1 /* Command line option handling.
2 Copyright (C) 2002-2022 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
38 /* In this file all option sets are explicit. */
41 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
43 /* Names of fundamental debug info formats indexed by enum
46 const char *const debug_type_names
[] =
48 "none", "stabs", "dwarf-2", "xcoff", "vms", "ctf", "btf"
51 /* Bitmasks of fundamental debug info formats indexed by enum
54 static uint32_t debug_type_masks
[] =
56 NO_DEBUG
, DWARF2_DEBUG
, VMS_DEBUG
,
60 /* Names of the set of debug formats requested by user. Updated and accessed
61 via debug_set_names. */
63 static char df_set_names
[sizeof "none stabs dwarf-2 xcoff vms ctf btf"];
65 /* Get enum debug_info_type of the specified debug format, for error messages.
66 Can be used only for individual debug format types. */
69 debug_set_to_format (uint32_t debug_info_set
)
72 enum debug_info_type dinfo_type
= DINFO_TYPE_NONE
;
73 /* Find first set bit. */
75 idx
= exact_log2 (debug_info_set
& - debug_info_set
);
76 /* Check that only one bit is set, if at all. This function is meant to be
77 used only for vanilla debug_info_set bitmask values, i.e. for individual
78 debug format types upto DINFO_TYPE_MAX. */
79 gcc_assert ((debug_info_set
& (debug_info_set
- 1)) == 0);
80 dinfo_type
= (enum debug_info_type
)idx
;
81 gcc_assert (dinfo_type
<= DINFO_TYPE_MAX
);
85 /* Get the number of debug formats enabled for output. */
88 debug_set_count (uint32_t w_symbols
)
90 unsigned int count
= 0;
94 w_symbols
&= ~ (w_symbols
& - w_symbols
);
99 /* Get the names of the debug formats enabled for output. */
102 debug_set_names (uint32_t w_symbols
)
104 uint32_t df_mask
= 0;
105 /* Reset the string to be returned. */
106 memset (df_set_names
, 0, sizeof (df_set_names
));
107 /* Get the popcount. */
108 int num_set_df
= debug_set_count (w_symbols
);
109 /* Iterate over the debug formats. Add name string for those enabled. */
110 for (int i
= DINFO_TYPE_NONE
; i
<= DINFO_TYPE_MAX
; i
++)
112 df_mask
= debug_type_masks
[i
];
113 if (w_symbols
& df_mask
)
115 strcat (df_set_names
, debug_type_names
[i
]);
118 strcat (df_set_names
, " ");
124 /* No debug formats enabled. */
125 gcc_assert (i
== DINFO_TYPE_NONE
);
126 strcat (df_set_names
, debug_type_names
[i
]);
133 /* Return TRUE iff BTF debug info is enabled. */
138 return (write_symbols
& BTF_DEBUG
);
141 /* Return TRUE iff BTF with CO-RE debug info is enabled. */
144 btf_with_core_debuginfo_p ()
146 return (write_symbols
& BTF_WITH_CORE_DEBUG
);
149 /* Return TRUE iff CTF debug info is enabled. */
154 return (write_symbols
& CTF_DEBUG
);
157 /* Return TRUE iff dwarf2 debug info is enabled. */
160 dwarf_debuginfo_p (struct gcc_options
*opts
)
162 return (opts
->x_write_symbols
& DWARF2_DEBUG
);
165 /* Return true iff the debug info format is to be generated based on DWARF
166 DIEs (like CTF and BTF debug info formats). */
168 bool dwarf_based_debuginfo_p ()
170 return ((write_symbols
& CTF_DEBUG
)
171 || (write_symbols
& BTF_DEBUG
));
174 /* All flag uses below need to explicitely reference the option sets
176 #define global_options DO_NOT_USE
177 #define global_options_set DO_NOT_USE
179 /* Parse the -femit-struct-debug-detailed option value
180 and set the flag variables. */
182 #define MATCH( prefix, string ) \
183 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
184 ? ((string += sizeof prefix - 1), 1) : 0)
187 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
190 /* various labels for comparison */
191 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
192 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
193 static const char none_lbl
[] = "none", any_lbl
[] = "any";
194 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
196 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
197 /* Default is to apply to as much as possible. */
198 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
199 int ord
= 1, gen
= 1;
202 if (MATCH (dfn_lbl
, spec
))
203 usage
= DINFO_USAGE_DFN
;
204 else if (MATCH (dir_lbl
, spec
))
205 usage
= DINFO_USAGE_DIR_USE
;
206 else if (MATCH (ind_lbl
, spec
))
207 usage
= DINFO_USAGE_IND_USE
;
209 /* Generics or not? */
210 if (MATCH (ord_lbl
, spec
))
212 else if (MATCH (gen_lbl
, spec
))
215 /* What allowable environment? */
216 if (MATCH (none_lbl
, spec
))
217 files
= DINFO_STRUCT_FILE_NONE
;
218 else if (MATCH (any_lbl
, spec
))
219 files
= DINFO_STRUCT_FILE_ANY
;
220 else if (MATCH (sys_lbl
, spec
))
221 files
= DINFO_STRUCT_FILE_SYS
;
222 else if (MATCH (base_lbl
, spec
))
223 files
= DINFO_STRUCT_FILE_BASE
;
226 "argument %qs to %<-femit-struct-debug-detailed%> "
230 /* Effect the specification. */
231 if (usage
== DINFO_USAGE_NUM_ENUMS
)
235 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
236 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
237 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
241 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
242 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
243 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
249 opts
->x_debug_struct_ordinary
[usage
] = files
;
251 opts
->x_debug_struct_generic
[usage
] = files
;
255 set_struct_debug_option (opts
, loc
, spec
+1);
258 /* No more -femit-struct-debug-detailed specifications.
262 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
264 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
265 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
266 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
267 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
269 "%<-femit-struct-debug-detailed=dir:...%> must allow "
270 "at least as much as "
271 "%<-femit-struct-debug-detailed=ind:...%>");
275 /* Strip off a legitimate source ending from the input string NAME of
276 length LEN. Rather than having to know the names used by all of
277 our front ends, we strip off an ending of a period followed by
278 up to fource characters. (C++ uses ".cpp".) */
281 strip_off_ending (char *name
, int len
)
284 for (i
= 2; i
< 5 && len
> i
; i
++)
286 if (name
[len
- i
] == '.')
288 name
[len
- i
] = '\0';
294 /* Find the base name of a path, stripping off both directories and
295 a single final extension. */
297 base_of_path (const char *path
, const char **base_out
)
299 const char *base
= path
;
301 const char *p
= path
;
305 if (IS_DIR_SEPARATOR (c
))
320 /* What to print when a switch has no documentation. */
321 static const char undocumented_msg
[] = N_("This option lacks documentation.");
322 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
324 typedef char *char_p
; /* For DEF_VEC_P. */
326 static void set_debug_level (uint32_t dinfo
, int extended
,
327 const char *arg
, struct gcc_options
*opts
,
328 struct gcc_options
*opts_set
,
330 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
331 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
332 location_t loc
, diagnostic_context
*dc
);
333 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
335 static void enable_warning_as_error (const char *arg
, int value
,
336 unsigned int lang_mask
,
337 const struct cl_option_handlers
*handlers
,
338 struct gcc_options
*opts
,
339 struct gcc_options
*opts_set
,
341 diagnostic_context
*dc
);
343 /* Handle a back-end option; arguments and return value as for
347 target_handle_option (struct gcc_options
*opts
,
348 struct gcc_options
*opts_set
,
349 const struct cl_decoded_option
*decoded
,
350 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
352 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
353 diagnostic_context
*dc
, void (*) (void))
355 gcc_assert (dc
== global_dc
);
356 gcc_assert (kind
== DK_UNSPECIFIED
);
357 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
360 /* Add comma-separated strings to a char_p vector. */
363 add_comma_separated_to_vector (void **pvec
, const char *arg
)
369 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
371 vec_check_alloc (v
, 1);
373 /* We never free this string. */
386 v
->safe_push (token_start
);
389 if (*r
== '\\' && r
[1] == ',')
399 if (*token_start
!= '\0')
400 v
->safe_push (token_start
);
405 /* Initialize opts_obstack. */
408 init_opts_obstack (void)
410 gcc_obstack_init (&opts_obstack
);
413 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
416 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
418 /* Ensure that opts_obstack has already been initialized by the time
419 that we initialize any gcc_options instances (PR jit/68446). */
420 gcc_assert (opts_obstack
.chunk_size
> 0);
422 *opts
= global_options_init
;
425 memset (opts_set
, 0, sizeof (*opts_set
));
427 /* Initialize whether `char' is signed. */
428 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
429 /* Set this to a special "uninitialized" value. The actual default
430 is set after target options have been processed. */
431 opts
->x_flag_short_enums
= 2;
433 /* Initialize target_flags before default_options_optimization
434 so the latter can modify it. */
435 opts
->x_target_flags
= targetm_common
.default_target_flags
;
437 /* Some targets have ABI-specified unwind tables. */
438 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
440 /* Some targets have other target-specific initialization. */
441 targetm_common
.option_init_struct (opts
);
444 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
445 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
446 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
447 mask LANG_MASK and option handlers HANDLERS. */
450 maybe_default_option (struct gcc_options
*opts
,
451 struct gcc_options
*opts_set
,
452 const struct default_options
*default_opt
,
453 int level
, bool size
, bool fast
, bool debug
,
454 unsigned int lang_mask
,
455 const struct cl_option_handlers
*handlers
,
457 diagnostic_context
*dc
)
459 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
463 gcc_assert (level
== 2);
465 gcc_assert (level
== 3);
467 gcc_assert (level
== 1);
469 switch (default_opt
->levels
)
475 case OPT_LEVELS_0_ONLY
:
476 enabled
= (level
== 0);
479 case OPT_LEVELS_1_PLUS
:
480 enabled
= (level
>= 1);
483 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
484 enabled
= (level
>= 1 && !size
&& !debug
);
487 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
488 enabled
= (level
>= 1 && !debug
);
491 case OPT_LEVELS_2_PLUS
:
492 enabled
= (level
>= 2);
495 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
496 enabled
= (level
>= 2 && !size
&& !debug
);
499 case OPT_LEVELS_3_PLUS
:
500 enabled
= (level
>= 3);
503 case OPT_LEVELS_3_PLUS_AND_SIZE
:
504 enabled
= (level
>= 3 || size
);
507 case OPT_LEVELS_SIZE
:
511 case OPT_LEVELS_FAST
:
515 case OPT_LEVELS_NONE
:
521 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
522 default_opt
->arg
, default_opt
->value
,
523 lang_mask
, DK_UNSPECIFIED
, loc
,
525 else if (default_opt
->arg
== NULL
526 && !option
->cl_reject_negative
527 && !(option
->flags
& CL_PARAMS
))
528 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
529 default_opt
->arg
, !default_opt
->value
,
530 lang_mask
, DK_UNSPECIFIED
, loc
,
534 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
535 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
536 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
537 language mask LANG_MASK and option handlers HANDLERS. */
540 maybe_default_options (struct gcc_options
*opts
,
541 struct gcc_options
*opts_set
,
542 const struct default_options
*default_opts
,
543 int level
, bool size
, bool fast
, bool debug
,
544 unsigned int lang_mask
,
545 const struct cl_option_handlers
*handlers
,
547 diagnostic_context
*dc
)
551 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
552 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
553 level
, size
, fast
, debug
,
554 lang_mask
, handlers
, loc
, dc
);
557 /* Table of options enabled by default at different levels.
