Copyright © 1988-2017 Free Software Foundation, Inc.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with the Invariant Sections being “Funding Free Software”, the Front-Cover Texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled “GNU Free Documentation License”.
(a) The FSF's Front-Cover Text is:
A GNU Manual
(b) The FSF's Back-Cover Text is:
You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.
collect2
gcc.target/i386
gcc.target/spu/ea
gcc.test-framework
dg-add-options
dg-require-
support
dg-final
GIMPLE_ASM
GIMPLE_ASSIGN
GIMPLE_BIND
GIMPLE_CALL
GIMPLE_CATCH
GIMPLE_COND
GIMPLE_DEBUG
GIMPLE_EH_FILTER
GIMPLE_LABEL
GIMPLE_GOTO
GIMPLE_NOP
GIMPLE_OMP_ATOMIC_LOAD
GIMPLE_OMP_ATOMIC_STORE
GIMPLE_OMP_CONTINUE
GIMPLE_OMP_CRITICAL
GIMPLE_OMP_FOR
GIMPLE_OMP_MASTER
GIMPLE_OMP_ORDERED
GIMPLE_OMP_PARALLEL
GIMPLE_OMP_RETURN
GIMPLE_OMP_SECTION
GIMPLE_OMP_SECTIONS
GIMPLE_OMP_SINGLE
GIMPLE_PHI
GIMPLE_RESX
GIMPLE_RETURN
GIMPLE_SWITCH
GIMPLE_TRY
GIMPLE_WITH_CLEANUP_EXPR
define_insn
enabled
attribute
targetm
Variable
__attribute__
collect2
This manual documents the internals of the GNU compilers, including how to port them to new targets and some information about how to write front ends for new languages. It corresponds to the compilers (GCC) version 6.5.0. The use of the GNU compilers is documented in a separate manual. See Introduction.
This manual is mainly a reference manual rather than a tutorial. It discusses how to contribute to GCC (see Contributing), the characteristics of the machines supported by GCC as hosts and targets (see Portability), how GCC relates to the ABIs on such systems (see Interface), and the characteristics of the languages for which GCC front ends are written (see Languages). It then describes the GCC source tree structure and build system, some of the interfaces to GCC front ends, and how support for a target system is implemented in GCC.
Additional tutorial information is linked to from http://gcc.gnu.org/readings.html.
If you would like to help pretest GCC releases to assure they work well, current development sources are available by SVN (see http://gcc.gnu.org/svn.html). Source and binary snapshots are also available for FTP; see http://gcc.gnu.org/snapshots.html.
If you would like to work on improvements to GCC, please read the advice at these URLs:
http://gcc.gnu.org/contribute.html http://gcc.gnu.org/contributewhy.html
for information on how to make useful contributions and avoid duplication of effort. Suggested projects are listed at http://gcc.gnu.org/projects/.
GCC itself aims to be portable to any machine where int
is at least
a 32-bit type. It aims to target machines with a flat (non-segmented) byte
addressed data address space (the code address space can be separate).
Target ABIs may have 8, 16, 32 or 64-bit int
type. char
can be wider than 8 bits.
GCC gets most of the information about the target machine from a machine description which gives an algebraic formula for each of the machine's instructions. This is a very clean way to describe the target. But when the compiler needs information that is difficult to express in this fashion, ad-hoc parameters have been defined for machine descriptions. The purpose of portability is to reduce the total work needed on the compiler; it was not of interest for its own sake.
GCC does not contain machine dependent code, but it does contain code
that depends on machine parameters such as endianness (whether the most
significant byte has the highest or lowest address of the bytes in a word)
and the availability of autoincrement addressing. In the RTL-generation
pass, it is often necessary to have multiple strategies for generating code
for a particular kind of syntax tree, strategies that are usable for different
combinations of parameters. Often, not all possible cases have been
addressed, but only the common ones or only the ones that have been
encountered. As a result, a new target may require additional
strategies. You will know
if this happens because the compiler will call abort
. Fortunately,
the new strategies can be added in a machine-independent fashion, and will
affect only the target machines that need them.
GCC is normally configured to use the same function calling convention normally in use on the target system. This is done with the machine-description macros described (see Target Macros).
However, returning of structure and union values is done differently on some target machines. As a result, functions compiled with PCC returning such types cannot be called from code compiled with GCC, and vice versa. This does not cause trouble often because few Unix library routines return structures or unions.
GCC code returns structures and unions that are 1, 2, 4 or 8 bytes
long in the same registers used for int
or double
return
values. (GCC typically allocates variables of such types in
registers also.) Structures and unions of other sizes are returned by
storing them into an address passed by the caller (usually in a
register). The target hook TARGET_STRUCT_VALUE_RTX
tells GCC where to pass this address.
By contrast, PCC on most target machines returns structures and unions of any size by copying the data into an area of static storage, and then returning the address of that storage as if it were a pointer value. The caller must copy the data from that memory area to the place where the value is wanted. This is slower than the method used by GCC, and fails to be reentrant.
On some target machines, such as RISC machines and the 80386, the standard system convention is to pass to the subroutine the address of where to return the value. On these machines, GCC has been configured to be compatible with the standard compiler, when this method is used. It may not be compatible for structures of 1, 2, 4 or 8 bytes.
GCC uses the system's standard convention for passing arguments. On some machines, the first few arguments are passed in registers; in others, all are passed on the stack. It would be possible to use registers for argument passing on any machine, and this would probably result in a significant speedup. But the result would be complete incompatibility with code that follows the standard convention. So this change is practical only if you are switching to GCC as the sole C compiler for the system. We may implement register argument passing on certain machines once we have a complete GNU system so that we can compile the libraries with GCC.
On some machines (particularly the SPARC), certain types of arguments are passed “by invisible reference”. This means that the value is stored in memory, and the address of the memory location is passed to the subroutine.
If you use longjmp
, beware of automatic variables. ISO C says that
automatic variables that are not declared volatile
have undefined
values after a longjmp
. And this is all GCC promises to do,
because it is very difficult to restore register variables correctly, and
one of GCC's features is that it can put variables in registers without
your asking it to.
GCC provides a low-level runtime library, libgcc.a or libgcc_s.so.1 on some platforms. GCC generates calls to routines in this library automatically, whenever it needs to perform some operation that is too complicated to emit inline code for.
Most of the routines in libgcc
handle arithmetic operations
that the target processor cannot perform directly. This includes
integer multiply and divide on some machines, and all floating-point
and fixed-point operations on other machines. libgcc
also includes
routines for exception handling, and a handful of miscellaneous operations.
Some of these routines can be defined in mostly machine-independent C. Others must be hand-written in assembly language for each processor that needs them.
GCC will also generate calls to C library routines, such as
memcpy
and memset
, in some cases. The set of routines
that GCC may possibly use is documented in Other Builtins.
These routines take arguments and return values of a specific machine
mode, not a specific C type. See Machine Modes, for an explanation
of this concept. For illustrative purposes, in this chapter the
floating point type float
is assumed to correspond to SFmode
;
double
to DFmode
; and long double
to both
TFmode
and XFmode
. Similarly, the integer types int
and unsigned int
correspond to SImode
; long
and
unsigned long
to DImode
; and long long
and
unsigned long long
to TImode
.
The integer arithmetic routines are used on platforms that don't provide hardware support for arithmetic operations on some modes.
These functions return the result of shifting a left by b bits.
These functions return the result of arithmetically shifting a right by b bits.
These functions return the quotient of the signed division of a and b.
These functions return the result of logically shifting a right by b bits.
These functions return the remainder of the signed division of a and b.
These functions return the product of a and b.
These functions return the negation of a.
These functions return the quotient of the unsigned division of a and b.
These functions calculate both the quotient and remainder of the unsigned division of a and b. The return value is the quotient, and the remainder is placed in variable pointed to by c.
These functions return the remainder of the unsigned division of a and b.
The following functions implement integral comparisons. These functions implement a low-level compare, upon which the higher level comparison operators (such as less than and greater than or equal to) can be constructed. The returned values lie in the range zero to two, to allow the high-level operators to be implemented by testing the returned result using either signed or unsigned comparison.
These functions perform a signed comparison of a and b. If a is less than b, they return 0; if a is greater than b, they return 2; and if a and b are equal they return 1.
These functions perform an unsigned comparison of a and b. If a is less than b, they return 0; if a is greater than b, they return 2; and if a and b are equal they return 1.
The following functions implement trapping arithmetic. These functions
call the libc function abort
upon signed arithmetic overflow.
These functions return the absolute value of a.
These functions return the sum of a and b; that is a
+
b.
The functions return the product of a and b; that is a
*
b.
These functions return the negation of a; that is
-
a.
These functions return the difference between b and a; that is a
-
b.
These functions return the number of leading 0-bits in a, starting at the most significant bit position. If a is zero, the result is undefined.
These functions return the number of trailing 0-bits in a, starting at the least significant bit position. If a is zero, the result is undefined.
These functions return the index of the least significant 1-bit in a, or the value zero if a is zero. The least significant bit is index one.
These functions return the value zero if the number of bits set in a is even, and the value one otherwise.
These functions return the number of bits set in a.
These functions return the a byteswapped.
The software floating point library is used on machines which do not have hardware support for floating point. It is also used whenever -msoft-float is used to disable generation of floating point instructions. (Not all targets support this switch.)
For compatibility with other compilers, the floating point emulation
routines can be renamed with the DECLARE_LIBRARY_RENAMES
macro
(see Library Calls). In this section, the default names are used.
Presently the library does not support XFmode
, which is used
for long double
on some architectures.
These functions return the sum of a and b.
These functions return the difference between b and a; that is, a - b.
These functions return the product of a and b.
These functions return the quotient of a and b; that is, a / b.
These functions return the negation of a. They simply flip the sign bit, so they can produce negative zero and negative NaN.
These functions extend a to the wider mode of their return type.
These functions truncate a to the narrower mode of their return type, rounding toward zero.
These functions convert a to a signed integer, rounding toward zero.
These functions convert a to a signed long, rounding toward zero.
These functions convert a to a signed long long, rounding toward zero.
These functions convert a to an unsigned integer, rounding toward zero. Negative values all become zero.
These functions convert a to an unsigned long, rounding toward zero. Negative values all become zero.
These functions convert a to an unsigned long long, rounding toward zero. Negative values all become zero.
These functions convert i, a signed integer, to floating point.
These functions convert i, a signed long, to floating point.
These functions convert i, a signed long long, to floating point.
These functions convert i, an unsigned integer, to floating point.
These functions convert i, an unsigned long, to floating point.
These functions convert i, an unsigned long long, to floating point.
There are two sets of basic comparison functions.
These functions calculate a <=> b. That is, if a is less than b, they return −1; if a is greater than b, they return 1; and if a and b are equal they return 0. If either argument is NaN they return 1, but you should not rely on this; if NaN is a possibility, use one of the higher-level comparison functions.
These functions return a nonzero value if either argument is NaN, otherwise 0.
There is also a complete group of higher level functions which correspond directly to comparison operators. They implement the ISO C semantics for floating-point comparisons, taking NaN into account. Pay careful attention to the return values defined for each set. Under the hood, all of these routines are implemented as
if (__unordXf2 (a, b)) return E; return __cmpXf2 (a, b);
where E is a constant chosen to give the proper behavior for NaN. Thus, the meaning of the return value is different for each set. Do not rely on this implementation; only the semantics documented below are guaranteed.
These functions return zero if neither argument is NaN, and a and b are equal.
These functions return a nonzero value if either argument is NaN, or if a and b are unequal.
These functions return a value greater than or equal to zero if neither argument is NaN, and a is greater than or equal to b.
These functions return a value less than zero if neither argument is NaN, and a is strictly less than b.
These functions return a value less than or equal to zero if neither argument is NaN, and a is less than or equal to b.
These functions return a value greater than zero if neither argument is NaN, and a is strictly greater than b.
These functions convert raise a to the power b.
These functions return the product of a + ib and c + id, following the rules of C99 Annex G.
These functions return the quotient of a + ib and c + id (i.e., (a + ib) / (c + id)), following the rules of C99 Annex G.
The software decimal floating point library implements IEEE 754-2008 decimal floating point arithmetic and is only activated on selected targets.
The software decimal floating point library supports either DPD (Densely Packed Decimal) or BID (Binary Integer Decimal) encoding as selected at configure time.
These functions return the sum of a and b.
These functions return the difference between b and a; that is, a - b.
These functions return the product of a and b.
These functions return the quotient of a and b; that is, a / b.
These functions return the negation of a. They simply flip the sign bit, so they can produce negative zero and negative NaN.
These functions convert the value a from one decimal floating type to another.
These functions convert the value of a from a binary floating type to a decimal floating type of a different size.
These functions convert the value of a from a decimal floating type to a binary floating type of a different size.
These functions convert the value of a between decimal and binary floating types of the same size.
These functions convert a to a signed integer.
These functions convert a to a signed long.
These functions convert a to an unsigned integer. Negative values all become zero.
These functions convert a to an unsigned long. Negative values all become zero.
These functions convert i, a signed integer, to decimal floating point.
These functions convert i, a signed long, to decimal floating point.
These functions convert i, an unsigned integer, to decimal floating point.
These functions convert i, an unsigned long, to decimal floating point.
These functions return a nonzero value if either argument is NaN, otherwise 0.
There is also a complete group of higher level functions which correspond directly to comparison operators. They implement the ISO C semantics for floating-point comparisons, taking NaN into account. Pay careful attention to the return values defined for each set. Under the hood, all of these routines are implemented as
if (__bid_unordXd2 (a, b)) return E; return __bid_cmpXd2 (a, b);
where E is a constant chosen to give the proper behavior for NaN. Thus, the meaning of the return value is different for each set. Do not rely on this implementation; only the semantics documented below are guaranteed.
These functions return zero if neither argument is NaN, and a and b are equal.
These functions return a nonzero value if either argument is NaN, or if a and b are unequal.
These functions return a value greater than or equal to zero if neither argument is NaN, and a is greater than or equal to b.
These functions return a value less than zero if neither argument is NaN, and a is strictly less than b.
These functions return a value less than or equal to zero if neither argument is NaN, and a is less than or equal to b.
These functions return a value greater than zero if neither argument is NaN, and a is strictly greater than b.
The software fixed-point library implements fixed-point fractional arithmetic, and is only activated on selected targets.
For ease of comprehension fract
is an alias for the
_Fract
type, accum
an alias for _Accum
, and
sat
an alias for _Sat
.
For illustrative purposes, in this section the fixed-point fractional type
short fract
is assumed to correspond to machine mode QQmode
;
unsigned short fract
to UQQmode
;
fract
to HQmode
;
unsigned fract
to UHQmode
;
long fract
to SQmode
;
unsigned long fract
to USQmode
;
long long fract
to DQmode
;
and unsigned long long fract
to UDQmode
.
Similarly the fixed-point accumulator type
short accum
corresponds to HAmode
;
unsigned short accum
to UHAmode
;
accum
to SAmode
;
unsigned accum
to USAmode
;
long accum
to DAmode
;
unsigned long accum
to UDAmode
;
long long accum
to TAmode
;
and unsigned long long accum
to UTAmode
.
These functions return the sum of a and b.
These functions return the sum of a and b with signed saturation.
