c++: Allow exporting a typedef redeclaration [PR102341]
[official-gcc.git] / gcc / opts.cc
blob5d5efaf1b9eb7868d036f4e00779fab2044d0edd
1 /* Command line option handling.
2 Copyright (C) 2002-2023 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
10 version.
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
15 for more details.
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
21 #include "config.h"
22 #include "system.h"
23 #include "intl.h"
24 #include "coretypes.h"
25 #include "opts.h"
26 #include "tm.h"
27 #include "flags.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
35 #include "version.h"
36 #include "selftest.h"
37 #include "file-prefix-map.h"
39 /* In this file all option sets are explicit. */
40 #undef OPTION_SET_P
42 /* Set by -fcanon-prefix-map. */
43 bool flag_canon_prefix_map;
45 /* Set by finish_options when flag_stack_protector was set only because of
46 -fhardened. Yuck. */
47 bool flag_stack_protector_set_by_fhardened_p;
49 static void set_Wstrict_aliasing (struct gcc_options *opts, int onoff);
51 /* Names of fundamental debug info formats indexed by enum
52 debug_info_type. */
54 const char *const debug_type_names[] =
56 "none", "dwarf-2", "vms", "ctf", "btf"
59 /* Bitmasks of fundamental debug info formats indexed by enum
60 debug_info_type. */
62 static uint32_t debug_type_masks[] =
64 NO_DEBUG, DWARF2_DEBUG, VMS_DEBUG,
65 CTF_DEBUG, BTF_DEBUG
68 /* Names of the set of debug formats requested by user. Updated and accessed
69 via debug_set_names. */
71 static char df_set_names[sizeof "none dwarf-2 vms ctf btf"];
73 /* Get enum debug_info_type of the specified debug format, for error messages.
74 Can be used only for individual debug format types. */
76 enum debug_info_type
77 debug_set_to_format (uint32_t debug_info_set)
79 int idx = 0;
80 enum debug_info_type dinfo_type = DINFO_TYPE_NONE;
81 /* Find first set bit. */
82 if (debug_info_set)
83 idx = exact_log2 (debug_info_set & - debug_info_set);
84 /* Check that only one bit is set, if at all. This function is meant to be
85 used only for vanilla debug_info_set bitmask values, i.e. for individual
86 debug format types upto DINFO_TYPE_MAX. */
87 gcc_assert ((debug_info_set & (debug_info_set - 1)) == 0);
88 dinfo_type = (enum debug_info_type)idx;
89 gcc_assert (dinfo_type <= DINFO_TYPE_MAX);
90 return dinfo_type;
93 /* Get the number of debug formats enabled for output. */
95 unsigned int
96 debug_set_count (uint32_t w_symbols)
98 unsigned int count = 0;
99 while (w_symbols)
101 ++ count;
102 w_symbols &= ~ (w_symbols & - w_symbols);
104 return count;
107 /* Get the names of the debug formats enabled for output. */
109 const char *
110 debug_set_names (uint32_t w_symbols)
112 uint32_t df_mask = 0;
113 /* Reset the string to be returned. */
114 memset (df_set_names, 0, sizeof (df_set_names));
115 /* Get the popcount. */
116 int num_set_df = debug_set_count (w_symbols);
117 /* Iterate over the debug formats. Add name string for those enabled. */
118 for (int i = DINFO_TYPE_NONE; i <= DINFO_TYPE_MAX; i++)
120 df_mask = debug_type_masks[i];
121 if (w_symbols & df_mask)
123 strcat (df_set_names, debug_type_names[i]);
124 num_set_df--;
125 if (num_set_df)
126 strcat (df_set_names, " ");
127 else
128 break;
130 else if (!w_symbols)
132 /* No debug formats enabled. */
133 gcc_assert (i == DINFO_TYPE_NONE);
134 strcat (df_set_names, debug_type_names[i]);
135 break;
138 return df_set_names;
141 /* Return TRUE iff BTF debug info is enabled. */
143 bool
144 btf_debuginfo_p ()
146 return (write_symbols & BTF_DEBUG);
149 /* Return TRUE iff BTF with CO-RE debug info is enabled. */
151 bool
152 btf_with_core_debuginfo_p ()
154 return (write_symbols & BTF_WITH_CORE_DEBUG);
157 /* Return TRUE iff CTF debug info is enabled. */
159 bool
160 ctf_debuginfo_p ()
162 return (write_symbols & CTF_DEBUG);
165 /* Return TRUE iff dwarf2 debug info is enabled. */
167 bool
168 dwarf_debuginfo_p (struct gcc_options *opts)
170 return (opts->x_write_symbols & DWARF2_DEBUG);
173 /* Return true iff the debug info format is to be generated based on DWARF
174 DIEs (like CTF and BTF debug info formats). */
176 bool dwarf_based_debuginfo_p ()
178 return ((write_symbols & CTF_DEBUG)
179 || (write_symbols & BTF_DEBUG));
182 /* All flag uses below need to explicitely reference the option sets
183 to operate on. */
184 #define global_options DO_NOT_USE
185 #define global_options_set DO_NOT_USE
187 /* Parse the -femit-struct-debug-detailed option value
188 and set the flag variables. */
190 #define MATCH( prefix, string ) \
191 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
192 ? ((string += sizeof prefix - 1), 1) : 0)
194 void
195 set_struct_debug_option (struct gcc_options *opts, location_t loc,
196 const char *spec)
198 /* various labels for comparison */
199 static const char dfn_lbl[] = "dfn:", dir_lbl[] = "dir:", ind_lbl[] = "ind:";
200 static const char ord_lbl[] = "ord:", gen_lbl[] = "gen:";
201 static const char none_lbl[] = "none", any_lbl[] = "any";
202 static const char base_lbl[] = "base", sys_lbl[] = "sys";
204 enum debug_struct_file files = DINFO_STRUCT_FILE_ANY;
205 /* Default is to apply to as much as possible. */
206 enum debug_info_usage usage = DINFO_USAGE_NUM_ENUMS;
207 int ord = 1, gen = 1;
209 /* What usage? */
210 if (MATCH (dfn_lbl, spec))
211 usage = DINFO_USAGE_DFN;
212 else if (MATCH (dir_lbl, spec))
213 usage = DINFO_USAGE_DIR_USE;
214 else if (MATCH (ind_lbl, spec))
215 usage = DINFO_USAGE_IND_USE;
217 /* Generics or not? */
218 if (MATCH (ord_lbl, spec))
219 gen = 0;
220 else if (MATCH (gen_lbl, spec))
221 ord = 0;
223 /* What allowable environment? */
224 if (MATCH (none_lbl, spec))
225 files = DINFO_STRUCT_FILE_NONE;
226 else if (MATCH (any_lbl, spec))
227 files = DINFO_STRUCT_FILE_ANY;
228 else if (MATCH (sys_lbl, spec))
229 files = DINFO_STRUCT_FILE_SYS;
230 else if (MATCH (base_lbl, spec))
231 files = DINFO_STRUCT_FILE_BASE;
232 else
233 error_at (loc,
234 "argument %qs to %<-femit-struct-debug-detailed%> "
235 "not recognized",
236 spec);
238 /* Effect the specification. */
239 if (usage == DINFO_USAGE_NUM_ENUMS)
241 if (ord)
243 opts->x_debug_struct_ordinary[DINFO_USAGE_DFN] = files;
244 opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE] = files;
245 opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE] = files;
247 if (gen)
249 opts->x_debug_struct_generic[DINFO_USAGE_DFN] = files;
250 opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE] = files;
251 opts->x_debug_struct_generic[DINFO_USAGE_IND_USE] = files;
254 else
256 if (ord)
257 opts->x_debug_struct_ordinary[usage] = files;
258 if (gen)
259 opts->x_debug_struct_generic[usage] = files;
262 if (*spec == ',')
263 set_struct_debug_option (opts, loc, spec+1);
264 else
266 /* No more -femit-struct-debug-detailed specifications.
267 Do final checks. */
268 if (*spec != '\0')
269 error_at (loc,
270 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
271 spec);
272 if (opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE]
273 < opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE]
274 || opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE]
275 < opts->x_debug_struct_generic[DINFO_USAGE_IND_USE])
276 error_at (loc,
277 "%<-femit-struct-debug-detailed=dir:...%> must allow "
278 "at least as much as "
279 "%<-femit-struct-debug-detailed=ind:...%>");
283 /* Strip off a legitimate source ending from the input string NAME of
284 length LEN. Rather than having to know the names used by all of
285 our front ends, we strip off an ending of a period followed by
286 up to fource characters. (C++ uses ".cpp".) */
288 void
289 strip_off_ending (char *name, int len)
291 int i;
292 for (i = 2; i < 5 && len > i; i++)
294 if (name[len - i] == '.')
296 name[len - i] = '\0';
297 break;
302 /* Find the base name of a path, stripping off both directories and
303 a single final extension. */
305 base_of_path (const char *path, const char **base_out)
307 const char *base = path;
308 const char *dot = 0;
309 const char *p = path;
310 char c = *p;
311 while (c)
313 if (IS_DIR_SEPARATOR (c))
315 base = p + 1;
316 dot = 0;
318 else if (c == '.')
319 dot = p;
320 c = *++p;
322 if (!dot)
323 dot = p;
324 *base_out = base;
325 return dot - base;
328 /* What to print when a switch has no documentation. */
329 static const char undocumented_msg[] = N_("This option lacks documentation.");
330 static const char use_diagnosed_msg[] = N_("Uses of this option are diagnosed.");
332 typedef char *char_p; /* For DEF_VEC_P. */
334 static void set_debug_level (uint32_t dinfo, int extended,
335 const char *arg, struct gcc_options *opts,
336 struct gcc_options *opts_set,
337 location_t loc);
338 static void set_fast_math_flags (struct gcc_options *opts, int set);
339 static void decode_d_option (const char *arg, struct gcc_options *opts,
340 location_t loc, diagnostic_context *dc);
341 static void set_unsafe_math_optimizations_flags (struct gcc_options *opts,
342 int set);
343 static void enable_warning_as_error (const char *arg, int value,
344 unsigned int lang_mask,
345 const struct cl_option_handlers *handlers,
346 struct gcc_options *opts,
347 struct gcc_options *opts_set,
348 location_t loc,
349 diagnostic_context *dc);
351 /* Handle a back-end option; arguments and return value as for
352 handle_option. */
354 bool
355 target_handle_option (struct gcc_options *opts,
356 struct gcc_options *opts_set,
357 const struct cl_decoded_option *decoded,
358 unsigned int lang_mask ATTRIBUTE_UNUSED, int kind,
359 location_t loc,
360 const struct cl_option_handlers *handlers ATTRIBUTE_UNUSED,
361 diagnostic_context *dc, void (*) (void))
363 gcc_assert (dc == global_dc);
364 gcc_assert (kind == DK_UNSPECIFIED);
365 return targetm_common.handle_option (opts, opts_set, decoded, loc);
368 /* Add comma-separated strings to a char_p vector. */
370 static void
371 add_comma_separated_to_vector (void **pvec, const char *arg)
373 char *tmp;
374 char *r;
375 char *w;
376 char *token_start;
377 vec<char_p> *v = (vec<char_p> *) *pvec;
379 vec_check_alloc (v, 1);
381 /* We never free this string. */
382 tmp = xstrdup (arg);
384 r = tmp;
385 w = tmp;
386 token_start = tmp;
388 while (*r != '\0')
390 if (*r == ',')
392 *w++ = '\0';
393 ++r;
394 v->safe_push (token_start);
395 token_start = w;
397 if (*r == '\\' && r[1] == ',')
399 *w++ = ',';
400 r += 2;
402 else
403 *w++ = *r++;
406 *w = '\0';
407 if (*token_start != '\0')
408 v->safe_push (token_start);
410 *pvec = v;
413 /* Initialize opts_obstack. */
415 void
416 init_opts_obstack (void)
418 gcc_obstack_init (&opts_obstack);
421 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
423 void
424 init_options_struct (struct gcc_options *opts, struct gcc_options *opts_set)
426 /* Ensure that opts_obstack has already been initialized by the time
427 that we initialize any gcc_options instances (PR jit/68446). */
428 gcc_assert (opts_obstack.chunk_size > 0);
430 *opts = global_options_init;
432 if (opts_set)
433 memset (opts_set, 0, sizeof (*opts_set));
435 /* Initialize whether `char' is signed. */
436 opts->x_flag_signed_char = DEFAULT_SIGNED_CHAR;
437 /* Set this to a special "uninitialized" value. The actual default
438 is set after target options have been processed. */
439 opts->x_flag_short_enums = 2;
441 /* Initialize target_flags before default_options_optimization
442 so the latter can modify it. */
443 opts->x_target_flags = targetm_common.default_target_flags;
445 /* Some targets have ABI-specified unwind tables. */
446 opts->x_flag_unwind_tables = targetm_common.unwind_tables_default;
448 /* Some targets have other target-specific initialization. */
449 targetm_common.option_init_struct (opts);
452 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
453 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
454 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
455 mask LANG_MASK and option handlers HANDLERS. */
457 static void
458 maybe_default_option (struct gcc_options *opts,
459 struct gcc_options *opts_set,
460 const struct default_options *default_opt,
461 int level, bool size, bool fast, bool debug,
462 unsigned int lang_mask,
463 const struct cl_option_handlers *handlers,
464 location_t loc,
465 diagnostic_context *dc)
467 const struct cl_option *option = &cl_options[default_opt->opt_index];
468 bool enabled;
470 if (size)
471 gcc_assert (level == 2);
472 if (fast)
473 gcc_assert (level == 3);
474 if (debug)
475 gcc_assert (level == 1);
477 switch (default_opt->levels)
479 case OPT_LEVELS_ALL:
480 enabled = true;
481 break;
483 case OPT_LEVELS_0_ONLY:
484 enabled = (level == 0);
485 break;
487 case OPT_LEVELS_1_PLUS:
488 enabled = (level >= 1);
489 break;
491 case OPT_LEVELS_1_PLUS_SPEED_ONLY:
492 enabled = (level >= 1 && !size && !debug);
493 break;
495 case OPT_LEVELS_1_PLUS_NOT_DEBUG:
496 enabled = (level >= 1 && !debug);
497 break;
499 case OPT_LEVELS_2_PLUS:
500 enabled = (level >= 2);
501 break;
503 case OPT_LEVELS_2_PLUS_SPEED_ONLY:
504 enabled = (level >= 2 && !size && !debug);
505 break;
507 case OPT_LEVELS_3_PLUS:
508 enabled = (level >= 3);
509 break;
511 case OPT_LEVELS_3_PLUS_AND_SIZE:
512 enabled = (level >= 3 || size);
513 break;
515 case OPT_LEVELS_SIZE:
516 enabled = size;
517 break;
519 case OPT_LEVELS_FAST:
520 enabled = fast;
521 break;
523 case OPT_LEVELS_NONE:
524 default:
525 gcc_unreachable ();
528 if (enabled)
529 handle_generated_option (opts, opts_set, default_opt->opt_index,
530 default_opt->arg, default_opt->value,
531 lang_mask, DK_UNSPECIFIED, loc,
532 handlers, true, dc);
533 else if (default_opt->arg == NULL
534 && !option->cl_reject_negative
535 && !(option->flags & CL_PARAMS))
536 handle_generated_option (opts, opts_set, default_opt->opt_index,
537 default_opt->arg, !default_opt->value,
538 lang_mask, DK_UNSPECIFIED, loc,
539 handlers, true, dc);
542 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
543 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
544 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
545 language mask LANG_MASK and option handlers HANDLERS. */
547 static void
548 maybe_default_options (struct gcc_options *opts,
549 struct gcc_options *opts_set,
550 const struct default_options *default_opts,
551 int level, bool size, bool fast, bool debug,
552 unsigned int lang_mask,
553 const struct cl_option_handlers *handlers,
554 location_t loc,
555 diagnostic_context *dc)
557 size_t i;
559 for (i = 0; default_opts[i].levels != OPT_LEVELS_NONE; i++)
560 maybe_default_option (opts, opts_set, &default_opts[i],
561 level, size, fast, debug,
562 lang_mask, handlers, loc, dc);
565 /* Table of options enabled by default at different levels.
