1 /* Command line option handling.
2 Copyright (C) 2002-2024 Free Software Foundation, Inc.
3 Contributed by Neil Booth.
5 This file is part of GCC.
7 GCC is free software; you can redistribute it and/or modify it under
8 the terms of the GNU General Public License as published by the Free
9 Software Foundation; either version 3, or (at your option) any later
12 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13 WARRANTY; without even the implied warranty of MERCHANTABILITY or
14 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 You should have received a copy of the GNU General Public License
18 along with GCC; see the file COPYING3. If not see
19 <http://www.gnu.org/licenses/>. */
24 #include "coretypes.h"
28 #include "diagnostic.h"
29 #include "opts-diagnostic.h"
30 #include "insn-attr-common.h"
31 #include "common/common-target.h"
32 #include "spellcheck.h"
33 #include "opt-suggestions.h"
34 #include "diagnostic-color.h"
37 #include "file-prefix-map.h"
39 /* In this file all option sets are explicit. */
42 /* Set by -fcanon-prefix-map. */
43 bool flag_canon_prefix_map
;
45 /* Set by finish_options when flag_stack_protector was set only because of
47 bool flag_stack_protector_set_by_fhardened_p
;
49 static void set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
);
51 /* Names of fundamental debug info formats indexed by enum
54 const char *const debug_type_names
[] =
56 "none", "dwarf-2", "vms", "ctf", "btf"
59 /* Bitmasks of fundamental debug info formats indexed by enum
62 static uint32_t debug_type_masks
[] =
64 NO_DEBUG
, DWARF2_DEBUG
, VMS_DEBUG
,
68 /* Names of the set of debug formats requested by user. Updated and accessed
69 via debug_set_names. */
71 static char df_set_names
[sizeof "none dwarf-2 vms ctf btf"];
73 /* Get enum debug_info_type of the specified debug format, for error messages.
74 Can be used only for individual debug format types. */
77 debug_set_to_format (uint32_t debug_info_set
)
80 enum debug_info_type dinfo_type
= DINFO_TYPE_NONE
;
81 /* Find first set bit. */
83 idx
= exact_log2 (debug_info_set
& - debug_info_set
);
84 /* Check that only one bit is set, if at all. This function is meant to be
85 used only for vanilla debug_info_set bitmask values, i.e. for individual
86 debug format types upto DINFO_TYPE_MAX. */
87 gcc_assert ((debug_info_set
& (debug_info_set
- 1)) == 0);
88 dinfo_type
= (enum debug_info_type
)idx
;
89 gcc_assert (dinfo_type
<= DINFO_TYPE_MAX
);
93 /* Get the number of debug formats enabled for output. */
96 debug_set_count (uint32_t w_symbols
)
98 unsigned int count
= 0;
102 w_symbols
&= ~ (w_symbols
& - w_symbols
);
107 /* Get the names of the debug formats enabled for output. */
110 debug_set_names (uint32_t w_symbols
)
112 uint32_t df_mask
= 0;
113 /* Reset the string to be returned. */
114 memset (df_set_names
, 0, sizeof (df_set_names
));
115 /* Get the popcount. */
116 int num_set_df
= debug_set_count (w_symbols
);
117 /* Iterate over the debug formats. Add name string for those enabled. */
118 for (int i
= DINFO_TYPE_NONE
; i
<= DINFO_TYPE_MAX
; i
++)
120 df_mask
= debug_type_masks
[i
];
121 if (w_symbols
& df_mask
)
123 strcat (df_set_names
, debug_type_names
[i
]);
126 strcat (df_set_names
, " ");
132 /* No debug formats enabled. */
133 gcc_assert (i
== DINFO_TYPE_NONE
);
134 strcat (df_set_names
, debug_type_names
[i
]);
141 /* Return TRUE iff BTF debug info is enabled. */
146 return (write_symbols
& BTF_DEBUG
);
149 /* Return TRUE iff BTF with CO-RE debug info is enabled. */
152 btf_with_core_debuginfo_p ()
154 return (write_symbols
& BTF_WITH_CORE_DEBUG
);
157 /* Return TRUE iff CTF debug info is enabled. */
162 return (write_symbols
& CTF_DEBUG
);
165 /* Return TRUE iff dwarf2 debug info is enabled. */
168 dwarf_debuginfo_p (struct gcc_options
*opts
)
170 return (opts
->x_write_symbols
& DWARF2_DEBUG
);
173 /* Return true iff the debug info format is to be generated based on DWARF
174 DIEs (like CTF and BTF debug info formats). */
176 bool dwarf_based_debuginfo_p ()
178 return ((write_symbols
& CTF_DEBUG
)
179 || (write_symbols
& BTF_DEBUG
));
182 /* All flag uses below need to explicitely reference the option sets
184 #define global_options DO_NOT_USE
185 #define global_options_set DO_NOT_USE
187 /* Parse the -femit-struct-debug-detailed option value
188 and set the flag variables. */
190 #define MATCH( prefix, string ) \
191 ((strncmp (prefix, string, sizeof prefix - 1) == 0) \
192 ? ((string += sizeof prefix - 1), 1) : 0)
195 set_struct_debug_option (struct gcc_options
*opts
, location_t loc
,
198 /* various labels for comparison */
199 static const char dfn_lbl
[] = "dfn:", dir_lbl
[] = "dir:", ind_lbl
[] = "ind:";
200 static const char ord_lbl
[] = "ord:", gen_lbl
[] = "gen:";
201 static const char none_lbl
[] = "none", any_lbl
[] = "any";
202 static const char base_lbl
[] = "base", sys_lbl
[] = "sys";
204 enum debug_struct_file files
= DINFO_STRUCT_FILE_ANY
;
205 /* Default is to apply to as much as possible. */
206 enum debug_info_usage usage
= DINFO_USAGE_NUM_ENUMS
;
207 int ord
= 1, gen
= 1;
210 if (MATCH (dfn_lbl
, spec
))
211 usage
= DINFO_USAGE_DFN
;
212 else if (MATCH (dir_lbl
, spec
))
213 usage
= DINFO_USAGE_DIR_USE
;
214 else if (MATCH (ind_lbl
, spec
))
215 usage
= DINFO_USAGE_IND_USE
;
217 /* Generics or not? */
218 if (MATCH (ord_lbl
, spec
))
220 else if (MATCH (gen_lbl
, spec
))
223 /* What allowable environment? */
224 if (MATCH (none_lbl
, spec
))
225 files
= DINFO_STRUCT_FILE_NONE
;
226 else if (MATCH (any_lbl
, spec
))
227 files
= DINFO_STRUCT_FILE_ANY
;
228 else if (MATCH (sys_lbl
, spec
))
229 files
= DINFO_STRUCT_FILE_SYS
;
230 else if (MATCH (base_lbl
, spec
))
231 files
= DINFO_STRUCT_FILE_BASE
;
234 "argument %qs to %<-femit-struct-debug-detailed%> "
238 /* Effect the specification. */
239 if (usage
== DINFO_USAGE_NUM_ENUMS
)
243 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DFN
] = files
;
244 opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
] = files
;
245 opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
] = files
;
249 opts
->x_debug_struct_generic
[DINFO_USAGE_DFN
] = files
;
250 opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
] = files
;
251 opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
] = files
;
257 opts
->x_debug_struct_ordinary
[usage
] = files
;
259 opts
->x_debug_struct_generic
[usage
] = files
;
263 set_struct_debug_option (opts
, loc
, spec
+1);
266 /* No more -femit-struct-debug-detailed specifications.
270 "argument %qs to %<-femit-struct-debug-detailed%> unknown",
272 if (opts
->x_debug_struct_ordinary
[DINFO_USAGE_DIR_USE
]
273 < opts
->x_debug_struct_ordinary
[DINFO_USAGE_IND_USE
]
274 || opts
->x_debug_struct_generic
[DINFO_USAGE_DIR_USE
]
275 < opts
->x_debug_struct_generic
[DINFO_USAGE_IND_USE
])
277 "%<-femit-struct-debug-detailed=dir:...%> must allow "
278 "at least as much as "
279 "%<-femit-struct-debug-detailed=ind:...%>");
283 /* Strip off a legitimate source ending from the input string NAME of
284 length LEN. Rather than having to know the names used by all of
285 our front ends, we strip off an ending of a period followed by
286 up to fource characters. (C++ uses ".cpp".) */
289 strip_off_ending (char *name
, int len
)
292 for (i
= 2; i
< 5 && len
> i
; i
++)
294 if (name
[len
- i
] == '.')
296 name
[len
- i
] = '\0';
302 /* Find the base name of a path, stripping off both directories and
303 a single final extension. */
305 base_of_path (const char *path
, const char **base_out
)
307 const char *base
= path
;
309 const char *p
= path
;
313 if (IS_DIR_SEPARATOR (c
))
328 /* What to print when a switch has no documentation. */
329 static const char undocumented_msg
[] = N_("This option lacks documentation.");
330 static const char use_diagnosed_msg
[] = N_("Uses of this option are diagnosed.");
332 typedef char *char_p
; /* For DEF_VEC_P. */
334 static void set_debug_level (uint32_t dinfo
, int extended
,
335 const char *arg
, struct gcc_options
*opts
,
336 struct gcc_options
*opts_set
,
338 static void set_fast_math_flags (struct gcc_options
*opts
, int set
);
339 static void decode_d_option (const char *arg
, struct gcc_options
*opts
,
340 location_t loc
, diagnostic_context
*dc
);
341 static void set_unsafe_math_optimizations_flags (struct gcc_options
*opts
,
343 static void enable_warning_as_error (const char *arg
, int value
,
344 unsigned int lang_mask
,
345 const struct cl_option_handlers
*handlers
,
346 struct gcc_options
*opts
,
347 struct gcc_options
*opts_set
,
349 diagnostic_context
*dc
);
351 /* Handle a back-end option; arguments and return value as for
355 target_handle_option (struct gcc_options
*opts
,
356 struct gcc_options
*opts_set
,
357 const struct cl_decoded_option
*decoded
,
358 unsigned int lang_mask ATTRIBUTE_UNUSED
, int kind
,
360 const struct cl_option_handlers
*handlers ATTRIBUTE_UNUSED
,
361 diagnostic_context
*dc
, void (*) (void))
363 gcc_assert (dc
== global_dc
);
364 gcc_assert (kind
== DK_UNSPECIFIED
);
365 return targetm_common
.handle_option (opts
, opts_set
, decoded
, loc
);
368 /* Add comma-separated strings to a char_p vector. */
371 add_comma_separated_to_vector (void **pvec
, const char *arg
)
377 vec
<char_p
> *v
= (vec
<char_p
> *) *pvec
;
379 vec_check_alloc (v
, 1);
381 /* We never free this string. */
394 v
->safe_push (token_start
);
397 if (*r
== '\\' && r
[1] == ',')
407 if (*token_start
!= '\0')
408 v
->safe_push (token_start
);
413 /* Initialize opts_obstack. */
416 init_opts_obstack (void)
418 gcc_obstack_init (&opts_obstack
);
421 /* Initialize OPTS and OPTS_SET before using them in parsing options. */
424 init_options_struct (struct gcc_options
*opts
, struct gcc_options
*opts_set
)
426 /* Ensure that opts_obstack has already been initialized by the time
427 that we initialize any gcc_options instances (PR jit/68446). */
428 gcc_assert (opts_obstack
.chunk_size
> 0);
430 *opts
= global_options_init
;
433 memset (opts_set
, 0, sizeof (*opts_set
));
435 /* Initialize whether `char' is signed. */
436 opts
->x_flag_signed_char
= DEFAULT_SIGNED_CHAR
;
437 /* Set this to a special "uninitialized" value. The actual default
438 is set after target options have been processed. */
439 opts
->x_flag_short_enums
= 2;
441 /* Initialize target_flags before default_options_optimization
442 so the latter can modify it. */
443 opts
->x_target_flags
= targetm_common
.default_target_flags
;
445 /* Some targets have ABI-specified unwind tables. */
446 opts
->x_flag_unwind_tables
= targetm_common
.unwind_tables_default
;
448 /* Some targets have other target-specific initialization. */
449 targetm_common
.option_init_struct (opts
);
452 /* If indicated by the optimization level LEVEL (-Os if SIZE is set,
453 -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
454 to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
455 mask LANG_MASK and option handlers HANDLERS. */
458 maybe_default_option (struct gcc_options
*opts
,
459 struct gcc_options
*opts_set
,
460 const struct default_options
*default_opt
,
461 int level
, bool size
, bool fast
, bool debug
,
462 unsigned int lang_mask
,
463 const struct cl_option_handlers
*handlers
,
465 diagnostic_context
*dc
)
467 const struct cl_option
*option
= &cl_options
[default_opt
->opt_index
];
471 gcc_assert (level
== 2);
473 gcc_assert (level
== 3);
475 gcc_assert (level
== 1);
477 switch (default_opt
->levels
)
483 case OPT_LEVELS_0_ONLY
:
484 enabled
= (level
== 0);
487 case OPT_LEVELS_1_PLUS
:
488 enabled
= (level
>= 1);
491 case OPT_LEVELS_1_PLUS_SPEED_ONLY
:
492 enabled
= (level
>= 1 && !size
&& !debug
);
495 case OPT_LEVELS_1_PLUS_NOT_DEBUG
:
496 enabled
= (level
>= 1 && !debug
);
499 case OPT_LEVELS_2_PLUS
:
500 enabled
= (level
>= 2);
503 case OPT_LEVELS_2_PLUS_SPEED_ONLY
:
504 enabled
= (level
>= 2 && !size
&& !debug
);
507 case OPT_LEVELS_3_PLUS
:
508 enabled
= (level
>= 3);
511 case OPT_LEVELS_3_PLUS_AND_SIZE
:
512 enabled
= (level
>= 3 || size
);
515 case OPT_LEVELS_SIZE
:
519 case OPT_LEVELS_FAST
:
523 case OPT_LEVELS_NONE
:
529 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
530 default_opt
->arg
, default_opt
->value
,
531 lang_mask
, DK_UNSPECIFIED
, loc
,
533 else if (default_opt
->arg
== NULL
534 && !option
->cl_reject_negative
535 && !(option
->flags
& CL_PARAMS
))
536 handle_generated_option (opts
, opts_set
, default_opt
->opt_index
,
537 default_opt
->arg
, !default_opt
->value
,
538 lang_mask
, DK_UNSPECIFIED
, loc
,
542 /* As indicated by the optimization level LEVEL (-Os if SIZE is set,
543 -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
544 OPTS and OPTS_SET, diagnostic context DC, location LOC, with
545 language mask LANG_MASK and option handlers HANDLERS. */
548 maybe_default_options (struct gcc_options
*opts
,
549 struct gcc_options
*opts_set
,
550 const struct default_options
*default_opts
,
551 int level
, bool size
, bool fast
, bool debug
,
552 unsigned int lang_mask
,
553 const struct cl_option_handlers
*handlers
,
555 diagnostic_context
*dc
)
559 for (i
= 0; default_opts
[i
].levels
!= OPT_LEVELS_NONE
; i
++)
560 maybe_default_option (opts
, opts_set
, &default_opts
[i
],
561 level
, size
, fast
, debug
,
562 lang_mask
, handlers
, loc
, dc
);
565 /* Table of options enabled by default at different levels.
