/* Command line option handling.
Copyright (C) 2002-2020 Free Software Foundation, Inc.
Contributed by Neil Booth.
This file is part of GCC.
GCC is free software; you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by the Free
Software Foundation; either version 3, or (at your option) any later
version.
GCC is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
for more details.
You should have received a copy of the GNU General Public License
along with GCC; see the file COPYING3. If not see
. */
#include "config.h"
#include "system.h"
#include "intl.h"
#include "coretypes.h"
#include "opts.h"
#include "tm.h"
#include "flags.h"
#include "diagnostic.h"
#include "opts-diagnostic.h"
#include "insn-attr-common.h"
#include "common/common-target.h"
#include "spellcheck.h"
#include "opt-suggestions.h"
#include "diagnostic-color.h"
#include "version.h"
#include "selftest.h"
static void set_Wstrict_aliasing (struct gcc_options *opts, int onoff);
/* Indexed by enum debug_info_type. */
const char *const debug_type_names[] =
{
"none", "stabs", "dwarf-2", "xcoff", "vms"
};
/* Parse the -femit-struct-debug-detailed option value
and set the flag variables. */
#define MATCH( prefix, string ) \
((strncmp (prefix, string, sizeof prefix - 1) == 0) \
? ((string += sizeof prefix - 1), 1) : 0)
void
set_struct_debug_option (struct gcc_options *opts, location_t loc,
const char *spec)
{
/* various labels for comparison */
static const char dfn_lbl[] = "dfn:", dir_lbl[] = "dir:", ind_lbl[] = "ind:";
static const char ord_lbl[] = "ord:", gen_lbl[] = "gen:";
static const char none_lbl[] = "none", any_lbl[] = "any";
static const char base_lbl[] = "base", sys_lbl[] = "sys";
enum debug_struct_file files = DINFO_STRUCT_FILE_ANY;
/* Default is to apply to as much as possible. */
enum debug_info_usage usage = DINFO_USAGE_NUM_ENUMS;
int ord = 1, gen = 1;
/* What usage? */
if (MATCH (dfn_lbl, spec))
usage = DINFO_USAGE_DFN;
else if (MATCH (dir_lbl, spec))
usage = DINFO_USAGE_DIR_USE;
else if (MATCH (ind_lbl, spec))
usage = DINFO_USAGE_IND_USE;
/* Generics or not? */
if (MATCH (ord_lbl, spec))
gen = 0;
else if (MATCH (gen_lbl, spec))
ord = 0;
/* What allowable environment? */
if (MATCH (none_lbl, spec))
files = DINFO_STRUCT_FILE_NONE;
else if (MATCH (any_lbl, spec))
files = DINFO_STRUCT_FILE_ANY;
else if (MATCH (sys_lbl, spec))
files = DINFO_STRUCT_FILE_SYS;
else if (MATCH (base_lbl, spec))
files = DINFO_STRUCT_FILE_BASE;
else
error_at (loc,
"argument %qs to %<-femit-struct-debug-detailed%> "
"not recognized",
spec);
/* Effect the specification. */
if (usage == DINFO_USAGE_NUM_ENUMS)
{
if (ord)
{
opts->x_debug_struct_ordinary[DINFO_USAGE_DFN] = files;
opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE] = files;
opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE] = files;
}
if (gen)
{
opts->x_debug_struct_generic[DINFO_USAGE_DFN] = files;
opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE] = files;
opts->x_debug_struct_generic[DINFO_USAGE_IND_USE] = files;
}
}
else
{
if (ord)
opts->x_debug_struct_ordinary[usage] = files;
if (gen)
opts->x_debug_struct_generic[usage] = files;
}
if (*spec == ',')
set_struct_debug_option (opts, loc, spec+1);
else
{
/* No more -femit-struct-debug-detailed specifications.
Do final checks. */
if (*spec != '\0')
error_at (loc,
"argument %qs to %<-femit-struct-debug-detailed%> unknown",
spec);
if (opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE]
< opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE]
|| opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE]
< opts->x_debug_struct_generic[DINFO_USAGE_IND_USE])
error_at (loc,
"%<-femit-struct-debug-detailed=dir:...%> must allow "
"at least as much as "
"%<-femit-struct-debug-detailed=ind:...%>");
}
}
/* Strip off a legitimate source ending from the input string NAME of
length LEN. Rather than having to know the names used by all of
our front ends, we strip off an ending of a period followed by
up to fource characters. (C++ uses ".cpp".) */
void
strip_off_ending (char *name, int len)
{
int i;
for (i = 2; i < 5 && len > i; i++)
{
if (name[len - i] == '.')
{
name[len - i] = '\0';
break;
}
}
}
/* Find the base name of a path, stripping off both directories and
a single final extension. */
int
base_of_path (const char *path, const char **base_out)
{
const char *base = path;
const char *dot = 0;
const char *p = path;
char c = *p;
while (c)
{
if (IS_DIR_SEPARATOR (c))
{
base = p + 1;
dot = 0;
}
else if (c == '.')
dot = p;
c = *++p;
}
if (!dot)
dot = p;
*base_out = base;
return dot - base;
}
/* What to print when a switch has no documentation. */
static const char undocumented_msg[] = N_("This option lacks documentation.");
static const char use_diagnosed_msg[] = N_("Uses of this option are diagnosed.");
typedef char *char_p; /* For DEF_VEC_P. */
static void set_debug_level (enum debug_info_type type, int extended,
const char *arg, struct gcc_options *opts,
struct gcc_options *opts_set,
location_t loc);
static void set_fast_math_flags (struct gcc_options *opts, int set);
static void decode_d_option (const char *arg, struct gcc_options *opts,
location_t loc, diagnostic_context *dc);
static void set_unsafe_math_optimizations_flags (struct gcc_options *opts,
int set);
static void enable_warning_as_error (const char *arg, int value,
unsigned int lang_mask,
const struct cl_option_handlers *handlers,
struct gcc_options *opts,
struct gcc_options *opts_set,
location_t loc,
diagnostic_context *dc);
/* Handle a back-end option; arguments and return value as for
handle_option. */
bool
target_handle_option (struct gcc_options *opts,
struct gcc_options *opts_set,
const struct cl_decoded_option *decoded,
unsigned int lang_mask ATTRIBUTE_UNUSED, int kind,
location_t loc,
const struct cl_option_handlers *handlers ATTRIBUTE_UNUSED,
diagnostic_context *dc, void (*) (void))
{
gcc_assert (dc == global_dc);
gcc_assert (kind == DK_UNSPECIFIED);
return targetm_common.handle_option (opts, opts_set, decoded, loc);
}
/* Add comma-separated strings to a char_p vector. */
static void
add_comma_separated_to_vector (void **pvec, const char *arg)
{
char *tmp;
char *r;
char *w;
char *token_start;
vec *v = (vec *) *pvec;
vec_check_alloc (v, 1);
/* We never free this string. */
tmp = xstrdup (arg);
r = tmp;
w = tmp;
token_start = tmp;
while (*r != '\0')
{
if (*r == ',')
{
*w++ = '\0';
++r;
v->safe_push (token_start);
token_start = w;
}
if (*r == '\\' && r[1] == ',')
{
*w++ = ',';
r += 2;
}
else
*w++ = *r++;
}
*w = '\0';
if (*token_start != '\0')
v->safe_push (token_start);
*pvec = v;
}
/* Initialize opts_obstack. */
void
init_opts_obstack (void)
{
gcc_obstack_init (&opts_obstack);
}
/* Initialize OPTS and OPTS_SET before using them in parsing options. */
void
init_options_struct (struct gcc_options *opts, struct gcc_options *opts_set)
{
/* Ensure that opts_obstack has already been initialized by the time
that we initialize any gcc_options instances (PR jit/68446). */
gcc_assert (opts_obstack.chunk_size > 0);
*opts = global_options_init;
if (opts_set)
memset (opts_set, 0, sizeof (*opts_set));
/* Initialize whether `char' is signed. */
opts->x_flag_signed_char = DEFAULT_SIGNED_CHAR;
/* Set this to a special "uninitialized" value. The actual default
is set after target options have been processed. */
opts->x_flag_short_enums = 2;
/* Initialize target_flags before default_options_optimization
so the latter can modify it. */
opts->x_target_flags = targetm_common.default_target_flags;
/* Some targets have ABI-specified unwind tables. */
opts->x_flag_unwind_tables = targetm_common.unwind_tables_default;
/* Some targets have other target-specific initialization. */
targetm_common.option_init_struct (opts);
}
/* If indicated by the optimization level LEVEL (-Os if SIZE is set,
-Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT
to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language
mask LANG_MASK and option handlers HANDLERS. */
static void
maybe_default_option (struct gcc_options *opts,
struct gcc_options *opts_set,
const struct default_options *default_opt,
int level, bool size, bool fast, bool debug,
unsigned int lang_mask,
const struct cl_option_handlers *handlers,
location_t loc,
diagnostic_context *dc)
{
const struct cl_option *option = &cl_options[default_opt->opt_index];
bool enabled;
if (size)
gcc_assert (level == 2);
if (fast)
gcc_assert (level == 3);
if (debug)
gcc_assert (level == 1);
switch (default_opt->levels)
{
case OPT_LEVELS_ALL:
enabled = true;
break;
case OPT_LEVELS_0_ONLY:
enabled = (level == 0);
break;
case OPT_LEVELS_1_PLUS:
enabled = (level >= 1);
break;
case OPT_LEVELS_1_PLUS_SPEED_ONLY:
enabled = (level >= 1 && !size && !debug);
break;
case OPT_LEVELS_1_PLUS_NOT_DEBUG:
enabled = (level >= 1 && !debug);
break;
case OPT_LEVELS_2_PLUS:
enabled = (level >= 2);
break;
case OPT_LEVELS_2_PLUS_SPEED_ONLY:
enabled = (level >= 2 && !size && !debug);
break;
case OPT_LEVELS_3_PLUS:
enabled = (level >= 3);
break;
case OPT_LEVELS_3_PLUS_AND_SIZE:
enabled = (level >= 3 || size);
break;
case OPT_LEVELS_SIZE:
enabled = size;
break;
case OPT_LEVELS_FAST:
enabled = fast;
break;
case OPT_LEVELS_NONE:
default:
gcc_unreachable ();
}
if (enabled)
handle_generated_option (opts, opts_set, default_opt->opt_index,
default_opt->arg, default_opt->value,
lang_mask, DK_UNSPECIFIED, loc,
handlers, true, dc);
else if (default_opt->arg == NULL
&& !option->cl_reject_negative
&& !(option->flags & CL_PARAMS))
handle_generated_option (opts, opts_set, default_opt->opt_index,
default_opt->arg, !default_opt->value,
lang_mask, DK_UNSPECIFIED, loc,
handlers, true, dc);
}
/* As indicated by the optimization level LEVEL (-Os if SIZE is set,
-Ofast if FAST is set), apply the options in array DEFAULT_OPTS to
OPTS and OPTS_SET, diagnostic context DC, location LOC, with
language mask LANG_MASK and option handlers HANDLERS. */
static void
maybe_default_options (struct gcc_options *opts,
struct gcc_options *opts_set,
const struct default_options *default_opts,
int level, bool size, bool fast, bool debug,
unsigned int lang_mask,
const struct cl_option_handlers *handlers,
location_t loc,
diagnostic_context *dc)
{
size_t i;
for (i = 0; default_opts[i].levels != OPT_LEVELS_NONE; i++)
maybe_default_option (opts, opts_set, &default_opts[i],
level, size, fast, debug,
lang_mask, handlers, loc, dc);
}
/* Table of options enabled by default at different levels.
