/* Command line option handling. Copyright (C) 2002-2023 Free Software Foundation, Inc. Contributed by Neil Booth. This file is part of GCC. GCC is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. GCC is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with GCC; see the file COPYING3. If not see . */ #include "config.h" #include "system.h" #include "intl.h" #include "coretypes.h" #include "opts.h" #include "tm.h" #include "flags.h" #include "diagnostic.h" #include "opts-diagnostic.h" #include "insn-attr-common.h" #include "common/common-target.h" #include "spellcheck.h" #include "opt-suggestions.h" #include "diagnostic-color.h" #include "version.h" #include "selftest.h" #include "file-prefix-map.h" /* In this file all option sets are explicit. */ #undef OPTION_SET_P /* Set by -fcanon-prefix-map. */ bool flag_canon_prefix_map; /* Set by finish_options when flag_stack_protector was set only because of -fhardened. Yuck. */ bool flag_stack_protector_set_by_fhardened_p; static void set_Wstrict_aliasing (struct gcc_options *opts, int onoff); /* Names of fundamental debug info formats indexed by enum debug_info_type. */ const char *const debug_type_names[] = { "none", "dwarf-2", "vms", "ctf", "btf" }; /* Bitmasks of fundamental debug info formats indexed by enum debug_info_type. */ static uint32_t debug_type_masks[] = { NO_DEBUG, DWARF2_DEBUG, VMS_DEBUG, CTF_DEBUG, BTF_DEBUG }; /* Names of the set of debug formats requested by user. Updated and accessed via debug_set_names. */ static char df_set_names[sizeof "none dwarf-2 vms ctf btf"]; /* Get enum debug_info_type of the specified debug format, for error messages. Can be used only for individual debug format types. */ enum debug_info_type debug_set_to_format (uint32_t debug_info_set) { int idx = 0; enum debug_info_type dinfo_type = DINFO_TYPE_NONE; /* Find first set bit. */ if (debug_info_set) idx = exact_log2 (debug_info_set & - debug_info_set); /* Check that only one bit is set, if at all. This function is meant to be used only for vanilla debug_info_set bitmask values, i.e. for individual debug format types upto DINFO_TYPE_MAX. */ gcc_assert ((debug_info_set & (debug_info_set - 1)) == 0); dinfo_type = (enum debug_info_type)idx; gcc_assert (dinfo_type <= DINFO_TYPE_MAX); return dinfo_type; } /* Get the number of debug formats enabled for output. */ unsigned int debug_set_count (uint32_t w_symbols) { unsigned int count = 0; while (w_symbols) { ++ count; w_symbols &= ~ (w_symbols & - w_symbols); } return count; } /* Get the names of the debug formats enabled for output. */ const char * debug_set_names (uint32_t w_symbols) { uint32_t df_mask = 0; /* Reset the string to be returned. */ memset (df_set_names, 0, sizeof (df_set_names)); /* Get the popcount. */ int num_set_df = debug_set_count (w_symbols); /* Iterate over the debug formats. Add name string for those enabled. */ for (int i = DINFO_TYPE_NONE; i <= DINFO_TYPE_MAX; i++) { df_mask = debug_type_masks[i]; if (w_symbols & df_mask) { strcat (df_set_names, debug_type_names[i]); num_set_df--; if (num_set_df) strcat (df_set_names, " "); else break; } else if (!w_symbols) { /* No debug formats enabled. */ gcc_assert (i == DINFO_TYPE_NONE); strcat (df_set_names, debug_type_names[i]); break; } } return df_set_names; } /* Return TRUE iff BTF debug info is enabled. */ bool btf_debuginfo_p () { return (write_symbols & BTF_DEBUG); } /* Return TRUE iff BTF with CO-RE debug info is enabled. */ bool btf_with_core_debuginfo_p () { return (write_symbols & BTF_WITH_CORE_DEBUG); } /* Return TRUE iff CTF debug info is enabled. */ bool ctf_debuginfo_p () { return (write_symbols & CTF_DEBUG); } /* Return TRUE iff dwarf2 debug info is enabled. */ bool dwarf_debuginfo_p (struct gcc_options *opts) { return (opts->x_write_symbols & DWARF2_DEBUG); } /* Return true iff the debug info format is to be generated based on DWARF DIEs (like CTF and BTF debug info formats). */ bool dwarf_based_debuginfo_p () { return ((write_symbols & CTF_DEBUG) || (write_symbols & BTF_DEBUG)); } /* All flag uses below need to explicitely reference the option sets to operate on. */ #define global_options DO_NOT_USE #define global_options_set DO_NOT_USE /* Parse the -femit-struct-debug-detailed option value and set the flag variables. */ #define MATCH( prefix, string ) \ ((strncmp (prefix, string, sizeof prefix - 1) == 0) \ ? ((string += sizeof prefix - 1), 1) : 0) void set_struct_debug_option (struct gcc_options *opts, location_t loc, const char *spec) { /* various labels for comparison */ static const char dfn_lbl[] = "dfn:", dir_lbl[] = "dir:", ind_lbl[] = "ind:"; static const char ord_lbl[] = "ord:", gen_lbl[] = "gen:"; static const char none_lbl[] = "none", any_lbl[] = "any"; static const char base_lbl[] = "base", sys_lbl[] = "sys"; enum debug_struct_file files = DINFO_STRUCT_FILE_ANY; /* Default is to apply to as much as possible. */ enum debug_info_usage usage = DINFO_USAGE_NUM_ENUMS; int ord = 1, gen = 1; /* What usage? */ if (MATCH (dfn_lbl, spec)) usage = DINFO_USAGE_DFN; else if (MATCH (dir_lbl, spec)) usage = DINFO_USAGE_DIR_USE; else if (MATCH (ind_lbl, spec)) usage = DINFO_USAGE_IND_USE; /* Generics or not? */ if (MATCH (ord_lbl, spec)) gen = 0; else if (MATCH (gen_lbl, spec)) ord = 0; /* What allowable environment? */ if (MATCH (none_lbl, spec)) files = DINFO_STRUCT_FILE_NONE; else if (MATCH (any_lbl, spec)) files = DINFO_STRUCT_FILE_ANY; else if (MATCH (sys_lbl, spec)) files = DINFO_STRUCT_FILE_SYS; else if (MATCH (base_lbl, spec)) files = DINFO_STRUCT_FILE_BASE; else error_at (loc, "argument %qs to %<-femit-struct-debug-detailed%> " "not recognized", spec); /* Effect the specification. */ if (usage == DINFO_USAGE_NUM_ENUMS) { if (ord) { opts->x_debug_struct_ordinary[DINFO_USAGE_DFN] = files; opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE] = files; opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE] = files; } if (gen) { opts->x_debug_struct_generic[DINFO_USAGE_DFN] = files; opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE] = files; opts->x_debug_struct_generic[DINFO_USAGE_IND_USE] = files; } } else { if (ord) opts->x_debug_struct_ordinary[usage] = files; if (gen) opts->x_debug_struct_generic[usage] = files; } if (*spec == ',') set_struct_debug_option (opts, loc, spec+1); else { /* No more -femit-struct-debug-detailed specifications. Do final checks. */ if (*spec != '\0') error_at (loc, "argument %qs to %<-femit-struct-debug-detailed%> unknown", spec); if (opts->x_debug_struct_ordinary[DINFO_USAGE_DIR_USE] < opts->x_debug_struct_ordinary[DINFO_USAGE_IND_USE] || opts->x_debug_struct_generic[DINFO_USAGE_DIR_USE] < opts->x_debug_struct_generic[DINFO_USAGE_IND_USE]) error_at (loc, "%<-femit-struct-debug-detailed=dir:...%> must allow " "at least as much as " "%<-femit-struct-debug-detailed=ind:...%>"); } } /* Strip off a legitimate source ending from the input string NAME of length LEN. Rather than having to know the names used by all of our front ends, we strip off an ending of a period followed by up to fource characters. (C++ uses ".cpp".) */ void strip_off_ending (char *name, int len) { int i; for (i = 2; i < 5 && len > i; i++) { if (name[len - i] == '.') { name[len - i] = '\0'; break; } } } /* Find the base name of a path, stripping off both directories and a single final extension. */ int base_of_path (const char *path, const char **base_out) { const char *base = path; const char *dot = 0; const char *p = path; char c = *p; while (c) { if (IS_DIR_SEPARATOR (c)) { base = p + 1; dot = 0; } else if (c == '.') dot = p; c = *++p; } if (!dot) dot = p; *base_out = base; return dot - base; } /* What to print when a switch has no documentation. */ static const char undocumented_msg[] = N_("This option lacks documentation."); static const char use_diagnosed_msg[] = N_("Uses of this option are diagnosed."); typedef char *char_p; /* For DEF_VEC_P. */ static void set_debug_level (uint32_t dinfo, int extended, const char *arg, struct gcc_options *opts, struct gcc_options *opts_set, location_t loc); static void set_fast_math_flags (struct gcc_options *opts, int set); static void decode_d_option (const char *arg, struct gcc_options *opts, location_t loc, diagnostic_context *dc); static void set_unsafe_math_optimizations_flags (struct gcc_options *opts, int set); static void enable_warning_as_error (const char *arg, int value, unsigned int lang_mask, const struct cl_option_handlers *handlers, struct gcc_options *opts, struct gcc_options *opts_set, location_t loc, diagnostic_context *dc); /* Handle a back-end option; arguments and return value as for handle_option. */ bool target_handle_option (struct gcc_options *opts, struct gcc_options *opts_set, const struct cl_decoded_option *decoded, unsigned int lang_mask ATTRIBUTE_UNUSED, int kind, location_t loc, const struct cl_option_handlers *handlers ATTRIBUTE_UNUSED, diagnostic_context *dc, void (*) (void)) { gcc_assert (dc == global_dc); gcc_assert (kind == DK_UNSPECIFIED); return targetm_common.handle_option (opts, opts_set, decoded, loc); } /* Add comma-separated strings to a char_p vector. */ static void add_comma_separated_to_vector (void **pvec, const char *arg) { char *tmp; char *r; char *w; char *token_start; vec *v = (vec *) *pvec; vec_check_alloc (v, 1); /* We never free this string. */ tmp = xstrdup (arg); r = tmp; w = tmp; token_start = tmp; while (*r != '\0') { if (*r == ',') { *w++ = '\0'; ++r; v->safe_push (token_start); token_start = w; } if (*r == '\\' && r[1] == ',') { *w++ = ','; r += 2; } else *w++ = *r++; } *w = '\0'; if (*token_start != '\0') v->safe_push (token_start); *pvec = v; } /* Initialize opts_obstack. */ void init_opts_obstack (void) { gcc_obstack_init (&opts_obstack); } /* Initialize OPTS and OPTS_SET before using them in parsing options. */ void init_options_struct (struct gcc_options *opts, struct gcc_options *opts_set) { /* Ensure that opts_obstack has already been initialized by the time that we initialize any gcc_options instances (PR jit/68446). */ gcc_assert (opts_obstack.chunk_size > 0); *opts = global_options_init; if (opts_set) memset (opts_set, 0, sizeof (*opts_set)); /* Initialize whether `char' is signed. */ opts->x_flag_signed_char = DEFAULT_SIGNED_CHAR; /* Set this to a special "uninitialized" value. The actual default is set after target options have been processed. */ opts->x_flag_short_enums = 2; /* Initialize target_flags before default_options_optimization so the latter can modify it. */ opts->x_target_flags = targetm_common.default_target_flags; /* Some targets have ABI-specified unwind tables. */ opts->x_flag_unwind_tables = targetm_common.unwind_tables_default; /* Some targets have other target-specific initialization. */ targetm_common.option_init_struct (opts); } /* If indicated by the optimization level LEVEL (-Os if SIZE is set, -Ofast if FAST is set, -Og if DEBUG is set), apply the option DEFAULT_OPT to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language mask LANG_MASK and option handlers HANDLERS. */ static void maybe_default_option (struct gcc_options *opts, struct gcc_options *opts_set, const struct default_options *default_opt, int level, bool size, bool fast, bool debug, unsigned int lang_mask, const struct cl_option_handlers *handlers, location_t loc, diagnostic_context *dc) { const struct cl_option *option = &cl_options[default_opt->opt_index]; bool enabled; if (size) gcc_assert (level == 2); if (fast) gcc_assert (level == 3); if (debug) gcc_assert (level == 1); switch (default_opt->levels) { case OPT_LEVELS_ALL: enabled = true; break; case OPT_LEVELS_0_ONLY: enabled = (level == 0); break; case OPT_LEVELS_1_PLUS: enabled = (level >= 1); break; case OPT_LEVELS_1_PLUS_SPEED_ONLY: enabled = (level >= 1 && !size && !debug); break; case OPT_LEVELS_1_PLUS_NOT_DEBUG: enabled = (level >= 1 && !debug); break; case OPT_LEVELS_2_PLUS: enabled = (level >= 2); break; case OPT_LEVELS_2_PLUS_SPEED_ONLY: enabled = (level >= 2 && !size && !debug); break; case OPT_LEVELS_3_PLUS: enabled = (level >= 3); break; case OPT_LEVELS_3_PLUS_AND_SIZE: enabled = (level >= 3 || size); break; case OPT_LEVELS_SIZE: enabled = size; break; case OPT_LEVELS_FAST: enabled = fast; break; case OPT_LEVELS_NONE: default: gcc_unreachable (); } if (enabled) handle_generated_option (opts, opts_set, default_opt->opt_index, default_opt->arg, default_opt->value, lang_mask, DK_UNSPECIFIED, loc, handlers, true, dc); else if (default_opt->arg == NULL && !option->cl_reject_negative && !