566 Please keep this list sorted by level and alphabetized within
567 each level; this makes it easier to keep the documentation
570 static const struct default_options default_options_table
[] =
572 /* -O1 and -Og optimizations. */
573 { OPT_LEVELS_1_PLUS
, OPT_fcombine_stack_adjustments
, NULL
, 1 },
574 { OPT_LEVELS_1_PLUS
, OPT_fcompare_elim
, NULL
, 1 },
575 { OPT_LEVELS_1_PLUS
, OPT_fcprop_registers
, NULL
, 1 },
576 { OPT_LEVELS_1_PLUS
, OPT_fdefer_pop
, NULL
, 1 },
577 { OPT_LEVELS_1_PLUS
, OPT_fforward_propagate
, NULL
, 1 },
578 { OPT_LEVELS_1_PLUS
, OPT_fguess_branch_probability
, NULL
, 1 },
579 { OPT_LEVELS_1_PLUS
, OPT_fipa_profile
, NULL
, 1 },
580 { OPT_LEVELS_1_PLUS
, OPT_fipa_pure_const
, NULL
, 1 },
581 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference
, NULL
, 1 },
582 { OPT_LEVELS_1_PLUS
, OPT_fipa_reference_addressable
, NULL
, 1 },
583 { OPT_LEVELS_1_PLUS
, OPT_fmerge_constants
, NULL
, 1 },
584 { OPT_LEVELS_1_PLUS
, OPT_fomit_frame_pointer
, NULL
, 1 },
585 { OPT_LEVELS_1_PLUS
, OPT_freorder_blocks
, NULL
, 1 },
586 { OPT_LEVELS_1_PLUS
, OPT_fshrink_wrap
, NULL
, 1 },
587 { OPT_LEVELS_1_PLUS
, OPT_fsplit_wide_types
, NULL
, 1 },
588 { OPT_LEVELS_1_PLUS
, OPT_fthread_jumps
, NULL
, 1 },
589 { OPT_LEVELS_1_PLUS
, OPT_ftree_builtin_call_dce
, NULL
, 1 },
590 { OPT_LEVELS_1_PLUS
, OPT_ftree_ccp
, NULL
, 1 },
591 { OPT_LEVELS_1_PLUS
, OPT_ftree_ch
, NULL
, 1 },
592 { OPT_LEVELS_1_PLUS
, OPT_ftree_coalesce_vars
, NULL
, 1 },
593 { OPT_LEVELS_1_PLUS
, OPT_ftree_copy_prop
, NULL
, 1 },
594 { OPT_LEVELS_1_PLUS
, OPT_ftree_dce
, NULL
, 1 },
595 { OPT_LEVELS_1_PLUS
, OPT_ftree_dominator_opts
, NULL
, 1 },
596 { OPT_LEVELS_1_PLUS
, OPT_ftree_fre
, NULL
, 1 },
597 { OPT_LEVELS_1_PLUS
, OPT_ftree_sink
, NULL
, 1 },
598 { OPT_LEVELS_1_PLUS
, OPT_ftree_slsr
, NULL
, 1 },
599 { OPT_LEVELS_1_PLUS
, OPT_ftree_ter
, NULL
, 1 },
600 { OPT_LEVELS_1_PLUS
, OPT_fvar_tracking
, NULL
, 1 },
602 /* -O1 (and not -Og) optimizations. */
603 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fbranch_count_reg
, NULL
, 1 },
605 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdelayed_branch
, NULL
, 1 },
607 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fdse
, NULL
, 1 },
608 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion
, NULL
, 1 },
609 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fif_conversion2
, NULL
, 1 },
610 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_finline_functions_called_once
, NULL
, 1 },
611 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_invariants
, NULL
, 1 },
612 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fmove_loop_stores
, NULL
, 1 },
613 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fssa_phiopt
, NULL
, 1 },
614 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_fipa_modref
, NULL
, 1 },
615 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_bit_ccp
, NULL
, 1 },
616 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_dse
, NULL
, 1 },
617 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_pta
, NULL
, 1 },
618 { OPT_LEVELS_1_PLUS_NOT_DEBUG
, OPT_ftree_sra
, NULL
, 1 },
620 /* -O2 and -Os optimizations. */
621 { OPT_LEVELS_2_PLUS
, OPT_fcaller_saves
, NULL
, 1 },
622 { OPT_LEVELS_2_PLUS
, OPT_fcode_hoisting
, NULL
, 1 },
623 { OPT_LEVELS_2_PLUS
, OPT_fcrossjumping
, NULL
, 1 },
624 { OPT_LEVELS_2_PLUS
, OPT_fcse_follow_jumps
, NULL
, 1 },
625 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize
, NULL
, 1 },
626 { OPT_LEVELS_2_PLUS
, OPT_fdevirtualize_speculatively
, NULL
, 1 },
627 { OPT_LEVELS_2_PLUS
, OPT_fexpensive_optimizations
, NULL
, 1 },
628 { OPT_LEVELS_2_PLUS
, OPT_fgcse
, NULL
, 1 },
629 { OPT_LEVELS_2_PLUS
, OPT_fhoist_adjacent_loads
, NULL
, 1 },
630 { OPT_LEVELS_2_PLUS
, OPT_findirect_inlining
, NULL
, 1 },
631 { OPT_LEVELS_2_PLUS
, OPT_finline_small_functions
, NULL
, 1 },
632 { OPT_LEVELS_2_PLUS
, OPT_fipa_bit_cp
, NULL
, 1 },
633 { OPT_LEVELS_2_PLUS
, OPT_fipa_cp
, NULL
, 1 },
634 { OPT_LEVELS_2_PLUS
, OPT_fipa_icf
, NULL
, 1 },
635 { OPT_LEVELS_2_PLUS
, OPT_fipa_ra
, NULL
, 1 },
636 { OPT_LEVELS_2_PLUS
, OPT_fipa_sra
, NULL
, 1 },
637 { OPT_LEVELS_2_PLUS
, OPT_fipa_vrp
, NULL
, 1 },
638 { OPT_LEVELS_2_PLUS
, OPT_fisolate_erroneous_paths_dereference
, NULL
, 1 },
639 { OPT_LEVELS_2_PLUS
, OPT_flra_remat
, NULL
, 1 },
640 { OPT_LEVELS_2_PLUS
, OPT_foptimize_sibling_calls
, NULL
, 1 },
641 { OPT_LEVELS_2_PLUS
, OPT_fpartial_inlining
, NULL
, 1 },
642 { OPT_LEVELS_2_PLUS
, OPT_fpeephole2
, NULL
, 1 },
643 { OPT_LEVELS_2_PLUS
, OPT_freorder_functions
, NULL
, 1 },
644 { OPT_LEVELS_2_PLUS
, OPT_frerun_cse_after_loop
, NULL
, 1 },
645 #ifdef INSN_SCHEDULING
646 { OPT_LEVELS_2_PLUS
, OPT_fschedule_insns2
, NULL
, 1 },
648 { OPT_LEVELS_2_PLUS
, OPT_fstrict_aliasing
, NULL
, 1 },
649 { OPT_LEVELS_2_PLUS
, OPT_fstore_merging
, NULL
, 1 },
650 { OPT_LEVELS_2_PLUS
, OPT_ftree_pre
, NULL
, 1 },
651 { OPT_LEVELS_2_PLUS
, OPT_ftree_switch_conversion
, NULL
, 1 },
652 { OPT_LEVELS_2_PLUS
, OPT_ftree_tail_merge
, NULL
, 1 },
653 { OPT_LEVELS_2_PLUS
, OPT_ftree_vrp
, NULL
, 1 },
654 { OPT_LEVELS_2_PLUS
, OPT_fvect_cost_model_
, NULL
,
655 VECT_COST_MODEL_VERY_CHEAP
},
656 { OPT_LEVELS_2_PLUS
, OPT_finline_functions
, NULL
, 1 },
657 { OPT_LEVELS_2_PLUS
, OPT_ftree_loop_distribute_patterns
, NULL
, 1 },
659 /* -O2 and above optimizations, but not -Os or -Og. */
660 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_functions
, NULL
, 1 },
661 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_jumps
, NULL
, 1 },
662 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_labels
, NULL
, 1 },
663 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_falign_loops
, NULL
, 1 },
664 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_foptimize_strlen
, NULL
, 1 },
665 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_freorder_blocks_algorithm_
, NULL
,
666 REORDER_BLOCKS_ALGORITHM_STC
},
667 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_ftree_loop_vectorize
, NULL
, 1 },
668 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_ftree_slp_vectorize
, NULL
, 1 },
669 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fopenmp_target_simd_clone_
, NULL
,
670 OMP_TARGET_SIMD_CLONE_NOHOST
},
671 #ifdef INSN_SCHEDULING
672 /* Only run the pre-regalloc scheduling pass if optimizing for speed. */
673 { OPT_LEVELS_2_PLUS_SPEED_ONLY
, OPT_fschedule_insns
, NULL
, 1 },
676 /* -O3 and -Os optimizations. */
678 /* -O3 optimizations. */
679 { OPT_LEVELS_3_PLUS
, OPT_fgcse_after_reload
, NULL
, 1 },
680 { OPT_LEVELS_3_PLUS
, OPT_fipa_cp_clone
, NULL
, 1 },
681 { OPT_LEVELS_3_PLUS
, OPT_floop_interchange
, NULL
, 1 },
682 { OPT_LEVELS_3_PLUS
, OPT_floop_unroll_and_jam
, NULL
, 1 },
683 { OPT_LEVELS_3_PLUS
, OPT_fpeel_loops
, NULL
, 1 },
684 { OPT_LEVELS_3_PLUS
, OPT_fpredictive_commoning
, NULL
, 1 },
685 { OPT_LEVELS_3_PLUS
, OPT_fsplit_loops
, NULL
, 1 },
686 { OPT_LEVELS_3_PLUS
, OPT_fsplit_paths
, NULL
, 1 },
687 { OPT_LEVELS_3_PLUS
, OPT_ftree_loop_distribution
, NULL
, 1 },
688 { OPT_LEVELS_3_PLUS
, OPT_ftree_partial_pre
, NULL
, 1 },
689 { OPT_LEVELS_3_PLUS
, OPT_funswitch_loops
, NULL
, 1 },
690 { OPT_LEVELS_3_PLUS
, OPT_fvect_cost_model_
, NULL
, VECT_COST_MODEL_DYNAMIC
},
691 { OPT_LEVELS_3_PLUS
, OPT_fversion_loops_for_strides
, NULL
, 1 },
693 /* -O3 parameters. */
694 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_auto_
, NULL
, 30 },
695 { OPT_LEVELS_3_PLUS
, OPT__param_early_inlining_insns_
, NULL
, 14 },
696 { OPT_LEVELS_3_PLUS
, OPT__param_inline_heuristics_hint_percent_
, NULL
, 600 },
697 { OPT_LEVELS_3_PLUS
, OPT__param_inline_min_speedup_
, NULL
, 15 },
698 { OPT_LEVELS_3_PLUS
, OPT__param_max_inline_insns_single_
, NULL
, 200 },
700 /* -Ofast adds optimizations to -O3. */
701 { OPT_LEVELS_FAST
, OPT_ffast_math
, NULL
, 1 },
702 { OPT_LEVELS_FAST
, OPT_fallow_store_data_races
, NULL
, 1 },
703 { OPT_LEVELS_FAST
, OPT_fsemantic_interposition
, NULL
, 0 },
705 { OPT_LEVELS_NONE
, 0, NULL
, 0 }
708 /* Default the options in OPTS and OPTS_SET based on the optimization
709 settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
711 default_options_optimization (struct gcc_options
*opts
,
712 struct gcc_options
*opts_set
,
713 struct cl_decoded_option
*decoded_options
,
714 unsigned int decoded_options_count
,
716 unsigned int lang_mask
,
717 const struct cl_option_handlers
*handlers
,
718 diagnostic_context
*dc
)
722 bool openacc_mode
= false;
724 /* Scan to see what optimization level has been specified. That will
725 determine the default value of many flags. */
726 for (i
= 1; i
< decoded_options_count
; i
++)
728 struct cl_decoded_option
*opt
= &decoded_options
[i
];
729 switch (opt
->opt_index
)
732 if (*opt
->arg
== '\0')
734 opts
->x_optimize
= 1;
735 opts
->x_optimize_size
= 0;
736 opts
->x_optimize_fast
= 0;
737 opts
->x_optimize_debug
= 0;
741 const int optimize_val
= integral_argument (opt
->arg
);
742 if (optimize_val
== -1)
743 error_at (loc
, "argument to %<-O%> should be a non-negative "
744 "integer, %<g%>, %<s%>, %<z%> or %<fast%>");
747 opts
->x_optimize
= optimize_val
;
748 if ((unsigned int) opts
->x_optimize
> 255)
749 opts
->x_optimize
= 255;
750 opts
->x_optimize_size
= 0;
751 opts
->x_optimize_fast
= 0;
752 opts
->x_optimize_debug
= 0;
758 opts
->x_optimize_size
= 1;
760 /* Optimizing for size forces optimize to be 2. */
761 opts
->x_optimize
= 2;
762 opts
->x_optimize_fast
= 0;
763 opts
->x_optimize_debug
= 0;
767 opts
->x_optimize_size
= 2;
769 /* Optimizing for size forces optimize to be 2. */
770 opts
->x_optimize
= 2;
771 opts
->x_optimize_fast
= 0;
772 opts
->x_optimize_debug
= 0;
776 /* -Ofast only adds flags to -O3. */
777 opts
->x_optimize_size
= 0;
778 opts
->x_optimize
= 3;
779 opts
->x_optimize_fast
= 1;
780 opts
->x_optimize_debug
= 0;
784 /* -Og selects optimization level 1. */
785 opts
->x_optimize_size
= 0;
786 opts
->x_optimize
= 1;
787 opts
->x_optimize_fast
= 0;
788 opts
->x_optimize_debug
= 1;
797 /* Ignore other options in this prescan. */
802 maybe_default_options (opts
, opts_set
, default_options_table
,
803 opts
->x_optimize
, opts
->x_optimize_size
,
804 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
805 lang_mask
, handlers
, loc
, dc
);
807 /* -O2 param settings. */
808 opt2
= (opts
->x_optimize
>= 2);
811 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_pta
, true);
813 /* Track fields in field-sensitive alias analysis. */
815 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_fields_for_field_sensitive
,
818 if (opts
->x_optimize_size
)
819 /* We want to crossjump as much as possible. */
820 SET_OPTION_IF_UNSET (opts
, opts_set
, param_min_crossjump_insns
, 1);
822 /* Restrict the amount of work combine does at -Og while retaining
823 most of its useful transforms. */
824 if (opts
->x_optimize_debug
)
825 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_combine_insns
, 2);
827 /* Allow default optimizations to be specified on a per-machine basis. */
828 maybe_default_options (opts
, opts_set
,
829 targetm_common
.option_optimization_table
,
830 opts
->x_optimize
, opts
->x_optimize_size
,
831 opts
->x_optimize_fast
, opts
->x_optimize_debug
,
832 lang_mask
, handlers
, loc
, dc
);
835 /* Control IPA optimizations based on different live patching LEVEL. */
837 control_options_for_live_patching (struct gcc_options
*opts
,
838 struct gcc_options
*opts_set
,
839 enum live_patching_level level
,
842 gcc_assert (level
> LIVE_PATCHING_NONE
);
846 case LIVE_PATCHING_INLINE_ONLY_STATIC
:
847 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static"
848 if (opts_set
->x_flag_ipa_cp_clone
&& opts
->x_flag_ipa_cp_clone
)
849 error_at (loc
, "%qs is incompatible with %qs",
850 "-fipa-cp-clone", LIVE_PATCHING_OPTION
);
852 opts
->x_flag_ipa_cp_clone
= 0;
854 if (opts_set
->x_flag_ipa_sra
&& opts
->x_flag_ipa_sra
)
855 error_at (loc
, "%qs is incompatible with %qs",
856 "-fipa-sra", LIVE_PATCHING_OPTION
);
858 opts
->x_flag_ipa_sra
= 0;
860 if (opts_set
->x_flag_partial_inlining
&& opts
->x_flag_partial_inlining
)
861 error_at (loc
, "%qs is incompatible with %qs",
862 "-fpartial-inlining", LIVE_PATCHING_OPTION
);
864 opts
->x_flag_partial_inlining
= 0;
866 if (opts_set
->x_flag_ipa_cp
&& opts
->x_flag_ipa_cp
)
867 error_at (loc
, "%qs is incompatible with %qs",
868 "-fipa-cp", LIVE_PATCHING_OPTION
);
870 opts
->x_flag_ipa_cp
= 0;
873 case LIVE_PATCHING_INLINE_CLONE
:
874 #undef LIVE_PATCHING_OPTION
875 #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static|inline-clone"
876 /* live patching should disable whole-program optimization. */
877 if (opts_set
->x_flag_whole_program
&& opts
->x_flag_whole_program
)
878 error_at (loc
, "%qs is incompatible with %qs",
879 "-fwhole-program", LIVE_PATCHING_OPTION
);
881 opts
->x_flag_whole_program
= 0;
883 /* visibility change should be excluded by !flag_whole_program
884 && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
885 && !flag_partial_inlining. */
887 if (opts_set
->x_flag_ipa_pta
&& opts
->x_flag_ipa_pta
)
888 error_at (loc
, "%qs is incompatible with %qs",
889 "-fipa-pta", LIVE_PATCHING_OPTION
);
891 opts
->x_flag_ipa_pta
= 0;
893 if (opts_set
->x_flag_ipa_reference
&& opts
->x_flag_ipa_reference
)
894 error_at (loc
, "%qs is incompatible with %qs",
895 "-fipa-reference", LIVE_PATCHING_OPTION
);
897 opts
->x_flag_ipa_reference
= 0;
899 if (opts_set
->x_flag_ipa_ra
&& opts
->x_flag_ipa_ra
)
900 error_at (loc
, "%qs is incompatible with %qs",
901 "-fipa-ra", LIVE_PATCHING_OPTION
);
903 opts
->x_flag_ipa_ra
= 0;
905 if (opts_set
->x_flag_ipa_icf
&& opts
->x_flag_ipa_icf
)
906 error_at (loc
, "%qs is incompatible with %qs",
907 "-fipa-icf", LIVE_PATCHING_OPTION
);
909 opts
->x_flag_ipa_icf
= 0;
911 if (opts_set
->x_flag_ipa_icf_functions
&& opts
->x_flag_ipa_icf_functions
)
912 error_at (loc
, "%qs is incompatible with %qs",
913 "-fipa-icf-functions", LIVE_PATCHING_OPTION
);
915 opts
->x_flag_ipa_icf_functions
= 0;
917 if (opts_set
->x_flag_ipa_icf_variables
&& opts
->x_flag_ipa_icf_variables
)
918 error_at (loc
, "%qs is incompatible with %qs",
919 "-fipa-icf-variables", LIVE_PATCHING_OPTION
);
921 opts
->x_flag_ipa_icf_variables
= 0;
923 if (opts_set
->x_flag_ipa_bit_cp
&& opts
->x_flag_ipa_bit_cp
)
924 error_at (loc
, "%qs is incompatible with %qs",
925 "-fipa-bit-cp", LIVE_PATCHING_OPTION
);
927 opts
->x_flag_ipa_bit_cp
= 0;
929 if (opts_set
->x_flag_ipa_vrp
&& opts
->x_flag_ipa_vrp
)
930 error_at (loc
, "%qs is incompatible with %qs",
931 "-fipa-vrp", LIVE_PATCHING_OPTION
);
933 opts
->x_flag_ipa_vrp
= 0;
935 if (opts_set
->x_flag_ipa_pure_const
&& opts
->x_flag_ipa_pure_const
)
936 error_at (loc
, "%qs is incompatible with %qs",
937 "-fipa-pure-const", LIVE_PATCHING_OPTION
);
939 opts
->x_flag_ipa_pure_const
= 0;
941 if (opts_set
->x_flag_ipa_modref
&& opts
->x_flag_ipa_modref
)
943 "%<-fipa-modref%> is incompatible with %qs",
944 LIVE_PATCHING_OPTION
);
946 opts
->x_flag_ipa_modref
= 0;
948 /* FIXME: disable unreachable code removal. */
950 /* discovery of functions/variables with no address taken. */
951 if (opts_set
->x_flag_ipa_reference_addressable
952 && opts
->x_flag_ipa_reference_addressable
)
953 error_at (loc
, "%qs is incompatible with %qs",
954 "-fipa-reference-addressable", LIVE_PATCHING_OPTION
);
956 opts
->x_flag_ipa_reference_addressable
= 0;
958 /* ipa stack alignment propagation. */
959 if (opts_set
->x_flag_ipa_stack_alignment
960 && opts
->x_flag_ipa_stack_alignment
)
961 error_at (loc
, "%qs is incompatible with %qs",
962 "-fipa-stack-alignment", LIVE_PATCHING_OPTION
);
964 opts
->x_flag_ipa_stack_alignment
= 0;
970 #undef LIVE_PATCHING_OPTION
973 /* --help option argument if set. */
974 vec
<const char *> help_option_arguments
;
976 /* Return the string name describing a sanitizer argument which has been
977 provided on the command line and has set this particular flag. */
979 find_sanitizer_argument (struct gcc_options
*opts
, unsigned int flags
)
981 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
983 /* Need to find the sanitizer_opts element which:
984 a) Could have set the flags requested.