Please keep this list sorted by level and alphabetized within
each level; this makes it easier to keep the documentation
in sync. */
static const struct default_options default_options_table[] =
{
/* -O1 and -Og optimizations. */
{ OPT_LEVELS_1_PLUS, OPT_fcombine_stack_adjustments, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fcompare_elim, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fcprop_registers, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fdefer_pop, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fforward_propagate, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fguess_branch_probability, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fipa_profile, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fipa_pure_const, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fipa_reference, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fipa_reference_addressable, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fmerge_constants, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fomit_frame_pointer, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_freorder_blocks, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fshrink_wrap, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_fsplit_wide_types, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_builtin_call_dce, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_ccp, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_ch, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_coalesce_vars, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_copy_prop, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_dce, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_dominator_opts, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_fre, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_sink, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_slsr, NULL, 1 },
{ OPT_LEVELS_1_PLUS, OPT_ftree_ter, NULL, 1 },
/* -O1 (and not -Og) optimizations. */
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fbranch_count_reg, NULL, 1 },
#if DELAY_SLOTS
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdelayed_branch, NULL, 1 },
#endif
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdse, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion2, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_finline_functions_called_once, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fmove_loop_invariants, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fssa_phiopt, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fipa_modref, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_bit_ccp, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_dse, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_pta, NULL, 1 },
{ OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_sra, NULL, 1 },
/* -O2 and -Os optimizations. */
{ OPT_LEVELS_2_PLUS, OPT_fcaller_saves, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fcode_hoisting, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fcrossjumping, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fcse_follow_jumps, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fdevirtualize, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fdevirtualize_speculatively, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fexpensive_optimizations, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fgcse, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fhoist_adjacent_loads, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_findirect_inlining, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_finline_small_functions, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_bit_cp, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_cp, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_icf, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_ra, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_sra, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fipa_vrp, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fisolate_erroneous_paths_dereference, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_flra_remat, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_foptimize_sibling_calls, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fpartial_inlining, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fpeephole2, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_freorder_functions, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_frerun_cse_after_loop, NULL, 1 },
#ifdef INSN_SCHEDULING
{ OPT_LEVELS_2_PLUS, OPT_fschedule_insns2, NULL, 1 },
#endif
{ OPT_LEVELS_2_PLUS, OPT_fstrict_aliasing, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fstore_merging, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fthread_jumps, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_ftree_pre, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_ftree_switch_conversion, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_ftree_tail_merge, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_ftree_vrp, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_fvect_cost_model_, NULL, VECT_COST_MODEL_CHEAP },
{ OPT_LEVELS_2_PLUS, OPT_finline_functions, NULL, 1 },
{ OPT_LEVELS_2_PLUS, OPT_ftree_loop_distribute_patterns, NULL, 1 },
/* -O2 and above optimizations, but not -Os or -Og. */
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_functions, NULL, 1 },
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_jumps, NULL, 1 },
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_labels, NULL, 1 },
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_loops, NULL, 1 },
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_foptimize_strlen, NULL, 1 },
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_freorder_blocks_algorithm_, NULL,
REORDER_BLOCKS_ALGORITHM_STC },
#ifdef INSN_SCHEDULING
/* Only run the pre-regalloc scheduling pass if optimizing for speed. */
{ OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_fschedule_insns, NULL, 1 },
#endif
/* -O3 and -Os optimizations. */
/* -O3 optimizations. */
{ OPT_LEVELS_3_PLUS, OPT_fgcse_after_reload, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fipa_cp_clone, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_floop_interchange, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_floop_unroll_and_jam, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fpeel_loops, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fpredictive_commoning, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fsplit_loops, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fsplit_paths, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_ftree_loop_distribution, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_ftree_loop_vectorize, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_ftree_partial_pre, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_ftree_slp_vectorize, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_funswitch_loops, NULL, 1 },
{ OPT_LEVELS_3_PLUS, OPT_fvect_cost_model_, NULL, VECT_COST_MODEL_DYNAMIC },
{ OPT_LEVELS_3_PLUS, OPT_fversion_loops_for_strides, NULL, 1 },
/* -O3 parameters. */
{ OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_auto_, NULL, 30 },
{ OPT_LEVELS_3_PLUS, OPT__param_early_inlining_insns_, NULL, 14 },
{ OPT_LEVELS_3_PLUS, OPT__param_inline_heuristics_hint_percent_, NULL, 600 },
{ OPT_LEVELS_3_PLUS, OPT__param_inline_min_speedup_, NULL, 15 },
{ OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_single_, NULL, 200 },
/* -Ofast adds optimizations to -O3. */
{ OPT_LEVELS_FAST, OPT_ffast_math, NULL, 1 },
{ OPT_LEVELS_FAST, OPT_fallow_store_data_races, NULL, 1 },
{ OPT_LEVELS_NONE, 0, NULL, 0 }
};
/* Default the options in OPTS and OPTS_SET based on the optimization
settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */
void
default_options_optimization (struct gcc_options *opts,
struct gcc_options *opts_set,
struct cl_decoded_option *decoded_options,
unsigned int decoded_options_count,
location_t loc,
unsigned int lang_mask,
const struct cl_option_handlers *handlers,
diagnostic_context *dc)
{
unsigned int i;
int opt2;
bool openacc_mode = false;
/* Scan to see what optimization level has been specified. That will
determine the default value of many flags. */
for (i = 1; i < decoded_options_count; i++)
{
struct cl_decoded_option *opt = &decoded_options[i];
switch (opt->opt_index)
{
case OPT_O:
if (*opt->arg == '\0')
{
opts->x_optimize = 1;
opts->x_optimize_size = 0;
opts->x_optimize_fast = 0;
opts->x_optimize_debug = 0;
}
else
{
const int optimize_val = integral_argument (opt->arg);
if (optimize_val == -1)
error_at (loc, "argument to %<-O%> should be a non-negative "
"integer, %, % or %");
else
{
opts->x_optimize = optimize_val;
if ((unsigned int) opts->x_optimize > 255)
opts->x_optimize = 255;
opts->x_optimize_size = 0;
opts->x_optimize_fast = 0;
opts->x_optimize_debug = 0;
}
}
break;
case OPT_Os:
opts->x_optimize_size = 1;
/* Optimizing for size forces optimize to be 2. */
opts->x_optimize = 2;
opts->x_optimize_fast = 0;
opts->x_optimize_debug = 0;
break;
case OPT_Ofast:
/* -Ofast only adds flags to -O3. */
opts->x_optimize_size = 0;
opts->x_optimize = 3;
opts->x_optimize_fast = 1;
opts->x_optimize_debug = 0;
break;
case OPT_Og:
/* -Og selects optimization level 1. */
opts->x_optimize_size = 0;
opts->x_optimize = 1;
opts->x_optimize_fast = 0;
opts->x_optimize_debug = 1;
break;
case OPT_fopenacc:
if (opt->value)
openacc_mode = true;
break;
default:
/* Ignore other options in this prescan. */
break;
}
}
maybe_default_options (opts, opts_set, default_options_table,
opts->x_optimize, opts->x_optimize_size,
opts->x_optimize_fast, opts->x_optimize_debug,
lang_mask, handlers, loc, dc);
/* -O2 param settings. */
opt2 = (opts->x_optimize >= 2);
if (openacc_mode)
SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_pta, true);
/* Track fields in field-sensitive alias analysis. */
if (opt2)
SET_OPTION_IF_UNSET (opts, opts_set, param_max_fields_for_field_sensitive,
100);
if (opts->x_optimize_size)
/* We want to crossjump as much as possible. */
SET_OPTION_IF_UNSET (opts, opts_set, param_min_crossjump_insns, 1);
/* Restrict the amount of work combine does at -Og while retaining
most of its useful transforms. */
if (opts->x_optimize_debug)
SET_OPTION_IF_UNSET (opts, opts_set, param_max_combine_insns, 2);
/* Allow default optimizations to be specified on a per-machine basis. */
maybe_default_options (opts, opts_set,
targetm_common.option_optimization_table,
opts->x_optimize, opts->x_optimize_size,
opts->x_optimize_fast, opts->x_optimize_debug,
lang_mask, handlers, loc, dc);
}
/* Control IPA optimizations based on different live patching LEVEL. */
static void
control_options_for_live_patching (struct gcc_options *opts,
struct gcc_options *opts_set,
enum live_patching_level level,
location_t loc)
{
gcc_assert (level > LIVE_PATCHING_NONE);
switch (level)
{
case LIVE_PATCHING_INLINE_ONLY_STATIC:
if (opts_set->x_flag_ipa_cp_clone && opts->x_flag_ipa_cp_clone)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-cp-clone", "-flive-patching=inline-only-static");
else
opts->x_flag_ipa_cp_clone = 0;
if (opts_set->x_flag_ipa_sra && opts->x_flag_ipa_sra)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-sra", "-flive-patching=inline-only-static");
else
opts->x_flag_ipa_sra = 0;
if (opts_set->x_flag_partial_inlining && opts->x_flag_partial_inlining)
error_at (loc, "%qs is incompatible with %qs",
"-fpartial-inlining", "-flive-patching=inline-only-static");
else
opts->x_flag_partial_inlining = 0;
if (opts_set->x_flag_ipa_cp && opts->x_flag_ipa_cp)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-cp", "-flive-patching=inline-only-static");
else
opts->x_flag_ipa_cp = 0;
/* FALLTHROUGH. */
case LIVE_PATCHING_INLINE_CLONE:
/* live patching should disable whole-program optimization. */
if (opts_set->x_flag_whole_program && opts->x_flag_whole_program)
error_at (loc, "%qs is incompatible with %qs",
"-fwhole-program",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_whole_program = 0;
/* visibility change should be excluded by !flag_whole_program
&& !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra
&& !flag_partial_inlining. */
if (opts_set->x_flag_ipa_pta && opts->x_flag_ipa_pta)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-pta",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_pta = 0;
if (opts_set->x_flag_ipa_reference && opts->x_flag_ipa_reference)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-reference",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_reference = 0;
if (opts_set->x_flag_ipa_ra && opts->x_flag_ipa_ra)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-ra",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_ra = 0;
if (opts_set->x_flag_ipa_icf && opts->x_flag_ipa_icf)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-icf",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_icf = 0;
if (opts_set->x_flag_ipa_icf_functions && opts->x_flag_ipa_icf_functions)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-icf-functions",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_icf_functions = 0;
if (opts_set->x_flag_ipa_icf_variables && opts->x_flag_ipa_icf_variables)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-icf-variables",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_icf_variables = 0;
if (opts_set->x_flag_ipa_bit_cp && opts->x_flag_ipa_bit_cp)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-bit-cp",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_bit_cp = 0;
if (opts_set->x_flag_ipa_vrp && opts->x_flag_ipa_vrp)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-vrp",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_vrp = 0;
if (opts_set->x_flag_ipa_pure_const && opts->x_flag_ipa_pure_const)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-pure-const",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_pure_const = 0;
if (opts_set->x_flag_ipa_modref && opts->x_flag_ipa_modref)
error_at (loc,
"%<-fipa-modref%> is incompatible with "
"%<-flive-patching=inline-only-static|inline-clone%>");
else
opts->x_flag_ipa_modref = 0;
/* FIXME: disable unreachable code removal. */
/* discovery of functions/variables with no address taken. */
if (opts_set->x_flag_ipa_reference_addressable
&& opts->x_flag_ipa_reference_addressable)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-reference-addressable",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_reference_addressable = 0;
/* ipa stack alignment propagation. */
if (opts_set->x_flag_ipa_stack_alignment
&& opts->x_flag_ipa_stack_alignment)
error_at (loc, "%qs is incompatible with %qs",
"-fipa-stack-alignment",
"-flive-patching=inline-only-static|inline-clone");
else
opts->x_flag_ipa_stack_alignment = 0;
break;
default:
gcc_unreachable ();
}
}
/* --help option argument if set. */
vec help_option_arguments;
/* Return the string name describing a sanitizer argument which has been
provided on the command line and has set this particular flag. */
const char *
find_sanitizer_argument (struct gcc_options *opts, unsigned int flags)
{
for (int i = 0; sanitizer_opts[i].name != NULL; ++i)
{
/* Need to find the sanitizer_opts element which:
a) Could have set the flags requested.
b) Has been set on the command line.
Can have (a) without (b) if the flag requested is e.g.
SANITIZE_ADDRESS, since both -fsanitize=address and
-fsanitize=kernel-address set this flag.
Can have (b) without (a) by requesting more than one sanitizer on the
command line. */
if ((sanitizer_opts[i].flag & opts->x_flag_sanitize)
!= sanitizer_opts[i].flag)
continue;
if ((sanitizer_opts[i].flag & flags) != flags)
continue;
return sanitizer_opts[i].name;
}
return NULL;
}
/* Report an error to the user about sanitizer options they have requested
which have set conflicting flags.
