1 /* Command line option handling.
2 Copyright (C) 2002-2017 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
29 #include "diagnostic.h"
30 #include "opts-diagnostic.h"
31 #include "insn-attr-common.h"
32 #include "common/common-target.h"
33 #include "spellcheck.h"
35 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
37 /* Indexed by enum debug_info_type. */
38 const char *const debug_type_names
[] =
40 "none", "stabs", "coff", "dwarf-2", "xcoff", "vms"
43 /* Parse the -femit-struct-debug-detailed option value
44 and set the flag variables. */
46 #define MATCH( prefix, string ) \
47 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
48 ? ((string += sizeof prefix - 1), 1) : 0)
51 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
54 /* various labels for comparison */
55 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
56 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
57 static const char none_lbl
[] = "none", any_lbl
[] = "any";
58 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
60 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
61 /* Default is to apply to as much as possible. */
62 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
66 if (MATCH (dfn_lbl
, spec
))
67 usage
= DINFO_USAGE_DFN
;
68 else if (MATCH (dir_lbl
, spec
))
69 usage
= DINFO_USAGE_DIR_USE
;
70 else if (MATCH (ind_lbl
, spec
))
71 usage
= DINFO_USAGE_IND_USE
;
73 /* Generics or not? */
74 if (MATCH (ord_lbl
, spec
))
76 else if (MATCH (gen_lbl
, spec
))
79 /* What allowable environment? */
80 if (MATCH (none_lbl
, spec
))
81 files
= DINFO_STRUCT_FILE_NONE
;
82 else if (MATCH (any_lbl
, spec
))
83 files
= DINFO_STRUCT_FILE_ANY
;
84 else if (MATCH (sys_lbl
, spec
))
85 files
= DINFO_STRUCT_FILE_SYS
;
86 else if (MATCH (base_lbl
, spec
))
87 files
= DINFO_STRUCT_FILE_BASE
;
90 "argument %qs to %<-femit-struct-debug-detailed%> "
94 /* Effect the specification. */
95 if (usage
== DINFO_USAGE_NUM_ENUMS
)
99 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
100 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
101 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
105 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
106 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
107 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
113 opts
->x_debug_struct_ordinary
[usage
] = files
;
115 opts
->x_debug_struct_generic
[usage
] = files
;
119 set_struct_debug_option (opts
, loc
, spec
+1);
122 /* No more -femit-struct-debug-detailed specifications.
126 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
128 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
129 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
130 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
131 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
133 "%<-femit-struct-debug-detailed=dir:...%> must allow "
134 "at least as much as "
135 "%<-femit-struct-debug-detailed=ind:...%>");
139 /* Strip off a legitimate source ending from the input string NAME of
140 length LEN. Rather than having to know the names used by all of
141 our front ends, we strip off an ending of a period followed by
142 up to fource characters. (C++ uses ".cpp".) */
145 strip_off_ending (char *name
, int len
)
148 for (i
= 2; i
< 5 && len
> i
; i
++)
150 if (name
[len
- i
] == '.')
152 name
[len
- i
] = '\0';
158 /* Find the base name of a path, stripping off both directories and
159 a single final extension. */
161 base_of_path (const char *path
, const char **base_out
)
163 const char *base
= path
;
165 const char *p
= path
;
169 if (IS_DIR_SEPARATOR (c
))
184 /* What to print when a switch has no documentation. */
185 static const char undocumented_msg
[] = N_("This option lacks documentation.");
186 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
188 typedef char *char_p
; /* For DEF_VEC_P. */
190 static void handle_param (struct gcc_options
*opts
,
191 struct gcc_options
*opts_set
, location_t loc
,
193 static void set_debug_level (enum debug_info_type type
, int extended
,
194 const char *arg
, struct gcc_options
*opts
,
195 struct gcc_options
*opts_set
,
197 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
198 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
199 location_t loc
, diagnostic_context
*dc
);
200 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
202 static void enable_warning_as_error (const char *arg
, int value
,
203 unsigned int lang_mask
,
204 const struct cl_option_handlers
*handlers
,
205 struct gcc_options
*opts
,
206 struct gcc_options
*opts_set
,
208 diagnostic_context
*dc
);
210 /* Handle a back-end option; arguments and return value as for
214 target_handle_option (struct gcc_options
*opts
,
215 struct gcc_options
*opts_set
,
216 const struct cl_decoded_option
*decoded
,
217 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
219 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
220 diagnostic_context
*dc
, void (*) (void))
222 gcc_assert (dc
== global_dc
);
223 gcc_assert (kind
== DK_UNSPECIFIED
);
224 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
227 /* Add comma-separated strings to a char_p vector. */
230 add_comma_separated_to_vector (void **pvec
, const char *arg
)
236 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
238 vec_check_alloc (v
, 1);
240 /* We never free this string. */
253 v
->safe_push (token_start
);
256 if (*r
== '\\' && r
[1] == ',')
264 if (*token_start
!= '\0')
265 v
->safe_push (token_start
);
270 /* Initialize opts_obstack. */
273 init_opts_obstack (void)
275 gcc_obstack_init (&opts_obstack
);
278 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
281 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
283 size_t num_params
= get_num_compiler_params ();
285 /* Ensure that opts_obstack has already been initialized by the time
286 that we initialize any gcc_options instances (PR jit/68446). */
287 gcc_assert (opts_obstack
.chunk_size
> 0);
289 *opts
= global_options_init
;
292 memset (opts_set
, 0, sizeof (*opts_set
));
294 opts
->x_param_values
= XNEWVEC (int, num_params
);
297 opts_set
->x_param_values
= XCNEWVEC (int, num_params
);
299 init_param_values (opts
->x_param_values
);
301 /* Initialize whether `char' is signed. */
302 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
303 /* Set this to a special "uninitialized" value. The actual default
304 is set after target options have been processed. */
305 opts
->x_flag_short_enums
= 2;
307 /* Initialize target_flags before default_options_optimization
308 so the latter can modify it. */
309 opts
->x_target_flags
= targetm_common
.default_target_flags
;
311 /* Some targets have ABI-specified unwind tables. */
312 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
314 /* Some targets have other target-specific initialization. */
315 targetm_common
.option_init_struct (opts
);
318 /* Release any allocations owned by OPTS. */
321 finalize_options_struct (struct gcc_options
*opts
)
323 XDELETEVEC (opts
->x_param_values
);
326 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
327 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
328 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
329 mask LANG_MASK and option handlers HANDLERS. */
332 maybe_default_option (struct gcc_options
*opts
,
333 struct gcc_options
*opts_set
,
334 const struct default_options
*default_opt
,
335 int level
, bool size
, bool fast
, bool debug
,
336 unsigned int lang_mask
,
337 const struct cl_option_handlers
*handlers
,
339 diagnostic_context
*dc
)
341 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
345 gcc_assert (level
== 2);
347 gcc_assert (level
== 3);
349 gcc_assert (level
== 1);
351 switch (default_opt
->levels
)
357 case OPT_LEVELS_0_ONLY
:
358 enabled
= (level
== 0);
361 case OPT_LEVELS_1_PLUS
:
362 enabled
= (level
>= 1);
365 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
366 enabled
= (level
>= 1 && !size
&& !debug
);
369 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
370 enabled
= (level
>= 1 && !debug
);
373 case OPT_LEVELS_2_PLUS
:
374 enabled
= (level
>= 2);
377 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
378 enabled
= (level
>= 2 && !size
&& !debug
);
381 case OPT_LEVELS_3_PLUS
:
382 enabled
= (level
>= 3);
385 case OPT_LEVELS_3_PLUS_AND_SIZE
:
386 enabled
= (level
>= 3 || size
);
389 case OPT_LEVELS_SIZE
:
393 case OPT_LEVELS_FAST
:
397 case OPT_LEVELS_NONE
:
403 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
404 default_opt
->arg
, default_opt
->value
,
405 lang_mask
, DK_UNSPECIFIED
, loc
,
407 else if (default_opt
->arg
== NULL
408 && !option
->cl_reject_negative
)
409 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
410 default_opt
->arg
, !default_opt
->value
,
411 lang_mask
, DK_UNSPECIFIED
, loc
,
415 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
416 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
417 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
418 language mask LANG_MASK and option handlers HANDLERS. */
421 maybe_default_options (struct gcc_options
*opts
,
422 struct gcc_options
*opts_set
,
423 const struct default_options
*default_opts
,
424 int level
, bool size
, bool fast
, bool debug
,
425 unsigned int lang_mask
,
426 const struct cl_option_handlers
*handlers
,
428 diagnostic_context
*dc
)
432 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