985 b) Has been set on the command line.
987 Can have (a) without (b) if the flag requested is e.g.
988 SANITIZE_ADDRESS, since both -fsanitize=address and
989 -fsanitize=kernel-address set this flag.
991 Can have (b) without (a) by requesting more than one sanitizer on the
993 if ((sanitizer_opts
[i
].flag
& opts
->x_flag_sanitize
)
994 != sanitizer_opts
[i
].flag
)
996 if ((sanitizer_opts
[i
].flag
& flags
) != flags
)
998 return sanitizer_opts
[i
].name
;
1004 /* Report an error to the user about sanitizer options they have requested
1005 which have set conflicting flags.
1007 LEFT and RIGHT indicate sanitizer flags which conflict with each other, this
1008 function reports an error if both have been set in OPTS->x_flag_sanitize and
1009 ensures the error identifies the requested command line options that have
1012 report_conflicting_sanitizer_options (struct gcc_options
*opts
, location_t loc
,
1013 unsigned int left
, unsigned int right
)
1015 unsigned int left_seen
= (opts
->x_flag_sanitize
& left
);
1016 unsigned int right_seen
= (opts
->x_flag_sanitize
& right
);
1017 if (left_seen
&& right_seen
)
1019 const char* left_arg
= find_sanitizer_argument (opts
, left_seen
);
1020 const char* right_arg
= find_sanitizer_argument (opts
, right_seen
);
1021 gcc_assert (left_arg
&& right_arg
);
1023 "%<-fsanitize=%s%> is incompatible with %<-fsanitize=%s%>",
1024 left_arg
, right_arg
);
1028 /* After all options at LOC have been read into OPTS and OPTS_SET,
1029 finalize settings of those options and diagnose incompatible
1032 finish_options (struct gcc_options
*opts
, struct gcc_options
*opts_set
,
1035 if (opts
->x_dump_base_name
1036 && ! opts
->x_dump_base_name_prefixed
)
1038 const char *sep
= opts
->x_dump_base_name
;
1041 if (IS_DIR_SEPARATOR (*sep
))
1045 /* If dump_base_path contains subdirectories, don't prepend
1047 else if (opts
->x_dump_dir_name
)
1048 /* We have a DUMP_DIR_NAME, prepend that. */
1049 opts
->x_dump_base_name
= opts_concat (opts
->x_dump_dir_name
,
1050 opts
->x_dump_base_name
, NULL
);
1052 /* It is definitely prefixed now. */
1053 opts
->x_dump_base_name_prefixed
= true;
1056 /* Handle related options for unit-at-a-time, toplevel-reorder, and
1058 if (!opts
->x_flag_unit_at_a_time
)
1060 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
1061 error_at (loc
, "section anchors must be disabled when unit-at-a-time "
1063 opts
->x_flag_section_anchors
= 0;
1064 if (opts
->x_flag_toplevel_reorder
== 1)
1065 error_at (loc
, "toplevel reorder must be disabled when unit-at-a-time "
1067 opts
->x_flag_toplevel_reorder
= 0;
1070 /* -fself-test depends on the state of the compiler prior to
1071 compiling anything. Ideally it should be run on an empty source
1072 file. However, in case we get run with actual source, assume
1073 -fsyntax-only which will inhibit any compiler initialization
1074 which may confuse the self tests. */
1075 if (opts
->x_flag_self_test
)
1076 opts
->x_flag_syntax_only
= 1;
1078 if (opts
->x_flag_tm
&& opts
->x_flag_non_call_exceptions
)
1079 sorry ("transactional memory is not supported with non-call exceptions");
1081 /* Unless the user has asked for section anchors, we disable toplevel
1082 reordering at -O0 to disable transformations that might be surprising
1083 to end users and to get -fno-toplevel-reorder tested. */
1084 if (!opts
->x_optimize
1085 && opts
->x_flag_toplevel_reorder
== 2
1086 && !(opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
))
1088 opts
->x_flag_toplevel_reorder
= 0;
1089 opts
->x_flag_section_anchors
= 0;
1091 if (!opts
->x_flag_toplevel_reorder
)
1093 if (opts
->x_flag_section_anchors
&& opts_set
->x_flag_section_anchors
)
1094 error_at (loc
, "section anchors must be disabled when toplevel reorder"
1096 opts
->x_flag_section_anchors
= 0;
1099 if (opts
->x_flag_hardened
)
1101 if (!opts_set
->x_flag_auto_var_init
)
1102 opts
->x_flag_auto_var_init
= AUTO_INIT_ZERO
;
1103 else if (opts
->x_flag_auto_var_init
!= AUTO_INIT_ZERO
)
1104 warning_at (loc
, OPT_Whardened
,
1105 "%<-ftrivial-auto-var-init=zero%> is not enabled by "
1106 "%<-fhardened%> because it was specified on the command "
1110 if (!opts
->x_flag_opts_finished
)
1112 /* We initialize opts->x_flag_pie to -1 so that targets can set a
1114 if (opts
->x_flag_pie
== -1)
1116 /* We initialize opts->x_flag_pic to -1 so that we can tell if
1117 -fpic, -fPIC, -fno-pic or -fno-PIC is used. */
1118 if (opts
->x_flag_pic
== -1)
1119 opts
->x_flag_pie
= (opts
->x_flag_hardened
1120 ? /*-fPIE*/ 2 : DEFAULT_FLAG_PIE
);
1122 opts
->x_flag_pie
= 0;
1124 /* If -fPIE or -fpie is used, turn on PIC. */
1125 if (opts
->x_flag_pie
)
1126 opts
->x_flag_pic
= opts
->x_flag_pie
;
1127 else if (opts
->x_flag_pic
== -1)
1128 opts
->x_flag_pic
= 0;
1129 if (opts
->x_flag_pic
&& !opts
->x_flag_pie
)
1130 opts
->x_flag_shlib
= 1;
1131 opts
->x_flag_opts_finished
= true;
1134 /* We initialize opts->x_flag_stack_protect to -1 so that targets
1135 can set a default value. With --enable-default-ssp or -fhardened
1136 the default is -fstack-protector-strong. */
1137 if (opts
->x_flag_stack_protect
== -1)
1139 /* This should check FRAME_GROWS_DOWNWARD, but on some targets it's
1140 defined in such a way that it uses flag_stack_protect which can't
1141 be used here. Moreover, some targets like BPF don't support
1142 -fstack-protector at all but we don't know that here. So remember
1143 that flag_stack_protect was set at the behest of -fhardened. */
1144 if (opts
->x_flag_hardened
)
1146 opts
->x_flag_stack_protect
= SPCT_FLAG_STRONG
;
1147 flag_stack_protector_set_by_fhardened_p
= true;
1150 opts
->x_flag_stack_protect
= DEFAULT_FLAG_SSP
;
1152 else if (opts
->x_flag_hardened
1153 && opts
->x_flag_stack_protect
!= SPCT_FLAG_STRONG
)
1154 warning_at (UNKNOWN_LOCATION
, OPT_Whardened
,
1155 "%<-fstack-protector-strong%> is not enabled by "
1156 "%<-fhardened%> because it was specified on the command "
1159 if (opts
->x_optimize
== 0)
1161 /* Inlining does not work if not optimizing,
1162 so force it not to be done. */
1163 opts
->x_warn_inline
= 0;
1164 opts
->x_flag_no_inline
= 1;
1167 /* At -O0 or -Og, turn __builtin_unreachable into a trap. */
1168 if (!opts
->x_optimize
|| opts
->x_optimize_debug
)
1169 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unreachable_traps
, true);
1171 /* Pipelining of outer loops is only possible when general pipelining
1172 capabilities are requested. */
1173 if (!opts
->x_flag_sel_sched_pipelining
)
1174 opts
->x_flag_sel_sched_pipelining_outer_loops
= 0;
1176 if (opts
->x_flag_conserve_stack
)
1178 SET_OPTION_IF_UNSET (opts
, opts_set
, param_large_stack_frame
, 100);
1179 SET_OPTION_IF_UNSET (opts
, opts_set
, param_stack_frame_growth
, 40);
1182 if (opts
->x_flag_lto
)
1185 opts
->x_flag_generate_lto
= 1;
1187 /* When generating IL, do not operate in whole-program mode.
1188 Otherwise, symbols will be privatized too early, causing link
1190 opts
->x_flag_whole_program
= 0;
1192 error_at (loc
, "LTO support has not been enabled in this configuration");
1194 if (!opts
->x_flag_fat_lto_objects
1195 && (!HAVE_LTO_PLUGIN
1196 || (opts_set
->x_flag_use_linker_plugin
1197 && !opts
->x_flag_use_linker_plugin
)))
1199 if (opts_set
->x_flag_fat_lto_objects
)
1200 error_at (loc
, "%<-fno-fat-lto-objects%> are supported only with "
1202 opts
->x_flag_fat_lto_objects
= 1;
1205 /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
1206 if (opts
->x_dwarf_split_debug_info
)
1208 inform (loc
, "%<-gsplit-dwarf%> is not supported with LTO,"
1210 opts
->x_dwarf_split_debug_info
= 0;
1214 /* We initialize opts->x_flag_split_stack to -1 so that targets can set a
1215 default value if they choose based on other options. */
1216 if (opts
->x_flag_split_stack
== -1)
1217 opts
->x_flag_split_stack
= 0;
1218 else if (opts
->x_flag_split_stack
)
1220 if (!targetm_common
.supports_split_stack (true, opts
))
1222 error_at (loc
, "%<-fsplit-stack%> is not supported by "
1223 "this compiler configuration");
1224 opts
->x_flag_split_stack
= 0;
1228 /* If stack splitting is turned on, and the user did not explicitly
1229 request function partitioning, turn off partitioning, as it
1230 confuses the linker when trying to handle partitioned split-stack
1231 code that calls a non-split-stack functions. But if partitioning
1232 was turned on explicitly just hope for the best. */
1233 if (opts
->x_flag_split_stack
1234 && opts
->x_flag_reorder_blocks_and_partition
)
1235 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_blocks_and_partition
, 0);
1237 if (opts
->x_flag_reorder_blocks_and_partition
)
1238 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_reorder_functions
, 1);
1240 /* The -gsplit-dwarf option requires -ggnu-pubnames. */
1241 if (opts
->x_dwarf_split_debug_info
)
1242 opts
->x_debug_generate_pub_sections
= 2;
1244 if ((opts
->x_flag_sanitize
1245 & (SANITIZE_USER_ADDRESS
| SANITIZE_KERNEL_ADDRESS
)) == 0)
1247 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_COMPARE
)
1249 "%<-fsanitize=pointer-compare%> must be combined with "
1250 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1251 if (opts
->x_flag_sanitize
& SANITIZE_POINTER_SUBTRACT
)
1253 "%<-fsanitize=pointer-subtract%> must be combined with "
1254 "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
1257 /* Address sanitizers conflict with the thread sanitizer. */
1258 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_THREAD
,
1260 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_THREAD
,
1261 SANITIZE_HWADDRESS
);
1262 /* The leak sanitizer conflicts with the thread sanitizer. */
1263 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_LEAK
,
1266 /* No combination of HWASAN and ASAN work together. */
1267 report_conflicting_sanitizer_options (opts
, loc
,
1268 SANITIZE_HWADDRESS
, SANITIZE_ADDRESS
);
1270 /* The userspace and kernel address sanitizers conflict with each other. */
1271 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_USER_HWADDRESS
,
1272 SANITIZE_KERNEL_HWADDRESS
);
1273 report_conflicting_sanitizer_options (opts
, loc
, SANITIZE_USER_ADDRESS
,
1274 SANITIZE_KERNEL_ADDRESS
);
1276 /* Check error recovery for -fsanitize-recover option. */
1277 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1278 if ((opts
->x_flag_sanitize_recover
& sanitizer_opts
[i
].flag
)
1279 && !sanitizer_opts
[i
].can_recover
)
1280 error_at (loc
, "%<-fsanitize-recover=%s%> is not supported",
1281 sanitizer_opts
[i
].name
);
1283 /* Check -fsanitize-trap option. */
1284 for (int i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
1285 if ((opts
->x_flag_sanitize_trap
& sanitizer_opts
[i
].flag
)
1286 && !sanitizer_opts
[i
].can_trap
1287 /* Allow -fsanitize-trap=all or -fsanitize-trap=undefined
1288 to set flag_sanitize_trap & SANITIZE_VPTR bit which will
1289 effectively disable -fsanitize=vptr, just disallow
1290 explicit -fsanitize-trap=vptr. */
1291 && sanitizer_opts
[i
].flag
!= SANITIZE_VPTR
)
1292 error_at (loc
, "%<-fsanitize-trap=%s%> is not supported",
1293 sanitizer_opts
[i
].name
);
1295 /* When instrumenting the pointers, we don't want to remove
1296 the null pointer checks. */
1297 if (opts
->x_flag_sanitize
& (SANITIZE_NULL
| SANITIZE_NONNULL_ATTRIBUTE
1298 | SANITIZE_RETURNS_NONNULL_ATTRIBUTE
))
1299 opts
->x_flag_delete_null_pointer_checks
= 0;
1301 /* Aggressive compiler optimizations may cause false negatives. */
1302 if (opts
->x_flag_sanitize
& ~(SANITIZE_LEAK
| SANITIZE_UNREACHABLE
))
1303 opts
->x_flag_aggressive_loop_optimizations
= 0;
1305 /* Enable -fsanitize-address-use-after-scope if either address sanitizer is
1307 if (opts
->x_flag_sanitize
1308 & (SANITIZE_USER_ADDRESS
| SANITIZE_USER_HWADDRESS
))
1309 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_sanitize_address_use_after_scope
,
1312 /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
1314 if (opts
->x_flag_sanitize_address_use_after_scope
)
1316 if (opts
->x_flag_stack_reuse
!= SR_NONE
1317 && opts_set
->x_flag_stack_reuse
!= SR_NONE
)
1319 "%<-fsanitize-address-use-after-scope%> requires "
1320 "%<-fstack-reuse=none%> option");
1322 opts
->x_flag_stack_reuse
= SR_NONE
;
1325 if ((opts
->x_flag_sanitize
& SANITIZE_USER_ADDRESS
) && opts
->x_flag_tm
)
1326 sorry ("transactional memory is not supported with %<-fsanitize=address%>");
1328 if ((opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
) && opts
->x_flag_tm
)
1329 sorry ("transactional memory is not supported with "
1330 "%<-fsanitize=kernel-address%>");
1332 /* Currently live patching is not support for LTO. */
1333 if (opts
->x_flag_live_patching
== LIVE_PATCHING_INLINE_ONLY_STATIC
&& opts
->x_flag_lto
)
1334 sorry ("live patching (with %qs) is not supported with LTO",
1335 "inline-only-static");
1337 /* Currently vtable verification is not supported for LTO */
1338 if (opts
->x_flag_vtable_verify
&& opts
->x_flag_lto
)
1339 sorry ("vtable verification is not supported with LTO");
1341 /* Control IPA optimizations based on different -flive-patching level. */
1342 if (opts
->x_flag_live_patching
)
1343 control_options_for_live_patching (opts
, opts_set
,
1344 opts
->x_flag_live_patching
,
1347 /* Allow cunroll to grow size accordingly. */
1348 if (!opts_set
->x_flag_cunroll_grow_size
)
1349 opts
->x_flag_cunroll_grow_size
1350 = (opts
->x_flag_unroll_loops
1351 || opts
->x_flag_peel_loops
1352 || opts
->x_optimize
>= 3);
1354 /* With -fcx-limited-range, we do cheap and quick complex arithmetic. */
1355 if (opts
->x_flag_cx_limited_range
)
1356 opts
->x_flag_complex_method
= 0;
1357 else if (opts_set
->x_flag_cx_limited_range
)
1358 opts
->x_flag_complex_method
= opts
->x_flag_default_complex_method
;
1360 /* With -fcx-fortran-rules, we do something in-between cheap and C99. */
1361 if (opts
->x_flag_cx_fortran_rules
)
1362 opts
->x_flag_complex_method
= 1;
1363 else if (opts_set
->x_flag_cx_fortran_rules
)
1364 opts
->x_flag_complex_method
= opts
->x_flag_default_complex_method
;
1366 /* Use -fvect-cost-model=cheap instead of -fvect-cost-mode=very-cheap
1367 by default with explicit -ftree-{loop,slp}-vectorize. */
1368 if (opts
->x_optimize
== 2
1369 && (opts_set
->x_flag_tree_loop_vectorize
1370 || opts_set
->x_flag_tree_vectorize
))
1371 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
1372 VECT_COST_MODEL_CHEAP
);
1374 if (opts
->x_flag_gtoggle
)
1376 /* Make sure to process -gtoggle only once. */
1377 opts
->x_flag_gtoggle
= false;
1378 if (opts
->x_debug_info_level
== DINFO_LEVEL_NONE
)
1380 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
1382 if (opts
->x_write_symbols
== NO_DEBUG
)
1383 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
1386 opts
->x_debug_info_level
