Using The GNU Compiler Collection: Richard M. Stallman and The GCC Developer Community
Using The GNU Compiler Collection: Richard M. Stallman and The GCC Developer Community
(GCC)
Short Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1 Programming Languages Supported by GCC . . . . . . . . . . . . . . . 3
2 Language Standards Supported by GCC . . . . . . . . . . . . . . . . . . 5
3 GCC Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 C Implementation-Defined Behavior . . . . . . . . . . . . . . . . . . . . 395
5 C++ Implementation-Defined Behavior . . . . . . . . . . . . . . . . . 403
6 Extensions to the C Language Family . . . . . . . . . . . . . . . . . . . 405
7 Extensions to the C++ Language . . . . . . . . . . . . . . . . . . . . . . 737
8 GNU Objective-C Features . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
9 Binary Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
10 gcov—a Test Coverage Program . . . . . . . . . . . . . . . . . . . . . . . 771
11 gcov-tool—an Offline Gcda Profile Processing Tool . . . . . . . 781
12 gcov-dump—an Offline Gcda and Gcno Profile Dump Tool . . 785
13 Known Causes of Trouble with GCC . . . . . . . . . . . . . . . . . . . . 787
14 Reporting Bugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
15 How To Get Help with GCC . . . . . . . . . . . . . . . . . . . . . . . . . . 805
16 Contributing to GCC Development . . . . . . . . . . . . . . . . . . . . . 807
Funding Free Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
The GNU Project and GNU/Linux . . . . . . . . . . . . . . . . . . . . . . . . . 811
GNU General Public License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
GNU Free Documentation License . . . . . . . . . . . . . . . . . . . . . . . . . 825
Contributors to GCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Option Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Keyword Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
iii
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction
This manual documents how to use the GNU compilers, as well as their features and incom-
patibilities, and how to report bugs. It corresponds to the compilers (GCC) version 7.5.0.
The internals of the GNU compilers, including how to port them to new targets and some
information about how to write front ends for new languages, are documented in a separate
manual. See Section “Introduction” in GNU Compiler Collection (GCC) Internals.
Chapter 1: Programming Languages Supported by GCC 3
2.1 C Language
The original ANSI C standard (X3.159-1989) was ratified in 1989 and published in 1990.
This standard was ratified as an ISO standard (ISO/IEC 9899:1990) later in 1990. There
were no technical differences between these publications, although the sections of the ANSI
standard were renumbered and became clauses in the ISO standard. The ANSI standard,
but not the ISO standard, also came with a Rationale document. This standard, in both
its forms, is commonly known as C89, or occasionally as C90, from the dates of ratifi-
cation. To select this standard in GCC, use one of the options ‘-ansi’, ‘-std=c90’ or
‘-std=iso9899:1990’; to obtain all the diagnostics required by the standard, you should
also specify ‘-pedantic’ (or ‘-pedantic-errors’ if you want them to be errors rather than
warnings). See Section 3.4 [Options Controlling C Dialect], page 33.
Errors in the 1990 ISO C standard were corrected in two Technical Corrigenda published
in 1994 and 1996. GCC does not support the uncorrected version.
An amendment to the 1990 standard was published in 1995. This amendment added
digraphs and __STDC_VERSION__ to the language, but otherwise concerned the library. This
amendment is commonly known as AMD1; the amended standard is sometimes known as
C94 or C95. To select this standard in GCC, use the option ‘-std=iso9899:199409’ (with,
as for other standard versions, ‘-pedantic’ to receive all required diagnostics).
A new edition of the ISO C standard was published in 1999 as ISO/IEC 9899:1999, and
is commonly known as C99. (While in development, drafts of this standard version were
referred to as C9X.) GCC has substantially complete support for this standard version; see
http://gcc.gnu.org/c99status.html for details. To select this standard, use ‘-std=c99’
or ‘-std=iso9899:1999’.
Errors in the 1999 ISO C standard were corrected in three Technical Corrigenda published
in 2001, 2004 and 2007. GCC does not support the uncorrected version.
A fourth version of the C standard, known as C11, was published in 2011 as ISO/IEC
9899:2011. (While in development, drafts of this standard version were referred to as C1X.)
GCC has substantially complete support for this standard, enabled with ‘-std=c11’ or
‘-std=iso9899:2011’.
By default, GCC provides some extensions to the C language that, on rare occasions con-
flict with the C standard. See Chapter 6 [Extensions to the C Language Family], page 405.
Some features that are part of the C99 standard are accepted as extensions in C90 mode,
and some features that are part of the C11 standard are accepted as extensions in C90 and
C99 modes. Use of the ‘-std’ options listed above disables these extensions where they
conflict with the C standard version selected. You may also select an extended version of
the C language explicitly with ‘-std=gnu90’ (for C90 with GNU extensions), ‘-std=gnu99’
(for C99 with GNU extensions) or ‘-std=gnu11’ (for C11 with GNU extensions).
The default, if no C language dialect options are given, is ‘-std=gnu11’.
6 Using the GNU Compiler Collection (GCC)
The ISO C standard defines (in clause 4) two classes of conforming implementation. A
conforming hosted implementation supports the whole standard including all the library
facilities; a conforming freestanding implementation is only required to provide certain
library facilities: those in <float.h>, <limits.h>, <stdarg.h>, and <stddef.h>; since
AMD1, also those in <iso646.h>; since C99, also those in <stdbool.h> and <stdint.h>;
and since C11, also those in <stdalign.h> and <stdnoreturn.h>. In addition, complex
types, added in C99, are not required for freestanding implementations.
The standard also defines two environments for programs, a freestanding environment,
required of all implementations and which may not have library facilities beyond those
required of freestanding implementations, where the handling of program startup and ter-
mination are implementation-defined; and a hosted environment, which is not required,
in which all the library facilities are provided and startup is through a function int main
(void) or int main (int, char *[]). An OS kernel is an example of a program running
in a freestanding environment; a program using the facilities of an operating system is an
example of a program running in a hosted environment.
GCC aims towards being usable as a conforming freestanding implementation, or as the
compiler for a conforming hosted implementation. By default, it acts as the compiler for a
hosted implementation, defining __STDC_HOSTED__ as 1 and presuming that when the names
of ISO C functions are used, they have the semantics defined in the standard. To make it act
as a conforming freestanding implementation for a freestanding environment, use the option
‘-ffreestanding’; it then defines __STDC_HOSTED__ to 0 and does not make assumptions
about the meanings of function names from the standard library, with exceptions noted
below. To build an OS kernel, you may well still need to make your own arrangements for
linking and startup. See Section 3.4 [Options Controlling C Dialect], page 33.
GCC does not provide the library facilities required only of hosted implementations, nor
yet all the facilities required by C99 of freestanding implementations on all platforms. To
use the facilities of a hosted environment, you need to find them elsewhere (for example, in
the GNU C library). See Section 13.5 [Standard Libraries], page 792.
Most of the compiler support routines used by GCC are present in ‘libgcc’, but there
are a few exceptions. GCC requires the freestanding environment provide memcpy, memmove,
memset and memcmp. Finally, if __builtin_trap is used, and the target does not implement
the trap pattern, then GCC emits a call to abort.
For references to Technical Corrigenda, Rationale documents and information concerning
the history of C that is available online, see http://gcc.gnu.org/readings.html
A revised ISO C++ standard was published in 2011 as ISO/IEC 14882:2011, and is referred
to as C++11; before its publication it was commonly referred to as C++0x. C++11 contains
several changes to the C++ language, all of which have been implemented in GCC. For
details see https://gcc.gnu.org/projects/cxx0x.html. To select this standard in GCC,
use the option ‘-std=c++11’.
Another revised ISO C++ standard was published in 2014 as ISO/IEC 14882:2014, and is
referred to as C++14; before its publication it was sometimes referred to as C++1y. C++14
contains several further changes to the C++ language, all of which have been implemented
in GCC. For details see https://gcc.gnu.org/projects/cxx1y.html. To select this
standard in GCC, use the option ‘-std=c++14’.
GCC also supports the C++ Concepts Technical Specification, ISO/IEC TS 19217:2015,
which allows constraints to be defined for templates, allowing template arguments to be
checked and for templates to be overloaded or specialized based on the constraints. Support
for C++ Concepts is included in an experimental C++1z mode that corresponds to the next
revision of the ISO C++ standard, expected to be published in 2017. To enable C++1z
support in GCC, use the option ‘-std=c++17’ or ‘-std=c++1z’.
More information about the C++ standards is available on the ISO C++ committee’s web
site at http://www.open-std.org/jtc1/sc22/wg21/.
To obtain all the diagnostics required by any of the standard versions described above
you should specify ‘-pedantic’ or ‘-pedantic-errors’, otherwise GCC will allow some
non-ISO C++ features as extensions. See Section 3.8 [Warning Options], page 59.
By default, GCC also provides some additional extensions to the C++ language that
on rare occasions conflict with the C++ standard. See Section 3.5 [C++ Dialect Options],
page 40. Use of the ‘-std’ options listed above disables these extensions where they they
conflict with the C++ standard version selected. You may also select an extended version
of the C++ language explicitly with ‘-std=gnu++98’ (for C++98 with GNU extensions), or
‘-std=gnu++11’ (for C++11 with GNU extensions), or ‘-std=gnu++14’ (for C++14 with GNU
extensions), or ‘-std=gnu++1z’ (for C++1z with GNU extensions).
The default, if no C++ language dialect options are given, is ‘-std=gnu++14’.
2.4 Go Language
As of the GCC 4.7.1 release, GCC supports the Go 1 language standard, described at
https://golang.org/doc/go1.
C Language Options
See Section 3.4 [Options Controlling C Dialect], page 33.
10 Using the GNU Compiler Collection (GCC)
-fivar-visibility=[public|protected|private|package]
-freplace-objc-classes
-fzero-link
-gen-decls
-Wassign-intercept
-Wno-protocol -Wselector
-Wstrict-selector-match
-Wundeclared-selector
Warning Options
See Section 3.8 [Options to Request or Suppress Warnings], page 59.
-fsyntax-only -fmax-errors=n -Wpedantic
-pedantic-errors
-w -Wextra -Wall -Waddress -Waggregate-return -Waligned-new
-Walloc-zero -Walloc-size-larger-than=n -Walloca -Walloca-larger-than=n
-Wno-aggressive-loop-optimizations -Warray-bounds -Warray-bounds=n
-Wno-attributes -Wbool-compare -Wbool-operation
-Wno-builtin-declaration-mismatch
-Wno-builtin-macro-redefined -Wc90-c99-compat -Wc99-c11-compat
-Wc++-compat -Wc++11-compat -Wc++14-compat -Wcast-align -Wcast-qual
-Wchar-subscripts -Wchkp -Wclobbered -Wcomment
-Wconditionally-supported
-Wconversion -Wcoverage-mismatch -Wno-cpp -Wdangling-else -Wdate-time
-Wdelete-incomplete
-Wno-deprecated -Wno-deprecated-declarations -Wno-designated-init
-Wdisabled-optimization
-Wno-discarded-qualifiers -Wno-discarded-array-qualifiers
-Wno-div-by-zero -Wdouble-promotion
-Wduplicated-branches -Wduplicated-cond
-Wempty-body -Wenum-compare -Wno-endif-labels -Wexpansion-to-defined
-Werror -Werror=* -Wfatal-errors -Wfloat-equal -Wformat -Wformat=2
-Wno-format-contains-nul -Wno-format-extra-args
-Wformat-nonliteral -Wformat-overflow=n
-Wformat-security -Wformat-signedness -Wformat-truncation=n
-Wformat-y2k -Wframe-address
-Wframe-larger-than=len -Wno-free-nonheap-object -Wjump-misses-init
-Wignored-qualifiers -Wignored-attributes -Wincompatible-pointer-types
-Wimplicit -Wimplicit-fallthrough -Wimplicit-fallthrough=n
-Wimplicit-function-declaration -Wimplicit-int
-Winit-self -Winline -Wno-int-conversion -Wint-in-bool-context
-Wno-int-to-pointer-cast -Winvalid-memory-model -Wno-invalid-offsetof
-Winvalid-pch -Wlarger-than=len
-Wlogical-op -Wlogical-not-parentheses -Wlong-long
-Wmain -Wmaybe-uninitialized -Wmemset-elt-size -Wmemset-transposed-args
-Wmisleading-indentation -Wmissing-braces
-Wmissing-field-initializers -Wmissing-include-dirs
-Wno-multichar -Wnonnull -Wnonnull-compare
-Wnormalized=[none|id|nfc|nfkc]
-Wnull-dereference -Wodr -Wno-overflow -Wopenmp-simd
12 Using the GNU Compiler Collection (GCC)
-Woverride-init-side-effects -Woverlength-strings
-Wpacked -Wpacked-bitfield-compat -Wpadded
-Wparentheses -Wno-pedantic-ms-format
-Wplacement-new -Wplacement-new=n
-Wpointer-arith -Wpointer-compare -Wno-pointer-to-int-cast
-Wno-pragmas -Wredundant-decls -Wrestrict -Wno-return-local-addr
-Wreturn-type -Wsequence-point -Wshadow -Wno-shadow-ivar
-Wshadow=global, -Wshadow=local, -Wshadow=compatible-local
-Wshift-overflow -Wshift-overflow=n
-Wshift-count-negative -Wshift-count-overflow -Wshift-negative-value
-Wsign-compare -Wsign-conversion -Wfloat-conversion
-Wno-scalar-storage-order
-Wsizeof-pointer-memaccess -Wsizeof-array-argument
-Wstack-protector -Wstack-usage=len -Wstrict-aliasing
-Wstrict-aliasing=n -Wstrict-overflow -Wstrict-overflow=n
-Wstringop-overflow=n
-Wsuggest-attribute=[pure|const|noreturn|format]
-Wsuggest-final-types
-Wsuggest-final-methods -Wsuggest-override
-Wmissing-format-attribute -Wsubobject-linkage
-Wswitch -Wswitch-bool -Wswitch-default -Wswitch-enum
-Wswitch-unreachable -Wsync-nand
-Wsystem-headers -Wtautological-compare -Wtrampolines -Wtrigraphs
-Wtype-limits -Wundef
-Wuninitialized -Wunknown-pragmas -Wunsafe-loop-optimizations
-Wunsuffixed-float-constants -Wunused -Wunused-function
-Wunused-label -Wunused-local-typedefs -Wunused-macros
-Wunused-parameter -Wno-unused-result
-Wunused-value -Wunused-variable
-Wunused-const-variable -Wunused-const-variable=n
-Wunused-but-set-parameter -Wunused-but-set-variable
-Wuseless-cast -Wvariadic-macros -Wvector-operation-performance
-Wvla -Wvla-larger-than=n -Wvolatile-register-var -Wwrite-strings
-Wzero-as-null-pointer-constant -Whsa
C and Objective-C-only Warning Options
-Wbad-function-cast -Wmissing-declarations
-Wmissing-parameter-type -Wmissing-prototypes -Wnested-externs
-Wold-style-declaration -Wold-style-definition
-Wstrict-prototypes -Wtraditional -Wtraditional-conversion
-Wdeclaration-after-statement -Wpointer-sign
Debugging Options
See Section 3.9 [Options for Debugging Your Program], page 101.
-g -glevel -gcoff -gdwarf -gdwarf-version
-ggdb -grecord-gcc-switches -gno-record-gcc-switches
-gstabs -gstabs+ -gstrict-dwarf -gno-strict-dwarf
-gcolumn-info -gno-column-info
-gvms -gxcoff -gxcoff+ -gz[=type]
-fdebug-prefix-map=old=new -fdebug-types-section
-feliminate-dwarf2-dups -fno-eliminate-unused-debug-types
-femit-struct-debug-baseonly -femit-struct-debug-reduced
-femit-struct-debug-detailed[=spec-list]
-feliminate-unused-debug-symbols -femit-class-debug-always
-fno-merge-debug-strings -fno-dwarf2-cfi-asm
-fvar-tracking -fvar-tracking-assignments
Optimization Options
See Section 3.10 [Options that Control Optimization], page 106.
Chapter 3: GCC Command Options 13
-faggressive-loop-optimizations -falign-functions[=n]
-falign-jumps[=n]
-falign-labels[=n] -falign-loops[=n]
-fassociative-math -fauto-profile -fauto-profile[=path]
-fauto-inc-dec -fbranch-probabilities
-fbranch-target-load-optimize -fbranch-target-load-optimize2
-fbtr-bb-exclusive -fcaller-saves
-fcombine-stack-adjustments -fconserve-stack
-fcompare-elim -fcprop-registers -fcrossjumping
-fcse-follow-jumps -fcse-skip-blocks -fcx-fortran-rules
-fcx-limited-range
-fdata-sections -fdce -fdelayed-branch
-fdelete-null-pointer-checks -fdevirtualize -fdevirtualize-speculatively
-fdevirtualize-at-ltrans -fdse
-fearly-inlining -fipa-sra -fexpensive-optimizations -ffat-lto-objects
-ffast-math -ffinite-math-only -ffloat-store -fexcess-precision=style
-fforward-propagate -ffp-contract=style -ffunction-sections
-fgcse -fgcse-after-reload -fgcse-las -fgcse-lm -fgraphite-identity
-fgcse-sm -fhoist-adjacent-loads -fif-conversion
-fif-conversion2 -findirect-inlining
-finline-functions -finline-functions-called-once -finline-limit=n
-finline-small-functions -fipa-cp -fipa-cp-clone
-fipa-bit-cp -fipa-vrp
-fipa-pta -fipa-profile -fipa-pure-const -fipa-reference -fipa-icf
-fira-algorithm=algorithm
-fira-region=region -fira-hoist-pressure
-fira-loop-pressure -fno-ira-share-save-slots
-fno-ira-share-spill-slots
-fisolate-erroneous-paths-dereference -fisolate-erroneous-paths-attribute
-fivopts -fkeep-inline-functions -fkeep-static-functions
-fkeep-static-consts -flimit-function-alignment -flive-range-shrinkage
-floop-block -floop-interchange -floop-strip-mine
-floop-unroll-and-jam -floop-nest-optimize
-floop-parallelize-all -flra-remat -flto -flto-compression-level
-flto-partition=alg -fmerge-all-constants
-fmerge-constants -fmodulo-sched -fmodulo-sched-allow-regmoves
-fmove-loop-invariants -fno-branch-count-reg
-fno-defer-pop -fno-fp-int-builtin-inexact -fno-function-cse
-fno-guess-branch-probability -fno-inline -fno-math-errno -fno-peephole
-fno-peephole2 -fno-printf-return-value -fno-sched-interblock
-fno-sched-spec -fno-signed-zeros
-fno-toplevel-reorder -fno-trapping-math -fno-zero-initialized-in-bss
-fomit-frame-pointer -foptimize-sibling-calls
-fpartial-inlining -fpeel-loops -fpredictive-commoning
-fprefetch-loop-arrays
-fprofile-correction
-fprofile-use -fprofile-use=path -fprofile-values
-fprofile-reorder-functions
-freciprocal-math -free -frename-registers -freorder-blocks
-freorder-blocks-algorithm=algorithm
-freorder-blocks-and-partition -freorder-functions
-frerun-cse-after-loop -freschedule-modulo-scheduled-loops
-frounding-math -fsched2-use-superblocks -fsched-pressure
-fsched-spec-load -fsched-spec-load-dangerous
-fsched-stalled-insns-dep[=n] -fsched-stalled-insns[=n]
-fsched-group-heuristic -fsched-critical-path-heuristic
-fsched-spec-insn-heuristic -fsched-rank-heuristic
-fsched-last-insn-heuristic -fsched-dep-count-heuristic
14 Using the GNU Compiler Collection (GCC)
-fschedule-fusion
-fschedule-insns -fschedule-insns2 -fsection-anchors
-fselective-scheduling -fselective-scheduling2
-fsel-sched-pipelining -fsel-sched-pipelining-outer-loops
-fsemantic-interposition -fshrink-wrap -fshrink-wrap-separate
-fsignaling-nans
-fsingle-precision-constant -fsplit-ivs-in-unroller -fsplit-loops
-fsplit-paths
-fsplit-wide-types -fssa-backprop -fssa-phiopt
-fstdarg-opt -fstore-merging -fstrict-aliasing
-fstrict-overflow -fthread-jumps -ftracer -ftree-bit-ccp
-ftree-builtin-call-dce -ftree-ccp -ftree-ch
-ftree-coalesce-vars -ftree-copy-prop -ftree-dce -ftree-dominator-opts
-ftree-dse -ftree-forwprop -ftree-fre -fcode-hoisting
-ftree-loop-if-convert -ftree-loop-im
-ftree-phiprop -ftree-loop-distribution -ftree-loop-distribute-patterns
-ftree-loop-ivcanon -ftree-loop-linear -ftree-loop-optimize
-ftree-loop-vectorize
-ftree-parallelize-loops=n -ftree-pre -ftree-partial-pre -ftree-pta
-ftree-reassoc -ftree-sink -ftree-slsr -ftree-sra
-ftree-switch-conversion -ftree-tail-merge
-ftree-ter -ftree-vectorize -ftree-vrp -funconstrained-commons
-funit-at-a-time -funroll-all-loops -funroll-loops
-funsafe-math-optimizations -funswitch-loops
-fipa-ra -fvariable-expansion-in-unroller -fvect-cost-model -fvpt
-fweb -fwhole-program -fwpa -fuse-linker-plugin
--param name=value -O -O0 -O1 -O2 -O3 -Os -Ofast -Og
Preprocessor Options
See Section 3.12 [Options Controlling the Preprocessor], page 176.
-Aquestion=answer
-A-question[=answer]
Chapter 3: GCC Command Options 15
-C -CC -Dmacro[=defn]
-dD -dI -dM -dN -dU
-fdebug-cpp -fdirectives-only -fdollars-in-identifiers
-fexec-charset=charset -fextended-identifiers
-finput-charset=charset -fno-canonical-system-headers
-fpch-deps -fpch-preprocess -fpreprocessed
-ftabstop=width -ftrack-macro-expansion
-fwide-exec-charset=charset -fworking-directory
-H -imacros file -include file
-M -MD -MF -MG -MM -MMD -MP -MQ -MT
-no-integrated-cpp -P -pthread -remap
-traditional -traditional-cpp -trigraphs
-Umacro -undef
-Wp,option -Xpreprocessor option
Assembler Options
See Section 3.13 [Passing Options to the Assembler], page 183.
-Wa,option -Xassembler option
Linker Options
See Section 3.14 [Options for Linking], page 183.
object-file-name -fuse-ld=linker -llibrary
-nostartfiles -nodefaultlibs -nostdlib -pie -pthread -rdynamic
-s -static -static-libgcc -static-libstdc++
-static-libasan -static-libtsan -static-liblsan -static-libubsan
-static-libmpx -static-libmpxwrappers
-shared -shared-libgcc -symbolic
-T script -Wl,option -Xlinker option
-u symbol -z keyword
Directory Options
See Section 3.15 [Options for Directory Search], page 188.
-Bprefix -Idir -I-
-idirafter dir
-imacros file -imultilib dir
-iplugindir=dir -iprefix file
-iquote dir -isysroot dir -isystem dir
-iwithprefix dir -iwithprefixbefore dir
-Ldir -no-canonical-prefixes --no-sysroot-suffix
-nostdinc -nostdinc++ --sysroot=dir
-fvisibility=[default|internal|hidden|protected]
-fstrict-volatile-bitfields -fsync-libcalls
Developer Options
See Section 3.17 [GCC Developer Options], page 201.
-dletters -dumpspecs -dumpmachine -dumpversion
-dumpfullversion -fchecking -fchecking=n -fdbg-cnt-list
-fdbg-cnt=counter-value-list
-fdisable-ipa-pass_name
-fdisable-rtl-pass_name
-fdisable-rtl-pass-name=range-list
-fdisable-tree-pass_name
-fdisable-tree-pass-name=range-list
-fdump-noaddr -fdump-unnumbered -fdump-unnumbered-links
-fdump-translation-unit[-n]
-fdump-class-hierarchy[-n]
-fdump-ipa-all -fdump-ipa-cgraph -fdump-ipa-inline
-fdump-passes
-fdump-rtl-pass -fdump-rtl-pass=filename
-fdump-statistics
-fdump-final-insns[=file] -fdump-tree-all
-fdump-tree-switch
-fdump-tree-switch-options
-fdump-tree-switch-options=filename
-fcompare-debug[=opts] -fcompare-debug-second
-fenable-kind-pass
-fenable-kind-pass=range-list
-fira-verbose=n
-flto-report -flto-report-wpa -fmem-report-wpa
-fmem-report -fpre-ipa-mem-report -fpost-ipa-mem-report
-fopt-info -fopt-info-options[=file]
-fprofile-report
-frandom-seed=string -fsched-verbose=n
-fsel-sched-verbose -fsel-sched-dump-cfg -fsel-sched-pipelining-verbose
-fstats -fstack-usage -ftime-report -ftime-report-details
-fvar-tracking-assignments-toggle -gtoggle
-print-file-name=library -print-libgcc-file-name
-print-multi-directory -print-multi-lib -print-multi-os-directory
-print-prog-name=program -print-search-dirs -Q
-print-sysroot -print-sysroot-headers-suffix
-save-temps -save-temps=cwd -save-temps=obj -time[=file]
Machine-Dependent Options
See Section 3.18 [Machine-Dependent Options], page 217.
AArch64 Options
-mabi=name -mbig-endian -mlittle-endian
-mgeneral-regs-only
-mcmodel=tiny -mcmodel=small -mcmodel=large
-mstrict-align
-momit-leaf-frame-pointer -mno-omit-leaf-frame-pointer
-mtls-dialect=desc -mtls-dialect=traditional
-mtls-size=size
-mfix-cortex-a53-835769 -mno-fix-cortex-a53-835769
-mfix-cortex-a53-843419 -mno-fix-cortex-a53-843419
-mlow-precision-recip-sqrt -mno-low-precision-recip-sqrt
-mlow-precision-sqrt -mno-low-precision-sqrt
-mlow-precision-div -mno-low-precision-div
-march=name -mcpu=name -mtune=name
Chapter 3: GCC Command Options 17
ARC Options
-mbarrel-shifter
-mcpu=cpu -mA6 -mARC600 -mA7 -mARC700
-mdpfp -mdpfp-compact -mdpfp-fast -mno-dpfp-lrsr
-mea -mno-mpy -mmul32x16 -mmul64 -matomic
-mnorm -mspfp -mspfp-compact -mspfp-fast -msimd -msoft-float -mswap
-mcrc -mdsp-packa -mdvbf -mlock -mmac-d16 -mmac-24 -mrtsc -mswape
-mtelephony -mxy -misize -mannotate-align -marclinux -marclinux_prof
-mlong-calls -mmedium-calls -msdata
-mvolatile-cache -mtp-regno=regno
-malign-call -mauto-modify-reg -mbbit-peephole -mno-brcc
-mcase-vector-pcrel -mcompact-casesi -mno-cond-exec -mearly-cbranchsi
-mexpand-adddi -mindexed-loads -mlra -mlra-priority-none
-mlra-priority-compact mlra-priority-noncompact -mno-millicode
-mmixed-code -mq-class -mRcq -mRcw -msize-level=level
-mtune=cpu -mmultcost=num
-munalign-prob-threshold=probability -mmpy-option=multo
-mdiv-rem -mcode-density -mll64 -mfpu=fpu
ARM Options
-mapcs-frame -mno-apcs-frame
-mabi=name
-mapcs-stack-check -mno-apcs-stack-check
-mapcs-reentrant -mno-apcs-reentrant
-msched-prolog -mno-sched-prolog
-mlittle-endian -mbig-endian
-mfloat-abi=name
-mfp16-format=name -mthumb-interwork -mno-thumb-interwork
-mcpu=name -march=name -mfpu=name
-mtune=name -mprint-tune-info
-mstructure-size-boundary=n
-mabort-on-noreturn
-mlong-calls -mno-long-calls
-msingle-pic-base -mno-single-pic-base
-mpic-register=reg
-mnop-fun-dllimport
-mpoke-function-name
-mthumb -marm
-mtpcs-frame -mtpcs-leaf-frame
-mcaller-super-interworking -mcallee-super-interworking
-mtp=name -mtls-dialect=dialect
-mword-relocations
-mfix-cortex-m3-ldrd
-munaligned-access
-mneon-for-64bits
-mslow-flash-data
-masm-syntax-unified
-mrestrict-it
-mpure-code
-mcmse
18 Using the GNU Compiler Collection (GCC)
AVR Options
-mmcu=mcu -mabsdata -maccumulate-args
-mbranch-cost=cost
-mcall-prologues -mint8 -mn_flash=size -mno-interrupts
-mrelax -mrmw -mstrict-X -mtiny-stack -mfract-convert-truncate
-nodevicelib
-Waddr-space-convert -Wmisspelled-isr
Blackfin Options
-mcpu=cpu[-sirevision]
-msim -momit-leaf-frame-pointer -mno-omit-leaf-frame-pointer
-mspecld-anomaly -mno-specld-anomaly -mcsync-anomaly -mno-csync-anomaly
-mlow-64k -mno-low64k -mstack-check-l1 -mid-shared-library
-mno-id-shared-library -mshared-library-id=n
-mleaf-id-shared-library -mno-leaf-id-shared-library
-msep-data -mno-sep-data -mlong-calls -mno-long-calls
-mfast-fp -minline-plt -mmulticore -mcorea -mcoreb -msdram
-micplb
C6X Options
-mbig-endian -mlittle-endian -march=cpu
-msim -msdata=sdata-type
CRIS Options
-mcpu=cpu -march=cpu -mtune=cpu
-mmax-stack-frame=n -melinux-stacksize=n
-metrax4 -metrax100 -mpdebug -mcc-init -mno-side-effects
-mstack-align -mdata-align -mconst-align
-m32-bit -m16-bit -m8-bit -mno-prologue-epilogue -mno-gotplt
-melf -maout -melinux -mlinux -sim -sim2
-mmul-bug-workaround -mno-mul-bug-workaround
CR16 Options
-mmac
-mcr16cplus -mcr16c
-msim -mint32 -mbit-ops -mdata-model=model
Darwin Options
-all_load -allowable_client -arch -arch_errors_fatal
-arch_only -bind_at_load -bundle -bundle_loader
-client_name -compatibility_version -current_version
-dead_strip
-dependency-file -dylib_file -dylinker_install_name
-dynamic -dynamiclib -exported_symbols_list
-filelist -flat_namespace -force_cpusubtype_ALL
-force_flat_namespace -headerpad_max_install_names
-iframework
-image_base -init -install_name -keep_private_externs
-multi_module -multiply_defined -multiply_defined_unused
-noall_load -no_dead_strip_inits_and_terms
-nofixprebinding -nomultidefs -noprebind -noseglinkedit
-pagezero_size -prebind -prebind_all_twolevel_modules
-private_bundle -read_only_relocs -sectalign
-sectobjectsymbols -whyload -seg1addr
-sectcreate -sectobjectsymbols -sectorder
-segaddr -segs_read_only_addr -segs_read_write_addr
-seg_addr_table -seg_addr_table_filename -seglinkedit
-segprot -segs_read_only_addr -segs_read_write_addr
-single_module -static -sub_library -sub_umbrella
Chapter 3: GCC Command Options 19
-mflush-func=func -mno-flush-func
-mbranch-cost=num -mbranch-likely -mno-branch-likely
-mcompact-branches=policy
-mfp-exceptions -mno-fp-exceptions
-mvr4130-align -mno-vr4130-align -msynci -mno-synci
-mlxc1-sxc1 -mno-lxc1-sxc1 -mmadd4 -mno-madd4
-mrelax-pic-calls -mno-relax-pic-calls -mmcount-ra-address
-mframe-header-opt -mno-frame-header-opt
MMIX Options
-mlibfuncs -mno-libfuncs -mepsilon -mno-epsilon -mabi=gnu
-mabi=mmixware -mzero-extend -mknuthdiv -mtoplevel-symbols
-melf -mbranch-predict -mno-branch-predict -mbase-addresses
-mno-base-addresses -msingle-exit -mno-single-exit
MN10300 Options
-mmult-bug -mno-mult-bug
-mno-am33 -mam33 -mam33-2 -mam34
-mtune=cpu-type
-mreturn-pointer-on-d0
-mno-crt0 -mrelax -mliw -msetlb
Moxie Options
-meb -mel -mmul.x -mno-crt0
MSP430 Options
-msim -masm-hex -mmcu= -mcpu= -mlarge -msmall -mrelax
-mwarn-mcu
-mcode-region= -mdata-region=
-msilicon-errata= -msilicon-errata-warn=
-mhwmult= -minrt
NDS32 Options
-mbig-endian -mlittle-endian
-mreduced-regs -mfull-regs
-mcmov -mno-cmov
-mperf-ext -mno-perf-ext
-mv3push -mno-v3push
-m16bit -mno-16bit
-misr-vector-size=num
-mcache-block-size=num
-march=arch
-mcmodel=code-model
-mctor-dtor -mrelax
Nios II Options
-G num -mgpopt=option -mgpopt -mno-gpopt
-mel -meb
-mno-bypass-cache -mbypass-cache
-mno-cache-volatile -mcache-volatile
-mno-fast-sw-div -mfast-sw-div
-mhw-mul -mno-hw-mul -mhw-mulx -mno-hw-mulx -mno-hw-div -mhw-div
-mcustom-insn=N -mno-custom-insn
-mcustom-fpu-cfg=name
-mhal -msmallc -msys-crt0=name -msys-lib=name
-march=arch -mbmx -mno-bmx -mcdx -mno-cdx
Nvidia PTX Options
-m32 -m64 -mmainkernel -moptimize
PDP-11 Options
Chapter 3: GCC Command Options 23
RL78 Options
-msim -mmul=none -mmul=g13 -mmul=g14 -mallregs
-mcpu=g10 -mcpu=g13 -mcpu=g14 -mg10 -mg13 -mg14
-m64bit-doubles -m32bit-doubles -msave-mduc-in-interrupts
RS/6000 and PowerPC Options
-mcpu=cpu-type
-mtune=cpu-type
-mcmodel=code-model
-mpowerpc64
-maltivec -mno-altivec
-mpowerpc-gpopt -mno-powerpc-gpopt
-mpowerpc-gfxopt -mno-powerpc-gfxopt
-mmfcrf -mno-mfcrf -mpopcntb -mno-popcntb -mpopcntd -mno-popcntd
-mfprnd -mno-fprnd
-mcmpb -mno-cmpb -mmfpgpr -mno-mfpgpr -mhard-dfp -mno-hard-dfp
-mfull-toc -mminimal-toc -mno-fp-in-toc -mno-sum-in-toc
-m64 -m32 -mxl-compat -mno-xl-compat -mpe
-malign-power -malign-natural
-msoft-float -mhard-float -mmultiple -mno-multiple
-msingle-float -mdouble-float -msimple-fpu
-mstring -mno-string -mupdate -mno-update
-mavoid-indexed-addresses -mno-avoid-indexed-addresses
-mfused-madd -mno-fused-madd -mbit-align -mno-bit-align
-mstrict-align -mno-strict-align -mrelocatable
-mno-relocatable -mrelocatable-lib -mno-relocatable-lib
-mtoc -mno-toc -mlittle -mlittle-endian -mbig -mbig-endian
-mdynamic-no-pic -maltivec -mswdiv -msingle-pic-base
-mprioritize-restricted-insns=priority
-msched-costly-dep=dependence_type
-minsert-sched-nops=scheme
-mcall-sysv -mcall-netbsd
24 Using the GNU Compiler Collection (GCC)
-maix-struct-return -msvr4-struct-return
-mabi=abi-type -msecure-plt -mbss-plt
-mblock-move-inline-limit=num
-misel -mno-isel
-misel=yes -misel=no
-mspe -mno-spe
-mspe=yes -mspe=no
-mpaired
-mgen-cell-microcode -mwarn-cell-microcode
-mvrsave -mno-vrsave
-mmulhw -mno-mulhw
-mdlmzb -mno-dlmzb
-mfloat-gprs=yes -mfloat-gprs=no -mfloat-gprs=single -mfloat-gprs=double
-mprototype -mno-prototype
-msim -mmvme -mads -myellowknife -memb -msdata
-msdata=opt -mreadonly-in-sdata -mvxworks -G num
-mrecip -mrecip=opt -mno-recip -mrecip-precision
-mno-recip-precision
-mveclibabi=type -mfriz -mno-friz
-mpointers-to-nested-functions -mno-pointers-to-nested-functions
-msave-toc-indirect -mno-save-toc-indirect
-mpower8-fusion -mno-mpower8-fusion -mpower8-vector -mno-power8-vector
-mcrypto -mno-crypto -mhtm -mno-htm -mdirect-move -mno-direct-move
-mquad-memory -mno-quad-memory
-mquad-memory-atomic -mno-quad-memory-atomic
-mcompat-align-parm -mno-compat-align-parm
-mupper-regs-df -mno-upper-regs-df -mupper-regs-sf -mno-upper-regs-sf
-mupper-regs-di -mno-upper-regs-di
-mupper-regs -mno-upper-regs
-mfloat128 -mno-float128 -mfloat128-hardware -mno-float128-hardware
-mgnu-attribute -mno-gnu-attribute
-mstack-protector-guard=guard -mstack-protector-guard-reg=reg
-mstack-protector-guard-offset=offset
-mlra -mno-lra
RX Options
-m64bit-doubles -m32bit-doubles -fpu -nofpu
-mcpu=
-mbig-endian-data -mlittle-endian-data
-msmall-data
-msim -mno-sim
-mas100-syntax -mno-as100-syntax
-mrelax
-mmax-constant-size=
-mint-register=
-mpid
-mallow-string-insns -mno-allow-string-insns
-mjsr
-mno-warn-multiple-fast-interrupts
-msave-acc-in-interrupts
S/390 and zSeries Options
-mtune=cpu-type -march=cpu-type
-mhard-float -msoft-float -mhard-dfp -mno-hard-dfp
-mlong-double-64 -mlong-double-128
-mbackchain -mno-backchain -mpacked-stack -mno-packed-stack
-msmall-exec -mno-small-exec -mmvcle -mno-mvcle
-m64 -m31 -mdebug -mno-debug -mesa -mzarch
-mhtm -mvx -mzvector
Chapter 3: GCC Command Options 25
-mea32 -mea64
-maddress-space-conversion -mno-address-space-conversion
-mcache-size=cache-size
-matomic-updates -mno-atomic-updates
System V Options
-Qy -Qn -YP,paths -Ym,dir
TILE-Gx Options
-mcpu=CPU -m32 -m64 -mbig-endian -mlittle-endian
-mcmodel=code-model
TILEPro Options
-mcpu=cpu -m32
V850 Options
-mlong-calls -mno-long-calls -mep -mno-ep
-mprolog-function -mno-prolog-function -mspace
-mtda=n -msda=n -mzda=n
-mapp-regs -mno-app-regs
-mdisable-callt -mno-disable-callt
-mv850e2v3 -mv850e2 -mv850e1 -mv850es
-mv850e -mv850 -mv850e3v5
-mloop
-mrelax
-mlong-jumps
-msoft-float
-mhard-float
-mgcc-abi
-mrh850-abi
-mbig-switch
VAX Options
-mg -mgnu -munix
Visium Options
-mdebug -msim -mfpu -mno-fpu -mhard-float -msoft-float
-mcpu=cpu-type -mtune=cpu-type -msv-mode -muser-mode
VMS Options
-mvms-return-codes -mdebug-main=prefix -mmalloc64
-mpointer-size=size
VxWorks Options
-mrtp -non-static -Bstatic -Bdynamic
-Xbind-lazy -Xbind-now
x86 Options
-mtune=cpu-type -march=cpu-type
-mtune-ctrl=feature-list -mdump-tune-features -mno-default
-mfpmath=unit
-masm=dialect -mno-fancy-math-387
-mno-fp-ret-in-387 -m80387 -mhard-float -msoft-float
-mno-wide-multiply -mrtd -malign-double
-mpreferred-stack-boundary=num
-mincoming-stack-boundary=num
-mcld -mcx16 -msahf -mmovbe -mcrc32
-mrecip -mrecip=opt
-mvzeroupper -mprefer-avx128
-mmmx -msse -msse2 -msse3 -mssse3 -msse4.1 -msse4.2 -msse4 -mavx
Chapter 3: GCC Command Options 27
file.m Objective-C source code. Note that you must link with the ‘libobjc’ library
to make an Objective-C program work.
file.mi Objective-C source code that should not be preprocessed.
file.mm
file.M Objective-C++ source code. Note that you must link with the ‘libobjc’ library
to make an Objective-C++ program work. Note that ‘.M’ refers to a literal
capital M.
file.mii Objective-C++ source code that should not be preprocessed.
file.h C, C++, Objective-C or Objective-C++ header file to be turned into a precom-
piled header (default), or C, C++ header file to be turned into an Ada spec (via
the ‘-fdump-ada-spec’ switch).
file.cc
file.cp
file.cxx
file.cpp
file.CPP
file.c++
file.C C++ source code that must be preprocessed. Note that in ‘.cxx’, the last two
letters must both be literally ‘x’. Likewise, ‘.C’ refers to a literal capital C.
file.mm
file.M Objective-C++ source code that must be preprocessed.
file.mii Objective-C++ source code that should not be preprocessed.
file.hh
file.H
file.hp
file.hxx
file.hpp
file.HPP
file.h++
file.tcc C++ header file to be turned into a precompiled header or Ada spec.
file.f
file.for
file.ftn Fixed form Fortran source code that should not be preprocessed.
file.F
file.FOR
file.fpp
file.FPP
file.FTN Fixed form Fortran source code that must be preprocessed (with the traditional
preprocessor).
file.f90
file.f95
file.f03
file.f08 Free form Fortran source code that should not be preprocessed.
Chapter 3: GCC Command Options 29
file.F90
file.F95
file.F03
file.F08 Free form Fortran source code that must be preprocessed (with the traditional
preprocessor).
file.go Go source code.
file.brig
BRIG files (binary representation of HSAIL).
file.ads Ada source code file that contains a library unit declaration (a declaration of a
package, subprogram, or generic, or a generic instantiation), or a library unit
renaming declaration (a package, generic, or subprogram renaming declaration).
Such files are also called specs.
file.adb Ada source code file containing a library unit body (a subprogram or package
body). Such files are also called bodies.
file.s Assembler code.
file.S
file.sx Assembler code that must be preprocessed.
other An object file to be fed straight into linking. Any file name with no recognized
suffix is treated this way.
You can specify the input language explicitly with the ‘-x’ option:
-x language
Specify explicitly the language for the following input files (rather than letting
the compiler choose a default based on the file name suffix). This option applies
to all following input files until the next ‘-x’ option. Possible values for language
are:
c c-header cpp-output
c++ c++-header c++-cpp-output
objective-c objective-c-header objective-c-cpp-output
objective-c++ objective-c++-header objective-c++-cpp-output
assembler assembler-with-cpp
ada
f77 f77-cpp-input f95 f95-cpp-input
go
brig
-x none Turn off any specification of a language, so that subsequent files are handled
according to their file name suffixes (as they are if ‘-x’ has not been used at
all).
If you only want some of the stages of compilation, you can use ‘-x’ (or filename suffixes)
to tell gcc where to start, and one of the options ‘-c’, ‘-S’, or ‘-E’ to say where gcc is to
stop. Note that some combinations (for example, ‘-x cpp-output -E’) instruct gcc to do
nothing at all.
-c Compile or assemble the source files, but do not link. The linking stage simply
is not done. The ultimate output is in the form of an object file for each source
file.
30 Using the GNU Compiler Collection (GCC)
By default, the object file name for a source file is made by replacing the suffix
‘.c’, ‘.i’, ‘.s’, etc., with ‘.o’.
Unrecognized input files, not requiring compilation or assembly, are ignored.
-S Stop after the stage of compilation proper; do not assemble. The output is in
the form of an assembler code file for each non-assembler input file specified.
By default, the assembler file name for a source file is made by replacing the
suffix ‘.c’, ‘.i’, etc., with ‘.s’.
Input files that don’t require compilation are ignored.
-E Stop after the preprocessing stage; do not run the compiler proper. The output
is in the form of preprocessed source code, which is sent to the standard output.
Input files that don’t require preprocessing are ignored.
-o file Place output in file file. This applies to whatever sort of output is being pro-
duced, whether it be an executable file, an object file, an assembler file or
preprocessed C code.
If ‘-o’ is not specified, the default is to put an executable file in ‘a.out’, the
object file for ‘source.suffix’ in ‘source.o’, its assembler file in ‘source.s’, a
precompiled header file in ‘source.suffix.gch’, and all preprocessed C source
on standard output.
-v Print (on standard error output) the commands executed to run the stages of
compilation. Also print the version number of the compiler driver program and
of the preprocessor and the compiler proper.
-### Like ‘-v’ except the commands are not executed and arguments are quoted
unless they contain only alphanumeric characters or ./-_. This is useful for
shell scripts to capture the driver-generated command lines.
--help Print (on the standard output) a description of the command-line options under-
stood by gcc. If the ‘-v’ option is also specified then ‘--help’ is also passed on
to the various processes invoked by gcc, so that they can display the command-
line options they accept. If the ‘-Wextra’ option has also been specified (prior to
the ‘--help’ option), then command-line options that have no documentation
associated with them are also displayed.
--target-help
Print (on the standard output) a description of target-specific command-line
options for each tool. For some targets extra target-specific information may
also be printed.
--help={class|[^]qualifier}[,...]
Print (on the standard output) a description of the command-line options un-
derstood by the compiler that fit into all specified classes and qualifiers. These
are the supported classes:
‘optimizers’
Display all of the optimization options supported by the compiler.
‘warnings’
Display all of the options controlling warning messages produced
by the compiler.
Chapter 3: GCC Command Options 31
--version
Display the version number and copyrights of the invoked GCC.
-pass-exit-codes
Normally the gcc program exits with the code of 1 if any phase of the compiler
returns a non-success return code. If you specify ‘-pass-exit-codes’, the gcc
program instead returns with the numerically highest error produced by any
phase returning an error indication. The C, C++, and Fortran front ends return
4 if an internal compiler error is encountered.
-pipe Use pipes rather than temporary files for communication between the various
stages of compilation. This fails to work on some systems where the assembler
is unable to read from a pipe; but the GNU assembler has no trouble.
-specs=file
Process file after the compiler reads in the standard ‘specs’ file, in order to
override the defaults which the gcc driver program uses when determining what
switches to pass to cc1, cc1plus, as, ld, etc. More than one ‘-specs=file’
can be specified on the command line, and they are processed in order, from
left to right. See Section 3.19 [Spec Files], page 382, for information about the
format of the file.
-wrapper Invoke all subcommands under a wrapper program. The name of the wrapper
program and its parameters are passed as a comma separated list.
gcc -c t.c -wrapper gdb,--args
This invokes all subprograms of gcc under ‘gdb --args’, thus the invocation of
cc1 is ‘gdb --args cc1 ...’.
-fplugin=name.so
Load the plugin code in file name.so, assumed to be a shared object to
be dlopen’d by the compiler. The base name of the shared object file
is used to identify the plugin for the purposes of argument parsing (See
‘-fplugin-arg-name-key=value’ below). Each plugin should define the
callback functions specified in the Plugins API.
-fplugin-arg-name-key=value
Define an argument called key with a value of value for the plugin called name.
-fdump-ada-spec[-slim]
For C and C++ source and include files, generate corresponding Ada specs. See
Section “Generating Ada Bindings for C and C++ headers” in GNAT User’s
Guide, which provides detailed documentation on this feature.
Chapter 3: GCC Command Options 33
-fada-spec-parent=unit
In conjunction with ‘-fdump-ada-spec[-slim]’ above, generate Ada specs as
child units of parent unit.
-fdump-go-spec=file
For input files in any language, generate corresponding Go declarations in file.
This generates Go const, type, var, and func declarations which may be
a useful way to start writing a Go interface to code written in some other
language.
@file Read command-line options from file. The options read are inserted in place
of the original @file option. If file does not exist, or cannot be read, then the
option will be treated literally, and not removed.
Options in file are separated by whitespace. A whitespace character may be
included in an option by surrounding the entire option in either single or double
quotes. Any character (including a backslash) may be included by prefixing the
character to be included with a backslash. The file may itself contain additional
@file options; any such options will be processed recursively.
and rarely used ISO trigraph feature. For the C compiler, it disables recognition
of C++ style ‘//’ comments as well as the inline keyword.
The alternate keywords __asm__, __extension__, __inline__ and __typeof_
_ continue to work despite ‘-ansi’. You would not want to use them in an ISO
C program, of course, but it is useful to put them in header files that might be
included in compilations done with ‘-ansi’. Alternate predefined macros such
as __unix__ and __vax__ are also available, with or without ‘-ansi’.
The ‘-ansi’ option does not cause non-ISO programs to be rejected
gratuitously. For that, ‘-Wpedantic’ is required in addition to ‘-ansi’. See
Section 3.8 [Warning Options], page 59.
The macro __STRICT_ANSI__ is predefined when the ‘-ansi’ option is used.
Some header files may notice this macro and refrain from declaring certain
functions or defining certain macros that the ISO standard doesn’t call for; this
is to avoid interfering with any programs that might use these names for other
things.
Functions that are normally built in but do not have semantics defined by ISO
C (such as alloca and ffs) are not built-in functions when ‘-ansi’ is used. See
Section 6.59 [Other built-in functions provided by GCC], page 572, for details
of the functions affected.
-std= Determine the language standard. See Chapter 2 [Language Standards Sup-
ported by GCC], page 5, for details of these standard versions. This option is
currently only supported when compiling C or C++.
The compiler can accept several base standards, such as ‘c90’ or ‘c++98’, and
GNU dialects of those standards, such as ‘gnu90’ or ‘gnu++98’. When a base
standard is specified, the compiler accepts all programs following that stan-
dard plus those using GNU extensions that do not contradict it. For example,
‘-std=c90’ turns off certain features of GCC that are incompatible with ISO
C90, such as the asm and typeof keywords, but not other GNU extensions that
do not have a meaning in ISO C90, such as omitting the middle term of a ?:
expression. On the other hand, when a GNU dialect of a standard is specified,
all features supported by the compiler are enabled, even when those features
change the meaning of the base standard. As a result, some strict-conforming
programs may be rejected. The particular standard is used by ‘-Wpedantic’ to
identify which features are GNU extensions given that version of the standard.
For example ‘-std=gnu90 -Wpedantic’ warns about C++ style ‘//’ comments,
while ‘-std=gnu99 -Wpedantic’ does not.
A value for this option must be provided; possible values are
‘c90’
‘c89’
‘iso9899:1990’
Support all ISO C90 programs (certain GNU extensions that con-
flict with ISO C90 are disabled). Same as ‘-ansi’ for C code.
‘iso9899:199409’
ISO C90 as modified in amendment 1.
Chapter 3: GCC Command Options 35
‘c99’
‘c9x’
‘iso9899:1999’
‘iso9899:199x’
ISO C99. This standard is substantially completely supported,
modulo bugs and floating-point issues (mainly but not entirely
relating to optional C99 features from Annexes F and G). See
http://gcc.gnu.org/c99status.html for more information. The
names ‘c9x’ and ‘iso9899:199x’ are deprecated.
‘c11’
‘c1x’
‘iso9899:2011’
ISO C11, the 2011 revision of the ISO C standard. This standard is
substantially completely supported, modulo bugs, floating-point is-
sues (mainly but not entirely relating to optional C11 features from
Annexes F and G) and the optional Annexes K (Bounds-checking
interfaces) and L (Analyzability). The name ‘c1x’ is deprecated.
‘gnu90’
‘gnu89’ GNU dialect of ISO C90 (including some C99 features).
‘gnu99’
‘gnu9x’ GNU dialect of ISO C99. The name ‘gnu9x’ is deprecated.
‘gnu11’
‘gnu1x’ GNU dialect of ISO C11. This is the default for C code. The name
‘gnu1x’ is deprecated.
‘c++98’
‘c++03’ The 1998 ISO C++ standard plus the 2003 technical corrigendum
and some additional defect reports. Same as ‘-ansi’ for C++ code.
‘gnu++98’
‘gnu++03’ GNU dialect of ‘-std=c++98’.
‘c++11’
‘c++0x’ The 2011 ISO C++ standard plus amendments. The name ‘c++0x’
is deprecated.
‘gnu++11’
‘gnu++0x’ GNU dialect of ‘-std=c++11’. The name ‘gnu++0x’ is deprecated.
‘c++14’
‘c++1y’ The 2014 ISO C++ standard plus amendments. The name ‘c++1y’
is deprecated.
‘gnu++14’
‘gnu++1y’ GNU dialect of ‘-std=c++14’. This is the default for C++ code.
The name ‘gnu++1y’ is deprecated.
‘c++1z’ The next revision of the ISO C++ standard, tentatively planned
for 2017. Support is highly experimental, and will almost certainly
change in incompatible ways in future releases.
36 Using the GNU Compiler Collection (GCC)
-fgnu89-inline
The option ‘-fgnu89-inline’ tells GCC to use the traditional GNU semantics
for inline functions when in C99 mode. See Section 6.43 [An Inline Func-
tion is As Fast As a Macro], page 499. Using this option is roughly equiva-
lent to adding the gnu_inline function attribute to all inline functions (see
Section 6.31 [Function Attributes], page 429).
The option ‘-fno-gnu89-inline’ explicitly tells GCC to use the C99 semantics
for inline when in C99 or gnu99 mode (i.e., it specifies the default behavior).
This option is not supported in ‘-std=c90’ or ‘-std=gnu90’ mode.
The preprocessor macros __GNUC_GNU_INLINE__ and __GNUC_STDC_INLINE__
may be used to check which semantics are in effect for inline functions. See
Section “Common Predefined Macros” in The C Preprocessor.
-fpermitted-flt-eval-methods=style
ISO/IEC TS 18661-3 defines new permissible values for FLT_EVAL_METHOD that
indicate that operations and constants with a semantic type that is an inter-
change or extended format should be evaluated to the precision and range of
that type. These new values are a superset of those permitted under C99/C11,
which does not specify the meaning of other positive values of FLT_EVAL_
METHOD. As such, code conforming to C11 may not have been written expecting
the possibility of the new values.
‘-fpermitted-flt-eval-methods’ specifies whether the compiler should allow
only the values of FLT_EVAL_METHOD specified in C99/C11, or the extended set
of values specified in ISO/IEC TS 18661-3.
style is either c11 or ts-18661-3 as appropriate.
The default when in a standards compliant mode (‘-std=c11’ or similar) is
‘-fpermitted-flt-eval-methods=c11’. The default when in a GNU dialect
(‘-std=gnu11’ or similar) is ‘-fpermitted-flt-eval-methods=ts-18661-3’.
-aux-info filename
Output to the given filename prototyped declarations for all functions declared
and/or defined in a translation unit, including those in header files. This option
is silently ignored in any language other than C.
Besides declarations, the file indicates, in comments, the origin of each declara-
tion (source file and line), whether the declaration was implicit, prototyped or
unprototyped (‘I’, ‘N’ for new or ‘O’ for old, respectively, in the first character
after the line number and the colon), and whether it came from a declaration
or a definition (‘C’ or ‘F’, respectively, in the following character). In the case
of function definitions, a K&R-style list of arguments followed by their decla-
rations is also provided, inside comments, after the declaration.
-fallow-parameterless-variadic-functions
Accept variadic functions without named parameters.
Chapter 3: GCC Command Options 37
-fgimple
Enable parsing of function definitions marked with __GIMPLE. This is an ex-
perimental feature that allows unit testing of GIMPLE passes.
-fhosted
Assert that compilation targets a hosted environment. This implies
‘-fbuiltin’. A hosted environment is one in which the entire standard library
38 Using the GNU Compiler Collection (GCC)
is available, and in which main has a return type of int. Examples are nearly
everything except a kernel. This is equivalent to ‘-fno-freestanding’.
-ffreestanding
Assert that compilation targets a freestanding environment. This implies
‘-fno-builtin’. A freestanding environment is one in which the standard
library may not exist, and program startup may not necessarily be at
main. The most obvious example is an OS kernel. This is equivalent to
‘-fno-hosted’.
See Chapter 2 [Language Standards Supported by GCC], page 5, for details of
freestanding and hosted environments.
-fopenacc
Enable handling of OpenACC directives #pragma acc in C/C++ and !$acc
in Fortran. When ‘-fopenacc’ is specified, the compiler generates acceler-
ated code according to the OpenACC Application Programming Interface v2.0
http://www.openacc.org/. This option implies ‘-pthread’, and thus is only
supported on targets that have support for ‘-pthread’.
-fopenacc-dim=geom
Specify default compute dimensions for parallel offload regions that do not
explicitly specify. The geom value is a triple of ’:’-separated sizes, in order
’gang’, ’worker’ and, ’vector’. A size can be omitted, to use a target-specific
default value.
-fopenmp Enable handling of OpenMP directives #pragma omp in C/C++ and !$omp
in Fortran. When ‘-fopenmp’ is specified, the compiler generates parallel
code according to the OpenMP Application Program Interface v4.5
http://www.openmp.org/. This option implies ‘-pthread’, and thus is only
supported on targets that have support for ‘-pthread’. ‘-fopenmp’ implies
‘-fopenmp-simd’.
-fopenmp-simd
Enable handling of OpenMP’s SIMD directives with #pragma omp in C/C++
and !$omp in Fortran. Other OpenMP directives are ignored.
-fcilkplus
Enable the usage of Cilk Plus language extension features for C/C++. When the
option ‘-fcilkplus’ is specified, enable the usage of the Cilk Plus Language
extension features for C/C++. The present implementation follows ABI version
1.2. This is an experimental feature that is only partially complete, and whose
interface may change in future versions of GCC as the official specification
changes. Currently, all features but _Cilk_for have been implemented.
-fgnu-tm When the option ‘-fgnu-tm’ is specified, the compiler generates code for the
Linux variant of Intel’s current Transactional Memory ABI specification doc-
ument (Revision 1.1, May 6 2009). This is an experimental feature whose
interface may change in future versions of GCC, as the official specification
changes. Please note that not all architectures are supported for this feature.
Chapter 3: GCC Command Options 39
For more information on GCC’s support for transactional memory, See Section
“The GNU Transactional Memory Library” in GNU Transactional Memory
Library.
Note that the transactional memory feature is not supported with non-call
exceptions (‘-fnon-call-exceptions’).
-fms-extensions
Accept some non-standard constructs used in Microsoft header files.
In C++ code, this allows member names in structures to be similar to previous
types declarations.
typedef int UOW;
struct ABC {
UOW UOW;
};
Some cases of unnamed fields in structures and unions are only accepted
with this option. See Section 6.63 [Unnamed struct/union fields within
structs/unions], page 731, for details.
Note that this option is off for all targets but x86 targets using ms-abi.
-fplan9-extensions
Accept some non-standard constructs used in Plan 9 code.
This enables ‘-fms-extensions’, permits passing pointers to structures with
anonymous fields to functions that expect pointers to elements of the type of
the field, and permits referring to anonymous fields declared using a typedef.
See Section 6.63 [Unnamed struct/union fields within structs/unions], page 731,
for details. This is only supported for C, not C++.
-fcond-mismatch
Allow conditional expressions with mismatched types in the second and third
arguments. The value of such an expression is void. This option is not supported
for C++.
-flax-vector-conversions
Allow implicit conversions between vectors with differing numbers of elements
and/or incompatible element types. This option should not be used for new
code.
-funsigned-char
Let the type char be unsigned, like unsigned char.
Each kind of machine has a default for what char should be. It is either like
unsigned char by default or like signed char by default.
Ideally, a portable program should always use signed char or unsigned char
when it depends on the signedness of an object. But many programs have been
written to use plain char and expect it to be signed, or expect it to be unsigned,
depending on the machines they were written for. This option, and its inverse,
let you make such a program work with the opposite default.
The type char is always a distinct type from each of signed char or unsigned
char, even though its behavior is always just like one of those two.
40 Using the GNU Compiler Collection (GCC)
-fsigned-char
Let the type char be signed, like signed char.
Note that this is equivalent to ‘-fno-unsigned-char’, which is the negative
form of ‘-funsigned-char’. Likewise, the option ‘-fno-signed-char’ is equiv-
alent to ‘-funsigned-char’.
-fsigned-bitfields
-funsigned-bitfields
-fno-signed-bitfields
-fno-unsigned-bitfields
These options control whether a bit-field is signed or unsigned, when the dec-
laration does not use either signed or unsigned. By default, such a bit-field is
signed, because this is consistent: the basic integer types such as int are signed
types.
-fsso-struct=endianness
Set the default scalar storage order of structures and unions to the specified en-
dianness. The accepted values are ‘big-endian’, ‘little-endian’ and ‘native’
for the native endianness of the target (the default). This option is not sup-
ported for C++.
Warning: the ‘-fsso-struct’ switch causes GCC to generate code that is not
binary compatible with code generated without it if the specified endianness is
not the native endianness of the target.
the C++ standard specifies that operator new only returns 0 if it is declared
throw(), in which case the compiler always checks the return value even without
this option. In all other cases, when operator new has a non-empty exception
specification, memory exhaustion is signalled by throwing std::bad_alloc.
See also ‘new (nothrow)’.
-fconcepts
Enable support for the C++ Extensions for Concepts Technical Specification,
ISO 19217 (2015), which allows code like
template <class T> concept bool Addable = requires (T t) { t + t; };
template <Addable T> T add (T a, T b) { return a + b; }
-fconstexpr-depth=n
Set the maximum nested evaluation depth for C++11 constexpr functions to
n. A limit is needed to detect endless recursion during constant expression
evaluation. The minimum specified by the standard is 512.
-fconstexpr-loop-limit=n
Set the maximum number of iterations for a loop in C++14 constexpr functions
to n. A limit is needed to detect infinite loops during constant expression
evaluation. The default is 262144 (1<<18).
-fdeduce-init-list
Enable deduction of a template type parameter as std::initializer_list
from a brace-enclosed initializer list, i.e.
template <class T> auto forward(T t) -> decltype (realfn (t))
{
return realfn (t);
}
void f()
{
forward({1,2}); // call forward<std::initializer_list<int>>
}
This deduction was implemented as a possible extension to the originally pro-
posed semantics for the C++11 standard, but was not part of the final standard,
so it is disabled by default. This option is deprecated, and may be removed in
a future version of G++.
-ffriend-injection
Inject friend functions into the enclosing namespace, so that they are visible
outside the scope of the class in which they are declared. Friend functions were
documented to work this way in the old Annotated C++ Reference Manual.
However, in ISO C++ a friend function that is not declared in an enclosing
scope can only be found using argument dependent lookup. GCC defaults to
the standard behavior.
This option is for compatibility, and may be removed in a future release of G++.
-fno-elide-constructors
The C++ standard allows an implementation to omit creating a temporary that
is only used to initialize another object of the same type. Specifying this option
disables that optimization, and forces G++ to call the copy constructor in all
Chapter 3: GCC Command Options 43
cases. This option also causes G++ to call trivial member functions which
otherwise would be expanded inline.
In C++17, the compiler is required to omit these temporaries, but this option
still affects trivial member functions.
-fno-enforce-eh-specs
Don’t generate code to check for violation of exception specifications at run
time. This option violates the C++ standard, but may be useful for reducing
code size in production builds, much like defining NDEBUG. This does not give
user code permission to throw exceptions in violation of the exception specifi-
cations; the compiler still optimizes based on the specifications, so throwing an
unexpected exception results in undefined behavior at run time.
-fextern-tls-init
-fno-extern-tls-init
The C++11 and OpenMP standards allow thread_local and threadprivate
variables to have dynamic (runtime) initialization. To support this, any use of
such a variable goes through a wrapper function that performs any necessary
initialization. When the use and definition of the variable are in the same
translation unit, this overhead can be optimized away, but when the use is in a
different translation unit there is significant overhead even if the variable doesn’t
actually need dynamic initialization. If the programmer can be sure that no
use of the variable in a non-defining TU needs to trigger dynamic initialization
(either because the variable is statically initialized, or a use of the variable in
the defining TU will be executed before any uses in another TU), they can avoid
this overhead with the ‘-fno-extern-tls-init’ option.
On targets that support symbol aliases, the default is ‘-fextern-tls-init’.
On targets that do not support symbol aliases, the default is
‘-fno-extern-tls-init’.
-ffor-scope
-fno-for-scope
If ‘-ffor-scope’ is specified, the scope of variables declared in a for-init-
statement is limited to the for loop itself, as specified by the C++ standard.
If ‘-fno-for-scope’ is specified, the scope of variables declared in a for-init-
statement extends to the end of the enclosing scope, as was the case in old
versions of G++, and other (traditional) implementations of C++.
If neither flag is given, the default is to follow the standard, but to allow and give
a warning for old-style code that would otherwise be invalid, or have different
behavior.
-fno-gnu-keywords
Do not recognize typeof as a keyword, so that code can use this word as an
identifier. You can use the keyword __typeof__ instead. This option is implied
by the strict ISO C++ dialects: ‘-ansi’, ‘-std=c++98’, ‘-std=c++11’, etc.
-fno-implicit-templates
Never emit code for non-inline templates that are instantiated implicitly (i.e.
by use); only emit code for explicit instantiations. See Section 7.5 [Template
Instantiation], page 740, for more information.
44 Using the GNU Compiler Collection (GCC)
-fno-implicit-inline-templates
Don’t emit code for implicit instantiations of inline templates, either. The
default is to handle inlines differently so that compiles with and without opti-
mization need the same set of explicit instantiations.
-fno-implement-inlines
To save space, do not emit out-of-line copies of inline functions controlled by
#pragma implementation. This causes linker errors if these functions are not
inlined everywhere they are called.
-fms-extensions
Disable Wpedantic warnings about constructs used in MFC, such as implicit
int and getting a pointer to member function via non-standard syntax.
-fnew-inheriting-ctors
Enable the P0136 adjustment to the semantics of C++11 constructor inheri-
tance. This is part of C++17 but also considered to be a Defect Report against
C++11 and C++14. This flag is enabled by default unless ‘-fabi-version=10’
or lower is specified.
-fnew-ttp-matching
Enable the P0522 resolution to Core issue 150, template template parameters
and default arguments: this allows a template with default template arguments
as an argument for a template template parameter with fewer template param-
eters. This flag is enabled by default for ‘-std=c++1z’.
-fno-nonansi-builtins
Disable built-in declarations of functions that are not mandated by ANSI/ISO
C. These include ffs, alloca, _exit, index, bzero, conjf, and other related
functions.
-fnothrow-opt
Treat a throw() exception specification as if it were a noexcept specification to
reduce or eliminate the text size overhead relative to a function with no excep-
tion specification. If the function has local variables of types with non-trivial
destructors, the exception specification actually makes the function smaller be-
cause the EH cleanups for those variables can be optimized away. The semantic
effect is that an exception thrown out of a function with such an exception spec-
ification results in a call to terminate rather than unexpected.
-fno-operator-names
Do not treat the operator name keywords and, bitand, bitor, compl, not, or
and xor as synonyms as keywords.
-fno-optional-diags
Disable diagnostics that the standard says a compiler does not need to issue.
Currently, the only such diagnostic issued by G++ is the one for a name having
multiple meanings within a class.
-fpermissive
Downgrade some diagnostics about nonconformant code from errors to warn-
ings. Thus, using ‘-fpermissive’ allows some nonconforming code to compile.
Chapter 3: GCC Command Options 45
-fno-pretty-templates
When an error message refers to a specialization of a function template, the com-
piler normally prints the signature of the template followed by the template ar-
guments and any typedefs or typenames in the signature (e.g. void f(T) [with
T = int] rather than void f(int)) so that it’s clear which template is involved.
When an error message refers to a specialization of a class template, the com-
piler omits any template arguments that match the default template arguments
for that template. If either of these behaviors make it harder to understand
the error message rather than easier, you can use ‘-fno-pretty-templates’ to
disable them.
-frepo Enable automatic template instantiation at link time. This option also im-
plies ‘-fno-implicit-templates’. See Section 7.5 [Template Instantiation],
page 740, for more information.
-fno-rtti
Disable generation of information about every class with virtual functions
for use by the C++ run-time type identification features (dynamic_cast and
typeid). If you don’t use those parts of the language, you can save some space
by using this flag. Note that exception handling uses the same information,
but G++ generates it as needed. The dynamic_cast operator can still be used
for casts that do not require run-time type information, i.e. casts to void * or
to unambiguous base classes.
-fsized-deallocation
Enable the built-in global declarations
void operator delete (void *, std::size_t) noexcept;
void operator delete[] (void *, std::size_t) noexcept;
-fstrict-enums
Allow the compiler to optimize using the assumption that a value of enumerated
type can only be one of the values of the enumeration (as defined in the C++
standard; basically, a value that can be represented in the minimum number
of bits needed to represent all the enumerators). This assumption may not be
valid if the program uses a cast to convert an arbitrary integer value to the
enumerated type.
-fstrong-eval-order
Evaluate member access, array subscripting, and shift expressions in left-to-
right order, and evaluate assignment in right-to-left order, as adopted for C++17.
Enabled by default with ‘-std=c++1z’. ‘-fstrong-eval-order=some’ enables
just the ordering of member access and shift expressions, and is the default
without ‘-std=c++1z’.
46 Using the GNU Compiler Collection (GCC)
-ftemplate-backtrace-limit=n
Set the maximum number of template instantiation notes for a single warning
or error to n. The default value is 10.
-ftemplate-depth=n
Set the maximum instantiation depth for template classes to n. A limit on
the template instantiation depth is needed to detect endless recursions during
template class instantiation. ANSI/ISO C++ conforming programs must not
rely on a maximum depth greater than 17 (changed to 1024 in C++11). The
default value is 900, as the compiler can run out of stack space before hitting
1024 in some situations.
-fno-threadsafe-statics
Do not emit the extra code to use the routines specified in the C++ ABI for
thread-safe initialization of local statics. You can use this option to reduce code
size slightly in code that doesn’t need to be thread-safe.
-fuse-cxa-atexit
Register destructors for objects with static storage duration with the __cxa_
atexit function rather than the atexit function. This option is required for
fully standards-compliant handling of static destructors, but only works if your
C library supports __cxa_atexit.
-fno-use-cxa-get-exception-ptr
Don’t use the __cxa_get_exception_ptr runtime routine. This causes
std::uncaught_exception to be incorrect, but is necessary if the runtime
routine is not available.
-fvisibility-inlines-hidden
This switch declares that the user does not attempt to compare pointers to
inline functions or methods where the addresses of the two functions are taken
in different shared objects.
The effect of this is that GCC may, effectively, mark inline methods with __
attribute__ ((visibility ("hidden"))) so that they do not appear in the
export table of a DSO and do not require a PLT indirection when used within
the DSO. Enabling this option can have a dramatic effect on load and link
times of a DSO as it massively reduces the size of the dynamic export table
when the library makes heavy use of templates.
The behavior of this switch is not quite the same as marking the methods as
hidden directly, because it does not affect static variables local to the function
or cause the compiler to deduce that the function is defined in only one shared
object.
You may mark a method as having a visibility explicitly to negate the effect of
the switch for that method. For example, if you do want to compare pointers
to a particular inline method, you might mark it as having default visibility.
Marking the enclosing class with explicit visibility has no effect.
Explicitly instantiated inline methods are unaffected by this option as their link-
age might otherwise cross a shared library boundary. See Section 7.5 [Template
Instantiation], page 740.
Chapter 3: GCC Command Options 47
-fvisibility-ms-compat
This flag attempts to use visibility settings to make GCC’s C++ linkage model
compatible with that of Microsoft Visual Studio.
The flag makes these changes to GCC’s linkage model:
1. It sets the default visibility to hidden, like ‘-fvisibility=hidden’.
2. Types, but not their members, are not hidden by default.
3. The One Definition Rule is relaxed for types without explicit visibility
specifications that are defined in more than one shared object: those dec-
larations are permitted if they are permitted when this option is not used.
In new code it is better to use ‘-fvisibility=hidden’ and export those classes
that are intended to be externally visible. Unfortunately it is possible for code
to rely, perhaps accidentally, on the Visual Studio behavior.
Among the consequences of these changes are that static data members of
the same type with the same name but defined in different shared objects are
different, so changing one does not change the other; and that pointers to
function members defined in different shared objects may not compare equal.
When this flag is given, it is a violation of the ODR to define types with the
same name differently.
-fno-weak
Do not use weak symbol support, even if it is provided by the linker. By
default, G++ uses weak symbols if they are available. This option exists only
for testing, and should not be used by end-users; it results in inferior code and
has no benefits. This option may be removed in a future release of G++.
-nostdinc++
Do not search for header files in the standard directories specific to C++, but do
still search the other standard directories. (This option is used when building
the C++ library.)
In addition, these optimization, warning, and code generation options have meanings only
for C++ programs:
-Wabi (C, Objective-C, C++ and Objective-C++ only)
Warn when G++ it generates code that is probably not compatible with the
vendor-neutral C++ ABI. Since G++ now defaults to updating the ABI with
each major release, normally ‘-Wabi’ will warn only if there is a check added
later in a release series for an ABI issue discovered since the initial release.
‘-Wabi’ will warn about more things if an older ABI version is selected (with
‘-fabi-version=n’).
‘-Wabi’ can also be used with an explicit version number to warn about compat-
ibility with a particular ‘-fabi-version’ level, e.g. ‘-Wabi=2’ to warn about
changes relative to ‘-fabi-version=2’.
If an explicit version number is provided and ‘-fabi-compat-version’ is
not specified, the version number from this option is used for compatibility
aliases. If no explicit version number is provided with this option, but
‘-fabi-compat-version’ is specified, that version number is used for ABI
warnings.
48 Using the GNU Compiler Collection (GCC)
Although an effort has been made to warn about all such cases, there are
probably some cases that are not warned about, even though G++ is generating
incompatible code. There may also be cases where warnings are emitted even
though the code that is generated is compatible.
You should rewrite your code to avoid these warnings if you are concerned about
the fact that code generated by G++ may not be binary compatible with code
generated by other compilers.
Known incompatibilities in ‘-fabi-version=2’ (which was the default from
GCC 3.4 to 4.9) include:
• A template with a non-type template parameter of reference type was
mangled incorrectly:
extern int N;
template <int &> struct S {};
void n (S<N>) {2}
This was fixed in ‘-fabi-version=3’.
• SIMD vector types declared using __attribute ((vector_size)) were
mangled in a non-standard way that does not allow for overloading of
functions taking vectors of different sizes.
The mangling was changed in ‘-fabi-version=4’.
• __attribute ((const)) and noreturn were mangled as type qualifiers,
and decltype of a plain declaration was folded away.
These mangling issues were fixed in ‘-fabi-version=5’.
• Scoped enumerators passed as arguments to a variadic function are pro-
moted like unscoped enumerators, causing va_arg to complain. On most
targets this does not actually affect the parameter passing ABI, as there is
no way to pass an argument smaller than int.
Also, the ABI changed the mangling of template argument packs, const_
cast, static_cast, prefix increment/decrement, and a class scope func-
tion used as a template argument.
These issues were corrected in ‘-fabi-version=6’.
• Lambdas in default argument scope were mangled incorrectly, and the ABI
changed the mangling of nullptr_t.
These issues were corrected in ‘-fabi-version=7’.
• When mangling a function type with function-cv-qualifiers, the un-qualified
function type was incorrectly treated as a substitution candidate.
This was fixed in ‘-fabi-version=8’, the default for GCC 5.1.
• decltype(nullptr) incorrectly had an alignment of 1, leading to un-
aligned accesses. Note that this did not affect the ABI of a function with
a nullptr_t parameter, as parameters have a minimum alignment.
This was fixed in ‘-fabi-version=9’, the default for GCC 5.2.
• Target-specific attributes that affect the identity of a type, such as ia32
calling conventions on a function type (stdcall, regparm, etc.), did not
affect the mangled name, leading to name collisions when function pointers
were used as template arguments.
Chapter 3: GCC Command Options 49
int main() {
int64_t i64 = 123;
printf("My int64: %" PRId64"\n", i64);
}
In this case, PRId64 is treated as a separate preprocessing token.
Additionally, warn when a user-defined literal operator is declared with a literal
suffix identifier that doesn’t begin with an underscore. Literal suffix identifiers
that don’t begin with an underscore are reserved for future standardization.
This warning is enabled by default.
-Wlto-type-mismatch
During the link-time optimization warn about type mismatches in global dec-
larations from different compilation units. Requires ‘-flto’ to be enabled.
Enabled by default.
50 Using the GNU Compiler Collection (GCC)
struct A {
virtual void f();
};
struct B: public A {
void f(int);
};
the A class version of f is hidden in B, and code like:
B* b;
b->f();
fails to compile.
-Wvirtual-inheritance
Warn when a class is defined with a virtual direct base class. Some coding rules
disallow multiple inheritance, and this may be used to enforce that rule. The
warning is inactive inside a system header file, such as the STL, so one can still
use the STL. One may also define classes that indirectly use virtual inheritance.
-Wnamespaces
Warn when a namespace definition is opened. Some coding rules disallow
namespaces, and this may be used to enforce that rule. The warning is in-
active inside a system header file, such as the STL, so one can still use the STL.
One may also use using directives and qualified names.
-freplace-objc-classes
Emit a special marker instructing ld(1) not to statically link in the resulting
object file, and allow dyld(1) to load it in at run time instead. This is used
in conjunction with the Fix-and-Continue debugging mode, where the object
file in question may be recompiled and dynamically reloaded in the course of
program execution, without the need to restart the program itself. Currently,
Fix-and-Continue functionality is only available in conjunction with the NeXT
runtime on Mac OS X 10.3 and later.
-fzero-link
When compiling for the NeXT runtime, the compiler ordinarily replaces calls to
objc_getClass("...") (when the name of the class is known at compile time)
with static class references that get initialized at load time, which improves run-
time performance. Specifying the ‘-fzero-link’ flag suppresses this behavior
and causes calls to objc_getClass("...") to be retained. This is useful in
Zero-Link debugging mode, since it allows for individual class implementations
to be modified during program execution. The GNU runtime currently always
retains calls to objc_get_class("...") regardless of command-line options.
-fno-local-ivars
By default instance variables in Objective-C can be accessed as if they were
local variables from within the methods of the class they’re declared in. This
can lead to shadowing between instance variables and other variables declared
either locally inside a class method or globally with the same name. Specify-
ing the ‘-fno-local-ivars’ flag disables this behavior thus avoiding variable
shadowing issues.
-fivar-visibility=[public|protected|private|package]
Set the default instance variable visibility to the specified option so that instance
variables declared outside the scope of any access modifier directives default to
the specified visibility.
-gen-decls
Dump interface declarations for all classes seen in the source file to a file named
‘sourcename.decl’.
-Wassign-intercept (Objective-C and Objective-C++ only)
Warn whenever an Objective-C assignment is being intercepted by the garbage
collector.
-Wno-protocol (Objective-C and Objective-C++ only)
If a class is declared to implement a protocol, a warning is issued for every
method in the protocol that is not implemented by the class. The default
behavior is to issue a warning for every method not explicitly implemented in the
class, even if a method implementation is inherited from the superclass. If you
use the ‘-Wno-protocol’ option, then methods inherited from the superclass
are considered to be implemented, and no warning is issued for them.
-Wselector (Objective-C and Objective-C++ only)
Warn if multiple methods of different types for the same selector are found
during compilation. The check is performed on the list of methods in the
56 Using the GNU Compiler Collection (GCC)
-print-objc-runtime-info
Generate C header describing the largest structure that is passed by value, if
any.
-fmessage-length=n
Try to format error messages so that they fit on lines of about n characters. If
n is zero, then no line-wrapping is done; each error message appears on a single
line. This is the default for all front ends.
-fdiagnostics-show-location=once
Only meaningful in line-wrapping mode. Instructs the diagnostic messages re-
porter to emit source location information once; that is, in case the message
is too long to fit on a single physical line and has to be wrapped, the source
location won’t be emitted (as prefix) again, over and over, in subsequent con-
tinuation lines. This is the default behavior.
Chapter 3: GCC Command Options 57
-fdiagnostics-show-location=every-line
Only meaningful in line-wrapping mode. Instructs the diagnostic messages
reporter to emit the same source location information (as prefix) for physical
lines that result from the process of breaking a message which is too long to fit
on a single line.
-fdiagnostics-color[=WHEN]
-fno-diagnostics-color
Use color in diagnostics. WHEN is ‘never’, ‘always’, or ‘auto’. The
default depends on how the compiler has been configured, it can be any
of the above WHEN options or also ‘never’ if GCC_COLORS environment
variable isn’t present in the environment, and ‘auto’ otherwise. ‘auto’
means to use color only when the standard error is a terminal. The
forms ‘-fdiagnostics-color’ and ‘-fno-diagnostics-color’ are aliases
for ‘-fdiagnostics-color=always’ and ‘-fdiagnostics-color=never’,
respectively.
The colors are defined by the environment variable GCC_COLORS. Its value is
a colon-separated list of capabilities and Select Graphic Rendition (SGR) sub-
strings. SGR commands are interpreted by the terminal or terminal emulator.
(See the section in the documentation of your text terminal for permitted values
and their meanings as character attributes.) These substring values are integers
in decimal representation and can be concatenated with semicolons. Common
values to concatenate include ‘1’ for bold, ‘4’ for underline, ‘5’ for blink, ‘7’ for
inverse, ‘39’ for default foreground color, ‘30’ to ‘37’ for foreground colors, ‘90’
to ‘97’ for 16-color mode foreground colors, ‘38;5;0’ to ‘38;5;255’ for 88-color
and 256-color modes foreground colors, ‘49’ for default background color, ‘40’
to ‘47’ for background colors, ‘100’ to ‘107’ for 16-color mode background col-
ors, and ‘48;5;0’ to ‘48;5;255’ for 88-color and 256-color modes background
colors.
The default GCC_COLORS is
error=01;31:warning=01;35:note=01;36:range1=32:range2=34:locus=01:\
quote=01:fixit-insert=32:fixit-delete=31:\
diff-filename=01:diff-hunk=32:diff-delete=31:diff-insert=32
where ‘01;31’ is bold red, ‘01;35’ is bold magenta, ‘01;36’ is bold cyan, ‘32’
is green, ‘34’ is blue, ‘01’ is bold, and ‘31’ is red. Setting GCC_COLORS to the
empty string disables colors. Supported capabilities are as follows.
error= SGR substring for error: markers.
warning= SGR substring for warning: markers.
note= SGR substring for note: markers.
range1= SGR substring for first additional range.
range2= SGR substring for second additional range.
locus= SGR substring for location information, ‘file:line’ or
‘file:line:column’ etc.
quote= SGR substring for information printed within quotes.
58 Using the GNU Compiler Collection (GCC)
fixit-insert=
SGR substring for fix-it hints suggesting text to be inserted or
replaced.
fixit-delete=
SGR substring for fix-it hints suggesting text to be deleted.
diff-filename=
SGR substring for filename headers within generated patches.
diff-hunk=
SGR substring for the starts of hunks within generated patches.
diff-delete=
SGR substring for deleted lines within generated patches.
diff-insert=
SGR substring for inserted lines within generated patches.
-fno-diagnostics-show-option
By default, each diagnostic emitted includes text indicating the command-line
option that directly controls the diagnostic (if such an option is known to the
diagnostic machinery). Specifying the ‘-fno-diagnostics-show-option’ flag
suppresses that behavior.
-fno-diagnostics-show-caret
By default, each diagnostic emitted includes the original source line and a caret
‘^’ indicating the column. This option suppresses this information. The source
line is truncated to n characters, if the ‘-fmessage-length=n’ option is given.
When the output is done to the terminal, the width is limited to the width
given by the COLUMNS environment variable or, if not set, to the terminal width.
-fdiagnostics-parseable-fixits
Emit fix-it hints in a machine-parseable format, suitable for consumption by
IDEs. For each fix-it, a line will be printed after the relevant diagnostic, starting
with the string “fix-it:”. For example:
fix-it:"test.c":{45:3-45:21}:"gtk_widget_show_all"
The location is expressed as a half-open range, expressed as a count of bytes,
starting at byte 1 for the initial column. In the above example, bytes 3 through
20 of line 45 of “test.c” are to be replaced with the given string:
00000000011111111112222222222
12345678901234567890123456789
gtk_widget_showall (dlg);
^^^^^^^^^^^^^^^^^^
gtk_widget_show_all
The filename and replacement string escape backslash as “\\", tab as “\t”,
newline as “\n”, double quotes as “\"”, non-printable characters as octal (e.g.
vertical tab as “\013”).
An empty replacement string indicates that the given range is to be removed.
An empty range (e.g. “45:3-45:3”) indicates that the string is to be inserted at
the given position.
Chapter 3: GCC Command Options 59
-fdiagnostics-generate-patch
Print fix-it hints to stderr in unified diff format, after any diagnostics are
printed. For example:
--- test.c
+++ test.c
@ -42,5 +42,5 @
The diff may or may not be colorized, following the same rules as for diagnostics
(see ‘-fdiagnostics-color’).
-fno-show-column
Do not print column numbers in diagnostics. This may be necessary if diag-
nostics are being scanned by a program that does not understand the column
numbers, such as dejagnu.
-Wparentheses
-Wpointer-sign
-Wreorder
-Wreturn-type
-Wsequence-point
-Wsign-compare (only in C++)
-Wsizeof-pointer-memaccess
-Wstrict-aliasing
-Wstrict-overflow=1
-Wswitch
-Wtautological-compare
-Wtrigraphs
-Wuninitialized
-Wunknown-pragmas
-Wunused-function
-Wunused-label
-Wunused-value
-Wunused-variable
-Wvolatile-register-var
Note that some warning flags are not implied by ‘-Wall’. Some of them warn
about constructions that users generally do not consider questionable, but which
occasionally you might wish to check for; others warn about constructions that
are necessary or hard to avoid in some cases, and there is no simple way to mod-
ify the code to suppress the warning. Some of them are enabled by ‘-Wextra’
but many of them must be enabled individually.
-Wextra This enables some extra warning flags that are not enabled by ‘-Wall’. (This
option used to be called ‘-W’. The older name is still supported, but the newer
name is more descriptive.)
-Wclobbered
-Wempty-body
-Wignored-qualifiers
-Wimplicit-fallthrough=3
-Wmissing-field-initializers
-Wmissing-parameter-type (C only)
-Wold-style-declaration (C only)
-Woverride-init
-Wsign-compare (C only)
-Wtype-limits
-Wuninitialized
-Wshift-negative-value (in C++03 and in C99 and newer)
-Wunused-parameter (only with ‘-Wunused’ or ‘-Wall’)
-Wunused-but-set-parameter (only with ‘-Wunused’ or ‘-Wall’)
The option ‘-Wextra’ also prints warning messages for the following cases:
• A pointer is compared against integer zero with <, <=, >, or >=.
• (C++ only) An enumerator and a non-enumerator both appear in a condi-
tional expression.
• (C++ only) Ambiguous virtual bases.
• (C++ only) Subscripting an array that has been declared register.
• (C++ only) Taking the address of a variable that has been declared
register.
Chapter 3: GCC Command Options 63
• (C++ only) A base class is not initialized in the copy constructor of a derived
class.
-Wchar-subscripts
Warn if an array subscript has type char. This is a common cause of error,
as programmers often forget that this type is signed on some machines. This
warning is enabled by ‘-Wall’.
-Wchkp Warn about an invalid memory access that is found by Pointer Bounds Checker
(‘-fcheck-pointer-bounds’).
-Wno-coverage-mismatch
Warn if feedback profiles do not match when using the ‘-fprofile-use’ option.
If a source file is changed between compiling with ‘-fprofile-gen’ and with
‘-fprofile-use’, the files with the profile feedback can fail to match the source
file and GCC cannot use the profile feedback information. By default, this
warning is enabled and is treated as an error. ‘-Wno-coverage-mismatch’ can
be used to disable the warning or ‘-Wno-error=coverage-mismatch’ can be
used to disable the error. Disabling the error for this warning can result in
poorly optimized code and is useful only in the case of very minor changes such
as bug fixes to an existing code-base. Completely disabling the warning is not
recommended.
-Wno-cpp (C, Objective-C, C++, Objective-C++ and Fortran only)
Suppress warning messages emitted by #warning directives.
-Wdouble-promotion (C, C++, Objective-C and Objective-C++ only)
Give a warning when a value of type float is implicitly promoted to double.
CPUs with a 32-bit “single-precision” floating-point unit implement float in
hardware, but emulate double in software. On such a machine, doing compu-
tations using double values is much more expensive because of the overhead
required for software emulation.
It is easy to accidentally do computations with double because floating-point
literals are implicitly of type double. For example, in:
float area(float radius)
{
return 3.14159 * radius * radius;
}
the compiler performs the entire computation with double because the floating-
point literal is a double.
-Wduplicate-decl-specifier (C and Objective-C only)
Warn if a declaration has duplicate const, volatile, restrict or _Atomic
specifier. This warning is enabled by ‘-Wall’.
-Wformat
-Wformat=n
Check calls to printf and scanf, etc., to make sure that the arguments supplied
have types appropriate to the format string specified, and that the conversions
specified in the format string make sense. This includes standard functions, and
others specified by format attributes (see Section 6.31 [Function Attributes],
64 Using the GNU Compiler Collection (GCC)
page 429), in the printf, scanf, strftime and strfmon (an X/Open exten-
sion, not in the C standard) families (or other target-specific families). Which
functions are checked without format attributes having been specified depends
on the standard version selected, and such checks of functions without the at-
tribute specified are disabled by ‘-ffreestanding’ or ‘-fno-builtin’.
The formats are checked against the format features supported by GNU libc
version 2.2. These include all ISO C90 and C99 features, as well as features
from the Single Unix Specification and some BSD and GNU extensions. Other
library implementations may not support all these features; GCC does not sup-
port warning about features that go beyond a particular library’s limitations.
However, if ‘-Wpedantic’ is used with ‘-Wformat’, warnings are given about
format features not in the selected standard version (but not for strfmon for-
mats, since those are not in any version of the C standard). See Section 3.4
[Options Controlling C Dialect], page 33.
-Wformat=1
-Wformat Option ‘-Wformat’ is equivalent to ‘-Wformat=1’, and
‘-Wno-format’ is equivalent to ‘-Wformat=0’. Since ‘-Wformat’
also checks for null format arguments for several functions,
‘-Wformat’ also implies ‘-Wnonnull’. Some aspects of this
level of format checking can be disabled by the options:
‘-Wno-format-contains-nul’, ‘-Wno-format-extra-args’, and
‘-Wno-format-zero-length’. ‘-Wformat’ is enabled by ‘-Wall’.
-Wno-format-contains-nul
If ‘-Wformat’ is specified, do not warn about format strings that
contain NUL bytes.
-Wno-format-extra-args
If ‘-Wformat’ is specified, do not warn about excess arguments to
a printf or scanf format function. The C standard specifies that
such arguments are ignored.
Where the unused arguments lie between used arguments that are
specified with ‘$’ operand number specifications, normally warnings
are still given, since the implementation could not know what type
to pass to va_arg to skip the unused arguments. However, in the
case of scanf formats, this option suppresses the warning if the un-
used arguments are all pointers, since the Single Unix Specification
says that such unused arguments are allowed.
-Wformat-overflow
-Wformat-overflow=level
Warn about calls to formatted input/output functions such as
sprintf and vsprintf that might overflow the destination buffer.
When the exact number of bytes written by a format directive
cannot be determined at compile-time it is estimated based on
heuristics that depend on the level argument and on optimization.
While enabling optimization will in most cases improve the
accuracy of the warning, it may also result in false positives.
Chapter 3: GCC Command Options 65
-Wformat-overflow
-Wformat-overflow=1
Level 1 of ‘-Wformat-overflow’ enabled by ‘-Wformat’
employs a conservative approach that warns only about
calls that most likely overflow the buffer. At this level,
numeric arguments to format directives with unknown
values are assumed to have the value of one, and strings
of unknown length to be empty. Numeric arguments
that are known to be bounded to a subrange of their
type, or string arguments whose output is bounded ei-
ther by their directive’s precision or by a finite set of
string literals, are assumed to take on the value within
the range that results in the most bytes on output.
For example, the call to sprintf below is diagnosed
because even with both a and b equal to zero, the ter-
minating NUL character (’\0’) appended by the func-
tion to the destination buffer will be written past its
end. Increasing the size of the buffer by a single byte
is sufficient to avoid the warning, though it may not be
sufficient to avoid the overflow.
void f (int a, int b)
{
char buf [12];
sprintf (buf, "a = %i, b = %i\n", a, b);
}
-Wformat-overflow=2
Level 2 warns also about calls that might overflow
the destination buffer given an argument of sufficient
length or magnitude. At level 2, unknown numeric
arguments are assumed to have the minimum repre-
sentable value for signed types with a precision greater
than 1, and the maximum representable value other-
wise. Unknown string arguments whose length cannot
be assumed to be bounded either by the directive’s pre-
cision, or by a finite set of string literals they may eval-
uate to, or the character array they may point to, are
assumed to be 1 character long.
At level 2, the call in the example above is again diag-
nosed, but this time because with a equal to a 32-bit
INT_MIN the first %i directive will write some of its dig-
its beyond the end of the destination buffer. To make
the call safe regardless of the values of the two variables,
the size of the destination buffer must be increased to
at least 34 bytes. GCC includes the minimum size of
the buffer in an informational note following the warn-
ing.
66 Using the GNU Compiler Collection (GCC)
int f()
{
int i = i;
return i;
}
This warning is enabled by ‘-Wall’ in C++.
-Wimplicit-int (C and Objective-C only)
Warn when a declaration does not specify a type. This warning is enabled by
‘-Wall’.
-Wimplicit-function-declaration (C and Objective-C only)
Give a warning whenever a function is used before being declared. In C99 mode
(‘-std=c99’ or ‘-std=gnu99’), this warning is enabled by default and it is made
into an error by ‘-pedantic-errors’. This warning is also enabled by ‘-Wall’.
-Wimplicit (C and Objective-C only)
Same as ‘-Wimplicit-int’ and ‘-Wimplicit-function-declaration’. This
warning is enabled by ‘-Wall’.
-Wimplicit-fallthrough
‘-Wimplicit-fallthrough’ is the same as ‘-Wimplicit-fallthrough=3’ and
‘-Wno-implicit-fallthrough’ is the same as ‘-Wimplicit-fallthrough=0’.
-Wimplicit-fallthrough=n
Warn when a switch case falls through. For example:
switch (cond)
{
case 1:
a = 1;
break;
case 2:
a = 2;
case 3:
a = 3;
break;
}
This warning does not warn when the last statement of a case cannot fall
through, e.g. when there is a return statement or a call to function declared with
the noreturn attribute. ‘-Wimplicit-fallthrough=’ also takes into account
control flow statements, such as ifs, and only warns when appropriate. E.g.
switch (cond)
{
case 1:
if (i > 3) {
bar (5);
break;
} else if (i < 1) {
bar (0);
} else
return;
default:
...
}
Chapter 3: GCC Command Options 69
Since there are occasions where a switch case fall through is desirable, GCC
provides an attribute, __attribute__ ((fallthrough)), that is to be used
along with a null statement to suppress this warning that would normally occur:
switch (cond)
{
case 1:
bar (0);
__attribute__ ((fallthrough));
default:
...
}
C++17 provides a standard way to suppress the ‘-Wimplicit-fallthrough’
warning using [[fallthrough]]; instead of the GNU attribute. In C++11
or C++14 users can use [[gnu::fallthrough]];, which is a GNU extension.
Instead of the these attributes, it is also possible to add a fallthrough com-
ment to silence the warning. The whole body of the C or C++ style comment
should match the given regular expressions listed below. The option argument
n specifies what kind of comments are accepted:
• ‘-Wimplicit-fallthrough=0’ disables the warning altogether.
• ‘-Wimplicit-fallthrough=1’ matches .* regular expression, any com-
ment is used as fallthrough comment.
• ‘-Wimplicit-fallthrough=2’ case insensitively matches .*falls?[ \t-
]*thr(ough|u).* regular expression.
• ‘-Wimplicit-fallthrough=3’ case sensitively matches one of the following
regular expressions:
• -fallthrough
• @fallthrough@
• lint -fallthrough[ \t]*
• [ \t.!]*(ELSE,? |INTENTIONAL(LY)? )?
FALL(S | |-)?THR(OUGH|U)[ \t.!]*(-[^\n\r]*)?
• [ \t.!]*(Else,? |Intentional(ly)? )?
Fall((s | |-)[Tt]|t)hr(ough|u)[ \t.!]*(-[^\n\r]*)?
• [ \t.!]*([Ee]lse,? |[Ii]ntentional(ly)? )?
fall(s | |-)?thr(ough|u)[ \t.!]*(-[^\n\r]*)?
• ‘-Wimplicit-fallthrough=4’ case sensitively matches one of the following
regular expressions:
• -fallthrough
• @fallthrough@
• lint -fallthrough[ \t]*
• [ \t]*FALLTHR(OUGH|U)[ \t]*
• ‘-Wimplicit-fallthrough=5’ doesn’t recognize any comments as
fallthrough comments, only attributes disable the warning.
The comment needs to be followed after optional whitespace and other com-
ments by case or default keywords or by a user label that precedes some case
or default label.
70 Using the GNU Compiler Collection (GCC)
switch (cond)
{
case 1:
bar (0);
/* FALLTHRU */
default:
...
}
The ‘-Wimplicit-fallthrough=3’ warning is enabled by ‘-Wextra’.
-Wmain Warn if the type of main is suspicious. main should be a function with external
linkage, returning int, taking either zero arguments, two, or three arguments of
appropriate types. This warning is enabled by default in C++ and is enabled
by either ‘-Wall’ or ‘-Wpedantic’.
The warning is not issued after a #line directive, since this typically indicates
autogenerated code, and no assumptions can be made about the layout of the
file that the directive references.
This warning is enabled by ‘-Wall’ in C and C++.
-Wmissing-braces
Warn if an aggregate or union initializer is not fully bracketed. In the following
example, the initializer for a is not fully bracketed, but that for b is fully
bracketed. This warning is enabled by ‘-Wall’ in C.
int a[2][2] = { 0, 1, 2, 3 };
int b[2][2] = { { 0, 1 }, { 2, 3 } };
This warning is enabled by ‘-Wall’.
-Wmissing-include-dirs (C, C++, Objective-C and Objective-C++ only)
Warn if a user-supplied include directory does not exist.
-Wparentheses
Warn if parentheses are omitted in certain contexts, such as when there is an
assignment in a context where a truth value is expected, or when operators are
nested whose precedence people often get confused about.
Also warn if a comparison like x<=y<=z appears; this is equivalent to (x<=y ? 1
: 0) <= z, which is a different interpretation from that of ordinary mathemat-
ical notation.
Also warn for dangerous uses of the GNU extension to ?: with omitted middle
operand. When the condition in the ?: operator is a boolean expression, the
omitted value is always 1. Often programmers expect it to be a value computed
inside the conditional expression instead.
This warning is enabled by ‘-Wall’.
-Wsequence-point
Warn about code that may have undefined semantics because of violations of
sequence point rules in the C and C++ standards.
The C and C++ standards define the order in which expressions in a C/C++
program are evaluated in terms of sequence points, which represent a partial
ordering between the execution of parts of the program: those executed before
the sequence point, and those executed after it. These occur after the evalua-
tion of a full expression (one which is not part of a larger expression), after the
evaluation of the first operand of a &&, ||, ? : or , (comma) operator, before a
function is called (but after the evaluation of its arguments and the expression
denoting the called function), and in certain other places. Other than as ex-
pressed by the sequence point rules, the order of evaluation of subexpressions
of an expression is not specified. All these rules describe only a partial order
rather than a total order, since, for example, if two functions are called within
one expression with no sequence point between them, the order in which the
functions are called is not specified. However, the standards committee have
ruled that function calls do not overlap.
It is not specified when between sequence points modifications to the values of
objects take effect. Programs whose behavior depends on this have undefined
72 Using the GNU Compiler Collection (GCC)
behavior; the C and C++ standards specify that “Between the previous and
next sequence point an object shall have its stored value modified at most once
by the evaluation of an expression. Furthermore, the prior value shall be read
only to determine the value to be stored.”. If a program breaks these rules, the
results on any particular implementation are entirely unpredictable.
Examples of code with undefined behavior are a = a++;, a[n] = b[n++] and
a[i++] = i;. Some more complicated cases are not diagnosed by this option,
and it may give an occasional false positive result, but in general it has been
found fairly effective at detecting this sort of problem in programs.
The C++17 standard will define the order of evaluation of operands in more
cases: in particular it requires that the right-hand side of an assignment be
evaluated before the left-hand side, so the above examples are no longer unde-
fined. But this warning will still warn about them, to help people avoid writing
code that is undefined in C and earlier revisions of C++.
The standard is worded confusingly, therefore there is some debate over the
precise meaning of the sequence point rules in subtle cases. Links to discussions
of the problem, including proposed formal definitions, may be found on the GCC
readings page, at http://gcc.gnu.org/readings.html.
This warning is enabled by ‘-Wall’ for C and C++.
-Wno-return-local-addr
Do not warn about returning a pointer (or in C++, a reference) to a variable
that goes out of scope after the function returns.
-Wreturn-type
Warn whenever a function is defined with a return type that defaults to int.
Also warn about any return statement with no return value in a function whose
return type is not void (falling off the end of the function body is considered
returning without a value).
For C only, warn about a return statement with an expression in a function
whose return type is void, unless the expression type is also void. As a GNU
extension, the latter case is accepted without a warning unless ‘-Wpedantic’ is
used.
For C++, a function without return type always produces a diagnostic message,
even when ‘-Wno-return-type’ is specified. The only exceptions are main and
functions defined in system headers.
This warning is enabled by ‘-Wall’.
-Wshift-count-negative
Warn if shift count is negative. This warning is enabled by default.
-Wshift-count-overflow
Warn if shift count >= width of type. This warning is enabled by default.
-Wshift-negative-value
Warn if left shifting a negative value. This warning is enabled by ‘-Wextra’ in
C99 and C++11 modes (and newer).
Chapter 3: GCC Command Options 73
-Wshift-overflow
-Wshift-overflow=n
Warn about left shift overflows. This warning is enabled by default in C99 and
C++11 modes (and newer).
-Wshift-overflow=1
This is the warning level of ‘-Wshift-overflow’ and is enabled by
default in C99 and C++11 modes (and newer). This warning level
does not warn about left-shifting 1 into the sign bit. (However, in
C, such an overflow is still rejected in contexts where an integer
constant expression is required.)
-Wshift-overflow=2
This warning level also warns about left-shifting 1 into the sign bit,
unless C++14 mode is active.
-Wswitch Warn whenever a switch statement has an index of enumerated type and lacks
a case for one or more of the named codes of that enumeration. (The presence
of a default label prevents this warning.) case labels outside the enumeration
range also provoke warnings when this option is used (even if there is a default
label). This warning is enabled by ‘-Wall’.
-Wswitch-default
Warn whenever a switch statement does not have a default case.
-Wswitch-enum
Warn whenever a switch statement has an index of enumerated type and lacks
a case for one or more of the named codes of that enumeration. case labels
outside the enumeration range also provoke warnings when this option is used.
The only difference between ‘-Wswitch’ and this option is that this option gives
a warning about an omitted enumeration code even if there is a default label.
-Wswitch-bool
Warn whenever a switch statement has an index of boolean type and the case
values are outside the range of a boolean type. It is possible to suppress this
warning by casting the controlling expression to a type other than bool. For
example:
switch ((int) (a == 4))
{
...
}
This warning is enabled by default for C and C++ programs.
-Wswitch-unreachable
Warn whenever a switch statement contains statements between the controlling
expression and the first case label, which will never be executed. For example:
switch (cond)
{
i = 15;
...
case 5:
...
}
74 Using the GNU Compiler Collection (GCC)
-Wunused-variable
Warn whenever a local or static variable is unused aside from its declaration.
This option implies ‘-Wunused-const-variable=1’ for C, but not for C++. This
warning is enabled by ‘-Wall’.
To suppress this warning use the unused attribute (see Section 6.32 [Variable
Attributes], page 474).
-Wunused-const-variable
-Wunused-const-variable=n
Warn whenever a constant static variable is unused aside from its declaration.
‘-Wunused-const-variable=1’ is enabled by ‘-Wunused-variable’ for C, but
not for C++. In C this declares variable storage, but in C++ this is not an error
since const variables take the place of #defines.
To suppress this warning use the unused attribute (see Section 6.32 [Variable
Attributes], page 474).
-Wunused-const-variable=1
This is the warning level that is enabled by ‘-Wunused-variable’
for C. It warns only about unused static const variables defined
in the main compilation unit, but not about static const variables
declared in any header included.
-Wunused-const-variable=2
This warning level also warns for unused constant static variables
in headers (excluding system headers). This is the warning level
of ‘-Wunused-const-variable’ and must be explicitly requested
since in C++ this isn’t an error and in C it might be harder to clean
up all headers included.
-Wunused-value
Warn whenever a statement computes a result that is explicitly not used. To
suppress this warning cast the unused expression to void. This includes an
expression-statement or the left-hand side of a comma expression that contains
no side effects. For example, an expression such as x[i,j] causes a warning,
while x[(void)i,j] does not.
This warning is enabled by ‘-Wall’.
-Wunused All the above ‘-Wunused’ options combined.
In order to get a warning about an unused function parameter, you must either
specify ‘-Wextra -Wunused’ (note that ‘-Wall’ implies ‘-Wunused’), or sepa-
rately specify ‘-Wunused-parameter’.
-Wuninitialized
Warn if an automatic variable is used without first being initialized or if a
variable may be clobbered by a setjmp call. In C++, warn if a non-static
reference or non-static const member appears in a class without constructors.
If you want to warn about code that uses the uninitialized value of the variable
in its own initializer, use the ‘-Winit-self’ option.
These warnings occur for individual uninitialized or clobbered elements of struc-
ture, union or array variables as well as for variables that are uninitialized or
76 Using the GNU Compiler Collection (GCC)
result, you may get a warning even when there is in fact no problem because
longjmp cannot in fact be called at the place that would cause a problem.
Some spurious warnings can be avoided if you declare all the functions you
use that never return as noreturn. See Section 6.31 [Function Attributes],
page 429.
This warning is enabled by ‘-Wall’ or ‘-Wextra’.
-Wunknown-pragmas
Warn when a #pragma directive is encountered that is not understood by GCC.
If this command-line option is used, warnings are even issued for unknown
pragmas in system header files. This is not the case if the warnings are only
enabled by the ‘-Wall’ command-line option.
-Wno-pragmas
Do not warn about misuses of pragmas, such as incorrect parameters, invalid
syntax, or conflicts between pragmas. See also ‘-Wunknown-pragmas’.
-Wstrict-aliasing
This option is only active when ‘-fstrict-aliasing’ is active. It warns about
code that might break the strict aliasing rules that the compiler is using for
optimization. The warning does not catch all cases, but does attempt to
catch the more common pitfalls. It is included in ‘-Wall’. It is equivalent
to ‘-Wstrict-aliasing=3’
-Wstrict-aliasing=n
This option is only active when ‘-fstrict-aliasing’ is active. It warns about
code that might break the strict aliasing rules that the compiler is using for op-
timization. Higher levels correspond to higher accuracy (fewer false positives).
Higher levels also correspond to more effort, similar to the way ‘-O’ works.
‘-Wstrict-aliasing’ is equivalent to ‘-Wstrict-aliasing=3’.
Level 1: Most aggressive, quick, least accurate. Possibly useful when higher
levels do not warn but ‘-fstrict-aliasing’ still breaks the code, as it has very
few false negatives. However, it has many false positives. Warns for all pointer
conversions between possibly incompatible types, even if never dereferenced.
Runs in the front end only.
Level 2: Aggressive, quick, not too precise. May still have many false positives
(not as many as level 1 though), and few false negatives (but possibly more
than level 1). Unlike level 1, it only warns when an address is taken. Warns
about incomplete types. Runs in the front end only.
Level 3 (default for ‘-Wstrict-aliasing’): Should have very few false positives
and few false negatives. Slightly slower than levels 1 or 2 when optimization
is enabled. Takes care of the common pun+dereference pattern in the front
end: *(int*)&some_float. If optimization is enabled, it also runs in the back
end, where it deals with multiple statement cases using flow-sensitive points-to
information. Only warns when the converted pointer is dereferenced. Does not
warn about incomplete types.
78 Using the GNU Compiler Collection (GCC)
-Wstrict-overflow
-Wstrict-overflow=n
This option is only active when ‘-fstrict-overflow’ is active. It warns about
cases where the compiler optimizes based on the assumption that signed over-
flow does not occur. Note that it does not warn about all cases where the code
might overflow: it only warns about cases where the compiler implements some
optimization. Thus this warning depends on the optimization level.
An optimization that assumes that signed overflow does not occur is perfectly
safe if the values of the variables involved are such that overflow never does, in
fact, occur. Therefore this warning can easily give a false positive: a warning
about code that is not actually a problem. To help focus on important issues,
several warning levels are defined. No warnings are issued for the use of unde-
fined signed overflow when estimating how many iterations a loop requires, in
particular when determining whether a loop will be executed at all.
-Wstrict-overflow=1
Warn about cases that are both questionable and easy to avoid. For
example, with ‘-fstrict-overflow’, the compiler simplifies x + 1
> x to 1. This level of ‘-Wstrict-overflow’ is enabled by ‘-Wall’;
higher levels are not, and must be explicitly requested.
-Wstrict-overflow=2
Also warn about other cases where a comparison is simplified to
a constant. For example: abs (x) >= 0. This can only be simpli-
fied when ‘-fstrict-overflow’ is in effect, because abs (INT_MIN)
overflows to INT_MIN, which is less than zero. ‘-Wstrict-overflow’
(with no level) is the same as ‘-Wstrict-overflow=2’.
-Wstrict-overflow=3
Also warn about other cases where a comparison is simplified. For
example: x + 1 > 1 is simplified to x > 0.
-Wstrict-overflow=4
Also warn about other simplifications not covered by the above
cases. For example: (x * 10) / 5 is simplified to x * 2.
-Wstrict-overflow=5
Also warn about cases where the compiler reduces the magnitude
of a constant involved in a comparison. For example: x + 2 > y is
simplified to x + 1 >= y. This is reported only at the highest warn-
ing level because this simplification applies to many comparisons,
so this warning level gives a very large number of false positives.
-Wstringop-overflow
-Wstringop-overflow=type
Warn for calls to string manipulation functions such as memcpy and strcpy
that are determined to overflow the destination buffer. The optional argument
is one greater than the type of Object Size Checking to perform to determine
the size of the destination. See Section 6.56 [Object Size Checking], page 567.
The argument is meaningful only for functions that operate on character arrays
Chapter 3: GCC Command Options 79
but not for raw memory functions like memcpy which always make use of Object
Size type-0. The option also warns for calls that specify a size in excess of the
largest possible object or at most SIZE_MAX / 2 bytes. The option produces
the best results with optimization enabled but can detect a small subset of
simple buffer overflows even without optimization in calls to the GCC built-in
functions like __builtin_memcpy that correspond to the standard functions.
In any case, the option warns about just a subset of buffer overflows detected
by the corresponding overflow checking built-ins. For example, the option will
issue a warning for the strcpy call below because it copies at least 5 characters
(the string "blue" including the terminating NUL) into the buffer of size 4.
enum Color { blue, purple, yellow };
const char* f (enum Color clr)
{
static char buf [4];
const char *str;
switch (clr)
{
case blue: str = "blue"; break;
case purple: str = "purple"; break;
case yellow: str = "yellow"; break;
}
-Wstringop-overflow=4
The ‘-Wstringop-overflow=4’ option uses type-three Object Size
Checking to determine the sizes of destination objects. At this
setting the option will warn about overflowing any data members,
and when the destination is one of several objects it uses the size of
the largest of them to decide whether to issue a warning. Similarly
to ‘-Wstringop-overflow=3’ this setting of the option may result
in warnings for benign code.
-Wsuggest-attribute=[pure|const|noreturn|format]
Warn for cases where adding an attribute may be beneficial. The attributes
currently supported are listed below.
-Wsuggest-attribute=pure
-Wsuggest-attribute=const
-Wsuggest-attribute=noreturn
Warn about functions that might be candidates for attributes pure,
const or noreturn. The compiler only warns for functions visible
in other compilation units or (in the case of pure and const) if
it cannot prove that the function returns normally. A function
returns normally if it doesn’t contain an infinite loop or return
abnormally by throwing, calling abort or trapping. This analysis
requires option ‘-fipa-pure-const’, which is enabled by default at
‘-O’ and higher. Higher optimization levels improve the accuracy
of the analysis.
-Wsuggest-attribute=format
-Wmissing-format-attribute
Warn about function pointers that might be candidates for format
attributes. Note these are only possible candidates, not absolute
ones. GCC guesses that function pointers with format attributes
that are used in assignment, initialization, parameter passing or
return statements should have a corresponding format attribute
in the resulting type. I.e. the left-hand side of the assignment or
initialization, the type of the parameter variable, or the return type
of the containing function respectively should also have a format
attribute to avoid the warning.
GCC also warns about function definitions that might be candi-
dates for format attributes. Again, these are only possible candi-
dates. GCC guesses that format attributes might be appropriate
for any function that calls a function like vprintf or vscanf, but
this might not always be the case, and some functions for which
format attributes are appropriate may not be detected.
Chapter 3: GCC Command Options 81
-Wsuggest-final-types
Warn about types with virtual methods where code quality would be improved
if the type were declared with the C++11 final specifier, or, if possible, de-
clared in an anonymous namespace. This allows GCC to more aggressively
devirtualize the polymorphic calls. This warning is more effective with link
time optimization, where the information about the class hierarchy graph is
more complete.
-Wsuggest-final-methods
Warn about virtual methods where code quality would be improved if the
method were declared with the C++11 final specifier, or, if possible, its type
were declared in an anonymous namespace or with the final specifier. This
warning is more effective with link-time optimization, where the information
about the class hierarchy graph is more complete. It is recommended to first
consider suggestions of ‘-Wsuggest-final-types’ and then rebuild with new
annotations.
-Wsuggest-override
Warn about overriding virtual functions that are not marked with the override
keyword.
-Walloc-zero
Warn about calls to allocation functions decorated with attribute alloc_size
that specify zero bytes, including those to the built-in forms of the functions
aligned_alloc, alloca, calloc, malloc, and realloc. Because the behavior
of these functions when called with a zero size differs among implementations
(and in the case of realloc has been deprecated) relying on it may result in
subtle portability bugs and should be avoided.
-Walloc-size-larger-than=n
Warn about calls to functions decorated with attribute alloc_size that at-
tempt to allocate objects larger than the specified number of bytes, or where
the result of the size computation in an integer type with infinite precision
would exceed SIZE_MAX / 2. The option argument n may end in one of the
standard suffixes designating a multiple of bytes such as kB and KiB for kilobyte
and kibibyte, respectively, MB and MiB for megabyte and mebibyte, and so on.
‘-Walloc-size-larger-than=’PTRDIFF MAX is enabled by default. Warn-
ings controlled by the option can be disabled by specifying n of SIZE MAX or
more. See Section 6.31 [Function Attributes], page 429.
-Walloca This option warns on all uses of alloca in the source.
-Walloca-larger-than=n
This option warns on calls to alloca that are not bounded by a controlling
predicate limiting its argument of integer type to at most n bytes, or calls
to alloca where the bound is unknown. Arguments of non-integer types are
considered unbounded even if they appear to be constrained to the expected
range.
For example, a bounded case of alloca could be:
void func (size_t n)
82 Using the GNU Compiler Collection (GCC)
{
void *p;
if (n <= 1000)
p = alloca (n);
else
p = malloc (n);
f (p);
}
In the above example, passing -Walloca-larger-than=1000 would not issue a
warning because the call to alloca is known to be at most 1000 bytes. However,
if -Walloca-larger-than=500 were passed, the compiler would emit a warning.
Unbounded uses, on the other hand, are uses of alloca with no controlling
predicate constraining its integer argument. For example:
void func ()
{
void *p = alloca (n);
f (p);
}
If -Walloca-larger-than=500 were passed, the above would trigger a warning,
but this time because of the lack of bounds checking.
Note, that even seemingly correct code involving signed integers could cause a
warning:
void func (signed int n)
{
if (n < 500)
{
p = alloca (n);
f (p);
}
}
In the above example, n could be negative, causing a larger than expected
argument to be implicitly cast into the alloca call.
This option also warns when alloca is used in a loop.
This warning is not enabled by ‘-Wall’, and is only active when ‘-ftree-vrp’
is active (default for ‘-O2’ and above).
See also ‘-Wvla-larger-than=n’.
-Warray-bounds
-Warray-bounds=n
This option is only active when ‘-ftree-vrp’ is active (default for ‘-O2’ and
above). It warns about subscripts to arrays that are always out of bounds. This
warning is enabled by ‘-Wall’.
-Warray-bounds=1
This is the warning level of ‘-Warray-bounds’ and is enabled by
‘-Wall’; higher levels are not, and must be explicitly requested.
-Warray-bounds=2
This warning level also warns about out of bounds access for arrays
at the end of a struct and for arrays accessed through pointers.
Chapter 3: GCC Command Options 83
This warning level may give a larger number of false positives and
is deactivated by default.
-Wbool-compare
Warn about boolean expression compared with an integer value different from
true/false. For instance, the following comparison is always false:
int n = 5;
...
if ((n > 1) == 2) { ... }
This warning is enabled by ‘-Wall’.
-Wbool-operation
Warn about suspicious operations on expressions of a boolean type. For in-
stance, bitwise negation of a boolean is very likely a bug in the program. For
C, this warning also warns about incrementing or decrementing a boolean,
which rarely makes sense. (In C++, decrementing a boolean is always invalid.
Incrementing a boolean is invalid in C++1z, and deprecated otherwise.)
This warning is enabled by ‘-Wall’.
-Wduplicated-branches
Warn when an if-else has identical branches. This warning detects cases like
if (p != NULL)
return 0;
else
return 0;
It doesn’t warn when both branches contain just a null statement. This warning
also warn for conditional operators:
int i = x ? *p : *p;
-Wduplicated-cond
Warn about duplicated conditions in an if-else-if chain. For instance, warn for
the following code:
if (p->q != NULL) { ... }
else if (p->q != NULL) { ... }
-Wframe-address
Warn when the ‘__builtin_frame_address’ or ‘__builtin_return_address’
is called with an argument greater than 0. Such calls may return indeterminate
values or crash the program. The warning is included in ‘-Wall’.
-Wno-discarded-qualifiers (C and Objective-C only)
Do not warn if type qualifiers on pointers are being discarded. Typically, the
compiler warns if a const char * variable is passed to a function that takes a
char * parameter. This option can be used to suppress such a warning.
-Wno-discarded-array-qualifiers (C and Objective-C only)
Do not warn if type qualifiers on arrays which are pointer targets are being
discarded. Typically, the compiler warns if a const int (*)[] variable is passed
to a function that takes a int (*)[] parameter. This option can be used to
suppress such a warning.
84 Using the GNU Compiler Collection (GCC)
of testing for equality, you should check to see whether the two values have
ranges that overlap; and this is done with the relational operators, so equality
comparisons are probably mistaken.
-Wtraditional (C and Objective-C only)
Warn about certain constructs that behave differently in traditional and ISO
C. Also warn about ISO C constructs that have no traditional C equivalent,
and/or problematic constructs that should be avoided.