433 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
434 level
, size
, fast
, debug
,
435 lang_mask
, handlers
, loc
, dc
);
438 /* Table of options enabled by default at different levels. */
440 static const struct default_options default_options_table
[] =
442 /* -O1 optimizations. */
443 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
445 { OPT_LEVELS_1_PLUS
, OPT_fdelayed_branch
, NULL
, 1 },
447 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
448 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
449 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
450 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
451 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
452 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
453 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
454 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
455 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
456 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
457 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
458 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
459 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
460 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
461 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
462 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
463 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
464 { OPT_LEVELS_1_PLUS
, OPT_ftree_dse
, NULL
, 1 },
465 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
466 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
467 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
468 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
469 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
470 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
471 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
472 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
473 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
474 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
475 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
476 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
477 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
478 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
480 /* -O2 optimizations. */
481 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
482 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
483 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
484 { OPT_LEVELS_2_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
485 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
486 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
487 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
488 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
489 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
490 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
491 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
492 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
493 #ifdef INSN_SCHEDULING
494 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
495 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
496 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
498 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
499 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
500 REORDER_BLOCKS_ALGORITHM_STC
},
501 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
502 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
503 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
504 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
505 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
506 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
507 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
508 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
509 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
510 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
511 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
512 { OPT_LEVELS_2_PLUS
, OPT_falign_loops
, NULL
, 1 },
513 { OPT_LEVELS_2_PLUS
, OPT_falign_jumps
, NULL
, 1 },
514 { OPT_LEVELS_2_PLUS
, OPT_falign_labels
, NULL
, 1 },
515 { OPT_LEVELS_2_PLUS
, OPT_falign_functions
, NULL
, 1 },
516 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
517 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_CHEAP
},
518 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
519 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
520 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
521 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
522 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
523 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
524 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
526 /* -O3 optimizations. */
527 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
528 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
529 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
530 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
531 /* Inlining of functions reducing size is a good idea with -Os
532 regardless of them being declared inline. */
533 { OPT_LEVELS_3_PLUS_AND_SIZE
, OPT_finline_functions
, NULL
, 1 },
534 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
535 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
536 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
537 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
538 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_vectorize
, NULL
, 1 },
539 { OPT_LEVELS_3_PLUS
, OPT_ftree_slp_vectorize
, NULL
, 1 },
540 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
541 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
542 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
543 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
545 /* -Ofast adds optimizations to -O3. */
546 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
548 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
551 /* Default the options in OPTS and OPTS_SET based on the optimization
552 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
554 default_options_optimization (struct gcc_options
*opts
,
555 struct gcc_options
*opts_set
,
556 struct cl_decoded_option
*decoded_options
,
557 unsigned int decoded_options_count
,
559 unsigned int lang_mask
,
560 const struct cl_option_handlers
*handlers
,
561 diagnostic_context
*dc
)
565 bool openacc_mode
= false;
567 /* Scan to see what optimization level has been specified. That will
568 determine the default value of many flags. */
569 for (i
= 1; i
< decoded_options_count
; i
++)
571 struct cl_decoded_option
*opt
= &decoded_options
[i
];
572 switch (opt
->opt_index
)
575 if (*opt
->arg
== '\0')
577 opts
->x_optimize
= 1;
578 opts
->x_optimize_size
= 0;
579 opts
->x_optimize_fast
= 0;
580 opts
->x_optimize_debug
= 0;
584 const int optimize_val
= integral_argument (opt
->arg
);
585 if (optimize_val
== -1)
586 error_at (loc
, "argument to %<-O%> should be a non-negative "
587 "integer, %<g%>, %<s%> or %<fast%>");
590 opts
->x_optimize
= optimize_val
;
591 if ((unsigned int) opts
->x_optimize
> 255)
592 opts
->x_optimize
= 255;
593 opts
->x_optimize_size
= 0;
594 opts
->x_optimize_fast
= 0;
595 opts
->x_optimize_debug
= 0;
601 opts
->x_optimize_size
= 1;
603 /* Optimizing for size forces optimize to be 2. */
604 opts
->x_optimize
= 2;
605 opts
->x_optimize_fast
= 0;
606 opts
->x_optimize_debug
= 0;
610 /* -Ofast only adds flags to -O3. */
611 opts
->x_optimize_size
= 0;
612 opts
->x_optimize
= 3;
613 opts
->x_optimize_fast
= 1;
614 opts
->x_optimize_debug
= 0;
618 /* -Og selects optimization level 1. */
619 opts
->x_optimize_size
= 0;
620 opts
->x_optimize
= 1;
621 opts
->x_optimize_fast
= 0;
622 opts
->x_optimize_debug
= 1;
631 /* Ignore other options in this prescan. */
636 maybe_default_options (opts
, opts_set
, default_options_table
,
637 opts
->x_optimize
, opts
->x_optimize_size
,
638 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
639 lang_mask
, handlers
, loc
, dc
);
641 /* -O2 param settings. */
642 opt2
= (opts
->x_optimize
>= 2);
645 && !opts_set
->x_flag_ipa_pta
)
646 opts
->x_flag_ipa_pta
= true;
648 /* Track fields in field-sensitive alias analysis. */
649 maybe_set_param_value
650 (PARAM_MAX_FIELDS_FOR_FIELD_SENSITIVE
,
651 opt2
? 100 : default_param_value (PARAM_MAX_FIELDS_FOR_FIELD_SENSITIVE
),
652 opts
->x_param_values
, opts_set
->x_param_values
);
654 /* For -O1 only do loop invariant motion for very small loops. */
655 maybe_set_param_value
656 (PARAM_LOOP_INVARIANT_MAX_BBS_IN_LOOP
,
657 opt2
? default_param_value (PARAM_LOOP_INVARIANT_MAX_BBS_IN_LOOP
) : 1000,
658 opts
->x_param_values
, opts_set
->x_param_values
);
660 /* At -Ofast, allow store motion to introduce potential race conditions. */
661 maybe_set_param_value
662 (PARAM_ALLOW_STORE_DATA_RACES
,
663 opts
->x_optimize_fast
? 1
664 : default_param_value (PARAM_ALLOW_STORE_DATA_RACES
),
665 opts
->x_param_values
, opts_set
->x_param_values
);
667 if (opts
->x_optimize_size
)
668 /* We want to crossjump as much as possible. */
669 maybe_set_param_value (PARAM_MIN_CROSSJUMP_INSNS
, 1,
670 opts
->x_param_values
, opts_set
->x_param_values
);
672 maybe_set_param_value (PARAM_MIN_CROSSJUMP_INSNS
,
673 default_param_value (PARAM_MIN_CROSSJUMP_INSNS
),
674 opts
->x_param_values
, opts_set
->x_param_values
);