= DINFO_LEVEL_NONE
;
1389 if (!opts_set
->x_debug_nonbind_markers_p
)
1390 opts
->x_debug_nonbind_markers_p
1392 && opts
->x_debug_info_level
>= DINFO_LEVEL_NORMAL
1393 && dwarf_debuginfo_p (opts
)
1394 && !(opts
->x_flag_selective_scheduling
1395 || opts
->x_flag_selective_scheduling2
));
1397 /* We know which debug output will be used so we can set flag_var_tracking
1398 and flag_var_tracking_uninit if the user has not specified them. */
1399 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
1400 || !dwarf_debuginfo_p (opts
)
1401 /* We have not yet initialized debug hooks so match that to check
1402 whether we're only doing DWARF2_LINENO_DEBUGGING_INFO. */
1403 #ifndef DWARF2_DEBUGGING_INFO
1408 if ((opts_set
->x_flag_var_tracking
&& opts
->x_flag_var_tracking
== 1)
1409 || (opts_set
->x_flag_var_tracking_uninit
1410 && opts
->x_flag_var_tracking_uninit
== 1))
1412 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
1413 warning_at (UNKNOWN_LOCATION
, 0,
1414 "variable tracking requested, but useless unless "
1415 "producing debug info");
1417 warning_at (UNKNOWN_LOCATION
, 0,
1418 "variable tracking requested, but not supported "
1419 "by this debug format");
1421 opts
->x_flag_var_tracking
= 0;
1422 opts
->x_flag_var_tracking_uninit
= 0;
1423 opts
->x_flag_var_tracking_assignments
= 0;
1426 /* One could use EnabledBy, but it would lead to a circular dependency. */
1427 if (!opts_set
->x_flag_var_tracking_uninit
)
1428 opts
->x_flag_var_tracking_uninit
= opts
->x_flag_var_tracking
;
1430 if (!opts_set
->x_flag_var_tracking_assignments
)
1431 opts
->x_flag_var_tracking_assignments
1432 = (opts
->x_flag_var_tracking
1433 && !(opts
->x_flag_selective_scheduling
1434 || opts
->x_flag_selective_scheduling2
));
1436 if (opts
->x_flag_var_tracking_assignments_toggle
)
1437 opts
->x_flag_var_tracking_assignments
1438 = !opts
->x_flag_var_tracking_assignments
;
1440 if (opts
->x_flag_var_tracking_assignments
&& !opts
->x_flag_var_tracking
)
1441 opts
->x_flag_var_tracking
= opts
->x_flag_var_tracking_assignments
= -1;
1443 if (opts
->x_flag_var_tracking_assignments
1444 && (opts
->x_flag_selective_scheduling
1445 || opts
->x_flag_selective_scheduling2
))
1447 "var-tracking-assignments changes selective scheduling");
1449 if (opts
->x_flag_syntax_only
)
1451 opts
->x_write_symbols
= NO_DEBUG
;
1452 opts
->x_profile_flag
= 0;
1455 if (opts
->x_warn_strict_flex_arrays
)
1456 if (opts
->x_flag_strict_flex_arrays
== 0)
1458 opts
->x_warn_strict_flex_arrays
= 0;
1459 warning_at (UNKNOWN_LOCATION
, 0,
1460 "%<-Wstrict-flex-arrays%> is ignored when"
1461 " %<-fstrict-flex-arrays%> is not present");
1464 diagnose_options (opts
, opts_set
, loc
);
1467 /* The function diagnoses incompatible combinations for provided options
1468 (OPTS and OPTS_SET) at a given LOCation. The function is called both
1469 when command line is parsed (after the target optimization hook) and
1470 when an optimize/target attribute (or pragma) is used. */
1472 void diagnose_options (gcc_options
*opts
, gcc_options
*opts_set
,
1475 /* The optimization to partition hot and cold basic blocks into separate
1476 sections of the .o and executable files does not work (currently)
1477 with exception handling. This is because there is no support for
1478 generating unwind info. If opts->x_flag_exceptions is turned on
1479 we need to turn off the partitioning optimization. */
1481 enum unwind_info_type ui_except
1482 = targetm_common
.except_unwind_info (opts
);
1484 if (opts
->x_flag_exceptions
1485 && opts
->x_flag_reorder_blocks_and_partition
1486 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
1488 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1490 "%<-freorder-blocks-and-partition%> does not work "
1491 "with exceptions on this architecture");
1492 opts
->x_flag_reorder_blocks_and_partition
= 0;
1493 opts
->x_flag_reorder_blocks
= 1;
1496 /* If user requested unwind info, then turn off the partitioning
1499 if (opts
->x_flag_unwind_tables
1500 && !targetm_common
.unwind_tables_default
1501 && opts
->x_flag_reorder_blocks_and_partition
1502 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))
1504 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1506 "%<-freorder-blocks-and-partition%> does not support "
1507 "unwind info on this architecture");
1508 opts
->x_flag_reorder_blocks_and_partition
= 0;
1509 opts
->x_flag_reorder_blocks
= 1;
1512 /* If the target requested unwind info, then turn off the partitioning
1513 optimization with a different message. Likewise, if the target does not
1514 support named sections. */
1516 if (opts
->x_flag_reorder_blocks_and_partition
1517 && (!targetm_common
.have_named_sections
1518 || (opts
->x_flag_unwind_tables
1519 && targetm_common
.unwind_tables_default
1520 && (ui_except
== UI_SJLJ
|| ui_except
>= UI_TARGET
))))
1522 if (opts_set
->x_flag_reorder_blocks_and_partition
)
1524 "%<-freorder-blocks-and-partition%> does not work "
1525 "on this architecture");
1526 opts
->x_flag_reorder_blocks_and_partition
= 0;
1527 opts
->x_flag_reorder_blocks
= 1;
1533 #define LEFT_COLUMN 27
1535 /* Output ITEM, of length ITEM_WIDTH, in the left column,
1536 followed by word-wrapped HELP in a second column. */
1538 wrap_help (const char *help
,
1540 unsigned int item_width
,
1541 unsigned int columns
)
1543 unsigned int col_width
= LEFT_COLUMN
;
1544 unsigned int remaining
, room
, len
;
1546 remaining
= strlen (help
);
1550 room
= columns
- 3 - MAX (col_width
, item_width
);
1559 for (i
= 0; help
[i
]; i
++)
1561 if (i
>= room
&& len
!= remaining
)
1565 else if ((help
[i
] == '-' || help
[i
] == '/')
1566 && help
[i
+ 1] != ' '
1567 && i
> 0 && ISALPHA (help
[i
- 1]))
1572 printf (" %-*.*s %.*s\n", col_width
, item_width
, item
, len
, help
);
1574 while (help
[len
] == ' ')
1582 /* Data structure used to print list of valid option values. */
1584 class option_help_tuple
1587 option_help_tuple (int code
, vec
<const char *> values
):
1588 m_code (code
), m_values (values
)
1591 /* Code of an option. */
1594 /* List of possible values. */
1595 vec
<const char *> m_values
;
1598 /* Print help for a specific front-end, etc. */
1600 print_filtered_help (unsigned int include_flags
,
1601 unsigned int exclude_flags
,
1602 unsigned int any_flags
,
1603 unsigned int columns
,
1604 struct gcc_options
*opts
,
1605 unsigned int lang_mask
)
1610 bool displayed
= false;
1613 if (!opts
->x_help_printed
)
1614 opts
->x_help_printed
= XCNEWVAR (char, cl_options_count
);
1616 if (!opts
->x_help_enum_printed
)
1617 opts
->x_help_enum_printed
= XCNEWVAR (char, cl_enums_count
);
1619 auto_vec
<option_help_tuple
> help_tuples
;
1621 for (i
= 0; i
< cl_options_count
; i
++)
1623 const struct cl_option
*option
= cl_options
+ i
;
1628 if (include_flags
== 0
1629 || ((option
->flags
& include_flags
) != include_flags
))
1631 if ((option
->flags
& any_flags
) == 0)
1635 /* Skip unwanted switches. */
1636 if ((option
->flags
& exclude_flags
) != 0)
1639 /* The driver currently prints its own help text. */
1640 if ((option
->flags
& CL_DRIVER
) != 0
1641 && (option
->flags
& (((1U << cl_lang_count
) - 1)
1642 | CL_COMMON
| CL_TARGET
)) == 0)
1645 /* If an option contains a language specification,
1646 exclude it from common unless all languages are present. */
1647 if ((include_flags
& CL_COMMON
)
1648 && !(option
->flags
& CL_DRIVER
)
1649 && (option
->flags
& CL_LANG_ALL
)
1650 && (option
->flags
& CL_LANG_ALL
) != CL_LANG_ALL
)
1654 /* Skip switches that have already been printed. */
1655 if (opts
->x_help_printed
[i
])
1658 opts
->x_help_printed
[i
] = true;
1660 help
= option
->help
;
1663 if (exclude_flags
& CL_UNDOCUMENTED
)
1666 help
= undocumented_msg
;
1669 /* Get the translation. */
1672 if (option
->alias_target
< N_OPTS
1673 && cl_options
[option
->alias_target
].help
)
1675 const struct cl_option
*target
= cl_options
+ option
->alias_target
;
1676 if (option
->help
== NULL
)
1678 /* The option is undocumented but is an alias for an option that
1679 is documented. If the option has alias arguments, then its
1680 purpose is to provide certain arguments to the other option, so
1681 inform the reader of this. Otherwise, point the reader to the
1682 other option in preference to the former. */
1684 if (option
->alias_arg
)
1686 if (option
->neg_alias_arg
)
1687 snprintf (new_help
, sizeof new_help
,
1688 _("Same as %s%s (or, in negated form, %s%s)."),
1689 target
->opt_text
, option
->alias_arg
,
1690 target
->opt_text
, option
->neg_alias_arg
);
1692 snprintf (new_help
, sizeof new_help
,
1694 target
->opt_text
, option
->alias_arg
);
1697 snprintf (new_help
, sizeof new_help
,
1703 /* For documented options with aliases, mention the aliased
1704 option's name for reference. */
1705 snprintf (new_help
, sizeof new_help
,
1706 _("%s Same as %s."),
1707 help
, cl_options
[option
->alias_target
].opt_text
);
1713 if (option
->warn_message
)
1715 /* Mention that the use of the option will trigger a warning. */
1716 if (help
== new_help
)
1717 snprintf (new_help
+ strlen (new_help
),
1718 sizeof new_help
- strlen (new_help
),
1719 " %s", _(use_diagnosed_msg
));
1721 snprintf (new_help
, sizeof new_help
,
1722 "%s %s", help
, _(use_diagnosed_msg
));
1727 /* Find the gap between the name of the
1728 option and its descriptive text. */
1729 tab
= strchr (help
, '\t');
1738 opt
= option
->opt_text
;
1742 /* With the -Q option enabled we change the descriptive text associated
1743 with an option to be an indication of its current setting. */
1744 if (!opts
->x_quiet_flag
)
1746 void *flag_var
= option_flag_var (i
, opts
);
1748 if (len
< (LEFT_COLUMN
+ 2))
1749 strcpy (new_help
, "\t\t");
1751 strcpy (new_help
, "\t");
1753 /* Set to print whether the option is enabled or disabled,
1754 or, if it's an alias for another option, the name of
1755 the aliased option. */
1756 bool print_state
= false;
1758 if (flag_var
!= NULL
1759 && option
->var_type
!= CLVC_DEFER
)
1761 /* If OPTION is only available for a specific subset
1762 of languages other than this one, mention them. */
1763 bool avail_for_lang
= true;
1764 if (unsigned langset
= option
->flags
& CL_LANG_ALL
)
1766 if (!(langset
& lang_mask
))
1768 avail_for_lang
= false;
1769 strcat (new_help
, _("[available in "));
1770 for (unsigned i
= 0, n
= 0; (1U << i
) < CL_LANG_ALL
; ++i
)
1771 if (langset
& (1U << i
))
1774 strcat (new_help
, ", ");
1775 strcat (new_help
, lang_names
[i
]);
1777 strcat (new_help
, "]");
1780 if (!avail_for_lang
)
1781 ; /* Print nothing else if the option is not available
1782 in the current language. */
1783 else if (option
->flags
& CL_JOINED
)
1785 if (option
->var_type
== CLVC_STRING
)
1787 if (* (const char **) flag_var
!= NULL
)
1788 snprintf (new_help
+ strlen (new_help
),
1789 sizeof (new_help
) - strlen (new_help
),
1790 "%s", * (const char **) flag_var
);
1792 else if (option
->var_type
== CLVC_ENUM
)
1794 const struct cl_enum
*e
= &cl_enums
[option
->var_enum
];
1796 const char *arg
= NULL
;
1798 value
= e
->get (flag_var
);
1799 enum_value_to_arg (e
->values
, &arg
, value
, lang_mask
);
1801 arg
= _("[default]");
1802 snprintf (new_help
+ strlen (new_help
),
1803 sizeof (new_help
) - strlen (new_help
),
1808 if (option
->cl_host_wide_int
)
1809 sprintf (new_help
+ strlen (new_help
),
1810 _("%llu bytes"), (unsigned long long)
1811 *(unsigned HOST_WIDE_INT
*) flag_var
);
1813 sprintf (new_help
+ strlen (new_help
),
1814 "%i", * (int *) flag_var
);
1821 /* When there is no argument, print the option state only
1822 if the option takes no argument. */
1823 print_state
= !(option
->flags
& CL_JOINED
);
1827 if (option
->alias_target
< N_OPTS
1828 && option
->alias_target
!= OPT_SPECIAL_warn_removed
1829 && option
->alias_target
!= OPT_SPECIAL_ignore
1830 && option
->alias_target
!= OPT_SPECIAL_input_file
1831 && option
->alias_target
!= OPT_SPECIAL_program_name
1832 && option
->alias_target
!= OPT_SPECIAL_unknown
)
1834 const struct cl_option
*target
1835 = &cl_options
[option
->alias_target
];
1836 sprintf (new_help
+ strlen (new_help
), "%s%s",
1838 option
->alias_arg
? option
->alias_arg
: "");
1840 else if (option
->alias_target
== OPT_SPECIAL_ignore
)
1841 strcat (new_help
, ("[ignored]"));
1844 /* Print the state for an on/off option. */
1845 int ena
= option_enabled (i
, lang_mask
, opts
);
1847 strcat (new_help
, _("[enabled]"));
1849 strcat (new_help
, _("[disabled]"));
1856 if (option
->range_max
!= -1 && tab
== NULL
)
1859 snprintf (b
, sizeof (b
), "<%d,%d>", option
->range_min
,
1861 opt
= concat (opt
, b
, NULL
);
1865 wrap_help (help
, opt
, len
, columns
);
1868 if (option
->var_type
== CLVC_ENUM
1869 && opts
->x_help_enum_printed
[option
->var_enum
] != 2)
1870 opts
->x_help_enum_printed
[option
->var_enum
] = 1;
1873 vec
<const char *> option_values
1874 = targetm_common
.get_valid_option_values (i
, NULL
);
1875 if (!option_values
.is_empty ())
1876 help_tuples
.safe_push (option_help_tuple (i
, option_values
));
1882 unsigned int langs
= include_flags
& CL_LANG_ALL
;
1885 printf (_(" No options with the desired characteristics were found\n"));
1890 /* PR 31349: Tell the user how to see all of the
1891 options supported by a specific front end. */
1892 for (i
= 0; (1U << i
) < CL_LANG_ALL
; i
++)
1893 if ((1U << i
) & langs
)
1894 printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
1895 lang_names
[i
], lang_names
[i
]);
1899 else if (! displayed
)
1900 printf (_(" All options with the desired characteristics have already been displayed\n"));
1904 /* Print details of enumerated option arguments, if those
1905 enumerations have help text headings provided. If no help text
1906 is provided, presume that the possible values are listed in the
1907 help text for the relevant options. */
1908 for (i
= 0; i
< cl_enums_count
; i
++)
1910 unsigned int j
, pos
;
1912 if (opts
->x_help_enum_printed
[i
] != 1)
1914 if (cl_enums
[i
].help
== NULL
)
1916 printf (" %s\n ", _(cl_enums
[i
].help
));
1918 for (j
= 0; cl_enums
[i
].values
[j
].arg
!= NULL
; j
++)
1920 unsigned int len
= strlen (cl_enums
[i
].values
[j
].arg
);
1922 if (pos
> 4 && pos
+ 1 + len
<= columns
)
1924 printf (" %s", cl_enums
[i
].values
[j
].arg
);
1934 printf ("%s", cl_enums
[i
].values
[j
].arg
);
1939 opts
->x_help_enum_printed
[i
] = 2;
1942 for (unsigned i
= 0; i
< help_tuples
.length (); i
++)
1944 const struct cl_option
*option
= cl_options
+ help_tuples
[i
].m_code
;
1945 printf (_(" Known valid arguments for %s option:\n "),
1947 for (unsigned j
= 0; j
< help_tuples
[i
].m_values
.length (); j
++)
1948 printf (" %s", help_tuples
[i
].m_values
[j
]);
1953 /* Display help for a specified type of option.