• Macro parameters that appear within string literals in the macro body. In
traditional C macro replacement takes place within string literals, but in
ISO C it does not.
• In traditional C, some preprocessor directives did not exist. Traditional
preprocessors only considered a line to be a directive if the ‘#’ appeared in
column 1 on the line. Therefore ‘-Wtraditional’ warns about directives
that traditional C understands but ignores because the ‘#’ does not appear
as the first character on the line. It also suggests you hide directives like
#pragma not understood by traditional C by indenting them. Some tra-
ditional implementations do not recognize #elif, so this option suggests
avoiding it altogether.
• A function-like macro that appears without arguments.
• The unary plus operator.
• The ‘U’ integer constant suffix, or the ‘F’ or ‘L’ floating-point constant
suffixes. (Traditional C does support the ‘L’ suffix on integer constants.)
Note, these suffixes appear in macros defined in the system headers of most
modern systems, e.g. the ‘_MIN’/‘_MAX’ macros in <limits.h>. Use of these
macros in user code might normally lead to spurious warnings, however
GCC’s integrated preprocessor has enough context to avoid warning in
these cases.
• A function declared external in one block and then used after the end of
the block.
• A switch statement has an operand of type long.
• A non-static function declaration follows a static one. This construct
is not accepted by some traditional C compilers.
• The ISO type of an integer constant has a different width or signedness
from its traditional type. This warning is only issued if the base of the
constant is ten. I.e. hexadecimal or octal values, which typically represent
bit patterns, are not warned about.
• Usage of ISO string concatenation is detected.
• Initialization of automatic aggregates.
• Identifier conflicts with labels. Traditional C lacks a separate namespace
for labels.
• Initialization of unions. If the initializer is zero, the warning is omitted.
This is done under the assumption that the zero initializer in user code
appears conditioned on e.g. __STDC__ to avoid missing initializer warnings
and relies on default initialization to zero in the traditional C case.
86 Using the GNU Compiler Collection (GCC)
-Wshadow Warn whenever a local variable or type declaration shadows another variable,
parameter, type, class member (in C++), or instance variable (in Objective-C)
or whenever a built-in function is shadowed. Note that in C++, the compiler
warns if a local variable shadows an explicit typedef, but not if it shadows a
struct/class/enum. Same as ‘-Wshadow=global’.
-Wshadow=global
The default for ‘-Wshadow’. Warns for any (global) shadowing.
-Wshadow=local
Warn when a local variable shadows another local variable or parameter. This
warning is enabled by ‘-Wshadow=global’.
-Wshadow=compatible-local
Warn when a local variable shadows another local variable or parameter whose
type is compatible with that of the shadowing variable. In C++, type compatibil-
ity here means the type of the shadowing variable can be converted to that of the
shadowed variable. The creation of this flag (in addition to ‘-Wshadow=local’)
is based on the idea that when a local variable shadows another one of incom-
patible type, it is most likely intentional, not a bug or typo, as shown in the
following example:
Chapter 3: GCC Command Options 87
-Wunsafe-loop-optimizations
Warn if the loop cannot be optimized because the compiler cannot assume any-
thing on the bounds of the loop indices. With ‘-funsafe-loop-optimizations’
warn if the compiler makes such assumptions.
88 Using the GNU Compiler Collection (GCC)
-Wpointer-compare
Warn if a pointer is compared with a zero character constant. This usually
means that the pointer was meant to be dereferenced. For example:
const char *p = foo ();
if (p == ’\0’)
return 42;
Note that the code above is invalid in C++11.
This warning is enabled by default.
-Wtype-limits
Warn if a comparison is always true or always false due to the limited range of
the data type, but do not warn for constant expressions. For example, warn if
an unsigned variable is compared against zero with < or >=. This warning is
also enabled by ‘-Wextra’.
-Wcomment
-Wcomments
Warn whenever a comment-start sequence ‘/*’ appears in a ‘/*’ comment, or
whenever a backslash-newline appears in a ‘//’ comment. This warning is
enabled by ‘-Wall’.
-Wtrigraphs
Warn if any trigraphs are encountered that might change the meaning of the
program. Trigraphs within comments are not warned about, except those that
would form escaped newlines.
This option is implied by ‘-Wall’. If ‘-Wall’ is not given, this option
is still enabled unless trigraphs are enabled. To get trigraph conversion
without warnings, but get the other ‘-Wall’ warnings, use ‘-trigraphs -Wall
-Wno-trigraphs’.
-Wundef Warn if an undefined identifier is evaluated in an #if directive. Such identifiers
are replaced with zero.
-Wexpansion-to-defined
Warn whenever ‘defined’ is encountered in the expansion of a macro (including
the case where the macro is expanded by an ‘#if’ directive). Such usage is not
portable. This warning is also enabled by ‘-Wpedantic’ and ‘-Wextra’.
-Wunused-macros
Warn about macros defined in the main file that are unused. A macro is used
if it is expanded or tested for existence at least once. The preprocessor also
warns if the macro has not been used at the time it is redefined or undefined.
Built-in macros, macros defined on the command line, and macros defined in
include files are not warned about.
Note: If a macro is actually used, but only used in skipped conditional blocks,
then the preprocessor reports it as unused. To avoid the warning in such a case,
you might improve the scope of the macro’s definition by, for example, moving
it into the first skipped block. Alternatively, you could provide a dummy use
with something like:
90 Using the GNU Compiler Collection (GCC)
-Wno-endif-labels
Do not warn whenever an #else or an #endif are followed by text. This
sometimes happens in older programs with code of the form
#if FOO
...
#else FOO
...
#endif FOO
The second and third FOO should be in comments. This warning is on by default.
-Wbad-function-cast (C and Objective-C only)
Warn when a function call is cast to a non-matching type. For example, warn
if a call to a function returning an integer type is cast to a pointer type.
-Wc90-c99-compat (C and Objective-C only)
Warn about features not present in ISO C90, but present in ISO C99. For
instance, warn about use of variable length arrays, long long type, bool type,
compound literals, designated initializers, and so on. This option is independent
of the standards mode. Warnings are disabled in the expression that follows
__extension__.
-Wc99-c11-compat (C and Objective-C only)
Warn about features not present in ISO C99, but present in ISO C11. For in-
stance, warn about use of anonymous structures and unions, _Atomic type qual-
ifier, _Thread_local storage-class specifier, _Alignas specifier, Alignof opera-
tor, _Generic keyword, and so on. This option is independent of the standards
mode. Warnings are disabled in the expression that follows __extension__.
-Wc++-compat (C and Objective-C only)
Warn about ISO C constructs that are outside of the common subset of ISO C
and ISO C++, e.g. request for implicit conversion from void * to a pointer to
non-void type.
-Wc++11-compat (C++ and Objective-C++ only)
Warn about C++ constructs whose meaning differs between ISO C++ 1998 and
ISO C++ 2011, e.g., identifiers in ISO C++ 1998 that are keywords in ISO C++
2011. This warning turns on ‘-Wnarrowing’ and is enabled by ‘-Wall’.
-Wc++14-compat (C++ and Objective-C++ only)
Warn about C++ constructs whose meaning differs between ISO C++ 2011 and
ISO C++ 2014. This warning is enabled by ‘-Wall’.
-Wc++1z-compat (C++ and Objective-C++ only)
Warn about C++ constructs whose meaning differs between ISO C++ 2014 and
the forthoming ISO C++ 2017(?). This warning is enabled by ‘-Wall’.
-Wcast-qual
Warn whenever a pointer is cast so as to remove a type qualifier from the target
type. For example, warn if a const char * is cast to an ordinary char *.
Chapter 3: GCC Command Options 91
Also warn when making a cast that introduces a type qualifier in an unsafe way.
For example, casting char ** to const char ** is unsafe, as in this example:
/* p is char ** value. */
const char **q = (const char **) p;
/* Assignment of readonly string to const char * is OK. */
*q = "string";
/* Now char** pointer points to read-only memory. */
**p = ’b’;
-Wcast-align
Warn whenever a pointer is cast such that the required alignment of the target
is increased. For example, warn if a char * is cast to an int * on machines
where integers can only be accessed at two- or four-byte boundaries.
-Wwrite-strings
When compiling C, give string constants the type const char[length] so that
copying the address of one into a non-const char * pointer produces a warning.
These warnings help you find at compile time code that can try to write into
a string constant, but only if you have been very careful about using const in
declarations and prototypes. Otherwise, it is just a nuisance. This is why we
did not make ‘-Wall’ request these warnings.
When compiling C++, warn about the deprecated conversion from string literals
to char *. This warning is enabled by default for C++ programs.
-Wclobbered
Warn for variables that might be changed by longjmp or vfork. This warning
is also enabled by ‘-Wextra’.
-Wconditionally-supported (C++ and Objective-C++ only)
Warn for conditionally-supported (C++11 [intro.defs]) constructs.
-Wconversion
Warn for implicit conversions that may alter a value. This includes conversions
between real and integer, like abs (x) when x is double; conversions between
signed and unsigned, like unsigned ui = -1; and conversions to smaller types,
like sqrtf (M_PI). Do not warn for explicit casts like abs ((int) x) and ui
= (unsigned) -1, or if the value is not changed by the conversion like in abs
(2.0). Warnings about conversions between signed and unsigned integers can
be disabled by using ‘-Wno-sign-conversion’.
For C++, also warn for confusing overload resolution for user-defined conver-
sions; and conversions that never use a type conversion operator: conversions
to void, the same type, a base class or a reference to them. Warnings about
conversions between signed and unsigned integers are disabled by default in
C++ unless ‘-Wsign-conversion’ is explicitly enabled.
-Wno-conversion-null (C++ and Objective-C++ only)
Do not warn for conversions between NULL and non-pointer types.
‘-Wconversion-null’ is enabled by default.
-Wzero-as-null-pointer-constant (C++ and Objective-C++ only)
Warn when a literal ‘0’ is used as null pointer constant. This can be useful to
facilitate the conversion to nullptr in C++11.
92 Using the GNU Compiler Collection (GCC)
-Wenum-compare
Warn about a comparison between values of different enumerated types. In
C++ enumerated type mismatches in conditional expressions are also diagnosed
and the warning is enabled by default. In C this warning is enabled by ‘-Wall’.
-Wjump-misses-init (C, Objective-C only)
Warn if a goto statement or a switch statement jumps forward across the
initialization of a variable, or jumps backward to a label after the variable has
been initialized. This only warns about variables that are initialized when they
are declared. This warning is only supported for C and Objective-C; in C++
this sort of branch is an error in any case.
‘-Wjump-misses-init’ is included in ‘-Wc++-compat’. It can be disabled with
the ‘-Wno-jump-misses-init’ option.
-Wsign-compare
Warn when a comparison between signed and unsigned values could produce
an incorrect result when the signed value is converted to unsigned. In C++, this
warning is also enabled by ‘-Wall’. In C, it is also enabled by ‘-Wextra’.
-Wsign-conversion
Warn for implicit conversions that may change the sign of an integer value, like
assigning a signed integer expression to an unsigned integer variable. An explicit
cast silences the warning. In C, this option is enabled also by ‘-Wconversion’.
-Wfloat-conversion
Warn for implicit conversions that reduce the precision of a real value. This
includes conversions from real to integer, and from higher precision real to lower
precision real values. This option is also enabled by ‘-Wconversion’.
-Wno-scalar-storage-order
Do not warn on suspicious constructs involving reverse scalar storage order.
-Wsized-deallocation (C++ and Objective-C++ only)
Warn about a definition of an unsized deallocation function
void operator delete (void *) noexcept;
void operator delete[] (void *) noexcept;
without a definition of the corresponding sized deallocation function
void operator delete (void *, std::size_t) noexcept;
void operator delete[] (void *, std::size_t) noexcept;
or vice versa. Enabled by ‘-Wextra’ along with ‘-fsized-deallocation’.
-Wsizeof-pointer-memaccess
Warn for suspicious length parameters to certain string and memory built-in
functions if the argument uses sizeof. This warning warns e.g. about memset
(ptr, 0, sizeof (ptr)); if ptr is not an array, but a pointer, and suggests a
possible fix, or about memcpy (&foo, ptr, sizeof (&foo));. This warning is
enabled by ‘-Wall’.
-Wsizeof-array-argument
Warn when the sizeof operator is applied to a parameter that is declared as
an array in a function definition. This warning is enabled by default for C and
C++ programs.
94 Using the GNU Compiler Collection (GCC)
-Wmemset-elt-size
Warn for suspicious calls to the memset built-in function, if the first argument
references an array, and the third argument is a number equal to the number
of elements, but not equal to the size of the array in memory. This indicates
that the user has omitted a multiplication by the element size. This warning is
enabled by ‘-Wall’.
-Wmemset-transposed-args
Warn for suspicious calls to the memset built-in function, if the second ar-
gument is not zero and the third argument is zero. This warns e.g. about
memset (buf, sizeof buf, 0) where most probably memset (buf, 0, sizeof
buf) was meant instead. The diagnostics is only emitted if the third argument
is literal zero. If it is some expression that is folded to zero, a cast of zero to
some type, etc., it is far less likely that the user has mistakenly exchanged the
arguments and no warning is emitted. This warning is enabled by ‘-Wall’.
-Waddress
Warn about suspicious uses of memory addresses. These include using the
address of a function in a conditional expression, such as void func(void);
if (func), and comparisons against the memory address of a string literal,
such as if (x == "abc"). Such uses typically indicate a programmer error: the
address of a function always evaluates to true, so their use in a conditional
usually indicate that the programmer forgot the parentheses in a function call;
and comparisons against string literals result in unspecified behavior and are
not portable in C, so they usually indicate that the programmer intended to
use strcmp. This warning is enabled by ‘-Wall’.
-Wlogical-op
Warn about suspicious uses of logical operators in expressions. This includes
using logical operators in contexts where a bit-wise operator is likely to be
expected. Also warns when the operands of a logical operator are the same:
extern int a;
if (a < 0 && a < 0) { ... }
-Wlogical-not-parentheses
Warn about logical not used on the left hand side operand of a comparison.
This option does not warn if the right operand is considered to be a boolean
expression. Its purpose is to detect suspicious code like the following:
int a;
...
if (!a > 1) { ... }
It is possible to suppress the warning by wrapping the LHS into parentheses:
if ((!a) > 1) { ... }
This warning is enabled by ‘-Wall’.
-Waggregate-return
Warn if any functions that return structures or unions are defined or called. (In
languages where you can return an array, this also elicits a warning.)
Chapter 3: GCC Command Options 95
-Wno-aggressive-loop-optimizations
Warn if in a loop with constant number of iterations the compiler detects un-
defined behavior in some statement during one or more of the iterations.
-Wno-attributes
Do not warn if an unexpected __attribute__ is used, such as unrecognized
attributes, function attributes applied to variables, etc. This does not stop
errors for incorrect use of supported attributes.
-Wno-builtin-declaration-mismatch
Warn if a built-in function is declared with the wrong signature. This warning
is enabled by default.
-Wno-builtin-macro-redefined
Do not warn if certain built-in macros are redefined. This suppresses warn-
ings for redefinition of __TIMESTAMP__, __TIME__, __DATE__, __FILE__, and
__BASE_FILE__.
-Wstrict-prototypes (C and Objective-C only)
Warn if a function is declared or defined without specifying the argument types.
(An old-style function definition is permitted without a warning if preceded by
a declaration that specifies the argument types.)
-Wold-style-declaration (C and Objective-C only)
Warn for obsolescent usages, according to the C Standard, in a declaration. For
example, warn if storage-class specifiers like static are not the first things in
a declaration. This warning is also enabled by ‘-Wextra’.
-Wold-style-definition (C and Objective-C only)
Warn if an old-style function definition is used. A warning is given even if there
is a previous prototype.
-Wmissing-parameter-type (C and Objective-C only)
A function parameter is declared without a type specifier in K&R-style func-
tions:
void foo(bar) { }
This warning is also enabled by ‘-Wextra’.
-Wmissing-prototypes (C and Objective-C only)
Warn if a global function is defined without a previous prototype declara-
tion. This warning is issued even if the definition itself provides a proto-
type. Use this option to detect global functions that do not have a match-
ing prototype declaration in a header file. This option is not valid for C++
because all function declarations provide prototypes and a non-matching dec-
laration declares an overload rather than conflict with an earlier declaration.
Use ‘-Wmissing-declarations’ to detect missing declarations in C++.
-Wmissing-declarations
Warn if a global function is defined without a previous declaration. Do so even if
the definition itself provides a prototype. Use this option to detect global func-
tions that are not declared in header files. In C, no warnings are issued for func-
tions with previous non-prototype declarations; use ‘-Wmissing-prototypes’
96 Using the GNU Compiler Collection (GCC)
to detect missing prototypes. In C++, no warnings are issued for function tem-
plates, or for inline functions, or for functions in anonymous namespaces.
-Wmissing-field-initializers
Warn if a structure’s initializer has some fields missing. For example, the fol-
lowing code causes such a warning, because x.h is implicitly zero:
struct s { int f, g, h; };
struct s x = { 3, 4 };
This option does not warn about designated initializers, so the following mod-
ification does not trigger a warning:
struct s { int f, g, h; };
struct s x = { .f = 3, .g = 4 };
In C++ this option does not warn either about the empty { } initializer, for
example:
struct s { int f, g, h; };
s x = { };
This warning is included in ‘-Wextra’. To get other ‘-Wextra’ warnings without
this one, use ‘-Wextra -Wno-missing-field-initializers’.
-Wno-multichar
Do not warn if a multicharacter constant (‘’FOOF’’) is used. Usually they
indicate a typo in the user’s code, as they have implementation-defined values,
and should not be used in portable code.
-Wnormalized=[none|id|nfc|nfkc]
In ISO C and ISO C++, two identifiers are different if they are different sequences
of characters. However, sometimes when characters outside the basic ASCII
character set are used, you can have two different character sequences that
look the same. To avoid confusion, the ISO 10646 standard sets out some
normalization rules which when applied ensure that two sequences that look the
same are turned into the same sequence. GCC can warn you if you are using
identifiers that have not been normalized; this option controls that warning.
There are four levels of warning supported by GCC. The default is
‘-Wnormalized=nfc’, which warns about any identifier that is not in the ISO
10646 “C” normalized form, NFC. NFC is the recommended form for most
uses. It is equivalent to ‘-Wnormalized’.
Unfortunately, there are some characters allowed in identifiers by ISO C and
ISO C++ that, when turned into NFC, are not allowed in identifiers. That is,
there’s no way to use these symbols in portable ISO C or C++ and have all
your identifiers in NFC. ‘-Wnormalized=id’ suppresses the warning for these
characters. It is hoped that future versions of the standards involved will correct
this, which is why this option is not the default.
You can switch the warning off for all characters by writing
‘-Wnormalized=none’ or ‘-Wno-normalized’. You should only do
this if you are using some other normalization scheme (like “D”), because
otherwise you can easily create bugs that are literally impossible to see.
Some characters in ISO 10646 have distinct meanings but look identical in some
fonts or display methodologies, especially once formatting has been applied. For
Chapter 3: GCC Command Options 97
-Wpacked-bitfield-compat
The 4.1, 4.2 and 4.3 series of GCC ignore the packed attribute on bit-fields
of type char. This has been fixed in GCC 4.4 but the change can lead to
differences in the structure layout. GCC informs you when the offset of such a
field has changed in GCC 4.4. For example there is no longer a 4-bit padding
between field a and b in this structure:
struct foo
{
char a:4;
char b:8;
} __attribute__ ((packed));
This warning is enabled by default. Use ‘-Wno-packed-bitfield-compat’ to
disable this warning.
-Wpadded Warn if padding is included in a structure, either to align an element of the
structure or to align the whole structure. Sometimes when this happens it is
possible to rearrange the fields of the structure to reduce the padding and so
make the structure smaller.
-Wredundant-decls
Warn if anything is declared more than once in the same scope, even in cases
where multiple declaration is valid and changes nothing.
-Wrestrict
Warn when an argument passed to a restrict-qualified parameter aliases with
another argument.
-Wnested-externs (C and Objective-C only)
Warn if an extern declaration is encountered within a function.
-Wno-inherited-variadic-ctor
Suppress warnings about use of C++11 inheriting constructors when the base
class inherited from has a C variadic constructor; the warning is on by default
because the ellipsis is not inherited.
-Winline Warn if a function that is declared as inline cannot be inlined. Even with this
option, the compiler does not warn about failures to inline functions declared
in system headers.
The compiler uses a variety of heuristics to determine whether or not to inline a
function. For example, the compiler takes into account the size of the function
being inlined and the amount of inlining that has already been done in the cur-
rent function. Therefore, seemingly insignificant changes in the source program
can cause the warnings produced by ‘-Winline’ to appear or disappear.
-Wno-invalid-offsetof (C++ and Objective-C++ only)
Suppress warnings from applying the offsetof macro to a non-POD type.
According to the 2014 ISO C++ standard, applying offsetof to a non-standard-
layout type is undefined. In existing C++ implementations, however, offsetof
typically gives meaningful results. This flag is for users who are aware that
they are writing nonportable code and who have deliberately chosen to ignore
the warning about it.
Chapter 3: GCC Command Options 99
mean both objects end up in the moved-from state. If the move assignment
operator is written to avoid moving from a moved-from object, this warning
can be disabled.
-Wvla Warn if a variable-length array is used in the code. ‘-Wno-vla’ prevents the
‘-Wpedantic’ warning of the variable-length array.
-Wvla-larger-than=n
If this option is used, the compiler will warn on uses of variable-length arrays
where the size is either unbounded, or bounded by an argument that can be
larger than n bytes. This is similar to how ‘-Walloca-larger-than=n’ works,
but with variable-length arrays.
Note that GCC may optimize small variable-length arrays of a known value
into plain arrays, so this warning may not get triggered for such arrays.
This warning is not enabled by ‘-Wall’, and is only active when ‘-ftree-vrp’
is active (default for ‘-O2’ and above).
See also ‘-Walloca-larger-than=n’.
-Wvolatile-register-var
Warn if a register variable is declared volatile. The volatile modifier does not
inhibit all optimizations that may eliminate reads and/or writes to register
variables. This warning is enabled by ‘-Wall’.
-Wdisabled-optimization
Warn if a requested optimization pass is disabled. This warning does not gen-
erally indicate that there is anything wrong with your code; it merely indicates
that GCC’s optimizers are unable to handle the code effectively. Often, the
problem is that your code is too big or too complex; GCC refuses to optimize
programs when the optimization itself is likely to take inordinate amounts of
time.
-Wpointer-sign (C and Objective-C only)
Warn for pointer argument passing or assignment with different signedness.
This option is only supported for C and Objective-C. It is implied by ‘-Wall’
and by ‘-Wpedantic’, which can be disabled with ‘-Wno-pointer-sign’.
-Wstack-protector
This option is only active when ‘-fstack-protector’ is active. It warns about
functions that are not protected against stack smashing.
-Woverlength-strings
Warn about string constants that are longer than the “minimum maximum”
length specified in the C standard. Modern compilers generally allow string
constants that are much longer than the standard’s minimum limit, but very
portable programs should avoid using longer strings.
The limit applies after string constant concatenation, and does not count the
trailing NUL. In C90, the limit was 509 characters; in C99, it was raised to
4095. C++98 does not specify a normative minimum maximum, so we do not
diagnose overlength strings in C++.
This option is implied by ‘-Wpedantic’, and can be disabled with
‘-Wno-overlength-strings’.
Chapter 3: GCC Command Options 101
‘-gdwarf’ does not accept a concatenated debug level, to avoid confusion with
‘-gdwarf-level’. Instead use an additional ‘-glevel’ option to change the
debug level for DWARF.
-feliminate-unused-debug-symbols
Produce debugging information in stabs format (if that is supported), for only
symbols that are actually used.
-femit-class-debug-always
Instead of emitting debugging information for a C++ class in only one object file,
emit it in all object files using the class. This option should be used only with
debuggers that are unable to handle the way GCC normally emits debugging
information for classes because using this option increases the size of debugging
information by as much as a factor of two.
-fno-merge-debug-strings
Direct the linker to not merge together strings in the debugging information
that are identical in different object files. Merging is not supported by all
assemblers or linkers. Merging decreases the size of the debug information in
the output file at the cost of increasing link processing time. Merging is enabled
by default.
-fdebug-prefix-map=old=new
When compiling files in directory ‘old’, record debugging information describing
them as in ‘new’ instead.
-fvar-tracking
Run variable tracking pass. It computes where variables are stored at each posi-
tion in code. Better debugging information is then generated (if the debugging
information format supports this information).
It is enabled by default when compiling with optimization (‘-Os’, ‘-O’, ‘-O2’,
. . . ), debugging information (‘-g’) and the debug info format supports it.
-fvar-tracking-assignments
Annotate assignments to user variables early in the compilation and attempt to
carry the annotations over throughout the compilation all the way to the end, in
an attempt to improve debug information while optimizing. Use of ‘-gdwarf-4’
is recommended along with it.
It can be enabled even if var-tracking is disabled, in which case annotations
are created and maintained, but discarded at the end. By default, this flag is
enabled together with ‘-fvar-tracking’, except when selective scheduling is
enabled.
-gsplit-dwarf
Separate as much DWARF debugging information as possible into a separate
output file with the extension ‘.dwo’. This option allows the build system to
avoid linking files with debug information. To be useful, this option requires a
debugger capable of reading ‘.dwo’ files.
-gpubnames
Generate DWARF .debug_pubnames and .debug_pubtypes sections.
104 Using the GNU Compiler Collection (GCC)
-ggnu-pubnames
Generate .debug_pubnames and .debug_pubtypes sections in a format suitable
for conversion into a GDB index. This option is only useful with a linker that
can produce GDB index version 7.
-fdebug-types-section
When using DWARF Version 4 or higher, type DIEs can be put into their own
.debug_types section instead of making them part of the .debug_info section.
It is more efficient to put them in a separate comdat sections since the linker
can then remove duplicates. But not all DWARF consumers support .debug_
types sections yet and on some objects .debug_types produces larger instead
of smaller debugging information.
-grecord-gcc-switches
-gno-record-gcc-switches
This switch causes the command-line options used to invoke the compiler that
may affect code generation to be appended to the DW AT producer attribute
in DWARF debugging information. The options are concatenated with spaces
separating them from each other and from the compiler version. It is enabled by
default. See also ‘-frecord-gcc-switches’ for another way of storing compiler
options into the object file.
-gstrict-dwarf
Disallow using extensions of later DWARF standard version than selected with
‘-gdwarf-version’. On most targets using non-conflicting DWARF extensions
from later standard versions is allowed.
-gno-strict-dwarf
Allow using extensions of later DWARF standard version than selected with
‘-gdwarf-version’.
-gcolumn-info
-gno-column-info
Emit location column information into DWARF debugging information, rather
than just file and line. This option is disabled by default.
-gz[=type]
Produce compressed debug sections in DWARF format, if that is supported. If
type is not given, the default type depends on the capabilities of the assembler
and linker used. type may be one of ‘none’ (don’t compress debug sections),
‘zlib’ (use zlib compression in ELF gABI format), or ‘zlib-gnu’ (use zlib
compression in traditional GNU format). If the linker doesn’t support writing
compressed debug sections, the option is rejected. Otherwise, if the assembler
does not support them, ‘-gz’ is silently ignored when producing object files.
-feliminate-dwarf2-dups
Compress DWARF debugging information by eliminating duplicated informa-
tion about each symbol. This option only makes sense when generating DWARF
debugging information.
Chapter 3: GCC Command Options 105
-femit-struct-debug-baseonly
Emit debug information for struct-like types only when the base name of the
compilation source file matches the base name of file in which the struct is
defined.
This option substantially reduces the size of debugging information,
but at significant potential loss in type information to the debugger.
See ‘-femit-struct-debug-reduced’ for a less aggressive option. See
‘-femit-struct-debug-detailed’ for more detailed control.
This option works only with DWARF debug output.
-femit-struct-debug-reduced
Emit debug information for struct-like types only when the base name of the
compilation source file matches the base name of file in which the type is defined,
unless the struct is a template or defined in a system header.
This option significantly reduces the size of debugging information,
with some potential loss in type information to the debugger. See
‘-femit-struct-debug-baseonly’ for a more aggressive option. See
‘-femit-struct-debug-detailed’ for more detailed control.
This option works only with DWARF debug output.
-femit-struct-debug-detailed[=spec-list]
Specify the struct-like types for which the compiler generates debug informa-
tion. The intent is to reduce duplicate struct debug information between dif-
ferent object files within the same program.
This option is a detailed version of ‘-femit-struct-debug-reduced’ and
‘-femit-struct-debug-baseonly’, which serves for most needs.
A specification has the syntax
[‘dir:’|‘ind:’][‘ord:’|‘gen:’](‘any’|‘sys’|‘base’|‘none’)
The optional first word limits the specification to structs that are used directly
(‘dir:’) or used indirectly (‘ind:’). A struct type is used directly when it is
the type of a variable, member. Indirect uses arise through pointers to structs.
That is, when use of an incomplete struct is valid, the use is indirect. An
example is ‘struct one direct; struct two * indirect;’.
The optional second word limits the specification to ordinary structs (‘ord:’) or
generic structs (‘gen:’). Generic structs are a bit complicated to explain. For
C++, these are non-explicit specializations of template classes, or non-template
classes within the above. Other programming languages have generics, but
‘-femit-struct-debug-detailed’ does not yet implement them.
The third word specifies the source files for those structs for which the compiler
should emit debug information. The values ‘none’ and ‘any’ have the normal
meaning. The value ‘base’ means that the base of name of the file in which
the type declaration appears must match the base of the name of the main
compilation file. In practice, this means that when compiling ‘foo.c’, debug
information is generated for types declared in that file and ‘foo.h’, but not other
header files. The value ‘sys’ means those types satisfying ‘base’ or declared in
system or compiler headers.
106 Using the GNU Compiler Collection (GCC)
You may need to experiment to determine the best settings for your application.
The default is ‘-femit-struct-debug-detailed=all’.
This option works only with DWARF debug output.
-fno-dwarf2-cfi-asm
Emit DWARF unwind info as compiler generated .eh_frame section instead of
using GAS .cfi_* directives.
-fno-eliminate-unused-debug-types
Normally, when producing DWARF output, GCC avoids producing debug sym-
bol output for types that are nowhere used in the source file being compiled.
Sometimes it is useful to have GCC emit debugging information for all types
declared in a compilation unit, regardless of whether or not they are actually
used in that compilation unit, for example if, in the debugger, you want to cast
a value to a type that is not actually used in your program (but is declared).
More often, however, this results in a significant amount of wasted space.
-fauto-inc-dec
-fbranch-count-reg
-fcombine-stack-adjustments
-fcompare-elim
-fcprop-registers
-fdce
-fdefer-pop
-fdelayed-branch
-fdse
-fforward-propagate
-fguess-branch-probability
-fif-conversion2
-fif-conversion
-finline-functions-called-once
-fipa-pure-const
-fipa-profile
-fipa-reference
-fmerge-constants
-fmove-loop-invariants
-freorder-blocks
-fshrink-wrap
-fshrink-wrap-separate
-fsplit-wide-types
-fssa-backprop
-fssa-phiopt
-ftree-bit-ccp
-ftree-ccp
-ftree-ch
-ftree-coalesce-vars
-ftree-copy-prop
-ftree-dce
-ftree-dominator-opts
-ftree-dse
-ftree-forwprop
-ftree-fre
-ftree-phiprop
-ftree-sink
-ftree-slsr
-ftree-sra
-ftree-pta
-ftree-ter
-funit-at-a-time
‘-O’ also turns on ‘-fomit-frame-pointer’ on machines where doing so does
not interfere with debugging.
-O2 Optimize even more. GCC performs nearly all supported optimizations that do
not involve a space-speed tradeoff. As compared to ‘-O’, this option increases
both compilation time and the performance of the generated code.
‘-O2’ turns on all optimization flags specified by ‘-O’. It also turns on the
following optimization flags:
-fthread-jumps
-falign-functions -falign-jumps
-falign-loops -falign-labels
-fcaller-saves
-fcrossjumping
-fcse-follow-jumps -fcse-skip-blocks
-fdelete-null-pointer-checks
108 Using the GNU Compiler Collection (GCC)
-fdevirtualize -fdevirtualize-speculatively
-fexpensive-optimizations
-fgcse -fgcse-lm
-fhoist-adjacent-loads
-finline-small-functions
-findirect-inlining
-fipa-cp
-fipa-bit-cp
-fipa-vrp
-fipa-sra
-fipa-icf
-fisolate-erroneous-paths-dereference
-flra-remat
-foptimize-sibling-calls
-foptimize-strlen
-fpartial-inlining
-fpeephole2
-freorder-blocks-algorithm=stc
-freorder-blocks-and-partition -freorder-functions
-frerun-cse-after-loop
-fsched-interblock -fsched-spec
-fschedule-insns -fschedule-insns2
-fstore-merging
-fstrict-aliasing -fstrict-overflow
-ftree-builtin-call-dce
-ftree-switch-conversion -ftree-tail-merge
-fcode-hoisting
-ftree-pre
-ftree-vrp
-fipa-ra
Please note the warning under ‘-fgcse’ about invoking ‘-O2’ on programs that
use computed gotos.
-O3 Optimize yet more. ‘-O3’ turns on all optimizations spec-
ified by ‘-O2’ and also turns on the ‘-finline-functions’,
‘-funswitch-loops’, ‘-fpredictive-commoning’, ‘-fgcse-after-reload’,
‘-ftree-loop-vectorize’, ‘-ftree-loop-distribute-patterns’,
‘-fsplit-paths’ ‘-ftree-slp-vectorize’, ‘-fvect-cost-model’,
‘-ftree-partial-pre’, ‘-fpeel-loops’ and ‘-fipa-cp-clone’ options.
-O0 Reduce compilation time and make debugging produce the expected results.
This is the default.
-Os Optimize for size. ‘-Os’ enables all ‘-O2’ optimizations that do not typically
increase code size.
‘-Os’ disables the following optimization flags:
-falign-functions -falign-jumps -falign-loops
-falign-labels -fprefetch-loop-arrays
It also enables ‘-finline-functions’, causes the compiler to tune for code
size rather than execution speed, and performs further optimizations designed
to reduce code size.
-Ofast Disregard strict standards compliance. ‘-Ofast’ enables all ‘-O3’
optimizations. It also enables optimizations that are not valid for all standard-
Chapter 3: GCC Command Options 109
The default setting (when not optimizing for size) for 32-bit GNU/Linux x86
and 32-bit Darwin x86 targets is ‘-fomit-frame-pointer’. You can config-
ure GCC with the ‘--enable-frame-pointer’ configure option to change the
default.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-foptimize-sibling-calls
Optimize sibling and tail recursive calls.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-foptimize-strlen
Optimize various standard C string functions (e.g. strlen, strchr or strcpy)
and their _FORTIFY_SOURCE counterparts into faster alternatives.
Enabled at levels ‘-O2’, ‘-O3’.
-fno-inline
Do not expand any functions inline apart from those marked with the always_
inline attribute. This is the default when not optimizing.
Single functions can be exempted from inlining by marking them with the
noinline attribute.
-finline-small-functions
Integrate functions into their callers when their body is smaller than expected
function call code (so overall size of program gets smaller). The compiler heuris-
tically decides which functions are simple enough to be worth integrating in this
way. This inlining applies to all functions, even those not declared inline.
Enabled at level ‘-O2’, ‘-O3’, ‘-Os’.
-findirect-inlining
Inline also indirect calls that are discovered to be known at compile time thanks
to previous inlining. This option has any effect only when inlining itself is turned
on by the ‘-finline-functions’ or ‘-finline-small-functions’ options.
Enabled at level ‘-O2’, ‘-O3’, ‘-Os’.
-finline-functions
Consider all functions for inlining, even if they are not declared inline. The
compiler heuristically decides which functions are worth integrating in this way.
If all calls to a given function are integrated, and the function is declared
static, then the function is normally not output as assembler code in its own
right.
Enabled at levels ‘-O3’, ‘-Os’. Also enabled by ‘-fprofile-use’ and
‘-fauto-profile’.
-finline-functions-called-once
Consider all static functions called once for inlining into their caller even if
they are not marked inline. If a call to a given function is integrated, then
the function is not output as assembler code in its own right.
Enabled at levels ‘-O1’, ‘-O2’, ‘-O3’ and ‘-Os’.
Chapter 3: GCC Command Options 111
-fearly-inlining
Inline functions marked by always_inline and functions whose body
seems smaller than the function call overhead early before doing
‘-fprofile-generate’ instrumentation and real inlining pass. Doing so makes
profiling significantly cheaper and usually inlining faster on programs having
large chains of nested wrapper functions.
Enabled by default.
-fipa-sra
Perform interprocedural scalar replacement of aggregates, removal of unused
parameters and replacement of parameters passed by reference by parameters
passed by value.
Enabled at levels ‘-O2’, ‘-O3’ and ‘-Os’.
-finline-limit=n
By default, GCC limits the size of functions that can be inlined. This flag
allows coarse control of this limit. n is the size of functions that can be inlined
in number of pseudo instructions.
Inlining is actually controlled by a number of parameters, which may be spec-
ified individually by using ‘--param name=value’. The ‘-finline-limit=n’
option sets some of these parameters as follows:
max-inline-insns-single
is set to n/2.
max-inline-insns-auto
is set to n/2.
See below for a documentation of the individual parameters controlling inlining
and for the defaults of these parameters.
Note: there may be no value to ‘-finline-limit’ that results in default be-
havior.
Note: pseudo instruction represents, in this particular context, an abstract
measurement of function’s size. In no way does it represent a count of assembly
instructions and as such its exact meaning might change from one release to an
another.
-fno-keep-inline-dllexport
This is a more fine-grained version of ‘-fkeep-inline-functions’, which ap-
plies only to functions that are declared using the dllexport attribute or de-
clspec. See Section 6.31 [Declaring Attributes of Functions], page 429.
-fkeep-inline-functions
In C, emit static functions that are declared inline into the object file, even
if the function has been inlined into all of its callers. This switch does not affect
functions using the extern inline extension in GNU C90. In C++, emit any
and all inline functions into the object file.
-fkeep-static-functions
Emit static functions into the object file, even if the function is never used.
112 Using the GNU Compiler Collection (GCC)
-fkeep-static-consts
Emit variables declared static const when optimization isn’t turned on, even
if the variables aren’t referenced.
GCC enables this option by default. If you want to force the compiler to check
if a variable is referenced, regardless of whether or not optimization is turned
on, use the ‘-fno-keep-static-consts’ option.
-fmerge-constants
Attempt to merge identical constants (string constants and floating-point con-
stants) across compilation units.
This option is the default for optimized compilation if the assembler and linker
support it. Use ‘-fno-merge-constants’ to inhibit this behavior.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fmerge-all-constants
Attempt to merge identical constants and identical variables.
This option implies ‘-fmerge-constants’. In addition to ‘-fmerge-constants’
this considers e.g. even constant initialized arrays or initialized constant vari-
ables with integral or floating-point types. Languages like C or C++ require each
variable, including multiple instances of the same variable in recursive calls, to
have distinct locations, so using this option results in non-conforming behavior.
-fmodulo-sched
Perform swing modulo scheduling immediately before the first scheduling pass.
This pass looks at innermost loops and reorders their instructions by overlap-
ping different iterations.
-fmodulo-sched-allow-regmoves
Perform more aggressive SMS-based modulo scheduling with register moves
allowed. By setting this flag certain anti-dependences edges are deleted, which
triggers the generation of reg-moves based on the life-range analysis. This
option is effective only with ‘-fmodulo-sched’ enabled.
-fno-branch-count-reg
Avoid running a pass scanning for opportunities to use “decrement and branch”
instructions on a count register instead of generating sequences of instructions
that decrement a register, compare it against zero, and then branch based upon
the result. This option is only meaningful on architectures that support such
instructions, which include x86, PowerPC, IA-64 and S/390. Note that the
‘-fno-branch-count-reg’ option doesn’t remove the decrement and branch
instructions from the generated instruction stream introduced by other opti-
mization passes.
Enabled by default at ‘-O1’ and higher.
The default is ‘-fbranch-count-reg’.
-fno-function-cse
Do not put function addresses in registers; make each instruction that calls a
constant function contain the function’s address explicitly.
Chapter 3: GCC Command Options 113
This option results in less efficient code, but some strange hacks that alter the
assembler output may be confused by the optimizations performed when this
option is not used.
The default is ‘-ffunction-cse’
-fno-zero-initialized-in-bss
If the target supports a BSS section, GCC by default puts variables that are
initialized to zero into BSS. This can save space in the resulting code.
This option turns off this behavior because some programs explicitly rely on
variables going to the data section—e.g., so that the resulting executable can
find the beginning of that section and/or make assumptions based on that.
The default is ‘-fzero-initialized-in-bss’.
-fthread-jumps
Perform optimizations that check to see if a jump branches to a location where
another comparison subsumed by the first is found. If so, the first branch is
redirected to either the destination of the second branch or a point immediately
following it, depending on whether the condition is known to be true or false.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fsplit-wide-types
When using a type that occupies multiple registers, such as long long on a
32-bit system, split the registers apart and allocate them independently. This
normally generates better code for those types, but may make debugging more
difficult.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fcse-follow-jumps
In common subexpression elimination (CSE), scan through jump instructions
when the target of the jump is not reached by any other path. For example,
when CSE encounters an if statement with an else clause, CSE follows the
jump when the condition tested is false.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fcse-skip-blocks
This is similar to ‘-fcse-follow-jumps’, but causes CSE to follow jumps that
conditionally skip over blocks. When CSE encounters a simple if statement
with no else clause, ‘-fcse-skip-blocks’ causes CSE to follow the jump around
the body of the if.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-frerun-cse-after-loop
Re-run common subexpression elimination after loop optimizations are per-
formed.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fgcse Perform a global common subexpression elimination pass. This pass also per-
forms global constant and copy propagation.
114 Using the GNU Compiler Collection (GCC)
-fauto-inc-dec
Combine increments or decrements of addresses with memory accesses. This
pass is always skipped on architectures that do not have instructions to support
this. Enabled by default at ‘-O’ and higher on architectures that support this.
-fdce Perform dead code elimination (DCE) on RTL. Enabled by default at ‘-O’ and
higher.
-fdse Perform dead store elimination (DSE) on RTL. Enabled by default at ‘-O’ and
higher.
-fif-conversion
Attempt to transform conditional jumps into branch-less equivalents. This
includes use of conditional moves, min, max, set flags and abs instructions, and
some tricks doable by standard arithmetics. The use of conditional execution
on chips where it is available is controlled by ‘-fif-conversion2’.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fif-conversion2
Use conditional execution (where available) to transform conditional jumps into
branch-less equivalents.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fdeclone-ctor-dtor
The C++ ABI requires multiple entry points for constructors and destructors:
one for a base subobject, one for a complete object, and one for a virtual
destructor that calls operator delete afterwards. For a hierarchy with virtual
bases, the base and complete variants are clones, which means two copies of the
function. With this option, the base and complete variants are changed to be
thunks that call a common implementation.
Enabled by ‘-Os’.
-fdelete-null-pointer-checks
Assume that programs cannot safely dereference null pointers, and that no code
or data element resides at address zero. This option enables simple constant
folding optimizations at all optimization levels. In addition, other optimization
passes in GCC use this flag to control global dataflow analyses that eliminate
useless checks for null pointers; these assume that a memory access to address
zero always results in a trap, so that if a pointer is checked after it has already
been dereferenced, it cannot be null.
Note however that in some environments this assumption is not true.
Use ‘-fno-delete-null-pointer-checks’ to disable this optimization for
programs that depend on that behavior.
This option is enabled by default on most targets. On Nios II ELF, it defaults
to off. On AVR and CR16, this option is completely disabled.
Passes that use the dataflow information are enabled independently at different
optimization levels.
116 Using the GNU Compiler Collection (GCC)
-fdevirtualize
Attempt to convert calls to virtual functions to direct calls. This is
done both within a procedure and interprocedurally as part of indirect
inlining (‘-findirect-inlining’) and interprocedural constant propagation
(‘-fipa-cp’). Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fdevirtualize-speculatively
Attempt to convert calls to virtual functions to speculative direct calls. Based
on the analysis of the type inheritance graph, determine for a given call the
set of likely targets. If the set is small, preferably of size 1, change the call
into a conditional deciding between direct and indirect calls. The speculative
calls enable more optimizations, such as inlining. When they seem useless after
further optimization, they are converted back into original form.
-fdevirtualize-at-ltrans
Stream extra information needed for aggressive devirtualization when running
the link-time optimizer in local transformation mode. This option enables more
devirtualization but significantly increases the size of streamed data. For this
reason it is disabled by default.
-fexpensive-optimizations
Perform a number of minor optimizations that are relatively expensive.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-free Attempt to remove redundant extension instructions. This is especially helpful
for the x86-64 architecture, which implicitly zero-extends in 64-bit registers
after writing to their lower 32-bit half.
Enabled for Alpha, AArch64 and x86 at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fno-lifetime-dse
In C++ the value of an object is only affected by changes within its lifetime:
when the constructor begins, the object has an indeterminate value, and any
changes during the lifetime of the object are dead when the object is de-
stroyed. Normally dead store elimination will take advantage of this; if your
code relies on the value of the object storage persisting beyond the lifetime
of the object, you can use this flag to disable this optimization. To pre-
serve stores before the constructor starts (e.g. because your operator new
clears the object storage) but still treat the object as dead after the destruc-
tor you, can use ‘-flifetime-dse=1’. The default behavior can be explic-
itly selected with ‘-flifetime-dse=2’. ‘-flifetime-dse=0’ is equivalent to
‘-fno-lifetime-dse’.
-flive-range-shrinkage
Attempt to decrease register pressure through register live range shrinkage.
This is helpful for fast processors with small or moderate size register sets.
-fira-algorithm=algorithm
Use the specified coloring algorithm for the integrated register allocator. The
algorithm argument can be ‘priority’, which specifies Chow’s priority coloring,
or ‘CB’, which specifies Chaitin-Briggs coloring. Chaitin-Briggs coloring is not
Chapter 3: GCC Command Options 117
implemented for all architectures, but for those targets that do support it, it is
the default because it generates better code.
-fira-region=region
Use specified regions for the integrated register allocator. The region argument
should be one of the following:
‘all’ Use all loops as register allocation regions. This can give the best
results for machines with a small and/or irregular register set.
‘mixed’ Use all loops except for loops with small register pressure as the
regions. This value usually gives the best results in most cases and
for most architectures, and is enabled by default when compiling
with optimization for speed (‘-O’, ‘-O2’, . . . ).
‘one’ Use all functions as a single region. This typically results in the
smallest code size, and is enabled by default for ‘-Os’ or ‘-O0’.
-fira-hoist-pressure
Use IRA to evaluate register pressure in the code hoisting pass for decisions to
hoist expressions. This option usually results in smaller code, but it can slow
the compiler down.
This option is enabled at level ‘-Os’ for all targets.
-fira-loop-pressure
Use IRA to evaluate register pressure in loops for decisions to move loop in-
variants. This option usually results in generation of faster and smaller code on
machines with large register files (>= 32 registers), but it can slow the compiler
down.
This option is enabled at level ‘-O3’ for some targets.
-fno-ira-share-save-slots
Disable sharing of stack slots used for saving call-used hard registers living
through a call. Each hard register gets a separate stack slot, and as a result
function stack frames are larger.
-fno-ira-share-spill-slots
Disable sharing of stack slots allocated for pseudo-registers. Each pseudo-
register that does not get a hard register gets a separate stack slot, and as
a result function stack frames are larger.
-flra-remat
Enable CFG-sensitive rematerialization in LRA. Instead of loading values of
spilled pseudos, LRA tries to rematerialize (recalculate) values if it is profitable.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fdelayed-branch
If supported for the target machine, attempt to reorder instructions to exploit
instruction slots available after delayed branch instructions.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
118 Using the GNU Compiler Collection (GCC)
-fschedule-insns
If supported for the target machine, attempt to reorder instructions to eliminate
execution stalls due to required data being unavailable. This helps machines
that have slow floating point or memory load instructions by allowing other
instructions to be issued until the result of the load or floating-point instruction
is required.
Enabled at levels ‘-O2’, ‘-O3’.
-fschedule-insns2
Similar to ‘-fschedule-insns’, but requests an additional pass of instruction
scheduling after register allocation has been done. This is especially useful on
machines with a relatively small number of registers and where memory load
instructions take more than one cycle.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fno-sched-interblock
Don’t schedule instructions across basic blocks. This is normally enabled by
default when scheduling before register allocation, i.e. with ‘-fschedule-insns’
or at ‘-O2’ or higher.
-fno-sched-spec
Don’t allow speculative motion of non-load instructions. This is normally
enabled by default when scheduling before register allocation, i.e. with
‘-fschedule-insns’ or at ‘-O2’ or higher.
-fsched-pressure
Enable register pressure sensitive insn scheduling before register allocation.
This only makes sense when scheduling before register allocation is enabled,
i.e. with ‘-fschedule-insns’ or at ‘-O2’ or higher. Usage of this option can
improve the generated code and decrease its size by preventing register pressure
increase above the number of available hard registers and subsequent spills in
register allocation.
-fsched-spec-load
Allow speculative motion of some load instructions. This only makes sense
when scheduling before register allocation, i.e. with ‘-fschedule-insns’ or at
‘-O2’ or higher.
-fsched-spec-load-dangerous
Allow speculative motion of more load instructions. This only makes sense
when scheduling before register allocation, i.e. with ‘-fschedule-insns’ or at
‘-O2’ or higher.
-fsched-stalled-insns
-fsched-stalled-insns=n
Define how many insns (if any) can be moved prematurely from the queue
of stalled insns into the ready list during the second scheduling pass.
‘-fno-sched-stalled-insns’ means that no insns are moved prematurely,
‘-fsched-stalled-insns=0’ means there is no limit on how many queued
insns can be moved prematurely. ‘-fsched-stalled-insns’ without a value
is equivalent to ‘-fsched-stalled-insns=1’.
Chapter 3: GCC Command Options 119
-fsched-stalled-insns-dep
-fsched-stalled-insns-dep=n
Define how many insn groups (cycles) are examined for a depen-
dency on a stalled insn that is a candidate for premature removal
from the queue of stalled insns. This has an effect only during
the second scheduling pass, and only if ‘-fsched-stalled-insns’
is used. ‘-fno-sched-stalled-insns-dep’ is equivalent to
‘-fsched-stalled-insns-dep=0’. ‘-fsched-stalled-insns-dep’
without a value is equivalent to ‘-fsched-stalled-insns-dep=1’.
-fsched2-use-superblocks
When scheduling after register allocation, use superblock scheduling. This al-
lows motion across basic block boundaries, resulting in faster schedules. This
option is experimental, as not all machine descriptions used by GCC model the
CPU closely enough to avoid unreliable results from the algorithm.
This only makes sense when scheduling after register allocation, i.e. with
‘-fschedule-insns2’ or at ‘-O2’ or higher.
-fsched-group-heuristic
Enable the group heuristic in the scheduler. This heuristic favors the instruction
that belongs to a schedule group. This is enabled by default when scheduling
is enabled, i.e. with ‘-fschedule-insns’ or ‘-fschedule-insns2’ or at ‘-O2’
or higher.
-fsched-critical-path-heuristic
Enable the critical-path heuristic in the scheduler. This heuristic favors in-
structions on the critical path. This is enabled by default when scheduling is
enabled, i.e. with ‘-fschedule-insns’ or ‘-fschedule-insns2’ or at ‘-O2’ or
higher.
-fsched-spec-insn-heuristic
Enable the speculative instruction heuristic in the scheduler. This heuristic
favors speculative instructions with greater dependency weakness. This is en-
abled by default when scheduling is enabled, i.e. with ‘-fschedule-insns’ or
‘-fschedule-insns2’ or at ‘-O2’ or higher.
-fsched-rank-heuristic
Enable the rank heuristic in the scheduler. This heuristic favors the instruc-
tion belonging to a basic block with greater size or frequency. This is en-
abled by default when scheduling is enabled, i.e. with ‘-fschedule-insns’ or
‘-fschedule-insns2’ or at ‘-O2’ or higher.
-fsched-last-insn-heuristic
Enable the last-instruction heuristic in the scheduler. This heuristic favors the
instruction that is less dependent on the last instruction scheduled. This is
enabled by default when scheduling is enabled, i.e. with ‘-fschedule-insns’
or ‘-fschedule-insns2’ or at ‘-O2’ or higher.
-fsched-dep-count-heuristic
Enable the dependent-count heuristic in the scheduler. This heuristic favors
the instruction that has more instructions depending on it. This is enabled
120 Using the GNU Compiler Collection (GCC)
-freschedule-modulo-scheduled-loops
Modulo scheduling is performed before traditional scheduling. If a loop is mod-
ulo scheduled, later scheduling passes may change its schedule. Use this option
to control that behavior.
-fselective-scheduling
Schedule instructions using selective scheduling algorithm. Selective scheduling
runs instead of the first scheduler pass.
-fselective-scheduling2
Schedule instructions using selective scheduling algorithm. Selective scheduling
runs instead of the second scheduler pass.
-fsel-sched-pipelining
Enable software pipelining of innermost loops during selective scheduling.
This option has no effect unless one of ‘-fselective-scheduling’ or
‘-fselective-scheduling2’ is turned on.
-fsel-sched-pipelining-outer-loops
When pipelining loops during selective scheduling, also pipeline outer loops.
This option has no effect unless ‘-fsel-sched-pipelining’ is turned on.
-fsemantic-interposition
Some object formats, like ELF, allow interposing of symbols by the dynamic
linker. This means that for symbols exported from the DSO, the compiler can-
not perform interprocedural propagation, inlining and other optimizations in
anticipation that the function or variable in question may change. While this
feature is useful, for example, to rewrite memory allocation functions by a de-
bugging implementation, it is expensive in the terms of code quality. With
‘-fno-semantic-interposition’ the compiler assumes that if interposition
happens for functions the overwriting function will have precisely the same
semantics (and side effects). Similarly if interposition happens for variables,
the constructor of the variable will be the same. The flag has no effect for
functions explicitly declared inline (where it is never allowed for interposition
to change semantics) and for symbols explicitly declared weak.
-fshrink-wrap
Emit function prologues only before parts of the function that need it, rather
than at the top of the function. This flag is enabled by default at ‘-O’ and
higher.
-fshrink-wrap-separate
Shrink-wrap separate parts of the prologue and epilogue separately, so that
those parts are only executed when needed. This option is on by default, but
has no effect unless ‘-fshrink-wrap’ is also turned on and the target supports
this.
Chapter 3: GCC Command Options 121
-fcaller-saves
Enable allocation of values to registers that are clobbered by function calls, by
emitting extra instructions to save and restore the registers around such calls.
Such allocation is done only when it seems to result in better code.
This option is always enabled by default on certain machines, usually those
which have no call-preserved registers to use instead.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fcombine-stack-adjustments
Tracks stack adjustments (pushes and pops) and stack memory references and
then tries to find ways to combine them.
Enabled by default at ‘-O1’ and higher.
-fipa-ra Use caller save registers for allocation if those registers are not used by any called
function. In that case it is not necessary to save and restore them around calls.
This is only possible if called functions are part of same compilation unit as
current function and they are compiled before it.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’, however the option is disabled if generated
code will be instrumented for profiling (‘-p’, or ‘-pg’) or if callee’s register usage
cannot be known exactly (this happens on targets that do not expose prologues
and epilogues in RTL).
-fconserve-stack
Attempt to minimize stack usage. The compiler attempts to use less stack
space, even if that makes the program slower. This option implies setting the
‘large-stack-frame’ parameter to 100 and the ‘large-stack-frame-growth’
parameter to 400.
-ftree-reassoc
Perform reassociation on trees. This flag is enabled by default at ‘-O’ and
higher.
-fcode-hoisting
Perform code hoisting. Code hoisting tries to move the evaluation of expressions
executed on all paths to the function exit as early as possible. This is especially
useful as a code size optimization, but it often helps for code speed as well.
This flag is enabled by default at ‘-O2’ and higher.
-ftree-pre
Perform partial redundancy elimination (PRE) on trees. This flag is enabled
by default at ‘-O2’ and ‘-O3’.
-ftree-partial-pre
Make partial redundancy elimination (PRE) more aggressive. This flag is en-
abled by default at ‘-O3’.
-ftree-forwprop
Perform forward propagation on trees. This flag is enabled by default at ‘-O’
and higher.
122 Using the GNU Compiler Collection (GCC)
-ftree-fre
Perform full redundancy elimination (FRE) on trees. The difference between
FRE and PRE is that FRE only considers expressions that are computed on
all paths leading to the redundant computation. This analysis is faster than
PRE, though it exposes fewer redundancies. This flag is enabled by default at
‘-O’ and higher.
-ftree-phiprop
Perform hoisting of loads from conditional pointers on trees. This pass is en-
abled by default at ‘-O’ and higher.
-fhoist-adjacent-loads
Speculatively hoist loads from both branches of an if-then-else if the loads are
from adjacent locations in the same structure and the target architecture has
a conditional move instruction. This flag is enabled by default at ‘-O2’ and
higher.
-ftree-copy-prop
Perform copy propagation on trees. This pass eliminates unnecessary copy
operations. This flag is enabled by default at ‘-O’ and higher.
-fipa-pure-const
Discover which functions are pure or constant. Enabled by default at ‘-O’ and
higher.
-fipa-reference
Discover which static variables do not escape the compilation unit. Enabled by
default at ‘-O’ and higher.
-fipa-pta
Perform interprocedural pointer analysis and interprocedural modification and
reference analysis. This option can cause excessive memory and compile-time
usage on large compilation units. It is not enabled by default at any optimiza-
tion level.
-fipa-profile
Perform interprocedural profile propagation. The functions called only from
cold functions are marked as cold. Also functions executed once (such as cold,
noreturn, static constructors or destructors) are identified. Cold functions and
loop less parts of functions executed once are then optimized for size. Enabled
by default at ‘-O’ and higher.
-fipa-cp Perform interprocedural constant propagation. This optimization analyzes the
program to determine when values passed to functions are constants and then
optimizes accordingly. This optimization can substantially increase perfor-
mance if the application has constants passed to functions. This flag is enabled
by default at ‘-O2’, ‘-Os’ and ‘-O3’.
-fipa-cp-clone
Perform function cloning to make interprocedural constant propagation
stronger. When enabled, interprocedural constant propagation performs
function cloning when externally visible function can be called with constant
Chapter 3: GCC Command Options 123
-fssa-backprop
Propagate information about uses of a value up the definition chain in order to
simplify the definitions. For example, this pass strips sign operations if the sign
of a value never matters. The flag is enabled by default at ‘-O’ and higher.
-fssa-phiopt
Perform pattern matching on SSA PHI nodes to optimize conditional code.
This pass is enabled by default at ‘-O’ and higher.
-ftree-switch-conversion
Perform conversion of simple initializations in a switch to initializations from a
scalar array. This flag is enabled by default at ‘-O2’ and higher.
-ftree-tail-merge
Look for identical code sequences. When found, replace one with a jump
to the other. This optimization is known as tail merging or cross jumping.
This flag is enabled by default at ‘-O2’ and higher. The compilation time in
this pass can be limited using ‘max-tail-merge-comparisons’ parameter and
‘max-tail-merge-iterations’ parameter.
-ftree-dce
Perform dead code elimination (DCE) on trees. This flag is enabled by default
at ‘-O’ and higher.
-ftree-builtin-call-dce
Perform conditional dead code elimination (DCE) for calls to built-in functions
that may set errno but are otherwise side-effect free. This flag is enabled by
default at ‘-O2’ and higher if ‘-Os’ is not also specified.
-ftree-dominator-opts
Perform a variety of simple scalar cleanups (constant/copy propagation, redun-
dancy elimination, range propagation and expression simplification) based on a
dominator tree traversal. This also performs jump threading (to reduce jumps
to jumps). This flag is enabled by default at ‘-O’ and higher.
-ftree-dse
Perform dead store elimination (DSE) on trees. A dead store is a store into a
memory location that is later overwritten by another store without any inter-
vening loads. In this case the earlier store can be deleted. This flag is enabled
by default at ‘-O’ and higher.
-ftree-ch
Perform loop header copying on trees. This is beneficial since it increases ef-
fectiveness of code motion optimizations. It also saves one jump. This flag is
enabled by default at ‘-O’ and higher. It is not enabled for ‘-Os’, since it usually
increases code size.
-ftree-loop-optimize
Perform loop optimizations on trees. This flag is enabled by default at ‘-O’ and
higher.
Chapter 3: GCC Command Options 125
-ftree-loop-linear
-floop-interchange
-floop-strip-mine
-floop-block
-floop-unroll-and-jam
Perform loop nest optimizations. Same as ‘-floop-nest-optimize’. To use
this code transformation, GCC has to be configured with ‘--with-isl’ to en-
able the Graphite loop transformation infrastructure.
-fgraphite-identity
Enable the identity transformation for graphite. For every SCoP we gener-
ate the polyhedral representation and transform it back to gimple. Using
‘-fgraphite-identity’ we can check the costs or benefits of the GIMPLE
-> GRAPHITE -> GIMPLE transformation. Some minimal optimizations are
also performed by the code generator isl, like index splitting and dead code
elimination in loops.
-floop-nest-optimize
Enable the isl based loop nest optimizer. This is a generic loop nest optimizer
based on the Pluto optimization algorithms. It calculates a loop structure
optimized for data-locality and parallelism. This option is experimental.
-floop-parallelize-all
Use the Graphite data dependence analysis to identify loops that can be paral-
lelized. Parallelize all the loops that can be analyzed to not contain loop carried
dependences without checking that it is profitable to parallelize the loops.
-ftree-coalesce-vars
While transforming the program out of the SSA representation, attempt to
reduce copying by coalescing versions of different user-defined variables, instead
of just compiler temporaries. This may severely limit the ability to debug an
optimized program compiled with ‘-fno-var-tracking-assignments’. In the
negated form, this flag prevents SSA coalescing of user variables. This option is
enabled by default if optimization is enabled, and it does very little otherwise.
-ftree-loop-if-convert
Attempt to transform conditional jumps in the innermost loops to branch-less
equivalents. The intent is to remove control-flow from the innermost loops in
order to improve the ability of the vectorization pass to handle these loops.
This is enabled by default if vectorization is enabled.
-ftree-loop-distribution
Perform loop distribution. This flag can improve cache performance on big loop
bodies and allow further loop optimizations, like parallelization or vectorization,
to take place. For example, the loop
DO I = 1, N
A(I) = B(I) + C
D(I) = E(I) * F
ENDDO
is transformed to
126 Using the GNU Compiler Collection (GCC)
DO I = 1, N
A(I) = B(I) + C
ENDDO
DO I = 1, N
D(I) = E(I) * F
ENDDO
-ftree-loop-distribute-patterns
Perform loop distribution of patterns that can be code generated with calls to
a library. This flag is enabled by default at ‘-O3’.
This pass distributes the initialization loops and generates a call to memset
zero. For example, the loop
DO I = 1, N
A(I) = 0
B(I) = A(I) + I
ENDDO
is transformed to
DO I = 1, N
A(I) = 0
ENDDO
DO I = 1, N
B(I) = A(I) + I
ENDDO
and the initialization loop is transformed into a call to memset zero.
-ftree-loop-im
Perform loop invariant motion on trees. This pass moves only invariants that
are hard to handle at RTL level (function calls, operations that expand to non-
trivial sequences of insns). With ‘-funswitch-loops’ it also moves operands
of conditions that are invariant out of the loop, so that we can use just trivial
invariantness analysis in loop unswitching. The pass also includes store motion.
-ftree-loop-ivcanon
Create a canonical counter for number of iterations in loops for which deter-
mining number of iterations requires complicated analysis. Later optimizations
then may determine the number easily. Useful especially in connection with
unrolling.
-fivopts Perform induction variable optimizations (strength reduction, induction vari-
able merging and induction variable elimination) on trees.
-ftree-parallelize-loops=n
Parallelize loops, i.e., split their iteration space to run in n threads. This is
only possible for loops whose iterations are independent and can be arbitrarily
reordered. The optimization is only profitable on multiprocessor machines, for
loops that are CPU-intensive, rather than constrained e.g. by memory band-
width. This option implies ‘-pthread’, and thus is only supported on targets
that have support for ‘-pthread’.
-ftree-pta
Perform function-local points-to analysis on trees. This flag is enabled by de-
fault at ‘-O’ and higher.
Chapter 3: GCC Command Options 127
-ftree-sra
Perform scalar replacement of aggregates. This pass replaces structure refer-
ences with scalars to prevent committing structures to memory too early. This
flag is enabled by default at ‘-O’ and higher.
-fstore-merging
Perform merging of narrow stores to consecutive memory addresses. This pass
merges contiguous stores of immediate values narrower than a word into fewer
wider stores to reduce the number of instructions. This is enabled by default
at ‘-O2’ and higher as well as ‘-Os’.
-ftree-ter
Perform temporary expression replacement during the SSA->normal phase. Sin-
gle use/single def temporaries are replaced at their use location with their defin-
ing expression. This results in non-GIMPLE code, but gives the expanders
much more complex trees to work on resulting in better RTL generation. This
is enabled by default at ‘-O’ and higher.
-ftree-slsr
Perform straight-line strength reduction on trees. This recognizes related ex-
pressions involving multiplications and replaces them by less expensive calcu-
lations when possible. This is enabled by default at ‘-O’ and higher.
-ftree-vectorize
Perform vectorization on trees. This flag enables ‘-ftree-loop-vectorize’
and ‘-ftree-slp-vectorize’ if not explicitly specified.
-ftree-loop-vectorize
Perform loop vectorization on trees. This flag is enabled by default at ‘-O3’
and when ‘-ftree-vectorize’ is enabled.
-ftree-slp-vectorize
Perform basic block vectorization on trees. This flag is enabled by default at
‘-O3’ and when ‘-ftree-vectorize’ is enabled.
-fvect-cost-model=model
Alter the cost model used for vectorization. The model argument should be
one of ‘unlimited’, ‘dynamic’ or ‘cheap’. With the ‘unlimited’ model the
vectorized code-path is assumed to be profitable while with the ‘dynamic’ model
a runtime check guards the vectorized code-path to enable it only for iteration
counts that will likely execute faster than when executing the original scalar
loop. The ‘cheap’ model disables vectorization of loops where doing so would be
cost prohibitive for example due to required runtime checks for data dependence
or alignment but otherwise is equal to the ‘dynamic’ model. The default cost
model depends on other optimization flags and is either ‘dynamic’ or ‘cheap’.
-fsimd-cost-model=model
Alter the cost model used for vectorization of loops marked with the
OpenMP or Cilk Plus simd directive. The model argument should be one of
‘unlimited’, ‘dynamic’, ‘cheap’. All values of model have the same meaning
as described in ‘-fvect-cost-model’ and by default a cost model defined with
‘-fvect-cost-model’ is used.
128 Using the GNU Compiler Collection (GCC)
-ftree-vrp
Perform Value Range Propagation on trees. This is similar to the constant prop-
agation pass, but instead of values, ranges of values are propagated. This allows
the optimizers to remove unnecessary range checks like array bound checks and
null pointer checks. This is enabled by default at ‘-O2’ and higher. Null pointer
check elimination is only done if ‘-fdelete-null-pointer-checks’ is enabled.
-fsplit-paths
Split paths leading to loop backedges. This can improve dead code elimination
and common subexpression elimination. This is enabled by default at ‘-O2’ and
above.
-fsplit-ivs-in-unroller
Enables expression of values of induction variables in later iterations of the
unrolled loop using the value in the first iteration. This breaks long dependency
chains, thus improving efficiency of the scheduling passes.
A combination of ‘-fweb’ and CSE is often sufficient to obtain the same effect.
However, that is not reliable in cases where the loop body is more complicated
than a single basic block. It also does not work at all on some architectures
due to restrictions in the CSE pass.
This optimization is enabled by default.
-fvariable-expansion-in-unroller
With this option, the compiler creates multiple copies of some local variables
when unrolling a loop, which can result in superior code.
-fpartial-inlining
Inline parts of functions. This option has any effect only when inlining itself
is turned on by the ‘-finline-functions’ or ‘-finline-small-functions’
options.
Enabled at level ‘-O2’.
-fpredictive-commoning
Perform predictive commoning optimization, i.e., reusing computations (espe-
cially memory loads and stores) performed in previous iterations of loops.
This option is enabled at level ‘-O3’.
-fprefetch-loop-arrays
If supported by the target machine, generate instructions to prefetch memory
to improve the performance of loops that access large arrays.
This option may generate better or worse code; results are highly dependent on
the structure of loops within the source code.
Disabled at level ‘-Os’.
-fno-printf-return-value
Do not substitute constants for known return value of formatted output func-
tions such as sprintf, snprintf, vsprintf, and vsnprintf (but not printf
of fprintf). This transformation allows GCC to optimize or even eliminate
branches based on the known return value of these functions called with ar-
guments that are either constant, or whose values are known to be in a range
Chapter 3: GCC Command Options 129
that makes determining the exact return value possible. For example, when
‘-fprintf-return-value’ is in effect, both the branch and the body of the if
statement (but not the call to snprint) can be optimized away when i is a
32-bit or smaller integer because the return value is guaranteed to be at most
8.
char buf[9];
if (snprintf (buf, "%08x", i) >= sizeof buf)
...
The ‘-fprintf-return-value’ option relies on other optimizations and yields
best results with ‘-O2’. It works in tandem with the ‘-Wformat-overflow’
and ‘-Wformat-truncation’ options. The ‘-fprintf-return-value’ option is
enabled by default.
-fno-peephole
-fno-peephole2
Disable any machine-specific peephole optimizations. The difference between
‘-fno-peephole’ and ‘-fno-peephole2’ is in how they are implemented in the
compiler; some targets use one, some use the other, a few use both.
‘-fpeephole’ is enabled by default. ‘-fpeephole2’ enabled at levels ‘-O2’,
‘-O3’, ‘-Os’.
-fno-guess-branch-probability
Do not guess branch probabilities using heuristics.
GCC uses heuristics to guess branch probabilities if they are not provided
by profiling feedback (‘-fprofile-arcs’). These heuristics are based on the
control flow graph. If some branch probabilities are specified by __builtin_
expect, then the heuristics are used to guess branch probabilities for the rest
of the control flow graph, taking the __builtin_expect info into account. The
interactions between the heuristics and __builtin_expect can be complex,
and in some cases, it may be useful to disable the heuristics so that the effects
of __builtin_expect are easier to understand.
The default is ‘-fguess-branch-probability’ at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-freorder-blocks
Reorder basic blocks in the compiled function in order to reduce number of
taken branches and improve code locality.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-freorder-blocks-algorithm=algorithm
Use the specified algorithm for basic block reordering. The algorithm argument
can be ‘simple’, which does not increase code size (except sometimes due to
secondary effects like alignment), or ‘stc’, the “software trace cache” algorithm,
which tries to put all often executed code together, minimizing the number of
branches executed by making extra copies of code.
The default is ‘simple’ at levels ‘-O’, ‘-Os’, and ‘stc’ at levels ‘-O2’, ‘-O3’.
-freorder-blocks-and-partition
In addition to reordering basic blocks in the compiled function, in order to
reduce number of taken branches, partitions hot and cold basic blocks into
130 Using the GNU Compiler Collection (GCC)
separate sections of the assembly and ‘.o’ files, to improve paging and cache
locality performance.
This optimization is automatically turned off in the presence of exception han-
dling, for linkonce sections, for functions with a user-defined section attribute
and on any architecture that does not support named sections.
Enabled for x86 at levels ‘-O2’, ‘-O3’.
-freorder-functions
Reorder functions in the object file in order to improve code locality. This is im-
plemented by using special subsections .text.hot for most frequently executed
functions and .text.unlikely for unlikely executed functions. Reordering is
done by the linker so object file format must support named sections and linker
must place them in a reasonable way.
Also profile feedback must be available to make this option effective. See
‘-fprofile-arcs’ for details.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fstrict-aliasing
Allow the compiler to assume the strictest aliasing rules applicable to the lan-
guage being compiled. For C (and C++), this activates optimizations based on
the type of expressions. In particular, an object of one type is assumed never
to reside at the same address as an object of a different type, unless the types
are almost the same. For example, an unsigned int can alias an int, but not
a void* or a double. A character type may alias any other type.
Pay special attention to code like this:
union a_union {
int i;
double d;
};
int f() {
union a_union t;
t.d = 3.0;
return t.i;
}
The practice of reading from a different union member than the one
most recently written to (called “type-punning”) is common. Even with
‘-fstrict-aliasing’, type-punning is allowed, provided the memory is
accessed through the union type. So, the code above works as expected. See
Section 4.9 [Structures unions enumerations and bit-fields implementation],
page 399. However, this code might not:
int f() {
union a_union t;
int* ip;
t.d = 3.0;
ip = &t.i;
return *ip;
}
Chapter 3: GCC Command Options 131
Similarly, access by taking the address, casting the resulting pointer and deref-
erencing the result has undefined behavior, even if the cast uses a union type,
e.g.:
int f() {
double d = 3.0;
return ((union a_union *) &d)->i;
}
The ‘-fstrict-aliasing’ option is enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-fstrict-overflow
Allow the compiler to assume strict signed overflow rules, depending on the
language being compiled. For C (and C++) this means that overflow when doing
arithmetic with signed numbers is undefined, which means that the compiler
may assume that it does not happen. This permits various optimizations. For
example, the compiler assumes that an expression like i + 10 > i is always true
for signed i. This assumption is only valid if signed overflow is undefined, as the
expression is false if i + 10 overflows when using twos complement arithmetic.
When this option is in effect any attempt to determine whether an operation
on signed numbers overflows must be written carefully to not actually involve
overflow.
This option also allows the compiler to assume strict pointer semantics: given
a pointer to an object, if adding an offset to that pointer does not produce a
pointer to the same object, the addition is undefined. This permits the compiler
to conclude that p + u > p is always true for a pointer p and unsigned integer
u. This assumption is only valid because pointer wraparound is undefined, as
the expression is false if p + u overflows using twos complement arithmetic.
See also the ‘-fwrapv’ option. Using ‘-fwrapv’ means that integer signed over-
flow is fully defined: it wraps. When ‘-fwrapv’ is used, there is no difference
between ‘-fstrict-overflow’ and ‘-fno-strict-overflow’ for integers. With
‘-fwrapv’ certain types of overflow are permitted. For example, if the compiler
gets an overflow when doing arithmetic on constants, the overflowed value can
still be used with ‘-fwrapv’, but not otherwise.
The ‘-fstrict-overflow’ option is enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-falign-functions
-falign-functions=n
Align the start of functions to the next power-of-two greater than n, skipping
up to n bytes. For instance, ‘-falign-functions=32’ aligns functions to the
next 32-byte boundary, but ‘-falign-functions=24’ aligns to the next 32-byte
boundary only if this can be done by skipping 23 bytes or less.
‘-fno-align-functions’ and ‘-falign-functions=1’ are equivalent and mean
that functions are not aligned.
Some assemblers only support this flag when n is a power of two; in that case,
it is rounded up.
If n is not specified or is zero, use a machine-dependent default. The maximum
allowed n option value is 65536.
Enabled at levels ‘-O2’, ‘-O3’.
132 Using the GNU Compiler Collection (GCC)
-flimit-function-alignment
If this option is enabled, the compiler tries to avoid unnecessarily overaligning
functions. It attempts to instruct the assembler to align by the amount speci-
fied by ‘-falign-functions’, but not to skip more bytes than the size of the
function.
-falign-labels
-falign-labels=n
Align all branch targets to a power-of-two boundary, skipping up to n bytes
like ‘-falign-functions’. This option can easily make code slower, because
it must insert dummy operations for when the branch target is reached in the
usual flow of the code.
‘-fno-align-labels’ and ‘-falign-labels=1’ are equivalent and mean that
labels are not aligned.
If ‘-falign-loops’ or ‘-falign-jumps’ are applicable and are greater than this
value, then their values are used instead.
If n is not specified or is zero, use a machine-dependent default which is very
likely to be ‘1’, meaning no alignment. The maximum allowed n option value
is 65536.
Enabled at levels ‘-O2’, ‘-O3’.
-falign-loops
-falign-loops=n
Align loops to a power-of-two boundary, skipping up to n bytes like
‘-falign-functions’. If the loops are executed many times, this makes up
for any execution of the dummy operations.
‘-fno-align-loops’ and ‘-falign-loops=1’ are equivalent and mean that
loops are not aligned. The maximum allowed n option value is 65536.
If n is not specified or is zero, use a machine-dependent default.
Enabled at levels ‘-O2’, ‘-O3’.
-falign-jumps
-falign-jumps=n
Align branch targets to a power-of-two boundary, for branch targets where
the targets can only be reached by jumping, skipping up to n bytes like
‘-falign-functions’. In this case, no dummy operations need be executed.
‘-fno-align-jumps’ and ‘-falign-jumps=1’ are equivalent and mean that
loops are not aligned.
If n is not specified or is zero, use a machine-dependent default. The maximum
allowed n option value is 65536.
Enabled at levels ‘-O2’, ‘-O3’.
-funit-at-a-time
This option is left for compatibility reasons. ‘-funit-at-a-time’ has no
effect, while ‘-fno-unit-at-a-time’ implies ‘-fno-toplevel-reorder’ and
‘-fno-section-anchors’.
Enabled by default.
Chapter 3: GCC Command Options 133
-fno-toplevel-reorder
Do not reorder top-level functions, variables, and asm statements. Output them
in the same order that they appear in the input file. When this option is
used, unreferenced static variables are not removed. This option is intended to
support existing code that relies on a particular ordering. For new code, it is
better to use attributes when possible.
Enabled at level ‘-O0’. When disabled explicitly, it also implies
‘-fno-section-anchors’, which is otherwise enabled at ‘-O0’ on some targets.
-fweb Constructs webs as commonly used for register allocation purposes and assign
each web individual pseudo register. This allows the register allocation pass
to operate on pseudos directly, but also strengthens several other optimization
passes, such as CSE, loop optimizer and trivial dead code remover. It can,
however, make debugging impossible, since variables no longer stay in a “home
register”.
Enabled by default with ‘-funroll-loops’.
-fwhole-program
Assume that the current compilation unit represents the whole program being
compiled. All public functions and variables with the exception of main and
those merged by attribute externally_visible become static functions and
in effect are optimized more aggressively by interprocedural optimizers.
This option should not be used in combination with ‘-flto’. Instead relying
on a linker plugin should provide safer and more precise information.
-flto[=n]
This option runs the standard link-time optimizer. When invoked with source
code, it generates GIMPLE (one of GCC’s internal representations) and writes
it to special ELF sections in the object file. When the object files are linked
together, all the function bodies are read from these ELF sections and instan-
tiated as if they had been part of the same translation unit.
To use the link-time optimizer, ‘-flto’ and optimization options should be
specified at compile time and during the final link. It is recommended that you
compile all the files participating in the same link with the same options and
also specify those options at link time. For example:
gcc -c -O2 -flto foo.c
gcc -c -O2 -flto bar.c
gcc -o myprog -flto -O2 foo.o bar.o
The first two invocations to GCC save a bytecode representation of GIMPLE
into special ELF sections inside ‘foo.o’ and ‘bar.o’. The final invocation reads
the GIMPLE bytecode from ‘foo.o’ and ‘bar.o’, merges the two files into a
single internal image, and compiles the result as usual. Since both ‘foo.o’
and ‘bar.o’ are merged into a single image, this causes all the interprocedural
analyses and optimizations in GCC to work across the two files as if they were a
single one. This means, for example, that the inliner is able to inline functions
in ‘bar.o’ into functions in ‘foo.o’ and vice-versa.
Another (simpler) way to enable link-time optimization is:
134 Using the GNU Compiler Collection (GCC)
If you do not specify an optimization level option ‘-O’ at link time, then GCC
uses the highest optimization level used when compiling the object files.
Currently, the following options and their settings are taken from the first ob-
ject file that explicitly specifies them: ‘-fPIC’, ‘-fpic’, ‘-fpie’, ‘-fcommon’,
‘-fexceptions’, ‘-fnon-call-exceptions’, ‘-fgnu-tm’ and all the ‘-m’ target
flags.
Certain ABI-changing flags are required to match in all compilation units, and
trying to override this at link time with a conflicting value is ignored. This
includes options such as ‘-freg-struct-return’ and ‘-fpcc-struct-return’.
Other options such as ‘-ffp-contract’, ‘-fno-strict-overflow’, ‘-fwrapv’,
‘-fno-trapv’ or ‘-fno-strict-aliasing’ are passed through to the
link stage and merged conservatively for conflicting translation units.
Specifically ‘-fno-strict-overflow’, ‘-fwrapv’ and ‘-fno-trapv’ take
precedence; and for example ‘-ffp-contract=off’ takes precedence over
‘-ffp-contract=fast’. You can override them at link time.
If LTO encounters objects with C linkage declared with incompatible types in
separate translation units to be linked together (undefined behavior according
to ISO C99 6.2.7), a non-fatal diagnostic may be issued. The behavior is still
undefined at run time. Similar diagnostics may be raised for other languages.
Another feature of LTO is that it is possible to apply interprocedural optimiza-
tions on files written in different languages:
gcc -c -flto foo.c
g++ -c -flto bar.cc
gfortran -c -flto baz.f90
g++ -o myprog -flto -O3 foo.o bar.o baz.o -lgfortran
Notice that the final link is done with g++ to get the C++ runtime libraries and
‘-lgfortran’ is added to get the Fortran runtime libraries. In general, when
mixing languages in LTO mode, you should use the same link command options
as when mixing languages in a regular (non-LTO) compilation.
If object files containing GIMPLE bytecode are stored in a library archive, say
‘libfoo.a’, it is possible to extract and use them in an LTO link if you are
using a linker with plugin support. To create static libraries suitable for LTO,
use gcc-ar and gcc-ranlib instead of ar and ranlib; to show the symbols
of object files with GIMPLE bytecode, use gcc-nm. Those commands require
that ar, ranlib and nm have been compiled with plugin support. At link time,
use the the flag ‘-fuse-linker-plugin’ to ensure that the library participates
in the LTO optimization process:
gcc -o myprog -O2 -flto -fuse-linker-plugin a.o b.o -lfoo
With the linker plugin enabled, the linker extracts the needed GIMPLE files
from ‘libfoo.a’ and passes them on to the running GCC to make them part
of the aggregated GIMPLE image to be optimized.
If you are not using a linker with plugin support and/or do not enable the linker
plugin, then the objects inside ‘libfoo.a’ are extracted and linked as usual,
but they do not participate in the LTO optimization process. In order to make
a static library suitable for both LTO optimization and usual linkage, compile
its object files with ‘-flto’ ‘-ffat-lto-objects’.
136 Using the GNU Compiler Collection (GCC)
-flto-partition=alg
Specify the partitioning algorithm used by the link-time optimizer. The value
is either ‘1to1’ to specify a partitioning mirroring the original source files or
‘balanced’ to specify partitioning into equally sized chunks (whenever possi-
ble) or ‘max’ to create new partition for every symbol where possible. Specifying
‘none’ as an algorithm disables partitioning and streaming completely. The de-
fault value is ‘balanced’. While ‘1to1’ can be used as an workaround for various
code ordering issues, the ‘max’ partitioning is intended for internal testing only.
The value ‘one’ specifies that exactly one partition should be used while the
value ‘none’ bypasses partitioning and executes the link-time optimization step
directly from the WPA phase.
-flto-odr-type-merging
Enable streaming of mangled types names of C++ types and their unification at
link time. This increases size of LTO object files, but enables diagnostics about
One Definition Rule violations.
-flto-compression-level=n
This option specifies the level of compression used for intermediate language
written to LTO object files, and is only meaningful in conjunction with LTO
mode (‘-flto’). Valid values are 0 (no compression) to 9 (maximum compres-
sion). Values outside this range are clamped to either 0 or 9. If the option is
not given, a default balanced compression setting is used.
Chapter 3: GCC Command Options 137
-fuse-linker-plugin
Enables the use of a linker plugin during link-time optimization. This option
relies on plugin support in the linker, which is available in gold or in GNU ld
2.21 or newer.
This option enables the extraction of object files with GIMPLE bytecode out
of library archives. This improves the quality of optimization by exposing more
code to the link-time optimizer. This information specifies what symbols can be
accessed externally (by non-LTO object or during dynamic linking). Resulting
code quality improvements on binaries (and shared libraries that use hidden
visibility) are similar to ‘-fwhole-program’. See ‘-flto’ for a description of
the effect of this flag and how to use it.
This option is enabled by default when LTO support in GCC is enabled and
GCC was configured for use with a linker supporting plugins (GNU ld 2.21 or
newer or gold).
-ffat-lto-objects
Fat LTO objects are object files that contain both the intermediate language
and the object code. This makes them usable for both LTO linking and normal
linking. This option is effective only when compiling with ‘-flto’ and is ignored
at link time.
‘-fno-fat-lto-objects’ improves compilation time over plain LTO, but re-
quires the complete toolchain to be aware of LTO. It requires a linker with linker
plugin support for basic functionality. Additionally, nm, ar and ranlib need
to support linker plugins to allow a full-featured build environment (capable of
building static libraries etc). GCC provides the gcc-ar, gcc-nm, gcc-ranlib
wrappers to pass the right options to these tools. With non fat LTO makefiles
need to be modified to use them.
The default is ‘-fno-fat-lto-objects’ on targets with linker plugin support.
-fcompare-elim
After register allocation and post-register allocation instruction splitting, iden-
tify arithmetic instructions that compute processor flags similar to a comparison
operation based on that arithmetic. If possible, eliminate the explicit compar-
ison operation.
This pass only applies to certain targets that cannot explicitly represent the
comparison operation before register allocation is complete.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fcprop-registers
After register allocation and post-register allocation instruction splitting, per-
form a copy-propagation pass to try to reduce scheduling dependencies and
occasionally eliminate the copy.
Enabled at levels ‘-O’, ‘-O2’, ‘-O3’, ‘-Os’.
-fprofile-correction
Profiles collected using an instrumented binary for multi-threaded programs
may be inconsistent due to missed counter updates. When this option is spec-
138 Using the GNU Compiler Collection (GCC)
This option prevents undesirable excess precision on machines such as the 68000
where the floating registers (of the 68881) keep more precision than a double
is supposed to have. Similarly for the x86 architecture. For most programs,
the excess precision does only good, but a few programs rely on the precise
definition of IEEE floating point. Use ‘-ffloat-store’ for such programs, after
modifying them to store all pertinent intermediate computations into variables.
-fexcess-precision=style
This option allows further control over excess precision on machines where
floating-point operations occur in a format with more precision or range
than the IEEE standard and interchange floating-point types. By default,
‘-fexcess-precision=fast’ is in effect; this means that operations may
be carried out in a wider precision than the types specified in the source
if that would result in faster code, and it is unpredictable when rounding
to the types specified in the source code takes place. When compiling C, if
‘-fexcess-precision=standard’ is specified then excess precision follows
the rules specified in ISO C99; in particular, both casts and assignments
cause values to be rounded to their semantic types (whereas ‘-ffloat-store’
only affects assignments). This option is enabled by default for C if a strict
conformance option such as ‘-std=c99’ is used. ‘-ffast-math’ enables
‘-fexcess-precision=fast’ by default regardless of whether a strict
conformance option is used.
‘-fexcess-precision=standard’ is not implemented for languages other than
C. On the x86, it has no effect if ‘-mfpmath=sse’ or ‘-mfpmath=sse+387’ is
specified; in the former case, IEEE semantics apply without excess precision,
and in the latter, rounding is unpredictable.
-ffast-math
Sets the options ‘-fno-math-errno’, ‘-funsafe-math-optimizations’,
‘-ffinite-math-only’, ‘-fno-rounding-math’, ‘-fno-signaling-nans’,
‘-fcx-limited-range’ and ‘-fexcess-precision=fast’.
This option causes the preprocessor macro __FAST_MATH__ to be defined.
This option is not turned on by any ‘-O’ option besides ‘-Ofast’ since it can
result in incorrect output for programs that depend on an exact implementation
of IEEE or ISO rules/specifications for math functions. It may, however, yield
faster code for programs that do not require the guarantees of these specifica-
tions.
-fno-math-errno
Do not set errno after calling math functions that are executed with a single
instruction, e.g., sqrt. A program that relies on IEEE exceptions for math
error handling may want to use this flag for speed while maintaining IEEE
arithmetic compatibility.
This option is not turned on by any ‘-O’ option since it can result in incorrect
output for programs that depend on an exact implementation of IEEE or ISO
rules/specifications for math functions. It may, however, yield faster code for
programs that do not require the guarantees of these specifications.
The default is ‘-fmath-errno’.
140 Using the GNU Compiler Collection (GCC)
On Darwin systems, the math library never sets errno. There is therefore
no reason for the compiler to consider the possibility that it might, and
‘-fno-math-errno’ is the default.
-funsafe-math-optimizations
Allow optimizations for floating-point arithmetic that (a) assume that argu-
ments and results are valid and (b) may violate IEEE or ANSI standards.
When used at link time, it may include libraries or startup files that change the
default FPU control word or other similar optimizations.
This option is not turned on by any ‘-O’ option since it can result in incor-
rect output for programs that depend on an exact implementation of IEEE
or ISO rules/specifications for math functions. It may, however, yield faster
code for programs that do not require the guarantees of these specifications.
Enables ‘-fno-signed-zeros’, ‘-fno-trapping-math’, ‘-fassociative-math’
and ‘-freciprocal-math’.
The default is ‘-fno-unsafe-math-optimizations’.
-fassociative-math
Allow re-association of operands in series of floating-point operations. This vi-
olates the ISO C and C++ language standard by possibly changing computation
result. NOTE: re-ordering may change the sign of zero as well as ignore NaNs
and inhibit or create underflow or overflow (and thus cannot be used on code
that relies on rounding behavior like (x + 2**52) - 2**52. May also reorder
floating-point comparisons and thus may not be used when ordered compar-
isons are required. This option requires that both ‘-fno-signed-zeros’ and
‘-fno-trapping-math’ be in effect. Moreover, it doesn’t make much sense with
‘-frounding-math’. For Fortran the option is automatically enabled when both
‘-fno-signed-zeros’ and ‘-fno-trapping-math’ are in effect.
The default is ‘-fno-associative-math’.
-freciprocal-math
Allow the reciprocal of a value to be used instead of dividing by the value if
this enables optimizations. For example x / y can be replaced with x * (1/y),
which is useful if (1/y) is subject to common subexpression elimination. Note
that this loses precision and increases the number of flops operating on the
value.
The default is ‘-fno-reciprocal-math’.
-ffinite-math-only
Allow optimizations for floating-point arithmetic that assume that arguments
and results are not NaNs or +-Infs.
This option is not turned on by any ‘-O’ option since it can result in incorrect
output for programs that depend on an exact implementation of IEEE or ISO
rules/specifications for math functions. It may, however, yield faster code for
programs that do not require the guarantees of these specifications.
The default is ‘-fno-finite-math-only’.
Chapter 3: GCC Command Options 141
-fno-signed-zeros
Allow optimizations for floating-point arithmetic that ignore the signedness of
zero. IEEE arithmetic specifies the behavior of distinct +0.0 and −0.0 values,
which then prohibits simplification of expressions such as x+0.0 or 0.0*x (even
with ‘-ffinite-math-only’). This option implies that the sign of a zero result
isn’t significant.
The default is ‘-fsigned-zeros’.
-fno-trapping-math
Compile code assuming that floating-point operations cannot generate user-
visible traps. These traps include division by zero, overflow, underflow, inexact
result and invalid operation. This option requires that ‘-fno-signaling-nans’
be in effect. Setting this option may allow faster code if one relies on “non-stop”
IEEE arithmetic, for example.
This option should never be turned on by any ‘-O’ option since it can result
in incorrect output for programs that depend on an exact implementation of
IEEE or ISO rules/specifications for math functions.
The default is ‘-ftrapping-math’.
-frounding-math
Disable transformations and optimizations that assume default floating-point
rounding behavior. This is round-to-zero for all floating point to integer con-
versions, and round-to-nearest for all other arithmetic truncations. This option
should be specified for programs that change the FP rounding mode dynami-
cally, or that may be executed with a non-default rounding mode. This option
disables constant folding of floating-point expressions at compile time (which
may be affected by rounding mode) and arithmetic transformations that are
unsafe in the presence of sign-dependent rounding modes.
The default is ‘-fno-rounding-math’.
This option is experimental and does not currently guarantee to disable all GCC
optimizations that are affected by rounding mode. Future versions of GCC may
provide finer control of this setting using C99’s FENV_ACCESS pragma. This
command-line option will be used to specify the default state for FENV_ACCESS.
-fsignaling-nans
Compile code assuming that IEEE signaling NaNs may generate user-visible
traps during floating-point operations. Setting this option disables optimiza-
tions that may change the number of exceptions visible with signaling NaNs.
This option implies ‘-ftrapping-math’.
This option causes the preprocessor macro __SUPPORT_SNAN__ to be defined.
The default is ‘-fno-signaling-nans’.
This option is experimental and does not currently guarantee to disable all
GCC optimizations that affect signaling NaN behavior.
-fno-fp-int-builtin-inexact
Do not allow the built-in functions ceil, floor, round and trunc, and their
float and long double variants, to generate code that raises the “inexact”
142 Using the GNU Compiler Collection (GCC)
floating-point exception for noninteger arguments. ISO C99 and C11 allow
these functions to raise the “inexact” exception, but ISO/IEC TS 18661-1:2014,
the C bindings to IEEE 754-2008, does not allow these functions to do so.
The default is ‘-ffp-int-builtin-inexact’, allowing the exception to be
raised. This option does nothing unless ‘-ftrapping-math’ is in effect.
Even if ‘-fno-fp-int-builtin-inexact’ is used, if the functions generate a
call to a library function then the “inexact” exception may be raised if the
library implementation does not follow TS 18661.
-fsingle-precision-constant
Treat floating-point constants as single precision instead of implicitly converting
them to double-precision constants.
-fcx-limited-range
When enabled, this option states that a range reduction step is not needed when
performing complex division. Also, there is no checking whether the result of
a complex multiplication or division is NaN + I*NaN, with an attempt to rescue
the situation in that case. The default is ‘-fno-cx-limited-range’, but is
enabled by ‘-ffast-math’.
This option controls the default setting of the ISO C99 CX_LIMITED_RANGE
pragma. Nevertheless, the option applies to all languages.
-fcx-fortran-rules
Complex multiplication and division follow Fortran rules. Range reduction is
done as part of complex division, but there is no checking whether the result of
a complex multiplication or division is NaN + I*NaN, with an attempt to rescue
the situation in that case.
The default is ‘-fno-cx-fortran-rules’.
The following options control optimizations that may improve performance, but are not
enabled by any ‘-O’ options. This section includes experimental options that may produce
broken code.
-fbranch-probabilities
After running a program compiled with ‘-fprofile-arcs’ (see Section 3.11
[Instrumentation Options], page 164), you can compile it a second time
using ‘-fbranch-probabilities’, to improve optimizations based on
the number of times each branch was taken. When a program compiled
with ‘-fprofile-arcs’ exits, it saves arc execution counts to a file called
‘sourcename.gcda’ for each source file. The information in this data file is
very dependent on the structure of the generated code, so you must use the
same source code and the same optimization options for both compilations.
With ‘-fbranch-probabilities’, GCC puts a ‘REG_BR_PROB’ note on each
‘JUMP_INSN’ and ‘CALL_INSN’. These can be used to improve optimization.
Currently, they are only used in one place: in ‘reorg.c’, instead of guessing
which path a branch is most likely to take, the ‘REG_BR_PROB’ values are used
to exactly determine which path is taken more often.
Chapter 3: GCC Command Options 143
-fprofile-values
If combined with ‘-fprofile-arcs’, it adds code so that some data about
values of expressions in the program is gathered.
With ‘-fbranch-probabilities’, it reads back the data gathered from profil-
ing values of expressions for usage in optimizations.
Enabled with ‘-fprofile-generate’ and ‘-fprofile-use’.
-fprofile-reorder-functions
Function reordering based on profile instrumentation collects first time of exe-
cution of a function and orders these functions in ascending order.
Enabled with ‘-fprofile-use’.
-fvpt If combined with ‘-fprofile-arcs’, this option instructs the compiler to add
code to gather information about values of expressions.
With ‘-fbranch-probabilities’, it reads back the data gathered and actually
performs the optimizations based on them. Currently the optimizations include
specialization of division operations using the knowledge about the value of the
denominator.
-frename-registers
Attempt to avoid false dependencies in scheduled code by making use of registers
left over after register allocation. This optimization most benefits processors
with lots of registers. Depending on the debug information format adopted by
the target, however, it can make debugging impossible, since variables no longer
stay in a “home register”.
Enabled by default with ‘-funroll-loops’.
-fschedule-fusion
Performs a target dependent pass over the instruction stream to schedule in-
structions of same type together because target machine can execute them more
efficiently if they are adjacent to each other in the instruction flow.
Enabled at levels ‘-O2’, ‘-O3’, ‘-Os’.
-ftracer Perform tail duplication to enlarge superblock size. This transformation simpli-
fies the control flow of the function allowing other optimizations to do a better
job.
Enabled with ‘-fprofile-use’.
-funroll-loops
Unroll loops whose number of iterations can be determined at compile time or
upon entry to the loop. ‘-funroll-loops’ implies ‘-frerun-cse-after-loop’,
‘-fweb’ and ‘-frename-registers’. It also turns on complete loop peeling (i.e.
complete removal of loops with a small constant number of iterations). This
option makes code larger, and may or may not make it run faster.
Enabled with ‘-fprofile-use’.
-funroll-all-loops
Unroll all loops, even if their number of iterations is uncertain when the loop is
entered. This usually makes programs run more slowly. ‘-funroll-all-loops’
implies the same options as ‘-funroll-loops’.
144 Using the GNU Compiler Collection (GCC)
-fpeel-loops
Peels loops for which there is enough information that they do not roll much
(from profile feedback or static analysis). It also turns on complete loop peeling
(i.e. complete removal of loops with small constant number of iterations).
Enabled with ‘-O3’ and/or ‘-fprofile-use’.
-fmove-loop-invariants
Enables the loop invariant motion pass in the RTL loop optimizer. Enabled at
level ‘-O1’
-fsplit-loops
Split a loop into two if it contains a condition that’s always true for one side of
the iteration space and false for the other.
-funswitch-loops
Move branches with loop invariant conditions out of the loop, with duplicates
of the loop on both branches (modified according to result of the condition).
-ffunction-sections
-fdata-sections
Place each function or data item into its own section in the output file if the
target supports arbitrary sections. The name of the function or the name of
the data item determines the section’s name in the output file.
Use these options on systems where the linker can perform optimizations to
improve locality of reference in the instruction space. Most systems using the
ELF object format and SPARC processors running Solaris 2 have linkers with
such optimizations. AIX may have these optimizations in the future.
Only use these options when there are significant benefits from doing so. When
you specify these options, the assembler and linker create larger object and
executable files and are also slower. You cannot use gprof on all systems if you
specify this option, and you may have problems with debugging if you specify
both this option and ‘-g’.
-fbranch-target-load-optimize
Perform branch target register load optimization before prologue / epilogue
threading. The use of target registers can typically be exposed only during
reload, thus hoisting loads out of loops and doing inter-block scheduling needs
a separate optimization pass.
-fbranch-target-load-optimize2
Perform branch target register load optimization after prologue / epilogue
threading.
-fbtr-bb-exclusive
When performing branch target register load optimization, don’t reuse branch
target registers within any basic block.
-fstdarg-opt
Optimize the prologue of variadic argument functions with respect to usage of
those arguments.
Chapter 3: GCC Command Options 145
-fsection-anchors
Try to reduce the number of symbolic address calculations by using shared
“anchor” symbols to address nearby objects. This transformation can help to
reduce the number of GOT entries and GOT accesses on some targets.
For example, the implementation of the following function foo:
static int a, b, c;
int foo (void) { return a + b + c; }
usually calculates the addresses of all three variables, but if you compile it with
‘-fsection-anchors’, it accesses the variables from a common anchor point
instead. The effect is similar to the following pseudocode (which isn’t valid C):
int foo (void)
{
register int *xr = &x;
return xr[&a - &x] + xr[&b - &x] + xr[&c - &x];
}
Not all targets support this option.
--param name=value
In some places, GCC uses various constants to control the amount of optimiza-
tion that is done. For example, GCC does not inline functions that contain
more than a certain number of instructions. You can control some of these
constants on the command line using the ‘--param’ option.
The names of specific parameters, and the meaning of the values, are tied to
the internals of the compiler, and are subject to change without notice in future
releases.
In each case, the value is an integer. The allowable choices for name are:
predictable-branch-outcome
When branch is predicted to be taken with probability lower than
this threshold (in percent), then it is considered well predictable.
The default is 10.
max-rtl-if-conversion-insns
RTL if-conversion tries to remove conditional branches around a
block and replace them with conditionally executed instructions.
This parameter gives the maximum number of instructions in a
block which should be considered for if-conversion. The default
is 10, though the compiler will also use other heuristics to decide
whether if-conversion is likely to be profitable.
max-rtl-if-conversion-predictable-cost
max-rtl-if-conversion-unpredictable-cost
RTL if-conversion will try to remove conditional branches around
a block and replace them with conditionally executed instructions.
These parameters give the maximum permissible cost for the
sequence that would be generated by if-conversion depending on
whether the branch is statically determined to be predictable or
not. The units for this parameter are the same as those for the
GCC internal seq cost metric. The compiler will try to provide a
146 Using the GNU Compiler Collection (GCC)
max-gcse-insertion-ratio
If the ratio of expression insertions to deletions is larger than this
value for any expression, then RTL PRE inserts or removes the
expression and thus leaves partially redundant computations in the
instruction stream. The default value is 20.
max-pending-list-length
The maximum number of pending dependencies scheduling allows
before flushing the current state and starting over. Large functions
with few branches or calls can create excessively large lists which
needlessly consume memory and resources.
max-modulo-backtrack-attempts
The maximum number of backtrack attempts the scheduler should
make when modulo scheduling a loop. Larger values can exponen-
tially increase compilation time.
max-inline-insns-single
Several parameters control the tree inliner used in GCC. This num-
ber sets the maximum number of instructions (counted in GCC’s
internal representation) in a single function that the tree inliner
considers for inlining. This only affects functions declared inline
and methods implemented in a class declaration (C++). The de-
fault value is 400.
max-inline-insns-auto
When you use ‘-finline-functions’ (included in ‘-O3’), a lot of
functions that would otherwise not be considered for inlining by
the compiler are investigated. To those functions, a different (more
restrictive) limit compared to functions declared inline can be ap-
plied. The default value is 40.
inline-min-speedup
When estimated performance improvement of caller + callee run-
time exceeds this threshold (in percent), the function can be inlined
regardless of the limit on ‘--param max-inline-insns-single’
and ‘--param max-inline-insns-auto’.
large-function-insns
The limit specifying really large functions. For functions larger
than this limit after inlining, inlining is constrained by ‘--param
large-function-growth’. This parameter is useful primarily to
avoid extreme compilation time caused by non-linear algorithms
used by the back end. The default value is 2700.
large-function-growth
Specifies maximal growth of large function caused by inlining in per-
cents. The default value is 100 which limits large function growth
to 2.0 times the original size.
148 Using the GNU Compiler Collection (GCC)
large-unit-insns
The limit specifying large translation unit. Growth caused by
inlining of units larger than this limit is limited by ‘--param
inline-unit-growth’. For small units this might be too tight.
For example, consider a unit consisting of function A that is
inline and B that just calls A three times. If B is small relative
to A, the growth of unit is 300\% and yet such inlining is
very sane. For very large units consisting of small inlineable
functions, however, the overall unit growth limit is needed to avoid
exponential explosion of code size. Thus for smaller units, the
size is increased to ‘--param large-unit-insns’ before applying
‘--param inline-unit-growth’. The default is 10000.
inline-unit-growth
Specifies maximal overall growth of the compilation unit caused by
inlining. The default value is 20 which limits unit growth to 1.2
times the original size. Cold functions (either marked cold via an
attribute or by profile feedback) are not accounted into the unit
size.
ipcp-unit-growth
Specifies maximal overall growth of the compilation unit caused
by interprocedural constant propagation. The default value is 10
which limits unit growth to 1.1 times the original size.
large-stack-frame
The limit specifying large stack frames. While inlining the algo-
rithm is trying to not grow past this limit too much. The default
value is 256 bytes.
large-stack-frame-growth
Specifies maximal growth of large stack frames caused by inlining in
percents. The default value is 1000 which limits large stack frame
growth to 11 times the original size.
max-inline-insns-recursive
max-inline-insns-recursive-auto
Specifies the maximum number of instructions an out-of-line copy of
a self-recursive inline function can grow into by performing recursive
inlining.
‘--param max-inline-insns-recursive’ applies to functions de-
clared inline. For functions not declared inline, recursive inlin-
ing happens only when ‘-finline-functions’ (included in ‘-O3’)
is enabled; ‘--param max-inline-insns-recursive-auto’ applies
instead. The default value is 450.
max-inline-recursive-depth
max-inline-recursive-depth-auto
Specifies the maximum recursion depth used for recursive inlining.
Chapter 3: GCC Command Options 149
gcse-unrestricted-cost
Cost, roughly measured as the cost of a single typical machine
instruction, at which GCSE optimizations do not constrain the dis-
tance an expression can travel. This is currently supported only
in the code hoisting pass. The lesser the cost, the more aggres-
sive code hoisting is. Specifying 0 allows all expressions to travel
unrestricted distances. The default value is 3.
max-hoist-depth
The depth of search in the dominator tree for expressions to hoist.
This is used to avoid quadratic behavior in hoisting algorithm. The
value of 0 does not limit on the search, but may slow down compi-
lation of huge functions. The default value is 30.
max-tail-merge-comparisons
The maximum amount of similar bbs to compare a bb with. This is
used to avoid quadratic behavior in tree tail merging. The default
value is 10.
max-tail-merge-iterations
The maximum amount of iterations of the pass over the function.
This is used to limit compilation time in tree tail merging. The
default value is 2.
store-merging-allow-unaligned
Allow the store merging pass to introduce unaligned stores if it is
legal to do so. The default value is 1.
max-stores-to-merge
The maximum number of stores to attempt to merge into wider
stores in the store merging pass. The minimum value is 2 and the
default is 64.
max-unrolled-insns
The maximum number of instructions that a loop may have to be
unrolled. If a loop is unrolled, this parameter also determines how
many times the loop code is unrolled.
max-average-unrolled-insns
The maximum number of instructions biased by probabilities of
their execution that a loop may have to be unrolled. If a loop is
unrolled, this parameter also determines how many times the loop
code is unrolled.
max-unroll-times
The maximum number of unrollings of a single loop.
Chapter 3: GCC Command Options 151
max-peeled-insns
The maximum number of instructions that a loop may have to be
peeled. If a loop is peeled, this parameter also determines how
many times the loop code is peeled.
max-peel-times
The maximum number of peelings of a single loop.
max-peel-branches
The maximum number of branches on the hot path through the
peeled sequence.
max-completely-peeled-insns
The maximum number of insns of a completely peeled loop.
max-completely-peel-times
The maximum number of iterations of a loop to be suitable for
complete peeling.
max-completely-peel-loop-nest-depth
The maximum depth of a loop nest suitable for complete peeling.
max-unswitch-insns
The maximum number of insns of an unswitched loop.
max-unswitch-level
The maximum number of branches unswitched in a single loop.
max-loop-headers-insns
The maximum number of insns in loop header duplicated by the
copy loop headers pass.
lim-expensive
The minimum cost of an expensive expression in the loop invariant
motion.
iv-consider-all-candidates-bound
Bound on number of candidates for induction variables, below
which all candidates are considered for each use in induction
variable optimizations. If there are more candidates than this,
only the most relevant ones are considered to avoid quadratic time
complexity.
iv-max-considered-uses
The induction variable optimizations give up on loops that contain
more induction variable uses.
iv-always-prune-cand-set-bound
If the number of candidates in the set is smaller than this value,
always try to remove unnecessary ivs from the set when adding a
new one.
avg-loop-niter
Average number of iterations of a loop.
152 Using the GNU Compiler Collection (GCC)
dse-max-object-size
Maximum size (in bytes) of objects tracked bytewise by dead store
elimination. Larger values may result in larger compilation times.
scev-max-expr-size
Bound on size of expressions used in the scalar evolutions analyzer.
Large expressions slow the analyzer.
scev-max-expr-complexity
Bound on the complexity of the expressions in the scalar evolutions
analyzer. Complex expressions slow the analyzer.
max-tree-if-conversion-phi-args
Maximum number of arguments in a PHI supported by TREE if
conversion unless the loop is marked with simd pragma.
vect-max-version-for-alignment-checks
The maximum number of run-time checks that can be performed
when doing loop versioning for alignment in the vectorizer.
vect-max-version-for-alias-checks
The maximum number of run-time checks that can be performed
when doing loop versioning for alias in the vectorizer.
vect-max-peeling-for-alignment
The maximum number of loop peels to enhance access alignment
for vectorizer. Value -1 means no limit.
max-iterations-to-track
The maximum number of iterations of a loop the brute-force algo-
rithm for analysis of the number of iterations of the loop tries to
evaluate.
hot-bb-count-ws-permille
A basic block profile count is considered hot if it contributes to the
given permillage (i.e. 0...1000) of the entire profiled execution.
hot-bb-frequency-fraction
Select fraction of the entry block frequency of executions of basic
block in function given basic block needs to have to be considered
hot.
max-predicted-iterations
The maximum number of loop iterations we predict statically. This
is useful in cases where a function contains a single loop with known
bound and another loop with unknown bound. The known number
of iterations is predicted correctly, while the unknown number of
iterations average to roughly 10. This means that the loop without
bounds appears artificially cold relative to the other one.
builtin-expect-probability
Control the probability of the expression having the specified value.
This parameter takes a percentage (i.e. 0 ... 100) as input. The
default probability of 90 is obtained empirically.
Chapter 3: GCC Command Options 153
align-threshold
Select fraction of the maximal frequency of executions of a basic
block in a function to align the basic block.
align-loop-iterations
A loop expected to iterate at least the selected number of iterations
is aligned.
tracer-dynamic-coverage
tracer-dynamic-coverage-feedback
This value is used to limit superblock formation once the given per-
centage of executed instructions is covered. This limits unnecessary
code size expansion.
The ‘tracer-dynamic-coverage-feedback’ parameter is used
only when profile feedback is available. The real profiles (as
opposed to statically estimated ones) are much less balanced
allowing the threshold to be larger value.
tracer-max-code-growth
Stop tail duplication once code growth has reached given percent-
age. This is a rather artificial limit, as most of the duplicates are
eliminated later in cross jumping, so it may be set to much higher
values than is the desired code growth.
tracer-min-branch-ratio
Stop reverse growth when the reverse probability of best edge is
less than this threshold (in percent).
tracer-min-branch-probability
tracer-min-branch-probability-feedback
Stop forward growth if the best edge has probability lower than
this threshold.
Similarly to ‘tracer-dynamic-coverage’ two parameters are
provided. ‘tracer-min-branch-probability-feedback’
is used for compilation with profile feedback and
‘tracer-min-branch-probability’ compilation without.
The value for compilation with profile feedback needs to be more
conservative (higher) in order to make tracer effective.
max-cse-path-length
The maximum number of basic blocks on path that CSE considers.
The default is 10.
max-cse-insns
The maximum number of instructions CSE processes before flush-
ing. The default is 1000.
ggc-min-expand
GCC uses a garbage collector to manage its own memory alloca-
tion. This parameter specifies the minimum percentage by which
the garbage collector’s heap should be allowed to expand between
154 Using the GNU Compiler Collection (GCC)
ggc-min-heapsize
Minimum size of the garbage collector’s heap before it begins
bothering to collect garbage. The first collection occurs after the
heap expands by ‘ggc-min-expand’% beyond ‘ggc-min-heapsize’.
Again, tuning this may improve compilation speed, and has no
effect on code generation.
The default is the smaller of RAM/8, RLIMIT RSS, or a limit
that tries to ensure that RLIMIT DATA or RLIMIT AS are not
exceeded, but with a lower bound of 4096 (four megabytes) and
an upper bound of 131072 (128 megabytes). If GCC is not able
to calculate RAM on a particular platform, the lower bound is
used. Setting this parameter very large effectively disables garbage
collection. Setting this parameter and ‘ggc-min-expand’ to zero
causes a full collection to occur at every opportunity.
max-reload-search-insns
The maximum number of instruction reload should look backward
for equivalent register. Increasing values mean more aggressive op-
timization, making the compilation time increase with probably
slightly better performance. The default value is 100.
max-cselib-memory-locations
The maximum number of memory locations cselib should take into
account. Increasing values mean more aggressive optimization,
making the compilation time increase with probably slightly better
performance. The default value is 500.
max-sched-ready-insns
The maximum number of instructions ready to be issued the sched-
uler should consider at any given time during the first scheduling
pass. Increasing values mean more thorough searches, making the
compilation time increase with probably little benefit. The default
value is 100.
max-sched-region-blocks
The maximum number of blocks in a region to be considered for
interblock scheduling. The default value is 10.
Chapter 3: GCC Command Options 155
max-pipeline-region-blocks
The maximum number of blocks in a region to be considered for
pipelining in the selective scheduler. The default value is 15.
max-sched-region-insns
The maximum number of insns in a region to be considered for
interblock scheduling. The default value is 100.
max-pipeline-region-insns
The maximum number of insns in a region to be considered for
pipelining in the selective scheduler. The default value is 200.
min-spec-prob
The minimum probability (in percents) of reaching a source block
for interblock speculative scheduling. The default value is 40.
max-sched-extend-regions-iters
The maximum number of iterations through CFG to extend regions.
A value of 0 (the default) disables region extensions.
max-sched-insn-conflict-delay
The maximum conflict delay for an insn to be considered for spec-
ulative motion. The default value is 3.
sched-spec-prob-cutoff
The minimal probability of speculation success (in percents), so
that speculative insns are scheduled. The default value is 40.
sched-state-edge-prob-cutoff
The minimum probability an edge must have for the scheduler to
save its state across it. The default value is 10.
sched-mem-true-dep-cost
Minimal distance (in CPU cycles) between store and load targeting
same memory locations. The default value is 1.
selsched-max-lookahead
The maximum size of the lookahead window of selective scheduling.
It is a depth of search for available instructions. The default value
is 50.
selsched-max-sched-times
The maximum number of times that an instruction is scheduled
during selective scheduling. This is the limit on the number of
iterations through which the instruction may be pipelined. The
default value is 2.
selsched-insns-to-rename
The maximum number of best instructions in the ready list that
are considered for renaming in the selective scheduler. The default
value is 2.
sms-min-sc
The minimum value of stage count that swing modulo scheduler
generates. The default value is 2.
156 Using the GNU Compiler Collection (GCC)
max-last-value-rtl
The maximum size measured as number of RTLs that can be
recorded in an expression in combiner for a pseudo register as last
known value of that register. The default is 10000.
max-combine-insns
The maximum number of instructions the RTL combiner tries to
combine. The default value is 2 at ‘-Og’ and 4 otherwise.
integer-share-limit
Small integer constants can use a shared data structure, reducing
the compiler’s memory usage and increasing its speed. This sets
the maximum value of a shared integer constant. The default value
is 256.
ssp-buffer-size
The minimum size of buffers (i.e. arrays) that receive stack smash-
ing protection when ‘-fstack-protection’ is used.
min-size-for-stack-sharing
The minimum size of variables taking part in stack slot sharing
when not optimizing. The default value is 32.
max-jump-thread-duplication-stmts
Maximum number of statements allowed in a block that needs to
be duplicated when threading jumps.
max-fields-for-field-sensitive
Maximum number of fields in a structure treated in a field sensitive
manner during pointer analysis. The default is zero for ‘-O0’ and
‘-O1’, and 100 for ‘-Os’, ‘-O2’, and ‘-O3’.
prefetch-latency
Estimate on average number of instructions that are executed be-
fore prefetch finishes. The distance prefetched ahead is propor-
tional to this constant. Increasing this number may also lead to
less streams being prefetched (see ‘simultaneous-prefetches’).
simultaneous-prefetches
Maximum number of prefetches that can run at the same time.
l1-cache-line-size
The size of cache line in L1 cache, in bytes.
l1-cache-size
The size of L1 cache, in kilobytes.
l2-cache-size
The size of L2 cache, in kilobytes.
min-insn-to-prefetch-ratio
The minimum ratio between the number of instructions and the
number of prefetches to enable prefetching in a loop.
Chapter 3: GCC Command Options 157
prefetch-min-insn-to-mem-ratio
The minimum ratio between the number of instructions and the
number of memory references to enable prefetching in a loop.
use-canonical-types
Whether the compiler should use the “canonical” type system. By
default, this should always be 1, which uses a more efficient internal
mechanism for comparing types in C++ and Objective-C++. How-
ever, if bugs in the canonical type system are causing compilation
failures, set this value to 0 to disable canonical types.
switch-conversion-max-branch-ratio
Switch initialization conversion refuses to create arrays that are big-
ger than ‘switch-conversion-max-branch-ratio’ times the num-
ber of branches in the switch.
max-partial-antic-length
Maximum length of the partial antic set computed during the tree
partial redundancy elimination optimization (‘-ftree-pre’) when
optimizing at ‘-O3’ and above. For some sorts of source code the en-
hanced partial redundancy elimination optimization can run away,
consuming all of the memory available on the host machine. This
parameter sets a limit on the length of the sets that are computed,
which prevents the runaway behavior. Setting a value of 0 for this
parameter allows an unlimited set length.
sccvn-max-scc-size
Maximum size of a strongly connected component (SCC) during
SCCVN processing. If this limit is hit, SCCVN processing for the
whole function is not done and optimizations depending on it are
disabled. The default maximum SCC size is 10000.
sccvn-max-alias-queries-per-access
Maximum number of alias-oracle queries we perform when looking
for redundancies for loads and stores. If this limit is hit the search
is aborted and the load or store is not considered redundant. The
number of queries is algorithmically limited to the number of stores
on all paths from the load to the function entry. The default max-
imum number of queries is 1000.
ira-max-loops-num
IRA uses regional register allocation by default. If a function con-
tains more loops than the number given by this parameter, only at
most the given number of the most frequently-executed loops form
regions for regional register allocation. The default value of the
parameter is 100.
ira-max-conflict-table-size
Although IRA uses a sophisticated algorithm to compress the con-
flict table, the table can still require excessive amounts of memory
for huge functions. If the conflict table for a function could be more
158 Using the GNU Compiler Collection (GCC)
loop-unroll-jam-size
Specify the unroll factor for the ‘-floop-unroll-and-jam’ option.