These functions return the sum of a and b with unsigned saturation.
These functions return the difference of a and b; that is, a
-
b.
These functions return the difference of a and b with signed saturation; that is, a
-
b.
These functions return the difference of a and b with unsigned saturation; that is, a
-
b.
These functions return the product of a and b.
These functions return the product of a and b with signed saturation.
These functions return the product of a and b with unsigned saturation.
These functions return the quotient of the signed division of a and b.
These functions return the quotient of the unsigned division of a and b.
These functions return the quotient of the signed division of a and b with signed saturation.
These functions return the quotient of the unsigned division of a and b with unsigned saturation.
These functions return the negation of a.
These functions return the negation of a with signed saturation.
These functions return the negation of a with unsigned saturation.
These functions return the result of shifting a left by b bits.
These functions return the result of arithmetically shifting a right by b bits.
These functions return the result of logically shifting a right by b bits.
These functions return the result of shifting a left by b bits with signed saturation.
These functions return the result of shifting a left by b bits with unsigned saturation.
The following functions implement fixed-point comparisons. These functions implement a low-level compare, upon which the higher level comparison operators (such as less than and greater than or equal to) can be constructed. The returned values lie in the range zero to two, to allow the high-level operators to be implemented by testing the returned result using either signed or unsigned comparison.
These functions perform a signed or unsigned comparison of a and b (depending on the selected machine mode). If a is less than b, they return 0; if a is greater than b, they return 2; and if a and b are equal they return 1.
These functions convert from fractional and signed non-fractionals to fractionals and signed non-fractionals, without saturation.
The functions convert from fractional and signed non-fractionals to fractionals, with saturation.
These functions convert from fractionals to unsigned non-fractionals; and from unsigned non-fractionals to fractionals, without saturation.
These functions convert from unsigned non-fractionals to fractionals, with saturation.
document me!
_Unwind_DeleteException _Unwind_Find_FDE _Unwind_ForcedUnwind _Unwind_GetGR _Unwind_GetIP _Unwind_GetLanguageSpecificData _Unwind_GetRegionStart _Unwind_GetTextRelBase _Unwind_GetDataRelBase _Unwind_RaiseException _Unwind_Resume _Unwind_SetGR _Unwind_SetIP _Unwind_FindEnclosingFunction _Unwind_SjLj_Register _Unwind_SjLj_Unregister _Unwind_SjLj_RaiseException _Unwind_SjLj_ForcedUnwind _Unwind_SjLj_Resume __deregister_frame __deregister_frame_info __deregister_frame_info_bases __register_frame __register_frame_info __register_frame_info_bases __register_frame_info_table __register_frame_info_table_bases __register_frame_table
This function clears the instruction cache between beg and end.
When using -fsplit-stack, this call may be used to iterate over the stack segments. It may be called like this:
void *next_segment = NULL; void *next_sp = NULL; void *initial_sp = NULL; void *stack; size_t stack_size; while ((stack = __splitstack_find (next_segment, next_sp, &stack_size, &next_segment, &next_sp, &initial_sp)) != NULL) { /* Stack segment starts at stack and is stack_size bytes long. */ }There is no way to iterate over the stack segments of a different thread. However, what is permitted is for one thread to call this with the segment_arg and sp arguments NULL, to pass next_segment, next_sp, and initial_sp to a different thread, and then to suspend one way or another. A different thread may run the subsequent
__splitstack_find
iterations. Of course, this will only work if the first thread is suspended while the second thread is calling__splitstack_find
. If not, the second thread could be looking at the stack while it is changing, and anything could happen.
Internal variables used by the -fsplit-stack implementation.
The interface to front ends for languages in GCC, and in particular
the tree
structure (see GENERIC), was initially designed for
C, and many aspects of it are still somewhat biased towards C and
C-like languages. It is, however, reasonably well suited to other
procedural languages, and front ends for many such languages have been
written for GCC.
Writing a compiler as a front end for GCC, rather than compiling directly to assembler or generating C code which is then compiled by GCC, has several advantages:
Because of the advantages of writing a compiler as a GCC front end, GCC front ends have also been created for languages very different from those for which GCC was designed, such as the declarative logic/functional language Mercury. For these reasons, it may also be useful to implement compilers created for specialized purposes (for example, as part of a research project) as GCC front ends.
This chapter describes the structure of the GCC source tree, and how GCC is built. The user documentation for building and installing GCC is in a separate manual (http://gcc.gnu.org/install/), with which it is presumed that you are familiar.
The configure and build process has a long and colorful history, and can be confusing to anyone who doesn't know why things are the way they are. While there are other documents which describe the configuration process in detail, here are a few things that everyone working on GCC should know.
There are three system names that the build knows about: the machine you are building on (build), the machine that you are building for (host), and the machine that GCC will produce code for (target). When you configure GCC, you specify these with --build=, --host=, and --target=.
Specifying the host without specifying the build should be avoided, as configure may (and once did) assume that the host you specify is also the build, which may not be true.
If build, host, and target are all the same, this is called a native. If build and host are the same but target is different, this is called a cross. If build, host, and target are all different this is called a canadian (for obscure reasons dealing with Canada's political party and the background of the person working on the build at that time). If host and target are the same, but build is different, you are using a cross-compiler to build a native for a different system. Some people call this a host-x-host, crossed native, or cross-built native. If build and target are the same, but host is different, you are using a cross compiler to build a cross compiler that produces code for the machine you're building on. This is rare, so there is no common way of describing it. There is a proposal to call this a crossback.
If build and host are the same, the GCC you are building will also be
used to build the target libraries (like libstdc++
). If build and host
are different, you must have already built and installed a cross
compiler that will be used to build the target libraries (if you
configured with --target=foo-bar, this compiler will be called
foo-bar-gcc).
In the case of target libraries, the machine you're building for is the
machine you specified with --target. So, build is the machine
you're building on (no change there), host is the machine you're
building for (the target libraries are built for the target, so host is
the target you specified), and target doesn't apply (because you're not
building a compiler, you're building libraries). The configure/make
process will adjust these variables as needed. It also sets
$with_cross_host
to the original --host value in case you
need it.
The libiberty
support library is built up to three times: once
for the host, once for the target (even if they are the same), and once
for the build if build and host are different. This allows it to be
used by all programs which are generated in the course of the build
process.
The top level source directory in a GCC distribution contains several files and directories that are shared with other software distributions such as that of GNU Binutils. It also contains several subdirectories that contain parts of GCC and its runtime libraries:
libiberty
library.
libintl
, from GNU gettext
, for systems which do not
include it in libc
.
__sync
and __atomic
).
libffi
library, used as part of the Java runtime library.
libiberty
library, used for portability and for some
generally useful data structures and algorithms. See Introduction, for more information
about this library.
gccadmin
account on gcc.gnu.org
.
zlib
compression library, used by the Java front end, as
part of the Java runtime library, and for compressing and uncompressing
GCC's intermediate language in LTO object files.
The build system in the top level directory, including how recursion into subdirectories works and how building runtime libraries for multilibs is handled, is documented in a separate manual, included with GNU Binutils. See GNU configure and build system, for details.
The gcc directory contains many files that are part of the C sources of GCC, other files used as part of the configuration and build process, and subdirectories including documentation and a testsuite. The files that are sources of GCC are documented in a separate chapter. See Passes and Files of the Compiler.
The gcc directory contains the following subdirectories:
The gcc directory is configured with an Autoconf-generated script configure. The configure script is generated from configure.ac and aclocal.m4. From the files configure.ac and acconfig.h, Autoheader generates the file config.in. The file cstamp-h.in is used as a timestamp.
configure uses some other scripts to help in its work:
The config.build file contains specific rules for particular systems which GCC is built on. This should be used as rarely as possible, as the behavior of the build system can always be detected by autoconf.
The config.host file contains specific rules for particular systems which GCC will run on. This is rarely needed.
The config.gcc file contains specific rules for particular systems which GCC will generate code for. This is usually needed.
Each file has a list of the shell variables it sets, with descriptions, at the top of the file.
FIXME: document the contents of these files, and what variables should be set to control build, host and target configuration.
configure
Here we spell out what files will be set up by configure in the gcc directory. Some other files are created as temporary files in the configuration process, and are not used in the subsequent build; these are not documented.
outputs
, then
the files listed in outputs
there are also generated.
The following configuration headers are created from the Makefile,
using mkconfig.sh, rather than directly by configure.
config.h, bconfig.h and tconfig.h all contain the
xm-machine.h header, if any, appropriate to the host,
build and target machines respectively, the configuration headers for
the target, and some definitions; for the host and build machines,
these include the autoconfigured headers generated by
configure. The other configuration headers are determined by
config.gcc. They also contain the typedefs for rtx
,
rtvec
and tree
.
#ifdef RTX_CODE
and #ifdef
TREE_CODE
conditional code segements. The
machine-protos.h is included after the rtl.h
and/or tree.h would have been included. The tm_p.h also
includes the header tm-preds.h which is generated by
genpreds program during the build to define the declarations
and inline functions for the predicate functions.
FIXME: describe the build system, including what is built in what stages. Also list the various source files that are used in the build process but aren't source files of GCC itself and so aren't documented below (see Passes).
These targets are available from the ‘gcc’ directory:
all
doc
dvi
pdf
html
man
info
mostlyclean
clean
distclean
maintainer-clean
srcextra
srcinfo
srcman
install
uninstall
check
make check-gcc RUNTESTFLAGS="execute.exp=19980413-*"
Note that running the testsuite may require additional tools be installed, such as Tcl or DejaGnu.
The toplevel tree from which you start GCC compilation is not the GCC directory, but rather a complex Makefile that coordinates the various steps of the build, including bootstrapping the compiler and using the new compiler to build target libraries.
When GCC is configured for a native configuration, the default action for make is to do a full three-stage bootstrap. This means that GCC is built three times—once with the native compiler, once with the native-built compiler it just built, and once with the compiler it built the second time. In theory, the last two should produce the same results, which ‘make compare’ can check. Each stage is configured separately and compiled into a separate directory, to minimize problems due to ABI incompatibilities between the native compiler and GCC.
If you do a change, rebuilding will also start from the first stage and “bubble” up the change through the three stages. Each stage is taken from its build directory (if it had been built previously), rebuilt, and copied to its subdirectory. This will allow you to, for example, continue a bootstrap after fixing a bug which causes the stage2 build to crash. It does not provide as good coverage of the compiler as bootstrapping from scratch, but it ensures that the new code is syntactically correct (e.g., that you did not use GCC extensions by mistake), and avoids spurious bootstrap comparison failures1.
Other targets available from the top level include:
bootstrap-lean
bootstrap
, except that the various stages are removed once
they're no longer needed. This saves disk space.
bootstrap2
bootstrap2-lean
stage
N-bubble (
N = 1...4, profile, feedback)
all-stage
N (
N = 1...4, profile, feedback)
cleanstrap
compare
profiledbootstrap
restrap
stage
N-start (
N = 1...4, profile, feedback)
You will invoke this target if you need to test or debug the
stageN GCC. If you only need to execute GCC (but you need
not run ‘make’ either to rebuild it or to run test suites),
you should be able to work directly in the stageN-gcc
directory. This makes it easier to debug multiple stages in
parallel.
stage
If you wish to use non-default GCC flags when compiling the stage2 and
stage3 compilers, set BOOT_CFLAGS
on the command line when doing
‘make’.
Usually, the first stage only builds the languages that the compiler
is written in: typically, C and maybe Ada. If you are debugging a
miscompilation of a different stage2 front-end (for example, of the
Fortran front-end), you may want to have front-ends for other languages
in the first stage as well. To do so, set STAGE1_LANGUAGES
on the command line when doing ‘make’.
For example, in the aforementioned scenario of debugging a Fortran front-end miscompilation caused by the stage1 compiler, you may need a command like
make stage2-bubble STAGE1_LANGUAGES=c,fortran
Alternatively, you can use per-language targets to build and test languages that are not enabled by default in stage1. For example, make f951 will build a Fortran compiler even in the stage1 build directory.
FIXME: list here, with explanation, all the C source files and headers under the gcc directory that aren't built into the GCC executable but rather are part of runtime libraries and object files, such as crtstuff.c and unwind-dw2.c. See Headers Installed by GCC, for more information about the ginclude directory.
In general, GCC expects the system C library to provide most of the headers to be used with it. However, GCC will fix those headers if necessary to make them work with GCC, and will install some headers required of freestanding implementations. These headers are installed in libsubdir/include. Headers for non-C runtime libraries are also installed by GCC; these are not documented here. (FIXME: document them somewhere.)
Several of the headers GCC installs are in the ginclude
directory. These headers, iso646.h,
stdarg.h, stdbool.h, and stddef.h,
are installed in libsubdir/include,
unless the target Makefile fragment (see Target Fragment)
overrides this by setting USER_H
.
In addition to these headers and those generated by fixing system
headers to work with GCC, some other headers may also be installed in
libsubdir/include. config.gcc may set
extra_headers
; this specifies additional headers under
config to be installed on some systems.
GCC installs its own version of <float.h>
, from ginclude/float.h.
This is done to cope with command-line options that change the
representation of floating point numbers.
GCC also installs its own version of <limits.h>
; this is generated
from glimits.h, together with limitx.h and
limity.h if the system also has its own version of
<limits.h>
. (GCC provides its own header because it is
required of ISO C freestanding implementations, but needs to include
the system header from its own header as well because other standards
such as POSIX specify additional values to be defined in
<limits.h>
.) The system's <limits.h>
header is used via
libsubdir/include/syslimits.h, which is copied from
gsyslimits.h if it does not need fixing to work with GCC; if it
needs fixing, syslimits.h is the fixed copy.
GCC can also install <tgmath.h>
. It will do this when
config.gcc sets use_gcc_tgmath
to yes
.
The main GCC documentation is in the form of manuals in Texinfo format. These are installed in Info format; DVI versions may be generated by ‘make dvi’, PDF versions by ‘make pdf’, and HTML versions by ‘make html’. In addition, some man pages are generated from the Texinfo manuals, there are some other text files with miscellaneous documentation, and runtime libraries have their own documentation outside the gcc directory. FIXME: document the documentation for runtime libraries somewhere.
The manuals for GCC as a whole, and the C and C++ front ends, are in files doc/*.texi. Other front ends have their own manuals in files language/*.texi. Common files doc/include/*.texi are provided which may be included in multiple manuals; the following files are in doc/include:
DVI-formatted manuals are generated by ‘make dvi’, which uses
texi2dvi (via the Makefile macro $(TEXI2DVI)
).
PDF-formatted manuals are generated by ‘make pdf’, which uses
texi2pdf (via the Makefile macro $(TEXI2PDF)
). HTML
formatted manuals are generated by ‘make html’. Info
manuals are generated by ‘make info’ (which is run as part of
a bootstrap); this generates the manuals in the source directory,
using makeinfo via the Makefile macro $(MAKEINFO)
,
and they are included in release distributions.
Manuals are also provided on the GCC web site, in both HTML and
PostScript forms. This is done via the script
maintainer-scripts/update_web_docs_svn. Each manual to be
provided online must be listed in the definition of MANUALS
in
that file; a file name.texi must only appear once in the
source tree, and the output manual must have the same name as the
source file. (However, other Texinfo files, included in manuals but
not themselves the root files of manuals, may have names that appear
more than once in the source tree.) The manual file
name.texi should only include other files in its own
directory or in doc/include. HTML manuals will be generated by
‘makeinfo --html’, PostScript manuals by texi2dvi
and dvips, and PDF manuals by texi2pdf.
