PRECISION_DEFAULT
)
2833 opts
->x_flag_excess_precision
2834 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
2835 if (!opts
->frontend_set_flag_signaling_nans
)
2836 opts
->x_flag_signaling_nans
= 0;
2837 if (!opts
->frontend_set_flag_rounding_math
)
2838 opts
->x_flag_rounding_math
= 0;
2839 if (!opts
->frontend_set_flag_cx_limited_range
)
2840 opts
->x_flag_cx_limited_range
= 1;
2844 /* When -funsafe-math-optimizations is set the following
2845 flags are set as well. */
2847 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
2849 if (!opts
->frontend_set_flag_trapping_math
)
2850 opts
->x_flag_trapping_math
= !set
;
2851 if (!opts
->frontend_set_flag_signed_zeros
)
2852 opts
->x_flag_signed_zeros
= !set
;
2853 if (!opts
->frontend_set_flag_associative_math
)
2854 opts
->x_flag_associative_math
= set
;
2855 if (!opts
->frontend_set_flag_reciprocal_math
)
2856 opts
->x_flag_reciprocal_math
= set
;
2859 /* Return true iff flags in OPTS are set as if -ffast-math. */
2861 fast_math_flags_set_p (const struct gcc_options
*opts
)
2863 return (!opts
->x_flag_trapping_math
2864 && opts
->x_flag_unsafe_math_optimizations
2865 && opts
->x_flag_finite_math_only
2866 && !opts
->x_flag_signed_zeros
2867 && !opts
->x_flag_errno_math
2868 && opts
->x_flag_excess_precision
== EXCESS_PRECISION_FAST
);
2871 /* Return true iff flags are set as if -ffast-math but using the flags stored
2872 in the struct cl_optimization structure. */
2874 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
2876 return (!opt
->x_flag_trapping_math
2877 && opt
->x_flag_unsafe_math_optimizations
2878 && opt
->x_flag_finite_math_only
2879 && !opt
->x_flag_signed_zeros
2880 && !opt
->x_flag_errno_math
);
2883 /* Handle a debug output -g switch for options OPTS
2884 (OPTS_SET->x_write_symbols storing whether a debug type was passed
2885 explicitly), location LOC. EXTENDED is true or false to support
2886 extended output (2 is special and means "-ggdb" was given). */
2888 set_debug_level (enum debug_info_type type
, int extended
, const char *arg
,
2889 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
2892 opts
->x_use_gnu_debug_info_extensions
= extended
;
2894 if (type
== NO_DEBUG
)
2896 if (opts
->x_write_symbols
== NO_DEBUG
)
2898 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
2902 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
2903 opts
->x_write_symbols
= DWARF2_DEBUG
;
2904 #elif defined DBX_DEBUGGING_INFO
2905 opts
->x_write_symbols
= DBX_DEBUG
;
2909 if (opts
->x_write_symbols
== NO_DEBUG
)
2910 warning_at (loc
, 0, "target system does not support debug output");
2915 /* Does it conflict with an already selected type? */
2916 if (opts_set
->x_write_symbols
!= NO_DEBUG
2917 && opts
->x_write_symbols
!= NO_DEBUG
2918 && type
!= opts
->x_write_symbols
)
2919 error_at (loc
, "debug format %qs conflicts with prior selection",
2920 debug_type_names
[type
]);
2921 opts
->x_write_symbols
= type
;
2922 opts_set
->x_write_symbols
= type
;
2925 /* A debug flag without a level defaults to level 2.