The default value is 4.
loop-unroll-jam-depth
Specify the dimension to be unrolled (counting from the most inner
loop) for the ‘-floop-unroll-and-jam’. The default value is 2.
ipa-cp-value-list-size
IPA-CP attempts to track all possible values and types passed to a
function’s parameter in order to propagate them and perform devir-
tualization. ‘ipa-cp-value-list-size’ is the maximum number
of values and types it stores per one formal parameter of a function.
ipa-cp-eval-threshold
IPA-CP calculates its own score of cloning profitability heuristics
and performs those cloning opportunities with scores that exceed
‘ipa-cp-eval-threshold’.
ipa-cp-recursion-penalty
Percentage penalty the recursive functions will receive when they
are evaluated for cloning.
ipa-cp-single-call-penalty
Percentage penalty functions containing a single call to another
function will receive when they are evaluated for cloning.
ipa-max-agg-items
IPA-CP is also capable to propagate a number of scalar values
passed in an aggregate. ‘ipa-max-agg-items’ controls the maxi-
mum number of such values per one parameter.
ipa-cp-loop-hint-bonus
When IPA-CP determines that a cloning candidate would make
the number of iterations of a loop known, it adds a bonus of
‘ipa-cp-loop-hint-bonus’ to the profitability score of the
candidate.
ipa-cp-array-index-hint-bonus
When IPA-CP determines that a cloning candidate would
make the index of an array access known, it adds a bonus of
‘ipa-cp-array-index-hint-bonus’ to the profitability score of
the candidate.
ipa-max-aa-steps
During its analysis of function bodies, IPA-CP employs alias
analysis in order to track values pointed to by function parameters.
In order not spend too much time analyzing huge functions, it
gives up and consider all memory clobbered after examining
‘ipa-max-aa-steps’ statements modifying memory.
Chapter 3: GCC Command Options 161
lto-partitions
Specify desired number of partitions produced during WHOPR
compilation. The number of partitions should exceed the number
of CPUs used for compilation. The default value is 32.
lto-min-partition
Size of minimal partition for WHOPR (in estimated instructions).
This prevents expenses of splitting very small programs into too
many partitions.
lto-max-partition
Size of max partition for WHOPR (in estimated instructions). to
provide an upper bound for individual size of partition. Meant to
be used only with balanced partitioning.
cxx-max-namespaces-for-diagnostic-help
The maximum number of namespaces to consult for suggestions
when C++ name lookup fails for an identifier. The default is 1000.
sink-frequency-threshold
The maximum relative execution frequency (in percents) of the tar-
get block relative to a statement’s original block to allow statement
sinking of a statement. Larger numbers result in more aggressive
statement sinking. The default value is 75. A small positive ad-
justment is applied for statements with memory operands as those
are even more profitable so sink.
max-stores-to-sink
The maximum number of conditional store pairs that can be
sunk. Set to 0 if either vectorization (‘-ftree-vectorize’)
or if-conversion (‘-ftree-loop-if-convert’) is disabled. The
default is 2.
allow-store-data-races
Allow optimizers to introduce new data races on stores. Set to
1 to allow, otherwise to 0. This option is enabled by default at
optimization level ‘-Ofast’.
case-values-threshold
The smallest number of different values for which it is best to use
a jump-table instead of a tree of conditional branches. If the value
is 0, use the default for the machine. The default is 0.
tree-reassoc-width
Set the maximum number of instructions executed in parallel in re-
associated tree. This parameter overrides target dependent heuris-
tics used by default if has non zero value.
sched-pressure-algorithm
Choose between the two available implementations of
‘-fsched-pressure’. Algorithm 1 is the original implementation
and is the more likely to prevent instructions from being reordered.
162 Using the GNU Compiler Collection (GCC)
concurrent instances of your program, and provided that the file system
supports locking, the data files will be correctly updated. Unless a strict
ISO C dialect option is in effect, fork calls are detected and correctly
handled without double counting.
• For profile-directed optimizations, compile the source files again
with the same optimization and code generation options plus
‘-fbranch-probabilities’ (see Section 3.10 [Options that Control
Optimization], page 106).
• For test coverage analysis, use gcov to produce human readable information
from the ‘.gcno’ and ‘.gcda’ files. Refer to the gcov documentation for
further information.
With ‘-fprofile-arcs’, for each function of your program GCC creates a
program flow graph, then finds a spanning tree for the graph. Only arcs that
are not on the spanning tree have to be instrumented: the compiler adds code
to count the number of times that these arcs are executed. When an arc is
the only exit or only entrance to a block, the instrumentation code can be
added to the block; otherwise, a new basic block must be created to hold the
instrumentation code.
-ftest-coverage
Produce a notes file that the gcov code-coverage utility (see Chapter 10 [gcov—
a Test Coverage Program], page 771) can use to show program coverage. Each
source file’s note file is called ‘auxname.gcno’. Refer to the ‘-fprofile-arcs’
option above for a description of auxname and instructions on how to generate
test coverage data. Coverage data matches the source files more closely if you
do not optimize.
-fprofile-dir=path
Set the directory to search for the profile data files in to path. This
option affects only the profile data generated by ‘-fprofile-generate’,
‘-ftest-coverage’, ‘-fprofile-arcs’ and used by ‘-fprofile-use’ and
‘-fbranch-probabilities’ and its related options. Both absolute and relative
paths can be used. By default, GCC uses the current directory as path, thus
the profile data file appears in the same directory as the object file.
-fprofile-generate
-fprofile-generate=path
Enable options usually used for instrumenting application to produce profile
useful for later recompilation with profile feedback based optimization. You
must use ‘-fprofile-generate’ both when compiling and when linking your
program.
The following options are enabled: ‘-fprofile-arcs’, ‘-fprofile-values’,
‘-fvpt’.
If path is specified, GCC looks at the path to find the profile feedback data
files. See ‘-fprofile-dir’.
To optimize the program based on the collected profile information, use
‘-fprofile-use’. See Section 3.10 [Optimize Options], page 106, for more
information.
166 Using the GNU Compiler Collection (GCC)
-fprofile-update=method
Alter the update method for an application instrumented for profile feedback
based optimization. The method argument should be one of ‘single’, ‘atomic’
or ‘prefer-atomic’. The first one is useful for single-threaded applications,
while the second one prevents profile corruption by emitting thread-safe code.
Warning: When an application does not properly join all threads (or creates
an detached thread), a profile file can be still corrupted.
Using ‘prefer-atomic’ would be transformed either to ‘atomic’, when sup-
ported by a target, or to ‘single’ otherwise. The GCC driver automatically
selects ‘prefer-atomic’ when ‘-pthread’ is present in the command line.
-fsanitize=address
Enable AddressSanitizer, a fast memory error detector. Memory access
instructions are instrumented to detect out-of-bounds and use-after-free bugs.
The option enables ‘-fsanitize-address-use-after-scope’. See https://
github.com/google/sanitizers/wiki/AddressSanitizer for more details.
The run-time behavior can be influenced using the ASAN_OPTIONS environment
variable. When set to help=1, the available options are shown at startup of
the instrumented program. See https://github.com/google/sanitizers/
wiki / AddressSanitizerFlags # run-time-flags for a list of supported
options. The option cannot be combined with ‘-fsanitize=thread’ and/or
‘-fcheck-pointer-bounds’.
-fsanitize=kernel-address
Enable AddressSanitizer for Linux kernel. See https: / / github . com /
google/kasan/wiki for more details. The option cannot be combined with
‘-fcheck-pointer-bounds’.
-fsanitize=thread
Enable ThreadSanitizer, a fast data race detector. Memory access
instructions are instrumented to detect data race bugs. See https: / /
github . com / google / sanitizers / wiki # threadsanitizer for more
details. The run-time behavior can be influenced using the TSAN_OPTIONS
environment variable; see https: / / github . com / google / sanitizers /
wiki / ThreadSanitizerFlags for a list of supported options. The option
cannot be combined with ‘-fsanitize=address’, ‘-fsanitize=leak’ and/or
‘-fcheck-pointer-bounds’.
Note that sanitized atomic builtins cannot throw exceptions when
operating on invalid memory addresses with non-call exceptions
(‘-fnon-call-exceptions’).
-fsanitize=leak
Enable LeakSanitizer, a memory leak detector. This option only matters for
linking of executables and the executable is linked against a library that over-
rides malloc and other allocator functions. See https://github.com/google/
sanitizers/wiki/AddressSanitizerLeakSanitizer for more details. The
run-time behavior can be influenced using the LSAN_OPTIONS environment vari-
able. The option cannot be combined with ‘-fsanitize=thread’.
Chapter 3: GCC Command Options 167
-fsanitize=undefined
Enable UndefinedBehaviorSanitizer, a fast undefined behavior detector. Var-
ious computations are instrumented to detect undefined behavior at runtime.
Current suboptions are:
-fsanitize=shift
This option enables checking that the result of a shift operation
is not undefined. Note that what exactly is considered
undefined differs slightly between C and C++, as well as between
ISO C90 and C99, etc. This option has two suboptions,
‘-fsanitize=shift-base’ and ‘-fsanitize=shift-exponent’.
-fsanitize=shift-exponent
This option enables checking that the second argument of a shift
operation is not negative and is smaller than the precision of the
promoted first argument.
-fsanitize=shift-base
If the second argument of a shift operation is within range, check
that the result of a shift operation is not undefined. Note that what
exactly is considered undefined differs slightly between C and C++,
as well as between ISO C90 and C99, etc.
-fsanitize=integer-divide-by-zero
Detect integer division by zero as well as INT_MIN / -1 division.
-fsanitize=unreachable
With this option, the compiler turns the __builtin_unreachable
call into a diagnostics message call instead. When reaching the
__builtin_unreachable call, the behavior is undefined.
-fsanitize=vla-bound
This option instructs the compiler to check that the size of a vari-
able length array is positive.
-fsanitize=null
This option enables pointer checking. Particularly, the application
built with this option turned on will issue an error message when
it tries to dereference a NULL pointer, or if a reference (possibly
an rvalue reference) is bound to a NULL pointer, or if a method is
invoked on an object pointed by a NULL pointer.
-fsanitize=return
This option enables return statement checking. Programs built
with this option turned on will issue an error message when the
end of a non-void function is reached without actually returning a
value. This option works in C++ only.
-fsanitize=signed-integer-overflow
This option enables signed integer overflow checking. We check that
the result of +, *, and both unary and binary - does not overflow
in the signed arithmetics. Note, integer promotion rules must be
taken into account. That is, the following is not an overflow:
168 Using the GNU Compiler Collection (GCC)
-fsanitize=bounds
This option enables instrumentation of array bounds. Various out
of bounds accesses are detected. Flexible array members, flexible
array member-like arrays, and initializers of variables with static
storage are not instrumented. The option cannot be combined with
‘-fcheck-pointer-bounds’.
-fsanitize=bounds-strict
This option enables strict instrumentation of array bounds. Most
out of bounds accesses are detected, including flexible array mem-
bers and flexible array member-like arrays. Initializers of variables
with static storage are not instrumented. The option cannot be
combined with ‘-fcheck-pointer-bounds’.
-fsanitize=alignment
This option enables checking of alignment of pointers when they are
dereferenced, or when a reference is bound to insufficiently aligned
target, or when a method or constructor is invoked on insufficiently
aligned object.
-fsanitize=object-size
This option enables instrumentation of memory references using the
__builtin_object_size function. Various out of bounds pointer
accesses are detected.
-fsanitize=float-divide-by-zero
Detect floating-point division by zero. Unlike other similar
options, ‘-fsanitize=float-divide-by-zero’ is not enabled by
‘-fsanitize=undefined’, since floating-point division by zero can
be a legitimate way of obtaining infinities and NaNs.
-fsanitize=float-cast-overflow
This option enables floating-point type to integer conversion check-
ing. We check that the result of the conversion does not overflow.
Unlike other similar options, ‘-fsanitize=float-cast-overflow’
is not enabled by ‘-fsanitize=undefined’. This option does not
work well with FE_INVALID exceptions enabled.
-fsanitize=nonnull-attribute
This option enables instrumentation of calls, checking whether null
values are not passed to arguments marked as requiring a non-null
value by the nonnull function attribute.
-fsanitize=returns-nonnull-attribute
This option enables instrumentation of return statements in func-
tions marked with returns_nonnull function attribute, to detect
returning of null values from such functions.
Chapter 3: GCC Command Options 169
-fsanitize=bool
This option enables instrumentation of loads from bool. If a value
other than 0/1 is loaded, a run-time error is issued.
-fsanitize=enum
This option enables instrumentation of loads from an enum type.
If a value outside the range of values for the enum type is loaded,
a run-time error is issued.
-fsanitize=vptr
This option enables instrumentation of C++ member function calls,
member accesses and some conversions between pointers to base
and derived classes, to verify the referenced object has the correct
dynamic type.
While ‘-ftrapv’ causes traps for signed overflows to be emitted,
‘-fsanitize=undefined’ gives a diagnostic message. This currently works
only for the C family of languages.
-fno-sanitize=all
This option disables all previously enabled sanitizers. ‘-fsanitize=all’ is not
allowed, as some sanitizers cannot be used together.
-fasan-shadow-offset=number
This option forces GCC to use custom shadow offset in AddressSanitizer checks.
It is useful for experimenting with different shadow memory layouts in Kernel
AddressSanitizer.
-fsanitize-sections=s1,s2,...
Sanitize global variables in selected user-defined sections. si may contain wild-
cards.
-fsanitize-recover[=opts]
‘-fsanitize-recover=’ controls error recovery mode for sanitizers mentioned
in comma-separated list of opts. Enabling this option for a sanitizer component
causes it to attempt to continue running the program as if no error happened.
This means multiple runtime errors can be reported in a single program run,
and the exit code of the program may indicate success even when errors have
been reported. The ‘-fno-sanitize-recover=’ option can be used to alter
this behavior: only the first detected error is reported and program then exits
with a non-zero exit code.
Currently this feature only works for ‘-fsanitize=undefined’ (and its
suboptions except for ‘-fsanitize=unreachable’ and ‘-fsanitize=return’),
‘-fsanitize=float-cast-overflow’, ‘-fsanitize=float-divide-by-zero’,
‘-fsanitize=bounds-strict’, ‘-fsanitize=kernel-address’ and
‘-fsanitize=address’. For these sanitizers error recovery is turned on by
default, except ‘-fsanitize=address’, for which this feature is experimental.
‘-fsanitize-recover=all’ and ‘-fno-sanitize-recover=all’ is also
accepted, the former enables recovery for all sanitizers that support it, the
latter disables recovery for all sanitizers that support it.
170 Using the GNU Compiler Collection (GCC)
-fsanitize-address-use-after-scope
Enable sanitization of local variables to detect use-after-scope bugs. The option
sets ‘-fstack-reuse’ to ‘none’.
-fsanitize-undefined-trap-on-error
The ‘-fsanitize-undefined-trap-on-error’ option instructs the compiler to
report undefined behavior using __builtin_trap rather than a libubsan li-
brary routine. The advantage of this is that the libubsan library is not needed
and is not linked in, so this is usable even in freestanding environments.
-fsanitize-coverage=trace-pc
Enable coverage-guided fuzzing code instrumentation. Inserts a call to __
sanitizer_cov_trace_pc into every basic block.
-fbounds-check
For front ends that support it, generate additional code to check that indices
used to access arrays are within the declared range. This is currently only
supported by the Fortran front end, where this option defaults to false.
-fcheck-pointer-bounds
Enable Pointer Bounds Checker instrumentation. Each memory reference is
instrumented with checks of the pointer used for memory access against bounds
associated with that pointer.
Currently there is only an implementation for Intel MPX available, thus x86
GNU/Linux target and ‘-mmpx’ are required to enable this feature. MPX-based
instrumentation requires a runtime library to enable MPX in hardware and
handle bounds violation signals. By default when ‘-fcheck-pointer-bounds’
and ‘-mmpx’ options are used to link a program, the GCC driver links against the
‘libmpx’ and ‘libmpxwrappers’ libraries. Bounds checking on calls to dynamic
libraries requires a linker with ‘-z bndplt’ support; if GCC was configured with
a linker without support for this option (including the Gold linker and older
versions of ld), a warning is given if you link with ‘-mmpx’ without also specifying
‘-static’, since the overall effectiveness of the bounds checking protection is
reduced. See also ‘-static-libmpxwrappers’.
MPX-based instrumentation may be used for debugging and also may be
included in production code to increase program security. Depending on
usage, you may have different requirements for the runtime library. The
current version of the MPX runtime library is more oriented for use as a
debugging tool. MPX runtime library usage implies ‘-lpthread’. See also
Chapter 3: GCC Command Options 171
-fchkp-use-static-const-bounds
Use statically-initialized bounds for constant bounds instead of gen-
erating them each time they are required. By default enabled when
‘-fchkp-use-static-bounds’ is enabled.
-fchkp-treat-zero-dynamic-size-as-infinite
With this option, objects with incomplete type whose dynamically-obtained size
is zero are treated as having infinite size instead by Pointer Bounds Checker.
This option may be helpful if a program is linked with a library missing size
information for some symbols. Disabled by default.
-fchkp-check-read
Instructs Pointer Bounds Checker to generate checks for all read accesses to
memory. Enabled by default.
-fchkp-check-write
Instructs Pointer Bounds Checker to generate checks for all write accesses to
memory. Enabled by default.
-fchkp-store-bounds
Instructs Pointer Bounds Checker to generate bounds stores for pointer writes.
Enabled by default.
-fchkp-instrument-calls
Instructs Pointer Bounds Checker to pass pointer bounds to calls. Enabled by
default.
-fchkp-instrument-marked-only
Instructs Pointer Bounds Checker to instrument only functions marked with the
bnd_instrument attribute (see Section 6.31 [Function Attributes], page 429).
Disabled by default.
-fchkp-use-wrappers
Allows Pointer Bounds Checker to replace calls to built-in functions with calls
to wrapper functions. When ‘-fchkp-use-wrappers’ is used to link a pro-
gram, the GCC driver automatically links against ‘libmpxwrappers’. See also
‘-static-libmpxwrappers’. Enabled by default.
-fstack-protector
Emit extra code to check for buffer overflows, such as stack smashing attacks.
This is done by adding a guard variable to functions with vulnerable objects.
This includes functions that call alloca, and functions with buffers larger than
8 bytes. The guards are initialized when a function is entered and then checked
when the function exits. If a guard check fails, an error message is printed and
the program exits.
-fstack-protector-all
Like ‘-fstack-protector’ except that all functions are protected.
-fstack-protector-strong
Like ‘-fstack-protector’ but includes additional functions to be protected
— those that have local array definitions, or have references to local frame
addresses.
Chapter 3: GCC Command Options 173
-fstack-protector-explicit
Like ‘-fstack-protector’ but only protects those functions which have the
stack_protect attribute.
-fstack-check
Generate code to verify that you do not go beyond the boundary of the stack.
You should specify this flag if you are running in an environment with multiple
threads, but you only rarely need to specify it in a single-threaded environment
since stack overflow is automatically detected on nearly all systems if there is
only one stack.
Note that this switch does not actually cause checking to be done; the operating
system or the language runtime must do that. The switch causes generation of
code to ensure that they see the stack being extended.
You can additionally specify a string parameter: ‘no’ means no checking,
‘generic’ means force the use of old-style checking, ‘specific’ means use the
best checking method and is equivalent to bare ‘-fstack-check’.
Old-style checking is a generic mechanism that requires no specific target sup-
port in the compiler but comes with the following drawbacks:
1. Modified allocation strategy for large objects: they are always allocated
dynamically if their size exceeds a fixed threshold.
2. Fixed limit on the size of the static frame of functions: when it is topped
by a particular function, stack checking is not reliable and a warning is
issued by the compiler.
3. Inefficiency: because of both the modified allocation strategy and the
generic implementation, code performance is hampered.
Note that old-style stack checking is also the fallback method for ‘specific’ if
no target support has been added in the compiler.
-fstack-limit-register=reg
-fstack-limit-symbol=sym
-fno-stack-limit
Generate code to ensure that the stack does not grow beyond a certain value,
either the value of a register or the address of a symbol. If a larger stack is
required, a signal is raised at run time. For most targets, the signal is raised
before the stack overruns the boundary, so it is possible to catch the signal
without taking special precautions.
For instance, if the stack starts at absolute address ‘0x80000000’ and grows
downwards, you can use the flags ‘-fstack-limit-symbol=__stack_limit’
and ‘-Wl,--defsym,__stack_limit=0x7ffe0000’ to enforce a stack limit of
128KB. Note that this may only work with the GNU linker.
You can locally override stack limit checking by using the no_stack_limit
function attribute (see Section 6.31 [Function Attributes], page 429).
-fsplit-stack
Generate code to automatically split the stack before it overflows. The resulting
program has a discontiguous stack which can only overflow if the program is
174 Using the GNU Compiler Collection (GCC)
unable to allocate any more memory. This is most useful when running threaded
programs, as it is no longer necessary to calculate a good stack size to use for
each thread. This is currently only implemented for the x86 targets running
GNU/Linux.
When code compiled with ‘-fsplit-stack’ calls code compiled without
‘-fsplit-stack’, there may not be much stack space available for the
latter code to run. If compiling all code, including library code, with
‘-fsplit-stack’ is not an option, then the linker can fix up these calls so that
the code compiled without ‘-fsplit-stack’ always has a large stack. Support
for this is implemented in the gold linker in GNU binutils release 2.21 and
later.
-fvtable-verify=[std|preinit|none]
This option is only available when compiling C++ code. It turns on (or off, if
using ‘-fvtable-verify=none’) the security feature that verifies at run time,
for every virtual call, that the vtable pointer through which the call is made
is valid for the type of the object, and has not been corrupted or overwritten.
If an invalid vtable pointer is detected at run time, an error is reported and
execution of the program is immediately halted.
This option causes run-time data structures to be built at program startup,
which are used for verifying the vtable pointers. The options ‘std’ and
‘preinit’ control the timing of when these data structures are built. In both
cases the data structures are built before execution reaches main. Using
‘-fvtable-verify=std’ causes the data structures to be built after shared
libraries have been loaded and initialized. ‘-fvtable-verify=preinit’ causes
them to be built before shared libraries have been loaded and initialized.
If this option appears multiple times in the command line with different values
specified, ‘none’ takes highest priority over both ‘std’ and ‘preinit’; ‘preinit’
takes priority over ‘std’.
-fvtv-debug
When used in conjunction with ‘-fvtable-verify=std’ or
‘-fvtable-verify=preinit’, causes debug versions of the runtime
functions for the vtable verification feature to be called. This flag also causes
the compiler to log information about which vtable pointers it finds for each
class. This information is written to a file named ‘vtv_set_ptr_data.log’
in the directory named by the environment variable VTV_LOGS_DIR if that is
defined or the current working directory otherwise.
Note: This feature appends data to the log file. If you want a fresh log file, be
sure to delete any existing one.
-fvtv-counts
This is a debugging flag. When used in conjunction with
‘-fvtable-verify=std’ or ‘-fvtable-verify=preinit’, this causes
the compiler to keep track of the total number of virtual calls it encounters
and the number of verifications it inserts. It also counts the number of calls to
certain run-time library functions that it inserts and logs this information for
each compilation unit. The compiler writes this information to a file named
Chapter 3: GCC Command Options 175
-finstrument-functions-exclude-function-list=sym,sym,...
This is similar to ‘-finstrument-functions-exclude-file-list’, but this
option sets the list of function names to be excluded from instrumentation.
The function name to be matched is its user-visible name, such as
vector<int> blah(const vector<int> &), not the internal mangled name
(e.g., _Z4blahRSt6vectorIiSaIiEE). The match is done on substrings: if the
sym parameter is a substring of the function name, it is considered to be
a match. For C99 and C++ extended identifiers, the function name must be
given in UTF-8, not using universal character names.
-imacros file
Exactly like ‘-include’, except that any output produced by scanning file is
thrown away. Macros it defines remain defined. This allows you to acquire all
the macros from a header without also processing its declarations.
All files specified by ‘-imacros’ are processed before all files specified by
‘-include’.
-undef Do not predefine any system-specific or GCC-specific macros. The standard
predefined macros remain defined.
-pthread Define additional macros required for using the POSIX threads library. You
should use this option consistently for both compilation and linking. This
option is supported on GNU/Linux targets, most other Unix derivatives, and
also on x86 Cygwin and MinGW targets.
-M Instead of outputting the result of preprocessing, output a rule suitable for make
describing the dependencies of the main source file. The preprocessor outputs
one make rule containing the object file name for that source file, a colon, and
the names of all the included files, including those coming from ‘-include’ or
‘-imacros’ command-line options.
Unless specified explicitly (with ‘-MT’ or ‘-MQ’), the object file name consists of
the name of the source file with any suffix replaced with object file suffix and
with any leading directory parts removed. If there are many included files then
the rule is split into several lines using ‘\’-newline. The rule has no commands.
This option does not suppress the preprocessor’s debug output, such as ‘-dM’.
To avoid mixing such debug output with the dependency rules you should ex-
plicitly specify the dependency output file with ‘-MF’, or use an environment
variable like DEPENDENCIES_OUTPUT (see Section 3.20 [Environment Variables],
page 389). Debug output is still sent to the regular output stream as normal.
Passing ‘-M’ to the driver implies ‘-E’, and suppresses warnings with an implicit
‘-w’.
-MM Like ‘-M’ but do not mention header files that are found in system header
directories, nor header files that are included, directly or indirectly, from such
a header.
This implies that the choice of angle brackets or double quotes in an ‘#include’
directive does not in itself determine whether that header appears in ‘-MM’
dependency output.
-MF file When used with ‘-M’ or ‘-MM’, specifies a file to write the dependencies to. If
no ‘-MF’ switch is given the preprocessor sends the rules to the same place it
would send preprocessed output.
When used with the driver options ‘-MD’ or ‘-MMD’, ‘-MF’ overrides the default
dependency output file.
-MG In conjunction with an option such as ‘-M’ requesting dependency generation,
‘-MG’ assumes missing header files are generated files and adds them to the
dependency list without raising an error. The dependency filename is taken
178 Using the GNU Compiler Collection (GCC)
directly from the #include directive without prepending any path. ‘-MG’ also
suppresses preprocessed output, as a missing header file renders this useless.
This feature is used in automatic updating of makefiles.
-MP This option instructs CPP to add a phony target for each dependency other
than the main file, causing each to depend on nothing. These dummy rules
work around errors make gives if you remove header files without updating the
‘Makefile’ to match.
This is typical output:
test.o: test.c test.h
test.h:
-MT target
Change the target of the rule emitted by dependency generation. By default
CPP takes the name of the main input file, deletes any directory components
and any file suffix such as ‘.c’, and appends the platform’s usual object suffix.
The result is the target.
An ‘-MT’ option sets the target to be exactly the string you specify. If you want
multiple targets, you can specify them as a single argument to ‘-MT’, or use
multiple ‘-MT’ options.
For example, ‘-MT ’$(objpfx)foo.o’’ might give
$(objpfx)foo.o: foo.c
-MQ target
Same as ‘-MT’, but it quotes any characters which are special to Make.
‘-MQ ’$(objpfx)foo.o’’ gives
$$(objpfx)foo.o: foo.c
The default target is automatically quoted, as if it were given with ‘-MQ’.
-MD ‘-MD’ is equivalent to ‘-M -MF file’, except that ‘-E’ is not implied. The driver
determines file based on whether an ‘-o’ option is given. If it is, the driver uses
its argument but with a suffix of ‘.d’, otherwise it takes the name of the input
file, removes any directory components and suffix, and applies a ‘.d’ suffix.
If ‘-MD’ is used in conjunction with ‘-E’, any ‘-o’ switch is understood to specify
the dependency output file (see [-MF], page 177), but if used without ‘-E’, each
‘-o’ is understood to specify a target object file.
Since ‘-E’ is not implied, ‘-MD’ can be used to generate a dependency output
file as a side-effect of the compilation process.
-MMD Like ‘-MD’ except mention only user header files, not system header files.
-fpreprocessed
Indicate to the preprocessor that the input file has already been preprocessed.
This suppresses things like macro expansion, trigraph conversion, escaped new-
line splicing, and processing of most directives. The preprocessor still recognizes
and removes comments, so that you can pass a file preprocessed with ‘-C’ to the
compiler without problems. In this mode the integrated preprocessor is little
more than a tokenizer for the front ends.
Chapter 3: GCC Command Options 179
‘-fpreprocessed’ is implicit if the input file has one of the extensions ‘.i’,
‘.ii’ or ‘.mi’. These are the extensions that GCC uses for preprocessed files
created by ‘-save-temps’.
-fdirectives-only
When preprocessing, handle directives, but do not expand macros.
The option’s behavior depends on the ‘-E’ and ‘-fpreprocessed’ options.
With ‘-E’, preprocessing is limited to the handling of directives such as #define,
#ifdef, and #error. Other preprocessor operations, such as macro expansion
and trigraph conversion are not performed. In addition, the ‘-dD’ option is
implicitly enabled.
With ‘-fpreprocessed’, predefinition of command line and most builtin macros
is disabled. Macros such as __LINE__, which are contextually dependent, are
handled normally. This enables compilation of files previously preprocessed
with -E -fdirectives-only.
With both ‘-E’ and ‘-fpreprocessed’, the rules for ‘-fpreprocessed’ take
precedence. This enables full preprocessing of files previously preprocessed
with -E -fdirectives-only.
-fdollars-in-identifiers
Accept ‘$’ in identifiers.
-fextended-identifiers
Accept universal character names in identifiers. This option is enabled by de-
fault for C99 (and later C standard versions) and C++.
-fno-canonical-system-headers
When preprocessing, do not shorten system header paths with canonicalization.
-ftabstop=width
Set the distance between tab stops. This helps the preprocessor report correct
column numbers in warnings or errors, even if tabs appear on the line. If the
value is less than 1 or greater than 100, the option is ignored. The default is 8.
-ftrack-macro-expansion[=level]
Track locations of tokens across macro expansions. This allows the compiler to
emit diagnostic about the current macro expansion stack when a compilation
error occurs in a macro expansion. Using this option makes the preprocessor
and the compiler consume more memory. The level parameter can be used
to choose the level of precision of token location tracking thus decreasing the
memory consumption if necessary. Value ‘0’ of level de-activates this option.
Value ‘1’ tracks tokens locations in a degraded mode for the sake of minimal
memory overhead. In this mode all tokens resulting from the expansion of an
argument of a function-like macro have the same location. Value ‘2’ tracks
tokens locations completely. This value is the most memory hungry. When this
option is given no argument, the default parameter value is ‘2’.
Note that -ftrack-macro-expansion=2 is activated by default.
180 Using the GNU Compiler Collection (GCC)
-fexec-charset=charset
Set the execution character set, used for string and character constants. The
default is UTF-8. charset can be any encoding supported by the system’s iconv
library routine.
-fwide-exec-charset=charset
Set the wide execution character set, used for wide string and character con-
stants. The default is UTF-32 or UTF-16, whichever corresponds to the width
of wchar_t. As with ‘-fexec-charset’, charset can be any encoding supported
by the system’s iconv library routine; however, you will have problems with
encodings that do not fit exactly in wchar_t.
-finput-charset=charset
Set the input character set, used for translation from the character set of the
input file to the source character set used by GCC. If the locale does not specify,
or GCC cannot get this information from the locale, the default is UTF-8. This
can be overridden by either the locale or this command-line option. Currently
the command-line option takes precedence if there’s a conflict. charset can be
any encoding supported by the system’s iconv library routine.
-fpch-deps
When using precompiled headers (see Section 3.21 [Precompiled Headers],
page 392), this flag causes the dependency-output flags to also list the
files from the precompiled header’s dependencies. If not specified, only the
precompiled header are listed and not the files that were used to create it,
because those files are not consulted when a precompiled header is used.
-fpch-preprocess
This option allows use of a precompiled header (see Section 3.21 [Precompiled
Headers], page 392) together with ‘-E’. It inserts a special #pragma, #pragma
GCC pch_preprocess "filename" in the output to mark the place where the
precompiled header was found, and its filename. When ‘-fpreprocessed’ is in
use, GCC recognizes this #pragma and loads the PCH.
This option is off by default, because the resulting preprocessed output is only
really suitable as input to GCC. It is switched on by ‘-save-temps’.
You should not write this #pragma in your own code, but it is safe to edit the
filename if the PCH file is available in a different location. The filename may
be absolute or it may be relative to GCC’s current directory.
-fworking-directory
Enable generation of linemarkers in the preprocessor output that let the com-
piler know the current working directory at the time of preprocessing. When
this option is enabled, the preprocessor emits, after the initial linemarker, a
second linemarker with the current working directory followed by two slashes.
GCC uses this directory, when it’s present in the preprocessed input, as the di-
rectory emitted as the current working directory in some debugging information
formats. This option is implicitly enabled if debugging information is enabled,
but this can be inhibited with the negated form ‘-fno-working-directory’.
If the ‘-P’ flag is present in the command line, this option has no effect, since
no #line directives are emitted whatsoever.
Chapter 3: GCC Command Options 181
-A predicate=answer
Make an assertion with the predicate predicate and answer answer. This form
is preferred to the older form ‘-A predicate(answer)’, which is still supported,
because it does not use shell special characters.
-A -predicate=answer
Cancel an assertion with the predicate predicate and answer answer.
-C Do not discard comments. All comments are passed through to the output file,
except for comments in processed directives, which are deleted along with the
directive.
You should be prepared for side effects when using ‘-C’; it causes the prepro-
cessor to treat comments as tokens in their own right. For example, comments
appearing at the start of what would be a directive line have the effect of turn-
ing that line into an ordinary source line, since the first token on the line is no
longer a ‘#’.
-CC Do not discard comments, including during macro expansion. This is like ‘-C’,
except that comments contained within macros are also passed through to the
output file where the macro is expanded.
In addition to the side-effects of the ‘-C’ option, the ‘-CC’ option causes all
C++-style comments inside a macro to be converted to C-style comments. This
is to prevent later use of that macro from inadvertently commenting out the
remainder of the source line.
The ‘-CC’ option is generally used to support lint comments.
-P Inhibit generation of linemarkers in the output from the preprocessor. This
might be useful when running the preprocessor on something that is not C code,
and will be sent to a program which might be confused by the linemarkers.
-traditional
-traditional-cpp
Try to imitate the behavior of pre-standard C preprocessors, as opposed to ISO
C preprocessors. See the GNU CPP manual for details.
Note that GCC does not otherwise attempt to emulate a pre-standard C com-
piler, and these options are only supported with the ‘-E’ switch, or when in-
voking CPP explicitly.
-trigraphs
Support ISO C trigraphs. These are three-character sequences, all starting with
‘??’, that are defined by ISO C to stand for single characters. For example, ‘??/’
stands for ‘\’, so ‘’??/n’’ is a character constant for a newline.
The nine trigraphs and their replacements are
Trigraph: ??( ??) ??< ??> ??= ??/ ??’ ??! ??-
Replacement: [ ] { } # \ ^ | ~
By default, GCC ignores trigraphs, but in standard-conforming modes it con-
verts them. See the ‘-std’ and ‘-ansi’ options.
-remap Enable special code to work around file systems which only permit very short
file names, such as MS-DOS.
182 Using the GNU Compiler Collection (GCC)
-H Print the name of each header file used, in addition to other normal activities.
Each name is indented to show how deep in the ‘#include’ stack it is. Precom-
piled header files are also printed, even if they are found to be invalid; an invalid
precompiled header file is printed with ‘...x’ and a valid one with ‘...!’ .
-dletters
Says to make debugging dumps during compilation as specified by letters. The
flags documented here are those relevant to the preprocessor. Other letters
are interpreted by the compiler proper, or reserved for future versions of GCC,
and so are silently ignored. If you specify letters whose behavior conflicts, the
result is undefined. See Section 3.17 [Developer Options], page 201, for more
information.
-dM Instead of the normal output, generate a list of ‘#define’ directives
for all the macros defined during the execution of the preprocessor,
including predefined macros. This gives you a way of finding out
what is predefined in your version of the preprocessor. Assuming
you have no file ‘foo.h’, the command
touch foo.h; cpp -dM foo.h
shows all the predefined macros.
If you use ‘-dM’ without the ‘-E’ option, ‘-dM’ is interpreted as a
synonym for ‘-fdump-rtl-mach’. See Section “Developer Options”
in gcc.
-dD Like ‘-dM’ except in two respects: it does not include the predefined
macros, and it outputs both the ‘#define’ directives and the result
of preprocessing. Both kinds of output go to the standard output
file.
-dN Like ‘-dD’, but emit only the macro names, not their expansions.
-dI Output ‘#include’ directives in addition to the result of prepro-
cessing.
-dU Like ‘-dD’ except that only macros that are expanded, or whose de-
finedness is tested in preprocessor directives, are output; the output
is delayed until the use or test of the macro; and ‘#undef’ directives
are also output for macros tested but undefined at the time.
-fdebug-cpp
This option is only useful for debugging GCC. When used from CPP or with
‘-E’, it dumps debugging information about location maps. Every token in the
output is preceded by the dump of the map its location belongs to.
When used from GCC without ‘-E’, this option has no effect.
-Wp,option
You can use ‘-Wp,option’ to bypass the compiler driver and pass option directly
through to the preprocessor. If option contains commas, it is split into multiple
options at the commas. However, many options are modified, translated or
interpreted by the compiler driver before being passed to the preprocessor,
and ‘-Wp’ forcibly bypasses this phase. The preprocessor’s direct interface is
Chapter 3: GCC Command Options 183
-fuse-ld=gold
Use the gold linker instead of the default linker.
-llibrary
-l library
Search the library named library when linking. (The second alternative with
the library as a separate argument is only for POSIX compliance and is not
recommended.)
It makes a difference where in the command you write this option; the linker
searches and processes libraries and object files in the order they are speci-
fied. Thus, ‘foo.o -lz bar.o’ searches library ‘z’ after file ‘foo.o’ but before
‘bar.o’. If ‘bar.o’ refers to functions in ‘z’, those functions may not be loaded.
The linker searches a standard list of directories for the library, which is actually
a file named ‘liblibrary.a’. The linker then uses this file as if it had been
specified precisely by name.
The directories searched include several standard system directories plus any
that you specify with ‘-L’.
Normally the files found this way are library files—archive files whose members
are object files. The linker handles an archive file by scanning through it for
members which define symbols that have so far been referenced but not defined.
But if the file that is found is an ordinary object file, it is linked in the usual
fashion. The only difference between using an ‘-l’ option and specifying a file
name is that ‘-l’ surrounds library with ‘lib’ and ‘.a’ and searches several
directories.
-lobjc You need this special case of the ‘-l’ option in order to link an Objective-C or
Objective-C++ program.
-nostartfiles
Do not use the standard system startup files when linking. The standard system
libraries are used normally, unless ‘-nostdlib’ or ‘-nodefaultlibs’ is used.
-nodefaultlibs
Do not use the standard system libraries when linking. Only the libraries you
specify are passed to the linker, and options specifying linkage of the system
libraries, such as ‘-static-libgcc’ or ‘-shared-libgcc’, are ignored. The
standard startup files are used normally, unless ‘-nostartfiles’ is used.
The compiler may generate calls to memcmp, memset, memcpy and memmove.
These entries are usually resolved by entries in libc. These entry points should
be supplied through some other mechanism when this option is specified.
-nostdlib
Do not use the standard system startup files or libraries when linking. No
startup files and only the libraries you specify are passed to the linker, and
options specifying linkage of the system libraries, such as ‘-static-libgcc’ or
‘-shared-libgcc’, are ignored.
The compiler may generate calls to memcmp, memset, memcpy and memmove.
These entries are usually resolved by entries in libc. These entry points should
be supplied through some other mechanism when this option is specified.
Chapter 3: GCC Command Options 185
the application wishes to throw and catch exceptions across different shared li-
braries. In that case, each of the libraries as well as the application itself should
use the shared ‘libgcc’.
Therefore, the G++ driver automatically adds ‘-shared-libgcc’ whenever you
build a shared library or a main executable, because C++ programs typically
use exceptions, so this is the right thing to do.
If, instead, you use the GCC driver to create shared libraries, you may find
that they are not always linked with the shared ‘libgcc’. If GCC finds, at its
configuration time, that you have a non-GNU linker or a GNU linker that does
not support option ‘--eh-frame-hdr’, it links the shared version of ‘libgcc’
into shared libraries by default. Otherwise, it takes advantage of the linker and
optimizes away the linking with the shared version of ‘libgcc’, linking with the
static version of libgcc by default. This allows exceptions to propagate through
such shared libraries, without incurring relocation costs at library load time.
However, if a library or main executable is supposed to throw or catch
exceptions, you must link it using the G++ driver, or using the option
‘-shared-libgcc’, such that it is linked with the shared ‘libgcc’.
-static-libasan
When the ‘-fsanitize=address’ option is used to link a program, the GCC
driver automatically links against ‘libasan’. If ‘libasan’ is available as a
shared library, and the ‘-static’ option is not used, then this links against the
shared version of ‘libasan’. The ‘-static-libasan’ option directs the GCC
driver to link ‘libasan’ statically, without necessarily linking other libraries
statically.
-static-libtsan
When the ‘-fsanitize=thread’ option is used to link a program, the GCC
driver automatically links against ‘libtsan’. If ‘libtsan’ is available as a
shared library, and the ‘-static’ option is not used, then this links against the
shared version of ‘libtsan’. The ‘-static-libtsan’ option directs the GCC
driver to link ‘libtsan’ statically, without necessarily linking other libraries
statically.
-static-liblsan
When the ‘-fsanitize=leak’ option is used to link a program, the GCC driver
automatically links against ‘liblsan’. If ‘liblsan’ is available as a shared
library, and the ‘-static’ option is not used, then this links against the shared
version of ‘liblsan’. The ‘-static-liblsan’ option directs the GCC driver to
link ‘liblsan’ statically, without necessarily linking other libraries statically.
-static-libubsan
When the ‘-fsanitize=undefined’ option is used to link a program, the GCC
driver automatically links against ‘libubsan’. If ‘libubsan’ is available as a
shared library, and the ‘-static’ option is not used, then this links against the
shared version of ‘libubsan’. The ‘-static-libubsan’ option directs the GCC
driver to link ‘libubsan’ statically, without necessarily linking other libraries
statically.
Chapter 3: GCC Command Options 187
-static-libmpx
When the ‘-fcheck-pointer bounds’ and ‘-mmpx’ options are used to link a
program, the GCC driver automatically links against ‘libmpx’. If ‘libmpx’ is
available as a shared library, and the ‘-static’ option is not used, then this
links against the shared version of ‘libmpx’. The ‘-static-libmpx’ option
directs the GCC driver to link ‘libmpx’ statically, without necessarily linking
other libraries statically.
-static-libmpxwrappers
When the ‘-fcheck-pointer bounds’ and ‘-mmpx’ options are used to link a
program without also using ‘-fno-chkp-use-wrappers’, the GCC driver auto-
matically links against ‘libmpxwrappers’. If ‘libmpxwrappers’ is available as a
shared library, and the ‘-static’ option is not used, then this links against the
shared version of ‘libmpxwrappers’. The ‘-static-libmpxwrappers’ option
directs the GCC driver to link ‘libmpxwrappers’ statically, without necessarily
linking other libraries statically.
-static-libstdc++
When the g++ program is used to link a C++ program, it normally automatically
links against ‘libstdc++’. If ‘libstdc++’ is available as a shared library, and
the ‘-static’ option is not used, then this links against the shared version of
‘libstdc++’. That is normally fine. However, it is sometimes useful to freeze
the version of ‘libstdc++’ used by the program without going all the way to
a fully static link. The ‘-static-libstdc++’ option directs the g++ driver to
link ‘libstdc++’ statically, without necessarily linking other libraries statically.
-symbolic
Bind references to global symbols when building a shared object. Warn about
any unresolved references (unless overridden by the link editor option ‘-Xlinker
-z -Xlinker defs’). Only a few systems support this option.
-T script Use script as the linker script. This option is supported by most systems using
the GNU linker. On some targets, such as bare-board targets without an oper-
ating system, the ‘-T’ option may be required when linking to avoid references
to undefined symbols.
-Xlinker option
Pass option as an option to the linker. You can use this to supply system-specific
linker options that GCC does not recognize.
If you want to pass an option that takes a separate argument, you must use
‘-Xlinker’ twice, once for the option and once for the argument. For example,
to pass ‘-assert definitions’, you must write ‘-Xlinker -assert -Xlinker
definitions’. It does not work to write ‘-Xlinker "-assert definitions"’,
because this passes the entire string as a single argument, which is not what
the linker expects.
When using the GNU linker, it is usually more convenient to pass arguments to
linker options using the ‘option=value’ syntax than as separate arguments. For
example, you can specify ‘-Xlinker -Map=output.map’ rather than ‘-Xlinker
-Map -Xlinker output.map’. Other linkers may not support this syntax for
command-line options.
188 Using the GNU Compiler Collection (GCC)
-Wl,option
Pass option as an option to the linker. If option contains commas, it is split into
multiple options at the commas. You can use this syntax to pass an argument
to the option. For example, ‘-Wl,-Map,output.map’ passes ‘-Map output.map’
to the linker. When using the GNU linker, you can also get the same effect
with ‘-Wl,-Map=output.map’.
-u symbol Pretend the symbol symbol is undefined, to force linking of library modules
to define it. You can use ‘-u’ multiple times with different symbols to force
loading of additional library modules.
-z keyword
‘-z’ is passed directly on to the linker along with the keyword keyword. See
the section in the documentation of your linker for permitted values and their
meanings.
-I dir
-iquote dir
-isystem dir
-idirafter dir
Add the directory dir to the list of directories to be searched for header files
during preprocessing. If dir begins with ‘=’, then the ‘=’ is replaced by the
sysroot prefix; see ‘--sysroot’ and ‘-isysroot’.
Directories specified with ‘-iquote’ apply only to the quote form of the
directive, #include "file". Directories specified with ‘-I’, ‘-isystem’,
or ‘-idirafter’ apply to lookup for both the #include "file" and
#include <file> directives.
You can specify any number or combination of these options on the command
line to search for header files in several directories. The lookup order is as
follows:
1. For the quote form of the include directive, the directory of the current file
is searched first.
2. For the quote form of the include directive, the directories specified by
‘-iquote’ options are searched in left-to-right order, as they appear on the
command line.
3. Directories specified with ‘-I’ options are scanned in left-to-right order.
4. Directories specified with ‘-isystem’ options are scanned in left-to-right
order.
5. Standard system directories are scanned.
6. Directories specified with ‘-idirafter’ options are scanned in left-to-right
order.
Chapter 3: GCC Command Options 189
You can use ‘-I’ to override a system header file, substituting your own ver-
sion, since these directories are searched before the standard system header file
directories. However, you should not use this option to add directories that
contain vendor-supplied system header files; use ‘-isystem’ for that.
The ‘-isystem’ and ‘-idirafter’ options also mark the directory as a system
directory, so that it gets the same special treatment that is applied to the
standard system directories.
If a standard system include directory, or a directory specified with ‘-isystem’,
is also specified with ‘-I’, the ‘-I’ option is ignored. The directory is still
searched but as a system directory at its normal position in the system include
chain. This is to ensure that GCC’s procedure to fix buggy system headers and
the ordering for the #include_next directive are not inadvertently changed.
If you really need to change the search order for system directories, use the
‘-nostdinc’ and/or ‘-isystem’ options.
-I- Split the include path. This option has been deprecated. Please use ‘-iquote’
instead for ‘-I’ directories before the ‘-I-’ and remove the ‘-I-’ option.
Any directories specified with ‘-I’ options before ‘-I-’ are searched only
for headers requested with #include "file"; they are not searched for
#include <file>. If additional directories are specified with ‘-I’ options after
the ‘-I-’, those directories are searched for all ‘#include’ directives.
In addition, ‘-I-’ inhibits the use of the directory of the current file directory
as the first search directory for #include "file". There is no way to override
this effect of ‘-I-’.
-iprefix prefix
Specify prefix as the prefix for subsequent ‘-iwithprefix’ options. If the prefix
represents a directory, you should include the final ‘/’.
-iwithprefix dir
-iwithprefixbefore dir
Append dir to the prefix specified previously with ‘-iprefix’, and add the
resulting directory to the include search path. ‘-iwithprefixbefore’ puts it
in the same place ‘-I’ would; ‘-iwithprefix’ puts it where ‘-idirafter’ would.
-isysroot dir
This option is like the ‘--sysroot’ option, but applies only to header files
(except for Darwin targets, where it applies to both header files and libraries).
See the ‘--sysroot’ option for more information.
-imultilib dir
Use dir as a subdirectory of the directory containing target-specific C++ headers.
-nostdinc
Do not search the standard system directories for header files. Only the directo-
ries explicitly specified with ‘-I’, ‘-iquote’, ‘-isystem’, and/or ‘-idirafter’
options (and the directory of the current file, if appropriate) are searched.
190 Using the GNU Compiler Collection (GCC)
-nostdinc++
Do not search for header files in the C++-specific standard directories, but do
still search the other standard directories. (This option is used when building
the C++ library.)
-iplugindir=dir
Set the directory to search for plugins that are passed by ‘-fplugin=name’
instead of ‘-fplugin=path/name.so’. This option is not meant to be used by
the user, but only passed by the driver.
-Ldir Add directory dir to the list of directories to be searched for ‘-l’.
-Bprefix This option specifies where to find the executables, libraries, include files, and
data files of the compiler itself.
The compiler driver program runs one or more of the subprograms cpp, cc1,
as and ld. It tries prefix as a prefix for each program it tries to run, both
with and without ‘machine/version/’ for the corresponding target machine
and compiler version.
For each subprogram to be run, the compiler driver first tries the ‘-B’ prefix, if
any. If that name is not found, or if ‘-B’ is not specified, the driver tries two
standard prefixes, ‘/usr/lib/gcc/’ and ‘/usr/local/lib/gcc/’. If neither of
those results in a file name that is found, the unmodified program name is
searched for using the directories specified in your PATH environment variable.
The compiler checks to see if the path provided by ‘-B’ refers to a directory,
and if necessary it adds a directory separator character at the end of the path.
‘-B’ prefixes that effectively specify directory names also apply to libraries in
the linker, because the compiler translates these options into ‘-L’ options for
the linker. They also apply to include files in the preprocessor, because the
compiler translates these options into ‘-isystem’ options for the preprocessor.
In this case, the compiler appends ‘include’ to the prefix.
The runtime support file ‘libgcc.a’ can also be searched for using the ‘-B’
prefix, if needed. If it is not found there, the two standard prefixes above are
tried, and that is all. The file is left out of the link if it is not found by those
means.
Another way to specify a prefix much like the ‘-B’ prefix is to use the envi-
ronment variable GCC_EXEC_PREFIX. See Section 3.20 [Environment Variables],
page 389.
As a special kludge, if the path provided by ‘-B’ is ‘[dir/]stageN/’, where N
is a number in the range 0 to 9, then it is replaced by ‘[dir/]include’. This
is to help with boot-strapping the compiler.
-no-canonical-prefixes
Do not expand any symbolic links, resolve references to ‘/../’ or ‘/./’, or make
the path absolute when generating a relative prefix.
--sysroot=dir
Use dir as the logical root directory for headers and libraries. For example, if
the compiler normally searches for headers in ‘/usr/include’ and libraries in
‘/usr/lib’, it instead searches ‘dir/usr/include’ and ‘dir/usr/lib’.
Chapter 3: GCC Command Options 191
If you use both this option and the ‘-isysroot’ option, then the ‘--sysroot’
option applies to libraries, but the ‘-isysroot’ option applies to header files.
The GNU linker (beginning with version 2.16) has the necessary support for
this option. If your linker does not support this option, the header file aspect
of ‘--sysroot’ still works, but the library aspect does not.
--no-sysroot-suffix
For some targets, a suffix is added to the root directory specified with
‘--sysroot’, depending on the other options used, so that headers may for ex-
ample be found in ‘dir/suffix/usr/include’ instead of ‘dir/usr/include’.
This option disables the addition of such a suffix.
p = &local1;
local1 = 10;
....
}
{
int local2;
local2 = 20;
...
}
Another example:
struct A
{
A(int k) : i(k), j(k) { }
int i;
int j;
};
A *ap;
void bar()
{
foo(A(10)); // temp object’s lifetime ends when foo returns
{
A a(20);
....
}
ap->i+= 10; // ap references out of scope temp whose space
// is reused with a. What is the value of ap->i?
}
-ftrapv This option generates traps for signed overflow on addition, subtraction, multi-
plication operations. The options ‘-ftrapv’ and ‘-fwrapv’ override each other,
so using ‘-ftrapv’ ‘-fwrapv’ on the command-line results in ‘-fwrapv’ being
effective. Note that only active options override, so using ‘-ftrapv’ ‘-fwrapv’
‘-fno-wrapv’ on the command-line results in ‘-ftrapv’ being effective.
-fwrapv This option instructs the compiler to assume that signed arithmetic overflow of
addition, subtraction and multiplication wraps around using twos-complement
representation. This flag enables some optimizations and disables others.
The options ‘-ftrapv’ and ‘-fwrapv’ override each other, so using ‘-ftrapv’
‘-fwrapv’ on the command-line results in ‘-fwrapv’ being effective. Note that
only active options override, so using ‘-ftrapv’ ‘-fwrapv’ ‘-fno-wrapv’ on the
command-line results in ‘-ftrapv’ being effective.
Chapter 3: GCC Command Options 193
-fexceptions
Enable exception handling. Generates extra code needed to propagate excep-
tions. For some targets, this implies GCC generates frame unwind information
for all functions, which can produce significant data size overhead, although
it does not affect execution. If you do not specify this option, GCC enables
it by default for languages like C++ that normally require exception handling,
and disables it for languages like C that do not normally require it. However,
you may need to enable this option when compiling C code that needs to inter-
operate properly with exception handlers written in C++. You may also wish
to disable this option if you are compiling older C++ programs that don’t use
exception handling.
-fnon-call-exceptions
Generate code that allows trapping instructions to throw exceptions. Note that
this requires platform-specific runtime support that does not exist everywhere.
Moreover, it only allows trapping instructions to throw exceptions, i.e. memory
references or floating-point instructions. It does not allow exceptions to be
thrown from arbitrary signal handlers such as SIGALRM.
-fdelete-dead-exceptions
Consider that instructions that may throw exceptions but don’t otherwise con-
tribute to the execution of the program can be optimized away. This option is
enabled by default for the Ada front end, as permitted by the Ada language
specification. Optimization passes that cause dead exceptions to be removed
are enabled independently at different optimization levels.
-funwind-tables
Similar to ‘-fexceptions’, except that it just generates any needed static data,
but does not affect the generated code in any other way. You normally do
not need to enable this option; instead, a language processor that needs this
handling enables it on your behalf.
-fasynchronous-unwind-tables
Generate unwind table in DWARF format, if supported by target machine.
The table is exact at each instruction boundary, so it can be used for stack
unwinding from asynchronous events (such as debugger or garbage collector).
-fno-gnu-unique
On systems with recent GNU assembler and C library, the C++ compiler uses
the STB_GNU_UNIQUE binding to make sure that definitions of template static
data members and static local variables in inline functions are unique even in
the presence of RTLD_LOCAL; this is necessary to avoid problems with a library
used by two different RTLD_LOCAL plugins depending on a definition in one of
them and therefore disagreeing with the other one about the binding of the
symbol. But this causes dlclose to be ignored for affected DSOs; if your
program relies on reinitialization of a DSO via dlclose and dlopen, you can
use ‘-fno-gnu-unique’.
-fpcc-struct-return
Return “short” struct and union values in memory like longer ones, rather
than in registers. This convention is less efficient, but it has the advantage
194 Using the GNU Compiler Collection (GCC)
and is the default for GCC on most targets. On the other hand, this behavior
is not required by ISO C, and on some targets may carry a speed or code size
penalty on variable references.
The ‘-fno-common’ option specifies that the compiler should instead place unini-
tialized global variables in the data section of the object file. This inhibits the
merging of tentative definitions by the linker so you get a multiple-definition
error if the same variable is defined in more than one compilation unit. Com-
piling with ‘-fno-common’ is useful on targets for which it provides better per-
formance, or if you wish to verify that the program will work on other systems
that always treat uninitialized variable definitions this way.
-fno-ident
Ignore the #ident directive.
-finhibit-size-directive
Don’t output a .size assembler directive, or anything else that would cause
trouble if the function is split in the middle, and the two halves are placed at lo-
cations far apart in memory. This option is used when compiling ‘crtstuff.c’;
you should not need to use it for anything else.
-fverbose-asm
Put extra commentary information in the generated assembly code to make it
more readable. This option is generally only of use to those who actually need
to read the generated assembly code (perhaps while debugging the compiler
itself).
‘-fno-verbose-asm’, the default, causes the extra information to be omitted
and is useful when comparing two assembler files.
The added comments include:
• information on the compiler version and command-line options,
• the source code lines associated with the assembly instructions, in the form
FILENAME:LINENUMBER:CONTENT OF LINE,
• hints on which high-level expressions correspond to the various assembly
instruction operands.
For example, given this C source file:
int test (int n)
{
int i;
int total = 0;
return total;
}
compiling to (x86 64) assembly via ‘-S’ and emitting the result direct to stdout
via ‘-o’ ‘-’
gcc -S test.c -fverbose-asm -Os -o -
gives output similar to this:
196 Using the GNU Compiler Collection (GCC)
.file "test.c"
# GNU C11 (GCC) version 7.0.0 20160809 (experimental) (x86_64-pc-linux-gnu)
[...snip...]
# options passed:
[...snip...]
.text
.globl test
.type test, @function
test:
.LFB0:
.cfi_startproc
# test.c:4: int total = 0;
xorl %eax, %eax # <retval>
# test.c:6: for (i = 0; i < n; i++)
xorl %edx, %edx # i
.L2:
# test.c:6: for (i = 0; i < n; i++)
cmpl %edi, %edx # n, i
jge .L5 #,
# test.c:7: total += i * i;
movl %edx, %ecx # i, tmp92
imull %edx, %ecx # i, tmp92
# test.c:6: for (i = 0; i < n; i++)
incl %edx # i
# test.c:7: total += i * i;
addl %ecx, %eax # tmp92, <retval>
jmp .L2 #
.L5:
# test.c:10: }
ret
.cfi_endproc
.LFE0:
.size test, .-test
.ident "GCC: (GNU) 7.0.0 20160809 (experimental)"
.section .note.GNU-stack,"",@progbits
The comments are intended for humans rather than machines and hence the
precise format of the comments is subject to change.
-frecord-gcc-switches
This switch causes the command line used to invoke the compiler to be recorded
into the object file that is being created. This switch is only implemented on
some targets and the exact format of the recording is target and binary file
format dependent, but it usually takes the form of a section containing ASCII
text. This switch is related to the ‘-fverbose-asm’ switch, but that switch
only records information in the assembler output file as comments, so it never
reaches the object file. See also ‘-grecord-gcc-switches’ for another way of
storing compiler options into the object file.
-fpic Generate position-independent code (PIC) suitable for use in a shared library,
if supported for the target machine. Such code accesses all constant addresses
through a global offset table (GOT). The dynamic loader resolves the GOT
entries when the program starts (the dynamic loader is not part of GCC; it
is part of the operating system). If the GOT size for the linked executable
exceeds a machine-specific maximum size, you get an error message from the
Chapter 3: GCC Command Options 197
linker indicating that ‘-fpic’ does not work; in that case, recompile with ‘-fPIC’
instead. (These maximums are 8k on the SPARC, 28k on AArch64 and 32k on
the m68k and RS/6000. The x86 has no such limit.)
Position-independent code requires special support, and therefore works only on
certain machines. For the x86, GCC supports PIC for System V but not for the
Sun 386i. Code generated for the IBM RS/6000 is always position-independent.
When this flag is set, the macros __pic__ and __PIC__ are defined to 1.
-fPIC If supported for the target machine, emit position-independent code, suitable
for dynamic linking and avoiding any limit on the size of the global offset table.
This option makes a difference on AArch64, m68k, PowerPC and SPARC.
Position-independent code requires special support, and therefore works only
on certain machines.
When this flag is set, the macros __pic__ and __PIC__ are defined to 2.
-fpie
-fPIE These options are similar to ‘-fpic’ and ‘-fPIC’, but generated position inde-
pendent code can be only linked into executables. Usually these options are
used when ‘-pie’ GCC option is used during linking.
‘-fpie’ and ‘-fPIE’ both define the macros __pie__ and __PIE__. The macros
have the value 1 for ‘-fpie’ and 2 for ‘-fPIE’.
-fno-plt Do not use the PLT for external function calls in position-independent code.
Instead, load the callee address at call sites from the GOT and branch to it.
This leads to more efficient code by eliminating PLT stubs and exposing GOT
loads to optimizations. On architectures such as 32-bit x86 where PLT stubs
expect the GOT pointer in a specific register, this gives more register allocation
freedom to the compiler. Lazy binding requires use of the PLT; with ‘-fno-plt’
all external symbols are resolved at load time.
Alternatively, the function attribute noplt can be used to avoid calls through
the PLT for specific external functions.
In position-dependent code, a few targets also convert calls to functions that
are marked to not use the PLT to use the GOT instead.
-fno-jump-tables
Do not use jump tables for switch statements even where it would be more effi-
cient than other code generation strategies. This option is of use in conjunction
with ‘-fpic’ or ‘-fPIC’ for building code that forms part of a dynamic linker
and cannot reference the address of a jump table. On some targets, jump tables
do not require a GOT and this option is not needed.
-ffixed-reg
Treat the register named reg as a fixed register; generated code should never
refer to it (except perhaps as a stack pointer, frame pointer or in some other
fixed role).
reg must be the name of a register. The register names accepted are machine-
specific and are defined in the REGISTER_NAMES macro in the machine descrip-
tion macro file.
198 Using the GNU Compiler Collection (GCC)
This flag does not have a negative form, because it specifies a three-way choice.
-fcall-used-reg
Treat the register named reg as an allocable register that is clobbered by func-
tion calls. It may be allocated for temporaries or variables that do not live
across a call. Functions compiled this way do not save and restore the register
reg.
It is an error to use this flag with the frame pointer or stack pointer. Use of this
flag for other registers that have fixed pervasive roles in the machine’s execution
model produces disastrous results.
This flag does not have a negative form, because it specifies a three-way choice.
-fcall-saved-reg
Treat the register named reg as an allocable register saved by functions. It may
be allocated even for temporaries or variables that live across a call. Functions
compiled this way save and restore the register reg if they use it.
It is an error to use this flag with the frame pointer or stack pointer. Use of this
flag for other registers that have fixed pervasive roles in the machine’s execution
model produces disastrous results.
A different sort of disaster results from the use of this flag for a register in which
function values may be returned.
This flag does not have a negative form, because it specifies a three-way choice.
-fpack-struct[=n]
Without a value specified, pack all structure members together without holes.
When a value is specified (which must be a small power of two), pack structure
members according to this value, representing the maximum alignment (that
is, objects with default alignment requirements larger than this are output
potentially unaligned at the next fitting location.
Warning: the ‘-fpack-struct’ switch causes GCC to generate code that is
not binary compatible with code generated without that switch. Additionally,
it makes the code suboptimal. Use it to conform to a non-default application
binary interface.
-fleading-underscore
This option and its counterpart, ‘-fno-leading-underscore’, forcibly change
the way C symbols are represented in the object file. One use is to help link
with legacy assembly code.
Warning: the ‘-fleading-underscore’ switch causes GCC to generate code
that is not binary compatible with code generated without that switch. Use it
to conform to a non-default application binary interface. Not all targets provide
complete support for this switch.
-ftls-model=model
Alter the thread-local storage model to be used (see Section 6.64 [Thread-
Local], page 732). The model argument should be one of ‘global-dynamic’,
‘local-dynamic’, ‘initial-exec’ or ‘local-exec’. Note that the choice is
Chapter 3: GCC Command Options 199
subject to optimization: the compiler may use a more efficient model for sym-
bols not visible outside of the translation unit, or if ‘-fpic’ is not given on the
command line.
The default without ‘-fpic’ is ‘initial-exec’; with ‘-fpic’ the default is
‘global-dynamic’.
-ftrampolines
For targets that normally need trampolines for nested functions, always gener-
ate them instead of using descriptors. Otherwise, for targets that do not need
them, like for example HP-PA or IA-64, do nothing.
A trampoline is a small piece of code that is created at run time on the stack
when the address of a nested function is taken, and is used to call the nested
function indirectly. Therefore, it requires the stack to be made executable in
order for the program to work properly.
‘-fno-trampolines’ is enabled by default on a language by language basis
to let the compiler avoid generating them, if it computes that this is safe,
and replace them with descriptors. Descriptors are made up of data only, but
the generated code must be prepared to deal with them. As of this writing,
‘-fno-trampolines’ is enabled by default only for Ada.
Moreover, code compiled with ‘-ftrampolines’ and code compiled with
‘-fno-trampolines’ are not binary compatible if nested functions are
present. This option must therefore be used on a program-wide basis and be
manipulated with extreme care.
-fvisibility=[default|internal|hidden|protected]
Set the default ELF image symbol visibility to the specified option—all symbols
are marked with this unless overridden within the code. Using this feature can
very substantially improve linking and load times of shared object libraries,
produce more optimized code, provide near-perfect API export and prevent
symbol clashes. It is strongly recommended that you use this in any shared
objects you distribute.
Despite the nomenclature, ‘default’ always means public; i.e., available to be
linked against from outside the shared object. ‘protected’ and ‘internal’ are
pretty useless in real-world usage so the only other commonly used option is
‘hidden’. The default if ‘-fvisibility’ isn’t specified is ‘default’, i.e., make
every symbol public.
A good explanation of the benefits offered by ensuring ELF symbols have
the correct visibility is given by “How To Write Shared Libraries” by Ulrich
Drepper (which can be found at https://www.akkadia.org/drepper/)—
however a superior solution made possible by this option to marking things
hidden when the default is public is to make the default hidden and
mark things public. This is the norm with DLLs on Windows and with
‘-fvisibility=hidden’ and __attribute__ ((visibility("default")))
instead of __declspec(dllexport) you get almost identical semantics with
identical syntax. This is a great boon to those working with cross-platform
projects.
200 Using the GNU Compiler Collection (GCC)
For those adding visibility support to existing code, you may find #pragma GCC
visibility of use. This works by you enclosing the declarations you wish
to set visibility for with (for example) #pragma GCC visibility push(hidden)
and #pragma GCC visibility pop. Bear in mind that symbol visibility should
be viewed as part of the API interface contract and thus all new code should
always specify visibility when it is not the default; i.e., declarations only for
use within the local DSO should always be marked explicitly as hidden as so
to avoid PLT indirection overheads—making this abundantly clear also aids
readability and self-documentation of the code. Note that due to ISO C++
specification requirements, operator new and operator delete must always
be of default visibility.
Be aware that headers from outside your project, in particular system head-
ers and headers from any other library you use, may not be expecting to be
compiled with visibility other than the default. You may need to explicitly say
#pragma GCC visibility push(default) before including any such headers.
extern declarations are not affected by ‘-fvisibility’, so a lot of code can be
recompiled with ‘-fvisibility=hidden’ with no modifications. However, this
means that calls to extern functions with no explicit visibility use the PLT, so
it is more effective to use __attribute ((visibility)) and/or #pragma GCC
visibility to tell the compiler which extern declarations should be treated
as hidden.
Note that ‘-fvisibility’ does affect C++ vague linkage entities. This means
that, for instance, an exception class that is be thrown between DSOs must
be explicitly marked with default visibility so that the ‘type_info’ nodes are
unified between the DSOs.
An overview of these techniques, their benefits and how to use them is at
http://gcc.gnu.org/wiki/Visibility.
-fstrict-volatile-bitfields
This option should be used if accesses to volatile bit-fields (or other structure
fields, although the compiler usually honors those types anyway) should use a
single access of the width of the field’s type, aligned to a natural alignment if
possible. For example, targets with memory-mapped peripheral registers might
require all such accesses to be 16 bits wide; with this flag you can declare
all peripheral bit-fields as unsigned short (assuming short is 16 bits on these
targets) to force GCC to use 16-bit accesses instead of, perhaps, a more efficient
32-bit access.
If this option is disabled, the compiler uses the most efficient instruction. In
the previous example, that might be a 32-bit load instruction, even though
that accesses bytes that do not contain any portion of the bit-field, or memory-
mapped registers unrelated to the one being updated.
In some cases, such as when the packed attribute is applied to a structure
field, it may not be possible to access the field with a single read or write that
is correctly aligned for the target machine. In this case GCC falls back to
generating multiple accesses rather than code that will fault or truncate the
result at run time.
Chapter 3: GCC Command Options 201
Note: Due to restrictions of the C/C++11 memory model, write accesses are not
allowed to touch non bit-field members. It is therefore recommended to define
all bits of the field’s type as bit-field members.
The default value of this option is determined by the application binary interface
for the target processor.
-fsync-libcalls
This option controls whether any out-of-line instance of the __sync family of
functions may be used to implement the C++11 __atomic family of functions.
The default value of this option is enabled, thus the only useful form of the
option is ‘-fno-sync-libcalls’. This option is used in the implementation of
the ‘libatomic’ runtime library.
-fdump-rtl-asmcons
Dump after fixing rtl statements that have unsatisfied in/out con-
straints.
-fdump-rtl-auto_inc_dec
Dump after auto-inc-dec discovery. This pass is only run on archi-
tectures that have auto inc or auto dec instructions.
-fdump-rtl-barriers
Dump after cleaning up the barrier instructions.
-fdump-rtl-bbpart
Dump after partitioning hot and cold basic blocks.
-fdump-rtl-bbro
Dump after block reordering.
-fdump-rtl-btl1
-fdump-rtl-btl2
‘-fdump-rtl-btl1’ and ‘-fdump-rtl-btl2’ enable dumping after
the two branch target load optimization passes.
-fdump-rtl-bypass
Dump after jump bypassing and control flow optimizations.
-fdump-rtl-combine
Dump after the RTL instruction combination pass.
-fdump-rtl-compgotos
Dump after duplicating the computed gotos.
-fdump-rtl-ce1
-fdump-rtl-ce2
-fdump-rtl-ce3
‘-fdump-rtl-ce1’, ‘-fdump-rtl-ce2’, and ‘-fdump-rtl-ce3’ en-
able dumping after the three if conversion passes.
-fdump-rtl-cprop_hardreg
Dump after hard register copy propagation.
-fdump-rtl-csa
Dump after combining stack adjustments.
-fdump-rtl-cse1
-fdump-rtl-cse2
‘-fdump-rtl-cse1’ and ‘-fdump-rtl-cse2’ enable dumping after
the two common subexpression elimination passes.
-fdump-rtl-dce
Dump after the standalone dead code elimination passes.
-fdump-rtl-dbr
Dump after delayed branch scheduling.
Chapter 3: GCC Command Options 203
-fdump-rtl-dce1
-fdump-rtl-dce2
‘-fdump-rtl-dce1’ and ‘-fdump-rtl-dce2’ enable dumping after
the two dead store elimination passes.
-fdump-rtl-eh
Dump after finalization of EH handling code.
-fdump-rtl-eh_ranges
Dump after conversion of EH handling range regions.
-fdump-rtl-expand
Dump after RTL generation.
-fdump-rtl-fwprop1
-fdump-rtl-fwprop2
‘-fdump-rtl-fwprop1’ and ‘-fdump-rtl-fwprop2’ enable dump-
ing after the two forward propagation passes.
-fdump-rtl-gcse1
-fdump-rtl-gcse2
‘-fdump-rtl-gcse1’ and ‘-fdump-rtl-gcse2’ enable dumping af-
ter global common subexpression elimination.
-fdump-rtl-init-regs
Dump after the initialization of the registers.
-fdump-rtl-initvals
Dump after the computation of the initial value sets.
-fdump-rtl-into_cfglayout
Dump after converting to cfglayout mode.
-fdump-rtl-ira
Dump after iterated register allocation.
-fdump-rtl-jump
Dump after the second jump optimization.
-fdump-rtl-loop2
‘-fdump-rtl-loop2’ enables dumping after the rtl loop optimiza-
tion passes.
-fdump-rtl-mach
Dump after performing the machine dependent reorganization pass,
if that pass exists.
-fdump-rtl-mode_sw
Dump after removing redundant mode switches.
-fdump-rtl-rnreg
Dump after register renumbering.
-fdump-rtl-outof_cfglayout
Dump after converting from cfglayout mode.
204 Using the GNU Compiler Collection (GCC)
-fdump-rtl-peephole2
Dump after the peephole pass.
-fdump-rtl-postreload
Dump after post-reload optimizations.
-fdump-rtl-pro_and_epilogue
Dump after generating the function prologues and epilogues.
-fdump-rtl-sched1
-fdump-rtl-sched2
‘-fdump-rtl-sched1’ and ‘-fdump-rtl-sched2’ enable dumping
after the basic block scheduling passes.
-fdump-rtl-ree
Dump after sign/zero extension elimination.
-fdump-rtl-seqabstr
Dump after common sequence discovery.
-fdump-rtl-shorten
Dump after shortening branches.
-fdump-rtl-sibling
Dump after sibling call optimizations.
-fdump-rtl-split1
-fdump-rtl-split2
-fdump-rtl-split3
-fdump-rtl-split4
-fdump-rtl-split5
These options enable dumping after five rounds of instruction split-
ting.
-fdump-rtl-sms
Dump after modulo scheduling. This pass is only run on some
architectures.
-fdump-rtl-stack
Dump after conversion from GCC’s “flat register file” registers to
the x87’s stack-like registers. This pass is only run on x86 variants.
-fdump-rtl-subreg1
-fdump-rtl-subreg2
‘-fdump-rtl-subreg1’ and ‘-fdump-rtl-subreg2’ enable dump-
ing after the two subreg expansion passes.
-fdump-rtl-unshare
Dump after all rtl has been unshared.
-fdump-rtl-vartrack
Dump after variable tracking.
-fdump-rtl-vregs
Dump after converting virtual registers to hard registers.
Chapter 3: GCC Command Options 205
-fdump-rtl-web
Dump after live range splitting.
-fdump-rtl-regclass
-fdump-rtl-subregs_of_mode_init
-fdump-rtl-subregs_of_mode_finish
-fdump-rtl-dfinit
-fdump-rtl-dfinish
These dumps are defined but always produce empty files.
-da
-fdump-rtl-all
Produce all the dumps listed above.
-dA Annotate the assembler output with miscellaneous debugging in-
formation.
-dD Dump all macro definitions, at the end of preprocessing, in addition
to normal output.
-dH Produce a core dump whenever an error occurs.
-dp Annotate the assembler output with a comment indicating which
pattern and alternative is used. The length of each instruction is
also printed.
-dP Dump the RTL in the assembler output as a comment before each
instruction. Also turns on ‘-dp’ annotation.
-dx Just generate RTL for a function instead of compiling it. Usually
used with ‘-fdump-rtl-expand’.
-fdump-noaddr
When doing debugging dumps, suppress address output. This makes it more
feasible to use diff on debugging dumps for compiler invocations with different
compiler binaries and/or different text / bss / data / heap / stack / dso start
locations.
-freport-bug
Collect and dump debug information into a temporary file if an internal compiler
error (ICE) occurs.
-fdump-unnumbered
When doing debugging dumps, suppress instruction numbers and address out-
put. This makes it more feasible to use diff on debugging dumps for compiler
invocations with different options, in particular with and without ‘-g’.
-fdump-unnumbered-links
When doing debugging dumps (see ‘-d’ option above), suppress instruction
numbers for the links to the previous and next instructions in a sequence.
-fdump-translation-unit (C++ only)
-fdump-translation-unit-options (C++ only)
Dump a representation of the tree structure for the entire translation unit to
a file. The file name is made by appending ‘.tu’ to the source file name, and
206 Using the GNU Compiler Collection (GCC)
the file is created in the same directory as the output file. If the ‘-options’
form is used, options controls the details of the dump as described for the
‘-fdump-tree’ options.
-fdump-class-hierarchy (C++ only)
-fdump-class-hierarchy-options (C++ only)
Dump a representation of each class’s hierarchy and virtual function table layout
to a file. The file name is made by appending ‘.class’ to the source file name,
and the file is created in the same directory as the output file. If the ‘-options’
form is used, options controls the details of the dump as described for the
‘-fdump-tree’ options.
-fdump-ipa-switch
Control the dumping at various stages of inter-procedural analysis language tree
to a file. The file name is generated by appending a switch specific suffix to the
source file name, and the file is created in the same directory as the output file.
The following dumps are possible:
‘all’ Enables all inter-procedural analysis dumps.
‘cgraph’ Dumps information about call-graph optimization, unused function
removal, and inlining decisions.
‘inline’ Dump after function inlining.
-fdump-passes
Print on ‘stderr’ the list of optimization passes that are turned on and off by
the current command-line options.
-fdump-statistics-option
Enable and control dumping of pass statistics in a separate file. The file name
is generated by appending a suffix ending in ‘.statistics’ to the source file
name, and the file is created in the same directory as the output file. If the
‘-option’ form is used, ‘-stats’ causes counters to be summed over the whole
compilation unit while ‘-details’ dumps every event as the passes generate
them. The default with no option is to sum counters for each function compiled.
-fdump-tree-all
-fdump-tree-switch
-fdump-tree-switch-options
-fdump-tree-switch-options=filename
Control the dumping at various stages of processing the intermediate language
tree to a file. The file name is generated by appending a switch-specific suffix to
the source file name, and the file is created in the same directory as the output
file. In case of ‘=filename’ option, the dump is output on the given file instead
of the auto named dump files. If the ‘-options’ form is used, options is a list
of ‘-’ separated options which control the details of the dump. Not all options
are applicable to all dumps; those that are not meaningful are ignored. The
following options are available
‘address’ Print the address of each node. Usually this is not meaningful as it
changes according to the environment and source file. Its primary
use is for tying up a dump file with a debug environment.
Chapter 3: GCC Command Options 207
‘asmname’ If DECL_ASSEMBLER_NAME has been set for a given decl, use that
in the dump instead of DECL_NAME. Its primary use is ease of use
working backward from mangled names in the assembly file.
‘slim’ When dumping front-end intermediate representations, inhibit
dumping of members of a scope or body of a function merely
because that scope has been reached. Only dump such items when
they are directly reachable by some other path.
When dumping pretty-printed trees, this option inhibits dumping
the bodies of control structures.
When dumping RTL, print the RTL in slim (condensed) form in-
stead of the default LISP-like representation.
‘raw’ Print a raw representation of the tree. By default, trees are pretty-
printed into a C-like representation.
‘details’ Enable more detailed dumps (not honored by every dump option).
Also include information from the optimization passes.
‘stats’ Enable dumping various statistics about the pass (not honored by
every dump option).
‘blocks’ Enable showing basic block boundaries (disabled in raw dumps).
‘graph’ For each of the other indicated dump files (‘-fdump-rtl-pass’),
dump a representation of the control flow graph suitable for viewing
with GraphViz to ‘file.passid.pass.dot’. Each function in the
file is pretty-printed as a subgraph, so that GraphViz can render
them all in a single plot.
This option currently only works for RTL dumps, and the RTL is
always dumped in slim form.
‘vops’ Enable showing virtual operands for every statement.
‘lineno’ Enable showing line numbers for statements.
‘uid’ Enable showing the unique ID (DECL_UID) for each variable.
‘verbose’ Enable showing the tree dump for each statement.
‘eh’ Enable showing the EH region number holding each statement.
‘scev’ Enable showing scalar evolution analysis details.
‘optimized’
Enable showing optimization information (only available in certain
passes).
‘missed’ Enable showing missed optimization information (only available in
certain passes).
‘note’ Enable other detailed optimization information (only available in
certain passes).
208 Using the GNU Compiler Collection (GCC)
‘=filename’
Instead of an auto named dump file, output into the given file name.
The file names ‘stdout’ and ‘stderr’ are treated specially and are
considered already open standard streams. For example,
gcc -O2 -ftree-vectorize -fdump-tree-vect-blocks=foo.dump
-fdump-tree-pre=/dev/stderr file.c
outputs vectorizer dump into ‘foo.dump’, while the PRE dump is
output on to ‘stderr’. If two conflicting dump filenames are given
for the same pass, then the latter option overrides the earlier one.
‘all’ Turn on all options, except ‘raw’, ‘slim’, ‘verbose’ and ‘lineno’.
‘optall’ Turn on all optimization options, i.e., ‘optimized’, ‘missed’, and
‘note’.
To determine what tree dumps are available or find the dump for a pass of
interest follow the steps below.
1. Invoke GCC with ‘-fdump-passes’ and in the ‘stderr’ output look for
a code that corresponds to the pass you are interested in. For example,
the codes tree-evrp, tree-vrp1, and tree-vrp2 correspond to the three
Value Range Propagation passes. The number at the end distinguishes
distinct invocations of the same pass.
2. To enable the creation of the dump file, append the pass code to the
‘-fdump-’ option prefix and invoke GCC with it. For example, to enable
the dump from the Early Value Range Propagation pass, invoke GCC with
the ‘-fdump-tree-evrp’ option. Optionally, you may specify the name of
the dump file. If you don’t specify one, GCC creates as described below.
3. Find the pass dump in a file whose name is composed of three components
separated by a period: the name of the source file GCC was invoked to
compile, a numeric suffix indicating the pass number followed by the letter
‘t’ for tree passes (and the letter ‘r’ for RTL passes), and finally the pass
code. For example, the Early VRP pass dump might be in a file named
‘myfile.c.038t.evrp’ in the current working directory. Note that the
numeric codes are not stable and may change from one version of GCC to
another.
-fopt-info
-fopt-info-options
-fopt-info-options=filename
Controls optimization dumps from various optimization passes. If the
‘-options’ form is used, options is a list of ‘-’ separated option keywords to
select the dump details and optimizations.
The options can be divided into two groups: options describing the verbosity of
the dump, and options describing which optimizations should be included. The
options from both the groups can be freely mixed as they are non-overlapping.
However, in case of any conflicts, the later options override the earlier options
on the command line.
The following options control the dump verbosity:
Chapter 3: GCC Command Options 209
‘optimized’
Print information when an optimization is successfully applied. It
is up to a pass to decide which information is relevant. For example,
the vectorizer passes print the source location of loops which are
successfully vectorized.
‘missed’ Print information about missed optimizations. Individual passes
control which information to include in the output.
‘note’ Print verbose information about optimizations, such as certain
transformations, more detailed messages about decisions etc.
‘all’ Print detailed optimization information. This includes
‘optimized’, ‘missed’, and ‘note’.
One or more of the following option keywords can be used to describe a group
of optimizations:
‘ipa’ Enable dumps from all interprocedural optimizations.
‘loop’ Enable dumps from all loop optimizations.
‘inline’ Enable dumps from all inlining optimizations.
‘omp’ Enable dumps from all OMP (Offloading and Multi Processing)
optimizations.
‘vec’ Enable dumps from all vectorization optimizations.
‘optall’ Enable dumps from all optimizations. This is a superset of the
optimization groups listed above.
If options is omitted, it defaults to ‘optimized-optall’, which means to dump
all info about successful optimizations from all the passes.
If the filename is provided, then the dumps from all the applicable optimiza-
tions are concatenated into the filename. Otherwise the dump is output onto
‘stderr’. Though multiple ‘-fopt-info’ options are accepted, only one of them
can include a filename. If other filenames are provided then all but the first
such option are ignored.
Note that the output filename is overwritten in case of multiple translation
units. If a combined output from multiple translation units is desired, ‘stderr’
should be used instead.
In the following example, the optimization info is output to ‘stderr’:
gcc -O3 -fopt-info
This example:
gcc -O3 -fopt-info-missed=missed.all
outputs missed optimization report from all the passes into ‘missed.all’, and
this one:
gcc -O2 -ftree-vectorize -fopt-info-vec-missed
prints information about missed optimization opportunities from vectoriza-
tion passes on ‘stderr’. Note that ‘-fopt-info-vec-missed’ is equivalent
to ‘-fopt-info-missed-vec’.
As another example,
210 Using the GNU Compiler Collection (GCC)
-fenable-ipa-pass
Enable IPA pass pass. pass is the pass name. If the same pass
is statically invoked in the compiler multiple times, the pass name
should be appended with a sequential number starting from 1.
-fenable-rtl-pass
-fenable-rtl-pass=range-list
Enable RTL pass pass. See ‘-fdisable-rtl’ for option argument
description and examples.
-fenable-tree-pass
-fenable-tree-pass=range-list
Enable tree pass pass. See ‘-fdisable-rtl’ for the description of
option arguments.
Here are some examples showing uses of these options.
-fchecking
-fchecking=n
Enable internal consistency checking. The default depends on the compiler
configuration. ‘-fchecking=2’ enables further internal consistency checking
that might affect code generation.
-frandom-seed=string
This option provides a seed that GCC uses in place of random numbers in
generating certain symbol names that have to be different in every compiled
file. It is also used to place unique stamps in coverage data files and the object
files that produce them. You can use the ‘-frandom-seed’ option to produce
reproducibly identical object files.
The string can either be a number (decimal, octal or hex) or an arbitrary string
(in which case it’s converted to a number by computing CRC32).
The string should be different for every file you compile.
-save-temps
-save-temps=cwd
Store the usual “temporary” intermediate files permanently; place them in the
current directory and name them based on the source file. Thus, compiling
212 Using the GNU Compiler Collection (GCC)
‘foo.c’ with ‘-c -save-temps’ produces files ‘foo.i’ and ‘foo.s’, as well as
‘foo.o’. This creates a preprocessed ‘foo.i’ output file even though the com-
piler now normally uses an integrated preprocessor.
When used in combination with the ‘-x’ command-line option, ‘-save-temps’
is sensible enough to avoid over writing an input source file with the same
extension as an intermediate file. The corresponding intermediate file may be
obtained by renaming the source file before using ‘-save-temps’.
If you invoke GCC in parallel, compiling several different source files that share
a common base name in different subdirectories or the same source file compiled
for multiple output destinations, it is likely that the different parallel compilers
will interfere with each other, and overwrite the temporary files. For instance:
gcc -save-temps -o outdir1/foo.o indir1/foo.c&
gcc -save-temps -o outdir2/foo.o indir2/foo.c&
may result in ‘foo.i’ and ‘foo.o’ being written to simultaneously by both
compilers.
-save-temps=obj
Store the usual “temporary” intermediate files permanently. If the ‘-o’ option
is used, the temporary files are based on the object file. If the ‘-o’ option is
not used, the ‘-save-temps=obj’ switch behaves like ‘-save-temps’.
For example:
gcc -save-temps=obj -c foo.c
gcc -save-temps=obj -c bar.c -o dir/xbar.o
gcc -save-temps=obj foobar.c -o dir2/yfoobar
creates ‘foo.i’, ‘foo.s’, ‘dir/xbar.i’, ‘dir/xbar.s’, ‘dir2/yfoobar.i’,
‘dir2/yfoobar.s’, and ‘dir2/yfoobar.o’.
-time[=file]
Report the CPU time taken by each subprocess in the compilation sequence.
For C source files, this is the compiler proper and assembler (plus the linker if
linking is done).
Without the specification of an output file, the output looks like this:
# cc1 0.12 0.01
# as 0.00 0.01
The first number on each line is the “user time”, that is time spent executing
the program itself. The second number is “system time”, time spent executing
operating system routines on behalf of the program. Both numbers are in
seconds.
With the specification of an output file, the output is appended to the named
file, and it looks like this:
0.12 0.01 cc1 options
0.00 0.01 as options
The “user time” and the “system time” are moved before the program name,
and the options passed to the program are displayed, so that one can later tell
what file was being compiled, and with which options.
Chapter 3: GCC Command Options 213
-fdump-final-insns[=file]
Dump the final internal representation (RTL) to file. If the optional argument
is omitted (or if file is .), the name of the dump file is determined by appending
.gkd to the compilation output file name.
-fcompare-debug[=opts]
If no error occurs during compilation, run the compiler a second time, adding
opts and ‘-fcompare-debug-second’ to the arguments passed to the second
compilation. Dump the final internal representation in both compilations, and
print an error if they differ.
If the equal sign is omitted, the default ‘-gtoggle’ is used.
The environment variable GCC_COMPARE_DEBUG, if defined, non-empty and
nonzero, implicitly enables ‘-fcompare-debug’. If GCC_COMPARE_DEBUG is
defined to a string starting with a dash, then it is used for opts, otherwise the
default ‘-gtoggle’ is used.
‘-fcompare-debug=’, with the equal sign but without opts, is equivalent to
‘-fno-compare-debug’, which disables the dumping of the final representation
and the second compilation, preventing even GCC_COMPARE_DEBUG from taking
effect.
To verify full coverage during ‘-fcompare-debug’ testing, set GCC_COMPARE_
DEBUG to say ‘-fcompare-debug-not-overridden’, which GCC rejects as
an invalid option in any actual compilation (rather than preprocessing,
assembly or linking). To get just a warning, setting GCC_COMPARE_DEBUG to
‘-w%n-fcompare-debug not overridden’ will do.
-fcompare-debug-second
This option is implicitly passed to the compiler for the second compilation
requested by ‘-fcompare-debug’, along with options to silence warnings, and
omitting other options that would cause side-effect compiler outputs to files or
to the standard output. Dump files and preserved temporary files are renamed
so as to contain the .gk additional extension during the second compilation, to
avoid overwriting those generated by the first.
When this option is passed to the compiler driver, it causes the first compilation
to be skipped, which makes it useful for little other than debugging the compiler
proper.
-gtoggle Turn off generation of debug info, if leaving out this option generates it, or turn
it on at level 2 otherwise. The position of this argument in the command line
does not matter; it takes effect after all other options are processed, and it does
so only once, no matter how many times it is given. This is mainly intended to
be used with ‘-fcompare-debug’.
-fvar-tracking-assignments-toggle
Toggle ‘-fvar-tracking-assignments’, in the same way that ‘-gtoggle’ tog-
gles ‘-g’.
-Q Makes the compiler print out each function name as it is compiled, and print
some statistics about each pass when it finishes.
214 Using the GNU Compiler Collection (GCC)
-ftime-report
Makes the compiler print some statistics about the time consumed by each pass
when it finishes.
-ftime-report-details
Record the time consumed by infrastructure parts separately for each pass.
-fira-verbose=n
Control the verbosity of the dump file for the integrated register allocator. The
default value is 5. If the value n is greater or equal to 10, the dump output is
sent to stderr using the same format as n minus 10.
-flto-report
Prints a report with internal details on the workings of the link-time optimizer.
The contents of this report vary from version to version. It is meant to be useful
to GCC developers when processing object files in LTO mode (via ‘-flto’).
Disabled by default.
-flto-report-wpa
Like ‘-flto-report’, but only print for the WPA phase of Link Time Opti-
mization.
-fmem-report
Makes the compiler print some statistics about permanent memory allocation
when it finishes.
-fmem-report-wpa
Makes the compiler print some statistics about permanent memory allocation
for the WPA phase only.
-fpre-ipa-mem-report
-fpost-ipa-mem-report
Makes the compiler print some statistics about permanent memory allocation
before or after interprocedural optimization.
-fprofile-report
Makes the compiler print some statistics about consistency of the (estimated)
profile and effect of individual passes.
-fstack-usage
Makes the compiler output stack usage information for the program, on a per-
function basis. The filename for the dump is made by appending ‘.su’ to the
auxname. auxname is generated from the name of the output file, if explicitly
specified and it is not an executable, otherwise it is the basename of the source
file. An entry is made up of three fields:
• The name of the function.
• A number of bytes.
• One or more qualifiers: static, dynamic, bounded.
The qualifier static means that the function manipulates the stack statically: a
fixed number of bytes are allocated for the frame on function entry and released
Chapter 3: GCC Command Options 215
on function exit; no stack adjustments are otherwise made in the function. The
second field is this fixed number of bytes.
The qualifier dynamic means that the function manipulates the stack dynami-
cally: in addition to the static allocation described above, stack adjustments are
made in the body of the function, for example to push/pop arguments around
function calls. If the qualifier bounded is also present, the amount of these ad-
justments is bounded at compile time and the second field is an upper bound of
the total amount of stack used by the function. If it is not present, the amount
of these adjustments is not bounded at compile time and the second field only
represents the bounded part.
-fstats Emit statistics about front-end processing at the end of the compilation. This
option is supported only by the C++ front end, and the information is generally
only useful to the G++ development team.
-fdbg-cnt-list
Print the name and the counter upper bound for all debug counters.
-fdbg-cnt=counter-value-list
Set the internal debug counter upper bound. counter-value-list is a comma-
separated list of name:value pairs which sets the upper bound of each debug
counter name to value. All debug counters have the initial upper bound of
UINT_MAX; thus dbg_cnt returns true always unless the upper bound is set
by this option. For example, with ‘-fdbg-cnt=dce:10,tail_call:0’, dbg_
cnt(dce) returns true only for first 10 invocations.
-print-file-name=library
Print the full absolute name of the library file library that would be used when
linking—and don’t do anything else. With this option, GCC does not compile
or link anything; it just prints the file name.
-print-multi-directory
Print the directory name corresponding to the multilib selected by any other
switches present in the command line. This directory is supposed to exist in
GCC_EXEC_PREFIX.
-print-multi-lib
Print the mapping from multilib directory names to compiler switches that
enable them. The directory name is separated from the switches by ‘;’, and
each switch starts with an ‘@’ instead of the ‘-’, without spaces between multiple
switches. This is supposed to ease shell processing.
-print-multi-os-directory
Print the path to OS libraries for the selected multilib, relative to some ‘lib’
subdirectory. If OS libraries are present in the ‘lib’ subdirectory and no mul-
tilibs are used, this is usually just ‘.’, if OS libraries are present in ‘libsuffix’
sibling directories this prints e.g. ‘../lib64’, ‘../lib’ or ‘../lib32’, or if
OS libraries are present in ‘lib/subdir’ subdirectories it prints e.g. ‘amd64’,
‘sparcv9’ or ‘ev6’.
216 Using the GNU Compiler Collection (GCC)
-print-multiarch
Print the path to OS libraries for the selected multiarch, relative to some ‘lib’
subdirectory.
-print-prog-name=program
Like ‘-print-file-name’, but searches for a program such as cpp.
-print-libgcc-file-name
Same as ‘-print-file-name=libgcc.a’.
This is useful when you use ‘-nostdlib’ or ‘-nodefaultlibs’ but you do want
to link with ‘libgcc.a’. You can do:
gcc -nostdlib files... ‘gcc -print-libgcc-file-name‘
-print-search-dirs
Print the name of the configured installation directory and a list of program
and library directories gcc searches—and don’t do anything else.
This is useful when gcc prints the error message ‘installation problem,
cannot exec cpp0: No such file or directory’. To resolve this you either
need to put ‘cpp0’ and the other compiler components where gcc expects to
find them, or you can set the environment variable GCC_EXEC_PREFIX to the di-
rectory where you installed them. Don’t forget the trailing ‘/’. See Section 3.20
[Environment Variables], page 389.
-print-sysroot
Print the target sysroot directory that is used during compilation. This is the
target sysroot specified either at configure time or using the ‘--sysroot’ option,
possibly with an extra suffix that depends on compilation options. If no target
sysroot is specified, the option prints nothing.
-print-sysroot-headers-suffix
Print the suffix added to the target sysroot when searching for headers, or
give an error if the compiler is not configured with such a suffix—and don’t do
anything else.
-dumpmachine
Print the compiler’s target machine (for example, ‘i686-pc-linux-gnu’)—and
don’t do anything else.
-dumpversion
Print the compiler version (for example, 3.0, 6.3.0 or 7)—and don’t do any-
thing else. This is the compiler version used in filesystem paths, specs, can
be depending on how the compiler has been configured just a single number
(major version), two numbers separated by dot (major and minor version) or
three numbers separated by dots (major, minor and patchlevel version).
-dumpfullversion
Print the full compiler version, always 3 numbers separated by dots, major,
minor and patchlevel version.
-dumpspecs
Print the compiler’s built-in specs—and don’t do anything else. (This is used
when GCC itself is being built.) See Section 3.19 [Spec Files], page 382.
Chapter 3: GCC Command Options 217
-momit-leaf-frame-pointer
-mno-omit-leaf-frame-pointer
Omit or keep the frame pointer in leaf functions. The former behavior is the
default.
-mtls-dialect=desc
Use TLS descriptors as the thread-local storage mechanism for dynamic accesses
of TLS variables. This is the default.
-mtls-dialect=traditional
Use traditional TLS as the thread-local storage mechanism for dynamic accesses
of TLS variables.
-mtls-size=size
Specify bit size of immediate TLS offsets. Valid values are 12, 24, 32, 48. This
option requires binutils 2.26 or newer.
-mfix-cortex-a53-835769
-mno-fix-cortex-a53-835769
Enable or disable the workaround for the ARM Cortex-A53 erratum number
835769. This involves inserting a NOP instruction between memory instructions
and 64-bit integer multiply-accumulate instructions.
-mfix-cortex-a53-843419
-mno-fix-cortex-a53-843419
Enable or disable the workaround for the ARM Cortex-A53 erratum number
843419. This erratum workaround is made at link time and this will only pass
the corresponding flag to the linker.
-mlow-precision-recip-sqrt
-mno-low-precision-recip-sqrt
Enable or disable the reciprocal square root approximation. This option only
has an effect if ‘-ffast-math’ or ‘-funsafe-math-optimizations’ is used as
well. Enabling this reduces precision of reciprocal square root results to about
16 bits for single precision and to 32 bits for double precision.
-mlow-precision-sqrt
-mno-low-precision-sqrt
Enable or disable the square root approximation. This option only has an
effect if ‘-ffast-math’ or ‘-funsafe-math-optimizations’ is used as well.
Enabling this reduces precision of square root results to about 16 bits for
single precision and to 32 bits for double precision. If enabled, it implies
‘-mlow-precision-recip-sqrt’.
-mlow-precision-div
-mno-low-precision-div
Enable or disable the division approximation. This option only has an effect if
‘-ffast-math’ or ‘-funsafe-math-optimizations’ is used as well. Enabling
this reduces precision of division results to about 16 bits for single precision
and to 32 bits for double precision.
Chapter 3: GCC Command Options 219
-march=name
Specify the name of the target architecture and, optionally, one or more feature
modifiers. This option has the form ‘-march=arch{+[no]feature}*’.
The permissible values for arch are ‘armv8-a’, ‘armv8.1-a’, ‘armv8.2-a’,
‘armv8.3-a’ or native.
The value ‘armv8.3-a’ implies ‘armv8.2-a’ and enables compiler support for
the ARMv8.3-A architecture extensions.
The value ‘armv8.2-a’ implies ‘armv8.1-a’ and enables compiler support for
the ARMv8.2-A architecture extensions.
The value ‘armv8.1-a’ implies ‘armv8-a’ and enables compiler support for the
ARMv8.1-A architecture extension. In particular, it enables the ‘+crc’ and
‘+lse’ features.
The value ‘native’ is available on native AArch64 GNU/Linux and causes the
compiler to pick the architecture of the host system. This option has no effect
if the compiler is unable to recognize the architecture of the host system,
The permissible values for feature are listed in the sub-section on [‘-march’ and
‘-mcpu’ Feature Modifiers], page 220. Where conflicting feature modifiers are
specified, the right-most feature is used.
GCC uses name to determine what kind of instructions it can emit when gen-
erating assembly code. If ‘-march’ is specified without either of ‘-mtune’ or
‘-mcpu’ also being specified, the code is tuned to perform well across a range of
target processors implementing the target architecture.
-mtune=name
Specify the name of the target processor for which GCC should tune
the performance of the code. Permissible values for this option are:
‘generic’, ‘cortex-a35’, ‘cortex-a53’, ‘cortex-a57’, ‘cortex-a72’,
‘cortex-a73’, ‘exynos-m1’, ‘falkor’, ‘qdf24xx’, ‘xgene1’, ‘vulcan’,
‘thunderx’, ‘thunderxt88’, ‘thunderxt88p1’, ‘thunderxt81’, ‘thunderxt83’,
‘thunderx2t99’, ‘cortex-a57.cortex-a53’, ‘cortex-a72.cortex-a53’,
‘cortex-a73.cortex-a35’, ‘cortex-a73.cortex-a53’, ‘native’.
The values ‘cortex-a57.cortex-a53’, ‘cortex-a72.cortex-a53’,
‘cortex-a73.cortex-a35’, ‘cortex-a73.cortex-a53’ specify that GCC
should tune for a big.LITTLE system.
Additionally on native AArch64 GNU/Linux systems the value ‘native’ tunes
performance to the host system. This option has no effect if the compiler is
unable to recognize the processor of the host system.
Where none of ‘-mtune=’, ‘-mcpu=’ or ‘-march=’ are specified, the code is tuned
to perform well across a range of target processors.
This option cannot be suffixed by feature modifiers.
-mcpu=name
Specify the name of the target processor, optionally suffixed by one or more
feature modifiers. This option has the form ‘-mcpu=cpu{+[no]feature}*’, where
the permissible values for cpu are the same as those available for ‘-mtune’. The
permissible values for feature are documented in the sub-section on [‘-march’
220 Using the GNU Compiler Collection (GCC)
and ‘-mcpu’ Feature Modifiers], page 220. Where conflicting feature modifiers
are specified, the right-most feature is used.
GCC uses name to determine what kind of instructions it can emit when gen-
erating assembly code (as if by ‘-march’) and to determine the target processor
for which to tune for performance (as if by ‘-mtune’). Where this option is used
in conjunction with ‘-march’ or ‘-mtune’, those options take precedence over
the appropriate part of this option.
-moverride=string
Override tuning decisions made by the back-end in response to a ‘-mtune=’
switch. The syntax, semantics, and accepted values for string in this option are
not guaranteed to be consistent across releases.
This option is only intended to be useful when developing GCC.
-mpc-relative-literal-loads
Enable PC-relative literal loads. With this option literal pools are accessed
using a single instruction and emitted after each function. This limits the max-
imum size of functions to 1MB. This is enabled by default for ‘-mcmodel=tiny’.
-msign-return-address=scope
Select the function scope on which return address signing will be applied. Per-
missible values are ‘none’, which disables return address signing, ‘non-leaf’,
which enables pointer signing for functions which are not leaf functions, and
‘all’, which enables pointer signing for all functions. The default value is
‘none’.
‘crypto’ Enable Crypto extension. This also enables Advanced SIMD and floating-point
instructions.
‘fp’ Enable floating-point instructions. This is on by default for all possible values
for options ‘-march’ and ‘-mcpu’.
‘simd’ Enable Advanced SIMD instructions. This also enables floating-point instruc-
tions. This is on by default for all possible values for options ‘-march’ and
‘-mcpu’.
Feature ‘crypto’ implies ‘simd’, which implies ‘fp’. Conversely, ‘nofp’ implies ‘nosimd’,
which implies ‘nocrypto’.
Chapter 3: GCC Command Options 221
-msmall16
Assume addresses can be loaded as 16-bit unsigned values. This does not apply
to function addresses for which ‘-mlong-calls’ semantics are in effect.
-mfp-mode=mode
Set the prevailing mode of the floating-point unit. This determines the floating-
point mode that is provided and expected at function call and return time.
Making this mode match the mode you predominantly need at function start can
make your programs smaller and faster by avoiding unnecessary mode switches.
mode can be set to one the following values:
‘caller’ Any mode at function entry is valid, and retained or restored when
the function returns, and when it calls other functions. This mode
is useful for compiling libraries or other compilation units you might
want to incorporate into different programs with different prevail-
ing FPU modes, and the convenience of being able to use a single
object file outweighs the size and speed overhead for any extra
mode switching that might be needed, compared with what would
be needed with a more specific choice of prevailing FPU mode.
‘truncate’
This is the mode used for floating-point calculations with truncating
(i.e. round towards zero) rounding mode. That includes conversion
from floating point to integer.
‘round-nearest’
This is the mode used for floating-point calculations with round-
to-nearest-or-even rounding mode.
‘int’ This is the mode used to perform integer calculations in the FPU,
e.g. integer multiply, or integer multiply-and-accumulate.
The default is ‘-mfp-mode=caller’
-mnosplit-lohi
-mno-postinc
-mno-postmodify
Code generation tweaks that disable, respectively, splitting of 32-bit loads, gen-
eration of post-increment addresses, and generation of post-modify addresses.
The defaults are ‘msplit-lohi’, ‘-mpost-inc’, and ‘-mpost-modify’.
-mnovect-double
Change the preferred SIMD mode to SImode. The default is ‘-mvect-double’,
which uses DImode as preferred SIMD mode.
-max-vect-align=num
The maximum alignment for SIMD vector mode types. num may be 4 or 8.
The default is 8. Note that this is an ABI change, even though many library
function interfaces are unaffected if they don’t use SIMD vector modes in places
that affect size and/or alignment of relevant types.
Chapter 3: GCC Command Options 223
-msplit-vecmove-early
Split vector moves into single word moves before reload. In theory this can give
better register allocation, but so far the reverse seems to be generally the case.
-m1reg-reg
Specify a register to hold the constant −1, which makes loading small negative
constants and certain bitmasks faster. Allowable values for reg are ‘r43’ and
‘r63’, which specify use of that register as a fixed register, and ‘none’, which
means that no register is used for this purpose. The default is ‘-m1reg-none’.
‘arc600_norm’
Compile for ARC 600 CPU with norm instructions enabled.
‘arc600_mul32x16’
Compile for ARC 600 CPU with norm and 32x16-bit multiply in-
structions enabled.
‘arc600_mul64’
Compile for ARC 600 CPU with norm and mul64-family instruc-
tions enabled.
‘arc601_norm’
Compile for ARC 601 CPU with norm instructions enabled.
‘arc601_mul32x16’
Compile for ARC 601 CPU with norm and 32x16-bit multiply in-
structions enabled.
‘arc601_mul64’
Compile for ARC 601 CPU with norm and mul64-family instruc-
tions enabled.
‘nps400’ Compile for ARC 700 on NPS400 chip.
-mdpfp
-mdpfp-compact
Generate double-precision FPX instructions, tuned for the compact implemen-
tation.
-mdpfp-fast
Generate double-precision FPX instructions, tuned for the fast implementation.
-mno-dpfp-lrsr
Disable lr and sr instructions from using FPX extension aux registers.
-mea Generate extended arithmetic instructions. Currently only divaw, adds, subs,
and sat16 are supported. This is always enabled for ‘-mcpu=ARC700’.
-mno-mpy Do not generate mpy-family instructions for ARC700. This option is deprecated.
-mmul32x16
Generate 32x16-bit multiply and multiply-accumulate instructions.
-mmul64 Generate mul64 and mulu64 instructions. Only valid for ‘-mcpu=ARC600’.
-mnorm Generate norm instructions. This is the default if ‘-mcpu=ARC700’ is in effect.
-mspfp
-mspfp-compact
Generate single-precision FPX instructions, tuned for the compact implemen-
tation.
-mspfp-fast
Generate single-precision FPX instructions, tuned for the fast implementation.
-msimd Enable generation of ARC SIMD instructions via target-specific builtins. Only
valid for ‘-mcpu=ARC700’.
Chapter 3: GCC Command Options 225
-msoft-float
This option ignored; it is provided for compatibility purposes only. Software
floating-point code is emitted by default, and this default can overridden by
FPX options; ‘-mspfp’, ‘-mspfp-compact’, or ‘-mspfp-fast’ for single preci-
sion, and ‘-mdpfp’, ‘-mdpfp-compact’, or ‘-mdpfp-fast’ for double precision.
-mswap Generate swap instructions.
-matomic This enables use of the locked load/store conditional extension to implement
atomic memory built-in functions. Not available for ARC 6xx or ARC EM
cores.
-mdiv-rem
Enable div and rem instructions for ARCv2 cores.
-mcode-density
Enable code density instructions for ARC EM. This option is on by default for
ARC HS.
-mll64 Enable double load/store operations for ARC HS cores.
-mtp-regno=regno
Specify thread pointer register number.
-mmpy-option=multo
Compile ARCv2 code with a multiplier design option. You can specify the
option using either a string or numeric value for multo. ‘wlh1’ is the default
value. The recognized values are:
‘0’
‘none’ No multiplier available.
‘1’
‘w’ 16x16 multiplier, fully pipelined. The following instructions are
enabled: mpyw and mpyuw.
‘2’
‘wlh1’ 32x32 multiplier, fully pipelined (1 stage). The following instruc-
tions are additionally enabled: mpy, mpyu, mpym, mpymu, and mpy_s.
‘3’
‘wlh2’ 32x32 multiplier, fully pipelined (2 stages). The following instruc-
tions are additionally enabled: mpy, mpyu, mpym, mpymu, and mpy_s.
‘4’
‘wlh3’ Two 16x16 multipliers, blocking, sequential. The following instruc-
tions are additionally enabled: mpy, mpyu, mpym, mpymu, and mpy_s.
‘5’
‘wlh4’ One 16x16 multiplier, blocking, sequential. The following instruc-
tions are additionally enabled: mpy, mpyu, mpym, mpymu, and mpy_s.
‘6’
‘wlh5’ One 32x4 multiplier, blocking, sequential. The following instruc-
tions are additionally enabled: mpy, mpyu, mpym, mpymu, and mpy_s.
226 Using the GNU Compiler Collection (GCC)
‘7’
‘plus_dmpy’
ARC HS SIMD support.
‘8’
‘plus_macd’
ARC HS SIMD support.
‘9’
‘plus_qmacw’
ARC HS SIMD support.
This option is only available for ARCv2 cores.
-mfpu=fpu
Enables support for specific floating-point hardware extensions for ARCv2
cores. Supported values for fpu are:
‘fpus’ Enables support for single-precision floating-point hardware exten-
sions.
‘fpud’ Enables support for double-precision floating-point hardware exten-
sions. The single-precision floating-point extension is also enabled.
Not available for ARC EM.
‘fpuda’ Enables support for double-precision floating-point hardware
extensions using double-precision assist instructions. The
single-precision floating-point extension is also enabled. This
option is only available for ARC EM.
‘fpuda_div’
Enables support for double-precision floating-point hardware
extensions using double-precision assist instructions. The
single-precision floating-point, square-root, and divide extensions
are also enabled. This option is only available for ARC EM.
‘fpuda_fma’
Enables support for double-precision floating-point hardware
extensions using double-precision assist instructions. The
single-precision floating-point and fused multiply and add
hardware extensions are also enabled. This option is only available
for ARC EM.
‘fpuda_all’
Enables support for double-precision floating-point hardware exten-
sions using double-precision assist instructions. All single-precision
floating-point hardware extensions are also enabled. This option is
only available for ARC EM.
‘fpus_div’
Enables support for single-precision floating-point, square-root and
divide hardware extensions.
Chapter 3: GCC Command Options 227
‘fpud_div’
Enables support for double-precision floating-point, square-root
and divide hardware extensions. This option includes option
‘fpus_div’. Not available for ARC EM.
‘fpus_fma’
Enables support for single-precision floating-point and fused mul-
tiply and add hardware extensions.
‘fpud_fma’
Enables support for double-precision floating-point and fused mul-
tiply and add hardware extensions. This option includes option
‘fpus_fma’. Not available for ARC EM.
‘fpus_all’
Enables support for all single-precision floating-point hardware ex-
tensions.
‘fpud_all’
Enables support for all single- and double-precision floating-point
hardware extensions. Not available for ARC EM.
The following options are passed through to the assembler, and also define preprocessor
macro symbols.
-mdsp-packa
Passed down to the assembler to enable the DSP Pack A extensions. Also sets
the preprocessor symbol __Xdsp_packa. This option is deprecated.
-mdvbf Passed down to the assembler to enable the dual Viterbi butterfly extension.
Also sets the preprocessor symbol __Xdvbf. This option is deprecated.
-mlock Passed down to the assembler to enable the locked load/store conditional ex-
tension. Also sets the preprocessor symbol __Xlock.
-mmac-d16
Passed down to the assembler. Also sets the preprocessor symbol __Xxmac_d16.
This option is deprecated.
-mmac-24 Passed down to the assembler. Also sets the preprocessor symbol __Xxmac_24.
This option is deprecated.
-mrtsc Passed down to the assembler to enable the 64-bit time-stamp counter exten-
sion instruction. Also sets the preprocessor symbol __Xrtsc. This option is
deprecated.
-mswape Passed down to the assembler to enable the swap byte ordering extension in-
struction. Also sets the preprocessor symbol __Xswape.
-mtelephony
Passed down to the assembler to enable dual- and single-operand instructions
for telephony. Also sets the preprocessor symbol __Xtelephony. This option is
deprecated.
228 Using the GNU Compiler Collection (GCC)
-mxy Passed down to the assembler to enable the XY memory extension. Also sets
the preprocessor symbol __Xxy.
The following options control how the assembly code is annotated:
-misize Annotate assembler instructions with estimated addresses.
-mannotate-align
Explain what alignment considerations lead to the decision to make an instruc-
tion short or long.
The following options are passed through to the linker:
-marclinux
Passed through to the linker, to specify use of the arclinux emulation. This
option is enabled by default in tool chains built for arc-linux-uclibc and
arceb-linux-uclibc targets when profiling is not requested.
-marclinux_prof
Passed through to the linker, to specify use of the arclinux_prof emulation.
This option is enabled by default in tool chains built for arc-linux-uclibc
and arceb-linux-uclibc targets when profiling is requested.
The following options control the semantics of generated code:
-mlong-calls
Generate calls as register indirect calls, thus providing access to the full 32-bit
address range.
-mmedium-calls
Don’t use less than 25-bit addressing range for calls, which is the offset avail-
able for an unconditional branch-and-link instruction. Conditional execution
of function calls is suppressed, to allow use of the 25-bit range, rather than
the 21-bit range with conditional branch-and-link. This is the default for tool
chains built for arc-linux-uclibc and arceb-linux-uclibc targets.
-mno-sdata
Do not generate sdata references. This is the default for tool chains built for
arc-linux-uclibc and arceb-linux-uclibc targets.
-mvolatile-cache
Use ordinarily cached memory accesses for volatile references. This is the de-
fault.
-mno-volatile-cache
Enable cache bypass for volatile references.
The following options fine tune code generation:
-malign-call
Do alignment optimizations for call instructions.
-mauto-modify-reg
Enable the use of pre/post modify with register displacement.
Chapter 3: GCC Command Options 229
-mbbit-peephole
Enable bbit peephole2.
-mno-brcc
This option disables a target-specific pass in ‘arc_reorg’ to generate compare-
and-branch (brcc) instructions. It has no effect on generation of these instruc-
tions driven by the combiner pass.
-mcase-vector-pcrel
Use PC-relative switch case tables to enable case table shortening. This is the
default for ‘-Os’.
-mcompact-casesi
Enable compact casesi pattern. This is the default for ‘-Os’, and only available
for ARCv1 cores.
-mno-cond-exec
Disable the ARCompact-specific pass to generate conditional execution instruc-
tions.
Due to delay slot scheduling and interactions between operand numbers, literal
sizes, instruction lengths, and the support for conditional execution, the target-
independent pass to generate conditional execution is often lacking, so the ARC
port has kept a special pass around that tries to find more conditional execution
generation opportunities after register allocation, branch shortening, and delay
slot scheduling have been done. This pass generally, but not always, improves
performance and code size, at the cost of extra compilation time, which is why
there is an option to switch it off. If you have a problem with call instructions
exceeding their allowable offset range because they are conditionalized, you
should consider using ‘-mmedium-calls’ instead.
-mearly-cbranchsi
Enable pre-reload use of the cbranchsi pattern.
-mexpand-adddi
Expand adddi3 and subdi3 at RTL generation time into add.f, adc etc.
-mindexed-loads
Enable the use of indexed loads. This can be problematic because some opti-
mizers then assume that indexed stores exist, which is not the case.
Enable Local Register Allocation. This is still experimental for ARC, so by
default the compiler uses standard reload (i.e. ‘-mno-lra’).
-mlra-priority-none
Don’t indicate any priority for target registers.
-mlra-priority-compact
Indicate target register priority for r0..r3 / r12..r15.
-mlra-priority-noncompact
Reduce target register priority for r0..r3 / r12..r15.
-mno-millicode
When optimizing for size (using ‘-Os’), prologues and epilogues that have to
save or restore a large number of registers are often shortened by using call
230 Using the GNU Compiler Collection (GCC)
-munalign-prob-threshold=probability
Set probability threshold for unaligning branches. When tuning for ‘ARC700’
and optimizing for speed, branches without filled delay slot are preferably emit-
ted unaligned and long, unless profiling indicates that the probability for the
branch to be taken is below probability. See Section 10.5 [Cross-profiling],
page 779. The default is (REG BR PROB BASE/2), i.e. 5000.
The following options are maintained for backward compatibility, but are now deprecated
and will be removed in a future release:
-margonaut
Obsolete FPX.
-mbig-endian
-EB Compile code for big-endian targets. Use of these options is now deprecated.
Big-endian code is supported by configuring GCC to build arceb-elf32 and
arceb-linux-uclibc targets, for which big endian is the default.
-mlittle-endian
-EL Compile code for little-endian targets. Use of these options is now deprecated.
Little-endian code is supported by configuring GCC to build arc-elf32 and
arc-linux-uclibc targets, for which little endian is the default.
-mbarrel_shifter
Replaced by ‘-mbarrel-shifter’.
-mdpfp_compact
Replaced by ‘-mdpfp-compact’.
-mdpfp_fast
Replaced by ‘-mdpfp-fast’.
-mdsp_packa
Replaced by ‘-mdsp-packa’.
-mEA Replaced by ‘-mea’.
-mmac_24 Replaced by ‘-mmac-24’.
-mmac_d16
Replaced by ‘-mmac-d16’.
-mspfp_compact
Replaced by ‘-mspfp-compact’.
-mspfp_fast
Replaced by ‘-mspfp-fast’.
-mtune=cpu
Values ‘arc600’, ‘arc601’, ‘arc700’ and ‘arc700-xmac’ for cpu are replaced by
‘ARC600’, ‘ARC601’, ‘ARC700’ and ‘ARC700-xmac’ respectively.
-multcost=num
Replaced by ‘-mmultcost’.
232 Using the GNU Compiler Collection (GCC)
-march=name
This specifies the name of the target ARM architecture. GCC uses this
name to determine what kind of instructions it can emit when generating
assembly code. This option can be used in conjunction with or instead of
the ‘-mcpu=’ option. Permissible names are: ‘armv2’, ‘armv2a’, ‘armv3’,
‘armv3m’, ‘armv4’, ‘armv4t’, ‘armv5’, ‘armv5e’, ‘armv5t’, ‘armv5te’, ‘armv6’,
‘armv6-m’, ‘armv6j’, ‘armv6k’, ‘armv6kz’, ‘armv6s-m’, ‘armv6t2’, ‘armv6z’,
‘armv6zk’, ‘armv7’, ‘armv7-a’, ‘armv7-m’, ‘armv7-r’, ‘armv7e-m’, ‘armv7ve’,
‘armv8-a’, ‘armv8-a+crc’, ‘armv8.1-a’, ‘armv8.1-a+crc’, ‘armv8-m.base’,
‘armv8-m.main’, ‘armv8-m.main+dsp’, ‘iwmmxt’, ‘iwmmxt2’.
Architecture revisions older than ‘armv4t’ are deprecated.
‘-march=armv6s-m’ is the ‘armv6-m’ architecture with support for the (now
mandatory) SVC instruction.
‘-march=armv6zk’ is an alias for ‘armv6kz’, existing for backwards compatibil-
ity.
‘-march=armv7ve’ is the ‘armv7-a’ architecture with virtualization extensions.
‘-march=armv8-a+crc’ enables code generation for the ARMv8-A architecture
together with the optional CRC32 extensions.
‘-march=armv8.1-a’ enables compiler support for the ARMv8.1-A architecture.