676 /* Restrict the amount of work combine does at -Og while retaining
677 most of its useful transforms. */
678 if (opts
->x_optimize_debug
)
679 maybe_set_param_value (PARAM_MAX_COMBINE_INSNS
, 2,
680 opts
->x_param_values
, opts_set
->x_param_values
);
682 /* Allow default optimizations to be specified on a per-machine basis. */
683 maybe_default_options (opts
, opts_set
,
684 targetm_common
.option_optimization_table
,
685 opts
->x_optimize
, opts
->x_optimize_size
,
686 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
687 lang_mask
, handlers
, loc
, dc
);
690 /* After all options at LOC have been read into OPTS and OPTS_SET,
691 finalize settings of those options and diagnose incompatible
694 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
697 enum unwind_info_type ui_except
;
699 if (opts
->x_dump_base_name
700 && ! IS_ABSOLUTE_PATH (opts
->x_dump_base_name
)
701 && ! opts
->x_dump_base_name_prefixed
)
703 /* First try to make OPTS->X_DUMP_BASE_NAME relative to the
704 OPTS->X_DUMP_DIR_NAME directory. Then try to make
705 OPTS->X_DUMP_BASE_NAME relative to the OPTS->X_AUX_BASE_NAME
706 directory, typically the directory to contain the object
708 if (opts
->x_dump_dir_name
)
709 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
710 opts
->x_dump_base_name
, NULL
);
711 else if (opts
->x_aux_base_name
712 && strcmp (opts
->x_aux_base_name
, HOST_BIT_BUCKET
) != 0)
714 const char *aux_base
;
716 base_of_path (opts
->x_aux_base_name
, &aux_base
);
717 if (opts
->x_aux_base_name
!= aux_base
)
719 int dir_len
= aux_base
- opts
->x_aux_base_name
;
720 char *new_dump_base_name
721 = XOBNEWVEC (&opts_obstack
, char,
722 strlen (opts
->x_dump_base_name
) + dir_len
+ 1);
724 /* Copy directory component from OPTS->X_AUX_BASE_NAME. */
725 memcpy (new_dump_base_name
, opts
->x_aux_base_name
, dir_len
);
726 /* Append existing OPTS->X_DUMP_BASE_NAME. */
727 strcpy (new_dump_base_name
+ dir_len
, opts
->x_dump_base_name
);
728 opts
->x_dump_base_name
= new_dump_base_name
;
731 opts
->x_dump_base_name_prefixed
= true;
734 /* Handle related options for unit-at-a-time, toplevel-reorder, and
736 if (!opts
->x_flag_unit_at_a_time
)
738 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
739 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
741 opts
->x_flag_section_anchors
= 0;
742 if (opts
->x_flag_toplevel_reorder
== 1)
743 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
745 opts
->x_flag_toplevel_reorder
= 0;
748 /* -fself-test depends on the state of the compiler prior to
749 compiling anything. Ideally it should be run on an empty source
750 file. However, in case we get run with actual source, assume
751 -fsyntax-only which will inhibit any compiler initialization
752 which may confuse the self tests. */
753 if (opts
->x_flag_self_test
)
754 opts
->x_flag_syntax_only
= 1;
756 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
757 sorry ("transactional memory is not supported with non-call exceptions");
759 /* Unless the user has asked for section anchors, we disable toplevel
760 reordering at -O0 to disable transformations that might be surprising
761 to end users and to get -fno-toplevel-reorder tested. */
762 if (!opts
->x_optimize
763 && opts
->x_flag_toplevel_reorder
== 2
764 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
766 opts
->x_flag_toplevel_reorder
= 0;
767 opts
->x_flag_section_anchors
= 0;
769 if (!opts
->x_flag_toplevel_reorder
)
771 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
772 error_at (loc
, "section anchors must be disabled when toplevel reorder"
774 opts
->x_flag_section_anchors
= 0;
777 if (!opts
->x_flag_opts_finished
)
779 /* We initialize opts->x_flag_pie to -1 so that targets can set a
781 if (opts
->x_flag_pie
== -1)
783 /* We initialize opts->x_flag_pic to -1 so that we can tell if
784 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
785 if (opts
->x_flag_pic
== -1)
786 opts
->x_flag_pie
= DEFAULT_FLAG_PIE
;
788 opts
->x_flag_pie
= 0;
790 /* If -fPIE or -fpie is used, turn on PIC. */
791 if (opts
->x_flag_pie
)
792 opts
->x_flag_pic
= opts
->x_flag_pie
;
793 else if (opts
->x_flag_pic
== -1)
794 opts
->x_flag_pic
= 0;
795 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
796 opts
->x_flag_shlib
= 1;
797 opts
->x_flag_opts_finished
= true;
800 /* We initialize opts->x_flag_stack_protect to -1 so that targets
801 can set a default value. */
802 if (opts
->x_flag_stack_protect
== -1)
803 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
805 if (opts
->x_optimize
== 0)
807 /* Inlining does not work if not optimizing,
808 so force it not to be done. */
809 opts
->x_warn_inline
= 0;
810 opts
->x_flag_no_inline
= 1;
813 /* The optimization to partition hot and cold basic blocks into separate
814 sections of the .o and executable files does not work (currently)
815 with exception handling. This is because there is no support for
816 generating unwind info. If opts->x_flag_exceptions is turned on
817 we need to turn off the partitioning optimization. */
819 ui_except
= targetm_common
.except_unwind_info (opts
);
821 if (opts
->x_flag_exceptions
822 && opts
->x_flag_reorder_blocks_and_partition
823 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
825 if (opts_set
->x_flag_reorder_blocks_and_partition
)
827 "%<-freorder-blocks-and-partition%> does not work "
828 "with exceptions on this architecture");
829 opts
->x_flag_reorder_blocks_and_partition
= 0;
830 opts
->x_flag_reorder_blocks
= 1;
833 /* If user requested unwind info, then turn off the partitioning
836 if (opts
->x_flag_unwind_tables
837 && !targetm_common
.unwind_tables_default
838 && opts
->x_flag_reorder_blocks_and_partition
839 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
841 if (opts_set
->x_flag_reorder_blocks_and_partition
)
843 "%<-freorder-blocks-and-partition%> does not support "
844 "unwind info on this architecture");
845 opts
->x_flag_reorder_blocks_and_partition
= 0;
846 opts
->x_flag_reorder_blocks
= 1;
849 /* If the target requested unwind info, then turn off the partitioning
850 optimization with a different message. Likewise, if the target does not
851 support named sections. */
853 if (opts
->x_flag_reorder_blocks_and_partition
854 && (!targetm_common
.have_named_sections
855 || (opts
->x_flag_unwind_tables
856 && targetm_common
.unwind_tables_default
857 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
859 if (opts_set
->x_flag_reorder_blocks_and_partition
)
861 "%<-freorder-blocks-and-partition%> does not work "
862 "on this architecture");
863 opts
->x_flag_reorder_blocks_and_partition
= 0;
864 opts
->x_flag_reorder_blocks
= 1;
868 /* Pipelining of outer loops is only possible when general pipelining
869 capabilities are requested. */
870 if (!opts
->x_flag_sel_sched_pipelining
)
871 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
873 if (opts
->x_flag_conserve_stack
)
875 maybe_set_param_value (PARAM_LARGE_STACK_FRAME
, 100,
876 opts
->x_param_values
, opts_set
->x_param_values
);
877 maybe_set_param_value (PARAM_STACK_FRAME_GROWTH
, 40,
878 opts
->x_param_values
, opts_set
->x_param_values
);
881 if (opts
->x_flag_lto
)
884 opts
->x_flag_generate_lto
= 1;
886 /* When generating IL, do not operate in whole-program mode.
887 Otherwise, symbols will be privatized too early, causing link
889 opts
->x_flag_whole_program
= 0;
891 error_at (loc
, "LTO support has not been enabled in this configuration");
893 if (!opts
->x_flag_fat_lto_objects
895 || (opts_set
->x_flag_use_linker_plugin
896 && !opts
->x_flag_use_linker_plugin
)))
898 if (opts_set
->x_flag_fat_lto_objects
)
899 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
901 opts
->x_flag_fat_lto_objects
= 1;
905 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
906 default value if they choose based on other options. */
907 if (opts
->x_flag_split_stack
== -1)
908 opts
->x_flag_split_stack
= 0;
909 else if (opts
->x_flag_split_stack
)
911 if (!targetm_common
.supports_split_stack (true, opts
))
913 error_at (loc
, "%<-fsplit-stack%> is not supported by "
914 "this compiler configuration");
915 opts
->x_flag_split_stack
= 0;
919 /* If stack splitting is turned on, and the user did not explicitly
920 request function partitioning, turn off partitioning, as it
921 confuses the linker when trying to handle partitioned split-stack
922 code that calls a non-split-stack functions. But if partitioning
923 was turned on explicitly just hope for the best. */
924 if (opts
->x_flag_split_stack
925 && opts
->x_flag_reorder_blocks_and_partition
926 && !opts_set
->x_flag_reorder_blocks_and_partition
)
927 opts
->x_flag_reorder_blocks_and_partition
= 0;
929 if (opts
->x_flag_reorder_blocks_and_partition
930 && !opts_set
->x_flag_reorder_functions
)
931 opts
->x_flag_reorder_functions
= 1;
933 /* Tune vectorization related parametees according to cost model. */
934 if (opts
->x_flag_vect_cost_model
== VECT_COST_MODEL_CHEAP
)
936 maybe_set_param_value (PARAM_VECT_MAX_VERSION_FOR_ALIAS_CHECKS
,
937 6, opts
->x_param_values
, opts_set
->x_param_values
);
938 maybe_set_param_value (PARAM_VECT_MAX_VERSION_FOR_ALIGNMENT_CHECKS
,
939 0, opts
->x_param_values
, opts_set
->x_param_values
);
940 maybe_set_param_value (PARAM_VECT_MAX_PEELING_FOR_ALIGNMENT
,
941 0, opts
->x_param_values
, opts_set
->x_param_values
);
944 /* Set PARAM_MAX_STORES_TO_SINK to 0 if either vectorization or if-conversion