All Texinfo files that are parts of manuals must
be version-controlled, even if they are generated files, for the
generation of online manuals to work.
The installation manual, doc/install.texi, is also provided on the GCC web site. The HTML version is generated by the script doc/install.texi2html.
Because of user demand, in addition to full Texinfo manuals, man pages are provided which contain extracts from those manuals. These man pages are generated from the Texinfo manuals using contrib/texi2pod.pl and pod2man. (The man page for g++, cp/g++.1, just contains a ‘.so’ reference to gcc.1, but all the other man pages are generated from Texinfo manuals.)
Because many systems may not have the necessary tools installed to generate the man pages, they are only generated if the configure script detects that recent enough tools are installed, and the Makefiles allow generating man pages to fail without aborting the build. Man pages are also included in release distributions. They are generated in the source directory.
Magic comments in Texinfo files starting ‘@c man’ control what parts of a Texinfo file go into a man page. Only a subset of Texinfo is supported by texi2pod.pl, and it may be necessary to add support for more Texinfo features to this script when generating new man pages. To improve the man page output, some special Texinfo macros are provided in doc/include/gcc-common.texi which texi2pod.pl understands:
@gcctabopt
@gccoptlist
@gol
FIXME: describe the texi2pod.pl input language and magic comments in more detail.
In addition to the formal documentation that is installed by GCC, there are several other text files in the gcc subdirectory with miscellaneous documentation:
FIXME: document such files in subdirectories, at least config, c, cp, objc, testsuite.
A front end for a language in GCC has the following parts:
default_compilers
in gcc.c for source file
suffixes for that language.
If the front end is added to the official GCC source repository, the following are also necessary:
A front end language directory contains the source files of that front end (but not of any runtime libraries, which should be outside the gcc directory). This includes documentation, and possibly some subsidiary programs built alongside the front end. Certain files are special and other parts of the compiler depend on their names:
default_compilers
in
gcc.c which override the default of giving an error that a
compiler for that language is not installed.
Each language subdirectory contains a config-lang.in file. This file is a shell script that may define some variables describing the language:
language
lang_requires
language
settings). For example, the
Java front end depends on the C++ front end, so sets
‘lang_requires=c++’.
subdir_requires
target_libs
target-libobjc
.
lang_dirs
build_by_default
boot_language
compilers
outputs
gtfiles
Each language subdirectory contains a Make-lang.in file. It contains
targets lang.
hook (where lang is the
setting of language
in config-lang.in) for the following
values of hook, and any other Makefile rules required to
build those targets (which may if necessary use other Makefiles
specified in outputs
in config-lang.in, although this is
deprecated). It also adds any testsuite targets that can use the
standard rule in gcc/Makefile.in to the variable
lang_checks
.
all.cross
start.encap
rest.encap
tags
info
dvi
$(TEXI2DVI)
, with appropriate
-I arguments pointing to directories of included files.
pdf
$(TEXI2PDF)
, with appropriate
-I arguments pointing to directories of included files.
html
man
install-common
compilers
in
config-lang.in.
install-info
install-man
install-plugin
srcextra
srcinfo
srcman
uninstall
mostlyclean
clean
distclean
maintainer-clean
maintainer-clean
should delete
all generated files in the source directory that are not version-controlled,
but should not delete anything that is.
Make-lang.in must also define a variable lang_OBJS
to a list of host object files that are used by that language.
A back end for a target architecture in GCC has the following parts:
extra_options
variable in
config.gcc. See Options.
__attribute__
), including where the
same attribute is already supported on some targets, which are
enumerated in the manual.
libstdc++
porting
manual needs to be installed as info for this to work, or to be a
chapter of this manual.
If the back end is added to the official GCC source repository, the following are also necessary:
GCC contains several testsuites to help maintain compiler quality. Most of the runtime libraries and language front ends in GCC have testsuites. Currently only the C language testsuites are documented here; FIXME: document the others.
In general, C testcases have a trailing -n.c, starting with -1.c, in case other testcases with similar names are added later. If the test is a test of some well-defined feature, it should have a name referring to that feature such as feature-1.c. If it does not test a well-defined feature but just happens to exercise a bug somewhere in the compiler, and a bug report has been filed for this bug in the GCC bug database, prbug-number-1.c is the appropriate form of name. Otherwise (for miscellaneous bugs not filed in the GCC bug database), and previously more generally, test cases are named after the date on which they were added. This allows people to tell at a glance whether a test failure is because of a recently found bug that has not yet been fixed, or whether it may be a regression, but does not give any other information about the bug or where discussion of it may be found. Some other language testsuites follow similar conventions.
In the gcc.dg testsuite, it is often necessary to test that an error is indeed a hard error and not just a warning—for example, where it is a constraint violation in the C standard, which must become an error with -pedantic-errors. The following idiom, where the first line shown is line line of the file and the line that generates the error, is used for this:
/* { dg-bogus "warning" "warning in place of error" } */ /* { dg-error "regexp" "message" { target *-*-* } line } */
It may be necessary to check that an expression is an integer constant expression and has a certain value. To check that E has value V, an idiom similar to the following is used:
char x[((E) == (V) ? 1 : -1)];
In gcc.dg tests, __typeof__
is sometimes used to make
assertions about the types of expressions. See, for example,
gcc.dg/c99-condexpr-1.c. The more subtle uses depend on the
exact rules for the types of conditional expressions in the C
standard; see, for example, gcc.dg/c99-intconst-1.c.
It is useful to be able to test that optimizations are being made
properly. This cannot be done in all cases, but it can be done where
the optimization will lead to code being optimized away (for example,
where flow analysis or alias analysis should show that certain code
cannot be called) or to functions not being called because they have
been expanded as built-in functions. Such tests go in
gcc.c-torture/execute. Where code should be optimized away, a
call to a nonexistent function such as link_failure ()
may be
inserted; a definition
#ifndef __OPTIMIZE__ void link_failure (void) { abort (); } #endif
will also be needed so that linking still succeeds when the test is
run without optimization. When all calls to a built-in function
should have been optimized and no calls to the non-built-in version of
the function should remain, that function may be defined as
static
to call abort ()
(although redeclaring a function
as static may not work on all targets).
All testcases must be portable. Target-specific testcases must have appropriate code to avoid causing failures on unsupported systems; unfortunately, the mechanisms for this differ by directory.
FIXME: discuss non-C testsuites here.
Test directives appear within comments in a test source file and begin
with dg-
. Some of these are defined within DejaGnu and others
are local to the GCC testsuite.
The order in which test directives appear in a test can be important: directives local to GCC sometimes override information used by the DejaGnu directives, which know nothing about the GCC directives, so the DejaGnu directives must precede GCC directives.
Several test directives include selectors (see Selectors)
which are usually preceded by the keyword target
or xfail
.
{ dg-do
do-what-keyword [{ target/xfail
selector }] }
preprocess
compile
assemble
link
run
The default is compile
. That can be overridden for a set of
tests by redefining dg-do-what-default
within the .exp
file for those tests.
If the directive includes the optional ‘{ target selector }’ then the test is skipped unless the target system matches the selector.
If do-what-keyword is run
and the directive includes
the optional ‘{ xfail selector }’ and the selector is met
then the test is expected to fail. The xfail
clause is ignored
for other values of do-what-keyword; those tests can use
directive dg-xfail-if
.
{ dg-options
options [{ target
selector }] }
{ dg-add-options
feature ... }
dg-options
directives.
For supported values of feature see Add Options.
{ dg-additional-options
options [{ target
selector }] }
The normal timeout limit, in seconds, is found by searching the following in order:
dg-timeout
directive in
the test
{ dg-timeout
n [{target
selector }] }
{ dg-timeout-factor
x [{ target
selector }] }
{ dg-skip-if
comment {
selector } [{
include-opts } [{
exclude-opts }]] }
For example, to skip a test if option -Os
is present:
/* { dg-skip-if "" { *-*-* } { "-Os" } { "" } } */
To skip a test if both options -O2
and -g
are present:
/* { dg-skip-if "" { *-*-* } { "-O2 -g" } { "" } } */
To skip a test if either -O2
or -O3
is present:
/* { dg-skip-if "" { *-*-* } { "-O2" "-O3" } { "" } } */
To skip a test unless option -Os
is present:
/* { dg-skip-if "" { *-*-* } { "*" } { "-Os" } } */
To skip a test if either -O2
or -O3
is used with -g
but not if -fpic
is also present:
/* { dg-skip-if "" { *-*-* } { "-O2 -g" "-O3 -g" } { "-fpic" } } */
{ dg-require-effective-target
keyword [{
selector }] }
dg-do
directive in the test
and before any dg-additional-sources
directive.
See Effective-Target Keywords.
{ dg-require-
support args }
dg-do
directive in the test
and before any dg-additional-sources
directive.
They require at least one argument, which can be an empty string if the
specific procedure does not examine the argument.
See Require Support, for a complete list of these directives.
{ dg-xfail-if
comment {
selector } [{
include-opts } [{
exclude-opts }]] }
dg-skip-if
) are met. This does not affect the execute step.
{ dg-xfail-run-if
comment {
selector } [{
include-opts } [{
exclude-opts }]] }
dg-skip-if
) are met.
{ dg-shouldfail
comment [{
selector } [{
include-opts } [{
exclude-opts }]]] }
dg-skip-if
) are met.
{ dg-error
regexp [
comment [{ target/xfail
selector } [
line] }]] }
FAIL
message. The check does
not look for the string ‘error’ unless it is part of regexp.
{ dg-warning
regexp [
comment [{ target/xfail
selector } [
line] }]] }
FAIL
message. The check does
not look for the string ‘warning’ unless it is part of regexp.
{ dg-message
regexp [
comment [{ target/xfail
selector } [
line] }]] }
FAIL
message.
{ dg-bogus
regexp [
comment [{ target/xfail
selector } [
line] }]] }
{ dg-excess-errors
comment [{ target/xfail
selector }] }
{ dg-prune-output
regexp }
{ dg-output
regexp [{ target/xfail
selector }] }
{ dg-additional-files "
filelist" }
{ dg-additional-sources "
filelist" }
{ dg-final {
local-directive } }
dg-final
.
Several test directives include selectors to limit the targets for which a test is run or to declare that a test is expected to fail on particular targets.
A selector is:
Depending on the context, the selector specifies whether a test is skipped and reported as unsupported or is expected to fail. A context that allows either ‘target’ or ‘xfail’ also allows ‘{ target selector1 xfail selector2 }’ to skip the test for targets that don't match selector1 and the test to fail for targets that match selector2.
A selector expression appears within curly braces and uses a single logical operator: one of ‘!’, ‘&&’, or ‘||’. An operand is another selector expression, an effective-target keyword, a single target triplet, or a list of target triplets within quotes or curly braces. For example:
{ target { ! "hppa*-*-* ia64*-*-*" } } { target { powerpc*-*-* && lp64 } } { xfail { lp64 || vect_no_align } }
Effective-target keywords identify sets of targets that support particular functionality. They are used to limit tests to be run only for particular targets, or to specify that particular sets of targets are expected to fail some tests.
Effective-target keywords are defined in lib/target-supports.exp in the GCC testsuite, with the exception of those that are documented as being local to a particular test directory.
The ‘effective target’ takes into account all of the compiler options
with which the test will be compiled, including the multilib options.
By convention, keywords ending in _nocache
can also include options
specified for the particular test in an earlier dg-options
or
dg-add-options
directive.
ilp32
int
, long
, and pointers.
lp64
int
, 64-bit long
and pointers.
llp64
int
and long
, 64-bit long long
and pointers.
double64
double
.
double64plus
double
that is 64 bits or longer.
longdouble128
long double
.
int32plus
int
that is at 32 bits or longer.
int16
int
that is 16 bits or shorter.
long_neq_int
int
and long
with different sizes.
large_double
double
that is longer than float
.
large_long_double
long double
that is longer than double
.
ptr32plus
size32plus
4byte_wchar_t
wchar_t
that is at least 4 bytes.
fortran_integer_16
integer
that is 16 bytes or longer.
fortran_large_int
integer
kinds larger than integer(8)
.
fortran_large_real
real
kinds larger than real(8)
.
vect_condition
vect_double
double
.
vect_float
float
.
vect_int
int
.
vect_long
long
.
vect_long_long
long long
.
vect_aligned_arrays
vect_hw_misalign
vect_no_align
vect_no_int_min_max
int
.
vect_no_int_add
int
.
vect_no_bitwise
vect_char_mult
vector char
multiplication.
vect_short_mult
vector short
multiplication.
vect_int_mult
vector int
multiplication.
vect_extract_even_odd
vect_extract_even_odd_wide
SImode
or larger.
vect_interleave
vect_strided
vect_strided_wide
vect_perm
vect_shift
vect_widen_sum_hi_to_si
short
operands
into int
results, or can promote (unpack) from short
to int
.
vect_widen_sum_qi_to_hi
char
operands
into short
results, or can promote (unpack) from char
to short
.
vect_widen_sum_qi_to_si
char
operands
into int
results.
vect_widen_mult_qi_to_hi
char
operands
into short
results, or can promote (unpack) from char
to
short
and perform non-widening multiplication of short
.
vect_widen_mult_hi_to_si
short
operands
into int
results, or can promote (unpack) from short
to
int
and perform non-widening multiplication of int
.
vect_widen_mult_si_to_di_pattern
int
operands
into long
results.
vect_sdot_qi
signed char
.
vect_udot_qi
unsigned char
.
vect_sdot_hi
signed short
.
vect_udot_hi
unsigned short
.
vect_pack_trunc
short
to char
and from int
to short
using modulo arithmetic.
vect_unpack
char
to short
and from char
to int
.
vect_intfloat_cvt
signed int
to float
.
vect_uintfloat_cvt
unsigned int
to float
.
vect_floatint_cvt
float
to signed int
.
vect_floatuint_cvt
float
to unsigned int
.
vect_max_reduc
tls
tls_native
tls_runtime
dfp
dfp_nocache
dfprt
dfprt_nocache
hard_dfp
arm32
arm_eabi
arm_fp_ok
__ARM_FP
using -mfloat-abi=softfp
or
equivalent options. Some multilibs may be incompatible with these
options.
arm_hf_eabi
-mfloat-abi=hard
).
arm_hard_vfp_ok
-mfpu=vfp -mfloat-abi=hard
.
Some multilibs may be incompatible with these options.
arm_iwmmxt_ok
-mcpu=iwmmxt
.
Some multilibs may be incompatible with this option.
arm_neon
arm_tune_string_ops_prefer_neon
arm_neon_hw
arm_neonv2_hw
arm_neon_ok
-mfpu=neon -mfloat-abi=softfp
or compatible
options. Some multilibs may be incompatible with these options.
arm_neonv2_ok
-mfpu=neon-vfpv4 -mfloat-abi=softfp
or compatible
options. Some multilibs may be incompatible with these options.
arm_neon_fp16_ok
-mfpu=neon-fp16 -mfloat-abi=softfp
or compatible
options, including -mfp16-format=ieee
if necessary to obtain the
__fp16
type. Some multilibs may be incompatible with these options.
arm_neon_fp16_hw
arm_thumb1_ok
-mthumb
.
arm_thumb2_ok
-mthumb
.
arm_vfp_ok
-mfpu=vfp -mfloat-abi=softfp
.