This also enables the features provided by ‘-march=armv8-a+crc’.
‘-march=armv8.2-a’ enables compiler support for the ARMv8.2-A architecture.
This also enables the features provided by ‘-march=armv8.1-a’.
‘-march=armv8.2-a+fp16’ enables compiler support for the ARMv8.2-A archi-
tecture with the optional FP16 instructions extension. This also enables the
features provided by ‘-march=armv8.1-a’ and implies ‘-mfp16-format=ieee’.
‘-march=native’ causes the compiler to auto-detect the architecture of the build
computer. At present, this feature is only supported on GNU/Linux, and not
all architectures are recognized. If the auto-detect is unsuccessful the option
has no effect.
-mtune=name
This option specifies the name of the target ARM processor for which GCC
should tune the performance of the code. For some ARM implementations bet-
ter performance can be obtained by using this option. Permissible names are:
‘arm2’, ‘arm250’, ‘arm3’, ‘arm6’, ‘arm60’, ‘arm600’, ‘arm610’, ‘arm620’, ‘arm7’,
‘arm7m’, ‘arm7d’, ‘arm7dm’, ‘arm7di’, ‘arm7dmi’, ‘arm70’, ‘arm700’, ‘arm700i’,
‘arm710’, ‘arm710c’, ‘arm7100’, ‘arm720’, ‘arm7500’, ‘arm7500fe’, ‘arm7tdmi’,
‘arm7tdmi-s’, ‘arm710t’, ‘arm720t’, ‘arm740t’, ‘strongarm’, ‘strongarm110’,
‘strongarm1100’, ‘strongarm1110’, ‘arm8’, ‘arm810’, ‘arm9’, ‘arm9e’,
‘arm920’, ‘arm920t’, ‘arm922t’, ‘arm946e-s’, ‘arm966e-s’, ‘arm968e-s’,
‘arm926ej-s’, ‘arm940t’, ‘arm9tdmi’, ‘arm10tdmi’, ‘arm1020t’, ‘arm1026ej-s’,
‘arm10e’, ‘arm1020e’, ‘arm1022e’, ‘arm1136j-s’, ‘arm1136jf-s’,
‘mpcore’, ‘mpcorenovfp’, ‘arm1156t2-s’, ‘arm1156t2f-s’, ‘arm1176jz-s’,
‘arm1176jzf-s’, ‘generic-armv7-a’, ‘cortex-a5’, ‘cortex-a7’, ‘cortex-a8’,
‘cortex-a9’, ‘cortex-a12’, ‘cortex-a15’, ‘cortex-a17’, ‘cortex-a32’,
‘cortex-a35’, ‘cortex-a53’, ‘cortex-a57’, ‘cortex-a72’, ‘cortex-a73’,
234 Using the GNU Compiler Collection (GCC)
-msingle-pic-base
Treat the register used for PIC addressing as read-only, rather than loading
it in the prologue for each function. The runtime system is responsible for
initializing this register with an appropriate value before execution begins.
-mpic-register=reg
Specify the register to be used for PIC addressing. For standard PIC base case,
the default is any suitable register determined by compiler. For single PIC base
case, the default is ‘R9’ if target is EABI based or stack-checking is enabled,
otherwise the default is ‘R10’.
-mpic-data-is-text-relative
Assume that the displacement between the text and data segments is fixed at
static link time. This permits using PC-relative addressing operations to access
data known to be in the data segment. For non-VxWorks RTP targets, this
option is enabled by default. When disabled on such targets, it will enable
‘-msingle-pic-base’ by default.
-mpoke-function-name
Write the name of each function into the text section, directly preceding the
function prologue. The generated code is similar to this:
t0
.ascii "arm_poke_function_name", 0
.align
t1
.word 0xff000000 + (t1 - t0)
arm_poke_function_name
mov ip, sp
stmfd sp!, {fp, ip, lr, pc}
sub fp, ip, #4
When performing a stack backtrace, code can inspect the value of pc stored at
fp + 0. If the trace function then looks at location pc - 12 and the top 8 bits
are set, then we know that there is a function name embedded immediately
preceding this location and has length ((pc[-3]) & 0xff000000).
-mthumb
-marm
Select between generating code that executes in ARM and Thumb states.
The default for most configurations is to generate code that executes in
ARM state, but the default can be changed by configuring GCC with the
‘--with-mode=’state configure option.
You can also override the ARM and Thumb mode for each function by using the
target("thumb") and target("arm") function attributes (see Section 6.31.4
[ARM Function Attributes], page 448) or pragmas (see Section 6.62.15 [Function
Specific Option Pragmas], page 730).
-mtpcs-frame
Generate a stack frame that is compliant with the Thumb Procedure Call Stan-
dard for all non-leaf functions. (A leaf function is one that does not call any
other functions.) The default is ‘-mno-tpcs-frame’.
Chapter 3: GCC Command Options 237
-mtpcs-leaf-frame
Generate a stack frame that is compliant with the Thumb Procedure Call Stan-
dard for all leaf functions. (A leaf function is one that does not call any other
functions.) The default is ‘-mno-apcs-leaf-frame’.
-mcallee-super-interworking
Gives all externally visible functions in the file being compiled an ARM in-
struction set header which switches to Thumb mode before executing the rest
of the function. This allows these functions to be called from non-interworking
code. This option is not valid in AAPCS configurations because interworking
is enabled by default.
-mcaller-super-interworking
Allows calls via function pointers (including virtual functions) to execute cor-
rectly regardless of whether the target code has been compiled for interworking
or not. There is a small overhead in the cost of executing a function pointer
if this option is enabled. This option is not valid in AAPCS configurations
because interworking is enabled by default.
-mtp=name
Specify the access model for the thread local storage pointer. The valid models
are ‘soft’, which generates calls to __aeabi_read_tp, ‘cp15’, which fetches the
thread pointer from cp15 directly (supported in the arm6k architecture), and
‘auto’, which uses the best available method for the selected processor. The
default setting is ‘auto’.
-mtls-dialect=dialect
Specify the dialect to use for accessing thread local storage. Two dialects are
supported—‘gnu’ and ‘gnu2’. The ‘gnu’ dialect selects the original GNU scheme
for supporting local and global dynamic TLS models. The ‘gnu2’ dialect selects
the GNU descriptor scheme, which provides better performance for shared li-
braries. The GNU descriptor scheme is compatible with the original scheme,
but does require new assembler, linker and library support. Initial and local
exec TLS models are unaffected by this option and always use the original
scheme.
-mword-relocations
Only generate absolute relocations on word-sized values (i.e. R ARM ABS32).
This is enabled by default on targets (uClinux, SymbianOS) where the runtime
loader imposes this restriction, and when ‘-fpic’ or ‘-fPIC’ is specified.
-mfix-cortex-m3-ldrd
Some Cortex-M3 cores can cause data corruption when ldrd instructions
with overlapping destination and base registers are used. This option
avoids generating these instructions. This option is enabled by default when
‘-mcpu=cortex-m3’ is specified.
-munaligned-access
-mno-unaligned-access
Enables (or disables) reading and writing of 16- and 32- bit values from ad-
dresses that are not 16- or 32- bit aligned. By default unaligned access is
238 Using the GNU Compiler Collection (GCC)
disabled for all pre-ARMv6, all ARMv6-M and for ARMv8-M Baseline archi-
tectures, and enabled for all other architectures. If unaligned access is not
enabled then words in packed data structures are accessed a byte at a time.
The ARM attribute Tag_CPU_unaligned_access is set in the generated object
file to either true or false, depending upon the setting of this option. If unaligned
access is enabled then the preprocessor symbol __ARM_FEATURE_UNALIGNED is
also defined.
-mneon-for-64bits
Enables using Neon to handle scalar 64-bits operations. This is disabled by
default since the cost of moving data from core registers to Neon is high.
-mslow-flash-data
Assume loading data from flash is slower than fetching instruction. Therefore
literal load is minimized for better performance. This option is only supported
when compiling for ARMv7 M-profile and off by default.
-masm-syntax-unified
Assume inline assembler is using unified asm syntax. The default is currently off
which implies divided syntax. This option has no impact on Thumb2. However,
this may change in future releases of GCC. Divided syntax should be considered
deprecated.
-mrestrict-it
Restricts generation of IT blocks to conform to the rules of ARMv8. IT blocks
can only contain a single 16-bit instruction from a select set of instructions.
This option is on by default for ARMv8 Thumb mode.
-mprint-tune-info
Print CPU tuning information as comment in assembler file. This is an option
used only for regression testing of the compiler and not intended for ordinary
use in compiling code. This option is disabled by default.
-mpure-code
Do not allow constant data to be placed in code sections. Additionally, when
compiling for ELF object format give all text sections the ELF processor-specific
section attribute SHF_ARM_PURECODE. This option is only available when gen-
erating non-pic code for ARMv7-M targets.
-mcmse Generate secure code as per the "ARMv8-M Security Extensions: Require-
ments on Development Tools Engineering Specification", which can be found
on http://infocenter.arm.com/help/topic/com.arm.doc.ecm0359818/
ECM0359818_armv8m_security_extensions_reqs_on_dev_tools_1_0.pdf.
avr6 “Enhanced” devices with 3-byte PC, i.e. with more than 128 KiB
of program memory.
mcu = atmega256rfr2, atmega2560, atmega2561,
atmega2564rfr2.
avrxmega2
“XMEGA” devices with more than 8 KiB and up to 64 KiB of
program memory.
mcu = atxmega16a4, atxmega16a4u, atxmega16c4, atxmega16d4,
atxmega16e5, atxmega32a4, atxmega32a4u, atxmega32c3,
atxmega32c4, atxmega32d3, atxmega32d4, atxmega32e5,
atxmega8e5.
avrxmega4
“XMEGA” devices with more than 64 KiB and up to 128 KiB of
program memory.
mcu = atxmega64a3, atxmega64a3u, atxmega64a4u,
atxmega64b1, atxmega64b3, atxmega64c3, atxmega64d3,
atxmega64d4.
avrxmega5
“XMEGA” devices with more than 64 KiB and up to 128 KiB of
program memory and more than 64 KiB of RAM.
mcu = atxmega64a1, atxmega64a1u.
avrxmega6
“XMEGA” devices with more than 128 KiB of program memory.
mcu = atxmega128a3, atxmega128a3u, atxmega128b1,
atxmega128b3, atxmega128c3, atxmega128d3, atxmega128d4,
atxmega192a3, atxmega192a3u, atxmega192c3, atxmega192d3,
atxmega256a3, atxmega256a3b, atxmega256a3bu,
atxmega256a3u, atxmega256c3, atxmega256d3, atxmega384c3,
atxmega384d3.
Chapter 3: GCC Command Options 241
avrxmega7
“XMEGA” devices with more than 128 KiB of program memory
and more than 64 KiB of RAM.
mcu = atxmega128a1, atxmega128a1u, atxmega128a4u.
avrtiny “TINY” Tiny core devices with 512 B up to 4 KiB of program
memory.
mcu = attiny10, attiny20, attiny4, attiny40, attiny5,
attiny9.
avr1 This ISA is implemented by the minimal AVR core and supported
for assembler only.
mcu = attiny11, attiny12, attiny15, attiny28, at90s1200.
-mabsdata
Assume that all data in static storage can be accessed by LDS / STS instruc-
tions. This option has only an effect on reduced Tiny devices like ATtiny40.
See also the absdata Section 6.32.2 [AVR Variable Attributes], page 478.
-maccumulate-args
Accumulate outgoing function arguments and acquire/release the needed stack
space for outgoing function arguments once in function prologue/epilogue.
Without this option, outgoing arguments are pushed before calling a function
and popped afterwards.
Popping the arguments after the function call can be expensive on AVR so
that accumulating the stack space might lead to smaller executables because
arguments need not be removed from the stack after such a function call.
This option can lead to reduced code size for functions that perform several
calls to functions that get their arguments on the stack like calls to printf-like
functions.
-mbranch-cost=cost
Set the branch costs for conditional branch instructions to cost. Reasonable
values for cost are small, non-negative integers. The default branch cost is 0.
-mcall-prologues
Functions prologues/epilogues are expanded as calls to appropriate subroutines.
Code size is smaller.
-mint8 Assume int to be 8-bit integer. This affects the sizes of all types: a char is 1
byte, an int is 1 byte, a long is 2 bytes, and long long is 4 bytes. Please note
that this option does not conform to the C standards, but it results in smaller
code size.
-mn-flash=num
Assume that the flash memory has a size of num times 64 KiB.
-mno-interrupts
Generated code is not compatible with hardware interrupts. Code size is
smaller.
-mrelax Try to replace CALL resp. JMP instruction by the shorter RCALL resp. RJMP in-
struction if applicable. Setting ‘-mrelax’ just adds the ‘--mlink-relax’ option
242 Using the GNU Compiler Collection (GCC)
to the assembler’s command line and the ‘--relax’ option to the linker’s com-
mand line.
Jump relaxing is performed by the linker because jump offsets are not known
before code is located. Therefore, the assembler code generated by the compiler
is the same, but the instructions in the executable may differ from instructions
in the assembler code.
Relaxing must be turned on if linker stubs are needed, see the section on EIND
and linker stubs below.
-mrmw Assume that the device supports the Read-Modify-Write instructions XCH, LAC,
LAS and LAT.
-msp8 Treat the stack pointer register as an 8-bit register, i.e. assume the high byte of
the stack pointer is zero. In general, you don’t need to set this option by hand.
This option is used internally by the compiler to select and build multilibs
for architectures avr2 and avr25. These architectures mix devices with and
without SPH. For any setting other than ‘-mmcu=avr2’ or ‘-mmcu=avr25’ the
compiler driver adds or removes this option from the compiler proper’s com-
mand line, because the compiler then knows if the device or architecture has
an 8-bit stack pointer and thus no SPH register or not.
-mstrict-X
Use address register X in a way proposed by the hardware. This means that X
is only used in indirect, post-increment or pre-decrement addressing.
Without this option, the X register may be used in the same way as Y or Z which
then is emulated by additional instructions. For example, loading a value with
X+const addressing with a small non-negative const < 64 to a register Rn is
performed as
adiw r26, const ; X += const
ld Rn, X ; Rn = *X
sbiw r26, const ; X -= const
-mtiny-stack
Only change the lower 8 bits of the stack pointer.
-mfract-convert-truncate
Allow to use truncation instead of rounding towards zero for fractional fixed-
point types.
-nodevicelib
Don’t link against AVR-LibC’s device specific library lib<mcu>.a.
-Waddr-space-convert
Warn about conversions between address spaces in the case where the resulting
address space is not contained in the incoming address space.
-Wmisspelled-isr
Warn if the ISR is misspelled, i.e. without vector prefix. Enabled by default.
Chapter 3: GCC Command Options 243
3.18.5.1 EIND and Devices with More Than 128 Ki Bytes of Flash
Pointers in the implementation are 16 bits wide. The address of a function or label is
represented as word address so that indirect jumps and calls can target any code address
in the range of 64 Ki words.
In order to facilitate indirect jump on devices with more than 128 Ki bytes of program
memory space, there is a special function register called EIND that serves as most significant
part of the target address when EICALL or EIJMP instructions are used.
Indirect jumps and calls on these devices are handled as follows by the compiler and are
subject to some limitations:
• The compiler never sets EIND.
• The compiler uses EIND implicitly in EICALL/EIJMP instructions or might read EIND
directly in order to emulate an indirect call/jump by means of a RET instruction.
• The compiler assumes that EIND never changes during the startup code or during the
application. In particular, EIND is not saved/restored in function or interrupt service
routine prologue/epilogue.
• For indirect calls to functions and computed goto, the linker generates stubs. Stubs are
jump pads sometimes also called trampolines. Thus, the indirect call/jump jumps to
such a stub. The stub contains a direct jump to the desired address.
• Linker relaxation must be turned on so that the linker generates the stubs correctly
in all situations. See the compiler option ‘-mrelax’ and the linker option ‘--relax’.
There are corner cases where the linker is supposed to generate stubs but aborts without
relaxation and without a helpful error message.
• The default linker script is arranged for code with EIND = 0. If code is supposed to
work for a setup with EIND != 0, a custom linker script has to be used in order to place
the sections whose name start with .trampolines into the segment where EIND points
to.
• The startup code from libgcc never sets EIND. Notice that startup code is a blend
of code from libgcc and AVR-LibC. For the impact of AVR-LibC on EIND, see the
AVR-LibC user manual.
• It is legitimate for user-specific startup code to set up EIND early, for example by means
of initialization code located in section .init3. Such code runs prior to general startup
code that initializes RAM and calls constructors, but after the bit of startup code from
AVR-LibC that sets EIND to the segment where the vector table is located.
#include <avr/io.h>
static void
__attribute__((section(".init3"),naked,used,no_instrument_function))
init3_set_eind (void)
{
__asm volatile ("ldi r24,pm_hh8(__trampolines_start)\n\t"
"out %i0,r24" :: "n" (&EIND) : "r24","memory");
}
The __trampolines_start symbol is defined in the linker script.
• Stubs are generated automatically by the linker if the following two conditions are met:
244 Using the GNU Compiler Collection (GCC)
− The address of a label is taken by means of the gs modifier (short for generate
stubs) like so:
LDI r24, lo8(gs(func))
LDI r25, hi8(gs(func))
− The final location of that label is in a code segment outside the segment where the
stubs are located.
• The compiler emits such gs modifiers for code labels in the following situations:
− Taking address of a function or code label.
− Computed goto.
− If prologue-save function is used, see ‘-mcall-prologues’ command-line option.
− Switch/case dispatch tables. If you do not want such dispatch tables you can
specify the ‘-fno-jump-tables’ command-line option.
− C and C++ constructors/destructors called during startup/shutdown.
− If the tools hit a gs() modifier explained above.
• Jumping to non-symbolic addresses like so is not supported:
int main (void)
{
/* Call function at word address 0x2 */
return ((int(*)(void)) 0x2)();
}
Instead, a stub has to be set up, i.e. the function has to be called through a symbol
(func_4 in the example):
int main (void)
{
extern int func_4 (void);
• If the device comes with a specific RAMP register, the ISR prologue/epilogue
saves/restores that SFR and initializes it with zero in case the ISR code might
(implicitly) use it.
• RAM larger than 64 KiB is not supported by GCC for AVR targets. If you use inline
assembler to read from locations outside the 16-bit address range and change one of
the RAMP registers, you must reset it to zero after the access.
__AVR_HAVE_ELPMX__
The device has the ELPM Rn,Z and ELPM Rn,Z+ instructions.
__AVR_HAVE_MOVW__
The device has the MOVW instruction to perform 16-bit register-register moves.
__AVR_HAVE_LPMX__
The device has the LPM Rn,Z and LPM Rn,Z+ instructions.
__AVR_HAVE_MUL__
The device has a hardware multiplier.
__AVR_HAVE_JMP_CALL__
The device has the JMP and CALL instructions. This is the case for devices with
at least 16 KiB of program memory.
__AVR_HAVE_EIJMP_EICALL__
__AVR_3_BYTE_PC__
The device has the EIJMP and EICALL instructions. This is the case for devices
with more than 128 KiB of program memory. This also means that the program
counter (PC) is 3 bytes wide.
__AVR_2_BYTE_PC__
The program counter (PC) is 2 bytes wide. This is the case for devices with up
to 128 KiB of program memory.
__AVR_HAVE_8BIT_SP__
__AVR_HAVE_16BIT_SP__
The stack pointer (SP) register is treated as 8-bit respectively 16-bit register
by the compiler. The definition of these macros is affected by ‘-mtiny-stack’.
__AVR_HAVE_SPH__
__AVR_SP8__
The device has the SPH (high part of stack pointer) special function register
or has an 8-bit stack pointer, respectively. The definition of these macros is
affected by ‘-mmcu=’ and in the cases of ‘-mmcu=avr2’ and ‘-mmcu=avr25’ also
by ‘-msp8’.
__AVR_HAVE_RAMPD__
__AVR_HAVE_RAMPX__
__AVR_HAVE_RAMPY__
__AVR_HAVE_RAMPZ__
The device has the RAMPD, RAMPX, RAMPY, RAMPZ special function register, re-
spectively.
__NO_INTERRUPTS__
This macro reflects the ‘-mno-interrupts’ command-line option.
__AVR_ERRATA_SKIP__
__AVR_ERRATA_SKIP_JMP_CALL__
Some AVR devices (AT90S8515, ATmega103) must not skip 32-bit instructions
because of a hardware erratum. Skip instructions are SBRS, SBRC, SBIS, SBIC
and CPSE. The second macro is only defined if __AVR_HAVE_JMP_CALL__ is also
set.
Chapter 3: GCC Command Options 247
__AVR_ISA_RMW__
The device has Read-Modify-Write instructions (XCH, LAC, LAS and LAT).
__AVR_SFR_OFFSET__=offset
Instructions that can address I/O special function registers directly like IN, OUT,
SBI, etc. may use a different address as if addressed by an instruction to access
RAM like LD or STS. This offset depends on the device architecture and has to
be subtracted from the RAM address in order to get the respective I/O address.
__WITH_AVRLIBC__
The compiler is configured to be used together with AVR-Libc. See the
‘--with-avrlibc’ configure option.
-msim Specifies that the program will be run on the simulator. This causes the simu-
lator BSP provided by libgloss to be linked in. This option has effect only for
‘bfin-elf’ toolchain. Certain other options, such as ‘-mid-shared-library’
and ‘-mfdpic’, imply ‘-msim’.
-momit-leaf-frame-pointer
Don’t keep the frame pointer in a register for leaf functions. This avoids the
instructions to save, set up and restore frame pointers and makes an extra reg-
ister available in leaf functions. The option ‘-fomit-frame-pointer’ removes
the frame pointer for all functions, which might make debugging harder.
248 Using the GNU Compiler Collection (GCC)
-mspecld-anomaly
When enabled, the compiler ensures that the generated code does not contain
speculative loads after jump instructions. If this option is used, __WORKAROUND_
SPECULATIVE_LOADS is defined.
-mno-specld-anomaly
Don’t generate extra code to prevent speculative loads from occurring.
-mcsync-anomaly
When enabled, the compiler ensures that the generated code does not contain
CSYNC or SSYNC instructions too soon after conditional branches. If this
option is used, __WORKAROUND_SPECULATIVE_SYNCS is defined.
-mno-csync-anomaly
Don’t generate extra code to prevent CSYNC or SSYNC instructions from
occurring too soon after a conditional branch.
-mlow-64k
When enabled, the compiler is free to take advantage of the knowledge that the
entire program fits into the low 64k of memory.
-mno-low-64k
Assume that the program is arbitrarily large. This is the default.
-mstack-check-l1
Do stack checking using information placed into L1 scratchpad memory by the
uClinux kernel.
-mid-shared-library
Generate code that supports shared libraries via the library ID method. This
allows for execute in place and shared libraries in an environment without vir-
tual memory management. This option implies ‘-fPIC’. With a ‘bfin-elf’
target, this option implies ‘-msim’.
-mno-id-shared-library
Generate code that doesn’t assume ID-based shared libraries are being used.
This is the default.
-mleaf-id-shared-library
Generate code that supports shared libraries via the library ID method, but
assumes that this library or executable won’t link against any other ID shared
libraries. That allows the compiler to use faster code for jumps and calls.
-mno-leaf-id-shared-library
Do not assume that the code being compiled won’t link against any ID shared
libraries. Slower code is generated for jump and call insns.
-mshared-library-id=n
Specifies the identification number of the ID-based shared library being com-
piled. Specifying a value of 0 generates more compact code; specifying other
values forces the allocation of that number to the current library but is no more
space- or time-efficient than omitting this option.
Chapter 3: GCC Command Options 249
-msep-data
Generate code that allows the data segment to be located in a different area of
memory from the text segment. This allows for execute in place in an environ-
ment without virtual memory management by eliminating relocations against
the text section.
-mno-sep-data
Generate code that assumes that the data segment follows the text segment.
This is the default.
-mlong-calls
-mno-long-calls
Tells the compiler to perform function calls by first loading the address of the
function into a register and then performing a subroutine call on this register.
This switch is needed if the target function lies outside of the 24-bit addressing
range of the offset-based version of subroutine call instruction.
This feature is not enabled by default. Specifying ‘-mno-long-calls’ restores
the default behavior. Note these switches have no effect on how the compiler
generates code to handle function calls via function pointers.
-mfast-fp
Link with the fast floating-point library. This library relaxes some of the
IEEE floating-point standard’s rules for checking inputs against Not-a-Number
(NAN), in the interest of performance.
-minline-plt
Enable inlining of PLT entries in function calls to functions that are not known
to bind locally. It has no effect without ‘-mfdpic’.
-mmulticore
Build a standalone application for multicore Blackfin processors. This
option causes proper start files and link scripts supporting multicore to be
used, and defines the macro __BFIN_MULTICORE. It can only be used with
‘-mcpu=bf561[-sirevision]’.
This option can be used with ‘-mcorea’ or ‘-mcoreb’, which selects the one-
application-per-core programming model. Without ‘-mcorea’ or ‘-mcoreb’, the
single-application/dual-core programming model is used. In this model, the
main function of Core B should be named as coreb_main.
If this option is not used, the single-core application programming model is
used.
-mcorea Build a standalone application for Core A of BF561 when using the one-
application-per-core programming model. Proper start files and link scripts
are used to support Core A, and the macro __BFIN_COREA is defined. This
option can only be used in conjunction with ‘-mmulticore’.
-mcoreb Build a standalone application for Core B of BF561 when using the
one-application-per-core programming model. Proper start files and link
scripts are used to support Core B, and the macro __BFIN_COREB is defined.
When this option is used, coreb_main should be used instead of main. This
option can only be used in conjunction with ‘-mmulticore’.
250 Using the GNU Compiler Collection (GCC)
-msdram Build a standalone application for SDRAM. Proper start files and link scripts
are used to put the application into SDRAM, and the macro __BFIN_SDRAM is
defined. The loader should initialize SDRAM before loading the application.
-micplb Assume that ICPLBs are enabled at run time. This has an effect on certain
anomaly workarounds. For Linux targets, the default is to assume ICPLBs are
enabled; for standalone applications the default is off.
-mmax-stack-frame=n
Warn when the stack frame of a function exceeds n bytes.
-metrax4
-metrax100
The options ‘-metrax4’ and ‘-metrax100’ are synonyms for ‘-march=v3’ and
‘-march=v8’ respectively.
-mmul-bug-workaround
-mno-mul-bug-workaround
Work around a bug in the muls and mulu instructions for CPU models where
it applies. This option is active by default.
-mpdebug Enable CRIS-specific verbose debug-related information in the assembly code.
This option also has the effect of turning off the ‘#NO_APP’ formatted-code
indicator to the assembler at the beginning of the assembly file.
-mcc-init
Do not use condition-code results from previous instruction; always emit com-
pare and test instructions before use of condition codes.
-mno-side-effects
Do not emit instructions with side effects in addressing modes other than post-
increment.
-mstack-align
-mno-stack-align
-mdata-align
-mno-data-align
-mconst-align
-mno-const-align
These options (‘no-’ options) arrange (eliminate arrangements) for the stack
frame, individual data and constants to be aligned for the maximum single
data access size for the chosen CPU model. The default is to arrange for 32-
bit alignment. ABI details such as structure layout are not affected by these
options.
-m32-bit
-m16-bit
-m8-bit Similar to the stack- data- and const-align options above, these options arrange
for stack frame, writable data and constants to all be 32-bit, 16-bit or 8-bit
aligned. The default is 32-bit alignment.
-mno-prologue-epilogue
-mprologue-epilogue
With ‘-mno-prologue-epilogue’, the normal function prologue and epilogue
which set up the stack frame are omitted and no return instructions or return
sequences are generated in the code. Use this option only together with visual
inspection of the compiled code: no warnings or errors are generated when
call-saved registers must be saved, or storage for local variables needs to be
allocated.
252 Using the GNU Compiler Collection (GCC)
-mno-gotplt
-mgotplt With ‘-fpic’ and ‘-fPIC’, don’t generate (do generate) instruction sequences
that load addresses for functions from the PLT part of the GOT rather than
(traditional on other architectures) calls to the PLT. The default is ‘-mgotplt’.
-melf Legacy no-op option only recognized with the cris-axis-elf and cris-axis-linux-
gnu targets.
-mlinux Legacy no-op option only recognized with the cris-axis-linux-gnu target.
-sim This option, recognized for the cris-axis-elf, arranges to link with input-output
functions from a simulator library. Code, initialized data and zero-initialized
data are allocated consecutively.
-sim2 Like ‘-sim’, but pass linker options to locate initialized data at 0x40000000 and
zero-initialized data at 0x80000000.
linker for shared libraries, ‘/usr/bin/libtool’, fails and prints an error if asked to create
a shared library with a less restrictive subtype than its input files (for instance, trying to
put a ‘ppc970’ object file in a ‘ppc7400’ library). The linker for executables, ld, quietly
gives the executable the most restrictive subtype of any of its input files.
-Fdir Add the framework directory dir to the head of the list of directories to be
searched for header files. These directories are interleaved with those specified
by ‘-I’ options and are scanned in a left-to-right order.
A framework directory is a directory with frameworks in it. A framework is
a directory with a ‘Headers’ and/or ‘PrivateHeaders’ directory contained
directly in it that ends in ‘.framework’. The name of a framework is the
name of this directory excluding the ‘.framework’. Headers associated with
the framework are found in one of those two directories, with ‘Headers’
being searched first. A subframework is a framework directory that is in a
framework’s ‘Frameworks’ directory. Includes of subframework headers can
only appear in a header of a framework that contains the subframework,
or in a sibling subframework header. Two subframeworks are siblings
if they occur in the same framework. A subframework should not have
the same name as a framework; a warning is issued if this is violated.
Currently a subframework cannot have subframeworks; in the future, the
mechanism may be extended to support this. The standard frameworks can
be found in ‘/System/Library/Frameworks’ and ‘/Library/Frameworks’.
An example include looks like #include <Framework/header.h>, where
‘Framework’ denotes the name of the framework and ‘header.h’ is found in
the ‘PrivateHeaders’ or ‘Headers’ directory.
-iframeworkdir
Like ‘-F’ except the directory is a treated as a system directory. The main
difference between this ‘-iframework’ and ‘-F’ is that with ‘-iframework’ the
compiler does not warn about constructs contained within header files found
via dir. This option is valid only for the C family of languages.
-gused Emit debugging information for symbols that are used. For stabs debugging
format, this enables ‘-feliminate-unused-debug-symbols’. This is by default
ON.
-gfull Emit debugging information for all symbols and types.
-mmacosx-version-min=version
The earliest version of MacOS X that this executable will run on is version.
Typical values of version include 10.1, 10.2, and 10.3.9.
If the compiler was built to use the system’s headers by default, then the default
for this option is the system version on which the compiler is running, otherwise
the default is to make choices that are compatible with as many systems and
code bases as possible.
-mkernel Enable kernel development mode. The ‘-mkernel’ option sets
‘-static’, ‘-fno-common’, ‘-fno-use-cxa-atexit’, ‘-fno-exceptions’,
‘-fno-non-call-exceptions’, ‘-fapple-kext’, ‘-fno-weak’ and ‘-fno-rtti’
254 Using the GNU Compiler Collection (GCC)
-mone-byte-bool
Override the defaults for bool so that sizeof(bool)==1. By default
sizeof(bool) is 4 when compiling for Darwin/PowerPC and 1 when
compiling for Darwin/x86, so this option has no effect on x86.
Warning: The ‘-mone-byte-bool’ switch causes GCC to generate code that
is not binary compatible with code generated without that switch. Using this
switch may require recompiling all other modules in a program, including sys-
tem libraries. Use this switch to conform to a non-default data model.
-mfix-and-continue
-ffix-and-continue
-findirect-data
Generate code suitable for fast turnaround development, such as to
allow GDB to dynamically load ‘.o’ files into already-running programs.
‘-findirect-data’ and ‘-ffix-and-continue’ are provided for backwards
compatibility.
-all_load
Loads all members of static archive libraries. See man ld(1) for more informa-
tion.
-arch_errors_fatal
Cause the errors having to do with files that have the wrong architecture to be
fatal.
-bind_at_load
Causes the output file to be marked such that the dynamic linker will bind all
undefined references when the file is loaded or launched.
-bundle Produce a Mach-o bundle format file. See man ld(1) for more information.
-bundle_loader executable
This option specifies the executable that will load the build output file being
linked. See man ld(1) for more information.
-dynamiclib
When passed this option, GCC produces a dynamic library instead of an exe-
cutable when linking, using the Darwin ‘libtool’ command.
-force_cpusubtype_ALL
This causes GCC’s output file to have the ‘ALL’ subtype, instead of one con-
trolled by the ‘-mcpu’ or ‘-march’ option.
Chapter 3: GCC Command Options 255
-allowable_client client_name
-client_name
-compatibility_version
-current_version
-dead_strip
-dependency-file
-dylib_file
-dylinker_install_name
-dynamic
-exported_symbols_list
-filelist
-flat_namespace
-force_flat_namespace
-headerpad_max_install_names
-image_base
-init
-install_name
-keep_private_externs
-multi_module
-multiply_defined
-multiply_defined_unused
-noall_load
-no_dead_strip_inits_and_terms
-nofixprebinding
-nomultidefs
-noprebind
-noseglinkedit
-pagezero_size
-prebind
-prebind_all_twolevel_modules
-private_bundle
-read_only_relocs
-sectalign
-sectobjectsymbols
-whyload
-seg1addr
-sectcreate
-sectobjectsymbols
-sectorder
-segaddr
-segs_read_only_addr
256 Using the GNU Compiler Collection (GCC)
-segs_read_write_addr
-seg_addr_table
-seg_addr_table_filename
-seglinkedit
-segprot
-segs_read_only_addr
-segs_read_write_addr
-single_module
-static
-sub_library
-sub_umbrella
-twolevel_namespace
-umbrella
-undefined
-unexported_symbols_list
-weak_reference_mismatches
-whatsloaded
These options are passed to the Darwin linker. The Darwin linker man page
describes them in detail.
-mno-soft-float
-msoft-float
Use (do not use) the hardware floating-point instructions for floating-point op-
erations. When ‘-msoft-float’ is specified, functions in ‘libgcc.a’ are used
to perform floating-point operations. Unless they are replaced by routines that
emulate the floating-point operations, or compiled in such a way as to call such
emulations routines, these routines issue floating-point operations. If you are
compiling for an Alpha without floating-point operations, you must ensure that
the library is built so as not to call them.
Note that Alpha implementations without floating-point operations are required
to have floating-point registers.
-mfp-reg
-mno-fp-regs
Generate code that uses (does not use) the floating-point register set.
‘-mno-fp-regs’ implies ‘-msoft-float’. If the floating-point register set is
not used, floating-point operands are passed in integer registers as if they were
integers and floating-point results are passed in $0 instead of $f0. This is a
non-standard calling sequence, so any function with a floating-point argument
or return value called by code compiled with ‘-mno-fp-regs’ must also be
compiled with that option.
A typical use of this option is building a kernel that does not use, and hence
need not save and restore, any floating-point registers.
Chapter 3: GCC Command Options 257
-mieee The Alpha architecture implements floating-point hardware optimized for max-
imum performance. It is mostly compliant with the IEEE floating-point stan-
dard. However, for full compliance, software assistance is required. This option
generates code fully IEEE-compliant code except that the inexact-flag is not
maintained (see below). If this option is turned on, the preprocessor macro
_IEEE_FP is defined during compilation. The resulting code is less efficient but
is able to correctly support denormalized numbers and exceptional IEEE values
such as not-a-number and plus/minus infinity. Other Alpha compilers call this
option ‘-ieee_with_no_inexact’.
-mieee-with-inexact
This is like ‘-mieee’ except the generated code also maintains the IEEE inexact-
flag. Turning on this option causes the generated code to implement fully-
compliant IEEE math. In addition to _IEEE_FP, _IEEE_FP_EXACT is defined as
a preprocessor macro. On some Alpha implementations the resulting code may
execute significantly slower than the code generated by default. Since there is
very little code that depends on the inexact-flag, you should normally not spec-
ify this option. Other Alpha compilers call this option ‘-ieee_with_inexact’.
-mfp-trap-mode=trap-mode
This option controls what floating-point related traps are enabled. Other Alpha
compilers call this option ‘-fptm trap-mode’. The trap mode can be set to one
of four values:
‘n’ This is the default (normal) setting. The only traps that are en-
abled are the ones that cannot be disabled in software (e.g., division
by zero trap).
‘u’ In addition to the traps enabled by ‘n’, underflow traps are enabled
as well.
‘su’ Like ‘u’, but the instructions are marked to be safe for software
completion (see Alpha architecture manual for details).
‘sui’ Like ‘su’, but inexact traps are enabled as well.
-mfp-rounding-mode=rounding-mode
Selects the IEEE rounding mode. Other Alpha compilers call this option ‘-fprm
rounding-mode’. The rounding-mode can be one of:
‘n’ Normal IEEE rounding mode. Floating-point numbers are rounded
towards the nearest machine number or towards the even machine
number in case of a tie.
‘m’ Round towards minus infinity.
‘c’ Chopped rounding mode. Floating-point numbers are rounded to-
wards zero.
‘d’ Dynamic rounding mode. A field in the floating-point control reg-
ister (fpcr, see Alpha architecture reference manual) controls the
rounding mode in effect. The C library initializes this register for
rounding towards plus infinity. Thus, unless your program modifies
the fpcr, ‘d’ corresponds to round towards plus infinity.
258 Using the GNU Compiler Collection (GCC)
-mtrap-precision=trap-precision
In the Alpha architecture, floating-point traps are imprecise. This means with-
out software assistance it is impossible to recover from a floating trap and
program execution normally needs to be terminated. GCC can generate code
that can assist operating system trap handlers in determining the exact loca-
tion that caused a floating-point trap. Depending on the requirements of an
application, different levels of precisions can be selected:
‘p’ Program precision. This option is the default and means a trap
handler can only identify which program caused a floating-point
exception.
‘f’ Function precision. The trap handler can determine the function
that caused a floating-point exception.
‘i’ Instruction precision. The trap handler can determine the exact
instruction that caused a floating-point exception.
Other Alpha compilers provide the equivalent options called ‘-scope_safe’ and
‘-resumption_safe’.
-mieee-conformant
This option marks the generated code as IEEE conformant. You must not
use this option unless you also specify ‘-mtrap-precision=i’ and either
‘-mfp-trap-mode=su’ or ‘-mfp-trap-mode=sui’. Its only effect is to emit the
line ‘.eflag 48’ in the function prologue of the generated assembly file.
-mbuild-constants
Normally GCC examines a 32- or 64-bit integer constant to see if it can construct
it from smaller constants in two or three instructions. If it cannot, it outputs
the constant as a literal and generates code to load it from the data segment
at run time.
Use this option to require GCC to construct all integer constants using code,
even if it takes more instructions (the maximum is six).
You typically use this option to build a shared library dynamic loader. Itself a
shared library, it must relocate itself in memory before it can find the variables
and constants in its own data segment.
-mbwx
-mno-bwx
-mcix
-mno-cix
-mfix
-mno-fix
-mmax
-mno-max Indicate whether GCC should generate code to use the optional BWX, CIX, FIX
and MAX instruction sets. The default is to use the instruction sets supported
by the CPU type specified via ‘-mcpu=’ option or that of the CPU on which
GCC was built if none is specified.
Chapter 3: GCC Command Options 259
-mfloat-vax
-mfloat-ieee
Generate code that uses (does not use) VAX F and G floating-point arithmetic
instead of IEEE single and double precision.
-mexplicit-relocs
-mno-explicit-relocs
Older Alpha assemblers provided no way to generate symbol relocations except
via assembler macros. Use of these macros does not allow optimal instruction
scheduling. GNU binutils as of version 2.12 supports a new syntax that al-
lows the compiler to explicitly mark which relocations should apply to which
instructions. This option is mostly useful for debugging, as GCC detects the
capabilities of the assembler when it is built and sets the default accordingly.
-msmall-data
-mlarge-data
When ‘-mexplicit-relocs’ is in effect, static data is accessed via gp-relative
relocations. When ‘-msmall-data’ is used, objects 8 bytes long or smaller are
placed in a small data area (the .sdata and .sbss sections) and are accessed
via 16-bit relocations off of the $gp register. This limits the size of the small
data area to 64KB, but allows the variables to be directly accessed via a single
instruction.
The default is ‘-mlarge-data’. With this option the data area is limited to just
below 2GB. Programs that require more than 2GB of data must use malloc or
mmap to allocate the data in the heap instead of in the program’s data segment.
When generating code for shared libraries, ‘-fpic’ implies ‘-msmall-data’ and
‘-fPIC’ implies ‘-mlarge-data’.
-msmall-text
-mlarge-text
When ‘-msmall-text’ is used, the compiler assumes that the code of the entire
program (or shared library) fits in 4MB, and is thus reachable with a branch in-
struction. When ‘-msmall-data’ is used, the compiler can assume that all local
symbols share the same $gp value, and thus reduce the number of instructions
required for a function call from 4 to 1.
The default is ‘-mlarge-text’.
-mcpu=cpu_type
Set the instruction set and instruction scheduling parameters for machine type
cpu type. You can specify either the ‘EV’ style name or the corresponding chip
number. GCC supports scheduling parameters for the EV4, EV5 and EV6
family of processors and chooses the default values for the instruction set from
the processor you specify. If you do not specify a processor type, GCC defaults
to the processor on which the compiler was built.
Supported values for cpu type are
‘ev4’
‘ev45’
‘21064’ Schedules as an EV4 and has no instruction set extensions.
260 Using the GNU Compiler Collection (GCC)
‘ev5’
‘21164’ Schedules as an EV5 and has no instruction set extensions.
‘ev56’
‘21164a’ Schedules as an EV5 and supports the BWX extension.
‘pca56’
‘21164pc’
‘21164PC’ Schedules as an EV5 and supports the BWX and MAX extensions.
‘ev6’
‘21264’ Schedules as an EV6 and supports the BWX, FIX, and MAX ex-
tensions.
‘ev67’
‘21264a’ Schedules as an EV6 and supports the BWX, CIX, FIX, and MAX
extensions.
Native toolchains also support the value ‘native’, which selects the best ar-
chitecture option for the host processor. ‘-mcpu=native’ has no effect if GCC
does not recognize the processor.
-mtune=cpu_type
Set only the instruction scheduling parameters for machine type cpu type. The
instruction set is not changed.
Native toolchains also support the value ‘native’, which selects the best archi-
tecture option for the host processor. ‘-mtune=native’ has no effect if GCC
does not recognize the processor.
-mmemory-latency=time
Sets the latency the scheduler should assume for typical memory references
as seen by the application. This number is highly dependent on the memory
access patterns used by the application and the size of the external cache on
the machine.
Valid options for time are
‘number’ A decimal number representing clock cycles.
‘L1’
‘L2’
‘L3’
‘main’ The compiler contains estimates of the number of clock cycles for
“typical” EV4 & EV5 hardware for the Level 1, 2 & 3 caches (also
called Dcache, Scache, and Bcache), as well as to main memory.
Note that L3 is only valid for EV5.
-mno-lsim
Assume that runtime support has been provided and so there is no need to
include the simulator library (‘libsim.a’) on the linker command line.
-mno-double
Do not use floating-point double instructions.
-mmedia
Use media instructions.
-mno-media
Do not use media instructions.
-mmuladd
Use multiply and add/subtract instructions.
-mno-muladd
Do not use multiply and add/subtract instructions.
-mfdpic
Select the FDPIC ABI, which uses function descriptors to represent pointers
to functions. Without any PIC/PIE-related options, it implies ‘-fPIE’. With
‘-fpic’ or ‘-fpie’, it assumes GOT entries and small data are within a 12-bit
range from the GOT base address; with ‘-fPIC’ or ‘-fPIE’, GOT offsets are
computed with 32 bits. With a ‘bfin-elf’ target, this option implies ‘-msim’.
-minline-plt
Enable inlining of PLT entries in function calls to functions that are not known
to bind locally. It has no effect without ‘-mfdpic’. It’s enabled by default if
optimizing for speed and compiling for shared libraries (i.e., ‘-fPIC’ or ‘-fpic’),
or when an optimization option such as ‘-O3’ or above is present in the command
line.
-mTLS
Assume a large TLS segment when generating thread-local code.
-mtls
Do not assume a large TLS segment when generating thread-local code.
-mgprel-ro
Enable the use of GPREL relocations in the FDPIC ABI for data that is known to
be in read-only sections. It’s enabled by default, except for ‘-fpic’ or ‘-fpie’:
even though it may help make the global offset table smaller, it trades 1 in-
struction for 4. With ‘-fPIC’ or ‘-fPIE’, it trades 3 instructions for 4, one of
which may be shared by multiple symbols, and it avoids the need for a GOT
entry for the referenced symbol, so it’s more likely to be a win. If it is not,
‘-mno-gprel-ro’ can be used to disable it.
-multilib-library-pic
Link with the (library, not FD) pic libraries. It’s implied by ‘-mlibrary-pic’,
as well as by ‘-fPIC’ and ‘-fpic’ without ‘-mfdpic’. You should never have to
use it explicitly.
-mlinked-fp
Follow the EABI requirement of always creating a frame pointer whenever a
stack frame is allocated. This option is enabled by default and can be disabled
with ‘-mno-linked-fp’.
Chapter 3: GCC Command Options 263
-mlong-calls
Use indirect addressing to call functions outside the current compilation unit.
This allows the functions to be placed anywhere within the 32-bit address space.
-malign-labels
Try to align labels to an 8-byte boundary by inserting NOPs into the previous
packet. This option only has an effect when VLIW packing is enabled. It
doesn’t create new packets; it merely adds NOPs to existing ones.
-mlibrary-pic
Generate position-independent EABI code.
-macc-4
Use only the first four media accumulator registers.
-macc-8
Use all eight media accumulator registers.
-mpack
Pack VLIW instructions.
-mno-pack
Do not pack VLIW instructions.
-mno-eflags
Do not mark ABI switches in e flags.
-mcond-move
Enable the use of conditional-move instructions (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mno-cond-move
Disable the use of conditional-move instructions.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mscc
Enable the use of conditional set instructions (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mno-scc
Disable the use of conditional set instructions.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mcond-exec
Enable the use of conditional execution (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
264 Using the GNU Compiler Collection (GCC)
-mno-cond-exec
Disable the use of conditional execution.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mvliw-branch
Run a pass to pack branches into VLIW instructions (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mno-vliw-branch
Do not run a pass to pack branches into VLIW instructions.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mmulti-cond-exec
Enable optimization of && and || in conditional execution (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mno-multi-cond-exec
Disable optimization of && and || in conditional execution.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mnested-cond-exec
Enable nested conditional execution optimizations (default).
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-mno-nested-cond-exec
Disable nested conditional execution optimizations.
This switch is mainly for debugging the compiler and will likely be removed in
a future version.
-moptimize-membar
This switch removes redundant membar instructions from the compiler-
generated code. It is enabled by default.
-mno-optimize-membar
This switch disables the automatic removal of redundant membar instructions
from the generated code.
-mtomcat-stats
Cause gas to print out tomcat statistics.
-mcpu=cpu
Select the processor type for which to generate code. Possible values are ‘frv’,
‘fr550’, ‘tomcat’, ‘fr500’, ‘fr450’, ‘fr405’, ‘fr400’, ‘fr300’ and ‘simple’.
Chapter 3: GCC Command Options 265
-mlong-load-store
Generate 3-instruction load and store sequences as sometimes required by the
HP-UX 10 linker. This is equivalent to the ‘+k’ option to the HP compilers.
-mportable-runtime
Use the portable calling conventions proposed by HP for ELF systems.
-mgas Enable the use of assembler directives only GAS understands.
-mschedule=cpu-type
Schedule code according to the constraints for the machine type cpu-type. The
choices for cpu-type are ‘700’ ‘7100’, ‘7100LC’, ‘7200’, ‘7300’ and ‘8000’. Refer
to ‘/usr/lib/sched.models’ on an HP-UX system to determine the proper
scheduling option for your machine. The default scheduling is ‘8000’.
-mlinker-opt
Enable the optimization pass in the HP-UX linker. Note this makes symbolic
debugging impossible. It also triggers a bug in the HP-UX 8 and HP-UX 9
linkers in which they give bogus error messages when linking some programs.
-msoft-float
Generate output containing library calls for floating point. Warning: the req-
uisite libraries are not available for all HPPA targets. Normally the facilities of
the machine’s usual C compiler are used, but this cannot be done directly in
cross-compilation. You must make your own arrangements to provide suitable
library functions for cross-compilation.
‘-msoft-float’ changes the calling convention in the output file; therefore, it
is only useful if you compile all of a program with this option. In particu-
lar, you need to compile ‘libgcc.a’, the library that comes with GCC, with
‘-msoft-float’ in order for this to work.
-msio Generate the predefine, _SIO, for server IO. The default is ‘-mwsio’. This gen-
erates the predefines, __hp9000s700, __hp9000s700__ and _WSIO, for worksta-
tion IO. These options are available under HP-UX and HI-UX.
-mgnu-ld Use options specific to GNU ld. This passes ‘-shared’ to ld when building a
shared library. It is the default when GCC is configured, explicitly or implic-
itly, with the GNU linker. This option does not affect which ld is called; it
only changes what parameters are passed to that ld. The ld that is called is
determined by the ‘--with-ld’ configure option, GCC’s program search path,
and finally by the user’s PATH. The linker used by GCC can be printed us-
ing ‘which ‘gcc -print-prog-name=ld‘’. This option is only available on the
64-bit HP-UX GCC, i.e. configured with ‘hppa*64*-*-hpux*’.
-mhp-ld Use options specific to HP ld. This passes ‘-b’ to ld when building a shared
library and passes ‘+Accept TypeMismatch’ to ld on all links. It is the default
when GCC is configured, explicitly or implicitly, with the HP linker. This op-
tion does not affect which ld is called; it only changes what parameters are
passed to that ld. The ld that is called is determined by the ‘--with-ld’ con-
figure option, GCC’s program search path, and finally by the user’s PATH. The
linker used by GCC can be printed using ‘which ‘gcc -print-prog-name=ld‘’.
268 Using the GNU Compiler Collection (GCC)
This option is only available on the 64-bit HP-UX GCC, i.e. configured with
‘hppa*64*-*-hpux*’.
-mlong-calls
Generate code that uses long call sequences. This ensures that a call is always
able to reach linker generated stubs. The default is to generate long calls
only when the distance from the call site to the beginning of the function or
translation unit, as the case may be, exceeds a predefined limit set by the
branch type being used. The limits for normal calls are 7,600,000 and 240,000
bytes, respectively for the PA 2.0 and PA 1.X architectures. Sibcalls are always
limited at 240,000 bytes.
Distances are measured from the beginning of functions when using
the ‘-ffunction-sections’ option, or when using the ‘-mgas’ and
‘-mno-portable-runtime’ options together under HP-UX with the SOM
linker.
It is normally not desirable to use this option as it degrades performance. How-
ever, it may be useful in large applications, particularly when partial linking is
used to build the application.
The types of long calls used depends on the capabilities of the assembler and
linker, and the type of code being generated. The impact on systems that
support long absolute calls, and long pic symbol-difference or pc-relative calls
should be relatively small. However, an indirect call is used on 32-bit ELF
systems in pic code and it is quite long.
-munix=unix-std
Generate compiler predefines and select a startfile for the specified UNIX stan-
dard. The choices for unix-std are ‘93’, ‘95’ and ‘98’. ‘93’ is supported on all
HP-UX versions. ‘95’ is available on HP-UX 10.10 and later. ‘98’ is available
on HP-UX 11.11 and later. The default values are ‘93’ for HP-UX 10.00, ‘95’
for HP-UX 10.10 though to 11.00, and ‘98’ for HP-UX 11.11 and later.
‘-munix=93’ provides the same predefines as GCC 3.3 and 3.4. ‘-munix=95’
provides additional predefines for XOPEN_UNIX and _XOPEN_SOURCE_EXTENDED,
and the startfile ‘unix95.o’. ‘-munix=98’ provides additional predefines for
_XOPEN_UNIX, _XOPEN_SOURCE_EXTENDED, _INCLUDE__STDC_A1_SOURCE and _
INCLUDE_XOPEN_SOURCE_500, and the startfile ‘unix98.o’.
It is important to note that this option changes the interfaces for various library
routines. It also affects the operational behavior of the C library. Thus, extreme
care is needed in using this option.
Library code that is intended to operate with more than one UNIX standard
must test, set and restore the variable __xpg4_extended_mask as appropriate.
Most GNU software doesn’t provide this capability.
-nolibdld
Suppress the generation of link options to search libdld.sl when the ‘-static’
option is specified on HP-UX 10 and later.
Chapter 3: GCC Command Options 269
-minline-float-divide-min-latency
Generate code for inline divides of floating-point values using the minimum
latency algorithm.
-minline-float-divide-max-throughput
Generate code for inline divides of floating-point values using the maximum
throughput algorithm.
-mno-inline-float-divide
Do not generate inline code for divides of floating-point values.
-minline-int-divide-min-latency
Generate code for inline divides of integer values using the minimum latency
algorithm.
-minline-int-divide-max-throughput
Generate code for inline divides of integer values using the maximum through-
put algorithm.
-mno-inline-int-divide
Do not generate inline code for divides of integer values.
-minline-sqrt-min-latency
Generate code for inline square roots using the minimum latency algorithm.
-minline-sqrt-max-throughput
Generate code for inline square roots using the maximum throughput algorithm.
-mno-inline-sqrt
Do not generate inline code for sqrt.
-mfused-madd
-mno-fused-madd
Do (don’t) generate code that uses the fused multiply/add or multiply/subtract
instructions. The default is to use these instructions.
-mno-dwarf2-asm
-mdwarf2-asm
Don’t (or do) generate assembler code for the DWARF line number debugging
info. This may be useful when not using the GNU assembler.
-mearly-stop-bits
-mno-early-stop-bits
Allow stop bits to be placed earlier than immediately preceding the instruction
that triggered the stop bit. This can improve instruction scheduling, but does
not always do so.
-mfixed-range=register-range
Generate code treating the given register range as fixed registers. A fixed regis-
ter is one that the register allocator cannot use. This is useful when compiling
kernel code. A register range is specified as two registers separated by a dash.
Multiple register ranges can be specified separated by a comma.
-mtls-size=tls-size
Specify bit size of immediate TLS offsets. Valid values are 14, 22, and 64.
Chapter 3: GCC Command Options 271
-mtune=cpu-type
Tune the instruction scheduling for a particular CPU, Valid values are
‘itanium’, ‘itanium1’, ‘merced’, ‘itanium2’, and ‘mckinley’.
-milp32
-mlp64 Generate code for a 32-bit or 64-bit environment. The 32-bit environment sets
int, long and pointer to 32 bits. The 64-bit environment sets int to 32 bits and
long and pointer to 64 bits. These are HP-UX specific flags.
-mno-sched-br-data-spec
-msched-br-data-spec
(Dis/En)able data speculative scheduling before reload. This results in gen-
eration of ld.a instructions and the corresponding check instructions (ld.c /
chk.a). The default setting is disabled.
-msched-ar-data-spec
-mno-sched-ar-data-spec
(En/Dis)able data speculative scheduling after reload. This results in gener-
ation of ld.a instructions and the corresponding check instructions (ld.c /
chk.a). The default setting is enabled.
-mno-sched-control-spec
-msched-control-spec
(Dis/En)able control speculative scheduling. This feature is available only dur-
ing region scheduling (i.e. before reload). This results in generation of the
ld.s instructions and the corresponding check instructions chk.s. The default
setting is disabled.
-msched-br-in-data-spec
-mno-sched-br-in-data-spec
(En/Dis)able speculative scheduling of the instructions that are dependent
on the data speculative loads before reload. This is effective only with
‘-msched-br-data-spec’ enabled. The default setting is enabled.
-msched-ar-in-data-spec
-mno-sched-ar-in-data-spec
(En/Dis)able speculative scheduling of the instructions that are dependent
on the data speculative loads after reload. This is effective only with
‘-msched-ar-data-spec’ enabled. The default setting is enabled.
-msched-in-control-spec
-mno-sched-in-control-spec
(En/Dis)able speculative scheduling of the instructions that are de-
pendent on the control speculative loads. This is effective only with
‘-msched-control-spec’ enabled. The default setting is enabled.
-mno-sched-prefer-non-data-spec-insns
-msched-prefer-non-data-spec-insns
If enabled, data-speculative instructions are chosen for schedule only if there
are no other choices at the moment. This makes the use of the data speculation
much more conservative. The default setting is disabled.
272 Using the GNU Compiler Collection (GCC)
-mno-sched-prefer-non-control-spec-insns
-msched-prefer-non-control-spec-insns
If enabled, control-speculative instructions are chosen for schedule only if there
are no other choices at the moment. This makes the use of the control specu-
lation much more conservative. The default setting is disabled.
-mno-sched-count-spec-in-critical-path
-msched-count-spec-in-critical-path
If enabled, speculative dependencies are considered during computation of the
instructions priorities. This makes the use of the speculation a bit more con-
servative. The default setting is disabled.
-msched-spec-ldc
Use a simple data speculation check. This option is on by default.
-msched-control-spec-ldc
Use a simple check for control speculation. This option is on by default.
-msched-stop-bits-after-every-cycle
Place a stop bit after every cycle when scheduling. This option is on by default.
-msched-fp-mem-deps-zero-cost
Assume that floating-point stores and loads are not likely to cause a conflict
when placed into the same instruction group. This option is disabled by default.
-msel-sched-dont-check-control-spec
Generate checks for control speculation in selective scheduling. This flag is
disabled by default.
-msched-max-memory-insns=max-insns
Limit on the number of memory insns per instruction group, giving lower prior-
ity to subsequent memory insns attempting to schedule in the same instruction
group. Frequently useful to prevent cache bank conflicts. The default value is
1.
-msched-max-memory-insns-hard-limit
Makes the limit specified by ‘msched-max-memory-insns’ a hard limit, disal-
lowing more than that number in an instruction group. Otherwise, the limit
is “soft”, meaning that non-memory operations are preferred when the limit is
reached, but memory operations may still be scheduled.
-msign-extend-enabled
Enable sign extend instructions.
-muser-enabled
Enable user-defined instructions.
-msdata=none
Disable use of the small data area. Variables are put into one of .data, .bss, or
.rodata (unless the section attribute has been specified). This is the default.
The small data area consists of sections .sdata and .sbss. Objects may be
explicitly put in the small data area with the section attribute using one of
these sections.
-msdata=sdata
Put small global and static data in the small data area, but do not generate
special code to reference them.
-msdata=use
Put small global and static data in the small data area, and generate special
instructions to reference them.
-G num Put global and static objects less than or equal to num bytes into the small
data or BSS sections instead of the normal data or BSS sections. The default
value of num is 8. The ‘-msdata’ option must be set to one of ‘sdata’ or ‘use’
for this option to have any effect.
All modules should be compiled with the same ‘-G num’ value. Compiling with
different values of num may or may not work; if it doesn’t the linker gives an
error message—incorrect code is not generated.
-mdebug Makes the M32R-specific code in the compiler display some statistics that might
help in debugging programs.
-malign-loops
Align all loops to a 32-byte boundary.
-mno-align-loops
Do not enforce a 32-byte alignment for loops. This is the default.
-missue-rate=number
Issue number instructions per cycle. number can only be 1 or 2.
-mbranch-cost=number
number can only be 1 or 2. If it is 1 then branches are preferred over conditional
code, if it is 2, then the opposite applies.
-mflush-trap=number
Specifies the trap number to use to flush the cache. The default is 12. Valid
numbers are between 0 and 15 inclusive.
-mno-flush-trap
Specifies that the cache cannot be flushed by using a trap.
-mflush-func=name
Specifies the name of the operating system function to call to flush the cache.
The default is ‘_flush_cache’, but a function call is only used if a trap is not
available.
-mno-flush-func
Indicates that there is no OS function for flushing the cache.
Chapter 3: GCC Command Options 275
-mcpu32 Generate output for a CPU32. This is the default when the compiler is config-
ured for CPU32-based systems. It is equivalent to ‘-march=cpu32’.
Use this option for microcontrollers with a CPU32 or CPU32+ core, including
the 68330, 68331, 68332, 68333, 68334, 68336, 68340, 68341, 68349 and 68360.
-m5200 Generate output for a 520X ColdFire CPU. This is the default when the com-
piler is configured for 520X-based systems. It is equivalent to ‘-mcpu=5206’,
and is now deprecated in favor of that option.
Use this option for microcontroller with a 5200 core, including the MCF5202,
MCF5203, MCF5204 and MCF5206.
-m5206e Generate output for a 5206e ColdFire CPU. The option is now deprecated in
favor of the equivalent ‘-mcpu=5206e’.
-m528x Generate output for a member of the ColdFire 528X family. The option is now
deprecated in favor of the equivalent ‘-mcpu=528x’.
-m5307 Generate output for a ColdFire 5307 CPU. The option is now deprecated in
favor of the equivalent ‘-mcpu=5307’.
-m5407 Generate output for a ColdFire 5407 CPU. The option is now deprecated in
favor of the equivalent ‘-mcpu=5407’.
-mcfv4e Generate output for a ColdFire V4e family CPU (e.g. 547x/548x). This in-
cludes use of hardware floating-point instructions. The option is equivalent to
‘-mcpu=547x’, and is now deprecated in favor of that option.
-m68020-40
Generate output for a 68040, without using any of the new instructions. This
results in code that can run relatively efficiently on either a 68020/68881 or a
68030 or a 68040. The generated code does use the 68881 instructions that are
emulated on the 68040.
The option is equivalent to ‘-march=68020’ ‘-mtune=68020-40’.
-m68020-60
Generate output for a 68060, without using any of the new instructions. This
results in code that can run relatively efficiently on either a 68020/68881 or a
68030 or a 68040. The generated code does use the 68881 instructions that are
emulated on the 68060.
The option is equivalent to ‘-march=68020’ ‘-mtune=68020-60’.
-mhard-float
-m68881 Generate floating-point instructions. This is the default for 68020 and above,
and for ColdFire devices that have an FPU. It defines the macro __HAVE_
68881__ on M680x0 targets and __mcffpu__ on ColdFire targets.
-msoft-float
Do not generate floating-point instructions; use library calls instead. This is the
default for 68000, 68010, and 68832 targets. It is also the default for ColdFire
devices that have no FPU.
278 Using the GNU Compiler Collection (GCC)
-mdiv
-mno-div Generate (do not generate) ColdFire hardware divide and remainder instruc-
tions. If ‘-march’ is used without ‘-mcpu’, the default is “on” for ColdFire ar-
chitectures and “off” for M680x0 architectures. Otherwise, the default is taken
from the target CPU (either the default CPU, or the one specified by ‘-mcpu’).
For example, the default is “off” for ‘-mcpu=5206’ and “on” for ‘-mcpu=5206e’.
GCC defines the macro __mcfhwdiv__ when this option is enabled.
-mshort Consider type int to be 16 bits wide, like short int. Additionally, parameters
passed on the stack are also aligned to a 16-bit boundary even on targets whose
API mandates promotion to 32-bit.
-mno-short
Do not consider type int to be 16 bits wide. This is the default.
-mnobitfield
-mno-bitfield
Do not use the bit-field instructions. The ‘-m68000’, ‘-mcpu32’ and ‘-m5200’
options imply ‘-mnobitfield’.
-mbitfield
Do use the bit-field instructions. The ‘-m68020’ option implies ‘-mbitfield’.
This is the default if you use a configuration designed for a 68020.
-mrtd Use a different function-calling convention, in which functions that take a fixed
number of arguments return with the rtd instruction, which pops their argu-
ments while returning. This saves one instruction in the caller since there is no
need to pop the arguments there.
This calling convention is incompatible with the one normally used on Unix, so
you cannot use it if you need to call libraries compiled with the Unix compiler.
Also, you must provide function prototypes for all functions that take variable
numbers of arguments (including printf); otherwise incorrect code is generated
for calls to those functions.
In addition, seriously incorrect code results if you call a function with too many
arguments. (Normally, extra arguments are harmlessly ignored.)
The rtd instruction is supported by the 68010, 68020, 68030, 68040, 68060 and
CPU32 processors, but not by the 68000 or 5200.
-mno-rtd Do not use the calling conventions selected by ‘-mrtd’. This is the default.
-malign-int
-mno-align-int
Control whether GCC aligns int, long, long long, float, double, and long
double variables on a 32-bit boundary (‘-malign-int’) or a 16-bit boundary
(‘-mno-align-int’). Aligning variables on 32-bit boundaries produces code
that runs somewhat faster on processors with 32-bit busses at the expense of
more memory.
Warning: if you use the ‘-malign-int’ switch, GCC aligns structures contain-
ing the above types differently than most published application binary interface
specifications for the m68k.
Chapter 3: GCC Command Options 279
-mpcrel Use the pc-relative addressing mode of the 68000 directly, instead of using a
global offset table. At present, this option implies ‘-fpic’, allowing at most a
16-bit offset for pc-relative addressing. ‘-fPIC’ is not presently supported with
‘-mpcrel’, though this could be supported for 68020 and higher processors.
-mno-strict-align
-mstrict-align
Do not (do) assume that unaligned memory references are handled by the sys-
tem.
-msep-data
Generate code that allows the data segment to be located in a different area of
memory from the text segment. This allows for execute-in-place in an environ-
ment without virtual memory management. This option implies ‘-fPIC’.
-mno-sep-data
Generate code that assumes that the data segment follows the text segment.
This is the default.
-mid-shared-library
Generate code that supports shared libraries via the library ID method. This
allows for execute-in-place and shared libraries in an environment without vir-
tual memory management. This option implies ‘-fPIC’.
-mno-id-shared-library
Generate code that doesn’t assume ID-based shared libraries are being used.
This is the default.
-mshared-library-id=n
Specifies the identification number of the ID-based shared library being com-
piled. Specifying a value of 0 generates more compact code; specifying other
values forces the allocation of that number to the current library, but is no more
space- or time-efficient than omitting this option.
-mxgot
-mno-xgot
When generating position-independent code for ColdFire, generate code that
works if the GOT has more than 8192 entries. This code is larger and slower
than code generated without this option. On M680x0 processors, this option is
not needed; ‘-fPIC’ suffices.
GCC normally uses a single instruction to load values from the GOT. While
this is relatively efficient, it only works if the GOT is smaller than about 64k.
Anything larger causes the linker to report an error such as:
relocation truncated to fit: R_68K_GOT16O foobar
If this happens, you should recompile your code with ‘-mxgot’. It should then
work with very large GOTs. However, code generated with ‘-mxgot’ is less
efficient, since it takes 4 instructions to fetch the value of a global symbol.
Note that some linkers, including newer versions of the GNU linker, can create
multiple GOTs and sort GOT entries. If you have such a linker, you should
only need to use ‘-mxgot’ when compiling a single object file that accesses more
than 8192 GOT entries. Very few do.
280 Using the GNU Compiler Collection (GCC)
-mxl-soft-div
Use software emulation for divides (default).
-mxl-barrel-shift
Use the hardware barrel shifter.
-mxl-pattern-compare
Use pattern compare instructions.
-msmall-divides
Use table lookup optimization for small signed integer divisions.
-mxl-stack-check
This option is deprecated. Use ‘-fstack-check’ instead.
-mxl-gp-opt
Use GP-relative .sdata/.sbss sections.
-mxl-multiply-high
Use multiply high instructions for high part of 32x32 multiply.
-mxl-float-convert
Use hardware floating-point conversion instructions.
-mxl-float-sqrt
Use hardware floating-point square root instruction.
-mbig-endian
Generate code for a big-endian target.
-mlittle-endian
Generate code for a little-endian target.
-mxl-reorder
Use reorder instructions (swap and byte reversed load/store).
-mxl-mode-app-model
Select application model app-model. Valid models are
‘executable’
normal executable (default), uses startup code ‘crt0.o’.
‘xmdstub’ for use with Xilinx Microprocessor Debugger (XMD) based soft-
ware intrusive debug agent called xmdstub. This uses startup file
‘crt1.o’ and sets the start address of the program to 0x800.
‘bootstrap’
for applications that are loaded using a bootloader. This model uses
startup file ‘crt2.o’ which does not contain a processor reset vector
handler. This is suitable for transferring control on a processor reset
to the bootloader rather than the application.
‘novectors’
for applications that do not require any of the MicroBlaze vectors.
This option may be useful for applications running within a moni-
toring application. This model uses ‘crt3.o’ as a startup file.
284 Using the GNU Compiler Collection (GCC)
-mtune=arch
Optimize for arch. Among other things, this option controls the way instruc-
tions are scheduled, and the perceived cost of arithmetic operations. The list
of arch values is the same as for ‘-march’.
When this option is not used, GCC optimizes for the processor specified by
‘-march’. By using ‘-march’ and ‘-mtune’ together, it is possible to generate
code that runs on a family of processors, but optimize the code for one particular
member of that family.
‘-mtune’ defines the macros _MIPS_TUNE and _MIPS_TUNE_foo, which work in
the same way as the ‘-march’ ones described above.
-mips1 Equivalent to ‘-march=mips1’.
-mips2 Equivalent to ‘-march=mips2’.
-mips3 Equivalent to ‘-march=mips3’.
-mips4 Equivalent to ‘-march=mips4’.
-mips32 Equivalent to ‘-march=mips32’.
-mips32r3
Equivalent to ‘-march=mips32r3’.
-mips32r5
Equivalent to ‘-march=mips32r5’.
-mips32r6
Equivalent to ‘-march=mips32r6’.
-mips64 Equivalent to ‘-march=mips64’.
-mips64r2
Equivalent to ‘-march=mips64r2’.
-mips64r3
Equivalent to ‘-march=mips64r3’.
-mips64r5
Equivalent to ‘-march=mips64r5’.
-mips64r6
Equivalent to ‘-march=mips64r6’.
-mips16
-mno-mips16
Generate (do not generate) MIPS16 code. If GCC is targeting a MIPS32 or
MIPS64 architecture, it makes use of the MIPS16e ASE.
MIPS16 code generation can also be controlled on a per-function basis by means
of mips16 and nomips16 attributes. See Section 6.31 [Function Attributes],
page 429, for more information.
-mflip-mips16
Generate MIPS16 code on alternating functions. This option is provided for
regression testing of mixed MIPS16/non-MIPS16 code generation, and is not
intended for ordinary use in compiling user code.
286 Using the GNU Compiler Collection (GCC)
-minterlink-compressed
-mno-interlink-compressed
Require (do not require) that code using the standard (uncompressed) MIPS
ISA be link-compatible with MIPS16 and microMIPS code, and vice versa.
For example, code using the standard ISA encoding cannot jump directly to
MIPS16 or microMIPS code; it must either use a call or an indirect jump.
‘-minterlink-compressed’ therefore disables direct jumps unless GCC knows
that the target of the jump is not compressed.
-minterlink-mips16
-mno-interlink-mips16
Aliases of ‘-minterlink-compressed’ and ‘-mno-interlink-compressed’.
These options predate the microMIPS ASE and are retained for backwards
compatibility.
-mabi=32
-mabi=o64
-mabi=n32
-mabi=64
-mabi=eabi
Generate code for the given ABI.
Note that the EABI has a 32-bit and a 64-bit variant. GCC normally generates
64-bit code when you select a 64-bit architecture, but you can use ‘-mgp32’ to
get 32-bit code instead.
For information about the O64 ABI, see http://gcc.gnu.org/projects/
mipso64-abi.html.
GCC supports a variant of the o32 ABI in which floating-point registers are
64 rather than 32 bits wide. You can select this combination with ‘-mabi=32’
‘-mfp64’. This ABI relies on the mthc1 and mfhc1 instructions and is therefore
only supported for MIPS32R2, MIPS32R3 and MIPS32R5 processors.
The register assignments for arguments and return values remain the same, but
each scalar value is passed in a single 64-bit register rather than a pair of 32-bit
registers. For example, scalar floating-point values are returned in ‘$f0’ only,
not a ‘$f0’/‘$f1’ pair. The set of call-saved registers also remains the same in
that the even-numbered double-precision registers are saved.
Two additional variants of the o32 ABI are supported to enable a transition from
32-bit to 64-bit registers. These are FPXX (‘-mfpxx’) and FP64A (‘-mfp64’
‘-mno-odd-spreg’). The FPXX extension mandates that all code must execute
correctly when run using 32-bit or 64-bit registers. The code can be interlinked
with either FP32 or FP64, but not both. The FP64A extension is similar to the
FP64 extension but forbids the use of odd-numbered single-precision registers.
This can be used in conjunction with the FRE mode of FPUs in MIPS32R5
processors and allows both FP32 and FP64A code to interlink and run in the
same process without changing FPU modes.
Chapter 3: GCC Command Options 287
-mabicalls
-mno-abicalls
Generate (do not generate) code that is suitable for SVR4-style dynamic ob-
jects. ‘-mabicalls’ is the default for SVR4-based systems.
-mshared
-mno-shared
Generate (do not generate) code that is fully position-independent, and that can
therefore be linked into shared libraries. This option only affects ‘-mabicalls’.
All ‘-mabicalls’ code has traditionally been position-independent, regardless of
options like ‘-fPIC’ and ‘-fpic’. However, as an extension, the GNU toolchain
allows executables to use absolute accesses for locally-binding symbols. It can
also use shorter GP initialization sequences and generate direct calls to locally-
defined functions. This mode is selected by ‘-mno-shared’.
‘-mno-shared’ depends on binutils 2.16 or higher and generates objects that
can only be linked by the GNU linker. However, the option does not affect the
ABI of the final executable; it only affects the ABI of relocatable objects. Using
‘-mno-shared’ generally makes executables both smaller and quicker.
‘-mshared’ is the default.
-mplt
-mno-plt Assume (do not assume) that the static and dynamic linkers support PLTs and
copy relocations. This option only affects ‘-mno-shared -mabicalls’. For the
n64 ABI, this option has no effect without ‘-msym32’.
You can make ‘-mplt’ the default by configuring GCC with ‘--with-mips-plt’.
The default is ‘-mno-plt’ otherwise.
-mxgot
-mno-xgot
Lift (do not lift) the usual restrictions on the size of the global offset table.
GCC normally uses a single instruction to load values from the GOT. While
this is relatively efficient, it only works if the GOT is smaller than about 64k.
Anything larger causes the linker to report an error such as:
relocation truncated to fit: R_MIPS_GOT16 foobar
If this happens, you should recompile your code with ‘-mxgot’. This works with
very large GOTs, although the code is also less efficient, since it takes three
instructions to fetch the value of a global symbol.
Note that some linkers can create multiple GOTs. If you have such a linker,
you should only need to use ‘-mxgot’ when a single object file accesses more
than 64k’s worth of GOT entries. Very few do.
These options have no effect unless GCC is generating position independent
code.
-mgp32 Assume that general-purpose registers are 32 bits wide.
-mgp64 Assume that general-purpose registers are 64 bits wide.
-mfp32 Assume that floating-point registers are 32 bits wide.
288 Using the GNU Compiler Collection (GCC)
The ‘-mnan=legacy’ option selects the legacy encoding. In this case quiet NaNs
(qNaNs) are denoted by the first bit of their trailing significand field being 0,
whereas signaling NaNs (sNaNs) are denoted by the first bit of their trailing
significand field being 1.
The ‘-mnan=2008’ option selects the IEEE 754-2008 encoding. In this case
qNaNs are denoted by the first bit of their trailing significand field being 1,
whereas sNaNs are denoted by the first bit of their trailing significand field
being 0.
The default is ‘-mnan=legacy’ unless GCC has been configured with
‘--with-nan=2008’.
-mllsc
-mno-llsc
Use (do not use) ‘ll’, ‘sc’, and ‘sync’ instructions to implement atomic memory
built-in functions. When neither option is specified, GCC uses the instructions
if the target architecture supports them.
‘-mllsc’ is useful if the runtime environment can emulate the instructions and
‘-mno-llsc’ can be useful when compiling for nonstandard ISAs. You can
make either option the default by configuring GCC with ‘--with-llsc’ and
‘--without-llsc’ respectively. ‘--with-llsc’ is the default for some configu-
rations; see the installation documentation for details.
-mdsp
-mno-dsp Use (do not use) revision 1 of the MIPS DSP ASE. See Section 6.60.13 [MIPS
DSP Built-in Functions], page 601. This option defines the preprocessor macro
__mips_dsp. It also defines __mips_dsp_rev to 1.
-mdspr2
-mno-dspr2
Use (do not use) revision 2 of the MIPS DSP ASE. See Section 6.60.13 [MIPS
DSP Built-in Functions], page 601. This option defines the preprocessor macros
__mips_dsp and __mips_dspr2. It also defines __mips_dsp_rev to 2.
-msmartmips
-mno-smartmips
Use (do not use) the MIPS SmartMIPS ASE.
-mpaired-single
-mno-paired-single
Use (do not use) paired-single floating-point instructions. See Section 6.60.14
[MIPS Paired-Single Support], page 606. This option requires hardware
floating-point support to be enabled.
-mdmx
-mno-mdmx
Use (do not use) MIPS Digital Media Extension instructions. This option can
only be used when generating 64-bit code and requires hardware floating-point
support to be enabled.
290 Using the GNU Compiler Collection (GCC)
-mips3d
-mno-mips3d
Use (do not use) the MIPS-3D ASE. See Section 6.60.15.3 [MIPS-3D Built-in
Functions], page 610. The option ‘-mips3d’ implies ‘-mpaired-single’.
-mmicromips
-mno-micromips
Generate (do not generate) microMIPS code.
MicroMIPS code generation can also be controlled on a per-function basis by
means of micromips and nomicromips attributes. See Section 6.31 [Function
Attributes], page 429, for more information.
-mmt
-mno-mt Use (do not use) MT Multithreading instructions.
-mmcu
-mno-mcu Use (do not use) the MIPS MCU ASE instructions.
-meva
-mno-eva Use (do not use) the MIPS Enhanced Virtual Addressing instructions.
-mvirt
-mno-virt
Use (do not use) the MIPS Virtualization (VZ) instructions.
-mxpa
-mno-xpa Use (do not use) the MIPS eXtended Physical Address (XPA) instructions.
-mlong64 Force long types to be 64 bits wide. See ‘-mlong32’ for an explanation of the
default and the way that the pointer size is determined.
-mlong32 Force long, int, and pointer types to be 32 bits wide.
The default size of ints, longs and pointers depends on the ABI. All the
supported ABIs use 32-bit ints. The n64 ABI uses 64-bit longs, as does the
64-bit EABI; the others use 32-bit longs. Pointers are the same size as longs,
or the same size as integer registers, whichever is smaller.
-msym32
-mno-sym32
Assume (do not assume) that all symbols have 32-bit values, regardless of
the selected ABI. This option is useful in combination with ‘-mabi=64’ and
‘-mno-abicalls’ because it allows GCC to generate shorter and faster refer-
ences to symbolic addresses.
-G num Put definitions of externally-visible data in a small data section if that data is
no bigger than num bytes. GCC can then generate more efficient accesses to
the data; see ‘-mgpopt’ for details.
The default ‘-G’ option depends on the configuration.
-mlocal-sdata
-mno-local-sdata
Extend (do not extend) the ‘-G’ behavior to local data too, such as to static
variables in C. ‘-mlocal-sdata’ is the default for all configurations.
Chapter 3: GCC Command Options 291
If the linker complains that an application is using too much small data,
you might want to try rebuilding the less performance-critical parts with
‘-mno-local-sdata’. You might also want to build large libraries with
‘-mno-local-sdata’, so that the libraries leave more room for the main
program.
-mextern-sdata
-mno-extern-sdata
Assume (do not assume) that externally-defined data is in a small data section
if the size of that data is within the ‘-G’ limit. ‘-mextern-sdata’ is the default
for all configurations.
If you compile a module Mod with ‘-mextern-sdata’ ‘-G num’ ‘-mgpopt’, and
Mod references a variable Var that is no bigger than num bytes, you must make
sure that Var is placed in a small data section. If Var is defined by another
module, you must either compile that module with a high-enough ‘-G’ setting
or attach a section attribute to Var’s definition. If Var is common, you must
link the application with a high-enough ‘-G’ setting.
The easiest way of satisfying these restrictions is to compile and link every
module with the same ‘-G’ option. However, you may wish to build a library
that supports several different small data limits. You can do this by compil-
ing the library with the highest supported ‘-G’ setting and additionally us-
ing ‘-mno-extern-sdata’ to stop the library from making assumptions about
externally-defined data.
-mgpopt
-mno-gpopt
Use (do not use) GP-relative accesses for symbols that are known to be in a
small data section; see ‘-G’, ‘-mlocal-sdata’ and ‘-mextern-sdata’. ‘-mgpopt’
is the default for all configurations.
‘-mno-gpopt’ is useful for cases where the $gp register might not hold the value
of _gp. For example, if the code is part of a library that might be used in a
boot monitor, programs that call boot monitor routines pass an unknown value
in $gp. (In such situations, the boot monitor itself is usually compiled with
‘-G0’.)
‘-mno-gpopt’ implies ‘-mno-local-sdata’ and ‘-mno-extern-sdata’.
-membedded-data
-mno-embedded-data
Allocate variables to the read-only data section first if possible, then next in the
small data section if possible, otherwise in data. This gives slightly slower code
than the default, but reduces the amount of RAM required when executing,
and thus may be preferred for some embedded systems.
-muninit-const-in-rodata
-mno-uninit-const-in-rodata
Put uninitialized const variables in the read-only data section. This option is
only meaningful in conjunction with ‘-membedded-data’.
292 Using the GNU Compiler Collection (GCC)
-mcode-readable=setting
Specify whether GCC may generate code that reads from executable sections.
There are three possible settings:
-mcode-readable=yes
Instructions may freely access executable sections. This is the de-
fault setting.
-mcode-readable=pcrel
MIPS16 PC-relative load instructions can access executable sec-
tions, but other instructions must not do so. This option is useful
on 4KSc and 4KSd processors when the code TLBs have the Read
Inhibit bit set. It is also useful on processors that can be configured
to have a dual instruction/data SRAM interface and that, like the
M4K, automatically redirect PC-relative loads to the instruction
RAM.
-mcode-readable=no
Instructions must not access executable sections. This option can
be useful on targets that are configured to have a dual instruc-
tion/data SRAM interface but that (unlike the M4K) do not auto-
matically redirect PC-relative loads to the instruction RAM.
-msplit-addresses
-mno-split-addresses
Enable (disable) use of the %hi() and %lo() assembler relocation operators.
This option has been superseded by ‘-mexplicit-relocs’ but is retained for
backwards compatibility.
-mexplicit-relocs
-mno-explicit-relocs
Use (do not use) assembler relocation operators when dealing with symbolic
addresses. The alternative, selected by ‘-mno-explicit-relocs’, is to use as-
sembler macros instead.
‘-mexplicit-relocs’ is the default if GCC was configured to use an assembler
that supports relocation operators.
-mcheck-zero-division
-mno-check-zero-division
Trap (do not trap) on integer division by zero.
The default is ‘-mcheck-zero-division’.
-mdivide-traps
-mdivide-breaks
MIPS systems check for division by zero by generating either a conditional
trap or a break instruction. Using traps results in smaller code, but is only
supported on MIPS II and later. Also, some versions of the Linux kernel have
a bug that prevents trap from generating the proper signal (SIGFPE). Use
‘-mdivide-traps’ to allow conditional traps on architectures that support them
and ‘-mdivide-breaks’ to force the use of breaks.
Chapter 3: GCC Command Options 293
-mload-store-pairs
-mno-load-store-pairs
Enable (disable) an optimization that pairs consecutive load or store instruc-
tions to enable load/store bonding. This option is enabled by default but only
takes effect when the selected architecture is known to support bonding.
-mmemcpy
-mno-memcpy
Force (do not force) the use of memcpy for non-trivial block moves. The default
is ‘-mno-memcpy’, which allows GCC to inline most constant-sized copies.
-mlong-calls
-mno-long-calls
Disable (do not disable) use of the jal instruction. Calling functions using
jal is more efficient but requires the caller and callee to be in the same 256
megabyte segment.
This option has no effect on abicalls code. The default is ‘-mno-long-calls’.
-mmad
-mno-mad Enable (disable) use of the mad, madu and mul instructions, as provided by the
R4650 ISA.
-mimadd
-mno-imadd
Enable (disable) use of the madd and msub integer instructions. The default
is ‘-mimadd’ on architectures that support madd and msub except for the 74k
architecture where it was found to generate slower code.
-mfused-madd
-mno-fused-madd
Enable (disable) use of the floating-point multiply-accumulate instructions,
when they are available. The default is ‘-mfused-madd’.
On the R8000 CPU when multiply-accumulate instructions are used, the in-
termediate product is calculated to infinite precision and is not subject to the
FCSR Flush to Zero bit. This may be undesirable in some circumstances. On
other processors the result is numerically identical to the equivalent computa-
tion using separate multiply, add, subtract and negate instructions.
-nocpp Tell the MIPS assembler to not run its preprocessor over user assembler files
(with a ‘.s’ suffix) when assembling them.
-mfix-24k
-mno-fix-24k
Work around the 24K E48 (lost data on stores during refill) errata. The
workarounds are implemented by the assembler rather than by GCC.
294 Using the GNU Compiler Collection (GCC)
-mfix-r4000
-mno-fix-r4000
Work around certain R4000 CPU errata:
− A double-word or a variable shift may give an incorrect result if executed
immediately after starting an integer division.
− A double-word or a variable shift may give an incorrect result if executed
while an integer multiplication is in progress.
− An integer division may give an incorrect result if started in a delay slot of
a taken branch or a jump.
-mfix-r4400
-mno-fix-r4400
Work around certain R4400 CPU errata:
− A double-word or a variable shift may give an incorrect result if executed
immediately after starting an integer division.
-mfix-r10000
-mno-fix-r10000
Work around certain R10000 errata:
− ll/sc sequences may not behave atomically on revisions prior to 3.0. They
may deadlock on revisions 2.6 and earlier.
This option can only be used if the target architecture supports branch-likely
instructions. ‘-mfix-r10000’ is the default when ‘-march=r10000’ is used;
‘-mno-fix-r10000’ is the default otherwise.
-mfix-rm7000
-mno-fix-rm7000
Work around the RM7000 dmult/dmultu errata. The workarounds are imple-
mented by the assembler rather than by GCC.
-mfix-vr4120
-mno-fix-vr4120
Work around certain VR4120 errata:
− dmultu does not always produce the correct result.
− div and ddiv do not always produce the correct result if one of the operands
is negative.
The workarounds for the division errata rely on special functions in ‘libgcc.a’.
At present, these functions are only provided by the mips64vr*-elf configura-
tions.
Other VR4120 errata require a NOP to be inserted between certain pairs of
instructions. These errata are handled by the assembler, not by GCC itself.
-mfix-vr4130
Work around the VR4130 mflo/mfhi errata. The workarounds are implemented
by the assembler rather than by GCC, although GCC avoids using mflo and
mfhi if the VR4130 macc, macchi, dmacc and dmacchi instructions are available
instead.
Chapter 3: GCC Command Options 295
-mfix-sb1
-mno-fix-sb1
Work around certain SB-1 CPU core errata. (This flag currently works around
the SB-1 revision 2 “F1” and “F2” floating-point errata.)
-mr10k-cache-barrier=setting
Specify whether GCC should insert cache barriers to avoid the side-effects of
speculation on R10K processors.
In common with many processors, the R10K tries to predict the outcome of
a conditional branch and speculatively executes instructions from the “taken”
branch. It later aborts these instructions if the predicted outcome is wrong.
However, on the R10K, even aborted instructions can have side effects.
This problem only affects kernel stores and, depending on the system, kernel
loads. As an example, a speculatively-executed store may load the target mem-
ory into cache and mark the cache line as dirty, even if the store itself is later
aborted. If a DMA operation writes to the same area of memory before the
“dirty” line is flushed, the cached data overwrites the DMA-ed data. See the
R10K processor manual for a full description, including other potential prob-
lems.
One workaround is to insert cache barrier instructions before every memory
access that might be speculatively executed and that might have side effects
even if aborted. ‘-mr10k-cache-barrier=setting’ controls GCC’s implemen-
tation of this workaround. It assumes that aborted accesses to any byte in the
following regions does not have side effects:
1. the memory occupied by the current function’s stack frame;
2. the memory occupied by an incoming stack argument;
3. the memory occupied by an object with a link-time-constant address.
It is the kernel’s responsibility to ensure that speculative accesses to these
regions are indeed safe.
If the input program contains a function declaration such as:
void foo (void);
then the implementation of foo must allow j foo and jal foo to be executed
speculatively. GCC honors this restriction for functions it compiles itself. It
expects non-GCC functions (such as hand-written assembly code) to do the
same.
The option has three forms:
-mr10k-cache-barrier=load-store
Insert a cache barrier before a load or store that might be specula-
tively executed and that might have side effects even if aborted.
-mr10k-cache-barrier=store
Insert a cache barrier before a store that might be speculatively
executed and that might have side effects even if aborted.
-mr10k-cache-barrier=none
Disable the insertion of cache barriers. This is the default setting.
296 Using the GNU Compiler Collection (GCC)
-mflush-func=func
-mno-flush-func
Specifies the function to call to flush the I and D caches, or to not call any
such function. If called, the function must take the same arguments as the
common _flush_func, that is, the address of the memory range for which the
cache is being flushed, the size of the memory range, and the number 3 (to flush
both caches). The default depends on the target GCC was configured for, but
commonly is either _flush_func or __cpu_flush.
mbranch-cost=num
Set the cost of branches to roughly num “simple” instructions. This cost is only
a heuristic and is not guaranteed to produce consistent results across releases.
A zero cost redundantly selects the default, which is based on the ‘-mtune’
setting.
-mbranch-likely
-mno-branch-likely
Enable or disable use of Branch Likely instructions, regardless of the default
for the selected architecture. By default, Branch Likely instructions may be
generated if they are supported by the selected architecture. An exception
is for the MIPS32 and MIPS64 architectures and processors that implement
those architectures; for those, Branch Likely instructions are not be generated
by default because the MIPS32 and MIPS64 architectures specifically deprecate
their use.
-mcompact-branches=never
-mcompact-branches=optimal
-mcompact-branches=always
These options control which form of branches will be generated. The default is
‘-mcompact-branches=optimal’.
The ‘-mcompact-branches=never’ option ensures that compact branch instruc-
tions will never be generated.
The ‘-mcompact-branches=always’ option ensures that a compact branch in-
struction will be generated if available. If a compact branch instruction is not
available, a delay slot form of the branch will be used instead.
This option is supported from MIPS Release 6 onwards.
The ‘-mcompact-branches=optimal’ option will cause a delay slot branch to
be used if one is available in the current ISA and the delay slot is successfully
filled. If the delay slot is not filled, a compact branch will be chosen if one is
available.
-mfp-exceptions
-mno-fp-exceptions
Specifies whether FP exceptions are enabled. This affects how FP instructions
are scheduled for some processors. The default is that FP exceptions are en-
abled.
For instance, on the SB-1, if FP exceptions are disabled, and we are emitting
64-bit code, then we can use both FP pipes. Otherwise, we can only use one
FP pipe.
Chapter 3: GCC Command Options 297
-mvr4130-align
-mno-vr4130-align
The VR4130 pipeline is two-way superscalar, but can only issue two instructions
together if the first one is 8-byte aligned. When this option is enabled, GCC
aligns pairs of instructions that it thinks should execute in parallel.
This option only has an effect when optimizing for the VR4130. It normally
makes code faster, but at the expense of making it bigger. It is enabled by
default at optimization level ‘-O3’.
-msynci
-mno-synci
Enable (disable) generation of synci instructions on architectures that sup-
port it. The synci instructions (if enabled) are generated when __builtin__
_clear_cache is compiled.
This option defaults to ‘-mno-synci’, but the default can be overridden by
configuring GCC with ‘--with-synci’.
When compiling code for single processor systems, it is generally safe to use
synci. However, on many multi-core (SMP) systems, it does not invalidate the
instruction caches on all cores and may lead to undefined behavior.
-mrelax-pic-calls
-mno-relax-pic-calls
Try to turn PIC calls that are normally dispatched via register $25 into direct
calls. This is only possible if the linker can resolve the destination at link time
and if the destination is within range for a direct call.
‘-mrelax-pic-calls’ is the default if GCC was configured to use an
assembler and a linker that support the .reloc assembly directive and
‘-mexplicit-relocs’ is in effect. With ‘-mno-explicit-relocs’, this
optimization can be performed by the assembler and the linker alone without
help from the compiler.
-mmcount-ra-address
-mno-mcount-ra-address
Emit (do not emit) code that allows _mcount to modify the calling function’s
return address. When enabled, this option extends the usual _mcount interface
with a new ra-address parameter, which has type intptr_t * and is passed in
register $12. _mcount can then modify the return address by doing both of the
following:
• Returning the new address in register $31.
• Storing the new address in *ra-address, if ra-address is nonnull.
The default is ‘-mno-mcount-ra-address’.
-mframe-header-opt
-mno-frame-header-opt
Enable (disable) frame header optimization in the o32 ABI. When using the o32
ABI, calling functions will allocate 16 bytes on the stack for the called function
to write out register arguments. When enabled, this optimization will suppress
the allocation of the frame header if it can be determined that it is unused.
298 Using the GNU Compiler Collection (GCC)
-mlibfuncs
-mno-libfuncs
Specify that intrinsic library functions are being compiled, passing all values in
registers, no matter the size.
-mepsilon
-mno-epsilon
Generate floating-point comparison instructions that compare with respect to
the rE epsilon register.
-mabi=mmixware
-mabi=gnu
Generate code that passes function parameters and return values that (in the
called function) are seen as registers $0 and up, as opposed to the GNU ABI
which uses global registers $231 and up.
-mzero-extend
-mno-zero-extend
When reading data from memory in sizes shorter than 64 bits, use (do not use)
zero-extending load instructions by default, rather than sign-extending ones.
-mknuthdiv
-mno-knuthdiv
Make the result of a division yielding a remainder have the same sign as the
divisor. With the default, ‘-mno-knuthdiv’, the sign of the remainder follows
the sign of the dividend. Both methods are arithmetically valid, the latter being
almost exclusively used.
-mtoplevel-symbols
-mno-toplevel-symbols
Prepend (do not prepend) a ‘:’ to all global symbols, so the assembly code can
be used with the PREFIX assembly directive.
-melf Generate an executable in the ELF format, rather than the default ‘mmo’ format
used by the mmix simulator.
Chapter 3: GCC Command Options 299
-mbranch-predict
-mno-branch-predict
Use (do not use) the probable-branch instructions, when static branch predic-
tion indicates a probable branch.
-mbase-addresses
-mno-base-addresses
Generate (do not generate) code that uses base addresses. Using a base address
automatically generates a request (handled by the assembler and the linker)
for a constant to be set up in a global register. The register is used for one or
more base address requests within the range 0 to 255 from the value held in the
register. The generally leads to short and fast code, but the number of different
data items that can be addressed is limited. This means that a program that
uses lots of static data may require ‘-mno-base-addresses’.
-msingle-exit
-mno-single-exit
Force (do not force) generated code to have a single exit point in each function.
-mrelax Indicate to the linker that it should perform a relaxation optimization pass to
shorten branches, calls and absolute memory addresses. This option only has
an effect when used on the command line for the final link step.
This option makes symbolic debugging impossible.
-mliw Allow the compiler to generate Long Instruction Word instructions if the target
is the ‘AM33’ or later. This is the default. This option defines the preprocessor
macro __LIW__.
-mnoliw Do not allow the compiler to generate Long Instruction Word instructions. This
option defines the preprocessor macro __NO_LIW__.
-msetlb Allow the compiler to generate the SETLB and Lcc instructions if the target
is the ‘AM33’ or later. This is the default. This option defines the preprocessor
macro __SETLB__.
-mnosetlb
Do not allow the compiler to generate SETLB or Lcc instructions. This option
defines the preprocessor macro __NO_SETLB__.
-mwarn-mcu
-mno-warn-mcu
This option enables or disables warnings about conflicts between the MCU name
specified by the ‘-mmcu’ option and the ISA set by the ‘-mcpu’ option and/or
the hardware multiply support set by the ‘-mhwmult’ option. It also toggles
warnings about unrecognized MCU names. This option is on by default.
-mcpu= Specifies the ISA to use. Accepted values are ‘msp430’, ‘msp430x’ and
‘msp430xv2’. This option is deprecated. The ‘-mmcu=’ option should be used
to select the ISA.
-msim Link to the simulator runtime libraries and linker script. Overrides any scripts
that would be selected by the ‘-mmcu=’ option.
-mlarge Use large-model addressing (20-bit pointers, 32-bit size_t).
-msmall Use small-model addressing (16-bit pointers, 16-bit size_t).
-mrelax This option is passed to the assembler and linker, and allows the linker to
perform certain optimizations that cannot be done until the final link.
mhwmult= Describes the type of hardware multiply supported by the target. Accepted
values are ‘none’ for no hardware multiply, ‘16bit’ for the original 16-bit-only
multiply supported by early MCUs. ‘32bit’ for the 16/32-bit multiply sup-
ported by later MCUs and ‘f5series’ for the 16/32-bit multiply supported by
F5-series MCUs. A value of ‘auto’ can also be given. This tells GCC to deduce
the hardware multiply support based upon the MCU name provided by the
‘-mmcu’ option. If no ‘-mmcu’ option is specified or if the MCU name is not
recognized then no hardware multiply support is assumed. auto is the default
setting.
Hardware multiplies are normally performed by calling a library routine. This
saves space in the generated code. When compiling at ‘-O3’ or higher however
the hardware multiplier is invoked inline. This makes for bigger, but faster
code.
The hardware multiply routines disable interrupts whilst running and restore
the previous interrupt state when they finish. This makes them safe to use
inside interrupt handlers as well as in normal code.
-minrt Enable the use of a minimum runtime environment - no static initializers or
constructors. This is intended for memory-constrained devices. The compiler
includes special symbols in some objects that tell the linker and runtime which
code fragments are required.
-mcode-region=
-mdata-region=
These options tell the compiler where to place functions and data that do not
have one of the lower, upper, either or section attributes. Possible values
are lower, upper, either or any. The first three behave like the corresponding
attribute. The fourth possible value - any - is the default. It leaves placement
entirely up to the linker script and how it assigns the standard sections (.text,
.data, etc) to the memory regions.
302 Using the GNU Compiler Collection (GCC)
-msilicon-errata=
This option passes on a request to assembler to enable the fixes for the named
silicon errata.
-msilicon-errata-warn=
This option passes on a request to the assembler to enable warning messages
when a silicon errata might need to be applied.
‘small’ All the data and read-only data segments must be within 512KB
addressing space. The text segment must be within 16MB address-
ing space.
‘medium’ The data segment must be within 512KB while the read-only data
segment can be within 4GB addressing space. The text segment
should be still within 16MB addressing space.
‘large’ All the text and data segments can be within 4GB addressing space.
-mctor-dtor
Enable constructor/destructor feature.
-mrelax Guide linker to relax instructions.
-mel
-meb Generate little-endian (default) or big-endian (experimental) code, respectively.
-march=arch
This specifies the name of the target Nios II architecture. GCC uses this name
to determine what kind of instructions it can emit when generating assembly
code. Permissible names are: ‘r1’, ‘r2’.
The preprocessor macro __nios2_arch__ is available to programs, with value
1 or 2, indicating the targeted ISA level.
-mbypass-cache
-mno-bypass-cache
Force all load and store instructions to always bypass cache by using I/O vari-
ants of the instructions. The default is not to bypass the cache.
-mno-cache-volatile
-mcache-volatile
Volatile memory access bypass the cache using the I/O variants of the load and
store instructions. The default is not to bypass the cache.
-mno-fast-sw-div
-mfast-sw-div
Do not use table-based fast divide for small numbers. The default is to use the
fast divide at ‘-O3’ and above.
-mno-hw-mul
-mhw-mul
-mno-hw-mulx
-mhw-mulx
-mno-hw-div
-mhw-div Enable or disable emitting mul, mulx and div family of instructions by the
compiler. The default is to emit mul and not emit div and mulx.
-mbmx
-mno-bmx
-mcdx
-mno-cdx Enable or disable generation of Nios II R2 BMX (bit manipulation) and
CDX (code density) instructions. Enabling these instructions also requires
‘-march=r2’. Since these instructions are optional extensions to the R2
architecture, the default is not to emit them.
Chapter 3: GCC Command Options 305
-mcustom-insn=N
-mno-custom-insn
Each ‘-mcustom-insn=N’ option enables use of a custom instruction
with encoding N when generating code that uses insn. For example,
‘-mcustom-fadds=253’ generates custom instruction 253 for single-precision
floating-point add operations instead of the default behavior of using a library
call.
The following values of insn are supported. Except as otherwise noted, floating-
point operations are expected to be implemented with normal IEEE 754 seman-
tics and correspond directly to the C operators or the equivalent GCC built-in
functions (see Section 6.59 [Other Builtins], page 572).
Single-precision floating point:
‘fadds’, ‘fsubs’, ‘fdivs’, ‘fmuls’
Binary arithmetic operations.
‘fnegs’ Unary negation.
‘fabss’ Unary absolute value.
‘fcmpeqs’, ‘fcmpges’, ‘fcmpgts’, ‘fcmples’, ‘fcmplts’, ‘fcmpnes’
Comparison operations.
‘fmins’, ‘fmaxs’
Floating-point minimum and maximum. These instructions are
only generated if ‘-ffinite-math-only’ is specified.
‘fsqrts’ Unary square root operation.
‘fcoss’, ‘fsins’, ‘ftans’, ‘fatans’, ‘fexps’, ‘flogs’
Floating-point trigonometric and exponential functions. These in-
structions are only generated if ‘-funsafe-math-optimizations’
is also specified.
Double-precision floating point:
‘faddd’, ‘fsubd’, ‘fdivd’, ‘fmuld’
Binary arithmetic operations.
‘fnegd’ Unary negation.
‘fabsd’ Unary absolute value.
‘fcmpeqd’, ‘fcmpged’, ‘fcmpgtd’, ‘fcmpled’, ‘fcmpltd’, ‘fcmpned’
Comparison operations.
‘fmind’, ‘fmaxd’
Double-precision minimum and maximum. These instructions are
only generated if ‘-ffinite-math-only’ is specified.
‘fsqrtd’ Unary square root operation.
‘fcosd’, ‘fsind’, ‘ftand’, ‘fatand’, ‘fexpd’, ‘flogd’
Double-precision trigonometric and exponential functions. These
instructions are only generated if ‘-funsafe-math-optimizations’
is also specified.
306 Using the GNU Compiler Collection (GCC)
Conversions:
‘fextsd’ Conversion from single precision to double precision.
‘ftruncds’
Conversion from double precision to single precision.
‘fixsi’, ‘fixsu’, ‘fixdi’, ‘fixdu’
Conversion from floating point to signed or unsigned integer types,
with truncation towards zero.
‘round’ Conversion from single-precision floating point to signed integer,
rounding to the nearest integer and ties away from zero.
This corresponds to the __builtin_lroundf function when
‘-fno-math-errno’ is used.
‘floatis’, ‘floatus’, ‘floatid’, ‘floatud’
Conversion from signed or unsigned integer types to floating-point
types.
In addition, all of the following transfer instructions for internal registers X and
Y must be provided to use any of the double-precision floating-point instruc-
tions. Custom instructions taking two double-precision source operands expect
the first operand in the 64-bit register X. The other operand (or only operand
of a unary operation) is given to the custom arithmetic instruction with the
least significant half in source register src1 and the most significant half in src2.
A custom instruction that returns a double-precision result returns the most
significant 32 bits in the destination register and the other half in 32-bit register
Y. GCC automatically generates the necessary code sequences to write register
X and/or read register Y when double-precision floating-point instructions are
used.
‘fwrx’ Write src1 into the least significant half of X and src2 into the most
significant half of X.
‘fwry’ Write src1 into Y.
‘frdxhi’, ‘frdxlo’
Read the most or least (respectively) significant half of X and store
it in dest.
‘frdy’ Read the value of Y and store it into dest.
Note that you can gain more local control over generation of Nios II custom in-
structions by using the target("custom-insn=N") and target("no-custom-
insn") function attributes (see Section 6.31 [Function Attributes], page 429)
or pragmas (see Section 6.62.15 [Function Specific Option Pragmas], page 730).
-mcustom-fpu-cfg=name
This option enables a predefined, named set of custom instruction encodings
(see ‘-mcustom-insn’ above). Currently, the following sets are defined:
‘-mcustom-fpu-cfg=60-1’ is equivalent to:
Chapter 3: GCC Command Options 307
-mcustom-fmuls=252
-mcustom-fadds=253
-mcustom-fsubs=254
-fsingle-precision-constant
‘-mcustom-fpu-cfg=60-2’ is equivalent to:
-mcustom-fmuls=252
-mcustom-fadds=253
-mcustom-fsubs=254
-mcustom-fdivs=255
-fsingle-precision-constant
‘-mcustom-fpu-cfg=72-3’ is equivalent to:
-mcustom-floatus=243
-mcustom-fixsi=244
-mcustom-floatis=245
-mcustom-fcmpgts=246
-mcustom-fcmples=249
-mcustom-fcmpeqs=250
-mcustom-fcmpnes=251
-mcustom-fmuls=252
-mcustom-fadds=253
-mcustom-fsubs=254
-mcustom-fdivs=255
-fsingle-precision-constant
Custom instruction assignments given by individual ‘-mcustom-insn=’ options
override those given by ‘-mcustom-fpu-cfg=’, regardless of the order of the
options on the command line.
Note that you can gain more local control over selection of a FPU configu-
ration by using the target("custom-fpu-cfg=name") function attribute (see
Section 6.31 [Function Attributes], page 429) or pragma (see Section 6.62.15
[Function Specific Option Pragmas], page 730).
These additional ‘-m’ options are available for the Altera Nios II ELF (bare-metal) target:
-mhal Link with HAL BSP. This suppresses linking with the GCC-provided C run-
time startup and termination code, and is typically used in conjunction with
‘-msys-crt0=’ to specify the location of the alternate startup code provided by
the HAL BSP.
-msmallc Link with a limited version of the C library, ‘-lsmallc’, rather than Newlib.
-msys-crt0=startfile
startfile is the file name of the startfile (crt0) to use when linking. This option
is only useful in conjunction with ‘-mhal’.
-msys-lib=systemlib
systemlib is the library name of the library that provides low-level system calls
required by the C library, e.g. read and write. This option is typically used
to link with a library provided by a HAL BSP.
-mmainkernel
Link in code for a main kernel. This is for stand-alone instead of offloading
execution.
-moptimize
Apply partitioned execution optimizations. This is the default when any level
of optimization is selected.
-msoft-stack
Generate code that does not use .local memory directly for stack storage.
Instead, a per-warp stack pointer is maintained explicitly. This enables variable-
length stack allocation (with variable-length arrays or alloca), and when global
memory is used for underlying storage, makes it possible to access automatic
variables from other threads, or with atomic instructions. This code generation
variant is used for OpenMP offloading, but the option is exposed on its own for
the purpose of testing the compiler; to generate code suitable for linking into
programs using OpenMP offloading, use option ‘-mgomp’.
-muniform-simt
Switch to code generation variant that allows to execute all threads in each
warp, while maintaining memory state and side effects as if only one thread in
each warp was active outside of OpenMP SIMD regions. All atomic operations
and calls to runtime (malloc, free, vprintf) are conditionally executed (iff current
lane index equals the master lane index), and the register being assigned is
copied via a shuffle instruction from the master lane. Outside of SIMD regions
lane 0 is the master; inside, each thread sees itself as the master. Shared
memory array int __nvptx_uni[] stores all-zeros or all-ones bitmasks for each
warp, indicating current mode (0 outside of SIMD regions). Each thread can
bitwise-and the bitmask at position tid.y with current lane index to compute
the master lane index.
-mgomp Generate code for use in OpenMP offloading: enables ‘-msoft-stack’ and
‘-muniform-simt’ options, and selects corresponding multilib variant.
-mbcopy-builtin
Use inline movmemhi patterns for copying memory. This is the default.
-mbcopy Do not use inline movmemhi patterns for copying memory.
-mint16
-mno-int32
Use 16-bit int. This is the default.
-mint32
-mno-int16
Use 32-bit int.
-mfloat64
-mno-float32
Use 64-bit float. This is the default.
-mfloat32
-mno-float64
Use 32-bit float.
-mabshi Use abshi2 pattern. This is the default.
-mno-abshi
Do not use abshi2 pattern.
-mbranch-expensive
Pretend that branches are expensive. This is for experimenting with code gen-
eration only.
-mbranch-cheap
Do not pretend that branches are expensive. This is the default.
-munix-asm
Use Unix assembler syntax. This is the default when configured for
‘pdp11-*-bsd’.
-mdec-asm
Use DEC assembler syntax. This is the default when configured for any PDP-11
target other than ‘pdp11-*-bsd’.
‘-mae=MAC’ selects a DSP-style MAC AE. Code compiled with this option may
suffer from poor performance of byte (char) manipulation, since the DSP AE
does not provide hardware support for byte load/stores.
-msymbol-as-address
Enable the compiler to directly use a symbol name as an address in a load/store
instruction, without first loading it into a register. Typically, the use of this
option generates larger programs, which run faster than when the option isn’t
used. However, the results vary from program to program, so it is left as a user
option, rather than being permanently enabled.
-mno-inefficient-warnings
Disables warnings about the generation of inefficient code. These warnings can
be generated, for example, when compiling code that performs byte-level mem-
ory operations on the MAC AE type. The MAC AE has no hardware support
for byte-level memory operations, so all byte load/stores must be synthesized
from word load/store operations. This is inefficient and a warning is generated
to indicate that you should rewrite the code to avoid byte operations, or to tar-
get an AE type that has the necessary hardware support. This option disables
these warnings.
-mfdiv
-mno-fdiv
Do or don’t use hardware floating-point divide and square root instructions.
This requires the F or D extensions for floating-point registers. The default is
to use them if the specified architecture has these instructions.
-mdiv
-mno-div Do or don’t use hardware instructions for integer division. This requires the
M extension. The default is to use them if the specified architecture has these
instructions.
-march=ISA-string
Generate code for given RISC-V ISA (e.g. ‘rv64im’). ISA strings must be
lower-case. Examples include ‘rv64i’, ‘rv32g’, and ‘rv32imaf’.
-mtune=processor-string
Optimize the output for the given processor, specified by microarchitecture
name.
-msmall-data-limit=n
Put global and static data smaller than n bytes into a special section (on some
targets).
-msave-restore
-mno-save-restore
Do or don’t use smaller but slower prologue and epilogue code that uses library
function calls. The default is to use fast inline prologues and epilogues.
-mstrict-align
-mno-strict-align
Do not or do generate unaligned memory accesses. The default is set depending
on whether the processor we are optimizing for supports fast unaligned access
or not.
-mcmodel=medlow
Generate code for the medium-low code model. The program and its statically
defined symbols must lie within a single 2 GiB address range and must lie
between absolute addresses −2 GiB and +2 GiB. Programs can be statically or
dynamically linked. This is the default code model.
-mcmodel=medany
Generate code for the medium-any code model. The program and its statically
defined symbols must be within any single 2 GiB address range. Programs can
be statically or dynamically linked.
-mexplicit-relocs
-mno-exlicit-relocs
Use or do not use assembler relocation operators when dealing with symbolic
addresses. The alternative is to use assembler macros instead, which may limit
optimization.
312 Using the GNU Compiler Collection (GCC)
-mallregs
Allow the compiler to use all of the available registers. By default registers
r24..r31 are reserved for use in interrupt handlers. With this option enabled
these registers can be used in ordinary functions as well.
-m64bit-doubles
-m32bit-doubles
Make the double data type be 64 bits (‘-m64bit-doubles’) or 32 bits
(‘-m32bit-doubles’) in size. The default is ‘-m32bit-doubles’.
-msave-mduc-in-interrupts
-mno-save-mduc-in-interrupts
Specifies that interrupt handler functions should preserve the MDUC registers.
This is only necessary if normal code might use the MDUC registers, for example
because it performs multiplication and division operations. The default is to
ignore the MDUC registers as this makes the interrupt handlers faster. The
target option -mg13 needs to be passed for this to work as this feature is only
available on the G13 target (S2 core). The MDUC registers will only be saved if
the interrupt handler performs a multiplication or division operation or it calls
another function.
-maltivec=le
Generate AltiVec instructions using little-endian element order, regardless of
whether the target is big- or little-endian. This is the default when targeting
a little-endian platform. This option is currently ignored when targeting a
big-endian platform.
The element order is used to interpret element numbers in AltiVec intrinsics
such as vec_splat, vec_extract, and vec_insert. By default, these match
array element order corresponding to the endianness for the target.
-mvrsave
-mno-vrsave
Generate VRSAVE instructions when generating AltiVec code.
-mgen-cell-microcode
Generate Cell microcode instructions.
-mwarn-cell-microcode
Warn when a Cell microcode instruction is emitted. An example of a Cell
microcode instruction is a variable shift.
-msecure-plt
Generate code that allows ld and ld.so to build executables and shared li-
braries with non-executable .plt and .got sections. This is a PowerPC 32-bit
SYSV ABI option.
-mbss-plt
Generate code that uses a BSS .plt section that ld.so fills in, and requires
.plt and .got sections that are both writable and executable. This is a Pow-
erPC 32-bit SYSV ABI option.
-misel
-mno-isel
This switch enables or disables the generation of ISEL instructions.
-misel=yes/no
This switch has been deprecated. Use ‘-misel’ and ‘-mno-isel’ instead.
-mlra Enable Local Register Allocation. By default the port uses LRA. (i.e.
‘-mno-lra’).
-mspe
-mno-spe This switch enables or disables the generation of SPE simd instructions.
-mpaired
-mno-paired
This switch enables or disables the generation of PAIRED simd instructions.
-mspe=yes/no
This option has been deprecated. Use ‘-mspe’ and ‘-mno-spe’ instead.
-mvsx
-mno-vsx Generate code that uses (does not use) vector/scalar (VSX) instructions, and
also enable the use of built-in functions that allow more direct access to the
VSX instruction set.
Chapter 3: GCC Command Options 317
-mcrypto
-mno-crypto
Enable the use (disable) of the built-in functions that allow direct access to
the cryptographic instructions that were added in version 2.07 of the PowerPC
ISA.
-mdirect-move
-mno-direct-move
Generate code that uses (does not use) the instructions to move data between
the general purpose registers and the vector/scalar (VSX) registers that were
added in version 2.07 of the PowerPC ISA.
-mhtm
-mno-htm Enable (disable) the use of the built-in functions that allow direct access to
the Hardware Transactional Memory (HTM) instructions that were added in
version 2.07 of the PowerPC ISA.
-mpower8-fusion
-mno-power8-fusion
Generate code that keeps (does not keeps) some integer operations adjacent so
that the instructions can be fused together on power8 and later processors.
-mpower8-vector
-mno-power8-vector
Generate code that uses (does not use) the vector and scalar instructions that
were added in version 2.07 of the PowerPC ISA. Also enable the use of built-in
functions that allow more direct access to the vector instructions.
-mquad-memory
-mno-quad-memory
Generate code that uses (does not use) the non-atomic quad word memory
instructions. The ‘-mquad-memory’ option requires use of 64-bit mode.
-mquad-memory-atomic
-mno-quad-memory-atomic
Generate code that uses (does not use) the atomic quad word memory instruc-
tions. The ‘-mquad-memory-atomic’ option requires use of 64-bit mode.
-mupper-regs-di
-mno-upper-regs-di
Generate code that uses (does not use) the scalar instructions that target all
64 registers in the vector/scalar floating point register set that were added in
version 2.06 of the PowerPC ISA when processing integers. ‘-mupper-regs-di’
is turned on by default if you use any of the ‘-mcpu=power7’, ‘-mcpu=power8’,
‘-mcpu=power9’, or ‘-mvsx’ options.
-mupper-regs-df
-mno-upper-regs-df
Generate code that uses (does not use) the scalar double precision instruc-
tions that target all 64 registers in the vector/scalar floating point register set
that were added in version 2.06 of the PowerPC ISA. ‘-mupper-regs-df’ is
318 Using the GNU Compiler Collection (GCC)
The argument ‘double’ enables the use of single and double-precision floating-
point operations.
The argument ‘no’ disables floating-point operations on the general-purpose
registers.
This option is currently only available on the MPC854x.
-m32
-m64 Generate code for 32-bit or 64-bit environments of Darwin and SVR4 targets
(including GNU/Linux). The 32-bit environment sets int, long and pointer
to 32 bits and generates code that runs on any PowerPC variant. The 64-bit
environment sets int to 32 bits and long and pointer to 64 bits, and generates
code for PowerPC64, as for ‘-mpowerpc64’.
-mfull-toc
-mno-fp-in-toc
-mno-sum-in-toc
-mminimal-toc
Modify generation of the TOC (Table Of Contents), which is created for every
executable file. The ‘-mfull-toc’ option is selected by default. In that case,
GCC allocates at least one TOC entry for each unique non-automatic variable
reference in your program. GCC also places floating-point constants in the
TOC. However, only 16,384 entries are available in the TOC.
If you receive a linker error message that saying you have overflowed the avail-
able TOC space, you can reduce the amount of TOC space used with the
‘-mno-fp-in-toc’ and ‘-mno-sum-in-toc’ options. ‘-mno-fp-in-toc’ prevents
GCC from putting floating-point constants in the TOC and ‘-mno-sum-in-toc’
forces GCC to generate code to calculate the sum of an address and a constant
at run time instead of putting that sum into the TOC. You may specify one
or both of these options. Each causes GCC to produce very slightly slower and
larger code at the expense of conserving TOC space.
If you still run out of space in the TOC even when you specify both of these
options, specify ‘-mminimal-toc’ instead. This option causes GCC to make
only one TOC entry for every file. When you specify this option, GCC produces
code that is slower and larger but which uses extremely little TOC space. You
may wish to use this option only on files that contain less frequently-executed
code.
-maix64
-maix32 Enable 64-bit AIX ABI and calling convention: 64-bit pointers, 64-bit long
type, and the infrastructure needed to support them. Specifying ‘-maix64’
implies ‘-mpowerpc64’, while ‘-maix32’ disables the 64-bit ABI and implies
‘-mno-powerpc64’. GCC defaults to ‘-maix32’.
-mxl-compat
-mno-xl-compat
Produce code that conforms more closely to IBM XL compiler semantics when
using AIX-compatible ABI. Pass floating-point arguments to prototyped func-
tions beyond the register save area (RSA) on the stack in addition to argument
320 Using the GNU Compiler Collection (GCC)
FPRs. Do not assume that most significant double in 128-bit long double value
is properly rounded when comparing values and converting to double. Use XL
symbol names for long double support routines.
The AIX calling convention was extended but not initially documented to han-
dle an obscure K&R C case of calling a function that takes the address of
its arguments with fewer arguments than declared. IBM XL compilers access
floating-point arguments that do not fit in the RSA from the stack when a
subroutine is compiled without optimization. Because always storing floating-
point arguments on the stack is inefficient and rarely needed, this option is not
enabled by default and only is necessary when calling subroutines compiled by
IBM XL compilers without optimization.