LEFT and RIGHT indicate sanitizer flags which conflict with each other, this
function reports an error if both have been set in OPTS->x_flag_sanitize and
ensures the error identifies the requested command line options that have
set these flags. */
static void
report_conflicting_sanitizer_options (struct gcc_options *opts, location_t loc,
unsigned int left, unsigned int right)
{
unsigned int left_seen = (opts->x_flag_sanitize & left);
unsigned int right_seen = (opts->x_flag_sanitize & right);
if (left_seen && right_seen)
{
const char* left_arg = find_sanitizer_argument (opts, left_seen);
const char* right_arg = find_sanitizer_argument (opts, right_seen);
gcc_assert (left_arg && right_arg);
error_at (loc,
"%<-fsanitize=%s%> is incompatible with %<-fsanitize=%s%>",
left_arg, right_arg);
}
}
/* After all options at LOC have been read into OPTS and OPTS_SET,
finalize settings of those options and diagnose incompatible
combinations. */
void
finish_options (struct gcc_options *opts, struct gcc_options *opts_set,
location_t loc)
{
enum unwind_info_type ui_except;
if (opts->x_dump_base_name
&& ! opts->x_dump_base_name_prefixed)
{
const char *sep = opts->x_dump_base_name;
for (; *sep; sep++)
if (IS_DIR_SEPARATOR (*sep))
break;
if (*sep)
/* If dump_base_path contains subdirectories, don't prepend
anything. */;
else if (opts->x_dump_dir_name)
/* We have a DUMP_DIR_NAME, prepend that. */
opts->x_dump_base_name = opts_concat (opts->x_dump_dir_name,
opts->x_dump_base_name, NULL);
/* It is definitely prefixed now. */
opts->x_dump_base_name_prefixed = true;
}
/* Handle related options for unit-at-a-time, toplevel-reorder, and
section-anchors. */
if (!opts->x_flag_unit_at_a_time)
{
if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors)
error_at (loc, "section anchors must be disabled when unit-at-a-time "
"is disabled");
opts->x_flag_section_anchors = 0;
if (opts->x_flag_toplevel_reorder == 1)
error_at (loc, "toplevel reorder must be disabled when unit-at-a-time "
"is disabled");
opts->x_flag_toplevel_reorder = 0;
}
/* -fself-test depends on the state of the compiler prior to
compiling anything. Ideally it should be run on an empty source
file. However, in case we get run with actual source, assume
-fsyntax-only which will inhibit any compiler initialization
which may confuse the self tests. */
if (opts->x_flag_self_test)
opts->x_flag_syntax_only = 1;
if (opts->x_flag_tm && opts->x_flag_non_call_exceptions)
sorry ("transactional memory is not supported with non-call exceptions");
/* Unless the user has asked for section anchors, we disable toplevel
reordering at -O0 to disable transformations that might be surprising
to end users and to get -fno-toplevel-reorder tested. */
if (!opts->x_optimize
&& opts->x_flag_toplevel_reorder == 2
&& !(opts->x_flag_section_anchors && opts_set->x_flag_section_anchors))
{
opts->x_flag_toplevel_reorder = 0;
opts->x_flag_section_anchors = 0;
}
if (!opts->x_flag_toplevel_reorder)
{
if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors)
error_at (loc, "section anchors must be disabled when toplevel reorder"
" is disabled");
opts->x_flag_section_anchors = 0;
}
if (!opts->x_flag_opts_finished)
{
/* We initialize opts->x_flag_pie to -1 so that targets can set a
default value. */
if (opts->x_flag_pie == -1)
{
/* We initialize opts->x_flag_pic to -1 so that we can tell if
-fpic, -fPIC, -fno-pic or -fno-PIC is used. */
if (opts->x_flag_pic == -1)
opts->x_flag_pie = DEFAULT_FLAG_PIE;
else
opts->x_flag_pie = 0;
}
/* If -fPIE or -fpie is used, turn on PIC. */
if (opts->x_flag_pie)
opts->x_flag_pic = opts->x_flag_pie;
else if (opts->x_flag_pic == -1)
opts->x_flag_pic = 0;
if (opts->x_flag_pic && !opts->x_flag_pie)
opts->x_flag_shlib = 1;
opts->x_flag_opts_finished = true;
}
/* We initialize opts->x_flag_stack_protect to -1 so that targets
can set a default value. */
if (opts->x_flag_stack_protect == -1)
opts->x_flag_stack_protect = DEFAULT_FLAG_SSP;
if (opts->x_optimize == 0)
{
/* Inlining does not work if not optimizing,
so force it not to be done. */
opts->x_warn_inline = 0;
opts->x_flag_no_inline = 1;
}
/* The optimization to partition hot and cold basic blocks into separate
sections of the .o and executable files does not work (currently)
with exception handling. This is because there is no support for
generating unwind info. If opts->x_flag_exceptions is turned on
we need to turn off the partitioning optimization. */
ui_except = targetm_common.except_unwind_info (opts);
if (opts->x_flag_exceptions
&& opts->x_flag_reorder_blocks_and_partition
&& (ui_except == UI_SJLJ || ui_except >= UI_TARGET))
{
if (opts_set->x_flag_reorder_blocks_and_partition)
inform (loc,
"%<-freorder-blocks-and-partition%> does not work "
"with exceptions on this architecture");
opts->x_flag_reorder_blocks_and_partition = 0;
opts->x_flag_reorder_blocks = 1;
}
/* If user requested unwind info, then turn off the partitioning
optimization. */
if (opts->x_flag_unwind_tables
&& !targetm_common.unwind_tables_default
&& opts->x_flag_reorder_blocks_and_partition
&& (ui_except == UI_SJLJ || ui_except >= UI_TARGET))
{
if (opts_set->x_flag_reorder_blocks_and_partition)
inform (loc,
"%<-freorder-blocks-and-partition%> does not support "
"unwind info on this architecture");
opts->x_flag_reorder_blocks_and_partition = 0;
opts->x_flag_reorder_blocks = 1;
}
/* If the target requested unwind info, then turn off the partitioning
optimization with a different message. Likewise, if the target does not
support named sections. */
if (opts->x_flag_reorder_blocks_and_partition
&& (!targetm_common.have_named_sections
|| (opts->x_flag_unwind_tables
&& targetm_common.unwind_tables_default
&& (ui_except == UI_SJLJ || ui_except >= UI_TARGET))))
{
if (opts_set->x_flag_reorder_blocks_and_partition)
inform (loc,
"%<-freorder-blocks-and-partition%> does not work "
"on this architecture");
opts->x_flag_reorder_blocks_and_partition = 0;
opts->x_flag_reorder_blocks = 1;
}
/* Pipelining of outer loops is only possible when general pipelining
capabilities are requested. */
if (!opts->x_flag_sel_sched_pipelining)
opts->x_flag_sel_sched_pipelining_outer_loops = 0;
if (opts->x_flag_conserve_stack)
{
SET_OPTION_IF_UNSET (opts, opts_set, param_large_stack_frame, 100);
SET_OPTION_IF_UNSET (opts, opts_set, param_stack_frame_growth, 40);
}
if (opts->x_flag_lto)
{
#ifdef ENABLE_LTO
opts->x_flag_generate_lto = 1;
/* When generating IL, do not operate in whole-program mode.
Otherwise, symbols will be privatized too early, causing link
errors later. */
opts->x_flag_whole_program = 0;
#else
error_at (loc, "LTO support has not been enabled in this configuration");
#endif
if (!opts->x_flag_fat_lto_objects
&& (!HAVE_LTO_PLUGIN
|| (opts_set->x_flag_use_linker_plugin
&& !opts->x_flag_use_linker_plugin)))
{
if (opts_set->x_flag_fat_lto_objects)
error_at (loc, "%<-fno-fat-lto-objects%> are supported only with "
"linker plugin");
opts->x_flag_fat_lto_objects = 1;
}
/* -gsplit-dwarf isn't compatible with LTO, see PR88389. */
if (opts->x_dwarf_split_debug_info)
{
inform (loc, "%<-gsplit-dwarf%> is not supported with LTO,"
" disabling");
opts->x_dwarf_split_debug_info = 0;
}
}
/* We initialize opts->x_flag_split_stack to -1 so that targets can set a
default value if they choose based on other options. */
if (opts->x_flag_split_stack == -1)
opts->x_flag_split_stack = 0;
else if (opts->x_flag_split_stack)
{
if (!targetm_common.supports_split_stack (true, opts))
{
error_at (loc, "%<-fsplit-stack%> is not supported by "
"this compiler configuration");
opts->x_flag_split_stack = 0;
}
}
/* If stack splitting is turned on, and the user did not explicitly
request function partitioning, turn off partitioning, as it
confuses the linker when trying to handle partitioned split-stack
code that calls a non-split-stack functions. But if partitioning
was turned on explicitly just hope for the best. */
if (opts->x_flag_split_stack
&& opts->x_flag_reorder_blocks_and_partition)
SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_blocks_and_partition, 0);
if (opts->x_flag_reorder_blocks_and_partition)
SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_functions, 1);
/* The -gsplit-dwarf option requires -ggnu-pubnames. */
if (opts->x_dwarf_split_debug_info)
opts->x_debug_generate_pub_sections = 2;
if ((opts->x_flag_sanitize
& (SANITIZE_USER_ADDRESS | SANITIZE_KERNEL_ADDRESS)) == 0)
{
if (opts->x_flag_sanitize & SANITIZE_POINTER_COMPARE)
error_at (loc,
"%<-fsanitize=pointer-compare%> must be combined with "
"%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
if (opts->x_flag_sanitize & SANITIZE_POINTER_SUBTRACT)
error_at (loc,
"%<-fsanitize=pointer-subtract%> must be combined with "
"%<-fsanitize=address%> or %<-fsanitize=kernel-address%>");
}
/* Address sanitizers conflict with the thread sanitizer. */
report_conflicting_sanitizer_options (opts, loc, SANITIZE_THREAD,
SANITIZE_ADDRESS | SANITIZE_HWADDRESS);
/* The leak sanitizer conflicts with the thread sanitizer. */
report_conflicting_sanitizer_options (opts, loc, SANITIZE_LEAK,
SANITIZE_THREAD);
/* No combination of HWASAN and ASAN work together. */
report_conflicting_sanitizer_options (opts, loc,
SANITIZE_HWADDRESS, SANITIZE_ADDRESS);
/* The userspace and kernel address sanitizers conflict with each other. */
report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_HWADDRESS,
SANITIZE_KERNEL_HWADDRESS);
report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_ADDRESS,
SANITIZE_KERNEL_ADDRESS);
/* Check error recovery for -fsanitize-recover option. */
for (int i = 0; sanitizer_opts[i].name != NULL; ++i)
if ((opts->x_flag_sanitize_recover & sanitizer_opts[i].flag)
&& !sanitizer_opts[i].can_recover)
error_at (loc, "%<-fsanitize-recover=%s%> is not supported",
sanitizer_opts[i].name);
/* When instrumenting the pointers, we don't want to remove
the null pointer checks. */
if (opts->x_flag_sanitize & (SANITIZE_NULL | SANITIZE_NONNULL_ATTRIBUTE
| SANITIZE_RETURNS_NONNULL_ATTRIBUTE))
opts->x_flag_delete_null_pointer_checks = 0;
/* Aggressive compiler optimizations may cause false negatives. */
if (opts->x_flag_sanitize & ~(SANITIZE_LEAK | SANITIZE_UNREACHABLE))
opts->x_flag_aggressive_loop_optimizations = 0;
/* Enable -fsanitize-address-use-after-scope if either address sanitizer is
enabled. */
if (opts->x_flag_sanitize
& (SANITIZE_USER_ADDRESS | SANITIZE_USER_HWADDRESS))
SET_OPTION_IF_UNSET (opts, opts_set, flag_sanitize_address_use_after_scope,
true);
/* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope
is enabled. */
if (opts->x_flag_sanitize_address_use_after_scope)
{
if (opts->x_flag_stack_reuse != SR_NONE
&& opts_set->x_flag_stack_reuse != SR_NONE)
error_at (loc,
"%<-fsanitize-address-use-after-scope%> requires "
"%<-fstack-reuse=none%> option");