558 Please keep this list sorted by level and alphabetized within
559 each level; this makes it easier to keep the documentation
562 static const struct default_options default_options_table
[] =
564 /* -O1 and -Og optimizations. */
565 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
566 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
567 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
568 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
569 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
570 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
571 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
572 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
573 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
574 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference_addressable
, NULL
, 1 },
575 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
576 { OPT_LEVELS_1_PLUS
, OPT_fomit_frame_pointer
, NULL
, 1 },
577 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
578 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
579 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
580 { OPT_LEVELS_1_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
581 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
582 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
583 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
584 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
585 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
586 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
587 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
588 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
589 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
590 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
591 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
592 { OPT_LEVELS_1_PLUS
, OPT_fvar_tracking
, NULL
, 1 },
594 /* -O1 (and not -Og) optimizations. */
595 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
597 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdelayed_branch
, NULL
, 1 },
599 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdse
, NULL
, 1 },
600 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
601 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
602 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
603 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
604 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_stores
, NULL
, 1 },
605 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
606 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fipa_modref
, NULL
, 1 },
607 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
608 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_dse
, NULL
, 1 },
609 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
610 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
612 /* -O2 and -Os optimizations. */
613 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
614 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
615 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
616 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
617 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
618 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
619 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
620 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
621 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
622 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
623 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
624 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
625 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
626 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
627 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
628 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
629 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
630 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
631 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
632 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
633 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
634 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
635 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
636 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
637 #ifdef INSN_SCHEDULING
638 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
640 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
641 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
642 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
643 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
644 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
645 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
646 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
,
647 VECT_COST_MODEL_VERY_CHEAP
},
648 { OPT_LEVELS_2_PLUS
, OPT_finline_functions
, NULL
, 1 },
649 { OPT_LEVELS_2_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
651 /* -O2 and above optimizations, but not -Os or -Og. */
652 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_functions
, NULL
, 1 },
653 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_jumps
, NULL
, 1 },
654 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_labels
, NULL
, 1 },
655 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_loops
, NULL
, 1 },
656 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
657 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
658 REORDER_BLOCKS_ALGORITHM_STC
},
659 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_ftree_loop_vectorize
, NULL
, 1 },
660 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_ftree_slp_vectorize
, NULL
, 1 },
661 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fopenmp_target_simd_clone_
, NULL
,
662 OMP_TARGET_SIMD_CLONE_NOHOST
},
663 #ifdef INSN_SCHEDULING
664 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
665 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
668 /* -O3 and -Os optimizations. */
670 /* -O3 optimizations. */
671 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
672 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
673 { OPT_LEVELS_3_PLUS
, OPT_floop_interchange
, NULL
, 1 },
674 { OPT_LEVELS_3_PLUS
, OPT_floop_unroll_and_jam
, NULL
, 1 },
675 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
676 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
677 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
678 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
679 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
680 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
681 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
682 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
683 { OPT_LEVELS_3_PLUS
, OPT_fversion_loops_for_strides
, NULL
, 1 },
685 /* -O3 parameters. */
686 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_auto_
, NULL
, 30 },
687 { OPT_LEVELS_3_PLUS
, OPT__param_early_inlining_insns_
, NULL
, 14 },
688 { OPT_LEVELS_3_PLUS
, OPT__param_inline_heuristics_hint_percent_
, NULL
, 600 },
689 { OPT_LEVELS_3_PLUS
, OPT__param_inline_min_speedup_
, NULL
, 15 },
690 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_single_
, NULL
, 200 },
692 /* -Ofast adds optimizations to -O3. */
693 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
694 { OPT_LEVELS_FAST
, OPT_fallow_store_data_races
, NULL
, 1 },
695 { OPT_LEVELS_FAST
, OPT_fsemantic_interposition
, NULL
, 0 },
697 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
700 /* Default the options in OPTS and OPTS_SET based on the optimization
701 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
703 default_options_optimization (struct gcc_options
*opts
,
704 struct gcc_options
*opts_set
,
705 struct cl_decoded_option
*decoded_options
,
706 unsigned int decoded_options_count
,
708 unsigned int lang_mask
,
709 const struct cl_option_handlers
*handlers
,
710 diagnostic_context
*dc
)
714 bool openacc_mode
= false;
716 /* Scan to see what optimization level has been specified. That will
717 determine the default value of many flags. */
718 for (i
= 1; i
< decoded_options_count
; i
++)
720 struct cl_decoded_option
*opt
= &decoded_options
[i
];
721 switch (opt
->opt_index
)
724 if (*opt
->arg
== '\0')
726 opts
->x_optimize
= 1;
727 opts
->x_optimize_size
= 0;
728 opts
->x_optimize_fast
= 0;
729 opts
->x_optimize_debug
= 0;
733 const int optimize_val
= integral_argument (opt
->arg
);
734 if (optimize_val
== -1)
735 error_at (loc
, "argument to %<-O%> should be a non-negative "
736 "integer, %<g%>, %<s%>, %<z%> or %<fast%>");
739 opts
->x_optimize
= optimize_val
;
740 if ((unsigned int) opts
->x_optimize
> 255)
741 opts
->x_optimize
= 255;
742 opts
->x_optimize_size
= 0;
743 opts
->x_optimize_fast
= 0;
744 opts
->x_optimize_debug
= 0;
750 opts
->x_optimize_size
= 1;
752 /* Optimizing for size forces optimize to be 2. */
753 opts
->x_optimize
= 2;
754 opts
->x_optimize_fast
= 0;
755 opts
->x_optimize_debug
= 0;
759 opts
->x_optimize_size
= 2;
761 /* Optimizing for size forces optimize to be 2. */
762 opts
->x_optimize
= 2;
763 opts
->x_optimize_fast
= 0;
764 opts
->x_optimize_debug
= 0;
768 /* -Ofast only adds flags to -O3. */
769 opts
->x_optimize_size
= 0;
770 opts
->x_optimize
= 3;
771 opts
->x_optimize_fast
= 1;
772 opts
->x_optimize_debug
= 0;
776 /* -Og selects optimization level 1. */
777 opts
->x_optimize_size
= 0;
778 opts
->x_optimize
= 1;
779 opts
->x_optimize_fast
= 0;
780 opts
->x_optimize_debug
= 1;
789 /* Ignore other options in this prescan. */
794 maybe_default_options (opts
, opts_set
, default_options_table
,
795 opts
->x_optimize
, opts
->x_optimize_size
,
796 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
797 lang_mask
, handlers
, loc
, dc
);
799 /* -O2 param settings. */
800 opt2
= (opts
->x_optimize
>= 2);
803 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_pta
, true);
805 /* Track fields in field-sensitive alias analysis. */
807 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_fields_for_field_sensitive
,
810 if (opts
->x_optimize_size
)
811 /* We want to crossjump as much as possible. */
812 SET_OPTION_IF_UNSET (opts
, opts_set
, param_min_crossjump_insns
, 1);
814 /* Restrict the amount of work combine does at -Og while retaining
815 most of its useful transforms. */
816 if (opts
->x_optimize_debug
)
817 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_combine_insns
, 2);
819 /* Allow default optimizations to be specified on a per-machine basis. */
820 maybe_default_options (opts
, opts_set
,
821 targetm_common
.option_optimization_table
,
822 opts
->x_optimize
, opts
->x_optimize_size
,
823 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
824 lang_mask
, handlers
, loc
, dc
);
827 /* Control IPA optimizations based on different live patching LEVEL. */
829 control_options_for_live_patching (struct gcc_options
*opts
,
830 struct gcc_options
*opts_set
,
831 enum live_patching_level level
,
834 gcc_assert (level
> LIVE_PATCHING_NONE
);
838 case LIVE_PATCHING_INLINE_ONLY_STATIC
:
839 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static"
840 if (opts_set
->x_flag_ipa_cp_clone
&& opts
->x_flag_ipa_cp_clone
)
841 error_at (loc
, "%qs is incompatible with %qs",
842 "-fipa-cp-clone", LIVE_PATCHING_OPTION
);
844 opts
->x_flag_ipa_cp_clone
= 0;
846 if (opts_set
->x_flag_ipa_sra
&& opts
->x_flag_ipa_sra
)
847 error_at (loc
, "%qs is incompatible with %qs",
848 "-fipa-sra", LIVE_PATCHING_OPTION
);
850 opts
->x_flag_ipa_sra
= 0;
852 if (opts_set
->x_flag_partial_inlining
&& opts
->x_flag_partial_inlining
)
853 error_at (loc
, "%qs is incompatible with %qs",
854 "-fpartial-inlining", LIVE_PATCHING_OPTION
);
856 opts
->x_flag_partial_inlining
= 0;
858 if (opts_set
->x_flag_ipa_cp
&& opts
->x_flag_ipa_cp
)
859 error_at (loc
, "%qs is incompatible with %qs",
860 "-fipa-cp", LIVE_PATCHING_OPTION
);
862 opts
->x_flag_ipa_cp
= 0;
865 case LIVE_PATCHING_INLINE_CLONE
:
866 #undef LIVE_PATCHING_OPTION
867 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static|inline-clone"
868 /* live patching should disable whole-program optimization. */
869 if (opts_set
->x_flag_whole_program
&& opts
->x_flag_whole_program
)
870 error_at (loc
, "%qs is incompatible with %qs",
871 "-fwhole-program", LIVE_PATCHING_OPTION
);
873 opts
->x_flag_whole_program
= 0;
875 /* visibility change should be excluded by !flag_whole_program
876 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
877 && !flag_partial_inlining. */
879 if (opts_set
->x_flag_ipa_pta
&& opts
->x_flag_ipa_pta
)
880 error_at (loc
, "%qs is incompatible with %qs",
881 "-fipa-pta", LIVE_PATCHING_OPTION
);
883 opts
->x_flag_ipa_pta
= 0;
885 if (opts_set
->x_flag_ipa_reference
&& opts
->x_flag_ipa_reference
)
886 error_at (loc
, "%qs is incompatible with %qs",
887 "-fipa-reference", LIVE_PATCHING_OPTION
);
889 opts
->x_flag_ipa_reference
= 0;
891 if (opts_set
->x_flag_ipa_ra
&& opts
->x_flag_ipa_ra
)
892 error_at (loc
, "%qs is incompatible with %qs",
893 "-fipa-ra", LIVE_PATCHING_OPTION
);
895 opts
->x_flag_ipa_ra
= 0;
897 if (opts_set
->x_flag_ipa_icf
&& opts
->x_flag_ipa_icf
)
898 error_at (loc
, "%qs is incompatible with %qs",
899 "-fipa-icf", LIVE_PATCHING_OPTION
);
901 opts
->x_flag_ipa_icf
= 0;
903 if (opts_set
->x_flag_ipa_icf_functions
&& opts
->x_flag_ipa_icf_functions
)
904 error_at (loc
, "%qs is incompatible with %qs",
905 "-fipa-icf-functions", LIVE_PATCHING_OPTION
);
907 opts
->x_flag_ipa_icf_functions
= 0;
909 if (opts_set
->x_flag_ipa_icf_variables
&& opts
->x_flag_ipa_icf_variables
)
910 error_at (loc
, "%qs is incompatible with %qs",
911 "-fipa-icf-variables", LIVE_PATCHING_OPTION
);
913 opts
->x_flag_ipa_icf_variables
= 0;
915 if (opts_set
->x_flag_ipa_bit_cp
&& opts
->x_flag_ipa_bit_cp
)
916 error_at (loc
, "%qs is incompatible with %qs",
917 "-fipa-bit-cp", LIVE_PATCHING_OPTION
);
919 opts
->x_flag_ipa_bit_cp
= 0;
921 if (opts_set
->x_flag_ipa_vrp
&& opts
->x_flag_ipa_vrp
)
922 error_at (loc
, "%qs is incompatible with %qs",
923 "-fipa-vrp", LIVE_PATCHING_OPTION
);
925 opts
->x_flag_ipa_vrp
= 0;
927 if (opts_set
->x_flag_ipa_pure_const
&& opts
->x_flag_ipa_pure_const
)
928 error_at (loc
, "%qs is incompatible with %qs",
929 "-fipa-pure-const", LIVE_PATCHING_OPTION
);
931 opts
->x_flag_ipa_pure_const
= 0;
933 if (opts_set
->x_flag_ipa_modref
&& opts
->x_flag_ipa_modref
)
935 "%<-fipa-modref%> is incompatible with %qs",
936 LIVE_PATCHING_OPTION
);
938 opts
->x_flag_ipa_modref
= 0;
940 /* FIXME: disable unreachable code removal. */
942 /* discovery of functions/variables with no address taken. */
943 if (opts_set
->x_flag_ipa_reference_addressable
944 && opts
->x_flag_ipa_reference_addressable
)
945 error_at (loc
, "%qs is incompatible with %qs",
946 "-fipa-reference-addressable", LIVE_PATCHING_OPTION
);
948 opts
->x_flag_ipa_reference_addressable
= 0;
950 /* ipa stack alignment propagation. */
951 if (opts_set
->x_flag_ipa_stack_alignment
952 && opts
->x_flag_ipa_stack_alignment
)
953 error_at (loc
, "%qs is incompatible with %qs",
954 "-fipa-stack-alignment", LIVE_PATCHING_OPTION
);
956 opts
->x_flag_ipa_stack_alignment
= 0;
962 #undef LIVE_PATCHING_OPTION
965 /* --help option argument if set. */
966 vec
<const char *> help_option_arguments
;
968 /* Return the string name describing a sanitizer argument which has been
969 provided on the command line and has set this particular flag. */
971 find_sanitizer_argument (struct gcc_options
*opts
, unsigned int flags
)
973 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
975 /* Need to find the sanitizer_opts element which:
976 a) Could have set the flags requested.
977 b) Has been set on the command line.
979 Can have (a) without (b) if the flag requested is e.g.
980 SANITIZE_ADDRESS, since both -fsanitize=address and
981 -fsanitize=kernel-address set this flag.
983 Can have (b) without (a) by requesting more than one sanitizer on the
985 if ((sanitizer_opts
[i
].flag
& opts
->x_flag_sanitize
)
986 != sanitizer_opts
[i
].flag
)
988 if ((sanitizer_opts
[i
].flag
& flags
) != flags
)
990 return sanitizer_opts
[i
].name
;
996 /* Report an error to the user about sanitizer options they have requested
997 which have set conflicting flags.