1954 The options must have ALL of the INCLUDE_FLAGS set
1955 ANY of the flags in the ANY_FLAGS set
1956 and NONE of the EXCLUDE_FLAGS set. The current option state is in
1957 OPTS; LANG_MASK is used for interpreting enumerated option state. */
1959 print_specific_help (unsigned int include_flags
,
1960 unsigned int exclude_flags
,
1961 unsigned int any_flags
,
1962 struct gcc_options
*opts
,
1963 unsigned int lang_mask
)
1965 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
1966 const char * description
= NULL
;
1967 const char * descrip_extra
= "";
1971 /* Sanity check: Make sure that we do not have more
1972 languages than we have bits available to enumerate them. */
1973 gcc_assert ((1U << cl_lang_count
) <= CL_MIN_OPTION_CLASS
);
1975 /* If we have not done so already, obtain
1976 the desired maximum width of the output. */
1977 if (opts
->x_help_columns
== 0)
1979 opts
->x_help_columns
= get_terminal_width ();
1980 if (opts
->x_help_columns
== INT_MAX
)
1981 /* Use a reasonable default. */
1982 opts
->x_help_columns
= 80;
1985 /* Decide upon the title for the options that we are going to display. */
1986 for (i
= 0, flag
= 1; flag
<= CL_MAX_OPTION_CLASS
; flag
<<= 1, i
++)
1988 switch (flag
& include_flags
)
1995 description
= _("The following options are target specific");
1998 description
= _("The following options control compiler warning messages");
2000 case CL_OPTIMIZATION
:
2001 description
= _("The following options control optimizations");
2004 description
= _("The following options are language-independent");
2007 description
= _("The following options control parameters");
2010 if (i
>= cl_lang_count
)
2012 if (exclude_flags
& all_langs_mask
)
2013 description
= _("The following options are specific to just the language ");
2015 description
= _("The following options are supported by the language ");
2016 descrip_extra
= lang_names
[i
];
2021 if (description
== NULL
)
2025 if (include_flags
& CL_UNDOCUMENTED
)
2026 description
= _("The following options are not documented");
2027 else if (include_flags
& CL_SEPARATE
)
2028 description
= _("The following options take separate arguments");
2029 else if (include_flags
& CL_JOINED
)
2030 description
= _("The following options take joined arguments");
2033 internal_error ("unrecognized %<include_flags 0x%x%> passed "
2034 "to %<print_specific_help%>",
2041 if (any_flags
& all_langs_mask
)
2042 description
= _("The following options are language-related");
2044 description
= _("The following options are language-independent");
2048 printf ("%s%s:\n", description
, descrip_extra
);
2049 print_filtered_help (include_flags
, exclude_flags
, any_flags
,
2050 opts
->x_help_columns
, opts
, lang_mask
);
2053 /* Enable FDO-related flags. */
2056 enable_fdo_optimizations (struct gcc_options
*opts
,
2057 struct gcc_options
*opts_set
,
2060 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_branch_probabilities
, value
);
2061 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
2062 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_loops
, value
);
2063 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_peel_loops
, value
);
2064 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tracer
, value
);
2065 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_value_profile_transformations
,
2067 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
2068 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp
, value
);
2071 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_cp_clone
, 1);
2072 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, 1);
2074 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_predictive_commoning
, value
);
2075 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_split_loops
, value
);
2076 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unswitch_loops
, value
);
2077 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_gcse_after_reload
, value
);
2078 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_vectorize
, value
);
2079 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_slp_vectorize
, value
);
2080 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_version_loops_for_strides
, value
);
2081 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_vect_cost_model
,
2082 VECT_COST_MODEL_DYNAMIC
);
2083 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribute_patterns
,
2085 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_loop_interchange
, value
);
2086 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_unroll_jam
, value
);
2087 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_tree_loop_distribution
, value
);
2090 /* -f{,no-}sanitize{,-recover}= suboptions. */
2091 const struct sanitizer_opts_s sanitizer_opts
[] =
2093 #define SANITIZER_OPT(name, flags, recover, trap) \
2094 { #name, flags, sizeof #name - 1, recover, trap }
2095 SANITIZER_OPT (address
, (SANITIZE_ADDRESS
| SANITIZE_USER_ADDRESS
), true,
2097 SANITIZER_OPT (hwaddress
, (SANITIZE_HWADDRESS
| SANITIZE_USER_HWADDRESS
),
2099 SANITIZER_OPT (kernel
-address
, (SANITIZE_ADDRESS
| SANITIZE_KERNEL_ADDRESS
),
2101 SANITIZER_OPT (kernel
-hwaddress
,
2102 (SANITIZE_HWADDRESS
| SANITIZE_KERNEL_HWADDRESS
),
2104 SANITIZER_OPT (pointer
-compare
, SANITIZE_POINTER_COMPARE
, true, false),
2105 SANITIZER_OPT (pointer
-subtract
, SANITIZE_POINTER_SUBTRACT
, true, false),
2106 SANITIZER_OPT (thread
, SANITIZE_THREAD
, false, false),
2107 SANITIZER_OPT (leak
, SANITIZE_LEAK
, false, false),
2108 SANITIZER_OPT (shift
, SANITIZE_SHIFT
, true, true),
2109 SANITIZER_OPT (shift
-base
, SANITIZE_SHIFT_BASE
, true, true),
2110 SANITIZER_OPT (shift
-exponent
, SANITIZE_SHIFT_EXPONENT
, true, true),
2111 SANITIZER_OPT (integer
-divide
-by
-zero
, SANITIZE_DIVIDE
, true, true),
2112 SANITIZER_OPT (undefined
, SANITIZE_UNDEFINED
, true, true),
2113 SANITIZER_OPT (unreachable
, SANITIZE_UNREACHABLE
, false, true),
2114 SANITIZER_OPT (vla
-bound
, SANITIZE_VLA
, true, true),
2115 SANITIZER_OPT (return, SANITIZE_RETURN
, false, true),
2116 SANITIZER_OPT (null
, SANITIZE_NULL
, true, true),
2117 SANITIZER_OPT (signed-integer
-overflow
, SANITIZE_SI_OVERFLOW
, true, true),
2118 SANITIZER_OPT (bool, SANITIZE_BOOL
, true, true),
2119 SANITIZER_OPT (enum, SANITIZE_ENUM
, true, true),
2120 SANITIZER_OPT (float-divide
-by
-zero
, SANITIZE_FLOAT_DIVIDE
, true, true),
2121 SANITIZER_OPT (float-cast
-overflow
, SANITIZE_FLOAT_CAST
, true, true),
2122 SANITIZER_OPT (bounds
, SANITIZE_BOUNDS
, true, true),
2123 SANITIZER_OPT (bounds
-strict
, SANITIZE_BOUNDS
| SANITIZE_BOUNDS_STRICT
, true,
2125 SANITIZER_OPT (alignment
, SANITIZE_ALIGNMENT
, true, true),
2126 SANITIZER_OPT (nonnull
-attribute
, SANITIZE_NONNULL_ATTRIBUTE
, true, true),
2127 SANITIZER_OPT (returns
-nonnull
-attribute
, SANITIZE_RETURNS_NONNULL_ATTRIBUTE
,
2129 SANITIZER_OPT (object
-size
, SANITIZE_OBJECT_SIZE
, true, true),
2130 SANITIZER_OPT (vptr
, SANITIZE_VPTR
, true, false),
2131 SANITIZER_OPT (pointer
-overflow
, SANITIZE_POINTER_OVERFLOW
, true, true),
2132 SANITIZER_OPT (builtin
, SANITIZE_BUILTIN
, true, true),
2133 SANITIZER_OPT (shadow
-call
-stack
, SANITIZE_SHADOW_CALL_STACK
, false, false),
2134 SANITIZER_OPT (all
, ~0U, true, true),
2135 #undef SANITIZER_OPT
2136 { NULL
, 0U, 0UL, false, false }
2139 /* -fzero-call-used-regs= suboptions. */
2140 const struct zero_call_used_regs_opts_s zero_call_used_regs_opts
[] =
2142 #define ZERO_CALL_USED_REGS_OPT(name, flags) \
2144 ZERO_CALL_USED_REGS_OPT (skip
, zero_regs_flags::SKIP
),
2145 ZERO_CALL_USED_REGS_OPT (used
-gpr
-arg
, zero_regs_flags::USED_GPR_ARG
),
2146 ZERO_CALL_USED_REGS_OPT (used
-gpr
, zero_regs_flags::USED_GPR
),
2147 ZERO_CALL_USED_REGS_OPT (used
-arg
, zero_regs_flags::USED_ARG
),
2148 ZERO_CALL_USED_REGS_OPT (used
, zero_regs_flags::USED
),
2149 ZERO_CALL_USED_REGS_OPT (all
-gpr
-arg
, zero_regs_flags::ALL_GPR_ARG
),
2150 ZERO_CALL_USED_REGS_OPT (all
-gpr
, zero_regs_flags::ALL_GPR
),
2151 ZERO_CALL_USED_REGS_OPT (all
-arg
, zero_regs_flags::ALL_ARG
),
2152 ZERO_CALL_USED_REGS_OPT (all
, zero_regs_flags::ALL
),
2153 ZERO_CALL_USED_REGS_OPT (leafy
-gpr
-arg
, zero_regs_flags::LEAFY_GPR_ARG
),
2154 ZERO_CALL_USED_REGS_OPT (leafy
-gpr
, zero_regs_flags::LEAFY_GPR
),
2155 ZERO_CALL_USED_REGS_OPT (leafy
-arg
, zero_regs_flags::LEAFY_ARG
),
2156 ZERO_CALL_USED_REGS_OPT (leafy
, zero_regs_flags::LEAFY
),
2157 #undef ZERO_CALL_USED_REGS_OPT
2161 /* A struct for describing a run of chars within a string. */
2163 class string_fragment
2166 string_fragment (const char *start
, size_t len
)
2167 : m_start (start
), m_len (len
) {}
2169 const char *m_start
;
2173 /* Specialization of edit_distance_traits for string_fragment,
2174 for use by get_closest_sanitizer_option. */
2177 struct edit_distance_traits
<const string_fragment
&>
2179 static size_t get_length (const string_fragment
&fragment
)
2181 return fragment
.m_len
;
2184 static const char *get_string (const string_fragment
&fragment
)
2186 return fragment
.m_start
;
2190 /* Given ARG, an unrecognized sanitizer option, return the best
2191 matching sanitizer option, or NULL if there isn't one.
2192 OPTS is array of candidate sanitizer options.
2193 CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or OPT_fsanitize_trap_.
2194 VALUE is non-zero for the regular form of the option, zero
2195 for the "no-" form (e.g. "-fno-sanitize-recover="). */
2198 get_closest_sanitizer_option (const string_fragment
&arg
,
2199 const struct sanitizer_opts_s
*opts
,
2200 enum opt_code code
, int value
)
2202 best_match
<const string_fragment
&, const char*> bm (arg
);
2203 for (int i
= 0; opts
[i
].name
!= NULL
; ++i
)
2205 /* -fsanitize=all is not valid, so don't offer it. */
2206 if (code
== OPT_fsanitize_
2207 && opts
[i
].flag
== ~0U
2211 /* For -fsanitize-recover= (and not -fno-sanitize-recover=),
2212 don't offer the non-recoverable options. */
2213 if (code
== OPT_fsanitize_recover_
2214 && !opts
[i
].can_recover
2218 /* For -fsanitize-trap= (and not -fno-sanitize-trap=),
2219 don't offer the non-trapping options. */
2220 if (code
== OPT_fsanitize_trap_
2221 && !opts
[i
].can_trap
2225 bm
.consider (opts
[i
].name
);
2227 return bm
.get_best_meaningful_candidate ();
2230 /* Parse comma separated sanitizer suboptions from P for option SCODE,
2231 adjust previous FLAGS and return new ones. If COMPLAIN is false,
2232 don't issue diagnostics. */
2235 parse_sanitizer_options (const char *p
, location_t loc
, int scode
,
2236 unsigned int flags
, int value
, bool complain
)
2238 enum opt_code code
= (enum opt_code
) scode
;
2244 const char *comma
= strchr (p
, ',');
2256 /* Check to see if the string matches an option class name. */
2257 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
2258 if (len
== sanitizer_opts
[i
].len
2259 && memcmp (p
, sanitizer_opts
[i
].name
, len
) == 0)
2261 /* Handle both -fsanitize and -fno-sanitize cases. */
2262 if (value
&& sanitizer_opts
[i
].flag
== ~0U)
2264 if (code
== OPT_fsanitize_
)
2267 error_at (loc
, "%<-fsanitize=all%> option is not valid");
2269 else if (code
== OPT_fsanitize_recover_
)
2270 flags
|= ~(SANITIZE_THREAD
| SANITIZE_LEAK
2271 | SANITIZE_UNREACHABLE
| SANITIZE_RETURN
2272 | SANITIZE_SHADOW_CALL_STACK
);
2273 else /* if (code == OPT_fsanitize_trap_) */
2274 flags
|= (SANITIZE_UNDEFINED
2275 | SANITIZE_UNDEFINED_NONDEFAULT
);
2279 /* Do not enable -fsanitize-recover=unreachable and
2280 -fsanitize-recover=return if -fsanitize-recover=undefined
2282 if (code
== OPT_fsanitize_recover_
2283 && sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
2284 flags
|= (SANITIZE_UNDEFINED
2285 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
));
2286 else if (code
== OPT_fsanitize_trap_
2287 && sanitizer_opts
[i
].flag
== SANITIZE_VPTR
)
2288 error_at (loc
, "%<-fsanitize-trap=%s%> is not supported",
2289 sanitizer_opts
[i
].name
);
2291 flags
|= sanitizer_opts
[i
].flag
;
2295 flags
&= ~sanitizer_opts
[i
].flag
;
2296 /* Don't always clear SANITIZE_ADDRESS if it was previously
2297 set: -fsanitize=address -fno-sanitize=kernel-address should
2298 leave SANITIZE_ADDRESS set. */
2299 if (flags
& (SANITIZE_KERNEL_ADDRESS
| SANITIZE_USER_ADDRESS
))
2300 flags
|= SANITIZE_ADDRESS
;
2306 if (! found
&& complain
)
2309 = get_closest_sanitizer_option (string_fragment (p
, len
),
2310 sanitizer_opts
, code
, value
);
2313 if (code
== OPT_fsanitize_recover_
)
2314 suffix
= "-recover";
2315 else if (code
== OPT_fsanitize_trap_
)
2322 "unrecognized argument to %<-f%ssanitize%s=%> "
2323 "option: %q.*s; did you mean %qs?",
2325 suffix
, (int) len
, p
, hint
);
2328 "unrecognized argument to %<-f%ssanitize%s=%> option: "
2329 "%q.*s", value
? "" : "no-",
2330 suffix
, (int) len
, p
);
2340 /* Parse string values of no_sanitize attribute passed in VALUE.