946 if ((!opts
->x_flag_tree_loop_vectorize
&& !opts
->x_flag_tree_slp_vectorize
)
947 || !opts
->x_flag_tree_loop_if_convert
)
948 maybe_set_param_value (PARAM_MAX_STORES_TO_SINK
, 0,
949 opts
->x_param_values
, opts_set
->x_param_values
);
951 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
952 if (opts
->x_dwarf_split_debug_info
)
953 opts
->x_debug_generate_pub_sections
= 2;
955 /* Userspace and kernel ASan conflict with each other. */
956 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
957 && (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
))
959 "%<-fsanitize=address%> is incompatible with "
960 "%<-fsanitize=kernel-address%>");
963 if ((opts
->x_flag_sanitize
& SANITIZE_ADDRESS
)
964 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
966 "%<-fsanitize=address%> and %<-fsanitize=kernel-address%> "
967 "are incompatible with %<-fsanitize=thread%>");
969 if ((opts
->x_flag_sanitize
& SANITIZE_LEAK
)
970 && (opts
->x_flag_sanitize
& SANITIZE_THREAD
))
972 "%<-fsanitize=leak%> is incompatible with %<-fsanitize=thread%>");
974 /* Check error recovery for -fsanitize-recover option. */
975 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
976 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
977 && !sanitizer_opts
[i
].can_recover
)
978 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
979 sanitizer_opts
[i
].name
);
981 /* When instrumenting the pointers, we don't want to remove
982 the null pointer checks. */
983 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
984 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
985 opts
->x_flag_delete_null_pointer_checks
= 0;
987 /* Aggressive compiler optimizations may cause false negatives. */
988 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
989 opts
->x_flag_aggressive_loop_optimizations
= 0;
991 /* Enable -fsanitize-address-use-after-scope if address sanitizer is
993 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
)
994 && !opts_set
->x_flag_sanitize_address_use_after_scope
)
995 opts
->x_flag_sanitize_address_use_after_scope
= true;
997 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
999 if (opts
->x_flag_sanitize_address_use_after_scope
)
1001 if (opts
->x_flag_stack_reuse
!= SR_NONE
1002 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1004 "%<-fsanitize-address-use-after-scope%> requires "
1005 "%<-fstack-reuse=none%> option");
1007 opts
->x_flag_stack_reuse
= SR_NONE
;
1010 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1011 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1013 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1014 sorry ("transactional memory is not supported with "
1015 "%<-fsanitize=kernel-address%>");
1018 #define LEFT_COLUMN 27
1020 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1021 followed by word-wrapped HELP in a second column. */
1023 wrap_help (const char *help
,
1025 unsigned int item_width
,
1026 unsigned int columns
)
1028 unsigned int col_width
= LEFT_COLUMN
;
1029 unsigned int remaining
, room
, len
;
1031 remaining
= strlen (help
);
1035 room
= columns
- 3 - MAX (col_width
, item_width
);
1044 for (i
= 0; help
[i
]; i
++)
1046 if (i
>= room
&& len
!= remaining
)
1050 else if ((help
[i
] == '-' || help
[i
] == '/')
1051 && help
[i
+ 1] != ' '
1052 && i
> 0 && ISALPHA (help
[i
- 1]))
1057 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1059 while (help
[len
] == ' ')
1067 /* Print help for a specific front-end, etc. */
1069 print_filtered_help (unsigned int include_flags
,
1070 unsigned int exclude_flags
,
1071 unsigned int any_flags
,
1072 unsigned int columns
,
1073 struct gcc_options
*opts
,
1074 unsigned int lang_mask
)
1079 bool displayed
= false;
1082 if (include_flags
== CL_PARAMS
)
1084 for (i
= 0; i
< LAST_PARAM
; i
++)
1086 const char *param
= compiler_params
[i
].option
;
1088 help
= compiler_params
[i
].help
;
1089 if (help
== NULL
|| *help
== '\0')
1091 if (exclude_flags
& CL_UNDOCUMENTED
)
1093 help
= undocumented_msg
;
1096 /* Get the translation. */
1099 if (!opts
->x_quiet_flag
)
1101 snprintf (new_help
, sizeof (new_help
),
1102 _("default %d minimum %d maximum %d"),
1103 compiler_params
[i
].default_value
,
1104 compiler_params
[i
].min_value
,
1105 compiler_params
[i
].max_value
);
1108 wrap_help (help
, param
, strlen (param
), columns
);
1114 if (!opts
->x_help_printed
)
1115 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1117 if (!opts
->x_help_enum_printed
)
1118 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1120 for (i
= 0; i
< cl_options_count
; i
++)
1122 const struct cl_option
*option
= cl_options
+ i
;
1127 if (include_flags
== 0
1128 || ((option
->flags
& include_flags
) != include_flags
))
1130 if ((option
->flags
& any_flags
) == 0)
1134 /* Skip unwanted switches. */
1135 if ((option
->flags
& exclude_flags
) != 0)
1138 /* The driver currently prints its own help text. */
1139 if ((option
->flags
& CL_DRIVER
) != 0
1140 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1141 | CL_COMMON
| CL_TARGET
)) == 0)
1145 /* Skip switches that have already been printed. */
1146 if (opts
->x_help_printed
[i
])
1149 opts
->x_help_printed
[i
] = true;
1151 help
= option
->help
;
1154 if (exclude_flags
& CL_UNDOCUMENTED
)
1157 help
= undocumented_msg
;
1160 if (option
->alias_target
< N_OPTS
1161 && cl_options
[option
->alias_target
].help
)
1163 if (help
== undocumented_msg
)
1165 /* For undocumented options that are aliases for other options
1166 that are documented, point the reader to the other option in
1167 preference of the former. */
1168 snprintf (new_help
, sizeof new_help
,
1169 _("Same as %s. Use the latter option instead."),
1170 cl_options
[option
->alias_target
].opt_text
);
1174 /* For documented options with aliases, mention the aliased
1175 option's name for reference. */
1176 snprintf (new_help
, sizeof new_help
,
1177 _("%s Same as %s."),
1178 help
, cl_options
[option
->alias_target
].opt_text
);
1184 if (option
->warn_message
)
1186 /* Mention that the use of the option will trigger a warning. */
1187 if (help
== new_help
)
1188 snprintf (new_help
+ strlen (new_help
),
1189 sizeof new_help
- strlen (new_help
),
1190 " %s", _(use_diagnosed_msg
));
1192 snprintf (new_help
, sizeof new_help
,
1193 "%s %s", help
, _(use_diagnosed_msg
));
1198 /* Get the translation. */
1201 /* Find the gap between the name of the
1202 option and its descriptive text. */
1203 tab
= strchr (help
, '\t');
1212 opt
= option
->opt_text
;
1216 /* With the -Q option enabled we change the descriptive text associated
1217 with an option to be an indication of its current setting. */
1218 if (!opts
->x_quiet_flag
)
1220 void *flag_var
= option_flag_var (i
, opts
);
1222 if (len
< (LEFT_COLUMN
+ 2))
1223 strcpy (new_help
, "\t\t");
1225 strcpy (new_help
, "\t");
1227 if (flag_var
!= NULL
1228 && option
->var_type
!= CLVC_DEFER
)
1230 if (option
->flags
& CL_JOINED
)
1232 if (option
->var_type
== CLVC_STRING
)
1234 if (* (const char **) flag_var
!= NULL
)
1235 snprintf (new_help
+ strlen (new_help
),
1236 sizeof (new_help
) - strlen (new_help
),
1237 "%s", * (const char **) flag_var
);
1239 else if (option
->var_type
== CLVC_ENUM
)
1241 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1243 const char *arg
= NULL
;
1245 value
= e
->get (flag_var
);
1246 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1248 arg
= _("[default]");
1249 snprintf (new_help
+ strlen (new_help
),
1250 sizeof (new_help
) - strlen (new_help
),
1254 sprintf (new_help
+ strlen (new_help
),
1255 "%d", * (int *) flag_var
);
1258 strcat (new_help
, option_enabled (i
, opts
)
1259 ? _("[enabled]") : _("[disabled]"));
1265 if (option
->range_max
!= -1)
1268 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1270 opt
= concat (opt
, b
, NULL
);
1274 wrap_help (help
, opt
, len
, columns
);
1277 if (option
->var_type
== CLVC_ENUM
1278 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1279 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1284 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1287 printf (_(" No options with the desired characteristics were found\n"));
1292 /* PR 31349: Tell the user how to see all of the
1293 options supported by a specific front end. */
1294 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1295 if ((1U << i
) & langs
)
1296 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1297 lang_names
[i
], lang_names
[i
]);
1301 else if (! displayed
)
1302 printf (_(" All options with the desired characteristics have already been displayed\n"));
1306 /* Print details of enumerated option arguments, if those
1307 enumerations have help text headings provided. If no help text
1308 is provided, presume that the possible values are listed in the
1309 help text for the relevant options. */
1310 for (i
= 0; i
< cl_enums_count
; i
++)
1312 unsigned int j
, pos
;
1314 if (opts
->x_help_enum_printed
[i
] != 1)
1316 if (cl_enums
[i
].help
== NULL
)
1318 printf (" %s\n ", _(cl_enums
[i
].help
));
1320 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1322 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1324 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1326 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1336 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1341 opts
->x_help_enum_printed
[i
] = 2;
1345 /* Display help for a specified type of option.