999 LEFT and RIGHT indicate sanitizer flags which conflict with each other, this
1000 function reports an error if both have been set in OPTS->x_flag_sanitize and
1001 ensures the error identifies the requested command line options that have
1004 report_conflicting_sanitizer_options (struct gcc_options
*opts
, location_t loc
,
1005 unsigned int left
, unsigned int right
)
1007 unsigned int left_seen
= (opts
->x_flag_sanitize
& left
);
1008 unsigned int right_seen
= (opts
->x_flag_sanitize
& right
);
1009 if (left_seen
&& right_seen
)
1011 const char* left_arg
= find_sanitizer_argument (opts
, left_seen
);
1012 const char* right_arg
= find_sanitizer_argument (opts
, right_seen
);
1013 gcc_assert (left_arg
&& right_arg
);
1015 "%<-fsanitize=%s%> is incompatible with %<-fsanitize=%s%>",
1016 left_arg
, right_arg
);
1020 /* After all options at LOC have been read into OPTS and OPTS_SET,
1021 finalize settings of those options and diagnose incompatible
1024 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
1027 if (opts
->x_dump_base_name
1028 && ! opts
->x_dump_base_name_prefixed
)
1030 const char *sep
= opts
->x_dump_base_name
;
1033 if (IS_DIR_SEPARATOR (*sep
))
1037 /* If dump_base_path contains subdirectories, don't prepend
1039 else if (opts
->x_dump_dir_name
)
1040 /* We have a DUMP_DIR_NAME, prepend that. */
1041 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
1042 opts
->x_dump_base_name
, NULL
);
1044 /* It is definitely prefixed now. */
1045 opts
->x_dump_base_name_prefixed
= true;
1048 /* Handle related options for unit-at-a-time, toplevel-reorder, and
1050 if (!opts
->x_flag_unit_at_a_time
)
1052 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
1053 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
1055 opts
->x_flag_section_anchors
= 0;
1056 if (opts
->x_flag_toplevel_reorder
== 1)
1057 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
1059 opts
->x_flag_toplevel_reorder
= 0;
1062 /* -fself-test depends on the state of the compiler prior to
1063 compiling anything. Ideally it should be run on an empty source
1064 file. However, in case we get run with actual source, assume
1065 -fsyntax-only which will inhibit any compiler initialization
1066 which may confuse the self tests. */
1067 if (opts
->x_flag_self_test
)
1068 opts
->x_flag_syntax_only
= 1;
1070 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
1071 sorry ("transactional memory is not supported with non-call exceptions");
1073 /* Unless the user has asked for section anchors, we disable toplevel
1074 reordering at -O0 to disable transformations that might be surprising
1075 to end users and to get -fno-toplevel-reorder tested. */
1076 if (!opts
->x_optimize
1077 && opts
->x_flag_toplevel_reorder
== 2
1078 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
1080 opts
->x_flag_toplevel_reorder
= 0;
1081 opts
->x_flag_section_anchors
= 0;
1083 if (!opts
->x_flag_toplevel_reorder
)
1085 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
1086 error_at (loc
, "section anchors must be disabled when toplevel reorder"
1088 opts
->x_flag_section_anchors
= 0;
1091 if (!opts
->x_flag_opts_finished
)
1093 /* We initialize opts->x_flag_pie to -1 so that targets can set a
1095 if (opts
->x_flag_pie
== -1)
1097 /* We initialize opts->x_flag_pic to -1 so that we can tell if
1098 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
1099 if (opts
->x_flag_pic
== -1)
1100 opts
->x_flag_pie
= DEFAULT_FLAG_PIE
;
1102 opts
->x_flag_pie
= 0;
1104 /* If -fPIE or -fpie is used, turn on PIC. */
1105 if (opts
->x_flag_pie
)
1106 opts
->x_flag_pic
= opts
->x_flag_pie
;
1107 else if (opts
->x_flag_pic
== -1)
1108 opts
->x_flag_pic
= 0;
1109 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
1110 opts
->x_flag_shlib
= 1;
1111 opts
->x_flag_opts_finished
= true;
1114 /* We initialize opts->x_flag_stack_protect to -1 so that targets
1115 can set a default value. */
1116 if (opts
->x_flag_stack_protect
== -1)
1117 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
1119 if (opts
->x_optimize
== 0)
1121 /* Inlining does not work if not optimizing,
1122 so force it not to be done. */
1123 opts
->x_warn_inline
= 0;
1124 opts
->x_flag_no_inline
= 1;
1127 /* At -O0 or -Og, turn __builtin_unreachable into a trap. */
1128 if (!opts
->x_optimize
|| opts
->x_optimize_debug
)
1129 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unreachable_traps
, true);
1131 /* Pipelining of outer loops is only possible when general pipelining
1132 capabilities are requested. */
1133 if (!opts
->x_flag_sel_sched_pipelining
)
1134 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
1136 if (opts
->x_flag_conserve_stack
)
1138 SET_OPTION_IF_UNSET (opts
, opts_set
, param_large_stack_frame
, 100);
1139 SET_OPTION_IF_UNSET (opts
, opts_set
, param_stack_frame_growth
, 40);
1142 if (opts
->x_flag_lto
)
1145 opts
->x_flag_generate_lto
= 1;
1147 /* When generating IL, do not operate in whole-program mode.
1148 Otherwise, symbols will be privatized too early, causing link
1150 opts
->x_flag_whole_program
= 0;
1152 error_at (loc
, "LTO support has not been enabled in this configuration");
1154 if (!opts
->x_flag_fat_lto_objects
1155 && (!HAVE_LTO_PLUGIN
1156 || (opts_set
->x_flag_use_linker_plugin
1157 && !opts
->x_flag_use_linker_plugin
)))
1159 if (opts_set
->x_flag_fat_lto_objects
)
1160 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
1162 opts
->x_flag_fat_lto_objects
= 1;
1165 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1166 if (opts
->x_dwarf_split_debug_info
)
1168 inform (loc
, "%<-gsplit-dwarf%> is not supported with LTO,"
1170 opts
->x_dwarf_split_debug_info
= 0;
1174 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1175 default value if they choose based on other options. */
1176 if (opts
->x_flag_split_stack
== -1)
1177 opts
->x_flag_split_stack
= 0;
1178 else if (opts
->x_flag_split_stack
)
1180 if (!targetm_common
.supports_split_stack (true, opts
))
1182 error_at (loc
, "%<-fsplit-stack%> is not supported by "
1183 "this compiler configuration");
1184 opts
->x_flag_split_stack
= 0;
1188 /* If stack splitting is turned on, and the user did not explicitly
1189 request function partitioning, turn off partitioning, as it
1190 confuses the linker when trying to handle partitioned split-stack
1191 code that calls a non-split-stack functions. But if partitioning
1192 was turned on explicitly just hope for the best. */
1193 if (opts
->x_flag_split_stack
1194 && opts
->x_flag_reorder_blocks_and_partition
)
1195 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_blocks_and_partition
, 0);
1197 if (opts
->x_flag_reorder_blocks_and_partition
)
1198 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_functions
, 1);
1200 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1201 if (opts
->x_dwarf_split_debug_info
)
1202 opts
->x_debug_generate_pub_sections
= 2;
1204 if ((opts
->x_flag_sanitize
1205 & (SANITIZE_USER_ADDRESS
| SANITIZE_KERNEL_ADDRESS
)) == 0)
1207 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_COMPARE
)
1209 "%<-fsanitize=pointer-compare%> must be combined with "
1210 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1211 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_SUBTRACT
)
1213 "%<-fsanitize=pointer-subtract%> must be combined with "
1214 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1217 /* Address sanitizers conflict with the thread sanitizer. */
1218 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_THREAD
,
1220 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_THREAD
,
1221 SANITIZE_HWADDRESS
);
1222 /* The leak sanitizer conflicts with the thread sanitizer. */
1223 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_LEAK
,
1226 /* No combination of HWASAN and ASAN work together. */
1227 report_conflicting_sanitizer_options (opts
, loc
,
1228 SANITIZE_HWADDRESS
, SANITIZE_ADDRESS
);
1230 /* The userspace and kernel address sanitizers conflict with each other. */
1231 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_USER_HWADDRESS
,
1232 SANITIZE_KERNEL_HWADDRESS
);
1233 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_USER_ADDRESS
,
1234 SANITIZE_KERNEL_ADDRESS
);
1236 /* Check error recovery for -fsanitize-recover option. */
1237 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1238 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
1239 && !sanitizer_opts
[i
].can_recover
)
1240 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
1241 sanitizer_opts
[i
].name
);
1243 /* Check -fsanitize-trap option. */
1244 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1245 if ((opts
->x_flag_sanitize_trap
& sanitizer_opts
[i
].flag
)
1246 && !sanitizer_opts
[i
].can_trap
1247 /* Allow -fsanitize-trap=all or -fsanitize-trap=undefined
1248 to set flag_sanitize_trap & SANITIZE_VPTR bit which will
1249 effectively disable -fsanitize=vptr, just disallow
1250 explicit -fsanitize-trap=vptr. */
1251 && sanitizer_opts
[i
].flag
!= SANITIZE_VPTR
)
1252 error_at (loc
, "%<-fsanitize-trap=%s%> is not supported",
1253 sanitizer_opts
[i
].name
);
1255 /* When instrumenting the pointers, we don't want to remove
1256 the null pointer checks. */
1257 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
1258 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
1259 opts
->x_flag_delete_null_pointer_checks
= 0;
1261 /* Aggressive compiler optimizations may cause false negatives. */
1262 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
1263 opts
->x_flag_aggressive_loop_optimizations
= 0;
1265 /* Enable -fsanitize-address-use-after-scope if either address sanitizer is
1267 if (opts
->x_flag_sanitize
1268 & (SANITIZE_USER_ADDRESS
| SANITIZE_USER_HWADDRESS
))
1269 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_sanitize_address_use_after_scope
,
1272 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1274 if (opts
->x_flag_sanitize_address_use_after_scope
)
1276 if (opts
->x_flag_stack_reuse
!= SR_NONE
1277 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1279 "%<-fsanitize-address-use-after-scope%> requires "
1280 "%<-fstack-reuse=none%> option");
1282 opts
->x_flag_stack_reuse
= SR_NONE
;
1285 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1286 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1288 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1289 sorry ("transactional memory is not supported with "
1290 "%<-fsanitize=kernel-address%>");
1292 /* Currently live patching is not support for LTO. */
1293 if (opts
->x_flag_live_patching
== LIVE_PATCHING_INLINE_ONLY_STATIC
&& opts
->x_flag_lto
)
1294 sorry ("live patching (with %qs) is not supported with LTO",
1295 "inline-only-static");
1297 /* Currently vtable verification is not supported for LTO */
1298 if (opts
->x_flag_vtable_verify
&& opts
->x_flag_lto
)
1299 sorry ("vtable verification is not supported with LTO");
1301 /* Control IPA optimizations based on different -flive-patching level. */
1302 if (opts
->x_flag_live_patching
)
1303 control_options_for_live_patching (opts
, opts_set
,
1304 opts
->x_flag_live_patching
,
1307 /* Allow cunroll to grow size accordingly. */
1308 if (!opts_set
->x_flag_cunroll_grow_size
)
1309 opts
->x_flag_cunroll_grow_size
1310 = (opts
->x_flag_unroll_loops
1311 || opts
->x_flag_peel_loops
1312 || opts
->x_optimize
>= 3);
1314 /* With -fcx-limited-range, we do cheap and quick complex arithmetic. */
1315 if (opts
->x_flag_cx_limited_range
)
1316 opts
->x_flag_complex_method
= 0;
1317 else if (opts_set
->x_flag_cx_limited_range
)
1318 opts
->x_flag_complex_method
= opts
->x_flag_default_complex_method
;
1320 /* With -fcx-fortran-rules, we do something in-between cheap and C99. */
1321 if (opts
->x_flag_cx_fortran_rules
)
1322 opts
->x_flag_complex_method
= 1;
1323 else if (opts_set
->x_flag_cx_fortran_rules
)
1324 opts
->x_flag_complex_method
= opts
->x_flag_default_complex_method
;
1326 /* Use -fvect-cost-model=cheap instead of -fvect-cost-mode=very-cheap
1327 by default with explicit -ftree-{loop,slp}-vectorize. */
1328 if (opts
->x_optimize
== 2
1329 && (opts_set
->x_flag_tree_loop_vectorize
1330 || opts_set
->x_flag_tree_vectorize
))
1331 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
1332 VECT_COST_MODEL_CHEAP
);
1334 if (opts
->x_flag_gtoggle
)
1336 /* Make sure to process -gtoggle only once. */
1337 opts
->x_flag_gtoggle
= false;
1338 if (opts
->x_debug_info_level
== DINFO_LEVEL_NONE
)
1340 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
1342 if (opts
->x_write_symbols
== NO_DEBUG
)
1343 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
1346 opts
->x_debug_info_level
= DINFO_LEVEL_NONE
;
1349 if (!opts_set
->x_debug_nonbind_markers_p
)
1350 opts
->x_debug_nonbind_markers_p
1352 && opts
->x_debug_info_level
>= DINFO_LEVEL_NORMAL
1353 && dwarf_debuginfo_p (opts
)
1354 && !(opts
->x_flag_selective_scheduling
1355 || opts
->x_flag_selective_scheduling2
));
1357 /* We know which debug output will be used so we can set flag_var_tracking
1358 and flag_var_tracking_uninit if the user has not specified them. */
1359 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
1360 || !dwarf_debuginfo_p (opts
)
1361 /* We have not yet initialized debug hooks so match that to check
1362 whether we're only doing DWARF2_LINENO_DEBUGGING_INFO. */
1363 #ifndef DWARF2_DEBUGGING_INFO
1368 if ((opts_set
->x_flag_var_tracking
&& opts
->x_flag_var_tracking
== 1)
1369 || (opts_set
->x_flag_var_tracking_uninit
1370 && opts