-mpe Support IBM RS/6000 SP Parallel Environment (PE). Link an application
written to use message passing with special startup code to enable the ap-
plication to run. The system must have PE installed in the standard loca-
tion (‘/usr/lpp/ppe.poe/’), or the ‘specs’ file must be overridden with the
‘-specs=’ option to specify the appropriate directory location. The Parallel
Environment does not support threads, so the ‘-mpe’ option and the ‘-pthread’
option are incompatible.
-malign-natural
-malign-power
On AIX, 32-bit Darwin, and 64-bit PowerPC GNU/Linux, the option
‘-malign-natural’ overrides the ABI-defined alignment of larger types, such
as floating-point doubles, on their natural size-based boundary. The option
‘-malign-power’ instructs GCC to follow the ABI-specified alignment rules.
GCC defaults to the standard alignment defined in the ABI.
On 64-bit Darwin, natural alignment is the default, and ‘-malign-power’ is not
supported.
-msoft-float
-mhard-float
Generate code that does not use (uses) the floating-point register set. Software
floating-point emulation is provided if you use the ‘-msoft-float’ option, and
pass the option to GCC when linking.
-msingle-float
-mdouble-float
Generate code for single- or double-precision floating-point operations.
‘-mdouble-float’ implies ‘-msingle-float’.
-msimple-fpu
Do not generate sqrt and div instructions for hardware floating-point unit.
-mfpu=name
Specify type of floating-point unit. Valid values for name are ‘sp_lite’
(equivalent to ‘-msingle-float -msimple-fpu’), ‘dp_lite’ (equiv-
alent to ‘-mdouble-float -msimple-fpu’), ‘sp_full’ (equivalent to
‘-msingle-float’), and ‘dp_full’ (equivalent to ‘-mdouble-float’).
Chapter 3: GCC Command Options 321
-mxilinx-fpu
Perform optimizations for the floating-point unit on Xilinx PPC 405/440.
-mmultiple
-mno-multiple
Generate code that uses (does not use) the load multiple word instructions
and the store multiple word instructions. These instructions are generated by
default on POWER systems, and not generated on PowerPC systems. Do not
use ‘-mmultiple’ on little-endian PowerPC systems, since those instructions
do not work when the processor is in little-endian mode. The exceptions are
PPC740 and PPC750 which permit these instructions in little-endian mode.
-mstring
-mno-string
Generate code that uses (does not use) the load string instructions and the
store string word instructions to save multiple registers and do small block
moves. These instructions are generated by default on POWER systems, and
not generated on PowerPC systems. Do not use ‘-mstring’ on little-endian
PowerPC systems, since those instructions do not work when the processor is
in little-endian mode. The exceptions are PPC740 and PPC750 which permit
these instructions in little-endian mode.
-mupdate
-mno-update
Generate code that uses (does not use) the load or store instructions that update
the base register to the address of the calculated memory location. These
instructions are generated by default. If you use ‘-mno-update’, there is a small
window between the time that the stack pointer is updated and the address of
the previous frame is stored, which means code that walks the stack frame
across interrupts or signals may get corrupted data.
-mavoid-indexed-addresses
-mno-avoid-indexed-addresses
Generate code that tries to avoid (not avoid) the use of indexed load or store
instructions. These instructions can incur a performance penalty on Power6
processors in certain situations, such as when stepping through large arrays
that cross a 16M boundary. This option is enabled by default when targeting
Power6 and disabled otherwise.
-mfused-madd
-mno-fused-madd
Generate code that uses (does not use) the floating-point multiply and ac-
cumulate instructions. These instructions are generated by default if hard-
ware floating point is used. The machine-dependent ‘-mfused-madd’ option is
now mapped to the machine-independent ‘-ffp-contract=fast’ option, and
‘-mno-fused-madd’ is mapped to ‘-ffp-contract=off’.
322 Using the GNU Compiler Collection (GCC)
-mmulhw
-mno-mulhw
Generate code that uses (does not use) the half-word multiply and multiply-
accumulate instructions on the IBM 405, 440, 464 and 476 processors. These
instructions are generated by default when targeting those processors.
-mdlmzb
-mno-dlmzb
Generate code that uses (does not use) the string-search ‘dlmzb’ instruction on
the IBM 405, 440, 464 and 476 processors. This instruction is generated by
default when targeting those processors.
-mno-bit-align
-mbit-align
On System V.4 and embedded PowerPC systems do not (do) force structures
and unions that contain bit-fields to be aligned to the base type of the bit-field.
For example, by default a structure containing nothing but 8 unsigned bit-
fields of length 1 is aligned to a 4-byte boundary and has a size of 4 bytes. By
using ‘-mno-bit-align’, the structure is aligned to a 1-byte boundary and is 1
byte in size.
-mno-strict-align
-mstrict-align
On System V.4 and embedded PowerPC systems do not (do) assume that un-
aligned memory references are handled by the system.
-mrelocatable
-mno-relocatable
Generate code that allows (does not allow) a static executable to be relocated
to a different address at run time. A simple embedded PowerPC system loader
should relocate the entire contents of .got2 and 4-byte locations listed in the
.fixup section, a table of 32-bit addresses generated by this option. For this
to work, all objects linked together must be compiled with ‘-mrelocatable’
or ‘-mrelocatable-lib’. ‘-mrelocatable’ code aligns the stack to an 8-byte
boundary.
-mrelocatable-lib
-mno-relocatable-lib
Like ‘-mrelocatable’, ‘-mrelocatable-lib’ generates a .fixup section to al-
low static executables to be relocated at run time, but ‘-mrelocatable-lib’
does not use the smaller stack alignment of ‘-mrelocatable’. Objects com-
piled with ‘-mrelocatable-lib’ may be linked with objects compiled with any
combination of the ‘-mrelocatable’ options.
-mno-toc
-mtoc On System V.4 and embedded PowerPC systems do not (do) assume that reg-
ister 2 contains a pointer to a global area pointing to the addresses used in the
program.
Chapter 3: GCC Command Options 323
-mlittle
-mlittle-endian
On System V.4 and embedded PowerPC systems compile code for the processor
in little-endian mode. The ‘-mlittle-endian’ option is the same as ‘-mlittle’.
-mbig
-mbig-endian
On System V.4 and embedded PowerPC systems compile code for the processor
in big-endian mode. The ‘-mbig-endian’ option is the same as ‘-mbig’.
-mdynamic-no-pic
On Darwin and Mac OS X systems, compile code so that it is not relocatable,
but that its external references are relocatable. The resulting code is suitable
for applications, but not shared libraries.
-msingle-pic-base
Treat the register used for PIC addressing as read-only, rather than loading
it in the prologue for each function. The runtime system is responsible for
initializing this register with an appropriate value before execution begins.
-mprioritize-restricted-insns=priority
This option controls the priority that is assigned to dispatch-slot restricted
instructions during the second scheduling pass. The argument priority takes
the value ‘0’, ‘1’, or ‘2’ to assign no, highest, or second-highest (respectively)
priority to dispatch-slot restricted instructions.
-msched-costly-dep=dependence_type
This option controls which dependences are considered costly by the target
during instruction scheduling. The argument dependence type takes one of the
following values:
‘no’ No dependence is costly.
‘all’ All dependences are costly.
‘true_store_to_load’
A true dependence from store to load is costly.
‘store_to_load’
Any dependence from store to load is costly.
number Any dependence for which the latency is greater than or equal to
number is costly.
-minsert-sched-nops=scheme
This option controls which NOP insertion scheme is used during the second
scheduling pass. The argument scheme takes one of the following values:
‘no’ Don’t insert NOPs.
‘pad’ Pad with NOPs any dispatch group that has vacant issue slots,
according to the scheduler’s grouping.
324 Using the GNU Compiler Collection (GCC)
‘regroup_exact’
Insert NOPs to force costly dependent insns into separate groups.
Insert exactly as many NOPs as needed to force an insn to a new
group, according to the estimated processor grouping.
number Insert NOPs to force costly dependent insns into separate groups.
Insert number NOPs to force an insn to a new group.
-mcall-sysv
On System V.4 and embedded PowerPC systems compile code using calling
conventions that adhere to the March 1995 draft of the System V Application
Binary Interface, PowerPC processor supplement. This is the default unless
you configured GCC using ‘powerpc-*-eabiaix’.
-mcall-sysv-eabi
-mcall-eabi
Specify both ‘-mcall-sysv’ and ‘-meabi’ options.
-mcall-sysv-noeabi
Specify both ‘-mcall-sysv’ and ‘-mno-eabi’ options.
-mcall-aixdesc
On System V.4 and embedded PowerPC systems compile code for the AIX
operating system.
-mcall-linux
On System V.4 and embedded PowerPC systems compile code for the Linux-
based GNU system.
-mcall-freebsd
On System V.4 and embedded PowerPC systems compile code for the FreeBSD
operating system.
-mcall-netbsd
On System V.4 and embedded PowerPC systems compile code for the NetBSD
operating system.
-mcall-openbsd
On System V.4 and embedded PowerPC systems compile code for the OpenBSD
operating system.
-maix-struct-return
Return all structures in memory (as specified by the AIX ABI).
-msvr4-struct-return
Return structures smaller than 8 bytes in registers (as specified by the SVR4
ABI).
-mabi=abi-type
Extend the current ABI with a particular extension, or remove such extension.
Valid values are ‘altivec’, ‘no-altivec’, ‘spe’, ‘no-spe’, ‘ibmlongdouble’,
‘ieeelongdouble’, ‘elfv1’, ‘elfv2’.
Chapter 3: GCC Command Options 325
-mabi=spe
Extend the current ABI with SPE ABI extensions. This does not change the
default ABI, instead it adds the SPE ABI extensions to the current ABI.
-mabi=no-spe
Disable Book-E SPE ABI extensions for the current ABI.
-mabi=ibmlongdouble
Change the current ABI to use IBM extended-precision long double. This is
a PowerPC 32-bit SYSV ABI option. Requires ‘-mlong-double-128’ to be
enabled.
-mabi=ieeelongdouble
Change the current ABI to use IEEE extended-precision long double. This
is a PowerPC 32-bit Linux ABI option. Requires ‘-mlong-double-128’ to be
enabled.
-mabi=elfv1
Change the current ABI to use the ELFv1 ABI. This is the default ABI for
big-endian PowerPC 64-bit Linux. Overriding the default ABI requires special
system support and is likely to fail in spectacular ways.
-mabi=elfv2
Change the current ABI to use the ELFv2 ABI. This is the default ABI for
little-endian PowerPC 64-bit Linux. Overriding the default ABI requires special
system support and is likely to fail in spectacular ways.
-mgnu-attribute
-mno-gnu-attribute
Emit .gnu attribute assembly directives to set tag/value pairs in a
.gnu.attributes section that specify ABI variations in function parameters or
return values.
-mprototype
-mno-prototype
On System V.4 and embedded PowerPC systems assume that all calls to vari-
able argument functions are properly prototyped. Otherwise, the compiler must
insert an instruction before every non-prototyped call to set or clear bit 6 of the
condition code register (CR) to indicate whether floating-point values are passed
in the floating-point registers in case the function takes variable arguments.
With ‘-mprototype’, only calls to prototyped variable argument functions set
or clear the bit.
-msim On embedded PowerPC systems, assume that the startup module is called
‘sim-crt0.o’ and that the standard C libraries are ‘libsim.a’ and ‘libc.a’.
This is the default for ‘powerpc-*-eabisim’ configurations.
-mmvme On embedded PowerPC systems, assume that the startup module is called
‘crt0.o’ and the standard C libraries are ‘libmvme.a’ and ‘libc.a’.
-mads On embedded PowerPC systems, assume that the startup module is called
‘crt0.o’ and the standard C libraries are ‘libads.a’ and ‘libc.a’.
326 Using the GNU Compiler Collection (GCC)
-myellowknife
On embedded PowerPC systems, assume that the startup module is called
‘crt0.o’ and the standard C libraries are ‘libyk.a’ and ‘libc.a’.
-mvxworks
On System V.4 and embedded PowerPC systems, specify that you are compiling
for a VxWorks system.
-memb On embedded PowerPC systems, set the PPC_EMB bit in the ELF flags header
to indicate that ‘eabi’ extended relocations are used.
-meabi
-mno-eabi
On System V.4 and embedded PowerPC systems do (do not) adhere to the
Embedded Applications Binary Interface (EABI), which is a set of modifications
to the System V.4 specifications. Selecting ‘-meabi’ means that the stack is
aligned to an 8-byte boundary, a function __eabi is called from main to set up
the EABI environment, and the ‘-msdata’ option can use both r2 and r13 to
point to two separate small data areas. Selecting ‘-mno-eabi’ means that the
stack is aligned to a 16-byte boundary, no EABI initialization function is called
from main, and the ‘-msdata’ option only uses r13 to point to a single small
data area. The ‘-meabi’ option is on by default if you configured GCC using
one of the ‘powerpc*-*-eabi*’ options.
-msdata=eabi
On System V.4 and embedded PowerPC systems, put small initialized const
global and static data in the .sdata2 section, which is pointed to by register
r2. Put small initialized non-const global and static data in the .sdata sec-
tion, which is pointed to by register r13. Put small uninitialized global and
static data in the .sbss section, which is adjacent to the .sdata section. The
‘-msdata=eabi’ option is incompatible with the ‘-mrelocatable’ option. The
‘-msdata=eabi’ option also sets the ‘-memb’ option.
-msdata=sysv
On System V.4 and embedded PowerPC systems, put small global and static
data in the .sdata section, which is pointed to by register r13. Put small
uninitialized global and static data in the .sbss section, which is adjacent
to the .sdata section. The ‘-msdata=sysv’ option is incompatible with the
‘-mrelocatable’ option.
-msdata=default
-msdata On System V.4 and embedded PowerPC systems, if ‘-meabi’ is used, com-
pile code the same as ‘-msdata=eabi’, otherwise compile code the same as
‘-msdata=sysv’.
-msdata=data
On System V.4 and embedded PowerPC systems, put small global data in the
.sdata section. Put small uninitialized global data in the .sbss section. Do
not use register r13 to address small data however. This is the default behavior
unless other ‘-msdata’ options are used.
Chapter 3: GCC Command Options 327
-msdata=none
-mno-sdata
On embedded PowerPC systems, put all initialized global and static data in
the .data section, and all uninitialized data in the .bss section.
-mreadonly-in-sdata
-mreadonly-in-sdata
Put read-only objects in the .sdata section as well. This is the default.
-mblock-move-inline-limit=num
Inline all block moves (such as calls to memcpy or structure copies) less than or
equal to num bytes. The minimum value for num is 32 bytes on 32-bit targets
and 64 bytes on 64-bit targets. The default value is target-specific.
-G num On embedded PowerPC systems, put global and static items less than or equal
to num bytes into the small data or BSS sections instead of the normal data or
BSS section. By default, num is 8. The ‘-G num’ switch is also passed to the
linker. All modules should be compiled with the same ‘-G num’ value.
-mregnames
-mno-regnames
On System V.4 and embedded PowerPC systems do (do not) emit register
names in the assembly language output using symbolic forms.
-mlongcall
-mno-longcall
By default assume that all calls are far away so that a longer and more expensive
calling sequence is required. This is required for calls farther than 32 megabytes
(33,554,432 bytes) from the current location. A short call is generated if the
compiler knows the call cannot be that far away. This setting can be overridden
by the shortcall function attribute, or by #pragma longcall(0).
Some linkers are capable of detecting out-of-range calls and generating glue
code on the fly. On these systems, long calls are unnecessary and generate
slower code. As of this writing, the AIX linker can do this, as can the GNU
linker for PowerPC/64. It is planned to add this feature to the GNU linker for
32-bit PowerPC systems as well.
On Darwin/PPC systems, #pragma longcall generates jbsr callee, L42,
plus a branch island (glue code). The two target addresses represent the callee
and the branch island. The Darwin/PPC linker prefers the first address and
generates a bl callee if the PPC bl instruction reaches the callee directly;
otherwise, the linker generates bl L42 to call the branch island. The branch
island is appended to the body of the calling function; it computes the full
32-bit address of the callee and jumps to it.
On Mach-O (Darwin) systems, this option directs the compiler emit to the glue
for every direct call, and the Darwin linker decides whether to use or discard
it.
In the future, GCC may ignore all longcall specifications when the linker is
known to generate glue.
328 Using the GNU Compiler Collection (GCC)
-mtls-markers
-mno-tls-markers
Mark (do not mark) calls to __tls_get_addr with a relocation specifying the
function argument. The relocation allows the linker to reliably associate func-
tion call with argument setup instructions for TLS optimization, which in turn
allows GCC to better schedule the sequence.
-mrecip
-mno-recip
This option enables use of the reciprocal estimate and reciprocal square
root estimate instructions with additional Newton-Raphson steps to increase
precision instead of doing a divide or square root and divide for floating-point
arguments. You should use the ‘-ffast-math’ option when using ‘-mrecip’
(or at least ‘-funsafe-math-optimizations’, ‘-ffinite-math-only’,
‘-freciprocal-math’ and ‘-fno-trapping-math’). Note that while the
throughput of the sequence is generally higher than the throughput of the
non-reciprocal instruction, the precision of the sequence can be decreased by
up to 2 ulp (i.e. the inverse of 1.0 equals 0.99999994) for reciprocal square
roots.
-mrecip=opt
This option controls which reciprocal estimate instructions may be used. opt
is a comma-separated list of options, which may be preceded by a ! to invert
the option:
‘all’ Enable all estimate instructions.
‘default’ Enable the default instructions, equivalent to ‘-mrecip’.
‘none’ Disable all estimate instructions, equivalent to ‘-mno-recip’.
‘div’ Enable the reciprocal approximation instructions for both single
and double precision.
‘divf’ Enable the single-precision reciprocal approximation instructions.
‘divd’ Enable the double-precision reciprocal approximation instructions.
‘rsqrt’ Enable the reciprocal square root approximation instructions for
both single and double precision.
‘rsqrtf’ Enable the single-precision reciprocal square root approximation
instructions.
‘rsqrtd’ Enable the double-precision reciprocal square root approximation
instructions.
So, for example, ‘-mrecip=all,!rsqrtd’ enables all of the reciprocal estimate
instructions, except for the FRSQRTE, XSRSQRTEDP, and XVRSQRTEDP instructions
which handle the double-precision reciprocal square root calculations.
-mrecip-precision
-mno-recip-precision
Assume (do not assume) that the reciprocal estimate instructions provide
higher-precision estimates than is mandated by the PowerPC ABI. Selecting
Chapter 3: GCC Command Options 329
Older versions of GCC (prior to 4.9.0) incorrectly did not align a structure
parameter on a 128-bit boundary when that structure contained a member
requiring 128-bit alignment. This is corrected in more recent versions of GCC.
This option may be used to generate code that is compatible with functions
compiled with older versions of GCC.
The ‘-mno-compat-align-parm’ option is the default.
-mstack-protector-guard=guard
-mstack-protector-guard-reg=reg
-mstack-protector-guard-offset=offset
Generate stack protection code using canary at guard. Supported locations are
‘global’ for global canary or ‘tls’ for per-thread canary in the TLS block (the
default with GNU libc version 2.4 or later).
With the latter choice the options ‘-mstack-protector-guard-reg=reg’ and
‘-mstack-protector-guard-offset=offset’ furthermore specify which regis-
ter to use as base register for reading the canary, and from what offset from
that base register. The default for those is as specified in the relevant ABI.
3.18.40 RX Options
These command-line options are defined for RX targets:
-m64bit-doubles
-m32bit-doubles
Make the double data type be 64 bits (‘-m64bit-doubles’) or 32 bits
(‘-m32bit-doubles’) in size. The default is ‘-m32bit-doubles’. Note RX
floating-point hardware only works on 32-bit values, which is why the default
is ‘-m32bit-doubles’.
-fpu
-nofpu Enables (‘-fpu’) or disables (‘-nofpu’) the use of RX floating-point hardware.
The default is enabled for the RX600 series and disabled for the RX200 series.
Floating-point instructions are only generated for 32-bit floating-point values,
however, so the FPU hardware is not used for doubles if the ‘-m64bit-doubles’
option is used.
Note If the ‘-fpu’ option is enabled then ‘-funsafe-math-optimizations’ is
also enabled automatically. This is because the RX FPU instructions are them-
selves unsafe.
-mcpu=name
Selects the type of RX CPU to be targeted. Currently three types are sup-
ported, the generic ‘RX600’ and ‘RX200’ series hardware and the specific ‘RX610’
CPU. The default is ‘RX600’.
The only difference between ‘RX600’ and ‘RX610’ is that the ‘RX610’ does not
support the MVTIPL instruction.
The ‘RX200’ series does not have a hardware floating-point unit and so ‘-nofpu’
is enabled by default when this type is selected.
Chapter 3: GCC Command Options 331
-mbig-endian-data
-mlittle-endian-data
Store data (but not code) in the big-endian format. The default is
‘-mlittle-endian-data’, i.e. to store data in the little-endian format.
-msmall-data-limit=N
Specifies the maximum size in bytes of global and static variables which can be
placed into the small data area. Using the small data area can lead to smaller
and faster code, but the size of area is limited and it is up to the programmer to
ensure that the area does not overflow. Also when the small data area is used
one of the RX’s registers (usually r13) is reserved for use pointing to this area,
so it is no longer available for use by the compiler. This could result in slower
and/or larger code if variables are pushed onto the stack instead of being held
in this register.
Note, common variables (variables that have not been initialized) and constants
are not placed into the small data area as they are assigned to other sections
in the output executable.
The default value is zero, which disables this feature. Note, this feature is not
enabled by default with higher optimization levels (‘-O2’ etc) because of the
potentially detrimental effects of reserving a register. It is up to the programmer
to experiment and discover whether this feature is of benefit to their program.
See the description of the ‘-mpid’ option for a description of how the actual
register to hold the small data area pointer is chosen.
-msim
-mno-sim Use the simulator runtime. The default is to use the libgloss board-specific
runtime.
-mas100-syntax
-mno-as100-syntax
When generating assembler output use a syntax that is compatible with Rene-
sas’s AS100 assembler. This syntax can also be handled by the GAS assembler,
but it has some restrictions so it is not generated by default.
-mmax-constant-size=N
Specifies the maximum size, in bytes, of a constant that can be used as an
operand in a RX instruction. Although the RX instruction set does allow
constants of up to 4 bytes in length to be used in instructions, a longer value
equates to a longer instruction. Thus in some circumstances it can be beneficial
to restrict the size of constants that are used in instructions. Constants that
are too big are instead placed into a constant pool and referenced via register
indirection.
The value N can be between 0 and 4. A value of 0 (the default) or 4 means
that constants of any size are allowed.
-mrelax Enable linker relaxation. Linker relaxation is a process whereby the linker
attempts to reduce the size of a program by finding shorter versions of various
instructions. Disabled by default.
332 Using the GNU Compiler Collection (GCC)
-mint-register=N
Specify the number of registers to reserve for fast interrupt handler functions.
The value N can be between 0 and 4. A value of 1 means that register r13 is
reserved for the exclusive use of fast interrupt handlers. A value of 2 reserves
r13 and r12. A value of 3 reserves r13, r12 and r11, and a value of 4 reserves
r13 through r10. A value of 0, the default, does not reserve any registers.
-msave-acc-in-interrupts
Specifies that interrupt handler functions should preserve the accumulator reg-
ister. This is only necessary if normal code might use the accumulator register,
for example because it performs 64-bit multiplications. The default is to ignore
the accumulator as this makes the interrupt handlers faster.
-mpid
-mno-pid Enables the generation of position independent data. When enabled any access
to constant data is done via an offset from a base address held in a register.
This allows the location of constant data to be determined at run time with-
out requiring the executable to be relocated, which is a benefit to embedded
applications with tight memory constraints. Data that can be modified is not
affected by this option.
Note, using this feature reserves a register, usually r13, for the constant data
base address. This can result in slower and/or larger code, especially in com-
plicated functions.
The actual register chosen to hold the constant data base address depends upon
whether the ‘-msmall-data-limit’ and/or the ‘-mint-register’ command-
line options are enabled. Starting with register r13 and proceeding downwards,
registers are allocated first to satisfy the requirements of ‘-mint-register’,
then ‘-mpid’ and finally ‘-msmall-data-limit’. Thus it is possible for the
small data area register to be r8 if both ‘-mint-register=4’ and ‘-mpid’ are
specified on the command line.
By default this feature is not enabled. The default can be restored via the
‘-mno-pid’ command-line option.
-mno-warn-multiple-fast-interrupts
-mwarn-multiple-fast-interrupts
Prevents GCC from issuing a warning message if it finds more than one fast
interrupt handler when it is compiling a file. The default is to issue a warning
for each extra fast interrupt handler found, as the RX only supports one such
interrupt.
-mallow-string-insns
-mno-allow-string-insns
Enables or disables the use of the string manipulation instructions SMOVF,
SCMPU, SMOVB, SMOVU, SUNTIL SWHILE and also the RMPA instruction. These
instructions may prefetch data, which is not safe to do if accessing an I/O
register. (See section 12.2.7 of the RX62N Group User’s Manual for more in-
formation).
The default is to allow these instructions, but it is not possible for GCC to
reliably detect all circumstances where a string instruction might be used to
Chapter 3: GCC Command Options 333
generating code compliant to the GNU/Linux for S/390 ABI, the default is
‘-mesa’. When generating code compliant to the GNU/Linux for zSeries ABI,
the default is ‘-mzarch’.
-mhtm
-mno-htm The ‘-mhtm’ option enables a set of builtins making use of instructions available
with the transactional execution facility introduced with the IBM zEnterprise
EC12 machine generation Section 6.60.25 [S/390 System z Built-in Functions],
page 692. ‘-mhtm’ is enabled by default when using ‘-march=zEC12’.
-mvx
-mno-vx When ‘-mvx’ is specified, generate code using the instructions available with the
vector extension facility introduced with the IBM z13 machine generation. This
option changes the ABI for some vector type values with regard to alignment
and calling conventions. In case vector type values are being used in an ABI-
relevant context a GAS ‘.gnu_attribute’ command will be added to mark the
resulting binary with the ABI used. ‘-mvx’ is enabled by default when using
‘-march=z13’.
-mzvector
-mno-zvector
The ‘-mzvector’ option enables vector language extensions and builtins using
instructions available with the vector extension facility introduced with the
IBM z13 machine generation. This option adds support for ‘vector’ to be
used as a keyword to define vector type variables and arguments. ‘vector’
is only available when GNU extensions are enabled. It will not be expanded
when requesting strict standard compliance e.g. with ‘-std=c99’. In addition
to the GCC low-level builtins ‘-mzvector’ enables a set of builtins added for
compatibility with AltiVec-style implementations like Power and Cell. In order
to make use of these builtins the header file ‘vecintrin.h’ needs to be included.
‘-mzvector’ is disabled by default.
-mmvcle
-mno-mvcle
Generate (or do not generate) code using the mvcle instruction to perform
block moves. When ‘-mno-mvcle’ is specified, use a mvc loop instead. This is
the default unless optimizing for size.
-mdebug
-mno-debug
Print (or do not print) additional debug information when compiling. The
default is to not print debug information.
-march=cpu-type
Generate code that runs on cpu-type, which is the name of a system
representing a certain processor type. Possible values for cpu-type are
‘z900’/‘arch5’, ‘z990’/‘arch6’, ‘z9-109’, ‘z9-ec’/‘arch7’, ‘z10’/‘arch8’,
‘z196’/‘arch9’, ‘zEC12’, ‘z13’/‘arch11’, ‘z14’/‘arch12’, and ‘native’.
The default is ‘-march=z900’. ‘g5’/‘arch3’ and ‘g6’ are deprecated and will be
removed with future releases.
336 Using the GNU Compiler Collection (GCC)
Specifying ‘native’ as cpu type can be used to select the best architecture
option for the host processor. ‘-march=native’ has no effect if GCC does not
recognize the processor.
-mtune=cpu-type
Tune to cpu-type everything applicable about the generated code, except for
the ABI and the set of available instructions. The list of cpu-type values is the
same as for ‘-march’. The default is the value used for ‘-march’.
-mtpf-trace
-mno-tpf-trace
Generate code that adds (does not add) in TPF OS specific branches to trace
routines in the operating system. This option is off by default, even when
compiling for the TPF OS.
-mfused-madd
-mno-fused-madd
Generate code that uses (does not use) the floating-point multiply and accu-
mulate instructions. These instructions are generated by default if hardware
floating point is used.
-mwarn-framesize=framesize
Emit a warning if the current function exceeds the given frame size. Because
this is a compile-time check it doesn’t need to be a real problem when the
program runs. It is intended to identify functions that most probably cause a
stack overflow. It is useful to be used in an environment with limited stack size
e.g. the linux kernel.
-mwarn-dynamicstack
Emit a warning if the function calls alloca or uses dynamically-sized arrays.
This is generally a bad idea with a limited stack size.
-mstack-guard=stack-guard
-mstack-size=stack-size
If these options are provided the S/390 back end emits additional instructions
in the function prologue that trigger a trap if the stack size is stack-guard bytes
above the stack-size (remember that the stack on S/390 grows downward).
If the stack-guard option is omitted the smallest power of 2 larger than the
frame size of the compiled function is chosen. These options are intended to
be used to help debugging stack overflow problems. The additionally emitted
code causes only little overhead and hence can also be used in production-like
systems without greater performance degradation. The given values have to be
exact powers of 2 and stack-size has to be greater than stack-guard without
exceeding 64k. In order to be efficient the extra code makes the assumption
that the stack starts at an address aligned to the value given by stack-size. The
stack-guard option can only be used in conjunction with stack-size.
-mhotpatch=pre-halfwords,post-halfwords
If the hotpatch option is enabled, a “hot-patching” function prologue is gener-
ated for all functions in the compilation unit. The funtion label is prepended
with the given number of two-byte NOP instructions (pre-halfwords, maximum
Chapter 3: GCC Command Options 337
1000000). After the label, 2 * post-halfwords bytes are appended, using the
largest NOP like instructions the architecture allows (maximum 1000000).
If both arguments are zero, hotpatching is disabled.
This option can be overridden for individual functions with the hotpatch at-
tribute.
3.18.43 SH Options
These ‘-m’ options are defined for the SH implementations:
-m1 Generate code for the SH1.
-m2 Generate code for the SH2.
-m2e Generate code for the SH2e.
-m2a-nofpu
Generate code for the SH2a without FPU, or for a SH2a-FPU in such a way
that the floating-point unit is not used.
-m2a-single-only
Generate code for the SH2a-FPU, in such a way that no double-precision
floating-point operations are used.
-m2a-single
Generate code for the SH2a-FPU assuming the floating-point unit is in single-
precision mode by default.
-m2a Generate code for the SH2a-FPU assuming the floating-point unit is in double-
precision mode by default.
-m3 Generate code for the SH3.
338 Using the GNU Compiler Collection (GCC)
‘soft-imask’
Generate software atomic sequences that temporarily disable inter-
rupts by setting SR.IMASK = 1111. This model works only when the
program runs in privileged mode and is only suitable for single-core
systems. Additional support from the interrupt/exception handling
code of the system is not required. This model is enabled by default
when the target is sh*-*-linux* and SH1* or SH2*.
‘hard-llcs’
Generate hardware atomic sequences using the movli.l and
movco.l instructions only. This is only available on SH4A and is
suitable for multi-core systems. Since the hardware instructions
support only 32 bit atomic variables access to 8 or 16 bit variables
is emulated with 32 bit accesses. Code compiled with this
option is also compatible with other software atomic model
interrupt/exception handling systems if executed on an SH4A
system. Additional support from the interrupt/exception handling
code of the system is not required for this model.
‘gbr-offset=’
This parameter specifies the offset in bytes of the variable in the
thread control block structure that should be used by the generated
atomic sequences when the ‘soft-tcb’ model has been selected. For
other models this parameter is ignored. The specified value must
be an integer multiple of four and in the range 0-1020.
‘strict’ This parameter prevents mixed usage of multiple atomic models,
even if they are compatible, and makes the compiler generate
atomic sequences of the specified model only.
-mtas Generate the tas.b opcode for __atomic_test_and_set. Notice that depend-
ing on the particular hardware and software configuration this can degrade
overall performance due to the operand cache line flushes that are implied by
the tas.b instruction. On multi-core SH4A processors the tas.b instruction
must be used with caution since it can result in data corruption for certain
cache configurations.
-mprefergot
When generating position-independent code, emit function calls using the
Global Offset Table instead of the Procedure Linkage Table.
-musermode
-mno-usermode
Don’t allow (allow) the compiler generating privileged mode code. Specifying
‘-musermode’ also implies ‘-mno-inline-ic_invalidate’ if the inlined code
would not work in user mode. ‘-musermode’ is the default when the target is
sh*-*-linux*. If the target is SH1* or SH2* ‘-musermode’ has no effect, since
there is no user mode.
-multcost=number
Set the cost to assume for a multiply insn.
342 Using the GNU Compiler Collection (GCC)
-mdiv=strategy
Set the division strategy to be used for integer division operations. strategy
can be one of:
‘call-div1’
Calls a library function that uses the single-step division instruc-
tion div1 to perform the operation. Division by zero calculates an
unspecified result and does not trap. This is the default except for
SH4, SH2A and SHcompact.
‘call-fp’ Calls a library function that performs the operation in double pre-
cision floating point. Division by zero causes a floating-point ex-
ception. This is the default for SHcompact with FPU. Specifying
this for targets that do not have a double precision FPU defaults
to call-div1.
‘call-table’
Calls a library function that uses a lookup table for small divisors
and the div1 instruction with case distinction for larger divisors.
Division by zero calculates an unspecified result and does not trap.
This is the default for SH4. Specifying this for targets that do not
have dynamic shift instructions defaults to call-div1.
When a division strategy has not been specified the default strategy is selected
based on the current target. For SH2A the default strategy is to use the divs
and divu instructions instead of library function calls.
-maccumulate-outgoing-args
Reserve space once for outgoing arguments in the function prologue rather than
around each call. Generally beneficial for performance and size. Also needed
for unwinding to avoid changing the stack frame around conditional code.
-mdivsi3_libfunc=name
Set the name of the library function used for 32-bit signed division to name.
This only affects the name used in the ‘call’ division strategies, and the com-
piler still expects the same sets of input/output/clobbered registers as if this
option were not present.
-mfixed-range=register-range
Generate code treating the given register range as fixed registers. A fixed
register is one that the register allocator can not use. This is useful when
compiling kernel code. A register range is specified as two registers separated
by a dash. Multiple register ranges can be specified separated by a comma.
-mbranch-cost=num
Assume num to be the cost for a branch instruction. Higher numbers make the
compiler try to generate more branch-free code if possible. If not specified the
value is selected depending on the processor type that is being compiled for.
-mzdcbranch
-mno-zdcbranch
Assume (do not assume) that zero displacement conditional branch instruc-
tions bt and bf are fast. If ‘-mzdcbranch’ is specified, the compiler prefers
Chapter 3: GCC Command Options 343
-mclear-hwcap
‘-mclear-hwcap’ tells the compiler to remove the hardware capabilities gener-
ated by the Solaris assembler. This is only necessary when object files use ISA
extensions not supported by the current machine, but check at runtime whether
or not to use them.
344 Using the GNU Compiler Collection (GCC)
-mimpure-text
‘-mimpure-text’, used in addition to ‘-shared’, tells the compiler to not pass
‘-z text’ to the linker when linking a shared object. Using this option, you can
link position-dependent code into a shared object.
‘-mimpure-text’ suppresses the “relocations remain against allocatable but
non-writable sections” linker error message. However, the necessary reloca-
tions trigger copy-on-write, and the shared object is not actually shared across
processes. Instead of using ‘-mimpure-text’, you should compile all source
code with ‘-fpic’ or ‘-fPIC’.
These switches are supported in addition to the above on Solaris 2:
-pthreads
This is a synonym for ‘-pthread’.
compiler additionally optimizes it for the Fujitsu MB86934 chip, which is the
more recent SPARClite with FPU.
With ‘-mcpu=sparclet’, GCC generates code for the SPARClet variant of the
SPARC architecture. This adds the integer multiply, multiply/accumulate,
integer divide step and scan (ffs) instructions which exist in SPARClet but
not in SPARC-V7. With ‘-mcpu=tsc701’, the compiler additionally optimizes
it for the TEMIC SPARClet chip.
With ‘-mcpu=v9’, GCC generates code for the V9 variant of the SPARC ar-
chitecture. This adds 64-bit integer and floating-point move instructions, 3
additional floating-point condition code registers and conditional move instruc-
tions. With ‘-mcpu=ultrasparc’, the compiler additionally optimizes it for the
Sun UltraSPARC I/II/IIi chips. With ‘-mcpu=ultrasparc3’, the compiler addi-
tionally optimizes it for the Sun UltraSPARC III/III+/IIIi/IIIi+/IV/IV+ chips.
With ‘-mcpu=niagara’, the compiler additionally optimizes it for Sun Ultra-
SPARC T1 chips. With ‘-mcpu=niagara2’, the compiler additionally optimizes
it for Sun UltraSPARC T2 chips. With ‘-mcpu=niagara3’, the compiler addi-
tionally optimizes it for Sun UltraSPARC T3 chips. With ‘-mcpu=niagara4’,
the compiler additionally optimizes it for Sun UltraSPARC T4 chips. With
‘-mcpu=niagara7’, the compiler additionally optimizes it for Oracle SPARC
M7 chips. With ‘-mcpu=m8’, the compiler additionally optimizes it for Oracle
M8 chips.
-mtune=cpu_type
Set the instruction scheduling parameters for machine type cpu type, but do
not set the instruction set or register set that the option ‘-mcpu=cpu_type’
does.
The same values for ‘-mcpu=cpu_type’ can be used for ‘-mtune=cpu_type’, but
the only useful values are those that select a particular CPU implementation.
Those are ‘cypress’, ‘supersparc’, ‘hypersparc’, ‘leon’, ‘leon3’, ‘leon3v7’,
‘f930’, ‘f934’, ‘sparclite86x’, ‘tsc701’, ‘ultrasparc’, ‘ultrasparc3’,
‘niagara’, ‘niagara2’, ‘niagara3’, ‘niagara4’, ‘niagara7’ and ‘m8’. With
native Solaris and GNU/Linux toolchains, ‘native’ can also be used.
-mv8plus
-mno-v8plus
With ‘-mv8plus’, GCC generates code for the SPARC-V8+ ABI. The difference
from the V8 ABI is that the global and out registers are considered 64 bits
wide. This is enabled by default on Solaris in 32-bit mode for all SPARC-V9
processors.
-mvis
-mno-vis With ‘-mvis’, GCC generates code that takes advantage of the UltraSPARC
Visual Instruction Set extensions. The default is ‘-mno-vis’.
-mvis2
-mno-vis2
With ‘-mvis2’, GCC generates code that takes advantage of version 2.0 of the
UltraSPARC Visual Instruction Set extensions. The default is ‘-mvis2’ when
348 Using the GNU Compiler Collection (GCC)
-msubxc
-mno-subxc
With ‘-msubxc’, GCC generates code that takes advantage of the UltraSPARC
Subtract-Extended-with-Carry instruction. The default is ‘-msubxc’ when tar-
geting a CPU that supports such an instruction, such as Niagara-7 and later.
-mfix-at697f
Enable the documented workaround for the single erratum of the Atmel AT697F
processor (which corresponds to erratum #13 of the AT697E processor).
-mfix-ut699
Enable the documented workarounds for the floating-point errata and the data
cache nullify errata of the UT699 processor.
-mfix-ut700
Enable the documented workaround for the back-to-back store errata of the
UT699E/UT700 processor.
-mfix-gr712rc
Enable the documented workaround for the back-to-back store errata of the
GR712RC processor.
These ‘-m’ options are supported in addition to the above on SPARC-V9 processors in
64-bit environments:
-m32
-m64 Generate code for a 32-bit or 64-bit environment. The 32-bit environment sets
int, long and pointer to 32 bits. The 64-bit environment sets int to 32 bits and
long and pointer to 64 bits.
-mcmodel=which
Set the code model to one of
‘medlow’ The Medium/Low code model: 64-bit addresses, programs must be
linked in the low 32 bits of memory. Programs can be statically or
dynamically linked.
‘medmid’ The Medium/Middle code model: 64-bit addresses, programs must
be linked in the low 44 bits of memory, the text and data segments
must be less than 2GB in size and the data segment must be located
within 2GB of the text segment.
‘medany’ The Medium/Anywhere code model: 64-bit addresses, programs
may be linked anywhere in memory, the text and data segments
must be less than 2GB in size and the data segment must be located
within 2GB of the text segment.
‘embmedany’
The Medium/Anywhere code model for embedded systems: 64-bit
addresses, the text and data segments must be less than 2GB in
size, both starting anywhere in memory (determined at link time).
The global register %g4 points to the base of the data segment.
Programs are statically linked and PIC is not supported.
350 Using the GNU Compiler Collection (GCC)
-mmemory-model=mem-model
Set the memory model in force on the processor to one of
‘default’ The default memory model for the processor and operating system.
‘rmo’ Relaxed Memory Order
‘pso’ Partial Store Order
‘tso’ Total Store Order
‘sc’ Sequential Consistency
These memory models are formally defined in Appendix D of the SPARC-V9
architecture manual, as set in the processor’s PSTATE.MM field.
-mstack-bias
-mno-stack-bias
With ‘-mstack-bias’, GCC assumes that the stack pointer, and frame pointer
if present, are offset by −2047 which must be added back when making stack
frame references. This is the default in 64-bit mode. Otherwise, assume no
such offset is present.
-mstdmain
By default, GCC links against startup code that assumes the SPU-style
main function interface (which has an unconventional parameter list). With
‘-mstdmain’, GCC links your program against startup code that assumes a
C99-style interface to main, including a local copy of argv strings.
-mfixed-range=register-range
Generate code treating the given register range as fixed registers. A fixed regis-
ter is one that the register allocator cannot use. This is useful when compiling
kernel code. A register range is specified as two registers separated by a dash.
Multiple register ranges can be specified separated by a comma.
-mea32
-mea64 Compile code assuming that pointers to the PPU address space accessed via the
__ea named address space qualifier are either 32 or 64 bits wide. The default
is 32 bits. As this is an ABI-changing option, all object code in an executable
must be compiled with the same setting.
-maddress-space-conversion
-mno-address-space-conversion
Allow/disallow treating the __ea address space as superset of the generic ad-
dress space. This enables explicit type casts between __ea and generic pointer
as well as implicit conversions of generic pointers to __ea pointers. The default
is to allow address space pointer conversions.
-mcache-size=cache-size
This option controls the version of libgcc that the compiler links to an executable
and selects a software-managed cache for accessing variables in the __ea address
space with a particular cache size. Possible options for cache-size are ‘8’, ‘16’,
‘32’, ‘64’ and ‘128’. The default cache size is 64KB.
-matomic-updates
-mno-atomic-updates
This option controls the version of libgcc that the compiler links to an executable
and selects whether atomic updates to the software-managed cache of PPU-side
variables are used. If you use atomic updates, changes to a PPU variable from
SPU code using the __ea named address space qualifier do not interfere with
changes to other PPU variables residing in the same cache line from PPU code.
If you do not use atomic updates, such interference may occur; however, writing
back cache lines is more efficient. The default behavior is to use atomic updates.
-mdual-nops
-mdual-nops=n
By default, GCC inserts NOPs to increase dual issue when it expects it to
increase performance. n can be a value from 0 to 10. A smaller n inserts fewer
NOPs. 10 is the default, 0 is the same as ‘-mno-dual-nops’. Disabled with
‘-Os’.
352 Using the GNU Compiler Collection (GCC)
-mhint-max-nops=n
Maximum number of NOPs to insert for a branch hint. A branch hint must be
at least 8 instructions away from the branch it is affecting. GCC inserts up to
n NOPs to enforce this, otherwise it does not generate the branch hint.
-mhint-max-distance=n
The encoding of the branch hint instruction limits the hint to be within 256
instructions of the branch it is affecting. By default, GCC makes sure it is
within 125.
-msafe-hints
Work around a hardware bug that causes the SPU to stall indefinitely. By
default, GCC inserts the hbrp instruction to make sure this stall won’t happen.
-mv850e2v3
Specify that the target processor is the V850E2V3. The preprocessor constant
__v850e2v3__ is defined if this option is used.
-mv850e2 Specify that the target processor is the V850E2. The preprocessor constant
__v850e2__ is defined if this option is used.
-mv850e1 Specify that the target processor is the V850E1. The preprocessor constants
__v850e1__ and __v850e__ are defined if this option is used.
-mv850es Specify that the target processor is the V850ES. This is an alias for the
‘-mv850e1’ option.
-mv850e Specify that the target processor is the V850E. The preprocessor constant
__v850e__ is defined if this option is used.
If neither ‘-mv850’ nor ‘-mv850e’ nor ‘-mv850e1’ nor ‘-mv850e2’ nor
‘-mv850e2v3’ nor ‘-mv850e3v5’ are defined then a default target processor is
chosen and the relevant ‘__v850*__’ preprocessor constant is defined.
The preprocessor constants __v850 and __v851__ are always defined, regardless
of which processor variant is the target.
-mdisable-callt
-mno-disable-callt
This option suppresses generation of the CALLT instruction for the v850e,
v850e1, v850e2, v850e2v3 and v850e3v5 flavors of the v850 architecture.
This option is enabled by default when the RH850 ABI is in use (see
‘-mrh850-abi’), and disabled by default when the GCC ABI is in use. If
CALLT instructions are being generated then the C preprocessor symbol
__V850_CALLT__ is defined.
-mrelax
-mno-relax
Pass on (or do not pass on) the ‘-mrelax’ command-line option to the assembler.
-mlong-jumps
-mno-long-jumps
Disable (or re-enable) the generation of PC-relative jump instructions.
-msoft-float
-mhard-float
Disable (or re-enable) the generation of hardware floating point instructions.
This option is only significant when the target architecture is ‘V850E2V3’ or
higher. If hardware floating point instructions are being generated then the C
preprocessor symbol __FPU_OK__ is defined, otherwise the symbol __NO_FPU__
is defined.
-mloop Enables the use of the e3v5 LOOP instruction. The use of this instruction is
not enabled by default when the e3v5 architecture is selected because its use is
still experimental.
-mrh850-abi
-mghs Enables support for the RH850 version of the V850 ABI. This is the default.
With this version of the ABI the following rules apply:
Chapter 3: GCC Command Options 355
• Integer sized structures and unions are returned via a memory pointer
rather than a register.
• Large structures and unions (more than 8 bytes in size) are passed by value.
• Functions are aligned to 16-bit boundaries.
• The ‘-m8byte-align’ command-line option is supported.
• The ‘-mdisable-callt’ command-line option is enabled by default. The
‘-mno-disable-callt’ command-line option is not supported.
When this version of the ABI is enabled the C preprocessor symbol __V850_
RH850_ABI__ is defined.
-mgcc-abi
Enables support for the old GCC version of the V850 ABI. With this version
of the ABI the following rules apply:
• Integer sized structures and unions are returned in register r10.
• Large structures and unions (more than 8 bytes in size) are passed by
reference.
• Functions are aligned to 32-bit boundaries, unless optimizing for size.
• The ‘-m8byte-align’ command-line option is not supported.
• The ‘-mdisable-callt’ command-line option is supported but not enabled
by default.
When this version of the ABI is enabled the C preprocessor symbol __V850_
GCC_ABI__ is defined.
-m8byte-align
-mno-8byte-align
Enables support for double and long long types to be aligned on 8-byte bound-
aries. The default is to restrict the alignment of all objects to at most 4-bytes.
When ‘-m8byte-align’ is in effect the C preprocessor symbol __V850_8BYTE_
ALIGN__ is defined.
-mbig-switch
Generate code suitable for big switch tables. Use this option only if the assem-
bler/linker complain about out of range branches within a switch table.
-mapp-regs
This option causes r2 and r5 to be used in the code generated by the compiler.
This setting is the default.
-mno-app-regs
This option causes r2 and r5 to be treated as fixed registers.
-mgnu Do output those jump instructions, on the assumption that the GNU assembler
is being used.
-mg Output code for G-format floating-point numbers instead of D-format.
not run at all on processors other than the one indicated. Specifying
‘-march=cpu-type’ implies ‘-mtune=cpu-type’.
The choices for cpu-type are:
‘native’ This selects the CPU to generate code for at compilation time by
determining the processor type of the compiling machine. Using
‘-march=native’ enables all instruction subsets supported by the
local machine (hence the result might not run on different ma-
chines). Using ‘-mtune=native’ produces code optimized for the
local machine under the constraints of the selected instruction set.
‘i386’ Original Intel i386 CPU.
‘i486’ Intel i486 CPU. (No scheduling is implemented for this chip.)
‘i586’
‘pentium’ Intel Pentium CPU with no MMX support.
‘lakemont’
Intel Lakemont MCU, based on Intel Pentium CPU.
‘pentium-mmx’
Intel Pentium MMX CPU, based on Pentium core with MMX in-
struction set support.
‘pentiumpro’
Intel Pentium Pro CPU.
‘i686’ When used with ‘-march’, the Pentium Pro instruction set is used,
so the code runs on all i686 family chips. When used with ‘-mtune’,
it has the same meaning as ‘generic’.
‘pentium2’
Intel Pentium II CPU, based on Pentium Pro core with MMX in-
struction set support.
‘pentium3’
‘pentium3m’
Intel Pentium III CPU, based on Pentium Pro core with MMX and
SSE instruction set support.
‘pentium-m’
Intel Pentium M; low-power version of Intel Pentium III CPU with
MMX, SSE and SSE2 instruction set support. Used by Centrino
notebooks.
‘pentium4’
‘pentium4m’
Intel Pentium 4 CPU with MMX, SSE and SSE2 instruction set
support.
‘prescott’
Improved version of Intel Pentium 4 CPU with MMX, SSE, SSE2
and SSE3 instruction set support.
Chapter 3: GCC Command Options 359
‘samuel-2’
VIA Eden Samuel 2 CPU with MMX and 3DNow! instruction set
support. (No scheduling is implemented for this chip.)
‘nehemiah’
VIA Eden Nehemiah CPU with MMX and SSE instruction set sup-
port. (No scheduling is implemented for this chip.)
‘esther’ VIA Eden Esther CPU with MMX, SSE, SSE2 and SSE3 instruc-
tion set support. (No scheduling is implemented for this chip.)
‘eden-x2’ VIA Eden X2 CPU with x86-64, MMX, SSE, SSE2 and SSE3 in-
struction set support. (No scheduling is implemented for this chip.)
‘eden-x4’ VIA Eden X4 CPU with x86-64, MMX, SSE, SSE2, SSE3, SSSE3,
SSE4.1, SSE4.2, AVX and AVX2 instruction set support. (No
scheduling is implemented for this chip.)
‘nano’ Generic VIA Nano CPU with x86-64, MMX, SSE, SSE2, SSE3 and
SSSE3 instruction set support. (No scheduling is implemented for
this chip.)
‘nano-1000’
VIA Nano 1xxx CPU with x86-64, MMX, SSE, SSE2, SSE3 and
SSSE3 instruction set support. (No scheduling is implemented for
this chip.)
‘nano-2000’
VIA Nano 2xxx CPU with x86-64, MMX, SSE, SSE2, SSE3 and
SSSE3 instruction set support. (No scheduling is implemented for
this chip.)
‘nano-3000’
VIA Nano 3xxx CPU with x86-64, MMX, SSE, SSE2, SSE3, SSSE3
and SSE4.1 instruction set support. (No scheduling is implemented
for this chip.)
‘nano-x2’ VIA Nano Dual Core CPU with x86-64, MMX, SSE, SSE2, SSE3,
SSSE3 and SSE4.1 instruction set support. (No scheduling is im-
plemented for this chip.)
‘nano-x4’ VIA Nano Quad Core CPU with x86-64, MMX, SSE, SSE2, SSE3,
SSSE3 and SSE4.1 instruction set support. (No scheduling is im-
plemented for this chip.)
‘geode’ AMD Geode embedded processor with MMX and 3DNow! instruc-
tion set support.
-mtune=cpu-type
Tune to cpu-type everything applicable about the generated code, except for
the ABI and the set of available instructions. While picking a specific cpu-type
schedules things appropriately for that particular chip, the compiler does not
generate any code that cannot run on the default machine type unless you use
Chapter 3: GCC Command Options 363
-mhard-float
Generate output containing 80387 instructions for floating point.
-mno-80387
-msoft-float
Generate output containing library calls for floating point.
Warning: the requisite libraries are not part of GCC. Normally the facilities
of the machine’s usual C compiler are used, but this cannot be done directly in
cross-compilation. You must make your own arrangements to provide suitable
library functions for cross-compilation.
On machines where a function returns floating-point results in the 80387 register
stack, some floating-point opcodes may be emitted even if ‘-msoft-float’ is
used.
-mno-fp-ret-in-387
Do not use the FPU registers for return values of functions.
The usual calling convention has functions return values of types float and
double in an FPU register, even if there is no FPU. The idea is that the
operating system should emulate an FPU.
The option ‘-mno-fp-ret-in-387’ causes such values to be returned in ordinary
CPU registers instead.
-mno-fancy-math-387
Some 387 emulators do not support the sin, cos and sqrt instructions for the
387. Specify this option to avoid generating those instructions. This option is
the default on OpenBSD and NetBSD. This option is overridden when ‘-march’
indicates that the target CPU always has an FPU and so the instruction does
not need emulation. These instructions are not generated unless you also use
the ‘-funsafe-math-optimizations’ switch.
-malign-double
-mno-align-double
Control whether GCC aligns double, long double, and long long variables on
a two-word boundary or a one-word boundary. Aligning double variables on a
two-word boundary produces code that runs somewhat faster on a Pentium at
the expense of more memory.
On x86-64, ‘-malign-double’ is enabled by default.
Warning: if you use the ‘-malign-double’ switch, structures containing the
above types are aligned differently than the published application binary inter-
face specifications for the x86-32 and are not binary compatible with structures
in code compiled without that switch.
-m96bit-long-double
-m128bit-long-double
These switches control the size of long double type. The x86-32 application
binary interface specifies the size to be 96 bits, so ‘-m96bit-long-double’ is
the default in 32-bit mode.
Modern architectures (Pentium and newer) prefer long double to be aligned
to an 8- or 16-byte boundary. In arrays or structures conforming to the ABI,
366 Using the GNU Compiler Collection (GCC)
-mlong-double-64
-mlong-double-80
-mlong-double-128
These switches control the size of long double type. A size of 64 bits makes the
long double type equivalent to the double type. This is the default for 32-bit
Bionic C library. A size of 128 bits makes the long double type equivalent to
the __float128 type. This is the default for 64-bit Bionic C library.
Warning: if you override the default value for your target ABI, this changes
the size of structures and arrays containing long double variables, as well as
modifying the function calling convention for functions taking long double.
Hence they are not binary-compatible with code compiled without that switch.
-malign-data=type
Control how GCC aligns variables. Supported values for type are ‘compat’
uses increased alignment value compatible uses GCC 4.8 and earlier, ‘abi’ uses
alignment value as specified by the psABI, and ‘cacheline’ uses increased
alignment value to match the cache line size. ‘compat’ is the default.
-mlarge-data-threshold=threshold
When ‘-mcmodel=medium’ is specified, data objects larger than threshold are
placed in the large data section. This value must be the same across all objects
linked into the binary, and defaults to 65535.
-mrtd Use a different function-calling convention, in which functions that take a fixed
number of arguments return with the ret num instruction, which pops their
arguments while returning. This saves one instruction in the caller since there
is no need to pop the arguments there.
You can specify that an individual function is called with this calling sequence
with the function attribute stdcall. You can also override the ‘-mrtd’ option
by using the function attribute cdecl. See Section 6.31 [Function Attributes],
page 429.
Warning: this calling convention is incompatible with the one normally used on
Unix, so you cannot use it if you need to call libraries compiled with the Unix
compiler.
Chapter 3: GCC Command Options 367
Also, you must provide function prototypes for all functions that take variable
numbers of arguments (including printf); otherwise incorrect code is generated
for calls to those functions.
In addition, seriously incorrect code results if you call a function with too many
arguments. (Normally, extra arguments are harmlessly ignored.)
-mregparm=num
Control how many registers are used to pass integer arguments. By default, no
registers are used to pass arguments, and at most 3 registers can be used. You
can control this behavior for a specific function by using the function attribute
regparm. See Section 6.31 [Function Attributes], page 429.
Warning: if you use this switch, and num is nonzero, then you must build all
modules with the same value, including any libraries. This includes the system
libraries and startup modules.
-msseregparm
Use SSE register passing conventions for float and double arguments and return
values. You can control this behavior for a specific function by using the func-
tion attribute sseregparm. See Section 6.31 [Function Attributes], page 429.
Warning: if you use this switch then you must build all modules with the same
value, including any libraries. This includes the system libraries and startup
modules.
-mvect8-ret-in-mem
Return 8-byte vectors in memory instead of MMX registers. This is the default
on Solaris 8 and 9 and VxWorks to match the ABI of the Sun Studio compilers
until version 12. Later compiler versions (starting with Studio 12 Update 1)
follow the ABI used by other x86 targets, which is the default on Solaris 10 and
later. Only use this option if you need to remain compatible with existing code
produced by those previous compiler versions or older versions of GCC.
-mpc32
-mpc64
-mpc80
Set 80387 floating-point precision to 32, 64 or 80 bits. When ‘-mpc32’ is speci-
fied, the significands of results of floating-point operations are rounded to 24 bits
(single precision); ‘-mpc64’ rounds the significands of results of floating-point
operations to 53 bits (double precision) and ‘-mpc80’ rounds the significands
of results of floating-point operations to 64 bits (extended double precision),
which is the default. When this option is used, floating-point operations in
higher precisions are not available to the programmer without setting the FPU
control word explicitly.
Setting the rounding of floating-point operations to less than the default 80 bits
can speed some programs by 2% or more. Note that some mathematical libraries
assume that extended-precision (80-bit) floating-point operations are enabled
by default; routines in such libraries could suffer significant loss of accuracy,
typically through so-called “catastrophic cancellation”, when this option is used
to set the precision to less than extended precision.
368 Using the GNU Compiler Collection (GCC)
-mstackrealign
Realign the stack at entry. On the x86, the ‘-mstackrealign’ option generates
an alternate prologue and epilogue that realigns the run-time stack if necessary.
This supports mixing legacy codes that keep 4-byte stack alignment with mod-
ern codes that keep 16-byte stack alignment for SSE compatibility. See also the
attribute force_align_arg_pointer, applicable to individual functions.
-mpreferred-stack-boundary=num
Attempt to keep the stack boundary aligned to a 2 raised to num byte boundary.
If ‘-mpreferred-stack-boundary’ is not specified, the default is 4 (16 bytes or
128 bits).
Warning: When generating code for the x86-64 architecture with SSE exten-
sions disabled, ‘-mpreferred-stack-boundary=3’ can be used to keep the stack
boundary aligned to 8 byte boundary. Since x86-64 ABI require 16 byte stack
alignment, this is ABI incompatible and intended to be used in controlled envi-
ronment where stack space is important limitation. This option leads to wrong
code when functions compiled with 16 byte stack alignment (such as functions
from a standard library) are called with misaligned stack. In this case, SSE
instructions may lead to misaligned memory access traps. In addition, variable
arguments are handled incorrectly for 16 byte aligned objects (including x87
long double and int128), leading to wrong results. You must build all modules
with ‘-mpreferred-stack-boundary=3’, including any libraries. This includes
the system libraries and startup modules.
-mincoming-stack-boundary=num
Assume the incoming stack is aligned to a 2 raised to num byte boundary.
If ‘-mincoming-stack-boundary’ is not specified, the one specified by
‘-mpreferred-stack-boundary’ is used.
On Pentium and Pentium Pro, double and long double values should be
aligned to an 8-byte boundary (see ‘-malign-double’) or suffer significant run
time performance penalties. On Pentium III, the Streaming SIMD Extension
(SSE) data type __m128 may not work properly if it is not 16-byte aligned.
To ensure proper alignment of this values on the stack, the stack boundary
must be as aligned as that required by any value stored on the stack. Further,
every function must be generated such that it keeps the stack aligned. Thus
calling a function compiled with a higher preferred stack boundary from a
function compiled with a lower preferred stack boundary most likely misaligns
the stack. It is recommended that libraries that use callbacks always use the
default setting.
This extra alignment does consume extra stack space, and generally increases
code size. Code that is sensitive to stack space usage, such as embedded systems
and operating system kernels, may want to reduce the preferred alignment to
‘-mpreferred-stack-boundary=2’.
-mmmx
-msse
-msse2
-msse3
Chapter 3: GCC Command Options 369
-mssse3
-msse4
-msse4a
-msse4.1
-msse4.2
-mavx
-mavx2
-mavx512f
-mavx512pf
-mavx512er
-mavx512cd
-mavx512vl
-mavx512bw
-mavx512dq
-mavx512ifma
-mavx512vbmi
-msha
-maes
-mpclmul
-mclflushopt
-mfsgsbase
-mrdrnd
-mf16c
-mfma
-mfma4
-mprefetchwt1
-mxop
-mlwp
-m3dnow
-m3dnowa
-mpopcnt
-mabm
-mbmi
-mbmi2
-mlzcnt
-mfxsr
-mxsave
-mxsaveopt
-mxsavec
-mxsaves
-mrtm
-mtbm
-mmpx
-mmwaitx
-mclzero
-mpku These switches enable the use of instructions in the MMX, SSE, SSE2,
SSE3, SSSE3, SSE4.1, AVX, AVX2, AVX512F, AVX512PF, AVX512ER,
AVX512CD, SHA, AES, PCLMUL, FSGSBASE, RDRND, F16C, FMA,
SSE4A, FMA4, XOP, LWP, ABM, AVX512VL, AVX512BW, AVX512DQ,
AVX512IFMA AVX512VBMI, BMI, BMI2, FXSR, XSAVE, XSAVEOPT,
LZCNT, RTM, MPX, MWAITX, PKU, 3DNow! or enhanced 3DNow!
370 Using the GNU Compiler Collection (GCC)
-mprefer-avx128
This option instructs GCC to use 128-bit AVX instructions instead of 256-bit
AVX instructions in the auto-vectorizer.
-mcx16 This option enables GCC to generate CMPXCHG16B instructions in 64-bit code
to implement compare-and-exchange operations on 16-byte aligned 128-bit ob-
jects. This is useful for atomic updates of data structures exceeding one machine
word in size. The compiler uses this instruction to implement Section 6.52
[ sync Builtins], page 558. However, for Section 6.53 [ atomic Builtins],
page 560 operating on 128-bit integers, a library call is always used.
-msahf This option enables generation of SAHF instructions in 64-bit code. Early Intel
Pentium 4 CPUs with Intel 64 support, prior to the introduction of Pentium
4 G1 step in December 2005, lacked the LAHF and SAHF instructions which are
supported by AMD64. These are load and store instructions, respectively, for
certain status flags. In 64-bit mode, the SAHF instruction is used to optimize
fmod, drem, and remainder built-in functions; see Section 6.59 [Other Builtins],
page 572 for details.
-mmovbe This option enables use of the movbe instruction to implement __builtin_
bswap32 and __builtin_bswap64.
-mcrc32 This option enables built-in functions __builtin_ia32_crc32qi, __builtin_
ia32_crc32hi, __builtin_ia32_crc32si and __builtin_ia32_crc32di to
generate the crc32 machine instruction.
-mrecip This option enables use of RCPSS and RSQRTSS instructions (and their
vectorized variants RCPPS and RSQRTPS) with an additional Newton-Raphson
step to increase precision instead of DIVSS and SQRTSS (and their vectorized
variants) for single-precision floating-point arguments. These instructions are
generated only when ‘-funsafe-math-optimizations’ is enabled together
with ‘-ffinite-math-only’ and ‘-fno-trapping-math’. Note that while the
throughput of the sequence is higher than the throughput of the non-reciprocal
instruction, the precision of the sequence can be decreased by up to 2 ulp (i.e.
the inverse of 1.0 equals 0.99999994).
Note that GCC implements 1.0f/sqrtf(x) in terms of RSQRTSS (or RSQRTPS)
already with ‘-ffast-math’ (or the above option combination), and doesn’t
need ‘-mrecip’.
Also note that GCC emits the above sequence with additional Newton-Raphson
step for vectorized single-float division and vectorized sqrtf(x) already with
‘-ffast-math’ (or the above option combination), and doesn’t need ‘-mrecip’.
-mrecip=opt
This option controls which reciprocal estimate instructions may be used. opt
is a comma-separated list of options, which may be preceded by a ‘!’ to invert
the option:
‘all’ Enable all estimate instructions.
‘default’ Enable the default instructions, equivalent to ‘-mrecip’.
‘none’ Disable all estimate instructions, equivalent to ‘-mno-recip’.
372 Using the GNU Compiler Collection (GCC)
struct
{
unsigned long bf_1 : 12;
unsigned long : 0;
unsigned long bf_2 : 12;
} t1;
The size of t1 is 8 bytes with the zero-length bit-field. If the zero-length
bit-field were removed, t1’s size would be 4 bytes.
2. If a zero-length bit-field is inserted after a bit-field, foo, and the alignment
of the zero-length bit-field is greater than the member that follows it, bar,
bar is aligned as the type of the zero-length bit-field.
For example:
struct
{
char foo : 4;
short : 0;
char bar;
} t2;
struct
{
char foo : 4;
short : 0;
double bar;
} t3;
For t2, bar is placed at offset 2, rather than offset 1. Accordingly, the size
of t2 is 4. For t3, the zero-length bit-field does not affect the alignment of
bar or, as a result, the size of the structure.
Taking this into account, it is important to note the following:
1. If a zero-length bit-field follows a normal bit-field, the type of the zero-
length bit-field may affect the alignment of the structure as whole. For
example, t2 has a size of 4 bytes, since the zero-length bit-field follows
a normal bit-field, and is of type short.
2. Even if a zero-length bit-field is not followed by a normal bit-field, it
may still affect the alignment of the structure:
struct
{
char foo : 6;
long : 0;
} t4;
Here, t4 takes up 4 bytes.
3. Zero-length bit-fields following non-bit-field members are ignored:
struct
{
char foo;
long : 0;
char bar;
} t5;
Here, t5 takes up 2 bytes.
Chapter 3: GCC Command Options 375
-mno-align-stringops
Do not align the destination of inlined string operations. This switch reduces
code size and improves performance in case the destination is already aligned,
but GCC doesn’t know about it.
-minline-all-stringops
By default GCC inlines string operations only when the destination is known to
be aligned to least a 4-byte boundary. This enables more inlining and increases
code size, but may improve performance of code that depends on fast memcpy,
strlen, and memset for short lengths.
-minline-stringops-dynamically
For string operations of unknown size, use run-time checks with inline code for
small blocks and a library call for large blocks.
-mstringop-strategy=alg
Override the internal decision heuristic for the particular algorithm to use for
inlining string operations. The allowed values for alg are:
‘rep_byte’
‘rep_4byte’
‘rep_8byte’
Expand using i386 rep prefix of the specified size.
‘byte_loop’
‘loop’
‘unrolled_loop’
Expand into an inline loop.
-mmemcpy-strategy=strategy
Override the internal decision heuristic to decide if __builtin_memcpy
should be inlined and what inline algorithm to use when the expected
size of the copy operation is known. strategy is a comma-separated list of
alg:max size:dest align triplets. alg is specified in ‘-mstringop-strategy’,
max size specifies the max byte size with which inline algorithm alg is allowed.
For the last triplet, the max size must be -1. The max size of the triplets in
the list must be specified in increasing order. The minimal byte size for alg is
0 for the first triplet and max_size + 1 of the preceding range.
-mmemset-strategy=strategy
The option is similar to ‘-mmemcpy-strategy=’ except that it is to control __
builtin_memset expansion.
-momit-leaf-frame-pointer
Don’t keep the frame pointer in a register for leaf functions. This avoids the in-
structions to save, set up, and restore frame pointers and makes an extra register
available in leaf functions. The option ‘-fomit-leaf-frame-pointer’ removes
the frame pointer for leaf functions, which might make debugging harder.
376 Using the GNU Compiler Collection (GCC)
-mtls-direct-seg-refs
-mno-tls-direct-seg-refs
Controls whether TLS variables may be accessed with offsets from the TLS
segment register (%gs for 32-bit, %fs for 64-bit), or whether the thread base
pointer must be added. Whether or not this is valid depends on the operating
system, and whether it maps the segment to cover the entire TLS area.
For systems that use the GNU C Library, the default is on.
-msse2avx
-mno-sse2avx
Specify that the assembler should encode SSE instructions with VEX prefix.
The option ‘-mavx’ turns this on by default.
-mfentry
-mno-fentry
If profiling is active (‘-pg’), put the profiling counter call before the prologue.
Note: On x86 architectures the attribute ms_hook_prologue isn’t possible at
the moment for ‘-mfentry’ and ‘-pg’.
-mrecord-mcount
-mno-record-mcount
If profiling is active (‘-pg’), generate a mcount loc section that contains point-
ers to each profiling call. This is useful for automatically patching and out calls.
-mnop-mcount
-mno-nop-mcount
If profiling is active (‘-pg’), generate the calls to the profiling functions as NOPs.
This is useful when they should be patched in later dynamically. This is likely
only useful together with ‘-mrecord-mcount’.
-mskip-rax-setup
-mno-skip-rax-setup
When generating code for the x86-64 architecture with SSE extensions disabled,
‘-mskip-rax-setup’ can be used to skip setting up RAX register when there
are no variable arguments passed in vector registers.
Warning: Since RAX register is used to avoid unnecessarily saving vector reg-
isters on stack when passing variable arguments, the impacts of this option are
callees may waste some stack space, misbehave or jump to a random location.
GCC 4.4 or newer don’t have those issues, regardless the RAX register value.
-m8bit-idiv
-mno-8bit-idiv
On some processors, like Intel Atom, 8-bit unsigned integer divide is much faster
than 32-bit/64-bit integer divide. This option generates a run-time check. If
both dividend and divisor are within range of 0 to 255, 8-bit unsigned integer
divide is used instead of 32-bit/64-bit integer divide.
-mavx256-split-unaligned-load
-mavx256-split-unaligned-store
Split 32-byte AVX unaligned load and store.
Chapter 3: GCC Command Options 377
-mstack-protector-guard=guard
Generate stack protection code using canary at guard. Supported locations
are ‘global’ for global canary or ‘tls’ for per-thread canary in the TLS block
(the default). This option has effect only when ‘-fstack-protector’ or
‘-fstack-protector-all’ is specified.
-mmitigate-rop
Try to avoid generating code sequences that contain unintended return opcodes,
to mitigate against certain forms of attack. At the moment, this option is lim-
ited in what it can do and should not be relied on to provide serious protection.
-mgeneral-regs-only
Generate code that uses only the general-purpose registers. This prevents the
compiler from using floating-point, vector, mask and bound registers.
-mindirect-branch=choice
Convert indirect call and jump with choice. The default is ‘keep’, which keeps
indirect call and jump unmodified. ‘thunk’ converts indirect call and jump
to call and return thunk. ‘thunk-inline’ converts indirect call and jump to
inlined call and return thunk. ‘thunk-extern’ converts indirect call and jump
to external call and return thunk provided in a separate object file. You can
control this behavior for a specific function by using the function attribute
indirect_branch. See Section 6.31 [Function Attributes], page 429.
Note that ‘-mcmodel=large’ is incompatible with ‘-mindirect-branch=thunk’
nor ‘-mindirect-branch=thunk-extern’ since the thunk function may not be
reachable in large code model.
-mfunction-return=choice
Convert function return with choice. The default is ‘keep’, which keeps func-
tion return unmodified. ‘thunk’ converts function return to call and return
thunk. ‘thunk-inline’ converts function return to inlined call and return
thunk. ‘thunk-extern’ converts function return to external call and return
thunk provided in a separate object file. You can control this behavior for
a specific function by using the function attribute function_return. See
Section 6.31 [Function Attributes], page 429.
Note that ‘-mcmodel=large’ is incompatible with ‘-mfunction-return=thunk’
nor ‘-mfunction-return=thunk-extern’ since the thunk function may not be
reachable in large code model.
-mindirect-branch-register
Force indirect call and jump via register.
These ‘-m’ switches are supported in addition to the above on x86-64 processors in 64-bit
environments.
378 Using the GNU Compiler Collection (GCC)
-m32
-m64
-mx32
-m16
-miamcu Generate code for a 16-bit, 32-bit or 64-bit environment. The ‘-m32’ option
sets int, long, and pointer types to 32 bits, and generates code that runs on
any i386 system.
The ‘-m64’ option sets int to 32 bits and long and pointer types to 64 bits, and
generates code for the x86-64 architecture. For Darwin only the ‘-m64’ option
also turns off the ‘-fno-pic’ and ‘-mdynamic-no-pic’ options.
The ‘-mx32’ option sets int, long, and pointer types to 32 bits, and generates
code for the x86-64 architecture.
The ‘-m16’ option is the same as ‘-m32’, except for that it outputs the
.code16gcc assembly directive at the beginning of the assembly output so
that the binary can run in 16-bit mode.
The ‘-miamcu’ option generates code which conforms to Intel MCU psABI. It
requires the ‘-m32’ option to be turned on.
-mno-red-zone
Do not use a so-called “red zone” for x86-64 code. The red zone is mandated by
the x86-64 ABI; it is a 128-byte area beyond the location of the stack pointer
that is not modified by signal or interrupt handlers and therefore can be used for
temporary data without adjusting the stack pointer. The flag ‘-mno-red-zone’
disables this red zone.
-mcmodel=small
Generate code for the small code model: the program and its symbols must be
linked in the lower 2 GB of the address space. Pointers are 64 bits. Programs
can be statically or dynamically linked. This is the default code model.
-mcmodel=kernel
Generate code for the kernel code model. The kernel runs in the negative 2 GB
of the address space. This model has to be used for Linux kernel code.
-mcmodel=medium
Generate code for the medium model: the program is linked in the lower 2 GB
of the address space. Small symbols are also placed there. Symbols with sizes
larger than ‘-mlarge-data-threshold’ are put into large data or BSS sections
and can be located above 2GB. Programs can be statically or dynamically
linked.
-mcmodel=large
Generate code for the large model. This model makes no assumptions about
addresses and sizes of sections.
-maddress-mode=long
Generate code for long address mode. This is only supported for 64-bit and
x32 environments. It is the default address mode for 64-bit environments.
Chapter 3: GCC Command Options 379
-maddress-mode=short
Generate code for short address mode. This is only supported for 32-bit and x32
environments. It is the default address mode for 32-bit and x32 environments.
See also under Section 3.18.55 [x86 Options], page 357 for standard options.
-msim Choose startup files and linker script suitable for the simulator.
-mconst16
-mno-const16
Enable or disable use of CONST16 instructions for loading constant values. The
CONST16 instruction is currently not a standard option from Tensilica. When
enabled, CONST16 instructions are always used in place of the standard L32R in-
structions. The use of CONST16 is enabled by default only if the L32R instruction
is not available.
-mfused-madd
-mno-fused-madd
Enable or disable use of fused multiply/add and multiply/subtract instructions
in the floating-point option. This has no effect if the floating-point option
is not also enabled. Disabling fused multiply/add and multiply/subtract in-
structions forces the compiler to use separate instructions for the multiply and
add/subtract operations. This may be desirable in some cases where strict
IEEE 754-compliant results are required: the fused multiply add/subtract in-
structions do not round the intermediate result, thereby producing results with
more bits of precision than specified by the IEEE standard. Disabling fused
multiply add/subtract instructions also ensures that the program output is not
sensitive to the compiler’s ability to combine multiply and add/subtract oper-
ations.
-mserialize-volatile
-mno-serialize-volatile
When this option is enabled, GCC inserts MEMW instructions before volatile
memory references to guarantee sequential consistency. The default is
‘-mserialize-volatile’. Use ‘-mno-serialize-volatile’ to omit the MEMW
instructions.
-mforce-no-pic
For targets, like GNU/Linux, where all user-mode Xtensa code must be
position-independent code (PIC), this option disables PIC for compiling kernel
code.
Chapter 3: GCC Command Options 381
-mtext-section-literals
-mno-text-section-literals
These options control the treatment of literal pools. The default is
‘-mno-text-section-literals’, which places literals in a separate section
in the output file. This allows the literal pool to be placed in a data
RAM/ROM, and it also allows the linker to combine literal pools from
separate object files to remove redundant literals and improve code size. With
‘-mtext-section-literals’, the literals are interspersed in the text section
in order to keep them as close as possible to their references. This may be
necessary for large assembly files. Literals for each function are placed right
before that function.
-mauto-litpools
-mno-auto-litpools
These options control the treatment of literal pools. The default is
‘-mno-auto-litpools’, which places literals in a separate section in the output
file unless ‘-mtext-section-literals’ is used. With ‘-mauto-litpools’ the
literals are interspersed in the text section by the assembler. Compiler does
not produce explicit .literal directives and loads literals into registers with
MOVI instructions instead of L32R to let the assembler do relaxation and place
literals as necessary. This option allows assembler to create several literal
pools per function and assemble very big functions, which may not be possible
with ‘-mtext-section-literals’.
-mtarget-align
-mno-target-align
When this option is enabled, GCC instructs the assembler to automatically align
instructions to reduce branch penalties at the expense of some code density. The
assembler attempts to widen density instructions to align branch targets and the
instructions following call instructions. If there are not enough preceding safe
density instructions to align a target, no widening is performed. The default is
‘-mtarget-align’. These options do not affect the treatment of auto-aligned
instructions like LOOP, which the assembler always aligns, either by widening
density instructions or by inserting NOP instructions.
-mlongcalls
-mno-longcalls
When this option is enabled, GCC instructs the assembler to translate direct
calls to indirect calls unless it can determine that the target of a direct call is
in the range allowed by the call instruction. This translation typically occurs
for calls to functions in other source files. Specifically, the assembler translates
a direct CALL instruction into an L32R followed by a CALLX instruction. The
default is ‘-mno-longcalls’. This option should be used in programs where the
call target can potentially be out of range. This option is implemented in the
assembler, not the compiler, so the assembly code generated by GCC still shows
direct call instructions—look at the disassembled object code to see the actual
instructions. Note that the assembler uses an indirect call for every cross-file
call, not just those that really are out of range.
382 Using the GNU Compiler Collection (GCC)
This says that any input file whose name ends in ‘.ZZ’ should be passed to the
program ‘z-compile’, which should be invoked with the command-line switch
‘-input’ and with the result of performing the ‘%i’ substitution. (See below.)
As an alternative to providing a spec string, the text following a suffix directive
can be one of the following:
@language
This says that the suffix is an alias for a known language. This is
similar to using the ‘-x’ command-line switch to GCC to specify a
language explicitly. For example:
.ZZ:
@c++
Says that .ZZ files are, in fact, C++ source files.
#name This causes an error messages saying:
name compiler not installed on this system.
GCC already has an extensive list of suffixes built into it. This directive adds
an entry to the end of the list of suffixes, but since the list is searched from
the end backwards, it is effectively possible to override earlier entries using this
technique.
GCC has the following spec strings built into it. Spec files can override these strings or
create their own. Note that individual targets can also add their own spec strings to this
list.
asm Options to pass to the assembler
asm_final Options to pass to the assembler post-processor
cpp Options to pass to the C preprocessor
cc1 Options to pass to the C compiler
cc1plus Options to pass to the C++ compiler
endfile Object files to include at the end of the link
link Options to pass to the linker
lib Libraries to include on the command line to the linker
libgcc Decides which GCC support library to pass to the linker
linker Sets the name of the linker
predefines Defines to be passed to the C preprocessor
signed_char Defines to pass to CPP to say whether char is signed
by default
startfile Object files to include at the start of the link
Here is a small example of a spec file:
%rename lib old_lib
*lib:
--start-group -lgcc -lc -leval1 --end-group %(old_lib)
This example renames the spec called ‘lib’ to ‘old_lib’ and then overrides the previous
definition of ‘lib’ with a new one. The new definition adds in some extra command-line
options before including the text of the old definition.
Spec strings are a list of command-line options to be passed to their corresponding pro-
gram. In addition, the spec strings can contain ‘%’-prefixed sequences to substitute variable
text or to conditionally insert text into the command line. Using these constructs it is
possible to generate quite complex command lines.
384 Using the GNU Compiler Collection (GCC)
Here is a table of all defined ‘%’-sequences for spec strings. Note that spaces are not
generated automatically around the results of expanding these sequences. Therefore you
can concatenate them together or combine them with constant text in a single argument.
%% Substitute one ‘%’ into the program name or argument.
%i Substitute the name of the input file being processed.
%b Substitute the basename of the input file being processed. This is the substring
up to (and not including) the last period and not including the directory.
%B This is the same as ‘%b’, but include the file suffix (text after the last period).
%d Marks the argument containing or following the ‘%d’ as a temporary file name,
so that that file is deleted if GCC exits successfully. Unlike ‘%g’, this contributes
no text to the argument.
%gsuffix Substitute a file name that has suffix suffix and is chosen once per compilation,
and mark the argument in the same way as ‘%d’. To reduce exposure to denial-
of-service attacks, the file name is now chosen in a way that is hard to predict
even when previously chosen file names are known. For example, ‘%g.s ...
%g.o ... %g.s’ might turn into ‘ccUVUUAU.s ccXYAXZ12.o ccUVUUAU.s’. suffix
matches the regexp ‘[.A-Za-z]*’ or the special string ‘%O’, which is treated
exactly as if ‘%O’ had been preprocessed. Previously, ‘%g’ was simply substituted
with a file name chosen once per compilation, without regard to any appended
suffix (which was therefore treated just like ordinary text), making such attacks
more likely to succeed.
%usuffix Like ‘%g’, but generates a new temporary file name each time it appears instead
of once per compilation.
%Usuffix Substitutes the last file name generated with ‘%usuffix’, generating a new
one if there is no such last file name. In the absence of any ‘%usuffix’, this
is just like ‘%gsuffix’, except they don’t share the same suffix space, so ‘%g.s
... %U.s ... %g.s ... %U.s’ involves the generation of two distinct file names,
one for each ‘%g.s’ and another for each ‘%U.s’. Previously, ‘%U’ was simply
substituted with a file name chosen for the previous ‘%u’, without regard to any
appended suffix.
%jsuffix Substitutes the name of the HOST_BIT_BUCKET, if any, and if it is writable, and
if ‘-save-temps’ is not used; otherwise, substitute the name of a temporary
file, just like ‘%u’. This temporary file is not meant for communication between
processes, but rather as a junk disposal mechanism.
%|suffix
%msuffix Like ‘%g’, except if ‘-pipe’ is in effect. In that case ‘%|’ substitutes a single
dash and ‘%m’ substitutes nothing at all. These are the two most common
ways to instruct a program that it should read from standard input or write
to standard output. If you need something more elaborate you can use an
‘%{pipe:X}’ construct: see for example ‘f/lang-specs.h’.
%.SUFFIX Substitutes .SUFFIX for the suffixes of a matched switch’s args when it is
subsequently output with ‘%*’. SUFFIX is terminated by the next space or %.
Chapter 3: GCC Command Options 385
%w Marks the argument containing or following the ‘%w’ as the designated output
file of this compilation. This puts the argument into the sequence of arguments
that ‘%o’ substitutes.
%o Substitutes the names of all the output files, with spaces automatically placed
around them. You should write spaces around the ‘%o’ as well or the results are
undefined. ‘%o’ is for use in the specs for running the linker. Input files whose
names have no recognized suffix are not compiled at all, but they are included
among the output files, so they are linked.
%O Substitutes the suffix for object files. Note that this is handled specially when
it immediately follows ‘%g, %u, or %U’, because of the need for those to form
complete file names. The handling is such that ‘%O’ is treated exactly as if it
had already been substituted, except that ‘%g, %u, and %U’ do not currently
support additional suffix characters following ‘%O’ as they do following, for
example, ‘.o’.
%p Substitutes the standard macro predefinitions for the current target machine.
Use this when running cpp.
%P Like ‘%p’, but puts ‘__’ before and after the name of each predefined macro,
except for macros that start with ‘__’ or with ‘_L’, where L is an uppercase
letter. This is for ISO C.
%I Substitute any of ‘-iprefix’ (made from GCC_EXEC_PREFIX), ‘-isysroot’
(made from TARGET_SYSTEM_ROOT), ‘-isystem’ (made from COMPILER_PATH
and ‘-B’ options) and ‘-imultilib’ as necessary.
%s Current argument is the name of a library or startup file of some sort. Search
for that file in a standard list of directories and substitute the full name found.
The current working directory is included in the list of directories scanned.
%T Current argument is the name of a linker script. Search for that file in the
current list of directories to scan for libraries. If the file is located insert a
‘--script’ option into the command line followed by the full path name found.
If the file is not found then generate an error message. Note: the current
working directory is not searched.
%estr Print str as an error message. str is terminated by a newline. Use this when
inconsistent options are detected.
%(name) Substitute the contents of spec string name at this point.
%x{option}
Accumulate an option for ‘%X’.
%X Output the accumulated linker options specified by ‘-Wl’ or a ‘%x’ spec string.
%Y Output the accumulated assembler options specified by ‘-Wa’.
%Z Output the accumulated preprocessor options specified by ‘-Wp’.
%a Process the asm spec. This is used to compute the switches to be passed to the
assembler.
386 Using the GNU Compiler Collection (GCC)
%A Process the asm_final spec. This is a spec string for passing switches to an
assembler post-processor, if such a program is needed.
%l Process the link spec. This is the spec for computing the command line passed
to the linker. Typically it makes use of the ‘%L %G %S %D and %E’ sequences.
%D Dump out a ‘-L’ option for each directory that GCC believes might contain
startup files. If the target supports multilibs then the current multilib directory
is prepended to each of these paths.
%L Process the lib spec. This is a spec string for deciding which libraries are
included on the command line to the linker.
%G Process the libgcc spec. This is a spec string for deciding which GCC support
library is included on the command line to the linker.
%S Process the startfile spec. This is a spec for deciding which object files are
the first ones passed to the linker. Typically this might be a file named ‘crt0.o’.
%E Process the endfile spec. This is a spec string that specifies the last object
files that are passed to the linker.
%C Process the cpp spec. This is used to construct the arguments to be passed to
the C preprocessor.
%1 Process the cc1 spec. This is used to construct the options to be passed to the
actual C compiler (cc1).
%2 Process the cc1plus spec. This is used to construct the options to be passed
to the actual C++ compiler (cc1plus).
%* Substitute the variable part of a matched option. See below. Note that each
comma in the substituted string is replaced by a single space.
%<S Remove all occurrences of -S from the command line. Note—this command is
position dependent. ‘%’ commands in the spec string before this one see -S, ‘%’
commands in the spec string after this one do not.
%:function(args)
Call the named function function, passing it args. args is first processed as a
nested spec string, then split into an argument vector in the usual fashion. The
function returns a string which is processed as if it had appeared literally as
part of the current spec.
The following built-in spec functions are provided:
getenv The getenv spec function takes two arguments: an environment
variable name and a string. If the environment variable is not
defined, a fatal error is issued. Otherwise, the return value is the
value of the environment variable concatenated with the string. For
example, if TOPDIR is defined as ‘/path/to/top’, then:
%:getenv(TOPDIR /include)
expands to ‘/path/to/top/include’.
Chapter 3: GCC Command Options 387
if-exists
The if-exists spec function takes one argument, an absolute
pathname to a file. If the file exists, if-exists returns the path-
name. Here is a small example of its usage:
*startfile:
crt0%O%s %:if-exists(crti%O%s) crtbegin%O%s
if-exists-else
The if-exists-else spec function is similar to the if-exists spec
function, except that it takes two arguments. The first argument is
an absolute pathname to a file. If the file exists, if-exists-else
returns the pathname. If it does not exist, it returns the second
argument. This way, if-exists-else can be used to select one
file or another, based on the existence of the first. Here is a small
example of its usage:
*startfile:
crt0%O%s %:if-exists(crti%O%s) \
%:if-exists-else(crtbeginT%O%s crtbegin%O%s)
replace-outfile
The replace-outfile spec function takes two arguments. It looks
for the first argument in the outfiles array and replaces it with the
second argument. Here is a small example of its usage:
%{fgnu-runtime:%:replace-outfile(-lobjc -lobjc-gnu)}
remove-outfile
The remove-outfile spec function takes one argument. It looks
for the first argument in the outfiles array and removes it. Here is
a small example its usage:
%:remove-outfile(-lm)
pass-through-libs
The pass-through-libs spec function takes any number of argu-
ments. It finds any ‘-l’ options and any non-options ending in
‘.a’ (which it assumes are the names of linker input library archive
files) and returns a result containing all the found arguments each
prepended by ‘-plugin-opt=-pass-through=’ and joined by spa-
ces. This list is intended to be passed to the LTO linker plugin.
%:pass-through-libs(%G %L %G)
print-asm-header
The print-asm-header function takes no arguments and simply
prints a banner like:
Assembler options
=================
ordinary libraries for the ‘-l’ option (but directories specified with ‘-L’ come
first).
LANG This variable is used to pass locale information to the compiler. One way in
which this information is used is to determine the character set to be used when
character literals, string literals and comments are parsed in C and C++. When
the compiler is configured to allow multibyte characters, the following values
for LANG are recognized:
‘C-JIS’ Recognize JIS characters.
‘C-SJIS’ Recognize SJIS characters.
‘C-EUCJP’ Recognize EUCJP characters.
If LANG is not defined, or if it has some other value, then the compiler uses
mblen and mbtowc as defined by the default locale to recognize and translate
multibyte characters.
Some additional environment variables affect the behavior of the preprocessor.
CPATH
C_INCLUDE_PATH
CPLUS_INCLUDE_PATH
OBJC_INCLUDE_PATH
Each variable’s value is a list of directories separated by a special character,
much like PATH, in which to look for header files. The special character, PATH_
SEPARATOR, is target-dependent and determined at GCC build time. For Mi-
crosoft Windows-based targets it is a semicolon, and for almost all other targets
it is a colon.
CPATH specifies a list of directories to be searched as if specified with ‘-I’, but
after any paths given with ‘-I’ options on the command line. This environment
variable is used regardless of which language is being preprocessed.
The remaining environment variables apply only when preprocessing the par-
ticular language indicated. Each specifies a list of directories to be searched as
if specified with ‘-isystem’, but after any paths given with ‘-isystem’ options
on the command line.
In all these variables, an empty element instructs the compiler to search its
current working directory. Empty elements can appear at the beginning or end
of a path. For instance, if the value of CPATH is :/special/include, that has
the same effect as ‘-I. -I/special/include’.
DEPENDENCIES_OUTPUT
If this variable is set, its value specifies how to output dependencies for Make
based on the non-system header files processed by the compiler. System header
files are ignored in the dependency output.
The value of DEPENDENCIES_OUTPUT can be just a file name, in which case the
Make rules are written to that file, guessing the target name from the source
file name. Or the value can have the form ‘file target’, in which case the
rules are written to file file using target as the target name.
392 Using the GNU Compiler Collection (GCC)
that header file, and ‘-include’ the precompiled header. If the header files have guards
against multiple inclusion, they are skipped because they’ve already been included (in the
precompiled header).
If you need to precompile the same header file for different languages, targets, or compiler
options, you can instead make a directory named like ‘all.h.gch’, and put each precompiled
header in the directory, perhaps using ‘-o’. It doesn’t matter what you call the files in the
directory; every precompiled header in the directory is considered. The first precompiled
header encountered in the directory that is valid for this compilation is used; they’re searched
in no particular order.
There are many other possibilities, limited only by your imagination, good sense, and the
constraints of your build system.
A precompiled header file can be used only when these conditions apply:
• Only one precompiled header can be used in a particular compilation.
• A precompiled header cannot be used once the first C token is seen. You can have
preprocessor directives before a precompiled header; you cannot include a precompiled
header from inside another header.
• The precompiled header file must be produced for the same language as the current
compilation. You cannot use a C precompiled header for a C++ compilation.
• The precompiled header file must have been produced by the same compiler binary as
the current compilation is using.
• Any macros defined before the precompiled header is included must either be defined
in the same way as when the precompiled header was generated, or must not affect the
precompiled header, which usually means that they don’t appear in the precompiled
header at all.
The ‘-D’ option is one way to define a macro before a precompiled header is included;
using a #define can also do it. There are also some options that define macros im-
plicitly, like ‘-O’ and ‘-Wdeprecated’; the same rule applies to macros defined this
way.
• If debugging information is output when using the precompiled header, using ‘-g’ or
similar, the same kind of debugging information must have been output when building
the precompiled header. However, a precompiled header built using ‘-g’ can be used
in a compilation when no debugging information is being output.
• The same ‘-m’ options must generally be used when building and using the precompiled
header. See Section 3.18 [Submodel Options], page 217, for any cases where this rule
is relaxed.
• Each of the following options must be the same when building and using the precom-
piled header:
-fexceptions
• Some other command-line options starting with ‘-f’, ‘-p’, or ‘-O’ must be defined in
the same way as when the precompiled header was generated. At present, it’s not clear
which options are safe to change and which are not; the safest choice is to use exactly
the same options when generating and using the precompiled header. The following
are known to be safe:
394 Using the GNU Compiler Collection (GCC)
For all of these except the last, the compiler automatically ignores the precompiled header
if the conditions aren’t met. If you find an option combination that doesn’t work and
doesn’t cause the precompiled header to be ignored, please consider filing a bug report, see
Chapter 14 [Bugs], page 803.
If you do use differing options when generating and using the precompiled header, the
actual behavior is a mixture of the behavior for the options. For instance, if you use ‘-g’ to
generate the precompiled header but not when using it, you may or may not get debugging
information for routines in the precompiled header.
Chapter 4: C Implementation-Defined Behavior 395
4 C Implementation-Defined Behavior
A conforming implementation of ISO C is required to document its choice of behavior in
each of the areas that are designated “implementation defined”. The following lists all such
areas, along with the section numbers from the ISO/IEC 9899:1990, ISO/IEC 9899:1999
and ISO/IEC 9899:2011 standards. Some areas are only implementation-defined in one
version of the standard.
Some choices depend on the externally determined ABI for the platform (including stan-
dard character encodings) which GCC follows; these are listed as “determined by ABI”
below. See Chapter 9 [Binary Compatibility], page 767, and http: / / gcc . gnu . org /
readings.html. Some choices are documented in the preprocessor manual. See Section
“Implementation-defined behavior” in The C Preprocessor. Some choices are made by
the library and operating system (or other environment when compiling for a freestanding
environment); refer to their documentation for details.
4.1 Translation
• How a diagnostic is identified (C90 3.7, C99 and C11 3.10, C90, C99 and C11 5.1.1.3).
Diagnostics consist of all the output sent to stderr by GCC.
• Whether each nonempty sequence of white-space characters other than new-line is
retained or replaced by one space character in translation phase 3 (C90, C99 and C11
5.1.1.2).
See Section “Implementation-defined behavior” in The C Preprocessor.
4.2 Environment
The behavior of most of these points are dependent on the implementation of the C library,
and are not defined by GCC itself.
• The mapping between physical source file multibyte characters and the source character
set in translation phase 1 (C90, C99 and C11 5.1.1.2).
See Section “Implementation-defined behavior” in The C Preprocessor.
4.3 Identifiers
• Which additional multibyte characters may appear in identifiers and their correspon-
dence to universal character names (C99 and C11 6.4.2).
See Section “Implementation-defined behavior” in The C Preprocessor.
• The number of significant initial characters in an identifier (C90 6.1.2, C90, C99 and
C11 5.2.4.1, C99 and C11 6.4.2).
For internal names, all characters are significant. For external names, the number of
significant characters are defined by the linker; for almost all targets, all characters are
significant.
• Whether case distinctions are significant in an identifier with external linkage (C90
6.1.2).
This is a property of the linker. C99 and C11 require that case distinctions are always
significant in identifiers with external linkage and systems without this property are
not supported by GCC.
396 Using the GNU Compiler Collection (GCC)
4.4 Characters
• The number of bits in a byte (C90 3.4, C99 and C11 3.6).
Determined by ABI.
• The values of the members of the execution character set (C90, C99 and C11 5.2.1).
Determined by ABI.
• The unique value of the member of the execution character set produced for each of
the standard alphabetic escape sequences (C90, C99 and C11 5.2.2).
Determined by ABI.
• The value of a char object into which has been stored any character other than a
member of the basic execution character set (C90 6.1.2.5, C99 and C11 6.2.5).
Determined by ABI.
• Which of signed char or unsigned char has the same range, representation, and be-
havior as “plain” char (C90 6.1.2.5, C90 6.2.1.1, C99 and C11 6.2.5, C99 and C11
6.3.1.1).
Determined by ABI. The options ‘-funsigned-char’ and ‘-fsigned-char’ change the
default. See Section 3.4 [Options Controlling C Dialect], page 33.
• The mapping of members of the source character set (in character constants and string
literals) to members of the execution character set (C90 6.1.3.4, C99 and C11 6.4.4.4,
C90, C99 and C11 5.1.1.2).
Determined by ABI.
• The value of an integer character constant containing more than one character or
containing a character or escape sequence that does not map to a single-byte execution
character (C90 6.1.3.4, C99 and C11 6.4.4.4).
See Section “Implementation-defined behavior” in The C Preprocessor.
• The value of a wide character constant containing more than one multibyte character or
a single multibyte character that maps to multiple members of the extended execution
character set, or containing a multibyte character or escape sequence not represented
in the extended execution character set (C90 6.1.3.4, C99 and C11 6.4.4.4).
See Section “Implementation-defined behavior” in The C Preprocessor.
• The current locale used to convert a wide character constant consisting of a single
multibyte character that maps to a member of the extended execution character set
into a corresponding wide character code (C90 6.1.3.4, C99 and C11 6.4.4.4).
See Section “Implementation-defined behavior” in The C Preprocessor.
• Whether differently-prefixed wide string literal tokens can be concatenated and, if so,
the treatment of the resulting multibyte character sequence (C11 6.4.5).
Such tokens may not be concatenated.
• The current locale used to convert a wide string literal into corresponding wide char-
acter codes (C90 6.1.4, C99 and C11 6.4.5).
See Section “Implementation-defined behavior” in The C Preprocessor.
• The value of a string literal containing a multibyte character or escape sequence not
represented in the execution character set (C90 6.1.4, C99 and C11 6.4.5).
See Section “Implementation-defined behavior” in The C Preprocessor.
Chapter 4: C Implementation-Defined Behavior 397
• The encoding of any of wchar_t, char16_t, and char32_t where the corresponding
standard encoding macro (__STDC_ISO_10646__, __STDC_UTF_16__, or __STDC_UTF_
32__) is not defined (C11 6.10.8.2).
See Section “Implementation-defined behavior” in The C Preprocessor. char16_t and
char32_t literals are always encoded in UTF-16 and UTF-32 respectively.
4.5 Integers
• Any extended integer types that exist in the implementation (C99 and C11 6.2.5).
GCC does not support any extended integer types.
• Whether signed integer types are represented using sign and magnitude, two’s comple-
ment, or one’s complement, and whether the extraordinary value is a trap representa-
tion or an ordinary value (C99 and C11 6.2.6.2).
GCC supports only two’s complement integer types, and all bit patterns are ordinary
values.
• The rank of any extended integer type relative to another extended integer type with
the same precision (C99 and C11 6.3.1.1).
GCC does not support any extended integer types.
• The result of, or the signal raised by, converting an integer to a signed integer type
when the value cannot be represented in an object of that type (C90 6.2.1.2, C99 and
C11 6.3.1.3).
For conversion to a type of width N , the value is reduced modulo 2N to be within range
of the type; no signal is raised.
• The results of some bitwise operations on signed integers (C90 6.3, C99 and C11 6.5).
Bitwise operators act on the representation of the value including both the sign and
value bits, where the sign bit is considered immediately above the highest-value value
bit. Signed ‘>>’ acts on negative numbers by sign extension.
As an extension to the C language, GCC does not use the latitude given in C99 and C11
only to treat certain aspects of signed ‘<<’ as undefined. However, ‘-fsanitize=shift’
(and ‘-fsanitize=undefined’) will diagnose such cases. They are also diagnosed where
constant expressions are required.
• The sign of the remainder on integer division (C90 6.3.5).
GCC always follows the C99 and C11 requirement that the result of division is truncated
towards zero.
A cast from pointer to integer discards most-significant bits if the pointer representation
is larger than the integer type, sign-extends1 if the pointer representation is smaller
than the integer type, otherwise the bits are unchanged.
A cast from integer to pointer discards most-significant bits if the pointer representation
is smaller than the integer type, extends according to the signedness of the integer type
if the pointer representation is larger than the integer type, otherwise the bits are
unchanged.
When casting from pointer to integer and back again, the resulting pointer must ref-
erence the same object as the original pointer, otherwise the behavior is undefined.
That is, one may not use integer arithmetic to avoid the undefined behavior of pointer
arithmetic as proscribed in C99 and C11 6.5.6/8.
• The size of the result of subtracting two pointers to elements of the same array (C90
6.3.6, C99 and C11 6.5.6).
The value is as specified in the standard and the type is determined by the ABI.
4.8 Hints
• The extent to which suggestions made by using the register storage-class specifier
are effective (C90 6.5.1, C99 and C11 6.7.1).
The register specifier affects code generation only in these ways:
• When used as part of the register variable extension, see Section 6.45.5 [Explicit
Register Variables], page 550.
• When ‘-O0’ is in use, the compiler allocates distinct stack memory for all variables
that do not have the register storage-class specifier; if register is specified, the
variable may have a shorter lifespan than the code would indicate and may never
be placed in memory.
• On some rare x86 targets, setjmp doesn’t save the registers in all circumstances.
In those cases, GCC doesn’t allocate any variables in registers unless they are
marked register.
• The extent to which suggestions made by using the inline function specifier are effective
(C99 and C11 6.7.4).
GCC will not inline any functions if the ‘-fno-inline’ option is used or if ‘-O0’ is
used. Otherwise, GCC may still be unable to inline a function for many reasons; the
‘-Winline’ option may be used to determine if a function has not been inlined and why
not.
4.10 Qualifiers
• What constitutes an access to an object that has volatile-qualified type (C90 6.5.3, C99
and C11 6.7.3).
Such an object is normally accessed by pointers and used for accessing hardware. In
most expressions, it is intuitively obvious what is a read and what is a write. For
example
volatile int *dst = somevalue;
volatile int *src = someothervalue;
*dst = *src;
will cause a read of the volatile object pointed to by src and store the value into the
volatile object pointed to by dst. There is no guarantee that these reads and writes
are atomic, especially for objects larger than int.
However, if the volatile storage is not being modified, and the value of the volatile
storage is not used, then the situation is less obvious. For example
volatile int *src = somevalue;
*src;
According to the C standard, such an expression is an rvalue whose type is the unqual-
ified version of its original type, i.e. int. Whether GCC interprets this as a read of
Chapter 4: C Implementation-Defined Behavior 401
the volatile object being pointed to or only as a request to evaluate the expression for
its side-effects depends on this type.
If it is a scalar type, or on most targets an aggregate type whose only member object
is of a scalar type, or a union type whose member objects are of scalar types, the
expression is interpreted by GCC as a read of the volatile object; in the other cases,
the expression is only evaluated for its side-effects.
4.11 Declarators
• The maximum number of declarators that may modify an arithmetic, structure or
union type (C90 6.5.4).
GCC is only limited by available memory.
4.12 Statements
• The maximum number of case values in a switch statement (C90 6.6.4.2).
GCC is only limited by available memory.
See Section “Pragmas” in The C Preprocessor, for details of pragmas accepted by GCC
on all targets. See Section 6.62 [Pragmas Accepted by GCC], page 724, for details of
target-specific pragmas.
• The definitions for __DATE__ and __TIME__ when respectively, the date and time of
translation are not available (C90 6.8.8, C99 6.10.8, C11 6.10.8.1).
4.15 Architecture
• The values or expressions assigned to the macros specified in the headers <float.h>,
<limits.h>, and <stdint.h> (C90, C99 and C11 5.2.4.2, C99 7.18.2, C99 7.18.3, C11
7.20.2, C11 7.20.3).
Determined by ABI.
• The result of attempting to indirectly access an object with automatic or thread storage
duration from a thread other than the one with which it is associated (C11 6.2.4).
Such accesses are supported, subject to the same requirements for synchronization for
concurrent accesses as for concurrent accesses to any object.
• The number, order, and encoding of bytes in any object (when not explicitly specified
in this International Standard) (C99 and C11 6.2.6.1).
Determined by ABI.
• Whether any extended alignments are supported and the contexts in which they are
supported (C11 6.2.8).
Extended alignments up to 228 (bytes) are supported for objects of automatic storage
duration. Alignments supported for objects of static and thread storage duration are
determined by the ABI.
• Valid alignment values other than those returned by an Alignof expression for funda-
mental types, if any (C11 6.2.8).
Valid alignments are powers of 2 up to and including 228 .
• The value of the result of the sizeof and _Alignof operators (C90 6.3.3.4, C99 and
C11 6.5.3.4).
Determined by ABI.
A a;
({a;}).Foo ()
constructs a temporary A object to hold the result of the statement expression, and that is
used to invoke Foo. Therefore the this pointer observed by Foo is not the address of a.
In a statement expression, any temporaries created within a statement are destroyed at
that statement’s end. This makes statement expressions inside macros slightly different
from function calls. In the latter case temporaries introduced during argument evaluation
are destroyed at the end of the statement that includes the function call. In the statement
expression case they are destroyed during the statement expression. For instance,
#define macro(a) ({__typeof__(a) b = (a); b + 3; })
template<typename T> T function(T a) { T b = a; return b + 3; }
void foo ()
{
macro (X ());
function (X ());
}
has different places where temporaries are destroyed. For the macro case, the temporary
X is destroyed just after the initialization of b. In the function case that temporary is
destroyed when the function returns.
These considerations mean that it is probably a bad idea to use statement expressions of
this form in header files that are designed to work with C++. (Note that some versions of
the GNU C Library contained header files using statement expressions that lead to precisely
this bug.)
Jumping into a statement expression with goto or using a switch statement outside the
statement expression with a case or default label inside the statement expression is not
permitted. Jumping into a statement expression with a computed goto (see Section 6.3
[Labels as Values], page 407) has undefined behavior. Jumping out of a statement expres-
sion is permitted, but if the statement expression is part of a larger expression then it is
unspecified which other subexpressions of that expression have been evaluated except where
the language definition requires certain subexpressions to be evaluated before or after the
statement expression. In any case, as with a function call, the evaluation of a statement
expression is not interleaved with the evaluation of other parts of the containing expression.
For example,
foo (), (({ bar1 (); goto a; 0; }) + bar2 ()), baz();
calls foo and bar1 and does not call baz but may or may not call bar2. If bar2 is called,
it is called after foo and before bar1.
To use these values, you need to be able to jump to one. This is done with the computed
goto statement1 , goto *exp;. For example,
goto *ptr;
Any expression of type void * is allowed.
One way of using these constants is in initializing a static array that serves as a jump
table:
static void *array[] = { &&foo, &&bar, &&hack };
Then you can select a label with indexing, like this:
goto *array[i];
Note that this does not check whether the subscript is in bounds—array indexing in C never
does that.
Such an array of label values serves a purpose much like that of the switch statement.
The switch statement is cleaner, so use that rather than an array unless the problem does
not fit a switch statement very well.
Another use of label values is in an interpreter for threaded code. The labels within the
interpreter function can be stored in the threaded code for super-fast dispatching.
You may not use this mechanism to jump to code in a different function. If you do that,
totally unpredictable things happen. The best way to avoid this is to store the label address
only in automatic variables and never pass it as an argument.
An alternate way to write the above example is
static const int array[] = { &&foo - &&foo, &&bar - &&foo,
&&hack - &&foo };
goto *(&&foo + array[i]);
This is more friendly to code living in shared libraries, as it reduces the number of dynamic
relocations that are needed, and by consequence, allows the data to be read-only. This
alternative with label differences is not supported for the AVR target, please use the first
approach for AVR programs.
The &&foo expressions for the same label might have different values if the contain-
ing function is inlined or cloned. If a program relies on them being always the same,
__attribute__((__noinline__,__noclone__)) should be used to prevent inlining and
cloning. If &&foo is used in a static variable initializer, inlining and cloning is forbidden.
The nested function can access all the variables of the containing function that are visible
at the point of its definition. This is called lexical scoping. For example, here we show a
nested function which uses an inherited variable named offset:
Nested function definitions are permitted within functions in the places where variable
definitions are allowed; that is, in any block, mixed with the other declarations and state-
ments in the block.
It is possible to call the nested function from outside the scope of its name by storing its
address or passing the address to another function:
If you try to call the nested function through its address after the containing function
exits, all hell breaks loose. If you try to call it after a containing scope level exits, and if it
refers to some of the variables that are no longer in scope, you may be lucky, but it’s not
wise to take the risk. If, however, the nested function does not refer to anything that has
gone out of scope, you should be safe.
GCC implements taking the address of a nested function using a technique called tram-
polines. This technique was described in Lexical Closures for C++ (Thomas M. Breuel,
USENIX C++ Conference Proceedings, October 17-21, 1988).
A nested function can jump to a label inherited from a containing function, provided
the label is explicitly declared in the containing function (see Section 6.2 [Local Labels],
page 406). Such a jump returns instantly to the containing function, exiting the nested
function that did the goto and any intermediate functions as well. Here is an example:
410 Using the GNU Compiler Collection (GCC)
The function saves the arg pointer register, structure value address, and all registers
that might be used to pass arguments to a function into a block of memory allocated
on the stack. Then it returns the address of that block.
{
if (__builtin_va_arg_pack_len () > 1)
warn_open_too_many_arguments ();
if (__builtin_constant_p (oflag))
{
if ((oflag & O_CREAT) != 0 && __builtin_va_arg_pack_len () < 1)
{
warn_open_missing_mode ();
return __open_2 (path, oflag);
}
return open (path, oflag, __builtin_va_arg_pack ());
}
if (__builtin_va_arg_pack_len () < 1)
return __open_2 (path, oflag);
and b. Eventually we hope to design a new form of declaration syntax that allows you to
declare variables whose scopes start only after their initializers; this will be a more reliable
way to prevent such conflicts.
Some more examples of the use of typeof:
• This declares y with the type of what x points to.
typeof (*x) y;
• This declares y as an array of such values.
typeof (*x) y[4];
• This declares y as an array of pointers to characters:
typeof (typeof (char *)[4]) y;
It is equivalent to the following traditional C declaration:
char *y[4];
To see the meaning of the declaration using typeof, and why it might be a useful way
to write, rewrite it with these macros:
#define pointer(T) typeof(T *)
#define array(T, N) typeof(T [N])
Now the declaration can be rewritten this way:
array (pointer (char), 4) y;
Thus, array (pointer (char), 4) is the type of arrays of 4 pointers to char.
In GNU C, but not GNU C++, you may also declare the type of a variable as __auto_type.
In that case, the declaration must declare only one variable, whose declarator must just be
an identifier, the declaration must be initialized, and the type of the variable is determined
by the initializer; the name of the variable is not in scope until after the initializer. (In C++,
you should use C++11 auto for this purpose.) Using __auto_type, the “maximum” macro
above could be written as:
#define max(a,b) \
({ __auto_type _a = (a); \
__auto_type _b = (b); \
_a > _b ? _a : _b; })
Using __auto_type instead of typeof has two advantages:
• Each argument to the macro appears only once in the expansion of the macro. This
prevents the size of the macro expansion growing exponentially when calls to such
macros are nested inside arguments of such macros.
• If the argument to the macro has variably modified type, it is evaluated only once when
using __auto_type, but twice if typeof is used.
x ? x : y
In this simple case, the ability to omit the middle operand is not especially useful. When it
becomes useful is when the first operand does, or may (if it is a macro argument), contain a
side effect. Then repeating the operand in the middle would perform the side effect twice.
Omitting the middle operand uses the value already computed without the undesirable
effects of recomputing it.
value you like by adding one to a real constant. This is a GNU extension; if you have
an ISO C99 conforming C library (such as the GNU C Library), and want to construct
complex constants of floating type, you should include <complex.h> and use the macros I
or _Complex_I instead.
To extract the real part of a complex-valued expression exp, write __real__ exp. Like-
wise, use __imag__ to extract the imaginary part. This is a GNU extension; for values of
floating type, you should use the ISO C99 functions crealf, creal, creall, cimagf, cimag
and cimagl, declared in <complex.h> and also provided as built-in functions by GCC.
The operator ‘~’ performs complex conjugation when used on a value with a complex
type. This is a GNU extension; for values of floating type, you should use the ISO C99
functions conjf, conj and conjl, declared in <complex.h> and also provided as built-in
functions by GCC.
GCC can allocate complex automatic variables in a noncontiguous fashion; it’s even
possible for the real part to be in a register while the imaginary part is on the stack (or
vice versa). Only the DWARF debug info format can represent this, so use of DWARF is
recommended. If you are using the stabs debug info format, GCC describes a noncontiguous
complex variable as if it were two separate variables of noncomplex type. If the variable’s
actual name is foo, the two fictitious variables are named foo$real and foo$imag. You
can examine and set these two fictitious variables with your debugger.
Support for these additional types includes the arithmetic operators: add, subtract, mul-
tiply, divide; unary arithmetic operators; relational operators; equality operators; and con-
versions to and from integer and other floating types. Use a suffix ‘w’ or ‘W’ in a literal
constant of type __float80 or type __ibm128. Use a suffix ‘q’ or ‘Q’ for _float128.
416 Using the GNU Compiler Collection (GCC)
In order to use _Float128, __float128, and __ibm128 on PowerPC Linux systems, you
must use the ‘-mfloat128’ option. It is expected in future versions of GCC that _Float128
and __float128 will be enabled automatically.
The _Float128 type is supported on all systems where __float128 is supported or
where long double has the IEEE binary128 format. The _Float64x type is supported on
all systems where __float128 is supported. The _Float32 type is supported on all systems
supporting IEEE binary32; the _Float64 and _Float32x types are supported on all systems
supporting IEEE binary64. The _Float16 type is supported on AArch64 systems by default,
and on ARM systems when the IEEE format for 16-bit floating-point types is selected with
‘-mfp16-format=ieee’. GCC does not currently support _Float128x on any systems.
On the i386, x86 64, IA-64, and HP-UX targets, you can declare complex types using
the corresponding internal complex type, XCmode for __float80 type and TCmode for __
float128 type:
typedef _Complex float __attribute__((mode(TC))) _Complex128;
typedef _Complex float __attribute__((mode(XC))) _Complex80;
On the PowerPC Linux VSX targets, you can declare complex types using the corre-
sponding internal complex type, KCmode for __float128 type and ICmode for __ibm128
type:
typedef _Complex float __attribute__((mode(KC))) _Complex_float128;
typedef _Complex float __attribute__((mode(IC))) _Complex_ibm128;
• ‘ulk’ or ‘ULK’ for unsigned long _Accum and _Sat unsigned long _Accum
• ‘ullk’ or ‘ULLK’ for unsigned long long _Accum and _Sat unsigned long long
_Accum
GCC support of fixed-point types as specified by the draft technical report is incomplete:
• Pragmas to control overflow and rounding behaviors are not implemented.
Fixed-point types are supported by the DWARF debug information format.
return **p;
}
int i = 1;
• The following code initializes a variable pfoo located in static storage with a 24-bit
address:
extern const __memx char foo;
const __memx void *pfoo = &foo;
Such code requires at least binutils 2.23, see PR13503.
• On the reduced Tiny devices like ATtiny40, no address spaces are supported. Data
can be put into and read from flash memory by means of attribute progmem, see
Section 6.32.2 [AVR Variable Attributes], page 478.
struct line {
int length;
char contents[0];
};
struct f2 {
struct f1 f1; int data[3];
} f2 = { { 1 }, { 2, 3, 4 } };
The convenience of this extension is that f1 has the desired type, eliminating the need to
consistently refer to f2.f1.
This has symmetry with normal static arrays, in that an array of unknown size is also
written with [].
Of course, this extension only makes sense if the extra data comes at the end of a top-level
object, as otherwise we would be overwriting data at subsequent offsets. To avoid undue
complication and confusion with initialization of deeply nested arrays, we simply disallow
any non-empty initialization except when the structure is the top-level object. For example:
struct foo { int x; int y[]; };
struct bar { struct foo z; };
struct entry
tester (int len; char data[len][len], int len)
{
/* . . . */
}
The ‘int len’ before the semicolon is a parameter forward declaration, and it serves the
purpose of making the name len known when the declaration of data is parsed.
You can write any number of such parameter forward declarations in the parameter list.
They can be separated by commas or semicolons, but the last one must end with a semicolon,
which is followed by the “real” parameter declarations. Each forward declaration must
match a “real” declaration in parameter name and data type. ISO C99 does not support
parameter forward declarations.
A consequence of this is that sizeof is also allowed on void and on function types, and
returns 1.
union foo f = { .d = 4 };
converts 4 to a double to store it in the union using the second element. By contrast,
casting 4 to type union foo stores it into the union as the integer i, since it is an integer.
See Section 6.29 [Cast to Union], page 429.
You can combine this technique of naming elements with ordinary C initialization of
successive elements. Each initializer element that does not have a designator applies to the
next consecutive element of the array or structure. For example,
int a[6] = { [1] = v1, v2, [4] = v4 };
is equivalent to
int a[6] = { 0, v1, v2, 0, v4, 0 };
Labeling the elements of an array initializer is especially useful when the indices are
characters or belong to an enum type. For example:
int whitespace[256]
= { [’ ’] = 1, [’\t’] = 1, [’\h’] = 1,
[’\f’] = 1, [’\n’] = 1, [’\r’] = 1 };
You can also write a series of ‘.fieldname’ and ‘[index]’ designators before an ‘=’ to
specify a nested subobject to initialize; the list is taken relative to the subobject correspond-
ing to the closest surrounding brace pair. For example, with the ‘struct point’ declaration
above:
struct point ptarray[10] = { [2].y = yv2, [2].x = xv2, [0].x = xv0 };
If the same field is initialized multiple times, it has the value from the last initialization.
If any such overridden initialization has side-effect, it is unspecified whether the side-effect
happens or not. Currently, GCC discards them and issues a warning.
case 1 ... 5:
rather than this:
case 1...5:
alloc_align
The alloc_align attribute is used to tell the compiler that the function return
value points to memory, where the returned pointer minimum alignment is given
by one of the functions parameters. GCC uses this information to improve
pointer alignment analysis.
The function parameter denoting the allocated alignment is specified by one
integer argument, whose number is the argument of the attribute. Argument
numbering starts at one.
For instance,
void* my_memalign(size_t, size_t) __attribute__((alloc_align(1)))
declares that my_memalign returns memory with minimum alignment given by
parameter 1.
alloc_size
The alloc_size attribute is used to tell the compiler that the function return
value points to memory, where the size is given by one or two of the func-
tions parameters. GCC uses this information to improve the correctness of
__builtin_object_size.
The function parameter(s) denoting the allocated size are specified by one or
two integer arguments supplied to the attribute. The allocated size is either
the value of the single function argument specified or the product of the two
function arguments specified. Argument numbering starts at one.