2341 Values are separated with comma. */
2344 parse_no_sanitize_attribute (char *value
)
2346 unsigned int flags
= 0;
2348 char *q
= strtok (value
, ",");
2352 for (i
= 0; sanitizer_opts
[i
].name
!= NULL
; ++i
)
2353 if (strcmp (sanitizer_opts
[i
].name
, q
) == 0)
2355 flags
|= sanitizer_opts
[i
].flag
;
2356 if (sanitizer_opts
[i
].flag
== SANITIZE_UNDEFINED
)
2357 flags
|= SANITIZE_UNDEFINED_NONDEFAULT
;
2361 if (sanitizer_opts
[i
].name
== NULL
)
2362 warning (OPT_Wattributes
,
2363 "%qs attribute directive ignored", q
);
2365 q
= strtok (NULL
, ",");
2371 /* Parse -fzero-call-used-regs suboptions from ARG, return the FLAGS. */
2374 parse_zero_call_used_regs_options (const char *arg
)
2376 unsigned int flags
= 0;
2378 /* Check to see if the string matches a sub-option name. */
2379 for (unsigned int i
= 0; zero_call_used_regs_opts
[i
].name
!= NULL
; ++i
)
2380 if (strcmp (arg
, zero_call_used_regs_opts
[i
].name
) == 0)
2382 flags
= zero_call_used_regs_opts
[i
].flag
;
2387 error ("unrecognized argument to %<-fzero-call-used-regs=%>: %qs", arg
);
2392 /* Parse -falign-NAME format for a FLAG value. Return individual
2393 parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
2394 set, print error message at LOC location. */
2397 parse_and_check_align_values (const char *flag
,
2399 auto_vec
<unsigned> &result_values
,
2403 char *str
= xstrdup (flag
);
2404 for (char *p
= strtok (str
, ":"); p
; p
= strtok (NULL
, ":"))
2407 int v
= strtol (p
, &end
, 10);
2408 if (*end
!= '\0' || v
< 0)
2411 error_at (loc
, "invalid arguments for %<-falign-%s%> option: %qs",
2417 result_values
.safe_push ((unsigned)v
);
2422 /* Check that we have a correct number of values. */
2423 if (result_values
.is_empty () || result_values
.length () > 4)
2426 error_at (loc
, "invalid number of arguments for %<-falign-%s%> "
2427 "option: %qs", name
, flag
);
2431 for (unsigned i
= 0; i
< result_values
.length (); i
++)
2432 if (result_values
[i
] > MAX_CODE_ALIGN_VALUE
)
2435 error_at (loc
, "%<-falign-%s%> is not between 0 and %d",
2436 name
, MAX_CODE_ALIGN_VALUE
);
2443 /* Check that alignment value FLAG for -falign-NAME is valid at a given
2444 location LOC. OPT_STR points to the stored -falign-NAME=argument and
2445 OPT_FLAG points to the associated -falign-NAME on/off flag. */
2448 check_alignment_argument (location_t loc
, const char *flag
, const char *name
,
2449 int *opt_flag
, const char **opt_str
)
2451 auto_vec
<unsigned> align_result
;
2452 parse_and_check_align_values (flag
, name
, align_result
, true, loc
);
2454 if (align_result
.length() >= 1 && align_result
[0] == 0)
2461 /* Parse argument of -fpatchable-function-entry option ARG and store
2462 corresponding values to PATCH_AREA_SIZE and PATCH_AREA_START.
2463 If REPORT_ERROR is set to true, generate error for a problematic
2464 option arguments. */
2467 parse_and_check_patch_area (const char *arg
, bool report_error
,
2468 HOST_WIDE_INT
*patch_area_size
,
2469 HOST_WIDE_INT
*patch_area_start
)
2471 *patch_area_size
= 0;
2472 *patch_area_start
= 0;
2477 char *patch_area_arg
= xstrdup (arg
);
2478 char *comma
= strchr (patch_area_arg
, ',');
2482 *patch_area_size
= integral_argument (patch_area_arg
);
2483 *patch_area_start
= integral_argument (comma
+ 1);
2486 *patch_area_size
= integral_argument (patch_area_arg
);
2488 if (*patch_area_size
< 0
2489 || *patch_area_size
> USHRT_MAX
2490 || *patch_area_start
< 0
2491 || *patch_area_start
> USHRT_MAX
2492 || *patch_area_size
< *patch_area_start
)
2494 error ("invalid arguments for %<-fpatchable-function-entry%>");
2496 free (patch_area_arg
);
2499 /* Print options enabled by -fhardened. Keep this in sync with the manual! */
2502 print_help_hardened ()
2504 printf ("%s\n", "The following options are enabled by -fhardened:");
2505 /* Unfortunately, I can't seem to use targetm.fortify_source_default_level
2507 printf (" %s\n", "-D_FORTIFY_SOURCE=3 (or =2 for glibc < 2.35)");
2508 printf (" %s\n", "-D_GLIBCXX_ASSERTIONS");
2509 printf (" %s\n", "-ftrivial-auto-var-init=zero");
2511 printf (" %s %s\n", "-fPIE", "-pie");
2513 if (HAVE_LD_NOW_SUPPORT
)
2514 printf (" %s\n", "-Wl,-z,now");
2515 if (HAVE_LD_RELRO_SUPPORT
)
2516 printf (" %s\n", "-Wl,-z,relro");
2517 printf (" %s\n", "-fstack-protector-strong");
2518 printf (" %s\n", "-fstack-clash-protection");
2519 printf (" %s\n", "-fcf-protection=full");
2523 /* Print help when OPT__help_ is set. */
2526 print_help (struct gcc_options
*opts
, unsigned int lang_mask
,
2527 const char *help_option_argument
)
2529 const char *a
= help_option_argument
;
2530 unsigned int include_flags
= 0;
2531 /* Note - by default we include undocumented options when listing
2532 specific classes. If you only want to see documented options
2533 then add ",^undocumented" to the --help= option. E.g.:
2535 --help=target,^undocumented */
2536 unsigned int exclude_flags
= 0;
2538 if (lang_mask
== CL_DRIVER
)
2541 /* Walk along the argument string, parsing each word in turn.
2543 arg = [^]{word}[,{arg}]
2544 word = {optimizers|target|warnings|undocumented|
2545 params|common|<language>} */
2555 { "optimizers", CL_OPTIMIZATION
},
2556 { "target", CL_TARGET
},
2557 { "warnings", CL_WARNING
},
2558 { "undocumented", CL_UNDOCUMENTED
},
2559 { "params", CL_PARAMS
},
2560 { "joined", CL_JOINED
},
2561 { "separate", CL_SEPARATE
},
2562 { "common", CL_COMMON
},
2565 unsigned int *pflags
;
2567 unsigned int lang_flag
, specific_flag
;
2576 error ("missing argument to %qs", "--help=^");
2579 pflags
= &exclude_flags
;
2582 pflags
= &include_flags
;
2584 comma
= strchr (a
, ',');
2595 /* Check to see if the string matches an option class name. */
2596 for (i
= 0, specific_flag
= 0; specifics
[i
].string
!= NULL
; i
++)
2597 if (strncasecmp (a
, specifics
[i
].string
, len
) == 0)
2599 specific_flag
= specifics
[i
].flag
;
2603 /* Check to see if the string matches a language name.
2604 Note - we rely upon the alpha-sorted nature of the entries in
2605 the lang_names array, specifically that shorter names appear
2606 before their longer variants. (i.e. C before C++). That way
2607 when we are attempting to match --help=c for example we will
2608 match with C first and not C++. */
2609 for (i
= 0, lang_flag
= 0; i
< cl_lang_count
; i
++)
2610 if (strncasecmp (a
, lang_names
[i
], len
) == 0)
2612 lang_flag
= 1U << i
;
2616 if (specific_flag
!= 0)
2619 *pflags
|= specific_flag
;
2622 /* The option's argument matches both the start of a
2623 language name and the start of an option class name.
2624 We have a special case for when the user has
2625 specified "--help=c", but otherwise we have to issue
2627 if (strncasecmp (a
, "c", len
) == 0)
2628 *pflags
|= lang_flag
;
2631 "%<--help%> argument %q.*s is ambiguous, "
2632 "please be more specific",
2636 else if (lang_flag
!= 0)
2637 *pflags
|= lang_flag
;
2638 else if (strncasecmp (a
, "hardened", len
) == 0)
2639 print_help_hardened ();
2642 "unrecognized argument to %<--help=%> option: %q.*s",
2650 /* We started using PerFunction/Optimization for parameters and
2651 a warning. We should exclude these from optimization options. */
2652 if (include_flags
& CL_OPTIMIZATION
)
2653 exclude_flags
|= CL_WARNING
;
2654 if (!(include_flags
& CL_PARAMS
))
2655 exclude_flags
|= CL_PARAMS
;
2658 print_specific_help (include_flags
, exclude_flags
, 0, opts
,
2662 /* Handle target- and language-independent options. Return zero to
2663 generate an "unknown option" message. Only options that need
2664 extra handling need to be listed here; if you simply want
2665 DECODED->value assigned to a variable, it happens automatically. */
2668 common_handle_option (struct gcc_options
*opts
,
2669 struct gcc_options
*opts_set
,
2670 const struct cl_decoded_option
*decoded
,
2671 unsigned int lang_mask
, int kind ATTRIBUTE_UNUSED
,
2673 const struct cl_option_handlers
*handlers
,
2674 diagnostic_context
*dc
,
2675 void (*target_option_override_hook
) (void))
2677 size_t scode
= decoded
->opt_index
;
2678 const char *arg
= decoded
->arg
;
2679 HOST_WIDE_INT value
= decoded
->value
;
2680 enum opt_code code
= (enum opt_code
) scode
;
2682 gcc_assert (decoded
->canonical_option_num_elements
<= 2);
2688 unsigned int all_langs_mask
= (1U << cl_lang_count
) - 1;
2689 unsigned int undoc_mask
;
2692 if (lang_mask
== CL_DRIVER
)
2695 undoc_mask
= ((opts
->x_verbose_flag
| opts
->x_extra_warnings
)
2698 target_option_override_hook ();
2699 /* First display any single language specific options. */
2700 for (i
= 0; i
< cl_lang_count
; i
++)
2702 (1U << i
, (all_langs_mask
& (~ (1U << i
))) | undoc_mask
, 0, opts
,
2704 /* Next display any multi language specific options. */
2705 print_specific_help (0, undoc_mask
, all_langs_mask
, opts
, lang_mask
);
2706 /* Then display any remaining, non-language options. */
2707 for (i
= CL_MIN_OPTION_CLASS
; i
<= CL_MAX_OPTION_CLASS
; i
<<= 1)
2709 print_specific_help (i
, undoc_mask
, 0, opts
, lang_mask
);
2710 opts
->x_exit_after_options
= true;
2714 case OPT__target_help
:
2715 if (lang_mask
== CL_DRIVER
)
2718 target_option_override_hook ();
2719 print_specific_help (CL_TARGET
, 0, 0, opts
, lang_mask
);
2720 opts
->x_exit_after_options
= true;
2725 help_option_arguments
.safe_push (arg
);
2726 opts
->x_exit_after_options
= true;
2731 if (lang_mask
== CL_DRIVER
)
2734 opts
->x_exit_after_options
= true;
2737 case OPT__completion_
:
2740 case OPT_fsanitize_
:
2741 opts_set
->x_flag_sanitize
= true;
2742 opts
->x_flag_sanitize
2743 = parse_sanitizer_options (arg
, loc
, code
,
2744 opts
->x_flag_sanitize
, value
, true);
2746 /* Kernel ASan implies normal ASan but does not yet support
2748 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_ADDRESS
)
2750 SET_OPTION_IF_UNSET (opts
, opts_set
,
2751 param_asan_instrumentation_with_call_threshold
,
2753 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_globals
, 0);
2754 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_stack
, 0);
2755 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_protect_allocas
, 0);
2756 SET_OPTION_IF_UNSET (opts
, opts_set
, param_asan_use_after_return
, 0);
2758 if (opts
->x_flag_sanitize
& SANITIZE_KERNEL_HWADDRESS
)
2760 SET_OPTION_IF_UNSET (opts
, opts_set
,
2761 param_hwasan_instrument_stack
, 0);
2762 SET_OPTION_IF_UNSET (opts
, opts_set
,
2763 param_hwasan_random_frame_tag
, 0);
2764 SET_OPTION_IF_UNSET (opts
, opts_set
,
2765 param_hwasan_instrument_allocas
, 0);
2769 case OPT_fsanitize_recover_
:
2770 opts
->x_flag_sanitize_recover
2771 = parse_sanitizer_options (arg
, loc
, code
,
2772 opts
->x_flag_sanitize_recover
, value
, true);
2775 case OPT_fsanitize_trap_
:
2776 opts
->x_flag_sanitize_trap
2777 = parse_sanitizer_options (arg
, loc
, code
,
2778 opts
->x_flag_sanitize_trap
, value
, true);
2781 case OPT_fasan_shadow_offset_
:
2785 case OPT_fsanitize_address_use_after_scope
:
2786 opts
->x_flag_sanitize_address_use_after_scope
= value
;
2789 case OPT_fsanitize_recover
:
2791 opts
->x_flag_sanitize_recover
2792 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
)
2793 & ~(SANITIZE_UNREACHABLE
| SANITIZE_RETURN
);
2795 opts
->x_flag_sanitize_recover
2796 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2799 case OPT_fsanitize_trap
:
2801 opts
->x_flag_sanitize_trap
2802 |= (SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2804 opts
->x_flag_sanitize_trap
2805 &= ~(SANITIZE_UNDEFINED
| SANITIZE_UNDEFINED_NONDEFAULT
);
2813 /* Currently handled in a prescan. */
2816 case OPT_Wattributes_
:
2817 if (lang_mask
== CL_DRIVER
)
2822 error_at (loc
, "arguments ignored for %<-Wattributes=%>; use "
2823 "%<-Wno-attributes=%> instead");
2826 else if (arg
[strlen (arg
) - 1] == ',')
2828 error_at (loc
, "trailing %<,%> in arguments for "
2829 "%<-Wno-attributes=%>");
2833 add_comma_separated_to_vector (&opts
->x_flag_ignored_attributes
, arg
);
2837 dc
->set_warning_as_error_requested (value
);
2841 if (lang_mask
== CL_DRIVER
)
2844 enable_warning_as_error (arg
, value
, lang_mask
, handlers
,
2845 opts
, opts_set
, loc
, dc
);
2848 case OPT_Wfatal_errors
:
2849 dc
->m_fatal_errors
= value
;
2852 case OPT_Wstack_usage_
:
2853 opts
->x_flag_stack_usage_info
= value
!= -1;
2856 case OPT_Wstrict_aliasing
:
2857 set_Wstrict_aliasing (opts
, value
);
2860 case OPT_Wstrict_overflow
:
2861 opts
->x_warn_strict_overflow
= (value
2862 ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
2866 case OPT_Wsystem_headers
:
2867 dc
->m_warn_system_headers
= value
;
2871 opts
->x_flag_gen_aux_info
= 1;
2875 decode_d_option (arg
, opts
, loc
, dc
);
2878 case OPT_fcall_used_
:
2879 case OPT_fcall_saved_
:
2887 case OPT_fdebug_prefix_map_
:
2888 case OPT_ffile_prefix_map_
:
2889 case OPT_fprofile_prefix_map_
:
2893 case OPT_fcanon_prefix_map
:
2894 flag_canon_prefix_map
= value
;
2897 case OPT_fcallgraph_info
:
2898 opts
->x_flag_callgraph_info
= CALLGRAPH_INFO_NAKED
;
2901 case OPT_fcallgraph_info_
:
2904 my_arg
= xstrdup (arg
);
2905 p
= strtok (my_arg
, ",");
2908 if (strcmp (p
, "su") == 0)
2910 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_STACK_USAGE
;
2911 opts
->x_flag_stack_usage_info
= true;
2913 else if (strcmp (p
, "da") == 0)
2914 opts
->x_flag_callgraph_info
|= CALLGRAPH_INFO_DYNAMIC_ALLOC
;
2917 p
= strtok (NULL
, ",");
2923 case OPT_fdiagnostics_show_location_
:
2924 diagnostic_prefixing_rule (dc
) = (diagnostic_prefixing_rule_t
) value
;
2927 case OPT_fdiagnostics_show_caret
:
2928 dc
->m_source_printing
.enabled
= value
;
2931 case OPT_fdiagnostics_show_labels
:
2932 dc
->m_source_printing
.show_labels_p
= value
;
2935 case OPT_fdiagnostics_show_line_numbers
:
2936 dc
->m_source_printing
.show_line_numbers_p
= value
;
2939 case OPT_fdiagnostics_color_
:
2940 diagnostic_color_init (dc
, value
);
2943 case OPT_fdiagnostics_urls_
:
2944 diagnostic_urls_init (dc
, value
);
2947 case OPT_fdiagnostics_format_
:
2949 const char *basename
= (opts
->x_dump_base_name
? opts
->x_dump_base_name
2950 : opts
->x_main_input_basename
);
2951 diagnostic_output_format_init (dc
, basename
,
2952 (enum diagnostics_output_format
)value
,
2953 opts
->x_flag_diagnostics_json_formatting
);
2957 case OPT_fdiagnostics_text_art_charset_
:
2958 dc
->set_text_art_charset ((enum diagnostic_text_art_charset
)value
);
2961 case OPT_fdiagnostics_parseable_fixits
:
2962 dc
->set_extra_output_kind (value
2963 ? EXTRA_DIAGNOSTIC_OUTPUT_fixits_v1
2964 : EXTRA_DIAGNOSTIC_OUTPUT_none
);