opts->x_flag_stack_reuse = SR_NONE;
}
if ((opts->x_flag_sanitize & SANITIZE_USER_ADDRESS) && opts->x_flag_tm)
sorry ("transactional memory is not supported with %<-fsanitize=address%>");
if ((opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS) && opts->x_flag_tm)
sorry ("transactional memory is not supported with "
"%<-fsanitize=kernel-address%>");
/* Currently live patching is not support for LTO. */
if (opts->x_flag_live_patching && opts->x_flag_lto)
sorry ("live patching is not supported with LTO");
/* Currently vtable verification is not supported for LTO */
if (opts->x_flag_vtable_verify && opts->x_flag_lto)
sorry ("vtable verification is not supported with LTO");
/* Control IPA optimizations based on different -flive-patching level. */
if (opts->x_flag_live_patching)
control_options_for_live_patching (opts, opts_set,
opts->x_flag_live_patching,
loc);
/* Unrolling all loops implies that standard loop unrolling must also
be done. */
if (opts->x_flag_unroll_all_loops)
opts->x_flag_unroll_loops = 1;
/* Allow cunroll to grow size accordingly. */
if (!opts_set->x_flag_cunroll_grow_size)
opts->x_flag_cunroll_grow_size
= (opts->x_flag_unroll_loops
|| opts->x_flag_peel_loops
|| opts->x_optimize >= 3);
}
#define LEFT_COLUMN 27
/* Output ITEM, of length ITEM_WIDTH, in the left column,
followed by word-wrapped HELP in a second column. */
static void
wrap_help (const char *help,
const char *item,
unsigned int item_width,
unsigned int columns)
{
unsigned int col_width = LEFT_COLUMN;
unsigned int remaining, room, len;
remaining = strlen (help);
do
{
room = columns - 3 - MAX (col_width, item_width);
if (room > columns)
room = 0;
len = remaining;
if (room < len)
{
unsigned int i;
for (i = 0; help[i]; i++)
{
if (i >= room && len != remaining)
break;
if (help[i] == ' ')
len = i;
else if ((help[i] == '-' || help[i] == '/')
&& help[i + 1] != ' '
&& i > 0 && ISALPHA (help[i - 1]))
len = i + 1;
}
}
printf (" %-*.*s %.*s\n", col_width, item_width, item, len, help);
item_width = 0;
while (help[len] == ' ')
len++;
help += len;
remaining -= len;
}
while (remaining);
}
/* Data structure used to print list of valid option values. */
class option_help_tuple
{
public:
option_help_tuple (int code, vec values):
m_code (code), m_values (values)
{}
/* Code of an option. */
int m_code;
/* List of possible values. */
vec m_values;
};
/* Print help for a specific front-end, etc. */
static void
print_filtered_help (unsigned int include_flags,
unsigned int exclude_flags,
unsigned int any_flags,
unsigned int columns,
struct gcc_options *opts,
unsigned int lang_mask)
{
unsigned int i;
const char *help;
bool found = false;
bool displayed = false;
char new_help[256];
if (!opts->x_help_printed)
opts->x_help_printed = XCNEWVAR (char, cl_options_count);
if (!opts->x_help_enum_printed)
opts->x_help_enum_printed = XCNEWVAR (char, cl_enums_count);
auto_vec help_tuples;
for (i = 0; i < cl_options_count; i++)
{
const struct cl_option *option = cl_options + i;
unsigned int len;
const char *opt;
const char *tab;
if (include_flags == 0
|| ((option->flags & include_flags) != include_flags))
{
if ((option->flags & any_flags) == 0)
continue;
}
/* Skip unwanted switches. */
if ((option->flags & exclude_flags) != 0)
continue;
/* The driver currently prints its own help text. */
if ((option->flags & CL_DRIVER) != 0
&& (option->flags & (((1U << cl_lang_count) - 1)
| CL_COMMON | CL_TARGET)) == 0)
continue;
/* If an option contains a language specification,
exclude it from common unless all languages are present. */
if ((include_flags & CL_COMMON)
&& !(option->flags & CL_DRIVER)
&& (option->flags & CL_LANG_ALL)
&& (option->flags & CL_LANG_ALL) != CL_LANG_ALL)
continue;
found = true;
/* Skip switches that have already been printed. */
if (opts->x_help_printed[i])
continue;
opts->x_help_printed[i] = true;
help = option->help;
if (help == NULL)
{
if (exclude_flags & CL_UNDOCUMENTED)
continue;
help = undocumented_msg;
}
/* Get the translation. */
help = _(help);
if (option->alias_target < N_OPTS
&& cl_options [option->alias_target].help)
{
const struct cl_option *target = cl_options + option->alias_target;
if (option->help == NULL)
{
/* The option is undocumented but is an alias for an option that
is documented. If the option has alias arguments, then its
purpose is to provide certain arguments to the other option, so
inform the reader of this. Otherwise, point the reader to the
other option in preference to the former. */
if (option->alias_arg)
{
if (option->neg_alias_arg)
snprintf (new_help, sizeof new_help,
_("Same as %s%s (or, in negated form, %s%s)."),
target->opt_text, option->alias_arg,
target->opt_text, option->neg_alias_arg);
else
snprintf (new_help, sizeof new_help,
_("Same as %s%s."),
target->opt_text, option->alias_arg);
}
else
snprintf (new_help, sizeof new_help,
_("Same as %s."),
target->opt_text);
}
else
{
/* For documented options with aliases, mention the aliased
option's name for reference. */
snprintf (new_help, sizeof new_help,
_("%s Same as %s."),
help, cl_options [option->alias_target].opt_text);
}
help = new_help;
}
if (option->warn_message)
{
/* Mention that the use of the option will trigger a warning. */
if (help == new_help)
snprintf (new_help + strlen (new_help),
sizeof new_help - strlen (new_help),
" %s", _(use_diagnosed_msg));
else
snprintf (new_help, sizeof new_help,
"%s %s", help, _(use_diagnosed_msg));
help = new_help;
}
/* Find the gap between the name of the
option and its descriptive text. */
tab = strchr (help, '\t');
if (tab)
{
len = tab - help;
opt = help;
help = tab + 1;
}
else
{
opt = option->opt_text;
len = strlen (opt);
}
/* With the -Q option enabled we change the descriptive text associated
with an option to be an indication of its current setting. */
if (!opts->x_quiet_flag)
{
void *flag_var = option_flag_var (i, opts);
if (len < (LEFT_COLUMN + 2))
strcpy (new_help, "\t\t");
else
strcpy (new_help, "\t");
/* Set to print whether the option is enabled or disabled,
or, if it's an alias for another option, the name of
the aliased option. */
bool print_state = false;
if (flag_var != NULL
&& option->var_type != CLVC_DEFER)
{
/* If OPTION is only available for a specific subset
of languages other than this one, mention them. */
bool avail_for_lang = true;
if (unsigned langset = option->flags & CL_LANG_ALL)
{
if (!(langset & lang_mask))
{
avail_for_lang = false;
strcat (new_help, _("[available in "));
for (unsigned i = 0, n = 0; (1U << i) < CL_LANG_ALL; ++i)
if (langset & (1U << i))
{
if (n++)
strcat (new_help, ", ");
strcat (new_help, lang_names[i]);
}
strcat (new_help, "]");
}
}
if (!avail_for_lang)
; /* Print nothing else if the option is not available
in the current language. */
else if (option->flags & CL_JOINED)
{
if (option->var_type == CLVC_STRING)
{
if (* (const char **) flag_var != NULL)
snprintf (new_help + strlen (new_help),
sizeof (new_help) - strlen (new_help),
"%s", * (const char **) flag_var);
}
else if (option->var_type == CLVC_ENUM)
{
const struct cl_enum *e = &cl_enums[option->var_enum];
int value;
const char *arg = NULL;
value = e->get (flag_var);
enum_value_to_arg (e->values, &arg, value, lang_mask);
if (arg == NULL)
arg = _("[default]");
snprintf (new_help + strlen (new_help),
sizeof (new_help) - strlen (new_help),
"%s", arg);
}
else
{
if (option->cl_host_wide_int)
sprintf (new_help + strlen (new_help),
_("%llu bytes"), (unsigned long long)
*(unsigned HOST_WIDE_INT *) flag_var);
else
sprintf (new_help + strlen (new_help),
"%i", * (int *) flag_var);
}
}
else
print_state = true;
}
else
/* When there is no argument, print the option state only
if the option takes no argument. */
print_state = !(option->flags & CL_JOINED);
if (print_state)
{
if (option->alias_target < N_OPTS
&& option->alias_target != OPT_SPECIAL_warn_removed
&& option->alias_target != OPT_SPECIAL_ignore
&& option->alias_target != OPT_SPECIAL_input_file
&& option->alias_target != OPT_SPECIAL_program_name
&& option->alias_target != OPT_SPECIAL_unknown)
{
const struct cl_option *target
= &cl_options[option->alias_target];
sprintf (new_help + strlen (new_help), "%s%s",
target->opt_text,
option->alias_arg ? option->alias_arg : "");
}
else if (option->alias_target == OPT_SPECIAL_ignore)
strcat (new_help, ("[ignored]"));
else
{
/* Print the state for an on/off option. */
int ena = option_enabled (i, lang_mask, opts);
if (ena > 0)
strcat (new_help, _("[enabled]"));
else if (ena == 0)
strcat (new_help, _("[disabled]"));
}
}
help = new_help;
}
if (option->range_max != -1)
{
char b[128];
snprintf (b, sizeof (b), "<%d,%d>", option->range_min,
option->range_max);
opt = concat (opt, b, NULL);
len += strlen (b);
}
wrap_help (help, opt, len, columns);
displayed = true;
if (option->var_type == CLVC_ENUM
&& opts->x_help_enum_printed[option->var_enum] != 2)
opts->x_help_enum_printed[option->var_enum] = 1;
else
{
vec option_values
= targetm_common.get_valid_option_values (i, NULL);
if (!option_values.is_empty ())
help_tuples.safe_push (option_help_tuple (i, option_values));
}
}
if (! found)
{
unsigned int langs = include_flags & CL_LANG_ALL;
if (langs == 0)
printf (_(" No options with the desired characteristics were found\n"));
else
{
unsigned int i;
/* PR 31349: Tell the user how to see all of the
options supported by a specific front end. */
for (i = 0; (1U << i) < CL_LANG_ALL; i ++)
if ((1U << i) & langs)
printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"),
lang_names[i], lang_names[i]);
}
}
else if (! displayed)
printf (_(" All options with the desired characteristics have already been displayed\n"));
putchar ('\n');
/* Print details of enumerated option arguments, if those
enumerations have help text headings provided. If no help text
is provided, presume that the possible values are listed in the
help text for the relevant options. */
for (i = 0; i < cl_enums_count; i++)
{
unsigned int j, pos;
if (opts->x_help_enum_printed[i] != 1)
continue;
if (cl_enums[i].help == NULL)
continue;
printf (" %s\n ", _(cl_enums[i].help));
pos = 4;
for (j = 0; cl_enums[i].values[j].arg != NULL; j++)
{
unsigned int len = strlen (cl_enums[i].values[j].arg);
if (pos > 4 && pos + 1 + len <= columns)
{
printf (" %s", cl_enums[i].values[j].arg);
pos += 1 + len;
}
else
{
if (pos > 4)
{
printf ("\n ");
pos = 4;
}
printf ("%s", cl_enums[i].values[j].arg);
pos += len;
}
}
printf ("\n\n");
opts->x_help_enum_printed[i] = 2;
}
for (unsigned i = 0; i < help_tuples.length (); i++)
{
const struct cl_option *option = cl_options + help_tuples[i].m_code;
printf (_(" Known valid arguments for %s option:\n "),
option->opt_text);
for (unsigned j = 0; j < help_tuples[i].m_values.length (); j++)
printf (" %s", help_tuples[i].m_values[j]);
printf ("\n\n");
}
}
/* Display help for a specified type of option.