For instance,
void* my_calloc(size_t, size_t) __attribute__((alloc_size(1,2)))
void* my_realloc(void*, size_t) __attribute__((alloc_size(2)))
declares that my_calloc returns memory of the size given by the product of
parameter 1 and 2 and that my_realloc returns memory of the size given by
parameter 2.
always_inline
Generally, functions are not inlined unless optimization is specified. For func-
tions declared inline, this attribute inlines the function independent of any
restrictions that otherwise apply to inlining. Failure to inline such a function
is diagnosed as an error. Note that if such a function is called indirectly the
compiler may or may not inline it depending on optimization level and a failure
to inline an indirect call may or may not be diagnosed.
artificial
This attribute is useful for small inline wrappers that if possible should appear
during debugging as a unit. Depending on the debug info format it either means
marking the function as artificial or using the caller location for all instructions
within the inlined body.
assume_aligned
The assume_aligned attribute is used to tell the compiler that the function
return value points to memory, where the returned pointer minimum alignment
is given by the first argument. If the attribute has two arguments, the second
argument is misalignment offset.
432 Using the GNU Compiler Collection (GCC)
For instance
void* my_alloc1(size_t) __attribute__((assume_aligned(16)))
void* my_alloc2(size_t) __attribute__((assume_aligned(32, 8)))
declares that my_alloc1 returns 16-byte aligned pointer and that my_alloc2
returns a pointer whose value modulo 32 is equal to 8.
bnd_instrument
The bnd_instrument attribute on functions is used to inform the compiler
that the function should be instrumented when compiled with the
‘-fchkp-instrument-marked-only’ option.
bnd_legacy
The bnd_legacy attribute on functions is used to inform the compiler
that the function should not be instrumented when compiled with the
‘-fcheck-pointer-bounds’ option.
cold The cold attribute on functions is used to inform the compiler that the function
is unlikely to be executed. The function is optimized for size rather than speed
and on many targets it is placed into a special subsection of the text section
so all cold functions appear close together, improving code locality of non-cold
parts of program. The paths leading to calls of cold functions within code are
marked as unlikely by the branch prediction mechanism. It is thus useful to
mark functions used to handle unlikely conditions, such as perror, as cold to
improve optimization of hot functions that do call marked functions in rare
occasions.
When profile feedback is available, via ‘-fprofile-use’, cold functions are
automatically detected and this attribute is ignored.
const Many functions do not examine any values except their arguments, and have
no effects except the return value. Basically this is just slightly more strict
class than the pure attribute below, since function is not allowed to read global
memory.
Note that a function that has pointer arguments and examines the data pointed
to must not be declared const. Likewise, a function that calls a non-const
function usually must not be const. It does not make sense for a const function
to return void.
constructor
destructor
constructor (priority)
destructor (priority)
The constructor attribute causes the function to be called automatically be-
fore execution enters main (). Similarly, the destructor attribute causes the
function to be called automatically after main () completes or exit () is called.
Functions with these attributes are useful for initializing data that is used im-
plicitly during the execution of the program.
You may provide an optional integer priority to control the order in which
constructor and destructor functions are run. A constructor with a smaller
priority number runs before a constructor with a larger priority number; the
Chapter 6: Extensions to the C Language Family 433
opposite relationship holds for destructors. So, if you have a constructor that
allocates a resource and a destructor that deallocates the same resource, both
functions typically have the same priority. The priorities for constructor and
destructor functions are the same as those specified for namespace-scope C++
objects (see Section 7.7 [C++ Attributes], page 743). However, at present, the
order in which constructors for C++ objects with static storage duration and
functions decorated with attribute constructor are invoked is unspecified. In
mixed declarations, attribute init_priority can be used to impose a specific
ordering.
deprecated
deprecated (msg)
The deprecated attribute results in a warning if the function is used anywhere
in the source file. This is useful when identifying functions that are expected
to be removed in a future version of a program. The warning also includes the
location of the declaration of the deprecated function, to enable users to easily
find further information about why the function is deprecated, or what they
should do instead. Note that the warnings only occurs for uses:
int old_fn () __attribute__ ((deprecated));
int old_fn ();
int (*fn_ptr)() = old_fn;
results in a warning on line 3 but not line 2. The optional msg argument, which
must be a string, is printed in the warning if present.
The deprecated attribute can also be used for variables and types (see
Section 6.32 [Variable Attributes], page 474, see Section 6.33 [Type Attributes],
page 485.)
error ("message")
warning ("message")
If the error or warning attribute is used on a function declaration and a call to
such a function is not eliminated through dead code elimination or other opti-
mizations, an error or warning (respectively) that includes message is diagnosed.
This is useful for compile-time checking, especially together with __builtin_
constant_p and inline functions where checking the inline function arguments
is not possible through extern char [(condition) ? 1 : -1]; tricks.
While it is possible to leave the function undefined and thus invoke a link failure
(to define the function with a message in .gnu.warning* section), when using
these attributes the problem is diagnosed earlier and with exact location of
the call even in presence of inline functions or when not emitting debugging
information.
externally_visible
This attribute, attached to a global variable or function, nullifies the effect
of the ‘-fwhole-program’ command-line option, so the object remains visible
outside the current compilation unit.
If ‘-fwhole-program’ is used together with ‘-flto’ and gold is used as the
linker plugin, externally_visible attributes are automatically added to func-
tions (not variable yet due to a current gold issue) that are accessed outside of
434 Using the GNU Compiler Collection (GCC)
LTO objects according to resolution file produced by gold. For other linkers
that cannot generate resolution file, explicit externally_visible attributes
are still necessary.
flatten Generally, inlining into a function is limited. For a function marked with this
attribute, every call inside this function is inlined, if possible. Whether the
function itself is considered for inlining depends on its size and the current
inlining parameters.
format (archetype, string-index, first-to-check)
The format attribute specifies that a function takes printf, scanf, strftime
or strfmon style arguments that should be type-checked against a format string.
For example, the declaration:
extern int
my_printf (void *my_object, const char *my_format, ...)
__attribute__ ((format (printf, 2, 3)));
causes the compiler to check the arguments in calls to my_printf for consistency
with the printf style format string argument my_format.
The parameter archetype determines how the format string is interpreted, and
should be printf, scanf, strftime, gnu_printf, gnu_scanf, gnu_strftime
or strfmon. (You can also use __printf__, __scanf__, __strftime__ or __
strfmon__.) On MinGW targets, ms_printf, ms_scanf, and ms_strftime are
also present. archetype values such as printf refer to the formats accepted by
the system’s C runtime library, while values prefixed with ‘gnu_’ always refer to
the formats accepted by the GNU C Library. On Microsoft Windows targets,
values prefixed with ‘ms_’ refer to the formats accepted by the ‘msvcrt.dll’
library. The parameter string-index specifies which argument is the format
string argument (starting from 1), while first-to-check is the number of the
first argument to check against the format string. For functions where the
arguments are not available to be checked (such as vprintf), specify the third
parameter as zero. In this case the compiler only checks the format string for
consistency. For strftime formats, the third parameter is required to be zero.
Since non-static C++ methods have an implicit this argument, the arguments
of such methods should be counted from two, not one, when giving values for
string-index and first-to-check.
In the example above, the format string (my_format) is the second argument
of the function my_print, and the arguments to check start with the third
argument, so the correct parameters for the format attribute are 2 and 3.
The format attribute allows you to identify your own functions that take for-
mat strings as arguments, so that GCC can check the calls to these functions
for errors. The compiler always (unless ‘-ffreestanding’ or ‘-fno-builtin’
is used) checks formats for the standard library functions printf, fprintf,
sprintf, scanf, fscanf, sscanf, strftime, vprintf, vfprintf and vsprintf
whenever such warnings are requested (using ‘-Wformat’), so there is no need
to modify the header file ‘stdio.h’. In C99 mode, the functions snprintf,
vsnprintf, vscanf, vfscanf and vsscanf are also checked. Except in strictly
conforming C standard modes, the X/Open function strfmon is also checked
Chapter 6: Extensions to the C Language Family 435
If the function is declared extern, then this definition of the function is used
only for inlining. In no case is the function compiled as a standalone function,
not even if you take its address explicitly. Such an address becomes an external
reference, as if you had only declared the function, and had not defined it. This
has almost the effect of a macro. The way to use this is to put a function
definition in a header file with this attribute, and put another copy of the
function, without extern, in a library file. The definition in the header file
causes most calls to the function to be inlined. If any uses of the function
remain, they refer to the single copy in the library. Note that the two definitions
of the functions need not be precisely the same, although if they do not have
the same effect your program may behave oddly.
In C, if the function is neither extern nor static, then the function is compiled
as a standalone function, as well as being inlined where possible.
This is how GCC traditionally handled functions declared inline. Since ISO
C99 specifies a different semantics for inline, this function attribute is provided
as a transition measure and as a useful feature in its own right. This attribute
is available in GCC 4.1.3 and later. It is available if either of the preproces-
sor macros __GNUC_GNU_INLINE__ or __GNUC_STDC_INLINE__ are defined. See
Section 6.43 [An Inline Function is As Fast As a Macro], page 499.
In C++, this attribute does not depend on extern in any way, but it still requires
the inline keyword to enable its special behavior.
hot The hot attribute on a function is used to inform the compiler that the func-
tion is a hot spot of the compiled program. The function is optimized more
aggressively and on many targets it is placed into a special subsection of the
text section so all hot functions appear close together, improving locality.
When profile feedback is available, via ‘-fprofile-use’, hot functions are au-
tomatically detected and this attribute is ignored.
ifunc ("resolver")
The ifunc attribute is used to mark a function as an indirect function using the
STT GNU IFUNC symbol type extension to the ELF standard. This allows
the resolution of the symbol value to be determined dynamically at load time,
and an optimized version of the routine can be selected for the particular pro-
cessor or other system characteristics determined then. To use this attribute,
first define the implementation functions available, and a resolver function that
returns a pointer to the selected implementation function. The implementation
functions’ declarations must match the API of the function being implemented,
the resolver’s declaration is be a function returning pointer to void function
returning void:
void *my_memcpy (void *dst, const void *src, size_t len)
{
...
}
The exported header file declaring the function the user calls would contain:
extern void *memcpy (void *, const void *, size_t);
allowing the user to call this as a regular function, unaware of the implementa-
tion. Finally, the indirect function needs to be defined in the same translation
unit as the resolver function:
void *memcpy (void *, const void *, size_t)
__attribute__ ((ifunc ("resolve_memcpy")));
Indirect functions cannot be weak. Binutils version 2.20.1 or higher and GNU
C Library version 2.11.1 are required to use this feature.
interrupt
interrupt_handler
Many GCC back ends support attributes to indicate that a function is an in-
terrupt handler, which tells the compiler to generate function entry and exit
sequences that differ from those from regular functions. The exact syntax and
behavior are target-specific; refer to the following subsections for details.
leaf Calls to external functions with this attribute must return to the current com-
pilation unit only by return or by exception handling. In particular, a leaf
function is not allowed to invoke callback functions passed to it from the cur-
rent compilation unit, directly call functions exported by the unit, or longjmp
into the unit. Leaf functions might still call functions from other compilation
units and thus they are not necessarily leaf in the sense that they contain no
function calls at all.
The attribute is intended for library functions to improve dataflow analysis.
The compiler takes the hint that any data not escaping the current compilation
unit cannot be used or modified by the leaf function. For example, the sin
function is a leaf function, but qsort is not.
Note that leaf functions might indirectly run a signal handler defined in the
current compilation unit that uses static variables. Similarly, when lazy symbol
resolution is in effect, leaf functions might invoke indirect functions whose re-
solver function or implementation function is defined in the current compilation
unit and uses static variables. There is no standard-compliant way to write such
a signal handler, resolver function, or implementation function, and the best
that you can do is to remove the leaf attribute or mark all such static variables
volatile. Lastly, for ELF-based systems that support symbol interposition,
care should be taken that functions defined in the current compilation unit do
not unexpectedly interpose other symbols based on the defined standards mode
and defined feature test macros; otherwise an inadvertent callback would be
added.
The attribute has no effect on functions defined within the current compilation
unit. This is to allow easy merging of multiple compilation units into one, for
example, by using the link-time optimization. For this reason the attribute is
not allowed on types to annotate indirect calls.
malloc This tells the compiler that a function is malloc-like, i.e., that the pointer P
returned by the function cannot alias any other pointer valid when the func-
438 Using the GNU Compiler Collection (GCC)
tion returns, and moreover no pointers to valid objects occur in any storage
addressed by P.
Using this attribute can improve optimization. Functions like malloc and
calloc have this property because they return a pointer to uninitialized or
zeroed-out storage. However, functions like realloc do not have this property,
as they can return a pointer to storage containing pointers.
no_icf This function attribute prevents a functions from being merged with another
semantically equivalent function.
no_instrument_function
If ‘-finstrument-functions’ is given, profiling function calls are generated at
entry and exit of most user-compiled functions. Functions with this attribute
are not so instrumented.
no_profile_instrument_function
The no_profile_instrument_function attribute on functions is used to in-
form the compiler that it should not process any profile feedback based opti-
mization code instrumentation.
no_reorder
Do not reorder functions or variables marked no_reorder against each other or
top level assembler statements the executable. The actual order in the program
will depend on the linker command line. Static variables marked like this are
also not removed. This has a similar effect as the ‘-fno-toplevel-reorder’
option, but only applies to the marked symbols.
no_sanitize_address
no_address_safety_analysis
The no_sanitize_address attribute on functions is used to inform the com-
piler that it should not instrument memory accesses in the function when
compiling with the ‘-fsanitize=address’ option. The no_address_safety_
analysis is a deprecated alias of the no_sanitize_address attribute, new
code should use no_sanitize_address.
no_sanitize_thread
The no_sanitize_thread attribute on functions is used to inform the compiler
that it should not instrument memory accesses in the function when compiling
with the ‘-fsanitize=thread’ option.
no_sanitize_undefined
The no_sanitize_undefined attribute on functions is used to inform the com-
piler that it should not check for undefined behavior in the function when com-
piling with the ‘-fsanitize=undefined’ option.
no_split_stack
If ‘-fsplit-stack’ is given, functions have a small prologue which decides
whether to split the stack. Functions with the no_split_stack attribute do
not have that prologue, and thus may run with only a small amount of stack
space available.
Chapter 6: Extensions to the C Language Family 439
no_stack_limit
This attribute locally overrides the ‘-fstack-limit-register’ and
‘-fstack-limit-symbol’ command-line options; it has the effect of disabling
stack limit checking in the function it applies to.
noclone This function attribute prevents a function from being considered for cloning—a
mechanism that produces specialized copies of functions and which is (currently)
performed by interprocedural constant propagation.
noinline This function attribute prevents a function from being considered for inlining.
If the function does not have side-effects, there are optimizations other than
inlining that cause function calls to be optimized away, although the function
call is live. To keep such calls from being optimized away, put
asm ("");
(see Section 6.45.2 [Extended Asm], page 503) in the called function, to serve
as a special side-effect.
nonnull (arg-index, ...)
The nonnull attribute specifies that some function parameters should be non-
null pointers. For instance, the declaration:
extern void *
my_memcpy (void *dest, const void *src, size_t len)
__attribute__((nonnull (1, 2)));
causes the compiler to check that, in calls to my_memcpy, arguments dest and
src are non-null. If the compiler determines that a null pointer is passed in
an argument slot marked as non-null, and the ‘-Wnonnull’ option is enabled, a
warning is issued. The compiler may also choose to make optimizations based
on the knowledge that certain function arguments will never be null.
If no argument index list is given to the nonnull attribute, all pointer arguments
are marked as non-null. To illustrate, the following declaration is equivalent to
the previous example:
extern void *
my_memcpy (void *dest, const void *src, size_t len)
__attribute__((nonnull));
noplt The noplt attribute is the counterpart to option ‘-fno-plt’. Calls to functions
marked with this attribute in position-independent code do not use the PLT.
/* Externally defined function foo. */
int foo () __attribute__ ((noplt));
int
main (/* . . . */)
{
/* . . . */
foo ();
/* . . . */
}
The noplt attribute on function foo tells the compiler to assume that the
function foo is externally defined and that the call to foo must avoid the PLT
in position-independent code.
440 Using the GNU Compiler Collection (GCC)
void
fatal (/* . . . */)
{
/* . . . */ /* Print error message. */ /* . . . */
exit (1);
}
The noreturn keyword tells the compiler to assume that fatal cannot return.
It can then optimize without regard to what would happen if fatal ever did
return. This makes slightly better code. More importantly, it helps avoid
spurious warnings of uninitialized variables.
The noreturn keyword does not affect the exceptional path when that applies:
a noreturn-marked function may still return to the caller by throwing an ex-
ception or calling longjmp.
Do not assume that registers saved by the calling function are restored before
calling the noreturn function.
It does not make sense for a noreturn function to have a return type other
than void.
nothrow The nothrow attribute is used to inform the compiler that a function cannot
throw an exception. For example, most functions in the standard C library can
be guaranteed not to throw an exception with the notable exceptions of qsort
and bsearch that take function pointer arguments.
optimize The optimize attribute is used to specify that a function is to be compiled with
different optimization options than specified on the command line. Arguments
can either be numbers or strings. Numbers are assumed to be an optimization
level. Strings that begin with O are assumed to be an optimization option,
while other options are assumed to be used with a -f prefix. You can also
use the ‘#pragma GCC optimize’ pragma to set the optimization options that
affect more than one function. See Section 6.62.15 [Function Specific Option
Pragmas], page 730, for details about the ‘#pragma GCC optimize’ pragma.
This attribute should be used for debugging purposes only. It is not suitable in
production code.
pure Many functions have no effects except the return value and their return value
depends only on the parameters and/or global variables. Such a function can
be subject to common subexpression elimination and loop optimization just as
an arithmetic operator would be. These functions should be declared with the
attribute pure. For example,
int square (int) __attribute__ ((pure));
Chapter 6: Extensions to the C Language Family 441
says that the hypothetical function square is safe to call fewer times than the
program says.
Some common examples of pure functions are strlen or memcmp. Interest-
ing non-pure functions are functions with infinite loops or those depending on
volatile memory or other system resource, that may change between two con-
secutive calls (such as feof in a multithreading environment).
returns_nonnull
The returns_nonnull attribute specifies that the function return value should
be a non-null pointer. For instance, the declaration:
extern void *
mymalloc (size_t len) __attribute__((returns_nonnull));
lets the compiler optimize callers based on the knowledge that the return value
will never be null.
returns_twice
The returns_twice attribute tells the compiler that a function may return
more than one time. The compiler ensures that all registers are dead before
calling such a function and emits a warning about the variables that may be
clobbered after the second return from the function. Examples of such functions
are setjmp and vfork. The longjmp-like counterpart of such function, if any,
might need to be marked with the noreturn attribute.
section ("section-name")
Normally, the compiler places the code it generates in the text section. Some-
times, however, you need additional sections, or you need certain particular
functions to appear in special sections. The section attribute specifies that a
function lives in a particular section. For example, the declaration:
extern void foobar (void) __attribute__ ((section ("bar")));
puts the function foobar in the bar section.
Some file formats do not support arbitrary sections so the section attribute
is not available on all platforms. If you need to map the entire contents of a
module to a particular section, consider using the facilities of the linker instead.
sentinel This function attribute ensures that a parameter in a function call is an explicit
NULL. The attribute is only valid on variadic functions. By default, the sentinel
is located at position zero, the last parameter of the function call. If an optional
integer position argument P is supplied to the attribute, the sentinel must be
located at position P counting backwards from the end of the argument list.
__attribute__ ((sentinel))
is equivalent to
__attribute__ ((sentinel(0)))
The attribute is automatically set with a position of 0 for the built-in functions
execl and execlp. The built-in function execle has the attribute set with a
position of 1.
A valid NULL in this context is defined as zero with any pointer type. If your
system defines the NULL macro with an integer type then you need to add
an explicit cast. GCC replaces stddef.h with a copy that redefines NULL
appropriately.
442 Using the GNU Compiler Collection (GCC)
The warnings for missing or incorrect sentinels are enabled with ‘-Wformat’.
simd
simd("mask")
This attribute enables creation of one or more function versions that can process
multiple arguments using SIMD instructions from a single invocation. Speci-
fying this attribute allows compiler to assume that such versions are available
at link time (provided in the same or another translation unit). Generated
versions are target-dependent and described in the corresponding Vector ABI
document. For x86 64 target this document can be found here.
The optional argument mask may have the value notinbranch or inbranch,
and instructs the compiler to generate non-masked or masked clones corre-
spondingly. By default, all clones are generated.
The attribute should not be used together with Cilk Plus vector attribute on
the same function.
If the attribute is specified and #pragma omp declare simd is present on a
declaration and the ‘-fopenmp’ or ‘-fopenmp-simd’ switch is specified, then
the attribute is ignored.
stack_protect
This attribute adds stack protection code to the function if
flags ‘-fstack-protector’, ‘-fstack-protector-strong’ or
‘-fstack-protector-explicit’ are set.
target (options)
Multiple target back ends implement the target attribute to specify that a
function is to be compiled with different target options than specified on the
command line. This can be used for instance to have functions compiled with a
different ISA (instruction set architecture) than the default. You can also use
the ‘#pragma GCC target’ pragma to set more than one function to be compiled
with specific target options. See Section 6.62.15 [Function Specific Option Prag-
mas], page 730, for details about the ‘#pragma GCC target’ pragma.
For instance, on an x86, you could declare one function with
the target("sse4.1,arch=core2") attribute and another with
target("sse4a,arch=amdfam10"). This is equivalent to compiling the first
function with ‘-msse4.1’ and ‘-march=core2’ options, and the second function
with ‘-msse4a’ and ‘-march=amdfam10’ options. It is up to you to make sure
that a function is only invoked on a machine that supports the particular
ISA it is compiled for (for example by using cpuid on x86 to determine what
feature bits and architecture family are used).
int core2_func (void) __attribute__ ((__target__ ("arch=core2")));
int sse3_func (void) __attribute__ ((__target__ ("sse3")));
You can either use multiple strings separated by commas to specify multiple
options, or separate the options with a comma (‘,’) within a single string.
The options supported are specific to each target; refer to Section 6.31.32
[x86 Function Attributes], page 469, Section 6.31.23 [PowerPC Function At-
tributes], page 462, Section 6.31.4 [ARM Function Attributes], page 448,and
Section 6.31.21 [Nios II Function Attributes], page 461, for details.
Chapter 6: Extensions to the C Language Family 443
target_clones (options)
The target_clones attribute is used to specify that a function be cloned into
multiple versions compiled with different target options than specified on the
command line. The supported options and restrictions are the same as for
target attribute.
For instance, on an x86, you could compile a function with target_
clones("sse4.1,avx"). GCC creates two function clones, one compiled
with ‘-msse4.1’ and another with ‘-mavx’. It also creates a resolver function
(see the ifunc attribute above) that dynamically selects a clone suitable for
current architecture.
unused This attribute, attached to a function, means that the function is meant to be
possibly unused. GCC does not produce a warning for this function.
used This attribute, attached to a function, means that code must be emitted for the
function even if it appears that the function is not referenced. This is useful,
for example, when the function is referenced only in inline assembly.
When applied to a member function of a C++ class template, the attribute also
means that the function is instantiated if the class itself is instantiated.
visibility ("visibility_type")
This attribute affects the linkage of the declaration to which it is attached. It
can be applied to variables (see Section 6.32.1 [Common Variable Attributes],
page 475) and types (see Section 6.33.1 [Common Type Attributes], page 485)
as well as functions.
There are four supported visibility type values: default, hidden, protected or
internal visibility.
void __attribute__ ((visibility ("protected")))
f () { /* Do something. */; }
int i __attribute__ ((visibility ("hidden")));
The possible values of visibility type correspond to the visibility settings in the
ELF gABI.
default Default visibility is the normal case for the object file format. This
value is available for the visibility attribute to override other options
that may change the assumed visibility of entities.
On ELF, default visibility means that the declaration is visible to
other modules and, in shared libraries, means that the declared
entity may be overridden.
On Darwin, default visibility means that the declaration is visible
to other modules.
Default visibility corresponds to “external linkage” in the language.
hidden Hidden visibility indicates that the entity declared has a new form
of linkage, which we call “hidden linkage”. Two declarations of an
object with hidden linkage refer to the same object if they are in
the same shared object.
internal Internal visibility is like hidden visibility, but with additional pro-
cessor specific semantics. Unless otherwise specified by the psABI,
444 Using the GNU Compiler Collection (GCC)
functions where not checking the result is either a security problem or always
a bug, such as realloc.
int fn () __attribute__ ((warn_unused_result));
int foo ()
{
if (fn () < 0) return -1;
fn ();
return 0;
}
results in warning on line 5.
weak The weak attribute causes the declaration to be emitted as a weak symbol
rather than a global. This is primarily useful in defining library functions that
can be overridden in user code, though it can also be used with non-function
declarations. Weak symbols are supported for ELF targets, and also for a.out
targets when using the GNU assembler and linker.
weakref
weakref ("target")
The weakref attribute marks a declaration as a weak reference. Without ar-
guments, it should be accompanied by an alias attribute naming the target
symbol. Optionally, the target may be given as an argument to weakref itself.
In either case, weakref implicitly marks the declaration as weak. Without a
target, given as an argument to weakref or to alias, weakref is equivalent to
weak.
static int x() __attribute__ ((weakref ("y")));
/* is equivalent to... */
static int x() __attribute__ ((weak, weakref, alias ("y")));
/* and to... */
static int x() __attribute__ ((weakref));
static int x() __attribute__ ((alias ("y")));
A weak reference is an alias that does not by itself require a definition to be
given for the target symbol. If the target symbol is only referenced through
weak references, then it becomes a weak undefined symbol. If it is directly
referenced, however, then such strong references prevail, and a definition is
required for the symbol, not necessarily in the same translation unit.
The effect is equivalent to moving all references to the alias to a separate trans-
lation unit, renaming the alias to the aliased symbol, declaring it as weak,
compiling the two separate translation units and performing a reloadable link
on them.
At present, a declaration to which weakref is attached can only be static.
point code, then the compiler gives an error. This is the same behavior as that
of the command-line option ‘-mgeneral-regs-only’.
fix-cortex-a53-835769
Indicates that the workaround for the Cortex-A53 erratum 835769 should be
applied to this function. To explicitly disable the workaround for this function
specify the negated form: no-fix-cortex-a53-835769. This corresponds to
the behavior of the command line options ‘-mfix-cortex-a53-835769’ and
‘-mno-fix-cortex-a53-835769’.
cmodel= Indicates that code should be generated for a particular code model for this
function. The behavior and permissible arguments are the same as for the
command line option ‘-mcmodel=’.
strict-align
Indicates that the compiler should not assume that unaligned memory refer-
ences are handled by the system. The behavior is the same as for the command-
line option ‘-mstrict-align’.
omit-leaf-frame-pointer
Indicates that the frame pointer should be omitted for a leaf function
call. To keep the frame pointer, the inverse attribute no-omit-leaf-
frame-pointer can be specified. These attributes have the same
behavior as the command-line options ‘-momit-leaf-frame-pointer’ and
‘-mno-omit-leaf-frame-pointer’.
tls-dialect=
Specifies the TLS dialect to use for this function. The behavior and permissible
arguments are the same as for the command-line option ‘-mtls-dialect=’.
arch= Specifies the architecture version and architectural extensions to use for this
function. The behavior and permissible arguments are the same as for the
‘-march=’ command-line option.
tune= Specifies the core for which to tune the performance of this function. The behav-
ior and permissible arguments are the same as for the ‘-mtune=’ command-line
option.
cpu= Specifies the core for which to tune the performance of this function and also
whose architectural features to use. The behavior and valid arguments are the
same as for the ‘-mcpu=’ command-line option.
sign-return-address
Select the function scope on which return address signing will be applied. The
behavior and permissible arguments are the same as for the command-line op-
tion ‘-msign-return-address=’. The default value is none.
The above target attributes can be specified as follows:
__attribute__((target("attr-string")))
int
f (int a)
{
return a + 5;
Chapter 6: Extensions to the C Language Family 447
In this example target("+crc+nocrypto") enables the crc extension and disables the
crypto extension for the function foo without modifying an existing ‘-march=’ or ‘-mcpu’
option.
Multiple target function attributes can be specified by separating them with a comma.
For example:
__attribute__((target("arch=armv8-a+crc+crypto,tune=cortex-a53")))
int
foo (int a)
{
return a + 5;
}
is valid and compiles function foo for ARMv8-A with crc and crypto extensions and
tunes it for cortex-a53.
interrupt
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present.
On the ARC, you must specify the kind of interrupt to be handled in a param-
eter to the interrupt attribute like this:
void f () __attribute__ ((interrupt ("ilink1")));
Permissible values for this parameter are: ilink1 and ilink2.
long_call
medium_call
short_call
These attributes specify how a particular function is called. These attributes
override the ‘-mlong-calls’ and ‘-mmedium-calls’ (see Section 3.18.3 [ARC
Options], page 223) command-line switches and #pragma long_calls settings.
For ARC, a function marked with the long_call attribute is always called
using register-indirect jump-and-link instructions, thereby enabling the called
function to be placed anywhere within the 32-bit address space. A function
marked with the medium_call attribute will always be close enough to be called
with an unconditional branch-and-link instruction, which has a 25-bit offset
from the call site. A function marked with the short_call attribute will always
be close enough to be called with a conditional branch-and-link instruction,
which has a 21-bit offset from the call site.
and require a different (more expensive) calling sequence. The short_call at-
tribute always places the offset to the function from the call site into the ‘BL’
instruction directly.
naked This attribute allows the compiler to construct the requisite function decla-
ration, while allowing the body of the function to be assembly code. The
specified function will not have prologue/epilogue sequences generated by the
compiler. Only basic asm statements can safely be included in naked functions
(see Section 6.45.1 [Basic Asm], page 501). While using extended asm or a mix-
ture of basic asm and C code may appear to work, they cannot be depended
upon to work reliably and are not supported.
pcs
The pcs attribute can be used to control the calling convention used for a
function on ARM. The attribute takes an argument that specifies the calling
convention to use.
When compiling using the AAPCS ABI (or a variant of it) then valid values for
the argument are "aapcs" and "aapcs-vfp". In order to use a variant other
than "aapcs" then the compiler must be permitted to use the appropriate co-
processor registers (i.e., the VFP registers must be available in order to use
"aapcs-vfp"). For example,
/* Argument passed in r0, and result returned in r0+r1. */
double f2d (float) __attribute__((pcs("aapcs")));
Variadic functions always use the "aapcs" calling convention and the compiler
rejects attempts to specify an alternative.
target (options)
As discussed in Section 6.31.1 [Common Function Attributes], page 430, this
attribute allows specification of target-specific compilation options.
On ARM, the following options are allowed:
‘thumb’ Force code generation in the Thumb (T16/T32) ISA, depending on
the architecture level.
‘arm’ Force code generation in the ARM (A32) ISA.
Functions from different modes can be inlined in the caller’s mode.
‘fpu=’ Specifies the fpu for which to tune the performance of this function.
The behavior and permissible arguments are the same as for the
‘-mfpu=’ command-line option.
attribute that does not insert a SEI instruction. If both signal and interrupt
are specified for the same function, signal is silently ignored.
naked This attribute allows the compiler to construct the requisite function decla-
ration, while allowing the body of the function to be assembly code. The
specified function will not have prologue/epilogue sequences generated by the
compiler. Only basic asm statements can safely be included in naked functions
(see Section 6.45.1 [Basic Asm], page 501). While using extended asm or a mix-
ture of basic asm and C code may appear to work, they cannot be depended
upon to work reliably and are not supported.
OS_main
OS_task On AVR, functions with the OS_main or OS_task attribute do not save/restore
any call-saved register in their prologue/epilogue.
The OS_main attribute can be used when there is guarantee that interrupts are
disabled at the time when the function is entered. This saves resources when
the stack pointer has to be changed to set up a frame for local variables.
The OS_task attribute can be used when there is no guarantee that interrupts
are disabled at that time when the function is entered like for, e.g. task functions
in a multi-threading operating system. In that case, changing the stack pointer
register is guarded by save/clear/restore of the global interrupt enable flag.
The differences to the naked function attribute are:
• naked functions do not have a return instruction whereas OS_main and
OS_task functions have a RET or RETI return instruction.
• naked functions do not set up a frame for local variables or a frame pointer
whereas OS_main and OS_task do this as needed.
signal Use this attribute on the AVR to indicate that the specified function is an
interrupt handler. The compiler generates function entry and exit sequences
suitable for use in an interrupt handler when this attribute is present.
See also the interrupt function attribute.
The AVR hardware globally disables interrupts when an interrupt is executed.
Interrupt handler functions defined with the signal attribute do not re-enable
interrupts. It is save to enable interrupts in a signal handler. This “save” only
applies to the code generated by the compiler and not to the IRQ layout of the
application which is responsibility of the application.
If both signal and interrupt are specified for the same function, signal is
silently ignored.
interrupt_handler
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present.
kspisusp When used together with interrupt_handler, exception_handler or nmi_
handler, code is generated to load the stack pointer from the USP register in
the function prologue.
l1_text This attribute specifies a function to be placed into L1 Instruction SRAM.
The function is put into a specific section named .l1.text. With ‘-mfdpic’,
function calls with a such function as the callee or caller uses inlined PLT.
l2 This attribute specifies a function to be placed into L2 SRAM. The function
is put into a specific section named .l2.text. With ‘-mfdpic’, callers of such
functions use an inlined PLT.
longcall
shortcall
The longcall attribute indicates that the function might be far away from
the call site and require a different (more expensive) calling sequence. The
shortcall attribute indicates that the function is always close enough for the
shorter calling sequence to be used. These attributes override the ‘-mlongcall’
switch.
nesting Use this attribute together with interrupt_handler, exception_handler or
nmi_handler to indicate that the function entry code should enable nested
interrupts or exceptions.
nmi_handler
Use this attribute on the Blackfin to indicate that the specified function is an
NMI handler. The compiler generates function entry and exit sequences suitable
for use in an NMI handler when this attribute is present.
saveall Use this attribute to indicate that all registers except the stack pointer should
be saved in the prologue regardless of whether they are used or not.
forwarder_section
This attribute modifies the behavior of an interrupt handler. The interrupt
handler may be in external memory which cannot be reached by a branch
instruction, so generate a local memory trampoline to transfer control. The
single parameter identifies the section where the trampoline is placed.
interrupt
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present. It may also generate a special
section with code to initialize the interrupt vector table.
On Epiphany targets one or more optional parameters can be added like this:
void __attribute__ ((interrupt ("dma0, dma1"))) universal_dma_handler ();
Permissible values for these parameters are: reset, software_exception,
page_miss, timer0, timer1, message, dma0, dma1, wand and swi. Multiple
parameters indicate that multiple entries in the interrupt vector table should
be initialized for this function, i.e. for each parameter name, a jump to the
function is emitted in the section ivt entry name. The parameter(s) may be
omitted entirely, in which case no interrupt vector table entry is provided.
Note that interrupts are enabled inside the function unless the disinterrupt
attribute is also specified.
The following examples are all valid uses of these attributes on Epiphany tar-
gets:
void __attribute__ ((interrupt)) universal_handler ();
void __attribute__ ((interrupt ("dma1"))) dma1_handler ();
void __attribute__ ((interrupt ("dma0, dma1")))
universal_dma_handler ();
void __attribute__ ((interrupt ("timer0"), disinterrupt))
fast_timer_handler ();
void __attribute__ ((interrupt ("dma0, dma1"),
forwarder_section ("tramp")))
external_dma_handler ();
long_call
short_call
These attributes specify how a particular function is called. These attributes
override the ‘-mlong-calls’ (see Section 3.18.2 [Adapteva Epiphany Options],
page 221) command-line switch and #pragma long_calls settings.
function_vector
Use this attribute on the H8/300, H8/300H, and H8S to indicate that the spec-
ified function should be called through the function vector. Calling a function
through the function vector reduces code size; however, the function vector
has a limited size (maximum 128 entries on the H8/300 and 64 entries on the
H8/300H and H8S) and shares space with the interrupt vector.
Chapter 6: Extensions to the C Language Family 453
interrupt_handler
Use this attribute on the H8/300, H8/300H, and H8S to indicate that the
specified function is an interrupt handler. The compiler generates function
entry and exit sequences suitable for use in an interrupt handler when this
attribute is present.
saveall Use this attribute on the H8/300, H8/300H, and H8S to indicate that all reg-
isters except the stack pointer should be saved in the prologue regardless of
whether they are used or not.
routines should get mapped within the address range 0x0F0000 to 0x0FFFFF
(for M16C) and 0xFF0000 to 0xFFFFFF (for M32C).
In the following example 2 bytes are saved for each call to function foo.
void foo (void) __attribute__((function_vector(0x18)));
void foo (void)
{
}
If functions are defined in one file and are called in another file, then be sure
to write this declaration in both files.
This attribute is ignored for R8C target.
interrupt
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present.
interrupt
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present.
model (model-name)
On the M32R/D, use this attribute to set the addressability of an object, and of
the code generated for a function. The identifier model-name is one of small,
medium, or large, representing each of the code models.
Small model objects live in the lower 16MB of memory (so that their addresses
can be loaded with the ld24 instruction), and are callable with the bl instruc-
tion.
Medium model objects may live anywhere in the 32-bit address space (the
compiler generates seth/add3 instructions to load their addresses), and are
callable with the bl instruction.
Large model objects may live anywhere in the 32-bit address space (the com-
piler generates seth/add3 instructions to load their addresses), and may not
be reachable with the bl instruction (the compiler generates the much slower
seth/add3/jl instruction sequence).
interrupt
interrupt_handler
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present. Either name may be used.
interrupt_thread
Use this attribute on fido, a subarchitecture of the m68k, to indicate that the
specified function is an interrupt handler that is designed to run as a thread.
The compiler omits generate prologue/epilogue sequences and replaces the re-
turn instruction with a sleep instruction. This attribute is available only on
fido.
save_volatiles
Use this attribute to indicate that the function is an interrupt handler. All
volatile registers (in addition to non-volatile registers) are saved in the function
prologue. If the function is a leaf function, only volatiles used by the function
are saved. A normal function return is generated instead of a return from
interrupt.
break_handler
Use this attribute to indicate that the specified function is a break handler.
The compiler generates function entry and exit sequences suitable for use in an
break handler when this attribute is present. The return from break_handler
is done through the rtbd instead of rtsd.
void f () __attribute__ ((break_handler));
interrupt_handler
fast_interrupt
These attributes indicate that the specified function is an interrupt handler.
Use the fast_interrupt attribute to indicate handlers used in low-latency
interrupt mode, and interrupt_handler for interrupts that do not use low-
latency handlers. In both cases, GCC emits appropriate prologue code and
generates a return from the handler using rtid instead of rtsd.
dllimport
On Microsoft Windows and Symbian OS targets, the dllimport attribute
causes the compiler to reference a function or variable via a global pointer
to a pointer that is set up by the DLL exporting the symbol. The attribute
implies extern. On Microsoft Windows targets, the pointer name is formed by
combining _imp__ and the function or variable name.
You can use __declspec(dllimport) as a synonym for __attribute__
((dllimport)) for compatibility with other compilers.
On systems that support the visibility attribute, this attribute also implies
“default” visibility. It is an error to explicitly specify any other visibility.
Currently, the attribute is ignored for inlined functions. If the attribute is ap-
plied to a symbol definition, an error is reported. If a symbol previously declared
dllimport is later defined, the attribute is ignored in subsequent references,
and a warning is emitted. The attribute is also overridden by a subsequent
declaration as dllexport.
When applied to C++ classes, the attribute marks non-inlined member functions
and static data members as imports. However, the attribute is ignored for
virtual methods to allow creation of vtables using thunks.
On the SH Symbian OS target the dllimport attribute also has another affect—
it can cause the vtable and run-time type information for a class to be exported.
This happens when the class has a dllimported constructor or a non-inline, non-
pure virtual function and, for either of those two conditions, the class also has
an inline constructor or destructor and has a key function that is defined in the
current translation unit.
For Microsoft Windows targets the use of the dllimport attribute on functions
is not necessary, but provides a small performance benefit by eliminating a
thunk in the DLL. The use of the dllimport attribute on imported variables
can be avoided by passing the ‘--enable-auto-import’ switch to the GNU
linker. As with functions, using the attribute for a variable eliminates a thunk
in the DLL.
One drawback to using this attribute is that a pointer to a variable marked
as dllimport cannot be used as a constant address. However, a pointer to a
function with the dllimport attribute can be used as a constant initializer;
in this case, the address of a stub function in the import lib is referenced.
On Microsoft Windows targets, the attribute can be disabled for functions by
setting the ‘-mnop-fun-dllimport’ flag.
controller (EIC) mode is in use, this can be explicitly set using eic. When
interrupts are non-masked then the requested Interrupt Priority Level
(IPL) is copied to the current IPL which has the effect of only enabling
higher priority interrupts. To use vectored interrupt mode use the argument
vector=[sw0|sw1|hw0|hw1|hw2|hw3|hw4|hw5], this will change the behavior
of the non-masked interrupt support and GCC will arrange to mask all
interrupts from sw0 up to and including the specified interrupt vector.
You can use the following attributes to modify the behavior of an interrupt
handler:
use_shadow_register_set
Assume that the handler uses a shadow register set, instead of the
main general-purpose registers. An optional argument intstack is
supported to indicate that the shadow register set contains a valid
stack pointer.
keep_interrupts_masked
Keep interrupts masked for the whole function. Without this at-
tribute, GCC tries to reenable interrupts for as much of the function
as it can.
use_debug_exception_return
Return using the deret instruction. Interrupt handlers that don’t
have this attribute return using eret instead.
long_call
near
far These attributes specify how a particular function is called on MIPS. The
attributes override the ‘-mlong-calls’ (see Section 3.18.26 [MIPS Options],
page 284) command-line switch. The long_call and far attributes are syn-
onyms, and cause the compiler to always call the function by first loading its
address into a register, and then using the contents of that register. The near
attribute has the opposite effect; it specifies that non-PIC calls should be made
using the more efficient jal instruction.
Chapter 6: Extensions to the C Language Family 459
mips16
nomips16
On MIPS targets, you can use the mips16 and nomips16 function attributes to
locally select or turn off MIPS16 code generation. A function with the mips16
attribute is emitted as MIPS16 code, while MIPS16 code generation is dis-
abled for functions with the nomips16 attribute. These attributes override the
‘-mips16’ and ‘-mno-mips16’ options on the command line (see Section 3.18.26
[MIPS Options], page 284).
When compiling files containing mixed MIPS16 and non-MIPS16 code, the pre-
processor symbol __mips16 reflects the setting on the command line, not that
within individual functions. Mixed MIPS16 and non-MIPS16 code may inter-
act badly with some GCC extensions such as __builtin_apply (see Section 6.5
[Constructing Calls], page 410).
micromips, MIPS
nomicromips, MIPS
On MIPS targets, you can use the micromips and nomicromips function at-
tributes to locally select or turn off microMIPS code generation. A function with
the micromips attribute is emitted as microMIPS code, while microMIPS code
generation is disabled for functions with the nomicromips attribute. These
attributes override the ‘-mmicromips’ and ‘-mno-micromips’ options on the
command line (see Section 3.18.26 [MIPS Options], page 284).
When compiling files containing mixed microMIPS and non-microMIPS code,
the preprocessor symbol __mips_micromips reflects the setting on the com-
mand line, not that within individual functions. Mixed microMIPS and non-
microMIPS code may interact badly with some GCC extensions such as __
builtin_apply (see Section 6.5 [Constructing Calls], page 410).
nocompression
On MIPS targets, you can use the nocompression function attribute to locally
turn off MIPS16 and microMIPS code generation. This attribute overrides the
‘-mips16’ and ‘-mmicromips’ options on the command line (see Section 3.18.26
[MIPS Options], page 284).
is a name it is treated as a symbolic name for the vector slot. These names
should match up with appropriate entries in the linker script. By default the
names watchdog for vector 26, nmi for vector 30 and reset for vector 31 are
recognized.
naked This attribute allows the compiler to construct the requisite function decla-
ration, while allowing the body of the function to be assembly code. The
specified function will not have prologue/epilogue sequences generated by the
compiler. Only basic asm statements can safely be included in naked functions
(see Section 6.45.1 [Basic Asm], page 501). While using extended asm or a mix-
ture of basic asm and C code may appear to work, they cannot be depended
upon to work reliably and are not supported.
reentrant
Reentrant functions disable interrupts upon entry and enable them upon exit.
Reentrant functions cannot also have the naked or critical attributes. They
can have the interrupt attribute.
wakeup This attribute only applies to interrupt functions. It is silently ignored if ap-
plied to a non-interrupt function. A wakeup interrupt function will rouse the
processor from any low-power state that it might be in when the function exits.
lower
upper
either On the MSP430 target these attributes can be used to specify whether the
function or variable should be placed into low memory, high memory, or the
placement should be left to the linker to decide. The attributes are only signif-
icant if compiling for the MSP430X architecture.
The attributes work in conjunction with a linker script that has been augmented
to specify where to place sections with a .lower and a .upper prefix. So,
for example, as well as placing the .data section, the script also specifies the
placement of a .lower.data and a .upper.data section. The intention is that
lower sections are placed into a small but easier to access memory region and
the upper sections are placed into a larger, but slower to access, region.
The either attribute is special. It tells the linker to place the object into the
corresponding lower section if there is room for it. If there is insufficient room
then the object is placed into the corresponding upper section instead. Note
that the placement algorithm is not very sophisticated. It does not attempt to
find an optimal packing of the lower sections. It just makes one pass over the
objects and does the best that it can. Using the ‘-ffunction-sections’ and
‘-fdata-sections’ command-line options can help the packing, however, since
they produce smaller, easier to pack regions.
interrupt
On NDS32 target, this attribute indicates that the specified function is an
interrupt handler. The compiler generates corresponding sections for use in an
interrupt handler. You can use the following attributes to modify the behavior:
nested This interrupt service routine is interruptible.
not_nested
This interrupt service routine is not interruptible.
nested_ready
This interrupt service routine is interruptible after PSW.GIE (global
interrupt enable) is set. This allows interrupt service routine to
finish some short critical code before enabling interrupts.
save_all The system will help save all registers into stack before entering
interrupt handler.
partial_save
The system will help save caller registers into stack before entering
interrupt handler.
naked This attribute allows the compiler to construct the requisite function decla-
ration, while allowing the body of the function to be assembly code. The
specified function will not have prologue/epilogue sequences generated by the
compiler. Only basic asm statements can safely be included in naked functions
(see Section 6.45.1 [Basic Asm], page 501). While using extended asm or a mix-
ture of basic asm and C code may appear to work, they cannot be depended
upon to work reliably and are not supported.
reset Use this attribute on the NDS32 target to indicate that the specified function
is a reset handler. The compiler will generate corresponding sections for use in
a reset handler. You can use the following attributes to provide extra exception
handling:
nmi Provide a user-defined function to handle NMI exception.
warm Provide a user-defined function to handle warm reset exception.
‘custom-fpu-cfg=name’
This attribute corresponds to the ‘-mcustom-fpu-cfg=name’
command-line option, to select a predefined set of custom
instructions named name. See Section 3.18.32 [Nios II Options],
page 303, for more information.
kernel This attribute indicates that the corresponding function should be compiled
as a kernel function, which can be invoked from the host via the CUDA RT
library. By default functions are only callable only from other PTX functions.
Kernel functions must have void return type.
longcall
shortcall
The longcall attribute indicates that the function might be far away from
the call site and require a different (more expensive) calling sequence. The
shortcall attribute indicates that the function is always close enough for
the shorter calling sequence to be used. These attributes override both the
‘-mlongcall’ switch and the #pragma longcall setting.
See Section 3.18.39 [RS/6000 and PowerPC Options], page 313, for more infor-
mation on whether long calls are necessary.
target (options)
As discussed in Section 6.31.1 [Common Function Attributes], page 430, this
attribute allows specification of target-specific compilation options.
On the PowerPC, the following options are allowed:
‘altivec’
‘no-altivec’
Generate code that uses (does not use) AltiVec instructions.
In 32-bit code, you cannot enable AltiVec instructions unless
‘-mabi=altivec’ is used on the command line.
‘cmpb’
‘no-cmpb’ Generate code that uses (does not use) the compare bytes instruc-
tion implemented on the POWER6 processor and other processors
that support the PowerPC V2.05 architecture.
Chapter 6: Extensions to the C Language Family 463
‘dlmzb’
‘no-dlmzb’
Generate code that uses (does not use) the string-search ‘dlmzb’
instruction on the IBM 405, 440, 464 and 476 processors. This
instruction is generated by default when targeting those processors.
‘fprnd’
‘no-fprnd’
Generate code that uses (does not use) the FP round to integer
instructions implemented on the POWER5+ processor and other
processors that support the PowerPC V2.03 architecture.
‘hard-dfp’
‘no-hard-dfp’
Generate code that uses (does not use) the decimal floating-point
instructions implemented on some POWER processors.
‘isel’
‘no-isel’ Generate code that uses (does not use) ISEL instruction.
‘mfcrf’
‘no-mfcrf’
Generate code that uses (does not use) the move from condition
register field instruction implemented on the POWER4 processor
and other processors that support the PowerPC V2.01 architecture.
‘mfpgpr’
‘no-mfpgpr’
Generate code that uses (does not use) the FP move to/from gen-
eral purpose register instructions implemented on the POWER6X
processor and other processors that support the extended PowerPC
V2.05 architecture.
‘mulhw’
‘no-mulhw’
Generate code that uses (does not use) the half-word multiply and
multiply-accumulate instructions on the IBM 405, 440, 464 and
476 processors. These instructions are generated by default when
targeting those processors.
‘multiple’
‘no-multiple’
Generate code that uses (does not use) the load multiple word
instructions and the store multiple word instructions.
‘update’
‘no-update’
Generate code that uses (does not use) the load or store instruc-
tions that update the base register to the address of the calculated
memory location.
464 Using the GNU Compiler Collection (GCC)
‘popcntb’
‘no-popcntb’
Generate code that uses (does not use) the popcount and double-
precision FP reciprocal estimate instruction implemented on the
POWER5 processor and other processors that support the Pow-
erPC V2.02 architecture.
‘popcntd’
‘no-popcntd’
Generate code that uses (does not use) the popcount instruction
implemented on the POWER7 processor and other processors that
support the PowerPC V2.06 architecture.
‘powerpc-gfxopt’
‘no-powerpc-gfxopt’
Generate code that uses (does not use) the optional PowerPC archi-
tecture instructions in the Graphics group, including floating-point
select.
‘powerpc-gpopt’
‘no-powerpc-gpopt’
Generate code that uses (does not use) the optional PowerPC ar-
chitecture instructions in the General Purpose group, including
floating-point square root.
‘recip-precision’
‘no-recip-precision’
Assume (do not assume) that the reciprocal estimate instructions
provide higher-precision estimates than is mandated by the Pow-
erPC ABI.
‘string’
‘no-string’
Generate code that uses (does not use) the load string instructions
and the store string word instructions to save multiple registers and
do small block moves.
‘vsx’
‘no-vsx’ Generate code that uses (does not use) vector/scalar (VSX) in-
structions, and also enable the use of built-in functions that allow
more direct access to the VSX instruction set. In 32-bit code, you
cannot enable VSX or AltiVec instructions unless ‘-mabi=altivec’
is used on the command line.
‘friz’
‘no-friz’ Generate (do not generate) the friz instruction when the
‘-funsafe-math-optimizations’ option is used to optimize
rounding a floating-point value to 64-bit integer and back to
floating point. The friz instruction does not return the same
value if the floating-point number is too large to fit in an integer.
Chapter 6: Extensions to the C Language Family 465
‘avoid-indexed-addresses’
‘no-avoid-indexed-addresses’
Generate code that tries to avoid (not avoid) the use of indexed
load or store instructions.
‘paired’
‘no-paired’
Generate code that uses (does not use) the generation of PAIRED
simd instructions.
‘longcall’
‘no-longcall’
Generate code that assumes (does not assume) that all calls are far
away so that a longer more expensive calling sequence is required.
‘cpu=CPU’ Specify the architecture to generate code for when compiling the
function. If you select the target("cpu=power7") attribute when
generating 32-bit code, VSX and AltiVec instructions are not gen-
erated unless you use the ‘-mabi=altivec’ option on the command
line.
‘tune=TUNE’
Specify the architecture to tune for when compiling the function.
If you do not specify the target("tune=TUNE") attribute and you
do specify the target("cpu=CPU") attribute, compilation tunes for
the CPU architecture, and not the default tuning specified on the
command line.
On the PowerPC, the inliner does not inline a function that has different target
options than the caller, unless the callee has a subset of the target options of
the caller.
naked This attribute allows the compiler to construct the requisite function decla-
ration, while allowing the body of the function to be assembly code. The
specified function will not have prologue/epilogue sequences generated by the
compiler. Only basic asm statements can safely be included in naked functions
(see Section 6.45.1 [Basic Asm], page 501). While using extended asm or a mix-
ture of basic asm and C code may appear to work, they cannot be depended
upon to work reliably and are not supported.
vector This RX attribute is similar to the interrupt attribute, including its parame-
ters, but does not make the function an interrupt-handler type function (i.e. it
retains the normal C function calling ABI). See the interrupt attribute for a
description of its arguments.
of halfwords to be added after the function label. For both arguments the
maximum allowed value is 1000000.
If both arguments are zero, hotpatching is disabled.
target (options)
As discussed in Section 6.31.1 [Common Function Attributes], page 430, this
attribute allows specification of target-specific compilation options.
On S/390, the following options are supported:
‘arch=’
‘tune=’
‘stack-guard=’
‘stack-size=’
‘branch-cost=’
‘warn-framesize=’
‘backchain’
‘no-backchain’
‘hard-dfp’
‘no-hard-dfp’
‘hard-float’
‘soft-float’
‘htm’
‘no-htm’
‘vx’
‘no-vx’
‘packed-stack’
‘no-packed-stack’
‘small-exec’
‘no-small-exec’
‘mvcle’
‘no-mvcle’
‘warn-dynamicstack’
‘no-warn-dynamicstack’
The options work exactly like the S/390 specific command line options (without
the prefix ‘-m’) except that they do not change any feature macros. For example,
target("no-vx")
does not undefine the __VEC__ macro.
the start of the vector table before any functions with this attribute are invoked.
Usually a good place to do the initialization is the startup routine. The TBR
relative vector table can have at max 256 function entries. The jumps to these
functions are generated using a SH2A specific, non delayed branch instruction
JSR/N @(disp8,TBR). You must use GAS and GLD from GNU binutils version
2.7 or later for this attribute to work correctly.
In an application, for a function being called once, this attribute saves at least 8
bytes of code; and if other successive calls are being made to the same function,
it saves 2 bytes of code per each of these calls.
interrupt_handler
Use this attribute to indicate that the specified function is an interrupt handler.
The compiler generates function entry and exit sequences suitable for use in an
interrupt handler when this attribute is present.
nosave_low_regs
Use this attribute on SH targets to indicate that an interrupt_handler func-
tion should not save and restore registers R0..R7. This can be used on SH3*
and SH4* targets that have a second R0..R7 register bank for non-reentrant
interrupt handlers.
renesas On SH targets this attribute specifies that the function or struct follows the
Renesas ABI.
resbank On the SH2A target, this attribute enables the high-speed register saving and
restoration using a register bank for interrupt_handler routines. Saving to
the bank is performed automatically after the CPU accepts an interrupt that
uses a register bank.
The nineteen 32-bit registers comprising general register R0 to R14, control
register GBR, and system registers MACH, MACL, and PR and the vector
table address offset are saved into a register bank. Register banks are stacked
in first-in last-out (FILO) sequence. Restoration from the bank is executed by
issuing a RESBANK instruction.
sp_switch
Use this attribute on the SH to indicate an interrupt_handler function should
switch to an alternate stack. It expects a string argument that names a global
variable holding the address of the alternate stack.
void *alt_stack;
void f () __attribute__ ((interrupt_handler,
sp_switch ("alt_stack")));
trap_exit
Use this attribute on the SH for an interrupt_handler to return using trapa
instead of rte. This attribute expects an integer argument specifying the trap
number to be used.
trapa_handler
On SH targets this function attribute is similar to interrupt_handler but it
does not save and restore all registers.
Chapter 6: Extensions to the C Language Family 469
on the stack. The thiscall attribute is intended for C++ non-static member
functions. As a GCC extension, this calling convention can be used for C
functions and for static member methods.
ms_abi
sysv_abi
On 32-bit and 64-bit x86 targets, you can use an ABI attribute to indicate
which calling convention should be used for a function. The ms_abi attribute
tells the compiler to use the Microsoft ABI, while the sysv_abi attribute tells
the compiler to use the ABI used on GNU/Linux and other systems. The
default is to use the Microsoft ABI when targeting Windows. On all other
systems, the default is the x86/AMD ABI.
Note, the ms_abi attribute for Microsoft Windows 64-bit targets currently re-
quires the ‘-maccumulate-outgoing-args’ option.
callee_pop_aggregate_return (number)
On x86-32 targets, you can use this attribute to control how aggregates are
returned in memory. If the caller is responsible for popping the hidden pointer
together with the rest of the arguments, specify number equal to zero. If callee
is responsible for popping the hidden pointer, specify number equal to one.
The default x86-32 ABI assumes that the callee pops the stack for hidden
pointer. However, on x86-32 Microsoft Windows targets, the compiler assumes
that the caller pops the stack for hidden pointer.
ms_hook_prologue
On 32-bit and 64-bit x86 targets, you can use this function attribute to make
GCC generate the “hot-patching” function prologue used in Win32 API func-
tions in Microsoft Windows XP Service Pack 2 and newer.
regparm (number)
On x86-32 targets, the regparm attribute causes the compiler to pass arguments
number one to number if they are of integral type in registers EAX, EDX,
and ECX instead of on the stack. Functions that take a variable number of
arguments continue to be passed all of their arguments on the stack.
Beware that on some ELF systems this attribute is unsuitable for global func-
tions in shared libraries with lazy binding (which is the default). Lazy binding
sends the first call via resolving code in the loader, which might assume EAX,
EDX and ECX can be clobbered, as per the standard calling conventions. So-
laris 8 is affected by this. Systems with the GNU C Library version 2.1 or
higher and FreeBSD are believed to be safe since the loaders there save EAX,
EDX and ECX. (Lazy binding can be disabled with the linker or the loader if
desired, to avoid the problem.)
sseregparm
On x86-32 targets with SSE support, the sseregparm attribute causes the com-
piler to pass up to 3 floating-point arguments in SSE registers instead of on the
stack. Functions that take a variable number of arguments continue to pass all
of their floating-point arguments on the stack.
Chapter 6: Extensions to the C Language Family 471
force_align_arg_pointer
On x86 targets, the force_align_arg_pointer attribute may be applied to
individual function definitions, generating an alternate prologue and epilogue
that realigns the run-time stack if necessary. This supports mixing legacy codes
that run with a 4-byte aligned stack with modern codes that keep a 16-byte
stack for SSE compatibility.
stdcall On x86-32 targets, the stdcall attribute causes the compiler to assume that
the called function pops off the stack space used to pass arguments, unless it
takes a variable number of arguments.
no_caller_saved_registers
Use this attribute to indicate that the specified function has no caller-saved
registers. That is, all registers are callee-saved. For example, this attribute can
be used for a function called from an interrupt handler. The compiler gener-
ates proper function entry and exit sequences to save and restore any modified
registers, except for the EFLAGS register. Since GCC doesn’t preserve MPX,
SSE, MMX nor x87 states, the GCC option ‘-mgeneral-regs-only’ should be
used to compile functions with no_caller_saved_registers attribute.
interrupt
Use this attribute to indicate that the specified function is an interrupt han-
dler or an exception handler (depending on parameters passed to the function,
explained further). The compiler generates function entry and exit sequences
suitable for use in an interrupt handler when this attribute is present. The IRET
instruction, instead of the RET instruction, is used to return from interrupt han-
dlers. All registers, except for the EFLAGS register which is restored by the
IRET instruction, are preserved by the compiler. Since GCC doesn’t preserve
MPX, SSE, MMX nor x87 states, the GCC option ‘-mgeneral-regs-only’
should be used to compile interrupt and exception handlers.
Any interruptible-without-stack-switch code must be compiled with
‘-mno-red-zone’ since interrupt handlers can and will, because of the
hardware design, touch the red zone.
An interrupt handler must be declared with a mandatory pointer argument:
struct interrupt_frame;
__attribute__ ((interrupt))
void
f (struct interrupt_frame *frame)
{
}
and you must define struct interrupt_frame as described in the processor’s
manual.
Exception handlers differ from interrupt handlers because the system pushes an
error code on the stack. An exception handler declaration is similar to that for
an interrupt handler, but with a different mandatory function signature. The
compiler arranges to pop the error code off the stack before the IRET instruction.
#ifdef __x86_64__
typedef unsigned long long int uword_t;
472 Using the GNU Compiler Collection (GCC)
#else
typedef unsigned int uword_t;
#endif
struct interrupt_frame;
__attribute__ ((interrupt))
void
f (struct interrupt_frame *frame, uword_t error_code)
{
...
}
Exception handlers should only be used for exceptions that push an error code;
you should use an interrupt handler in other cases. The system will crash if the
wrong kind of handler is used.
target (options)
As discussed in Section 6.31.1 [Common Function Attributes], page 430, this
attribute allows specification of target-specific compilation options.
On the x86, the following options are allowed:
‘abm’
‘no-abm’ Enable/disable the generation of the advanced bit instructions.
‘aes’
‘no-aes’ Enable/disable the generation of the AES instructions.
‘default’ See Section 7.8 [Function Multiversioning], page 744, where it is
used to specify the default function version.
‘mmx’
‘no-mmx’ Enable/disable the generation of the MMX instructions.
‘pclmul’
‘no-pclmul’
Enable/disable the generation of the PCLMUL instructions.
‘popcnt’
‘no-popcnt’
Enable/disable the generation of the POPCNT instruction.
‘sse’
‘no-sse’ Enable/disable the generation of the SSE instructions.
‘sse2’
‘no-sse2’ Enable/disable the generation of the SSE2 instructions.
‘sse3’
‘no-sse3’ Enable/disable the generation of the SSE3 instructions.
‘sse4’
‘no-sse4’ Enable/disable the generation of the SSE4 instructions (both
SSE4.1 and SSE4.2).
‘sse4.1’
‘no-sse4.1’
Enable/disable the generation of the sse4.1 instructions.
Chapter 6: Extensions to the C Language Family 473
‘sse4.2’
‘no-sse4.2’
Enable/disable the generation of the sse4.2 instructions.
‘sse4a’
‘no-sse4a’
Enable/disable the generation of the SSE4A instructions.
‘fma4’
‘no-fma4’ Enable/disable the generation of the FMA4 instructions.
‘xop’
‘no-xop’ Enable/disable the generation of the XOP instructions.
‘lwp’
‘no-lwp’ Enable/disable the generation of the LWP instructions.
‘ssse3’
‘no-ssse3’
Enable/disable the generation of the SSSE3 instructions.
‘cld’
‘no-cld’ Enable/disable the generation of the CLD before string moves.
‘fancy-math-387’
‘no-fancy-math-387’
Enable/disable the generation of the sin, cos, and sqrt instruc-
tions on the 387 floating-point unit.
‘ieee-fp’
‘no-ieee-fp’
Enable/disable the generation of floating point that depends on
IEEE arithmetic.
‘inline-all-stringops’
‘no-inline-all-stringops’
Enable/disable inlining of string operations.
‘inline-stringops-dynamically’
‘no-inline-stringops-dynamically’
Enable/disable the generation of the inline code to do small string
operations and calling the library routines for large operations.
‘align-stringops’
‘no-align-stringops’
Do/do not align destination of inlined string operations.
‘recip’
‘no-recip’
Enable/disable the generation of RCPSS, RCPPS, RSQRTSS and
RSQRTPS instructions followed an additional Newton-Raphson
step instead of doing a floating-point division.
474 Using the GNU Compiler Collection (GCC)
‘arch=ARCH’
Specify the architecture to generate code for in compiling the func-
tion.
‘tune=TUNE’
Specify the architecture to tune for in compiling the function.
‘fpmath=FPMATH’
Specify which floating-point unit to use. You must
specify the target("fpmath=sse,387") option as
target("fpmath=sse+387") because the comma would
separate different options.
‘indirect_branch("choice")’
On x86 targets, the indirect_branch attribute causes the compiler
to convert indirect call and jump with choice. ‘keep’ keeps indirect
call and jump unmodified. ‘thunk’ converts indirect call and jump
to call and return thunk. ‘thunk-inline’ converts indirect call and
jump to inlined call and return thunk. ‘thunk-extern’ converts
indirect call and jump to external call and return thunk provided
in a separate object file.
‘function_return("choice")’
On x86 targets, the function_return attribute causes the compiler
to convert function return with choice. ‘keep’ keeps function return
unmodified. ‘thunk’ converts function return to call and return
thunk. ‘thunk-inline’ converts function return to inlined call and
return thunk. ‘thunk-extern’ converts function return to external
call and return thunk provided in a separate object file.
On the x86, the inliner does not inline a function that has different target
options than the caller, unless the callee has a subset of the target options of
the caller. For example a function declared with target("sse3") can inline a
function with target("sse2"), since -msse3 implies -msse2.
(see Section 6.36 [Statement Attributes], page 493), and for types (see Section 6.33 [Type
Attributes], page 485). Other front ends might define more attributes (see Chapter 7
[Extensions to the C++ Language], page 737).
See Section 6.37 [Attribute Syntax], page 494, for details of the exact syntax for using
attributes.
packed The packed attribute specifies that a variable or structure field should have the
smallest possible alignment—one byte for a variable, and one bit for a field,
unless you specify a larger value with the aligned attribute.
Here is a structure in which the field x is packed, so that it immediately follows
a:
struct foo
{
char a;
int x[2] __attribute__ ((packed));
};
Note: The 4.1, 4.2 and 4.3 series of GCC ignore the packed attribute on
bit-fields of type char. This has been fixed in GCC 4.4 but the change
can lead to differences in the structure layout. See the documentation of
‘-Wpacked-bitfield-compat’ for more information.
section ("section-name")
Normally, the compiler places the objects it generates in sections like data and
bss. Sometimes, however, you need additional sections, or you need certain
particular variables to appear in special sections, for example to map to special
hardware. The section attribute specifies that a variable (or function) lives
in a particular section. For example, this small program uses several specific
section names:
struct duart a __attribute__ ((section ("DUART_A"))) = { 0 };
struct duart b __attribute__ ((section ("DUART_B"))) = { 0 };
char stack[10000] __attribute__ ((section ("STACK"))) = { 0 };
int init_data __attribute__ ((section ("INITDATA")));
main()
{
/* Initialize stack pointer */
init_sp (stack + sizeof (stack));
ized variable has multiple definitions. You can force a variable to be initialized
with the ‘-fno-common’ flag or the nocommon attribute.
Some file formats do not support arbitrary sections so the section attribute
is not available on all platforms. If you need to map the entire contents of a
module to a particular section, consider using the facilities of the linker instead.
tls_model ("tls_model")
The tls_model attribute sets thread-local storage model (see Section 6.64
[Thread-Local], page 732) of a particular __thread variable, overriding
‘-ftls-model=’ command-line switch on a per-variable basis. The tls model
argument should be one of global-dynamic, local-dynamic, initial-exec
or local-exec.
Not all targets support this attribute.
unused This attribute, attached to a variable, means that the variable is meant to be
possibly unused. GCC does not produce a warning for this variable.
used This attribute, attached to a variable with static storage, means that the vari-
able must be emitted even if it appears that the variable is not referenced.
When applied to a static data member of a C++ class template, the attribute
also means that the member is instantiated if the class itself is instantiated.
vector_size (bytes)
This attribute specifies the vector size for the variable, measured in bytes. For
example, the declaration:
int foo __attribute__ ((vector_size (16)));
causes the compiler to set the mode for foo, to be 16 bytes, divided into int
sized units. Assuming a 32-bit int (a vector of 4 units of 4 bytes), the corre-
sponding mode of foo is V4SI.
This attribute is only applicable to integral and float scalars, although arrays,
pointers, and function return values are allowed in conjunction with this con-
struct.
Aggregates with this attribute are invalid, even if they are of the same size as
a corresponding scalar. For example, the declaration:
struct S { int a; };
struct S __attribute__ ((vector_size (16))) foo;
is invalid even if the size of the structure is the same as the size of the int.
visibility ("visibility_type")
This attribute affects the linkage of the declaration to which it is attached.
The visibility attribute is described in Section 6.31.1 [Common Function
Attributes], page 430.
weak The weak attribute is described in Section 6.31.1 [Common Function
Attributes], page 430.
This attribute works similar to the section attribute but adds additional check-
ing.
• Ordinary AVR cores with 32 general purpose registers:
progmem affects the location of the data but not how this data is
accessed. In order to read data located with the progmem attribute
(inline) assembler must be used.
/* Use custom macros from AVR-LibC */
#include <avr/pgmspace.h>
*(.gnu.linkonce.r*)
} AT> text
/* No more need to put .rodata into .data:
Removed all .rodata entries from .data. */
.data :
{ ...
io
io (addr) Variables with the io attribute are used to address memory-mapped peripherals
in the io address range. If an address is specified, the variable is assigned that
address, and the value is interpreted as an address in the data address space.
Example:
volatile int porta __attribute__((io (0x22)));
The address specified in the address in the data address range.
Otherwise, the variable it is not assigned an address, but the compiler will still
use in/out instructions where applicable, assuming some other module assigns
an address in the io address range. Example:
extern volatile int porta __attribute__((io));
io_low
io_low (addr)
This is like the io attribute, but additionally it informs the compiler that the
object lies in the lower half of the I/O area, allowing the use of cbi, sbi, sbic
and sbis instructions.
address
address (addr)
Variables with the address attribute are used to address memory-mapped pe-
ripherals that may lie outside the io address range.
volatile int porta __attribute__((address (0x600)));
absdata Variables in static storage and with the absdata attribute can be accessed by
the LDS and STS instructions which take absolute addresses.
• This attribute is only supported for the reduced AVR Tiny core like AT-
tiny40.
• You must make sure that respective data is located in the address range
0x40. . . 0xbf accessible by LDS and STS. One way to achieve this as an
appropriate linker description file.
• If the location does not fit the address range of LDS and STS, there is
currently (Binutils 2.26) just an unspecific warning like
module.c:(.text+0x1c): warning: internal error: out
of range error
See also the ‘-mabsdata’ Section 3.18.5 [AVR Options], page 238.
l1_data
l1_data_A
l1_data_B
Use these attributes on the Blackfin to place the variable into L1 Data SRAM.
Variables with l1_data attribute are put into the specific section named
.l1.data. Those with l1_data_A attribute are put into the specific section
named .l1.data.A. Those with l1_data_B attribute are put into the specific
section named .l1.data.B.
l2 Use this attribute on the Blackfin to place the variable into L2 SRAM. Variables
with l2 attribute are put into the specific section named .l2.data.
Medium and large model objects may live anywhere in the 32-bit address space
(the compiler generates seth/add3 instructions to load their addresses).
cb
cb (addr) Variables with the cb attribute are used to access the control bus, using special
instructions. addr indicates the control bus address. Example:
int cpu_clock __attribute__((cb(0x123)));
linker, the first is selected and the remainder are discarded. Following usage
by the Microsoft compiler, the linker is told not to warn about size or content
differences of the multiple definitions.
Although the primary usage of this attribute is for POD types, the attribute can
also be applied to global C++ objects that are initialized by a constructor. In
this case, the static initialization and destruction code for the object is emitted
in each translation defining the object, but the calls to the constructor and
destructor are protected by a link-once guard variable.
The selectany attribute is only available on Microsoft Windows targets.
You can use __declspec (selectany) as a synonym for __attribute__
((selectany)) for compatibility with other compilers.
shared On Microsoft Windows, in addition to putting variable definitions in a named
section, the section can also be shared among all running copies of an executable
or DLL. For example, this small program defines shared data by putting it in
a named section shared and marking the section shareable:
int foo __attribute__((section ("shared"), shared)) = 0;
int
main()
{
/* Read and write foo. All running
copies see the same value. */
return 0;
}
You may only use the shared attribute along with section attribute with a
fully-initialized global definition because of the way linkers work. See section
attribute for more information.
The shared attribute is only available on Microsoft Windows.
Note that the alignment of any given struct or union type is required by the
ISO C standard to be at least a perfect multiple of the lowest common multiple
of the alignments of all of the members of the struct or union in question. This
means that you can effectively adjust the alignment of a struct or union type
by attaching an aligned attribute to any one of the members of such a type,
but the notation illustrated in the example above is a more obvious, intuitive,
and readable way to request the compiler to adjust the alignment of an entire
struct or union type.
As in the preceding example, you can explicitly specify the alignment (in bytes)
that you wish the compiler to use for a given struct or union type. Alterna-
tively, you can leave out the alignment factor and just ask the compiler to
align a type to the maximum useful alignment for the target machine you are
compiling for. For example, you could write:
struct S { short f[3]; } __attribute__ ((aligned));
Whenever you leave out the alignment factor in an aligned attribute specifica-
tion, the compiler automatically sets the alignment for the type to the largest
alignment that is ever used for any data type on the target machine you are
compiling for. Doing this can often make copy operations more efficient, be-
cause the compiler can use whatever instructions copy the biggest chunks of
memory when performing copies to or from the variables that have types that
you have aligned this way.
In the example above, if the size of each short is 2 bytes, then the size of the
entire struct S type is 6 bytes. The smallest power of two that is greater than
or equal to that is 8, so the compiler sets the alignment for the entire struct
S type to 8 bytes.
Note that although you can ask the compiler to select a time-efficient alignment
for a given type and then declare only individual stand-alone objects of that
type, the compiler’s ability to select a time-efficient alignment is primarily useful
only when you plan to create arrays of variables having the relevant (efficiently
aligned) type. If you declare or use arrays of variables of an efficiently-aligned
type, then it is likely that your program also does pointer arithmetic (or sub-
scripting, which amounts to the same thing) on pointers to the relevant type,
and the code that the compiler generates for these pointer arithmetic operations
is often more efficient for efficiently-aligned types than for other types.
Note that the effectiveness of aligned attributes may be limited by inherent
limitations in your linker. On many systems, the linker is only able to arrange
for variables to be aligned up to a certain maximum alignment. (For some
linkers, the maximum supported alignment may be very very small.) If your
linker is only able to align variables up to a maximum of 8-byte alignment,
then specifying aligned(16) in an __attribute__ still only provides you with
8-byte alignment. See your linker documentation for further information.
The aligned attribute can only increase alignment. Alignment can be de-
creased by specifying the packed attribute. See below.
Chapter 6: Extensions to the C Language Family 487
bnd_variable_size
When applied to a structure field, this attribute tells Pointer Bounds Checker
that the size of this field should not be computed using static type information.
It may be used to mark variably-sized static array fields placed at the end of a
structure.
struct S
{
int size;
char data[1];
}
S *p = (S *)malloc (sizeof(S) + 100);
p->data[10] = 0; //Bounds violation
By using an attribute for the field we may avoid unwanted bound violation
checks:
struct S
{
int size;
char data[1] __attribute__((bnd_variable_size));
}
S *p = (S *)malloc (sizeof(S) + 100);
p->data[10] = 0; //OK
deprecated
deprecated (msg)
The deprecated attribute results in a warning if the type is used anywhere in
the source file. This is useful when identifying types that are expected to be
removed in a future version of a program. If possible, the warning also includes
the location of the declaration of the deprecated type, to enable users to easily
find further information about why the type is deprecated, or what they should
do instead. Note that the warnings only occur for uses and then only if the type
is being applied to an identifier that itself is not being declared as deprecated.
typedef int T1 __attribute__ ((deprecated));
T1 x;
typedef T1 T2;
T2 y;
typedef T1 T3 __attribute__ ((deprecated));
T3 z __attribute__ ((deprecated));
results in a warning on line 2 and 3 but not lines 4, 5, or 6. No warning is
issued for line 4 because T2 is not explicitly deprecated. Line 5 has no warning
because T3 is explicitly deprecated. Similarly for line 6. The optional msg
argument, which must be a string, is printed in the warning if present.
The deprecated attribute can also be used for functions and variables (see
Section 6.31 [Function Attributes], page 429, see Section 6.32 [Variable At-
tributes], page 474.)
designated_init
This attribute may only be applied to structure types. It indicates that any ini-
tialization of an object of this type must use designated initializers rather than
positional initializers. The intent of this attribute is to allow the programmer
to indicate that a structure’s layout may change, and that therefore relying on
positional initialization will result in future breakage.
488 Using the GNU Compiler Collection (GCC)
int
main (void)
{
int a = 0x12345678;
short_a *b = (short_a *) &a;
b[1] = 0;
if (a == 0x12345678)
abort();
exit(0);
}
If you replaced short_a with short in the variable declaration, the above pro-
gram would abort when compiled with ‘-fstrict-aliasing’, which is on by
default at ‘-O2’ or above.
packed This attribute, attached to struct or union type definition, specifies that each
member (other than zero-width bit-fields) of the structure or union is placed
to minimize the memory required. When attached to an enum definition, it
indicates that the smallest integral type should be used.
Specifying the packed attribute for struct and union types is equivalent to
specifying the packed attribute on each of the structure or union members.
Specifying the ‘-fshort-enums’ flag on the command line is equivalent to spec-
ifying the packed attribute on all enum definitions.
In the following example struct my_packed_struct’s members are packed
closely together, but the internal layout of its s member is not packed—to
do that, struct my_unpacked_struct needs to be packed too.
struct my_unpacked_struct
{
char c;
int i;
};
{
char c;
int i;
struct my_unpacked_struct s;
};
You may only specify the packed attribute attribute on the definition of an
enum, struct or union, not on a typedef that does not also define the enu-
merated type, structure or union.
scalar_storage_order ("endianness")
When attached to a union or a struct, this attribute sets the storage order,
aka endianness, of the scalar fields of the type, as well as the array fields whose
component is scalar. The supported endiannesses are big-endian and little-
endian. The attribute has no effects on fields which are themselves a union, a
struct or an array whose component is a union or a struct, and it is possible
for these fields to have a different scalar storage order than the enclosing type.
This attribute is supported only for targets that use a uniform default scalar
storage order (fortunately, most of them), i.e. targets that store the scalars
either all in big-endian or all in little-endian.
Additional restrictions are enforced for types with the reverse scalar storage
order with regard to the scalar storage order of the target:
• Taking the address of a scalar field of a union or a struct with reverse
scalar storage order is not permitted and yields an error.
• Taking the address of an array field, whose component is scalar, of a union
or a struct with reverse scalar storage order is permitted but yields a
warning, unless ‘-Wno-scalar-storage-order’ is specified.
• Taking the address of a union or a struct with reverse scalar storage order
is permitted.
These restrictions exist because the storage order attribute is lost when the
address of a scalar or the address of an array with scalar component is taken,
so storing indirectly through this address generally does not work. The second
case is nevertheless allowed to be able to perform a block copy from or to the
array.
Moreover, the use of type punning or aliasing to toggle the storage order is
not supported; that is to say, a given scalar object cannot be accessed through
distinct types that assign a different storage order to it.
transparent_union
This attribute, attached to a union type definition, indicates that any function
parameter having that union type causes calls to that function to be treated in
a special way.
First, the argument corresponding to a transparent union type can be of any
type in the union; no cast is required. Also, if the union contains a pointer type,
the corresponding argument can be a null pointer constant or a void pointer
expression; and if the union contains a void pointer type, the corresponding
argument can be any pointer expression. If the union member type is a pointer,
490 Using the GNU Compiler Collection (GCC)
qualifiers like const on the referenced type must be respected, just as with
normal pointer conversions.
Second, the argument is passed to the function using the calling conventions of
the first member of the transparent union, not the calling conventions of the
union itself. All members of the union must have the same machine represen-
tation; this is necessary for this argument passing to work properly.
Transparent unions are designed for library functions that have multiple inter-
faces for compatibility reasons. For example, suppose the wait function must
accept either a value of type int * to comply with POSIX, or a value of type
union wait * to comply with the 4.1BSD interface. If wait’s parameter were
void *, wait would accept both kinds of arguments, but it would also accept
any other pointer type and this would make argument type checking less useful.
Instead, <sys/wait.h> might define the interface as follows:
typedef union __attribute__ ((__transparent_union__))
{
int *__ip;
union wait *__up;
} wait_status_ptr_t;
unused When attached to a type (including a union or a struct), this attribute means
that variables of that type are meant to appear possibly unused. GCC does not
produce a warning for any variables of that type, even if the variable appears to
do nothing. This is often the case with lock or thread classes, which are usually
defined and then not referenced, but contain constructors and destructors that
have nontrivial bookkeeping functions.
visibility
In C++, attribute visibility (see Section 6.31 [Function Attributes], page 429)
can also be applied to class, struct, union and enum types. Unlike other type
attributes, the attribute must appear between the initial keyword and the name
of the type; it cannot appear after the body of the type.
Note that the type visibility is applied to vague linkage entities associated with
the class (vtable, typeinfo node, etc.). In particular, if a class is thrown as
an exception in one shared object and caught in another, the class must have
default visibility. Otherwise the two shared objects are unable to use the same
typeinfo node and exception handling will break.
Chapter 6: Extensions to the C Language Family 491
To specify multiple attributes, separate them by commas within the double parentheses:
for example, ‘__attribute__ ((aligned (16), packed))’.
__declspec(dllexport)
C::C() {}
In this code, C::C is exported from the current DLL, but the virtual table for C is not
exported. (You can use __attribute__ instead of __declspec if you prefer, but most
Symbian OS code uses __declspec.)
ms_struct
gcc_struct
If packed is used on a structure, or if bit-fields are used it may be that the
Microsoft ABI packs them differently than GCC normally packs them. Par-
ticularly when moving packed data between functions compiled with GCC and
the native Microsoft compiler (either via function call or as data in a file), it
may be necessary to access either format.
The ms_struct and gcc_struct attributes correspond to the ‘-mms-bitfields’
and ‘-mno-ms-bitfields’ command-line options, respectively; see
Section 3.18.55 [x86 Options], page 357, for details of how structure layout
is affected. See Section 6.32.15 [x86 Variable Attributes], page 484, for
information about the corresponding attributes on variables.
/* This branch (the fall-through from the asm) is less commonly used */
ErrorHandling:
__attribute__((cold, unused)); /* Semi-colon is required here */
printf("error\n");
return 0;
NoError:
printf("no error\n");
return 1;
unused This feature is intended for program-generated code that may contain unused
labels, but which is compiled with ‘-Wall’. It is not normally appropriate to
use in it human-written code, though it could be useful in cases where the code
that jumps to the label is contained within an #ifdef conditional.
hot The hot attribute on a label is used to inform the compiler that the path
following the label is more likely than paths that are not so annotated. This
attribute is used in cases where __builtin_expect cannot be used, for instance
with computed goto or asm goto.
cold The cold attribute on labels is used to inform the compiler that the path
following the label is unlikely to be executed. This attribute is used in cases
where __builtin_expect cannot be used, for instance with computed goto or
asm goto.
Chapter 6: Extensions to the C Language Family 493
int
fn (void)
{
return oldval;
}
deprecated
The deprecated attribute results in a warning if the enumerator is used any-
where in the source file. This is useful when identifying enumerators that are
expected to be removed in a future version of a program. The warning also
includes the location of the declaration of the deprecated enumerator, to enable
users to easily find further information about why the enumerator is deprecated,
or what they should do instead. Note that the warnings only occurs for uses.
fallthrough
The fallthrough attribute with a null statement serves as a fallthrough state-
ment. It hints to the compiler that a statement that falls through to another
case label, or user-defined label in a switch statement is intentional and thus
494 Using the GNU Compiler Collection (GCC)
of the same name. For example, you may use the attribute name __noreturn__ instead of
noreturn.
Label Attributes
In GNU C, an attribute specifier list may appear after the colon following a label, other than
a case or default label. GNU C++ only permits attributes on labels if the attribute specifier
is immediately followed by a semicolon (i.e., the label applies to an empty statement). If
the semicolon is missing, C++ label attributes are ambiguous, as it is permissible for a
declaration, which could begin with an attribute list, to be labelled in C++. Declarations
cannot be labelled in C90 or C99, so the ambiguity does not arise there.
Enumerator Attributes
In GNU C, an attribute specifier list may appear as part of an enumerator. The attribute
goes after the enumeration constant, before =, if present. The optional attribute in the
enumerator appertains to the enumeration constant. It is not possible to place the attribute
after the constant expression, if present.
Statement Attributes
In GNU C, an attribute specifier list may appear as part of a null statement. The attribute
goes before the semicolon.
Type Attributes
An attribute specifier list may appear as part of a struct, union or enum specifier. It may
go either immediately after the struct, union or enum keyword, or after the closing brace.
The former syntax is preferred. Where attribute specifiers follow the closing brace, they
are considered to relate to the structure, union or enumerated type defined, not to any
enclosing declaration the type specifier appears in, and the type defined is not complete
until after the attribute specifiers.
a whole. In the obsolescent usage where a type of int is implied by the absence of type
specifiers, such a list of specifiers and qualifiers may be an attribute specifier list with no
other specifiers or qualifiers.
At present, the first parameter in a function prototype must have some type specifier that
is not an attribute specifier; this resolves an ambiguity in the interpretation of void f(int
(__attribute__((foo)) x)), but is subject to change. At present, if the parentheses of a
function declarator contain only attributes then those attributes are ignored, rather than
yielding an error or warning or implying a single parameter of type int, but this is subject
to change.
An attribute specifier list may appear immediately before a declarator (other than the
first) in a comma-separated list of declarators in a declaration of more than one identifier
using a single list of specifiers and qualifiers. Such attribute specifiers apply only to the
identifier before whose declarator they appear. For example, in
__attribute__((noreturn)) void d0 (void),
__attribute__((format(printf, 1, 2))) d1 (const char *, ...),
d2 (void);
the noreturn attribute applies to all the functions declared; the format attribute only
applies to d1.
An attribute specifier list may appear immediately before the comma, = or semicolon
terminating the declaration of an identifier other than a function definition. Such attribute
specifiers apply to the declared object or function. Where an assembler name for an object
or function is specified (see Section 6.45.4 [Asm Labels], page 550), the attribute must follow
the asm specification.
An attribute specifier list may, in future, be permitted to appear after the declarator in
a function definition (before any old-style parameter declarations or the function body).
Attribute specifiers may be mixed with type qualifiers appearing inside the [] of a pa-
rameter array declarator, in the C99 construct by which such qualifiers are applied to the
pointer to which the array is implicitly converted. Such attribute specifiers apply to the
pointer, not to the array, but at present this is not implemented and they are ignored.
An attribute specifier list may appear at the start of a nested declarator. At present,
there are some limitations in this usage: the attributes correctly apply to the declarator,
but for most individual attributes the semantics this implies are not implemented. When
attribute specifiers follow the * of a pointer declarator, they may be mixed with any type
qualifiers present. The following describes the formal semantics of this syntax. It makes
the most sense if you are familiar with the formal specification of declarators in the ISO C
standard.
Consider (as in C99 subclause 6.7.5 paragraph 4) a declaration T D1, where T contains
declaration specifiers that specify a type Type (such as int) and D1 is a declarator that
contains an identifier ident. The type specified for ident for derived declarators whose type
does not include an attribute specifier is as in the ISO C standard.
If D1 has the form ( attribute-specifier-list D ), and the declaration T D specifies
the type “derived-declarator-type-list Type” for ident, then T D1 specifies the type “derived-
declarator-type-list attribute-specifier-list Type” for ident.
If D1 has the form * type-qualifier-and-attribute-specifier-list D, and the dec-
laration T D specifies the type “derived-declarator-type-list Type” for ident, then T D1 spec-
Chapter 6: Extensions to the C Language Family 497
or long. Therefore, in cases like these GNU C allows a prototype to override a later old-
style definition. More precisely, in GNU C, a function prototype argument type overrides
the argument type specified by a later old-style definition if the former type is the same as
the latter type before promotion. Thus in GNU C the above example is equivalent to the
following:
int isroot (uid_t);
int
isroot (uid_t x)
{
return x == 0;
}
GNU C++ does not support old-style function definitions, so this extension is irrelevant.
Unless *ptr and vobj can be aliased, it is not guaranteed that the write to *ptr occurs by
the time the update of vobj happens. If you need this guarantee, you must use a stronger
memory barrier such as:
int *ptr = something;
volatile int vobj;
*ptr = something;
asm volatile ("" : : : "memory");
vobj = 1;
A scalar volatile object is read when it is accessed in a void context:
volatile int *src = somevalue;
*src;
Such expressions are rvalues, and GCC implements this as a read of the volatile object
being pointed to.
Assignments are also expressions and have an rvalue. However when assigning to a scalar
volatile, the volatile object is not reread, regardless of whether the assignment expression’s
rvalue is used or not. If the assignment’s rvalue is used, the value is that assigned to the
volatile object. For instance, there is no read of vobj in all the following cases:
int obj;
volatile int vobj;
vobj = something;
obj = vobj = something;
obj ? vobj = onething : vobj = anotherthing;
obj = (something, vobj = anotherthing);
If you need to read the volatile object after an assignment has occurred, you must use a
separate expression with an intervening sequence point.
As bit-fields are not individually addressable, volatile bit-fields may be implicitly read
when written to, or when adjacent bit-fields are accessed. Bit-field operations may be
optimized such that adjacent bit-fields are only partially accessed, if they straddle a storage
unit boundary. For these reasons it is unwise to use volatile bit-fields to access hardware.
Qualifiers
volatile The optional volatile qualifier has no effect. All basic asm blocks are implicitly
volatile.
inline If you use the inline qualifier, then for inlining purposes the size of the asm is
taken as the smallest size possible (see Section 6.45.6 [Size of an asm], page 553).
Parameters
AssemblerInstructions
This is a literal string that specifies the assembler code. The string can contain
any instructions recognized by the assembler, including directives. GCC does
not parse the assembler instructions themselves and does not know what they
mean or even whether they are valid assembler input.
You may place multiple assembler instructions together in a single asm string,
separated by the characters normally used in assembly code for the system. A
combination that works in most places is a newline to break the line, plus a
tab character (written as ‘\n\t’). Some assemblers allow semicolons as a line
separator. However, note that some assembler dialects use semicolons to start
a comment.
Remarks
Using extended asm (see Section 6.45.2 [Extended Asm], page 503) typically produces
smaller, safer, and more efficient code, and in most cases it is a better solution than basic
asm. However, there are two situations where only basic asm can be used:
• Extended asm statements have to be inside a C function, so to write inline assembly
language at file scope (“top-level”), outside of C functions, you must use basic asm. You
can use this technique to emit assembler directives, define assembly language macros
that can be invoked elsewhere in the file, or write entire functions in assembly language.
• Functions declared with the naked attribute also require basic asm (see Section 6.31
[Function Attributes], page 429).
Safely accessing C data and calling functions from basic asm is more complex than it may
appear. To access C data, it is better to use extended asm.
Do not expect a sequence of asm statements to remain perfectly consecutive after compila-
tion. If certain instructions need to remain consecutive in the output, put them in a single
multi-instruction asm statement. Note that GCC’s optimizers can move asm statements
relative to other code, including across jumps.
asm statements may not perform jumps into other asm statements. GCC does not know
about these jumps, and therefore cannot take account of them when deciding how to opti-
mize. Jumps from asm to C labels are only supported in extended asm.
Under certain circumstances, GCC may duplicate (or remove duplicates of) your assem-
bly code when optimizing. This can lead to unexpected duplicate symbol errors during
compilation if your assembly code defines symbols or labels.
Warning: The C standards do not specify semantics for asm, making it a potential source
of incompatibilities between compilers. These incompatibilities may not produce compiler
warnings/errors.
Chapter 6: Extensions to the C Language Family 503
GCC does not parse basic asm’s AssemblerInstructions, which means there is no way to
communicate to the compiler what is happening inside them. GCC has no visibility of
symbols in the asm and may discard them as unreferenced. It also does not know about
side effects of the assembler code, such as modifications to memory or registers. Unlike
some compilers, GCC assumes that no changes to general purpose registers occur. This
assumption may change in a future release.
To avoid complications from future changes to the semantics and the compatibility issues
between compilers, consider replacing basic asm with extended asm. See How to convert
from basic asm to extended asm for information about how to perform this conversion.
The compiler copies the assembler instructions in a basic asm verbatim to the assembly
language output file, without processing dialects or any of the ‘%’ operators that are available
with extended asm. This results in minor differences between basic asm strings and extended
asm templates. For example, to refer to registers you might use ‘%eax’ in basic asm and
‘%%eax’ in extended asm.
On targets such as x86 that support multiple assembler dialects, all basic asm blocks
use the assembler dialect specified by the ‘-masm’ command-line option (see Section 3.18.55
[x86 Options], page 357). Basic asm provides no mechanism to provide different assembler
strings for different dialects.
For basic asm with non-empty assembler string GCC assumes the assembler block does
not change any general purpose registers, but it may read or write any globally accessible
variable.
Here is an example of basic asm for i386:
/* Note that this code will not compile with -masm=intel */
#define DebugBreak() asm("int $3")
Qualifiers
volatile The typical use of extended asm statements is to manipulate input values to
produce output values. However, your asm statements may also produce side
effects. If so, you may need to use the volatile qualifier to disable certain
optimizations. See [Volatile], page 505.
inline If you use the inline qualifier, then for inlining purposes the size of the asm is
taken as the smallest size possible (see Section 6.45.6 [Size of an asm], page 553).
goto This qualifier informs the compiler that the asm statement may perform a jump
to one of the labels listed in the GotoLabels. See [GotoLabels], page 514.
Parameters
AssemblerTemplate
This is a literal string that is the template for the assembler code. It is a
combination of fixed text and tokens that refer to the input, output, and goto
parameters. See [AssemblerTemplate], page 507.
OutputOperands
A comma-separated list of the C variables modified by the instructions in
the AssemblerTemplate. An empty list is permitted. See [OutputOperands],
page 508.
InputOperands
A comma-separated list of C expressions read by the instructions in the
AssemblerTemplate. An empty list is permitted. See [InputOperands],
page 512.
Clobbers A comma-separated list of registers or other values changed by the
AssemblerTemplate, beyond those listed as outputs. An empty list is
permitted. See [Clobbers], page 513.
GotoLabels
When you are using the goto form of asm, this section contains the list of
all C labels to which the code in the AssemblerTemplate may jump. See
[GotoLabels], page 514.
asm statements may not perform jumps into other asm statements, only to the
listed GotoLabels. GCC’s optimizers do not know about other jumps; therefore
they cannot take account of them when deciding how to optimize.
The total number of input + output + goto operands is limited to 30.
Remarks
The asm statement allows you to include assembly instructions directly within C code.
This may help you to maximize performance in time-sensitive code or to access assembly
instructions that are not readily available to C programs.
Note that extended asm statements must be inside a function. Only basic asm may be
outside functions (see Section 6.45.1 [Basic Asm], page 501). Functions declared with the
naked attribute also require basic asm (see Section 6.31 [Function Attributes], page 429).
Chapter 6: Extensions to the C Language Family 505
While the uses of asm are many and varied, it may help to think of an asm statement as
a series of low-level instructions that convert input parameters to output parameters. So a
simple (if not particularly useful) example for i386 using asm might look like this:
int src = 1;
int dst;
printf("%d\n", dst);
This code copies src to dst and add 1 to dst.
6.45.2.1 Volatile
GCC’s optimizers sometimes discard asm statements if they determine there is no need for
the output variables. Also, the optimizers may move code out of loops if they believe that
the code will always return the same result (i.e. none of its input values change between
calls). Using the volatile qualifier disables these optimizations. asm statements that have
no output operands, including asm goto statements, are implicitly volatile.
This i386 code demonstrates a case that does not use (or require) the volatile quali-
fier. If it is performing assertion checking, this code uses asm to perform the validation.
Otherwise, dwRes is unreferenced by any code. As a result, the optimizers can discard the
asm statement, which in turn removes the need for the entire DoCheck routine. By omitting
the volatile qualifier when it isn’t needed you allow the optimizers to produce the most
efficient code possible.
void DoCheck(uint32_t dwSomeValue)
{
uint32_t dwRes;
// Do other work...
sum = x + y;
The compiler may move the addition back before the volatile asm. To make it work as
expected, add an artificial dependency to the asm by referencing a variable in the subsequent
code, for example:
asm volatile ("mtfsf 255,%1" : "=X" (sum) : "f" (fpenv));
sum = x + y;
Under certain circumstances, GCC may duplicate (or remove duplicates of) your assembly
code when optimizing. This can lead to unexpected duplicate symbol errors during com-
pilation if your asm code defines symbols or labels. Using ‘%=’ (see [AssemblerTemplate],
page 507) may help resolve this problem.
‘%{’
‘%|’
‘%}’ Outputs ‘{’, ‘|’, and ‘}’ characters (respectively) into the assembler code. When
unescaped, these characters have special meaning to indicate multiple assembler
dialects, as described below.
: "Ir" (Offset)
: "cc");
return old;
Operands are separated by commas. Each operand has this format:
[ [asmSymbolicName] ] constraint (cvariablename)
asmSymbolicName
Specifies a symbolic name for the operand. Reference the name in the assembler
template by enclosing it in square brackets (i.e. ‘%[Value]’). The scope of the
name is the asm statement that contains the definition. Any valid C variable
name is acceptable, including names already defined in the surrounding code.
No two operands within the same asm statement can use the same symbolic
name.
When not using an asmSymbolicName, use the (zero-based) position of the
operand in the list of operands in the assembler template. For example if there
are three output operands, use ‘%0’ in the template to refer to the first, ‘%1’ for
the second, and ‘%2’ for the third.
constraint A string constant specifying constraints on the placement of the operand; See
Section 6.45.3 [Constraints], page 518, for details.
Output constraints must begin with either ‘=’ (a variable overwriting an exist-
ing value) or ‘+’ (when reading and writing). When using ‘=’, do not assume
the location contains the existing value on entry to the asm, except when the
operand is tied to an input; see [Input Operands], page 512.
After the prefix, there must be one or more additional constraints (see
Section 6.45.3 [Constraints], page 518) that describe where the value resides.
Common constraints include ‘r’ for register and ‘m’ for memory. When you list
more than one possible location (for example, "=rm"), the compiler chooses
the most efficient one based on the current context. If you list as many
alternates as the asm statement allows, you permit the optimizers to produce
the best possible code. If you must use a specific register, but your Machine
Constraints do not provide sufficient control to select the specific register you
want, local register variables may provide a solution (see Section 6.45.5.2
[Local Register Variables], page 552).
cvariablename
Specifies a C lvalue expression to hold the output, typically a variable name.
The enclosing parentheses are a required part of the syntax.
When the compiler selects the registers to use to represent the output operands, it does
not use any of the clobbered registers (see [Clobbers], page 513).
Output operand expressions must be lvalues. The compiler cannot check whether the
operands have data types that are reasonable for the instruction being executed. For output
expressions that are not directly addressable (for example a bit-field), the constraint must
allow a register. In that case, GCC uses the register as the output of the asm, and then
stores that register into the output.
510 Using the GNU Compiler Collection (GCC)
Operands using the ‘+’ constraint modifier count as two operands (that is, both as input
and output) towards the total maximum of 30 operands per asm statement.
Use the ‘&’ constraint modifier (see Section 6.45.3.3 [Modifiers], page 521) on all output
operands that must not overlap an input. Otherwise, GCC may allocate the output operand
in the same register as an unrelated input operand, on the assumption that the assembler
code consumes its inputs before producing outputs. This assumption may be false if the
assembler code actually consists of more than one instruction.
The same problem can occur if one output parameter (a) allows a register constraint and
another output parameter (b) allows a memory constraint. The code generated by GCC
to access the memory address in b can contain registers which might be shared by a, and
GCC considers those registers to be inputs to the asm. As above, GCC assumes that such
input registers are consumed before any outputs are written. This assumption may result
in incorrect behavior if the asm writes to a before using b. Combining the ‘&’ modifier with
the register constraint on a ensures that modifying a does not affect the address referenced
by b. Otherwise, the location of b is undefined if a is modified before using b.
asm supports operand modifiers on operands (for example ‘%k2’ instead of simply ‘%2’).
Typically these qualifiers are hardware dependent. The list of supported modifiers for x86
is found at [x86Operandmodifiers], page 515.
If the C code that follows the asm makes no use of any of the output operands, use
volatile for the asm statement to prevent the optimizers from discarding the asm statement
as unneeded (see [Volatile], page 505).
This code makes no use of the optional asmSymbolicName. Therefore it references the
first output operand as %0 (were there a second, it would be %1, etc). The number of the
first input operand is one greater than that of the last output operand. In this i386 example,
that makes Mask referenced as %1:
uint32_t Mask = 1234;
uint32_t Index;
Input constraints can also be digits (for example, "0"). This indicates that
the specified input must be in the same place as the output constraint at the
(zero-based) index in the output constraint list. When using asmSymbolicName
syntax for the output operands, you may use these names (enclosed in brackets
‘[]’) instead of digits.
cexpression
This is the C variable or expression being passed to the asm statement as input.
The enclosing parentheses are a required part of the syntax.
When the compiler selects the registers to use to represent the input operands, it does
not use any of the clobbered registers (see [Clobbers], page 513).
If there are no output operands but there are input operands, place two consecutive colons
where the output operands would go:
__asm__ ("some instructions"
: /* No outputs. */
: "r" (Offset / 8));
Warning: Do not modify the contents of input-only operands (except for inputs tied
to outputs). The compiler assumes that on exit from the asm statement these operands
contain the same values as they had before executing the statement. It is not possible
to use clobbers to inform the compiler that the values in these inputs are changing. One
common work-around is to tie the changing input variable to an output variable that never
gets used. Note, however, that if the code that follows the asm statement makes no use
of any of the output operands, the GCC optimizers may discard the asm statement as
unneeded (see [Volatile], page 505).
asm supports operand modifiers on operands (for example ‘%k2’ instead of simply ‘%2’).
Typically these qualifiers are hardware dependent. The list of supported modifiers for x86
is found at [x86Operandmodifiers], page 515.
In this example using the fictitious combine instruction, the constraint "0" for input
operand 1 says that it must occupy the same location as output operand 0. Only input
operands may use numbers in constraints, and they must each refer to an output operand.
Only a number (or the symbolic assembler name) in the constraint can guarantee that one
operand is in the same place as another. The mere fact that foo is the value of both operands
is not enough to guarantee that they are in the same place in the generated assembler code.
asm ("combine %2, %0"
: "=r" (foo)
: "0" (foo), "g" (bar));
Here is an example using symbolic names.
asm ("cmoveq %1, %2, %[result]"
: [result] "=r"(result)
: "r" (test), "r" (new), "[result]" (old));
6.45.2.6 Clobbers
While the compiler is aware of changes to entries listed in the output operands, the inline
asm code may modify more than just the outputs. For example, calculations may require
additional registers, or the processor may overwrite a register as a side effect of a particular
514 Using the GNU Compiler Collection (GCC)
assembler instruction. In order to inform the compiler of these changes, list them in the
clobber list. Clobber list items are either register names or the special clobbers (listed
below). Each clobber list item is a string constant enclosed in double quotes and separated
by commas.
Clobber descriptions may not in any way overlap with an input or output operand. For
example, you may not have an operand describing a register class with one member when
listing that register in the clobber list. Variables declared to live in specific registers (see
Section 6.45.5 [Explicit Register Variables], page 550) and used as asm input or output
operands must have no part mentioned in the clobber description. In particular, there is
no way to specify that input operands get modified without also specifying them as output
operands.
When the compiler selects which registers to use to represent input and output operands,
it does not use any of the clobbered registers. As a result, clobbered registers are available
for any use in the assembler code.
Here is a realistic example for the VAX showing the use of clobbered registers:
asm volatile ("movc3 %0, %1, %2"
: /* No outputs. */
: "g" (from), "g" (to), "g" (count)
: "r0", "r1", "r2", "r3", "r4", "r5");
Also, there are two special clobber arguments:
"cc" The "cc" clobber indicates that the assembler code modifies the flags register.
On some machines, GCC represents the condition codes as a specific hardware
register; "cc" serves to name this register. On other machines, condition code
handling is different, and specifying "cc" has no effect. But it is valid no matter
what the target.
"memory" The "memory" clobber tells the compiler that the assembly code performs mem-
ory reads or writes to items other than those listed in the input and output
operands (for example, accessing the memory pointed to by one of the input
parameters). To ensure memory contains correct values, GCC may need to
flush specific register values to memory before executing the asm. Further, the
compiler does not assume that any values read from memory before an asm re-
main unchanged after that asm; it reloads them as needed. Using the "memory"
clobber effectively forms a read/write memory barrier for the compiler.
Note that this clobber does not prevent the processor from doing speculative
reads past the asm statement. To prevent that, you need processor-specific
fence instructions.
Flushing registers to memory has performance implications and may be an
issue for time-sensitive code. You can use a trick to avoid this if the size of the
memory being accessed is known at compile time. For example, if accessing ten
bytes of a string, use a memory input like:
{"m"( ({ struct { char x[10]; } *p = (void *)ptr ; *p; }) )}.
assembler code may jump. GCC assumes that asm execution falls through to the next
statement (if this is not the case, consider using the __builtin_unreachable intrinsic
after the asm statement). Optimization of asm goto may be improved by using the hot and
cold label attributes (see Section 6.34 [Label Attributes], page 492).
An asm goto statement cannot have outputs. This is due to an internal restriction of
the compiler: control transfer instructions cannot have outputs. If the assembler code does
modify anything, use the "memory" clobber to force the optimizers to flush all register values
to memory and reload them if necessary after the asm statement.
Also note that an asm goto statement is always implicitly considered volatile.
To reference a label in the assembler template, prefix it with ‘%l’ (lowercase ‘L’) followed
by its (zero-based) position in GotoLabels plus the number of input operands. For example,
if the asm has three inputs and references two labels, refer to the first label as ‘%l3’ and the
second as ‘%l4’).
Alternately, you can reference labels using the actual C label name enclosed in brackets.
For example, to reference a label named carry, you can use ‘%l[carry]’. The label must
still be listed in the GotoLabels section when using this approach.
Here is an example of asm goto for i386:
asm goto (
"btl %1, %0\n\t"
"jc %l2"
: /* No outputs. */
: "r" (p1), "r" (p2)
: "cc"
: carry);
return 0;
carry:
return 1;
The following example shows an asm goto that uses a memory clobber.
int frob(int x)
{
int y;
asm goto ("frob %%r5, %1; jc %l[error]; mov (%2), %%r5"
: /* No outputs. */
: "r"(x), "r"(&y)
: "r5", "memory"
: error);
return y;
error:
return -1;
}
516 Using the GNU Compiler Collection (GCC)
top:
V is a special modifier which prints the name of the full integer register without %.
on some targets the operand with ‘<’ in constraint string must be accompanied
by special instruction suffixes like %U0 instruction suffix on PowerPC or %P0 on
IA-64.
‘>’ A memory operand with autoincrement addressing (either preincrement or
postincrement) is allowed. In inline asm the same restrictions as for ‘<’ ap-
ply.
‘r’ A register operand is allowed provided that it is in a general register.
‘i’ An immediate integer operand (one with constant value) is allowed. This in-
cludes symbolic constants whose values will be known only at assembly time or
later.
‘n’ An immediate integer operand with a known numeric value is allowed. Many
systems cannot support assembly-time constants for operands less than a word
wide. Constraints for these operands should use ‘n’ rather than ‘i’.
‘I’, ‘J’, ‘K’, . . . ‘P’
Other letters in the range ‘I’ through ‘P’ may be defined in a machine-dependent
fashion to permit immediate integer operands with explicit integer values in
specified ranges. For example, on the 68000, ‘I’ is defined to stand for the
range of values 1 to 8. This is the range permitted as a shift count in the shift
instructions.
‘E’ An immediate floating operand (expression code const_double) is allowed, but
only if the target floating point format is the same as that of the host machine
(on which the compiler is running).
‘F’ An immediate floating operand (expression code const_double or
const_vector) is allowed.
‘G’, ‘H’ ‘G’ and ‘H’ may be defined in a machine-dependent fashion to permit immediate
floating operands in particular ranges of values.
‘s’ An immediate integer operand whose value is not an explicit integer is allowed.
This might appear strange; if an insn allows a constant operand with a value
not known at compile time, it certainly must allow any known value. So why
use ‘s’ instead of ‘i’? Sometimes it allows better code to be generated.
For example, on the 68000 in a fullword instruction it is possible to use an
immediate operand; but if the immediate value is between −128 and 127, better
code results from loading the value into a register and using the register. This
is because the load into the register can be done with a ‘moveq’ instruction. We
arrange for this to happen by defining the letter ‘K’ to mean “any integer outside
the range −128 to 127”, and then specifying ‘Ks’ in the operand constraints.
‘g’ Any register, memory or immediate integer operand is allowed, except for reg-
isters that are not general registers.
‘X’ Any operand whatsoever is allowed.
‘0’, ‘1’, ‘2’, . . . ‘9’
An operand that matches the specified operand number is allowed. If a digit
is used together with letters within the same alternative, the digit should come
last.
520 Using the GNU Compiler Collection (GCC)
This number is allowed to be more than a single digit. If multiple digits are en-
countered consecutively, they are interpreted as a single decimal integer. There
is scant chance for ambiguity, since to-date it has never been desirable that
‘10’ be interpreted as matching either operand 1 or operand 0. Should this be
desired, one can use multiple alternatives instead.
This is called a matching constraint and what it really means is that the assem-
bler has only a single operand that fills two roles which asm distinguishes. For
example, an add instruction uses two input operands and an output operand,
but on most CISC machines an add instruction really has only two operands,
one of them an input-output operand:
addl #35,r12
Matching constraints are used in these circumstances. More precisely, the two
operands that match must include one input-only operand and one output-only
operand. Moreover, the digit must be a smaller number than the number of
the operand that uses it in the constraint.
‘p’ An operand that is a valid memory address is allowed. This is for “load address”
and “push address” instructions.
‘p’ in the constraint must be accompanied by address_operand as the predicate
in the match_operand. This predicate interprets the mode specified in the
match_operand as the mode of the memory reference for which the address
would be valid.
other-letters
Other letters can be defined in machine-dependent fashion to stand for par-
ticular classes of registers or other arbitrary operand types. ‘d’, ‘a’ and ‘f’
are defined on the 68000/68020 to stand for data, address and floating point
registers.
There is no way within the template to determine which alternative was chosen. However
you may be able to wrap your asm statements with builtins such as __builtin_constant_p
to achieve the desired results.
the constraint letters that usually have very similar meanings across architectures. The
most commonly used constraints are ‘m’ and ‘r’ (for memory and general-purpose registers
respectively; see Section 6.45.3.1 [Simple Constraints], page 518), and ‘I’, usually the letter
indicating the most common immediate-constant format.
Each architecture defines additional constraints. These constraints are used by the com-
piler itself for instruction generation, as well as for asm statements; therefore, some of the
constraints are not particularly useful for asm. Here is a summary of some of the machine-
dependent constraints available on some particular machines; it includes both constraints
that are useful for asm and constraints that aren’t. The compiler source file mentioned in
the table heading for each architecture is the definitive reference for the meanings of that
architecture’s constraints.
AArch64 family—‘config/aarch64/constraints.md’
k The stack pointer register (SP)
w Floating point or SIMD vector register
I Integer constant that is valid as an immediate operand in an ADD
instruction
J Integer constant that is valid as an immediate operand in a SUB
instruction (once negated)
K Integer constant that can be used with a 32-bit logical instruction
L Integer constant that can be used with a 64-bit logical instruction
M Integer constant that is valid as an immediate operand in a 32-
bit MOV pseudo instruction. The MOV may be assembled to one of
several different machine instructions depending on the value
N Integer constant that is valid as an immediate operand in a 64-bit
MOV pseudo instruction
S An absolute symbolic address or a label reference
Y Floating point constant zero
Z Integer constant zero
Ush The high part (bits 12 and upwards) of the pc-relative address of a
symbol within 4GB of the instruction
Q A memory address which uses a single base register with no offset
Ump A memory address suitable for a load/store pair instruction in SI,
DI, SF and DF modes
ARC —‘config/arc/constraints.md’
q Registers usable in ARCompact 16-bit instructions: r0-r3, r12-
r15. This constraint can only match when the ‘-mq’ option is in
effect.
e Registers usable as base-regs of memory addresses in ARCompact
16-bit memory instructions: r0-r3, r12-r15, sp. This constraint
can only match when the ‘-mq’ option is in effect.
Chapter 6: Extensions to the C Language Family 523
d The d register.
S The si register.
D The di register.
A The a and d registers. This class is used for instructions that re-
turn double word results in the ax:dx register pair. Single word
values will be allocated either in ax or dx. For example on i386 the
following implements rdtsc:
unsigned long long rdtsc (void)
{
unsigned long long tick;
__asm__ __volatile__("rdtsc":"=A"(tick));
return tick;
}
This is not correct on x86-64 as it would allocate tick in either ax
or dx. You have to use the following variant instead:
unsigned long long rdtsc (void)
{
unsigned int tickl, tickh;
__asm__ __volatile__("rdtsc":"=a"(tickl),"=d"(tickh));
return ((unsigned long long)tickh << 32)|tickl;
}
Xstormy16—‘config/stormy16/stormy16.h’
a Register r0.
b Register r1.
c Register r2.
d Register r8.
e Registers r0 through r7.
t Registers r0 and r1.
y The carry register.
z Registers r8 and r9.
I A constant between 0 and 3 inclusive.
J A constant that has exactly one bit set.
K A constant that has exactly one bit clear.
L A constant between 0 and 255 inclusive.
M A constant between −255 and 0 inclusive.
N A constant between −3 and 0 inclusive.
O A constant between 1 and 4 inclusive.
P A constant between −4 and −1 inclusive.
Q A memory reference that is a stack push.
R A memory reference that is a stack pop.
S A memory reference that refers to a constant address of known
value.
T The register indicated by Rx (not implemented yet).
U A constant that is not between 2 and 15 inclusive.
Z The constant 0.
Xtensa—‘config/xtensa/constraints.md’
a General-purpose 32-bit register
b One-bit boolean register
A MAC16 40-bit accumulator register
I Signed 12-bit integer constant, for use in MOVI instructions
J Signed 8-bit integer constant, for use in ADDI instructions
K Integer constant valid for BccI instructions
L Unsigned constant valid for BccUI instructions
550 Using the GNU Compiler Collection (GCC)
make sense to reserve some globally. For example this may be useful in programs such as
programming language interpreters that have a couple of global variables that are accessed
very often.
After defining a global register variable, for the current compilation unit:
• The register is reserved entirely for this use, and will not be allocated for any other
purpose.
• The register is not saved and restored by any functions.
• Stores into this register are never deleted even if they appear to be dead, but references
may be deleted, moved or simplified.
Note that these points only apply to code that is compiled with the definition. The
behavior of code that is merely linked in (for example code from libraries) is not affected.
If you want to recompile source files that do not actually use your global register variable
so they do not use the specified register for any other purpose, you need not actually add
the global register declaration to their source code. It suffices to specify the compiler option
‘-ffixed-reg’ (see Section 3.16 [Code Gen Options], page 191) to reserve the register.
This extension may not be very useful, but it makes the handling of enum more consistent
with the way struct and union are handled.
This extension is not supported by GNU C++.
class a {
public:
void sub (int i)
{
printf ("__FUNCTION__ = %s\n", __FUNCTION__);
printf ("__PRETTY_FUNCTION__ = %s\n", __PRETTY_FUNCTION__);
}
};
int
main (void)
{
a ax;
ax.sub (0);
return 0;
}
gives this output:
__FUNCTION__ = sub
__PRETTY_FUNCTION__ = void a::sub(int)
These identifiers are variables, not preprocessor macros, and may not be used to initialize
char arrays or be concatenated with string literals.
diagnosed when the ‘-Wframe-address’ option is in effect. Such calls should only be
made in debugging situations.
v4si a, b, c;
c = a + b;
Subtraction, multiplication, division, and the logical operations operate in a similar man-
ner. Likewise, the result of using the unary minus or complement operators on a vector type
is a vector whose elements are the negative or complemented values of the corresponding
elements in the operand.
It is possible to use shifting operators <<, >> on integer-type vectors. The operation is
defined as following: {a0, a1, ..., an} >> {b0, b1, ..., bn} == {a0 >> b0, a1 >> b1,
..., an >> bn}. Vector operands must have the same number of elements.
Chapter 6: Extensions to the C Language Family 557
For convenience, it is allowed to use a binary vector operation where one operand is a
scalar. In that case the compiler transforms the scalar operand into a vector where each
element is the scalar from the operation. The transformation happens only if the scalar
could be safely converted to the vector-element type. Consider the following code.
typedef int v4si __attribute__ ((vector_size (16)));
v4si a, b, c;
long l;
a = b + 1; /* a = b + {1,1,1,1}; */
a = 2 * b; /* a = {2,2,2,2} * b; */
v4si a = {1,2,3,4};
v4si b = {3,2,1,4};
v4si c;
The elements of the input vectors are numbered in memory ordering of vec0 beginning
at 0 and vec1 beginning at N. The elements of mask are considered modulo N in the
single-operand case and modulo 2 ∗ N in the two-operand case.
Consider the following example,
typedef int v4si __attribute__ ((vector_size (16)));
v4si a = {1,2,3,4};
v4si b = {5,6,7,8};
v4si mask1 = {0,1,1,3};
v4si mask2 = {0,4,2,5};
v4si res;
offsetof_member_designator:
identifier
| offsetof_member_designator "." identifier
| offsetof_member_designator "[" expr "]"
This extension is sufficient such that
#define offsetof(type, member) __builtin_offsetof (type, member)
is a suitable definition of the offsetof macro. In C++, type may be dependent. In either
case, member may consist of a single identifier, or a sequence of member accesses and array
references.
or 8 bytes in size other than the C type _Bool or the C++ type bool. Operations on pointer
arguments are performed as if the operands were of the uintptr_t type. That is, they are
not scaled by the size of the type to which the pointer points.
These functions are implemented in terms of the ‘__atomic’ builtins (see Section 6.53
[ atomic Builtins], page 560). They should not be used for new code which should use the
‘__atomic’ builtins instead.
Not all operations are supported by all target processors. If a particular operation cannot
be implemented on the target processor, a warning is generated and a call to an external
function is generated. The external function carries the same name as the built-in version,
with an additional suffix ‘_n’ where n is the size of the data type.
In most cases, these built-in functions are considered a full barrier. That is, no memory
operand is moved across the operation, either forward or backward. Further, instructions
are issued as necessary to prevent the processor from speculating loads across the operation
and from queuing stores after the operation.
All of the routines are described in the Intel documentation to take “an optional list
of variables protected by the memory barrier”. It’s not clear what is meant by that; it
could mean that only the listed variables are protected, or it could mean a list of additional
variables to be protected. The list is ignored by GCC which treats it as empty. GCC
interprets an empty list as meaning that all globally accessible variables should be protected.
type __sync_fetch_and_add (type *ptr, type value, ...)
type __sync_fetch_and_sub (type *ptr, type value, ...)
type __sync_fetch_and_or (type *ptr, type value, ...)
type __sync_fetch_and_and (type *ptr, type value, ...)
type __sync_fetch_and_xor (type *ptr, type value, ...)
type __sync_fetch_and_nand (type *ptr, type value, ...)