1346 The options must have ALL of the INCLUDE_FLAGS set
1347 ANY of the flags in the ANY_FLAGS set
1348 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1349 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1351 print_specific_help (unsigned int include_flags
,
1352 unsigned int exclude_flags
,
1353 unsigned int any_flags
,
1354 struct gcc_options
*opts
,
1355 unsigned int lang_mask
)
1357 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1358 const char * description
= NULL
;
1359 const char * descrip_extra
= "";
1363 /* Sanity check: Make sure that we do not have more
1364 languages than we have bits available to enumerate them. */
1365 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1367 /* If we have not done so already, obtain
1368 the desired maximum width of the output. */
1369 if (opts
->x_help_columns
== 0)
1371 opts
->x_help_columns
= get_terminal_width ();
1372 if (opts
->x_help_columns
== INT_MAX
)
1373 /* Use a reasonable default. */
1374 opts
->x_help_columns
= 80;
1377 /* Decide upon the title for the options that we are going to display. */
1378 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1380 switch (flag
& include_flags
)
1387 description
= _("The following options are target specific");
1390 description
= _("The following options control compiler warning messages");
1392 case CL_OPTIMIZATION
:
1393 description
= _("The following options control optimizations");
1396 description
= _("The following options are language-independent");
1399 description
= _("The --param option recognizes the following as parameters");
1402 if (i
>= cl_lang_count
)
1404 if (exclude_flags
& all_langs_mask
)
1405 description
= _("The following options are specific to just the language ");
1407 description
= _("The following options are supported by the language ");
1408 descrip_extra
= lang_names
[i
];
1413 if (description
== NULL
)
1417 if (include_flags
& CL_UNDOCUMENTED
)
1418 description
= _("The following options are not documented");
1419 else if (include_flags
& CL_SEPARATE
)
1420 description
= _("The following options take separate arguments");
1421 else if (include_flags
& CL_JOINED
)
1422 description
= _("The following options take joined arguments");
1425 internal_error ("unrecognized include_flags 0x%x passed to print_specific_help",
1432 if (any_flags
& all_langs_mask
)
1433 description
= _("The following options are language-related");
1435 description
= _("The following options are language-independent");
1439 printf ("%s%s:\n", description
, descrip_extra
);
1440 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
1441 opts
->x_help_columns
, opts
, lang_mask
);
1444 /* Enable FDO-related flags. */
1447 enable_fdo_optimizations (struct gcc_options
*opts
,
1448 struct gcc_options
*opts_set
,
1451 if (!opts_set
->x_flag_branch_probabilities
)
1452 opts
->x_flag_branch_probabilities
= value
;
1453 if (!opts_set
->x_flag_profile_values
)
1454 opts
->x_flag_profile_values
= value
;
1455 if (!opts_set
->x_flag_unroll_loops
)
1456 opts
->x_flag_unroll_loops
= value
;
1457 if (!opts_set
->x_flag_peel_loops
)
1458 opts
->x_flag_peel_loops
= value
;
1459 if (!opts_set
->x_flag_tracer
)
1460 opts
->x_flag_tracer
= value
;
1461 if (!opts_set
->x_flag_value_profile_transformations
)
1462 opts
->x_flag_value_profile_transformations
= value
;
1463 if (!opts_set
->x_flag_inline_functions
)
1464 opts
->x_flag_inline_functions
= value
;
1465 if (!opts_set
->x_flag_ipa_cp
)
1466 opts
->x_flag_ipa_cp
= value
;
1467 if (!opts_set
->x_flag_ipa_cp_clone
1468 && value
&& opts
->x_flag_ipa_cp
)
1469 opts
->x_flag_ipa_cp_clone
= value
;
1470 if (!opts_set
->x_flag_ipa_bit_cp
1471 && value
&& opts
->x_flag_ipa_cp
)
1472 opts
->x_flag_ipa_bit_cp
= value
;
1473 if (!opts_set
->x_flag_predictive_commoning
)
1474 opts
->x_flag_predictive_commoning
= value
;
1475 if (!opts_set
->x_flag_split_loops
)
1476 opts
->x_flag_split_loops
= value
;
1477 if (!opts_set
->x_flag_unswitch_loops
)
1478 opts
->x_flag_unswitch_loops
= value
;
1479 if (!opts_set
->x_flag_gcse_after_reload
)
1480 opts
->x_flag_gcse_after_reload
= value
;
1481 if (!opts_set
->x_flag_tree_loop_vectorize
)
1482 opts
->x_flag_tree_loop_vectorize
= value
;
1483 if (!opts_set
->x_flag_tree_slp_vectorize
)
1484 opts
->x_flag_tree_slp_vectorize
= value
;
1485 if (!opts_set
->x_flag_vect_cost_model
)
1486 opts
->x_flag_vect_cost_model
= VECT_COST_MODEL_DYNAMIC
;
1487 if (!opts_set
->x_flag_tree_loop_distribute_patterns
)
1488 opts
->x_flag_tree_loop_distribute_patterns
= value
;
1491 /* -f{,no-}sanitize{,-recover}= suboptions. */
1492 const struct sanitizer_opts_s sanitizer_opts
[] =
1494 #define SANITIZER_OPT(name, flags, recover) \
1495 { #name, flags, sizeof #name - 1, recover }
1496 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true),
1497 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
1499 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false),
1500 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false),
1501 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true),
1502 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true),
1503 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true),
1504 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true),
1505 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true),
1506 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false),
1507 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true),
1508 SANITIZER_OPT (return, SANITIZE_RETURN
, false),
1509 SANITIZER_OPT (null
, SANITIZE_NULL
, true),
1510 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true),
1511 SANITIZER_OPT (bool, SANITIZE_BOOL
, true),
1512 SANITIZER_OPT (enum, SANITIZE_ENUM
, true),
1513 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true),
1514 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true),
1515 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true),
1516 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true),
1517 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true),
1518 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true),
1519 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
1521 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true),
1522 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true),
1523 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true),
1524 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true),
1525 SANITIZER_OPT (all
, ~0U, true),
1526 #undef SANITIZER_OPT
1527 { NULL
, 0U, 0UL, false }
1530 /* -f{,no-}sanitize-coverage= suboptions. */
1531 const struct sanitizer_opts_s coverage_sanitizer_opts
[] =
1533 #define COVERAGE_SANITIZER_OPT(name, flags) \
1534 { #name, flags, sizeof #name - 1, true }
1535 COVERAGE_SANITIZER_OPT (trace
-pc
, SANITIZE_COV_TRACE_PC
),
1536 COVERAGE_SANITIZER_OPT (trace
-cmp
, SANITIZE_COV_TRACE_CMP
),
1537 #undef COVERAGE_SANITIZER_OPT
1538 { NULL
, 0U, 0UL, false }
1541 /* A struct for describing a run of chars within a string. */
1543 struct string_fragment
1545 string_fragment (const char *start
, size_t len
)
1546 : m_start (start
), m_len (len
) {}
1548 const char *m_start
;
1552 /* Specialization of edit_distance_traits for string_fragment,
1553 for use by get_closest_sanitizer_option. */
1556 struct edit_distance_traits
<const string_fragment
&>
1558 static size_t get_length (const string_fragment
&fragment
)
1560 return fragment
.m_len
;
1563 static const char *get_string (const string_fragment
&fragment
)
1565 return fragment
.m_start
;
1569 /* Given ARG, an unrecognized sanitizer option, return the best
1570 matching sanitizer option, or NULL if there isn't one.
1571 OPTS is array of candidate sanitizer options.
1572 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or
1573 OPT_fsanitize_coverage_.
1574 VALUE is non-zero for the regular form of the option, zero
1575 for the "no-" form (e.g. "-fno-sanitize-recover="). */
1578 get_closest_sanitizer_option (const string_fragment
&arg
,
1579 const struct sanitizer_opts_s
*opts
,
1580 enum opt_code code
, int value
)
1582 best_match
<const string_fragment
&, const char*> bm (arg
);
1583 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
1585 /* -fsanitize=all is not valid, so don't offer it. */
1586 if (code
== OPT_fsanitize_
1587 && opts
[i
].flag
== ~0U
1591 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
1592 don't offer the non-recoverable options. */
1593 if (code
== OPT_fsanitize_recover_
1594 && !opts
[i
].can_recover
1598 bm
.consider (opts
[i
].name
);
1600 return bm
.get_best_meaningful_candidate ();
1603 /* Parse comma separated sanitizer suboptions from P for option SCODE,
1604 adjust previous FLAGS and return new ones. If COMPLAIN is false,
1605 don't issue diagnostics. */
1608 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
1609 unsigned int flags
, int value
, bool complain
)
1611 enum opt_code code
= (enum opt_code
) scode
;
1613 const struct sanitizer_opts_s
*opts
;
1614 if (code
== OPT_fsanitize_coverage_
)
1615 opts
= coverage_sanitizer_opts
;
1617 opts
= sanitizer_opts
;
1623 const char *comma
= strchr (p
, ',');
1635 /* Check to see if the string matches an option class name. */
1636 for (i
= 0; opts
[i
].name
!= NULL
; ++i
)
1637 if (len
== opts
[i
].len
&& memcmp (p
, opts
[i
].name
, len
) == 0)
1639 /* Handle both -fsanitize and -fno-sanitize cases. */
1640 if (value
&& opts
[i
].flag
== ~0U)
1642 if (code
== OPT_fsanitize_
)
1645 error_at (loc
, "%<-fsanitize=all%> option is not valid");
1648 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
1649 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
1653 /* Do not enable -fsanitize-recover=unreachable and
1654 -fsanitize-recover=return if -fsanitize-recover=undefined
1656 if (code
== OPT_fsanitize_recover_
1657 && opts
[i
].flag
== SANITIZE_UNDEFINED
)
1658 flags
|= (SANITIZE_UNDEFINED
1659 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
1661 flags
|= opts
[i
].flag
;
1664 flags
&= ~opts
[i
].flag
;
1669 if (! found
&& complain
)
1672 = get_closest_sanitizer_option (string_fragment (p
, len
),
1676 if (code
== OPT_fsanitize_recover_
)
1677 suffix
= "-recover";
1678 else if (code
== OPT_fsanitize_coverage_
)
1679 suffix
= "-coverage";
1685 "unrecognized argument to -f%ssanitize%s= option: %q.*s;"
1686 " did you mean %qs?",
1688 suffix
, (int) len
, p
, hint
);
1691 "unrecognized argument to -f%ssanitize%s= option: %q.*s",
1693 suffix
, (int) len
, p
);
1703 /* Parse string values of no_sanitize attribute passed in VALUE.