->x_flag_var_tracking_uninit
== 1))
1372 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
1373 warning_at (UNKNOWN_LOCATION
, 0,
1374 "variable tracking requested, but useless unless "
1375 "producing debug info");
1377 warning_at (UNKNOWN_LOCATION
, 0,
1378 "variable tracking requested, but not supported "
1379 "by this debug format");
1381 opts
->x_flag_var_tracking
= 0;
1382 opts
->x_flag_var_tracking_uninit
= 0;
1385 /* One could use EnabledBy, but it would lead to a circular dependency. */
1386 if (!opts_set
->x_flag_var_tracking_uninit
)
1387 opts
->x_flag_var_tracking_uninit
= opts
->x_flag_var_tracking
;
1389 if (!opts_set
->x_flag_var_tracking_assignments
)
1390 opts
->x_flag_var_tracking_assignments
1391 = (opts
->x_flag_var_tracking
1392 && !(opts
->x_flag_selective_scheduling
1393 || opts
->x_flag_selective_scheduling2
));
1395 if (opts
->x_flag_var_tracking_assignments_toggle
)
1396 opts
->x_flag_var_tracking_assignments
1397 = !opts
->x_flag_var_tracking_assignments
;
1399 if (opts
->x_flag_var_tracking_assignments
&& !opts
->x_flag_var_tracking
)
1400 opts
->x_flag_var_tracking
= opts
->x_flag_var_tracking_assignments
= -1;
1402 if (opts
->x_flag_var_tracking_assignments
1403 && (opts
->x_flag_selective_scheduling
1404 || opts
->x_flag_selective_scheduling2
))
1406 "var-tracking-assignments changes selective scheduling");
1408 if (opts
->x_flag_syntax_only
)
1410 opts
->x_write_symbols
= NO_DEBUG
;
1411 opts
->x_profile_flag
= 0;
1415 diagnose_options (opts
, opts_set
, loc
);
1418 /* The function diagnoses incompatible combinations for provided options
1419 (OPTS and OPTS_SET) at a given LOCation. The function is called both
1420 when command line is parsed (after the target optimization hook) and
1421 when an optimize/target attribute (or pragma) is used. */
1423 void diagnose_options (gcc_options
*opts
, gcc_options
*opts_set
,
1426 /* The optimization to partition hot and cold basic blocks into separate
1427 sections of the .o and executable files does not work (currently)
1428 with exception handling. This is because there is no support for
1429 generating unwind info. If opts->x_flag_exceptions is turned on
1430 we need to turn off the partitioning optimization. */
1432 enum unwind_info_type ui_except
1433 = targetm_common
.except_unwind_info (opts
);
1435 if (opts
->x_flag_exceptions
1436 && opts
->x_flag_reorder_blocks_and_partition
1437 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
1439 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1441 "%<-freorder-blocks-and-partition%> does not work "
1442 "with exceptions on this architecture");
1443 opts
->x_flag_reorder_blocks_and_partition
= 0;
1444 opts
->x_flag_reorder_blocks
= 1;
1447 /* If user requested unwind info, then turn off the partitioning
1450 if (opts
->x_flag_unwind_tables
1451 && !targetm_common
.unwind_tables_default
1452 && opts
->x_flag_reorder_blocks_and_partition
1453 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
1455 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1457 "%<-freorder-blocks-and-partition%> does not support "
1458 "unwind info on this architecture");
1459 opts
->x_flag_reorder_blocks_and_partition
= 0;
1460 opts
->x_flag_reorder_blocks
= 1;
1463 /* If the target requested unwind info, then turn off the partitioning
1464 optimization with a different message. Likewise, if the target does not
1465 support named sections. */
1467 if (opts
->x_flag_reorder_blocks_and_partition
1468 && (!targetm_common
.have_named_sections
1469 || (opts
->x_flag_unwind_tables
1470 && targetm_common
.unwind_tables_default
1471 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
1473 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1475 "%<-freorder-blocks-and-partition%> does not work "
1476 "on this architecture");
1477 opts
->x_flag_reorder_blocks_and_partition
= 0;
1478 opts
->x_flag_reorder_blocks
= 1;
1484 #define LEFT_COLUMN 27
1486 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1487 followed by word-wrapped HELP in a second column. */
1489 wrap_help (const char *help
,
1491 unsigned int item_width
,
1492 unsigned int columns
)
1494 unsigned int col_width
= LEFT_COLUMN
;
1495 unsigned int remaining
, room
, len
;
1497 remaining
= strlen (help
);
1501 room
= columns
- 3 - MAX (col_width
, item_width
);
1510 for (i
= 0; help
[i
]; i
++)
1512 if (i
>= room
&& len
!= remaining
)
1516 else if ((help
[i
] == '-' || help
[i
] == '/')
1517 && help
[i
+ 1] != ' '
1518 && i
> 0 && ISALPHA (help
[i
- 1]))
1523 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1525 while (help
[len
] == ' ')
1533 /* Data structure used to print list of valid option values. */
1535 class option_help_tuple
1538 option_help_tuple (int code
, vec
<const char *> values
):
1539 m_code (code
), m_values (values
)
1542 /* Code of an option. */
1545 /* List of possible values. */
1546 vec
<const char *> m_values
;
1549 /* Print help for a specific front-end, etc. */
1551 print_filtered_help (unsigned int include_flags
,
1552 unsigned int exclude_flags
,
1553 unsigned int any_flags
,
1554 unsigned int columns
,
1555 struct gcc_options
*opts
,
1556 unsigned int lang_mask
)
1561 bool displayed
= false;
1564 if (!opts
->x_help_printed
)
1565 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1567 if (!opts
->x_help_enum_printed
)
1568 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1570 auto_vec
<option_help_tuple
> help_tuples
;
1572 for (i
= 0; i
< cl_options_count
; i
++)
1574 const struct cl_option
*option
= cl_options
+ i
;
1579 if (include_flags
== 0
1580 || ((option
->flags
& include_flags
) != include_flags
))
1582 if ((option
->flags
& any_flags
) == 0)
1586 /* Skip unwanted switches. */
1587 if ((option
->flags
& exclude_flags
) != 0)
1590 /* The driver currently prints its own help text. */
1591 if ((option
->flags
& CL_DRIVER
) != 0
1592 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1593 | CL_COMMON
| CL_TARGET
)) == 0)
1596 /* If an option contains a language specification,
1597 exclude it from common unless all languages are present. */
1598 if ((include_flags
& CL_COMMON
)
1599 && !(option
->flags
& CL_DRIVER
)
1600 && (option
->flags
& CL_LANG_ALL
)
1601 && (option
->flags
& CL_LANG_ALL
) != CL_LANG_ALL
)
1605 /* Skip switches that have already been printed. */
1606 if (opts
->x_help_printed
[i
])
1609 opts
->x_help_printed
[i
] = true;
1611 help
= option
->help
;
1614 if (exclude_flags
& CL_UNDOCUMENTED
)
1617 help
= undocumented_msg
;
1620 /* Get the translation. */
1623 if (option
->alias_target
< N_OPTS
1624 && cl_options
[option
->alias_target
].help
)
1626 const struct cl_option
*target
= cl_options
+ option
->alias_target
;
1627 if (option
->help
== NULL
)
1629 /* The option is undocumented but is an alias for an option that
1630 is documented. If the option has alias arguments, then its
1631 purpose is to provide certain arguments to the other option, so
1632 inform the reader of this. Otherwise, point the reader to the
1633 other option in preference to the former. */
1635 if (option
->alias_arg
)
1637 if (option
->neg_alias_arg
)
1638 snprintf (new_help
, sizeof new_help
,
1639 _("Same as %s%s (or, in negated form, %s%s)."),
1640 target
->opt_text
, option
->alias_arg
,
1641 target
->opt_text
, option
->neg_alias_arg
);
1643 snprintf (new_help
, sizeof new_help
,
1645 target
->opt_text
, option
->alias_arg
);
1648 snprintf (new_help
, sizeof new_help
,
1654 /* For documented options with aliases, mention the aliased
1655 option's name for reference. */
1656 snprintf (new_help
, sizeof new_help
,
1657 _("%s Same as %s."),
1658 help
, cl_options
[option
->alias_target
].opt_text
);
1664 if (option
->warn_message
)
1666 /* Mention that the use of the option will trigger a warning. */
1667 if (help
== new_help
)
1668 snprintf (new_help
+ strlen (new_help
),
1669 sizeof new_help
- strlen (new_help
),
1670 " %s", _(use_diagnosed_msg
));
1672 snprintf (new_help
, sizeof new_help
,
1673 "%s %s", help
, _(use_diagnosed_msg
));
1678 /* Find the gap between the name of the
1679 option and its descriptive text. */
1680 tab
= strchr (help
, '\t');
1689 opt
= option
->opt_text
;
1693 /* With the -Q option enabled we change the descriptive text associated
1694 with an option to be an indication of its current setting. */
1695 if (!opts
->x_quiet_flag
)
1697 void *flag_var
= option_flag_var (i
, opts
);
1699 if (len
< (LEFT_COLUMN
+ 2))
1700 strcpy (new_help
, "\t\t");
1702 strcpy (new_help
, "\t");
1704 /* Set to print whether the option is enabled or disabled,
1705 or, if it's an alias for another option, the name of
1706 the aliased option. */
1707 bool print_state
= false;
1709 if (flag_var
!= NULL
1710 && option
->var_type
!= CLVC_DEFER
)
1712 /* If OPTION is only available for a specific subset
1713 of languages other than this one, mention them. */
1714 bool avail_for_lang
= true;
1715 if (unsigned langset
= option
->flags
& CL_LANG_ALL
)
1717 if (!(langset
& lang_mask
))
1719 avail_for_lang
= false;
1720 strcat (new_help
, _("[available in "));
1721 for (unsigned i
= 0, n
= 0; (1U << i
) < CL_LANG_ALL
; ++i
)
1722 if (langset
& (1U << i
))
1725 strcat (new_help
, ", ");
1726 strcat (new_help
, lang_names
[i
]);
1728 strcat (new_help
, "]");
1731 if (!avail_for_lang
)
1732 ; /* Print nothing else if the option is not available
1733 in the current language. */
1734 else if (option
->flags
& CL_JOINED
)
1736 if (option
->var_type
== CLVC_STRING
)
1738 if (* (const char **) flag_var
!= NULL
)
1739 snprintf (new_help
+ strlen (new_help
),
1740 sizeof (new_help
) - strlen (new_help
),
1741 "%s", * (const char **) flag_var
);
1743 else if (option
->var_type
== CLVC_ENUM
)
1745 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1747 const char *arg
= NULL
;
1749 value
= e
->get (flag_var
);
1750 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1752 arg
= _("[default]");
1753 snprintf (new_help
+ strlen (new_help
),
1754 sizeof (new_help
) - strlen (new_help
),
1759 if (option
->cl_host_wide_int
)
1760 sprintf (new_help
+ strlen (new_help
),
1761 _("%llu bytes"), (unsigned long long)
1762 *(unsigned HOST_WIDE_INT
*) flag_var
);
1764 sprintf (new_help
+ strlen (new_help
),
1765 "%i", * (int *) flag_var
);
1772 /* When there is no argument, print the option state only
1773 if the option takes no argument. */
1774 print_state
= !(option
->flags
& CL_JOINED
);
1778 if (option
->alias_target
< N_OPTS
1779 && option
->alias_target
!= OPT_SPECIAL_warn_removed
1780 && option
->alias_target
!= OPT_SPECIAL_ignore
1781 && option
->alias_target
!= OPT_SPECIAL_input_file
1782 && option
->alias_target
!= OPT_SPECIAL_program_name
1783 && option
->alias_target
!= OPT_SPECIAL_unknown
)
1785 const struct cl_option
*target
1786 = &cl_options
[option
->alias_target
];
1787 sprintf (new_help
+ strlen (new_help
), "%s%s",
1789 option
->alias_arg
? option
->alias_arg
: "");
1791 else if (option
->alias_target
== OPT_SPECIAL_ignore
)
1792 strcat (new_help
, ("[ignored]"));
1795 /* Print the state for an on/off option. */
1796 int ena
= option_enabled (i
, lang_mask
, opts
);
1798 strcat (new_help
, _("[enabled]"));
1800 strcat (new_help
, _("[disabled]"));
1807 if (option
->range_max
!= -1 && tab
== NULL
)
1810 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1812 opt
= concat (opt
, b
, NULL
);
1816 wrap_help (help
, opt
, len
, columns
);
1819 if (option
->var_type
== CLVC_ENUM
1820 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1821 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1824 vec
<const char *> option_values
1825 = targetm_common
.get_valid_option_values (i
, NULL
);
1826 if (!option_values
.is_empty ())
1827 help_tuples
.safe_push (option_help_tuple (i
, option_values
));
1833 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1836 printf (_(" No options with the desired characteristics were found\n"));
1841 /* PR 31349: Tell the user how to see all of the
1842 options supported by a specific front end. */
1843 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1844 if ((1U << i
) & langs
)
1845 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1846 lang_names
[i
], lang_names
[i
]);
1850 else if (! displayed
)
1851 printf (_(" All options with the desired characteristics have already been displayed\n"));
1855 /* Print details of enumerated option arguments, if those
1856 enumerations have help text headings provided. If no help text
1857 is provided, presume that the possible values are listed in the
1858 help text for the relevant options. */
1859 for (i
= 0; i
< cl_enums_count
; i
++)
1861 unsigned int j
, pos
;
1863 if (opts
->x_help_enum_printed
[i
] != 1)
1865 if (cl_enums
[i
].help
== NULL
)
1867 printf (" %s\n ", _(cl_enums
[i
].help
));
1869 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1871 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1873 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1875 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1885 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1890 opts
->x_help_enum_printed
[i
] = 2;
1893 for (unsigned i
= 0; i
< help_tuples
.length (); i
++)
1895 const struct cl_option
*option
= cl_options
+ help_tuples
[i
].m_code
;
1896 printf (_(" Known valid arguments for %s option:\n "),
1898 for (unsigned j
= 0; j
< help_tuples
[i
].m_values
.length (); j
++)
1899 printf (" %s", help_tuples
[i
].m_values
[j
]);
1904 /* Display help for a specified type of option.