These built-in functions perform the operation suggested by the name, and re-
turns the value that had previously been in memory. That is, operations on
integer operands have the following semantics. Operations on pointer argu-
ments are performed as if the operands were of the uintptr_t type. That is,
they are not scaled by the size of the type to which the pointer points.
{ tmp = *ptr; *ptr op= value; return tmp; }
{ tmp = *ptr; *ptr = ~(tmp & value); return tmp; } // nand
The object pointed to by the first argument must be of integer or pointer type.
It must not be a boolean type.
Note: GCC 4.4 and later implement __sync_fetch_and_nand as *ptr = ~(tmp
& value) instead of *ptr = ~tmp & value.
type __sync_add_and_fetch (type *ptr, type value, ...)
type __sync_sub_and_fetch (type *ptr, type value, ...)
type __sync_or_and_fetch (type *ptr, type value, ...)
type __sync_and_and_fetch (type *ptr, type value, ...)
type __sync_xor_and_fetch (type *ptr, type value, ...)
type __sync_nand_and_fetch (type *ptr, type value, ...)
These built-in functions perform the operation suggested by the name, and
return the new value. That is, operations on integer operands have the following
560 Using the GNU Compiler Collection (GCC)
Note that the ‘__atomic’ builtins assume that programs will conform to the C++11 mem-
ory model. In particular, they assume that programs are free of data races. See the C++11
standard for detailed requirements.
The ‘__atomic’ builtins can be used with any integral scalar or pointer type that is 1, 2,
4, or 8 bytes in length. 16-byte integral types are also allowed if ‘__int128’ (see Section 6.8
[ int128], page 414) is supported by the architecture.
The four non-arithmetic functions (load, store, exchange, and compare exchange) all have
a generic version as well. This generic version works on any data type. It uses the lock-free
built-in function if the specific data type size makes that possible; otherwise, an external call
is left to be resolved at run time. This external call is the same format with the addition of
a ‘size_t’ parameter inserted as the first parameter indicating the size of the object being
pointed to. All objects must be the same size.
There are 6 different memory orders that can be specified. These map to the C++11
memory orders with the same names, see the C++11 standard or the GCC wiki on atomic
synchronization for detailed definitions. Individual targets may also support additional
memory orders for use on specific architectures. Refer to the target documentation for
details of these.
An atomic operation can both constrain code motion and be mapped to hardware instruc-
tions for synchronization between threads (e.g., a fence). To which extent this happens is
controlled by the memory orders, which are listed here in approximately ascending order
of strength. The description of each memory order is only meant to roughly illustrate the
effects and is not a specification; see the C++11 memory model for precise semantics.
__ATOMIC_RELAXED
Implies no inter-thread ordering constraints.
__ATOMIC_CONSUME
This is currently implemented using the stronger __ATOMIC_ACQUIRE memory
order because of a deficiency in C++11’s semantics for memory_order_consume.
__ATOMIC_ACQUIRE
Creates an inter-thread happens-before constraint from the release (or stronger)
semantic store to this acquire load. Can prevent hoisting of code to before the
operation.
__ATOMIC_RELEASE
Creates an inter-thread happens-before constraint to acquire (or stronger) se-
mantic loads that read from this release store. Can prevent sinking of code to
after the operation.
__ATOMIC_ACQ_REL
Combines the effects of both __ATOMIC_ACQUIRE and __ATOMIC_RELEASE.
__ATOMIC_SEQ_CST
Enforces total ordering with all other __ATOMIC_SEQ_CST operations.
Note that in the C++11 memory model, fences (e.g., ‘__atomic_thread_fence’) take ef-
fect in combination with other atomic operations on specific memory locations (e.g., atomic
loads); operations on specific memory locations do not necessarily affect other operations
in the same way.
562 Using the GNU Compiler Collection (GCC)
Target architectures are encouraged to provide their own patterns for each of the atomic
built-in functions. If no target is provided, the original non-memory model set of ‘__sync’
atomic built-in functions are used, along with any required synchronization fences surround-
ing it in order to achieve the proper behavior. Execution in this case is subject to the same
restrictions as those built-in functions.
If there is no pattern or mechanism to provide a lock-free instruction sequence, a call is
made to an external routine with the same parameters to be resolved at run time.
When implementing patterns for these built-in functions, the memory order parameter
can be ignored as long as the pattern implements the most restrictive __ATOMIC_SEQ_CST
memory order. Any of the other memory orders execute correctly with this memory order
but they may not execute as efficiently as they could with a more appropriate implementa-
tion of the relaxed requirements.
Note that the C++11 standard allows for the memory order parameter to be determined
at run time rather than at compile time. These built-in functions map any run-time value
to __ATOMIC_SEQ_CST rather than invoke a runtime library call or inline a switch statement.
This is standard compliant, safe, and the simplest approach for now.
The memory order parameter is a signed int, but only the lower 16 bits are reserved for
the memory order. The remainder of the signed int is reserved for target use and should be
0. Use of the predefined atomic values ensures proper usage.
type __atomic_load_n (type *ptr, int memorder) [Built-in Function]
This built-in function implements an atomic load operation. It returns the contents
of *ptr.
The valid memory order variants are __ATOMIC_RELAXED, __ATOMIC_SEQ_CST, __
ATOMIC_ACQUIRE, and __ATOMIC_CONSUME.
void __atomic_load (type *ptr, type *ret, int memorder) [Built-in Function]
This is the generic version of an atomic load. It returns the contents of *ptr in *ret.
void __atomic_store_n (type *ptr, type val, int memorder) [Built-in Function]
This built-in function implements an atomic store operation. It writes val into *ptr.
The valid memory order variants are __ATOMIC_RELAXED, __ATOMIC_SEQ_CST, and
__ATOMIC_RELEASE.
void __atomic_store (type *ptr, type *val, int memorder) [Built-in Function]
This is the generic version of an atomic store. It stores the value of *val into *ptr.
type __atomic_exchange_n (type *ptr, type val, int [Built-in Function]
memorder)
This built-in function implements an atomic exchange operation. It writes val into
*ptr, and returns the previous contents of *ptr.
The valid memory order variants are __ATOMIC_RELAXED, __ATOMIC_SEQ_CST, __
ATOMIC_ACQUIRE, __ATOMIC_RELEASE, and __ATOMIC_ACQ_REL.
void __atomic_exchange (type *ptr, type *val, type *ret, int [Built-in Function]
memorder)
This is the generic version of an atomic exchange. It stores the contents of *val into
*ptr. The original value of *ptr is copied into *ret.
Chapter 6: Extensions to the C Language Family 563
performed as if the operands were of the uintptr_t type. That is, they are not
scaled by the size of the type to which the pointer points.
{ tmp = *ptr; *ptr op= val; return tmp; }
The same constraints on arguments apply as for the corresponding __atomic_op_
fetch built-in functions. All memory orders are valid.
The following built-in functions allow checking if simple arithmetic operation would over-
flow.
enum {
A = INT_MAX, B = 3,
C = INT_ADD_OVERFLOW_P (A, B) ? 0 : A + B,
D = __builtin_add_overflow_p (1, SCHAR_MAX, (signed char) 0)
Chapter 6: Extensions to the C Language Family 567
};
The compiler will attempt to use hardware instructions to implement these built-in
functions where possible, like conditional jump on overflow after addition, conditional
jump on carry etc.
int lockvar;
There are built-in functions added for many common string operation functions, e.g., for
memcpy __builtin___memcpy_chk built-in is provided. This built-in has an additional last
argument, which is the number of bytes remaining in object the dest argument points to or
(size_t) -1 if the size is not known.
The built-in functions are optimized into the normal string functions like memcpy if the
last argument is (size_t) -1 or if it is known at compile time that the destination object
will not be overflown. If the compiler can determine at compile time the object will be
always overflown, it issues a warning.
The intended use can be e.g.
#undef memcpy
#define bos0(dest) __builtin_object_size (dest, 0)
#define memcpy(dest, src, n) \
__builtin___memcpy_chk (dest, src, n, bos0 (dest))
char *volatile p;
char buf[10];
/* It is unknown what object p points to, so this is optimized
into plain memcpy - no checking is possible. */
memcpy (p, "abcde", n);
/* Destination is known and length too. It is known at compile
time there will be no overflow. */
memcpy (&buf[5], "abcde", 5);
/* Destination is known, but the length is not known at compile time.
This will result in __memcpy_chk call that can check for overflow
at run time. */
memcpy (&buf[5], "abcde", n);
/* Destination is known and it is known at compile time there will
be overflow. There will be a warning and __memcpy_chk call that
will abort the program at run time. */
memcpy (&buf[6], "abcde", 5);
Such built-in functions are provided for memcpy, mempcpy, memmove, memset, strcpy,
stpcpy, strncpy, strcat and strncat.
There are also checking built-in functions for formatted output functions.
Chapter 6: Extensions to the C Language Family 569
int __builtin___sprintf_chk (char *s, int flag, size_t os, const char *fmt, ...);
int __builtin___snprintf_chk (char *s, size_t maxlen, int flag, size_t os,
const char *fmt, ...);
int __builtin___vsprintf_chk (char *s, int flag, size_t os, const char *fmt,
va_list ap);
int __builtin___vsnprintf_chk (char *s, size_t maxlen, int flag, size_t os,
const char *fmt, va_list ap);
The added flag argument is passed unchanged to __sprintf_chk etc. functions and can
contain implementation specific flags on what additional security measures the checking
function might take, such as handling %n differently.
The os argument is the object size s points to, like in the other built-in functions. There
is a small difference in the behavior though, if os is (size_t) -1, the built-in functions are
optimized into the non-checking functions only if flag is 0, otherwise the checking function
is called with os argument set to (size_t) -1.
In addition to this, there are checking built-in functions __builtin___printf_chk, _
_builtin___vprintf_chk, __builtin___fprintf_chk and __builtin___vfprintf_chk.
These have just one additional argument, flag, right before format string fmt. If the compiler
is able to optimize them to fputc etc. functions, it does, otherwise the checking function is
called and the flag argument passed to it.
• __sec_reduce_mutating
Further details and examples about these built-in functions are described in the Cilk Plus
language manual which can be found at https://www.cilkplus.org.
log2f, log2l, log2, logbf, logbl, logb, lrintf, lrintl, lrint, lroundf, lroundl,
lround, nearbyintf, nearbyintl, nearbyint, nextafterf, nextafterl, nextafter,
nexttowardf, nexttowardl, nexttoward, remainderf, remainderl, remainder, remquof,
remquol, remquo, rintf, rintl, rint, roundf, roundl, round, scalblnf, scalblnl,
scalbln, scalbnf, scalbnl, scalbn, snprintf, tgammaf, tgammal, tgamma, truncf,
truncl, trunc, vfscanf, vscanf, vsnprintf and vsscanf are handled as built-in
functions except in strict ISO C90 mode (‘-ansi’ or ‘-std=c90’).
There are also built-in versions of the ISO C99 functions acosf, acosl, asinf, asinl,
atan2f, atan2l, atanf, atanl, ceilf, ceill, cosf, coshf, coshl, cosl, expf, expl,
fabsf, fabsl, floorf, floorl, fmodf, fmodl, frexpf, frexpl, ldexpf, ldexpl, log10f,
log10l, logf, logl, modfl, modf, powf, powl, sinf, sinhf, sinhl, sinl, sqrtf, sqrtl,
tanf, tanhf, tanhl and tanl that are recognized in any mode since ISO C90 reserves these
names for the purpose to which ISO C99 puts them. All these functions have corresponding
versions prefixed with __builtin_.
There are also built-in functions __builtin_fabsfn, __builtin_fabsfnx, __builtin_
copysignfn and __builtin_copysignfnx, corresponding to the TS 18661-3 functions
fabsfn, fabsfnx, copysignfn and copysignfnx, for supported types _Floatn and
_Floatnx.
There are also GNU extension functions clog10, clog10f and clog10l which names
are reserved by ISO C99 for future use. All these functions have versions prefixed with
__builtin_.
The ISO C94 functions iswalnum, iswalpha, iswcntrl, iswdigit, iswgraph, iswlower,
iswprint, iswpunct, iswspace, iswupper, iswxdigit, towlower and towupper are han-
dled as built-in functions except in strict ISO C90 mode (‘-ansi’ or ‘-std=c90’).
The ISO C90 functions abort, abs, acos, asin, atan2, atan, calloc, ceil, cosh,
cos, exit, exp, fabs, floor, fmod, fprintf, fputs, frexp, fscanf, isalnum, isalpha,
iscntrl, isdigit, isgraph, islower, isprint, ispunct, isspace, isupper, isxdigit,
tolower, toupper, labs, ldexp, log10, log, malloc, memchr, memcmp, memcpy, memset,
modf, pow, printf, putchar, puts, scanf, sinh, sin, snprintf, sprintf, sqrt, sscanf,
strcat, strchr, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk,
strrchr, strspn, strstr, tanh, tan, vfprintf, vprintf and vsprintf are all recognized
as built-in functions unless ‘-fno-builtin’ is specified (or ‘-fno-builtin-function’ is
specified for an individual function). All of these functions have corresponding versions
prefixed with __builtin_.
GCC provides built-in versions of the ISO C99 floating-point comparison macros that
avoid raising exceptions for unordered operands. They have the same names as the stan-
dard macros ( isgreater, isgreaterequal, isless, islessequal, islessgreater, and
isunordered) , with __builtin_ prefixed. We intend for a library implementor to be able
to simply #define each standard macro to its built-in equivalent. In the same fashion,
GCC provides fpclassify, isfinite, isinf_sign, isnormal and signbit built-ins used
with __builtin_ prefixed. The isinf and isnan built-in functions appear both with and
without the __builtin_ prefix.
the default stack alignment boundary for the target determined by the __BIGGEST_
ALIGNMENT__ macro. The __builtin_alloca function returns a pointer to the first
byte of the allocated object. The lifetime of the allocated object ends just before
the calling function returns to its caller. This is so even when __builtin_alloca is
called within a nested block.
For example, the following function allocates eight objects of n bytes each on the
stack, storing a pointer to each in consecutive elements of the array a. It then passes
the array to function g which can safely use the storage pointed to by each of the
array elements.
void f (unsigned n)
{
void *a [8];
for (int i = 0; i != 8; ++i)
a [i] = __builtin_alloca (n);
p = __builtin_alloc (n);
does not indicate that the value is not a constant, but merely that GCC cannot prove
it is a constant with the specified value of the ‘-O’ option.
You typically use this function in an embedded application where memory is a critical
resource. If you have some complex calculation, you may want it to be folded if it
involves constants, but need to call a function if it does not. For example:
#define Scale_Value(X) \
(__builtin_constant_p (X) \
? ((X) * SCALE + OFFSET) : Scale (X))
You may use this built-in function in either a macro or an inline function. However, if
you use it in an inlined function and pass an argument of the function as the argument
to the built-in, GCC never returns 1 when you call the inline function with a string
constant or compound literal (see Section 6.26 [Compound Literals], page 426) and
does not return 1 when you pass a constant numeric value to the inline function unless
you specify the ‘-O’ option.
You may also use __builtin_constant_p in initializers for static data. For instance,
you can write
static const int table[] = {
__builtin_constant_p (EXPRESSION) ? (EXPRESSION) : -1,
/* . . . */
};
This is an acceptable initializer even if EXPRESSION is not a constant expression,
including the case where __builtin_constant_p returns 1 because EXPRESSION
can be folded to a constant but EXPRESSION contains operands that are not other-
wise permitted in a static initializer (for example, 0 && foo ()). GCC must be more
conservative about evaluating the built-in in this case, because it has no opportunity
to perform optimization.
long __builtin_expect (long exp, long c) [Built-in Function]
You may use __builtin_expect to provide the compiler with branch prediction
information. In general, you should prefer to use actual profile feedback for this
(‘-fprofile-arcs’), as programmers are notoriously bad at predicting how their
programs actually perform. However, there are applications in which this data is
hard to collect.
The return value is the value of exp, which should be an integral expression. The
semantics of the built-in are that it is expected that exp == c. For example:
if (__builtin_expect (x, 0))
foo ();
indicates that we do not expect to call foo, since we expect x to be zero. Since you
are limited to integral expressions for exp, you should use constructions such as
if (__builtin_expect (ptr != NULL, 1))
foo (*ptr);
when testing pointer or floating-point values.
void __builtin_trap (void) [Built-in Function]
This function causes the program to exit abnormally. GCC implements this function
by using a target-dependent mechanism (such as intentionally executing an illegal
instruction) or by calling abort. The mechanism used may vary from release to
release so you should not rely on any particular implementation.
578 Using the GNU Compiler Collection (GCC)
int g (int c)
{
if (c)
{
return 1;
}
else
{
function_that_never_returns ();
__builtin_unreachable ();
}
}
The value of addr is the address of the memory to prefetch. There are two optional
arguments, rw and locality. The value of rw is a compile-time constant one or zero;
one means that the prefetch is preparing for a write to the memory address and zero,
the default, means that the prefetch is preparing for a read. The value locality must
be a compile-time constant integer between zero and three. A value of zero means
that the data has no temporal locality, so it need not be left in the cache after the
access. A value of three means that the data has a high degree of temporal locality and
should be left in all levels of cache possible. Values of one and two mean, respectively,
a low or moderate degree of temporal locality. The default is three.
for (i = 0; i < n; i++)
{
a[i] = a[i] + b[i];
__builtin_prefetch (&a[i+j], 1, 1);
__builtin_prefetch (&b[i+j], 0, 1);
/* . . . */
}
Data prefetch does not generate faults if addr is invalid, but the address expression
itself must be valid. For example, a prefetch of p->next does not fault if p->next is
not a valid address, but evaluation faults if p is not a valid address.
If the target does not support data prefetch, the address expression is evaluated if it
includes side effects but no other code is generated and GCC does not issue a warning.
int __builtin_fpclassify (int, int, int, int, int, ...) [Built-in Function]
This built-in implements the C99 fpclassify functionality. The first five int arguments
should be the target library’s notion of the possible FP classes and are used for return
values. They must be constant values and they must appear in this order: FP_NAN,
FP_INFINITE, FP_NORMAL, FP_SUBNORMAL and FP_ZERO. The ellipsis is for exactly one
floating-point value to classify. GCC treats the last argument as type-generic, which
means it does not do default promotion from float to double.
void __builtin_arc_sr (unsigned int auxr, unsigned int val) [Built-in Function]
The first argument, auxv, is the address of an auxiliary register, the second argument,
val, is a compile time constant to be written to the register. Generates:
sr auxr, [val]
The instructions generated by the following builtins are not considered as candidates for
scheduling. They are not moved around by the compiler during scheduling, and thus can
be expected to appear where they are put in the C code:
__builtin_arc_brk()
__builtin_arc_core_read()
__builtin_arc_core_write()
__builtin_arc_flag()
__builtin_arc_lr()
__builtin_arc_sleep()
__builtin_arc_sr()
__builtin_arc_swi()
These types can be used to define 128-bit variables. The built-in functions listed in the
following section can be used on these variables to generate the vector operations.
For all builtins, __builtin_arc_someinsn, the header file ‘arc-simd.h’ also provides
equivalent macros called _someinsn that can be used for programming ease and improved
readability. The following macros for DMA control are also provided:
#define _setup_dma_in_channel_reg _vdiwr
#define _setup_dma_out_channel_reg _vdowr
The following is a complete list of all the SIMD built-ins provided for ARC, grouped by
calling signature.
The following take two __v8hi arguments and return a __v8hi result:
__v8hi __builtin_arc_vaddaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vaddw (__v8hi, __v8hi)
__v8hi __builtin_arc_vand (__v8hi, __v8hi)
__v8hi __builtin_arc_vandaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vavb (__v8hi, __v8hi)
__v8hi __builtin_arc_vavrb (__v8hi, __v8hi)
__v8hi __builtin_arc_vbic (__v8hi, __v8hi)
__v8hi __builtin_arc_vbicaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vdifaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vdifw (__v8hi, __v8hi)
__v8hi __builtin_arc_veqw (__v8hi, __v8hi)
__v8hi __builtin_arc_vh264f (__v8hi, __v8hi)
__v8hi __builtin_arc_vh264ft (__v8hi, __v8hi)
__v8hi __builtin_arc_vh264fw (__v8hi, __v8hi)
__v8hi __builtin_arc_vlew (__v8hi, __v8hi)
__v8hi __builtin_arc_vltw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmaxaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmaxw (__v8hi, __v8hi)
__v8hi __builtin_arc_vminaw (__v8hi, __v8hi)
__v8hi __builtin_arc_vminw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr1aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr1w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr2aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr2w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr3aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr3w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr4aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr4w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr5aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr5w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr6aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr6w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr7aw (__v8hi, __v8hi)
__v8hi __builtin_arc_vmr7w (__v8hi, __v8hi)
__v8hi __builtin_arc_vmrb (__v8hi, __v8hi)
__v8hi __builtin_arc_vmulaw (__v8hi, __v8hi)
Chapter 6: Extensions to the C Language Family 591
from ‘arm_acle.h’. The ARM back end’s 16-bit floating-point Advanced SIMD intrinsics
currently comply to ACLE v1.1. AArch64’s back end does not have support for 16-bit
floating point Advanced SIMD intrinsics yet.
See Section 3.18.4 [ARM Options], page 232 and Section 3.18.1 [AArch64 Options],
page 217 for more information on the availability of extensions.
ticks is the number of ticks to delay execution. Note that this built-in does not take into
account the effect of interrupts that might increase delay time. ticks must be a compile-
time integer constant; delays with a variable number of cycles are not supported.
char __builtin_avr_flash_segment (const __memx void*)
This built-in takes a byte address to the 24-bit [AVR Named Address Spaces], page 419
__memx and returns the number of the flash segment (the 64 KiB chunk) where the address
points to. Counting starts at 0. If the address does not point to flash memory, return -1.
unsigned char __builtin_avr_insert_bits (unsigned long map,
unsigned char bits,
unsigned char val)
Insert bits from bits into val and return the resulting value. The nibbles of map determine
how the insertion is performed: Let X be the n-th nibble of map
1. If X is 0xf, then the n-th bit of val is returned unaltered.
2. If X is in the range 0. . . 7, then the n-th result bit is set to the X-th bit of bits
3. If X is in the range 8. . . 0xe, then the n-th result bit is undefined.
One typical use case for this built-in is adjusting input and output values to non-contiguous
port layouts. Some examples:
// same as val, bits is unused
__builtin_avr_insert_bits (0xffffffff, bits, val)
// same as bits, val is unused
__builtin_avr_insert_bits (0x76543210, bits, val)
// same as rotating bits by 4
__builtin_avr_insert_bits (0x32107654, bits, 0)
// high nibble of result is the high nibble of val
// low nibble of result is the low nibble of bits
__builtin_avr_insert_bits (0xffff3210, bits, val)
// reverse the bit order of bits
__builtin_avr_insert_bits (0x01234567, bits, 0)
void __builtin_avr_nops (unsigned count)
Insert count NOP instructions. The number of instructions must be a compile-time integer
constant.
The SCOUNT and POS bits of the DSP control register are global. The WRDSP,
EXTPDP, EXTPDPV and MTHLIP instructions modify the SCOUNT and POS bits. Dur-
ing optimization, the compiler does not delete these instructions and it does not delete calls
to functions containing these instructions.
At present, GCC only provides support for operations on 32-bit vectors. The vector type
associated with 8-bit integer data is usually called v4i8, the vector type associated with
Q7 is usually called v4q7, the vector type associated with 16-bit integer data is usually
called v2i16, and the vector type associated with Q15 is usually called v2q15. They can
be defined in C as follows:
typedef signed char v4i8 __attribute__ ((vector_size(4)));
typedef signed char v4q7 __attribute__ ((vector_size(4)));
typedef short v2i16 __attribute__ ((vector_size(4)));
typedef short v2q15 __attribute__ ((vector_size(4)));
v4i8, v4q7, v2i16 and v2q15 values are initialized in the same way as aggregates. For
example:
v4i8 a = {1, 2, 3, 4};
v4i8 b;
b = (v4i8) {5, 6, 7, 8};
q31 and i32 are actually the same as int, but we use q31 to indicate a Q31 fractional
value and i32 to indicate a 32-bit integer value. Similarly, a64 is the same as long long,
but we use a64 to indicate values that are placed in one of the four DSP accumulators
($ac0, $ac1, $ac2 or $ac3).
Also, some built-in functions prefer or require immediate numbers as parameters, because
the corresponding DSP instructions accept both immediate numbers and register operands,
or accept immediate numbers only. The immediate parameters are listed as follows.
imm0_3: 0 to 3.
imm0_7: 0 to 7.
imm0_15: 0 to 15.
imm0_31: 0 to 31.
imm0_63: 0 to 63.
imm0_255: 0 to 255.
imm_n32_31: -32 to 31.
imm_n512_511: -512 to 511.
The following built-in functions map directly to a particular MIPS DSP instruction.
Please refer to the architecture specification for details on what each instruction does.
v2q15 __builtin_mips_addq_ph (v2q15, v2q15)
v2q15 __builtin_mips_addq_s_ph (v2q15, v2q15)
q31 __builtin_mips_addq_s_w (q31, q31)
v4i8 __builtin_mips_addu_qb (v4i8, v4i8)
v4i8 __builtin_mips_addu_s_qb (v4i8, v4i8)
v2q15 __builtin_mips_subq_ph (v2q15, v2q15)
v2q15 __builtin_mips_subq_s_ph (v2q15, v2q15)
q31 __builtin_mips_subq_s_w (q31, q31)
v4i8 __builtin_mips_subu_qb (v4i8, v4i8)
v4i8 __builtin_mips_subu_s_qb (v4i8, v4i8)
i32 __builtin_mips_addsc (i32, i32)
i32 __builtin_mips_addwc (i32, i32)
i32 __builtin_mips_modsub (i32, i32)
i32 __builtin_mips_raddu_w_qb (v4i8)
v2q15 __builtin_mips_absq_s_ph (v2q15)
q31 __builtin_mips_absq_s_w (q31)
v4i8 __builtin_mips_precrq_qb_ph (v2q15, v2q15)
v2q15 __builtin_mips_precrq_ph_w (q31, q31)
v2q15 __builtin_mips_precrq_rs_ph_w (q31, q31)
v4i8 __builtin_mips_precrqu_s_qb_ph (v2q15, v2q15)
q31 __builtin_mips_preceq_w_phl (v2q15)
q31 __builtin_mips_preceq_w_phr (v2q15)
v2q15 __builtin_mips_precequ_ph_qbl (v4i8)
v2q15 __builtin_mips_precequ_ph_qbr (v4i8)
v2q15 __builtin_mips_precequ_ph_qbla (v4i8)
v2q15 __builtin_mips_precequ_ph_qbra (v4i8)
v2q15 __builtin_mips_preceu_ph_qbl (v4i8)
v2q15 __builtin_mips_preceu_ph_qbr (v4i8)
v2q15 __builtin_mips_preceu_ph_qbla (v4i8)
v2q15 __builtin_mips_preceu_ph_qbra (v4i8)
v4i8 __builtin_mips_shll_qb (v4i8, imm0_7)
v4i8 __builtin_mips_shll_qb (v4i8, i32)
v2q15 __builtin_mips_shll_ph (v2q15, imm0_15)
v2q15 __builtin_mips_shll_ph (v2q15, i32)
v2q15 __builtin_mips_shll_s_ph (v2q15, imm0_15)
v2q15 __builtin_mips_shll_s_ph (v2q15, i32)
q31 __builtin_mips_shll_s_w (q31, imm0_31)
q31 __builtin_mips_shll_s_w (q31, i32)
604 Using the GNU Compiler Collection (GCC)
The following built-in functions map directly to a particular MIPS DSP REV 2 instruc-
tion. Please refer to the architecture specification for details on what each instruction does.
v4q7 __builtin_mips_absq_s_qb (v4q7);
v2i16 __builtin_mips_addu_ph (v2i16, v2i16);
v2i16 __builtin_mips_addu_s_ph (v2i16, v2i16);
v4i8 __builtin_mips_adduh_qb (v4i8, v4i8);
v4i8 __builtin_mips_adduh_r_qb (v4i8, v4i8);
i32 __builtin_mips_append (i32, i32, imm0_31);
i32 __builtin_mips_balign (i32, i32, imm0_3);
i32 __builtin_mips_cmpgdu_eq_qb (v4i8, v4i8);
i32 __builtin_mips_cmpgdu_lt_qb (v4i8, v4i8);
i32 __builtin_mips_cmpgdu_le_qb (v4i8, v4i8);
a64 __builtin_mips_dpa_w_ph (a64, v2i16, v2i16);
a64 __builtin_mips_dps_w_ph (a64, v2i16, v2i16);
v2i16 __builtin_mips_mul_ph (v2i16, v2i16);
v2i16 __builtin_mips_mul_s_ph (v2i16, v2i16);
q31 __builtin_mips_mulq_rs_w (q31, q31);
v2q15 __builtin_mips_mulq_s_ph (v2q15, v2q15);
q31 __builtin_mips_mulq_s_w (q31, q31);
a64 __builtin_mips_mulsa_w_ph (a64, v2i16, v2i16);
v4i8 __builtin_mips_precr_qb_ph (v2i16, v2i16);
v2i16 __builtin_mips_precr_sra_ph_w (i32, i32, imm0_31);
v2i16 __builtin_mips_precr_sra_r_ph_w (i32, i32, imm0_31);
i32 __builtin_mips_prepend (i32, i32, imm0_31);
v4i8 __builtin_mips_shra_qb (v4i8, imm0_7);
v4i8 __builtin_mips_shra_r_qb (v4i8, imm0_7);
v4i8 __builtin_mips_shra_qb (v4i8, i32);
v4i8 __builtin_mips_shra_r_qb (v4i8, i32);
v2i16 __builtin_mips_shrl_ph (v2i16, imm0_15);
v2i16 __builtin_mips_shrl_ph (v2i16, i32);
v2i16 __builtin_mips_subu_ph (v2i16, v2i16);
v2i16 __builtin_mips_subu_s_ph (v2i16, v2i16);
v4i8 __builtin_mips_subuh_qb (v4i8, v4i8);
v4i8 __builtin_mips_subuh_r_qb (v4i8, v4i8);
v2q15 __builtin_mips_addqh_ph (v2q15, v2q15);
v2q15 __builtin_mips_addqh_r_ph (v2q15, v2q15);
q31 __builtin_mips_addqh_w (q31, q31);
q31 __builtin_mips_addqh_r_w (q31, q31);
v2q15 __builtin_mips_subqh_ph (v2q15, v2q15);
v2q15 __builtin_mips_subqh_r_ph (v2q15, v2q15);
q31 __builtin_mips_subqh_w (q31, q31);
q31 __builtin_mips_subqh_r_w (q31, q31);
a64 __builtin_mips_dpax_w_ph (a64, v2i16, v2i16);
606 Using the GNU Compiler Collection (GCC)
v2sf a, b;
if (__builtin_mips_upper_c_eq_ps (a, b))
upper_halves_are_equal ();
else
upper_halves_are_unequal ();
These built-in functions are available for the PowerPC family of processors:
float __builtin_recipdivf (float, float);
float __builtin_rsqrtf (float);
double __builtin_recipdiv (double, double);
double __builtin_rsqrt (double);
uint64_t __builtin_ppc_get_timebase ();
unsigned long __builtin_ppc_mftb ();
double __builtin_unpack_longdouble (long double, int);
long double __builtin_pack_longdouble (double, double);
The vec_rsqrt, __builtin_rsqrt, and __builtin_rsqrtf functions generate multiple
instructions to implement the reciprocal sqrt functionality using reciprocal sqrt estimate
instructions.
Chapter 6: Extensions to the C Language Family 631
double
scalar_insert_exp (unsigned long long int significand, unsigned long long int exponent);
double
632 Using the GNU Compiler Collection (GCC)
least significant 11 bits of the exponent argument and the least significant 52 bits of the
significand argument.
The scalar_cmp_exp_gt, scalar_cmp_exp_lt, scalar_cmp_exp_eq, and scalar_cmp_
exp_unordered built-in functions return a non-zero value if arg1 is greater than, less than,
equal to, or not comparable to arg2 respectively. The arguments are not comparable if one
or the other equals NaN (not a number).
The scalar_test_data_class built-in function returns 1 if any of the condition tests
enabled by the value of the condition variable are true, and 0 otherwise. The condition
argument must be a compile-time constant integer with value not exceeding 127. The
condition argument is encoded as a bitmask with each bit enabling the testing of a different
condition, as characterized by the following:
0x40 Test for NaN
0x20 Test for +Infinity
0x10 Test for -Infinity
0x08 Test for +Zero
0x04 Test for -Zero
0x02 Test for +Denormal
0x01 Test for -Denormal
The scalar_test_neg built-in function returns 1 if its source argument holds a negative
value, 0 otherwise.
The __builtin_byte_in_set function requires a 64-bit environment supporting ISA 3.0
or later. This function returns a non-zero value if and only if its u argument exactly equals
one of the eight bytes contained within its 64-bit set argument.
The __builtin_byte_in_range and __builtin_byte_in_either_range require an en-
vironment supporting ISA 3.0 or later. For these two functions, the range argument is
encoded as 4 bytes, organized as hi_1:lo_1:hi_2:lo_2. The __builtin_byte_in_range
function returns a non-zero value if and only if its u argument is within the range bounded
between lo_2 and hi_2 inclusive. The __builtin_byte_in_either_range function returns
non-zero if and only if its u argument is within either the range bounded between lo_1 and
hi_1 inclusive or the range bounded between lo_2 and hi_2 inclusive.
The __builtin_dfp_dtstsfi_lt function returns a non-zero value if and only if the num-
ber of signficant digits of its value argument is less than its comparison argument. The __
builtin_dfp_dtstsfi_lt_dd and __builtin_dfp_dtstsfi_lt_td functions behave simi-
larly, but require that the type of the value argument be __Decimal64 and __Decimal128
respectively.
The __builtin_dfp_dtstsfi_gt function returns a non-zero value if and only if the
number of signficant digits of its value argument is greater than its comparison argu-
ment. The __builtin_dfp_dtstsfi_gt_dd and __builtin_dfp_dtstsfi_gt_td functions
behave similarly, but require that the type of the value argument be __Decimal64 and __
Decimal128 respectively.
The __builtin_dfp_dtstsfi_eq function returns a non-zero value if and only if the
number of signficant digits of its value argument equals its comparison argument. The __
builtin_dfp_dtstsfi_eq_dd and __builtin_dfp_dtstsfi_eq_td functions behave simi-
larly, but require that the type of the value argument be __Decimal64 and __Decimal128
respectively.
634 Using the GNU Compiler Collection (GCC)
The __builtin_dfp_dtstsfi_ov function returns a non-zero value if and only if its value
argument has an undefined number of significant digits, such as when value is an encoding of
NaN. The __builtin_dfp_dtstsfi_ov_dd and __builtin_dfp_dtstsfi_ov_td functions
behave similarly, but require that the type of the value argument be __Decimal64 and
__Decimal128 respectively.
The following built-in functions are also available for the PowerPC family of processors,
starting with ISA 3.0 or later (‘-mcpu=power9’). These string functions are described sep-
arately in order to group the descriptions closer to the function prototypes:
int vec_all_nez (vector signed char, vector signed char);
int vec_all_nez (vector unsigned char, vector unsigned char);
int vec_all_nez (vector signed short, vector signed short);
int vec_all_nez (vector unsigned short, vector unsigned short);
int vec_all_nez (vector signed int, vector signed int);
int vec_all_nez (vector unsigned int, vector unsigned int);
vector bool char vec_cmpnez (vector signed char arg1, vector signed char arg2);
vector bool char vec_cmpnez (vector unsigned char arg1, vector unsigned char arg2);
vector bool short vec_cmpnez (vector signed short arg1, vector signed short arg2);
vector bool short vec_cmpnez (vector unsigned short arg1, vector unsigned short arg2);
vector bool int vec_cmpnez (vector signed int arg1, vector signed int arg2);
vector bool int vec_cmpnez (vector unsigned int, vector unsigned int);
void vec_xst_len (vector signed char data, signed char *addr, size_t len);
void vec_xst_len (vector unsigned char data, unsigned char *addr, size_t len);
void vec_xst_len (vector signed int data, signed int *addr, size_t len);
void vec_xst_len (vector unsigned int data, unsigned int *addr, size_t len);
void vec_xst_len (vector unsigned __int128 data, unsigned __int128 *addr, size_t len);
void vec_xst_len (vector signed long long data, signed long long *addr, size_t len);
void vec_xst_len (vector unsigned long long data, unsigned long long *addr, size_t len);
void vec_xst_len (vector signed short data, signed short *addr, size_t len);
Chapter 6: Extensions to the C Language Family 635
void vec_xst_len (vector unsigned short data, unsigned short *addr, size_t len);
void vec_xst_len (vector signed __int128 data, signed __int128 *addr, size_t len);
void vec_xst_len (vector double data, double *addr, size_t len);
void vec_xst_len (vector float data, float *addr, size_t len);
signed char vec_xlx (unsigned int index, vector signed char data);
unsigned char vec_xlx (unsigned int index, vector unsigned char data);
signed short vec_xlx (unsigned int index, vector signed short data);
unsigned short vec_xlx (unsigned int index, vector unsigned short data);
signed int vec_xlx (unsigned int index, vector signed int data);
unsigned int vec_xlx (unsigned int index, vector unsigned int data);
float vec_xlx (unsigned int index, vector float data);
signed char vec_xrx (unsigned int index, vector signed char data);
unsigned char vec_xrx (unsigned int index, vector unsigned char data);
signed short vec_xrx (unsigned int index, vector signed short data);
unsigned short vec_xrx (unsigned int index, vector unsigned short data);
signed int vec_xrx (unsigned int index, vector signed int data);
unsigned int vec_xrx (unsigned int index, vector unsigned int data);
float vec_xrx (unsigned int index, vector float data);
The vec_xlx and vec_xrx functions extract the single element selected by the index
argument from the vector represented by the data argument. The index argument always
specifies a byte offset, regardless of the size of the vector element. With vec_xlx, index is
the offset of the first byte of the element to be extracted. With vec_xrx, index represents
the last byte of the element to be extracted, measured from the right end of the vector. In
other words, the last byte of the element to be extracted is found at position (15 - index).
There is no requirement that index be a multiple of the vector element size. However, if
the size of the vector element added to index is greater than 15, the content of the returned
value is undefined.
The following built-in functions are available for the PowerPC family of processors when
hardware decimal floating point (‘-mhard-dfp’) is available:
long long __builtin_dxex (_Decimal64);
long long __builtin_dxexq (_Decimal128);
_Decimal64 __builtin_ddedpd (int, _Decimal64);
_Decimal128 __builtin_ddedpdq (int, _Decimal128);
_Decimal64 __builtin_denbcd (int, _Decimal64);
_Decimal128 __builtin_denbcdq (int, _Decimal128);
_Decimal64 __builtin_diex (long long, _Decimal64);
_Decimal128 _builtin_diexq (long long, _Decimal128);
_Decimal64 __builtin_dscli (_Decimal64, int);
_Decimal128 __builtin_dscliq (_Decimal128, int);
_Decimal64 __builtin_dscri (_Decimal64, int);
_Decimal128 __builtin_dscriq (_Decimal128, int);
unsigned long long __builtin_unpack_dec128 (_Decimal128, int);
_Decimal128 __builtin_pack_dec128 (unsigned long long, unsigned long long);
The following built-in functions are available for the PowerPC family of processors when
the Vector Scalar (vsx) instruction set is available:
unsigned long long __builtin_unpack_vector_int128 (vector __int128_t, int);
vector __int128_t __builtin_pack_vector_int128 (unsigned long long,
unsigned long long);
vector double
The long types are only implemented for 64-bit code generation, and the long type is only
used in the floating point/integer conversion instructions.
GCC’s implementation of the high-level language interface available from C and C++ code
differs from Motorola’s documentation in several ways.
• A vector constant is a list of constant expressions within curly braces.
• A vector initializer requires no cast if the vector constant is of the same type as the
variable it is initializing.
• If signed or unsigned is omitted, the signedness of the vector type is the default
signedness of the base type. The default varies depending on the operating system, so
a portable program should always specify the signedness.
• Compiling with ‘-maltivec’ adds keywords __vector, vector, __pixel, pixel, __
bool and bool. When compiling ISO C, the context-sensitive substitution of the key-
words vector, pixel and bool is disabled. To use them, you must include <altivec.h>
instead.
• GCC allows using a typedef name as the type specifier for a vector type, but only
under the following circumstances:
• When using __vector instead of vector; for example,
typedef signed short int16;
__vector int16 data;
• When using vector in keyword-and-predefine mode; for example,
typedef signed short int16;
vector int16 data;
Note that keyword-and-predefine mode is enabled by disabling GNU extensions
(e.g., by using -std=c11) and including <altivec.h>.
• For C, overloaded functions are implemented with macros so the following does not
work:
vec_add ((vector signed int){1, 2, 3, 4}, foo);
Since vec_add is a macro, the vector constant in the example is treated as four separate
arguments. Wrap the entire argument in parentheses for this to work.
Note: Only the <altivec.h> interface is supported. Internally, GCC uses built-in func-
tions to achieve the functionality in the aforementioned header file, but they are not sup-
ported and are subject to change without notice.
GCC complies with the OpenPOWER 64-Bit ELF V2 ABI Specification, which may
be found at http: / / openpowerfoundation . org / wp-content / uploads / resources /
leabi-prd / content / index . html. Appendix A of this document lists the vector
API interfaces that must be provided by compliant compilers. Programmers should
preferentially use the interfaces described therein. However, historically GCC has provided
additional interfaces for access to vector instructions. These are briefly described below.
The following interfaces are supported for the generic and specific AltiVec operations
and the AltiVec predicates. In cases where there is a direct mapping between generic and
specific operations, only the generic names are shown here, although the specific operations
can also be used.
638 Using the GNU Compiler Collection (GCC)
Arguments that are documented as const int require literal integral values within the
range required for that operation.
vector signed char vec_abs (vector signed char);
vector signed short vec_abs (vector signed short);
vector signed int vec_abs (vector signed int);
vector float vec_abs (vector float);
vector signed char vec_add (vector bool char, vector signed char);
vector signed char vec_add (vector signed char, vector bool char);
vector signed char vec_add (vector signed char, vector signed char);
vector unsigned char vec_add (vector bool char, vector unsigned char);
vector unsigned char vec_add (vector unsigned char, vector bool char);
vector unsigned char vec_add (vector unsigned char,
vector unsigned char);
vector signed short vec_add (vector bool short, vector signed short);
vector signed short vec_add (vector signed short, vector bool short);
vector signed short vec_add (vector signed short, vector signed short);
vector unsigned short vec_add (vector bool short,
vector unsigned short);
vector unsigned short vec_add (vector unsigned short,
vector bool short);
vector unsigned short vec_add (vector unsigned short,
vector unsigned short);
vector signed int vec_add (vector bool int, vector signed int);
vector signed int vec_add (vector signed int, vector bool int);
vector signed int vec_add (vector signed int, vector signed int);
vector unsigned int vec_add (vector bool int, vector unsigned int);
vector unsigned int vec_add (vector unsigned int, vector bool int);
vector unsigned int vec_add (vector unsigned int, vector unsigned int);
vector float vec_add (vector float, vector float);
vector signed int vec_vadduwm (vector bool int, vector signed int);
vector signed int vec_vadduwm (vector signed int, vector bool int);
vector signed int vec_vadduwm (vector signed int, vector signed int);
vector unsigned int vec_vadduwm (vector bool int, vector unsigned int);
vector unsigned int vec_vadduwm (vector unsigned int, vector bool int);
vector unsigned int vec_vadduwm (vector unsigned int,
vector unsigned int);
vector signed char vec_vaddubm (vector bool char, vector signed char);
vector signed char vec_vaddubm (vector signed char, vector bool char);
vector signed char vec_vaddubm (vector signed char, vector signed char);
vector unsigned char vec_vaddubm (vector bool char,
vector unsigned char);
vector unsigned char vec_vaddubm (vector unsigned char,
vector bool char);
vector unsigned char vec_vaddubm (vector unsigned char,
vector unsigned char);
vector unsigned int vec_addc (vector unsigned int, vector unsigned int);
vector unsigned char vec_adds (vector bool char, vector unsigned char);
vector unsigned char vec_adds (vector unsigned char, vector bool char);
vector unsigned char vec_adds (vector unsigned char,
vector unsigned char);
vector signed char vec_adds (vector bool char, vector signed char);
vector signed char vec_adds (vector signed char, vector bool char);
vector signed char vec_adds (vector signed char, vector signed char);
vector unsigned short vec_adds (vector bool short,
vector unsigned short);
vector unsigned short vec_adds (vector unsigned short,
vector bool short);
vector unsigned short vec_adds (vector unsigned short,
vector unsigned short);
vector signed short vec_adds (vector bool short, vector signed short);
vector signed short vec_adds (vector signed short, vector bool short);
vector signed short vec_adds (vector signed short, vector signed short);
vector unsigned int vec_adds (vector bool int, vector unsigned int);
vector unsigned int vec_adds (vector unsigned int, vector bool int);
vector unsigned int vec_adds (vector unsigned int, vector unsigned int);
vector signed int vec_adds (vector bool int, vector signed int);
vector signed int vec_adds (vector signed int, vector bool int);
vector signed int vec_adds (vector signed int, vector signed int);
vector signed int vec_vaddsws (vector bool int, vector signed int);
vector signed int vec_vaddsws (vector signed int, vector bool int);
vector signed int vec_vaddsws (vector signed int, vector signed int);
vector unsigned int vec_vadduws (vector bool int, vector unsigned int);
vector unsigned int vec_vadduws (vector unsigned int, vector bool int);
vector unsigned int vec_vadduws (vector unsigned int,
vector unsigned int);
vector signed char vec_vaddsbs (vector bool char, vector signed char);
vector signed char vec_vaddsbs (vector signed char, vector bool char);
vector signed char vec_vaddsbs (vector signed char, vector signed char);
vector signed int vec_vavgsw (vector signed int, vector signed int);
vector signed char vec_vavgsb (vector signed char, vector signed char);
vector bool
char vec_cmpeq (vector bool char, vector bool char);
vector bool
short vec_cmpeq (vector bool short, vector bool short);
vector bool
int vec_cmpeq (vector bool int, vector bool int);
vector bool
char vec_cmpeq (vector signed char, vector signed char);
vector bool
char vec_cmpeq (vector unsigned char, vector unsigned char);
vector bool
short vec_cmpeq (vector signed short, vector signed short);
vector bool
short vec_cmpeq (vector unsigned short,
vector unsigned short);
vector bool int vec_cmpeq (vector signed int, vector signed int);
vector bool int vec_cmpeq (vector unsigned int, vector unsigned int);
vector bool int vec_cmpeq (vector float, vector float);
vector bool int vec_vcmpequw (vector signed int, vector signed int);
vector bool int vec_vcmpequw (vector unsigned int, vector unsigned int);
vector bool char vec_vcmpequb (vector signed char, vector signed char);
vector bool char vec_vcmpequb (vector unsigned char,
vector unsigned char);
vector bool char vec_cmpgt (vector unsigned char, vector unsigned char);
vector bool char vec_cmpgt (vector signed char, vector signed char);
vector bool short vec_cmpgt (vector unsigned short,
vector unsigned short);
vector bool short vec_cmpgt (vector signed short, vector signed short);
vector bool int vec_cmpgt (vector unsigned int, vector unsigned int);
vector bool int vec_cmpgt (vector signed int, vector signed int);
vector bool int vec_cmpgt (vector float, vector float);
vector bool int vec_vcmpgtsw (vector signed int, vector signed int);
vector bool int vec_vcmpgtuw (vector unsigned int, vector unsigned int);
vector bool char vec_vcmpgtsb (vector signed char, vector signed char);
vector bool char vec_cmplt (vector unsigned char, vector unsigned char);
vector bool char vec_cmplt (vector signed char, vector signed char);
vector bool short vec_cmplt (vector unsigned short,
vector unsigned short);
vector bool short vec_cmplt (vector signed short, vector signed short);
vector bool int vec_cmplt (vector unsigned int, vector unsigned int);
vector bool int vec_cmplt (vector signed int, vector signed int);
vector bool int vec_cmplt (vector float, vector float);
vector unsigned char vec_lvsl (int, const volatile unsigned char *);
vector unsigned char vec_lvsl (int, const volatile signed char *);
vector unsigned char vec_lvsl (int, const volatile unsigned short *);
vector unsigned char vec_lvsl (int, const volatile short *);
vector unsigned char vec_lvsl (int, const volatile unsigned int *);
vector unsigned char vec_lvsl (int, const volatile int *);
646 Using the GNU Compiler Collection (GCC)
vector unsigned char vec_lvsl (int, const volatile unsigned long *);
vector unsigned char vec_lvsl (int, const volatile long *);
vector unsigned char vec_lvsl (int, const volatile float *);
vector unsigned char vec_lvsr (int, const volatile unsigned char *);
vector unsigned char vec_lvsr (int, const volatile signed char *);
vector unsigned char vec_lvsr (int, const volatile unsigned short *);
vector unsigned char vec_lvsr (int, const volatile short *);
vector unsigned char vec_lvsr (int, const volatile unsigned int *);
vector unsigned char vec_lvsr (int, const volatile int *);
vector unsigned char vec_lvsr (int, const volatile unsigned long *);
vector unsigned char vec_lvsr (int, const volatile long *);
vector unsigned char vec_lvsr (int, const volatile float *);
vector unsigned char vec_max (vector bool char, vector unsigned char);
vector unsigned char vec_max (vector unsigned char, vector bool char);
vector unsigned char vec_max (vector unsigned char,
vector unsigned char);
vector signed char vec_max (vector bool char, vector signed char);
vector signed char vec_max (vector signed char, vector bool char);
vector signed char vec_max (vector signed char, vector signed char);
vector unsigned short vec_max (vector bool short,
vector unsigned short);
vector unsigned short vec_max (vector unsigned short,
vector bool short);
vector unsigned short vec_max (vector unsigned short,
vector unsigned short);
vector signed short vec_max (vector bool short, vector signed short);
vector signed short vec_max (vector signed short, vector bool short);
vector signed short vec_max (vector signed short, vector signed short);
vector unsigned int vec_max (vector bool int, vector unsigned int);
vector unsigned int vec_max (vector unsigned int, vector bool int);
vector unsigned int vec_max (vector unsigned int, vector unsigned int);
vector signed int vec_max (vector bool int, vector signed int);
vector signed int vec_max (vector signed int, vector bool int);
vector signed int vec_max (vector signed int, vector signed int);
vector float vec_max (vector float, vector float);
vector signed int vec_vmaxsw (vector bool int, vector signed int);
vector signed int vec_vmaxsw (vector signed int, vector bool int);
vector signed int vec_vmaxsw (vector signed int, vector signed int);
vector unsigned int vec_vmaxuw (vector bool int, vector unsigned int);
vector unsigned int vec_vmaxuw (vector unsigned int, vector bool int);
vector unsigned int vec_vmaxuw (vector unsigned int,
vector unsigned int);
vector signed short vec_vmaxsh (vector bool short, vector signed short);
vector signed short vec_vmaxsh (vector signed short, vector bool short);
vector signed short vec_vmaxsh (vector signed short,
Chapter 6: Extensions to the C Language Family 647
vector signed char vec_vmaxsb (vector bool char, vector signed char);
vector signed char vec_vmaxsb (vector signed char, vector bool char);
vector signed char vec_vmaxsb (vector signed char, vector signed char);
vector bool char vec_mergeh (vector bool char, vector bool char);
vector signed char vec_mergeh (vector signed char, vector signed char);
vector unsigned char vec_mergeh (vector unsigned char,
vector unsigned char);
vector bool short vec_mergeh (vector bool short, vector bool short);
vector pixel vec_mergeh (vector pixel, vector pixel);
vector signed short vec_mergeh (vector signed short,
vector signed short);
vector unsigned short vec_mergeh (vector unsigned short,
vector unsigned short);
vector float vec_mergeh (vector float, vector float);
vector bool int vec_mergeh (vector bool int, vector bool int);
vector signed int vec_mergeh (vector signed int, vector signed int);
vector unsigned int vec_mergeh (vector unsigned int,
vector unsigned int);
vector bool short vec_vmrghh (vector bool short, vector bool short);
vector signed short vec_vmrghh (vector signed short,
vector signed short);
vector unsigned short vec_vmrghh (vector unsigned short,
vector unsigned short);
vector pixel vec_vmrghh (vector pixel, vector pixel);
vector bool char vec_vmrghb (vector bool char, vector bool char);
vector signed char vec_vmrghb (vector signed char, vector signed char);
vector unsigned char vec_vmrghb (vector unsigned char,
vector unsigned char);
vector bool char vec_mergel (vector bool char, vector bool char);
vector signed char vec_mergel (vector signed char, vector signed char);
vector unsigned char vec_mergel (vector unsigned char,
vector unsigned char);
648 Using the GNU Compiler Collection (GCC)
vector bool short vec_mergel (vector bool short, vector bool short);
vector pixel vec_mergel (vector pixel, vector pixel);
vector signed short vec_mergel (vector signed short,
vector signed short);
vector unsigned short vec_mergel (vector unsigned short,
vector unsigned short);
vector float vec_mergel (vector float, vector float);
vector bool int vec_mergel (vector bool int, vector bool int);
vector signed int vec_mergel (vector signed int, vector signed int);
vector unsigned int vec_mergel (vector unsigned int,
vector unsigned int);
vector bool short vec_vmrglh (vector bool short, vector bool short);
vector signed short vec_vmrglh (vector signed short,
vector signed short);
vector unsigned short vec_vmrglh (vector unsigned short,
vector unsigned short);
vector pixel vec_vmrglh (vector pixel, vector pixel);
vector bool char vec_vmrglb (vector bool char, vector bool char);
vector signed char vec_vmrglb (vector signed char, vector signed char);
vector unsigned char vec_vmrglb (vector unsigned char,
vector unsigned char);
vector unsigned char vec_min (vector bool char, vector unsigned char);
vector unsigned char vec_min (vector unsigned char, vector bool char);
vector unsigned char vec_min (vector unsigned char,
vector unsigned char);
vector signed char vec_min (vector bool char, vector signed char);
vector signed char vec_min (vector signed char, vector bool char);
vector signed char vec_min (vector signed char, vector signed char);
vector unsigned short vec_min (vector bool short,
vector unsigned short);
vector unsigned short vec_min (vector unsigned short,
vector bool short);
vector unsigned short vec_min (vector unsigned short,
vector unsigned short);
vector signed short vec_min (vector bool short, vector signed short);
vector signed short vec_min (vector signed short, vector bool short);
vector signed short vec_min (vector signed short, vector signed short);
vector unsigned int vec_min (vector bool int, vector unsigned int);
vector unsigned int vec_min (vector unsigned int, vector bool int);
vector unsigned int vec_min (vector unsigned int, vector unsigned int);
vector signed int vec_min (vector bool int, vector signed int);
vector signed int vec_min (vector signed int, vector bool int);
vector signed int vec_min (vector signed int, vector signed int);
vector float vec_min (vector float, vector float);
vector signed int vec_vminsw (vector bool int, vector signed int);
vector signed int vec_vminsw (vector signed int, vector bool int);
vector signed int vec_vminsw (vector signed int, vector signed int);
vector unsigned int vec_vminuw (vector bool int, vector unsigned int);
vector unsigned int vec_vminuw (vector unsigned int, vector bool int);
vector unsigned int vec_vminuw (vector unsigned int,
vector unsigned int);
vector signed short vec_vminsh (vector bool short, vector signed short);
vector signed short vec_vminsh (vector signed short, vector bool short);
vector signed short vec_vminsh (vector signed short,
vector signed short);
vector signed char vec_vminsb (vector bool char, vector signed char);
vector signed char vec_vminsb (vector signed char, vector bool char);
vector signed char vec_vminsb (vector signed char, vector signed char);
vector bool short vec_or (vector bool short, vector bool short);
vector signed short vec_or (vector bool short, vector signed short);
vector signed short vec_or (vector signed short, vector bool short);
vector signed short vec_or (vector signed short, vector signed short);
vector unsigned short vec_or (vector bool short, vector unsigned short);
vector unsigned short vec_or (vector unsigned short, vector bool short);
vector unsigned short vec_or (vector unsigned short,
vector unsigned short);
vector signed char vec_or (vector bool char, vector signed char);
vector bool char vec_or (vector bool char, vector bool char);
vector signed char vec_or (vector signed char, vector bool char);
vector signed char vec_or (vector signed char, vector signed char);
vector unsigned char vec_or (vector bool char, vector unsigned char);
vector unsigned char vec_or (vector unsigned char, vector bool char);
vector unsigned char vec_or (vector unsigned char,
vector unsigned char);
vector signed char vec_pack (vector signed short, vector signed short);
vector unsigned char vec_pack (vector unsigned short,
vector unsigned short);
vector bool char vec_pack (vector bool short, vector bool short);
vector signed short vec_pack (vector signed int, vector signed int);
vector unsigned short vec_pack (vector unsigned int,
vector unsigned int);
vector bool short vec_pack (vector bool int, vector bool int);
vector bool short vec_vpkuwum (vector bool int, vector bool int);
vector signed short vec_vpkuwum (vector signed int, vector signed int);
vector unsigned short vec_vpkuwum (vector unsigned int,
vector unsigned int);
vector bool char vec_vpkuhum (vector bool short, vector bool short);
vector signed char vec_vpkuhum (vector signed short,
vector signed short);
vector unsigned char vec_vpkuhum (vector unsigned short,
vector unsigned short);
vector signed short vec_vpkswss (vector signed int, vector signed int);
vector signed int vec_vrlw (vector signed int, vector unsigned int);
vector unsigned int vec_vrlw (vector unsigned int, vector unsigned int);
vector signed char vec_vrlb (vector signed char, vector unsigned char);
vector unsigned char vec_vrlb (vector unsigned char,
vector unsigned char);
vector float vec_sel (vector float, vector float, vector bool int);
vector float vec_sel (vector float, vector float, vector unsigned int);
vector signed int vec_sel (vector signed int,
vector signed int,
vector bool int);
vector signed int vec_sel (vector signed int,
vector signed int,
vector unsigned int);
vector unsigned int vec_sel (vector unsigned int,
vector unsigned int,
vector bool int);
vector unsigned int vec_sel (vector unsigned int,
vector unsigned int,
vector unsigned int);
vector bool int vec_sel (vector bool int,
vector bool int,
vector bool int);
vector bool int vec_sel (vector bool int,
vector bool int,
vector unsigned int);
vector signed short vec_sel (vector signed short,
vector signed short,
vector bool short);
vector signed short vec_sel (vector signed short,
vector signed short,
vector unsigned short);
vector unsigned short vec_sel (vector unsigned short,
vector unsigned short,
vector bool short);
vector unsigned short vec_sel (vector unsigned short,
vector unsigned short,
vector unsigned short);
vector bool short vec_sel (vector bool short,
vector bool short,
vector bool short);
vector bool short vec_sel (vector bool short,
vector bool short,
Chapter 6: Extensions to the C Language Family 655
vector signed int vec_vslw (vector signed int, vector unsigned int);
vector unsigned int vec_vslw (vector unsigned int, vector unsigned int);
vector signed char vec_vslb (vector signed char, vector unsigned char);
vector unsigned char vec_vslb (vector unsigned char,
vector unsigned char);
vector signed char vec_sr (vector signed char, vector unsigned char);
vector unsigned char vec_sr (vector unsigned char,
vector unsigned char);
vector signed short vec_sr (vector signed short,
vector unsigned short);
vector unsigned short vec_sr (vector unsigned short,
vector unsigned short);
vector signed int vec_sr (vector signed int, vector unsigned int);
vector unsigned int vec_sr (vector unsigned int, vector unsigned int);
vector signed int vec_vsrw (vector signed int, vector unsigned int);
vector unsigned int vec_vsrw (vector unsigned int, vector unsigned int);
vector signed char vec_vsrb (vector signed char, vector unsigned char);
vector unsigned char vec_vsrb (vector unsigned char,
vector unsigned char);
vector signed char vec_sra (vector signed char, vector unsigned char);
vector unsigned char vec_sra (vector unsigned char,
vector unsigned char);
vector signed short vec_sra (vector signed short,
vector unsigned short);
vector unsigned short vec_sra (vector unsigned short,
Chapter 6: Extensions to the C Language Family 659
vector signed int vec_vsraw (vector signed int, vector unsigned int);
vector unsigned int vec_vsraw (vector unsigned int,
vector unsigned int);
vector signed char vec_vsrab (vector signed char, vector unsigned char);
vector unsigned char vec_vsrab (vector unsigned char,
vector unsigned char);
vector signed int vec_srl (vector signed int, vector unsigned int);
vector signed int vec_srl (vector signed int, vector unsigned short);
vector signed int vec_srl (vector signed int, vector unsigned char);
vector unsigned int vec_srl (vector unsigned int, vector unsigned int);
vector unsigned int vec_srl (vector unsigned int,
vector unsigned short);
vector unsigned int vec_srl (vector unsigned int, vector unsigned char);
vector bool int vec_srl (vector bool int, vector unsigned int);
vector bool int vec_srl (vector bool int, vector unsigned short);
vector bool int vec_srl (vector bool int, vector unsigned char);
vector signed short vec_srl (vector signed short, vector unsigned int);
vector signed short vec_srl (vector signed short,
vector unsigned short);
vector signed short vec_srl (vector signed short, vector unsigned char);
vector unsigned short vec_srl (vector unsigned short,
vector unsigned int);
vector unsigned short vec_srl (vector unsigned short,
vector unsigned short);
vector unsigned short vec_srl (vector unsigned short,
vector unsigned char);
vector long long int vec_srl (vector long long int,
vector unsigned char);
vector unsigned long long int vec_srl (vector unsigned long long int,
vector unsigned char);
vector bool short vec_srl (vector bool short, vector unsigned int);
vector bool short vec_srl (vector bool short, vector unsigned short);
vector bool short vec_srl (vector bool short, vector unsigned char);
vector pixel vec_srl (vector pixel, vector unsigned int);
vector pixel vec_srl (vector pixel, vector unsigned short);
vector pixel vec_srl (vector pixel, vector unsigned char);
vector signed char vec_srl (vector signed char, vector unsigned int);
vector signed char vec_srl (vector signed char, vector unsigned short);
vector signed char vec_srl (vector signed char, vector unsigned char);
vector unsigned char vec_srl (vector unsigned char,
vector unsigned int);
vector unsigned char vec_srl (vector unsigned char,
vector unsigned short);
vector unsigned char vec_srl (vector unsigned char,
vector unsigned char);
vector bool char vec_srl (vector bool char, vector unsigned int);
vector bool char vec_srl (vector bool char, vector unsigned short);
660 Using the GNU Compiler Collection (GCC)
vector bool char vec_srl (vector bool char, vector unsigned char);
vector signed char vec_sub (vector bool char, vector signed char);
vector signed char vec_sub (vector signed char, vector bool char);
vector signed char vec_sub (vector signed char, vector signed char);
vector unsigned char vec_sub (vector bool char, vector unsigned char);
vector unsigned char vec_sub (vector unsigned char, vector bool char);
vector unsigned char vec_sub (vector unsigned char,
vector unsigned char);
vector signed short vec_sub (vector bool short, vector signed short);
vector signed short vec_sub (vector signed short, vector bool short);
vector signed short vec_sub (vector signed short, vector signed short);
vector unsigned short vec_sub (vector bool short,
vector unsigned short);
vector unsigned short vec_sub (vector unsigned short,
vector bool short);
vector unsigned short vec_sub (vector unsigned short,
vector unsigned short);
vector signed int vec_sub (vector bool int, vector signed int);
vector signed int vec_sub (vector signed int, vector bool int);
vector signed int vec_sub (vector signed int, vector signed int);
vector unsigned int vec_sub (vector bool int, vector unsigned int);
vector unsigned int vec_sub (vector unsigned int, vector bool int);
vector unsigned int vec_sub (vector unsigned int, vector unsigned int);
vector float vec_sub (vector float, vector float);
vector signed int vec_vsubuwm (vector bool int, vector signed int);
vector signed int vec_vsubuwm (vector signed int, vector bool int);
vector signed int vec_vsubuwm (vector signed int, vector signed int);
vector unsigned int vec_vsubuwm (vector bool int, vector unsigned int);
vector unsigned int vec_vsubuwm (vector unsigned int, vector bool int);
vector unsigned int vec_vsubuwm (vector unsigned int,
vector unsigned int);
vector signed char vec_vsububm (vector bool char, vector signed char);
vector signed char vec_vsububm (vector signed char, vector bool char);
vector signed char vec_vsububm (vector signed char, vector signed char);
vector unsigned char vec_vsububm (vector bool char,
vector unsigned char);
vector unsigned char vec_vsububm (vector unsigned char,
vector bool char);
vector unsigned char vec_vsububm (vector unsigned char,
vector unsigned char);
Chapter 6: Extensions to the C Language Family 663
vector unsigned int vec_subc (vector unsigned int, vector unsigned int);
vector unsigned char vec_subs (vector bool char, vector unsigned char);
vector unsigned char vec_subs (vector unsigned char, vector bool char);
vector unsigned char vec_subs (vector unsigned char,
vector unsigned char);
vector signed char vec_subs (vector bool char, vector signed char);
vector signed char vec_subs (vector signed char, vector bool char);
vector signed char vec_subs (vector signed char, vector signed char);
vector unsigned short vec_subs (vector bool short,
vector unsigned short);
vector unsigned short vec_subs (vector unsigned short,
vector bool short);
vector unsigned short vec_subs (vector unsigned short,
vector unsigned short);
vector signed short vec_subs (vector bool short, vector signed short);
vector signed short vec_subs (vector signed short, vector bool short);
vector signed short vec_subs (vector signed short, vector signed short);
vector unsigned int vec_subs (vector bool int, vector unsigned int);
vector unsigned int vec_subs (vector unsigned int, vector bool int);
vector unsigned int vec_subs (vector unsigned int, vector unsigned int);
vector signed int vec_subs (vector bool int, vector signed int);
vector signed int vec_subs (vector signed int, vector bool int);
vector signed int vec_subs (vector signed int, vector signed int);
vector signed int vec_vsubsws (vector bool int, vector signed int);
vector signed int vec_vsubsws (vector signed int, vector bool int);
vector signed int vec_vsubsws (vector signed int, vector signed int);
vector unsigned int vec_vsubuws (vector bool int, vector unsigned int);
vector unsigned int vec_vsubuws (vector unsigned int, vector bool int);
vector unsigned int vec_vsubuws (vector unsigned int,
vector unsigned int);
vector signed char vec_vsubsbs (vector bool char, vector signed char);
vector signed char vec_vsubsbs (vector signed char, vector bool char);
vector signed char vec_vsubsbs (vector signed char, vector signed char);
vector signed int vec_vsum4shs (vector signed short, vector signed int);
vector signed int vec_vsum4sbs (vector signed char, vector signed int);
vector signed int vec_sum2s (vector signed int, vector signed int);
vector signed int vec_sums (vector signed int, vector signed int);
vector unsigned int vec_xor (vector unsigned int, vector bool int);
vector unsigned int vec_xor (vector unsigned int, vector unsigned int);
vector bool short vec_xor (vector bool short, vector bool short);
vector signed short vec_xor (vector bool short, vector signed short);
vector signed short vec_xor (vector signed short, vector bool short);
vector signed short vec_xor (vector signed short, vector signed short);
vector unsigned short vec_xor (vector bool short,
vector unsigned short);
vector unsigned short vec_xor (vector unsigned short,
vector bool short);
vector unsigned short vec_xor (vector unsigned short,
vector unsigned short);
vector signed char vec_xor (vector bool char, vector signed char);
vector bool char vec_xor (vector bool char, vector bool char);
vector signed char vec_xor (vector signed char, vector bool char);
vector signed char vec_xor (vector signed char, vector signed char);
vector unsigned char vec_xor (vector bool char, vector unsigned char);
vector unsigned char vec_xor (vector unsigned char, vector bool char);
vector unsigned char vec_xor (vector unsigned char,
vector unsigned char);
If the vector/scalar (VSX) instruction set is available, the following additional functions
are available:
vector double vec_abs (vector double);
vector double vec_add (vector double, vector double);
vector double vec_and (vector double, vector double);
vector double vec_and (vector double, vector bool long);
vector double vec_and (vector bool long, vector double);
vector long vec_and (vector long, vector long);
vector long vec_and (vector long, vector bool long);
vector long vec_and (vector bool long, vector long);
vector unsigned long vec_and (vector unsigned long, vector unsigned long);
vector unsigned long vec_and (vector unsigned long, vector bool long);
vector unsigned long vec_and (vector bool long, vector unsigned long);
vector double vec_andc (vector double, vector double);
vector double vec_andc (vector double, vector bool long);
vector double vec_andc (vector bool long, vector double);
vector long vec_andc (vector long, vector long);
vector long vec_andc (vector long, vector bool long);
vector long vec_andc (vector bool long, vector long);
vector unsigned long vec_andc (vector unsigned long, vector unsigned long);
vector unsigned long vec_andc (vector unsigned long, vector bool long);
vector unsigned long vec_andc (vector bool long, vector unsigned long);
vector double vec_ceil (vector double);
vector bool long vec_cmpeq (vector double, vector double);
vector bool long vec_cmpge (vector double, vector double);
vector bool long vec_cmpgt (vector double, vector double);
vector bool long vec_cmple (vector double, vector double);
vector bool long vec_cmplt (vector double, vector double);
vector double vec_cpsgn (vector double, vector double);
vector float vec_div (vector float, vector float);
vector double vec_div (vector double, vector double);
vector long vec_div (vector long, vector long);
vector unsigned long vec_div (vector unsigned long, vector unsigned long);
vector double vec_floor (vector double);
vector signed long long vec_ld (int, const vector signed long long *);
vector signed long long vec_ld (int, const signed long long *);
vector unsigned long long vec_ld (int, const vector unsigned long long *);
vector unsigned long long vec_ld (int, const unsigned long long *);
vector double vec_ld (int, const vector double *);
vector double vec_ld (int, const double *);
vector double vec_ldl (int, const vector double *);
vector double vec_ldl (int, const double *);
vector unsigned char vec_lvsl (int, const volatile double *);
Chapter 6: Extensions to the C Language Family 671
vector unsigned long vec_sel (vector unsigned long, vector unsigned long,
vector unsigned long);
vector unsigned long vec_sel (vector unsigned long, vector unsigned long,
vector bool long);
vector double vec_splats (double);
vector signed long vec_splats (signed long);
vector unsigned long vec_splats (unsigned long);
vector float vec_sqrt (vector float);
vector double vec_sqrt (vector double);
void vec_st (vector signed long long, int, vector signed long long *);
void vec_st (vector signed long long, int, signed long long *);
void vec_st (vector unsigned long long, int, vector unsigned long long *);
void vec_st (vector unsigned long long, int, unsigned long long *);
void vec_st (vector bool long long, int, vector bool long long *);
void vec_st (vector bool long long, int, signed long long *);
void vec_st (vector bool long long, int, unsigned long long *);
void vec_st (vector double, int, vector double *);
void vec_st (vector double, int, double *);
vector double vec_sub (vector double, vector double);
vector double vec_trunc (vector double);
vector double vec_xl (int, vector double *);
vector double vec_xl (int, double *);
vector long long vec_xl (int, vector long long *);
vector long long vec_xl (int, long long *);
vector unsigned long long vec_xl (int, vector unsigned long long *);
vector unsigned long long vec_xl (int, unsigned long long *);
vector float vec_xl (int, vector float *);
vector float vec_xl (int, float *);
vector int vec_xl (int, vector int *);
vector int vec_xl (int, int *);
vector unsigned int vec_xl (int, vector unsigned int *);
vector unsigned int vec_xl (int, unsigned int *);
vector double vec_xor (vector double, vector double);
vector double vec_xor (vector double, vector bool long);
vector double vec_xor (vector bool long, vector double);
vector long vec_xor (vector long, vector long);
vector long vec_xor (vector long, vector bool long);
vector long vec_xor (vector bool long, vector long);
vector unsigned long vec_xor (vector unsigned long, vector unsigned long);
vector unsigned long vec_xor (vector unsigned long, vector bool long);
vector unsigned long vec_xor (vector bool long, vector unsigned long);
void vec_xst (vector double, int, vector double *);
void vec_xst (vector double, int, double *);
void vec_xst (vector long long, int, vector long long *);
void vec_xst (vector long long, int, long long *);
void vec_xst (vector unsigned long long, int, vector unsigned long long *);
void vec_xst (vector unsigned long long, int, unsigned long long *);
void vec_xst (vector float, int, vector float *);
void vec_xst (vector float, int, float *);
void vec_xst (vector int, int, vector int *);
void vec_xst (vector int, int, int *);
void vec_xst (vector unsigned int, int, vector unsigned int *);
void vec_xst (vector unsigned int, int, unsigned int *);
int vec_all_eq (vector double, vector double);
int vec_all_ge (vector double, vector double);
int vec_all_gt (vector double, vector double);
int vec_all_le (vector double, vector double);
int vec_all_lt (vector double, vector double);
Chapter 6: Extensions to the C Language Family 673
void vec_vsx_st (vector bool short, int, vector bool short *);
void vec_vsx_st (vector bool short, int, unsigned short *);
void vec_vsx_st (vector pixel, int, vector pixel *);
void vec_vsx_st (vector pixel, int, unsigned short *);
void vec_vsx_st (vector pixel, int, short *);
void vec_vsx_st (vector bool short, int, short *);
void vec_vsx_st (vector signed char, int, vector signed char *);
void vec_vsx_st (vector signed char, int, signed char *);
void vec_vsx_st (vector unsigned char, int, vector unsigned char *);
void vec_vsx_st (vector unsigned char, int, unsigned char *);
void vec_vsx_st (vector bool char, int, vector bool char *);
void vec_vsx_st (vector bool char, int, unsigned char *);
void vec_vsx_st (vector bool char, int, signed char *);
vector long long vec_add (vector long long, vector long long);
vector unsigned long long vec_add (vector unsigned long long,
vector unsigned long long);
Chapter 6: Extensions to the C Language Family 675
vector bool long long vec_cmpeq (vector bool long long, vector bool long long);
vector long long vec_eqv (vector long long, vector long long);
vector long long vec_eqv (vector bool long long, vector long long);
vector long long vec_eqv (vector long long, vector bool long long);
vector unsigned long long vec_eqv (vector unsigned long long,
vector unsigned long long);
vector unsigned long long vec_eqv (vector bool long long,
vector unsigned long long);
vector unsigned long long vec_eqv (vector unsigned long long,
vector bool long long);
vector int vec_eqv (vector int, vector int);
vector int vec_eqv (vector bool int, vector int);
vector int vec_eqv (vector int, vector bool int);
vector unsigned int vec_eqv (vector unsigned int, vector unsigned int);
vector unsigned int vec_eqv (vector bool unsigned int,
vector unsigned int);
vector unsigned int vec_eqv (vector unsigned int,
vector bool unsigned int);
vector short vec_eqv (vector short, vector short);
vector short vec_eqv (vector bool short, vector short);
vector short vec_eqv (vector short, vector bool short);
vector unsigned short vec_eqv (vector unsigned short, vector unsigned short);
vector unsigned short vec_eqv (vector bool unsigned short,
vector unsigned short);
vector unsigned short vec_eqv (vector unsigned short,
vector bool unsigned short);
vector signed char vec_eqv (vector signed char, vector signed char);
vector signed char vec_eqv (vector bool signed char, vector signed char);
vector signed char vec_eqv (vector signed char, vector bool signed char);
vector unsigned char vec_eqv (vector unsigned char, vector unsigned char);
676 Using the GNU Compiler Collection (GCC)
vector unsigned char vec_eqv (vector bool unsigned char, vector unsigned char);
vector unsigned char vec_eqv (vector unsigned char, vector bool unsigned char);
vector long long vec_max (vector long long, vector long long);
vector unsigned long long vec_max (vector unsigned long long,
vector unsigned long long);
vector signed int vec_mergee (vector signed int, vector signed int);
vector unsigned int vec_mergee (vector unsigned int, vector unsigned int);
vector bool int vec_mergee (vector bool int, vector bool int);
vector signed int vec_mergeo (vector signed int, vector signed int);
vector unsigned int vec_mergeo (vector unsigned int, vector unsigned int);
vector bool int vec_mergeo (vector bool int, vector bool int);
vector long long vec_min (vector long long, vector long long);
vector unsigned long long vec_min (vector unsigned long long,
vector unsigned long long);
vector long long vec_nand (vector long long, vector long long);
vector long long vec_nand (vector bool long long, vector long long);
vector long long vec_nand (vector long long, vector bool long long);
vector unsigned long long vec_nand (vector unsigned long long,
vector unsigned long long);
vector unsigned long long vec_nand (vector bool long long,
vector unsigned long long);
vector unsigned long long vec_nand (vector unsigned long long,
vector bool long long);
vector int vec_nand (vector int, vector int);
vector int vec_nand (vector bool int, vector int);
vector int vec_nand (vector int, vector bool int);
vector unsigned int vec_nand (vector unsigned int, vector unsigned int);
vector unsigned int vec_nand (vector bool unsigned int,
vector unsigned int);
vector unsigned int vec_nand (vector unsigned int,
vector bool unsigned int);
vector short vec_nand (vector short, vector short);
vector short vec_nand (vector bool short, vector short);
vector short vec_nand (vector short, vector bool short);
vector unsigned short vec_nand (vector unsigned short, vector unsigned short);
vector unsigned short vec_nand (vector bool unsigned short,
vector unsigned short);
vector unsigned short vec_nand (vector unsigned short,
vector bool unsigned short);
vector signed char vec_nand (vector signed char, vector signed char);
vector signed char vec_nand (vector bool signed char, vector signed char);
vector signed char vec_nand (vector signed char, vector bool signed char);
vector unsigned char vec_nand (vector unsigned char, vector unsigned char);
vector unsigned char vec_nand (vector bool unsigned char, vector unsigned char);
vector unsigned char vec_nand (vector unsigned char, vector bool unsigned char);
vector long long vec_orc (vector long long, vector long long);
vector long long vec_orc (vector bool long long, vector long long);
vector long long vec_orc (vector long long, vector bool long long);
vector unsigned long long vec_orc (vector unsigned long long,
vector unsigned long long);
Chapter 6: Extensions to the C Language Family 677
vector unsigned
char vec_packsu (vector signed short, vector signed short )
vector unsigned
char vec_packsu (vector unsigned short, vector unsigned short )
vector unsigned
short int vec_packsu (vector signed int, vector signed int);
vector unsigned
short int vec_packsu (vector unsigned int,
vector unsigned int);
vector unsigned int vec_packsu (vector long long, vector long long);
vector unsigned int vec_packsu (vector unsigned long long,
vector unsigned long long);
vector unsigned int vec_packsu (vector signed long long,
vector signed long long);
vector long long vec_sl (vector long long, vector unsigned long long);
vector long long vec_sl (vector unsigned long long,
vector unsigned long long);
678 Using the GNU Compiler Collection (GCC)
vector long long vec_sr (vector long long, vector unsigned long long);
vector unsigned long long char vec_sr (vector unsigned long long,
vector unsigned long long);
vector long long vec_sra (vector long long, vector unsigned long long);
vector unsigned long long vec_sra (vector unsigned long long,
vector unsigned long long);
vector long long vec_sub (vector long long, vector long long);
vector unsigned long long vec_sub (vector unsigned long long,
vector unsigned long long);
vector long long vec_vaddudm (vector long long, vector long long);
vector long long vec_vaddudm (vector bool long long, vector long long);
vector long long vec_vaddudm (vector long long, vector bool long long);
vector unsigned long long vec_vaddudm (vector unsigned long long,
vector unsigned long long);
vector unsigned long long vec_vaddudm (vector bool unsigned long long,
vector unsigned long long);
vector unsigned long long vec_vaddudm (vector unsigned long long,
vector bool unsigned long long);
vector long long vec_vbpermq (vector signed char, vector signed char);
vector long long vec_vbpermq (vector unsigned char, vector unsigned char);
vector unsigned char vec_bperm (vector unsigned char, vector unsigned char);
vector unsigned long long vec_bperm (vector unsigned __int128,
vector unsigned char);
vector long long vec_vmaxsd (vector long long, vector long long);
vector long long vec_vminsd (vector long long, vector long long);
vector long long vec_vrld (vector long long, vector unsigned long long);
vector unsigned long long vec_vrld (vector unsigned long long,
vector unsigned long long);
vector long long vec_vsld (vector long long, vector unsigned long long);
680 Using the GNU Compiler Collection (GCC)
vector long long vec_vsrad (vector long long, vector unsigned long long);
vector unsigned long long vec_vsrad (vector unsigned long long,
vector unsigned long long);
vector long long vec_vsrd (vector long long, vector unsigned long long);
vector unsigned long long char vec_vsrd (vector unsigned long long,
vector unsigned long long);
vector long long vec_vsubudm (vector long long, vector long long);
vector long long vec_vsubudm (vector bool long long, vector long long);
vector long long vec_vsubudm (vector long long, vector bool long long);
vector unsigned long long vec_vsubudm (vector unsigned long long,
vector unsigned long long);
vector unsigned long long vec_vsubudm (vector bool long long,
vector unsigned long long);
vector unsigned long long vec_vsubudm (vector unsigned long long,
vector bool long long);
vector __uint128_t);
vector bool char vec_cmpne (vector bool char, vector bool char);
vector bool char vec_cmpne (vector signed char, vector signed char);
vector bool char vec_cmpne (vector unsigned char, vector unsigned char);
vector bool int vec_cmpne (vector bool int, vector bool int);
vector bool int vec_cmpne (vector signed int, vector signed int);
vector bool int vec_cmpne (vector unsigned int, vector unsigned int);
vector bool long long vec_cmpne (vector bool long long, vector bool long long);
vector bool long long vec_cmpne (vector signed long long,
vector signed long long);
vector bool long long vec_cmpne (vector unsigned long long,
vector unsigned long long);
vector bool short vec_cmpne (vector bool short, vector bool short);
vector bool short vec_cmpne (vector signed short, vector signed short);
vector bool short vec_cmpne (vector unsigned short, vector unsigned short);
vector bool long long vec_cmpne (vector double, vector double);
vector bool int vec_cmpne (vector float, vector float);
__vector float
vec_insert_exp (__vector unsigned int significands,
__vector unsigned int exponents);
__vector float
vec_insert_exp (__vector unsigned float significands,
__vector unsigned int exponents);
__vector double
vec_insert_exp (__vector unsigned long long int significands,
__vector unsigned long long int exponents);
__vector double
vec_insert_exp (__vector unsigned double significands,
__vector unsigned long long int exponents);
which all of the sign bits of its second argument vector are overwritten with the sign bits
copied from the coresponding elements of its first argument vector, and all other (non-sign)
bits of the second argument vector are copied unchanged into the result vector.
The vec_insert_exp built-in functions return a vector of single- or double-precision float-
ing point values constructed by assembling the values of their significands and exponents
arguments into the corresponding elements of the returned vector. The sign of each element
of the result is copied from the most significant bit of the corresponding entry within the
significands argument. Note that the relevant bits of the significands argument are the
same, for both integer and floating point types. The significand and exponent components
of each element of the result are composed of the least significant bits of the correspond-
ing significands element and the least significant bits of the corresponding exponents
element.
The vec_test_data_class built-in function returns a vector representing the results
of testing the source vector for the condition selected by the condition argument. The
condition argument must be a compile-time constant integer with value not exceeding 127.
The condition argument is encoded as a bitmask with each bit enabling the testing of a
different condition, as characterized by the following:
0x40 Test for NaN
0x20 Test for +Infinity
0x10 Test for -Infinity
0x08 Test for +Zero
0x04 Test for -Zero
0x02 Test for +Denormal
0x01 Test for -Denormal
If any of the enabled test conditions is true, the corresponding entry in the result vector
is -1. Otherwise (all of the enabled test conditions are false), the corresponding entry of the
result vector is 0.
The following built-in functions are available for the PowerPC family of processors, start-
ing with ISA 3.0 or later (‘-mcpu=power9’):
vector unsigned int vec_rlmi (vector unsigned int, vector unsigned int,
vector unsigned int);
vector unsigned long long vec_rlmi (vector unsigned long long,
vector unsigned long long,
vector unsigned long long);
vector unsigned int vec_rlnm (vector unsigned int, vector unsigned int,
vector unsigned int);
vector unsigned long long vec_rlnm (vector unsigned long long,
vector unsigned long long,
vector unsigned long long);
vector unsigned int vec_vrlnm (vector unsigned int, vector unsigned int);
vector unsigned long long vec_vrlnm (vector unsigned long long,
vector unsigned long long);
The result of vec_rlmi is obtained by rotating each element of the first argument vector
left and inserting it under mask into the second argument vector. The third argument
vector contains the mask beginning in bits 11:15, the mask end in bits 19:23, and the shift
count in bits 27:31, of each element.
The result of vec_rlnm is obtained by rotating each element of the first argument vector
left and ANDing it with a mask specified by the second and third argument vectors. The
second argument vector contains the shift count for each element in the low-order byte. The
Chapter 6: Extensions to the C Language Family 685
third argument vector contains the mask end for each element in the low-order byte, with
the mask begin in the next higher byte.
The result of vec_vrlnm is obtained by rotating each element of the first argument vector
left and ANDing it with a mask. The second argument vector contains the mask beginning
in bits 11:15, the mask end in bits 19:23, and the shift count in bits 27:31, of each element.
If the ISA 3.0 instruction set additions (‘-mcpu=power9’) are available:
vector signed char vec_revb (vector signed char);
vector unsigned char vec_revb (vector unsigned char);
vector short vec_revb (vector short);
vector unsigned short vec_revb (vector unsigned short);
vector int vec_revb (vector int);
vector unsigned int vec_revb (vector unsigned int);
vector float vec_revb (vector float);
vector long long vec_revb (vector long long);
vector unsigned long long vec_revb (vector unsigned long long);
vector double vec_revb (vector double);
On 64-bit targets, if the ISA 3.0 additions (‘-mcpu=power9’) are available:
vector long vec_revb (vector long);
vector unsigned long vec_revb (vector unsigned long);
vector __int128_t vec_revb (vector __int128_t);
vector __uint128_t vec_revb (vector __uint128_t);
The vec_revb built-in function reverses the bytes on an element by element basis. A
vector of vector unsigned char or vector signed char reverses the bytes in the whole
word.
If the cryptographic instructions are enabled (‘-mcrypto’ or ‘-mcpu=power8’), the follow-
ing builtins are enabled.
vector unsigned long long __builtin_crypto_vsbox (vector unsigned long long);
vector unsigned char vec_cipher_be (vector unsigned char, vector unsigned char);
The second argument to builtin crypto vshasigmad and builtin crypto vshasigmaw
must be a constant integer that is 0 or 1. The third argument to these built-in functions
must be a constant integer in the range of 0 to 15.
If the ISA 3.0 instruction set additions are enabled (‘-mcpu=power9’), the following ad-
ditional functions are available for both 32-bit and 64-bit targets.
vector short vec xl (int, vector short *); vector short vec xl (int, short *); vector unsigned
short vec xl (int, vector unsigned short *); vector unsigned short vec xl (int, unsigned short
*); vector char vec xl (int, vector char *); vector char vec xl (int, char *); vector unsigned
char vec xl (int, vector unsigned char *); vector unsigned char vec xl (int, unsigned char
*);
void vec xst (vector short, int, vector short *); void vec xst (vector short, int, short
*); void vec xst (vector unsigned short, int, vector unsigned short *); void vec xst (vector
unsigned short, int, unsigned short *); void vec xst (vector char, int, vector char *); void
vec xst (vector char, int, char *); void vec xst (vector unsigned char, int, vector unsigned
char *); void vec xst (vector unsigned char, int, unsigned char *);
Chapter 6: Extensions to the C Language Family 687
their semantics. This has been accomplished by adding memory barriers to the associated
HTM instructions (which is a conservative approach to provide acquire and release
semantics). Earlier versions of the compiler did not treat the HTM instructions as memory
barriers. A __TM_FENCE__ macro has been added, which can be used to determine whether
the current compiler treats HTM instructions as memory barriers or not. This allows the
user to explicitly add memory barriers to their code when using an older version of the
compiler.
The following set of built-in functions are available to gain access to the HTM specific
special purpose registers.
unsigned long __builtin_get_texasr (void)
unsigned long __builtin_get_texasru (void)
unsigned long __builtin_get_tfhar (void)
unsigned long __builtin_get_tfiar (void)
while (1)
{
if (__builtin_tbegin (0))
{
/* Transaction State Initiated. */
if (is_locked (lock))
__builtin_tabort (0);
... transaction code...
__builtin_tend (0);
break;
}
else
{
/* Transaction State Failed. Use locks if the transaction
failure is "persistent" or we’ve tried too many times. */
if (num_retries-- <= 0
|| _TEXASRU_FAILURE_PERSISTENT (__builtin_get_texasru ()))
{
acquire_lock (lock);
... non transactional fallback path...
release_lock (lock);
break;
}
}
}
One final built-in function has been added that returns the value of the 2-bit Transaction
State field of the Machine Status Register (MSR) as stored in CR0.
unsigned long __builtin_ttest (void)
This built-in can be used to determine the current transaction state using the following
code example:
Chapter 6: Extensions to the C Language Family 689
#include <htmintrin.h>
if (tx_state == _HTM_TRANSACTIONAL)
{
/* Code to use in transactional state. */
}
else if (tx_state == _HTM_NONTRANSACTIONAL)
{
/* Code to use in non-transactional state. */
}
else if (tx_state == _HTM_SUSPENDED)
{
/* Code to use in transaction suspended state. */
}
while (1)
{
if (__TM_begin (TM_buff) == _HTM_TBEGIN_STARTED)
{
/* Transaction State Initiated. */
if (is_locked (lock))
__TM_abort ();
... transaction code...
__TM_end ();
690 Using the GNU Compiler Collection (GCC)
break;
}
else
{
/* Transaction State Failed. Use locks if the transaction
failure is "persistent" or we’ve tried too many times. */
if (num_retries-- <= 0
|| __TM_is_failure_persistent (TM_buff))
{
acquire_lock (lock);
... non transactional fallback path...
release_lock (lock);
break;
}
}
}
When you use the ‘-mvis4’ switch, the VIS version 4.0 built-in functions also become
available:
v8qi __builtin_vis_fpadd8 (v8qi, v8qi);
v8qi __builtin_vis_fpadds8 (v8qi, v8qi);
v8qi __builtin_vis_fpaddus8 (v8qi, v8qi);
v4hi __builtin_vis_fpaddus16 (v4hi, v4hi);
When you use the ‘-mvis4b’ switch, the VIS version 4.0B built-in functions also become
available:
Where op is the name of the instruction. Refer to the ISA manual for the complete list
of instructions.
GCC also provides intrinsics to directly access the network registers. The intrinsics are:
where op is the name of the instruction. Refer to the ISA manual for the complete list of
instructions.
GCC also provides intrinsics to directly access the network registers. The intrinsics are:
‘amdfam15h’
AMD Family 15h CPU.
‘bdver1’ AMD Family 15h Bulldozer version 1.
‘bdver2’ AMD Family 15h Bulldozer version 2.
‘bdver3’ AMD Family 15h Bulldozer version 3.
‘bdver4’ AMD Family 15h Bulldozer version 4.
‘btver2’ AMD Family 16h CPU.
‘amdfam17h’
AMD Family 17h CPU.
‘znver1’ AMD Family 17h Zen version 1.
Here is an example:
if (__builtin_cpu_is ("corei7"))
{
do_corei7 (); // Core i7 specific implementation.
}
else
{
do_generic (); // Generic implementation.
}
The following built-in functions are made available by ‘-mmmx’. All of them generate the
machine instruction that is part of the name.
v8qi __builtin_ia32_paddb (v8qi, v8qi)
v4hi __builtin_ia32_paddw (v4hi, v4hi)
v2si __builtin_ia32_paddd (v2si, v2si)
v8qi __builtin_ia32_psubb (v8qi, v8qi)
v4hi __builtin_ia32_psubw (v4hi, v4hi)
v2si __builtin_ia32_psubd (v2si, v2si)
v8qi __builtin_ia32_paddsb (v8qi, v8qi)
v4hi __builtin_ia32_paddsw (v4hi, v4hi)
v8qi __builtin_ia32_psubsb (v8qi, v8qi)
v4hi __builtin_ia32_psubsw (v4hi, v4hi)
v8qi __builtin_ia32_paddusb (v8qi, v8qi)
v4hi __builtin_ia32_paddusw (v4hi, v4hi)
v8qi __builtin_ia32_psubusb (v8qi, v8qi)
v4hi __builtin_ia32_psubusw (v4hi, v4hi)
v4hi __builtin_ia32_pmullw (v4hi, v4hi)
v4hi __builtin_ia32_pmulhw (v4hi, v4hi)
di __builtin_ia32_pand (di, di)
di __builtin_ia32_pandn (di,di)
di __builtin_ia32_por (di, di)
di __builtin_ia32_pxor (di, di)
v8qi __builtin_ia32_pcmpeqb (v8qi, v8qi)
v4hi __builtin_ia32_pcmpeqw (v4hi, v4hi)
v2si __builtin_ia32_pcmpeqd (v2si, v2si)
v8qi __builtin_ia32_pcmpgtb (v8qi, v8qi)
v4hi __builtin_ia32_pcmpgtw (v4hi, v4hi)
v2si __builtin_ia32_pcmpgtd (v2si, v2si)
v8qi __builtin_ia32_punpckhbw (v8qi, v8qi)
v4hi __builtin_ia32_punpckhwd (v4hi, v4hi)
v2si __builtin_ia32_punpckhdq (v2si, v2si)
v8qi __builtin_ia32_punpcklbw (v8qi, v8qi)
v4hi __builtin_ia32_punpcklwd (v4hi, v4hi)
v2si __builtin_ia32_punpckldq (v2si, v2si)
v8qi __builtin_ia32_packsswb (v4hi, v4hi)
v4hi __builtin_ia32_packssdw (v2si, v2si)
v8qi __builtin_ia32_packuswb (v4hi, v4hi)
The following built-in functions are made available either with ‘-msse’, or with
‘-m3dnowa’. All of them generate the machine instruction that is part of the name.
704 Using the GNU Compiler Collection (GCC)
The following built-in functions are available when ‘-msse’ is used. All of them generate
the machine instruction that is part of the name.
int __builtin_ia32_comieq (v4sf, v4sf)
int __builtin_ia32_comineq (v4sf, v4sf)
int __builtin_ia32_comilt (v4sf, v4sf)
int __builtin_ia32_comile (v4sf, v4sf)
int __builtin_ia32_comigt (v4sf, v4sf)
int __builtin_ia32_comige (v4sf, v4sf)
int __builtin_ia32_ucomieq (v4sf, v4sf)
int __builtin_ia32_ucomineq (v4sf, v4sf)
int __builtin_ia32_ucomilt (v4sf, v4sf)
int __builtin_ia32_ucomile (v4sf, v4sf)
int __builtin_ia32_ucomigt (v4sf, v4sf)
int __builtin_ia32_ucomige (v4sf, v4sf)
v4sf __builtin_ia32_addps (v4sf, v4sf)
v4sf __builtin_ia32_subps (v4sf, v4sf)
v4sf __builtin_ia32_mulps (v4sf, v4sf)
v4sf __builtin_ia32_divps (v4sf, v4sf)
v4sf __builtin_ia32_addss (v4sf, v4sf)
v4sf __builtin_ia32_subss (v4sf, v4sf)
v4sf __builtin_ia32_mulss (v4sf, v4sf)
v4sf __builtin_ia32_divss (v4sf, v4sf)
v4sf __builtin_ia32_cmpeqps (v4sf, v4sf)
v4sf __builtin_ia32_cmpltps (v4sf, v4sf)
v4sf __builtin_ia32_cmpleps (v4sf, v4sf)
v4sf __builtin_ia32_cmpgtps (v4sf, v4sf)
v4sf __builtin_ia32_cmpgeps (v4sf, v4sf)
v4sf __builtin_ia32_cmpunordps (v4sf, v4sf)
v4sf __builtin_ia32_cmpneqps (v4sf, v4sf)
v4sf __builtin_ia32_cmpnltps (v4sf, v4sf)
v4sf __builtin_ia32_cmpnleps (v4sf, v4sf)
v4sf __builtin_ia32_cmpngtps (v4sf, v4sf)
v4sf __builtin_ia32_cmpngeps (v4sf, v4sf)
v4sf __builtin_ia32_cmpordps (v4sf, v4sf)
v4sf __builtin_ia32_cmpeqss (v4sf, v4sf)
v4sf __builtin_ia32_cmpltss (v4sf, v4sf)
v4sf __builtin_ia32_cmpless (v4sf, v4sf)
v4sf __builtin_ia32_cmpunordss (v4sf, v4sf)
v4sf __builtin_ia32_cmpneqss (v4sf, v4sf)
v4sf __builtin_ia32_cmpnltss (v4sf, v4sf)
v4sf __builtin_ia32_cmpnless (v4sf, v4sf)
v4sf __builtin_ia32_cmpordss (v4sf, v4sf)
v4sf __builtin_ia32_maxps (v4sf, v4sf)
v4sf __builtin_ia32_maxss (v4sf, v4sf)
v4sf __builtin_ia32_minps (v4sf, v4sf)
Chapter 6: Extensions to the C Language Family 705
The following built-in functions are available when ‘-mavx2’ is used. All of them generate
the machine instruction that is part of the name.
v32qi __builtin_ia32_mpsadbw256 (v32qi,v32qi,int)
v32qi __builtin_ia32_pabsb256 (v32qi)
v16hi __builtin_ia32_pabsw256 (v16hi)
v8si __builtin_ia32_pabsd256 (v8si)
v16hi __builtin_ia32_packssdw256 (v8si,v8si)
v32qi __builtin_ia32_packsswb256 (v16hi,v16hi)
v16hi __builtin_ia32_packusdw256 (v8si,v8si)
v32qi __builtin_ia32_packuswb256 (v16hi,v16hi)
v32qi __builtin_ia32_paddb256 (v32qi,v32qi)
714 Using the GNU Compiler Collection (GCC)
The following built-in functions are available when ‘-maes’ is used. All of them generate
the machine instruction that is part of the name.
v2di __builtin_ia32_aesenc128 (v2di, v2di)
v2di __builtin_ia32_aesenclast128 (v2di, v2di)
v2di __builtin_ia32_aesdec128 (v2di, v2di)
v2di __builtin_ia32_aesdeclast128 (v2di, v2di)
v2di __builtin_ia32_aeskeygenassist128 (v2di, const int)
v2di __builtin_ia32_aesimc128 (v2di)
The following built-in functions are available when ‘-mfma4’ is used. All of them generate
the machine instruction that is part of the name.
v2df __builtin_ia32_vfmaddpd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfmaddps (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfmaddsd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfmaddss (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfmsubpd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfmsubps (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfmsubsd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfmsubss (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfnmaddpd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfnmaddps (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfnmaddsd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfnmaddss (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfnmsubpd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfnmsubps (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfnmsubsd (v2df, v2df, v2df)
v4sf __builtin_ia32_vfnmsubss (v4sf, v4sf, v4sf)
v2df __builtin_ia32_vfmaddsubpd (v2df, v2df, v2df)
720 Using the GNU Compiler Collection (GCC)
The following built-in functions are available when ‘-mxsave’ is used. All of them generate
the machine instruction that is part of the name.
void __builtin_ia32_xsave (void *, long long)
void __builtin_ia32_xrstor (void *, long long)
void __builtin_ia32_xsave64 (void *, long long)
void __builtin_ia32_xrstor64 (void *, long long)
The following built-in functions are available when ‘-mxsaveopt’ is used. All of them
generate the machine instruction that is part of the name.
void __builtin_ia32_xsaveopt (void *, long long)
void __builtin_ia32_xsaveopt64 (void *, long long)
The following built-in functions are available when ‘-mtbm’ is used. Both of them generate
the immediate form of the bextr machine instruction.
unsigned int __builtin_ia32_bextri_u32 (unsigned int,
const unsigned int);
unsigned long long __builtin_ia32_bextri_u64 (unsigned long long,
const unsigned long long);
The following built-in functions are available when ‘-m3dnow’ is used. All of them generate
the machine instruction that is part of the name.
void __builtin_ia32_femms (void)
v8qi __builtin_ia32_pavgusb (v8qi, v8qi)
v2si __builtin_ia32_pf2id (v2sf)
v2sf __builtin_ia32_pfacc (v2sf, v2sf)
v2sf __builtin_ia32_pfadd (v2sf, v2sf)
v2si __builtin_ia32_pfcmpeq (v2sf, v2sf)
v2si __builtin_ia32_pfcmpge (v2sf, v2sf)
v2si __builtin_ia32_pfcmpgt (v2sf, v2sf)
v2sf __builtin_ia32_pfmax (v2sf, v2sf)
v2sf __builtin_ia32_pfmin (v2sf, v2sf)
v2sf __builtin_ia32_pfmul (v2sf, v2sf)
v2sf __builtin_ia32_pfrcp (v2sf)
v2sf __builtin_ia32_pfrcpit1 (v2sf, v2sf)
v2sf __builtin_ia32_pfrcpit2 (v2sf, v2sf)
v2sf __builtin_ia32_pfrsqrt (v2sf)
v2sf __builtin_ia32_pfsub (v2sf, v2sf)
v2sf __builtin_ia32_pfsubr (v2sf, v2sf)
v2sf __builtin_ia32_pi2fd (v2si)
v4hi __builtin_ia32_pmulhrw (v4hi, v4hi)
The following built-in functions are available when ‘-m3dnowa’ is used. All of them
generate the machine instruction that is part of the name.
v2si __builtin_ia32_pf2iw (v2sf)
v2sf __builtin_ia32_pfnacc (v2sf, v2sf)
v2sf __builtin_ia32_pfpnacc (v2sf, v2sf)
v2sf __builtin_ia32_pi2fw (v2si)
v2sf __builtin_ia32_pswapdsf (v2sf)
v2si __builtin_ia32_pswapdsi (v2si)
The following built-in functions are available when ‘-mrtm’ is used They are used for
restricted transactional memory. These are the internal low level functions. Normally the
functions in Section 6.60.33 [x86 transactional memory intrinsics], page 722 should be used
instead.
int __builtin_ia32_xbegin ()
void __builtin_ia32_xend ()
void __builtin_ia32_xabort (status)
722 Using the GNU Compiler Collection (GCC)
int __builtin_ia32_xtest ()
The following built-in functions are available when ‘-mmwaitx’ is used. All of them
generate the machine instruction that is part of the name.
void __builtin_ia32_monitorx (void *, unsigned int, unsigned int)
void __builtin_ia32_mwaitx (unsigned int, unsigned int, unsigned int)
The following built-in functions are available when ‘-mclzero’ is used. All of them
generate the machine instruction that is part of the name.
void __builtin_i32_clzero (void *)
The following built-in functions are available when ‘-mpku’ is used. They generate reads
and writes to PKRU.
void __builtin_ia32_wrpkru (unsigned int)
unsigned int __builtin_ia32_rdpkru ()
Here is an example showing handling for _XABORT_RETRY and a fallback path for other
failures:
#include <immintrin.h>
types. However, parsing of the format string itself is currently undefined and is not carried
out by this version of the compiler.
Additionally, CFStringRefs (defined by the CoreFoundation headers) may also be used
as format arguments. Note that the relevant headers are only likely to be available on
Darwin (OSX) installations. On such installations, the XCode and system documentation
provide descriptions of CFString, CFStringRefs and associated functions.
longcall (0)
Do not apply the longcall attribute to subsequent function declarations.
Note that these pragmas override any command-line options. GCC keeps track
of the location of each pragma, and issues diagnostics according to the state
as of that point in the source file. Thus, pragmas occurring after a line do not
affect diagnostics caused by that line.
#pragma GCC diagnostic push
#pragma GCC diagnostic pop
Causes GCC to remember the state of the diagnostics as of each push, and
restore to that point at each pop. If a pop has no matching push, the command-
line options are restored.
#pragma GCC diagnostic error "-Wuninitialized"
foo(a); /* error is given for this one */
#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Wuninitialized"
foo(b); /* no diagnostic for this one */
#pragma GCC diagnostic pop
foo(c); /* error is given for this one */
#pragma GCC diagnostic pop
foo(d); /* depends on command-line options */
GCC also offers a simple mechanism for printing messages during compilation.
#pragma message string
Prints string as a compiler message on compilation. The message is informa-
tional only, and is neither a compilation warning nor an error.
#pragma message "Compiling " __FILE__ "..."
string may be parenthesized, and is printed with location information. For
example,
#define DO_PRAGMA(x) _Pragma (#x)
#define TODO(x) DO_PRAGMA(message ("TODO - " #x))
#pragma push_macro("macro_name")
This pragma saves the value of the macro named as macro name to the top of
the stack for this macro.
#pragma pop_macro("macro_name")
This pragma sets the value of the macro named as macro name to the value
on top of the stack for this macro. If the stack for macro name is empty, the
value of the macro remains unchanged.
For example:
#define X 1
#pragma push_macro("X")
#undef X
#define X -1
#pragma pop_macro("X")
int x [X];
Unless ‘-fms-extensions’ is used, the unnamed field must be a structure or union defini-
tion without a tag (for example, ‘struct { int a; };’). If ‘-fms-extensions’ is used, the
field may also be a definition with a tag such as ‘struct foo { int a; };’, a reference to
a previously defined structure or union such as ‘struct foo;’, or a reference to a typedef
name for a previously defined structure or union type.
The option ‘-fplan9-extensions’ enables ‘-fms-extensions’ as well as two other ex-
tensions. First, a pointer to a structure is automatically converted to a pointer to an
anonymous field for assignments and function calls. For example:
struct s1 { int a; };
struct s2 { struct s1; };
extern void f1 (struct s1 *);
void f2 (struct s2 *p) { f1 (p); }
In the call to f1 inside f2, the pointer p is converted into a pointer to the anonymous field.
Second, when the type of an anonymous field is a typedef for a struct or union, code
may refer to the field using the name of the typedef.
typedef struct { int a; } s1;
struct s2 { s1; };
s1 f1 (struct s2 *p) { return p->s1; }
These usages are only permitted when they are not ambiguous.
See ELF Handling For Thread-Local Storage for a detailed explanation of the four thread-
local storage addressing models, and how the runtime is expected to function.
Change paragraph 1
With the exception of __thread, at most one storage-class-specifier shall
appear in a given decl-specifier-seq. The __thread specifier may be used
alone, or immediately following the extern or static specifiers. [. . . ]
Add after paragraph 5
The __thread specifier can be applied only to the names of objects and to
anonymous unions.
• [class.mem]
Add after paragraph 6
Non-static members shall not be __thread.
type_info objects
C++ requires information about types to be written out in order to implement
‘dynamic_cast’, ‘typeid’ and exception handling. For polymorphic classes
(classes with virtual functions), the ‘type_info’ object is written out along
with the vtable so that ‘dynamic_cast’ can determine the dynamic type of a
class object at run time. For all other types, we write out the ‘type_info’
object when it is used: when applying ‘typeid’ to an expression, throwing an
object, or referring to a type in a catch clause or exception specification.
Template Instantiations
Most everything in this section also applies to template instantiations, but there
are other options as well. See Section 7.5 [Where’s the Template?], page 740.
When used with GNU ld version 2.8 or later on an ELF system such as GNU/Linux or
Solaris 2, or on Microsoft Windows, duplicate copies of these constructs will be discarded
at link time. This is known as COMDAT support.
On targets that don’t support COMDAT, but do support weak symbols, GCC uses them.
This way one copy overrides all the others, but the unused copies still take up space in the
executable.
For targets that do not support either COMDAT or weak symbols, most entities with
vague linkage are emitted as local symbols to avoid duplicate definition errors from the
linker. This does not happen for local statics in inlines, however, as having multiple copies
almost certainly breaks things.
See Section 7.4 [Declarations and Definitions in One Header], page 739, for another way
to control placement of these constructs.
The second form of this directive is useful for the case where you have multiple
headers with the same name in different directories. If you use this form, you
must specify the same string to ‘#pragma implementation’.
#pragma implementation
#pragma implementation "objects.h"
Use this pragma in a main input file, when you want full output from included
header files to be generated (and made globally visible). The included header
file, in turn, should use ‘#pragma interface’. Backup copies of inline member
functions, debugging information, and the internal tables used to implement
virtual functions are all generated in implementation files.
If you use ‘#pragma implementation’ with no argument, it applies to an
include file with the same basename1 as your source file. For example, in
‘allclass.cc’, giving just ‘#pragma implementation’ by itself is equivalent
to ‘#pragma implementation "allclass.h"’.
Use the string argument if you want a single implementation file to include code
from multiple header files. (You must also use ‘#include’ to include the header
file; ‘#pragma implementation’ only specifies how to use the file—it doesn’t
actually include it.)
There is no way to split up the contents of a single header file into multiple
implementation files.
‘#pragma implementation’ and ‘#pragma interface’ also have an effect on function in-
lining.
If you define a class in a header file marked with ‘#pragma interface’, the effect on
an inline function defined in that class is similar to an explicit extern declaration—the
compiler emits no code at all to define an independent version of the function. Its definition
is used only for inlining with its callers.
Conversely, when you include the same header file in a main source file that declares it
as ‘#pragma implementation’, the compiler emits code for the function itself; this defines
a version of the function that can be found via pointers (or by callers compiled without
inlining). If all calls to the function can be inlined, you can avoid emitting the function by
compiling with ‘-fno-implement-inlines’. If any calls are not inlined, you will get linker
errors.
stances in each translation unit that uses them, and the linker collapses them
together. The advantage of this model is that the linker only has to consider
the object files themselves; there is no external complexity to worry about. The
disadvantage is that compilation time is increased because the template code
is being compiled repeatedly. Code written for this model tends to include
definitions of all templates in the header file, since they must be seen to be
instantiated.
Cfront model
The AT&T C++ translator, Cfront, solved the template instantiation problem
by creating the notion of a template repository, an automatically maintained
place where template instances are stored. A more modern version of the repos-
itory works as follows: As individual object files are built, the compiler places
any template definitions and instantiations encountered in the repository. At
link time, the link wrapper adds in the objects in the repository and compiles
any needed instances that were not previously emitted. The advantages of this
model are more optimal compilation speed and the ability to use the system
linker; to implement the Borland model a compiler vendor also needs to replace
the linker. The disadvantages are vastly increased complexity, and thus poten-
tial for error; for some code this can be just as transparent, but in practice
it can been very difficult to build multiple programs in one directory and one
program in multiple directories. Code written for this model tends to separate
definitions of non-inline member templates into a separate file, which should be
compiled separately.
G++ implements the Borland model on targets where the linker supports it, including
ELF targets (such as GNU/Linux), Mac OS X and Microsoft Windows. Otherwise G++
implements neither automatic model.
You have the following options for dealing with template instantiations:
1. Do nothing. Code written for the Borland model works fine, but each translation
unit contains instances of each of the templates it uses. The duplicate instances will
be discarded by the linker, but in a large program, this can lead to an unacceptable
amount of code duplication in object files or shared libraries.
Duplicate instances of a template can be avoided by defining an explicit instantiation
in one object file, and preventing the compiler from doing implicit instantiations in
any other object files by using an explicit instantiation declaration, using the extern
template syntax:
extern template int max (int, int);
This syntax is defined in the C++ 2011 standard, but has been supported by G++ and
other compilers since well before 2011.
Explicit instantiations can be used for the largest or most frequently duplicated in-
stances, without having to know exactly which other instances are used in the rest
of the program. You can scatter the explicit instantiations throughout your program,
perhaps putting them in the translation units where the instances are used or the
translation units that define the templates themselves; you can put all of the explicit
instantiations you need into one big file; or you can create small files like
#include "Foo.h"
742 Using the GNU Compiler Collection (GCC)
#include "Foo.cc"
for each of the instances you need, and create a template instantiation library from
those.
This is the simplest option, but also offers flexibility and fine-grained control when
necessary. It is also the most portable alternative and programs using this approach
will work with most modern compilers.
2. Compile your template-using code with ‘-frepo’. The compiler generates files with
the extension ‘.rpo’ listing all of the template instantiations used in the corresponding
object files that could be instantiated there; the link wrapper, ‘collect2’, then updates
the ‘.rpo’ files to tell the compiler where to place those instantiations and rebuild any
affected object files. The link-time overhead is negligible after the first pass, as the
compiler continues to place the instantiations in the same files.
This can be a suitable option for application code written for the Borland model, as it
usually just works. Code written for the Cfront model needs to be modified so that the
template definitions are available at one or more points of instantiation; usually this is
as simple as adding #include <tmethods.cc> to the end of each template header.
For library code, if you want the library to provide all of the template instantiations
it needs, just try to link all of its object files together; the link will fail, but cause
the instantiations to be generated as a side effect. Be warned, however, that this may
cause conflicts if multiple libraries try to provide the same instantiations. For greater
control, use explicit instantiation as described in the next option.
3. Compile your code with ‘-fno-implicit-templates’ to disable the implicit generation
of template instances, and explicitly instantiate all the ones you use. This approach
requires more knowledge of exactly which instances you need than do the others, but it’s
less mysterious and allows greater control if you want to ensure that only the intended
instances are used.
If you are using Cfront-model code, you can probably get away with not using
‘-fno-implicit-templates’ when compiling files that don’t ‘#include’ the member
template definitions.
If you use one big file to do the instantiations, you may want to compile it without
‘-fno-implicit-templates’ so you get all of the instances required by your explicit
instantiations (but not by any other files) without having to specify them as well.
In addition to forward declaration of explicit instantiations (with extern), G++ has
extended the template instantiation syntax to support instantiation of the compiler
support data for a template class (i.e. the vtable) without instantiating any of its
members (with inline), and instantiation of only the static data members of a template
class, without the support data or member functions (with static):
inline template class Foo<int>;
static template class Foo<int>;
Chapter 7: Extensions to the C++ Language 743
fptr p = (fptr)(a.*fp);
For PMF constants (i.e. expressions of the form ‘&Klasse::Member’), no object is needed
to obtain the address of the function. They can be converted to function pointers directly:
fptr p1 = (fptr)(&A::foo);
You must specify ‘-Wno-pmf-conversions’ to use this extension.
that needs to coexist with an earlier ABI, using this option can help to find all
affected types that need to be tagged.
When a type involving an ABI tag is used as the type of a variable or re-
turn type of a function where that tag is not already present in the signature
of the function, the tag is automatically applied to the variable or function.
‘-Wabi-tag’ also warns about this situation; this warning can be avoided by
explicitly tagging the variable or function or moving it into a tagged inline
namespace.
init_priority (priority)
In Standard C++, objects defined at namespace scope are guaranteed to be
initialized in an order in strict accordance with that of their definitions in a given
translation unit. No guarantee is made for initializations across translation
units. However, GNU C++ allows users to control the order of initialization
of objects defined at namespace scope with the init_priority attribute by
specifying a relative priority, a constant integral expression currently bounded
between 101 and 65535 inclusive. Lower numbers indicate a higher priority.
In the following example, A would normally be created before B, but the init_
priority attribute reverses that order:
Some_Class A __attribute__ ((init_priority (2000)));
Some_Class B __attribute__ ((init_priority (543)));
Note that the particular values of priority do not matter; only their relative
ordering.
warn_unused
For C++ types with non-trivial constructors and/or destructors it is impossible
for the compiler to determine whether a variable of this type is truly unused if
it is not referenced. This type attribute informs the compiler that variables of
this type should be warned about if they appear to be unused, just like variables
of fundamental types.
This attribute is appropriate for types which just represent a value, such as
std::string; it is not appropriate for types which control a resource, such as
std::lock_guard.
This attribute is also accepted in C, but it is unnecessary because C does not
have constructors or destructors.
int main ()
{
int (*p)() = &foo;
assert ((*p) () == foo ());
return 0;
}
In the above example, four versions of function foo are created. The first version of foo
with the target attribute "default" is the default version. This version gets executed when
no other target specific version qualifies for execution on a particular platform. A new
version of foo is created by using the same function signature but with a different target
string. Function foo is called or a pointer to it is taken just like a regular function. GCC
takes care of doing the dispatching to call the right version at runtime. Refer to the GCC
wiki on Function Multiversioning for more details.
__has_nothrow_constructor (type)
If __has_trivial_constructor (type) is true then the trait is true, else if
type is a cv class or union type (or array thereof) with a default constructor
that is known not to throw an exception then the trait is true, else it is false.
Requires: type shall be a complete type, (possibly cv-qualified) void, or an
array of unknown bound.
__has_trivial_assign (type)
If type is const qualified or is a reference type then the trait is false. Otherwise
if __is_pod (type) is true then the trait is true, else if type is a cv class or
union type with a trivial copy assignment ([class.copy]) then the trait is true,
else it is false. Requires: type shall be a complete type, (possibly cv-qualified)
void, or an array of unknown bound.
__has_trivial_copy (type)
If __is_pod (type) is true or type is a reference type then the trait is true, else
if type is a cv class or union type with a trivial copy constructor ([class.copy])
then the trait is true, else it is false. Requires: type shall be a complete type,
(possibly cv-qualified) void, or an array of unknown bound.
__has_trivial_constructor (type)
If __is_pod (type) is true then the trait is true, else if type is a cv class or
union type (or array thereof) with a trivial default constructor ([class.ctor])
then the trait is true, else it is false. Requires: type shall be a complete type,
(possibly cv-qualified) void, or an array of unknown bound.
__has_trivial_destructor (type)
If __is_pod (type) is true or type is a reference type then the trait is true, else
if type is a cv class or union type (or array thereof) with a trivial destructor
([class.dtor]) then the trait is true, else it is false. Requires: type shall be a
complete type, (possibly cv-qualified) void, or an array of unknown bound.
__has_virtual_destructor (type)
If type is a class type with a virtual destructor ([class.dtor]) then the trait
is true, else it is false. Requires: type shall be a complete type, (possibly
cv-qualified) void, or an array of unknown bound.
__is_abstract (type)
If type is an abstract class ([class.abstract]) then the trait is true, else it is
false. Requires: type shall be a complete type, (possibly cv-qualified) void, or
an array of unknown bound.
__is_base_of (base_type, derived_type)
If base_type is a base class of derived_type ([class.derived]) then the trait
is true, otherwise it is false. Top-level cv qualifications of base_type and
derived_type are ignored. For the purposes of this trait, a class type is con-
sidered is own base. Requires: if __is_class (base_type) and __is_class
(derived_type) are true and base_type and derived_type are not the same
type (disregarding cv-qualifiers), derived_type shall be a complete type. A
diagnostic is produced if this requirement is not met.
Chapter 7: Extensions to the C++ Language 747
__is_class (type)
If type is a cv class type, and not a union type ([basic.compound]) the trait is
true, else it is false.
__is_empty (type)
If __is_class (type) is false then the trait is false. Otherwise type is con-
sidered empty if and only if: type has no non-static data members, or all
non-static data members, if any, are bit-fields of length 0, and type has no
virtual members, and type has no virtual base classes, and type has no base
classes base_type for which __is_empty (base_type) is false. Requires: type
shall be a complete type, (possibly cv-qualified) void, or an array of unknown
bound.