1704 Values are separated with comma. */
1707 parse_no_sanitize_attribute (char *value
)
1709 unsigned int flags
= 0;
1711 char *q
= strtok (value
, ",");
1715 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1716 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
1718 flags
|= sanitizer_opts
[i
].flag
;
1719 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
1720 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
1724 if (sanitizer_opts
[i
].name
== NULL
)
1725 warning (OPT_Wattributes
,
1726 "%<%s%> attribute directive ignored", q
);
1728 q
= strtok (NULL
, ",");
1734 /* Handle target- and language-independent options. Return zero to
1735 generate an "unknown option" message. Only options that need
1736 extra handling need to be listed here; if you simply want
1737 DECODED->value assigned to a variable, it happens automatically. */
1740 common_handle_option (struct gcc_options
*opts
,
1741 struct gcc_options
*opts_set
,
1742 const struct cl_decoded_option
*decoded
,
1743 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
1745 const struct cl_option_handlers
*handlers
,
1746 diagnostic_context
*dc
,
1747 void (*target_option_override_hook
) (void))
1749 size_t scode
= decoded
->opt_index
;
1750 const char *arg
= decoded
->arg
;
1751 int value
= decoded
->value
;
1752 enum opt_code code
= (enum opt_code
) scode
;
1754 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
1759 handle_param (opts
, opts_set
, loc
, arg
);
1764 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1765 unsigned int undoc_mask
;
1768 if (lang_mask
== CL_DRIVER
)
1771 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
1774 target_option_override_hook ();
1775 /* First display any single language specific options. */
1776 for (i
= 0; i
< cl_lang_count
; i
++)
1778 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
1780 /* Next display any multi language specific options. */
1781 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
1782 /* Then display any remaining, non-language options. */
1783 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
1785 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
1786 opts
->x_exit_after_options
= true;
1790 case OPT__target_help
:
1791 if (lang_mask
== CL_DRIVER
)
1794 target_option_override_hook ();
1795 print_specific_help (CL_TARGET
, CL_UNDOCUMENTED
, 0, opts
, lang_mask
);
1796 opts
->x_exit_after_options
= true;
1801 const char *a
= arg
;
1802 unsigned int include_flags
= 0;
1803 /* Note - by default we include undocumented options when listing
1804 specific classes. If you only want to see documented options
1805 then add ",^undocumented" to the --help= option. E.g.:
1807 --help=target,^undocumented */
1808 unsigned int exclude_flags
= 0;
1810 if (lang_mask
== CL_DRIVER
)
1813 /* Walk along the argument string, parsing each word in turn.
1815 arg = [^]{word}[,{arg}]
1816 word = {optimizers|target|warnings|undocumented|
1817 params|common|<language>} */
1827 { "optimizers", CL_OPTIMIZATION
},
1828 { "target", CL_TARGET
},
1829 { "warnings", CL_WARNING
},
1830 { "undocumented", CL_UNDOCUMENTED
},
1831 { "params", CL_PARAMS
},
1832 { "joined", CL_JOINED
},
1833 { "separate", CL_SEPARATE
},
1834 { "common", CL_COMMON
},
1837 unsigned int *pflags
;
1839 unsigned int lang_flag
, specific_flag
;
1848 error_at (loc
, "missing argument to %qs", "--help=^");
1851 pflags
= &exclude_flags
;
1854 pflags
= &include_flags
;
1856 comma
= strchr (a
, ',');
1867 /* Check to see if the string matches an option class name. */
1868 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
1869 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
1871 specific_flag
= specifics
[i
].flag
;
1875 /* Check to see if the string matches a language name.
1876 Note - we rely upon the alpha-sorted nature of the entries in
1877 the lang_names array, specifically that shorter names appear
1878 before their longer variants. (i.e. C before C++). That way
1879 when we are attempting to match --help=c for example we will
1880 match with C first and not C++. */
1881 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
1882 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
1884 lang_flag
= 1U << i
;
1888 if (specific_flag
!= 0)
1891 *pflags
|= specific_flag
;
1894 /* The option's argument matches both the start of a
1895 language name and the start of an option class name.
1896 We have a special case for when the user has
1897 specified "--help=c", but otherwise we have to issue
1899 if (strncasecmp (a
, "c", len
) == 0)
1900 *pflags
|= lang_flag
;
1903 "--help argument %q.*s is ambiguous, "
1904 "please be more specific",
1908 else if (lang_flag
!= 0)
1909 *pflags
|= lang_flag
;
1912 "unrecognized argument to --help= option: %q.*s",
1922 target_option_override_hook ();
1923 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
1926 opts
->x_exit_after_options
= true;
1931 if (lang_mask
== CL_DRIVER
)
1934 opts
->x_exit_after_options
= true;
1937 case OPT_fsanitize_
:
1938 opts
->x_flag_sanitize
1939 = parse_sanitizer_options (arg
, loc
, code
,
1940 opts
->x_flag_sanitize
, value
, true);
1942 /* Kernel ASan implies normal ASan but does not yet support
1944 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
1946 maybe_set_param_value (PARAM_ASAN_INSTRUMENTATION_WITH_CALL_THRESHOLD
,
1947 0, opts
->x_param_values
,
1948 opts_set
->x_param_values
);
1949 maybe_set_param_value (PARAM_ASAN_GLOBALS
, 0, opts
->x_param_values
,
1950 opts_set
->x_param_values
);
1951 maybe_set_param_value (PARAM_ASAN_STACK
, 0, opts
->x_param_values
,
1952 opts_set
->x_param_values
);
1953 maybe_set_param_value (PARAM_ASAN_PROTECT_ALLOCAS
, 0,
1954 opts
->x_param_values
,
1955 opts_set
->x_param_values
);
1956 maybe_set_param_value (PARAM_ASAN_USE_AFTER_RETURN
, 0,
1957 opts
->x_param_values
,
1958 opts_set
->x_param_values
);
1962 case OPT_fsanitize_recover_
:
1963 opts
->x_flag_sanitize_recover
1964 = parse_sanitizer_options (arg
, loc
, code
,
1965 opts
->x_flag_sanitize_recover
, value
, true);
1968 case OPT_fasan_shadow_offset_
:
1972 case OPT_fsanitize_address_use_after_scope
:
1973 opts
->x_flag_sanitize_address_use_after_scope
= value
;
1976 case OPT_fsanitize_recover
:
1978 opts
->x_flag_sanitize_recover
1979 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
1980 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
1982 opts
->x_flag_sanitize_recover
1983 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
1986 case OPT_fsanitize_coverage_
:
1987 opts
->x_flag_sanitize_coverage
1988 = parse_sanitizer_options (arg
, loc
, code
,
1989 opts
->x_flag_sanitize_coverage
, value
, true);
1996 /* Currently handled in a prescan. */
2000 dc
->warning_as_error_requested
= value
;
2004 if (lang_mask
== CL_DRIVER
)
2007 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2008 opts
, opts_set
, loc
, dc
);
2011 case OPT_Wlarger_than_
:
2012 opts
->x_larger_than_size
= value
;
2013 opts
->x_warn_larger_than
= value
!= -1;
2016 case OPT_Wfatal_errors
:
2017 dc
->fatal_errors
= value
;
2020 case OPT_Wframe_larger_than_
:
2021 opts
->x_frame_larger_than_size
= value
;
2022 opts
->x_warn_frame_larger_than
= value
!= -1;
2025 case OPT_Wstack_usage_
:
2026 opts
->x_warn_stack_usage
= value
;
2027 opts
->x_flag_stack_usage_info
= value
!= -1;
2030 case OPT_Wstrict_aliasing
:
2031 set_Wstrict_aliasing (opts
, value
);
2034 case OPT_Wstrict_overflow
:
2035 opts
->x_warn_strict_overflow
= (value
2036 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2040 case OPT_Wsystem_headers
:
2041 dc
->dc_warn_system_headers
= value
;
2045 opts
->x_flag_gen_aux_info
= 1;
2048 case OPT_auxbase_strip
:
2050 char *tmp
= xstrdup (arg
);
2051 strip_off_ending (tmp
, strlen (tmp
));
2053 opts
->x_aux_base_name
= tmp
;
2060 decode_d_option (arg
, opts
, loc
, dc
);
2063 case OPT_fcall_used_
:
2064 case OPT_fcall_saved_
:
2072 case OPT_fdbg_cnt_list
:
2074 opts
->x_exit_after_options
= true;
2077 case OPT_fdebug_prefix_map_
:
2081 case OPT_fdiagnostics_show_location_
:
2082 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2085 case OPT_fdiagnostics_show_caret
:
2086 dc
->show_caret
= value
;
2089 case OPT_fdiagnostics_color_
:
2090 diagnostic_color_init (dc
, value
);
2093 case OPT_fdiagnostics_parseable_fixits
:
2094 dc
->parseable_fixits_p
= value
;
2097 case OPT_fdiagnostics_show_option
:
2098 dc
->show_option_requested
= value
;
2105 case OPT_ffast_math
:
2106 set_fast_math_flags (opts
, value
);
2109 case OPT_funsafe_math_optimizations
:
2110 set_unsafe_math_optimizations_flags (opts
, value
);