Some multilibs may be incompatible with these options.
arm_vfp3_ok
-mfpu=vfp3 -mfloat-abi=softfp
.
Some multilibs may be incompatible with these options.
arm_v8_vfp_ok
-mfpu=fp-armv8 -mfloat-abi=softfp
.
Some multilibs may be incompatible with these options.
arm_v8_neon_ok
-mfpu=neon-fp-armv8 -mfloat-abi=softfp
.
Some multilibs may be incompatible with these options.
arm_v8_1a_neon_ok
arm_v8_1a_neon_hw
arm_prefer_ldrd_strd
LDRD
and STRD
instructions over
LDM
and STM
instructions.
aarch64_asm_<ext>_ok
ext
via the
.arch_extension
pseudo-op.
aarch64_tiny
aarch64_small
aarch64_large
aarch64_little_endian
aarch64_big_endian
aarch64_small_fpic
mips64
nomips16
mips16_attribute
mips_loongson
mips_newabi_large_long_double
long double
larger than double
when using the new ABI.
mpaired_single
-mpaired-single
.
dfp_hw
p8vector_hw
powerpc64
powerpc_altivec
powerpc_altivec_ok
-maltivec
.
powerpc_eabi_ok
-meabi
.
powerpc_elfv2
-mabi=elfv2
.
powerpc_fprs
powerpc_hard_double
powerpc_htm_ok
-mhtm
powerpc_p8vector_ok
-mpower8-vector
powerpc_ppu_ok
-mcpu=cell
.
powerpc_spe
powerpc_spe_nocache
powerpc_spu
powerpc_vsx_ok
-mvsx
.
powerpc_405_nocache
ppc_recip_hw
spu_auto_overlay
vmx_hw
vsx_hw
avx
avx
instructions.
avx_runtime
avx
instructions.
cell_hw
coldfire_fpu
hard_float
non_strict_align
sqrt_insn
sse
sse
instructions.
sse_runtime
sse
instructions.
sse2
sse2
instructions.
sse2_runtime
sse2
instructions.
sync_char_short
char
and short
.
sync_int_long
int
and long
.
ultrasparc_hw
EM_SPARC
executables and chokes on EM_SPARC32PLUS
or EM_SPARCV9
executables.
vect_cmdline_needed
pie_copyreloc
c
c++
c99_runtime
correct_iso_cpp_string_wchar_protos
string.h
and wchar.h
headers provide C++ required
overloads for strchr
etc. functions.
dummy_wcsftime
wcsftime
function that always returns zero.
fd_truncate
ftruncate
or
chsize
.
freestanding
init_priority
inttypes_types
inttypes.h
.
This is for tests that GCC's notions of these types agree with those
in the header, as some systems have only inttypes.h
.
lax_strtofp
mempcpy
mempcpy
function.
mmap
mmap
.
newlib
pow10
pow10
function.
pthread
pthread.h
with no errors or warnings.
pthread_h
pthread.h
.
run_expensive_tests
simulator
stabs
stdint_types
stdint.h
.
This will be obsolete when GCC ensures a working stdint.h
for
all targets.
stpcpy
stpcpy
function.
trampolines
uclibc
unwrapped
vxworks_kernel
vxworks_rtp
wchar
automatic_stack_alignment
cxa_atexit
__cxa_atexit
.
default_packed
fgraphite
fixed_point
fopenacc
fopenmp
fpic
freorder
fstack_protector
gas
gc_sections
gld
keeps_null_pointer_checks
lto
naked_functions
naked
function attribute.
named_sections
natural_alignment_32
target_natural_alignment_64
nonpic
pie_enabled
pcc_bitfield_type_matters
PCC_BITFIELD_TYPE_MATTERS
.
pe_aligned_commons
pie
rdynamic
section_anchors
short_enums
static
static_libgfortran
string_merging
ucn
ucn_nocache
unaligned_stack
STACK_BOUNDARY
is greater than
or equal to the required vector alignment.
vector_alignment_reachable
vector_alignment_reachable_for_64bit
wchar_t_char16_t_compatible
wchar_t
that is compatible with char16_t
.
wchar_t_char32_t_compatible
wchar_t
that is compatible with char32_t
.
comdat_group
gcc.target/i386
3dnow
3dnow
instructions.
aes
aes
instructions.
fma4
fma4
instructions.
ms_hook_prologue
ms_hook_prologue
.
pclmul
pclmul
instructions.
sse3
sse3
instructions.
sse4
sse4
instructions.
sse4a
sse4a
instructions.
ssse3
ssse3
instructions.
vaes
vaes
instructions.
vpclmul
vpclmul
instructions.
xop
xop
instructions.
gcc.target/spu/ea
ealib
__ea
library functions are available.
gcc.test-framework
no
yes
dg-add-options
The supported values of feature for directive dg-add-options
are:
arm_fp
__ARM_FP
definition. Only ARM targets support this feature, and only then
in certain modes; see the arm_fp_ok effective target keyword.
arm_neon
arm_neon_fp16
arm_vfp3
bind_pic_locally
c99_runtime
ieee
mips16_attribute
mips16
function attributes.
Only MIPS targets support this feature, and only then in certain modes.
tls
dg-require-
supportA few of the dg-require
directives take arguments.
dg-require-iconv
codesetdg-require-profiling
profoptdg-require-visibility
visvisibility
attribute.
If vis is ""
, support for visibility("hidden")
is
checked, for visibility("
vis")
otherwise.
The original dg-require
directives were defined before there
was support for effective-target keywords. The directives that do not
take arguments could be replaced with effective-target keywords.
dg-require-alias ""
dg-require-ascii-locale ""
dg-require-compat-dfp ""
dg-require-cxa-atexit ""
__cxa_atexit
.
This is equivalent to dg-require-effective-target cxa_atexit
.
dg-require-dll ""
dg-require-fork ""
fork
.
dg-require-gc-sections ""
--gc-sections
flags.
This is equivalent to dg-require-effective-target gc-sections
.
dg-require-host-local ""
-o a.out
".
dg-require-mkfifo ""
mkfifo
.
dg-require-named-sections ""
dg-require-effective-target named_sections
.
dg-require-weak ""
dg-require-weak-override ""
dg-final
The GCC testsuite defines the following directives to be used within
dg-final
.
scan-file
filename regexp [{ target/xfail
selector }]
scan-file-not
filename regexp [{ target/xfail
selector }]
scan-module
module regexp [{ target/xfail
selector }]
scan-assembler
regex [{ target/xfail
selector }]
scan-assembler-not
regex [{ target/xfail
selector }]
scan-assembler-times
regex num [{ target/xfail
selector }]
scan-assembler-dem
regex [{ target/xfail
selector }]
scan-assembler-dem-not
regex [{ target/xfail
selector }]
scan-hidden
symbol [{ target/xfail
selector }]
scan-not-hidden
symbol [{ target/xfail
selector }]
These commands are available for kind of tree
, rtl
,
and ipa
.
scan-
kind-dump
regex suffix [{ target/xfail
selector }]
scan-
kind-dump-not
regex suffix [{ target/xfail
selector }]
scan-
kind-dump-times
regex num suffix [{ target/xfail
selector }]
scan-
kind-dump-dem
regex suffix [{ target/xfail
selector }]
scan-
kind-dump-dem-not
regex suffix [{ target/xfail
selector }]
output-exists [{ target/xfail
selector }]
output-exists-not [{ target/xfail
selector }]
scan-symbol
regexp [{ target/xfail
selector }]
run-gcov
sourcefilerun-gcov [branches] [calls] {
opts sourcefile }
Usually the test-framework removes files that were generated during testing. If a testcase, for example, uses any dumping mechanism to inspect a passes dump file, the testsuite recognized the dump option passed to the tool and schedules a final cleanup to remove these files.
There are, however, following additional cleanup directives that can be used to annotate a testcase "manually".
cleanup-coverage-files
cleanup-modules "
list-of-extra-modules"
module MoD1 end module MoD1 module Mod2 end module Mod2 module moD3 end module moD3 module mod4 end module mod4 ! { dg-final { cleanup-modules "mod1 mod2" } } ! redundant ! { dg-final { keep-modules "mod3 mod4" } }
keep-modules "
list-of-modules-not-to-delete"
module maybe_unneeded end module maybe_unneeded module keep1 end module keep1 module keep2 end module keep2 ! { dg-final { keep-modules "keep1 keep2" } } ! just keep these two ! { dg-final { keep-modules "" } } ! keep all
dg-keep-saved-temps "
list-of-suffixes-not-to-delete"
// { dg-options "-save-temps -fpch-preprocess -I." } int main() { return 0; } // { dg-keep-saved-temps ".s" } ! just keep assembler file // { dg-keep-saved-temps ".s" ".i" } ! ... and .i // { dg-keep-saved-temps ".ii" ".o" } ! or just .ii and .o
cleanup-profile-file
cleanup-repo-files
The Ada testsuite includes executable tests from the ACATS testsuite, publicly available at http://www.ada-auth.org/acats.html.
These tests are integrated in the GCC testsuite in the
ada/acats directory, and
enabled automatically when running make check
, assuming
the Ada language has been enabled when configuring GCC.
You can also run the Ada testsuite independently, using
make check-ada
, or run a subset of the tests by specifying which
chapter to run, e.g.:
$ make check-ada CHAPTERS="c3 c9"
The tests are organized by directory, each directory corresponding to a chapter of the Ada Reference Manual. So for example, c9 corresponds to chapter 9, which deals with tasking features of the language.
There is also an extra chapter called gcc containing a template for creating new executable tests, although this is deprecated in favor of the gnat.dg testsuite.
The tests are run using two sh scripts: run_acats and run_all.sh. To run the tests using a simulator or a cross target, see the small customization section at the top of run_all.sh.
These tests are run using the build tree: they can be run without doing
a make install
.
GCC contains the following C language testsuites, in the gcc/testsuite directory:
Magic comments determine whether the file
is preprocessed, compiled, linked or run. In these tests, error and warning
message texts are compared against expected texts or regular expressions
given in comments. These tests are run with the options ‘-ansi -pedantic’
unless other options are given in the test. Except as noted below they
are not run with multiple optimization options.
This directory should probably not be used for new tests.
NO_LABEL_VALUES
and STACK_SIZE
are used.
This directory should probably not be used for new tests.
bprob*.c
gcov*.c
i386-pf-*.c
dg-*.c
FIXME: merge in testsuite/README.gcc and discuss the format of test cases and magic comments more.
Runtime tests are executed via ‘make check’ in the target/libjava/testsuite directory in the build tree. Additional runtime tests can be checked into this testsuite.
Regression testing of the core packages in libgcj is also covered by the Mauve testsuite. The Mauve Project develops tests for the Java Class Libraries. These tests are run as part of libgcj testing by placing the Mauve tree within the libjava testsuite sources at libjava/testsuite/libjava.mauve/mauve, or by specifying the location of that tree when invoking ‘make’, as in ‘make MAUVEDIR=~/mauve check’.
To detect regressions, a mechanism in mauve.exp compares the failures for a test run against the list of expected failures in libjava/testsuite/libjava.mauve/xfails from the source hierarchy. Update this file when adding new failing tests to Mauve, or when fixing bugs in libgcj that had caused Mauve test failures.
We encourage developers to contribute test cases to Mauve.
Tests for link-time optimizations usually require multiple source files that are compiled separately, perhaps with different sets of options. There are several special-purpose test directives used for these tests.
{ dg-lto-do
do-what-keyword }
assemble
link
run
The default is assemble
. That can be overridden for a set of
tests by redefining dg-do-what-default
within the .exp
file for those tests.
Unlike dg-do
, dg-lto-do
does not support an optional
‘target’ or ‘xfail’ list. Use dg-skip-if
,
dg-xfail-if
, or dg-xfail-run-if
.
{ dg-lto-options { {
options } [{
options }] } [{ target
selector }]}
{ dg-extra-ld-options
options [{ target
selector }]}
{ dg-suppress-ld-options
options [{ target
selector }]}
Language-independent support for testing gcov, and for checking that branch profiling produces expected values, is provided by the expect file lib/gcov.exp. gcov tests also rely on procedures in lib/gcc-dg.exp to compile and run the test program. A typical gcov test contains the following DejaGnu commands within comments:
{ dg-options "-fprofile-arcs -ftest-coverage" } { dg-do run { target native } } { dg-final { run-gcov sourcefile } }
Checks of gcov output can include line counts, branch percentages,
and call return percentages. All of these checks are requested via
commands that appear in comments in the test's source file.
Commands to check line counts are processed by default.
Commands to check branch percentages and call return percentages are
processed if the run-gcov command has arguments branches
or calls
, respectively. For example, the following specifies
checking both, as well as passing -b to gcov:
{ dg-final { run-gcov branches calls { -b sourcefile } } }
A line count command appears within a comment on the source line
that is expected to get the specified count and has the form
count(
cnt)
. A test should only check line counts for
lines that will get the same count for any architecture.
Commands to check branch percentages (branch
) and call
return percentages (returns
) are very similar to each other.
A beginning command appears on or before the first of a range of
lines that will report the percentage, and the ending command
follows that range of lines. The beginning command can include a
list of percentages, all of which are expected to be found within
the range. A range is terminated by the next command of the same
kind. A command branch(end)
or returns(end)
marks
the end of a range without starting a new one. For example:
if (i > 10 && j > i && j < 20) /* branch(27 50 75) */ /* branch(end) */ foo (i, j);
For a call return percentage, the value specified is the percentage of calls reported to return. For a branch percentage, the value is either the expected percentage or 100 minus that value, since the direction of a branch can differ depending on the target or the optimization level.
Not all branches and calls need to be checked. A test should not check for branches that might be optimized away or replaced with predicated instructions. Don't check for calls inserted by the compiler or ones that might be inlined or optimized away.
A single test can check for combinations of line counts, branch percentages, and call return percentages. The command to check a line count must appear on the line that will report that count, but commands to check branch percentages and call return percentages can bracket the lines that report them.
The file profopt.exp provides language-independent support for checking correct execution of a test built with profile-directed optimization. This testing requires that a test program be built and executed twice. The first time it is compiled to generate profile data, and the second time it is compiled to use the data that was generated during the first execution. The second execution is to verify that the test produces the expected results.
To check that the optimization actually generated better code, a test can be built and run a third time with normal optimizations to verify that the performance is better with the profile-directed optimizations. profopt.exp has the beginnings of this kind of support.
profopt.exp provides generic support for profile-directed optimizations. Each set of tests that uses it provides information about a specific optimization:
tool
profile_option
feedback_option
prof_ext
PROFOPT_OPTIONS
{ dg-final-generate {
local-directive } }
dg-final
, but the
local-directive is run after the generation of profile data.
{ dg-final-use {
local-directive } }
The file compat.exp provides language-independent support for binary compatibility testing. It supports testing interoperability of two compilers that follow the same ABI, or of multiple sets of compiler options that should not affect binary compatibility. It is intended to be used for testsuites that complement ABI testsuites.