2967 case OPT_fdiagnostics_column_unit_
:
2968 dc
->m_column_unit
= (enum diagnostics_column_unit
)value
;
2971 case OPT_fdiagnostics_column_origin_
:
2972 dc
->m_column_origin
= value
;
2975 case OPT_fdiagnostics_escape_format_
:
2976 dc
->set_escape_format ((enum diagnostics_escape_format
)value
);
2979 case OPT_fdiagnostics_show_cwe
:
2980 dc
->set_show_cwe (value
);
2983 case OPT_fdiagnostics_show_rules
:
2984 dc
->set_show_rules (value
);
2987 case OPT_fdiagnostics_path_format_
:
2988 dc
->set_path_format ((enum diagnostic_path_format
)value
);
2991 case OPT_fdiagnostics_show_path_depths
:
2992 dc
->set_show_path_depths (value
);
2995 case OPT_fdiagnostics_show_option
:
2996 dc
->set_show_option_requested (value
);
2999 case OPT_fdiagnostics_minimum_margin_width_
:
3000 dc
->m_source_printing
.min_margin_width
= value
;
3007 case OPT_ffast_math
:
3008 set_fast_math_flags (opts
, value
);
3011 case OPT_funsafe_math_optimizations
:
3012 set_unsafe_math_optimizations_flags (opts
, value
);
3019 case OPT_finline_limit_
:
3020 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_single
,
3022 SET_OPTION_IF_UNSET (opts
, opts_set
, param_max_inline_insns_auto
,
3026 case OPT_finstrument_functions_exclude_function_list_
:
3027 add_comma_separated_to_vector
3028 (&opts
->x_flag_instrument_functions_exclude_functions
, arg
);
3031 case OPT_finstrument_functions_exclude_file_list_
:
3032 add_comma_separated_to_vector
3033 (&opts
->x_flag_instrument_functions_exclude_files
, arg
);
3036 case OPT_fmessage_length_
:
3037 pp_set_line_maximum_length (dc
->printer
, value
);
3038 diagnostic_set_caret_max_width (dc
, value
);
3042 case OPT_fopt_info_
:
3046 case OPT_foffload_options_
:
3050 case OPT_foffload_abi_
:
3051 #ifdef ACCEL_COMPILER
3052 /* Handled in the 'mkoffload's. */
3054 error_at (loc
, "%<-foffload-abi%> option can be specified only for "
3055 "offload compiler");
3059 case OPT_fpack_struct_
:
3060 if (value
<= 0 || (value
& (value
- 1)) || value
> 16)
3062 "structure alignment must be a small power of two, not %wu",
3065 opts
->x_initial_max_fld_align
= value
;
3069 case OPT_fplugin_arg_
:
3073 case OPT_fprofile_use_
:
3074 opts
->x_profile_data_prefix
= xstrdup (arg
);
3075 opts
->x_flag_profile_use
= true;
3077 /* No break here - do -fprofile-use processing. */
3079 case OPT_fprofile_use
:
3080 enable_fdo_optimizations (opts
, opts_set
, value
);
3081 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_reorder_functions
,
3083 /* Indirect call profiling should do all useful transformations
3084 speculative devirtualization does. */
3085 if (opts
->x_flag_value_profile_transformations
)
3086 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_devirtualize_speculatively
,
3090 case OPT_fauto_profile_
:
3091 opts
->x_auto_profile_file
= xstrdup (arg
);
3092 opts
->x_flag_auto_profile
= true;
3094 /* No break here - do -fauto-profile processing. */
3096 case OPT_fauto_profile
:
3097 enable_fdo_optimizations (opts
, opts_set
, value
);
3098 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_correction
, value
);
3101 case OPT_fprofile_generate_
:
3102 opts
->x_profile_data_prefix
= xstrdup (arg
);
3104 /* No break here - do -fprofile-generate processing. */
3106 case OPT_fprofile_generate
:
3107 SET_OPTION_IF_UNSET (opts
, opts_set
, profile_arc_flag
, value
);
3108 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_profile_values
, value
);
3109 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_inline_functions
, value
);
3110 SET_OPTION_IF_UNSET (opts
, opts_set
, flag_ipa_bit_cp
, value
);
3113 case OPT_fprofile_info_section
:
3114 opts
->x_profile_info_section
= ".gcov_info";
3117 case OPT_fpatchable_function_entry_
:
3119 HOST_WIDE_INT patch_area_size
, patch_area_start
;
3120 parse_and_check_patch_area (arg
, true, &patch_area_size
,
3125 case OPT_ftree_vectorize
:
3126 /* Automatically sets -ftree-loop-vectorize and
3127 -ftree-slp-vectorize. Nothing more to do here. */
3129 case OPT_fzero_call_used_regs_
:
3130 opts
->x_flag_zero_call_used_regs
3131 = parse_zero_call_used_regs_options (arg
);
3134 case OPT_fshow_column
:
3135 dc
->m_show_column
= value
;
3138 case OPT_frandom_seed
:
3139 /* The real switch is -fno-random-seed. */
3145 case OPT_frandom_seed_
:
3149 case OPT_fsched_verbose_
:
3150 #ifdef INSN_SCHEDULING
3151 /* Handled with Var in common.opt. */
3157 case OPT_fsched_stalled_insns_
:
3158 opts
->x_flag_sched_stalled_insns
= value
;
3159 if (opts
->x_flag_sched_stalled_insns
== 0)
3160 opts
->x_flag_sched_stalled_insns
= -1;
3163 case OPT_fsched_stalled_insns_dep_
:
3164 opts
->x_flag_sched_stalled_insns_dep
= value
;
3167 case OPT_fstack_check_
:
3168 if (!strcmp (arg
, "no"))
3169 opts
->x_flag_stack_check
= NO_STACK_CHECK
;
3170 else if (!strcmp (arg
, "generic"))
3171 /* This is the old stack checking method. */
3172 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
3173 ? FULL_BUILTIN_STACK_CHECK
3174 : GENERIC_STACK_CHECK
;
3175 else if (!strcmp (arg
, "specific"))
3176 /* This is the new stack checking method. */
3177 opts
->x_flag_stack_check
= STACK_CHECK_BUILTIN
3178 ? FULL_BUILTIN_STACK_CHECK
3179 : STACK_CHECK_STATIC_BUILTIN
3180 ? STATIC_BUILTIN_STACK_CHECK
3181 : GENERIC_STACK_CHECK
;
3183 warning_at (loc
, 0, "unknown stack check parameter %qs", arg
);
3186 case OPT_fstack_limit
:
3187 /* The real switch is -fno-stack-limit. */
3193 case OPT_fstack_limit_register_
:
3194 case OPT_fstack_limit_symbol_
:
3198 case OPT_fstack_usage
:
3199 opts
->x_flag_stack_usage
= value
;
3200 opts
->x_flag_stack_usage_info
= value
!= 0;
3204 set_debug_level (NO_DEBUG
, DEFAULT_GDB_EXTENSIONS
, arg
, opts
, opts_set
,
3212 set_debug_level (BTF_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3213 /* set the debug level to level 2, but if already at level 3,
3215 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
3216 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3220 set_debug_level (CTF_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3221 /* CTF generation feeds off DWARF dies. For optimal CTF, switch debug
3222 info level to 2. If off or at level 1, set it to level 2, but if
3223 already at level 3, don't lower it. */
3224 if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
3225 && opts
->x_ctf_debug_info_level
> CTFINFO_LEVEL_NONE
)
3226 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3230 if (arg
&& strlen (arg
) != 0)
3232 error_at (loc
, "%<-gdwarf%s%> is ambiguous; "
3233 "use %<-gdwarf-%s%> for DWARF version "
3234 "or %<-gdwarf%> %<-g%s%> for debug level", arg
, arg
, arg
);
3238 value
= opts
->x_dwarf_version
;
3242 if (value
< 2 || value
> 5)
3243 error_at (loc
, "dwarf version %wu is not supported", value
);
3245 opts
->x_dwarf_version
= value
;
3246 set_debug_level (DWARF2_DEBUG
, false, "", opts
, opts_set
, loc
);
3250 set_debug_level (NO_DEBUG
, 2, arg
, opts
, opts_set
, loc
);
3254 set_debug_level (VMS_DEBUG
, false, arg
, opts
, opts_set
, loc
);
3259 /* Handled completely via specs. */
3262 case OPT_pedantic_errors
:
3263 dc
->m_pedantic_errors
= 1;
3264 control_warning_option (OPT_Wpedantic
, DK_ERROR
, NULL
, value
,
3266 handlers
, opts
, opts_set
,
3271 opts
->x_flag_lto
= value
? "" : NULL
;
3275 if (strcmp (arg
, "none") != 0
3276 && strcmp (arg
, "jobserver") != 0
3277 && strcmp (arg
, "auto") != 0
3280 "unrecognized argument to %<-flto=%> option: %qs", arg
);
3284 dc
->m_inhibit_warnings
= true;
3287 case OPT_fmax_errors_
:
3288 dc
->set_max_errors (value
);
3291 case OPT_fuse_ld_bfd
:
3292 case OPT_fuse_ld_gold
:
3293 case OPT_fuse_ld_lld
:
3294 case OPT_fuse_ld_mold
:
3295 case OPT_fuse_linker_plugin
:
3296 /* No-op. Used by the driver and passed to us because it starts with f.*/
3301 opts
->x_flag_trapv
= 0;
3306 opts
->x_flag_wrapv
= 0;
3309 case OPT_fstrict_overflow
:
3310 opts
->x_flag_wrapv
= !value
;
3311 opts
->x_flag_wrapv_pointer
= !value
;
3313 opts
->x_flag_trapv
= 0;
3317 opts
->x_flag_ipa_icf_functions
= value
;
3318 opts
->x_flag_ipa_icf_variables
= value
;
3321 case OPT_falign_loops_
:
3322 check_alignment_argument (loc
, arg
, "loops",
3323 &opts
->x_flag_align_loops
,
3324 &opts
->x_str_align_loops
);
3327 case OPT_falign_jumps_
:
3328 check_alignment_argument (loc
, arg
, "jumps",
3329 &opts
->x_flag_align_jumps
,
3330 &opts
->x_str_align_jumps
);
3333 case OPT_falign_labels_
:
3334 check_alignment_argument (loc
, arg
, "labels",
3335 &opts
->x_flag_align_labels
,
3336 &opts
->x_str_align_labels
);
3339 case OPT_falign_functions_
:
3340 check_alignment_argument (loc
, arg
, "functions",
3341 &opts
->x_flag_align_functions
,
3342 &opts
->x_str_align_functions
);
3346 /* It is documented that we silently ignore silly values. */
3347 if (value
>= 1 && value
<= 100)
3348 dc
->m_tabstop
= value
;
3351 case OPT_freport_bug
:
3352 dc
->set_report_bug (value
);
3355 case OPT_fmultiflags
:
3356 gcc_checking_assert (lang_mask
== CL_DRIVER
);
3360 /* If the flag was handled in a standard way, assume the lack of
3361 processing here is intentional. */
3362 gcc_assert (option_flag_var (scode
, opts
));
3366 common_handle_option_auto (opts
, opts_set
, decoded
, lang_mask
, kind
,
3371 /* Used to set the level of strict aliasing warnings in OPTS,
3372 when no level is specified (i.e., when -Wstrict-aliasing, and not
3373 -Wstrict-aliasing=level was given).
3374 ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
3375 and 0 otherwise. After calling this function, wstrict_aliasing will be
3376 set to the default value of -Wstrict_aliasing=level, currently 3. */
3378 set_Wstrict_aliasing (struct gcc_options
*opts
, int onoff
)
3380 gcc_assert (onoff
== 0 || onoff
== 1);
3382 opts
->x_warn_strict_aliasing
= 3;
3384 opts
->x_warn_strict_aliasing
= 0;
3387 /* The following routines are useful in setting all the flags that
3388 -ffast-math and -fno-fast-math imply. */
3390 set_fast_math_flags (struct gcc_options
*opts
, int set
)
3392 if (!opts
->frontend_set_flag_unsafe_math_optimizations
)
3394 opts
->x_flag_unsafe_math_optimizations
= set
;
3395 set_unsafe_math_optimizations_flags (opts
, set
);
3397 if (!opts
->frontend_set_flag_finite_math_only
)
3398 opts
->x_flag_finite_math_only
= set
;
3399 if (!opts
->frontend_set_flag_errno_math
)
3400 opts
->x_flag_errno_math
= !set
;
3403 if (opts
->frontend_set_flag_excess_precision
== EXCESS_PRECISION_DEFAULT
)
3404 opts
->x_flag_excess_precision
3405 = set
? EXCESS_PRECISION_FAST
: EXCESS_PRECISION_DEFAULT
;
3406 if (!opts
->frontend_set_flag_signaling_nans
)
3407 opts
->x_flag_signaling_nans
= 0;
3408 if (!opts
->frontend_set_flag_rounding_math
)
3409 opts
->x_flag_rounding_math
= 0;
3410 if (!opts
->frontend_set_flag_cx_limited_range
)
3411 opts
->x_flag_cx_limited_range
= 1;
3415 /* When -funsafe-math-optimizations is set the following
3416 flags are set as well. */
3418 set_unsafe_math_optimizations_flags (struct gcc_options
*opts
, int set
)
3420 if (!opts
->frontend_set_flag_trapping_math
)
3421 opts
->x_flag_trapping_math
= !set
;
3422 if (!opts
->frontend_set_flag_signed_zeros
)
3423 opts
->x_flag_signed_zeros
= !set
;
3424 if (!opts
->frontend_set_flag_associative_math
)
3425 opts
->x_flag_associative_math
= set
;
3426 if (!opts
->frontend_set_flag_reciprocal_math
)
3427 opts
->x_flag_reciprocal_math
= set
;
3430 /* Return true iff flags in OPTS are set as if -ffast-math. */
3432 fast_math_flags_set_p (const struct gcc_options
*opts
)
3434 return (!opts
->x_flag_trapping_math
3435 && opts
->x_flag_unsafe_math_optimizations
3436 && opts
->x_flag_finite_math_only
3437 && !opts
->x_flag_signed_zeros
3438 && !opts
->x_flag_errno_math
3439 && opts
->x_flag_excess_precision
== EXCESS_PRECISION_FAST
);
3442 /* Return true iff flags are set as if -ffast-math but using the flags stored
3443 in the struct cl_optimization structure. */
3445 fast_math_flags_struct_set_p (struct cl_optimization
*opt
)
3447 return (!opt
->x_flag_trapping_math
3448 && opt
->x_flag_unsafe_math_optimizations
3449 && opt
->x_flag_finite_math_only
3450 && !opt
->x_flag_signed_zeros
3451 && !opt
->x_flag_errno_math
);
3454 /* Handle a debug output -g switch for options OPTS
3455 (OPTS_SET->x_write_symbols storing whether a debug format was passed
3456 explicitly), location LOC. EXTENDED is true or false to support
3457 extended output (2 is special and means "-ggdb" was given). */
3459 set_debug_level (uint32_t dinfo
, int extended
, const char *arg
,
3460 struct gcc_options
*opts
, struct gcc_options
*opts_set
,
3463 if (dinfo
== NO_DEBUG
)
3465 if (opts
->x_write_symbols
== NO_DEBUG
)
3467 opts
->x_write_symbols
= PREFERRED_DEBUGGING_TYPE
;
3471 #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
3472 if (opts
->x_write_symbols
& CTF_DEBUG
)
3473 opts
->x_write_symbols
|= DWARF2_DEBUG
;
3475 opts
->x_write_symbols
= DWARF2_DEBUG
;
3479 if (opts
->x_write_symbols
== NO_DEBUG
)
3480 warning_at (loc
, 0, "target system does not support debug output");
3482 else if ((opts
->x_write_symbols
& CTF_DEBUG
)
3483 || (opts
->x_write_symbols
& BTF_DEBUG
))
3485 opts
->x_write_symbols
|= DWARF2_DEBUG
;
3486 opts_set
->x_write_symbols
|= DWARF2_DEBUG
;
3491 /* Make and retain the choice if both CTF and DWARF debug info are to
3493 if (((dinfo
== DWARF2_DEBUG
) || (dinfo
== CTF_DEBUG
))
3494 && ((opts
->x_write_symbols
== (DWARF2_DEBUG
|CTF_DEBUG
))
3495 || (opts
->x_write_symbols
== DWARF2_DEBUG
)
3496 || (opts
->x_write_symbols
== CTF_DEBUG
)))
3498 opts
->x_write_symbols
|= dinfo
;
3499 opts_set
->x_write_symbols
|= dinfo
;
3501 /* However, CTF and BTF are not allowed together at this time. */
3502 else if (((dinfo
== DWARF2_DEBUG
) || (dinfo
== BTF_DEBUG
))
3503 && ((opts
->x_write_symbols
== (DWARF2_DEBUG
|BTF_DEBUG
))
3504 || (opts
->x_write_symbols
== DWARF2_DEBUG
)
3505 || (opts
->x_write_symbols
== BTF_DEBUG
)))
3507 opts
->x_write_symbols
|= dinfo
;
3508 opts_set
->x_write_symbols
|= dinfo
;
3512 /* Does it conflict with an already selected debug format? */
3513 if (opts_set
->x_write_symbols
!= NO_DEBUG
3514 && opts
->x_write_symbols
!= NO_DEBUG
3515 && dinfo
!= opts
->x_write_symbols
)
3517 gcc_assert (debug_set_count (dinfo
) <= 1);
3518 error_at (loc
, "debug format %qs conflicts with prior selection",
3519 debug_type_names
[debug_set_to_format (dinfo
)]);
3521 opts
->x_write_symbols
= dinfo
;
3522 opts_set
->x_write_symbols
= dinfo
;
3526 if (dinfo
!= BTF_DEBUG
)
3528 /* A debug flag without a level defaults to level 2.