1905 The options must have ALL of the INCLUDE_FLAGS set
1906 ANY of the flags in the ANY_FLAGS set
1907 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1908 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1910 print_specific_help (unsigned int include_flags
,
1911 unsigned int exclude_flags
,
1912 unsigned int any_flags
,
1913 struct gcc_options
*opts
,
1914 unsigned int lang_mask
)
1916 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1917 const char * description
= NULL
;
1918 const char * descrip_extra
= "";
1922 /* Sanity check: Make sure that we do not have more
1923 languages than we have bits available to enumerate them. */
1924 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1926 /* If we have not done so already, obtain
1927 the desired maximum width of the output. */
1928 if (opts
->x_help_columns
== 0)
1930 opts
->x_help_columns
= get_terminal_width ();
1931 if (opts
->x_help_columns
== INT_MAX
)
1932 /* Use a reasonable default. */
1933 opts
->x_help_columns
= 80;
1936 /* Decide upon the title for the options that we are going to display. */
1937 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1939 switch (flag
& include_flags
)
1946 description
= _("The following options are target specific");
1949 description
= _("The following options control compiler warning messages");
1951 case CL_OPTIMIZATION
:
1952 description
= _("The following options control optimizations");
1955 description
= _("The following options are language-independent");
1958 description
= _("The following options control parameters");
1961 if (i
>= cl_lang_count
)
1963 if (exclude_flags
& all_langs_mask
)
1964 description
= _("The following options are specific to just the language ");
1966 description
= _("The following options are supported by the language ");
1967 descrip_extra
= lang_names
[i
];
1972 if (description
== NULL
)
1976 if (include_flags
& CL_UNDOCUMENTED
)
1977 description
= _("The following options are not documented");
1978 else if (include_flags
& CL_SEPARATE
)
1979 description
= _("The following options take separate arguments");
1980 else if (include_flags
& CL_JOINED
)
1981 description
= _("The following options take joined arguments");
1984 internal_error ("unrecognized %<include_flags 0x%x%> passed "
1985 "to %<print_specific_help%>",
1992 if (any_flags
& all_langs_mask
)
1993 description
= _("The following options are language-related");
1995 description
= _("The following options are language-independent");
1999 printf ("%s%s:\n", description
, descrip_extra
);
2000 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
2001 opts
->x_help_columns
, opts
, lang_mask
);
2004 /* Enable FDO-related flags. */
2007 enable_fdo_optimizations (struct gcc_options
*opts
,
2008 struct gcc_options
*opts_set
,
2011 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_branch_probabilities
, value
);
2012 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
2013 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_loops
, value
);
2014 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_peel_loops
, value
);
2015 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tracer
, value
);
2016 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_value_profile_transformations
,
2018 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
2019 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp
, value
);
2022 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp_clone
, 1);
2023 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, 1);
2025 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_predictive_commoning
, value
);
2026 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_split_loops
, value
);
2027 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unswitch_loops
, value
);
2028 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_gcse_after_reload
, value
);
2029 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_vectorize
, value
);
2030 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_slp_vectorize
, value
);
2031 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_version_loops_for_strides
, value
);
2032 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
2033 VECT_COST_MODEL_DYNAMIC
);
2034 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribute_patterns
,
2036 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_loop_interchange
, value
);
2037 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_jam
, value
);
2038 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribution
, value
);
2041 /* -f{,no-}sanitize{,-recover}= suboptions. */
2042 const struct sanitizer_opts_s sanitizer_opts
[] =
2044 #define SANITIZER_OPT(name, flags, recover, trap) \
2045 { #name, flags, sizeof #name - 1, recover, trap }
2046 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true,
2048 SANITIZER_OPT (hwaddress
, (SANITIZE_HWADDRESS
| SANITIZE_USER_HWADDRESS
),
2050 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
2052 SANITIZER_OPT (kernel
-hwaddress
,
2053 (SANITIZE_HWADDRESS
| SANITIZE_KERNEL_HWADDRESS
),
2055 SANITIZER_OPT (pointer
-compare
, SANITIZE_POINTER_COMPARE
, true, false),
2056 SANITIZER_OPT (pointer
-subtract
, SANITIZE_POINTER_SUBTRACT
, true, false),
2057 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false, false),
2058 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false, false),
2059 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true, true),
2060 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true, true),
2061 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true, true),
2062 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true, true),
2063 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true, true),
2064 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false, true),
2065 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true, true),
2066 SANITIZER_OPT (return, SANITIZE_RETURN
, false, true),
2067 SANITIZER_OPT (null
, SANITIZE_NULL
, true, true),
2068 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true, true),
2069 SANITIZER_OPT (bool, SANITIZE_BOOL
, true, true),
2070 SANITIZER_OPT (enum, SANITIZE_ENUM
, true, true),
2071 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true, true),
2072 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true, true),
2073 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true, true),
2074 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true,
2076 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true, true),
2077 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true, true),
2078 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
2080 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true, true),
2081 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true, false),
2082 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true, true),
2083 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true, true),
2084 SANITIZER_OPT (shadow
-call
-stack
, SANITIZE_SHADOW_CALL_STACK
, false, false),
2085 SANITIZER_OPT (all
, ~0U, true, true),
2086 #undef SANITIZER_OPT
2087 { NULL
, 0U, 0UL, false, false }
2090 /* -fzero-call-used-regs= suboptions. */
2091 const struct zero_call_used_regs_opts_s zero_call_used_regs_opts
[] =
2093 #define ZERO_CALL_USED_REGS_OPT(name, flags) \
2095 ZERO_CALL_USED_REGS_OPT (skip
, zero_regs_flags::SKIP
),
2096 ZERO_CALL_USED_REGS_OPT (used
-gpr
-arg
, zero_regs_flags::USED_GPR_ARG
),
2097 ZERO_CALL_USED_REGS_OPT (used
-gpr
, zero_regs_flags::USED_GPR
),
2098 ZERO_CALL_USED_REGS_OPT (used
-arg
, zero_regs_flags::USED_ARG
),
2099 ZERO_CALL_USED_REGS_OPT (used
, zero_regs_flags::USED
),
2100 ZERO_CALL_USED_REGS_OPT (all
-gpr
-arg
, zero_regs_flags::ALL_GPR_ARG
),
2101 ZERO_CALL_USED_REGS_OPT (all
-gpr
, zero_regs_flags::ALL_GPR
),
2102 ZERO_CALL_USED_REGS_OPT (all
-arg
, zero_regs_flags::ALL_ARG
),
2103 ZERO_CALL_USED_REGS_OPT (all
, zero_regs_flags::ALL
),
2104 #undef ZERO_CALL_USED_REGS_OPT
2108 /* A struct for describing a run of chars within a string. */
2110 class string_fragment
2113 string_fragment (const char *start
, size_t len
)
2114 : m_start (start
), m_len (len
) {}
2116 const char *m_start
;
2120 /* Specialization of edit_distance_traits for string_fragment,
2121 for use by get_closest_sanitizer_option. */
2124 struct edit_distance_traits
<const string_fragment
&>
2126 static size_t get_length (const string_fragment
&fragment
)
2128 return fragment
.m_len
;
2131 static const char *get_string (const string_fragment
&fragment
)
2133 return fragment
.m_start
;
2137 /* Given ARG, an unrecognized sanitizer option, return the best
2138 matching sanitizer option, or NULL if there isn't one.
2139 OPTS is array of candidate sanitizer options.
2140 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or OPT_fsanitize_trap_.
2141 VALUE is non-zero for the regular form of the option, zero
2142 for the "no-" form (e.g. "-fno-sanitize-recover="). */
2145 get_closest_sanitizer_option (const string_fragment
&arg
,
2146 const struct sanitizer_opts_s
*opts
,
2147 enum opt_code code
, int value
)
2149 best_match
<const string_fragment
&, const char*> bm (arg
);
2150 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
2152 /* -fsanitize=all is not valid, so don't offer it. */
2153 if (code
== OPT_fsanitize_
2154 && opts
[i
].flag
== ~0U
2158 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
2159 don't offer the non-recoverable options. */
2160 if (code
== OPT_fsanitize_recover_
2161 && !opts
[i
].can_recover
2165 /* For -fsanitize-trap= (and not -fno-sanitize-trap=),
2166 don't offer the non-trapping options. */
2167 if (code
== OPT_fsanitize_trap_
2168 && !opts
[i
].can_trap
2172 bm
.consider (opts
[i
].name
);
2174 return bm
.get_best_meaningful_candidate ();
2177 /* Parse comma separated sanitizer suboptions from P for option SCODE,
2178 adjust previous FLAGS and return new ones. If COMPLAIN is false,
2179 don't issue diagnostics. */
2182 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
2183 unsigned int flags
, int value
, bool complain
)
2185 enum opt_code code
= (enum opt_code
) scode
;
2191 const char *comma
= strchr (p
, ',');
2203 /* Check to see if the string matches an option class name. */
2204 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
2205 if (len
== sanitizer_opts
[i
].len
2206 && memcmp (p
, sanitizer_opts
[i
].name
, len
) == 0)
2208 /* Handle both -fsanitize and -fno-sanitize cases. */
2209 if (value
&& sanitizer_opts
[i
].flag
== ~0U)
2211 if (code
== OPT_fsanitize_
)
2214 error_at (loc
, "%<-fsanitize=all%> option is not valid");
2216 else if (code
== OPT_fsanitize_recover_
)
2217 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
2218 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
2219 | SANITIZE_SHADOW_CALL_STACK
);
2220 else /* if (code == OPT_fsanitize_trap_) */
2221 flags
|= (SANITIZE_UNDEFINED
2222 | SANITIZE_UNDEFINED_NONDEFAULT
);
2226 /* Do not enable -fsanitize-recover=unreachable and
2227 -fsanitize-recover=return if -fsanitize-recover=undefined
2229 if (code
== OPT_fsanitize_recover_
2230 && sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
2231 flags
|= (SANITIZE_UNDEFINED
2232 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
2233 else if (code
== OPT_fsanitize_trap_
2234 && sanitizer_opts
[i
].flag
== SANITIZE_VPTR
)
2235 error_at (loc
, "%<-fsanitize-trap=%s%> is not supported",
2236 sanitizer_opts
[i
].name
);
2238 flags
|= sanitizer_opts
[i
].flag
;
2241 flags
&= ~sanitizer_opts
[i
].flag
;
2246 if (! found
&& complain
)
2249 = get_closest_sanitizer_option (string_fragment (p
, len
),
2250 sanitizer_opts
, code
, value
);
2253 if (code
== OPT_fsanitize_recover_
)
2254 suffix
= "-recover";
2255 else if (code
== OPT_fsanitize_trap_
)
2262 "unrecognized argument to %<-f%ssanitize%s=%> "
2263 "option: %q.*s; did you mean %qs?",
2265 suffix
, (int) len
, p
, hint
);
2268 "unrecognized argument to %<-f%ssanitize%s=%> option: "
2269 "%q.*s", value
? "" : "no-",
2270 suffix
, (int) len
, p
);
2280 /* Parse string values of no_sanitize attribute passed in VALUE.
2281 Values are separated with comma. */
2284 parse_no_sanitize_attribute (char *value
)
2286 unsigned int flags
= 0;
2288 char *q
= strtok (value
, ",");
2292 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
2293 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
2295 flags
|= sanitizer_opts
[i
].flag
;
2296 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
2297 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
2301 if (sanitizer_opts
[i
].name
== NULL
)
2302 warning (OPT_Wattributes
,
2303 "%qs attribute directive ignored", q
);
2305 q
= strtok (NULL
, ",");
2311 /* Parse -fzero-call-used-regs suboptions from ARG, return the FLAGS. */
2314 parse_zero_call_used_regs_options (const char *arg
)
2316 unsigned int flags
= 0;
2318 /* Check to see if the string matches a sub-option name. */
2319 for (unsigned int i
= 0; zero_call_used_regs_opts
[i
].name
!= NULL
; ++i
)
2320 if (strcmp (arg
, zero_call_used_regs_opts
[i
].name
) == 0)
2322 flags
= zero_call_used_regs_opts
[i
].flag
;
2327 error ("unrecognized argument to %<-fzero-call-used-regs=%>: %qs", arg
);
2332 /* Parse -falign-NAME format for a FLAG value. Return individual
2333 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
2334 set, print error message at LOC location. */
2337 parse_and_check_align_values (const char *flag
,
2339 auto_vec
<unsigned> &result_values
,
2343 char *str
= xstrdup (flag
);
2344 for (char *p
= strtok (str
, ":"); p
; p
= strtok (NULL
, ":"))
2347 int v
= strtol (p
, &end
, 10);
2348 if (*end
!= '\0' || v
< 0)
2351 error_at (loc
, "invalid arguments for %<-falign-%s%> option: %qs",
2357 result_values
.safe_push ((unsigned)v
);
2362 /* Check that we have a correct number of values. */
2363 if (result_values
.is_empty () || result_values
.length () > 4)
2366 error_at (loc
, "invalid number of arguments for %<-falign-%s%> "
2367 "option: %qs", name
, flag
);
2371 for (unsigned i
= 0; i
< result_values
.length (); i
++)
2372 if (result_values
[i
] > MAX_CODE_ALIGN_VALUE
)
2375 error_at (loc
, "%<-falign-%s%> is not between 0 and %d",
2376 name
, MAX_CODE_ALIGN_VALUE
);
2383 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2384 location LOC. OPT_STR points to the stored -falign-NAME=argument and
2385 OPT_FLAG points to the associated -falign-NAME on/off flag. */
2388 check_alignment_argument (location_t loc
, const char *flag
, const char *name
,
2389 int *opt_flag
, const char **opt_str
)
2391 auto_vec
<unsigned> align_result
;
2392 parse_and_check_align_values (flag
, name
, align_result
, true, loc
);
2394 if (align_result
.length() >= 1 && align_result
[0] == 0)
2401 /* Parse argument of -fpatchable-function-entry option ARG and store
2402 corresponding values to PATCH_AREA_SIZE and PATCH_AREA_START.