A test supported by this framework has three parts, each in a separate source file: a main program and two pieces that interact with each other to split up the functionality being tested.
Within each test, the main program and one functional piece are compiled by the GCC under test. The other piece can be compiled by an alternate compiler. If no alternate compiler is specified, then all three source files are all compiled by the GCC under test. You can specify pairs of sets of compiler options. The first element of such a pair specifies options used with the GCC under test, and the second element of the pair specifies options used with the alternate compiler. Each test is compiled with each pair of options.
compat.exp defines default pairs of compiler options. These can be overridden by defining the environment variable COMPAT_OPTIONS as:
COMPAT_OPTIONS="[list [list {tst1} {alt1}] ...[list {tstn} {altn}]]"
where tsti and alti are lists of options, with tsti
used by the compiler under test and alti used by the alternate
compiler. For example, with
[list [list {-g -O0} {-O3}] [list {-fpic} {-fPIC -O2}]]
,
the test is first built with -g -O0 by the compiler under
test and with -O3 by the alternate compiler. The test is
built a second time using -fpic by the compiler under test
and -fPIC -O2 by the alternate compiler.
An alternate compiler is specified by defining an environment
variable to be the full pathname of an installed compiler; for C
define ALT_CC_UNDER_TEST, and for C++ define
ALT_CXX_UNDER_TEST. These will be written to the
site.exp file used by DejaGnu. The default is to build each
test with the compiler under test using the first of each pair of
compiler options from COMPAT_OPTIONS. When
ALT_CC_UNDER_TEST or
ALT_CXX_UNDER_TEST is same
, each test is built using
the compiler under test but with combinations of the options from
COMPAT_OPTIONS.
To run only the C++ compatibility suite using the compiler under test and another version of GCC using specific compiler options, do the following from objdir/gcc:
rm site.exp make -k \ ALT_CXX_UNDER_TEST=${alt_prefix}/bin/g++ \ COMPAT_OPTIONS="lists as shown above" \ check-c++ \ RUNTESTFLAGS="compat.exp"
A test that fails when the source files are compiled with different compilers, but passes when the files are compiled with the same compiler, demonstrates incompatibility of the generated code or runtime support. A test that fails for the alternate compiler but passes for the compiler under test probably tests for a bug that was fixed in the compiler under test but is present in the alternate compiler.
The binary compatibility tests support a small number of test framework commands that appear within comments in a test file.
dg-require-*
dg-options
dg-xfail-if
Throughout the compiler testsuite there are several directories whose tests are run multiple times, each with a different set of options. These are known as torture tests. lib/torture-options.exp defines procedures to set up these lists:
torture-init
set-torture-options
torture-finish
The .exp file for a set of tests that use torture options must include calls to these three procedures if:
gcc-dg-runtest
and overrides DG_TORTURE_OPTIONS.
-torture
or
${tool}-torture-execute
, where tool is c
,
fortran
, or objc
.
dg-pch
.
It is not necessary for a .exp file that calls gcc-dg-runtest
to call the torture procedures if the tests should use the list in
DG_TORTURE_OPTIONS defined in gcc-dg.exp.
Most uses of torture options can override the default lists by defining TORTURE_OPTIONS or add to the default list by defining ADDITIONAL_TORTURE_OPTIONS. Define these in a .dejagnurc file or add them to the site.exp file; for example
set ADDITIONAL_TORTURE_OPTIONS [list \ { -O2 -ftree-loop-linear } \ { -O2 -fpeel-loops } ]
Most GCC command-line options are described by special option
definition files, the names of which conventionally end in
.opt
. This chapter describes the format of these files.
Option files are a simple list of records in which each field occupies its own line and in which the records themselves are separated by blank lines. Comments may appear on their own line anywhere within the file and are preceded by semicolons. Whitespace is allowed before the semicolon.
The files can contain the following types of record:
cl_target_option
structure.
Var
properties.
gcc_options
structure, but these variables are also stored in
the cl_target_option
structure. The variables are saved in the
target save code and restored in the target restore code.
#ifdef
sequences to properly set up the initialization. These records have
two fields: the string ‘SourceInclude’ and the name of the
include file.
Name(
name)
Enum
option properties.
Type(
type)
Var
.
UnknownError(
message)
UnknownError
, a
generic error message is used. message should contain a single
‘%qs’ format, which will be used to format the invalid argument.
Enum(
name)
String(
string)
Value(
value)
int
) should be used for the given string.
Canonical
DriverOnly
Undocumented
property).
By default, all options beginning with “f”, “W” or “m” are
implicitly assumed to take a “no-” form. This form should not be
listed separately. If an option beginning with one of these letters
does not have a “no-” form, you can use the RejectNegative
property to reject it.
The help text is automatically line-wrapped before being displayed. Normally the name of the option is printed on the left-hand side of the output and the help text is printed on the right. However, if the help text contains a tab character, the text to the left of the tab is used instead of the option's name and the text to the right of the tab forms the help text. This allows you to elaborate on what type of argument the option takes.
target_flags
(see Run-time Target) for
each mask name x and set the macro MASK_
x to the
appropriate bitmask. It will also declare a TARGET_
x
macro that has the value 1 when bit MASK_
x is set and
0 otherwise.
They are primarily intended to declare target masks that are not associated with user options, either because these masks represent internal switches or because the options are not available on all configurations and yet the masks always need to be defined.
The second field of an option record can specify any of the following properties. When an option takes an argument, it is enclosed in parentheses following the option property name. The parser that handles option files is quite simplistic, and will be tricked by any nested parentheses within the argument text itself; in this case, the entire option argument can be wrapped in curly braces within the parentheses to demarcate it, e.g.:
Condition({defined (USE_CYGWIN_LIBSTDCXX_WRAPPERS)})
Common
Target
Driver
It is possible to specify several different languages for the same
option. Each language must have been declared by an earlier
Language
record. See Option file format.
RejectDriver
RejectNegative
Negative(
othername)
Negative
property of the option to be
turned off.
As a consequence, if you have a group of mutually-exclusive
options, their Negative
properties should form a circular chain.
For example, if options -a, -b and
-c are mutually exclusive, their respective Negative
properties should be ‘Negative(b)’, ‘Negative(c)’
and ‘Negative(a)’.
Joined
Separate
Joined
indicates
that the option and argument can be included in the same argv
entry (as with -mflush-func=
name, for example).
Separate
indicates that the option and argument can be
separate argv
entries (as with -o
). An option is
allowed to have both of these properties.
JoinedOrMissing
argv
entry as the option itself.
This property cannot be used alongside Joined
or Separate
.
MissingArgError(
message)
Joined
or Separate
, the message
message will be used as an error message if the mandatory
argument is missing; for options without MissingArgError
, a
generic error message is used. message should contain a single
‘%qs’ format, which will be used to format the name of the option
passed.
Args(
n)
Separate
, indicate that it takes n
arguments. The default is 1.
UInteger
UInteger
should also be used on options like
-falign-loops
where both -falign-loops
and
-falign-loops
=n are supported to make sure the saved
options are given a full integer.
ToLower
Enum
property.
NoDriverArg
Separate
, the option only takes an
argument in the compiler proper, not in the driver. This is for
compatibility with existing options that are used both directly and
via -Wp,; new options should not have this property.
Var(
var)
global_options.x_
var).
The way that the state is stored depends on the type of option:
Mask
or InverseMask
properties,
var is the integer variable that contains the mask.
UInteger
property,
var is an integer variable that stores the value of the argument.
Enum
property,
var is a variable (type given in the Type
property of the
‘Enum’ record whose Name
property has the same argument as
the Enum
property of this option) that stores the value of the
argument.
Defer
property, var is a pointer to
a VEC(cl_deferred_option,heap)
that stores the option for later
processing. (var is declared with type void *
and needs
to be cast to VEC(cl_deferred_option,heap)
before use.)
The option-processing script will usually zero-initialize var.
You can modify this behavior using Init
.
Var(
var,
set)
!
set
when the “no-” form is used.
var is declared in the same way as for the single-argument form
described above.
Init(
value)
Var
property should be statically
initialized to value. If more than one option using the same
variable specifies Init
, all must specify the same initializer.
Mask(
name)
target_flags
variable (see Run-time Target) and is active when that bit is set.
You may also specify Var
to select a variable other than
target_flags
.
The options-processing script will automatically allocate a unique bit
for the option. If the option is attached to ‘target_flags’,
the script will set the macro MASK_
name to the appropriate
bitmask. It will also declare a TARGET_
name macro that has
the value 1 when the option is active and 0 otherwise. If you use Var
to attach the option to a different variable, the bitmask macro with be
called OPTION_MASK_
name.
InverseMask(
othername)
InverseMask(
othername,
thisname)
Mask(
othername)
property. If thisname is given,
the options-processing script will declare a TARGET_
thisname
macro that is 1 when the option is active and 0 otherwise.
Enum(
name)
Defer
Var
,
for later processing.
Alias(
opt)
Alias(
opt,
arg)
Alias(
opt,
posarg,
negarg)
NegativeAlias
). In the first form,
any argument passed to the alias is considered to be passed to
-opt, and -opt is considered to be
negated if the alias is used in negated form. In the second form, the
alias may not be negated or have an argument, and posarg is
considered to be passed as an argument to -opt. In the
third form, the alias may not have an argument, if the alias is used
in the positive form then posarg is considered to be passed to
-opt, and if the alias is used in the negative form
then negarg is considered to be passed to -opt.
Aliases should not specify Var
or Mask
or
UInteger
. Aliases should normally specify the same languages
as the target of the alias; the flags on the target will be used to
determine any diagnostic for use of an option for the wrong language,
while those on the alias will be used to identify what command-line
text is the option and what text is any argument to that option.
When an Alias
definition is used for an option, driver specs do
not need to handle it and no ‘OPT_’ enumeration value is defined
for it; only the canonical form of the option will be seen in those
places.
NegativeAlias
Alias(
opt)
, the option is
considered to be an alias for the positive form of -opt
if negated and for the negative form of -opt if not
negated. NegativeAlias
may not be used with the forms of
Alias
taking more than one argument.
Ignore
Warn
. The option will not be seen by specs and no ‘OPT_’
enumeration value is defined for it.
SeparateAlias
Joined
, Separate
and
Alias
, the option only acts as an alias when passed a separate
argument; with a joined argument it acts as a normal option, with an
‘OPT_’ enumeration value. This is for compatibility with the
Java -d option and should not be used for new options.
Warn(
message)
Warn
, the target of the alias must not also be marked
Warn
.
Report
Warning
Optimization
Var
should be saved and restored when the optimization level is
changed with optimize
attributes.
Undocumented
Condition(
cond)
Save
cl_target_option
structure to hold a copy of the
option, add the functions cl_target_option_save
and
cl_target_option_restore
to save and restore the options.
SetByCombined
gcc_options
struct to
have a field frontend_set_
name, where name
is the name of the field holding the value of this option (without the
leading x_
). This gives the front end a way to indicate that
the value has been set explicitly and should not be changed by the
combined option. For example, some front ends use this to prevent
-ffast-math and -fno-fast-math from changing the
value of -fmath-errno for languages that do not use
errno
.
EnabledBy(
opt)
EnabledBy(
opt ||
opt2)
EnabledBy(
opt &&
opt2)
||
. The third form using &&
specifies that the option is
only set if both opt and opt2 are set. The options opt
and opt2 must have the Common
property; otherwise, use
LangEnabledBy
.
LangEnabledBy(
language,
opt)
LangEnabledBy(
language,
opt,
posarg,
negarg)
||
separated options. In the second form, if
opt is used in the positive form then posarg is considered
to be passed to the option, and if opt is used in the negative
form then negarg is considered to be passed to the option. It
is possible to specify several different languages. Each
language must have been declared by an earlier Language
record. See Option file format.
NoDWARFRecord
PchIgnore
CPP(
var)
Var
and Init
must be set as well.
CppReason(
CPP_W_Enum)
cpplib.h
warning reason code
CPP_W_Enum. This should only be used for warning options of the
C-family front-ends.
This chapter is dedicated to giving an overview of the optimization and code generation passes of the compiler. In the process, it describes some of the language front end interface, though this description is no where near complete.
The language front end is invoked only once, via
lang_hooks.parse_file
, to parse the entire input. The language
front end may use any intermediate language representation deemed
appropriate. The C front end uses GENERIC trees (see GENERIC), plus
a double handful of language specific tree codes defined in
c-common.def. The Fortran front end uses a completely different
private representation.
At some point the front end must translate the representation used in the front end to a representation understood by the language-independent portions of the compiler. Current practice takes one of two forms. The C front end manually invokes the gimplifier (see GIMPLE) on each function, and uses the gimplifier callbacks to convert the language-specific tree nodes directly to GIMPLE before passing the function off to be compiled. The Fortran front end converts from a private representation to GENERIC, which is later lowered to GIMPLE when the function is compiled. Which route to choose probably depends on how well GENERIC (plus extensions) can be made to match up with the source language and necessary parsing data structures.
BUG: Gimplification must occur before nested function lowering, and nested function lowering must be done by the front end before passing the data off to cgraph.
TODO: Cgraph should control nested function lowering. It would only be invoked when it is certain that the outer-most function is used.
TODO: Cgraph needs a gimplify_function callback. It should be invoked when (1) it is certain that the function is used, (2) warning flags specified by the user require some amount of compilation in order to honor, (3) the language indicates that semantic analysis is not complete until gimplification occurs. Hum... this sounds overly complicated. Perhaps we should just have the front end gimplify always; in most cases it's only one function call.
The front end needs to pass all function definitions and top level declarations off to the middle-end so that they can be compiled and emitted to the object file. For a simple procedural language, it is usually most convenient to do this as each top level declaration or definition is seen. There is also a distinction to be made between generating functional code and generating complete debug information. The only thing that is absolutely required for functional code is that function and data definitions be passed to the middle-end. For complete debug information, function, data and type declarations should all be passed as well.
In any case, the front end needs each complete top-level function or
data declaration, and each data definition should be passed to
rest_of_decl_compilation
. Each complete type definition should
be passed to rest_of_type_compilation
. Each function definition
should be passed to cgraph_finalize_function
.
TODO: I know rest_of_compilation currently has all sorts of RTL generation semantics. I plan to move all code generation bits (both Tree and RTL) to compile_function. Should we hide cgraph from the front ends and move back to rest_of_compilation as the official interface? Possibly we should rename all three interfaces such that the names match in some meaningful way and that is more descriptive than "rest_of".
The middle-end will, at its option, emit the function and data definitions immediately or queue them for later processing.
If Cilk Plus generation (flag -fcilkplus) is enabled, all the Cilk Plus code is transformed into equivalent C and C++ functions. Majority of this transformation occurs toward the end of the parsing and right before the gimplification pass.
These are the major components to the Cilk Plus language extension:
ARRAY_NOTATION_REF
tree using the function
c_parser_array_notation
. During the end of parsing, we check the entire
function to see if there are any array notation specific code (using the
function contains_array_notation_expr
). If this function returns
true, then we expand them using either expand_array_notation_exprs
or
build_array_notation_expr
. For the cases where array notations are
inside conditions, they are transformed using the function
fix_conditional_array_notations
. The C language-specific routines are
located in c/c-array-notation.c and the equivalent C++ routines are in
the file cp/cp-array-notation.c. Common routines such as functions to
initialize built-in functions are stored in array-notation-common.c.