The options must have ALL of the INCLUDE_FLAGS set
ANY of the flags in the ANY_FLAGS set
and NONE of the EXCLUDE_FLAGS set. The current option state is in
OPTS; LANG_MASK is used for interpreting enumerated option state. */
static void
print_specific_help (unsigned int include_flags,
unsigned int exclude_flags,
unsigned int any_flags,
struct gcc_options *opts,
unsigned int lang_mask)
{
unsigned int all_langs_mask = (1U << cl_lang_count) - 1;
const char * description = NULL;
const char * descrip_extra = "";
size_t i;
unsigned int flag;
/* Sanity check: Make sure that we do not have more
languages than we have bits available to enumerate them. */
gcc_assert ((1U << cl_lang_count) <= CL_MIN_OPTION_CLASS);
/* If we have not done so already, obtain
the desired maximum width of the output. */
if (opts->x_help_columns == 0)
{
opts->x_help_columns = get_terminal_width ();
if (opts->x_help_columns == INT_MAX)
/* Use a reasonable default. */
opts->x_help_columns = 80;
}
/* Decide upon the title for the options that we are going to display. */
for (i = 0, flag = 1; flag <= CL_MAX_OPTION_CLASS; flag <<= 1, i ++)
{
switch (flag & include_flags)
{
case 0:
case CL_DRIVER:
break;
case CL_TARGET:
description = _("The following options are target specific");
break;
case CL_WARNING:
description = _("The following options control compiler warning messages");
break;
case CL_OPTIMIZATION:
description = _("The following options control optimizations");
break;
case CL_COMMON:
description = _("The following options are language-independent");
break;
case CL_PARAMS:
description = _("The following options control parameters");
break;
default:
if (i >= cl_lang_count)
break;
if (exclude_flags & all_langs_mask)
description = _("The following options are specific to just the language ");
else
description = _("The following options are supported by the language ");
descrip_extra = lang_names [i];
break;
}
}
if (description == NULL)
{
if (any_flags == 0)
{
if (include_flags & CL_UNDOCUMENTED)
description = _("The following options are not documented");
else if (include_flags & CL_SEPARATE)
description = _("The following options take separate arguments");
else if (include_flags & CL_JOINED)
description = _("The following options take joined arguments");
else
{
internal_error ("unrecognized % passed "
"to %",
include_flags);
return;
}
}
else
{
if (any_flags & all_langs_mask)
description = _("The following options are language-related");
else
description = _("The following options are language-independent");
}
}
printf ("%s%s:\n", description, descrip_extra);
print_filtered_help (include_flags, exclude_flags, any_flags,
opts->x_help_columns, opts, lang_mask);
}
/* Enable FDO-related flags. */
static void
enable_fdo_optimizations (struct gcc_options *opts,
struct gcc_options *opts_set,
int value)
{
SET_OPTION_IF_UNSET (opts, opts_set, flag_branch_probabilities, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_loops, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_peel_loops, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_tracer, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_value_profile_transformations,
value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp, value);
if (value)
{
SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp_clone, 1);
SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, 1);
}
SET_OPTION_IF_UNSET (opts, opts_set, flag_predictive_commoning, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_split_loops, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_unswitch_loops, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_gcse_after_reload, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_vectorize, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_slp_vectorize, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_version_loops_for_strides, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_vect_cost_model,
VECT_COST_MODEL_DYNAMIC);
SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribute_patterns,
value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_loop_interchange, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_jam, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribution, value);
}
/* -f{,no-}sanitize{,-recover}= suboptions. */
const struct sanitizer_opts_s sanitizer_opts[] =
{
#define SANITIZER_OPT(name, flags, recover) \
{ #name, flags, sizeof #name - 1, recover }
SANITIZER_OPT (address, (SANITIZE_ADDRESS | SANITIZE_USER_ADDRESS), true),
SANITIZER_OPT (hwaddress, (SANITIZE_HWADDRESS | SANITIZE_USER_HWADDRESS),
true),
SANITIZER_OPT (kernel-address, (SANITIZE_ADDRESS | SANITIZE_KERNEL_ADDRESS),
true),
SANITIZER_OPT (kernel-hwaddress,
(SANITIZE_HWADDRESS | SANITIZE_KERNEL_HWADDRESS),
true),
SANITIZER_OPT (pointer-compare, SANITIZE_POINTER_COMPARE, true),
SANITIZER_OPT (pointer-subtract, SANITIZE_POINTER_SUBTRACT, true),
SANITIZER_OPT (thread, SANITIZE_THREAD, false),
SANITIZER_OPT (leak, SANITIZE_LEAK, false),
SANITIZER_OPT (shift, SANITIZE_SHIFT, true),
SANITIZER_OPT (shift-base, SANITIZE_SHIFT_BASE, true),
SANITIZER_OPT (shift-exponent, SANITIZE_SHIFT_EXPONENT, true),
SANITIZER_OPT (integer-divide-by-zero, SANITIZE_DIVIDE, true),
SANITIZER_OPT (undefined, SANITIZE_UNDEFINED, true),
SANITIZER_OPT (unreachable, SANITIZE_UNREACHABLE, false),
SANITIZER_OPT (vla-bound, SANITIZE_VLA, true),
SANITIZER_OPT (return, SANITIZE_RETURN, false),
SANITIZER_OPT (null, SANITIZE_NULL, true),
SANITIZER_OPT (signed-integer-overflow, SANITIZE_SI_OVERFLOW, true),
SANITIZER_OPT (bool, SANITIZE_BOOL, true),
SANITIZER_OPT (enum, SANITIZE_ENUM, true),
SANITIZER_OPT (float-divide-by-zero, SANITIZE_FLOAT_DIVIDE, true),
SANITIZER_OPT (float-cast-overflow, SANITIZE_FLOAT_CAST, true),
SANITIZER_OPT (bounds, SANITIZE_BOUNDS, true),
SANITIZER_OPT (bounds-strict, SANITIZE_BOUNDS | SANITIZE_BOUNDS_STRICT, true),
SANITIZER_OPT (alignment, SANITIZE_ALIGNMENT, true),
SANITIZER_OPT (nonnull-attribute, SANITIZE_NONNULL_ATTRIBUTE, true),
SANITIZER_OPT (returns-nonnull-attribute, SANITIZE_RETURNS_NONNULL_ATTRIBUTE,
true),
SANITIZER_OPT (object-size, SANITIZE_OBJECT_SIZE, true),
SANITIZER_OPT (vptr, SANITIZE_VPTR, true),
SANITIZER_OPT (pointer-overflow, SANITIZE_POINTER_OVERFLOW, true),
SANITIZER_OPT (builtin, SANITIZE_BUILTIN, true),
SANITIZER_OPT (all, ~0U, true),
#undef SANITIZER_OPT
{ NULL, 0U, 0UL, false }
};
/* -f{,no-}sanitize-coverage= suboptions. */
const struct sanitizer_opts_s coverage_sanitizer_opts[] =
{
#define COVERAGE_SANITIZER_OPT(name, flags) \
{ #name, flags, sizeof #name - 1, true }
COVERAGE_SANITIZER_OPT (trace-pc, SANITIZE_COV_TRACE_PC),
COVERAGE_SANITIZER_OPT (trace-cmp, SANITIZE_COV_TRACE_CMP),
#undef COVERAGE_SANITIZER_OPT
{ NULL, 0U, 0UL, false }
};
/* -fzero-call-used-regs= suboptions. */
const struct zero_call_used_regs_opts_s zero_call_used_regs_opts[] =
{
#define ZERO_CALL_USED_REGS_OPT(name, flags) \
{ #name, flags }
ZERO_CALL_USED_REGS_OPT (skip, zero_regs_flags::SKIP),
ZERO_CALL_USED_REGS_OPT (used-gpr-arg, zero_regs_flags::USED_GPR_ARG),
ZERO_CALL_USED_REGS_OPT (used-gpr, zero_regs_flags::USED_GPR),
ZERO_CALL_USED_REGS_OPT (used-arg, zero_regs_flags::USED_ARG),
ZERO_CALL_USED_REGS_OPT (used, zero_regs_flags::USED),
ZERO_CALL_USED_REGS_OPT (all-gpr-arg, zero_regs_flags::ALL_GPR_ARG),
ZERO_CALL_USED_REGS_OPT (all-gpr, zero_regs_flags::ALL_GPR),
ZERO_CALL_USED_REGS_OPT (all-arg, zero_regs_flags::ALL_ARG),
ZERO_CALL_USED_REGS_OPT (all, zero_regs_flags::ALL),
#undef ZERO_CALL_USED_REGS_OPT
{NULL, 0U}
};
/* A struct for describing a run of chars within a string. */
class string_fragment
{
public:
string_fragment (const char *start, size_t len)
: m_start (start), m_len (len) {}
const char *m_start;
size_t m_len;
};
/* Specialization of edit_distance_traits for string_fragment,
for use by get_closest_sanitizer_option. */
template <>
struct edit_distance_traits
{
static size_t get_length (const string_fragment &fragment)
{
return fragment.m_len;
}
static const char *get_string (const string_fragment &fragment)
{
return fragment.m_start;
}
};
/* Given ARG, an unrecognized sanitizer option, return the best
matching sanitizer option, or NULL if there isn't one.
OPTS is array of candidate sanitizer options.
CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or
OPT_fsanitize_coverage_.
VALUE is non-zero for the regular form of the option, zero
for the "no-" form (e.g. "-fno-sanitize-recover="). */
static const char *
get_closest_sanitizer_option (const string_fragment &arg,
const struct sanitizer_opts_s *opts,
enum opt_code code, int value)
{
best_match bm (arg);
for (int i = 0; opts[i].name != NULL; ++i)
{
/* -fsanitize=all is not valid, so don't offer it. */
if (code == OPT_fsanitize_
&& opts[i].flag == ~0U
&& value)
continue;
/* For -fsanitize-recover= (and not -fno-sanitize-recover=),
don't offer the non-recoverable options. */
if (code == OPT_fsanitize_recover_
&& !opts[i].can_recover
&& value)
continue;
bm.consider (opts[i].name);
}
return bm.get_best_meaningful_candidate ();
}
/* Parse comma separated sanitizer suboptions from P for option SCODE,
adjust previous FLAGS and return new ones. If COMPLAIN is false,
don't issue diagnostics. */
unsigned int
parse_sanitizer_options (const char *p, location_t loc, int scode,
unsigned int flags, int value, bool complain)
{
enum opt_code code = (enum opt_code) scode;
const struct sanitizer_opts_s *opts;
if (code == OPT_fsanitize_coverage_)
opts = coverage_sanitizer_opts;
else
opts = sanitizer_opts;
while (*p != 0)
{
size_t len, i;
bool found = false;
const char *comma = strchr (p, ',');
if (comma == NULL)
len = strlen (p);
else
len = comma - p;
if (len == 0)
{
p = comma + 1;
continue;
}
/* Check to see if the string matches an option class name. */
for (i = 0; opts[i].name != NULL; ++i)
if (len == opts[i].len && memcmp (p, opts[i].name, len) == 0)
{
/* Handle both -fsanitize and -fno-sanitize cases. */
if (value && opts[i].flag == ~0U)
{
if (code == OPT_fsanitize_)
{
if (complain)
error_at (loc, "%<-fsanitize=all%> option is not valid");
}
else
flags |= ~(SANITIZE_THREAD | SANITIZE_LEAK
| SANITIZE_UNREACHABLE | SANITIZE_RETURN);
}
else if (value)
{
/* Do not enable -fsanitize-recover=unreachable and
-fsanitize-recover=return if -fsanitize-recover=undefined
is selected. */
if (code == OPT_fsanitize_recover_
&& opts[i].flag == SANITIZE_UNDEFINED)
flags |= (SANITIZE_UNDEFINED
& ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN));
else
flags |= opts[i].flag;
}
else
flags &= ~opts[i].flag;
found = true;
break;
}
if (! found && complain)
{
const char *hint
= get_closest_sanitizer_option (string_fragment (p, len),
opts, code, value);
const char *suffix;
if (code == OPT_fsanitize_recover_)
suffix = "-recover";
else if (code == OPT_fsanitize_coverage_)
suffix = "-coverage";
else
suffix = "";
if (hint)
error_at (loc,
"unrecognized argument to %<-f%ssanitize%s=%> "
"option: %q.*s; did you mean %qs?",
value ? "" : "no-",
suffix, (int) len, p, hint);
else
error_at (loc,
"unrecognized argument to %<-f%ssanitize%s=%> option: "
"%q.*s", value ? "" : "no-",
suffix, (int) len, p);
}
if (comma == NULL)
break;
p = comma + 1;
}
return flags;
}
/* Parse string values of no_sanitize attribute passed in VALUE.