2403 If REPORT_ERROR is set to true, generate error for a problematic
2404 option arguments. */
2407 parse_and_check_patch_area (const char *arg
, bool report_error
,
2408 HOST_WIDE_INT
*patch_area_size
,
2409 HOST_WIDE_INT
*patch_area_start
)
2411 *patch_area_size
= 0;
2412 *patch_area_start
= 0;
2417 char *patch_area_arg
= xstrdup (arg
);
2418 char *comma
= strchr (patch_area_arg
, ',');
2422 *patch_area_size
= integral_argument (patch_area_arg
);
2423 *patch_area_start
= integral_argument (comma
+ 1);
2426 *patch_area_size
= integral_argument (patch_area_arg
);
2428 if (*patch_area_size
< 0
2429 || *patch_area_size
> USHRT_MAX
2430 || *patch_area_start
< 0
2431 || *patch_area_start
> USHRT_MAX
2432 || *patch_area_size
< *patch_area_start
)
2434 error ("invalid arguments for %<-fpatchable-function-entry%>");
2436 free (patch_area_arg
);
2439 /* Print help when OPT__help_ is set. */
2442 print_help (struct gcc_options
*opts
, unsigned int lang_mask
,
2443 const char *help_option_argument
)
2445 const char *a
= help_option_argument
;
2446 unsigned int include_flags
= 0;
2447 /* Note - by default we include undocumented options when listing
2448 specific classes. If you only want to see documented options
2449 then add ",^undocumented" to the --help= option. E.g.:
2451 --help=target,^undocumented */
2452 unsigned int exclude_flags
= 0;
2454 if (lang_mask
== CL_DRIVER
)
2457 /* Walk along the argument string, parsing each word in turn.
2459 arg = [^]{word}[,{arg}]
2460 word = {optimizers|target|warnings|undocumented|
2461 params|common|<language>} */
2471 { "optimizers", CL_OPTIMIZATION
},
2472 { "target", CL_TARGET
},
2473 { "warnings", CL_WARNING
},
2474 { "undocumented", CL_UNDOCUMENTED
},
2475 { "params", CL_PARAMS
},
2476 { "joined", CL_JOINED
},
2477 { "separate", CL_SEPARATE
},
2478 { "common", CL_COMMON
},
2481 unsigned int *pflags
;
2483 unsigned int lang_flag
, specific_flag
;
2492 error ("missing argument to %qs", "--help=^");
2495 pflags
= &exclude_flags
;
2498 pflags
= &include_flags
;
2500 comma
= strchr (a
, ',');
2511 /* Check to see if the string matches an option class name. */
2512 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
2513 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
2515 specific_flag
= specifics
[i
].flag
;
2519 /* Check to see if the string matches a language name.
2520 Note - we rely upon the alpha-sorted nature of the entries in
2521 the lang_names array, specifically that shorter names appear
2522 before their longer variants. (i.e. C before C++). That way
2523 when we are attempting to match --help=c for example we will
2524 match with C first and not C++. */
2525 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
2526 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
2528 lang_flag
= 1U << i
;
2532 if (specific_flag
!= 0)
2535 *pflags
|= specific_flag
;
2538 /* The option's argument matches both the start of a
2539 language name and the start of an option class name.
2540 We have a special case for when the user has
2541 specified "--help=c", but otherwise we have to issue
2543 if (strncasecmp (a
, "c", len
) == 0)
2544 *pflags
|= lang_flag
;
2547 "%<--help%> argument %q.*s is ambiguous, "
2548 "please be more specific",
2552 else if (lang_flag
!= 0)
2553 *pflags
|= lang_flag
;
2556 "unrecognized argument to %<--help=%> option: %q.*s",
2564 /* We started using PerFunction/Optimization for parameters and
2565 a warning. We should exclude these from optimization options. */
2566 if (include_flags
& CL_OPTIMIZATION
)
2567 exclude_flags
|= CL_WARNING
;
2568 if (!(include_flags
& CL_PARAMS
))
2569 exclude_flags
|= CL_PARAMS
;
2572 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
2576 /* Handle target- and language-independent options. Return zero to
2577 generate an "unknown option" message. Only options that need
2578 extra handling need to be listed here; if you simply want
2579 DECODED->value assigned to a variable, it happens automatically. */
2582 common_handle_option (struct gcc_options
*opts
,
2583 struct gcc_options
*opts_set
,
2584 const struct cl_decoded_option
*decoded
,
2585 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
2587 const struct cl_option_handlers
*handlers
,
2588 diagnostic_context
*dc
,
2589 void (*target_option_override_hook
) (void))
2591 size_t scode
= decoded
->opt_index
;
2592 const char *arg
= decoded
->arg
;
2593 HOST_WIDE_INT value
= decoded
->value
;
2594 enum opt_code code
= (enum opt_code
) scode
;
2596 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
2602 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
2603 unsigned int undoc_mask
;
2606 if (lang_mask
== CL_DRIVER
)
2609 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
2612 target_option_override_hook ();
2613 /* First display any single language specific options. */
2614 for (i
= 0; i
< cl_lang_count
; i
++)
2616 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
2618 /* Next display any multi language specific options. */
2619 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
2620 /* Then display any remaining, non-language options. */
2621 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
2623 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
2624 opts
->x_exit_after_options
= true;
2628 case OPT__target_help
:
2629 if (lang_mask
== CL_DRIVER
)
2632 target_option_override_hook ();
2633 print_specific_help (CL_TARGET
, 0, 0, opts
, lang_mask
);
2634 opts
->x_exit_after_options
= true;
2639 help_option_arguments
.safe_push (arg
);
2640 opts
->x_exit_after_options
= true;
2645 if (lang_mask
== CL_DRIVER
)
2648 opts
->x_exit_after_options
= true;
2651 case OPT__completion_
:
2654 case OPT_fsanitize_
:
2655 opts_set
->x_flag_sanitize
= true;
2656 opts
->x_flag_sanitize
2657 = parse_sanitizer_options (arg
, loc
, code
,
2658 opts
->x_flag_sanitize
, value
, true);
2660 /* Kernel ASan implies normal ASan but does not yet support
2662 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
2664 SET_OPTION_IF_UNSET (opts
, opts_set
,
2665 param_asan_instrumentation_with_call_threshold
,
2667 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_globals
, 0);
2668 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_stack
, 0);
2669 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_protect_allocas
, 0);
2670 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_use_after_return
, 0);
2672 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_HWADDRESS
)
2674 SET_OPTION_IF_UNSET (opts
, opts_set
,
2675 param_hwasan_instrument_stack
, 0);
2676 SET_OPTION_IF_UNSET (opts
, opts_set
,
2677 param_hwasan_random_frame_tag
, 0);
2678 SET_OPTION_IF_UNSET (opts
, opts_set
,
2679 param_hwasan_instrument_allocas
, 0);
2683 case OPT_fsanitize_recover_
:
2684 opts
->x_flag_sanitize_recover
2685 = parse_sanitizer_options (arg
, loc
, code
,
2686 opts
->x_flag_sanitize_recover
, value
, true);
2689 case OPT_fsanitize_trap_
:
2690 opts
->x_flag_sanitize_trap
2691 = parse_sanitizer_options (arg
, loc
, code
,
2692 opts
->x_flag_sanitize_trap
, value
, true);
2695 case OPT_fasan_shadow_offset_
:
2699 case OPT_fsanitize_address_use_after_scope
:
2700 opts
->x_flag_sanitize_address_use_after_scope
= value
;
2703 case OPT_fsanitize_recover
:
2705 opts
->x_flag_sanitize_recover
2706 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
2707 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
2709 opts
->x_flag_sanitize_recover
2710 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2713 case OPT_fsanitize_trap
:
2715 opts
->x_flag_sanitize_trap
2716 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2718 opts
->x_flag_sanitize_trap
2719 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2727 /* Currently handled in a prescan. */
2730 case OPT_Wattributes_
:
2731 if (lang_mask
== CL_DRIVER
)
2736 error_at (loc
, "arguments ignored for %<-Wattributes=%>; use "
2737 "%<-Wno-attributes=%> instead");
2740 else if (arg
[strlen (arg
) - 1] == ',')
2742 error_at (loc
, "trailing %<,%> in arguments for "
2743 "%<-Wno-attributes=%>");
2747 add_comma_separated_to_vector (&opts
->x_flag_ignored_attributes
, arg
);
2751 dc
->warning_as_error_requested
= value
;
2755 if (lang_mask
== CL_DRIVER
)
2758 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2759 opts
, opts_set
, loc
, dc
);
2762 case OPT_Wfatal_errors
:
2763 dc
->fatal_errors
= value
;
2766 case OPT_Wstack_usage_
:
2767 opts
->x_flag_stack_usage_info
= value
!= -1;
2770 case OPT_Wstrict_aliasing
:
2771 set_Wstrict_aliasing (opts
, value
);
2774 case OPT_Wstrict_overflow
:
2775 opts
->x_warn_strict_overflow
= (value
2776 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2780 case OPT_Wsystem_headers
:
2781 dc
->dc_warn_system_headers
= value
;
2785 opts
->x_flag_gen_aux_info
= 1;
2789 decode_d_option (arg
, opts
, loc
, dc
);
2792 case OPT_fcall_used_
:
2793 case OPT_fcall_saved_
:
2801 case OPT_fdebug_prefix_map_
:
2802 case OPT_ffile_prefix_map_
:
2803 case OPT_fprofile_prefix_map_
:
2807 case OPT_fcallgraph_info
:
2808 opts
->x_flag_callgraph_info
= CALLGRAPH_INFO_NAKED
;
2811 case OPT_fcallgraph_info_
:
2814 my_arg
= xstrdup (arg
);
2815 p
= strtok (my_arg
, ",");
2818 if (strcmp (p
, "su") == 0)
2820 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_STACK_USAGE
;
2821 opts
->x_flag_stack_usage_info
= true;
2823 else if (strcmp (p
, "da") == 0)
2824 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_DYNAMIC_ALLOC
;
2827 p
= strtok (NULL
, ",");
2833 case OPT_fdiagnostics_show_location_
:
2834 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2837 case OPT_fdiagnostics_show_caret
:
2838 dc
->show_caret
= value
;
2841 case OPT_fdiagnostics_show_labels
:
2842 dc
->show_labels_p
= value
;
2845 case OPT_fdiagnostics_show_line_numbers
:
2846 dc
->show_line_numbers_p
= value
;
2849 case OPT_fdiagnostics_color_
:
2850 diagnostic_color_init (dc
, value
);
2853 case OPT_fdiagnostics_urls_
:
2854 diagnostic_urls_init (dc
, value
);
2857 case OPT_fdiagnostics_format_
:
2858 diagnostic_output_format_init (dc
, opts
->x_dump_base_name
,
2859 (enum diagnostics_output_format
)value
);
2862 case OPT_fdiagnostics_parseable_fixits
:
2863 dc
->extra_output_kind
= (value
2864 ? EXTRA_DIAGNOSTIC_OUTPUT_fixits_v1
2865 : EXTRA_DIAGNOSTIC_OUTPUT_none
);
2868 case OPT_fdiagnostics_column_unit_
:
2869 dc
->column_unit
= (enum diagnostics_column_unit
)value
;
2872 case OPT_fdiagnostics_column_origin_
:
2873 dc
->column_origin
= value
;
2876 case OPT_fdiagnostics_escape_format_
:
2877 dc
->escape_format
= (enum diagnostics_escape_format
)value
;
2880 case OPT_fdiagnostics_show_cwe
:
2881 dc
->show_cwe
= value
;
2884 case OPT_fdiagnostics_show_rules
:
2885 dc
->show_rules
= value
;
2888 case OPT_fdiagnostics_path_format_
:
2889 dc
->path_format
= (enum diagnostic_path_format
)value
;
2892 case OPT_fdiagnostics_show_path_depths
:
2893 dc
->show_path_depths
= value
;
2896 case OPT_fdiagnostics_show_option
:
2897 dc
->show_option_requested
= value
;
2900 case OPT_fdiagnostics_minimum_margin_width_
:
2901 dc
->min_margin_width
= value
;
2908 case OPT_ffast_math
:
2909 set_fast_math_flags (opts
, value
);
2912 case OPT_funsafe_math_optimizations
:
2913 set_unsafe_math_optimizations_flags (opts
, value
);
2920 case OPT_finline_limit_
:
2921 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_single
,
2923 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_auto
,
2927 case OPT_finstrument_functions_exclude_function_list_
:
2928 add_comma_separated_to_vector
2929 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
2932 case OPT_finstrument_functions_exclude_file_list_
:
2933 add_comma_separated_to_vector
2934 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
2937 case OPT_fmessage_length_
:
2938 pp_set_line_maximum_length (dc
->printer
, value
);
2939 diagnostic_set_caret_max_width (dc
, value
);
2943 case OPT_fopt_info_
:
2947 case OPT_foffload_options_
:
2951 case OPT_foffload_abi_
:
2952 #ifdef ACCEL_COMPILER
2953 /* Handled in the 'mkoffload's. */
2955 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
2956 "offload compiler");
2960 case OPT_fpack_struct_
:
2961 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
2963 "structure alignment must be a small power of two, not %wu",