2117 case OPT_finline_limit_
:
2118 set_param_value ("max-inline-insns-single", value
/ 2,
2119 opts
->x_param_values
, opts_set
->x_param_values
);
2120 set_param_value ("max-inline-insns-auto", value
/ 2,
2121 opts
->x_param_values
, opts_set
->x_param_values
);
2124 case OPT_finstrument_functions_exclude_function_list_
:
2125 add_comma_separated_to_vector
2126 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
2129 case OPT_finstrument_functions_exclude_file_list_
:
2130 add_comma_separated_to_vector
2131 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
2134 case OPT_fmessage_length_
:
2135 pp_set_line_maximum_length (dc
->printer
, value
);
2136 diagnostic_set_caret_max_width (dc
, value
);
2140 case OPT_fopt_info_
:
2146 const char *p
= arg
;
2147 opts
->x_flag_disable_hsa
= true;
2150 const char *comma
= strchr (p
, ',');
2152 if ((strncmp (p
, "disable", 7) == 0)
2153 && (p
[7] == ',' || p
[7] == '\0'))
2155 opts
->x_flag_disable_hsa
= true;
2159 if ((strncmp (p
, "hsa", 3) == 0)
2160 && (p
[3] == ',' || p
[3] == '\0'))
2163 opts
->x_flag_disable_hsa
= false;
2165 sorry ("HSA has not been enabled during configuration");
2175 #ifndef ACCEL_COMPILER
2176 case OPT_foffload_abi_
:
2177 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
2178 "offload compiler");
2182 case OPT_fpack_struct_
:
2183 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
2185 "structure alignment must be a small power of two, not %d",
2188 opts
->x_initial_max_fld_align
= value
;
2192 case OPT_fplugin_arg_
:
2196 case OPT_fprofile_use_
:
2197 opts
->x_profile_data_prefix
= xstrdup (arg
);
2198 opts
->x_flag_profile_use
= true;
2200 /* No break here - do -fprofile-use processing. */
2202 case OPT_fprofile_use
:
2203 enable_fdo_optimizations (opts
, opts_set
, value
);
2204 if (!opts_set
->x_flag_profile_reorder_functions
)
2205 opts
->x_flag_profile_reorder_functions
= value
;
2206 /* Indirect call profiling should do all useful transformations
2207 speculative devirtualization does. */
2208 if (!opts_set
->x_flag_devirtualize_speculatively
2209 && opts
->x_flag_value_profile_transformations
)
2210 opts
->x_flag_devirtualize_speculatively
= false;
2213 case OPT_fauto_profile_
:
2214 opts
->x_auto_profile_file
= xstrdup (arg
);
2215 opts
->x_flag_auto_profile
= true;
2217 /* No break here - do -fauto-profile processing. */
2219 case OPT_fauto_profile
:
2220 enable_fdo_optimizations (opts
, opts_set
, value
);
2221 if (!opts_set
->x_flag_profile_correction
)
2222 opts
->x_flag_profile_correction
= value
;
2223 maybe_set_param_value (
2224 PARAM_EARLY_INLINER_MAX_ITERATIONS
, 10,
2225 opts
->x_param_values
, opts_set
->x_param_values
);
2228 case OPT_fprofile_generate_
:
2229 opts
->x_profile_data_prefix
= xstrdup (arg
);
2231 /* No break here - do -fprofile-generate processing. */
2233 case OPT_fprofile_generate
:
2234 if (!opts_set
->x_profile_arc_flag
)
2235 opts
->x_profile_arc_flag
= value
;
2236 if (!opts_set
->x_flag_profile_values
)
2237 opts
->x_flag_profile_values
= value
;
2238 if (!opts_set
->x_flag_inline_functions
)
2239 opts
->x_flag_inline_functions
= value
;
2240 if (!opts_set
->x_flag_ipa_bit_cp
)
2241 opts
->x_flag_ipa_bit_cp
= value
;
2242 /* FIXME: Instrumentation we insert makes ipa-reference bitmaps
2243 quadratic. Disable the pass until better memory representation
2245 if (!opts_set
->x_flag_ipa_reference
)
2246 opts
->x_flag_ipa_reference
= false;
2249 case OPT_fpatchable_function_entry_
:
2251 char *patch_area_arg
= xstrdup (arg
);
2252 char *comma
= strchr (patch_area_arg
, ',');
2256 function_entry_patch_area_size
=
2257 integral_argument (patch_area_arg
);
2258 function_entry_patch_area_start
=
2259 integral_argument (comma
+ 1);
2263 function_entry_patch_area_size
=
2264 integral_argument (patch_area_arg
);
2265 function_entry_patch_area_start
= 0;
2267 if (function_entry_patch_area_size
< 0
2268 || function_entry_patch_area_start
< 0
2269 || function_entry_patch_area_size
2270 < function_entry_patch_area_start
)
2271 error ("invalid arguments for %<-fpatchable_function_entry%>");
2272 free (patch_area_arg
);
2276 case OPT_ftree_vectorize
:
2277 /* Automatically sets -ftree-loop-vectorize and
2278 -ftree-slp-vectorize. Nothing more to do here. */
2280 case OPT_fshow_column
:
2281 dc
->show_column
= value
;
2284 case OPT_frandom_seed
:
2285 /* The real switch is -fno-random-seed. */
2291 case OPT_frandom_seed_
:
2295 case OPT_fsched_verbose_
:
2296 #ifdef INSN_SCHEDULING
2297 /* Handled with Var in common.opt. */
2303 case OPT_fsched_stalled_insns_
:
2304 opts
->x_flag_sched_stalled_insns
= value
;
2305 if (opts
->x_flag_sched_stalled_insns
== 0)
2306 opts
->x_flag_sched_stalled_insns
= -1;
2309 case OPT_fsched_stalled_insns_dep_
:
2310 opts
->x_flag_sched_stalled_insns_dep
= value
;
2313 case OPT_fstack_check_
:
2314 if (!strcmp (arg
, "no"))
2315 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
2316 else if (!strcmp (arg
, "generic"))
2317 /* This is the old stack checking method. */
2318 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2319 ? FULL_BUILTIN_STACK_CHECK
2320 : GENERIC_STACK_CHECK
;
2321 else if (!strcmp (arg
, "specific"))
2322 /* This is the new stack checking method. */
2323 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
2324 ? FULL_BUILTIN_STACK_CHECK
2325 : STACK_CHECK_STATIC_BUILTIN
2326 ? STATIC_BUILTIN_STACK_CHECK
2327 : GENERIC_STACK_CHECK
;
2329 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
2332 case OPT_fstack_limit
:
2333 /* The real switch is -fno-stack-limit. */
2339 case OPT_fstack_limit_register_
:
2340 case OPT_fstack_limit_symbol_
:
2344 case OPT_fstack_usage
:
2345 opts
->x_flag_stack_usage
= value
;
2346 opts
->x_flag_stack_usage_info
= value
!= 0;
2350 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
2355 set_debug_level (SDB_DEBUG
, false, arg
, opts
, opts_set
, loc
);
2359 if (arg
&& strlen (arg
) != 0)
2361 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
2362 "use %<-gdwarf-%s%> for DWARF version "
2363 "or %<-gdwarf -g%s%> for debug level", arg
, arg
, arg
);
2367 value
= opts
->x_dwarf_version
;
2371 if (value
< 2 || value
> 5)
2372 error_at (loc
, "dwarf version %d is not supported", value
);
2374 opts
->x_dwarf_version
= value
;
2375 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
2378 case OPT_gsplit_dwarf
:
2379 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, "", opts
, opts_set
,
2384 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
2389 set_debug_level (DBX_DEBUG
, code
== OPT_gstabs_
, arg
, opts
, opts_set
,
2394 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
2399 set_debug_level (XCOFF_DEBUG
, code
== OPT_gxcoff_
, arg
, opts
, opts_set
,
2405 /* Handled completely via specs. */
2408 case OPT_pedantic_errors
:
2409 dc
->pedantic_errors
= 1;
2410 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
2412 handlers
, opts
, opts_set
,
2417 opts
->x_flag_lto
= value
? "" : NULL
;
2421 dc
->dc_inhibit_warnings
= true;
2424 case OPT_fmax_errors_
:
2425 dc
->max_errors
= value
;
2428 case OPT_fuse_ld_bfd
:
2429 case OPT_fuse_ld_gold
:
2430 case OPT_fuse_linker_plugin
:
2431 /* No-op. Used by the driver and passed to us because it starts with f.*/
2436 opts
->x_flag_trapv
= 0;
2441 opts
->x_flag_wrapv
= 0;
2445 opts
->x_flag_ipa_icf_functions
= value
;
2446 opts
->x_flag_ipa_icf_variables
= value
;
2450 /* If the flag was handled in a standard way, assume the lack of
2451 processing here is intentional. */
2452 gcc_assert (option_flag_var (scode
, opts
));
2456 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
2461 /* Handle --param NAME=VALUE. */
2463 handle_param (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
2464 location_t loc
, const char *carg
)
2469 arg
= xstrdup (carg
);
2470 equal
= strchr (arg
, '=');
2472 error_at (loc
, "%s: --param arguments should be of the form NAME=VALUE",
2478 enum compiler_param index
;
2479 if (!find_param (arg
, &index
))
2481 const char *suggestion
= find_param_fuzzy (arg
);
2483 error_at (loc
, "invalid --param name %qs; did you mean %qs?",
2486 error_at (loc
, "invalid --param name %qs", arg
);
2490 if (!param_string_value_p (index
, equal
+ 1, &value
))
2491 value
= integral_argument (equal
+ 1);
2494 error_at (loc
, "invalid --param value %qs", equal
+ 1);
2496 set_param_value (arg
, value
,
2497 opts
->x_param_values
, opts_set
->x_param_values
);
2504 /* Used to set the level of strict aliasing warnings in OPTS,
2505 when no level is specified (i.e., when -Wstrict-aliasing, and not
2506 -Wstrict-aliasing=level was given).