566 Please keep this list sorted by level and alphabetized within
567 each level; this makes it easier to keep the documentation
568 in sync. */
570 static const struct default_options default_options_table[] =
572 /* -O1 and -Og optimizations. */
573 { OPT_LEVELS_1_PLUS, OPT_fcombine_stack_adjustments, NULL, 1 },
574 { OPT_LEVELS_1_PLUS, OPT_fcompare_elim, NULL, 1 },
575 { OPT_LEVELS_1_PLUS, OPT_fcprop_registers, NULL, 1 },
576 { OPT_LEVELS_1_PLUS, OPT_fdefer_pop, NULL, 1 },
577 { OPT_LEVELS_1_PLUS, OPT_fforward_propagate, NULL, 1 },
578 { OPT_LEVELS_1_PLUS, OPT_fguess_branch_probability, NULL, 1 },
579 { OPT_LEVELS_1_PLUS, OPT_fipa_profile, NULL, 1 },
580 { OPT_LEVELS_1_PLUS, OPT_fipa_pure_const, NULL, 1 },
581 { OPT_LEVELS_1_PLUS, OPT_fipa_reference, NULL, 1 },
582 { OPT_LEVELS_1_PLUS, OPT_fipa_reference_addressable, NULL, 1 },
583 { OPT_LEVELS_1_PLUS, OPT_fmerge_constants, NULL, 1 },
584 { OPT_LEVELS_1_PLUS, OPT_fomit_frame_pointer, NULL, 1 },
585 { OPT_LEVELS_1_PLUS, OPT_freorder_blocks, NULL, 1 },
586 { OPT_LEVELS_1_PLUS, OPT_fshrink_wrap, NULL, 1 },
587 { OPT_LEVELS_1_PLUS, OPT_fsplit_wide_types, NULL, 1 },
588 { OPT_LEVELS_1_PLUS, OPT_fthread_jumps, NULL, 1 },
589 { OPT_LEVELS_1_PLUS, OPT_ftree_builtin_call_dce, NULL, 1 },
590 { OPT_LEVELS_1_PLUS, OPT_ftree_ccp, NULL, 1 },
591 { OPT_LEVELS_1_PLUS, OPT_ftree_ch, NULL, 1 },
592 { OPT_LEVELS_1_PLUS, OPT_ftree_coalesce_vars, NULL, 1 },
593 { OPT_LEVELS_1_PLUS, OPT_ftree_copy_prop, NULL, 1 },
594 { OPT_LEVELS_1_PLUS, OPT_ftree_dce, NULL, 1 },
595 { OPT_LEVELS_1_PLUS, OPT_ftree_dominator_opts, NULL, 1 },
596 { OPT_LEVELS_1_PLUS, OPT_ftree_fre, NULL, 1 },
597 { OPT_LEVELS_1_PLUS, OPT_ftree_sink, NULL, 1 },
598 { OPT_LEVELS_1_PLUS, OPT_ftree_slsr, NULL, 1 },
599 { OPT_LEVELS_1_PLUS, OPT_ftree_ter, NULL, 1 },
600 { OPT_LEVELS_1_PLUS, OPT_fvar_tracking, NULL, 1 },
602 /* -O1 (and not -Og) optimizations. */
603 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fbranch_count_reg, NULL, 1 },
604 #if DELAY_SLOTS
605 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdelayed_branch, NULL, 1 },
606 #endif
607 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdse, NULL, 1 },
608 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion, NULL, 1 },
609 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion2, NULL, 1 },
610 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_finline_functions_called_once, NULL, 1 },
611 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fmove_loop_invariants, NULL, 1 },
612 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fmove_loop_stores, NULL, 1 },
613 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fssa_phiopt, NULL, 1 },
614 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fipa_modref, NULL, 1 },
615 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_bit_ccp, NULL, 1 },
616 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_dse, NULL, 1 },
617 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_pta, NULL, 1 },
618 { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_sra, NULL, 1 },
620 /* -O2 and -Os optimizations. */
621 { OPT_LEVELS_2_PLUS, OPT_fcaller_saves, NULL, 1 },
622 { OPT_LEVELS_2_PLUS, OPT_fcode_hoisting, NULL, 1 },
623 { OPT_LEVELS_2_PLUS, OPT_fcrossjumping, NULL, 1 },
624 { OPT_LEVELS_2_PLUS, OPT_fcse_follow_jumps, NULL, 1 },
625 { OPT_LEVELS_2_PLUS, OPT_fdevirtualize, NULL, 1 },
626 { OPT_LEVELS_2_PLUS, OPT_fdevirtualize_speculatively, NULL, 1 },
627 { OPT_LEVELS_2_PLUS, OPT_fexpensive_optimizations, NULL, 1 },
628 { OPT_LEVELS_2_PLUS, OPT_fgcse, NULL, 1 },
629 { OPT_LEVELS_2_PLUS, OPT_fhoist_adjacent_loads, NULL, 1 },
630 { OPT_LEVELS_2_PLUS, OPT_findirect_inlining, NULL, 1 },
631 { OPT_LEVELS_2_PLUS, OPT_finline_small_functions, NULL, 1 },
632 { OPT_LEVELS_2_PLUS, OPT_fipa_bit_cp, NULL, 1 },
633 { OPT_LEVELS_2_PLUS, OPT_fipa_cp, NULL, 1 },
634 { OPT_LEVELS_2_PLUS, OPT_fipa_icf, NULL, 1 },
635 { OPT_LEVELS_2_PLUS, OPT_fipa_ra, NULL, 1 },
636 { OPT_LEVELS_2_PLUS, OPT_fipa_sra, NULL, 1 },
637 { OPT_LEVELS_2_PLUS, OPT_fipa_vrp, NULL, 1 },
638 { OPT_LEVELS_2_PLUS, OPT_fisolate_erroneous_paths_dereference, NULL, 1 },
639 { OPT_LEVELS_2_PLUS, OPT_flra_remat, NULL, 1 },
640 { OPT_LEVELS_2_PLUS, OPT_foptimize_sibling_calls, NULL, 1 },
641 { OPT_LEVELS_2_PLUS, OPT_fpartial_inlining, NULL, 1 },
642 { OPT_LEVELS_2_PLUS, OPT_fpeephole2, NULL, 1 },
643 { OPT_LEVELS_2_PLUS, OPT_freorder_functions, NULL, 1 },
644 { OPT_LEVELS_2_PLUS, OPT_frerun_cse_after_loop, NULL, 1 },
645 #ifdef INSN_SCHEDULING
646 { OPT_LEVELS_2_PLUS, OPT_fschedule_insns2, NULL, 1 },
647 #endif
648 { OPT_LEVELS_2_PLUS, OPT_fstrict_aliasing, NULL, 1 },
649 { OPT_LEVELS_2_PLUS, OPT_fstore_merging, NULL, 1 },
650 { OPT_LEVELS_2_PLUS, OPT_ftree_pre, NULL, 1 },
651 { OPT_LEVELS_2_PLUS, OPT_ftree_switch_conversion, NULL, 1 },
652 { OPT_LEVELS_2_PLUS, OPT_ftree_tail_merge, NULL, 1 },
653 { OPT_LEVELS_2_PLUS, OPT_ftree_vrp, NULL, 1 },
654 { OPT_LEVELS_2_PLUS, OPT_fvect_cost_model_, NULL,
655 VECT_COST_MODEL_VERY_CHEAP },
656 { OPT_LEVELS_2_PLUS, OPT_finline_functions, NULL, 1 },
657 { OPT_LEVELS_2_PLUS, OPT_ftree_loop_distribute_patterns, NULL, 1 },
659 /* -O2 and above optimizations, but not -Os or -Og. */
660 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_functions, NULL, 1 },
661 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_jumps, NULL, 1 },
662 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_labels, NULL, 1 },
663 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_loops, NULL, 1 },
664 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_foptimize_strlen, NULL, 1 },
665 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_freorder_blocks_algorithm_, NULL,
666 REORDER_BLOCKS_ALGORITHM_STC },
667 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_ftree_loop_vectorize, NULL, 1 },
668 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_ftree_slp_vectorize, NULL, 1 },
669 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_fopenmp_target_simd_clone_, NULL,
670 OMP_TARGET_SIMD_CLONE_NOHOST },
671 #ifdef INSN_SCHEDULING
672 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
673 { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_fschedule_insns, NULL, 1 },
674 #endif
676 /* -O3 and -Os optimizations. */
678 /* -O3 optimizations. */
679 { OPT_LEVELS_3_PLUS, OPT_fgcse_after_reload, NULL, 1 },
680 { OPT_LEVELS_3_PLUS, OPT_fipa_cp_clone, NULL, 1 },
681 { OPT_LEVELS_3_PLUS, OPT_floop_interchange, NULL, 1 },
682 { OPT_LEVELS_3_PLUS, OPT_floop_unroll_and_jam, NULL, 1 },
683 { OPT_LEVELS_3_PLUS, OPT_fpeel_loops, NULL, 1 },
684 { OPT_LEVELS_3_PLUS, OPT_fpredictive_commoning, NULL, 1 },
685 { OPT_LEVELS_3_PLUS, OPT_fsplit_loops, NULL, 1 },
686 { OPT_LEVELS_3_PLUS, OPT_fsplit_paths, NULL, 1 },
687 { OPT_LEVELS_3_PLUS, OPT_ftree_loop_distribution, NULL, 1 },
688 { OPT_LEVELS_3_PLUS, OPT_ftree_partial_pre, NULL, 1 },
689 { OPT_LEVELS_3_PLUS, OPT_funswitch_loops, NULL, 1 },
690 { OPT_LEVELS_3_PLUS, OPT_fvect_cost_model_, NULL, VECT_COST_MODEL_DYNAMIC },
691 { OPT_LEVELS_3_PLUS, OPT_fversion_loops_for_strides, NULL, 1 },
693 /* -O3 parameters. */
694 { OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_auto_, NULL, 30 },
695 { OPT_LEVELS_3_PLUS, OPT__param_early_inlining_insns_, NULL, 14 },
696 { OPT_LEVELS_3_PLUS, OPT__param_inline_heuristics_hint_percent_, NULL, 600 },
697 { OPT_LEVELS_3_PLUS, OPT__param_inline_min_speedup_, NULL, 15 },
698 { OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_single_, NULL, 200 },
700 /* -Ofast adds optimizations to -O3. */
701 { OPT_LEVELS_FAST, OPT_ffast_math, NULL, 1 },
702 { OPT_LEVELS_FAST, OPT_fallow_store_data_races, NULL, 1 },
703 { OPT_LEVELS_FAST, OPT_fsemantic_interposition, NULL, 0 },
705 { OPT_LEVELS_NONE, 0, NULL, 0 }
708 /* Default the options in OPTS and OPTS_SET based on the optimization
709 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
710 void
711 default_options_optimization (struct gcc_options *opts,
712 struct gcc_options *opts_set,
713 struct cl_decoded_option *decoded_options,
714 unsigned int decoded_options_count,
715 location_t loc,
716 unsigned int lang_mask,
717 const struct cl_option_handlers *handlers,
718 diagnostic_context *dc)
720 unsigned int i;
721 int opt2;
722 bool openacc_mode = false;
724 /* Scan to see what optimization level has been specified. That will
725 determine the default value of many flags. */
726 for (i = 1; i < decoded_options_count; i++)
728 struct cl_decoded_option *opt = &decoded_options[i];
729 switch (opt->opt_index)
731 case OPT_O:
732 if (*opt->arg == '\0')
734 opts->x_optimize = 1;
735 opts->x_optimize_size = 0;
736 opts->x_optimize_fast = 0;
737 opts->x_optimize_debug = 0;
739 else
741 const int optimize_val = integral_argument (opt->arg);
742 if (optimize_val == -1)
743 error_at (loc, "argument to %<-O%> should be a non-negative "
744 "integer, %<g%>, %<s%>, %<z%> or %<fast%>");
745 else
747 opts->x_optimize = optimize_val;
748 if ((unsigned int) opts->x_optimize > 255)
749 opts->x_optimize = 255;
750 opts->x_optimize_size = 0;
751 opts->x_optimize_fast = 0;
752 opts->x_optimize_debug = 0;
755 break;
757 case OPT_Os:
758 opts->x_optimize_size = 1;
760 /* Optimizing for size forces optimize to be 2. */
761 opts->x_optimize = 2;
762 opts->x_optimize_fast = 0;
763 opts->x_optimize_debug = 0;
764 break;
766 case OPT_Oz:
767 opts->x_optimize_size = 2;
769 /* Optimizing for size forces optimize to be 2. */
770 opts->x_optimize = 2;
771 opts->x_optimize_fast = 0;
772 opts->x_optimize_debug = 0;
773 break;
775 case OPT_Ofast:
776 /* -Ofast only adds flags to -O3. */
777 opts->x_optimize_size = 0;
778 opts->x_optimize = 3;
779 opts->x_optimize_fast = 1;
780 opts->x_optimize_debug = 0;
781 break;
783 case OPT_Og:
784 /* -Og selects optimization level 1. */
785 opts->x_optimize_size = 0;
786 opts->x_optimize = 1;
787 opts->x_optimize_fast = 0;
788 opts->x_optimize_debug = 1;
789 break;
791 case OPT_fopenacc:
792 if (opt->value)
793 openacc_mode = true;
794 break;
796 default:
797 /* Ignore other options in this prescan. */
798 break;
802 maybe_default_options (opts, opts_set, default_options_table,
803 opts->x_optimize, opts->x_optimize_size,
804 opts->x_optimize_fast, opts->x_optimize_debug,
805 lang_mask, handlers, loc, dc);
807 /* -O2 param settings. */
808 opt2 = (opts->x_optimize >= 2);
810 if (openacc_mode)
811 SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_pta, true);
813 /* Track fields in field-sensitive alias analysis. */
814 if (opt2)
815 SET_OPTION_IF_UNSET (opts, opts_set, param_max_fields_for_field_sensitive,
816 100);
818 if (opts->x_optimize_size)
819 /* We want to crossjump as much as possible. */
820 SET_OPTION_IF_UNSET (opts, opts_set, param_min_crossjump_insns, 1);
822 /* Restrict the amount of work combine does at -Og while retaining
823 most of its useful transforms. */
824 if (opts->x_optimize_debug)
825 SET_OPTION_IF_UNSET (opts, opts_set, param_max_combine_insns, 2);
827 /* Allow default optimizations to be specified on a per-machine basis. */
828 maybe_default_options (opts, opts_set,
829 targetm_common.option_optimization_table,
830 opts->x_optimize, opts->x_optimize_size,
831 opts->x_optimize_fast, opts->x_optimize_debug,
832 lang_mask, handlers, loc, dc);
835 /* Control IPA optimizations based on different live patching LEVEL. */
836 static void
837 control_options_for_live_patching (struct gcc_options *opts,
838 struct gcc_options *opts_set,
839 enum live_patching_level level,
840 location_t loc)
842 gcc_assert (level > LIVE_PATCHING_NONE);
844 switch (level)
846 case LIVE_PATCHING_INLINE_ONLY_STATIC:
847 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static"
848 if (opts_set->x_flag_ipa_cp_clone && opts->x_flag_ipa_cp_clone)
849 error_at (loc, "%qs is incompatible with %qs",
850 "-fipa-cp-clone", LIVE_PATCHING_OPTION);
851 else
852 opts->x_flag_ipa_cp_clone = 0;
854 if (opts_set->x_flag_ipa_sra && opts->x_flag_ipa_sra)
855 error_at (loc, "%qs is incompatible with %qs",
856 "-fipa-sra", LIVE_PATCHING_OPTION);
857 else
858 opts->x_flag_ipa_sra = 0;
860 if (opts_set->x_flag_partial_inlining && opts->x_flag_partial_inlining)
861 error_at (loc, "%qs is incompatible with %qs",
862 "-fpartial-inlining", LIVE_PATCHING_OPTION);
863 else
864 opts->x_flag_partial_inlining = 0;
866 if (opts_set->x_flag_ipa_cp && opts->x_flag_ipa_cp)
867 error_at (loc, "%qs is incompatible with %qs",
868 "-fipa-cp", LIVE_PATCHING_OPTION);
869 else
870 opts->x_flag_ipa_cp = 0;
872 /* FALLTHROUGH. */
873 case LIVE_PATCHING_INLINE_CLONE:
874 #undef LIVE_PATCHING_OPTION
875 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static|inline-clone"
876 /* live patching should disable whole-program optimization. */
877 if (opts_set->x_flag_whole_program && opts->x_flag_whole_program)
878 error_at (loc, "%qs is incompatible with %qs",
879 "-fwhole-program", LIVE_PATCHING_OPTION);
880 else
881 opts->x_flag_whole_program = 0;
883 /* visibility change should be excluded by !flag_whole_program
884 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
885 && !flag_partial_inlining. */
887 if (opts_set->x_flag_ipa_pta && opts->x_flag_ipa_pta)
888 error_at (loc, "%qs is incompatible with %qs",
889 "-fipa-pta", LIVE_PATCHING_OPTION);
890 else
891 opts->x_flag_ipa_pta = 0;
893 if (opts_set->x_flag_ipa_reference && opts->x_flag_ipa_reference)
894 error_at (loc, "%qs is incompatible with %qs",
895 "-fipa-reference", LIVE_PATCHING_OPTION);
896 else
897 opts->x_flag_ipa_reference = 0;
899 if (opts_set->x_flag_ipa_ra && opts->x_flag_ipa_ra)
900 error_at (loc, "%qs is incompatible with %qs",
901 "-fipa-ra", LIVE_PATCHING_OPTION);
902 else
903 opts->x_flag_ipa_ra = 0;
905 if (opts_set->x_flag_ipa_icf && opts->x_flag_ipa_icf)
906 error_at (loc, "%qs is incompatible with %qs",
907 "-fipa-icf", LIVE_PATCHING_OPTION);
908 else
909 opts->x_flag_ipa_icf = 0;
911 if (opts_set->x_flag_ipa_icf_functions && opts->x_flag_ipa_icf_functions)
912 error_at (loc, "%qs is incompatible with %qs",
913 "-fipa-icf-functions", LIVE_PATCHING_OPTION);
914 else
915 opts->x_flag_ipa_icf_functions = 0;
917 if (opts_set->x_flag_ipa_icf_variables && opts->x_flag_ipa_icf_variables)
918 error_at (loc, "%qs is incompatible with %qs",
919 "-fipa-icf-variables", LIVE_PATCHING_OPTION);
920 else
921 opts->x_flag_ipa_icf_variables = 0;
923 if (opts_set->x_flag_ipa_bit_cp && opts->x_flag_ipa_bit_cp)
924 error_at (loc, "%qs is incompatible with %qs",
925 "-fipa-bit-cp", LIVE_PATCHING_OPTION);
926 else
927 opts->x_flag_ipa_bit_cp = 0;
929 if (opts_set->x_flag_ipa_vrp && opts->x_flag_ipa_vrp)
930 error_at (loc, "%qs is incompatible with %qs",
931 "-fipa-vrp", LIVE_PATCHING_OPTION);
932 else
933 opts->x_flag_ipa_vrp = 0;
935 if (opts_set->x_flag_ipa_pure_const && opts->x_flag_ipa_pure_const)
936 error_at (loc, "%qs is incompatible with %qs",
937 "-fipa-pure-const", LIVE_PATCHING_OPTION);
938 else
939 opts->x_flag_ipa_pure_const = 0;
941 if (opts_set->x_flag_ipa_modref && opts->x_flag_ipa_modref)
942 error_at (loc,
943 "%<-fipa-modref%> is incompatible with %qs",
944 LIVE_PATCHING_OPTION);
945 else
946 opts->x_flag_ipa_modref = 0;
948 /* FIXME: disable unreachable code removal. */
950 /* discovery of functions/variables with no address taken. */
951 if (opts_set->x_flag_ipa_reference_addressable
952 && opts->x_flag_ipa_reference_addressable)
953 error_at (loc, "%qs is incompatible with %qs",
954 "-fipa-reference-addressable", LIVE_PATCHING_OPTION);
955 else
956 opts->x_flag_ipa_reference_addressable = 0;
958 /* ipa stack alignment propagation. */
959 if (opts_set->x_flag_ipa_stack_alignment
960 && opts->x_flag_ipa_stack_alignment)
961 error_at (loc, "%qs is incompatible with %qs",
962 "-fipa-stack-alignment", LIVE_PATCHING_OPTION);
963 else
964 opts->x_flag_ipa_stack_alignment = 0;
965 break;
966 default:
967 gcc_unreachable ();
970 #undef LIVE_PATCHING_OPTION
973 /* --help option argument if set. */
974 vec<const char *> help_option_arguments;
976 /* Return the string name describing a sanitizer argument which has been
977 provided on the command line and has set this particular flag. */
978 const char *
979 find_sanitizer_argument (struct gcc_options *opts, unsigned int flags)
981 for (int i = 0; sanitizer_opts[i].name != NULL; ++i)
983 /* Need to find the sanitizer_opts element which:
984 a) Could have set the flags requested.