_Cilk_spawn
:
The _Cilk_spawn
keyword is parsed and the function it contains is marked
as a spawning function. The spawning function is called the spawner. At
the end of the parsing phase, appropriate built-in functions are
added to the spawner that are defined in the Cilk runtime. The appropriate
locations of these functions, and the internal structures are detailed in
cilk_init_builtins
in the file cilk-common.c. The pointers to
Cilk functions and fields of internal structures are described
in cilk.h. The built-in functions are described in
cilk-builtins.def.
During gimplification, a new "spawn-helper" function is created.
The spawned function is replaced with a spawn helper function in the spawner.
The spawned function-call is moved into the spawn helper. The main function
that does these transformations is gimplify_cilk_spawn
in
c-family/cilk.c. In the spawn-helper, the gimplification function
gimplify_call_expr
, inserts a function call __cilkrts_detach
.
This function is expanded by builtin_expand_cilk_detach
located in
c-family/cilk.c.
_Cilk_sync
:
_Cilk_sync
is parsed like a keyword. During gimplification,
the function gimplify_cilk_sync
in c-family/cilk.c, will replace
this keyword with a set of functions that are stored in the Cilk runtime.
One of the internal functions inserted during gimplification,
__cilkrts_pop_frame
must be expanded by the compiler and is
done by builtin_expand_cilk_pop_frame
in cilk-common.c.
Documentation about Cilk Plus and language specification is provided under the "Learn" section in https://www.cilkplus.org. It is worth mentioning that the current implementation follows ABI 1.1.
Gimplification is a whimsical term for the process of converting the intermediate representation of a function into the GIMPLE language (see GIMPLE). The term stuck, and so words like “gimplification”, “gimplify”, “gimplifier” and the like are sprinkled throughout this section of code.
While a front end may certainly choose to generate GIMPLE directly if it chooses, this can be a moderately complex process unless the intermediate language used by the front end is already fairly simple. Usually it is easier to generate GENERIC trees plus extensions and let the language-independent gimplifier do most of the work.
The main entry point to this pass is gimplify_function_tree
located in gimplify.c. From here we process the entire
function gimplifying each statement in turn. The main workhorse
for this pass is gimplify_expr
. Approximately everything
passes through here at least once, and it is from here that we
invoke the lang_hooks.gimplify_expr
callback.
The callback should examine the expression in question and return
GS_UNHANDLED
if the expression is not a language specific
construct that requires attention. Otherwise it should alter the
expression in some way to such that forward progress is made toward
producing valid GIMPLE. If the callback is certain that the
transformation is complete and the expression is valid GIMPLE, it
should return GS_ALL_DONE
. Otherwise it should return
GS_OK
, which will cause the expression to be processed again.
If the callback encounters an error during the transformation (because
the front end is relying on the gimplification process to finish
semantic checks), it should return GS_ERROR
.
The pass manager is located in passes.c, tree-optimize.c and tree-pass.h. It processes passes as described in passes.def. Its job is to run all of the individual passes in the correct order, and take care of standard bookkeeping that applies to every pass.
The theory of operation is that each pass defines a structure that represents everything we need to know about that pass—when it should be run, how it should be run, what intermediate language form or on-the-side data structures it needs. We register the pass to be run in some particular order, and the pass manager arranges for everything to happen in the correct order.
The actuality doesn't completely live up to the theory at present.
Command-line switches and timevar_id_t
enumerations must still
be defined elsewhere. The pass manager validates constraints but does
not attempt to (re-)generate data structures or lower intermediate
language form based on the requirements of the next pass. Nevertheless,
what is present is useful, and a far sight better than nothing at all.
Each pass should have a unique name. Each pass may have its own dump file (for GCC debugging purposes). Passes with a name starting with a star do not dump anything. Sometimes passes are supposed to share a dump file / option name. To still give these unique names, you can use a prefix that is delimited by a space from the part that is used for the dump file / option name. E.g. When the pass name is "ud dce", the name used for dump file/options is "dce".
TODO: describe the global variables set up by the pass manager, and a brief description of how a new pass should use it. I need to look at what info RTL passes use first...
The following briefly describes the Tree optimization passes that are run after gimplification and what source files they are located in.
This pass is an extremely simple sweep across the gimple code in which
we identify obviously dead code and remove it. Here we do things like
simplify if
statements with constant conditions, remove
exception handling constructs surrounding code that obviously cannot
throw, remove lexical bindings that contain no variables, and other
assorted simplistic cleanups. The idea is to get rid of the obvious
stuff quickly rather than wait until later when it's more work to get
rid of it. This pass is located in tree-cfg.c and described by
pass_remove_useless_stmts
.
If OpenMP generation (-fopenmp) is enabled, this pass lowers OpenMP constructs into GIMPLE.
Lowering of OpenMP constructs involves creating replacement
expressions for local variables that have been mapped using data
sharing clauses, exposing the control flow of most synchronization
directives and adding region markers to facilitate the creation of the
control flow graph. The pass is located in omp-low.c and is
described by pass_lower_omp
.
If OpenMP generation (-fopenmp) is enabled, this pass expands
parallel regions into their own functions to be invoked by the thread
library. The pass is located in omp-low.c and is described by
pass_expand_omp
.
This pass flattens if
statements (COND_EXPR
)
and moves lexical bindings (BIND_EXPR
) out of line. After
this pass, all if
statements will have exactly two goto
statements in its then
and else
arms. Lexical binding
information for each statement will be found in TREE_BLOCK
rather
than being inferred from its position under a BIND_EXPR
. This
pass is found in gimple-low.c and is described by
pass_lower_cf
.
This pass decomposes high-level exception handling constructs
(TRY_FINALLY_EXPR
and TRY_CATCH_EXPR
) into a form
that explicitly represents the control flow involved. After this
pass, lookup_stmt_eh_region
will return a non-negative
number for any statement that may have EH control flow semantics;
examine tree_can_throw_internal
or tree_can_throw_external
for exact semantics. Exact control flow may be extracted from
foreach_reachable_handler
. The EH region nesting tree is defined
in except.h and built in except.c. The lowering pass
itself is in tree-eh.c and is described by pass_lower_eh
.
This pass decomposes a function into basic blocks and creates all of
the edges that connect them. It is located in tree-cfg.c and
is described by pass_build_cfg
.
This pass walks the entire function and collects an array of all
variables referenced in the function, referenced_vars
. The
index at which a variable is found in the array is used as a UID
for the variable within this function. This data is needed by the
SSA rewriting routines. The pass is located in tree-dfa.c
and is described by pass_referenced_vars
.
This pass rewrites the function such that it is in SSA form. After
this pass, all is_gimple_reg
variables will be referenced by
SSA_NAME
, and all occurrences of other variables will be
annotated with VDEFS
and VUSES
; PHI nodes will have
been inserted as necessary for each basic block. This pass is
located in tree-ssa.c and is described by pass_build_ssa
.
This pass scans the function for uses of SSA_NAME
s that
are fed by default definition. For non-parameter variables, such
uses are uninitialized. The pass is run twice, before and after
optimization (if turned on). In the first pass we only warn for uses that are
positively uninitialized; in the second pass we warn for uses that
are possibly uninitialized. The pass is located in tree-ssa.c
and is defined by pass_early_warn_uninitialized
and
pass_late_warn_uninitialized
.
This pass scans the function for statements without side effects whose
result is unused. It does not do memory life analysis, so any value
that is stored in memory is considered used. The pass is run multiple
times throughout the optimization process. It is located in
tree-ssa-dce.c and is described by pass_dce
.
This pass performs trivial dominator-based copy and constant propagation,
expression simplification, and jump threading. It is run multiple times
throughout the optimization process. It is located in tree-ssa-dom.c
and is described by pass_dominator
.
This pass attempts to remove redundant computation by substituting
variables that are used once into the expression that uses them and
seeing if the result can be simplified. It is located in
tree-ssa-forwprop.c and is described by pass_forwprop
.
This pass attempts to change the name of compiler temporaries involved in
copy operations such that SSA->normal can coalesce the copy away. When compiler
temporaries are copies of user variables, it also renames the compiler
temporary to the user variable resulting in better use of user symbols. It is
located in tree-ssa-copyrename.c and is described by
pass_copyrename
.
This pass recognizes forms of PHI inputs that can be represented as
conditional expressions and rewrites them into straight line code.
It is located in tree-ssa-phiopt.c and is described by
pass_phiopt
.
This pass performs a flow sensitive SSA-based points-to analysis.
The resulting may-alias, must-alias, and escape analysis information
is used to promote variables from in-memory addressable objects to
non-aliased variables that can be renamed into SSA form. We also
update the VDEF
/VUSE
memory tags for non-renameable
aggregates so that we get fewer false kills. The pass is located
in tree-ssa-alias.c and is described by pass_may_alias
.
Interprocedural points-to information is located in
tree-ssa-structalias.c and described by pass_ipa_pta
.
This pass instruments the function in order to collect runtime block
and value profiling data. Such data may be fed back into the compiler
on a subsequent run so as to allow optimization based on expected
execution frequencies. The pass is located in tree-profile.c and
is described by pass_ipa_tree_profile
.
This pass implements series of heuristics to guess propababilities
of branches. The resulting predictions are turned into edge profile
by propagating branches across the control flow graphs.
The pass is located in tree-profile.c and is described by
pass_profile
.
This pass rewrites complex arithmetic operations into their component
scalar arithmetic operations. The pass is located in tree-complex.c
and is described by pass_lower_complex
.
This pass rewrites suitable non-aliased local aggregate variables into
a set of scalar variables. The resulting scalar variables are
rewritten into SSA form, which allows subsequent optimization passes
to do a significantly better job with them. The pass is located in
tree-sra.c and is described by pass_sra
.
This pass eliminates stores to memory that are subsequently overwritten
by another store, without any intervening loads. The pass is located
in tree-ssa-dse.c and is described by pass_dse
.
This pass transforms tail recursion into a loop. It is located in
tree-tailcall.c and is described by pass_tail_recursion
.
This pass sinks stores and assignments down the flowgraph closer to their
use point. The pass is located in tree-ssa-sink.c and is
described by pass_sink_code
.
This pass eliminates partially redundant computations, as well as
performing load motion. The pass is located in tree-ssa-pre.c
and is described by pass_pre
.
Just before partial redundancy elimination, if
-funsafe-math-optimizations is on, GCC tries to convert
divisions to multiplications by the reciprocal. The pass is located
in tree-ssa-math-opts.c and is described by
pass_cse_reciprocal
.
This is a simpler form of PRE that only eliminates redundancies that
occur on all paths. It is located in tree-ssa-pre.c and
described by pass_fre
.
The main driver of the pass is placed in tree-ssa-loop.c
and described by pass_loop
.
The optimizations performed by this pass are:
Loop invariant motion. This pass moves only invariants that would be hard to handle on RTL level (function calls, operations that expand to nontrivial sequences of insns). With -funswitch-loops it also moves operands of conditions that are invariant out of the loop, so that we can use just trivial invariantness analysis in loop unswitching. The pass also includes store motion. The pass is implemented in tree-ssa-loop-im.c.
Canonical induction variable creation. This pass creates a simple counter for number of iterations of the loop and replaces the exit condition of the loop using it, in case when a complicated analysis is necessary to determine the number of iterations. Later optimizations then may determine the number easily. The pass is implemented in tree-ssa-loop-ivcanon.c.
Induction variable optimizations. This pass performs standard induction variable optimizations, including strength reduction, induction variable merging and induction variable elimination. The pass is implemented in tree-ssa-loop-ivopts.c.
Loop unswitching. This pass moves the conditional jumps that are invariant out of the loops. To achieve this, a duplicate of the loop is created for each possible outcome of conditional jump(s). The pass is implemented in tree-ssa-loop-unswitch.c.
The optimizations also use various utility functions contained in tree-ssa-loop-manip.c, cfgloop.c, cfgloopanal.c and cfgloopmanip.c.
Vectorization. This pass transforms loops to operate on vector types
instead of scalar types. Data parallelism across loop iterations is exploited
to group data elements from consecutive iterations into a vector and operate
on them in parallel. Depending on available target support the loop is
conceptually unrolled by a factor VF
(vectorization factor), which is
the number of elements operated upon in parallel in each iteration, and the
VF
copies of each scalar operation are fused to form a vector operation.
Additional loop transformations such as peeling and versioning may take place
to align the number of iterations, and to align the memory accesses in the
loop.
The pass is implemented in tree-vectorizer.c (the main driver),
tree-vect-loop.c and tree-vect-loop-manip.c (loop specific parts
and general loop utilities), tree-vect-slp (loop-aware SLP
functionality), tree-vect-stmts.c and tree-vect-data-refs.c.
Analysis of data references is in tree-data-ref.c.
SLP Vectorization. This pass performs vectorization of straight-line code. The pass is implemented in tree-vectorizer.c (the main driver), tree-vect-slp.c, tree-vect-stmts.c and tree-vect-data-refs.c.
Autoparallelization. This pass splits the loop iteration space to run into several threads. The pass is implemented in tree-parloops.c.
Graphite is a loop transformation framework based on the polyhedral model. Graphite stands for Gimple Represented as Polyhedra. The internals of this infrastructure are documented in http://gcc.gnu.org/wiki/Graphite. The passes working on this representation are implemented in the various graphite-* files.
This pass applies if-conversion to simple loops to help vectorizer.
We identify if convertible loops, if-convert statements and merge
basic blocks in one big block. The idea is to present loop in such
form so that vectorizer can have one to one mapping between statements
and available vector operations. This pass is located in
tree-if-conv.c and is described by pass_if_conversion
.
This pass relaxes a lattice of values in order to identify those
that must be constant even in the presence of conditional branches.
The pass is located in tree-ssa-ccp.c and is described
by pass_ccp
.
A related pass that works on memory loads and stores, and not just
register values, is located in tree-ssa-ccp.c and described by
pass_store_ccp
.
This is similar to constant propagation but the lattice of values is
the “copy-of” relation. It eliminates redundant copies from the
code. The pass is located in tree-ssa-copy.c and described by
pass_copy_prop
.
A related pass that works on memory copies, and not just register
copies, is located in tree-ssa-copy.c and described by
pass_store_copy_prop
.
This transformation is similar to constant propagation but
instead of propagating single constant values, it propagates
known value ranges. The implementation is based on Patterson's
range propagation algorithm (Accurate Static Branch Prediction by
Value Range Propagation, J. R. C. Patterson, PLDI '95). In
contrast to Patterson's algorithm, this implementation does not
propagate branch probabilities nor it uses more than a single
range per SSA name. This means that the current implementation
cannot be used for branch prediction (though adapting it would
not be difficult). The pass is located in tree-vrp.c and is
described by pass_vrp
.
This pass simplifies built-in functions, as applicable, with constant
arguments or with inferable string lengths. It is located in
tree-ssa-ccp.c and is described by pass_fold_builtins
.
This pass identifies critical edges and inserts empty basic blocks
such that the edge is no longer critical. The pass is located in
tree-cfg.c and is described by pass_split_crit_edges
.