2966 opts
->x_initial_max_fld_align
= value
;
2970 case OPT_fplugin_arg_
:
2974 case OPT_fprofile_use_
:
2975 opts
->x_profile_data_prefix
= xstrdup (arg
);
2976 opts
->x_flag_profile_use
= true;
2978 /* No break here - do -fprofile-use processing. */
2980 case OPT_fprofile_use
:
2981 enable_fdo_optimizations (opts
, opts_set
, value
);
2982 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_reorder_functions
,
2984 /* Indirect call profiling should do all useful transformations
2985 speculative devirtualization does. */
2986 if (opts
->x_flag_value_profile_transformations
)
2987 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_devirtualize_speculatively
,
2991 case OPT_fauto_profile_
:
2992 opts
->x_auto_profile_file
= xstrdup (arg
);
2993 opts
->x_flag_auto_profile
= true;
2995 /* No break here - do -fauto-profile processing. */
2997 case OPT_fauto_profile
:
2998 enable_fdo_optimizations (opts
, opts_set
, value
);
2999 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_correction
, value
);
3002 case OPT_fprofile_generate_
:
3003 opts
->x_profile_data_prefix
= xstrdup (arg
);
3005 /* No break here - do -fprofile-generate processing. */
3007 case OPT_fprofile_generate
:
3008 SET_OPTION_IF_UNSET (opts
, opts_set
, profile_arc_flag
, value
);
3009 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
3010 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
3011 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, value
);
3014 case OPT_fprofile_info_section
:
3015 opts
->x_profile_info_section
= ".gcov_info";
3018 case OPT_fpatchable_function_entry_
:
3020 HOST_WIDE_INT patch_area_size
, patch_area_start
;
3021 parse_and_check_patch_area (arg
, true, &patch_area_size
,
3026 case OPT_ftree_vectorize
:
3027 /* Automatically sets -ftree-loop-vectorize and
3028 -ftree-slp-vectorize. Nothing more to do here. */
3030 case OPT_fzero_call_used_regs_
:
3031 opts
->x_flag_zero_call_used_regs
3032 = parse_zero_call_used_regs_options (arg
);
3035 case OPT_fshow_column
:
3036 dc
->show_column
= value
;
3039 case OPT_frandom_seed
:
3040 /* The real switch is -fno-random-seed. */
3046 case OPT_frandom_seed_
:
3050 case OPT_fsched_verbose_
:
3051 #ifdef INSN_SCHEDULING
3052 /* Handled with Var in common.opt. */
3058 case OPT_fsched_stalled_insns_
:
3059 opts
->x_flag_sched_stalled_insns
= value
;
3060 if (opts
->x_flag_sched_stalled_insns
== 0)
3061 opts
->x_flag_sched_stalled_insns
= -1;
3064 case OPT_fsched_stalled_insns_dep_
:
3065 opts
->x_flag_sched_stalled_insns_dep
= value
;
3068 case OPT_fstack_check_
:
3069 if (!strcmp (arg
, "no"))
3070 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
3071 else if (!strcmp (arg
, "generic"))
3072 /* This is the old stack checking method. */
3073 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
3074 ? FULL_BUILTIN_STACK_CHECK
3075 : GENERIC_STACK_CHECK
;
3076 else if (!strcmp (arg
, "specific"))
3077 /* This is the new stack checking method. */
3078 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
3079 ? FULL_BUILTIN_STACK_CHECK
3080 : STACK_CHECK_STATIC_BUILTIN
3081 ? STATIC_BUILTIN_STACK_CHECK
3082 : GENERIC_STACK_CHECK
;
3084 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
3087 case OPT_fstack_limit
:
3088 /* The real switch is -fno-stack-limit. */
3094 case OPT_fstack_limit_register_
:
3095 case OPT_fstack_limit_symbol_
:
3099 case OPT_fstack_usage
:
3100 opts
->x_flag_stack_usage
= value
;
3101 opts
->x_flag_stack_usage_info
= value
!= 0;
3105 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
3110 set_debug_level (BTF_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3111 /* set the debug level to level 2, but if already at level 3,
3113 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
3114 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3118 set_debug_level (CTF_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3119 /* CTF generation feeds off DWARF dies. For optimal CTF, switch debug
3120 info level to 2. If off or at level 1, set it to level 2, but if
3121 already at level 3, don't lower it. */
3122 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
3123 && opts
->x_ctf_debug_info_level
> CTFINFO_LEVEL_NONE
)
3124 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3128 if (arg
&& strlen (arg
) != 0)
3130 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
3131 "use %<-gdwarf-%s%> for DWARF version "
3132 "or %<-gdwarf%> %<-g%s%> for debug level", arg
, arg
, arg
);
3136 value
= opts
->x_dwarf_version
;
3140 if (value
< 2 || value
> 5)
3141 error_at (loc
, "dwarf version %wu is not supported", value
);
3143 opts
->x_dwarf_version
= value
;
3144 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
3148 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
3152 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3157 /* Handled completely via specs. */
3160 case OPT_pedantic_errors
:
3161 dc
->pedantic_errors
= 1;
3162 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
3164 handlers
, opts
, opts_set
,
3169 opts
->x_flag_lto
= value
? "" : NULL
;
3173 if (strcmp (arg
, "none") != 0
3174 && strcmp (arg
, "jobserver") != 0
3175 && strcmp (arg
, "auto") != 0
3178 "unrecognized argument to %<-flto=%> option: %qs", arg
);
3182 dc
->dc_inhibit_warnings
= true;
3185 case OPT_fmax_errors_
:
3186 dc
->max_errors
= value
;
3189 case OPT_fuse_ld_bfd
:
3190 case OPT_fuse_ld_gold
:
3191 case OPT_fuse_ld_lld
:
3192 case OPT_fuse_ld_mold
:
3193 case OPT_fuse_linker_plugin
:
3194 /* No-op. Used by the driver and passed to us because it starts with f.*/
3199 opts
->x_flag_trapv
= 0;
3204 opts
->x_flag_wrapv
= 0;
3207 case OPT_fstrict_overflow
:
3208 opts
->x_flag_wrapv
= !value
;
3209 opts
->x_flag_wrapv_pointer
= !value
;
3211 opts
->x_flag_trapv
= 0;
3215 opts
->x_flag_ipa_icf_functions
= value
;
3216 opts
->x_flag_ipa_icf_variables
= value
;
3219 case OPT_falign_loops_
:
3220 check_alignment_argument (loc
, arg
, "loops",
3221 &opts
->x_flag_align_loops
,
3222 &opts
->x_str_align_loops
);
3225 case OPT_falign_jumps_
:
3226 check_alignment_argument (loc
, arg
, "jumps",
3227 &opts
->x_flag_align_jumps
,
3228 &opts
->x_str_align_jumps
);
3231 case OPT_falign_labels_
:
3232 check_alignment_argument (loc
, arg
, "labels",
3233 &opts
->x_flag_align_labels
,
3234 &opts
->x_str_align_labels
);
3237 case OPT_falign_functions_
:
3238 check_alignment_argument (loc
, arg
, "functions",
3239 &opts
->x_flag_align_functions
,
3240 &opts
->x_str_align_functions
);
3244 /* It is documented that we silently ignore silly values. */
3245 if (value
>= 1 && value
<= 100)
3246 dc
->tabstop
= value
;
3249 case OPT_freport_bug
:
3250 dc
->report_bug
= value
;
3253 case OPT_fmultiflags
:
3254 gcc_checking_assert (lang_mask
== CL_DRIVER
);
3258 /* If the flag was handled in a standard way, assume the lack of
3259 processing here is intentional. */
3260 gcc_assert (option_flag_var (scode
, opts
));
3264 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
3269 /* Used to set the level of strict aliasing warnings in OPTS,
3270 when no level is specified (i.e., when -Wstrict-aliasing, and not
3271 -Wstrict-aliasing=level was given).
3272 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
3273 and 0 otherwise. After calling this function, wstrict_aliasing will be
3274 set to the default value of -Wstrict_aliasing=level, currently 3. */
3276 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
3278 gcc_assert (onoff
== 0 || onoff
== 1);
3280 opts
->x_warn_strict_aliasing
= 3;
3282 opts
->x_warn_strict_aliasing
= 0;
3285 /* The following routines are useful in setting all the flags that
3286 -ffast-math and -fno-fast-math imply. */
3288 set_fast_math_flags (struct gcc_options
*opts
, int set
)
3290 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
3292 opts
->x_flag_unsafe_math_optimizations
= set
;
3293 set_unsafe_math_optimizations_flags (opts
, set
);
3295 if (!opts
->frontend_set_flag_finite_math_only
)
3296 opts
->x_flag_finite_math_only
= set
;
3297 if (!opts
->frontend_set_flag_errno_math
)
3298 opts
->x_flag_errno_math
= !set
;
3301 if (opts
->frontend_set_flag_excess_precision
== EXCESS_PRECISION_DEFAULT
)
3302 opts
->x_flag_excess_precision
3303 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
3304 if (!opts
->frontend_set_flag_signaling_nans
)
3305 opts
->x_flag_signaling_nans
= 0;
3306 if (!opts
->frontend_set_flag_rounding_math
)
3307 opts
->x_flag_rounding_math
= 0;
3308 if (!opts
->frontend_set_flag_cx_limited_range
)
3309 opts
->x_flag_cx_limited_range
= 1;
3313 /* When -funsafe-math-optimizations is set the following
3314 flags are set as well. */
3316 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
3318 if (!opts
->frontend_set_flag_trapping_math
)
3319 opts
->x_flag_trapping_math
= !set
;
3320 if (!opts
->frontend_set_flag_signed_zeros
)
3321 opts
->x_flag_signed_zeros
= !set
;
3322 if (!opts
->frontend_set_flag_associative_math
)
3323 opts
->x_flag_associative_math
= set
;
3324 if (!opts
->frontend_set_flag_reciprocal_math
)
3325 opts
->x_flag_reciprocal_math
= set
;
3328 /* Return true iff flags in OPTS are set as if -ffast-math. */
3330 fast_math_flags_set_p (const struct gcc_options
*opts
)
3332 return (!opts
->x_flag_trapping_math
3333 && opts
->x_flag_unsafe_math_optimizations
3334 && opts
->x_flag_finite_math_only
3335 && !opts
->x_flag_signed_zeros
3336 && !opts
->x_flag_errno_math
3337 && opts
->x_flag_excess_precision
== EXCESS_PRECISION_FAST
);
3340 /* Return true iff flags are set as if -ffast-math but using the flags stored
3341 in the struct cl_optimization structure. */
3343 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
3345 return (!opt
->x_flag_trapping_math
3346 && opt
->x_flag_unsafe_math_optimizations
3347 && opt
->x_flag_finite_math_only
3348 && !opt
->x_flag_signed_zeros
3349 && !opt
->x_flag_errno_math
);
3352 /* Handle a debug output -g switch for options OPTS
3353 (OPTS_SET->x_write_symbols storing whether a debug format was passed
3354 explicitly), location LOC. EXTENDED is true or false to support
3355 extended output (2 is special and means "-ggdb" was given). */
3357 set_debug_level (uint32_t dinfo
, int extended
, const char *arg
,
3358 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
3361 if (dinfo
== NO_DEBUG
)
3363 if (opts
->x_write_symbols
== NO_DEBUG
)
3365 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
3369 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
3370 if (opts
->x_write_symbols
& CTF_DEBUG
)
3371 opts
->x_write_symbols
|= DWARF2_DEBUG
;
3373 opts
->x_write_symbols
= DWARF2_DEBUG
;
3377 if (opts
->x_write_symbols
== NO_DEBUG
)
3378 warning_at (loc
, 0, "target system does not support debug output");
3380 else if ((opts
->x_write_symbols
& CTF_DEBUG
)
3381 || (opts
->x_write_symbols
& BTF_DEBUG
))
3383 opts
->x_write_symbols
|= DWARF2_DEBUG
;
3384 opts_set
->x_write_symbols
|= DWARF2_DEBUG
;
3389 /* Make and retain the choice if both CTF and DWARF debug info are to
3391 if (((dinfo
== DWARF2_DEBUG
) || (dinfo
== CTF_DEBUG
))
3392 && ((opts
->x_write_symbols
== (DWARF2_DEBUG
|CTF_DEBUG
))
3393 || (opts
->x_write_symbols
== DWARF2_DEBUG
)
3394 || (opts
->x_write_symbols
== CTF_DEBUG
)))
3396 opts
->x_write_symbols
|= dinfo
;
3397 opts_set
->x_write_symbols
|= dinfo
;
3399 /* However, CTF and BTF are not allowed together at this time. */
3400 else if (((dinfo
== DWARF2_DEBUG
) || (dinfo
== BTF_DEBUG
))
3401 && ((opts
->x_write_symbols
== (DWARF2_DEBUG
|BTF_DEBUG
))
3402 || (opts
->x_write_symbols
== DWARF2_DEBUG
)
3403 || (opts
->x_write_symbols
== BTF_DEBUG
)))
3405 opts
->x_write_symbols
|= dinfo
;
3406 opts_set
->x_write_symbols
|= dinfo
;
3410 /* Does it conflict with an already selected debug format? */
3411 if (opts_set
->x_write_symbols
!= NO_DEBUG
3412 && opts
->x_write_symbols
!= NO_DEBUG
3413 && dinfo
!= opts
->x_write_symbols
)
3415 gcc_assert (debug_set_count (dinfo
) <= 1);
3416 error_at (loc
, "debug format %qs conflicts with prior selection",
3417 debug_type_names
[debug_set_to_format (dinfo
)]);
3419 opts
->x_write_symbols
= dinfo
;
3420 opts_set
->x_write_symbols
= dinfo
;
3424 if (dinfo
!= BTF_DEBUG
)
3426 /* A debug flag without a level defaults to level 2.