2507 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
2508 and 0 otherwise. After calling this function, wstrict_aliasing will be
2509 set to the default value of -Wstrict_aliasing=level, currently 3. */
2511 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
2513 gcc_assert (onoff
== 0 || onoff
== 1);
2515 opts
->x_warn_strict_aliasing
= 3;
2517 opts
->x_warn_strict_aliasing
= 0;
2520 /* The following routines are useful in setting all the flags that
2521 -ffast-math and -fno-fast-math imply. */
2523 set_fast_math_flags (struct gcc_options
*opts
, int set
)
2525 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
2527 opts
->x_flag_unsafe_math_optimizations
= set
;
2528 set_unsafe_math_optimizations_flags (opts
, set
);
2530 if (!opts
->frontend_set_flag_finite_math_only
)
2531 opts
->x_flag_finite_math_only
= set
;
2532 if (!opts
->frontend_set_flag_errno_math
)
2533 opts
->x_flag_errno_math
= !set
;
2536 if (opts
->frontend_set_flag_excess_precision_cmdline
2537 == EXCESS_PRECISION_DEFAULT
)
2538 opts
->x_flag_excess_precision_cmdline
2539 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
2540 if (!opts
->frontend_set_flag_signaling_nans
)
2541 opts
->x_flag_signaling_nans
= 0;
2542 if (!opts
->frontend_set_flag_rounding_math
)
2543 opts
->x_flag_rounding_math
= 0;
2544 if (!opts
->frontend_set_flag_cx_limited_range
)
2545 opts
->x_flag_cx_limited_range
= 1;
2549 /* When -funsafe-math-optimizations is set the following
2550 flags are set as well. */
2552 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
2554 if (!opts
->frontend_set_flag_trapping_math
)
2555 opts
->x_flag_trapping_math
= !set
;
2556 if (!opts
->frontend_set_flag_signed_zeros
)
2557 opts
->x_flag_signed_zeros
= !set
;
2558 if (!opts
->frontend_set_flag_associative_math
)
2559 opts
->x_flag_associative_math
= set
;
2560 if (!opts
->frontend_set_flag_reciprocal_math
)
2561 opts
->x_flag_reciprocal_math
= set
;
2564 /* Return true iff flags in OPTS are set as if -ffast-math. */
2566 fast_math_flags_set_p (const struct gcc_options
*opts
)
2568 return (!opts
->x_flag_trapping_math
2569 && opts
->x_flag_unsafe_math_optimizations
2570 && opts
->x_flag_finite_math_only
2571 && !opts
->x_flag_signed_zeros
2572 && !opts
->x_flag_errno_math
2573 && opts
->x_flag_excess_precision_cmdline
2574 == EXCESS_PRECISION_FAST
);
2577 /* Return true iff flags are set as if -ffast-math but using the flags stored
2578 in the struct cl_optimization structure. */
2580 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
2582 return (!opt
->x_flag_trapping_math
2583 && opt
->x_flag_unsafe_math_optimizations
2584 && opt
->x_flag_finite_math_only
2585 && !opt
->x_flag_signed_zeros
2586 && !opt
->x_flag_errno_math
);
2589 /* Handle a debug output -g switch for options OPTS
2590 (OPTS_SET->x_write_symbols storing whether a debug type was passed
2591 explicitly), location LOC. EXTENDED is true or false to support
2592 extended output (2 is special and means "-ggdb" was given). */
2594 set_debug_level (enum debug_info_type type
, int extended
, const char *arg
,
2595 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
2598 opts
->x_use_gnu_debug_info_extensions
= extended
;
2600 if (type
== NO_DEBUG
)
2602 if (opts
->x_write_symbols
== NO_DEBUG
)
2604 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
2608 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
2609 opts
->x_write_symbols
= DWARF2_DEBUG
;
2610 #elif defined DBX_DEBUGGING_INFO
2611 opts
->x_write_symbols
= DBX_DEBUG
;
2615 if (opts
->x_write_symbols
== NO_DEBUG
)
2616 warning_at (loc
, 0, "target system does not support debug output");
2621 /* Does it conflict with an already selected type? */
2622 if (opts_set
->x_write_symbols
!= NO_DEBUG
2623 && opts
->x_write_symbols
!= NO_DEBUG
2624 && type
!= opts
->x_write_symbols
)
2625 error_at (loc
, "debug format %qs conflicts with prior selection",
2626 debug_type_names
[type
]);
2627 opts
->x_write_symbols
= type
;
2628 opts_set
->x_write_symbols
= type
;
2631 /* A debug flag without a level defaults to level 2.
2632 If off or at level 1, set it to level 2, but if already
2633 at level 3, don't lower it. */
2636 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
2637 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
2641 int argval
= integral_argument (arg
);
2643 error_at (loc
, "unrecognized debug output level %qs", arg
);
2644 else if (argval
> 3)
2645 error_at (loc
, "debug output level %qs is too high", arg
);
2647 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
2651 /* Arrange to dump core on error for diagnostic context DC. (The
2652 regular error message is still printed first, except in the case of
2656 setup_core_dumping (diagnostic_context
*dc
)
2659 signal (SIGABRT
, SIG_DFL
);
2661 #if defined(HAVE_SETRLIMIT)
2664 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
2665 fatal_error (input_location
, "getting core file size maximum limit: %m");
2666 rlim
.rlim_cur
= rlim
.rlim_max
;
2667 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
2668 fatal_error (input_location
,
2669 "setting core file size limit to maximum: %m");
2672 diagnostic_abort_on_error (dc
);
2675 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
2676 diagnostic context DC. */
2679 decode_d_option (const char *arg
, struct gcc_options
*opts
,
2680 location_t loc
, diagnostic_context
*dc
)
2688 opts
->x_flag_debug_asm
= 1;
2691 opts
->x_flag_print_asm_name
= 1;
2694 opts
->x_flag_dump_rtl_in_asm
= 1;
2695 opts
->x_flag_print_asm_name
= 1;
2698 opts
->x_rtl_dump_and_exit
= 1;
2700 case 'D': /* These are handled by the preprocessor. */
2707 setup_core_dumping (dc
);
2710 opts
->x_flag_dump_all_passed
= true;
2714 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
2719 /* Enable (or disable if VALUE is 0) a warning option ARG (language
2720 mask LANG_MASK, option handlers HANDLERS) as an error for option
2721 structures OPTS and OPTS_SET, diagnostic context DC (possibly
2722 NULL), location LOC. This is used by -Werror=. */
2725 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
2726 const struct cl_option_handlers
*handlers
,
2727 struct gcc_options
*opts
,
2728 struct gcc_options
*opts_set
,
2729 location_t loc
, diagnostic_context
*dc
)
2734 new_option
= XNEWVEC (char, strlen (arg
) + 2);
2735 new_option
[0] = 'W';
2736 strcpy (new_option
+ 1, arg
);
2737 option_index
= find_opt (new_option
, lang_mask
);
2738 if (option_index
== OPT_SPECIAL_unknown
)
2739 error_at (loc
, "-Werror=%s: no option -%s", arg
, new_option
);
2740 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
2741 error_at (loc
, "-Werror=%s: -%s is not an option that controls warnings",
2745 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
2746 const char *arg
= NULL
;
2748 if (cl_options
[option_index
].flags
& CL_JOINED
)
2749 arg
= new_option
+ cl_options
[option_index
].opt_len
;
2750 control_warning_option (option_index
, (int) kind
, arg
, value
,
2752 handlers
, opts
, opts_set
, dc
);
2757 /* Return malloced memory for the name of the option OPTION_INDEX
2758 which enabled a diagnostic (context CONTEXT), originally of type
2759 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
2763 option_name (diagnostic_context
*context
, int option_index
,
2764 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
2768 /* A warning classified as an error. */
2769 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
2770 && diag_kind
== DK_ERROR
)
2771 return concat (cl_options
[OPT_Werror_
].opt_text
,
2772 /* Skip over "-W". */
2773 cl_options
[option_index
].opt_text
+ 2,
2775 /* A warning with option. */
2777 return xstrdup (cl_options
[option_index
].opt_text
);
2779 /* A warning without option classified as an error. */
2780 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
2781 || diag_kind
== DK_WARNING
)
2782 && context
->warning_as_error_requested
)
2783 return xstrdup (cl_options
[OPT_Werror
].opt_text
);