985 b) Has been set on the command line.
987 Can have (a) without (b) if the flag requested is e.g.
988 SANITIZE_ADDRESS, since both -fsanitize=address and
989 -fsanitize=kernel-address set this flag.
991 Can have (b) without (a) by requesting more than one sanitizer on the
992 command line. */
993 if ((sanitizer_opts[i].flag & opts->x_flag_sanitize)
994 != sanitizer_opts[i].flag)
995 continue;
996 if ((sanitizer_opts[i].flag & flags) != flags)
997 continue;
998 return sanitizer_opts[i].name;
1000 return NULL;
1004 /* Report an error to the user about sanitizer options they have requested
1005 which have set conflicting flags.
1007 LEFT and RIGHT indicate sanitizer flags which conflict with each other, this
1008 function reports an error if both have been set in OPTS->x_flag_sanitize and
1009 ensures the error identifies the requested command line options that have
1010 set these flags. */
1011 static void
1012 report_conflicting_sanitizer_options (struct gcc_options *opts, location_t loc,
1013 unsigned int left, unsigned int right)
1015 unsigned int left_seen = (opts->x_flag_sanitize & left);
1016 unsigned int right_seen = (opts->x_flag_sanitize & right);
1017 if (left_seen && right_seen)
1019 const char* left_arg = find_sanitizer_argument (opts, left_seen);
1020 const char* right_arg = find_sanitizer_argument (opts, right_seen);
1021 gcc_assert (left_arg && right_arg);
1022 error_at (loc,
1023 "%<-fsanitize=%s%> is incompatible with %<-fsanitize=%s%>",
1024 left_arg, right_arg);
1028 /* After all options at LOC have been read into OPTS and OPTS_SET,
1029 finalize settings of those options and diagnose incompatible
1030 combinations. */
1031 void
1032 finish_options (struct gcc_options *opts, struct gcc_options *opts_set,
1033 location_t loc)
1035 if (opts->x_dump_base_name
1036 && ! opts->x_dump_base_name_prefixed)
1038 const char *sep = opts->x_dump_base_name;
1040 for (; *sep; sep++)
1041 if (IS_DIR_SEPARATOR (*sep))
1042 break;
1044 if (*sep)
1045 /* If dump_base_path contains subdirectories, don't prepend
1046 anything. */;
1047 else if (opts->x_dump_dir_name)
1048 /* We have a DUMP_DIR_NAME, prepend that. */
1049 opts->x_dump_base_name = opts_concat (opts->x_dump_dir_name,
1050 opts->x_dump_base_name, NULL);
1052 /* It is definitely prefixed now. */
1053 opts->x_dump_base_name_prefixed = true;
1056 /* Handle related options for unit-at-a-time, toplevel-reorder, and
1057 section-anchors. */
1058 if (!opts->x_flag_unit_at_a_time)
1060 if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors)
1061 error_at (loc, "section anchors must be disabled when unit-at-a-time "
1062 "is disabled");
1063 opts->x_flag_section_anchors = 0;
1064 if (opts->x_flag_toplevel_reorder == 1)
1065 error_at (loc, "toplevel reorder must be disabled when unit-at-a-time "
1066 "is disabled");
1067 opts->x_flag_toplevel_reorder = 0;
1070 /* -fself-test depends on the state of the compiler prior to
1071 compiling anything. Ideally it should be run on an empty source
1072 file. However, in case we get run with actual source, assume
1073 -fsyntax-only which will inhibit any compiler initialization
1074 which may confuse the self tests. */
1075 if (opts->x_flag_self_test)
1076 opts->x_flag_syntax_only = 1;
1078 if (opts->x_flag_tm && opts->x_flag_non_call_exceptions)
1079 sorry ("transactional memory is not supported with non-call exceptions");
1081 /* Unless the user has asked for section anchors, we disable toplevel
1082 reordering at -O0 to disable transformations that might be surprising
1083 to end users and to get -fno-toplevel-reorder tested. */
1084 if (!opts->x_optimize
1085 && opts->x_flag_toplevel_reorder == 2
1086 && !(opts->x_flag_section_anchors && opts_set->x_flag_section_anchors))
1088 opts->x_flag_toplevel_reorder = 0;
1089 opts->x_flag_section_anchors = 0;
1091 if (!opts->x_flag_toplevel_reorder)
1093 if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors)
1094 error_at (loc, "section anchors must be disabled when toplevel reorder"
1095 " is disabled");
1096 opts->x_flag_section_anchors = 0;
1099 if (opts->x_flag_hardened)
1101 if (!opts_set->x_flag_auto_var_init)
1102 opts->x_flag_auto_var_init = AUTO_INIT_ZERO;
1103 else if (opts->x_flag_auto_var_init != AUTO_INIT_ZERO)
1104 warning_at (loc, OPT_Whardened,
1105 "%<-ftrivial-auto-var-init=zero%> is not enabled by "
1106 "%<-fhardened%> because it was specified on the command "
1107 "line");
1110 if (!opts->x_flag_opts_finished)
1112 /* We initialize opts->x_flag_pie to -1 so that targets can set a
1113 default value. */
1114 if (opts->x_flag_pie == -1)
1116 /* We initialize opts->x_flag_pic to -1 so that we can tell if
1117 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
1118 if (opts->x_flag_pic == -1)
1119 opts->x_flag_pie = (opts->x_flag_hardened
1120 ? /*-fPIE*/ 2 : DEFAULT_FLAG_PIE);
1121 else
1122 opts->x_flag_pie = 0;
1124 /* If -fPIE or -fpie is used, turn on PIC. */
1125 if (opts->x_flag_pie)
1126 opts->x_flag_pic = opts->x_flag_pie;
1127 else if (opts->x_flag_pic == -1)
1128 opts->x_flag_pic = 0;
1129 if (opts->x_flag_pic && !opts->x_flag_pie)
1130 opts->x_flag_shlib = 1;
1131 opts->x_flag_opts_finished = true;
1134 /* We initialize opts->x_flag_stack_protect to -1 so that targets
1135 can set a default value. With --enable-default-ssp or -fhardened
1136 the default is -fstack-protector-strong. */
1137 if (opts->x_flag_stack_protect == -1)
1139 /* This should check FRAME_GROWS_DOWNWARD, but on some targets it's
1140 defined in such a way that it uses flag_stack_protect which can't
1141 be used here. Moreover, some targets like BPF don't support
1142 -fstack-protector at all but we don't know that here. So remember
1143 that flag_stack_protect was set at the behest of -fhardened. */
1144 if (opts->x_flag_hardened)
1146 opts->x_flag_stack_protect = SPCT_FLAG_STRONG;
1147 flag_stack_protector_set_by_fhardened_p = true;
1149 else
1150 opts->x_flag_stack_protect = DEFAULT_FLAG_SSP;
1152 else if (opts->x_flag_hardened
1153 && opts->x_flag_stack_protect != SPCT_FLAG_STRONG)
1154 warning_at (UNKNOWN_LOCATION, OPT_Whardened,
1155 "%<-fstack-protector-strong%> is not enabled by "
1156 "%<-fhardened%> because it was specified on the command "
1157 "line");
1159 if (opts->x_optimize == 0)
1161 /* Inlining does not work if not optimizing,
1162 so force it not to be done. */
1163 opts->x_warn_inline = 0;
1164 opts->x_flag_no_inline = 1;
1167 /* At -O0 or -Og, turn __builtin_unreachable into a trap. */
1168 if (!opts->x_optimize || opts->x_optimize_debug)
1169 SET_OPTION_IF_UNSET (opts, opts_set, flag_unreachable_traps, true);
1171 /* Pipelining of outer loops is only possible when general pipelining
1172 capabilities are requested. */
1173 if (!opts->x_flag_sel_sched_pipelining)
1174 opts->x_flag_sel_sched_pipelining_outer_loops = 0;
1176 if (opts->x_flag_conserve_stack)
1178 SET_OPTION_IF_UNSET (opts, opts_set, param_large_stack_frame, 100);
1179 SET_OPTION_IF_UNSET (opts, opts_set, param_stack_frame_growth, 40);
1182 if (opts->x_flag_lto)
1184 #ifdef ENABLE_LTO
1185 opts->x_flag_generate_lto = 1;
1187 /* When generating IL, do not operate in whole-program mode.
1188 Otherwise, symbols will be privatized too early, causing link
1189 errors later. */
1190 opts->x_flag_whole_program = 0;
1191 #else
1192 error_at (loc, "LTO support has not been enabled in this configuration");
1193 #endif
1194 if (!opts->x_flag_fat_lto_objects
1195 && (!HAVE_LTO_PLUGIN
1196 || (opts_set->x_flag_use_linker_plugin
1197 && !opts->x_flag_use_linker_plugin)))
1199 if (opts_set->x_flag_fat_lto_objects)
1200 error_at (loc, "%<-fno-fat-lto-objects%> are supported only with "
1201 "linker plugin");
1202 opts->x_flag_fat_lto_objects = 1;
1205 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1206 if (opts->x_dwarf_split_debug_info)
1208 inform (loc, "%<-gsplit-dwarf%> is not supported with LTO,"
1209 " disabling");
1210 opts->x_dwarf_split_debug_info = 0;
1214 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1215 default value if they choose based on other options. */
1216 if (opts->x_flag_split_stack == -1)
1217 opts->x_flag_split_stack = 0;
1218 else if (opts->x_flag_split_stack)
1220 if (!targetm_common.supports_split_stack (true, opts))
1222 error_at (loc, "%<-fsplit-stack%> is not supported by "
1223 "this compiler configuration");
1224 opts->x_flag_split_stack = 0;
1228 /* If stack splitting is turned on, and the user did not explicitly
1229 request function partitioning, turn off partitioning, as it
1230 confuses the linker when trying to handle partitioned split-stack
1231 code that calls a non-split-stack functions. But if partitioning
1232 was turned on explicitly just hope for the best. */
1233 if (opts->x_flag_split_stack
1234 && opts->x_flag_reorder_blocks_and_partition)
1235 SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_blocks_and_partition, 0);
1237 if (opts->x_flag_reorder_blocks_and_partition)
1238 SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_functions, 1);
1240 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1241 if (opts->x_dwarf_split_debug_info)
1242 opts->x_debug_generate_pub_sections = 2;
1244 if ((opts->x_flag_sanitize
1245 & (SANITIZE_USER_ADDRESS | SANITIZE_KERNEL_ADDRESS)) == 0)
1247 if (opts->x_flag_sanitize & SANITIZE_POINTER_COMPARE)
1248 error_at (loc,
1249 "%<-fsanitize=pointer-compare%> must be combined with "
1250 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1251 if (opts->x_flag_sanitize & SANITIZE_POINTER_SUBTRACT)
1252 error_at (loc,
1253 "%<-fsanitize=pointer-subtract%> must be combined with "
1254 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1257 /* Address sanitizers conflict with the thread sanitizer. */
1258 report_conflicting_sanitizer_options (opts, loc, SANITIZE_THREAD,
1259 SANITIZE_ADDRESS);
1260 report_conflicting_sanitizer_options (opts, loc, SANITIZE_THREAD,
1261 SANITIZE_HWADDRESS);
1262 /* The leak sanitizer conflicts with the thread sanitizer. */
1263 report_conflicting_sanitizer_options (opts, loc, SANITIZE_LEAK,
1264 SANITIZE_THREAD);
1266 /* No combination of HWASAN and ASAN work together. */
1267 report_conflicting_sanitizer_options (opts, loc,
1268 SANITIZE_HWADDRESS, SANITIZE_ADDRESS);
1270 /* The userspace and kernel address sanitizers conflict with each other. */
1271 report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_HWADDRESS,
1272 SANITIZE_KERNEL_HWADDRESS);
1273 report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_ADDRESS,
1274 SANITIZE_KERNEL_ADDRESS);
1276 /* Check error recovery for -fsanitize-recover option. */
1277 for (int i = 0; sanitizer_opts[i].name != NULL; ++i)
1278 if ((opts->x_flag_sanitize_recover & sanitizer_opts[i].flag)
1279 && !sanitizer_opts[i].can_recover)
1280 error_at (loc, "%<-fsanitize-recover=%s%> is not supported",
1281 sanitizer_opts[i].name);
1283 /* Check -fsanitize-trap option. */
1284 for (int i = 0; sanitizer_opts[i].name != NULL; ++i)
1285 if ((opts->x_flag_sanitize_trap & sanitizer_opts[i].flag)
1286 && !sanitizer_opts[i].can_trap
1287 /* Allow -fsanitize-trap=all or -fsanitize-trap=undefined
1288 to set flag_sanitize_trap & SANITIZE_VPTR bit which will
1289 effectively disable -fsanitize=vptr, just disallow
1290 explicit -fsanitize-trap=vptr. */
1291 && sanitizer_opts[i].flag != SANITIZE_VPTR)
1292 error_at (loc, "%<-fsanitize-trap=%s%> is not supported",
1293 sanitizer_opts[i].name);
1295 /* When instrumenting the pointers, we don't want to remove
1296 the null pointer checks. */
1297 if (opts->x_flag_sanitize & (SANITIZE_NULL | SANITIZE_NONNULL_ATTRIBUTE
1298 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE))
1299 opts->x_flag_delete_null_pointer_checks = 0;
1301 /* Aggressive compiler optimizations may cause false negatives. */
1302 if (opts->x_flag_sanitize & ~(SANITIZE_LEAK | SANITIZE_UNREACHABLE))
1303 opts->x_flag_aggressive_loop_optimizations = 0;
1305 /* Enable -fsanitize-address-use-after-scope if either address sanitizer is
1306 enabled. */
1307 if (opts->x_flag_sanitize
1308 & (SANITIZE_USER_ADDRESS | SANITIZE_USER_HWADDRESS))
1309 SET_OPTION_IF_UNSET (opts, opts_set, flag_sanitize_address_use_after_scope,
1310 true);
1312 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1313 is enabled. */
1314 if (opts->x_flag_sanitize_address_use_after_scope)
1316 if (opts->x_flag_stack_reuse != SR_NONE
1317 && opts_set->x_flag_stack_reuse != SR_NONE)
1318 error_at (loc,
1319 "%<-fsanitize-address-use-after-scope%> requires "
1320 "%<-fstack-reuse=none%> option");
1322 opts->x_flag_stack_reuse = SR_NONE;
1325 if ((opts->x_flag_sanitize & SANITIZE_USER_ADDRESS) && opts->x_flag_tm)
1326 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1328 if ((opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS) && opts->x_flag_tm)
1329 sorry ("transactional memory is not supported with "
1330 "%<-fsanitize=kernel-address%>");
1332 /* Currently live patching is not support for LTO. */
1333 if (opts->x_flag_live_patching == LIVE_PATCHING_INLINE_ONLY_STATIC && opts->x_flag_lto)
1334 sorry ("live patching (with %qs) is not supported with LTO",
1335 "inline-only-static");
1337 /* Currently vtable verification is not supported for LTO */
1338 if (opts->x_flag_vtable_verify && opts->x_flag_lto)
1339 sorry ("vtable verification is not supported with LTO");
1341 /* Control IPA optimizations based on different -flive-patching level. */
1342 if (opts->x_flag_live_patching)
1343 control_options_for_live_patching (opts, opts_set,
1344 opts->x_flag_live_patching,
1345 loc);
1347 /* Allow cunroll to grow size accordingly. */
1348 if (!opts_set->x_flag_cunroll_grow_size)
1349 opts->x_flag_cunroll_grow_size
1350 = (opts->x_flag_unroll_loops
1351 || opts->x_flag_peel_loops
1352 || opts->x_optimize >= 3);
1354 /* With -fcx-limited-range, we do cheap and quick complex arithmetic. */
1355 if (opts->x_flag_cx_limited_range)
1356 opts->x_flag_complex_method = 0;
1357 else if (opts_set->x_flag_cx_limited_range)
1358 opts->x_flag_complex_method = opts->x_flag_default_complex_method;
1360 /* With -fcx-fortran-rules, we do something in-between cheap and C99. */
1361 if (opts->x_flag_cx_fortran_rules)
1362 opts->x_flag_complex_method = 1;
1363 else if (opts_set->x_flag_cx_fortran_rules)
1364 opts->x_flag_complex_method = opts->x_flag_default_complex_method;
1366 /* Use -fvect-cost-model=cheap instead of -fvect-cost-mode=very-cheap
1367 by default with explicit -ftree-{loop,slp}-vectorize. */
1368 if (opts->x_optimize == 2
1369 && (opts_set->x_flag_tree_loop_vectorize
1370 || opts_set->x_flag_tree_vectorize))
1371 SET_OPTION_IF_UNSET (opts, opts_set, flag_vect_cost_model,
1372 VECT_COST_MODEL_CHEAP);
1374 if (opts->x_flag_gtoggle)
1376 /* Make sure to process -gtoggle only once. */
1377 opts->x_flag_gtoggle = false;
1378 if (opts->x_debug_info_level == DINFO_LEVEL_NONE)
1380 opts->x_debug_info_level = DINFO_LEVEL_NORMAL;
1382 if (opts->x_write_symbols == NO_DEBUG)
1383 opts->x_write_symbols = PREFERRED_DEBUGGING_TYPE;
1385 else
1386 opts->x_debug_info_level = DINFO_LEVEL_NONE;
1389 if (!opts_set->x_debug_nonbind_markers_p)
1390 opts->x_debug_nonbind_markers_p
1391 = (opts->x_optimize
1392 && opts->x_debug_info_level >= DINFO_LEVEL_NORMAL
1393 && dwarf_debuginfo_p (opts)
1394 && !(opts->x_flag_selective_scheduling
1395 || opts->x_flag_selective_scheduling2));
1397 /* We know which debug output will be used so we can set flag_var_tracking
1398 and flag_var_tracking_uninit if the user has not specified them. */
1399 if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL
1400 || !dwarf_debuginfo_p (opts)
1401 /* We have not yet initialized debug hooks so match that to check
1402 whether we're only doing DWARF2_LINENO_DEBUGGING_INFO. */
1403 #ifndef DWARF2_DEBUGGING_INFO
1404 || true
1405 #endif
1408 if ((opts_set->x_flag_var_tracking && opts->x_flag_var_tracking == 1)
1409 || (opts_set->x_flag_var_tracking_uninit
1410 && opts->x_flag_var_tracking_uninit == 1))
1412 if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL)
1413 warning_at (UNKNOWN_LOCATION, 0,
1414 "variable tracking requested, but useless unless "
1415 "producing debug info");
1416 else
1417 warning_at (UNKNOWN_LOCATION, 0,
1418 "variable tracking requested, but not supported "
1419 "by this debug format");
1421 opts->x_flag_var_tracking = 0;
1422 opts->x_flag_var_tracking_uninit = 0;
1423 opts->x_flag_var_tracking_assignments = 0;
1426 /* One could use EnabledBy, but it would lead to a circular dependency. */
1427 if (!opts_set->x_flag_var_tracking_uninit)
1428 opts->x_flag_var_tracking_uninit = opts->x_flag_var_tracking;
1430 if (!opts_set->x_flag_var_tracking_assignments)
1431 opts->x_flag_var_tracking_assignments
1432 = (opts->x_flag_var_tracking
1433 && !(opts->x_flag_selective_scheduling
1434 || opts->x_flag_selective_scheduling2));
1436 if (opts->x_flag_var_tracking_assignments_toggle)
1437 opts->x_flag_var_tracking_assignments
1438 = !opts->x_flag_var_tracking_assignments;
1440 if (opts->x_flag_var_tracking_assignments && !opts->x_flag_var_tracking)
1441 opts->x_flag_var_tracking = opts->x_flag_var_tracking_assignments = -1;
1443 if (opts->x_flag_var_tracking_assignments
1444 && (opts->x_flag_selective_scheduling
1445 || opts->x_flag_selective_scheduling2))
1446 warning_at (loc, 0,
1447 "var-tracking-assignments changes selective scheduling");
1449 if (opts->x_flag_syntax_only)
1451 opts->x_write_symbols = NO_DEBUG;
1452 opts->x_profile_flag = 0;
1455 if (opts->x_warn_strict_flex_arrays)
1456 if (opts->x_flag_strict_flex_arrays == 0)
1458 opts->x_warn_strict_flex_arrays = 0;
1459 warning_at (UNKNOWN_LOCATION, 0,
1460 "%<-Wstrict-flex-arrays%> is ignored when"
1461 " %<-fstrict-flex-arrays%> is not present");
1464 diagnose_options (opts, opts_set, loc);
1467 /* The function diagnoses incompatible combinations for provided options
1468 (OPTS and OPTS_SET) at a given LOCation. The function is called both
1469 when command line is parsed (after the target optimization hook) and
1470 when an optimize/target attribute (or pragma) is used. */
1472 void diagnose_options (gcc_options *opts, gcc_options *opts_set,
1473 location_t loc)
1475 /* The optimization to partition hot and cold basic blocks into separate
1476 sections of the .o and executable files does not work (currently)
1477 with exception handling. This is because there is no support for
1478 generating unwind info. If opts->x_flag_exceptions is turned on
1479 we need to turn off the partitioning optimization. */
1481 enum unwind_info_type ui_except
1482 = targetm_common.except_unwind_info (opts);
1484 if (opts->x_flag_exceptions
1485 && opts->x_flag_reorder_blocks_and_partition
1486 && (ui_except == UI_SJLJ || ui_except >= UI_TARGET))
1488 if (opts_set->x_flag_reorder_blocks_and_partition)
1489 inform (loc,
1490 "%<-freorder-blocks-and-partition%> does not work "
1491 "with exceptions on this architecture");
1492 opts->x_flag_reorder_blocks_and_partition = 0;
1493 opts->x_flag_reorder_blocks = 1;
1496 /* If user requested unwind info, then turn off the partitioning
1497 optimization. */
1499 if (opts->x_flag_unwind_tables
1500 && !targetm_common.unwind_tables_default
1501 && opts->x_flag_reorder_blocks_and_partition
1502 && (ui_except == UI_SJLJ || ui_except >= UI_TARGET))
1504 if (opts_set->x_flag_reorder_blocks_and_partition)
1505 inform (loc,
1506 "%<-freorder-blocks-and-partition%> does not support "
1507 "unwind info on this architecture");
1508 opts->x_flag_reorder_blocks_and_partition = 0;
1509 opts->x_flag_reorder_blocks = 1;
1512 /* If the target requested unwind info, then turn off the partitioning
1513 optimization with a different message. Likewise, if the target does not
1514 support named sections. */
1516 if (opts->x_flag_reorder_blocks_and_partition
1517 && (!targetm_common.have_named_sections
1518 || (opts->x_flag_unwind_tables
1519 && targetm_common.unwind_tables_default
1520 && (ui_except == UI_SJLJ || ui_except >= UI_TARGET))))
1522 if (opts_set->x_flag_reorder_blocks_and_partition)
1523 inform (loc,
1524 "%<-freorder-blocks-and-partition%> does not work "
1525 "on this architecture");
1526 opts->x_flag_reorder_blocks_and_partition = 0;
1527 opts->x_flag_reorder_blocks = 1;
1533 #define LEFT_COLUMN 27
1535 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1536 followed by word-wrapped HELP in a second column. */
1537 static void
1538 wrap_help (const char *help,
1539 const char *item,
1540 unsigned int item_width,
1541 unsigned int columns)
1543 unsigned int col_width = LEFT_COLUMN;
1544 unsigned int remaining, room, len;
1546 remaining = strlen (help);
1550 room = columns - 3 - MAX (col_width, item_width);
1551 if (room > columns)
1552 room = 0;
1553 len = remaining;
1555 if (room < len)
1557 unsigned int i;
1559 for (i = 0; help[i]; i++)
1561 if (i >= room && len != remaining)
1562 break;
1563 if (help[i] == ' ')
1564 len = i;
1565 else if ((help[i] == '-' || help[i] == '/')
1566 && help[i + 1] != ' '
1567 && i > 0 && ISALPHA (help[i - 1]))
1568 len = i + 1;
1572 printf (" %-*.*s %.*s\n", col_width, item_width, item, len, help);
1573 item_width = 0;
1574 while (help[len] == ' ')
1575 len++;
1576 help += len;
1577 remaining -= len;
1579 while (remaining);
1582 /* Data structure used to print list of valid option values. */
1584 class option_help_tuple
1586 public:
1587 option_help_tuple (int code, vec<const char *> values):
1588 m_code (code), m_values (values)
1591 /* Code of an option. */
1592 int m_code;
1594 /* List of possible values. */
1595 vec<const char *> m_values;
1598 /* Print help for a specific front-end, etc. */
1599 static void
1600 print_filtered_help (unsigned int include_flags,
1601 unsigned int exclude_flags,
1602 unsigned int any_flags,
1603 unsigned int columns,
1604 struct gcc_options *opts,
1605 unsigned int lang_mask)
1607 unsigned int i;
1608 const char *help;
1609 bool found = false;
1610 bool displayed = false;
1611 char new_help[256];
1613 if (!opts->x_help_printed)
1614 opts->x_help_printed = XCNEWVAR (char, cl_options_count);
1616 if (!opts->x_help_enum_printed)
1617 opts->x_help_enum_printed = XCNEWVAR (char, cl_enums_count);
1619 auto_vec<option_help_tuple> help_tuples;
1621 for (i = 0; i < cl_options_count; i++)
1623 const struct cl_option *option = cl_options + i;
1624 unsigned int len;
1625 const char *opt;
1626 const char *tab;
1628 if (include_flags == 0
1629 || ((option->flags & include_flags) != include_flags))
1631 if ((option->flags & any_flags) == 0)
1632 continue;
1635 /* Skip unwanted switches. */
1636 if ((option->flags & exclude_flags) != 0)
1637 continue;
1639 /* The driver currently prints its own help text. */
1640 if ((option->flags & CL_DRIVER) != 0
1641 && (option->flags & (((1U << cl_lang_count) - 1)
1642 | CL_COMMON | CL_TARGET)) == 0)
1643 continue;
1645 /* If an option contains a language specification,
1646 exclude it from common unless all languages are present. */
1647 if ((include_flags & CL_COMMON)
1648 && !(option->flags & CL_DRIVER)
1649 && (option->flags & CL_LANG_ALL)
1650 && (option->flags & CL_LANG_ALL) != CL_LANG_ALL)
1651 continue;
1653 found = true;
1654 /* Skip switches that have already been printed. */
1655 if (opts->x_help_printed[i])
1656 continue;
1658 opts->x_help_printed[i] = true;
1660 help = option->help;
1661 if (help == NULL)
1663 if (exclude_flags & CL_UNDOCUMENTED)
1664 continue;
1666 help = undocumented_msg;
1669 /* Get the translation. */
1670 help = _(help);
1672 if (option->alias_target < N_OPTS
1673 && cl_options [option->alias_target].help)
1675 const struct cl_option *target = cl_options + option->alias_target;
1676 if (option->help == NULL)
1678 /* The option is undocumented but is an alias for an option that
1679 is documented. If the option has alias arguments, then its
1680 purpose is to provide certain arguments to the other option, so
1681 inform the reader of this. Otherwise, point the reader to the
1682 other option in preference to the former. */
1684 if (option->alias_arg)
1686 if (option->neg_alias_arg)
1687 snprintf (new_help, sizeof new_help,
1688 _("Same as %s%s (or, in negated form, %s%s)."),
1689 target->opt_text, option->alias_arg,
1690 target->opt_text, option->neg_alias_arg);
1691 else
1692 snprintf (new_help, sizeof new_help,
1693 _("Same as %s%s."),
1694 target->opt_text, option->alias_arg);
1696 else
1697 snprintf (new_help, sizeof new_help,
1698 _("Same as %s."),
1699 target->opt_text);
1701 else
1703 /* For documented options with aliases, mention the aliased
1704 option's name for reference. */
1705 snprintf (new_help, sizeof new_help,
1706 _("%s Same as %s."),
1707 help, cl_options [option->alias_target].opt_text);
1710 help = new_help;
1713 if (option->warn_message)
1715 /* Mention that the use of the option will trigger a warning. */
1716 if (help == new_help)
1717 snprintf (new_help + strlen (new_help),
1718 sizeof new_help - strlen (new_help),
1719 " %s", _(use_diagnosed_msg));
1720 else
1721 snprintf (new_help, sizeof new_help,
1722 "%s %s", help, _(use_diagnosed_msg));
1724 help = new_help;
1727 /* Find the gap between the name of the
1728 option and its descriptive text. */
1729 tab = strchr (help, '\t');
1730 if (tab)
1732 len = tab - help;
1733 opt = help;
1734 help = tab + 1;
1736 else
1738 opt = option->opt_text;
1739 len = strlen (opt);
1742 /* With the -Q option enabled we change the descriptive text associated
1743 with an option to be an indication of its current setting. */
1744 if (!opts->x_quiet_flag)
1746 void *flag_var = option_flag_var (i, opts);
1748 if (len < (LEFT_COLUMN + 2))
1749 strcpy (new_help, "\t\t");
1750 else
1751 strcpy (new_help, "\t");
1753 /* Set to print whether the option is enabled or disabled,
1754 or, if it's an alias for another option, the name of
1755 the aliased option. */
1756 bool print_state = false;
1758 if (flag_var != NULL
1759 && option->var_type != CLVC_DEFER)
1761 /* If OPTION is only available for a specific subset
1762 of languages other than this one, mention them. */
1763 bool avail_for_lang = true;
1764 if (unsigned langset = option->flags & CL_LANG_ALL)
1766 if (!(langset & lang_mask))
1768 avail_for_lang = false;
1769 strcat (new_help, _("[available in "));
1770 for (unsigned i = 0, n = 0; (1U << i) < CL_LANG_ALL; ++i)
1771 if (langset & (1U << i))
1773 if (n++)
1774 strcat (new_help, ", ");
1775 strcat (new_help, lang_names[i]);
1777 strcat (new_help, "]");
1780 if (!avail_for_lang)
1781 ; /* Print nothing else if the option is not available
1782 in the current language. */
1783 else if (option->flags & CL_JOINED)
1785 if (option->var_type == CLVC_STRING)
1787 if (* (const char **) flag_var != NULL)
1788 snprintf (new_help + strlen (new_help),
1789 sizeof (new_help) - strlen (new_help),
1790 "%s", * (const char **) flag_var);
1792 else if (option->var_type == CLVC_ENUM)
1794 const struct cl_enum *e = &cl_enums[option->var_enum];
1795 int value;
1796 const char *arg = NULL;
1798 value = e->get (flag_var);
1799 enum_value_to_arg (e->values, &arg, value, lang_mask);
1800 if (arg == NULL)
1801 arg = _("[default]");
1802 snprintf (new_help + strlen (new_help),
1803 sizeof (new_help) - strlen (new_help),
1804 "%s", arg);
1806 else
1808 if (option->cl_host_wide_int)
1809 sprintf (new_help + strlen (new_help),
1810 _("%llu bytes"), (unsigned long long)
1811 *(unsigned HOST_WIDE_INT *) flag_var);
1812 else
1813 sprintf (new_help + strlen (new_help),
1814 "%i", * (int *) flag_var);
1817 else
1818 print_state = true;
1820 else
1821 /* When there is no argument, print the option state only
1822 if the option takes no argument. */
1823 print_state = !(option->flags & CL_JOINED);
1825 if (print_state)
1827 if (option->alias_target < N_OPTS
1828 && option->alias_target != OPT_SPECIAL_warn_removed
1829 && option->alias_target != OPT_SPECIAL_ignore
1830 && option->alias_target != OPT_SPECIAL_input_file
1831 && option->alias_target != OPT_SPECIAL_program_name
1832 && option->alias_target != OPT_SPECIAL_unknown)
1834 const struct cl_option *target
1835 = &cl_options[option->alias_target];
1836 sprintf (new_help + strlen (new_help), "%s%s",
1837 target->opt_text,
1838 option->alias_arg ? option->alias_arg : "");
1840 else if (option->alias_target == OPT_SPECIAL_ignore)
1841 strcat (new_help, ("[ignored]"));
1842 else
1844 /* Print the state for an on/off option. */
1845 int ena = option_enabled (i, lang_mask, opts);
1846 if (ena > 0)
1847 strcat (new_help, _("[enabled]"));
1848 else if (ena == 0)
1849 strcat (new_help, _("[disabled]"));
1853 help = new_help;
1856 if (option->range_max != -1 && tab == NULL)
1858 char b[128];
1859 snprintf (b, sizeof (b), "<%d,%d>", option->range_min,
1860 option->range_max);
1861 opt = concat (opt, b, NULL);
1862 len += strlen (b);
1865 wrap_help (help, opt, len, columns);
1866 displayed = true;
1868 if (option->var_type == CLVC_ENUM
1869 && opts->x_help_enum_printed[option->var_enum] != 2)
1870 opts->x_help_enum_printed[option->var_enum] = 1;
1871 else
1873 vec<const char *> option_values
1874 = targetm_common.get_valid_option_values (i, NULL);
1875 if (!option_values.is_empty ())
1876 help_tuples.safe_push (option_help_tuple (i, option_values));
1880 if (! found)
1882 unsigned int langs = include_flags & CL_LANG_ALL;
1884 if (langs == 0)
1885 printf (_(" No options with the desired characteristics were found\n"));
1886 else
1888 unsigned int i;
1890 /* PR 31349: Tell the user how to see all of the
1891 options supported by a specific front end. */
1892 for (i = 0; (1U << i) < CL_LANG_ALL; i ++)
1893 if ((1U << i) & langs)
1894 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1895 lang_names[i], lang_names[i]);
1899 else if (! displayed)
1900 printf (_(" All options with the desired characteristics have already been displayed\n"));
1902 putchar ('\n');
1904 /* Print details of enumerated option arguments, if those
1905 enumerations have help text headings provided. If no help text
1906 is provided, presume that the possible values are listed in the
1907 help text for the relevant options. */
1908 for (i = 0; i < cl_enums_count; i++)
1910 unsigned int j, pos;
1912 if (opts->x_help_enum_printed[i] != 1)
1913 continue;
1914 if (cl_enums[i].help == NULL)
1915 continue;
1916 printf (" %s\n ", _(cl_enums[i].help));
1917 pos = 4;
1918 for (j = 0; cl_enums[i].values[j].arg != NULL; j++)
1920 unsigned int len = strlen (cl_enums[i].values[j].arg);
1922 if (pos > 4 && pos + 1 + len <= columns)
1924 printf (" %s", cl_enums[i].values[j].arg);
1925 pos += 1 + len;
1927 else
1929 if (pos > 4)
1931 printf ("\n ");
1932 pos = 4;
1934 printf ("%s", cl_enums[i].values[j].arg);
1935 pos += len;
1938 printf ("\n\n");
1939 opts->x_help_enum_printed[i] = 2;
1942 for (unsigned i = 0; i < help_tuples.length (); i++)
1944 const struct cl_option *option = cl_options + help_tuples[i].m_code;
1945 printf (_(" Known valid arguments for %s option:\n "),
1946 option->opt_text);
1947 for (unsigned j = 0; j < help_tuples[i].m_values.length (); j++)
1948 printf (" %s", help_tuples[i].m_values[j]);
1949 printf ("\n\n");
1953 /* Display help for a specified type of option.