This pass is a stronger form of dead code elimination that can
eliminate unnecessary control flow statements. It is located
in tree-ssa-dce.c and is described by pass_cd_dce
.
This pass identifies function calls that may be rewritten into
jumps. No code transformation is actually applied here, but the
data and control flow problem is solved. The code transformation
requires target support, and so is delayed until RTL. In the
meantime CALL_EXPR_TAILCALL
is set indicating the possibility.
The pass is located in tree-tailcall.c and is described by
pass_tail_calls
. The RTL transformation is handled by
fixup_tail_calls
in calls.c.
For non-void functions, this pass locates return statements that do
not specify a value and issues a warning. Such a statement may have
been injected by falling off the end of the function. This pass is
run last so that we have as much time as possible to prove that the
statement is not reachable. It is located in tree-cfg.c and
is described by pass_warn_function_return
.
This pass rewrites the function such that it is in normal form. At
the same time, we eliminate as many single-use temporaries as possible,
so the intermediate language is no longer GIMPLE, but GENERIC. The
pass is located in tree-outof-ssa.c and is described by
pass_del_ssa
.
This is part of the CFG cleanup passes. It attempts to join PHI nodes
from a forwarder CFG block into another block with PHI nodes. The
pass is located in tree-cfgcleanup.c and is described by
pass_merge_phi
.
If a function always returns the same local variable, and that local
variable is an aggregate type, then the variable is replaced with the
return value for the function (i.e., the function's DECL_RESULT). This
is equivalent to the C++ named return value optimization applied to
GIMPLE. The pass is located in tree-nrv.c and is described by
pass_nrv
.
If a function returns a memory object and is called as var =
foo()
, this pass tries to change the call so that the address of
var
is sent to the caller to avoid an extra memory copy. This
pass is located in tree-nrv.c
and is described by
pass_return_slot
.
__builtin_object_size
This is a propagation pass similar to CCP that tries to remove calls
to __builtin_object_size
when the size of the object can be
computed at compile-time. This pass is located in
tree-object-size.c and is described by
pass_object_sizes
.
This pass removes expensive loop-invariant computations out of loops.
The pass is located in tree-ssa-loop.c and described by
pass_lim
.
This is a family of loop transformations that works on loop nests. It
includes loop interchange, scaling, skewing and reversal and they are
all geared to the optimization of data locality in array traversals
and the removal of dependencies that hamper optimizations such as loop
parallelization and vectorization. The pass is located in
tree-loop-linear.c and described by
pass_linear_transform
.
This pass removes loops with no code in them. The pass is located in
tree-ssa-loop-ivcanon.c and described by
pass_empty_loop
.
This pass completely unrolls loops with few iterations. The pass
is located in tree-ssa-loop-ivcanon.c and described by
pass_complete_unroll
.
This pass makes the code reuse the computations from the previous
iterations of the loops, especially loads and stores to memory.
It does so by storing the values of these computations to a bank
of temporary variables that are rotated at the end of loop. To avoid
the need for this rotation, the loop is then unrolled and the copies
of the loop body are rewritten to use the appropriate version of
the temporary variable. This pass is located in tree-predcom.c
and described by pass_predcom
.
This pass issues prefetch instructions for array references inside
loops. The pass is located in tree-ssa-loop-prefetch.c and
described by pass_loop_prefetch
.
This pass rewrites arithmetic expressions to enable optimizations that
operate on them, like redundancy elimination and vectorization. The
pass is located in tree-ssa-reassoc.c and described by
pass_reassoc
.
stdarg
functions
This pass tries to avoid the saving of register arguments into the
stack on entry to stdarg
functions. If the function doesn't
use any va_start
macros, no registers need to be saved. If
va_start
macros are used, the va_list
variables don't
escape the function, it is only necessary to save registers that will
be used in va_arg
macros. For instance, if va_arg
is
only used with integral types in the function, floating point
registers don't need to be saved. This pass is located in
tree-stdarg.c
and described by pass_stdarg
.
The following briefly describes the RTL generation and optimization passes that are run after the Tree optimization passes.
The source files for RTL generation include
stmt.c,
calls.c,
expr.c,
explow.c,
expmed.c,
function.c,
optabs.c
and emit-rtl.c.
Also, the file
insn-emit.c, generated from the machine description by the
program genemit
, is used in this pass. The header file
expr.h is used for communication within this pass.
The header files insn-flags.h and insn-codes.h,
generated from the machine description by the programs genflags
and gencodes
, tell this pass which standard names are available
for use and which patterns correspond to them.
This pass generates the glue that handles communication between the exception handling library routines and the exception handlers within the function. Entry points in the function that are invoked by the exception handling library are called landing pads. The code for this pass is located in except.c.
This pass removes unreachable code, simplifies jumps to next, jumps to jump, jumps across jumps, etc. The pass is run multiple times. For historical reasons, it is occasionally referred to as the “jump optimization pass”. The bulk of the code for this pass is in cfgcleanup.c, and there are support routines in cfgrtl.c and jump.c.
This pass attempts to remove redundant computation by substituting variables that come from a single definition, and seeing if the result can be simplified. It performs copy propagation and addressing mode selection. The pass is run twice, with values being propagated into loops only on the second run. The code is located in fwprop.c.
This pass removes redundant computation within basic blocks, and optimizes addressing modes based on cost. The pass is run twice. The code for this pass is located in cse.c.
This pass performs two different types of GCSE depending on whether you are optimizing for size or not (LCM based GCSE tends to increase code size for a gain in speed, while Morel-Renvoise based GCSE does not). When optimizing for size, GCSE is done using Morel-Renvoise Partial Redundancy Elimination, with the exception that it does not try to move invariants out of loops—that is left to the loop optimization pass. If MR PRE GCSE is done, code hoisting (aka unification) is also done, as well as load motion. If you are optimizing for speed, LCM (lazy code motion) based GCSE is done. LCM is based on the work of Knoop, Ruthing, and Steffen. LCM based GCSE also does loop invariant code motion. We also perform load and store motion when optimizing for speed. Regardless of which type of GCSE is used, the GCSE pass also performs global constant and copy propagation. The source file for this pass is gcse.c, and the LCM routines are in lcm.c.
This pass performs several loop related optimizations. The source files cfgloopanal.c and cfgloopmanip.c contain generic loop analysis and manipulation code. Initialization and finalization of loop structures is handled by loop-init.c. A loop invariant motion pass is implemented in loop-invariant.c. Basic block level optimizations—unrolling, and peeling loops— are implemented in loop-unroll.c. Replacing of the exit condition of loops by special machine-dependent instructions is handled by loop-doloop.c.
This pass is an aggressive form of GCSE that transforms the control flow graph of a function by propagating constants into conditional branch instructions. The source file for this pass is gcse.c.
This pass attempts to replace conditional branches and surrounding assignments with arithmetic, boolean value producing comparison instructions, and conditional move instructions. In the very last invocation after reload/LRA, it will generate predicated instructions when supported by the target. The code is located in ifcvt.c.
This pass splits independent uses of each pseudo-register. This can improve effect of the other transformation, such as CSE or register allocation. The code for this pass is located in web.c.
This pass attempts to combine groups of two or three instructions that are related by data flow into single instructions. It combines the RTL expressions for the instructions by substitution, simplifies the result using algebra, and then attempts to match the result against the machine description. The code is located in combine.c.
This pass looks for instructions that require the processor to be in a specific “mode” and minimizes the number of mode changes required to satisfy all users. What these modes are, and what they apply to are completely target-specific. The code for this pass is located in mode-switching.c.
This pass looks at innermost loops and reorders their instructions by overlapping different iterations. Modulo scheduling is performed immediately before instruction scheduling. The code for this pass is located in modulo-sched.c.
This pass looks for instructions whose output will not be available by the time that it is used in subsequent instructions. Memory loads and floating point instructions often have this behavior on RISC machines. It re-orders instructions within a basic block to try to separate the definition and use of items that otherwise would cause pipeline stalls. This pass is performed twice, before and after register allocation. The code for this pass is located in haifa-sched.c, sched-deps.c, sched-ebb.c, sched-rgn.c and sched-vis.c.
These passes make sure that all occurrences of pseudo registers are eliminated, either by allocating them to a hard register, replacing them by an equivalent expression (e.g. a constant) or by placing them on the stack. This is done in several subpasses:
Source files of the allocator are ira.c, ira-build.c, ira-costs.c, ira-conflicts.c, ira-color.c, ira-emit.c, ira-lives, plus header files ira.h and ira-int.h used for the communication between the allocator and the rest of the compiler and between the IRA files.
The reload pass also optionally eliminates the frame pointer and inserts instructions to save and restore call-clobbered registers around calls.
Source files are reload.c and reload1.c, plus the header reload.h used for communication between them.
Unlike the reload pass, intermediate LRA decisions are reflected in RTL as much as possible. This reduces the number of target-dependent macros and hooks, leaving instruction constraints as the primary source of control.
LRA is run on targets for which TARGET_LRA_P returns true.
This pass implements profile guided code positioning. If profile information is not available, various types of static analysis are performed to make the predictions normally coming from the profile feedback (IE execution frequency, branch probability, etc). It is implemented in the file bb-reorder.c, and the various prediction routines are in predict.c.
This pass computes where the variables are stored at each position in code and generates notes describing the variable locations to RTL code. The location lists are then generated according to these notes to debug information if the debugging information format supports location lists. The code is located in var-tracking.c.
This optional pass attempts to find instructions that can go into the delay slots of other instructions, usually jumps and calls. The code for this pass is located in reorg.c.
On many RISC machines, branch instructions have a limited range. Thus, longer sequences of instructions must be used for long branches. In this pass, the compiler figures out what how far each instruction will be from each other instruction, and therefore whether the usual instructions, or the longer sequences, must be used for each branch. The code for this pass is located in final.c.
Conversion from usage of some hard registers to usage of a register stack may be done at this point. Currently, this is supported only for the floating-point registers of the Intel 80387 coprocessor. The code for this pass is located in reg-stack.c.
This pass outputs the assembler code for the function. The source files are final.c plus insn-output.c; the latter is generated automatically from the machine description by the tool genoutput. The header file conditions.h is used for communication between these files.
This is run after final because it must output the stack slot offsets for pseudo registers that did not get hard registers. Source files are dbxout.c for DBX symbol table format, sdbout.c for SDB symbol table format, dwarfout.c for DWARF symbol table format, files dwarf2out.c and dwarf2asm.c for DWARF2 symbol table format, and vmsdbgout.c for VMS debug symbol table format.
This section is describes dump infrastructure which is common to both pass dumps as well as optimization dumps. The goal for this infrastructure is to provide both gcc developers and users detailed information about various compiler transformations and optimizations.
A dump_manager class is defined in dumpfile.h. Various passes
register dumping pass-specific information via dump_register
in
passes.c. During the registration, an optimization pass can
select its optimization group (see Optimization groups). After
that optimization information corresponding to the entire group
(presumably from multiple passes) can be output via command-line
switches. Note that if a pass does not fit into any of the pre-defined
groups, it can select OPTGROUP_NONE
.
Note that in general, a pass need not know its dump output file name,
whether certain flags are enabled, etc. However, for legacy reasons,
passes could also call dump_begin
which returns a stream in
case the particular pass has optimization dumps enabled. A pass could
call dump_end
when the dump has ended. These methods should go
away once all the passes are converted to use the new dump
infrastructure.
The recommended way to setup the dump output is via dump_start
and dump_end
.
The optimization passes are grouped into several categories. Currently defined categories in dumpfile.h are
OPTGROUP_IPA
OPTGROUP_LOOP
OPTGROUP_INLINE
OPTGROUP_VEC
OPTGROUP_OTHER
OPTGROUP_ALL
By using groups a user could selectively enable optimization information only for a group of passes. By default, the optimization information for all the passes is dumped.
There are two separate output streams available for outputting
optimization information from passes. Note that both these streams
accept stderr
and stdout
as valid streams and thus it is
possible to dump output to standard output or error. This is specially
handy for outputting all available information in a single file by
redirecting stderr
.
pstream
stdout
and
stderr
for dumping to standard output and standard error
respectively.
alt_stream
stderr
.
The dump verbosity has the following options
gcc -O2 -ftree-vectorize -fopt-info-vec-missed
will print information about missed optimization opportunities from
vectorization passes on stderr.
dump_printf
dump_kind
which signifies the type of
dump. This method outputs information only when the dumps are enabled
for this particular dump_kind
. Note that the caller doesn't
need to know if the particular dump is enabled or not, or even the
file name. The caller only needs to decide which dump output
information is relevant, and under what conditions. This determines
the associated flags.
Consider the following example from loop-unroll.c where an informative message about a loop (along with its location) is printed when any of the following flags is enabled
int report_flags = MSG_OPTIMIZED_LOCATIONS | TDF_RTL | TDF_DETAILS; dump_printf_loc (report_flags, locus, "loop turned into non-loop; it never loops.\n");
dump_basic_block
dump_generic_expr
dump_gimple_stmt
Note that the above methods also have variants prefixed with
_loc
, such as dump_printf_loc
, which are similar except
they also output the source location information.
gcc -O3 -fopt-info-missed=missed.all
outputs missed optimization report from all the passes into missed.all.
As another example,
gcc -O3 -fopt-info-inline-optimized-missed=inline.txt
will output information about missed optimizations as well as optimized locations from all the inlining passes into inline.txt.
If the filename is provided, then the dumps from all the applicable optimizations are concatenated into the filename. Otherwise the dump is output onto stderr. If options is omitted, it defaults to all-all, which means dump all available optimization info from all the passes. In the following example, all optimization info is output on to stderr.
gcc -O3 -fopt-info
Note that -fopt-info-vec-missed behaves the same as -fopt-info-missed-vec.
As another example, consider
gcc -fopt-info-vec-missed=vec.miss -fopt-info-loop-optimized=loop.opt
Here the two output file names vec.miss and loop.opt are in conflict since only one output file is allowed. In this case, only the first option takes effect and the subsequent options are ignored. Thus only the vec.miss is produced which containts dumps from the vectorizer about missed opportunities.
The purpose of GENERIC is simply to provide a
language-independent way of representing an entire function in
trees. To this end, it was necessary to add a few new tree codes
to the back end, but almost everything was already there. If you
can express it with the codes in gcc/tree.def
, it's
GENERIC.
Early on, there was a great deal of debate about how to think
about statements in a tree IL. In GENERIC, a statement is
defined as any expression whose value, if any, is ignored. A
statement will always have TREE_SIDE_EFFECTS
set (or it
will be discarded), but a non-statement expression may also have
side effects. A CALL_EXPR
, for instance.
It would be possible for some local optimizations to work on the
GENERIC form of a function; indeed, the adapted tree inliner
works fine on GENERIC, but the current compiler performs inlining
after lowering to GIMPLE (a restricted form described in the next
section). Indeed, currently the frontends perform this lowering
before handing off to tree_rest_of_compilation
, but this
seems inelegant.
There are many places in which this document is incomplet and incorrekt. It is, as of yet, only preliminary documentation.
The central data structure used by the internal representation is the
tree
. These nodes, while all of the C type tree
, are of
many varieties. A tree
is a pointer type, but the object to
which it points may be of a variety of types. From this point forward,
we will refer to trees in ordinary type, rather than in this
font
, except when talking about the actual C type tree
.