__is_enum (type)
If type is a cv enumeration type ([basic.compound]) the trait is true, else it is
false.
__is_literal_type (type)
If type is a literal type ([basic.types]) the trait is true, else it is false. Requires:
type shall be a complete type, (possibly cv-qualified) void, or an array of
unknown bound.
__is_pod (type)
If type is a cv POD type ([basic.types]) then the trait is true, else it is false.
Requires: type shall be a complete type, (possibly cv-qualified) void, or an
array of unknown bound.
__is_polymorphic (type)
If type is a polymorphic class ([class.virtual]) then the trait is true, else it is
false. Requires: type shall be a complete type, (possibly cv-qualified) void, or
an array of unknown bound.
__is_standard_layout (type)
If type is a standard-layout type ([basic.types]) the trait is true, else it is false.
Requires: type shall be a complete type, (possibly cv-qualified) void, or an
array of unknown bound.
__is_trivial (type)
If type is a trivial type ([basic.types]) the trait is true, else it is false. Requires:
type shall be a complete type, (possibly cv-qualified) void, or an array of
unknown bound.
__is_union (type)
If type is a cv union type ([basic.compound]) the trait is true, else it is false.
__underlying_type (type)
The underlying type of type. Requires: type shall be an enumeration type
([dcl.enum]).
extend the usual overloading and partial specialization capabilities of the language, allowing
generic data structures and algorithms to be “refined” based on their properties rather than
their type names.
The following keywords are reserved for concepts.
assumes States an expression as an assumption, and if possible, verifies that the assump-
tion is valid. For example, assume(n > 0).
axiom Introduces an axiom definition. Axioms introduce requirements on values.
forall Introduces a universally quantified object in an axiom. For example, forall
(int n) n + 0 == n).
concept Introduces a concept definition. Concepts are sets of syntactic and semantic
requirements on types and their values.
requires Introduces constraints on template arguments or requirements for a member
function of a class template.
The front end also exposes a number of internal mechanism that can be used to simplify
the writing of type traits. Note that some of these traits are likely to be removed in the
future.
__is_same (type1, type2)
A binary type trait: true whenever the type arguments are the same.
• ‘objc/thr.h’: this header declares a public runtime API threading layer that is only
provided by the GNU Objective-C runtime. It declares functions such as objc_mutex_
lock(), which provide a platform-independent set of threading functions.
The header files contain detailed documentation for each function in the GNU Objective-
C runtime API.
@implementation FileStream
+ (void)initialize
{
Stdin = [[FileStream new] initWithFd:0];
Stdout = [[FileStream new] initWithFd:1];
Stderr = [[FileStream new] initWithFd:2];
}
In this example, the initialization of Stdin, Stdout and Stderr in +initialize occurs
too late. The programmer can send a message to one of these objects before the variables
are actually initialized, thus sending messages to the nil object. The +initialize method
which actually initializes the global variables is not invoked until the first message is sent
Chapter 8: GNU Objective-C Features 753
to the class object. The solution would require these variables to be initialized just before
entering main.
The correct solution of the above problem is to use the +load method instead of
+initialize:
@implementation FileStream
+ (void)load
{
Stdin = [[FileStream new] initWithFd:0];
Stdout = [[FileStream new] initWithFd:1];
Stderr = [[FileStream new] initWithFd:2];
}
The +load is a method that is not overridden by categories. If a class and a category of
it both implement +load, both methods are invoked. This allows some additional initial-
izations to be performed in a category.
This mechanism is not intended to be a replacement for +initialize. You should be
aware of its limitations when you decide to use it instead of +initialize.
class is invoked even if +load was not invoked. Note if you explicitly call +load on a class,
+initialize will be called first. To avoid possible problems try to implement only one of
these methods.
The +load method is also invoked when a bundle is dynamically loaded into your running
program. This happens automatically without any intervening operation from you. When
you write bundles and you need to write +load you can safely create and send messages to
objects whose classes already exist in the running program. The same restrictions as above
apply to classes defined in bundle.
The encoding of bit-fields has changed to allow bit-fields to be properly handled by the
runtime functions that compute sizes and alignments of types that contain bit-fields. The
previous encoding contained only the size of the bit-field. Using only this information it is
not possible to reliably compute the size occupied by the bit-field. This is very important
in the presence of the Boehm’s garbage collector because the objects are allocated using
the typed memory facility available in this collector. The typed memory allocation requires
information about where the pointers are located inside the object.
The position in the bit-field is the position, counting in bits, of the bit closest to the
beginning of the structure.
The non-atomic types are encoded as follows:
pointers ‘^’ followed by the pointed type.
arrays ‘[’ followed by the number of elements in the array followed by the
type of the elements followed by ‘]’
structures ‘{’ followed by the name of the structure (or ‘?’ if the structure is
unnamed), the ‘=’ sign, the type of the members and by ‘}’
unions ‘(’ followed by the name of the structure (or ‘?’ if the union is un-
named), the ‘=’ sign, the type of the members followed by ‘)’
vectors ‘![’ followed by the vector size (the number of bytes composing the
vector) followed by a comma, followed by the alignment (in bytes) of
the vector, followed by the type of the elements followed by ‘]’
Here are some types and their encodings, as they are generated by the compiler on an
i386 machine:
struct { {?=i[3f]b128i3b131i2c}
int i;
float f[3];
int a:3;
int b:2;
char c;
}
In addition to the types the compiler also encodes the type specifiers. The table below
describes the encoding of the current Objective-C type specifiers:
Specifier Encoding
const r
in n
inout N
out o
bycopy O
756 Using the GNU Compiler Collection (GCC)
byref R
oneway V
The type specifiers are encoded just before the type. Unlike types however, the type
specifiers are only encoded when they appear in method argument types.
Note how const interacts with pointers:
const int* is a pointer to a const int, and so is encoded as ^ri. int* const, instead,
is a const pointer to an int, and so is encoded as r^i.
Finally, there is a complication when encoding const char * versus char * const. Be-
cause char * is encoded as * and not as ^c, there is no way to express the fact that r applies
to the pointer or to the pointee.
Hence, it is assumed as a convention that r* means const char * (since it is what is
most often meant), and there is no way to encode char *const. char *const would simply
be encoded as *, and the const is lost.
8.3.2 @encode
GNU Objective-C supports the @encode syntax that allows you to create a type encoding
from a C/Objective-C type. For example, @encode(int) is compiled by the compiler into
"i".
@encode does not support type qualifiers other than const. For example, @encode(const
char*) is valid and is compiled into "r*", while @encode(bycopy char *) is invalid and
will cause a compilation error.
Chapter 8: GNU Objective-C Features 757
- initWithPointer:(const void*)p;
- (const void*)weakPointer;
@end
@implementation WeakPointer
+ (void)initialize
{
if (self == objc_lookUpClass ("WeakPointer"))
class_ivar_set_gcinvisible (self, "weakPointer", YES);
}
- initWithPointer:(const void*)p
{
weakPointer = p;
return self;
}
- (const void*)weakPointer
{
return weakPointer;
}
@end
Weak pointers are supported through a new type character specifier represented by the
‘!’ character. The class_ivar_set_gcinvisible() function adds or removes this specifier
to the string type description of the instance variable named as argument.
User defined libraries may want to implement their own constant string class. To be able
to support them, the GNU Objective-C compiler provides a new command line options
‘-fconstant-string-class=class-name’. The provided class should adhere to a strict
structure, the same as NXConstantString’s structure:
@interface MyConstantStringClass
{
Class isa;
char *c_string;
unsigned int len;
}
@end
NXConstantString inherits from Object; user class libraries may choose to inherit the
customized constant string class from a different class than Object. There is no requirement
in the methods the constant string class has to implement, but the final ivar layout of the
class must be the compatible with the given structure.
When the compiler creates the statically allocated constant string object, the c_string
field will be filled by the compiler with the string; the length field will be filled by the
compiler with the string length; the isa pointer will be filled with NULL by the compiler,
and it will later be fixed up automatically at runtime by the GNU Objective-C runtime
library to point to the class which was set by the ‘-fconstant-string-class’ option when
the object file is loaded (if you wonder how it works behind the scenes, the name of the
class to use, and the list of static objects to fixup, are stored by the compiler in the object
file in a place where the GNU runtime library will find them at runtime).
As a result, when a file is compiled with the ‘-fconstant-string-class’ option, all the
constant string objects will be instances of the class specified as argument to this option. It
is possible to have multiple compilation units referring to different constant string classes,
neither the compiler nor the linker impose any restrictions in doing this.
8.6 compatibility_alias
The keyword @compatibility_alias allows you to define a class name as equivalent to
another class name. For example:
@compatibility_alias WOApplication GSWApplication;
tells the compiler that each time it encounters WOApplication as a class name, it
should replace it with GSWApplication (that is, WOApplication is just an alias for
GSWApplication).
There are some constraints on how this can be used—
• WOApplication (the alias) must not be an existing class;
• GSWApplication (the real class) must be an existing class.
8.7 Exceptions
GNU Objective-C provides exception support built into the language, as in the following
example:
@try {
...
760 Using the GNU Compiler Collection (GCC)
@throw expr;
...
}
@catch (AnObjCClass *exc) {
...
@throw expr;
...
@throw;
...
}
@catch (AnotherClass *exc) {
...
}
@catch (id allOthers) {
...
}
@finally {
...
@throw expr;
...
}
8.8 Synchronization
GNU Objective-C provides support for synchronized blocks:
@synchronized (ObjCClass *guard) {
...
}
Upon entering the @synchronized block, a thread of execution shall first check whether
a lock has been placed on the corresponding guard object by another thread. If it has, the
current thread shall wait until the other thread relinquishes its lock. Once guard becomes
available, the current thread will place its own lock on it, execute the code contained in the
@synchronized block, and finally relinquish the lock (thereby making guard available to
other threads).
Unlike Java, Objective-C does not allow for entire methods to be marked @synchronized.
Note that throwing exceptions out of @synchronized blocks is allowed, and will cause the
guarding object to be unlocked properly.
Because of the interactions between synchronization and exception handling, you can only
use @synchronized when compiling with exceptions enabled, that is with the command line
option ‘-fobjc-exceptions’.
{
id object;
for (object in array)
{
/* Do something with ’object’ */
}
}
but can save some typing.
Note that the option ‘-std=c99’ is not required to allow this syntax in Objective-C.
To configure the hook, you set the global variable __objc_msg_forward2 to a func-
tion with the same argument and return types of objc_msg_lookup(). When objc_msg_
lookup() can not find a method implementation, it invokes the hook function you provided
to get a method implementation to return. So, in practice __objc_msg_forward2 allows you
to extend objc_msg_lookup() by adding some custom code that is called to do a further
lookup when no standard method implementation can be found using the normal lookup.
This hook is generally reserved for “Foundation” libraries such as GNUstep Base, which
use it to implement their high-level method forwarding API, typically based around the
forwardInvocation: method. So, unless you are implementing your own “Foundation”
library, you should not set this hook.
In a typical forwarding implementation, the __objc_msg_forward2 hook function deter-
mines the argument and return type of the method that is being looked up, and then creates
a function that takes these arguments and has that return type, and returns it to the caller.
Creating this function is non-trivial and is typically performed using a dedicated library
such as libffi.
The forwarding method implementation thus created is returned by objc_msg_lookup()
and is executed as if it was a normal method implementation. When the forwarding method
implementation is called, it is usually expected to pack all arguments into some sort of
object (typically, an NSInvocation in a “Foundation” library), and hand it over to the
programmer (forwardInvocation:) who is then allowed to manipulate the method in-
vocation using a high-level API provided by the “Foundation” library. For example, the
programmer may want to examine the method invocation arguments and name and poten-
tially change them before forwarding the method invocation to one or more local objects
(performInvocation:) or even to remote objects (by using Distributed Objects or some
other mechanism). When all this completes, the return value is passed back and must be
returned correctly to the original caller.
Note that the GNU Objective-C runtime currently provides no support for method for-
warding or method invocations other than the __objc_msg_forward2 hook.
If the forwarding hook does not exist or returns NULL, the runtime currently attempts
forwarding using an older, deprecated API, and if that fails, it aborts the program. In
future versions of the GNU Objective-C runtime, the runtime will immediately abort.
Chapter 9: Binary Compatibility 767
9 Binary Compatibility
Binary compatibility encompasses several related concepts:
application binary interface (ABI)
The set of runtime conventions followed by all of the tools that deal with bi-
nary representations of a program, including compilers, assemblers, linkers, and
language runtime support. Some ABIs are formal with a written specification,
possibly designed by multiple interested parties. Others are simply the way
things are actually done by a particular set of tools.
ABI conformance
A compiler conforms to an ABI if it generates code that follows all of the
specifications enumerated by that ABI. A library conforms to an ABI if it is
implemented according to that ABI. An application conforms to an ABI if it
is built using tools that conform to that ABI and does not contain source code
that specifically changes behavior specified by the ABI.
calling conventions
Calling conventions are a subset of an ABI that specify of how arguments are
passed and function results are returned.
interoperability
Different sets of tools are interoperable if they generate files that can be used
in the same program. The set of tools includes compilers, assemblers, linkers,
libraries, header files, startup files, and debuggers. Binaries produced by dif-
ferent sets of tools are not interoperable unless they implement the same ABI.
This applies to different versions of the same tools as well as tools from different
vendors.
intercallability
Whether a function in a binary built by one set of tools can call a function in
a binary built by a different set of tools is a subset of interoperability.
implementation-defined features
Language standards include lists of implementation-defined features whose be-
havior can vary from one implementation to another. Some of these features
are normally covered by a platform’s ABI and others are not. The features
that are not covered by an ABI generally affect how a program behaves, but
not intercallability.
compatibility
Conformance to the same ABI and the same behavior of implementation-defined
features are both relevant for compatibility.
The application binary interface implemented by a C or C++ compiler affects code gen-
eration and runtime support for:
• size and alignment of data types
• layout of structured types
• calling conventions
768 Using the GNU Compiler Collection (GCC)
The most straightforward way to link a program to use a particular C++ library is to
use a C++ driver that specifies that C++ library by default. The g++ driver, for example,
tells the linker where to find GCC’s C++ library (‘libstdc++’) plus the other libraries and
startup files it needs, in the proper order.
If a program must use a different C++ library and it’s not possible to do the final link
using a C++ driver that uses that library by default, it is necessary to tell g++ the location
and name of that library. It might also be necessary to specify different startup files and
other runtime support libraries, and to suppress the use of GCC’s support libraries with
one or more of the options ‘-nostdlib’, ‘-nostartfiles’, and ‘-nodefaultlibs’.
Chapter 10: gcov—a Test Coverage Program 771
-a
--all-blocks
Write individual execution counts for every basic block. Normally gcov outputs
execution counts only for the main blocks of a line. With this option you can
determine if blocks within a single line are not being executed.
-b
--branch-probabilities
Write branch frequencies to the output file, and write branch summary info to
the standard output. This option allows you to see how often each branch in
your program was taken. Unconditional branches will not be shown, unless the
‘-u’ option is given.
-c
--branch-counts
Write branch frequencies as the number of branches taken, rather than the
percentage of branches taken.
-d
--display-progress
Display the progress on the standard output.
-f
--function-summaries
Output summaries for each function in addition to the file level summary.
-h
--help Display help about using gcov (on the standard output), and exit without doing
any further processing.
-i
--intermediate-format
Output gcov file in an easy-to-parse intermediate text format that can be used
by lcov or other tools. The output is a single ‘.gcov’ file per ‘.gcda’ file. No
source code is required.
The format of the intermediate ‘.gcov’ file is plain text with one entry per line
file:source_file_name
function:line_number,execution_count,function_name
lcount:line number,execution_count
branch:line_number,branch_coverage_type
lcount:11,1
lcount:12,1
lcount:14,1
branch:14,taken
lcount:26,1
branch:28,nottaken
-l
--long-file-names
Create long file names for included source files. For example, if the header
file ‘x.h’ contains code, and was included in the file ‘a.c’, then running gcov
on the file ‘a.c’ will produce an output file called ‘a.c##x.h.gcov’ instead of
‘x.h.gcov’. This can be useful if ‘x.h’ is included in multiple source files and
you want to see the individual contributions. If you use the ‘-p’ option, both
the including and included file names will be complete path names.
-m
--demangled-names
Display demangled function names in output. The default is to show mangled
function names.
-n
--no-output
Do not create the gcov output file.
-o directory|file
--object-directory directory
--object-file file
Specify either the directory containing the gcov data files, or the object path
name. The ‘.gcno’, and ‘.gcda’ data files are searched for using this option. If
a directory is specified, the data files are in that directory and named after the
input file name, without its extension. If a file is specified here, the data files
are named after that file, without its extension.
-p
--preserve-paths
Preserve complete path information in the names of generated ‘.gcov’ files.
Without this option, just the filename component is used. With this option, all
directories are used, with ‘/’ characters translated to ‘#’ characters, ‘.’ directory
components removed and unremoveable ‘..’ components renamed to ‘^’. This
is useful if sourcefiles are in several different directories.
-r
--relative-only
Only output information about source files with a relative pathname (after
source prefix elision). Absolute paths are usually system header files and cov-
erage of any inline functions therein is normally uninteresting.
-s directory
--source-prefix directory
A prefix for source file names to remove when generating the output coverage
files. This option is useful when building in a separate directory, and the path-
774 Using the GNU Compiler Collection (GCC)
name to the source directory is not wanted when determining the output file
names. Note that this prefix detection is applied before determining whether
the source file is absolute.
-u
--unconditional-branches
When branch probabilities are given, include those of unconditional branches.
Unconditional branches are normally not interesting.
-v
--version
Display the gcov version number (on the standard output), and exit without
doing any further processing.
-w
--verbose
Print verbose informations related to basic blocks and arcs.
-x
--hash-filenames
By default, gcov uses the full pathname of the source files to to create an output
filename. This can lead to long filenames that can overflow filesystem limits.
This option creates names of the form ‘source-file##md5.gcov’, where the
source-file component is the final filename part and the md5 component is
calculated from the full mangled name that would have been used otherwise.
gcov should be run with the current directory the same as that when you invoked the
compiler. Otherwise it will not be able to locate the source files. gcov produces files called
‘mangledname.gcov’ in the current directory. These contain the coverage information of
the source file they correspond to. One ‘.gcov’ file is produced for each source (or header)
file containing code, which was compiled to produce the data files. The mangledname part
of the output file name is usually simply the source file name, but can be something more
complicated if the ‘-l’ or ‘-p’ options are given. Refer to those options for details.
If you invoke gcov with multiple input files, the contributions from each input file are
summed. Typically you would invoke it with the same list of files as the final link of your
executable.
The ‘.gcov’ files contain the ‘:’ separated fields along with program source code. The
format is
execution_count:line_number:source line text
Additional block information may succeed each line, when requested by command line
option. The execution count is ‘-’ for lines containing no code. Unexecuted lines are marked
‘#####’ or ‘=====’, depending on whether they are reachable by non-exceptional paths or
only exceptional paths such as C++ exception handlers, respectively. Given ‘-a’ option,
unexecuted blocks are marked ‘$$$$$’ or ‘%%%%%’, depending on whether a basic block is
reachable via non-exceptional or exceptional paths.
Note that GCC can completely remove the bodies of functions that are not needed – for
instance if they are inlined everywhere. Such functions are marked with ‘-’, which can be
confusing. Use the ‘-fkeep-inline-functions’ and ‘-fkeep-static-functions’ options
to retain these functions and allow gcov to properly show their execution count.
Chapter 10: gcov—a Test Coverage Program 775
Some lines of information at the start have line number of zero. These preamble lines
are of the form
-:0:tag:value
The ordering and number of these preamble lines will be augmented as gcov development
progresses — do not rely on them remaining unchanged. Use tag to locate a particular
preamble line.
The additional block information is of the form
tag information
The information is human readable, but designed to be simple enough for machine parsing
too.
When printing percentages, 0% and 100% are only printed when the values are exactly
0% and 100% respectively. Other values which would conventionally be rounded to 0% or
100% are instead printed as the nearest non-boundary value.
When using gcov, you must first compile your program with two special GCC options:
‘-fprofile-arcs -ftest-coverage’. This tells the compiler to generate additional infor-
mation needed by gcov (basically a flow graph of the program) and also includes additional
code in the object files for generating the extra profiling information needed by gcov. These
additional files are placed in the directory where the object file is located.
Running the program will cause profile output to be generated. For each source file
compiled with ‘-fprofile-arcs’, an accompanying ‘.gcda’ file will be placed in the object
file directory.
Running gcov with your program’s source file names as arguments will now produce a
listing of the code along with frequency of execution for each line. For example, if your
program is called ‘tmp.c’, this is what you see when you use the basic gcov facility:
$ gcc -fprofile-arcs -ftest-coverage tmp.c
$ a.out
$ gcov tmp.c
File ’tmp.c’
Lines executed:90.00% of 10
Creating ’tmp.c.gcov’
The file ‘tmp.c.gcov’ contains output from gcov. Here is a sample:
-: 0:Source:tmp.c
-: 0:Graph:tmp.gcno
-: 0:Data:tmp.gcda
-: 0:Runs:1
-: 0:Programs:1
-: 1:#include <stdio.h>
-: 2:
-: 3:int main (void)
1: 4:{
1: 5: int i, total;
-: 6:
1: 7: total = 0;
-: 8:
11: 9: for (i = 0; i < 10; i++)
10: 10: total += i;
-: 11:
1: 12: if (total != 45)
#####: 13: printf ("Failure\n");
-: 14: else
776 Using the GNU Compiler Collection (GCC)
-: 0:Data:tmp.gcda
-: 0:Runs:1
-: 0:Programs:1
-: 1:#include <stdio.h>
-: 2:
-: 3:int main (void)
function main called 1 returned 1 blocks executed 75%
1: 4:{
1: 5: int i, total;
-: 6:
1: 7: total = 0;
-: 8:
11: 9: for (i = 0; i < 10; i++)
branch 0 taken 91% (fallthrough)
branch 1 taken 9%
10: 10: total += i;
-: 11:
1: 12: if (total != 45)
branch 0 taken 0% (fallthrough)
branch 1 taken 100%
#####: 13: printf ("Failure\n");
call 0 never executed
-: 14: else
1: 15: printf ("Success\n");
call 0 called 1 returned 100%
1: 16: return 0;
-: 17:}
For each function, a line is printed showing how many times the function is called, how
many times it returns and what percentage of the function’s blocks were executed.
For each basic block, a line is printed after the last line of the basic block describing the
branch or call that ends the basic block. There can be multiple branches and calls listed for
a single source line if there are multiple basic blocks that end on that line. In this case, the
branches and calls are each given a number. There is no simple way to map these branches
and calls back to source constructs. In general, though, the lowest numbered branch or call
will correspond to the leftmost construct on the source line.
For a branch, if it was executed at least once, then a percentage indicating the number
of times the branch was taken divided by the number of times the branch was executed will
be printed. Otherwise, the message “never executed” is printed.
For a call, if it was executed at least once, then a percentage indicating the number of
times the call returned divided by the number of times the call was executed will be printed.
This will usually be 100%, but may be less for functions that call exit or longjmp, and
thus may not return every time they are called.
The execution counts are cumulative. If the example program were executed again with-
out removing the ‘.gcda’ file, the count for the number of times each line in the source was
executed would be added to the results of the previous run(s). This is potentially useful in
several ways. For example, it could be used to accumulate data over a number of program
runs as part of a test verification suite, or to provide more accurate long-term information
over a large number of program runs.
The data in the ‘.gcda’ files is saved immediately before the program exits. For each
source file compiled with ‘-fprofile-arcs’, the profiling code first attempts to read in an
existing ‘.gcda’ file; if the file doesn’t match the executable (differing number of basic block
778 Using the GNU Compiler Collection (GCC)
counts) it will ignore the contents of the file. It then adds in the new execution counts and
finally writes the data to the file.
__gcov_dump is executed after all user defined static destructors, as well as handlers regis-
tered with atexit. If an executable loads a dynamic shared object via dlopen functionality,
‘-Wl,--dynamic-list-data’ is needed to dump all profile data.
-o
--object Print object level overlap score.
-t float
--hot_threshold <float>
Set the threshold for hot counter value.
-v
--verbose
Set the verbose mode.
Chapter 12: gcov-dump—an Offline Gcda and Gcno Profile Dump Tool 785
13.2 Interoperation
This section lists various difficulties encountered in using GCC together with other compilers
or with the assemblers, linkers, libraries and debuggers on certain systems.
• On many platforms, GCC supports a different ABI for C++ than do other compilers, so
the object files compiled by GCC cannot be used with object files generated by another
C++ compiler.
An area where the difference is most apparent is name mangling. The use of different
name mangling is intentional, to protect you from more subtle problems. Compilers
differ as to many internal details of C++ implementation, including: how class instances
are laid out, how multiple inheritance is implemented, and how virtual function calls
are handled. If the name encoding were made the same, your programs would link
against libraries provided from other compilers—but the programs would then crash
when run. Incompatible libraries are then detected at link time, rather than at run
time.
• On some BSD systems, including some versions of Ultrix, use of profiling causes static
variable destructors (currently used only in C++) not to be run.
• On a SPARC, GCC aligns all values of type double on an 8-byte boundary, and it
expects every double to be so aligned. The Sun compiler usually gives double values
8-byte alignment, with one exception: function arguments of type double may not be
aligned.
As a result, if a function compiled with Sun CC takes the address of an argument
of type double and passes this pointer of type double * to a function compiled with
GCC, dereferencing the pointer may cause a fatal signal.
One way to solve this problem is to compile your entire program with GCC. Another
solution is to modify the function that is compiled with Sun CC to copy the argument
into a local variable; local variables are always properly aligned. A third solution is to
modify the function that uses the pointer to dereference it via the following function
access_double instead of directly with ‘*’:
788 Using the GNU Compiler Collection (GCC)
inline double
access_double (double *unaligned_ptr)
{
union d2i { double d; int i[2]; };
u.i[0] = p->i[0];
u.i[1] = p->i[1];
return u.d;
}
Storing into the pointer can be done likewise with the same union.
• On Solaris, the malloc function in the ‘libmalloc.a’ library may allocate memory
that is only 4 byte aligned. Since GCC on the SPARC assumes that doubles are 8 byte
aligned, this may result in a fatal signal if doubles are stored in memory allocated by
the ‘libmalloc.a’ library.
The solution is to not use the ‘libmalloc.a’ library. Use instead malloc and related
functions from ‘libc.a’; they do not have this problem.
• On the HP PA machine, ADB sometimes fails to work on functions compiled with
GCC. Specifically, it fails to work on functions that use alloca or variable-size arrays.
This is because GCC doesn’t generate HP-UX unwind descriptors for such functions.
It may even be impossible to generate them.
• Debugging (‘-g’) is not supported on the HP PA machine, unless you use the prelimi-
nary GNU tools.
• Taking the address of a label may generate errors from the HP-UX PA assembler. GAS
for the PA does not have this problem.
• Using floating point parameters for indirect calls to static functions will not work when
using the HP assembler. There simply is no way for GCC to specify what registers hold
arguments for static functions when using the HP assembler. GAS for the PA does not
have this problem.
• In extremely rare cases involving some very large functions you may receive errors from
the HP linker complaining about an out of bounds unconditional branch offset. This
used to occur more often in previous versions of GCC, but is now exceptionally rare.
If you should run into it, you can work around by making your function smaller.
• GCC compiled code sometimes emits warnings from the HP-UX assembler of the form:
(warning) Use of GR3 when
frame >= 8192 may cause conflict.
These warnings are harmless and can be safely ignored.
• In extremely rare cases involving some very large functions you may receive errors from
the AIX Assembler complaining about a displacement that is too large. If you should
run into it, you can work around by making your function smaller.
• The ‘libstdc++.a’ library in GCC relies on the SVR4 dynamic linker semantics which
merges global symbols between libraries and applications, especially necessary for C++
streams functionality. This is not the default behavior of AIX shared libraries and
dynamic linking. ‘libstdc++.a’ is built on AIX with “runtime-linking” enabled so
Chapter 13: Known Causes of Trouble with GCC 789
that symbol merging can occur. To utilize this feature, the application linked with
‘libstdc++.a’ must include the ‘-Wl,-brtl’ flag on the link line. G++ cannot impose
this because this option may interfere with the semantics of the user program and users
may not always use ‘g++’ to link his or her application. Applications are not required to
use the ‘-Wl,-brtl’ flag on the link line—the rest of the ‘libstdc++.a’ library which
is not dependent on the symbol merging semantics will continue to function correctly.
• An application can interpose its own definition of functions for functions invoked by
‘libstdc++.a’ with “runtime-linking” enabled on AIX. To accomplish this the appli-
cation must be linked with “runtime-linking” option and the functions explicitly must
be exported by the application (‘-Wl,-brtl,-bE:exportfile’).
• AIX on the RS/6000 provides support (NLS) for environments outside of the United
States. Compilers and assemblers use NLS to support locale-specific representations
of various objects including floating-point numbers (‘.’ vs ‘,’ for separating decimal
fractions). There have been problems reported where the library linked with GCC does
not produce the same floating-point formats that the assembler accepts. If you have
this problem, set the LANG environment variable to ‘C’ or ‘En_US’.
• Even if you specify ‘-fdollars-in-identifiers’, you cannot successfully use ‘$’ in
identifiers on the RS/6000 due to a restriction in the IBM assembler. GAS supports
these identifiers.
foo ()
{
int a, b;
a = fun1 ();
if (setjmp (j))
return a;
a = fun2 ();
/* longjmp (j) may occur in fun3. */
return a + fun3 ();
}
Here a may or may not be restored to its first value when the longjmp occurs. If a is
allocated in a register, then its first value is restored; otherwise, it keeps the last value
stored in it.
If you use the ‘-W’ option with the ‘-O’ option, you will get a warning when GCC thinks
such a problem might be possible.
• Programs that use preprocessing directives in the middle of macro arguments do not
work with GCC. For example, a program like this will not work:
foobar (
#define luser
hack)
ISO C does not permit such a construct.
• K&R compilers allow comments to cross over an inclusion boundary (i.e. started in an
include file and ended in the including file).
• Declarations of external variables and functions within a block apply only to the block
containing the declaration. In other words, they have the same scope as any other
declaration in the same place.
In some other C compilers, an extern declaration affects all the rest of the file even if
it happens within a block.
• In traditional C, you can combine long, etc., with a typedef name, as shown here:
typedef int foo;
typedef long foo bar;
In ISO C, this is not allowed: long and other type modifiers require an explicit int.
• PCC allows typedef names to be used as function parameters.
• Traditional C allows the following erroneous pair of declarations to appear together in
a given scope:
typedef int foo;
typedef foo foo;
• GCC treats all characters of identifiers as significant. According to K&R-1 (2.2), “No
more than the first eight characters are significant, although more may be used.”. Also
according to K&R-1 (2.2), “An identifier is a sequence of letters and digits; the first
character must be a letter. The underscore counts as a letter.”, but GCC also allows
dollar signs in identifiers.
• PCC allows whitespace in the middle of compound assignment operators such as ‘+=’.
GCC, following the ISO standard, does not allow this.
Chapter 13: Known Causes of Trouble with GCC 791
what is meant is an operator and two values, the ISO C standard specifically requires
that this be treated as erroneous.
A preprocessing token is a preprocessing number if it begins with a digit and is followed
by letters, underscores, digits, periods and ‘e+’, ‘e-’, ‘E+’, ‘E-’, ‘p+’, ‘p-’, ‘P+’, or ‘P-’
character sequences. (In strict C90 mode, the sequences ‘p+’, ‘p-’, ‘P+’ and ‘P-’ cannot
appear in preprocessing numbers.)
To make the above program fragment valid, place whitespace in front of the minus
sign. This whitespace will end the preprocessing number.
X/Open compatibility for GNU/Linux and HURD-based GNU systems; no recent version
of it supports other systems, though some very old versions did. Version 2.2 of the GNU
C library includes nearly complete C99 support. You could also ask your operating system
vendor if newer libraries are available.
• On 68000 and x86 systems, for instance, you can get paradoxical results if you test
the precise values of floating point numbers. For example, you can find that a floating
point value which is not a NaN is not equal to itself. This results from the fact that
the floating point registers hold a few more bits of precision than fit in a double in
memory. Compiled code moves values between memory and floating point registers at
its convenience, and moving them into memory truncates them.
You can partially avoid this problem by using the ‘-ffloat-store’ option (see
Section 3.10 [Optimize Options], page 106).
• On AIX and other platforms without weak symbol support, templates need to be in-
stantiated explicitly and symbols for static members of templates will not be generated.
• On AIX, GCC scans object files and library archives for static constructors and de-
structors when linking an application before the linker prunes unreferenced symbols.
This is necessary to prevent the AIX linker from mistakenly assuming that static con-
structor or destructor are unused and removing them before the scanning can occur.
All static constructors and destructors found will be referenced even though the mod-
ules in which they occur may not be used by the program. This may lead to both
increased executable size and unexpected symbol references.
This declaration only establishes that the class Foo has an int named Foo::bar, and a
member function named Foo::method. But you still need to define both method and bar
elsewhere. According to the ISO standard, you must supply an initializer in one (and only
one) source file, such as:
int Foo::bar = 0;
Other C++ compilers may not correctly implement the standard behavior. As a result,
when you switch to g++ from one of these compilers, you may discover that a program
that appeared to work correctly in fact does not conform to the standard: g++ reports as
undefined symbols any static data members that lack definitions.
Chapter 13: Known Causes of Trouble with GCC 795
struct A {
template <typename T>
void f () {
foo (1); // 1
int i = N; // 2
T t;
t.bar(); // 3
foo (t); // 4
}
access i in a dependent context, by either using this->i (remember that this is of type
Derived<T>*, so is obviously dependent), or using Base<T>::i. Alternatively, Base<T>::i
might be brought into scope by a using-declaration.
Another, similar example involves calling member functions of a base class:
template <typename T> struct Base {
int f();
};
void
f ()
{
const char *p = strfunc().c_str();
Chapter 13: Known Causes of Trouble with GCC 797
...
charfunc (p);
...
charfunc (p);
}
In this situation, it may seem reasonable to save a pointer to the C string returned by
the c_str member function and use that rather than call c_str repeatedly. However, the
temporary string created by the call to strfunc is destroyed after p is initialized, at which
point p is left pointing to freed memory.
Code like this may run successfully under some other compilers, particularly obsolete
cfront-based compilers that delete temporaries along with normal local variables. How-
ever, the GNU C++ behavior is standard-conforming, so if your program depends on late
destruction of temporaries it is not portable.
The safe way to write such code is to give the temporary a name, which forces it to
remain until the end of the scope of the name. For example:
const string& tmp = strfunc ();
charfunc (tmp.c_str ());
more than once when the implicit copy-assignment for Derived objects is invoked (as it is
inside ‘func’ in the example).
G++ implements the “intuitive” algorithm for copy-assignment: assign all direct bases,
then assign all members. In that algorithm, the virtual base subobject can be encountered
more than once. In the example, copying proceeds in the following order: ‘val’, ‘name’ (via
strdup), ‘bval’, and ‘name’ again.
If application code relies on copy-assignment, a user-defined copy-assignment operator
removes any uncertainties. With such an operator, the application can define whether and
how the virtual base subobject is assigned.
The GNU C compiler supports both dialects; you can specify the signed dialect with
‘-fsigned-bitfields’ and the unsigned dialect with ‘-funsigned-bitfields’. How-
ever, this leaves open the question of which dialect to use by default.
Currently, the preferred dialect makes plain bit-fields signed, because this is simplest.
Since int is the same as signed int in every other context, it is cleanest for them to
be the same in bit-fields as well.
Some computer manufacturers have published Application Binary Interface standards
which specify that plain bit-fields should be unsigned. It is a mistake, however, to say
anything about this issue in an ABI. This is because the handling of plain bit-fields
distinguishes two dialects of C. Both dialects are meaningful on every type of machine.
Whether a particular object file was compiled using signed bit-fields or unsigned is of
no concern to other object files, even if they access the same bit-fields in the same data
structures.
A given program is written in one or the other of these two dialects. The program
stands a chance to work on most any machine if it is compiled with the proper dialect.
It is unlikely to work at all if compiled with the wrong dialect.
Many users appreciate the GNU C compiler because it provides an environment that is
uniform across machines. These users would be inconvenienced if the compiler treated
plain bit-fields differently on certain machines.
Occasionally users write programs intended only for a particular machine type. On
these occasions, the users would benefit if the GNU C compiler were to support by
default the same dialect as the other compilers on that machine. But such applications
are rare. And users writing a program to run on more than one type of machine cannot
possibly benefit from this kind of compatibility.
This is why GCC does and will treat plain bit-fields in the same fashion on all types
of machines (by default).
There are some arguments for making bit-fields unsigned by default on all machines.
If, for example, this becomes a universal de facto standard, it would make sense for
GCC to go along with it. This is something to be considered in the future.
(Of course, users strongly concerned about portability should indicate explicitly in each
bit-field whether it is signed or not. In this way, they write programs which have the
same meaning in both C dialects.)
• Undefining __STDC__ when ‘-ansi’ is not used.
Currently, GCC defines __STDC__ unconditionally. This provides good results in prac-
tice.
Programmers normally use conditionals on __STDC__ to ask whether it is safe to use
certain features of ISO C, such as function prototypes or ISO token concatenation.
Since plain gcc supports all the features of ISO C, the correct answer to these questions
is “yes”.
Some users try to use __STDC__ to check for the availability of certain library facilities.
This is actually incorrect usage in an ISO C program, because the ISO C standard says
that a conforming freestanding implementation should define __STDC__ even though it
does not have the library facilities. ‘gcc -ansi -pedantic’ is a conforming freestanding
implementation, and it is therefore required to define __STDC__, even though it does
not come with an ISO C library.
800 Using the GNU Compiler Collection (GCC)
Sometimes people say that defining __STDC__ in a compiler that does not completely
conform to the ISO C standard somehow violates the standard. This is illogical. The
standard is a standard for compilers that claim to support ISO C, such as ‘gcc -ansi’—
not for other compilers such as plain gcc. Whatever the ISO C standard says is
relevant to the design of plain gcc without ‘-ansi’ only for pragmatic reasons, not as
a requirement.
GCC normally defines __STDC__ to be 1, and in addition defines __STRICT_ANSI__ if
you specify the ‘-ansi’ option, or a ‘-std’ option for strict conformance to some version
of ISO C. On some hosts, system include files use a different convention, where __STDC_
_ is normally 0, but is 1 if the user specifies strict conformance to the C Standard. GCC
follows the host convention when processing system include files, but when processing
user files it follows the usual GNU C convention.
• Undefining __STDC__ in C++.
Programs written to compile with C++-to-C translators get the value of __STDC__ that
goes with the C compiler that is subsequently used. These programs must test __STDC_
_ to determine what kind of C preprocessor that compiler uses: whether they should
concatenate tokens in the ISO C fashion or in the traditional fashion.
These programs work properly with GNU C++ if __STDC__ is defined. They would not
work otherwise.
In addition, many header files are written to provide prototypes in ISO C but not in
traditional C. Many of these header files can work without change in C++ provided
__STDC__ is defined. If __STDC__ is not defined, they will all fail, and will all need to
be changed to test explicitly for C++ as well.
• Deleting “empty” loops.
Historically, GCC has not deleted “empty” loops under the assumption that the most
likely reason you would put one in a program is to have a delay, so deleting them will
not make real programs run any faster.
However, the rationale here is that optimization of a nonempty loop cannot produce an
empty one. This held for carefully written C compiled with less powerful optimizers but
is not always the case for carefully written C++ or with more powerful optimizers. Thus
GCC will remove operations from loops whenever it can determine those operations
are not externally visible (apart from the time taken to execute them, of course). In
case the loop can be proved to be finite, GCC will also remove the loop itself.
Be aware of this when performing timing tests, for instance the following loop can be
completely removed, provided some_expression can provably not change any global
state.
{
int sum = 0;
int ix;
It is never safe to depend on the order of evaluation of side effects. For example, a
function call like this may very well behave differently from one compiler to another:
void func (int, int);
int i = 2;
func (i++, i++);
There is no guarantee (in either the C or the C++ standard language definitions) that the
increments will be evaluated in any particular order. Either increment might happen
first. func might get the arguments ‘2, 3’, or it might get ‘3, 2’, or even ‘2, 2’.
• Making certain warnings into errors by default.
Some ISO C testsuites report failure when the compiler does not produce an error
message for a certain program.
ISO C requires a “diagnostic” message for certain kinds of invalid programs, but a
warning is defined by GCC to count as a diagnostic. If GCC produces a warning but
not an error, that is correct ISO C support. If testsuites call this “failure”, they should
be run with the GCC option ‘-pedantic-errors’, which will turn these warnings into
errors.
14 Reporting Bugs
Your bug reports play an essential role in making GCC reliable.
When you encounter a problem, the first thing to do is to see if it is already known. See
Chapter 13 [Trouble], page 787. If it isn’t known, then you should report the problem.
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of
works.
The licenses for most software and other practical works are designed to take away your
freedom to share and change the works. By contrast, the GNU General Public License is
intended to guarantee your freedom to share and change all versions of a program–to make
sure it remains free software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to any other work
released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute copies
of free software (and charge for them if you wish), that you receive source code or can get
it if you want it, that you can change the software or use pieces of it in new free programs,
and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking
you to surrender the rights. Therefore, you have certain responsibilities if you distribute
copies of the software, or if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you
must pass on to the recipients the same freedoms that you received. You must make sure
that they, too, receive or can get the source code. And you must show them these terms so
they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright
on the software, and (2) offer you this License giving you legal permission to copy, distribute
and/or modify it.
For the developers’ and authors’ protection, the GPL clearly explains that there is no
warranty for this free software. For both users’ and authors’ sake, the GPL requires that
modified versions be marked as changed, so that their problems will not be attributed
erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the
software inside them, although the manufacturer can do so. This is fundamentally incom-
patible with the aim of protecting users’ freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to use, which is pre-
cisely where it is most unacceptable. Therefore, we have designed this version of the GPL
to prohibit the practice for those products. If such problems arise substantially in other
domains, we stand ready to extend this provision to those domains in future versions of the
GPL, as needed to protect the freedom of users.
814 Using the GNU Compiler Collection (GCC)
Finally, every program is threatened constantly by software patents. States should not
allow patents to restrict development and use of software on general-purpose computers, but
in those that do, we wish to avoid the special danger that patents applied to a free program
could make it effectively proprietary. To prevent this, the GPL assures that patents cannot
be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
The “System Libraries” of an executable work include anything, other than the work as
a whole, that (a) is included in the normal form of packaging a Major Component, but
which is not part of that Major Component, and (b) serves only to enable use of the
work with that Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A “Major Component”,
in this context, means a major essential component (kernel, window system, and so
on) of the specific operating system (if any) on which the executable work runs, or a
compiler used to produce the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code
needed to generate, install, and (for an executable work) run the object code and to
modify the work, including scripts to control those activities. However, it does not
include the work’s System Libraries, or general-purpose tools or generally available
free programs which are used unmodified in performing those activities but which are
not part of the work. For example, Corresponding Source includes interface definition
files associated with source files for the work, and the source code for shared libraries
and dynamically linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those subprograms
and other parts of the work.
The Corresponding Source need not include anything that users can regenerate auto-
matically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the
Program, and are irrevocable provided the stated conditions are met. This License ex-
plicitly affirms your unlimited permission to run the unmodified Program. The output
from running a covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your rights of fair use
or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without
conditions so long as your license otherwise remains in force. You may convey covered
works to others for the sole purpose of having them make modifications exclusively
for you, or provide you with facilities for running those works, provided that you
comply with the terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for you must do
so exclusively on your behalf, under your direction and control, on terms that prohibit
them from making any copies of your copyrighted material outside their relationship
with you.
Conveying under any other circumstances is permitted solely under the conditions
stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under
any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty
adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention
of such measures.
816 Using the GNU Compiler Collection (GCC)
When you convey a covered work, you waive any legal power to forbid circumvention of
technological measures to the extent such circumvention is effected by exercising rights
under this License with respect to the covered work, and you disclaim any intention
to limit operation or modification of the work as a means of enforcing, against the
work’s users, your or third parties’ legal rights to forbid circumvention of technological
measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program’s source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice; keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code; keep intact all
notices of the absence of any warranty; and give all recipients a copy of this License
along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer
support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from
the Program, in the form of source code under the terms of section 4, provided that
you also meet all of these conditions:
a. The work must carry prominent notices stating that you modified it, and giving a
relevant date.
b. The work must carry prominent notices stating that it is released under this Li-
cense and any conditions added under section 7. This requirement modifies the
requirement in section 4 to “keep intact all notices”.
c. You must license the entire work, as a whole, under this License to anyone who
comes into possession of a copy. This License will therefore apply, along with any
applicable section 7 additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no permission to license
the work in any other way, but it does not invalidate such permission if you have
separately received it.
d. If the work has interactive user interfaces, each must display Appropriate Legal
Notices; however, if the Program has interactive interfaces that do not display
Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which
are not by their nature extensions of the covered work, and which are not combined
with it such as to form a larger program, in or on a volume of a storage or distribution
medium, is called an “aggregate” if the compilation and its resulting copyright are
not used to limit the access or legal rights of the compilation’s users beyond what the
individual works permit. Inclusion of a covered work in an aggregate does not cause
this License to apply to the other parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and
5, provided that you also convey the machine-readable Corresponding Source under
the terms of this License, in one of these ways:
GNU General Public License 817
a. Convey the object code in, or embodied in, a physical product (including a phys-
ical distribution medium), accompanied by the Corresponding Source fixed on a
durable physical medium customarily used for software interchange.
b. Convey the object code in, or embodied in, a physical product (including a physi-
cal distribution medium), accompanied by a written offer, valid for at least three
years and valid for as long as you offer spare parts or customer support for that
product model, to give anyone who possesses the object code either (1) a copy of
the Corresponding Source for all the software in the product that is covered by this
License, on a durable physical medium customarily used for software interchange,
for a price no more than your reasonable cost of physically performing this con-
veying of source, or (2) access to copy the Corresponding Source from a network
server at no charge.
c. Convey individual copies of the object code with a copy of the written offer to
provide the Corresponding Source. This alternative is allowed only occasionally
and noncommercially, and only if you received the object code with such an offer,
in accord with subsection 6b.
d. Convey the object code by offering access from a designated place (gratis or for
a charge), and offer equivalent access to the Corresponding Source in the same
way through the same place at no further charge. You need not require recipients
to copy the Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source may be on
a different server (operated by you or a third party) that supports equivalent
copying facilities, provided you maintain clear directions next to the object code
saying where to find the Corresponding Source. Regardless of what server hosts
the Corresponding Source, you remain obligated to ensure that it is available for
as long as needed to satisfy these requirements.
e. Convey the object code using peer-to-peer transmission, provided you inform other
peers where the object code and Corresponding Source of the work are being offered
to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Cor-
responding Source as a System Library, need not be included in conveying the object
code work.
A “User Product” is either (1) a “consumer product”, which means any tangible per-
sonal property which is normally used for personal, family, or household purposes, or
(2) anything designed or sold for incorporation into a dwelling. In determining whether
a product is a consumer product, doubtful cases shall be resolved in favor of coverage.
For a particular product received by a particular user, “normally used” refers to a
typical or common use of that class of product, regardless of the status of the par-
ticular user or of the way in which the particular user actually uses, or expects or is
expected to use, the product. A product is a consumer product regardless of whether
the product has substantial commercial, industrial or non-consumer uses, unless such
uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, autho-
rization keys, or other information required to install and execute modified versions of a
covered work in that User Product from a modified version of its Corresponding Source.
818 Using the GNU Compiler Collection (GCC)
The information must suffice to ensure that the continued functioning of the modified
object code is in no case prevented or interfered with solely because modification has
been made.
If you convey an object code work under this section in, or with, or specifically for
use in, a User Product, and the conveying occurs as part of a transaction in which
the right of possession and use of the User Product is transferred to the recipient in
perpetuity or for a fixed term (regardless of how the transaction is characterized),
the Corresponding Source conveyed under this section must be accompanied by the
Installation Information. But this requirement does not apply if neither you nor any
third party retains the ability to install modified object code on the User Product (for
example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement
to continue to provide support service, warranty, or updates for a work that has been
modified or installed by the recipient, or for the User Product in which it has been
modified or installed. Access to a network may be denied when the modification itself
materially and adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with
this section must be in a format that is publicly documented (and with an implementa-
tion available to the public in source code form), and must require no special password
or key for unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by mak-
ing exceptions from one or more of its conditions. Additional permissions that are
applicable to the entire Program shall be treated as though they were included in this
License, to the extent that they are valid under applicable law. If additional permis-
sions apply only to part of the Program, that part may be used separately under those
permissions, but the entire Program remains governed by this License without regard
to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any
additional permissions from that copy, or from any part of it. (Additional permissions
may be written to require their own removal in certain cases when you modify the
work.) You may place additional permissions on material, added by you to a covered
work, for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered
work, you may (if authorized by the copyright holders of that material) supplement
the terms of this License with terms:
a. Disclaiming warranty or limiting liability differently from the terms of sections 15
and 16 of this License; or
b. Requiring preservation of specified reasonable legal notices or author attributions
in that material or in the Appropriate Legal Notices displayed by works containing
it; or
c. Prohibiting misrepresentation of the origin of that material, or requiring that mod-
ified versions of such material be marked in reasonable ways as different from the
original version; or
GNU General Public License 819
d. Limiting the use for publicity purposes of names of licensors or authors of the
material; or
e. Declining to grant rights under trademark law for use of some trade names, trade-
marks, or service marks; or
f. Requiring indemnification of licensors and authors of that material by anyone who
conveys the material (or modified versions of it) with contractual assumptions
of liability to the recipient, for any liability that these contractual assumptions
directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within
the meaning of section 10. If the Program as you received it, or any part of it, con-
tains a notice stating that it is governed by this License along with a term that is a
further restriction, you may remove that term. If a license document contains a further
restriction but permits relicensing or conveying under this License, you may add to a
covered work material governed by the terms of that license document, provided that
the further restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the
relevant source files, a statement of the additional terms that apply to those files, or a
notice indicating where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a sep-
arately written license, or stated as exceptions; the above requirements apply either
way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided un-
der this License. Any attempt otherwise to propagate or modify it is void, and will
automatically terminate your rights under this License (including any patent licenses
granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular
copyright holder is reinstated (a) provisionally, unless and until the copyright holder
explicitly and finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means prior to 60 days
after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if
the copyright holder notifies you of the violation by some reasonable means, this is the
first time you have received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after your receipt of the
notice.
Termination of your rights under this section does not terminate the licenses of parties
who have received copies or rights from you under this License. If your rights have
been terminated and not permanently reinstated, you do not qualify to receive new
licenses for the same material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the
Program. Ancillary propagation of a covered work occurring solely as a consequence of
using peer-to-peer transmission to receive a copy likewise does not require acceptance.
820 Using the GNU Compiler Collection (GCC)
However, nothing other than this License grants you permission to propagate or modify
any covered work. These actions infringe copyright if you do not accept this License.
Therefore, by modifying or propagating a covered work, you indicate your acceptance
of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license
from the original licensors, to run, modify and propagate that work, subject to this
License. You are not responsible for enforcing compliance by third parties with this
License.
An “entity transaction” is a transaction transferring control of an organization, or
substantially all assets of one, or subdividing an organization, or merging organizations.
If propagation of a covered work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever licenses to the work
the party’s predecessor in interest had or could give under the previous paragraph, plus
a right to possession of the Corresponding Source of the work from the predecessor in
interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or
affirmed under this License. For example, you may not impose a license fee, royalty, or
other charge for exercise of rights granted under this License, and you may not initiate
litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent
claim is infringed by making, using, selling, offering for sale, or importing the Program
or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the
Program or a work on which the Program is based. The work thus licensed is called
the contributor’s “contributor version”.
A contributor’s “essential patent claims” are all patent claims owned or controlled by
the contributor, whether already acquired or hereafter acquired, that would be infringed
by some manner, permitted by this License, of making, using, or selling its contributor
version, but do not include claims that would be infringed only as a consequence of
further modification of the contributor version. For purposes of this definition, “con-
trol” includes the right to grant patent sublicenses in a manner consistent with the
requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license
under the contributor’s essential patent claims, to make, use, sell, offer for sale, import
and otherwise run, modify and propagate the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or com-
mitment, however denominated, not to enforce a patent (such as an express permission
to practice a patent or covenant not to sue for patent infringement). To “grant” such
a patent license to a party means to make such an agreement or commitment not to
enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corre-
sponding Source of the work is not available for anyone to copy, free of charge and under
the terms of this License, through a publicly available network server or other readily
accessible means, then you must either (1) cause the Corresponding Source to be so
GNU General Public License 821
available, or (2) arrange to deprive yourself of the benefit of the patent license for this
particular work, or (3) arrange, in a manner consistent with the requirements of this
License, to extend the patent license to downstream recipients. “Knowingly relying”
means you have actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient’s use of the covered work in a country,
would infringe one or more identifiable patents in that country that you have reason
to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey,
or propagate by procuring conveyance of, a covered work, and grant a patent license
to some of the parties receiving the covered work authorizing them to use, propagate,
modify or convey a specific copy of the covered work, then the patent license you grant
is automatically extended to all recipients of the covered work and works based on it.
A patent license is “discriminatory” if it does not include within the scope of its cover-
age, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the
rights that are specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is in the business of
distributing software, under which you make payment to the third party based on the
extent of your activity of conveying the work, and under which the third party grants,
to any of the parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work conveyed by you (or
copies made from those copies), or (b) primarily for and in connection with specific
products or compilations that contain the covered work, unless you entered into that
arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or
other defenses to infringement that may otherwise be available to you under applicable
patent law.
12. No Surrender of Others’ Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that
contradict the conditions of this License, they do not excuse you from the conditions
of this License. If you cannot convey a covered work so as to satisfy simultaneously
your obligations under this License and any other pertinent obligations, then as a
consequence you may not convey it at all. For example, if you agree to terms that
obligate you to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this License would
be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or
combine any covered work with a work licensed under version 3 of the GNU Affero
General Public License into a single combined work, and to convey the resulting work.
The terms of this License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License, section 13,
concerning interaction through a network will apply to the combination as such.
14. Revised Versions of this License.
822 Using the GNU Compiler Collection (GCC)
The Free Software Foundation may publish revised and/or new versions of the GNU
General Public License from time to time. Such new versions will be similar in spirit
to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that
a certain numbered version of the GNU General Public License “or any later version”
applies to it, you have the option of following the terms and conditions either of that
numbered version or of any later version published by the Free Software Foundation.
If the Program does not specify a version number of the GNU General Public License,
you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU
General Public License can be used, that proxy’s public statement of acceptance of a
version permanently authorizes you to choose that version for the Program.
Later license versions may give you additional or different permissions. However, no
additional obligations are imposed on any author or copyright holder as a result of your
choosing to follow a later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PER-
MITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE
THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EX-
PRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFEC-
TIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO
MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, IN-
CIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUS-
TAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR
OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given
local legal effect according to their terms, reviewing courts shall apply local law that
most closely approximates an absolute waiver of all civil liability in connection with
the Program, unless a warranty or assumption of liability accompanies a copy of the
Program in return for a fee.
GNU General Public License 823
You should have received a copy of the GNU General Public License
along with this program. If not, see http://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it
starts in an interactive mode:
program Copyright (C) year name of author
This program comes with ABSOLUTELY NO WARRANTY; for details type ‘show w’.
This is free software, and you are welcome to redistribute it
under certain conditions; type ‘show c’ for details.
The hypothetical commands ‘show w’ and ‘show c’ should show the appropriate parts of
the General Public License. Of course, your program’s commands might be different; for a
GUI interface, you would use an “about box”.
You should also get your employer (if you work as a programmer) or school, if any, to
sign a “copyright disclaimer” for the program, if necessary. For more information on this,
and how to apply and follow the GNU GPL, see http://www.gnu.org/licenses/.
The GNU General Public License does not permit incorporating your program into pro-
prietary programs. If your program is a subroutine library, you may consider it more useful
to permit linking proprietary applications with the library. If this is what you want to do,
use the GNU Lesser General Public License instead of this License. But first, please read
http://www.gnu.org/philosophy/why-not-lgpl.html.
GNU Free Documentation License 825
under this License. If a section does not fit the above definition of Secondary then it is
not allowed to be designated as Invariant. The Document may contain zero Invariant
Sections. If the Document does not identify any Invariant Sections then there are none.
The “Cover Texts” are certain short passages of text that are listed, as Front-Cover
Texts or Back-Cover Texts, in the notice that says that the Document is released under
this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may
be at most 25 words.
A “Transparent” copy of the Document means a machine-readable copy, represented
in a format whose specification is available to the general public, that is suitable for
revising the document straightforwardly with generic text editors or (for images com-
posed of pixels) generic paint programs or (for drawings) some widely available drawing
editor, and that is suitable for input to text formatters or for automatic translation to
a variety of formats suitable for input to text formatters. A copy made in an otherwise
Transparent file format whose markup, or absence of markup, has been arranged to
thwart or discourage subsequent modification by readers is not Transparent. An image
format is not Transparent if used for any substantial amount of text. A copy that is
not “Transparent” is called “Opaque”.
Examples of suitable formats for Transparent copies include plain ascii without
markup, Texinfo input format, LaTEX input format, SGML or XML using a publicly
available DTD, and standard-conforming simple HTML, PostScript or PDF designed
for human modification. Examples of transparent image formats include PNG, XCF
and JPG. Opaque formats include proprietary formats that can be read and edited
only by proprietary word processors, SGML or XML for which the DTD and/or
processing tools are not generally available, and the machine-generated HTML,
PostScript or PDF produced by some word processors for output purposes only.
The “Title Page” means, for a printed book, the title page itself, plus such following
pages as are needed to hold, legibly, the material this License requires to appear in the
title page. For works in formats which do not have any title page as such, “Title Page”
means the text near the most prominent appearance of the work’s title, preceding the
beginning of the body of the text.
The “publisher” means any person or entity that distributes copies of the Document
to the public.
A section “Entitled XYZ” means a named subunit of the Document whose title either
is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in
another language. (Here XYZ stands for a specific section name mentioned below, such
as “Acknowledgements”, “Dedications”, “Endorsements”, or “History”.) To “Preserve
the Title” of such a section when you modify the Document means that it remains a
section “Entitled XYZ” according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that
this License applies to the Document. These Warranty Disclaimers are considered to
be included by reference in this License, but only as regards disclaiming warranties:
any other implication that these Warranty Disclaimers may have is void and has no
effect on the meaning of this License.
2. VERBATIM COPYING
GNU Free Documentation License 827
You may copy and distribute the Document in any medium, either commercially or
noncommercially, provided that this License, the copyright notices, and the license
notice saying this License applies to the Document are reproduced in all copies, and
that you add no other conditions whatsoever to those of this License. You may not use
technical measures to obstruct or control the reading or further copying of the copies
you make or distribute. However, you may accept compensation in exchange for copies.
If you distribute a large enough number of copies you must also follow the conditions
in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly
display copies.
3. COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of
the Document, numbering more than 100, and the Document’s license notice requires
Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all
these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on
the back cover. Both covers must also clearly and legibly identify you as the publisher
of these copies. The front cover must present the full title with all words of the title
equally prominent and visible. You may add other material on the covers in addition.
Copying with changes limited to the covers, as long as they preserve the title of the
Document and satisfy these conditions, can be treated as verbatim copying in other
respects.
If the required texts for either cover are too voluminous to fit legibly, you should put
the first ones listed (as many as fit reasonably) on the actual cover, and continue the
rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100,
you must either include a machine-readable Transparent copy along with each Opaque
copy, or state in or with each Opaque copy a computer-network location from which
the general network-using public has access to download using public-standard network
protocols a complete Transparent copy of the Document, free of added material. If
you use the latter option, you must take reasonably prudent steps, when you begin
distribution of Opaque copies in quantity, to ensure that this Transparent copy will
remain thus accessible at the stated location until at least one year after the last time
you distribute an Opaque copy (directly or through your agents or retailers) of that
edition to the public.
It is requested, but not required, that you contact the authors of the Document well
before redistributing any large number of copies, to give them a chance to provide you
with an updated version of the Document.
4. MODIFICATIONS
You may copy and distribute a Modified Version of the Document under the conditions
of sections 2 and 3 above, provided that you release the Modified Version under precisely
this License, with the Modified Version filling the role of the Document, thus licensing
distribution and modification of the Modified Version to whoever possesses a copy of
it. In addition, you must do these things in the Modified Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the
Document, and from those of previous versions (which should, if there were any,
828 Using the GNU Compiler Collection (GCC)
be listed in the History section of the Document). You may use the same title as
a previous version if the original publisher of that version gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for
authorship of the modifications in the Modified Version, together with at least five
of the principal authors of the Document (all of its principal authors, if it has fewer
than five), unless they release you from this requirement.
C. State on the Title page the name of the publisher of the Modified Version, as the
publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the other
copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the public
permission to use the Modified Version under the terms of this License, in the form
shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover
Texts given in the Document’s license notice.
H. Include an unaltered copy of this License.
I. Preserve the section Entitled “History”, Preserve its Title, and add to it an item
stating at least the title, year, new authors, and publisher of the Modified Version
as given on the Title Page. If there is no section Entitled “History” in the Docu-
ment, create one stating the title, year, authors, and publisher of the Document
as given on its Title Page, then add an item describing the Modified Version as
stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to
a Transparent copy of the Document, and likewise the network locations given in
the Document for previous versions it was based on. These may be placed in the
“History” section. You may omit a network location for a work that was published
at least four years before the Document itself, or if the original publisher of the
version it refers to gives permission.
K. For any section Entitled “Acknowledgements” or “Dedications”, Preserve the Title
of the section, and preserve in the section all the substance and tone of each of the
contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and
in their titles. Section numbers or the equivalent are not considered part of the
section titles.
M. Delete any section Entitled “Endorsements”. Such a section may not be included
in the Modified Version.
N. Do not retitle any existing section to be Entitled “Endorsements” or to conflict in
title with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify
as Secondary Sections and contain no material copied from the Document, you may at
your option designate some or all of these sections as invariant. To do this, add their
GNU Free Documentation License 829
titles to the list of Invariant Sections in the Modified Version’s license notice. These
titles must be distinct from any other section titles.
You may add a section Entitled “Endorsements”, provided it contains nothing but
endorsements of your Modified Version by various parties—for example, statements of
peer review or that the text has been approved by an organization as the authoritative
definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up
to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified
Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be
added by (or through arrangements made by) any one entity. If the Document already
includes a cover text for the same cover, previously added by you or by arrangement
made by the same entity you are acting on behalf of, you may not add another; but
you may replace the old one, on explicit permission from the previous publisher that
added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission
to use their names for publicity for or to assert or imply endorsement of any Modified
Version.
5. COMBINING DOCUMENTS
You may combine the Document with other documents released under this License,
under the terms defined in section 4 above for modified versions, provided that you
include in the combination all of the Invariant Sections of all of the original documents,
unmodified, and list them all as Invariant Sections of your combined work in its license
notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical
Invariant Sections may be replaced with a single copy. If there are multiple Invariant
Sections with the same name but different contents, make the title of each such section
unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment
to the section titles in the list of Invariant Sections in the license notice of the combined
work.
In the combination, you must combine any sections Entitled “History” in the vari-
ous original documents, forming one section Entitled “History”; likewise combine any
sections Entitled “Acknowledgements”, and any sections Entitled “Dedications”. You
must delete all sections Entitled “Endorsements.”
6. COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released
under this License, and replace the individual copies of this License in the various
documents with a single copy that is included in the collection, provided that you
follow the rules of this License for verbatim copying of each of the documents in all
other respects.
You may extract a single document from such a collection, and distribute it individu-
ally under this License, provided you insert a copy of this License into the extracted
document, and follow this License in all other respects regarding verbatim copying of
that document.
830 Using the GNU Compiler Collection (GCC)
Contributors to GCC
The GCC project would like to thank its many contributors. Without them the project
would not have been nearly as successful as it has been. Any omissions in this list are
accidental. Feel free to contact [email protected] or [email protected] if you have been
left out or some of your contributions are not listed. Please keep this list in alphabetical
order.
• Analog Devices helped implement the support for complex data types and iterators.
• John David Anglin for threading-related fixes and improvements to libstdc++-v3, and
the HP-UX port.
• James van Artsdalen wrote the code that makes efficient use of the Intel 80387 register
stack.
• Abramo and Roberto Bagnara for the SysV68 Motorola 3300 Delta Series port.
• Alasdair Baird for various bug fixes.
• Giovanni Bajo for analyzing lots of complicated C++ problem reports.
• Peter Barada for his work to improve code generation for new ColdFire cores.
• Gerald Baumgartner added the signature extension to the C++ front end.
• Godmar Back for his Java improvements and encouragement.
• Scott Bambrough for help porting the Java compiler.
• Wolfgang Bangerth for processing tons of bug reports.
• Jon Beniston for his Microsoft Windows port of Java and port to Lattice Mico32.
• Daniel Berlin for better DWARF 2 support, faster/better optimizations, improved alias
analysis, plus migrating GCC to Bugzilla.
• Geoff Berry for his Java object serialization work and various patches.
• David Binderman tests weekly snapshots of GCC trunk against Fedora Rawhide for
several architectures.
• Laurynas Biveinis for memory management work and DJGPP port fixes.
• Uros Bizjak for the implementation of x87 math built-in functions and for various
middle end and i386 back end improvements and bug fixes.
• Eric Blake for helping to make GCJ and libgcj conform to the specifications.
• Janne Blomqvist for contributions to GNU Fortran.
• Hans-J. Boehm for his garbage collector, IA-64 libffi port, and other Java work.
• Segher Boessenkool for helping maintain the PowerPC port and the instruction com-
biner plus various contributions to the middle end.
• Neil Booth for work on cpplib, lang hooks, debug hooks and other miscellaneous clean-
ups.
• Steven Bosscher for integrating the GNU Fortran front end into GCC and for con-
tributing to the tree-ssa branch.
• Eric Botcazou for fixing middle- and backend bugs left and right.
• Per Bothner for his direction via the steering committee and various improvements
to the infrastructure for supporting new languages. Chill front end implementation.
834 Using the GNU Compiler Collection (GCC)
Initial implementations of cpplib, fix-header, config.guess, libio, and past C++ library
(libg++) maintainer. Dreaming up, designing and implementing much of GCJ.
• Devon Bowen helped port GCC to the Tahoe.
• Don Bowman for mips-vxworks contributions.
• James Bowman for the FT32 port.
• Dave Brolley for work on cpplib and Chill.
• Paul Brook for work on the ARM architecture and maintaining GNU Fortran.
• Robert Brown implemented the support for Encore 32000 systems.
• Christian Bruel for improvements to local store elimination.
• Herman A.J. ten Brugge for various fixes.
• Joerg Brunsmann for Java compiler hacking and help with the GCJ FAQ.
• Joe Buck for his direction via the steering committee from its creation to 2013.
• Craig Burley for leadership of the G77 Fortran effort.
• Tobias Burnus for contributions to GNU Fortran.
• Stephan Buys for contributing Doxygen notes for libstdc++.
• Paolo Carlini for libstdc++ work: lots of efficiency improvements to the C++ strings,
streambufs and formatted I/O, hard detective work on the frustrating localization
issues, and keeping up with the problem reports.
• John Carr for his alias work, SPARC hacking, infrastructure improvements, previous
contributions to the steering committee, loop optimizations, etc.
• Stephane Carrez for 68HC11 and 68HC12 ports.
• Steve Chamberlain for support for the Renesas SH and H8 processors and the PicoJava
processor, and for GCJ config fixes.
• Glenn Chambers for help with the GCJ FAQ.
• John-Marc Chandonia for various libgcj patches.
• Denis Chertykov for contributing and maintaining the AVR port, the first GCC port
for an 8-bit architecture.
• Kito Cheng for his work on the RISC-V port, including bringing up the test suite and
maintenance.
• Scott Christley for his Objective-C contributions.
• Eric Christopher for his Java porting help and clean-ups.
• Branko Cibej for more warning contributions.
• The GNU Classpath project for all of their merged runtime code.
• Nick Clifton for arm, mcore, fr30, v850, m32r, msp430 rx work, ‘--help’, and other
random hacking.
• Michael Cook for libstdc++ cleanup patches to reduce warnings.
• R. Kelley Cook for making GCC buildable from a read-only directory as well as other
miscellaneous build process and documentation clean-ups.
• Ralf Corsepius for SH testing and minor bug fixing.
• François-Xavier Coudert for contributions to GNU Fortran.
Contributors to GCC 835
• Stan Cox for care and feeding of the x86 port and lots of behind the scenes hacking.
• Alex Crain provided changes for the 3b1.
• Ian Dall for major improvements to the NS32k port.
• Paul Dale for his work to add uClinux platform support to the m68k backend.
• Palmer Dabbelt for his work maintaining the RISC-V port.
• Dario Dariol contributed the four varieties of sample programs that print a copy of
their source.
• Russell Davidson for fstream and stringstream fixes in libstdc++.
• Bud Davis for work on the G77 and GNU Fortran compilers.
• Mo DeJong for GCJ and libgcj bug fixes.
• Jerry DeLisle for contributions to GNU Fortran.
• DJ Delorie for the DJGPP port, build and libiberty maintenance, various bug fixes,
and the M32C, MeP, MSP430, and RL78 ports.
• Arnaud Desitter for helping to debug GNU Fortran.
• Gabriel Dos Reis for contributions to G++, contributions and maintenance of GCC
diagnostics infrastructure, libstdc++-v3, including valarray<>, complex<>, maintain-
ing the numerics library (including that pesky <limits> :-) and keeping up-to-date
anything to do with numbers.
• Ulrich Drepper for his work on glibc, testing of GCC using glibc, ISO C99 support,
CFG dumping support, etc., plus support of the C++ runtime libraries including for all
kinds of C interface issues, contributing and maintaining complex<>, sanity checking
and disbursement, configuration architecture, libio maintenance, and early math work.
• François Dumont for his work on libstdc++-v3, especially maintaining and improving
debug-mode and associative and unordered containers.
• Zdenek Dvorak for a new loop unroller and various fixes.
• Michael Eager for his work on the Xilinx MicroBlaze port.
• Richard Earnshaw for his ongoing work with the ARM.
• David Edelsohn for his direction via the steering committee, ongoing work with the
RS6000/PowerPC port, help cleaning up Haifa loop changes, doing the entire AIX
port of libstdc++ with his bare hands, and for ensuring GCC properly keeps working
on AIX.
• Kevin Ediger for the floating point formatting of num put::do put in libstdc++.
• Phil Edwards for libstdc++ work including configuration hackery, documentation main-
tainer, chief breaker of the web pages, the occasional iostream bug fix, and work on
shared library symbol versioning.
• Paul Eggert for random hacking all over GCC.
• Mark Elbrecht for various DJGPP improvements, and for libstdc++ configuration sup-
port for locales and fstream-related fixes.
• Vadim Egorov for libstdc++ fixes in strings, streambufs, and iostreams.
• Christian Ehrhardt for dealing with bug reports.
• Ben Elliston for his work to move the Objective-C runtime into its own subdirectory
and for his work on autoconf.
836 Using the GNU Compiler Collection (GCC)
• Nobuyuki Hikichi of Software Research Associates, Tokyo, contributed the support for
the Sony NEWS machine.
• Kazu Hirata for caring and feeding the Renesas H8/300 port and various fixes.
• Katherine Holcomb for work on GNU Fortran.
• Manfred Hollstein for his ongoing work to keep the m88k alive, lots of testing and bug
fixing, particularly of GCC configury code.
• Steve Holmgren for MachTen patches.
• Mat Hostetter for work on the TILE-Gx and TILEPro ports.
• Jan Hubicka for his x86 port improvements.
• Falk Hueffner for working on C and optimization bug reports.
• Bernardo Innocenti for his m68k work, including merging of ColdFire improvements
and uClinux support.
• Christian Iseli for various bug fixes.
• Kamil Iskra for general m68k hacking.
• Lee Iverson for random fixes and MIPS testing.
• Balaji V. Iyer for Cilk+ development and merging.
• Andreas Jaeger for testing and benchmarking of GCC and various bug fixes.
• Martin Jambor for his work on inter-procedural optimizations, the switch conversion
pass, and scalar replacement of aggregates.
• Jakub Jelinek for his SPARC work and sibling call optimizations as well as lots of bug
fixes and test cases, and for improving the Java build system.
• Janis Johnson for ia64 testing and fixes, her quality improvement sidetracks, and web
page maintenance.
• Kean Johnston for SCO OpenServer support and various fixes.
• Tim Josling for the sample language treelang based originally on Richard Kenner’s
“toy” language.
• Nicolai Josuttis for additional libstdc++ documentation.
• Klaus Kaempf for his ongoing work to make alpha-vms a viable target.
• Steven G. Kargl for work on GNU Fortran.
• David Kashtan of SRI adapted GCC to VMS.
• Ryszard Kabatek for many, many libstdc++ bug fixes and optimizations of strings,
especially member functions, and for auto ptr fixes.
• Geoffrey Keating for his ongoing work to make the PPC work for GNU/Linux and his
automatic regression tester.
• Brendan Kehoe for his ongoing work with G++ and for a lot of early work in just about
every part of libstdc++.
• Oliver M. Kellogg of Deutsche Aerospace contributed the port to the MIL-STD-1750A.
• Richard Kenner of the New York University Ultracomputer Research Laboratory wrote
the machine descriptions for the AMD 29000, the DEC Alpha, the IBM RT PC, and
the IBM RS/6000 as well as the support for instruction attributes. He also made
changes to better support RISC processors including changes to common subexpression
838 Using the GNU Compiler Collection (GCC)
elimination, strength reduction, function calling sequence handling, and condition code
support, in addition to generalizing the code for frame pointer elimination and delay
slot scheduling. Richard Kenner was also the head maintainer of GCC for several years.
• Mumit Khan for various contributions to the Cygwin and Mingw32 ports and main-
taining binary releases for Microsoft Windows hosts, and for massive libstdc++ porting
work to Cygwin/Mingw32.
• Robin Kirkham for cpu32 support.
• Mark Klein for PA improvements.
• Thomas Koenig for various bug fixes.
• Bruce Korb for the new and improved fixincludes code.
• Benjamin Kosnik for his G++ work and for leading the libstdc++-v3 effort.
• Maxim Kuvyrkov for contributions to the instruction scheduler, the Android and
m68k/Coldfire ports, and optimizations.
• Charles LaBrec contributed the support for the Integrated Solutions 68020 system.
• Asher Langton and Mike Kumbera for contributing Cray pointer support to GNU
Fortran, and for other GNU Fortran improvements.
• Jeff Law for his direction via the steering committee, coordinating the entire egcs
project and GCC 2.95, rolling out snapshots and releases, handling merges from GCC2,
reviewing tons of patches that might have fallen through the cracks else, and random
but extensive hacking.
• Walter Lee for work on the TILE-Gx and TILEPro ports.
• Marc Lehmann for his direction via the steering committee and helping with analysis
and improvements of x86 performance.
• Victor Leikehman for work on GNU Fortran.
• Ted Lemon wrote parts of the RTL reader and printer.
• Kriang Lerdsuwanakij for C++ improvements including template as template parameter
support, and many C++ fixes.
• Warren Levy for tremendous work on libgcj (Java Runtime Library) and random work
on the Java front end.
• Alain Lichnewsky ported GCC to the MIPS CPU.
• Oskar Liljeblad for hacking on AWT and his many Java bug reports and patches.
• Robert Lipe for OpenServer support, new testsuites, testing, etc.
• Chen Liqin for various S+core related fixes/improvement, and for maintaining the
S+core port.
• Weiwen Liu for testing and various bug fixes.
• Manuel López-Ibá~
nez for improving ‘-Wconversion’ and many other diagnostics fixes
and improvements.
• Dave Love for his ongoing work with the Fortran front end and runtime libraries.
• Martin von Löwis for internal consistency checking infrastructure, various C++ improve-
ments including namespace support, and tons of assistance with libstdc++/compiler
merges.
Contributors to GCC 839
• H.J. Lu for his previous contributions to the steering committee, many x86 bug reports,
prototype patches, and keeping the GNU/Linux ports working.
• Greg McGary for random fixes and (someday) bounded pointers.
• Andrew MacLeod for his ongoing work in building a real EH system, various code
generation improvements, work on the global optimizer, etc.
• Vladimir Makarov for hacking some ugly i960 problems, PowerPC hacking improve-
ments to compile-time performance, overall knowledge and direction in the area of
instruction scheduling, and design and implementation of the automaton based in-
struction scheduler.
• Bob Manson for his behind the scenes work on dejagnu.
• John Marino for contributing the DragonFly BSD port.
• Philip Martin for lots of libstdc++ string and vector iterator fixes and improvements,
and string clean up and testsuites.
• Michael Matz for his work on dominance tree discovery, the x86-64 port, link-time
optimization framework and general optimization improvements.
• All of the Mauve project contributors for Java test code.
• Bryce McKinlay for numerous GCJ and libgcj fixes and improvements.
• Adam Megacz for his work on the Microsoft Windows port of GCJ.
• Michael Meissner for LRS framework, ia32, m32r, v850, m88k, MIPS, powerpc, haifa,
ECOFF debug support, and other assorted hacking.
• Jason Merrill for his direction via the steering committee and leading the G++ effort.
• Martin Michlmayr for testing GCC on several architectures using the entire Debian
archive.
• David Miller for his direction via the steering committee, lots of SPARC work, im-
provements in jump.c and interfacing with the Linux kernel developers.
• Gary Miller ported GCC to Charles River Data Systems machines.
• Alfred Minarik for libstdc++ string and ios bug fixes, and turning the entire libstdc++
testsuite namespace-compatible.
• Mark Mitchell for his direction via the steering committee, mountains of C++ work,
load/store hoisting out of loops, alias analysis improvements, ISO C restrict support,
and serving as release manager from 2000 to 2011.
• Alan Modra for various GNU/Linux bits and testing.
• Toon Moene for his direction via the steering committee, Fortran maintenance, and his
ongoing work to make us make Fortran run fast.
• Jason Molenda for major help in the care and feeding of all the services on the
gcc.gnu.org (formerly egcs.cygnus.com) machine—mail, web services, ftp services, etc
etc. Doing all this work on scrap paper and the backs of envelopes would have been. . .
difficult.
• Catherine Moore for fixing various ugly problems we have sent her way, including the
haifa bug which was killing the Alpha & PowerPC Linux kernels.
• Mike Moreton for his various Java patches.
• David Mosberger-Tang for various Alpha improvements, and for the initial IA-64 port.
840 Using the GNU Compiler Collection (GCC)
• Stephen Moshier contributed the floating point emulator that assists in cross-
compilation and permits support for floating point numbers wider than 64 bits and
for ISO C99 support.
• Bill Moyer for his behind the scenes work on various issues.
• Philippe De Muyter for his work on the m68k port.
• Joseph S. Myers for his work on the PDP-11 port, format checking and ISO C99
support, and continuous emphasis on (and contributions to) documentation.
• Nathan Myers for his work on libstdc++-v3: architecture and authorship through the
first three snapshots, including implementation of locale infrastructure, string, shadow
C headers, and the initial project documentation (DESIGN, CHECKLIST, and so
forth). Later, more work on MT-safe string and shadow headers.
• Felix Natter for documentation on porting libstdc++.
• Nathanael Nerode for cleaning up the configuration/build process.
• NeXT, Inc. donated the front end that supports the Objective-C language.
• Hans-Peter Nilsson for the CRIS and MMIX ports, improvements to the search engine
setup, various documentation fixes and other small fixes.
• Geoff Noer for his work on getting cygwin native builds working.
• Diego Novillo for his work on Tree SSA, OpenMP, SPEC performance tracking web
pages, GIMPLE tuples, and assorted fixes.
• David O’Brien for the FreeBSD/alpha, FreeBSD/AMD x86-64, FreeBSD/ARM,
FreeBSD/PowerPC, and FreeBSD/SPARC64 ports and related infrastructure
improvements.
• Alexandre Oliva for various build infrastructure improvements, scripts and amazing
testing work, including keeping libtool issues sane and happy.
• Stefan Olsson for work on mt alloc.
• Melissa O’Neill for various NeXT fixes.
• Rainer Orth for random MIPS work, including improvements to GCC’s o32 ABI sup-
port, improvements to dejagnu’s MIPS support, Java configuration clean-ups and port-
ing work, and maintaining the IRIX, Solaris 2, and Tru64 UNIX ports.
• Hartmut Penner for work on the s390 port.
• Paul Petersen wrote the machine description for the Alliant FX/8.
• Alexandre Petit-Bianco for implementing much of the Java compiler and continued
Java maintainership.
• Matthias Pfaller for major improvements to the NS32k port.
• Gerald Pfeifer for his direction via the steering committee, pointing out lots of problems
we need to solve, maintenance of the web pages, and taking care of documentation
maintenance in general.
• Andrew Pinski for processing bug reports by the dozen.
• Ovidiu Predescu for his work on the Objective-C front end and runtime libraries.
• Jerry Quinn for major performance improvements in C++ formatted I/O.
• Ken Raeburn for various improvements to checker, MIPS ports and various cleanups
in the compiler.
Contributors to GCC 841
• Joel Sherrill for his direction via the steering committee, RTEMS contributions and
RTEMS testing.
• Nathan Sidwell for many C++ fixes/improvements.
• Jeffrey Siegal for helping RMS with the original design of GCC, some code which
handles the parse tree and RTL data structures, constant folding and help with the
original VAX & m68k ports.
• Kenny Simpson for prompting libstdc++ fixes due to defect reports from the LWG
(thereby keeping GCC in line with updates from the ISO).
• Franz Sirl for his ongoing work with making the PPC port stable for GNU/Linux.
• Andrey Slepuhin for assorted AIX hacking.
• Trevor Smigiel for contributing the SPU port.
• Christopher Smith did the port for Convex machines.
• Danny Smith for his major efforts on the Mingw (and Cygwin) ports. Retired from
GCC maintainership August 2010, having mentored two new maintainers into the role.
• Randy Smith finished the Sun FPA support.
• Ed Smith-Rowland for his continuous work on libstdc++-v3, special functions,
<random>, and various improvements to C++11 features.
• Scott Snyder for queue, iterator, istream, and string fixes and libstdc++ testsuite en-
tries. Also for providing the patch to G77 to add rudimentary support for INTEGER*1,
INTEGER*2, and LOGICAL*1.
• Zdenek Sojka for running automated regression testing of GCC and reporting numerous
bugs.
• Jayant Sonar for contributing the CR16 port.
• Brad Spencer for contributions to the GLIBCPP FORCE NEW technique.
• Richard Stallman, for writing the original GCC and launching the GNU project.
• Jan Stein of the Chalmers Computer Society provided support for Genix, as well as
part of the 32000 machine description.
• Nigel Stephens for various mips16 related fixes/improvements.
• Jonathan Stone wrote the machine description for the Pyramid computer.
• Graham Stott for various infrastructure improvements.
• John Stracke for his Java HTTP protocol fixes.
• Mike Stump for his Elxsi port, G++ contributions over the years and more recently his
vxworks contributions
• Jeff Sturm for Java porting help, bug fixes, and encouragement.
• Shigeya Suzuki for this fixes for the bsdi platforms.
• Ian Lance Taylor for the Go frontend, the initial mips16 and mips64 support, general
configury hacking, fixincludes, etc.
• Holger Teutsch provided the support for the Clipper CPU.
• Gary Thomas for his ongoing work to make the PPC work for GNU/Linux.
• Paul Thomas for contributions to GNU Fortran.
• Philipp Thomas for random bug fixes throughout the compiler
Contributors to GCC 843
• Jim Wilson for his direction via the steering committee, tackling hard problems in
various places that nobody else wanted to work on, strength reduction and other loop
optimizations.
• Paul Woegerer and Tal Agmon for the CRX port.
• Carlo Wood for various fixes.
• Tom Wood for work on the m88k port.
• Chung-Ju Wu for his work on the Andes NDS32 port.
• Canqun Yang for work on GNU Fortran.
• Masanobu Yuhara of Fujitsu Laboratories implemented the machine description for the
Tron architecture (specifically, the Gmicro).
• Kevin Zachmann helped port GCC to the Tahoe.
• Ayal Zaks for Swing Modulo Scheduling (SMS).
• Xiaoqiang Zhang for work on GNU Fortran.
• Gilles Zunino for help porting Java to Irix.
The following people are recognized for their contributions to GNAT, the Ada front end
of GCC:
• Bernard Banner
• Romain Berrendonner
• Geert Bosch
• Emmanuel Briot
• Joel Brobecker
• Ben Brosgol
• Vincent Celier
• Arnaud Charlet
• Chien Chieng
• Cyrille Comar
• Cyrille Crozes
• Robert Dewar
• Gary Dismukes
• Robert Duff
• Ed Falis
• Ramon Fernandez
• Sam Figueroa
• Vasiliy Fofanov
• Michael Friess
• Franco Gasperoni
• Ted Giering
• Matthew Gingell
• Laurent Guerby
Contributors to GCC 845
• Jerome Guitton
• Olivier Hainque
• Jerome Hugues
• Hristian Kirtchev
• Jerome Lambourg
• Bruno Leclerc
• Albert Lee
• Sean McNeil
• Javier Miranda
• Laurent Nana
• Pascal Obry
• Dong-Ik Oh
• Laurent Pautet
• Brett Porter
• Thomas Quinot
• Nicolas Roche
• Pat Rogers
• Jose Ruiz
• Douglas Rupp
• Sergey Rybin
• Gail Schenker
• Ed Schonberg
• Nicolas Setton
• Samuel Tardieu
The following people are recognized for their contributions of new features, bug reports,
testing and integration of classpath/libgcj for GCC version 4.1:
• Lillian Angel for JTree implementation and lots Free Swing additions and bug fixes.
• Wolfgang Baer for GapContent bug fixes.
• Anthony Balkissoon for JList, Free Swing 1.5 updates and mouse event fixes, lots of
Free Swing work including JTable editing.
• Stuart Ballard for RMI constant fixes.
• Goffredo Baroncelli for HTTPURLConnection fixes.
• Gary Benson for MessageFormat fixes.
• Daniel Bonniot for Serialization fixes.
• Chris Burdess for lots of gnu.xml and http protocol fixes, StAX and DOM xml:id support.
• Ka-Hing Cheung for TreePath and TreeSelection fixes.
• Archie Cobbs for build fixes, VM interface updates, URLClassLoader updates.
• Kelley Cook for build fixes.
• Martin Cordova for Suggestions for better SocketTimeoutException.
846 Using the GNU Compiler Collection (GCC)
• David Daney for BitSet bug fixes, HttpURLConnection rewrite and improvements.
• Thomas Fitzsimmons for lots of upgrades to the gtk+ AWT and Cairo 2D support.
Lots of imageio framework additions, lots of AWT and Free Swing bug fixes.
• Jeroen Frijters for ClassLoader and nio cleanups, serialization fixes, better Proxy
support, bug fixes and IKVM integration.
• Santiago Gala for AccessControlContext fixes.
• Nicolas Geoffray for VMClassLoader and AccessController improvements.
• David Gilbert for basic and metal icon and plaf support and lots of documenting,
Lots of Free Swing and metal theme additions. MetalIconFactory implementation.
• Anthony Green for MIDI framework, ALSA and DSSI providers.
• Andrew Haley for Serialization and URLClassLoader fixes, gcj build speedups.
• Kim Ho for JFileChooser implementation.
• Andrew John Hughes for Locale and net fixes, URI RFC2986 updates, Serialization
fixes, Properties XML support and generic branch work, VMIntegration guide update.
• Bastiaan Huisman for TimeZone bug fixing.
• Andreas Jaeger for mprec updates.
• Paul Jenner for better ‘-Werror’ support.
• Ito Kazumitsu for NetworkInterface implementation and updates.
• Roman Kennke for BoxLayout, GrayFilter and SplitPane, plus bug fixes all over.
Lots of Free Swing work including styled text.
• Simon Kitching for String cleanups and optimization suggestions.
• Michael Koch for configuration fixes, Locale updates, bug and build fixes.
• Guilhem Lavaux for configuration, thread and channel fixes and Kaffe integration. JCL
native Pointer updates. Logger bug fixes.
• David Lichteblau for JCL support library global/local reference cleanups.
• Aaron Luchko for JDWP updates and documentation fixes.
• Ziga Mahkovec for Graphics2D upgraded to Cairo 0.5 and new regex features.
• Sven de Marothy for BMP imageio support, CSS and TextLayout fixes. GtkImage
rewrite, 2D, awt, free swing and date/time fixes and implementing the Qt4 peers.
• Casey Marshall for crypto algorithm fixes, FileChannel lock, SystemLogger and
FileHandler rotate implementations, NIO FileChannel.map support, security and
policy updates.
• Bryce McKinlay for RMI work.
• Audrius Meskauskas for lots of Free Corba, RMI and HTML work plus testing and
documenting.
• Kalle Olavi Niemitalo for build fixes.
• Rainer Orth for build fixes.
• Andrew Overholt for File locking fixes.
• Ingo Proetel for Image, Logger and URLClassLoader updates.
• Olga Rodimina for MenuSelectionManager implementation.
Contributors to GCC 847
• Jörgen Freyh
• Mark K. Gardner
• Charles-Antoine Gauthier
• Yung Shing Gene
• David Gilbert
• Simon Gornall
• Fred Gray
• John Griffin
• Patrik Hagglund
• Phil Hargett
• Amancio Hasty
• Takafumi Hayashi
• Bryan W. Headley
• Kevin B. Hendricks
• Joep Jansen
• Christian Joensson
• Michel Kern
• David Kidd
• Tobias Kuipers
• Anand Krishnaswamy
• A. O. V. Le Blanc
• llewelly
• Damon Love
• Brad Lucier
• Matthias Klose
• Martin Knoblauch
• Rick Lutowski
• Jesse Macnish
• Stefan Morrell
• Anon A. Mous
• Matthias Mueller
• Pekka Nikander
• Rick Niles
• Jon Olson
• Magnus Persson
• Chris Pollard
• Richard Polton
• Derk Reefman
• David Rees
Contributors to GCC 849
• Paul Reilly
• Tom Reilly
• Torsten Rueger
• Danny Sadinoff
• Marc Schifer
• Erik Schnetter
• Wayne K. Schroll
• David Schuler
• Vin Shelton
• Tim Souder
• Adam Sulmicki
• Bill Thorson
• George Talbot
• Pedro A. M. Vazquez
• Gregory Warnes
• Ian Watson
• David E. Young
• And many others
And finally we’d like to thank everyone who uses the compiler, provides feedback and
generally reminds us why we’re doing this work in the first place.
Option Index 851
Option Index
GCC’s command line options are indexed here without any initial ‘-’ or ‘--’. Where an
option has both positive and negative forms (such as ‘-foption’ and ‘-fno-option’), rele-
vant entries in the manual are indexed under the most appropriate form; it may sometimes
be useful to look up both forms.
# D
### . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182, 201
da . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
dA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
- dD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182, 205
-fipa-bit-cp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 dead_strip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
-fipa-vrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 dependency-file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
-mfunction-return . . . . . . . . . . . . . . . . . . . . . . . . . . 377 dH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
-mindirect-branch . . . . . . . . . . . . . . . . . . . . . . . . . . 377 dI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
-mindirect-branch-register . . . . . . . . . . . . . . . . 377 dM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
-mlow-precision-div . . . . . . . . . . . . . . . . . . . . . . . . 218 dN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
-mlow-precision-sqrt . . . . . . . . . . . . . . . . . . . . . . . 218 dp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
-mno-low-precision-div . . . . . . . . . . . . . . . . . . . . . 218 dP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
-mno-low-precision-sqrt . . . . . . . . . . . . . . . . . . . 218 dumpfullversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
-Wabi-tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 dumpmachine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
-Wno-scalar-storage-order . . . . . . . . . . . . . . . . . . 93 dumpspecs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
-Wscalar-storage-order . . . . . . . . . . . . . . . . . . . . . . 93 dumpversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
dU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
dx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
8 dylib_file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
80387 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 dylinker_install_name . . . . . . . . . . . . . . . . . . . . . . 256
dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
dynamiclib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
A D............................................. 176
all_load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
allowable_client. . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
ansi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5, 33, 572, 799
E
arch_errors_fatal . . . . . . . . . . . . . . . . . . . . . . . . . . 254 EB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231, 284
aux-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 EL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231, 284
A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 exported_symbols_list . . . . . . . . . . . . . . . . . . . . . . 256
E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30, 183
B
bind_at_load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 F
bundle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 fabi-compat-version . . . . . . . . . . . . . . . . . . . . . . . . . 41
bundle_loader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 fabi-version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
B............................................. 190 fada-spec-parent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Bdynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 faggressive-loop-optimizations . . . . . . . . . . . 114
Bstatic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 falign-functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
falign-jumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
falign-labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
C falign-loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29, 183 faligned-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
C............................................. 181 fallow-parameterless-variadic-functions . . 36
CC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 fasan-shadow-offset . . . . . . . . . . . . . . . . . . . . . . . . 169
client_name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 fassociative-math . . . . . . . . . . . . . . . . . . . . . . . . . . 140
compatibility_version . . . . . . . . . . . . . . . . . . . . . . 256 fasynchronous-unwind-tables . . . . . . . . . . . . . . . 193
coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 fauto-inc-dec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
current_version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 fauto-profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
852 Using the GNU Compiler Collection (GCC)
L
G l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
g . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 lobjc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
gcoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
gcolumn-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
gdwarf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
gen-decls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 M
gfull . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 m............................................. 324
ggdb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 m1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
ggnu-pubnames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 m10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
gno-column-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 m128bit-long-double . . . . . . . . . . . . . . . . . . . . . . . . 365
gno-record-gcc-switches . . . . . . . . . . . . . . . . . . . 104 m16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
gno-strict-dwarf. . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 m16-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251, 302
gpubnames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 m1reg- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
grecord-gcc-switches . . . . . . . . . . . . . . . . . . . . . . . 104 m2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gsplit-dwarf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 m210 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
gstabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 m2a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gstabs+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 m2a-nofpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gstrict-dwarf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 m2a-single . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gtoggle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 m2a-single-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gused . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 m3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
gvms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 m31 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
gxcoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 m32 . . . . . . . . . . . . . . . . . . . 307, 319, 349, 352, 353, 378
gxcoff+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 m32-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
gz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 m32bit-doubles . . . . . . . . . . . . . . . . . . . . . . . . . 313, 330
G . . . . . . . . . . . . . . . . . . . . . . . . . . 274, 290, 303, 327, 352 m32r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
m32r2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
m32rx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
H m340 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
headerpad_max_install_names . . . . . . . . . . . . . . . 256 m3dnow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 m3dnowa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 m3e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
m4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
m4-100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
I m4-100-nofpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
I- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 m4-100-single . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
idirafter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 m4-100-single-only . . . . . . . . . . . . . . . . . . . . . . . . . 338
iframework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 m4-200 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
imacros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 m4-200-nofpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
image_base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 m4-200-single . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
imultilib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 m4-200-single-only . . . . . . . . . . . . . . . . . . . . . . . . . 338
include . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 m4-300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
init . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 m4-300-nofpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
install_name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 m4-300-single . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
iplugindir= . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 m4-300-single-only . . . . . . . . . . . . . . . . . . . . . . . . . 338
iprefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 m4-340 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
iquote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 m4-500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
isysroot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 m4-nofpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
isystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 m4-single . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
iwithprefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 m4-single-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
858 Using the GNU Compiler Collection (GCC)
R U
rdynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 u............................................. 188
read_only_relocs. . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 umbrella . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
remap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 undef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
undefined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
unexported_symbols_list . . . . . . . . . . . . . . . . . . . 256
S U............................................. 176
s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
save-temps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 V
save-temps=obj . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
sectalign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 v . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
sectcreate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
sectobjectsymbols . . . . . . . . . . . . . . . . . . . . . . . . . . 256
sectorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 W
seg_addr_table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
seg_addr_table_filename . . . . . . . . . . . . . . . . . . . 256 w . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
seg1addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 weak_reference_mismatches . . . . . . . . . . . . . . . . . 256
segaddr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 whatsloaded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
seglinkedit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 whyload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
segprot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 wrapper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
segs_read_only_addr . . . . . . . . . . . . . . . . . . . . . . . . 256 W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62, 96, 97, 790
segs_read_write_addr . . . . . . . . . . . . . . . . . . . . . . . 256 Wa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
shared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Wabi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
shared-libgcc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Wabi-tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
short-calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Waddr-space-convert . . . . . . . . . . . . . . . . . . . . . . . . 242
sim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Waddress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
sim2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Waggregate-return. . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
single_module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Waggressive-loop-optimizations . . . . . . . . . . . . . 95
specs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Waligned-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
static. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185, 256, 269 Wall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61, 792
static-libasan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Walloc-zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
static-libgcc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Walloca . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
static-liblsan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Warray-bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
static-libmpx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Wassign-intercept. . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
static-libmpxwrappers . . . . . . . . . . . . . . . . . . . . . . 187 Wattributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
static-libstdc++. . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Wbad-function-cast . . . . . . . . . . . . . . . . . . . . . . . . . . 90
static-libtsan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Wbool-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
static-libubsan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Wbool-operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
std . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5, 34, 572, 799 Wbuiltin-declaration-mismatch . . . . . . . . . . . . . . 95
sub_library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Wbuiltin-macro-redefined . . . . . . . . . . . . . . . . . . . 95
sub_umbrella . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Wc++-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
symbolic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Wc++11-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
sysroot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Wc++14-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30, 183 Wc++1z-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Wc90-c99-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Wc99-c11-compat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
T Wcast-align . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Wcast-qual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
target-help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Wchar-subscripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Wchkp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Wclobbered. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
tno-android-cc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Wcomment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
tno-android-ld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Wcomments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
traditional. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181, 789 Wconditionally-supported . . . . . . . . . . . . . . . . . . . 91
traditional-cpp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Wconversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
trigraphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Wconversion-null . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
twolevel_namespace . . . . . . . . . . . . . . . . . . . . . . . . . 256 Wctor-dtor-privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 49
T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Wdangling-else . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
870 Using the GNU Compiler Collection (GCC)
Wdate-time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wjump-misses-init. . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Wdeclaration-after-statement . . . . . . . . . . . . . . . 86 Wl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Wdelete-incomplete . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wlarger-than-len . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Wdelete-non-virtual-dtor . . . . . . . . . . . . . . . . . . . 49 Wlarger-than=len . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Wdeprecated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Wliteral-suffix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Wdeprecated-declarations . . . . . . . . . . . . . . . . . . . 97 Wlogical-not-parentheses . . . . . . . . . . . . . . . . . . . 94
Wdisabled-optimization . . . . . . . . . . . . . . . . . . . . . 100 Wlogical-op . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Wdiscarded-array-qualifiers . . . . . . . . . . . . . . . . 83 Wlong-long. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Wdiscarded-qualifiers . . . . . . . . . . . . . . . . . . . . . . . 83 Wlto-type-mismatch . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Wdiv-by-zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wmain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Wdouble-promotion. . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Wmaybe-uninitialized . . . . . . . . . . . . . . . . . . . . . . . . 76
Wduplicate-decl-specifier . . . . . . . . . . . . . . . . . . 63 Wmemset-elt-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Wduplicated-branches . . . . . . . . . . . . . . . . . . . . . . . . 83 Wmemset-transposed-args . . . . . . . . . . . . . . . . . . . . . 94
Wduplicated-cond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Wmisleading-indentation . . . . . . . . . . . . . . . . . . . . . 70
Weffc++ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Wmissing-braces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wempty-body . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wmissing-declarations . . . . . . . . . . . . . . . . . . . . . . . 95
Wendif-labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Wmissing-field-initializers . . . . . . . . . . . . . . . . 96
Wenum-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Wmissing-format-attribute . . . . . . . . . . . . . . . . . . 80
Werror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Wmissing-include-dirs . . . . . . . . . . . . . . . . . . . . . . . 71
Werror= . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Wmissing-parameter-type . . . . . . . . . . . . . . . . . . . . . 95
Wexpansion-to-defined . . . . . . . . . . . . . . . . . . . . . . . 89 Wmissing-prototypes . . . . . . . . . . . . . . . . . . . . . . . . . 95
Wextra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62, 96, 97 Wmisspelled-isr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Wfatal-errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Wmultichar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Wfloat-conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Wmultiple-inheritance . . . . . . . . . . . . . . . . . . . . . . . 52
Wfloat-equal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wnamespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Wformat . . . . . . . . . . . . . . . . . . . . . . . . . . . 63, 64, 80, 434 Wnarrowing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wformat-contains-nul . . . . . . . . . . . . . . . . . . . . . . . . 64 Wnested-externs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wformat-extra-args . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Wno-abi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Wformat-nonliteral . . . . . . . . . . . . . . . . . . . . . . 66, 435 Wno-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Wformat-overflow . . . . . . . . . . . . . . . . . . . . . . . . . 64, 65 Wno-aggregate-return . . . . . . . . . . . . . . . . . . . . . . . . 94
Wformat-security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-aggressive-loop-optimizations . . . . . . . . . 95
Wformat-signedness . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-aligned-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Wformat-truncation . . . . . . . . . . . . . . . . . . . . . . . 66, 67 Wno-all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Wformat-y2k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Wno-alloc-zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Wformat-zero-length . . . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-alloca. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Wformat= . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Wno-array-bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Wformat=1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Wno-assign-intercept . . . . . . . . . . . . . . . . . . . . . . . . 55
Wformat=2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Wframe-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Wno-bad-function-cast . . . . . . . . . . . . . . . . . . . . . . . 90
Wframe-larger-than . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Wno-bool-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Wfree-nonheap-object . . . . . . . . . . . . . . . . . . . . . . . . 87 Wno-bool-operation . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Wignored-attributes . . . . . . . . . . . . . . . . . . . . . . . . . 70 Wno-builtin-declaration-mismatch . . . . . . . . . . 95
Wignored-qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . 70 Wno-builtin-macro-redefined . . . . . . . . . . . . . . . . 95
Wimplicit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Wno-c90-c99-compat . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Wimplicit-fallthrough . . . . . . . . . . . . . . . . . . . . . . . 68 Wno-c99-c11-compat . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Wimplicit-fallthrough= . . . . . . . . . . . . . . . . . . . . . . 68 Wno-cast-align . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Wimplicit-function-declaration . . . . . . . . . . . . . 68 Wno-cast-qual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Wimplicit-int . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Wno-char-subscripts . . . . . . . . . . . . . . . . . . . . . . . . . 63
Wincompatible-pointer-types . . . . . . . . . . . . . . . . 84 Wno-clobbered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Winherited-variadic-ctor . . . . . . . . . . . . . . . . . . . 98 Wno-conditionally-supported . . . . . . . . . . . . . . . . 91
Winit-self. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Wno-conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Winline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 499 Wno-conversion-null . . . . . . . . . . . . . . . . . . . . . . . . . 91
Wint-conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wno-coverage-mismatch . . . . . . . . . . . . . . . . . . . . . . . 63
Wint-in-bool-context . . . . . . . . . . . . . . . . . . . . . . . . 99 Wno-ctor-dtor-privacy . . . . . . . . . . . . . . . . . . . . . . . 49
Wint-to-pointer-cast . . . . . . . . . . . . . . . . . . . . . . . . 99 Wno-dangling-else. . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Winvalid-memory-model . . . . . . . . . . . . . . . . . . . . . . . 76 Wno-date-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Winvalid-offsetof. . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Wno-declaration-after-statement . . . . . . . . . . . 86
Winvalid-pch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wno-delete-incomplete . . . . . . . . . . . . . . . . . . . . . . . 92
Option Index 871
Wno-delete-non-virtual-dtor . . . . . . . . . . . . . . . . 49 Wno-memset-transposed-args . . . . . . . . . . . . . . . . . 94
Wno-deprecated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Wno-misleading-indentation . . . . . . . . . . . . . . . . . 70
Wno-deprecated-declarations . . . . . . . . . . . . . . . . 97 Wno-missing-braces . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wno-disabled-optimization . . . . . . . . . . . . . . . . . 100 Wno-missing-declarations . . . . . . . . . . . . . . . . . . . 95
Wno-discarded-array-qualifiers . . . . . . . . . . . . . 83 Wno-missing-field-initializers . . . . . . . . . . . . . 96
Wno-discarded-qualifiers . . . . . . . . . . . . . . . . . . . 83 Wno-missing-format-attribute . . . . . . . . . . . . . . . 80
Wno-div-by-zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wno-missing-include-dirs . . . . . . . . . . . . . . . . . . . 71
Wno-double-promotion . . . . . . . . . . . . . . . . . . . . . . . . 63 Wno-missing-parameter-type . . . . . . . . . . . . . . . . . 95
Wno-duplicate-decl-specifier . . . . . . . . . . . . . . . 63 Wno-missing-prototypes . . . . . . . . . . . . . . . . . . . . . . 95
Wno-duplicated-branches . . . . . . . . . . . . . . . . . . . . . 83 Wno-multichar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Wno-duplicated-cond . . . . . . . . . . . . . . . . . . . . . . . . . 83 Wno-narrowing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-effc++. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Wno-nested-externs . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-empty-body . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wno-noexcept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-endif-labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Wno-noexcept-type. . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-enum-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Wno-non-template-friend . . . . . . . . . . . . . . . . . . . . . 51
Wno-error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Wno-non-virtual-dtor . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-error=. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Wno-nonnull . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-extra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62, 96, 97 Wno-nonnull-compare . . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-fatal-errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Wno-normalized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Wno-float-conversion . . . . . . . . . . . . . . . . . . . . . . . . 93 Wno-null-dereference . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-float-equal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wno-odr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63, 80 Wno-old-style-cast . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Wno-format-contains-nul . . . . . . . . . . . . . . . . . . . . . 64 Wno-old-style-declaration . . . . . . . . . . . . . . . . . . 95
Wno-format-extra-args . . . . . . . . . . . . . . . . . . . . . . . 64 Wno-old-style-definition . . . . . . . . . . . . . . . . . . . 95
Wno-format-nonliteral . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-format-overflow . . . . . . . . . . . . . . . . . . 64, 65, 67 Wno-overlength-strings . . . . . . . . . . . . . . . . . . . . . 100
Wno-format-security . . . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-overloaded-virtual . . . . . . . . . . . . . . . . . . . . . . 51
Wno-format-signedness . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-override-init. . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-format-truncation . . . . . . . . . . . . . . . . . . . . . . . 66 Wno-override-init-side-effects . . . . . . . . . . . . . 97
Wno-format-y2k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Wno-packed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-format-zero-length . . . . . . . . . . . . . . . . . . . . . . 66 Wno-packed-bitfield-compat . . . . . . . . . . . . . . . . . 98
Wno-frame-address. . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Wno-padded. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-free-nonheap-object . . . . . . . . . . . . . . . . . . . . . 87 Wno-parentheses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wno-ignored-attributes . . . . . . . . . . . . . . . . . . . . . . 70 Wno-pedantic-ms-format . . . . . . . . . . . . . . . . . . . . . . 88
Wno-ignored-qualifiers . . . . . . . . . . . . . . . . . . . . . . 70 Wno-placement-new. . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Wno-implicit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Wno-pmf-conversions . . . . . . . . . . . . . . . . . . . . 52, 743
Wno-implicit-fallthrough . . . . . . . . . . . . . . . . . . . 68 Wno-pointer-arith. . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Wno-implicit-function-declaration . . . . . . . . . 68 Wno-pointer-compare . . . . . . . . . . . . . . . . . . . . . . . . . 89
Wno-implicit-int . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Wno-pointer-sign. . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Wno-incompatible-pointer-types . . . . . . . . . . . . . 84 Wno-pointer-to-int-cast . . . . . . . . . . . . . . . . . . . . . 99
Wno-inherited-variadic-ctor . . . . . . . . . . . . . . . . 98 Wno-pragmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Wno-init-self . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Wno-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Wno-inline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Wno-redundant-decls . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-int-conversion . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wno-register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-int-in-bool-context . . . . . . . . . . . . . . . . . . . . . 99 Wno-reorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-int-to-pointer-cast . . . . . . . . . . . . . . . . . . . . . 99 Wno-restrict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-invalid-memory-model . . . . . . . . . . . . . . . . . . . 76 Wno-return-local-addr . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-invalid-offsetof . . . . . . . . . . . . . . . . . . . . . . . . 98 Wno-return-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-invalid-pch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wno-selector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Wno-jump-misses-init . . . . . . . . . . . . . . . . . . . . . . . . 93 Wno-sequence-point . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wno-literal-suffix . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Wno-shadow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Wno-logical-not-parentheses . . . . . . . . . . . . . . . . 94 Wno-shadow-ivar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Wno-logical-op . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Wno-shift-count-negative . . . . . . . . . . . . . . . . . . . 72
Wno-long-long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wno-shift-count-overflow . . . . . . . . . . . . . . . . . . . 72
Wno-lto-type-mismatch . . . . . . . . . . . . . . . . . . . . . . . 49 Wno-shift-negative-value . . . . . . . . . . . . . . . . . . . 72
Wno-main . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Wno-shift-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Wno-maybe-uninitialized . . . . . . . . . . . . . . . . . . . . . 76 Wno-sign-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Wno-memset-elt-size . . . . . . . . . . . . . . . . . . . . . . . . . 94 Wno-sign-conversion . . . . . . . . . . . . . . . . . . . . . . . . . 93
872 Using the GNU Compiler Collection (GCC)
Wno-sign-promo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Wnon-template-friend . . . . . . . . . . . . . . . . . . . . . . . . 51
Wno-sized-deallocation . . . . . . . . . . . . . . . . . . . . . . 93 Wnon-virtual-dtor. . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-sizeof-array-argument . . . . . . . . . . . . . . . . . . 93 Wnonnull . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-sizeof-pointer-memaccess . . . . . . . . . . . . . . . 93 Wnonnull-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-stack-protector . . . . . . . . . . . . . . . . . . . . . . . . 100 Wnormalized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Wno-strict-aliasing . . . . . . . . . . . . . . . . . . . . . . . . . 77 Wnormalized= . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Wno-strict-null-sentinel . . . . . . . . . . . . . . . . . . . 51 Wnull-dereference. . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Wno-strict-overflow . . . . . . . . . . . . . . . . . . . . . . . . . 78 Wodr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-strict-prototypes . . . . . . . . . . . . . . . . . . . . . . . 95 Wold-style-cast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Wno-strict-selector-match . . . . . . . . . . . . . . . . . . 56 Wold-style-declaration . . . . . . . . . . . . . . . . . . . . . . 95
Wno-stringop-overflow . . . . . . . . . . . . . . . . . . . 78, 79 Wold-style-definition . . . . . . . . . . . . . . . . . . . . . . . 95
Wno-subobject-linkage . . . . . . . . . . . . . . . . . . . . . . . 92 Wopenm-simd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-suggest-attribute= . . . . . . . . . . . . . . . . . . . . . . 80 Woverflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-suggest-attribute=const . . . . . . . . . . . . . . . . 80 Woverlength-strings . . . . . . . . . . . . . . . . . . . . . . . . 100
Wno-suggest-attribute=format . . . . . . . . . . . . . . . 80 Woverloaded-virtual . . . . . . . . . . . . . . . . . . . . . . . . . 51
Wno-suggest-attribute=noreturn . . . . . . . . . . . . . 80 Woverride-init . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-suggest-attribute=pure . . . . . . . . . . . . . . . . . 80 Woverride-init-side-effects . . . . . . . . . . . . . . . . 97
Wno-suggest-final-methods . . . . . . . . . . . . . . . . . . 81 Wp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Wno-suggest-final-types . . . . . . . . . . . . . . . . . . . . . 81 Wpacked . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Wno-switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wpacked-bitfield-compat . . . . . . . . . . . . . . . . . . . . . 98
Wno-switch-bool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wpadded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-switch-default . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wparentheses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wno-switch-enum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wpedantic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Wno-switch-unreachable . . . . . . . . . . . . . . . . . . . . . . 73 Wpedantic-ms-format . . . . . . . . . . . . . . . . . . . . . . . . . 88
Wno-sync-nand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Wplacement-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Wno-system-headers . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wpmf-conversions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Wno-tautological-compare . . . . . . . . . . . . . . . . . . . 84 Wpointer-arith . . . . . . . . . . . . . . . . . . . . . . . . . . 88, 425
Wno-terminate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Wpointer-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Wno-traditional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Wpointer-sign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Wno-traditional-conversion . . . . . . . . . . . . . . . . . 86 Wpointer-to-int-cast . . . . . . . . . . . . . . . . . . . . . . . . 99
Wno-trampolines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Wpragmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Wno-type-limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Wprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Wno-undeclared-selector . . . . . . . . . . . . . . . . . . . . . 56 Wredundant-decls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-undef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Wregister . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-uninitialized. . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Wreorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Wno-unknown-pragmas . . . . . . . . . . . . . . . . . . . . . . . . . 77 Wrestrict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Wno-unsafe-loop-optimizations . . . . . . . . . . . . . . 87 Wreturn-local-addr . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-unused. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Wreturn-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-unused-but-set-parameter . . . . . . . . . . . . . . . 74 Wselector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Wno-unused-but-set-variable . . . . . . . . . . . . . . . . 74 Wsequence-point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Wno-unused-const-variable . . . . . . . . . . . . . . . . . . 75 Wshadow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Wno-unused-function . . . . . . . . . . . . . . . . . . . . . . . . . 74 Wshadow-ivar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Wno-unused-label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Wshadow=compatible-local . . . . . . . . . . . . . . . . . . . 86
Wno-unused-parameter . . . . . . . . . . . . . . . . . . . . . . . . 74 Wshadow=local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Wno-unused-result. . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Wshift-count-negative . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-unused-value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Wshift-count-overflow . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-unused-variable . . . . . . . . . . . . . . . . . . . . . . . . . 75 Wshift-negative-value . . . . . . . . . . . . . . . . . . . . . . . 72
Wno-useless-cast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wshift-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Wno-varargs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wsign-compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Wno-variadic-macros . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wsign-conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Wno-vector-operation-performance . . . . . . . . . . 99 Wsign-promo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Wno-virtual-move-assign . . . . . . . . . . . . . . . . . . . . . 99 Wsized-deallocation . . . . . . . . . . . . . . . . . . . . . . . . . 93
Wno-vla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Wsizeof-array-argument . . . . . . . . . . . . . . . . . . . . . . 93
Wno-volatile-register-var . . . . . . . . . . . . . . . . . 100 Wsizeof-pointer-memaccess . . . . . . . . . . . . . . . . . . 93
Wno-write-strings. . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Wstack-protector. . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Wno-zero-as-null-pointer-constant . . . . . . . . . 91 Wstack-usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Wnoexcept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Wstrict-aliasing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Wnoexcept-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Wstrict-aliasing=n . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Option Index 873
Wstrict-null-sentinel . . . . . . . . . . . . . . . . . . . . . . . 51 Wunused-const-variable . . . . . . . . . . . . . . . . . . . . . . 75
Wstrict-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Wunused-function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Wstrict-prototypes . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Wunused-label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Wstrict-selector-match . . . . . . . . . . . . . . . . . . . . . . 56 Wunused-local-typedefs . . . . . . . . . . . . . . . . . . . . . . 74
Wstringop-overflow . . . . . . . . . . . . . . . . . . . . . . . 78, 79 Wunused-macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Wsubobject-linkage . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Wunused-parameter. . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Wsuggest-attribute= . . . . . . . . . . . . . . . . . . . . . . . . . 80 Wunused-result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Wsuggest-attribute=const . . . . . . . . . . . . . . . . . . . 80 Wunused-value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Wsuggest-attribute=format . . . . . . . . . . . . . . . . . . 80 Wunused-variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Wsuggest-attribute=noreturn . . . . . . . . . . . . . . . . 80 Wuseless-cast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Wsuggest-attribute=pure . . . . . . . . . . . . . . . . . . . . . 80 Wvarargs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Wsuggest-final-methods . . . . . . . . . . . . . . . . . . . . . . 81 Wvariadic-macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Wsuggest-final-types . . . . . . . . . . . . . . . . . . . . . . . . 81 Wvector-operation-performance . . . . . . . . . . . . . . 99
Wswitch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wvirtual-inheritance . . . . . . . . . . . . . . . . . . . . . . . . 52
Wswitch-bool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wvirtual-move-assign . . . . . . . . . . . . . . . . . . . . . . . . 99
Wswitch-default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wvla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Wswitch-enum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wvolatile-register-var . . . . . . . . . . . . . . . . . . . . . 100
Wswitch-unreachable . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wwrite-strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Wsync-nand. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Wzero-as-null-pointer-constant . . . . . . . . . . . . . 91
Wsystem-headers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Wtautological-compare . . . . . . . . . . . . . . . . . . . . . . . 84
Wtemplates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 X
Wterminate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Wtraditional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Xassembler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Wtraditional-conversion . . . . . . . . . . . . . . . . . . . . . 86 Xbind-lazy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Wtrampolines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Xbind-now . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Wtrigraphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Xlinker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Wtype-limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Xpreprocessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Wundeclared-selector . . . . . . . . . . . . . . . . . . . . . . . . 56
Wundef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Wuninitialized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Y
Wunknown-pragmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Ym . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Wunsafe-loop-optimizations . . . . . . . . . . . . . . . . . 87 YP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Wunsuffixed-float-constants . . . . . . . . . . . . . . . 101
Wunused . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Wunused-but-set-parameter . . . . . . . . . . . . . . . . . . 74 Z
Wunused-but-set-variable . . . . . . . . . . . . . . . . . . . 74 z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Keyword Index 875
Keyword Index
# <
#pragma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724 ‘<’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
#pragma implementation . . . . . . . . . . . . . . . . . . . . . 740
#pragma implementation, implied . . . . . . . . . . . . 740
#pragma interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 739 =
‘=’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
$ >
$ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
‘>’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
% ?
‘%’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 ?: extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
%include . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 ?: side effect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
%include_noerr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
%rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Y
W y0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
w floating point suffix . . . . . . . . . . . . . . . . . . . . . . . . . 415 y0f . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
W floating point suffix . . . . . . . . . . . . . . . . . . . . . . . . . 415 y0l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
wakeup function attribute, MSP430 . . . . . . . . . . . 460 y1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
warm function attribute, NDS32 . . . . . . . . . . . . . . . 461 y1f . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
warn_unused type attribute . . . . . . . . . . . . . . . . . . . 744 y1l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
warn_unused_result function attribute . . . . . . . 444 yn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
warning for comparison of signed and unsigned ynf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 ynl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
warning for overloaded virtual function . . . . . . . . 51
warning for reordering of member initializers . . . 50
warning for unknown pragmas . . . . . . . . . . . . . . . . . 77 Z
warning function attribute. . . . . . . . . . . . . . . . . . . . 433 zda variable attribute, V850 . . . . . . . . . . . . . . . . . . 484
warning GCC_COLORS capability . . . . . . . . . . . . . . . . 57 zero-length arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
warning messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 zero-size structures . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
warnings from system headers . . . . . . . . . . . . . . . . . 84 zSeries options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382