1954 The options must have ALL of the INCLUDE_FLAGS set
1955 ANY of the flags in the ANY_FLAGS set
1956 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1957 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1958 static void
1959 print_specific_help (unsigned int include_flags,
1960 unsigned int exclude_flags,
1961 unsigned int any_flags,
1962 struct gcc_options *opts,
1963 unsigned int lang_mask)
1965 unsigned int all_langs_mask = (1U << cl_lang_count) - 1;
1966 const char * description = NULL;
1967 const char * descrip_extra = "";
1968 size_t i;
1969 unsigned int flag;
1971 /* Sanity check: Make sure that we do not have more
1972 languages than we have bits available to enumerate them. */
1973 gcc_assert ((1U << cl_lang_count) <= CL_MIN_OPTION_CLASS);
1975 /* If we have not done so already, obtain
1976 the desired maximum width of the output. */
1977 if (opts->x_help_columns == 0)
1979 opts->x_help_columns = get_terminal_width ();
1980 if (opts->x_help_columns == INT_MAX)
1981 /* Use a reasonable default. */
1982 opts->x_help_columns = 80;
1985 /* Decide upon the title for the options that we are going to display. */
1986 for (i = 0, flag = 1; flag <= CL_MAX_OPTION_CLASS; flag <<= 1, i ++)
1988 switch (flag & include_flags)
1990 case 0:
1991 case CL_DRIVER:
1992 break;
1994 case CL_TARGET:
1995 description = _("The following options are target specific");
1996 break;
1997 case CL_WARNING:
1998 description = _("The following options control compiler warning messages");
1999 break;
2000 case CL_OPTIMIZATION:
2001 description = _("The following options control optimizations");
2002 break;
2003 case CL_COMMON:
2004 description = _("The following options are language-independent");
2005 break;
2006 case CL_PARAMS:
2007 description = _("The following options control parameters");
2008 break;
2009 default:
2010 if (i >= cl_lang_count)
2011 break;
2012 if (exclude_flags & all_langs_mask)
2013 description = _("The following options are specific to just the language ");
2014 else
2015 description = _("The following options are supported by the language ");
2016 descrip_extra = lang_names [i];
2017 break;
2021 if (description == NULL)
2023 if (any_flags == 0)
2025 if (include_flags & CL_UNDOCUMENTED)
2026 description = _("The following options are not documented");
2027 else if (include_flags & CL_SEPARATE)
2028 description = _("The following options take separate arguments");
2029 else if (include_flags & CL_JOINED)
2030 description = _("The following options take joined arguments");
2031 else
2033 internal_error ("unrecognized %<include_flags 0x%x%> passed "
2034 "to %<print_specific_help%>",
2035 include_flags);
2036 return;
2039 else
2041 if (any_flags & all_langs_mask)
2042 description = _("The following options are language-related");
2043 else
2044 description = _("The following options are language-independent");
2048 printf ("%s%s:\n", description, descrip_extra);
2049 print_filtered_help (include_flags, exclude_flags, any_flags,
2050 opts->x_help_columns, opts, lang_mask);
2053 /* Enable FDO-related flags. */
2055 static void
2056 enable_fdo_optimizations (struct gcc_options *opts,
2057 struct gcc_options *opts_set,
2058 int value)
2060 SET_OPTION_IF_UNSET (opts, opts_set, flag_branch_probabilities, value);
2061 SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value);
2062 SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_loops, value);
2063 SET_OPTION_IF_UNSET (opts, opts_set, flag_peel_loops, value);
2064 SET_OPTION_IF_UNSET (opts, opts_set, flag_tracer, value);
2065 SET_OPTION_IF_UNSET (opts, opts_set, flag_value_profile_transformations,
2066 value);
2067 SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value);
2068 SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp, value);
2069 if (value)
2071 SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp_clone, 1);
2072 SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, 1);
2074 SET_OPTION_IF_UNSET (opts, opts_set, flag_predictive_commoning, value);
2075 SET_OPTION_IF_UNSET (opts, opts_set, flag_split_loops, value);
2076 SET_OPTION_IF_UNSET (opts, opts_set, flag_unswitch_loops, value);
2077 SET_OPTION_IF_UNSET (opts, opts_set, flag_gcse_after_reload, value);
2078 SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_vectorize, value);
2079 SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_slp_vectorize, value);
2080 SET_OPTION_IF_UNSET (opts, opts_set, flag_version_loops_for_strides, value);
2081 SET_OPTION_IF_UNSET (opts, opts_set, flag_vect_cost_model,
2082 VECT_COST_MODEL_DYNAMIC);
2083 SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribute_patterns,
2084 value);
2085 SET_OPTION_IF_UNSET (opts, opts_set, flag_loop_interchange, value);
2086 SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_jam, value);
2087 SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribution, value);
2090 /* -f{,no-}sanitize{,-recover}= suboptions. */
2091 const struct sanitizer_opts_s sanitizer_opts[] =
2093 #define SANITIZER_OPT(name, flags, recover, trap) \
2094 { #name, flags, sizeof #name - 1, recover, trap }
2095 SANITIZER_OPT (address, (SANITIZE_ADDRESS | SANITIZE_USER_ADDRESS), true,
2096 false),
2097 SANITIZER_OPT (hwaddress, (SANITIZE_HWADDRESS | SANITIZE_USER_HWADDRESS),
2098 true, false),
2099 SANITIZER_OPT (kernel-address, (SANITIZE_ADDRESS | SANITIZE_KERNEL_ADDRESS),
2100 true, false),
2101 SANITIZER_OPT (kernel-hwaddress,
2102 (SANITIZE_HWADDRESS | SANITIZE_KERNEL_HWADDRESS),
2103 true, false),
2104 SANITIZER_OPT (pointer-compare, SANITIZE_POINTER_COMPARE, true, false),
2105 SANITIZER_OPT (pointer-subtract, SANITIZE_POINTER_SUBTRACT, true, false),
2106 SANITIZER_OPT (thread, SANITIZE_THREAD, false, false),
2107 SANITIZER_OPT (leak, SANITIZE_LEAK, false, false),
2108 SANITIZER_OPT (shift, SANITIZE_SHIFT, true, true),
2109 SANITIZER_OPT (shift-base, SANITIZE_SHIFT_BASE, true, true),
2110 SANITIZER_OPT (shift-exponent, SANITIZE_SHIFT_EXPONENT, true, true),
2111 SANITIZER_OPT (integer-divide-by-zero, SANITIZE_DIVIDE, true, true),
2112 SANITIZER_OPT (undefined, SANITIZE_UNDEFINED, true, true),
2113 SANITIZER_OPT (unreachable, SANITIZE_UNREACHABLE, false, true),
2114 SANITIZER_OPT (vla-bound, SANITIZE_VLA, true, true),
2115 SANITIZER_OPT (return, SANITIZE_RETURN, false, true),
2116 SANITIZER_OPT (null, SANITIZE_NULL, true, true),
2117 SANITIZER_OPT (signed-integer-overflow, SANITIZE_SI_OVERFLOW, true, true),
2118 SANITIZER_OPT (bool, SANITIZE_BOOL, true, true),
2119 SANITIZER_OPT (enum, SANITIZE_ENUM, true, true),
2120 SANITIZER_OPT (float-divide-by-zero, SANITIZE_FLOAT_DIVIDE, true, true),
2121 SANITIZER_OPT (float-cast-overflow, SANITIZE_FLOAT_CAST, true, true),
2122 SANITIZER_OPT (bounds, SANITIZE_BOUNDS, true, true),
2123 SANITIZER_OPT (bounds-strict, SANITIZE_BOUNDS | SANITIZE_BOUNDS_STRICT, true,
2124 true),
2125 SANITIZER_OPT (alignment, SANITIZE_ALIGNMENT, true, true),
2126 SANITIZER_OPT (nonnull-attribute, SANITIZE_NONNULL_ATTRIBUTE, true, true),
2127 SANITIZER_OPT (returns-nonnull-attribute, SANITIZE_RETURNS_NONNULL_ATTRIBUTE,
2128 true, true),
2129 SANITIZER_OPT (object-size, SANITIZE_OBJECT_SIZE, true, true),
2130 SANITIZER_OPT (vptr, SANITIZE_VPTR, true, false),
2131 SANITIZER_OPT (pointer-overflow, SANITIZE_POINTER_OVERFLOW, true, true),
2132 SANITIZER_OPT (builtin, SANITIZE_BUILTIN, true, true),
2133 SANITIZER_OPT (shadow-call-stack, SANITIZE_SHADOW_CALL_STACK, false, false),
2134 SANITIZER_OPT (all, ~0U, true, true),
2135 #undef SANITIZER_OPT
2136 { NULL, 0U, 0UL, false, false }
2139 /* -fzero-call-used-regs= suboptions. */
2140 const struct zero_call_used_regs_opts_s zero_call_used_regs_opts[] =
2142 #define ZERO_CALL_USED_REGS_OPT(name, flags) \
2143 { #name, flags }
2144 ZERO_CALL_USED_REGS_OPT (skip, zero_regs_flags::SKIP),
2145 ZERO_CALL_USED_REGS_OPT (used-gpr-arg, zero_regs_flags::USED_GPR_ARG),
2146 ZERO_CALL_USED_REGS_OPT (used-gpr, zero_regs_flags::USED_GPR),
2147 ZERO_CALL_USED_REGS_OPT (used-arg, zero_regs_flags::USED_ARG),
2148 ZERO_CALL_USED_REGS_OPT (used, zero_regs_flags::USED),
2149 ZERO_CALL_USED_REGS_OPT (all-gpr-arg, zero_regs_flags::ALL_GPR_ARG),
2150 ZERO_CALL_USED_REGS_OPT (all-gpr, zero_regs_flags::ALL_GPR),
2151 ZERO_CALL_USED_REGS_OPT (all-arg, zero_regs_flags::ALL_ARG),
2152 ZERO_CALL_USED_REGS_OPT (all, zero_regs_flags::ALL),
2153 ZERO_CALL_USED_REGS_OPT (leafy-gpr-arg, zero_regs_flags::LEAFY_GPR_ARG),
2154 ZERO_CALL_USED_REGS_OPT (leafy-gpr, zero_regs_flags::LEAFY_GPR),
2155 ZERO_CALL_USED_REGS_OPT (leafy-arg, zero_regs_flags::LEAFY_ARG),
2156 ZERO_CALL_USED_REGS_OPT (leafy, zero_regs_flags::LEAFY),
2157 #undef ZERO_CALL_USED_REGS_OPT
2158 {NULL, 0U}
2161 /* A struct for describing a run of chars within a string. */
2163 class string_fragment
2165 public:
2166 string_fragment (const char *start, size_t len)
2167 : m_start (start), m_len (len) {}
2169 const char *m_start;
2170 size_t m_len;
2173 /* Specialization of edit_distance_traits for string_fragment,
2174 for use by get_closest_sanitizer_option. */
2176 template <>
2177 struct edit_distance_traits<const string_fragment &>
2179 static size_t get_length (const string_fragment &fragment)
2181 return fragment.m_len;
2184 static const char *get_string (const string_fragment &fragment)
2186 return fragment.m_start;
2190 /* Given ARG, an unrecognized sanitizer option, return the best
2191 matching sanitizer option, or NULL if there isn't one.
2192 OPTS is array of candidate sanitizer options.
2193 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or OPT_fsanitize_trap_.
2194 VALUE is non-zero for the regular form of the option, zero
2195 for the "no-" form (e.g. "-fno-sanitize-recover="). */
2197 static const char *
2198 get_closest_sanitizer_option (const string_fragment &arg,
2199 const struct sanitizer_opts_s *opts,
2200 enum opt_code code, int value)
2202 best_match <const string_fragment &, const char*> bm (arg);
2203 for (int i = 0; opts[i].name != NULL; ++i)
2205 /* -fsanitize=all is not valid, so don't offer it. */
2206 if (code == OPT_fsanitize_
2207 && opts[i].flag == ~0U
2208 && value)
2209 continue;
2211 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
2212 don't offer the non-recoverable options. */
2213 if (code == OPT_fsanitize_recover_
2214 && !opts[i].can_recover
2215 && value)
2216 continue;
2218 /* For -fsanitize-trap= (and not -fno-sanitize-trap=),
2219 don't offer the non-trapping options. */
2220 if (code == OPT_fsanitize_trap_
2221 && !opts[i].can_trap
2222 && value)
2223 continue;
2225 bm.consider (opts[i].name);
2227 return bm.get_best_meaningful_candidate ();
2230 /* Parse comma separated sanitizer suboptions from P for option SCODE,
2231 adjust previous FLAGS and return new ones. If COMPLAIN is false,
2232 don't issue diagnostics. */
2234 unsigned int
2235 parse_sanitizer_options (const char *p, location_t loc, int scode,
2236 unsigned int flags, int value, bool complain)
2238 enum opt_code code = (enum opt_code) scode;
2240 while (*p != 0)
2242 size_t len, i;
2243 bool found = false;
2244 const char *comma = strchr (p, ',');
2246 if (comma == NULL)
2247 len = strlen (p);
2248 else
2249 len = comma - p;
2250 if (len == 0)
2252 p = comma + 1;
2253 continue;
2256 /* Check to see if the string matches an option class name. */
2257 for (i = 0; sanitizer_opts[i].name != NULL; ++i)
2258 if (len == sanitizer_opts[i].len
2259 && memcmp (p, sanitizer_opts[i].name, len) == 0)
2261 /* Handle both -fsanitize and -fno-sanitize cases. */
2262 if (value && sanitizer_opts[i].flag == ~0U)
2264 if (code == OPT_fsanitize_)
2266 if (complain)
2267 error_at (loc, "%<-fsanitize=all%> option is not valid");
2269 else if (code == OPT_fsanitize_recover_)
2270 flags |= ~(SANITIZE_THREAD | SANITIZE_LEAK
2271 | SANITIZE_UNREACHABLE | SANITIZE_RETURN
2272 | SANITIZE_SHADOW_CALL_STACK);
2273 else /* if (code == OPT_fsanitize_trap_) */
2274 flags |= (SANITIZE_UNDEFINED
2275 | SANITIZE_UNDEFINED_NONDEFAULT);
2277 else if (value)
2279 /* Do not enable -fsanitize-recover=unreachable and
2280 -fsanitize-recover=return if -fsanitize-recover=undefined
2281 is selected. */
2282 if (code == OPT_fsanitize_recover_
2283 && sanitizer_opts[i].flag == SANITIZE_UNDEFINED)
2284 flags |= (SANITIZE_UNDEFINED
2285 & ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN));
2286 else if (code == OPT_fsanitize_trap_
2287 && sanitizer_opts[i].flag == SANITIZE_VPTR)
2288 error_at (loc, "%<-fsanitize-trap=%s%> is not supported",
2289 sanitizer_opts[i].name);
2290 else
2291 flags |= sanitizer_opts[i].flag;
2293 else
2295 flags &= ~sanitizer_opts[i].flag;
2296 /* Don't always clear SANITIZE_ADDRESS if it was previously
2297 set: -fsanitize=address -fno-sanitize=kernel-address should
2298 leave SANITIZE_ADDRESS set. */
2299 if (flags & (SANITIZE_KERNEL_ADDRESS | SANITIZE_USER_ADDRESS))
2300 flags |= SANITIZE_ADDRESS;
2302 found = true;
2303 break;
2306 if (! found && complain)
2308 const char *hint
2309 = get_closest_sanitizer_option (string_fragment (p, len),
2310 sanitizer_opts, code, value);
2312 const char *suffix;
2313 if (code == OPT_fsanitize_recover_)
2314 suffix = "-recover";
2315 else if (code == OPT_fsanitize_trap_)
2316 suffix = "-trap";
2317 else
2318 suffix = "";
2320 if (hint)
2321 error_at (loc,
2322 "unrecognized argument to %<-f%ssanitize%s=%> "
2323 "option: %q.*s; did you mean %qs?",
2324 value ? "" : "no-",
2325 suffix, (int) len, p, hint);
2326 else
2327 error_at (loc,
2328 "unrecognized argument to %<-f%ssanitize%s=%> option: "
2329 "%q.*s", value ? "" : "no-",
2330 suffix, (int) len, p);
2333 if (comma == NULL)
2334 break;
2335 p = comma + 1;
2337 return flags;
2340 /* Parse string values of no_sanitize attribute passed in VALUE.