2926 If off or at level 1, set it to level 2, but if already
2927 at level 3, don't lower it. */
2930 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
2931 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
2935 int argval
= integral_argument (arg
);
2937 error_at (loc
, "unrecognized debug output level %qs", arg
);
2938 else if (argval
> 3)
2939 error_at (loc
, "debug output level %qs is too high", arg
);
2941 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
2945 /* Arrange to dump core on error for diagnostic context DC. (The
2946 regular error message is still printed first, except in the case of
2950 setup_core_dumping (diagnostic_context
*dc
)
2953 signal (SIGABRT
, SIG_DFL
);
2955 #if defined(HAVE_SETRLIMIT)
2958 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
2959 fatal_error (input_location
, "getting core file size maximum limit: %m");
2960 rlim
.rlim_cur
= rlim
.rlim_max
;
2961 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
2962 fatal_error (input_location
,
2963 "setting core file size limit to maximum: %m");
2966 diagnostic_abort_on_error (dc
);
2969 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
2970 diagnostic context DC. */
2973 decode_d_option (const char *arg
, struct gcc_options
*opts
,
2974 location_t loc
, diagnostic_context
*dc
)
2982 opts
->x_flag_debug_asm
= 1;
2985 opts
->x_flag_print_asm_name
= 1;
2988 opts
->x_flag_dump_rtl_in_asm
= 1;
2989 opts
->x_flag_print_asm_name
= 1;
2992 opts
->x_rtl_dump_and_exit
= 1;
2994 case 'D': /* These are handled by the preprocessor. */
3001 setup_core_dumping (dc
);
3004 opts
->x_flag_dump_all_passed
= true;
3008 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
3013 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3014 mask LANG_MASK, option handlers HANDLERS) as an error for option
3015 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3016 NULL), location LOC. This is used by -Werror=. */
3019 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
3020 const struct cl_option_handlers
*handlers
,
3021 struct gcc_options
*opts
,
3022 struct gcc_options
*opts_set
,
3023 location_t loc
, diagnostic_context
*dc
)
3028 new_option
= XNEWVEC (char, strlen (arg
) + 2);
3029 new_option
[0] = 'W';
3030 strcpy (new_option
+ 1, arg
);
3031 option_index
= find_opt (new_option
, lang_mask
);
3032 if (option_index
== OPT_SPECIAL_unknown
)
3035 const char *hint
= op
.suggest_option (new_option
);
3037 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>;"
3038 " did you mean %<-%s%>?", value
? "" : "no-",
3039 arg
, new_option
, hint
);
3041 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>",
3042 value
? "" : "no-", arg
, new_option
);
3044 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
3045 error_at (loc
, "%<-Werror=%s%>: %<-%s%> is not an option that "
3046 "controls warnings", arg
, new_option
);
3049 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
3050 const char *arg
= NULL
;
3052 if (cl_options
[option_index
].flags
& CL_JOINED
)
3053 arg
= new_option
+ cl_options
[option_index
].opt_len
;
3054 control_warning_option (option_index
, (int) kind
, arg
, value
,
3056 handlers
, opts
, opts_set
, dc
);
3061 /* Return malloced memory for the name of the option OPTION_INDEX
3062 which enabled a diagnostic (context CONTEXT), originally of type
3063 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3067 option_name (diagnostic_context
*context
, int option_index
,
3068 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
3072 /* A warning classified as an error. */
3073 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
3074 && diag_kind
== DK_ERROR
)
3075 return concat (cl_options
[OPT_Werror_
].opt_text
,
3076 /* Skip over "-W". */
3077 cl_options
[option_index
].opt_text
+ 2,
3079 /* A warning with option. */
3081 return xstrdup (cl_options
[option_index
].opt_text
);
3083 /* A warning without option classified as an error. */
3084 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
3085 || diag_kind
== DK_WARNING
)
3086 && context
->warning_as_error_requested
)
3087 return xstrdup (cl_options
[OPT_Werror
].opt_text
);
3092 /* Return malloced memory for a URL describing the option OPTION_INDEX
3093 which enabled a diagnostic (context CONTEXT). */
3096 get_option_url (diagnostic_context
*, int option_index
)
3099 /* DOCUMENTATION_ROOT_URL should be supplied via -D by the Makefile
3100 (see --with-documentation-root-url).
3102 Expect an anchor of the form "index-Wfoo" e.g.
3103 <a name="index-Wformat"></a>, and thus an id within
3104 the URL of "#index-Wformat". */
3105 return concat (DOCUMENTATION_ROOT_URL
,
3106 "Warning-Options.html",
3107 "#index", cl_options
[option_index
].opt_text
,