(option->flags & CL_PARAMS)) handle_generated_option (opts, opts_set, default_opt->opt_index, default_opt->arg, !default_opt->value, lang_mask, DK_UNSPECIFIED, loc, handlers, true, dc); } /* As indicated by the optimization level LEVEL (-Os if SIZE is set, -Ofast if FAST is set), apply the options in array DEFAULT_OPTS to OPTS and OPTS_SET, diagnostic context DC, location LOC, with language mask LANG_MASK and option handlers HANDLERS. */ static void maybe_default_options (struct gcc_options *opts, struct gcc_options *opts_set, const struct default_options *default_opts, int level, bool size, bool fast, bool debug, unsigned int lang_mask, const struct cl_option_handlers *handlers, location_t loc, diagnostic_context *dc) { size_t i; for (i = 0; default_opts[i].levels != OPT_LEVELS_NONE; i++) maybe_default_option (opts, opts_set, &default_opts[i], level, size, fast, debug, lang_mask, handlers, loc, dc); } /* Table of options enabled by default at different levels. Please keep this list sorted by level and alphabetized within each level; this makes it easier to keep the documentation in sync. */ static const struct default_options default_options_table[] = { /* -O1 and -Og optimizations. */ { OPT_LEVELS_1_PLUS, OPT_fcombine_stack_adjustments, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fcompare_elim, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fcprop_registers, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fdefer_pop, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fforward_propagate, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fguess_branch_probability, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fipa_profile, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fipa_pure_const, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fipa_reference, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fipa_reference_addressable, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fmerge_constants, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fomit_frame_pointer, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_freorder_blocks, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fshrink_wrap, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fsplit_wide_types, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fthread_jumps, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_builtin_call_dce, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_ccp, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_ch, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_coalesce_vars, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_copy_prop, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_dce, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_dominator_opts, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_fre, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_sink, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_slsr, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_ftree_ter, NULL, 1 }, { OPT_LEVELS_1_PLUS, OPT_fvar_tracking, NULL, 1 }, /* -O1 (and not -Og) optimizations. */ { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fbranch_count_reg, NULL, 1 }, #if DELAY_SLOTS { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdelayed_branch, NULL, 1 }, #endif { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fdse, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fif_conversion2, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_finline_functions_called_once, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fmove_loop_invariants, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fmove_loop_stores, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fssa_phiopt, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_fipa_modref, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_bit_ccp, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_dse, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_pta, NULL, 1 }, { OPT_LEVELS_1_PLUS_NOT_DEBUG, OPT_ftree_sra, NULL, 1 }, /* -O2 and -Os optimizations. */ { OPT_LEVELS_2_PLUS, OPT_fcaller_saves, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fcode_hoisting, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fcrossjumping, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fcse_follow_jumps, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fdevirtualize, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fdevirtualize_speculatively, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fexpensive_optimizations, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fgcse, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fhoist_adjacent_loads, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_findirect_inlining, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_finline_small_functions, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_bit_cp, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_cp, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_icf, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_ra, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_sra, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fipa_vrp, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fisolate_erroneous_paths_dereference, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_flra_remat, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_foptimize_sibling_calls, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fpartial_inlining, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fpeephole2, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_freorder_functions, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_frerun_cse_after_loop, NULL, 1 }, #ifdef INSN_SCHEDULING { OPT_LEVELS_2_PLUS, OPT_fschedule_insns2, NULL, 1 }, #endif { OPT_LEVELS_2_PLUS, OPT_fstrict_aliasing, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fstore_merging, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_ftree_pre, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_ftree_switch_conversion, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_ftree_tail_merge, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_ftree_vrp, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_fvect_cost_model_, NULL, VECT_COST_MODEL_VERY_CHEAP }, { OPT_LEVELS_2_PLUS, OPT_finline_functions, NULL, 1 }, { OPT_LEVELS_2_PLUS, OPT_ftree_loop_distribute_patterns, NULL, 1 }, /* -O2 and above optimizations, but not -Os or -Og. */ { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_functions, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_jumps, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_labels, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_falign_loops, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_foptimize_strlen, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_freorder_blocks_algorithm_, NULL, REORDER_BLOCKS_ALGORITHM_STC }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_ftree_loop_vectorize, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_ftree_slp_vectorize, NULL, 1 }, { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_fopenmp_target_simd_clone_, NULL, OMP_TARGET_SIMD_CLONE_NOHOST }, #ifdef INSN_SCHEDULING /* Only run the pre-regalloc scheduling pass if optimizing for speed. */ { OPT_LEVELS_2_PLUS_SPEED_ONLY, OPT_fschedule_insns, NULL, 1 }, #endif /* -O3 and -Os optimizations. */ /* -O3 optimizations. */ { OPT_LEVELS_3_PLUS, OPT_fgcse_after_reload, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fipa_cp_clone, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_floop_interchange, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_floop_unroll_and_jam, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fpeel_loops, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fpredictive_commoning, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fsplit_loops, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fsplit_paths, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_ftree_loop_distribution, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_ftree_partial_pre, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_funswitch_loops, NULL, 1 }, { OPT_LEVELS_3_PLUS, OPT_fvect_cost_model_, NULL, VECT_COST_MODEL_DYNAMIC }, { OPT_LEVELS_3_PLUS, OPT_fversion_loops_for_strides, NULL, 1 }, /* -O3 parameters. */ { OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_auto_, NULL, 30 }, { OPT_LEVELS_3_PLUS, OPT__param_early_inlining_insns_, NULL, 14 }, { OPT_LEVELS_3_PLUS, OPT__param_inline_heuristics_hint_percent_, NULL, 600 }, { OPT_LEVELS_3_PLUS, OPT__param_inline_min_speedup_, NULL, 15 }, { OPT_LEVELS_3_PLUS, OPT__param_max_inline_insns_single_, NULL, 200 }, /* -Ofast adds optimizations to -O3. */ { OPT_LEVELS_FAST, OPT_ffast_math, NULL, 1 }, { OPT_LEVELS_FAST, OPT_fallow_store_data_races, NULL, 1 }, { OPT_LEVELS_FAST, OPT_fsemantic_interposition, NULL, 0 }, { OPT_LEVELS_NONE, 0, NULL, 0 } }; /* Default the options in OPTS and OPTS_SET based on the optimization settings in DECODED_OPTIONS and DECODED_OPTIONS_COUNT. */ void default_options_optimization (struct gcc_options *opts, struct gcc_options *opts_set, struct cl_decoded_option *decoded_options, unsigned int decoded_options_count, location_t loc, unsigned int lang_mask, const struct cl_option_handlers *handlers, diagnostic_context *dc) { unsigned int i; int opt2; bool openacc_mode = false; /* Scan to see what optimization level has been specified. That will determine the default value of many flags. */ for (i = 1; i < decoded_options_count; i++) { struct cl_decoded_option *opt = &decoded_options[i]; switch (opt->opt_index) { case OPT_O: if (*opt->arg == '\0') { opts->x_optimize = 1; opts->x_optimize_size = 0; opts->x_optimize_fast = 0; opts->x_optimize_debug = 0; } else { const int optimize_val = integral_argument (opt->arg); if (optimize_val == -1) error_at (loc, "argument to %<-O%> should be a non-negative " "integer, %, %, % or %"); else { opts->x_optimize = optimize_val; if ((unsigned int) opts->x_optimize > 255) opts->x_optimize = 255; opts->x_optimize_size = 0; opts->x_optimize_fast = 0; opts->x_optimize_debug = 0; } } break; case OPT_Os: opts->x_optimize_size = 1; /* Optimizing for size forces optimize to be 2. */ opts->x_optimize = 2; opts->x_optimize_fast = 0; opts->x_optimize_debug = 0; break; case OPT_Oz: opts->x_optimize_size = 2; /* Optimizing for size forces optimize to be 2. */ opts->x_optimize = 2; opts->x_optimize_fast = 0; opts->x_optimize_debug = 0; break; case OPT_Ofast: /* -Ofast only adds flags to -O3. */ opts->x_optimize_size = 0; opts->x_optimize = 3; opts->x_optimize_fast = 1; opts->x_optimize_debug = 0; break; case OPT_Og: /* -Og selects optimization level 1. */ opts->x_optimize_size = 0; opts->x_optimize = 1; opts->x_optimize_fast = 0; opts->x_optimize_debug = 1; break; case OPT_fopenacc: if (opt->value) openacc_mode = true; break; default: /* Ignore other options in this prescan. */ break; } } maybe_default_options (opts, opts_set, default_options_table, opts->x_optimize, opts->x_optimize_size, opts->x_optimize_fast, opts->x_optimize_debug, lang_mask, handlers, loc, dc); /* -O2 param settings. */ opt2 = (opts->x_optimize >= 2); if (openacc_mode) SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_pta, true); /* Track fields in field-sensitive alias analysis. */ if (opt2) SET_OPTION_IF_UNSET (opts, opts_set, param_max_fields_for_field_sensitive, 100); if (opts->x_optimize_size) /* We want to crossjump as much as possible. */ SET_OPTION_IF_UNSET (opts, opts_set, param_min_crossjump_insns, 1); /* Restrict the amount of work combine does at -Og while retaining most of its useful transforms. */ if (opts->x_optimize_debug) SET_OPTION_IF_UNSET (opts, opts_set, param_max_combine_insns, 2); /* Allow default optimizations to be specified on a per-machine basis. */ maybe_default_options (opts, opts_set, targetm_common.option_optimization_table, opts->x_optimize, opts->x_optimize_size, opts->x_optimize_fast, opts->x_optimize_debug, lang_mask, handlers, loc, dc); } /* Control IPA optimizations based on different live patching LEVEL. */ static void control_options_for_live_patching (struct gcc_options *opts, struct gcc_options *opts_set, enum live_patching_level level, location_t loc) { gcc_assert (level > LIVE_PATCHING_NONE); switch (level) { case LIVE_PATCHING_INLINE_ONLY_STATIC: #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static" if (opts_set->x_flag_ipa_cp_clone && opts->x_flag_ipa_cp_clone) error_at (loc, "%qs is incompatible with %qs", "-fipa-cp-clone", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_cp_clone = 0; if (opts_set->x_flag_ipa_sra && opts->x_flag_ipa_sra) error_at (loc, "%qs is incompatible with %qs", "-fipa-sra", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_sra = 0; if (opts_set->x_flag_partial_inlining && opts->x_flag_partial_inlining) error_at (loc, "%qs is incompatible with %qs", "-fpartial-inlining", LIVE_PATCHING_OPTION); else opts->x_flag_partial_inlining = 0; if (opts_set->x_flag_ipa_cp && opts->x_flag_ipa_cp) error_at (loc, "%qs is incompatible with %qs", "-fipa-cp", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_cp = 0; /* FALLTHROUGH. */ case LIVE_PATCHING_INLINE_CLONE: #undef LIVE_PATCHING_OPTION #define LIVE_PATCHING_OPTION "-flive-patching=inline-only-static|inline-clone" /* live patching should disable whole-program optimization. */ if (opts_set->x_flag_whole_program && opts->x_flag_whole_program) error_at (loc, "%qs is incompatible with %qs", "-fwhole-program", LIVE_PATCHING_OPTION); else opts->x_flag_whole_program = 0; /* visibility change should be excluded by !flag_whole_program && !in_lto_p && !flag_ipa_cp_clone && !flag_ipa_sra && !flag_partial_inlining. */ if (opts_set->x_flag_ipa_pta && opts->x_flag_ipa_pta) error_at (loc, "%qs is incompatible with %qs", "-fipa-pta", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_pta = 0; if (opts_set->x_flag_ipa_reference && opts->x_flag_ipa_reference) error_at (loc, "%qs is incompatible with %qs", "-fipa-reference", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_reference = 0; if (opts_set->x_flag_ipa_ra && opts->x_flag_ipa_ra) error_at (loc, "%qs is incompatible with %qs", "-fipa-ra", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_ra = 0; if (opts_set->x_flag_ipa_icf && opts->x_flag_ipa_icf) error_at (loc, "%qs is incompatible with %qs", "-fipa-icf", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_icf = 0; if (opts_set->x_flag_ipa_icf_functions && opts->x_flag_ipa_icf_functions) error_at (loc, "%qs is incompatible with %qs", "-fipa-icf-functions", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_icf_functions = 0; if (opts_set->x_flag_ipa_icf_variables && opts->x_flag_ipa_icf_variables) error_at (loc, "%qs is incompatible with %qs", "-fipa-icf-variables", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_icf_variables = 0; if (opts_set->x_flag_ipa_bit_cp && opts->x_flag_ipa_bit_cp) error_at (loc, "%qs is incompatible with %qs", "-fipa-bit-cp", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_bit_cp = 0; if (opts_set->x_flag_ipa_vrp && opts->x_flag_ipa_vrp) error_at (loc, "%qs is incompatible with %qs", "-fipa-vrp", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_vrp = 0; if (opts_set->x_flag_ipa_pure_const && opts->x_flag_ipa_pure_const) error_at (loc, "%qs is incompatible with %qs", "-fipa-pure-const", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_pure_const = 0; if (opts_set->x_flag_ipa_modref && opts->x_flag_ipa_modref) error_at (loc, "%<-fipa-modref%> is incompatible with %qs", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_modref = 0; /* FIXME: disable unreachable code removal. */ /* discovery of functions/variables with no address taken. */ if (opts_set->x_flag_ipa_reference_addressable && opts->x_flag_ipa_reference_addressable) error_at (loc, "%qs is incompatible with %qs", "-fipa-reference-addressable", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_reference_addressable = 0; /* ipa stack alignment propagation. */ if (opts_set->x_flag_ipa_stack_alignment && opts->x_flag_ipa_stack_alignment) error_at (loc, "%qs is incompatible with %qs", "-fipa-stack-alignment", LIVE_PATCHING_OPTION); else opts->x_flag_ipa_stack_alignment = 0; break; default: gcc_unreachable (); } #undef LIVE_PATCHING_OPTION } /* --help option argument if set. */ vec help_option_arguments; /* Return the string name describing a sanitizer argument which has been provided on the command line and has set this particular flag. */ const char * find_sanitizer_argument (struct gcc_options *opts, unsigned int flags) { for (int i = 0; sanitizer_opts[i].name != NULL; ++i) { /* Need to find the sanitizer_opts element which: a) Could have set the flags requested. b) Has been set on the command line. Can have (a) without (b) if the flag requested is e.g. SANITIZE_ADDRESS, since both -fsanitize=address and -fsanitize=kernel-address set this flag. Can have (b) without (a) by requesting more than one sanitizer on the command line. */ if ((sanitizer_opts[i].flag & opts->x_flag_sanitize) != sanitizer_opts[i].flag) continue; if ((sanitizer_opts[i].flag & flags) != flags) continue; return sanitizer_opts[i].name; } return NULL; } /* Report an error to the user about sanitizer options they have requested which have set conflicting flags. LEFT and RIGHT indicate sanitizer flags which conflict with each other, this function reports an error if both have been set in OPTS->x_flag_sanitize and ensures the error identifies the requested command line options that have set these flags. */ static void report_conflicting_sanitizer_options (struct gcc_options *opts, location_t loc, unsigned int left, unsigned int right) { unsigned int left_seen = (opts->x_flag_sanitize & left); unsigned int right_seen = (opts->x_flag_sanitize & right); if (left_seen && right_seen) { const char* left_arg = find_sanitizer_argument (opts, left_seen); const char* right_arg = find_sanitizer_argument (opts, right_seen); gcc_assert (left_arg && right_arg); error_at (loc, "%<-fsanitize=%s%> is incompatible with %<-fsanitize=%s%>", left_arg, right_arg); } } /* After all options at LOC have been read into OPTS and OPTS_SET, finalize settings of those options and diagnose incompatible combinations. */ void finish_options (struct gcc_options *opts, struct gcc_options *opts_set, location_t loc) { if (opts->x_dump_base_name && ! opts->x_dump_base_name_prefixed) { const char *sep = opts->x_dump_base_name; for (; *sep; sep++) if (IS_DIR_SEPARATOR (*sep)) break; if (*sep) /* If dump_base_path contains subdirectories, don't prepend anything. */; else if (opts->x_dump_dir_name) /* We have a DUMP_DIR_NAME, prepend that. */ opts->x_dump_base_name = opts_concat (opts->x_dump_dir_name, opts->x_dump_base_name, NULL); /* It is definitely prefixed now. */ opts->x_dump_base_name_prefixed = true; } /* Handle related options for unit-at-a-time, toplevel-reorder, and section-anchors. */ if (!opts->x_flag_unit_at_a_time) { if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors) error_at (loc, "section anchors must be disabled when unit-at-a-time " "is disabled"); opts->x_flag_section_anchors = 0; if (opts->x_flag_toplevel_reorder == 1) error_at (loc, "toplevel reorder must be disabled when unit-at-a-time " "is disabled"); opts->x_flag_toplevel_reorder = 0; } /* -fself-test depends on the state of the compiler prior to compiling anything. Ideally it should be run on an empty source file. However, in case we get run with actual source, assume -fsyntax-only which will inhibit any compiler initialization which may confuse the self tests. */ if (opts->x_flag_self_test) opts->x_flag_syntax_only = 1; if (opts->x_flag_tm && opts->x_flag_non_call_exceptions) sorry ("transactional memory is not supported with non-call exceptions"); /* Unless the user has asked for section anchors, we disable toplevel reordering at -O0 to disable transformations that might be surprising to end users and to get -fno-toplevel-reorder tested. */ if (!opts->x_optimize && opts->x_flag_toplevel_reorder == 2 && !(opts->x_flag_section_anchors && opts_set->x_flag_section_anchors)) { opts->x_flag_toplevel_reorder = 0; opts->x_flag_section_anchors = 0; } if (!opts->x_flag_toplevel_reorder) { if (opts->x_flag_section_anchors && opts_set->x_flag_section_anchors) error_at (loc, "section anchors must be disabled when toplevel reorder" " is disabled"); opts->x_flag_section_anchors = 0; } if (opts->x_flag_hardened) { if (!opts_set->x_flag_auto_var_init) opts->x_flag_auto_var_init = AUTO_INIT_ZERO; else if (opts->x_flag_auto_var_init != AUTO_INIT_ZERO) warning_at (loc, OPT_Whardened, "%<-ftrivial-auto-var-init=zero%> is not enabled by " "%<-fhardened%> because it was specified on the command " "line"); } if (!opts->x_flag_opts_finished) { /* We initialize opts->x_flag_pie to -1 so that targets can set a default value. */ if (opts->x_flag_pie == -1) { /* We initialize opts->x_flag_pic to -1 so that we can tell if -fpic, -fPIC, -fno-pic or -fno-PIC is used. */ if (opts->x_flag_pic == -1) opts->x_flag_pie = (opts->x_flag_hardened ? /*-fPIE*/ 2 : DEFAULT_FLAG_PIE); else opts->x_flag_pie = 0; } /* If -fPIE or -fpie is used, turn on PIC. */ if (opts->x_flag_pie) opts->x_flag_pic = opts->x_flag_pie; else if (opts->x_flag_pic == -1) opts->x_flag_pic = 0; if (opts->x_flag_pic && !opts->x_flag_pie) opts->x_flag_shlib = 1; opts->x_flag_opts_finished = true; } /* We initialize opts->x_flag_stack_protect to -1 so that targets can set a default value. With --enable-default-ssp or -fhardened the default is -fstack-protector-strong. */ if (opts->x_flag_stack_protect == -1) { /* This should check FRAME_GROWS_DOWNWARD, but on some targets it's defined in such a way that it uses flag_stack_protect which can't be used here. Moreover, some targets like BPF don't support -fstack-protector at all but we don't know that here. So remember that flag_stack_protect was set at the behest of -fhardened. */ if (opts->x_flag_hardened) { opts->x_flag_stack_protect = SPCT_FLAG_STRONG; flag_stack_protector_set_by_fhardened_p = true; } else opts->x_flag_stack_protect = DEFAULT_FLAG_SSP; } else if (opts->x_flag_hardened && opts->x_flag_stack_protect != SPCT_FLAG_STRONG) warning_at (UNKNOWN_LOCATION, OPT_Whardened, "%<-fstack-protector-strong%> is not enabled by " "%<-fhardened%> because it was specified on the command " "line"); if (opts->x_optimize == 0) { /* Inlining does not work if not optimizing, so force it not to be done. */ opts->x_warn_inline = 0; opts->x_flag_no_inline = 1; } /* At -O0 or -Og, turn __builtin_unreachable into a trap. */ if (!opts->x_optimize || opts->x_optimize_debug) SET_OPTION_IF_UNSET (opts, opts_set, flag_unreachable_traps, true); /* Pipelining of outer loops is only possible when general pipelining capabilities are requested. */ if (!opts->x_flag_sel_sched_pipelining) opts->x_flag_sel_sched_pipelining_outer_loops = 0; if (opts->x_flag_conserve_stack) { SET_OPTION_IF_UNSET (opts, opts_set, param_large_stack_frame, 100); SET_OPTION_IF_UNSET (opts, opts_set, param_stack_frame_growth, 40); } if (opts->x_flag_lto) { #ifdef ENABLE_LTO opts->x_flag_generate_lto = 1; /* When generating IL, do not operate in whole-program mode. Otherwise, symbols will be privatized too early, causing link errors later. */ opts->x_flag_whole_program = 0; #else error_at (loc, "LTO support has not been enabled in this configuration"); #endif if (!opts->x_flag_fat_lto_objects && (!HAVE_LTO_PLUGIN || (opts_set->x_flag_use_linker_plugin && !opts->x_flag_use_linker_plugin))) { if (opts_set->x_flag_fat_lto_objects) error_at (loc, "%<-fno-fat-lto-objects%> are supported only with " "linker plugin"); opts->x_flag_fat_lto_objects = 1; } /* -gsplit-dwarf isn't compatible with LTO, see PR88389. */ if (opts->x_dwarf_split_debug_info) { inform (loc, "%<-gsplit-dwarf%> is not supported with LTO," " disabling"); opts->x_dwarf_split_debug_info = 0; } } /* We initialize opts->x_flag_split_stack to -1 so that targets can set a default value if they choose based on other options. */ if (opts->x_flag_split_stack == -1) opts->x_flag_split_stack = 0; else if (opts->x_flag_split_stack) { if (!targetm_common.supports_split_stack (true, opts)) { error_at (loc, "%<-fsplit-stack%> is not supported by " "this compiler configuration"); opts->x_flag_split_stack = 0; } } /* If stack splitting is turned on, and the user did not explicitly request function partitioning, turn off partitioning, as it confuses the linker when trying to handle partitioned split-stack code that calls a non-split-stack functions. But if partitioning was turned on explicitly just hope for the best. */ if (opts->x_flag_split_stack && opts->x_flag_reorder_blocks_and_partition) SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_blocks_and_partition, 0); if (opts->x_flag_reorder_blocks_and_partition) SET_OPTION_IF_UNSET (opts, opts_set, flag_reorder_functions, 1); /* The -gsplit-dwarf option requires -ggnu-pubnames. */ if (opts->x_dwarf_split_debug_info) opts->x_debug_generate_pub_sections = 2; if ((opts->x_flag_sanitize & (SANITIZE_USER_ADDRESS | SANITIZE_KERNEL_ADDRESS)) == 0) { if (opts->x_flag_sanitize & SANITIZE_POINTER_COMPARE) error_at (loc, "%<-fsanitize=pointer-compare%> must be combined with " "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>"); if (opts->x_flag_sanitize & SANITIZE_POINTER_SUBTRACT) error_at (loc, "%<-fsanitize=pointer-subtract%> must be combined with " "%<-fsanitize=address%> or %<-fsanitize=kernel-address%>"); } /* Address sanitizers conflict with the thread sanitizer. */ report_conflicting_sanitizer_options (opts, loc, SANITIZE_THREAD, SANITIZE_ADDRESS); report_conflicting_sanitizer_options (opts, loc, SANITIZE_THREAD, SANITIZE_HWADDRESS); /* The leak sanitizer conflicts with the thread sanitizer. */ report_conflicting_sanitizer_options (opts, loc, SANITIZE_LEAK, SANITIZE_THREAD); /* No combination of HWASAN and ASAN work together. */ report_conflicting_sanitizer_options (opts, loc, SANITIZE_HWADDRESS, SANITIZE_ADDRESS); /* The userspace and kernel address sanitizers conflict with each other. */ report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_HWADDRESS, SANITIZE_KERNEL_HWADDRESS); report_conflicting_sanitizer_options (opts, loc, SANITIZE_USER_ADDRESS, SANITIZE_KERNEL_ADDRESS); /* Check error recovery for -fsanitize-recover option. */ for (int i = 0; sanitizer_opts[i].name != NULL; ++i) if ((opts->x_flag_sanitize_recover & sanitizer_opts[i].flag) && !sanitizer_opts[i].can_recover) error_at (loc, "%<-fsanitize-recover=%s%> is not supported", sanitizer_opts[i].name); /* Check -fsanitize-trap option. */ for (int i = 0; sanitizer_opts[i].name != NULL; ++i) if ((opts->x_flag_sanitize_trap & sanitizer_opts[i].flag) && !sanitizer_opts[i].can_trap /* Allow -fsanitize-trap=all or -fsanitize-trap=undefined to set flag_sanitize_trap & SANITIZE_VPTR bit which will effectively disable -fsanitize=vptr, just disallow explicit -fsanitize-trap=vptr. */ && sanitizer_opts[i].flag != SANITIZE_VPTR) error_at (loc, "%<-fsanitize-trap=%s%> is not supported", sanitizer_opts[i].name); /* When instrumenting the pointers, we don't want to remove the null pointer checks. */ if (opts->x_flag_sanitize & (SANITIZE_NULL | SANITIZE_NONNULL_ATTRIBUTE | SANITIZE_RETURNS_NONNULL_ATTRIBUTE)) opts->x_flag_delete_null_pointer_checks = 0; /* Aggressive compiler optimizations may cause false negatives. */ if (opts->x_flag_sanitize & ~(SANITIZE_LEAK | SANITIZE_UNREACHABLE)) opts->x_flag_aggressive_loop_optimizations = 0; /* Enable -fsanitize-address-use-after-scope if either address sanitizer is enabled. */ if (opts->x_flag_sanitize & (SANITIZE_USER_ADDRESS | SANITIZE_USER_HWADDRESS)) SET_OPTION_IF_UNSET (opts, opts_set, flag_sanitize_address_use_after_scope, true); /* Force -fstack-reuse=none in case -fsanitize-address-use-after-scope is enabled. */ if (opts->x_flag_sanitize_address_use_after_scope) { if (opts->x_flag_stack_reuse != SR_NONE && opts_set->x_flag_stack_reuse != SR_NONE) error_at (loc, "%<-fsanitize-address-use-after-scope%> requires " "%<-fstack-reuse=none%> option"); opts->x_flag_stack_reuse = SR_NONE; } if ((opts->x_flag_sanitize & SANITIZE_USER_ADDRESS) && opts->x_flag_tm) sorry ("transactional memory is not supported with %<-fsanitize=address%>"); if ((opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS) && opts->x_flag_tm) sorry ("transactional memory is not supported with " "%<-fsanitize=kernel-address%>"); /* Currently live patching is not support for LTO. */ if (opts->x_flag_live_patching == LIVE_PATCHING_INLINE_ONLY_STATIC && opts->x_flag_lto) sorry ("live patching (with %qs) is not supported with LTO", "inline-only-static"); /* Currently vtable verification is not supported for LTO */ if (opts->x_flag_vtable_verify && opts->x_flag_lto) sorry ("vtable verification is not supported with LTO"); /* Control IPA optimizations based on different -flive-patching level. */ if (opts->x_flag_live_patching) control_options_for_live_patching (opts, opts_set, opts->x_flag_live_patching, loc); /* Allow cunroll to grow size accordingly. */ if (!opts_set->x_flag_cunroll_grow_size) opts->x_flag_cunroll_grow_size = (opts->x_flag_unroll_loops || opts->x_flag_peel_loops || opts->x_optimize >= 3); /* With -fcx-limited-range, we do cheap and quick complex arithmetic. */ if (opts->x_flag_cx_limited_range) opts->x_flag_complex_method = 0; else if (opts_set->x_flag_cx_limited_range) opts->x_flag_complex_method = opts->x_flag_default_complex_method; /* With -fcx-fortran-rules, we do something in-between cheap and C99. */ if (opts->x_flag_cx_fortran_rules) opts->x_flag_complex_method = 1; else if (opts_set->x_flag_cx_fortran_rules) opts->x_flag_complex_method = opts->x_flag_default_complex_method; /* Use -fvect-cost-model=cheap instead of -fvect-cost-mode=very-cheap by default with explicit -ftree-{loop,slp}-vectorize. */ if (opts->x_optimize == 2 && (opts_set->x_flag_tree_loop_vectorize || opts_set->x_flag_tree_vectorize)) SET_OPTION_IF_UNSET (opts, opts_set, flag_vect_cost_model, VECT_COST_MODEL_CHEAP); if (opts->x_flag_gtoggle) { /* Make sure to process -gtoggle only once. */ opts->x_flag_gtoggle = false; if (opts->x_debug_info_level == DINFO_LEVEL_NONE) { opts->x_debug_info_level = DINFO_LEVEL_NORMAL; if (opts->x_write_symbols == NO_DEBUG) opts->x_write_symbols = PREFERRED_DEBUGGING_TYPE; } else opts->x_debug_info_level = DINFO_LEVEL_NONE; } if (!opts_set->x_debug_nonbind_markers_p) opts->x_debug_nonbind_markers_p = (opts->x_optimize && opts->x_debug_info_level >= DINFO_LEVEL_NORMAL && dwarf_debuginfo_p (opts) && !(opts->x_flag_selective_scheduling || opts->x_flag_selective_scheduling2)); /* We know which debug output will be used so we can set flag_var_tracking and flag_var_tracking_uninit if the user has not specified them. */ if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL || !dwarf_debuginfo_p (opts) /* We have not yet initialized debug hooks so match that to check whether we're only doing DWARF2_LINENO_DEBUGGING_INFO. */ #ifndef DWARF2_DEBUGGING_INFO || true #endif ) { if ((opts_set->x_flag_var_tracking && opts->x_flag_var_tracking == 1) || (opts_set->x_flag_var_tracking_uninit && opts->x_flag_var_tracking_uninit == 1)) { if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL) warning_at (UNKNOWN_LOCATION, 0, "variable tracking requested, but useless unless " "producing debug info"); else warning_at (UNKNOWN_LOCATION, 0, "variable tracking requested, but not supported " "by this debug format"); } opts->x_flag_var_tracking = 0; opts->x_flag_var_tracking_uninit = 0; opts->x_flag_var_tracking_assignments = 0; } /* One could use EnabledBy, but it would lead to a circular dependency. */ if (!opts_set->x_flag_var_tracking_uninit) opts->x_flag_var_tracking_uninit = opts->x_flag_var_tracking; if (!opts_set->x_flag_var_tracking_assignments) opts->x_flag_var_tracking_assignments = (opts->x_flag_var_tracking && !(opts->x_flag_selective_scheduling || opts->x_flag_selective_scheduling2)); if (opts->x_flag_var_tracking_assignments_toggle) opts->x_flag_var_tracking_assignments = !opts->x_flag_var_tracking_assignments; if (opts->x_flag_var_tracking_assignments && !opts->x_flag_var_tracking) opts->x_flag_var_tracking = opts->x_flag_var_tracking_assignments = -1; if (opts->x_flag_var_tracking_assignments && (opts->x_flag_selective_scheduling || opts->x_flag_selective_scheduling2)) warning_at (loc, 0, "var-tracking-assignments changes selective scheduling"); if (opts->x_flag_syntax_only) { opts->x_write_symbols = NO_DEBUG; opts->x_profile_flag = 0; } if (opts->x_warn_strict_flex_arrays) if (opts->x_flag_strict_flex_arrays == 0) { opts->x_warn_strict_flex_arrays = 0; warning_at (UNKNOWN_LOCATION, 0, "%<-Wstrict-flex-arrays%> is ignored when" " %<-fstrict-flex-arrays%> is not present"); } diagnose_options (opts, opts_set, loc); } /* The function diagnoses incompatible combinations for provided options (OPTS and OPTS_SET) at a given LOCation. The function is called both when command line is parsed (after the target optimization hook) and when an optimize/target attribute (or pragma) is used. */ void diagnose_options (gcc_options *opts, gcc_options *opts_set, location_t loc) { /* The optimization to partition hot and cold basic blocks into separate sections of the .o and executable files does not work (currently) with exception handling. This is because there is no support for generating unwind info. If opts->x_flag_exceptions is turned on we need to turn off the partitioning optimization. */ enum unwind_info_type ui_except = targetm_common.except_unwind_info (opts); if (opts->x_flag_exceptions && opts->x_flag_reorder_blocks_and_partition && (ui_except == UI_SJLJ || ui_except >= UI_TARGET)) { if (opts_set->x_flag_reorder_blocks_and_partition) inform (loc, "%<-freorder-blocks-and-partition%> does not work " "with exceptions on this architecture"); opts->x_flag_reorder_blocks_and_partition = 0; opts->x_flag_reorder_blocks = 1; } /* If user requested unwind info, then turn off the partitioning optimization. */ if (opts->x_flag_unwind_tables && !targetm_common.unwind_tables_default && opts->x_flag_reorder_blocks_and_partition && (ui_except == UI_SJLJ || ui_except >= UI_TARGET)) { if (opts_set->x_flag_reorder_blocks_and_partition) inform (loc, "%<-freorder-blocks-and-partition%> does not support " "unwind info on this architecture"); opts->x_flag_reorder_blocks_and_partition = 0; opts->x_flag_reorder_blocks = 1; } /* If the target requested unwind info, then turn off the partitioning optimization with a different message. Likewise, if the target does not support named sections. */ if (opts->x_flag_reorder_blocks_and_partition && (!targetm_common.have_named_sections || (opts->x_flag_unwind_tables && targetm_common.unwind_tables_default && (ui_except == UI_SJLJ || ui_except >= UI_TARGET)))) { if (opts_set->x_flag_reorder_blocks_and_partition) inform (loc, "%<-freorder-blocks-and-partition%> does not work " "on this architecture"); opts->x_flag_reorder_blocks_and_partition = 0; opts->x_flag_reorder_blocks = 1; } } #define LEFT_COLUMN 27 /* Output ITEM, of length ITEM_WIDTH, in the left column, followed by word-wrapped HELP in a second column. */ static void wrap_help (const char *help, const char *item, unsigned int item_width, unsigned int columns) { unsigned int col_width = LEFT_COLUMN; unsigned int remaining, room, len; remaining = strlen (help); do { room = columns - 3 - MAX (col_width, item_width); if (room > columns) room = 0; len = remaining; if (room < len) { unsigned int i; for (i = 0; help[i]; i++) { if (i >= room && len != remaining) break; if (help[i] == ' ') len = i; else if ((help[i] == '-' || help[i] == '/') && help[i + 1] != ' ' && i > 0 && ISALPHA (help[i - 1])) len = i + 1; } } printf (" %-*.*s %.*s\n", col_width, item_width, item, len, help); item_width = 0; while (help[len] == ' ') len++; help += len; remaining -= len; } while (remaining); } /* Data structure used to print list of valid option values. */ class option_help_tuple { public: option_help_tuple (int code, vec values): m_code (code), m_values (values) {} /* Code of an option. */ int m_code; /* List of possible values. */ vec m_values; }; /* Print help for a specific front-end, etc. */ static void print_filtered_help (unsigned int include_flags, unsigned int exclude_flags, unsigned int any_flags, unsigned int columns, struct gcc_options *opts, unsigned int lang_mask) { unsigned int i; const char *help; bool found = false; bool displayed = false; char new_help[256]; if (!opts->x_help_printed) opts->x_help_printed = XCNEWVAR (char, cl_options_count); if (!opts->x_help_enum_printed) opts->x_help_enum_printed = XCNEWVAR (char, cl_enums_count); auto_vec help_tuples; for (i = 0; i < cl_options_count; i++) { const struct cl_option *option = cl_options + i; unsigned int len; const char *opt; const char *tab; if (include_flags == 0 || ((option->flags & include_flags) != include_flags)) { if ((option->flags & any_flags) == 0) continue; } /* Skip unwanted switches. */ if ((option->flags & exclude_flags) != 0) continue; /* The driver currently prints its own help text. */ if ((option->flags & CL_DRIVER) != 0 && (option->flags & (((1U << cl_lang_count) - 1) | CL_COMMON | CL_TARGET)) == 0) continue; /* If an option contains a language specification, exclude it from common unless all languages are present. */ if ((include_flags & CL_COMMON) && !(option->flags & CL_DRIVER) && (option->flags & CL_LANG_ALL) && (option->flags & CL_LANG_ALL) != CL_LANG_ALL) continue; found = true; /* Skip switches that have already been printed. */ if (opts->x_help_printed[i]) continue; opts->x_help_printed[i] = true; help = option->help; if (help == NULL) { if (exclude_flags & CL_UNDOCUMENTED) continue; help = undocumented_msg; } /* Get the translation. */ help = _(help); if (option->alias_target < N_OPTS && cl_options [option->alias_target].help) { const struct cl_option *target = cl_options + option->alias_target; if (option->help == NULL) { /* The option is undocumented but is an alias for an option that is documented. If the option has alias arguments, then its purpose is to provide certain arguments to the other option, so inform the reader of this. Otherwise, point the reader to the other option in preference to the former. */ if (option->alias_arg) { if (option->neg_alias_arg) snprintf (new_help, sizeof new_help, _("Same as %s%s (or, in negated form, %s%s)."), target->opt_text, option->alias_arg, target->opt_text, option->neg_alias_arg); else snprintf (new_help, sizeof new_help, _("Same as %s%s."), target->opt_text, option->alias_arg); } else snprintf (new_help, sizeof new_help, _("Same as %s."), target->opt_text); } else { /* For documented options with aliases, mention the aliased option's name for reference. */ snprintf (new_help, sizeof new_help, _("%s Same as %s."), help, cl_options [option->alias_target].opt_text); } help = new_help; } if (option->warn_message) { /* Mention that the use of the option will trigger a warning. */ if (help == new_help) snprintf (new_help + strlen (new_help), sizeof new_help - strlen (new_help), " %s", _(use_diagnosed_msg)); else snprintf (new_help, sizeof new_help, "%s %s", help, _(use_diagnosed_msg)); help = new_help; } /* Find the gap between the name of the option and its descriptive text. */ tab = strchr (help, '\t'); if (tab) { len = tab - help; opt = help; help = tab + 1; } else { opt = option->opt_text; len = strlen (opt); } /* With the -Q option enabled we change the descriptive text associated with an option to be an indication of its current setting. */ if (!opts->x_quiet_flag) { void *flag_var = option_flag_var (i, opts); if (len < (LEFT_COLUMN + 2)) strcpy (new_help, "\t\t"); else strcpy (new_help, "\t"); /* Set to print whether the option is enabled or disabled, or, if it's an alias for another option, the name of the aliased option. */ bool print_state = false; if (flag_var != NULL && option->var_type != CLVC_DEFER) { /* If OPTION is only available for a specific subset of languages other than this one, mention them. */ bool avail_for_lang = true; if (unsigned langset = option->flags & CL_LANG_ALL) { if (!(langset & lang_mask)) { avail_for_lang = false; strcat (new_help, _("[available in ")); for (unsigned i = 0, n = 0; (1U << i) < CL_LANG_ALL; ++i) if (langset & (1U << i)) { if (n++) strcat (new_help, ", "); strcat (new_help, lang_names[i]); } strcat (new_help, "]"); } } if (!avail_for_lang) ; /* Print nothing else if the option is not available in the current language. */ else if (option->flags & CL_JOINED) { if (option->var_type == CLVC_STRING) { if (* (const char **) flag_var != NULL) snprintf (new_help + strlen (new_help), sizeof (new_help) - strlen (new_help), "%s", * (const char **) flag_var); } else if (option->var_type == CLVC_ENUM) { const struct cl_enum *e = &cl_enums[option->var_enum]; int value; const char *arg = NULL; value = e->get (flag_var); enum_value_to_arg (e->values, &arg, value, lang_mask); if (arg == NULL) arg = _("[default]"); snprintf (new_help + strlen (new_help), sizeof (new_help) - strlen (new_help), "%s", arg); } else { if (option->cl_host_wide_int) sprintf (new_help + strlen (new_help), _("%llu bytes"), (unsigned long long) *(unsigned HOST_WIDE_INT *) flag_var); else sprintf (new_help + strlen (new_help), "%i", * (int *) flag_var); } } else print_state = true; } else /* When there is no argument, print the option state only if the option takes no argument. */ print_state = !