2341 Values are separated with comma. */
2343 unsigned int
2344 parse_no_sanitize_attribute (char *value)
2346 unsigned int flags = 0;
2347 unsigned int i;
2348 char *q = strtok (value, ",");
2350 while (q != NULL)
2352 for (i = 0; sanitizer_opts[i].name != NULL; ++i)
2353 if (strcmp (sanitizer_opts[i].name, q) == 0)
2355 flags |= sanitizer_opts[i].flag;
2356 if (sanitizer_opts[i].flag == SANITIZE_UNDEFINED)
2357 flags |= SANITIZE_UNDEFINED_NONDEFAULT;
2358 break;
2361 if (sanitizer_opts[i].name == NULL)
2362 warning (OPT_Wattributes,
2363 "%qs attribute directive ignored", q);
2365 q = strtok (NULL, ",");
2368 return flags;
2371 /* Parse -fzero-call-used-regs suboptions from ARG, return the FLAGS. */
2373 unsigned int
2374 parse_zero_call_used_regs_options (const char *arg)
2376 unsigned int flags = 0;
2378 /* Check to see if the string matches a sub-option name. */
2379 for (unsigned int i = 0; zero_call_used_regs_opts[i].name != NULL; ++i)
2380 if (strcmp (arg, zero_call_used_regs_opts[i].name) == 0)
2382 flags = zero_call_used_regs_opts[i].flag;
2383 break;
2386 if (!flags)
2387 error ("unrecognized argument to %<-fzero-call-used-regs=%>: %qs", arg);
2389 return flags;
2392 /* Parse -falign-NAME format for a FLAG value. Return individual
2393 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
2394 set, print error message at LOC location. */
2396 bool
2397 parse_and_check_align_values (const char *flag,
2398 const char *name,
2399 auto_vec<unsigned> &result_values,
2400 bool report_error,
2401 location_t loc)
2403 char *str = xstrdup (flag);
2404 for (char *p = strtok (str, ":"); p; p = strtok (NULL, ":"))
2406 char *end;
2407 int v = strtol (p, &end, 10);
2408 if (*end != '\0' || v < 0)
2410 if (report_error)
2411 error_at (loc, "invalid arguments for %<-falign-%s%> option: %qs",
2412 name, flag);
2414 return false;
2417 result_values.safe_push ((unsigned)v);
2420 free (str);
2422 /* Check that we have a correct number of values. */
2423 if (result_values.is_empty () || result_values.length () > 4)
2425 if (report_error)
2426 error_at (loc, "invalid number of arguments for %<-falign-%s%> "
2427 "option: %qs", name, flag);
2428 return false;
2431 for (unsigned i = 0; i < result_values.length (); i++)
2432 if (result_values[i] > MAX_CODE_ALIGN_VALUE)
2434 if (report_error)
2435 error_at (loc, "%<-falign-%s%> is not between 0 and %d",
2436 name, MAX_CODE_ALIGN_VALUE);
2437 return false;
2440 return true;
2443 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2444 location LOC. OPT_STR points to the stored -falign-NAME=argument and
2445 OPT_FLAG points to the associated -falign-NAME on/off flag. */
2447 static void
2448 check_alignment_argument (location_t loc, const char *flag, const char *name,
2449 int *opt_flag, const char **opt_str)
2451 auto_vec<unsigned> align_result;
2452 parse_and_check_align_values (flag, name, align_result, true, loc);
2454 if (align_result.length() >= 1 && align_result[0] == 0)
2456 *opt_flag = 1;
2457 *opt_str = NULL;
2461 /* Parse argument of -fpatchable-function-entry option ARG and store
2462 corresponding values to PATCH_AREA_SIZE and PATCH_AREA_START.
2463 If REPORT_ERROR is set to true, generate error for a problematic
2464 option arguments. */
2466 void
2467 parse_and_check_patch_area (const char *arg, bool report_error,
2468 HOST_WIDE_INT *patch_area_size,
2469 HOST_WIDE_INT *patch_area_start)
2471 *patch_area_size = 0;
2472 *patch_area_start = 0;
2474 if (arg == NULL)
2475 return;
2477 char *patch_area_arg = xstrdup (arg);
2478 char *comma = strchr (patch_area_arg, ',');
2479 if (comma)
2481 *comma = '\0';
2482 *patch_area_size = integral_argument (patch_area_arg);
2483 *patch_area_start = integral_argument (comma + 1);
2485 else
2486 *patch_area_size = integral_argument (patch_area_arg);
2488 if (*patch_area_size < 0
2489 || *patch_area_size > USHRT_MAX
2490 || *patch_area_start < 0
2491 || *patch_area_start > USHRT_MAX
2492 || *patch_area_size < *patch_area_start)
2493 if (report_error)
2494 error ("invalid arguments for %<-fpatchable-function-entry%>");
2496 free (patch_area_arg);
2499 /* Print options enabled by -fhardened. Keep this in sync with the manual! */
2501 static void
2502 print_help_hardened ()
2504 printf ("%s\n", "The following options are enabled by -fhardened:");
2505 /* Unfortunately, I can't seem to use targetm.fortify_source_default_level
2506 here. */
2507 printf (" %s\n", "-D_FORTIFY_SOURCE=3 (or =2 for glibc < 2.35)");
2508 printf (" %s\n", "-D_GLIBCXX_ASSERTIONS");
2509 printf (" %s\n", "-ftrivial-auto-var-init=zero");
2510 #ifdef HAVE_LD_PIE
2511 printf (" %s %s\n", "-fPIE", "-pie");
2512 #endif
2513 if (HAVE_LD_NOW_SUPPORT)
2514 printf (" %s\n", "-Wl,-z,now");
2515 if (HAVE_LD_RELRO_SUPPORT)
2516 printf (" %s\n", "-Wl,-z,relro");
2517 printf (" %s\n", "-fstack-protector-strong");
2518 printf (" %s\n", "-fstack-clash-protection");
2519 printf (" %s\n", "-fcf-protection=full");
2520 putchar ('\n');
2523 /* Print help when OPT__help_ is set. */
2525 void
2526 print_help (struct gcc_options *opts, unsigned int lang_mask,
2527 const char *help_option_argument)
2529 const char *a = help_option_argument;
2530 unsigned int include_flags = 0;
2531 /* Note - by default we include undocumented options when listing
2532 specific classes. If you only want to see documented options
2533 then add ",^undocumented" to the --help= option. E.g.:
2535 --help=target,^undocumented */
2536 unsigned int exclude_flags = 0;
2538 if (lang_mask == CL_DRIVER)
2539 return;
2541 /* Walk along the argument string, parsing each word in turn.
2542 The format is:
2543 arg = [^]{word}[,{arg}]
2544 word = {optimizers|target|warnings|undocumented|
2545 params|common|<language>} */
2546 while (*a != 0)
2548 static const struct
2550 const char *string;
2551 unsigned int flag;
2553 specifics[] =
2555 { "optimizers", CL_OPTIMIZATION },
2556 { "target", CL_TARGET },
2557 { "warnings", CL_WARNING },
2558 { "undocumented", CL_UNDOCUMENTED },
2559 { "params", CL_PARAMS },
2560 { "joined", CL_JOINED },
2561 { "separate", CL_SEPARATE },
2562 { "common", CL_COMMON },
2563 { NULL, 0 }
2565 unsigned int *pflags;
2566 const char *comma;
2567 unsigned int lang_flag, specific_flag;
2568 unsigned int len;
2569 unsigned int i;
2571 if (*a == '^')
2573 ++a;
2574 if (*a == '\0')
2576 error ("missing argument to %qs", "--help=^");
2577 break;
2579 pflags = &exclude_flags;
2581 else
2582 pflags = &include_flags;
2584 comma = strchr (a, ',');
2585 if (comma == NULL)
2586 len = strlen (a);
2587 else
2588 len = comma - a;
2589 if (len == 0)
2591 a = comma + 1;
2592 continue;
2595 /* Check to see if the string matches an option class name. */
2596 for (i = 0, specific_flag = 0; specifics[i].string != NULL; i++)
2597 if (strncasecmp (a, specifics[i].string, len) == 0)
2599 specific_flag = specifics[i].flag;
2600 break;
2603 /* Check to see if the string matches a language name.
2604 Note - we rely upon the alpha-sorted nature of the entries in
2605 the lang_names array, specifically that shorter names appear
2606 before their longer variants. (i.e. C before C++). That way
2607 when we are attempting to match --help=c for example we will
2608 match with C first and not C++. */
2609 for (i = 0, lang_flag = 0; i < cl_lang_count; i++)
2610 if (strncasecmp (a, lang_names[i], len) == 0)
2612 lang_flag = 1U << i;
2613 break;
2616 if (specific_flag != 0)
2618 if (lang_flag == 0)
2619 *pflags |= specific_flag;
2620 else
2622 /* The option's argument matches both the start of a
2623 language name and the start of an option class name.
2624 We have a special case for when the user has
2625 specified "--help=c", but otherwise we have to issue
2626 a warning. */
2627 if (strncasecmp (a, "c", len) == 0)
2628 *pflags |= lang_flag;
2629 else
2630 warning (0,
2631 "%<--help%> argument %q.*s is ambiguous, "
2632 "please be more specific",
2633 len, a);
2636 else if (lang_flag != 0)
2637 *pflags |= lang_flag;
2638 else if (strncasecmp (a, "hardened", len) == 0)
2639 print_help_hardened ();
2640 else
2641 warning (0,
2642 "unrecognized argument to %<--help=%> option: %q.*s",
2643 len, a);
2645 if (comma == NULL)
2646 break;
2647 a = comma + 1;
2650 /* We started using PerFunction/Optimization for parameters and
2651 a warning. We should exclude these from optimization options. */
2652 if (include_flags & CL_OPTIMIZATION)
2653 exclude_flags |= CL_WARNING;
2654 if (!(include_flags & CL_PARAMS))
2655 exclude_flags |= CL_PARAMS;
2657 if (include_flags)
2658 print_specific_help (include_flags, exclude_flags, 0, opts,
2659 lang_mask);
2662 /* Handle target- and language-independent options. Return zero to
2663 generate an "unknown option" message. Only options that need
2664 extra handling need to be listed here; if you simply want
2665 DECODED->value assigned to a variable, it happens automatically. */
2667 bool
2668 common_handle_option (struct gcc_options *opts,
2669 struct gcc_options *opts_set,
2670 const struct cl_decoded_option *decoded,
2671 unsigned int lang_mask, int kind ATTRIBUTE_UNUSED,
2672 location_t loc,
2673 const struct cl_option_handlers *handlers,
2674 diagnostic_context *dc,
2675 void (*target_option_override_hook) (void))
2677 size_t scode = decoded->opt_index;
2678 const char *arg = decoded->arg;
2679 HOST_WIDE_INT value = decoded->value;
2680 enum opt_code code = (enum opt_code) scode;
2682 gcc_assert (decoded->canonical_option_num_elements <= 2);
2684 switch (code)
2686 case OPT__help:
2688 unsigned int all_langs_mask = (1U << cl_lang_count) - 1;
2689 unsigned int undoc_mask;
2690 unsigned int i;
2692 if (lang_mask == CL_DRIVER)
2693 break;
2695 undoc_mask = ((opts->x_verbose_flag | opts->x_extra_warnings)
2697 : CL_UNDOCUMENTED);
2698 target_option_override_hook ();
2699 /* First display any single language specific options. */
2700 for (i = 0; i < cl_lang_count; i++)
2701 print_specific_help
2702 (1U << i, (all_langs_mask & (~ (1U << i))) | undoc_mask, 0, opts,
2703 lang_mask);
2704 /* Next display any multi language specific options. */
2705 print_specific_help (0, undoc_mask, all_langs_mask, opts, lang_mask);
2706 /* Then display any remaining, non-language options. */
2707 for (i = CL_MIN_OPTION_CLASS; i <= CL_MAX_OPTION_CLASS; i <<= 1)
2708 if (i != CL_DRIVER)
2709 print_specific_help (i, undoc_mask, 0, opts, lang_mask);
2710 opts->x_exit_after_options = true;
2711 break;
2714 case OPT__target_help:
2715 if (lang_mask == CL_DRIVER)
2716 break;
2718 target_option_override_hook ();
2719 print_specific_help (CL_TARGET, 0, 0, opts, lang_mask);
2720 opts->x_exit_after_options = true;
2721 break;
2723 case OPT__help_:
2725 help_option_arguments.safe_push (arg);
2726 opts->x_exit_after_options = true;
2727 break;
2730 case OPT__version:
2731 if (lang_mask == CL_DRIVER)
2732 break;
2734 opts->x_exit_after_options = true;
2735 break;
2737 case OPT__completion_:
2738 break;
2740 case OPT_fsanitize_:
2741 opts_set->x_flag_sanitize = true;
2742 opts->x_flag_sanitize
2743 = parse_sanitizer_options (arg, loc, code,
2744 opts->x_flag_sanitize, value, true);
2746 /* Kernel ASan implies normal ASan but does not yet support
2747 all features. */
2748 if (opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS)
2750 SET_OPTION_IF_UNSET (opts, opts_set,
2751 param_asan_instrumentation_with_call_threshold,
2753 SET_OPTION_IF_UNSET (opts, opts_set, param_asan_globals, 0);
2754 SET_OPTION_IF_UNSET (opts, opts_set, param_asan_stack, 0);
2755 SET_OPTION_IF_UNSET (opts, opts_set, param_asan_protect_allocas, 0);
2756 SET_OPTION_IF_UNSET (opts, opts_set, param_asan_use_after_return, 0);
2758 if (opts->x_flag_sanitize & SANITIZE_KERNEL_HWADDRESS)
2760 SET_OPTION_IF_UNSET (opts, opts_set,
2761 param_hwasan_instrument_stack, 0);
2762 SET_OPTION_IF_UNSET (opts, opts_set,
2763 param_hwasan_random_frame_tag, 0);
2764 SET_OPTION_IF_UNSET (opts, opts_set,
2765 param_hwasan_instrument_allocas, 0);
2767 break;
2769 case OPT_fsanitize_recover_:
2770 opts->x_flag_sanitize_recover
2771 = parse_sanitizer_options (arg, loc, code,
2772 opts->x_flag_sanitize_recover, value, true);
2773 break;
2775 case OPT_fsanitize_trap_:
2776 opts->x_flag_sanitize_trap
2777 = parse_sanitizer_options (arg, loc, code,
2778 opts->x_flag_sanitize_trap, value, true);
2779 break;
2781 case OPT_fasan_shadow_offset_:
2782 /* Deferred. */
2783 break;
2785 case OPT_fsanitize_address_use_after_scope:
2786 opts->x_flag_sanitize_address_use_after_scope = value;
2787 break;
2789 case OPT_fsanitize_recover:
2790 if (value)
2791 opts->x_flag_sanitize_recover
2792 |= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT)
2793 & ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN);
2794 else
2795 opts->x_flag_sanitize_recover
2796 &= ~(SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT);
2797 break;
2799 case OPT_fsanitize_trap:
2800 if (value)
2801 opts->x_flag_sanitize_trap
2802 |= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT);
2803 else
2804 opts->x_flag_sanitize_trap
2805 &= ~(SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT);
2806 break;
2808 case OPT_O:
2809 case OPT_Os:
2810 case OPT_Ofast:
2811 case OPT_Og:
2812 case OPT_Oz:
2813 /* Currently handled in a prescan. */
2814 break;
2816 case OPT_Wattributes_:
2817 if (lang_mask == CL_DRIVER)
2818 break;
2820 if (value)
2822 error_at (loc, "arguments ignored for %<-Wattributes=%>; use "
2823 "%<-Wno-attributes=%> instead");
2824 break;
2826 else if (arg[strlen (arg) - 1] == ',')
2828 error_at (loc, "trailing %<,%> in arguments for "
2829 "%<-Wno-attributes=%>");
2830 break;
2833 add_comma_separated_to_vector (&opts->x_flag_ignored_attributes, arg);
2834 break;
2836 case OPT_Werror:
2837 dc->set_warning_as_error_requested (value);
2838 break;
2840 case OPT_Werror_:
2841 if (lang_mask == CL_DRIVER)
2842 break;
2844 enable_warning_as_error (arg, value, lang_mask, handlers,