3427 If off or at level 1, set it to level 2, but if already
3428 at level 3, don't lower it. */
3431 if (dinfo
== CTF_DEBUG
)
3432 opts
->x_ctf_debug_info_level
= CTFINFO_LEVEL_NORMAL
;
3433 else if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
3434 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3438 int argval
= integral_argument (arg
);
3440 error_at (loc
, "unrecognized debug output level %qs", arg
);
3441 else if (argval
> 3)
3442 error_at (loc
, "debug output level %qs is too high", arg
);
3445 if (dinfo
== CTF_DEBUG
)
3446 opts
->x_ctf_debug_info_level
3447 = (enum ctf_debug_info_levels
) argval
;
3449 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
3453 else if (*arg
!= '\0')
3454 error_at (loc
, "unrecognized btf debug output level %qs", arg
);
3457 /* Arrange to dump core on error for diagnostic context DC. (The
3458 regular error message is still printed first, except in the case of
3462 setup_core_dumping (diagnostic_context
*dc
)
3465 signal (SIGABRT
, SIG_DFL
);
3467 #if defined(HAVE_SETRLIMIT)
3470 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
3471 fatal_error (input_location
, "getting core file size maximum limit: %m");
3472 rlim
.rlim_cur
= rlim
.rlim_max
;
3473 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
3474 fatal_error (input_location
,
3475 "setting core file size limit to maximum: %m");
3478 diagnostic_abort_on_error (dc
);
3481 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
3482 diagnostic context DC. */
3485 decode_d_option (const char *arg
, struct gcc_options
*opts
,
3486 location_t loc
, diagnostic_context
*dc
)
3494 opts
->x_flag_debug_asm
= 1;
3497 opts
->x_flag_print_asm_name
= 1;
3500 opts
->x_flag_dump_rtl_in_asm
= 1;
3501 opts
->x_flag_print_asm_name
= 1;
3504 opts
->x_rtl_dump_and_exit
= 1;
3506 case 'D': /* These are handled by the preprocessor. */
3513 setup_core_dumping (dc
);
3516 opts
->x_flag_dump_all_passed
= true;
3520 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
3525 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3526 mask LANG_MASK, option handlers HANDLERS) as an error for option
3527 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3528 NULL), location LOC. This is used by -Werror=. */
3531 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
3532 const struct cl_option_handlers
*handlers
,
3533 struct gcc_options
*opts
,
3534 struct gcc_options
*opts_set
,
3535 location_t loc
, diagnostic_context
*dc
)
3540 new_option
= XNEWVEC (char, strlen (arg
) + 2);
3541 new_option
[0] = 'W';
3542 strcpy (new_option
+ 1, arg
);
3543 option_index
= find_opt (new_option
, lang_mask
);
3544 if (option_index
== OPT_SPECIAL_unknown
)
3547 const char *hint
= op
.suggest_option (new_option
);
3549 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>;"
3550 " did you mean %<-%s%>?", value
? "" : "no-",
3551 arg
, new_option
, hint
);
3553 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>",
3554 value
? "" : "no-", arg
, new_option
);
3556 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
3557 error_at (loc
, "%<-Werror=%s%>: %<-%s%> is not an option that "
3558 "controls warnings", arg
, new_option
);
3561 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
3562 const char *arg
= NULL
;
3564 if (cl_options
[option_index
].flags
& CL_JOINED
)
3565 arg
= new_option
+ cl_options
[option_index
].opt_len
;
3566 control_warning_option (option_index
, (int) kind
, arg
, value
,
3568 handlers
, opts
, opts_set
, dc
);
3573 /* Return malloced memory for the name of the option OPTION_INDEX
3574 which enabled a diagnostic (context CONTEXT), originally of type
3575 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3579 option_name (diagnostic_context
*context
, int option_index
,
3580 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
3584 /* A warning classified as an error. */
3585 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
3586 && diag_kind
== DK_ERROR
)
3587 return concat (cl_options
[OPT_Werror_
].opt_text
,
3588 /* Skip over "-W". */
3589 cl_options
[option_index
].opt_text
+ 2,
3591 /* A warning with option. */
3593 return xstrdup (cl_options
[option_index
].opt_text
);
3595 /* A warning without option classified as an error. */
3596 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
3597 || diag_kind
== DK_WARNING
)
3598 && context
->warning_as_error_requested
)
3599 return xstrdup (cl_options
[OPT_Werror
].opt_text
);
3604 /* Get the page within the documentation for this option. */
3607 get_option_html_page (int option_index
)
3609 const cl_option
*cl_opt
= &cl_options
[option_index
];
3611 /* Analyzer options are on their own page. */
3612 if (strstr (cl_opt
->opt_text
, "analyzer-"))
3613 return "gcc/Static-Analyzer-Options.html";
3615 /* Handle -flto= option. */
3616 if (strstr (cl_opt
->opt_text
, "flto"))
3617 return "gcc/Optimize-Options.html";
3620 if ((cl_opt
->flags
& CL_Fortran
) != 0
3621 /* If it is option common to both C/C++ and Fortran, it is documented
3622 in gcc/ rather than gfortran/ docs. */
3623 && (cl_opt
->flags
& CL_C
) == 0
3625 && (cl_opt
->flags
& CL_CXX
) == 0
3628 return "gfortran/Error-and-Warning-Options.html";
3631 return "gcc/Warning-Options.html";
3634 /* Return malloced memory for a URL describing the option OPTION_INDEX
3635 which enabled a diagnostic (context CONTEXT). */
3638 get_option_url (diagnostic_context
*, int option_index
)
3641 return concat (/* DOCUMENTATION_ROOT_URL should be supplied via -D by
3642 the Makefile (see --with-documentation-root-url), and
3643 should have a trailing slash. */
3644 DOCUMENTATION_ROOT_URL
,
3646 /* get_option_html_page will return something like
3647 "gcc/Warning-Options.html". */
3648 get_option_html_page (option_index
),
3650 /* Expect an anchor of the form "index-Wfoo" e.g.
3651 <a name="index-Wformat"></a>, and thus an id within
3652 the URL of "#index-Wformat". */
3653 "#index", cl_options
[option_index
].opt_text
,
3659 /* Return a heap allocated producer with command line options. */
3662 gen_command_line_string (cl_decoded_option
*options
,
3663 unsigned int options_count
)
3665 auto_vec
<const char *> switches
;
3666 char *options_string
, *tail
;
3670 for (unsigned i
= 0; i
< options_count
; i
++)
3671 switch (options
[i
].opt_index
)
3676 case OPT_dumpbase_ext
:
3686 case OPT_SPECIAL_unknown
:
3687 case OPT_SPECIAL_ignore
:
3688 case OPT_SPECIAL_warn_removed
:
3689 case OPT_SPECIAL_program_name
:
3690 case OPT_SPECIAL_input_file
:
3691 case OPT_grecord_gcc_switches
:
3692 case OPT_frecord_gcc_switches
:
3693 case OPT__output_pch
:
3694 case OPT_fdiagnostics_show_location_
:
3695 case OPT_fdiagnostics_show_option
:
3696 case OPT_fdiagnostics_show_caret
:
3697 case OPT_fdiagnostics_show_labels
:
3698 case OPT_fdiagnostics_show_line_numbers
:
3699 case OPT_fdiagnostics_color_
:
3700 case OPT_fdiagnostics_format_
:
3701 case OPT_fverbose_asm
:
3705 case OPT_nostdinc__
:
3706 case OPT_fpreprocessed
:
3707 case OPT_fltrans_output_list_
:
3708 case OPT_fresolution_
:
3709 case OPT_fdebug_prefix_map_
:
3710 case OPT_fmacro_prefix_map_
:
3711 case OPT_ffile_prefix_map_
:
3712 case OPT_fprofile_prefix_map_
:
3713 case OPT_fcompare_debug
:
3715 case OPT_fchecking_
:
3720 const char *lto_canonical
= "-flto";
3721 switches
.safe_push (lto_canonical
);
3722 len
+= strlen (lto_canonical
) + 1;
3726 if (cl_options
[options
[i
].opt_index
].flags
3727 & CL_NO_DWARF_RECORD
)
3729 gcc_checking_assert (options
[i
].canonical_option
[0][0] == '-');
3730 switch (options
[i
].canonical_option
[0][1])
3737 if (strncmp (options
[i
].canonical_option
[0] + 2,
3744 switches
.safe_push (options
[i
].orig_option_with_args_text
);
3745 len
+= strlen (options
[i
].orig_option_with_args_text
) + 1;
3749 options_string
= XNEWVEC (char, len
+ 1);
3750 tail
= options_string
;
3753 FOR_EACH_VEC_ELT (switches
, i
, p
)
3756 memcpy (tail
, p
, len
);
3758 if (i
!= switches
.length () - 1)
3766 return options_string
;
3769 /* Return a heap allocated producer string including command line options. */
3772 gen_producer_string (const char *language_string
, cl_decoded_option
*options
,
3773 unsigned int options_count
)
3775 char *cmdline
= gen_command_line_string (options
, options_count
);
3776 char *combined
= concat (language_string
, " ", version_string
, " ",
3784 namespace selftest
{
3786 /* Verify that get_option_html_page works as expected. */
3789 test_get_option_html_page ()
3791 ASSERT_STREQ (get_option_html_page (OPT_Wcpp
), "gcc/Warning-Options.html");
3792 ASSERT_STREQ (get_option_html_page (OPT_Wanalyzer_double_free
),
3793 "gcc/Static-Analyzer-Options.html");
3795 ASSERT_STREQ (get_option_html_page (OPT_Wline_truncation
),
3796 "gfortran/Error-and-Warning-Options.html");
3800 /* Verify EnumSet and EnumBitSet requirements. */
3805 for (unsigned i
= 0; i
< cl_options_count
; ++i
)
3806 if (cl_options
[i
].var_type
== CLVC_ENUM
3807 && cl_options
[i
].var_value
!= CLEV_NORMAL
)
3809 const struct cl_enum
*e
= &cl_enums
[cl_options
[i
].var_enum
];
3810 unsigned HOST_WIDE_INT used_sets
= 0;
3811 unsigned HOST_WIDE_INT mask
= 0;
3812 unsigned highest_set
= 0;
3813 for (unsigned j
= 0; e
->values
[j
].arg
; ++j
)
3815 unsigned set
= e
->values
[j
].flags
>> CL_ENUM_SET_SHIFT
;
3816 if (cl_options
[i
].var_value
== CLEV_BITSET
)
3818 /* For EnumBitSet Set shouldn't be used and Value should
3819 be a power of two. */
3820 ASSERT_TRUE (set
== 0);
3821 ASSERT_TRUE (pow2p_hwi (e
->values
[j
].value
));
3824 /* Test that enumerators referenced in EnumSet have all
3825 Set(n) on them within the valid range. */
3826 ASSERT_TRUE (set
>= 1 && set
<= HOST_BITS_PER_WIDE_INT
);
3827 highest_set
= MAX (set
, highest_set
);
3828 used_sets
|= HOST_WIDE_INT_1U
<< (set
- 1);
3830 if (cl_options
[i
].var_value
== CLEV_BITSET
)
3832 /* If there is just one set, no point to using EnumSet. */
3833 ASSERT_TRUE (highest_set
>= 2);
3834 /* Test that there are no gaps in between the sets. */
3835 if (highest_set
== HOST_BITS_PER_WIDE_INT
)
3836 ASSERT_TRUE (used_sets
== HOST_WIDE_INT_M1U
);
3838 ASSERT_TRUE (used_sets
== (HOST_WIDE_INT_1U
<< highest_set
) - 1);
3839 for (unsigned int j
= 1; j
<= highest_set
; ++j
)
3841 unsigned HOST_WIDE_INT this_mask
= 0;
3842 for (unsigned k
= 0; e
->values
[k
].arg
; ++k
)
3844 unsigned set
= e
->values
[j
].flags
>> CL_ENUM_SET_SHIFT
;
3846 this_mask
|= e
->values
[j
].value
;
3848 ASSERT_TRUE ((mask
& this_mask
) == 0);
3854 /* Run all of the selftests within this file. */
3859 test_get_option_html_page ();
3863 } // namespace selftest
3865 #endif /* #if CHECKING_P */