(option->flags & CL_JOINED); if (print_state) { if (option->alias_target < N_OPTS && option->alias_target != OPT_SPECIAL_warn_removed && option->alias_target != OPT_SPECIAL_ignore && option->alias_target != OPT_SPECIAL_input_file && option->alias_target != OPT_SPECIAL_program_name && option->alias_target != OPT_SPECIAL_unknown) { const struct cl_option *target = &cl_options[option->alias_target]; sprintf (new_help + strlen (new_help), "%s%s", target->opt_text, option->alias_arg ? option->alias_arg : ""); } else if (option->alias_target == OPT_SPECIAL_ignore) strcat (new_help, ("[ignored]")); else { /* Print the state for an on/off option. */ int ena = option_enabled (i, lang_mask, opts); if (ena > 0) strcat (new_help, _("[enabled]")); else if (ena == 0) strcat (new_help, _("[disabled]")); } } help = new_help; } if (option->range_max != -1 && tab == NULL) { char b[128]; snprintf (b, sizeof (b), "<%d,%d>", option->range_min, option->range_max); opt = concat (opt, b, NULL); len += strlen (b); } wrap_help (help, opt, len, columns); displayed = true; if (option->var_type == CLVC_ENUM && opts->x_help_enum_printed[option->var_enum] != 2) opts->x_help_enum_printed[option->var_enum] = 1; else { vec option_values = targetm_common.get_valid_option_values (i, NULL); if (!option_values.is_empty ()) help_tuples.safe_push (option_help_tuple (i, option_values)); } } if (! found) { unsigned int langs = include_flags & CL_LANG_ALL; if (langs == 0) printf (_(" No options with the desired characteristics were found\n")); else { unsigned int i; /* PR 31349: Tell the user how to see all of the options supported by a specific front end. */ for (i = 0; (1U << i) < CL_LANG_ALL; i ++) if ((1U << i) & langs) printf (_(" None found. Use --help=%s to show *all* the options supported by the %s front-end.\n"), lang_names[i], lang_names[i]); } } else if (! displayed) printf (_(" All options with the desired characteristics have already been displayed\n")); putchar ('\n'); /* Print details of enumerated option arguments, if those enumerations have help text headings provided. If no help text is provided, presume that the possible values are listed in the help text for the relevant options. */ for (i = 0; i < cl_enums_count; i++) { unsigned int j, pos; if (opts->x_help_enum_printed[i] != 1) continue; if (cl_enums[i].help == NULL) continue; printf (" %s\n ", _(cl_enums[i].help)); pos = 4; for (j = 0; cl_enums[i].values[j].arg != NULL; j++) { unsigned int len = strlen (cl_enums[i].values[j].arg); if (pos > 4 && pos + 1 + len <= columns) { printf (" %s", cl_enums[i].values[j].arg); pos += 1 + len; } else { if (pos > 4) { printf ("\n "); pos = 4; } printf ("%s", cl_enums[i].values[j].arg); pos += len; } } printf ("\n\n"); opts->x_help_enum_printed[i] = 2; } for (unsigned i = 0; i < help_tuples.length (); i++) { const struct cl_option *option = cl_options + help_tuples[i].m_code; printf (_(" Known valid arguments for %s option:\n "), option->opt_text); for (unsigned j = 0; j < help_tuples[i].m_values.length (); j++) printf (" %s", help_tuples[i].m_values[j]); printf ("\n\n"); } } /* Display help for a specified type of option. The options must have ALL of the INCLUDE_FLAGS set ANY of the flags in the ANY_FLAGS set and NONE of the EXCLUDE_FLAGS set. The current option state is in OPTS; LANG_MASK is used for interpreting enumerated option state. */ static void print_specific_help (unsigned int include_flags, unsigned int exclude_flags, unsigned int any_flags, struct gcc_options *opts, unsigned int lang_mask) { unsigned int all_langs_mask = (1U << cl_lang_count) - 1; const char * description = NULL; const char * descrip_extra = ""; size_t i; unsigned int flag; /* Sanity check: Make sure that we do not have more languages than we have bits available to enumerate them. */ gcc_assert ((1U << cl_lang_count) <= CL_MIN_OPTION_CLASS); /* If we have not done so already, obtain the desired maximum width of the output. */ if (opts->x_help_columns == 0) { opts->x_help_columns = get_terminal_width (); if (opts->x_help_columns == INT_MAX) /* Use a reasonable default. */ opts->x_help_columns = 80; } /* Decide upon the title for the options that we are going to display. */ for (i = 0, flag = 1; flag <= CL_MAX_OPTION_CLASS; flag <<= 1, i ++) { switch (flag & include_flags) { case 0: case CL_DRIVER: break; case CL_TARGET: description = _("The following options are target specific"); break; case CL_WARNING: description = _("The following options control compiler warning messages"); break; case CL_OPTIMIZATION: description = _("The following options control optimizations"); break; case CL_COMMON: description = _("The following options are language-independent"); break; case CL_PARAMS: description = _("The following options control parameters"); break; default: if (i >= cl_lang_count) break; if (exclude_flags & all_langs_mask) description = _("The following options are specific to just the language "); else description = _("The following options are supported by the language "); descrip_extra = lang_names [i]; break; } } if (description == NULL) { if (any_flags == 0) { if (include_flags & CL_UNDOCUMENTED) description = _("The following options are not documented"); else if (include_flags & CL_SEPARATE) description = _("The following options take separate arguments"); else if (include_flags & CL_JOINED) description = _("The following options take joined arguments"); else { internal_error ("unrecognized % passed " "to %", include_flags); return; } } else { if (any_flags & all_langs_mask) description = _("The following options are language-related"); else description = _("The following options are language-independent"); } } printf ("%s%s:\n", description, descrip_extra); print_filtered_help (include_flags, exclude_flags, any_flags, opts->x_help_columns, opts, lang_mask); } /* Enable FDO-related flags. */ static void enable_fdo_optimizations (struct gcc_options *opts, struct gcc_options *opts_set, int value) { SET_OPTION_IF_UNSET (opts, opts_set, flag_branch_probabilities, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_loops, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_peel_loops, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_tracer, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_value_profile_transformations, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp, value); if (value) { SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_cp_clone, 1); SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, 1); } SET_OPTION_IF_UNSET (opts, opts_set, flag_predictive_commoning, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_split_loops, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_unswitch_loops, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_gcse_after_reload, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_vectorize, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_slp_vectorize, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_version_loops_for_strides, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_vect_cost_model, VECT_COST_MODEL_DYNAMIC); SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribute_patterns, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_loop_interchange, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_unroll_jam, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_tree_loop_distribution, value); } /* -f{,no-}sanitize{,-recover}= suboptions. */ const struct sanitizer_opts_s sanitizer_opts[] = { #define SANITIZER_OPT(name, flags, recover, trap) \ { #name, flags, sizeof #name - 1, recover, trap } SANITIZER_OPT (address, (SANITIZE_ADDRESS | SANITIZE_USER_ADDRESS), true, false), SANITIZER_OPT (hwaddress, (SANITIZE_HWADDRESS | SANITIZE_USER_HWADDRESS), true, false), SANITIZER_OPT (kernel-address, (SANITIZE_ADDRESS | SANITIZE_KERNEL_ADDRESS), true, false), SANITIZER_OPT (kernel-hwaddress, (SANITIZE_HWADDRESS | SANITIZE_KERNEL_HWADDRESS), true, false), SANITIZER_OPT (pointer-compare, SANITIZE_POINTER_COMPARE, true, false), SANITIZER_OPT (pointer-subtract, SANITIZE_POINTER_SUBTRACT, true, false), SANITIZER_OPT (thread, SANITIZE_THREAD, false, false), SANITIZER_OPT (leak, SANITIZE_LEAK, false, false), SANITIZER_OPT (shift, SANITIZE_SHIFT, true, true), SANITIZER_OPT (shift-base, SANITIZE_SHIFT_BASE, true, true), SANITIZER_OPT (shift-exponent, SANITIZE_SHIFT_EXPONENT, true, true), SANITIZER_OPT (integer-divide-by-zero, SANITIZE_DIVIDE, true, true), SANITIZER_OPT (undefined, SANITIZE_UNDEFINED, true, true), SANITIZER_OPT (unreachable, SANITIZE_UNREACHABLE, false, true), SANITIZER_OPT (vla-bound, SANITIZE_VLA, true, true), SANITIZER_OPT (return, SANITIZE_RETURN, false, true), SANITIZER_OPT (null, SANITIZE_NULL, true, true), SANITIZER_OPT (signed-integer-overflow, SANITIZE_SI_OVERFLOW, true, true), SANITIZER_OPT (bool, SANITIZE_BOOL, true, true), SANITIZER_OPT (enum, SANITIZE_ENUM, true, true), SANITIZER_OPT (float-divide-by-zero, SANITIZE_FLOAT_DIVIDE, true, true), SANITIZER_OPT (float-cast-overflow, SANITIZE_FLOAT_CAST, true, true), SANITIZER_OPT (bounds, SANITIZE_BOUNDS, true, true), SANITIZER_OPT (bounds-strict, SANITIZE_BOUNDS | SANITIZE_BOUNDS_STRICT, true, true), SANITIZER_OPT (alignment, SANITIZE_ALIGNMENT, true, true), SANITIZER_OPT (nonnull-attribute, SANITIZE_NONNULL_ATTRIBUTE, true, true), SANITIZER_OPT (returns-nonnull-attribute, SANITIZE_RETURNS_NONNULL_ATTRIBUTE, true, true), SANITIZER_OPT (object-size, SANITIZE_OBJECT_SIZE, true, true), SANITIZER_OPT (vptr, SANITIZE_VPTR, true, false), SANITIZER_OPT (pointer-overflow, SANITIZE_POINTER_OVERFLOW, true, true), SANITIZER_OPT (builtin, SANITIZE_BUILTIN, true, true), SANITIZER_OPT (shadow-call-stack, SANITIZE_SHADOW_CALL_STACK, false, false), SANITIZER_OPT (all, ~0U, true, true), #undef SANITIZER_OPT { NULL, 0U, 0UL, false, false } }; /* -fzero-call-used-regs= suboptions. */ const struct zero_call_used_regs_opts_s zero_call_used_regs_opts[] = { #define ZERO_CALL_USED_REGS_OPT(name, flags) \ { #name, flags } ZERO_CALL_USED_REGS_OPT (skip, zero_regs_flags::SKIP), ZERO_CALL_USED_REGS_OPT (used-gpr-arg, zero_regs_flags::USED_GPR_ARG), ZERO_CALL_USED_REGS_OPT (used-gpr, zero_regs_flags::USED_GPR), ZERO_CALL_USED_REGS_OPT (used-arg, zero_regs_flags::USED_ARG), ZERO_CALL_USED_REGS_OPT (used, zero_regs_flags::USED), ZERO_CALL_USED_REGS_OPT (all-gpr-arg, zero_regs_flags::ALL_GPR_ARG), ZERO_CALL_USED_REGS_OPT (all-gpr, zero_regs_flags::ALL_GPR), ZERO_CALL_USED_REGS_OPT (all-arg, zero_regs_flags::ALL_ARG), ZERO_CALL_USED_REGS_OPT (all, zero_regs_flags::ALL), ZERO_CALL_USED_REGS_OPT (leafy-gpr-arg, zero_regs_flags::LEAFY_GPR_ARG), ZERO_CALL_USED_REGS_OPT (leafy-gpr, zero_regs_flags::LEAFY_GPR), ZERO_CALL_USED_REGS_OPT (leafy-arg, zero_regs_flags::LEAFY_ARG), ZERO_CALL_USED_REGS_OPT (leafy, zero_regs_flags::LEAFY), #undef ZERO_CALL_USED_REGS_OPT {NULL, 0U} }; /* A struct for describing a run of chars within a string. */ class string_fragment { public: string_fragment (const char *start, size_t len) : m_start (start), m_len (len) {} const char *m_start; size_t m_len; }; /* Specialization of edit_distance_traits for string_fragment, for use by get_closest_sanitizer_option. */ template <> struct edit_distance_traits { static size_t get_length (const string_fragment &fragment) { return fragment.m_len; } static const char *get_string (const string_fragment &fragment) { return fragment.m_start; } }; /* Given ARG, an unrecognized sanitizer option, return the best matching sanitizer option, or NULL if there isn't one. OPTS is array of candidate sanitizer options. CODE is OPT_fsanitize_, OPT_fsanitize_recover_ or OPT_fsanitize_trap_. VALUE is non-zero for the regular form of the option, zero for the "no-" form (e.g. "-fno-sanitize-recover="). */ static const char * get_closest_sanitizer_option (const string_fragment &arg, const struct sanitizer_opts_s *opts, enum opt_code code, int value) { best_match bm (arg); for (int i = 0; opts[i].name != NULL; ++i) { /* -fsanitize=all is not valid, so don't offer it. */ if (code == OPT_fsanitize_ && opts[i].flag == ~0U && value) continue; /* For -fsanitize-recover= (and not -fno-sanitize-recover=), don't offer the non-recoverable options. */ if (code == OPT_fsanitize_recover_ && !opts[i].can_recover && value) continue; /* For -fsanitize-trap= (and not -fno-sanitize-trap=), don't offer the non-trapping options. */ if (code == OPT_fsanitize_trap_ && !opts[i].can_trap && value) continue; bm.consider (opts[i].name); } return bm.get_best_meaningful_candidate (); } /* Parse comma separated sanitizer suboptions from P for option SCODE, adjust previous FLAGS and return new ones. If COMPLAIN is false, don't issue diagnostics. */ unsigned int parse_sanitizer_options (const char *p, location_t loc, int scode, unsigned int flags, int value, bool complain) { enum opt_code code = (enum opt_code) scode; while (*p != 0) { size_t len, i; bool found = false; const char *comma = strchr (p, ','); if (comma == NULL) len = strlen (p); else len = comma - p; if (len == 0) { p = comma + 1; continue; } /* Check to see if the string matches an option class name. */ for (i = 0; sanitizer_opts[i].name != NULL; ++i) if (len == sanitizer_opts[i].len && memcmp (p, sanitizer_opts[i].name, len) == 0) { /* Handle both -fsanitize and -fno-sanitize cases. */ if (value && sanitizer_opts[i].flag == ~0U) { if (code == OPT_fsanitize_) { if (complain) error_at (loc, "%<-fsanitize=all%> option is not valid"); } else if (code == OPT_fsanitize_recover_) flags |= ~(SANITIZE_THREAD | SANITIZE_LEAK | SANITIZE_UNREACHABLE | SANITIZE_RETURN | SANITIZE_SHADOW_CALL_STACK); else /* if (code == OPT_fsanitize_trap_) */ flags |= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT); } else if (value) { /* Do not enable -fsanitize-recover=unreachable and -fsanitize-recover=return if -fsanitize-recover=undefined is selected. */ if (code == OPT_fsanitize_recover_ && sanitizer_opts[i].flag == SANITIZE_UNDEFINED) flags |= (SANITIZE_UNDEFINED & ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN)); else if (code == OPT_fsanitize_trap_ && sanitizer_opts[i].flag == SANITIZE_VPTR) error_at (loc, "%<-fsanitize-trap=%s%> is not supported", sanitizer_opts[i].name); else flags |= sanitizer_opts[i].flag; } else { flags &= ~sanitizer_opts[i].flag; /* Don't always clear SANITIZE_ADDRESS if it was previously set: -fsanitize=address -fno-sanitize=kernel-address should leave SANITIZE_ADDRESS set. */ if (flags & (SANITIZE_KERNEL_ADDRESS | SANITIZE_USER_ADDRESS)) flags |= SANITIZE_ADDRESS; } found = true; break; } if (! found && complain) { const char *hint = get_closest_sanitizer_option (string_fragment (p, len), sanitizer_opts, code, value); const char *suffix; if (code == OPT_fsanitize_recover_) suffix = "-recover"; else if (code == OPT_fsanitize_trap_) suffix = "-trap"; else suffix = ""; if (hint) error_at (loc, "unrecognized argument to %<-f%ssanitize%s=%> " "option: %q.