2845 opts, opts_set, loc, dc);
2846 break;
2848 case OPT_Wfatal_errors:
2849 dc->m_fatal_errors = value;
2850 break;
2852 case OPT_Wstack_usage_:
2853 opts->x_flag_stack_usage_info = value != -1;
2854 break;
2856 case OPT_Wstrict_aliasing:
2857 set_Wstrict_aliasing (opts, value);
2858 break;
2860 case OPT_Wstrict_overflow:
2861 opts->x_warn_strict_overflow = (value
2862 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2863 : 0);
2864 break;
2866 case OPT_Wsystem_headers:
2867 dc->m_warn_system_headers = value;
2868 break;
2870 case OPT_aux_info:
2871 opts->x_flag_gen_aux_info = 1;
2872 break;
2874 case OPT_d:
2875 decode_d_option (arg, opts, loc, dc);
2876 break;
2878 case OPT_fcall_used_:
2879 case OPT_fcall_saved_:
2880 /* Deferred. */
2881 break;
2883 case OPT_fdbg_cnt_:
2884 /* Deferred. */
2885 break;
2887 case OPT_fdebug_prefix_map_:
2888 case OPT_ffile_prefix_map_:
2889 case OPT_fprofile_prefix_map_:
2890 /* Deferred. */
2891 break;
2893 case OPT_fcanon_prefix_map:
2894 flag_canon_prefix_map = value;
2895 break;
2897 case OPT_fcallgraph_info:
2898 opts->x_flag_callgraph_info = CALLGRAPH_INFO_NAKED;
2899 break;
2901 case OPT_fcallgraph_info_:
2903 char *my_arg, *p;
2904 my_arg = xstrdup (arg);
2905 p = strtok (my_arg, ",");
2906 while (p)
2908 if (strcmp (p, "su") == 0)
2910 opts->x_flag_callgraph_info |= CALLGRAPH_INFO_STACK_USAGE;
2911 opts->x_flag_stack_usage_info = true;
2913 else if (strcmp (p, "da") == 0)
2914 opts->x_flag_callgraph_info |= CALLGRAPH_INFO_DYNAMIC_ALLOC;
2915 else
2916 return 0;
2917 p = strtok (NULL, ",");
2919 free (my_arg);
2921 break;
2923 case OPT_fdiagnostics_show_location_:
2924 diagnostic_prefixing_rule (dc) = (diagnostic_prefixing_rule_t) value;
2925 break;
2927 case OPT_fdiagnostics_show_caret:
2928 dc->m_source_printing.enabled = value;
2929 break;
2931 case OPT_fdiagnostics_show_labels:
2932 dc->m_source_printing.show_labels_p = value;
2933 break;
2935 case OPT_fdiagnostics_show_line_numbers:
2936 dc->m_source_printing.show_line_numbers_p = value;
2937 break;
2939 case OPT_fdiagnostics_color_:
2940 diagnostic_color_init (dc, value);
2941 break;
2943 case OPT_fdiagnostics_urls_:
2944 diagnostic_urls_init (dc, value);
2945 break;
2947 case OPT_fdiagnostics_format_:
2949 const char *basename = (opts->x_dump_base_name ? opts->x_dump_base_name
2950 : opts->x_main_input_basename);
2951 diagnostic_output_format_init (dc, basename,
2952 (enum diagnostics_output_format)value);
2953 break;
2956 case OPT_fdiagnostics_text_art_charset_:
2957 dc->set_text_art_charset ((enum diagnostic_text_art_charset)value);
2958 break;
2960 case OPT_fdiagnostics_parseable_fixits:
2961 dc->set_extra_output_kind (value
2962 ? EXTRA_DIAGNOSTIC_OUTPUT_fixits_v1
2963 : EXTRA_DIAGNOSTIC_OUTPUT_none);
2964 break;
2966 case OPT_fdiagnostics_column_unit_:
2967 dc->m_column_unit = (enum diagnostics_column_unit)value;
2968 break;
2970 case OPT_fdiagnostics_column_origin_:
2971 dc->m_column_origin = value;
2972 break;
2974 case OPT_fdiagnostics_escape_format_:
2975 dc->set_escape_format ((enum diagnostics_escape_format)value);
2976 break;
2978 case OPT_fdiagnostics_show_cwe:
2979 dc->set_show_cwe (value);
2980 break;
2982 case OPT_fdiagnostics_show_rules:
2983 dc->set_show_rules (value);
2984 break;
2986 case OPT_fdiagnostics_path_format_:
2987 dc->set_path_format ((enum diagnostic_path_format)value);
2988 break;
2990 case OPT_fdiagnostics_show_path_depths:
2991 dc->set_show_path_depths (value);
2992 break;
2994 case OPT_fdiagnostics_show_option:
2995 dc->set_show_option_requested (value);
2996 break;
2998 case OPT_fdiagnostics_minimum_margin_width_:
2999 dc->m_source_printing.min_margin_width = value;
3000 break;
3002 case OPT_fdump_:
3003 /* Deferred. */
3004 break;
3006 case OPT_ffast_math:
3007 set_fast_math_flags (opts, value);
3008 break;
3010 case OPT_funsafe_math_optimizations:
3011 set_unsafe_math_optimizations_flags (opts, value);
3012 break;
3014 case OPT_ffixed_:
3015 /* Deferred. */
3016 break;
3018 case OPT_finline_limit_:
3019 SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_single,
3020 value / 2);
3021 SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_auto,
3022 value / 2);
3023 break;
3025 case OPT_finstrument_functions_exclude_function_list_:
3026 add_comma_separated_to_vector
3027 (&opts->x_flag_instrument_functions_exclude_functions, arg);
3028 break;
3030 case OPT_finstrument_functions_exclude_file_list_:
3031 add_comma_separated_to_vector
3032 (&opts->x_flag_instrument_functions_exclude_files, arg);
3033 break;
3035 case OPT_fmessage_length_:
3036 pp_set_line_maximum_length (dc->printer, value);
3037 diagnostic_set_caret_max_width (dc, value);
3038 break;
3040 case OPT_fopt_info:
3041 case OPT_fopt_info_:
3042 /* Deferred. */
3043 break;
3045 case OPT_foffload_options_:
3046 /* Deferred. */
3047 break;
3049 case OPT_foffload_abi_:
3050 #ifdef ACCEL_COMPILER
3051 /* Handled in the 'mkoffload's. */
3052 #else
3053 error_at (loc, "%<-foffload-abi%> option can be specified only for "
3054 "offload compiler");
3055 #endif
3056 break;
3058 case OPT_fpack_struct_:
3059 if (value <= 0 || (value & (value - 1)) || value > 16)
3060 error_at (loc,
3061 "structure alignment must be a small power of two, not %wu",
3062 value);
3063 else
3064 opts->x_initial_max_fld_align = value;
3065 break;
3067 case OPT_fplugin_:
3068 case OPT_fplugin_arg_:
3069 /* Deferred. */
3070 break;
3072 case OPT_fprofile_use_:
3073 opts->x_profile_data_prefix = xstrdup (arg);
3074 opts->x_flag_profile_use = true;
3075 value = true;
3076 /* No break here - do -fprofile-use processing. */
3077 /* FALLTHRU */
3078 case OPT_fprofile_use:
3079 enable_fdo_optimizations (opts, opts_set, value);
3080 SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_reorder_functions,
3081 value);
3082 /* Indirect call profiling should do all useful transformations
3083 speculative devirtualization does. */
3084 if (opts->x_flag_value_profile_transformations)
3085 SET_OPTION_IF_UNSET (opts, opts_set, flag_devirtualize_speculatively,
3086 false);
3087 break;
3089 case OPT_fauto_profile_:
3090 opts->x_auto_profile_file = xstrdup (arg);
3091 opts->x_flag_auto_profile = true;
3092 value = true;
3093 /* No break here - do -fauto-profile processing. */
3094 /* FALLTHRU */
3095 case OPT_fauto_profile:
3096 enable_fdo_optimizations (opts, opts_set, value);
3097 SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_correction, value);
3098 break;
3100 case OPT_fprofile_generate_:
3101 opts->x_profile_data_prefix = xstrdup (arg);
3102 value = true;
3103 /* No break here - do -fprofile-generate processing. */
3104 /* FALLTHRU */
3105 case OPT_fprofile_generate:
3106 SET_OPTION_IF_UNSET (opts, opts_set, profile_arc_flag, value);
3107 SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value);
3108 SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value);
3109 SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, value);
3110 break;
3112 case OPT_fprofile_info_section:
3113 opts->x_profile_info_section = ".gcov_info";
3114 break;
3116 case OPT_fpatchable_function_entry_:
3118 HOST_WIDE_INT patch_area_size, patch_area_start;
3119 parse_and_check_patch_area (arg, true, &patch_area_size,
3120 &patch_area_start);
3122 break;
3124 case OPT_ftree_vectorize:
3125 /* Automatically sets -ftree-loop-vectorize and
3126 -ftree-slp-vectorize. Nothing more to do here. */
3127 break;
3128 case OPT_fzero_call_used_regs_:
3129 opts->x_flag_zero_call_used_regs
3130 = parse_zero_call_used_regs_options (arg);
3131 break;
3133 case OPT_fshow_column:
3134 dc->m_show_column = value;
3135 break;
3137 case OPT_frandom_seed:
3138 /* The real switch is -fno-random-seed. */
3139 if (value)
3140 return false;
3141 /* Deferred. */
3142 break;
3144 case OPT_frandom_seed_:
3145 /* Deferred. */
3146 break;
3148 case OPT_fsched_verbose_:
3149 #ifdef INSN_SCHEDULING
3150 /* Handled with Var in common.opt. */
3151 break;
3152 #else
3153 return false;
3154 #endif
3156 case OPT_fsched_stalled_insns_:
3157 opts->x_flag_sched_stalled_insns = value;
3158 if (opts->x_flag_sched_stalled_insns == 0)
3159 opts->x_flag_sched_stalled_insns = -1;
3160 break;
3162 case OPT_fsched_stalled_insns_dep_:
3163 opts->x_flag_sched_stalled_insns_dep = value;
3164 break;
3166 case OPT_fstack_check_:
3167 if (!strcmp (arg, "no"))
3168 opts->x_flag_stack_check = NO_STACK_CHECK;
3169 else if (!strcmp (arg, "generic"))
3170 /* This is the old stack checking method. */
3171 opts->x_flag_stack_check = STACK_CHECK_BUILTIN
3172 ? FULL_BUILTIN_STACK_CHECK
3173 : GENERIC_STACK_CHECK;
3174 else if (!strcmp (arg, "specific"))
3175 /* This is the new stack checking method. */
3176 opts->x_flag_stack_check = STACK_CHECK_BUILTIN
3177 ? FULL_BUILTIN_STACK_CHECK
3178 : STACK_CHECK_STATIC_BUILTIN
3179 ? STATIC_BUILTIN_STACK_CHECK
3180 : GENERIC_STACK_CHECK;
3181 else
3182 warning_at (loc, 0, "unknown stack check parameter %qs", arg);
3183 break;
3185 case OPT_fstack_limit:
3186 /* The real switch is -fno-stack-limit. */
3187 if (value)
3188 return false;
3189 /* Deferred. */
3190 break;
3192 case OPT_fstack_limit_register_:
3193 case OPT_fstack_limit_symbol_:
3194 /* Deferred. */
3195 break;
3197 case OPT_fstack_usage:
3198 opts->x_flag_stack_usage = value;
3199 opts->x_flag_stack_usage_info = value != 0;
3200 break;
3202 case OPT_g:
3203 set_debug_level (NO_DEBUG, DEFAULT_GDB_EXTENSIONS, arg, opts, opts_set,
3204 loc);
3205 break;
3207 case OPT_gcodeview:
3208 break;
3210 case OPT_gbtf:
3211 set_debug_level (BTF_DEBUG, false, arg, opts, opts_set, loc);
3212 /* set the debug level to level 2, but if already at level 3,
3213 don't lower it. */
3214 if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL)
3215 opts->x_debug_info_level = DINFO_LEVEL_NORMAL;
3216 break;
3218 case OPT_gctf:
3219 set_debug_level (CTF_DEBUG, false, arg, opts, opts_set, loc);
3220 /* CTF generation feeds off DWARF dies. For optimal CTF, switch debug
3221 info level to 2. If off or at level 1, set it to level 2, but if
3222 already at level 3, don't lower it. */
3223 if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL
3224 && opts->x_ctf_debug_info_level > CTFINFO_LEVEL_NONE)
3225 opts->x_debug_info_level = DINFO_LEVEL_NORMAL;
3226 break;
3228 case OPT_gdwarf:
3229 if (arg && strlen (arg) != 0)
3231 error_at (loc, "%<-gdwarf%s%> is ambiguous; "
3232 "use %<-gdwarf-%s%> for DWARF version "
3233 "or %<-gdwarf%> %<-g%s%> for debug level", arg, arg, arg);
3234 break;
3236 else
3237 value = opts->x_dwarf_version;
3239 /* FALLTHRU */
3240 case OPT_gdwarf_:
3241 if (value < 2 || value > 5)
3242 error_at (loc, "dwarf version %wu is not supported", value);
3243 else
3244 opts->x_dwarf_version = value;
3245 set_debug_level (DWARF2_DEBUG, false, "", opts, opts_set, loc);
3246 break;
3248 case OPT_ggdb:
3249 set_debug_level (NO_DEBUG, 2, arg, opts, opts_set, loc);
3250 break;
3252 case OPT_gvms:
3253 set_debug_level (VMS_DEBUG, false, arg, opts, opts_set, loc);
3254 break;
3256 case OPT_gz:
3257 case OPT_gz_:
3258 /* Handled completely via specs. */
3259 break;
3261 case OPT_pedantic_errors:
3262 dc->m_pedantic_errors = 1;
3263 control_warning_option (OPT_Wpedantic, DK_ERROR, NULL, value,
3264 loc, lang_mask,
3265 handlers, opts, opts_set,
3266 dc);
3267 break;
3269 case OPT_flto:
3270 opts->x_flag_lto = value ? "" : NULL;
3271 break;
3273 case OPT_flto_:
3274 if (strcmp (arg, "none") != 0
3275 && strcmp (arg, "jobserver") != 0
3276 && strcmp (arg, "auto") != 0
3277 && atoi (arg) == 0)
3278 error_at (loc,
3279 "unrecognized argument to %<-flto=%> option: %qs", arg);
3280 break;
3282 case OPT_w:
3283 dc->m_inhibit_warnings = true;
3284 break;
3286 case OPT_fmax_errors_:
3287 dc->set_max_errors (value);
3288 break;
3290 case OPT_fuse_ld_bfd:
3291 case OPT_fuse_ld_gold:
3292 case OPT_fuse_ld_lld:
3293 case OPT_fuse_ld_mold:
3294 case OPT_fuse_linker_plugin:
3295 /* No-op. Used by the driver and passed to us because it starts with f.*/
3296 break;
3298 case OPT_fwrapv:
3299 if (value)
3300 opts->x_flag_trapv = 0;
3301 break;
3303 case OPT_ftrapv:
3304 if (value)
3305 opts->x_flag_wrapv = 0;
3306 break;
3308 case OPT_fstrict_overflow:
3309 opts->x_flag_wrapv = !value;
3310 opts->x_flag_wrapv_pointer = !value;
3311 if (!value)
3312 opts->x_flag_trapv = 0;
3313 break;
3315 case OPT_fipa_icf:
3316 opts->x_flag_ipa_icf_functions = value;
3317 opts->x_flag_ipa_icf_variables = value;
3318 break;
3320 case OPT_falign_loops_:
3321 check_alignment_argument (loc, arg, "loops",
3322 &opts->x_flag_align_loops,
3323 &opts->x_str_align_loops);
3324 break;
3326 case OPT_falign_jumps_:
3327 check_alignment_argument (loc, arg, "jumps",
3328 &opts->x_flag_align_jumps,
3329 &opts->x_str_align_jumps);
3330 break;
3332 case OPT_falign_labels_:
3333 check_alignment_argument (loc, arg, "labels",
3334 &opts->x_flag_align_labels,
3335 &opts->x_str_align_labels);
3336 break;
3338 case OPT_falign_functions_:
3339 check_alignment_argument (loc, arg, "functions",
3340 &opts->x_flag_align_functions,
3341 &opts->x_str_align_functions);
3342 break;
3344 case OPT_ftabstop_:
3345 /* It is documented that we silently ignore silly values. */
3346 if (value >= 1 && value <= 100)
3347 dc->m_tabstop = value;
3348 break;
3350 case OPT_freport_bug:
3351 dc->set_report_bug (value);
3352 break;
3354 case OPT_fmultiflags:
3355 gcc_checking_assert (lang_mask == CL_DRIVER);
3356 break;
3358 default:
3359 /* If the flag was handled in a standard way, assume the lack of
3360 processing here is intentional. */
3361 gcc_assert (option_flag_var (scode, opts));
3362 break;
3365 common_handle_option_auto (opts, opts_set, decoded, lang_mask, kind,
3366 loc, handlers, dc);
3367 return true;
3370 /* Used to set the level of strict aliasing warnings in OPTS,
3371 when no level is specified (i.e., when -Wstrict-aliasing, and not
3372 -Wstrict-aliasing=level was given).