3529 If off or at level 1, set it to level 2, but if already
3530 at level 3, don't lower it. */
3533 if (dinfo
== CTF_DEBUG
)
3534 opts
->x_ctf_debug_info_level
= CTFINFO_LEVEL_NORMAL
;
3535 else if (opts
->x_debug_info_level
< DINFO_LEVEL_NORMAL
)
3536 opts
->x_debug_info_level
= DINFO_LEVEL_NORMAL
;
3540 int argval
= integral_argument (arg
);
3542 error_at (loc
, "unrecognized debug output level %qs", arg
);
3543 else if (argval
> 3)
3544 error_at (loc
, "debug output level %qs is too high", arg
);
3547 if (dinfo
== CTF_DEBUG
)
3548 opts
->x_ctf_debug_info_level
3549 = (enum ctf_debug_info_levels
) argval
;
3551 opts
->x_debug_info_level
= (enum debug_info_levels
) argval
;
3555 else if (*arg
!= '\0')
3556 error_at (loc
, "unrecognized btf debug output level %qs", arg
);
3559 /* Arrange to dump core on error for diagnostic context DC. (The
3560 regular error message is still printed first, except in the case of
3564 setup_core_dumping (diagnostic_context
*dc
)
3567 signal (SIGABRT
, SIG_DFL
);
3569 #if defined(HAVE_SETRLIMIT)
3572 if (getrlimit (RLIMIT_CORE
, &rlim
) != 0)
3573 fatal_error (input_location
, "getting core file size maximum limit: %m");
3574 rlim
.rlim_cur
= rlim
.rlim_max
;
3575 if (setrlimit (RLIMIT_CORE
, &rlim
) != 0)
3576 fatal_error (input_location
,
3577 "setting core file size limit to maximum: %m");
3580 diagnostic_abort_on_error (dc
);
3583 /* Parse a -d<ARG> command line switch for OPTS, location LOC,
3584 diagnostic context DC. */
3587 decode_d_option (const char *arg
, struct gcc_options
*opts
,
3588 location_t loc
, diagnostic_context
*dc
)
3596 opts
->x_flag_debug_asm
= 1;
3599 opts
->x_flag_print_asm_name
= 1;
3602 opts
->x_flag_dump_rtl_in_asm
= 1;
3603 opts
->x_flag_print_asm_name
= 1;
3606 opts
->x_rtl_dump_and_exit
= 1;
3608 case 'D': /* These are handled by the preprocessor. */
3615 setup_core_dumping (dc
);
3618 opts
->x_flag_dump_all_passed
= true;
3622 warning_at (loc
, 0, "unrecognized gcc debugging option: %c", c
);
3627 /* Enable (or disable if VALUE is 0) a warning option ARG (language
3628 mask LANG_MASK, option handlers HANDLERS) as an error for option
3629 structures OPTS and OPTS_SET, diagnostic context DC (possibly
3630 NULL), location LOC. This is used by -Werror=. */
3633 enable_warning_as_error (const char *arg
, int value
, unsigned int lang_mask
,
3634 const struct cl_option_handlers
*handlers
,
3635 struct gcc_options
*opts
,
3636 struct gcc_options
*opts_set
,
3637 location_t loc
, diagnostic_context
*dc
)
3642 new_option
= XNEWVEC (char, strlen (arg
) + 2);
3643 new_option
[0] = 'W';
3644 strcpy (new_option
+ 1, arg
);
3645 option_index
= find_opt (new_option
, lang_mask
);
3646 if (option_index
== OPT_SPECIAL_unknown
)
3649 const char *hint
= op
.suggest_option (new_option
);
3651 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>;"
3652 " did you mean %<-%s%>?", value
? "" : "no-",
3653 arg
, new_option
, hint
);
3655 error_at (loc
, "%<-W%serror=%s%>: no option %<-%s%>",
3656 value
? "" : "no-", arg
, new_option
);
3658 else if (!(cl_options
[option_index
].flags
& CL_WARNING
))
3659 error_at (loc
, "%<-Werror=%s%>: %<-%s%> is not an option that "
3660 "controls warnings", arg
, new_option
);
3663 const diagnostic_t kind
= value
? DK_ERROR
: DK_WARNING
;
3664 const char *arg
= NULL
;
3666 if (cl_options
[option_index
].flags
& CL_JOINED
)
3667 arg
= new_option
+ cl_options
[option_index
].opt_len
;
3668 control_warning_option (option_index
, (int) kind
, arg
, value
,
3670 handlers
, opts
, opts_set
, dc
);
3675 /* Return malloced memory for the name of the option OPTION_INDEX
3676 which enabled a diagnostic (context CONTEXT), originally of type
3677 ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
3681 option_name (const diagnostic_context
*context
, int option_index
,
3682 diagnostic_t orig_diag_kind
, diagnostic_t diag_kind
)
3686 /* A warning classified as an error. */
3687 if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
)
3688 && diag_kind
== DK_ERROR
)
3689 return concat (cl_options
[OPT_Werror_
].opt_text
,
3690 /* Skip over "-W". */
3691 cl_options
[option_index
].opt_text
+ 2,
3693 /* A warning with option. */
3695 return xstrdup (cl_options
[option_index
].opt_text
);
3697 /* A warning without option classified as an error. */
3698 else if ((orig_diag_kind
== DK_WARNING
|| orig_diag_kind
== DK_PEDWARN
3699 || diag_kind
== DK_WARNING
)
3700 && context
->warning_as_error_requested_p ())
3701 return xstrdup (cl_options
[OPT_Werror
].opt_text
);
3706 /* Get the page within the documentation for this option. */
3709 get_option_html_page (int option_index
)
3711 const cl_option
*cl_opt
= &cl_options
[option_index
];
3714 if ((cl_opt
->flags
& CL_Fortran
) != 0
3715 /* If it is option common to both C/C++ and Fortran, it is documented
3716 in gcc/ rather than gfortran/ docs. */
3717 && (cl_opt
->flags
& CL_C
) == 0
3719 && (cl_opt
->flags
& CL_CXX
) == 0
3722 return "gfortran/Error-and-Warning-Options.html";
3728 /* Get the url within the documentation for this option, or NULL. */
3731 get_option_url_suffix (int option_index
, unsigned lang_mask
)
3733 if (const char *url
= get_opt_url_suffix (option_index
, lang_mask
))
3735 return label_text::borrow (url
);
3737 /* Fallback code for some options that aren't handled byt opt_url_suffixes
3738 e.g. links below "gfortran/". */
3739 if (const char *html_page
= get_option_html_page (option_index
))
3740 return label_text::take
3742 /* Expect an anchor of the form "index-Wfoo" e.g.
3743 <a name="index-Wformat"></a>, and thus an id within
3744 the page of "#index-Wformat". */
3746 cl_options
[option_index
].opt_text
,
3749 return label_text ();
3752 /* Return malloced memory for a URL describing the option OPTION_INDEX
3753 which enabled a diagnostic (context CONTEXT). */
3756 get_option_url (const diagnostic_context
*,
3762 label_text url_suffix
= get_option_url_suffix (option_index
, lang_mask
);
3763 if (url_suffix
.get ())
3766 /* On release branches, append to DOCUMENTATION_ROOT_URL the
3767 subdirectory with documentation of the latest release made
3769 if (BUILDING_GCC_MINOR
!= 0 && BUILDING_GCC_PATCHLEVEL
<= 1U)
3770 sprintf (infix
, "gcc-%u.%u.0/",
3771 BUILDING_GCC_MAJOR
, BUILDING_GCC_MINOR
);
3774 return concat (DOCUMENTATION_ROOT_URL
, infix
, url_suffix
.get (),
3782 /* Return a heap allocated producer with command line options. */
3785 gen_command_line_string (cl_decoded_option
*options
,
3786 unsigned int options_count
)
3788 auto_vec
<const char *> switches
;
3789 char *options_string
, *tail
;
3793 for (unsigned i
= 0; i
< options_count
; i
++)
3794 switch (options
[i
].opt_index
)
3799 case OPT_dumpbase_ext
:
3809 case OPT_SPECIAL_unknown
:
3810 case OPT_SPECIAL_ignore
:
3811 case OPT_SPECIAL_warn_removed
:
3812 case OPT_SPECIAL_program_name
:
3813 case OPT_SPECIAL_input_file
:
3814 case OPT_grecord_gcc_switches
:
3815 case OPT_frecord_gcc_switches
:
3816 case OPT__output_pch
:
3817 case OPT_fdiagnostics_show_location_
:
3818 case OPT_fdiagnostics_show_option
:
3819 case OPT_fdiagnostics_show_caret
:
3820 case OPT_fdiagnostics_show_labels
:
3821 case OPT_fdiagnostics_show_line_numbers
:
3822 case OPT_fdiagnostics_color_
:
3823 case OPT_fdiagnostics_format_
:
3824 case OPT_fverbose_asm
:
3828 case OPT_nostdinc__
:
3829 case OPT_fpreprocessed
:
3830 case OPT_fltrans_output_list_
:
3831 case OPT_fresolution_
:
3832 case OPT_fdebug_prefix_map_
:
3833 case OPT_fmacro_prefix_map_
:
3834 case OPT_ffile_prefix_map_
:
3835 case OPT_fprofile_prefix_map_
:
3836 case OPT_fcanon_prefix_map
:
3837 case OPT_fcompare_debug
:
3839 case OPT_fchecking_
:
3844 const char *lto_canonical
= "-flto";
3845 switches
.safe_push (lto_canonical
);
3846 len
+= strlen (lto_canonical
) + 1;
3850 if (cl_options
[options
[i
].opt_index
].flags
3851 & CL_NO_DWARF_RECORD
)
3853 gcc_checking_assert (options
[i
].canonical_option
[0][0] == '-');
3854 switch (options
[i
].canonical_option
[0][1])
3861 if (strncmp (options
[i
].canonical_option
[0] + 2,
3868 switches
.safe_push (options
[i
].orig_option_with_args_text
);
3869 len
+= strlen (options
[i
].orig_option_with_args_text
) + 1;
3873 options_string
= XNEWVEC (char, len
+ 1);
3874 tail
= options_string
;
3877 FOR_EACH_VEC_ELT (switches
, i
, p
)
3880 memcpy (tail
, p
, len
);
3882 if (i
!= switches
.length () - 1)
3890 return options_string
;
3893 /* Return a heap allocated producer string including command line options. */
3896 gen_producer_string (const char *language_string
, cl_decoded_option
*options
,
3897 unsigned int options_count
)
3899 char *cmdline
= gen_command_line_string (options
, options_count
);
3900 char *combined
= concat (language_string
, " ", version_string
, " ",
3908 namespace selftest
{
3910 /* Verify that get_option_url_suffix works as expected. */
3913 test_get_option_url_suffix ()
3915 ASSERT_STREQ (get_option_url_suffix (OPT_Wcpp
, 0).get (),
3916 "gcc/Warning-Options.html#index-Wcpp");
3917 ASSERT_STREQ (get_option_url_suffix (OPT_Wanalyzer_double_free
, 0).get (),
3918 "gcc/Static-Analyzer-Options.html#index-Wanalyzer-double-free");
3920 /* Test of a D-specific option. */
3922 ASSERT_EQ (get_option_url_suffix (OPT_fbounds_check_
, 0).get (), nullptr);
3923 ASSERT_STREQ (get_option_url_suffix (OPT_fbounds_check_
, CL_D
).get (),
3924 "gdc/Runtime-Options.html#index-fbounds-check");
3926 /* Test of a D-specific override to an option URL. */
3928 ASSERT_STREQ (get_option_url_suffix (OPT_fmax_errors_
, 0).get (),
3929 "gcc/Warning-Options.html#index-fmax-errors");
3930 /* D-specific URL. */
3931 ASSERT_STREQ (get_option_url_suffix (OPT_fmax_errors_
, CL_D
).get (),
3932 "gdc/Warnings.html#index-fmax-errors");
3937 (get_option_url_suffix (OPT_Wline_truncation
, CL_Fortran
).get (),
3938 "gfortran/Error-and-Warning-Options.html#index-Wline-truncation");
3942 /* Verify EnumSet and EnumBitSet requirements. */
3947 for (unsigned i
= 0; i
< cl_options_count
; ++i
)
3948 if (cl_options
[i
].var_type
== CLVC_ENUM
3949 && cl_options
[i
].var_value
!= CLEV_NORMAL
)
3951 const struct cl_enum
*e
= &cl_enums
[cl_options
[i
].var_enum
];
3952 unsigned HOST_WIDE_INT used_sets
= 0;
3953 unsigned HOST_WIDE_INT mask
= 0;
3954 unsigned highest_set
= 0;
3955 for (unsigned j
= 0; e
->values
[j
].arg
; ++j
)
3957 unsigned set
= e
->values
[j
].flags
>> CL_ENUM_SET_SHIFT
;
3958 if (cl_options
[i
].var_value
== CLEV_BITSET
)
3960 /* For EnumBitSet Set shouldn't be used and Value should
3961 be a power of two. */
3962 ASSERT_TRUE (set
== 0);
3963 ASSERT_TRUE (pow2p_hwi (e
->values
[j
].value
));
3966 /* Test that enumerators referenced in EnumSet have all
3967 Set(n) on them within the valid range. */
3968 ASSERT_TRUE (set
>= 1 && set
<= HOST_BITS_PER_WIDE_INT
);
3969 highest_set
= MAX (set
, highest_set
);
3970 used_sets
|= HOST_WIDE_INT_1U
<< (set
- 1);
3972 if (cl_options
[i
].var_value
== CLEV_BITSET
)
3974 /* If there is just one set, no point to using EnumSet. */
3975 ASSERT_TRUE (highest_set
>= 2);
3976 /* Test that there are no gaps in between the sets. */
3977 if (highest_set
== HOST_BITS_PER_WIDE_INT
)
3978 ASSERT_TRUE (used_sets
== HOST_WIDE_INT_M1U
);
3980 ASSERT_TRUE (used_sets
== (HOST_WIDE_INT_1U
<< highest_set
) - 1);
3981 for (unsigned int j
= 1; j
<= highest_set
; ++j
)
3983 unsigned HOST_WIDE_INT this_mask
= 0;
3984 for (unsigned k
= 0; e
->values
[k
].arg
; ++k
)
3986 unsigned set
= e
->values
[j
].flags
>> CL_ENUM_SET_SHIFT
;
3988 this_mask
|= e
->values
[j
].value
;
3990 ASSERT_TRUE ((mask
& this_mask
) == 0);
3996 /* Run all of the selftests within this file. */
4001 test_get_option_url_suffix ();
4005 } // namespace selftest
4007 #endif /* #if CHECKING_P */