*s; did you mean %qs?", value ? "" : "no-", suffix, (int) len, p, hint); else error_at (loc, "unrecognized argument to %<-f%ssanitize%s=%> option: " "%q.*s", value ? "" : "no-", suffix, (int) len, p); } if (comma == NULL) break; p = comma + 1; } return flags; } /* Parse string values of no_sanitize attribute passed in VALUE. Values are separated with comma. */ unsigned int parse_no_sanitize_attribute (char *value) { unsigned int flags = 0; unsigned int i; char *q = strtok (value, ","); while (q != NULL) { for (i = 0; sanitizer_opts[i].name != NULL; ++i) if (strcmp (sanitizer_opts[i].name, q) == 0) { flags |= sanitizer_opts[i].flag; if (sanitizer_opts[i].flag == SANITIZE_UNDEFINED) flags |= SANITIZE_UNDEFINED_NONDEFAULT; break; } if (sanitizer_opts[i].name == NULL) warning (OPT_Wattributes, "%qs attribute directive ignored", q); q = strtok (NULL, ","); } return flags; } /* Parse -fzero-call-used-regs suboptions from ARG, return the FLAGS. */ unsigned int parse_zero_call_used_regs_options (const char *arg) { unsigned int flags = 0; /* Check to see if the string matches a sub-option name. */ for (unsigned int i = 0; zero_call_used_regs_opts[i].name != NULL; ++i) if (strcmp (arg, zero_call_used_regs_opts[i].name) == 0) { flags = zero_call_used_regs_opts[i].flag; break; } if (!flags) error ("unrecognized argument to %<-fzero-call-used-regs=%>: %qs", arg); return flags; } /* Parse -falign-NAME format for a FLAG value. Return individual parsed integer values into RESULT_VALUES array. If REPORT_ERROR is set, print error message at LOC location. */ bool parse_and_check_align_values (const char *flag, const char *name, auto_vec &result_values, bool report_error, location_t loc) { char *str = xstrdup (flag); for (char *p = strtok (str, ":"); p; p = strtok (NULL, ":")) { char *end; int v = strtol (p, &end, 10); if (*end != '\0' || v < 0) { if (report_error) error_at (loc, "invalid arguments for %<-falign-%s%> option: %qs", name, flag); return false; } result_values.safe_push ((unsigned)v); } free (str); /* Check that we have a correct number of values. */ if (result_values.is_empty () || result_values.length () > 4) { if (report_error) error_at (loc, "invalid number of arguments for %<-falign-%s%> " "option: %qs", name, flag); return false; } for (unsigned i = 0; i < result_values.length (); i++) if (result_values[i] > MAX_CODE_ALIGN_VALUE) { if (report_error) error_at (loc, "%<-falign-%s%> is not between 0 and %d", name, MAX_CODE_ALIGN_VALUE); return false; } return true; } /* Check that alignment value FLAG for -falign-NAME is valid at a given location LOC. OPT_STR points to the stored -falign-NAME=argument and OPT_FLAG points to the associated -falign-NAME on/off flag. */ static void check_alignment_argument (location_t loc, const char *flag, const char *name, int *opt_flag, const char **opt_str) { auto_vec align_result; parse_and_check_align_values (flag, name, align_result, true, loc); if (align_result.length() >= 1 && align_result[0] == 0) { *opt_flag = 1; *opt_str = NULL; } } /* Parse argument of -fpatchable-function-entry option ARG and store corresponding values to PATCH_AREA_SIZE and PATCH_AREA_START. If REPORT_ERROR is set to true, generate error for a problematic option arguments. */ void parse_and_check_patch_area (const char *arg, bool report_error, HOST_WIDE_INT *patch_area_size, HOST_WIDE_INT *patch_area_start) { *patch_area_size = 0; *patch_area_start = 0; if (arg == NULL) return; char *patch_area_arg = xstrdup (arg); char *comma = strchr (patch_area_arg, ','); if (comma) { *comma = '\0'; *patch_area_size = integral_argument (patch_area_arg); *patch_area_start = integral_argument (comma + 1); } else *patch_area_size = integral_argument (patch_area_arg); if (*patch_area_size < 0 || *patch_area_size > USHRT_MAX || *patch_area_start < 0 || *patch_area_start > USHRT_MAX || *patch_area_size < *patch_area_start) if (report_error) error ("invalid arguments for %<-fpatchable-function-entry%>"); free (patch_area_arg); } /* Print options enabled by -fhardened. Keep this in sync with the manual! */ static void print_help_hardened () { printf ("%s\n", "The following options are enabled by -fhardened:"); /* Unfortunately, I can't seem to use targetm.fortify_source_default_level here. */ printf (" %s\n", "-D_FORTIFY_SOURCE=3 (or =2 for glibc < 2.35)"); printf (" %s\n", "-D_GLIBCXX_ASSERTIONS"); printf (" %s\n", "-ftrivial-auto-var-init=zero"); #ifdef HAVE_LD_PIE printf (" %s %s\n", "-fPIE", "-pie"); #endif if (HAVE_LD_NOW_SUPPORT) printf (" %s\n", "-Wl,-z,now"); if (HAVE_LD_RELRO_SUPPORT) printf (" %s\n", "-Wl,-z,relro"); printf (" %s\n", "-fstack-protector-strong"); printf (" %s\n", "-fstack-clash-protection"); printf (" %s\n", "-fcf-protection=full"); putchar ('\n'); } /* Print help when OPT__help_ is set. */ void print_help (struct gcc_options *opts, unsigned int lang_mask, const char *help_option_argument) { const char *a = help_option_argument; unsigned int include_flags = 0; /* Note - by default we include undocumented options when listing specific classes. If you only want to see documented options then add ",^undocumented" to the --help= option. E.g.: --help=target,^undocumented */ unsigned int exclude_flags = 0; if (lang_mask == CL_DRIVER) return; /* Walk along the argument string, parsing each word in turn. The format is: arg = [^]{word}[,{arg}] word = {optimizers|target|warnings|undocumented| params|common|} */ while (*a != 0) { static const struct { const char *string; unsigned int flag; } specifics[] = { { "optimizers", CL_OPTIMIZATION }, { "target", CL_TARGET }, { "warnings", CL_WARNING }, { "undocumented", CL_UNDOCUMENTED }, { "params", CL_PARAMS }, { "joined", CL_JOINED }, { "separate", CL_SEPARATE }, { "common", CL_COMMON }, { NULL, 0 } }; unsigned int *pflags; const char *comma; unsigned int lang_flag, specific_flag; unsigned int len; unsigned int i; if (*a == '^') { ++a; if (*a == '\0') { error ("missing argument to %qs", "--help=^"); break; } pflags = &exclude_flags; } else pflags = &include_flags; comma = strchr (a, ','); if (comma == NULL) len = strlen (a); else len = comma - a; if (len == 0) { a = comma + 1; continue; } /* Check to see if the string matches an option class name. */ for (i = 0, specific_flag = 0; specifics[i].string != NULL; i++) if (strncasecmp (a, specifics[i].string, len) == 0) { specific_flag = specifics[i].flag; break; } /* Check to see if the string matches a language name. Note - we rely upon the alpha-sorted nature of the entries in the lang_names array, specifically that shorter names appear before their longer variants. (i.e. C before C++). That way when we are attempting to match --help=c for example we will match with C first and not C++. */ for (i = 0, lang_flag = 0; i < cl_lang_count; i++) if (strncasecmp (a, lang_names[i], len) == 0) { lang_flag = 1U << i; break; } if (specific_flag != 0) { if (lang_flag == 0) *pflags |= specific_flag; else { /* The option's argument matches both the start of a language name and the start of an option class name. We have a special case for when the user has specified "--help=c", but otherwise we have to issue a warning. */ if (strncasecmp (a, "c", len) == 0) *pflags |= lang_flag; else warning (0, "%<--help%> argument %q.*s is ambiguous, " "please be more specific", len, a); } } else if (lang_flag != 0) *pflags |= lang_flag; else if (strncasecmp (a, "hardened", len) == 0) print_help_hardened (); else warning (0, "unrecognized argument to %<--help=%> option: %q.*s", len, a); if (comma == NULL) break; a = comma + 1; } /* We started using PerFunction/Optimization for parameters and a warning. We should exclude these from optimization options. */ if (include_flags & CL_OPTIMIZATION) exclude_flags |= CL_WARNING; if (!(include_flags & CL_PARAMS)) exclude_flags |= CL_PARAMS; if (include_flags) print_specific_help (include_flags, exclude_flags, 0, opts, lang_mask); } /* Handle target- and language-independent options. Return zero to generate an "unknown option" message. Only options that need extra handling need to be listed here; if you simply want DECODED->value assigned to a variable, it happens automatically. */ bool common_handle_option (struct gcc_options *opts, struct gcc_options *opts_set, const struct cl_decoded_option *decoded, unsigned int lang_mask, int kind ATTRIBUTE_UNUSED, location_t loc, const struct cl_option_handlers *handlers, diagnostic_context *dc, void (*target_option_override_hook) (void)) { size_t scode = decoded->opt_index; const char *arg = decoded->arg; HOST_WIDE_INT value = decoded->value; enum opt_code code = (enum opt_code) scode; gcc_assert (decoded->canonical_option_num_elements <= 2); switch (code) { case OPT__help: { unsigned int all_langs_mask = (1U << cl_lang_count) - 1; unsigned int undoc_mask; unsigned int i; if (lang_mask == CL_DRIVER) break; undoc_mask = ((opts->x_verbose_flag | opts->x_extra_warnings) ? 0 : CL_UNDOCUMENTED); target_option_override_hook (); /* First display any single language specific options. */ for (i = 0; i < cl_lang_count; i++) print_specific_help (1U << i, (all_langs_mask & (~ (1U << i))) | undoc_mask, 0, opts, lang_mask); /* Next display any multi language specific options. */ print_specific_help (0, undoc_mask, all_langs_mask, opts, lang_mask); /* Then display any remaining, non-language options. */ for (i = CL_MIN_OPTION_CLASS; i <= CL_MAX_OPTION_CLASS; i <<= 1) if (i != CL_DRIVER) print_specific_help (i, undoc_mask, 0, opts, lang_mask); opts->x_exit_after_options = true; break; } case OPT__target_help: if (lang_mask == CL_DRIVER) break; target_option_override_hook (); print_specific_help (CL_TARGET, 0, 0, opts, lang_mask); opts->x_exit_after_options = true; break; case OPT__help_: { help_option_arguments.safe_push (arg); opts->x_exit_after_options = true; break; } case OPT__version: if (lang_mask == CL_DRIVER) break; opts->x_exit_after_options = true; break; case OPT__completion_: break; case OPT_fsanitize_: opts_set->x_flag_sanitize = true; opts->x_flag_sanitize = parse_sanitizer_options (arg, loc, code, opts->x_flag_sanitize, value, true); /* Kernel ASan implies normal ASan but does not yet support all features. */ if (opts->x_flag_sanitize & SANITIZE_KERNEL_ADDRESS) { SET_OPTION_IF_UNSET (opts, opts_set, param_asan_instrumentation_with_call_threshold, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_asan_globals, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_asan_stack, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_asan_protect_allocas, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_asan_use_after_return, 0); } if (opts->x_flag_sanitize & SANITIZE_KERNEL_HWADDRESS) { SET_OPTION_IF_UNSET (opts, opts_set, param_hwasan_instrument_stack, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_hwasan_random_frame_tag, 0); SET_OPTION_IF_UNSET (opts, opts_set, param_hwasan_instrument_allocas, 0); } break; case OPT_fsanitize_recover_: opts->x_flag_sanitize_recover = parse_sanitizer_options (arg, loc, code, opts->x_flag_sanitize_recover, value, true); break; case OPT_fsanitize_trap_: opts->x_flag_sanitize_trap = parse_sanitizer_options (arg, loc, code, opts->x_flag_sanitize_trap, value, true); break; case OPT_fasan_shadow_offset_: /* Deferred. */ break; case OPT_fsanitize_address_use_after_scope: opts->x_flag_sanitize_address_use_after_scope = value; break; case OPT_fsanitize_recover: if (value) opts->x_flag_sanitize_recover |= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT) & ~(SANITIZE_UNREACHABLE | SANITIZE_RETURN); else opts->x_flag_sanitize_recover &= ~(SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT); break; case OPT_fsanitize_trap: if (value) opts->x_flag_sanitize_trap |= (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT); else opts->x_flag_sanitize_trap &= ~(SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT); break; case OPT_O: case OPT_Os: case OPT_Ofast: case OPT_Og: case OPT_Oz: /* Currently handled in a prescan. */ break; case OPT_Wattributes_: if (lang_mask == CL_DRIVER) break; if (value) { error_at (loc, "arguments ignored for %<-Wattributes=%>; use " "%<-Wno-attributes=%> instead"); break; } else if (arg[strlen (arg) - 1] == ',') { error_at (loc, "trailing %<,%> in arguments for " "%<-Wno-attributes=%>"); break; } add_comma_separated_to_vector (&opts->x_flag_ignored_attributes, arg); break; case OPT_Werror: dc->set_warning_as_error_requested (value); break; case OPT_Werror_: if (lang_mask == CL_DRIVER) break; enable_warning_as_error (arg, value, lang_mask, handlers, opts, opts_set, loc, dc); break; case OPT_Wfatal_errors: dc->m_fatal_errors = value; break; case OPT_Wstack_usage_: opts->x_flag_stack_usage_info = value != -1; break; case OPT_Wstrict_aliasing: set_Wstrict_aliasing (opts, value); break; case OPT_Wstrict_overflow: opts->x_warn_strict_overflow = (value ? (int) WARN_STRICT_OVERFLOW_CONDITIONAL : 0); break; case OPT_Wsystem_headers: dc->m_warn_system_headers = value; break; case OPT_aux_info: opts->x_flag_gen_aux_info = 1; break; case OPT_d: decode_d_option (arg, opts, loc, dc); break; case OPT_fcall_used_: case OPT_fcall_saved_: /* Deferred. */ break; case OPT_fdbg_cnt_: /* Deferred. */ break; case OPT_fdebug_prefix_map_: case OPT_ffile_prefix_map_: case OPT_fprofile_prefix_map_: /* Deferred. */ break; case OPT_fcanon_prefix_map: flag_canon_prefix_map = value; break; case OPT_fcallgraph_info: opts->x_flag_callgraph_info = CALLGRAPH_INFO_NAKED; break; case OPT_fcallgraph_info_: { char *my_arg, *p; my_arg = xstrdup (arg); p = strtok (my_arg, ","); while (p) { if (strcmp (p, "su") == 0) { opts->x_flag_callgraph_info |= CALLGRAPH_INFO_STACK_USAGE; opts->x_flag_stack_usage_info = true; } else if (strcmp (p, "da") == 0) opts->x_flag_callgraph_info |= CALLGRAPH_INFO_DYNAMIC_ALLOC; else return 0; p = strtok (NULL, ","); } free (my_arg); } break; case OPT_fdiagnostics_show_location_: diagnostic_prefixing_rule (dc) = (diagnostic_prefixing_rule_t) value; break; case OPT_fdiagnostics_show_caret: dc->m_source_printing.enabled = value; break; case OPT_fdiagnostics_show_labels: dc->m_source_printing.show_labels_p = value; break; case OPT_fdiagnostics_show_line_numbers: dc->m_source_printing.show_line_numbers_p = value; break; case OPT_fdiagnostics_color_: diagnostic_color_init (dc, value); break; case OPT_fdiagnostics_urls_: diagnostic_urls_init (dc, value); break; case OPT_fdiagnostics_format_: { const char *basename = (opts->x_dump_base_name ? opts->x_dump_base_name : opts->x_main_input_basename); diagnostic_output_format_init (dc, basename, (enum diagnostics_output_format)value, opts->x_flag_diagnostics_json_formatting); break; } case OPT_fdiagnostics_text_art_charset_: dc->set_text_art_charset ((enum diagnostic_text_art_charset)value); break; case OPT_fdiagnostics_parseable_fixits: dc->set_extra_output_kind (value ? EXTRA_DIAGNOSTIC_OUTPUT_fixits_v1 : EXTRA_DIAGNOSTIC_OUTPUT_none); break; case OPT_fdiagnostics_column_unit_: dc->m_column_unit = (enum diagnostics_column_unit)value; break; case OPT_fdiagnostics_column_origin_: dc->m_column_origin = value; break; case OPT_fdiagnostics_escape_format_: dc->set_escape_format ((enum diagnostics_escape_format)value); break; case OPT_fdiagnostics_show_cwe: dc->set_show_cwe (value); break; case OPT_fdiagnostics_show_rules: dc->set_show_rules (value); break; case OPT_fdiagnostics_path_format_: dc->set_path_format ((enum diagnostic_path_format)value); break; case OPT_fdiagnostics_show_path_depths: dc->set_show_path_depths (value); break; case OPT_fdiagnostics_show_option: dc->set_show_option_requested (value); break; case OPT_fdiagnostics_minimum_margin_width_: dc->m_source_printing.min_margin_width = value; break; case OPT_fdump_: /* Deferred. */ break; case OPT_ffast_math: set_fast_math_flags (opts, value); break; case OPT_funsafe_math_optimizations: set_unsafe_math_optimizations_flags (opts, value); break; case OPT_ffixed_: /* Deferred. */ break; case OPT_finline_limit_: SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_single, value / 2); SET_OPTION_IF_UNSET (opts, opts_set, param_max_inline_insns_auto, value / 2); break; case OPT_finstrument_functions_exclude_function_list_: add_comma_separated_to_vector (&opts->x_flag_instrument_functions_exclude_functions, arg); break; case OPT_finstrument_functions_exclude_file_list_: add_comma_separated_to_vector (&opts->x_flag_instrument_functions_exclude_files, arg); break; case OPT_fmessage_length_: pp_set_line_maximum_length (dc->printer, value); diagnostic_set_caret_max_width (dc, value); break; case OPT_fopt_info: case OPT_fopt_info_: /* Deferred. */ break; case OPT_foffload_options_: /* Deferred. */ break; case OPT_foffload_abi_: #ifdef ACCEL_COMPILER /* Handled in the 'mkoffload's. */ #else error_at (loc, "%<-foffload-abi%> option can be specified only for " "offload compiler"); #endif break; case OPT_fpack_struct_: if (value <= 0 || (value & (value - 1)) || value > 16) error_at (loc, "structure alignment must be a small power of two, not %wu", value); else opts->x_initial_max_fld_align = value; break; case OPT_fplugin_: case OPT_fplugin_arg_: /* Deferred. */ break; case OPT_fprofile_use_: opts->x_profile_data_prefix = xstrdup (arg); opts->x_flag_profile_use = true; value = true; /* No break here - do -fprofile-use processing. */ /* FALLTHRU */ case OPT_fprofile_use: enable_fdo_optimizations (opts, opts_set, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_reorder_functions, value); /* Indirect call profiling should do all useful transformations speculative devirtualization does. */ if (opts->x_flag_value_profile_transformations) SET_OPTION_IF_UNSET (opts, opts_set, flag_devirtualize_speculatively, false); break; case OPT_fauto_profile_: opts->x_auto_profile_file = xstrdup (arg); opts->x_flag_auto_profile = true; value = true; /* No break here - do -fauto-profile processing. */ /* FALLTHRU */ case OPT_fauto_profile: enable_fdo_optimizations (opts, opts_set, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_correction, value); break; case OPT_fprofile_generate_: opts->x_profile_data_prefix = xstrdup (arg); value = true; /* No break here - do -fprofile-generate processing. */ /* FALLTHRU */ case OPT_fprofile_generate: SET_OPTION_IF_UNSET (opts, opts_set, profile_arc_flag, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_profile_values, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_inline_functions, value); SET_OPTION_IF_UNSET (opts, opts_set, flag_ipa_bit_cp, value); break; case OPT_fprofile_info_section: opts->x_profile_info_section = ".gcov_info"; break; case OPT_fpatchable_function_entry_: { HOST_WIDE_INT patch_area_size, patch_area_start; parse_and_check_patch_area (arg, true, &patch_area_size, &patch_area_start); } break; case OPT_ftree_vectorize: /* Automatically sets -ftree-loop-vectorize and -ftree-slp-vectorize. Nothing more to do here. */ break; case OPT_fzero_call_used_regs_: opts->x_flag_zero_call_used_regs = parse_zero_call_used_regs_options (arg); break; case OPT_fshow_column: dc->m_show_column = value; break; case OPT_frandom_seed: /* The real switch is -fno-random-seed. */ if (value) return false; /* Deferred. */ break; case OPT_frandom_seed_: /* Deferred. */ break; case OPT_fsched_verbose_: #ifdef INSN_SCHEDULING /* Handled with Var in common.opt. */ break; #else return false; #endif case OPT_fsched_stalled_insns_: opts->x_flag_sched_stalled_insns = value; if (opts->x_flag_sched_stalled_insns == 0) opts->x_flag_sched_stalled_insns = -1; break; case OPT_fsched_stalled_insns_dep_: opts->x_flag_sched_stalled_insns_dep = value; break; case OPT_fstack_check_: if (!strcmp (arg, "no")) opts->x_flag_stack_check = NO_STACK_CHECK; else if (!strcmp (arg, "generic")) /* This is the old stack checking method. */ opts->x_flag_stack_check = STACK_CHECK_BUILTIN ? FULL_BUILTIN_STACK_CHECK : GENERIC_STACK_CHECK; else if (!strcmp (arg, "specific")) /* This is the new stack checking method. */ opts->x_flag_stack_check = STACK_CHECK_BUILTIN ? FULL_BUILTIN_STACK_CHECK : STACK_CHECK_STATIC_BUILTIN ? STATIC_BUILTIN_STACK_CHECK : GENERIC_STACK_CHECK; else warning_at (loc, 0, "unknown stack check parameter %qs", arg); break; case OPT_fstack_limit: /* The real switch is -fno-stack-limit. */ if (value) return false; /* Deferred. */ break; case OPT_fstack_limit_register_: case OPT_fstack_limit_symbol_: /* Deferred. */ break; case OPT_fstack_usage: opts->x_flag_stack_usage = value; opts->x_flag_stack_usage_info = value != 0; break; case OPT_g: set_debug_level (NO_DEBUG, DEFAULT_GDB_EXTENSIONS, arg, opts, opts_set, loc); break; case OPT_gcodeview: break; case OPT_gbtf: set_debug_level (BTF_DEBUG, false, arg, opts, opts_set, loc); /* set the debug level to level 2, but if already at level 3, don't lower it. */ if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL) opts->x_debug_info_level = DINFO_LEVEL_NORMAL; break; case OPT_gctf: set_debug_level (CTF_DEBUG, false, arg, opts, opts_set, loc); /* CTF generation feeds off DWARF dies. For optimal CTF, switch debug info level to 2. If off or at level 1, set it to level 2, but if already at level 3, don't lower it. */ if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL && opts->x_ctf_debug_info_level > CTFINFO_LEVEL_NONE) opts->x_debug_info_level = DINFO_LEVEL_NORMAL; break; case OPT_gdwarf: if (arg && strlen (arg) != 0) { error_at (loc, "%<-gdwarf%s%> is ambiguous; " "use %<-gdwarf-%s%> for DWARF version " "or %<-gdwarf%> %<-g%s%> for debug level", arg, arg, arg); break; } else value = opts->x_dwarf_version; /* FALLTHRU */ case OPT_gdwarf_: if (value < 2 || value > 5) error_at (loc, "dwarf version %wu is not supported", value); else opts->x_dwarf_version = value; set_debug_level (DWARF2_DEBUG, false, "", opts, opts_set, loc); break; case OPT_ggdb: set_debug_level (NO_DEBUG, 2, arg, opts, opts_set, loc); break; case OPT_gvms: set_debug_level (VMS_DEBUG, false, arg, opts, opts_set, loc); break; case OPT_gz: case OPT_gz_: /* Handled completely via specs. */ break; case OPT_pedantic_errors: dc->m_pedantic_errors = 1; control_warning_option (OPT_Wpedantic, DK_ERROR, NULL, value, loc, lang_mask, handlers, opts, opts_set, dc); break; case OPT_flto: opts->x_flag_lto = value ? "" : NULL; break; case OPT_flto_: if (strcmp (arg, "none") != 0 && strcmp (arg, "jobserver") != 0 && strcmp (arg, "auto") != 0 && atoi (arg) == 0) error_at (loc, "unrecognized argument to %<-flto=%> option: %qs", arg); break; case OPT_w: dc->m_inhibit_warnings = true; break; case OPT_fmax_errors_: dc->set_max_errors (value); break; case OPT_fuse_ld_bfd: case OPT_fuse_ld_gold: case OPT_fuse_ld_lld: case OPT_fuse_ld_mold: case OPT_fuse_linker_plugin: /* No-op. Used by the driver and passed to us because it starts with f.*/ break; case OPT_fwrapv: if (value) opts->x_flag_trapv = 0; break; case OPT_ftrapv: if (value) opts->x_flag_wrapv = 0; break; case OPT_fstrict_overflow: opts->x_flag_wrapv = !value; opts->x_flag_wrapv_pointer = !value; if (!value) opts->x_flag_trapv = 0; break; case OPT_fipa_icf: opts->x_flag_ipa_icf_functions = value; opts->x_flag_ipa_icf_variables = value; break; case OPT_falign_loops_: check_alignment_argument (loc, arg, "loops", &opts->x_flag_align_loops, &opts->x_str_align_loops); break; case OPT_falign_jumps_: check_alignment_argument (loc, arg, "jumps", &opts->x_flag_align_jumps, &opts->x_str_align_jumps); break; case OPT_falign_labels_: check_alignment_argument (loc, arg, "labels", &opts->x_flag_align_labels, &opts->x_str_align_labels); break; case OPT_falign_functions_: check_alignment_argument (loc, arg, "functions", &opts->x_flag_align_functions, &opts->x_str_align_functions); break; case OPT_ftabstop_: /* It is documented that we silently ignore silly values. */ if (value >= 1 && value <= 100) dc->m_tabstop = value; break; case OPT_freport_bug: dc->set_report_bug (value); break; case OPT_fmultiflags: gcc_checking_assert (lang_mask == CL_DRIVER); break; default: /* If the flag was handled in a standard way, assume the lack of processing here is intentional. */ gcc_assert (option_flag_var (scode, opts)); break; } common_handle_option_auto (opts, opts_set, decoded, lang_mask, kind, loc, handlers, dc); return true; } /* Used to set the level of strict aliasing warnings in OPTS, when no level is specified (i.e., when -Wstrict-aliasing, and not -Wstrict-aliasing=level was given). ONOFF is assumed to take value 1 when -Wstrict-aliasing is specified, and 0 otherwise. After calling this function, wstrict_aliasing will be set to the default value of -Wstrict_aliasing=level, currently 3. */ static void set_Wstrict_aliasing (struct gcc_options *opts, int onoff) { gcc_assert (onoff == 0 || onoff == 1); if (onoff != 0) opts->x_warn_strict_aliasing = 3; else opts->x_warn_strict_aliasing = 0; } /* The following routines are useful in setting all the flags that -ffast-math and -fno-fast-math imply. */ static void set_fast_math_flags (struct gcc_options *opts, int set) { if (!opts->frontend_set_flag_unsafe_math_optimizations) { opts->x_flag_unsafe_math_optimizations = set; set_unsafe_math_optimizations_flags (opts, set); } if (!opts->frontend_set_flag_finite_math_only) opts->x_flag_finite_math_only = set; if (!opts->frontend_set_flag_errno_math) opts->x_flag_errno_math = !set; if (set) { if (opts->frontend_set_flag_excess_precision == EXCESS_PRECISION_DEFAULT) opts->x_flag_excess_precision = set ? EXCESS_PRECISION_FAST : EXCESS_PRECISION_DEFAULT; if (!opts->frontend_set_flag_signaling_nans) opts->x_flag_signaling_nans = 0; if (!opts->frontend_set_flag_rounding_math) opts->x_flag_rounding_math = 0; if (!opts->frontend_set_flag_cx_limited_range) opts->x_flag_cx_limited_range = 1; } } /* When -funsafe-math-optimizations is set the following flags are set as well. */ static void set_unsafe_math_optimizations_flags (struct gcc_options *opts, int set) { if (!opts->frontend_set_flag_trapping_math) opts->x_flag_trapping_math = !set; if (!opts->frontend_set_flag_signed_zeros) opts->x_flag_signed_zeros = !set; if (!opts->frontend_set_flag_associative_math) opts->x_flag_associative_math = set; if (!opts->frontend_set_flag_reciprocal_math) opts->x_flag_reciprocal_math = set; } /* Return true iff flags in OPTS are set as if -ffast-math. */ bool fast_math_flags_set_p (const struct gcc_options *opts) { return (!opts->x_flag_trapping_math && opts->x_flag_unsafe_math_optimizations && opts->x_flag_finite_math_only && !opts->x_flag_signed_zeros && !opts->x_flag_errno_math && opts->x_flag_excess_precision == EXCESS_PRECISION_FAST); } /* Return true iff flags are set as if -ffast-math but using the flags stored in the struct cl_optimization structure. */ bool fast_math_flags_struct_set_p (struct cl_optimization *opt) { return (!opt->x_flag_trapping_math && opt->x_flag_unsafe_math_optimizations && opt->x_flag_finite_math_only && !opt->x_flag_signed_zeros && !opt->x_flag_errno_math); } /* Handle a debug output -g switch for options OPTS (OPTS_SET->x_write_symbols storing whether a debug format was passed explicitly), location LOC. EXTENDED is true or false to support extended output (2 is special and means "-ggdb" was given). */ static void set_debug_level (uint32_t dinfo, int extended, const char *arg, struct gcc_options *opts, struct gcc_options *opts_set, location_t loc) { if (dinfo == NO_DEBUG) { if (opts->x_write_symbols == NO_DEBUG) { opts->x_write_symbols = PREFERRED_DEBUGGING_TYPE; if (extended == 2) { #if defined DWARF2_DEBUGGING_INFO || defined DWARF2_LINENO_DEBUGGING_INFO if (opts->x_write_symbols & CTF_DEBUG) opts->x_write_symbols |= DWARF2_DEBUG; else opts->x_write_symbols = DWARF2_DEBUG; #endif } if (opts->x_write_symbols == NO_DEBUG) warning_at (loc, 0, "target system does not support debug output"); } else if ((opts->x_write_symbols & CTF_DEBUG) || (opts->x_write_symbols & BTF_DEBUG)) { opts->x_write_symbols |= DWARF2_DEBUG; opts_set->x_write_symbols |= DWARF2_DEBUG; } } else { /* Make and retain the choice if both CTF and DWARF debug info are to be generated. */ if (((dinfo == DWARF2_DEBUG) || (dinfo == CTF_DEBUG)) && ((opts->x_write_symbols == (DWARF2_DEBUG|CTF_DEBUG)) || (opts->x_write_symbols == DWARF2_DEBUG) || (opts->x_write_symbols == CTF_DEBUG))) { opts->x_write_symbols |= dinfo; opts_set->x_write_symbols |= dinfo; } /* However, CTF and BTF are not allowed together at this time. */ else if (((dinfo == DWARF2_DEBUG) || (dinfo == BTF_DEBUG)) && ((opts->x_write_symbols == (DWARF2_DEBUG|BTF_DEBUG)) || (opts->x_write_symbols == DWARF2_DEBUG) || (opts->x_write_symbols == BTF_DEBUG))) { opts->x_write_symbols |= dinfo; opts_set->x_write_symbols |= dinfo; } else { /* Does it conflict with an already selected debug format? */ if (opts_set->x_write_symbols != NO_DEBUG && opts->x_write_symbols != NO_DEBUG && dinfo != opts->x_write_symbols) { gcc_assert (debug_set_count (dinfo) <= 1); error_at (loc, "debug format %qs conflicts with prior selection", debug_type_names[debug_set_to_format (dinfo)]); } opts->x_write_symbols = dinfo; opts_set->x_write_symbols = dinfo; } } if (dinfo != BTF_DEBUG) { /* A debug flag without a level defaults to level 2. If off or at level 1, set it to level 2, but if already at level 3, don't lower it. */ if (*arg == '\0') { if (dinfo == CTF_DEBUG) opts->x_ctf_debug_info_level = CTFINFO_LEVEL_NORMAL; else if (opts->x_debug_info_level < DINFO_LEVEL_NORMAL) opts->x_debug_info_level = DINFO_LEVEL_NORMAL; } else { int argval = integral_argument (arg); if (argval == -1) error_at (loc, "unrecognized debug output level %qs", arg); else if (argval > 3) error_at (loc, "debug output level %qs is too high", arg); else { if (dinfo == CTF_DEBUG) opts->x_ctf_debug_info_level = (enum ctf_debug_info_levels) argval; else opts->x_debug_info_level = (enum debug_info_levels) argval; } } } else if (*arg != '\0') error_at (loc, "unrecognized btf debug output level %qs", arg); } /* Arrange to dump core on error for diagnostic context DC. (The regular error message is still printed first, except in the case of abort ().) */ static void setup_core_dumping (diagnostic_context *dc) { #ifdef SIGABRT signal (SIGABRT, SIG_DFL); #endif #if defined(HAVE_SETRLIMIT) { struct rlimit rlim; if (getrlimit (RLIMIT_CORE, &rlim) != 0) fatal_error (input_location, "getting core file size maximum limit: %m"); rlim.rlim_cur = rlim.rlim_max; if (setrlimit (RLIMIT_CORE, &rlim) != 0) fatal_error (input_location, "setting core file size limit to maximum: %m"); } #endif diagnostic_abort_on_error (dc); } /* Parse a -d command line switch for OPTS, location LOC, diagnostic context DC. */ static void decode_d_option (const char *arg, struct gcc_options *opts, location_t loc, diagnostic_context *dc) { int c; while (*arg) switch (c = *arg++) { case 'A': opts->x_flag_debug_asm = 1; break; case 'p': opts->x_flag_print_asm_name = 1; break; case 'P': opts->x_flag_dump_rtl_in_asm = 1; opts->x_flag_print_asm_name = 1; break; case 'x': opts->x_rtl_dump_and_exit = 1; break; case 'D': /* These are handled by the preprocessor. */ case 'I': case 'M': case 'N': case 'U': break; case 'H': setup_core_dumping (dc); break; case 'a': opts->x_flag_dump_all_passed = true; break; default: warning_at (loc, 0, "unrecognized gcc debugging option: %c", c); break; } } /* Enable (or disable if VALUE is 0) a warning option ARG (language mask LANG_MASK, option handlers HANDLERS) as an error for option structures OPTS and OPTS_SET, diagnostic context DC (possibly NULL), location LOC. This is used by -Werror=. */ static void enable_warning_as_error (const char *arg, int value, unsigned int lang_mask, const struct cl_option_handlers *handlers, struct gcc_options *opts, struct gcc_options *opts_set, location_t loc, diagnostic_context *dc) { char *new_option; int option_index; new_option = XNEWVEC (char, strlen (arg) + 2); new_option[0] = 'W'; strcpy (new_option + 1, arg); option_index = find_opt (new_option, lang_mask); if (option_index == OPT_SPECIAL_unknown) { option_proposer op; const char *hint = op.suggest_option (new_option); if (hint) error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>;" " did you mean %<-%s%>?", value ? "" : "no-", arg, new_option, hint); else error_at (loc, "%<-W%serror=%s%>: no option %<-%s%>", value ? "" : "no-", arg, new_option); } else if (!(cl_options[option_index].flags & CL_WARNING)) error_at (loc, "%<-Werror=%s%>: %<-%s%> is not an option that " "controls warnings", arg, new_option); else { const diagnostic_t kind = value ? DK_ERROR : DK_WARNING; const char *arg = NULL; if (cl_options[option_index].flags & CL_JOINED) arg = new_option + cl_options[option_index].opt_len; control_warning_option (option_index, (int) kind, arg, value, loc, lang_mask, handlers, opts, opts_set, dc); } free (new_option); } /* Return malloced memory for the name of the option OPTION_INDEX which enabled a diagnostic (context CONTEXT), originally of type ORIG_DIAG_KIND but possibly converted to DIAG_KIND by options such as -Werror. */ char * option_name (const diagnostic_context *context, int option_index, diagnostic_t orig_diag_kind, diagnostic_t diag_kind) { if (option_index) { /* A warning classified as an error. */ if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN) && diag_kind == DK_ERROR) return concat (cl_options[OPT_Werror_].opt_text, /* Skip over "-W". */ cl_options[option_index].opt_text + 2, NULL); /* A warning with option. */ else return xstrdup (cl_options[option_index].opt_text); } /* A warning without option classified as an error. */ else if ((orig_diag_kind == DK_WARNING || orig_diag_kind == DK_PEDWARN || diag_kind == DK_WARNING) && context->warning_as_error_requested_p ()) return xstrdup (cl_options[OPT_Werror].opt_text); else return NULL; } /* Get the page within the documentation for this option. */ static const char * get_option_html_page (int option_index) { const cl_option *cl_opt = &cl_options[option_index]; /* Analyzer options are on their own page. */ if (strstr (cl_opt->opt_text, "analyzer-")) return "gcc/Static-Analyzer-Options.html"; /* Handle -flto= option. */ if (strstr (cl_opt->opt_text, "flto")) return "gcc/Optimize-Options.html"; #ifdef CL_Fortran if ((cl_opt->flags & CL_Fortran) != 0 /* If it is option common to both C/C++ and Fortran, it is documented in gcc/ rather than gfortran/ docs. */ && (cl_opt->flags & CL_C) == 0 #ifdef CL_CXX && (cl_opt->flags & CL_CXX) == 0 #endif ) return "gfortran/Error-and-Warning-Options.html"; #endif return "gcc/Warning-Options.html"; } /* Return malloced memory for a URL describing the option OPTION_INDEX which enabled a diagnostic (context CONTEXT). */ char * get_option_url (const diagnostic_context *, int option_index) { if (option_index) return concat (/* DOCUMENTATION_ROOT_URL should be supplied via #include "config.h" (see --with-documentation-root-url), and should have a trailing slash. */ DOCUMENTATION_ROOT_URL, /* get_option_html_page will return something like "gcc/Warning-Options.html". */ get_option_html_page (option_index), /* Expect an anchor of the form "index-Wfoo" e.g. , and thus an id within the URL of "#index-Wformat". */ "#index", cl_options[option_index].opt_text, NULL); else return NULL; } /* Return a heap allocated producer with command line options. */ char * gen_command_line_string (cl_decoded_option *options, unsigned int options_count) { auto_vec switches; char *options_string, *tail; const char *p; size_t len = 0; for (unsigned i = 0; i < options_count; i++) switch (options[i].opt_index) { case OPT_o: case OPT_d: case OPT_dumpbase: case OPT_dumpbase_ext: case OPT_dumpdir: case OPT_quiet: case OPT_version: case OPT_v: case OPT_w: case OPT_L: case OPT_D: case OPT_I: case OPT_U: case OPT_SPECIAL_unknown: case OPT_SPECIAL_ignore: case OPT_SPECIAL_warn_removed: case OPT_SPECIAL_program_name: case OPT_SPECIAL_input_file: case OPT_grecord_gcc_switches: case OPT_frecord_gcc_switches: case OPT__output_pch: case OPT_fdiagnostics_show_location_: case OPT_fdiagnostics_show_option: case OPT_fdiagnostics_show_caret: case OPT_fdiagnostics_show_labels: case OPT_fdiagnostics_show_line_numbers: case OPT_fdiagnostics_color_: case OPT_fdiagnostics_format_: case OPT_fverbose_asm: case OPT____: case OPT__sysroot_: case OPT_nostdinc: case OPT_nostdinc__: case OPT_fpreprocessed: case OPT_fltrans_output_list_: case OPT_fresolution_: case OPT_fdebug_prefix_map_: case OPT_fmacro_prefix_map_: case OPT_ffile_prefix_map_: case OPT_fprofile_prefix_map_: case OPT_fcanon_prefix_map: case OPT_fcompare_debug: case OPT_fchecking: case OPT_fchecking_: /* Ignore these. */ continue; case OPT_flto_: { const char *lto_canonical = "-flto"; switches.safe_push (lto_canonical); len += strlen (lto_canonical) + 1; break; } default: if (cl_options[options[i].opt_index].flags & CL_NO_DWARF_RECORD) continue; gcc_checking_assert (options[i].canonical_option[0][0] == '-'); switch (options[i].canonical_option[0][1]) { case 'M': case 'i': case 'W': continue; case 'f': if (strncmp (options[i].canonical_option[0] + 2, "dump", 4) == 0) continue; break; default: break; } switches.safe_push (options[i].orig_option_with_args_text); len += strlen (options[i].orig_option_with_args_text) + 1; break; } options_string = XNEWVEC (char, len + 1); tail = options_string; unsigned i; FOR_EACH_VEC_ELT (switches, i, p) { len = strlen (p); memcpy (tail, p, len); tail += len; if (i != switches.length () - 1) { *tail = ' '; ++tail; } } *tail = '\0'; return options_string; } /* Return a heap allocated producer string including command line options. */ char * gen_producer_string (const char *language_string, cl_decoded_option *options, unsigned int options_count) { char *cmdline = gen_command_line_string (options, options_count); char *combined = concat (language_string, " ", version_string, " ", cmdline, NULL); free (cmdline); return combined; } #if CHECKING_P namespace selftest { /* Verify that get_option_html_page works as expected. */ static void test_get_option_html_page () { ASSERT_STREQ (get_option_html_page (OPT_Wcpp), "gcc/Warning-Options.html"); ASSERT_STREQ (get_option_html_page (OPT_Wanalyzer_double_free), "gcc/Static-Analyzer-Options.html"); #ifdef CL_Fortran ASSERT_STREQ (get_option_html_page (OPT_Wline_truncation), "gfortran/Error-and-Warning-Options.html"); #endif } /* Verify EnumSet and EnumBitSet requirements. */ static void test_enum_sets () { for (unsigned i = 0; i < cl_options_count; ++i) if (cl_options[i].var_type == CLVC_ENUM && cl_options[i].var_value != CLEV_NORMAL) { const struct cl_enum *e = &cl_enums[cl_options[i].var_enum]; unsigned HOST_WIDE_INT used_sets = 0; unsigned HOST_WIDE_INT mask = 0; unsigned highest_set = 0; for (unsigned j = 0; e->values[j].arg; ++j) { unsigned set = e->values[j].flags >> CL_ENUM_SET_SHIFT; if (cl_options[i].var_value == CLEV_BITSET) { /* For EnumBitSet Set shouldn't be used and Value should be a power of two. */ ASSERT_TRUE (set == 0); ASSERT_TRUE (pow2p_hwi (e->values[j].value)); continue; } /* Test that enumerators referenced in EnumSet have all Set(n) on them within the valid range. */ ASSERT_TRUE (set >= 1 && set <= HOST_BITS_PER_WIDE_INT); highest_set = MAX (set, highest_set); used_sets |= HOST_WIDE_INT_1U << (set - 1); } if (cl_options[i].var_value == CLEV_BITSET) continue; /* If there is just one set, no point to using EnumSet. */ ASSERT_TRUE (highest_set >= 2); /* Test that there are no gaps in between the sets. */ if (highest_set == HOST_BITS_PER_WIDE_INT) ASSERT_TRUE (used_sets == HOST_WIDE_INT_M1U); else ASSERT_TRUE (used_sets == (HOST_WIDE_INT_1U << highest_set) - 1); for (unsigned int j = 1; j <= highest_set; ++j) { unsigned HOST_WIDE_INT this_mask = 0; for (unsigned k = 0; e->values[k].arg; ++k) { unsigned set = e->values[j].flags >> CL_ENUM_SET_SHIFT; if (set == j) this_mask |= e->values[j].value; } ASSERT_TRUE ((mask & this_mask) == 0); mask |= this_mask; } } } /* Run all of the selftests within this file. */ void opts_cc_tests () { test_get_option_html_page (); test_enum_sets (); } } // namespace selftest #endif /* #if CHECKING_P */