3373 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
3374 and 0 otherwise. After calling this function, wstrict_aliasing will be
3375 set to the default value of -Wstrict_aliasing=level, currently 3. */
3376 static void
3377 set_Wstrict_aliasing (struct gcc_options *opts, int onoff)
3379 gcc_assert (onoff == 0 || onoff == 1);
3380 if (onoff != 0)
3381 opts->x_warn_strict_aliasing = 3;
3382 else
3383 opts->x_warn_strict_aliasing = 0;
3386 /* The following routines are useful in setting all the flags that
3387 -ffast-math and -fno-fast-math imply. */
3388 static void
3389 set_fast_math_flags (struct gcc_options *opts, int set)
3391 if (!opts->frontend_set_flag_unsafe_math_optimizations)
3393 opts->x_flag_unsafe_math_optimizations = set;
3394 set_unsafe_math_optimizations_flags (opts, set);
3396 if (!opts->frontend_set_flag_finite_math_only)
3397 opts->x_flag_finite_math_only = set;
3398 if (!opts->frontend_set_flag_errno_math)
3399 opts->x_flag_errno_math = !set;
3400 if (set)
3402 if (opts->frontend_set_flag_excess_precision == EXCESS_PRECISION_DEFAULT)
3403 opts->x_flag_excess_precision
3404 = set ? EXCESS_PRECISION_FAST : EXCESS_PRECISION_DEFAULT;
3405 if (!opts->frontend_set_flag_signaling_nans)
3406 opts->x_flag_signaling_nans = 0;
3407 if (!opts->frontend_set_flag_rounding_math)
3408 opts->x_flag_rounding_math = 0;
3409 if (!opts->frontend_set_flag_cx_limited_range)
3410 opts->x_flag_cx_limited_range = 1;
3414 /* When -funsafe-math-optimizations is set the following
3415 flags are set as well. */
3416 static void
3417 set_unsafe_math_optimizations_flags (struct gcc_options *opts, int set)
3419 if (!opts->frontend_set_flag_trapping_math)
3420 opts->x_flag_trapping_math = !set;
3421 if (!opts->frontend_set_flag_signed_zeros)
3422 opts->x_flag_signed_zeros = !set;
3423 if (!opts->frontend_set_flag_associative_math)
3424 opts->x_flag_associative_math = set;
3425 if (!opts->frontend_set_flag_reciprocal_math)
3426 opts->x_flag_reciprocal_math = set;
3429 /* Return true iff flags in OPTS are set as if -ffast-math. */
3430 bool
3431 fast_math_flags_set_p (const struct gcc_options *opts)
3433 return (!opts->x_flag_trapping_math
3434 && opts->x_flag_unsafe_math_optimizations
3435 && opts->x_flag_finite_math_only
3436 && !opts->x_flag_signed_zeros
3437 && !opts->x_flag_errno_math
3438 && opts->x_flag_excess_precision == EXCESS_PRECISION_FAST);
3441 /* Return true iff flags are set as if -ffast-math but using the flags stored
3442 in the struct cl_optimization structure. */
3443 bool
3444 fast_math_flags_struct_set_p (struct cl_optimization *opt)
3446 return (!opt->x_flag_trapping_math
3447 && opt->x_flag_unsafe_math_optimizations
3448 && opt->x_flag_finite_math_only
3449 && !opt->x_flag_signed_zeros
3450 && !opt->x_flag_errno_math);
3453 /* Handle a debug output -g switch for options OPTS
3454 (OPTS_SET->x_write_symbols storing whether a debug format was passed
3455 explicitly), location LOC. EXTENDED is true or false to support
3456 extended output (2 is special and means "-ggdb" was given). */
3457 static void
3458 set_debug_level (uint32_t dinfo, int extended, const char *arg,
3459 struct gcc_options *opts, struct gcc_options *opts_set,
3460 location_t loc)
3462 if (dinfo == NO_DEBUG)
3464 if (opts->x_write_symbols == NO_DEBUG)
3466 opts->x_write_symbols = PREFERRED_DEBUGGING_TYPE;
3468 if (extended == 2)
3470 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
3471 if (opts->x_write_symbols & CTF_DEBUG)
3472 opts->x_write_symbols |= DWARF2_DEBUG;
3473 else
3474 opts->x_write_symbols = DWARF2_DEBUG;
3475 #endif
3478 if (opts->x_write_symbols == NO_DEBUG)
3479 warning_at (loc, 0, "target system does not support debug output");
3481 else if ((opts->x_write_symbols & CTF_DEBUG)
3482 || (opts->x_write_symbols & BTF_DEBUG))
3484 opts->x_write_symbols |= DWARF2_DEBUG;
3485 opts_set->x_write_symbols |= DWARF2_DEBUG;
3488 else
3490 /* Make and retain the choice if both CTF and DWARF debug info are to
3491 be generated. */
3492 if (((dinfo == DWARF2_DEBUG) || (dinfo == CTF_DEBUG))
3493 && ((opts->x_write_symbols == (DWARF2_DEBUG|CTF_DEBUG))
3494 || (opts->x_write_symbols == DWARF2_DEBUG)
3495 || (opts->x_write_symbols == CTF_DEBUG)))
3497 opts->x_write_symbols |= dinfo;
3498 opts_set->x_write_symbols |= dinfo;
3500 /* However, CTF and BTF are not allowed together at this time. */
3501 else if (((dinfo == DWARF2_DEBUG) || (dinfo == BTF_DEBUG))
3502 && ((opts->x_write_symbols == (DWARF2_DEBUG|BTF_DEBUG))
3503 || (opts->x_write_symbols == DWARF2_DEBUG)
3504 || (opts->x_write_symbols == BTF_DEBUG)))
3506 opts->x_write_symbols |= dinfo;
3507 opts_set->x_write_symbols |= dinfo;
3509 else
3511 /* Does it conflict with an already selected debug format? */
3512 if (opts_set->x_write_symbols != NO_DEBUG
3513 && opts->x_write_symbols != NO_DEBUG
3514 && dinfo != opts->x_write_symbols)
3516 gcc_assert (debug_set_count (dinfo) <= 1);
3517 error_at (loc, "debug format %qs conflicts with prior selection",
3518 debug_type_names[debug_set_to_format (dinfo)]);
3520 opts->x_write_symbols = dinfo;
3521 opts_set->x_write_symbols = dinfo;
3525 if (dinfo != BTF_DEBUG)
3527 /* A debug flag without a level defaults to level 2.
3528 If off or at level 1, set it to level 2, but if already
3529 at level 3, don't lower it. */
3530 if (*arg == '\0')
3532 if (dinfo == CTF_DEBUG)
3533 opts->x_ctf_debug_info_level = CTFINFO_LEVEL_NORMAL;
3534 else if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL)
3535 opts->x_debug_info_level = DINFO_LEVEL_NORMAL;
3537 else
3539 int argval = integral_argument (arg);
3540 if (argval == -1)
3541 error_at (loc, "unrecognized debug output level %qs", arg);
3542 else if (argval > 3)
3543 error_at (loc, "debug output level %qs is too high", arg);
3544 else
3546 if (dinfo == CTF_DEBUG)
3547 opts->x_ctf_debug_info_level
3548 = (enum ctf_debug_info_levels) argval;
3549 else
3550 opts->x_debug_info_level = (enum debug_info_levels) argval;
3554 else if (*arg != '\0')
3555 error_at (loc, "unrecognized btf debug output level %qs", arg);
3558 /* Arrange to dump core on error for diagnostic context DC. (The
3559 regular error message is still printed first, except in the case of
3560 abort ().) */
3562 static void
3563 setup_core_dumping (diagnostic_context *dc)
3565 #ifdef SIGABRT
3566 signal (SIGABRT, SIG_DFL);
3567 #endif
3568 #if defined(HAVE_SETRLIMIT)
3570 struct rlimit rlim;
3571 if (getrlimit (RLIMIT_CORE, &rlim) != 0)
3572 fatal_error (input_location, "getting core file size maximum limit: %m");
3573 rlim.rlim_cur = rlim.rlim_max;
3574 if (setrlimit (RLIMIT_CORE, &rlim) != 0)
3575 fatal_error (input_location,
3576 "setting core file size limit to maximum: %m");
3578 #endif
3579 diagnostic_abort_on_error (dc);
3582 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
3583 diagnostic context DC. */
3585 static void
3586 decode_d_option (const char *arg, struct gcc_options *opts,
3587 location_t loc, diagnostic_context *dc)
3589 int c;
3591 while (*arg)
3592 switch (c = *arg++)
3594 case 'A':
3595 opts->x_flag_debug_asm = 1;
3596 break;
3597 case 'p':
3598 opts->x_flag_print_asm_name = 1;
3599 break;
3600 case 'P':
3601 opts->x_flag_dump_rtl_in_asm = 1;
3602 opts->x_flag_print_asm_name = 1;
3603 break;
3604 case 'x':
3605 opts->x_rtl_dump_and_exit = 1;
3606 break;
3607 case 'D': /* These are handled by the preprocessor. */
3608 case 'I':
3609 case 'M':
3610 case 'N':
3611 case 'U':
3612 break;
3613 case 'H':
3614 setup_core_dumping (dc);
3615 break;
3616 case 'a':
3617 opts->x_flag_dump_all_passed = true;
3618 break;
3620 default:
3621 warning_at (loc, 0, "unrecognized gcc debugging option: %c", c);
3622 break;
3626 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3627 mask LANG_MASK, option handlers HANDLERS) as an error for option
3628 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3629 NULL), location LOC. This is used by -Werror=. */
3631 static void
3632 enable_warning_as_error (const char *arg, int value, unsigned int lang_mask,
3633 const struct cl_option_handlers *handlers,
3634 struct gcc_options *opts,
3635 struct gcc_options *opts_set,
3636 location_t loc, diagnostic_context *dc)
3638 char *new_option;
3639 int option_index;
3641 new_option = XNEWVEC (char, strlen (arg) + 2);
3642 new_option[0] = 'W';
3643 strcpy (new_option + 1, arg);
3644 option_index = find_opt (new_option, lang_mask);
3645 if (option_index == OPT_SPECIAL_unknown)
3647 option_proposer op;
3648 const char *hint = op.suggest_option (new_option);
3649 if (hint)
3650 error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>;"
3651 " did you mean %<-%s%>?", value ? "" : "no-",
3652 arg, new_option, hint);
3653 else
3654 error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>",
3655 value ? "" : "no-", arg, new_option);
3657 else if (!(cl_options[option_index].flags & CL_WARNING))
3658 error_at (loc, "%<-Werror=%s%>: %<-%s%> is not an option that "
3659 "controls warnings", arg, new_option);
3660 else
3662 const diagnostic_t kind = value ? DK_ERROR : DK_WARNING;
3663 const char *arg = NULL;
3665 if (cl_options[option_index].flags & CL_JOINED)
3666 arg = new_option + cl_options[option_index].opt_len;
3667 control_warning_option (option_index, (int) kind, arg, value,
3668 loc, lang_mask,
3669 handlers, opts, opts_set, dc);
3671 free (new_option);
3674 /* Return malloced memory for the name of the option OPTION_INDEX
3675 which enabled a diagnostic (context CONTEXT), originally of type
3676 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3677 as -Werror. */
3679 char *
3680 option_name (const diagnostic_context *context, int option_index,
3681 diagnostic_t orig_diag_kind, diagnostic_t diag_kind)
3683 if (option_index)
3685 /* A warning classified as an error. */
3686 if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN)
3687 && diag_kind == DK_ERROR)
3688 return concat (cl_options[OPT_Werror_].opt_text,
3689 /* Skip over "-W". */
3690 cl_options[option_index].opt_text + 2,
3691 NULL);
3692 /* A warning with option. */
3693 else
3694 return xstrdup (cl_options[option_index].opt_text);
3696 /* A warning without option classified as an error. */
3697 else if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN
3698 || diag_kind == DK_WARNING)
3699 && context->warning_as_error_requested_p ())
3700 return xstrdup (cl_options[OPT_Werror].opt_text);
3701 else
3702 return NULL;
3705 /* Get the page within the documentation for this option. */
3707 static const char *
3708 get_option_html_page (int option_index)
3710 const cl_option *cl_opt = &cl_options[option_index];
3712 /* Analyzer options are on their own page. */
3713 if (strstr (cl_opt->opt_text, "analyzer-"))
3714 return "gcc/Static-Analyzer-Options.html";
3716 /* Handle -flto= option. */
3717 if (strstr (cl_opt->opt_text, "flto"))
3718 return "gcc/Optimize-Options.html";
3720 #ifdef CL_Fortran
3721 if ((cl_opt->flags & CL_Fortran) != 0
3722 /* If it is option common to both C/C++ and Fortran, it is documented
3723 in gcc/ rather than gfortran/ docs. */
3724 && (cl_opt->flags & CL_C) == 0
3725 #ifdef CL_CXX
3726 && (cl_opt->flags & CL_CXX) == 0
3727 #endif
3729 return "gfortran/Error-and-Warning-Options.html";
3730 #endif
3732 return "gcc/Warning-Options.html";
3735 /* Return malloced memory for a URL describing the option OPTION_INDEX
3736 which enabled a diagnostic (context CONTEXT). */
3738 char *
3739 get_option_url (const diagnostic_context *, int option_index)
3741 if (option_index)
3742 return concat (/* DOCUMENTATION_ROOT_URL should be supplied via
3743 #include "config.h" (see --with-documentation-root-url),
3744 and should have a trailing slash. */
3745 DOCUMENTATION_ROOT_URL,
3747 /* get_option_html_page will return something like
3748 "gcc/Warning-Options.html". */
3749 get_option_html_page (option_index),
3751 /* Expect an anchor of the form "index-Wfoo" e.g.
3752 <a name="index-Wformat"></a>, and thus an id within
3753 the URL of "#index-Wformat". */
3754 "#index", cl_options[option_index].opt_text,
3755 NULL);
3756 else
3757 return NULL;
3760 /* Return a heap allocated producer with command line options. */
3762 char *
3763 gen_command_line_string (cl_decoded_option *options,
3764 unsigned int options_count)
3766 auto_vec<const char *> switches;
3767 char *options_string, *tail;
3768 const char *p;
3769 size_t len = 0;
3771 for (unsigned i = 0; i < options_count; i++)
3772 switch (options[i].opt_index)
3774 case OPT_o:
3775 case OPT_d:
3776 case OPT_dumpbase:
3777 case OPT_dumpbase_ext:
3778 case OPT_dumpdir:
3779 case OPT_quiet:
3780 case OPT_version:
3781 case OPT_v:
3782 case OPT_w:
3783 case OPT_L:
3784 case OPT_D:
3785 case OPT_I:
3786 case OPT_U:
3787 case OPT_SPECIAL_unknown:
3788 case OPT_SPECIAL_ignore:
3789 case OPT_SPECIAL_warn_removed:
3790 case OPT_SPECIAL_program_name:
3791 case OPT_SPECIAL_input_file:
3792 case OPT_grecord_gcc_switches:
3793 case OPT_frecord_gcc_switches:
3794 case OPT__output_pch:
3795 case OPT_fdiagnostics_show_location_:
3796 case OPT_fdiagnostics_show_option:
3797 case OPT_fdiagnostics_show_caret:
3798 case OPT_fdiagnostics_show_labels:
3799 case OPT_fdiagnostics_show_line_numbers:
3800 case OPT_fdiagnostics_color_:
3801 case OPT_fdiagnostics_format_:
3802 case OPT_fverbose_asm:
3803 case OPT____:
3804 case OPT__sysroot_:
3805 case OPT_nostdinc:
3806 case OPT_nostdinc__:
3807 case OPT_fpreprocessed:
3808 case OPT_fltrans_output_list_:
3809 case OPT_fresolution_:
3810 case OPT_fdebug_prefix_map_:
3811 case OPT_fmacro_prefix_map_:
3812 case OPT_ffile_prefix_map_:
3813 case OPT_fprofile_prefix_map_:
3814 case OPT_fcanon_prefix_map:
3815 case OPT_fcompare_debug:
3816 case OPT_fchecking:
3817 case OPT_fchecking_:
3818 /* Ignore these. */
3819 continue;
3820 case OPT_flto_:
3822 const char *lto_canonical = "-flto";
3823 switches.safe_push (lto_canonical);
3824 len += strlen (lto_canonical) + 1;
3825 break;
3827 default:
3828 if (cl_options[options[i].opt_index].flags
3829 & CL_NO_DWARF_RECORD)
3830 continue;
3831 gcc_checking_assert (options[i].canonical_option[0][0] == '-');
3832 switch (options[i].canonical_option[0][1])
3834 case 'M':
3835 case 'i':
3836 case 'W':
3837 continue;
3838 case 'f':
3839 if (strncmp (options[i].canonical_option[0] + 2,
3840 "dump", 4) == 0)
3841 continue;
3842 break;
3843 default:
3844 break;
3846 switches.safe_push (options[i].orig_option_with_args_text);
3847 len += strlen (options[i].orig_option_with_args_text) + 1;
3848 break;
3851 options_string = XNEWVEC (char, len + 1);
3852 tail = options_string;
3854 unsigned i;
3855 FOR_EACH_VEC_ELT (switches, i, p)
3857 len = strlen (p);
3858 memcpy (tail, p, len);
3859 tail += len;
3860 if (i != switches.length () - 1)
3862 *tail = ' ';
3863 ++tail;
3867 *tail = '\0';
3868 return options_string;
3871 /* Return a heap allocated producer string including command line options. */
3873 char *
3874 gen_producer_string (const char *language_string, cl_decoded_option *options,
3875 unsigned int options_count)
3877 char *cmdline = gen_command_line_string (options, options_count);
3878 char *combined = concat (language_string, " ", version_string, " ",
3879 cmdline, NULL);
3880 free (cmdline);
3881 return combined;
3884 #if CHECKING_P
3886 namespace selftest {
3888 /* Verify that get_option_html_page works as expected. */
3890 static void
3891 test_get_option_html_page ()
3893 ASSERT_STREQ (get_option_html_page (OPT_Wcpp), "gcc/Warning-Options.html");
3894 ASSERT_STREQ (get_option_html_page (OPT_Wanalyzer_double_free),
3895 "gcc/Static-Analyzer-Options.html");
3896 #ifdef CL_Fortran
3897 ASSERT_STREQ (get_option_html_page (OPT_Wline_truncation),
3898 "gfortran/Error-and-Warning-Options.html");
3899 #endif
3902 /* Verify EnumSet and EnumBitSet requirements. */
3904 static void
3905 test_enum_sets ()
3907 for (unsigned i = 0; i < cl_options_count; ++i)
3908 if (cl_options[i].var_type == CLVC_ENUM
3909 && cl_options[i].var_value != CLEV_NORMAL)
3911 const struct cl_enum *e = &cl_enums[cl_options[i].var_enum];
3912 unsigned HOST_WIDE_INT used_sets = 0;
3913 unsigned HOST_WIDE_INT mask = 0;
3914 unsigned highest_set = 0;
3915 for (unsigned j = 0; e->values[j].arg; ++j)
3917 unsigned set = e->values[j].flags >> CL_ENUM_SET_SHIFT;
3918 if (cl_options[i].var_value == CLEV_BITSET)
3920 /* For EnumBitSet Set shouldn't be used and Value should
3921 be a power of two. */
3922 ASSERT_TRUE (set == 0);
3923 ASSERT_TRUE (pow2p_hwi (e->values[j].value));
3924 continue;
3926 /* Test that enumerators referenced in EnumSet have all
3927 Set(n) on them within the valid range. */
3928 ASSERT_TRUE (set >= 1 && set <= HOST_BITS_PER_WIDE_INT);
3929 highest_set = MAX (set, highest_set);
3930 used_sets |= HOST_WIDE_INT_1U << (set - 1);
3932 if (cl_options[i].var_value == CLEV_BITSET)
3933 continue;
3934 /* If there is just one set, no point to using EnumSet. */
3935 ASSERT_TRUE (highest_set >= 2);
3936 /* Test that there are no gaps in between the sets. */
3937 if (highest_set == HOST_BITS_PER_WIDE_INT)
3938 ASSERT_TRUE (used_sets == HOST_WIDE_INT_M1U);
3939 else
3940 ASSERT_TRUE (used_sets == (HOST_WIDE_INT_1U << highest_set) - 1);
3941 for (unsigned int j = 1; j <= highest_set; ++j)
3943 unsigned HOST_WIDE_INT this_mask = 0;
3944 for (unsigned k = 0; e->values[k].arg; ++k)
3946 unsigned set = e->values[j].flags >> CL_ENUM_SET_SHIFT;
3947 if (set == j)
3948 this_mask |= e->values[j].value;
3950 ASSERT_TRUE ((mask & this_mask) == 0);
3951 mask |= this_mask;
3956 /* Run all of the selftests within this file. */
3958 void
3959 opts_cc_tests ()
3961 test_get_option_html_page ();
3962 test_enum_sets ();
3965 } // namespace selftest
3967 #endif /* #if CHECKING_P */