Values are separated with comma. */
unsigned int
parse_no_sanitize_attribute (char *value)
{
unsigned int flags = 0;
unsigned int i;
char *q = strtok (value, ",");
while (q != NULL)
{
for (i = 0; sanitizer_opts[i].name != NULL; ++i)
if (strcmp (sanitizer_opts[i].name, q) == 0)
{
flags |= sanitizer_opts[i].flag;
if (sanitizer_opts[i].flag == SANITIZE_UNDEFINED)
flags |= SANITIZE_UNDEFINED_NONDEFAULT;
break;
}
if (sanitizer_opts[i].name == NULL)
warning (OPT_Wattributes,
"%qs attribute directive ignored", q);
q = strtok (NULL, ",");
}
return flags;
}
/* Parse -fzero-call-used-regs suboptions from ARG, return the FLAGS. */
unsigned int
parse_zero_call_used_regs_options (const char *arg)
{
unsigned int flags = 0;
/* Check to see if the string matches a sub-option name. */
for (unsigned int i = 0; zero_call_used_regs_opts[i].name != NULL; ++i)
if (strcmp (arg, zero_call_used_regs_opts[i].name) == 0)
{
flags = zero_call_used_regs_opts[i].flag;
break;
}
if (!flags)
error ("unrecognized argument to %<-fzero-call-used-regs=%>: %qs", arg);
return flags;
}
/* Parse -falign-NAME format for a FLAG value. Return individual
parsed integer values into RESULT_VALUES array. If REPORT_ERROR is
set, print error message at LOC location. */
bool
parse_and_check_align_values (const char *flag,
const char *name,
auto_vec &result_values,
bool report_error,
location_t loc)
{
char *str = xstrdup (flag);
for (char *p = strtok (str, ":"); p; p = strtok (NULL, ":"))
{
char *end;
int v = strtol (p, &end, 10);
if (*end != '\0' || v < 0)
{
if (report_error)
error_at (loc, "invalid arguments for %<-falign-%s%> option: %qs",
name, flag);
return false;
}
result_values.safe_push ((unsigned)v);
}
free (str);
/* Check that we have a correct number of values. */
if (result_values.is_empty () || result_values.length () > 4)
{
if (report_error)
error_at (loc, "invalid number of arguments for %<-falign-%s%> "
"option: %qs", name, flag);
return false;
}
for (unsigned i = 0; i < result_values.length (); i++)
if (result_values[i] > MAX_CODE_ALIGN_VALUE)
{
if (report_error)
error_at (loc, "%<-falign-%s%> is not between 0 and %d",
name, MAX_CODE_ALIGN_VALUE);
return false;
}
return true;
}
/* Check that alignment value FLAG for -falign-NAME is valid at a given
location LOC. OPT_STR points to the stored -falign-NAME=argument and
OPT_FLAG points to the associated -falign-NAME on/off flag. */
static void
check_alignment_argument (location_t loc, const char *flag, const char *name,
int *opt_flag, const char **opt_str)
{
auto_vec align_result;
parse_and_check_align_values (flag, name, align_result, true, loc);
if (align_result.length() >= 1 && align_result[0] == 0)
{
*opt_flag = 1;
*opt_str = NULL;
}
}
/* Print help when OPT__help_ is set. */
void
print_help (struct gcc_options *opts, unsigned int lang_mask,
const char *help_option_argument)
{
const char *a = help_option_argument;
unsigned int include_flags = 0;
/* Note - by default we include undocumented options when listing
specific classes. If you only want to see documented options
then add ",^undocumented" to the --help= option. E.g.:
--help=target,^undocumented */
unsigned int exclude_flags = 0;
if (lang_mask == CL_DRIVER)
return;
/* Walk along the argument string, parsing each word in turn.
The format is:
arg = [^]{word}[,{arg}]
word = {optimizers|target|warnings|undocumented|
params|common|} */
while (*a != 0)
{
static const struct
{
const char *string;
unsigned int flag;
}
specifics[] =
{
{ "optimizers", CL_OPTIMIZATION },
{ "target", CL_TARGET },
{ "warnings", CL_WARNING },
{ "undocumented", CL_UNDOCUMENTED },
{ "params", CL_PARAMS },
{ "joined", CL_JOINED },
{ "separate", CL_SEPARATE },
{ "common", CL_COMMON },
{ NULL, 0 }
};
unsigned int *pflags;
const char *comma;
unsigned int lang_flag, specific_flag;
unsigned int len;
unsigned int i;
if (*a == '^')
{
++a;
if (*a == '\0')
{
error ("missing argument to %qs", "--help=^");
break;
}
pflags = &exclude_flags;
}
else
pflags = &include_flags;
comma = strchr (a, ',');
if (comma == NULL)
len = strlen (a);
else
len = comma - a;
if (len == 0)
{
a = comma + 1;
continue;
}
/* Check to see if the string matches an option class name. */
for (i = 0, specific_flag = 0; specifics[i].string != NULL; i++)
if (strncasecmp (a, specifics[i].string, len) == 0)
{
specific_flag = specifics[i].flag;
break;
}
/* Check to see if the string matches a language name.
Note - we rely upon the alpha-sorted nature of the entries in
the lang_names array, specifically that shorter names appear
before their longer variants. (i.e. C before C++). That way
when we are attempting to match --help=c for example we will
match with C first and not C++. */
for (i = 0, lang_flag = 0; i < cl_lang_count; i++)
if (strncasecmp (a, lang_names[i], len) == 0)
{
lang_flag = 1U << i;
break;
}
if (specific_flag != 0)
{
if (lang_flag == 0)
*pflags |= specific_flag;
else
{
/* The option's argument matches both the start of a
language name and the start of an option class name.
We have a special case for when the user has
specified "--help=c", but otherwise we have to issue
a warning. */
if (strncasecmp (a, "c", len) == 0)
*pflags |= lang_flag;
else
warning (0,
"%<--help%> argument %q.*s is ambiguous, "
"please be more specific",
len, a);
}
}
else if (lang_flag != 0)
*pflags |= lang_flag;
else
warning (0,
"unrecognized argument to %<--help=%> option: %q.*s",
len, a);
if (comma == NULL)
break;
a = comma + 1;
}
/* We started using PerFunction/Optimization for parameters and
a warning. We should exclude these from optimization options. */
if (include_flags & CL_OPTIMIZATION)
exclude_flags |= CL_WARNING;
if (!(include_flags & CL_PARAMS))
exclude_flags |= CL_PARAMS;
if (include_flags)
print_specific_help (include_flags, exclude_flags, 0, opts,
lang_mask);
}
/* Handle target- and language-independent options. Return zero to
generate an "unknown option" message. Only options that need
extra handling need to be listed here; if you simply want
DECODED->value assigned to a variable, it happens automatically. */
bool
common_handle_option (struct gcc_options *opts,
struct gcc_options *opts_set,
const struct cl_decoded_option *decoded,
unsigned int lang_mask, int kind ATTRIBUTE_UNUSED,
location_t loc,
const struct cl_option_handlers *handlers,
diagnostic_context *dc,
void (*target_option_override_hook) (void))
{
size_t scode = decoded->opt_index;
const char *arg = decoded->arg;
HOST_WIDE_INT value = decoded->value;
enum opt_code code = (enum opt_code) scode;
gcc_assert (decoded->canonical_option_num_elements <= 2);
switch (code)
{
case OPT__help:
{
unsigned int all_langs_mask = (1U << cl_lang_count) - 1;
unsigned int undoc_mask;
unsigned int i;
if (lang_mask == CL_DRIVER)
break;
undoc_mask = ((opts->x_verbose_flag | opts->x_extra_warnings)
? 0
: CL_UNDOCUMENTED);
target_option_override_hook ();
/* First display any single language specific options. */
for (i = 0; i < cl_lang_count; i++)
print_specific_help
(1U << i, (all_langs_mask & (~ (1U << i))) | undoc_mask, 0, opts,
lang_mask);
/* Next display any multi language specific options. */
print_specific_help (0, undoc_mask, all_langs_mask, opts, lang_mask);
/* Then display any remaining, non-language options. */
for (i = CL_MIN_OPTION_CLASS; i <= CL_MAX_OPTION_CLASS; i <<= 1)
if (i != CL_DRIVER)
print_specific_help (i, undoc_mask, 0, opts, lang_mask);
opts->x_exit_after_options = true;
break;
}
case OPT__target_help:
if (lang_mask == CL_DRIVER)
break;
target_option_override_hook ();
print_specific_help (CL_TARGET, CL_UNDOCUMENTED, 0, opts, lang_mask);
opts->x_exit_after_options = true;
break;
case OPT__help_:
{
help_option_arguments.safe_push (arg);
opts->x_exit_after_options = true;
break;
}
case OPT__version:
if (lang_mask == CL_DRIVER)
break;
opts->x_exit_after_options = true;
break;
case OPT__completion_:
break;
case OPT_fsanitize_:
opts->x_flag_sanitize
= parse_sanitizer_options (arg, loc, code,
opts->x_flag_sanitize, value, true);
/* Kernel ASan implies normal ASan but does not yet support
all features. */
if (opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS)
{
SET_OPTION_IF_UNSET (opts, opts_set,
param_asan_instrumentation_with_call_threshold,
0);
SET_OPTION_IF_UNSET (opts, opts_set, param_asan_globals, 0);
SET_OPTION_IF_UNSET (opts, opts_set, param_asan_stack, 0);
SET_OPTION_IF_UNSET (opts, opts_set, param_asan_protect_allocas, 0);
SET_OPTION_IF_UNSET (opts, opts_set, param_asan_use_after_return, 0);
}
if (opts->x_flag_sanitize & SANITIZE_KERNEL_HWADDRESS)
{
SET_OPTION_IF_UNSET (opts, opts_set,
param_hwasan_instrument_stack, 0);
SET_OPTION_IF_UNSET (opts, opts_set,
param_hwasan_random_frame_tag, 0);
SET_OPTION_IF_UNSET (opts, opts_set,
param_hwasan_instrument_allocas, 0);
}
break;
case OPT_fsanitize_recover_:
opts->x_flag_sanitize_recover
= parse_sanitizer_options (arg, loc, code,
opts->x_flag_sanitize_recover, value, true);
break;
case OPT_fasan_shadow_offset_:
/* Deferred. */
break;
case OPT_fsanitize_address_use_after_scope:
opts->x_flag_sanitize_address_use_after_scope = value;
break;
case OPT_fsanitize_recover:
if (value)
opts->x_flag_sanitize_recover
|= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT)
& ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN);
else
opts->x_flag_sanitize_recover
&= ~(SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT);
break;
case OPT_fsanitize_coverage_:
opts->x_flag_sanitize_coverage
= parse_sanitizer_options (arg, loc, code,
opts->x_flag_sanitize_coverage, value, true);
break;
case OPT_O:
case OPT_Os:
case OPT_Ofast:
case OPT_Og:
/* Currently handled in a prescan. */
break;
case OPT_Werror:
dc->warning_as_error_requested = value;
break;
case OPT_Werror_:
if (lang_mask == CL_DRIVER)
break;
enable_warning_as_error (arg, value, lang_mask, handlers,
opts, opts_set, loc, dc);
break;
case OPT_Wfatal_errors:
dc->fatal_errors = value;
break;
case OPT_Wstack_usage_:
opts->x_flag_stack_usage_info = value != -1;
break;
case OPT_Wstrict_aliasing:
set_Wstrict_aliasing (opts, value);
break;
case OPT_Wstrict_overflow:
opts->x_warn_strict_overflow = (value
? (int) WARN_STRICT_OVERFLOW_CONDITIONAL
: 0);
break;
case OPT_Wsystem_headers:
dc->dc_warn_system_headers = value;
break;
case OPT_aux_info:
opts->x_flag_gen_aux_info = 1;
break;
case OPT_d:
decode_d_option (arg, opts, loc, dc);
break;
case OPT_fcall_used_:
case OPT_fcall_saved_:
/* Deferred. */
break;
case OPT_fdbg_cnt_:
/* Deferred. */
break;
case OPT_fdebug_prefix_map_:
case OPT_ffile_prefix_map_:
/* Deferred. */
break;
case OPT_fcallgraph_info:
opts->x_flag_callgraph_info = CALLGRAPH_INFO_NAKED;
break;
case OPT_fcallgraph_info_:
{
char *my_arg, *p;
my_arg = xstrdup (arg);
p = strtok (my_arg, ",");
while (p)
{
if (strcmp (p, "su") == 0)
{
opts->x_flag_callgraph_info |= CALLGRAPH_INFO_STACK_USAGE;
opts->x_flag_stack_usage_info = true;
}
else if (strcmp (p, "da") == 0)
opts->x_flag_callgraph_info |= CALLGRAPH_INFO_DYNAMIC_ALLOC;
else
return 0;
p = strtok (NULL, ",");
}
free (my_arg);
}
break;
case OPT_fdiagnostics_show_location_:
diagnostic_prefixing_rule (dc) = (diagnostic_prefixing_rule_t) value;
break;
case OPT_fdiagnostics_show_caret:
dc->show_caret = value;
break;
case OPT_fdiagnostics_show_labels:
dc->show_labels_p = value;
break;
case OPT_fdiagnostics_show_line_numbers:
dc->show_line_numbers_p = value;
break;
case OPT_fdiagnostics_color_:
diagnostic_color_init (dc, value);
break;
case OPT_fdiagnostics_urls_:
diagnostic_urls_init (dc, value);
break;
case OPT_fdiagnostics_format_:
diagnostic_output_format_init (dc,
(enum diagnostics_output_format)value);
break;
case OPT_fdiagnostics_parseable_fixits:
dc->parseable_fixits_p = value;
break;
case OPT_fdiagnostics_column_unit_:
dc->column_unit = (enum diagnostics_column_unit)value;
break;
case OPT_fdiagnostics_column_origin_:
dc->column_origin = value;
break;
case OPT_fdiagnostics_show_cwe:
dc->show_cwe = value;
break;
case OPT_fdiagnostics_path_format_:
dc->path_format = (enum diagnostic_path_format)value;
break;
case OPT_fdiagnostics_show_path_depths:
dc->show_path_depths = value;
break;
case OPT_fdiagnostics_show_option:
dc->show_option_requested = value;
break;
case OPT_fdiagnostics_minimum_margin_width_:
dc->min_margin_width = value;
break;
case OPT_fdump_:
/* Deferred. */
break;
case OPT_ffast_math:
set_fast_math_flags (opts, value);
break;
case OPT_funsafe_math_optimizations:
set_unsafe_math_optimizations_flags (opts, value);
break;
case OPT_ffixed_:
/* Deferred. */
break;
case OPT_finline_limit_:
SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_single,
value / 2);
SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_auto,
value / 2);
break;
case OPT_finstrument_functions_exclude_function_list_:
add_comma_separated_to_vector
(&opts->x_flag_instrument_functions_exclude_functions, arg);
break;
case OPT_finstrument_functions_exclude_file_list_:
add_comma_separated_to_vector
(&opts->x_flag_instrument_functions_exclude_files, arg);
break;
case OPT_fmessage_length_:
pp_set_line_maximum_length (dc->printer, value);
diagnostic_set_caret_max_width (dc, value);
break;
case OPT_fopt_info:
case OPT_fopt_info_:
/* Deferred. */
break;
case OPT_foffload_:
/* Deferred. */
break;
#ifndef ACCEL_COMPILER
case OPT_foffload_abi_:
error_at (loc, "%<-foffload-abi%> option can be specified only for "
"offload compiler");
break;
#endif
case OPT_fpack_struct_:
if (value <= 0 || (value & (value - 1)) || value > 16)
error_at (loc,
"structure alignment must be a small power of two, not %wu",
value);
else
opts->x_initial_max_fld_align = value;
break;
case OPT_fplugin_:
case OPT_fplugin_arg_:
/* Deferred. */
break;
case OPT_fprofile_use_:
opts->x_profile_data_prefix = xstrdup (arg);
opts->x_flag_profile_use = true;
value = true;
/* No break here - do -fprofile-use processing. */
/* FALLTHRU */
case OPT_fprofile_use:
enable_fdo_optimizations (opts, opts_set, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_reorder_functions,
value);
/* Indirect call profiling should do all useful transformations
speculative devirtualization does. */
if (opts->x_flag_value_profile_transformations)
SET_OPTION_IF_UNSET (opts, opts_set, flag_devirtualize_speculatively,
false);
break;
case OPT_fauto_profile_:
opts->x_auto_profile_file = xstrdup (arg);
opts->x_flag_auto_profile = true;
value = true;
/* No break here - do -fauto-profile processing. */
/* FALLTHRU */
case OPT_fauto_profile:
enable_fdo_optimizations (opts, opts_set, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_correction, value);
SET_OPTION_IF_UNSET (opts, opts_set,
param_early_inliner_max_iterations, 10);
break;
case OPT_fprofile_generate_:
opts->x_profile_data_prefix = xstrdup (arg);
value = true;
/* No break here - do -fprofile-generate processing. */
/* FALLTHRU */
case OPT_fprofile_generate:
SET_OPTION_IF_UNSET (opts, opts_set, profile_arc_flag, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value);
SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, value);
break;
case OPT_fprofile_info_section:
opts->x_profile_info_section = ".gcov_info";
break;
case OPT_fpatchable_function_entry_:
{
char *patch_area_arg = xstrdup (arg);
char *comma = strchr (patch_area_arg, ',');
if (comma)
{
*comma = '\0';
function_entry_patch_area_size =
integral_argument (patch_area_arg);
function_entry_patch_area_start =
integral_argument (comma + 1);
}
else
{
function_entry_patch_area_size =
integral_argument (patch_area_arg);
function_entry_patch_area_start = 0;
}
if (function_entry_patch_area_size < 0
|| function_entry_patch_area_size > USHRT_MAX
|| function_entry_patch_area_start < 0
|| function_entry_patch_area_start > USHRT_MAX
|| function_entry_patch_area_size
< function_entry_patch_area_start)
error ("invalid arguments for %<-fpatchable-function-entry%>");
free (patch_area_arg);
}
break;
case OPT_ftree_vectorize:
/* Automatically sets -ftree-loop-vectorize and
-ftree-slp-vectorize. Nothing more to do here. */
break;
case OPT_fzero_call_used_regs_:
opts->x_flag_zero_call_used_regs
= parse_zero_call_used_regs_options (arg);
break;
case OPT_fshow_column:
dc->show_column = value;
break;
case OPT_frandom_seed:
/* The real switch is -fno-random-seed. */
if (value)
return false;
/* Deferred. */
break;
case OPT_frandom_seed_:
/* Deferred. */
break;
case OPT_fsched_verbose_:
#ifdef INSN_SCHEDULING
/* Handled with Var in common.opt. */
break;
#else
return false;
#endif
case OPT_fsched_stalled_insns_:
opts->x_flag_sched_stalled_insns = value;
if (opts->x_flag_sched_stalled_insns == 0)
opts->x_flag_sched_stalled_insns = -1;
break;
case OPT_fsched_stalled_insns_dep_:
opts->x_flag_sched_stalled_insns_dep = value;
break;
case OPT_fstack_check_:
if (!strcmp (arg, "no"))
opts->x_flag_stack_check = NO_STACK_CHECK;
else if (!strcmp (arg, "generic"))
/* This is the old stack checking method. */
opts->x_flag_stack_check = STACK_CHECK_BUILTIN
? FULL_BUILTIN_STACK_CHECK
: GENERIC_STACK_CHECK;
else if (!strcmp (arg, "specific"))
/* This is the new stack checking method. */
opts->x_flag_stack_check = STACK_CHECK_BUILTIN
? FULL_BUILTIN_STACK_CHECK
: STACK_CHECK_STATIC_BUILTIN
? STATIC_BUILTIN_STACK_CHECK
: GENERIC_STACK_CHECK;
else
warning_at (loc, 0, "unknown stack check parameter %qs", arg);
break;
case OPT_fstack_limit:
/* The real switch is -fno-stack-limit. */
if (value)
return false;
/* Deferred. */
break;
case OPT_fstack_limit_register_:
case OPT_fstack_limit_symbol_:
/* Deferred. */
break;
case OPT_fstack_usage:
opts->x_flag_stack_usage = value;
opts->x_flag_stack_usage_info = value != 0;
break;
case OPT_g:
set_debug_level (NO_DEBUG, DEFAULT_GDB_EXTENSIONS, arg, opts, opts_set,
loc);
break;
case OPT_gdwarf:
if (arg && strlen (arg) != 0)
{
error_at (loc, "%<-gdwarf%s%> is ambiguous; "
"use %<-gdwarf-%s%> for DWARF version "
"or %<-gdwarf%> %<-g%s%> for debug level", arg, arg, arg);
break;
}
else
value = opts->x_dwarf_version;
/* FALLTHRU */
case OPT_gdwarf_:
if (value < 2 || value > 5)
error_at (loc, "dwarf version %wu is not supported", value);
else
opts->x_dwarf_version = value;
set_debug_level (DWARF2_DEBUG, false, "", opts, opts_set, loc);
break;
case OPT_ggdb:
set_debug_level (NO_DEBUG, 2, arg, opts, opts_set, loc);
break;
case OPT_gstabs:
case OPT_gstabs_:
set_debug_level (DBX_DEBUG, code == OPT_gstabs_, arg, opts, opts_set,
loc);
break;
case OPT_gvms:
set_debug_level (VMS_DEBUG, false, arg, opts, opts_set, loc);
break;
case OPT_gxcoff:
case OPT_gxcoff_:
set_debug_level (XCOFF_DEBUG, code == OPT_gxcoff_, arg, opts, opts_set,
loc);
break;
case OPT_gz:
case OPT_gz_:
/* Handled completely via specs. */
break;
case OPT_pedantic_errors:
dc->pedantic_errors = 1;
control_warning_option (OPT_Wpedantic, DK_ERROR, NULL, value,
loc, lang_mask,
handlers, opts, opts_set,
dc);
break;
case OPT_flto:
opts->x_flag_lto = value ? "" : NULL;
break;
case OPT_flto_:
if (strcmp (arg, "none") != 0
&& strcmp (arg, "jobserver") != 0
&& strcmp (arg, "auto") != 0
&& atoi (arg) == 0)
error_at (loc,
"unrecognized argument to %<-flto=%> option: %qs", arg);
break;
case OPT_w:
dc->dc_inhibit_warnings = true;
break;
case OPT_fmax_errors_:
dc->max_errors = value;
break;
case OPT_fuse_ld_bfd:
case OPT_fuse_ld_gold:
case OPT_fuse_ld_lld:
case OPT_fuse_linker_plugin:
/* No-op. Used by the driver and passed to us because it starts with f.*/
break;
case OPT_fwrapv:
if (value)
opts->x_flag_trapv = 0;
break;
case OPT_ftrapv:
if (value)
opts->x_flag_wrapv = 0;
break;
case OPT_fstrict_overflow:
opts->x_flag_wrapv = !value;
opts->x_flag_wrapv_pointer = !value;
if (!value)
opts->x_flag_trapv = 0;
break;
case OPT_fipa_icf:
opts->x_flag_ipa_icf_functions = value;
opts->x_flag_ipa_icf_variables = value;
break;
case OPT_falign_loops_:
check_alignment_argument (loc, arg, "loops",
&opts->x_flag_align_loops,
&opts->x_str_align_loops);
break;
case OPT_falign_jumps_:
check_alignment_argument (loc, arg, "jumps",
&opts->x_flag_align_jumps,
&opts->x_str_align_jumps);
break;
case OPT_falign_labels_:
check_alignment_argument (loc, arg, "labels",
&opts->x_flag_align_labels,
&opts->x_str_align_labels);
break;
case OPT_falign_functions_:
check_alignment_argument (loc, arg, "functions",
&opts->x_flag_align_functions,
&opts->x_str_align_functions);
break;
case OPT_ftabstop_:
/* It is documented that we silently ignore silly values. */
if (value >= 1 && value <= 100)
dc->tabstop = value;
break;
default:
/* If the flag was handled in a standard way, assume the lack of
processing here is intentional. */
gcc_assert (option_flag_var (scode, opts));
break;
}
common_handle_option_auto (opts, opts_set, decoded, lang_mask, kind,
loc, handlers, dc);
return true;
}
/* Used to set the level of strict aliasing warnings in OPTS,
when no level is specified (i.e., when -Wstrict-aliasing, and not
-Wstrict-aliasing=level was given).
ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified,
and 0 otherwise. After calling this function, wstrict_aliasing will be
set to the default value of -Wstrict_aliasing=level, currently 3. */
static void
set_Wstrict_aliasing (struct gcc_options *opts, int onoff)
{
gcc_assert (onoff == 0 || onoff == 1);
if (onoff != 0)
opts->x_warn_strict_aliasing = 3;
else
opts->x_warn_strict_aliasing = 0;
}
/* The following routines are useful in setting all the flags that
-ffast-math and -fno-fast-math imply. */
static void
set_fast_math_flags (struct gcc_options *opts, int set)
{
if (!opts->frontend_set_flag_unsafe_math_optimizations)
{
opts->x_flag_unsafe_math_optimizations = set;
set_unsafe_math_optimizations_flags (opts, set);
}
if (!opts->frontend_set_flag_finite_math_only)
opts->x_flag_finite_math_only = set;
if (!opts->frontend_set_flag_errno_math)
opts->x_flag_errno_math = !set;
if (set)
{
if (opts->frontend_set_flag_excess_precision == EXCESS_PRECISION_DEFAULT)
opts->x_flag_excess_precision
= set ? EXCESS_PRECISION_FAST : EXCESS_PRECISION_DEFAULT;
if (!opts->frontend_set_flag_signaling_nans)
opts->x_flag_signaling_nans = 0;
if (!opts->frontend_set_flag_rounding_math)
opts->x_flag_rounding_math = 0;
if (!opts->frontend_set_flag_cx_limited_range)
opts->x_flag_cx_limited_range = 1;
}
}
/* When -funsafe-math-optimizations is set the following
flags are set as well. */
static void
set_unsafe_math_optimizations_flags (struct gcc_options *opts, int set)
{
if (!opts->frontend_set_flag_trapping_math)
opts->x_flag_trapping_math = !set;
if (!opts->frontend_set_flag_signed_zeros)
opts->x_flag_signed_zeros = !set;
if (!opts->frontend_set_flag_associative_math)
opts->x_flag_associative_math = set;
if (!opts->frontend_set_flag_reciprocal_math)
opts->x_flag_reciprocal_math = set;
}
/* Return true iff flags in OPTS are set as if -ffast-math. */
bool
fast_math_flags_set_p (const struct gcc_options *opts)
{
return (!opts->x_flag_trapping_math
&& opts->x_flag_unsafe_math_optimizations
&& opts->x_flag_finite_math_only
&& !opts->x_flag_signed_zeros
&& !opts->x_flag_errno_math
&& opts->x_flag_excess_precision == EXCESS_PRECISION_FAST);
}
/* Return true iff flags are set as if -ffast-math but using the flags stored
in the struct cl_optimization structure. */
bool
fast_math_flags_struct_set_p (struct cl_optimization *opt)
{
return (!opt->x_flag_trapping_math
&& opt->x_flag_unsafe_math_optimizations
&& opt->x_flag_finite_math_only
&& !opt->x_flag_signed_zeros
&& !opt->x_flag_errno_math);
}
/* Handle a debug output -g switch for options OPTS
(OPTS_SET->x_write_symbols storing whether a debug type was passed
explicitly), location LOC. EXTENDED is true or false to support
extended output (2 is special and means "-ggdb" was given). */
static void
set_debug_level (enum debug_info_type type, int extended, const char *arg,
struct gcc_options *opts, struct gcc_options *opts_set,
location_t loc)
{
opts->x_use_gnu_debug_info_extensions = extended;
if (type == NO_DEBUG)
{
if (opts->x_write_symbols == NO_DEBUG)
{
opts->x_write_symbols = PREFERRED_DEBUGGING_TYPE;
if (extended == 2)
{
#if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO
opts->x_write_symbols = DWARF2_DEBUG;
#elif defined DBX_DEBUGGING_INFO
opts->x_write_symbols = DBX_DEBUG;
#endif
}
if (opts->x_write_symbols == NO_DEBUG)
warning_at (loc, 0, "target system does not support debug output");
}
}
else
{
/* Does it conflict with an already selected type? */
if (opts_set->x_write_symbols != NO_DEBUG
&& opts->x_write_symbols != NO_DEBUG
&& type != opts->x_write_symbols)
error_at (loc, "debug format %qs conflicts with prior selection",
debug_type_names[type]);
opts->x_write_symbols = type;
opts_set->x_write_symbols = type;
}
/* A debug flag without a level defaults to level 2.
If off or at level 1, set it to level 2, but if already
at level 3, don't lower it. */
if (*arg == '\0')
{
if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL)
opts->x_debug_info_level = DINFO_LEVEL_NORMAL;
}
else
{
int argval = integral_argument (arg);
if (argval == -1)
error_at (loc, "unrecognized debug output level %qs", arg);
else if (argval > 3)
error_at (loc, "debug output level %qs is too high", arg);
else
opts->x_debug_info_level = (enum debug_info_levels) argval;
}
}
/* Arrange to dump core on error for diagnostic context DC. (The
regular error message is still printed first, except in the case of
abort ().) */
static void
setup_core_dumping (diagnostic_context *dc)
{
#ifdef SIGABRT
signal (SIGABRT, SIG_DFL);
#endif
#if defined(HAVE_SETRLIMIT)
{
struct rlimit rlim;
if (getrlimit (RLIMIT_CORE, &rlim) != 0)
fatal_error (input_location, "getting core file size maximum limit: %m");
rlim.rlim_cur = rlim.rlim_max;
if (setrlimit (RLIMIT_CORE, &rlim) != 0)
fatal_error (input_location,
"setting core file size limit to maximum: %m");
}
#endif
diagnostic_abort_on_error (dc);
}
/* Parse a -d command line switch for OPTS, location LOC,
diagnostic context DC. */
static void
decode_d_option (const char *arg, struct gcc_options *opts,
location_t loc, diagnostic_context *dc)
{
int c;
while (*arg)
switch (c = *arg++)
{
case 'A':
opts->x_flag_debug_asm = 1;
break;
case 'p':
opts->x_flag_print_asm_name = 1;
break;
case 'P':
opts->x_flag_dump_rtl_in_asm = 1;
opts->x_flag_print_asm_name = 1;
break;
case 'x':
opts->x_rtl_dump_and_exit = 1;
break;
case 'D': /* These are handled by the preprocessor. */
case 'I':
case 'M':
case 'N':
case 'U':
break;
case 'H':
setup_core_dumping (dc);
break;
case 'a':
opts->x_flag_dump_all_passed = true;
break;
default:
warning_at (loc, 0, "unrecognized gcc debugging option: %c", c);
break;
}
}
/* Enable (or disable if VALUE is 0) a warning option ARG (language
mask LANG_MASK, option handlers HANDLERS) as an error for option
structures OPTS and OPTS_SET, diagnostic context DC (possibly
NULL), location LOC. This is used by -Werror=. */
static void
enable_warning_as_error (const char *arg, int value, unsigned int lang_mask,
const struct cl_option_handlers *handlers,
struct gcc_options *opts,
struct gcc_options *opts_set,
location_t loc, diagnostic_context *dc)
{
char *new_option;
int option_index;
new_option = XNEWVEC (char, strlen (arg) + 2);
new_option[0] = 'W';
strcpy (new_option + 1, arg);
option_index = find_opt (new_option, lang_mask);
if (option_index == OPT_SPECIAL_unknown)
{
option_proposer op;
const char *hint = op.suggest_option (new_option);
if (hint)
error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>;"
" did you mean %<-%s%>?", value ? "" : "no-",
arg, new_option, hint);
else
error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>",
value ? "" : "no-", arg, new_option);
}
else if (!(cl_options[option_index].flags & CL_WARNING))
error_at (loc, "%<-Werror=%s%>: %<-%s%> is not an option that "
"controls warnings", arg, new_option);
else
{
const diagnostic_t kind = value ? DK_ERROR : DK_WARNING;
const char *arg = NULL;
if (cl_options[option_index].flags & CL_JOINED)
arg = new_option + cl_options[option_index].opt_len;
control_warning_option (option_index, (int) kind, arg, value,
loc, lang_mask,
handlers, opts, opts_set, dc);
}
free (new_option);
}
/* Return malloced memory for the name of the option OPTION_INDEX
which enabled a diagnostic (context CONTEXT), originally of type
ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such
as -Werror. */
char *
option_name (diagnostic_context *context, int option_index,
diagnostic_t orig_diag_kind, diagnostic_t diag_kind)
{
if (option_index)
{
/* A warning classified as an error. */
if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN)
&& diag_kind == DK_ERROR)
return concat (cl_options[OPT_Werror_].opt_text,
/* Skip over "-W". */
cl_options[option_index].opt_text + 2,
NULL);
/* A warning with option. */
else
return xstrdup (cl_options[option_index].opt_text);
}
/* A warning without option classified as an error. */
else if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN
|| diag_kind == DK_WARNING)
&& context->warning_as_error_requested)
return xstrdup (cl_options[OPT_Werror].opt_text);
else
return NULL;
}
/* Get the page within the documentation for this option. */
static const char *
get_option_html_page (int option_index)
{
const cl_option *cl_opt = &cl_options[option_index];
/* Analyzer options are on their own page. */
if (strstr(cl_opt->opt_text, "analyzer-"))
return "gcc/Static-Analyzer-Options.html";
#ifdef CL_Fortran
if ((cl_opt->flags & CL_Fortran) != 0
/* If it is option common to both C/C++ and Fortran, it is documented
in gcc/ rather than gfortran/ docs. */
&& (cl_opt->flags & CL_C) == 0
#ifdef CL_CXX
&& (cl_opt->flags & CL_CXX) == 0
#endif
)
return "gfortran/Error-and-Warning-Options.html";
#endif
return "gcc/Warning-Options.html";
}
/* Return malloced memory for a URL describing the option OPTION_INDEX
which enabled a diagnostic (context CONTEXT). */
char *
get_option_url (diagnostic_context *, int option_index)
{
if (option_index)
return concat (/* DOCUMENTATION_ROOT_URL should be supplied via -D by
the Makefile (see --with-documentation-root-url), and
should have a trailing slash. */
DOCUMENTATION_ROOT_URL,
/* get_option_html_page will return something like
"gcc/Warning-Options.html". */
get_option_html_page (option_index),
/* Expect an anchor of the form "index-Wfoo" e.g.
, and thus an id within
the URL of "#index-Wformat". */
"#index", cl_options[option_index].opt_text,
NULL);
else
return NULL;
}
/* Return a heap allocated producer with command line options. */
char *
gen_command_line_string (cl_decoded_option *options,
unsigned int options_count)
{
auto_vec switches;
char *options_string, *tail;
const char *p;
size_t len = 0;
for (unsigned i = 0; i < options_count; i++)
switch (options[i].opt_index)
{
case OPT_o:
case OPT_d:
case OPT_dumpbase:
case OPT_dumpdir:
case OPT_quiet:
case OPT_version:
case OPT_v:
case OPT_w:
case OPT_L:
case OPT_D:
case OPT_I:
case OPT_U:
case OPT_SPECIAL_unknown:
case OPT_SPECIAL_ignore:
case OPT_SPECIAL_warn_removed:
case OPT_SPECIAL_program_name:
case OPT_SPECIAL_input_file:
case OPT_grecord_gcc_switches:
case OPT_frecord_gcc_switches:
case OPT__output_pch_:
case OPT_fdiagnostics_show_location_:
case OPT_fdiagnostics_show_option:
case OPT_fdiagnostics_show_caret:
case OPT_fdiagnostics_show_labels:
case OPT_fdiagnostics_show_line_numbers:
case OPT_fdiagnostics_color_:
case OPT_fdiagnostics_format_:
case OPT_fverbose_asm:
case OPT____:
case OPT__sysroot_:
case OPT_nostdinc:
case OPT_nostdinc__:
case OPT_fpreprocessed:
case OPT_fltrans_output_list_:
case OPT_fresolution_:
case OPT_fdebug_prefix_map_:
case OPT_fmacro_prefix_map_:
case OPT_ffile_prefix_map_:
case OPT_fcompare_debug:
case OPT_fchecking:
case OPT_fchecking_:
/* Ignore these. */
continue;
case OPT_flto_:
{
const char *lto_canonical = "-flto";
switches.safe_push (lto_canonical);
len += strlen (lto_canonical) + 1;
break;
}
default:
if (cl_options[options[i].opt_index].flags
& CL_NO_DWARF_RECORD)
continue;
gcc_checking_assert (options[i].canonical_option[0][0] == '-');
switch (options[i].canonical_option[0][1])
{
case 'M':
case 'i':
case 'W':
continue;
case 'f':
if (strncmp (options[i].canonical_option[0] + 2,
"dump", 4) == 0)
continue;
break;
default:
break;
}
switches.safe_push (options[i].orig_option_with_args_text);
len += strlen (options[i].orig_option_with_args_text) + 1;
break;
}
options_string = XNEWVEC (char, len + 1);
tail = options_string;
unsigned i;
FOR_EACH_VEC_ELT (switches, i, p)
{
len = strlen (p);
memcpy (tail, p, len);
tail += len;
if (i != switches.length () - 1)
{
*tail = ' ';
++tail;
}
}
*tail = '\0';
return options_string;
}
/* Return a heap allocated producer string including command line options. */
char *
gen_producer_string (const char *language_string, cl_decoded_option *options,
unsigned int options_count)
{
return concat (language_string, " ", version_string, " ",
gen_command_line_string (options, options_count), NULL);
}
#if CHECKING_P
namespace selftest {
/* Verify that get_option_html_page works as expected. */
static void
test_get_option_html_page ()
{
ASSERT_STREQ (get_option_html_page (OPT_Wcpp), "gcc/Warning-Options.html");
ASSERT_STREQ (get_option_html_page (OPT_Wanalyzer_double_free),
"gcc/Static-Analyzer-Options.html");
#ifdef CL_Fortran
ASSERT_STREQ (get_option_html_page (OPT_Wline_truncation),
"gfortran/Error-and-Warning-Options.html");
#endif
}
/* Run all of the selftests within this file. */
void
opts_c_tests ()
{
test_get_option_html_page ();
}
} // namespace selftest
#endif /* #if CHECKING_P */