You can tell what kind of node a particular tree is by using the
TREE_CODE
macro. Many, many macros take trees as input and
return trees as output. However, most macros require a certain kind of
tree node as input. In other words, there is a type-system for trees,
but it is not reflected in the C type-system.
For safety, it is useful to configure GCC with --enable-checking. Although this results in a significant performance penalty (since all tree types are checked at run-time), and is therefore inappropriate in a release version, it is extremely helpful during the development process.
Many macros behave as predicates. Many, although not all, of these
predicates end in ‘_P’. Do not rely on the result type of these
macros being of any particular type. You may, however, rely on the fact
that the type can be compared to 0
, so that statements like
if (TEST_P (t) && !TEST_P (y)) x = 1;
and
int i = (TEST_P (t) != 0);
are legal. Macros that return int
values now may be changed to
return tree
values, or other pointers in the future. Even those
that continue to return int
may return multiple nonzero codes
where previously they returned only zero and one. Therefore, you should
not write code like
if (TEST_P (t) == 1)
as this code is not guaranteed to work correctly in the future.
You should not take the address of values returned by the macros or functions described here. In particular, no guarantee is given that the values are lvalues.
In general, the names of macros are all in uppercase, while the names of functions are entirely in lowercase. There are rare exceptions to this rule. You should assume that any macro or function whose name is made up entirely of uppercase letters may evaluate its arguments more than once. You may assume that a macro or function whose name is made up entirely of lowercase letters will evaluate its arguments only once.
The error_mark_node
is a special tree. Its tree code is
ERROR_MARK
, but since there is only ever one node with that code,
the usual practice is to compare the tree against
error_mark_node
. (This test is just a test for pointer
equality.) If an error has occurred during front-end processing the
flag errorcount
will be set. If the front end has encountered
code it cannot handle, it will issue a message to the user and set
sorrycount
. When these flags are set, any macro or function
which normally returns a tree of a particular kind may instead return
the error_mark_node
. Thus, if you intend to do any processing of
erroneous code, you must be prepared to deal with the
error_mark_node
.
Occasionally, a particular tree slot (like an operand to an expression, or a particular field in a declaration) will be referred to as “reserved for the back end”. These slots are used to store RTL when the tree is converted to RTL for use by the GCC back end. However, if that process is not taking place (e.g., if the front end is being hooked up to an intelligent editor), then those slots may be used by the back end presently in use.
If you encounter situations that do not match this documentation, such as tree nodes of types not mentioned here, or macros documented to return entities of a particular kind that instead return entities of some different kind, you have found a bug, either in the front end or in the documentation. Please report these bugs as you would any other bug.
All GENERIC trees have two fields in common. First, TREE_CHAIN
is a pointer that can be used as a singly-linked list to other trees.
The other is TREE_TYPE
. Many trees store the type of an
expression or declaration in this field.
These are some other functions for handling trees:
tree_size
build0
build1
build2
build3
build4
build5
build6
code
is the TREE_CODE
, and type
is a tree
representing the TREE_TYPE
. These are followed by the
operands, each of which is also a tree.
An IDENTIFIER_NODE
represents a slightly more general concept
than the standard C or C++ concept of identifier. In particular, an
IDENTIFIER_NODE
may contain a ‘$’, or other extraordinary
characters.
There are never two distinct IDENTIFIER_NODE
s representing the
same identifier. Therefore, you may use pointer equality to compare
IDENTIFIER_NODE
s, rather than using a routine like
strcmp
. Use get_identifier
to obtain the unique
IDENTIFIER_NODE
for a supplied string.
You can use the following macros to access identifiers:
IDENTIFIER_POINTER
char*
. This string is always NUL
-terminated, and contains
no embedded NUL
characters.
IDENTIFIER_LENGTH
IDENTIFIER_POINTER
, not
including the trailing NUL
. This value of
IDENTIFIER_LENGTH (x)
is always the same as strlen
(IDENTIFIER_POINTER (x))
.
IDENTIFIER_OPNAME_P
IDENTIFIER_POINTER
or the
IDENTIFIER_LENGTH
.
IDENTIFIER_TYPENAME_P
TREE_TYPE
of
the IDENTIFIER_NODE
holds the type to which the conversion
operator converts.
Two common container data structures can be represented directly with
tree nodes. A TREE_LIST
is a singly linked list containing two
trees per node. These are the TREE_PURPOSE
and TREE_VALUE
of each node. (Often, the TREE_PURPOSE
contains some kind of
tag, or additional information, while the TREE_VALUE
contains the
majority of the payload. In other cases, the TREE_PURPOSE
is
simply NULL_TREE
, while in still others both the
TREE_PURPOSE
and TREE_VALUE
are of equal stature.) Given
one TREE_LIST
node, the next node is found by following the
TREE_CHAIN
. If the TREE_CHAIN
is NULL_TREE
, then
you have reached the end of the list.
A TREE_VEC
is a simple vector. The TREE_VEC_LENGTH
is an
integer (not a tree) giving the number of nodes in the vector. The
nodes themselves are accessed using the TREE_VEC_ELT
macro, which
takes two arguments. The first is the TREE_VEC
in question; the
second is an integer indicating which element in the vector is desired.
The elements are indexed from zero.
All types have corresponding tree nodes. However, you should not assume that there is exactly one tree node corresponding to each type. There are often multiple nodes corresponding to the same type.
For the most part, different kinds of types have different tree codes.
(For example, pointer types use a POINTER_TYPE
code while arrays
use an ARRAY_TYPE
code.) However, pointers to member functions
use the RECORD_TYPE
code. Therefore, when writing a
switch
statement that depends on the code associated with a
particular type, you should take care to handle pointers to member
functions under the RECORD_TYPE
case label.
The following functions and macros deal with cv-qualification of types:
TYPE_MAIN_VARIANT
A few other macros and functions are usable with all types:
TYPE_SIZE
INTEGER_CST
. For an incomplete type, TYPE_SIZE
will be
NULL_TREE
.
TYPE_ALIGN
int
.
TYPE_NAME
TYPE_DECL
) for
the type. (Note this macro does not return an
IDENTIFIER_NODE
, as you might expect, given its name!) You can
look at the DECL_NAME
of the TYPE_DECL
to obtain the
actual name of the type. The TYPE_NAME
will be NULL_TREE
for a type that is not a built-in type, the result of a typedef, or a
named class type.
TYPE_CANONICAL
same_type_p
: if the TYPE_CANONICAL
values
of the types are equal, the types are equivalent; otherwise, the types
are not equivalent. The notion of equivalence for canonical types is
the same as the notion of type equivalence in the language itself. For
instance,
When TYPE_CANONICAL
is NULL_TREE
, there is no canonical
type for the given type node. In this case, comparison between this
type and any other type requires the compiler to perform a deep,
“structural” comparison to see if the two type nodes have the same
form and properties.
The canonical type for a node is always the most fundamental type in
the equivalence class of types. For instance, int
is its own
canonical type. A typedef I
of int
will have int
as its canonical type. Similarly, I*
and a typedef IP
(defined to I*
) will has int*
as their canonical
type. When building a new type node, be sure to set
TYPE_CANONICAL
to the appropriate canonical type. If the new
type is a compound type (built from other types), and any of those
other types require structural equality, use
SET_TYPE_STRUCTURAL_EQUALITY
to ensure that the new type also
requires structural equality. Finally, if for some reason you cannot
guarantee that TYPE_CANONICAL
will point to the canonical type,
use SET_TYPE_STRUCTURAL_EQUALITY
to make sure that the new
type–and any type constructed based on it–requires structural
equality. If you suspect that the canonical type system is
miscomparing types, pass --param verify-canonical-types=1
to
the compiler or configure with --enable-checking
to force the
compiler to verify its canonical-type comparisons against the
structural comparisons; the compiler will then print any warnings if
the canonical types miscompare.
TYPE_STRUCTURAL_EQUALITY_P
TYPE_CANONICAL
is NULL_TREE
.
SET_TYPE_STRUCTURAL_EQUALITY
TYPE_CANONICAL
to
NULL_TREE
.
same_type_p
typedef
for the other, or
both are typedef
s for the same type. This predicate also holds if
the two trees given as input are simply copies of one another; i.e.,
there is no difference between them at the source level, but, for
whatever reason, a duplicate has been made in the representation. You
should never use ==
(pointer equality) to compare types; always
use same_type_p
instead.
Detailed below are the various kinds of types, and the macros that can be used to access them. Although other kinds of types are used elsewhere in G++, the types described here are the only ones that you will encounter while examining the intermediate representation.
VOID_TYPE
void
type.
INTEGER_TYPE
char
,
short
, int
, long
, and long long
. This code
is not used for enumeration types, nor for the bool
type.
The TYPE_PRECISION
is the number of bits used in
the representation, represented as an unsigned int
. (Note that
in the general case this is not the same value as TYPE_SIZE
;
suppose that there were a 24-bit integer type, but that alignment
requirements for the ABI required 32-bit alignment. Then,
TYPE_SIZE
would be an INTEGER_CST
for 32, while
TYPE_PRECISION
would be 24.) The integer type is unsigned if
TYPE_UNSIGNED
holds; otherwise, it is signed.
The TYPE_MIN_VALUE
is an INTEGER_CST
for the smallest
integer that may be represented by this type. Similarly, the
TYPE_MAX_VALUE
is an INTEGER_CST
for the largest integer
that may be represented by this type.
REAL_TYPE
float
, double
, and long
double
types. The number of bits in the floating-point representation
is given by TYPE_PRECISION
, as in the INTEGER_TYPE
case.
FIXED_POINT_TYPE
short _Fract
, _Fract
, long
_Fract
, long long _Fract
, short _Accum
, _Accum
,
long _Accum
, and long long _Accum
types. The number of bits
in the fixed-point representation is given by TYPE_PRECISION
,
as in the INTEGER_TYPE
case. There may be padding bits, fractional
bits and integral bits. The number of fractional bits is given by
TYPE_FBIT
, and the number of integral bits is given by TYPE_IBIT
.
The fixed-point type is unsigned if TYPE_UNSIGNED
holds; otherwise,
it is signed.
The fixed-point type is saturating if TYPE_SATURATING
holds; otherwise,
it is not saturating.
COMPLEX_TYPE
__complex__
data types. The
TREE_TYPE
is the type of the real and imaginary parts.
ENUMERAL_TYPE
TYPE_PRECISION
gives
(as an int
), the number of bits used to represent the type. If
there are no negative enumeration constants, TYPE_UNSIGNED
will
hold. The minimum and maximum enumeration constants may be obtained
with TYPE_MIN_VALUE
and TYPE_MAX_VALUE
, respectively; each
of these macros returns an INTEGER_CST
.
The actual enumeration constants themselves may be obtained by looking
at the TYPE_VALUES
. This macro will return a TREE_LIST
,
containing the constants. The TREE_PURPOSE
of each node will be
an IDENTIFIER_NODE
giving the name of the constant; the
TREE_VALUE
will be an INTEGER_CST
giving the value
assigned to that constant. These constants will appear in the order in
which they were declared. The TREE_TYPE
of each of these
constants will be the type of enumeration type itself.
BOOLEAN_TYPE
bool
type.
POINTER_TYPE
TREE_TYPE
gives the type to which this type points.
REFERENCE_TYPE
TREE_TYPE
gives the type
to which this type refers.
FUNCTION_TYPE
TREE_TYPE
gives the return type of the function.
The TYPE_ARG_TYPES
are a TREE_LIST
of the argument types.
The TREE_VALUE
of each node in this list is the type of the
corresponding argument; the TREE_PURPOSE
is an expression for the
default argument value, if any. If the last node in the list is
void_list_node
(a TREE_LIST
node whose TREE_VALUE
is the void_type_node
), then functions of this type do not take
variable arguments. Otherwise, they do take a variable number of
arguments.
Note that in C (but not in C++) a function declared like void f()
is an unprototyped function taking a variable number of arguments; the
TYPE_ARG_TYPES
of such a function will be NULL
.
METHOD_TYPE
FUNCTION_TYPE
, the return type is given by the TREE_TYPE
.
The type of *this
, i.e., the class of which functions of this
type are a member, is given by the TYPE_METHOD_BASETYPE
. The
TYPE_ARG_TYPES
is the parameter list, as for a
FUNCTION_TYPE
, and includes the this
argument.
ARRAY_TYPE
TREE_TYPE
gives the type of
the elements in the array. If the array-bound is present in the type,
the TYPE_DOMAIN
is an INTEGER_TYPE
whose
TYPE_MIN_VALUE
and TYPE_MAX_VALUE
will be the lower and
upper bounds of the array, respectively. The TYPE_MIN_VALUE
will
always be an INTEGER_CST
for zero, while the
TYPE_MAX_VALUE
will be one less than the number of elements in
the array, i.e., the highest value which may be used to index an element
in the array.
RECORD_TYPE
struct
and class
types, as well as
pointers to member functions and similar constructs in other languages.
TYPE_FIELDS
contains the items contained in this type, each of
which can be a FIELD_DECL
, VAR_DECL
, CONST_DECL
, or
TYPE_DECL
. You may not make any assumptions about the ordering
of the fields in the type or whether one or more of them overlap.
UNION_TYPE
union
types. Similar to RECORD_TYPE
except that all FIELD_DECL
nodes in TYPE_FIELD
start at
bit position zero.
QUAL_UNION_TYPE
UNION_TYPE
except that each FIELD_DECL
has a
DECL_QUALIFIER
field, which contains a boolean expression that
indicates whether the field is present in the object. The type will only
have one field, so each field's DECL_QUALIFIER
is only evaluated
if none of the expressions in the previous fields in TYPE_FIELDS
are nonzero. Normally these expressions will reference a field in the
outer object using a PLACEHOLDER_EXPR
.
LANG_TYPE
OFFSET_TYPE
X::m
the TYPE_OFFSET_BASETYPE
is X
and the
TREE_TYPE
is the type of m
.
There are variables whose values represent some of the basic types. These include:
void_type_node
void
.
integer_type_node
int
.
unsigned_type_node.
unsigned int
.
char_type_node.
char
.
same_type_p
.
This section covers the various kinds of declarations that appear in the
internal representation, except for declarations of functions
(represented by FUNCTION_DECL
nodes), which are described in
Functions.
Some macros can be used with any kind of declaration. These include:
DECL_NAME
IDENTIFIER_NODE
giving the name of the
entity.
TREE_TYPE
EXPR_FILENAME
char*
. For an entity declared implicitly by the
compiler (like __builtin_memcpy
), this will be the string
"<internal>"
.
EXPR_LINENO
int
.
DECL_ARTIFICIAL
TYPE_DECL
implicitly
generated for a class type. Recall that in C++ code like:
struct S {};
is roughly equivalent to C code like:
struct S {}; typedef struct S S;
The implicitly generated typedef
declaration is represented by a
TYPE_DECL
for which DECL_ARTIFICIAL
holds.
The various kinds of declarations include:
LABEL_DECL
CONST_DECL
DECL_INITIAL
which will be an
INTEGER_CST
with the same type as the TREE_TYPE
of the
CONST_DECL
, i.e., an ENUMERAL_TYPE
.
RESULT_DECL
RESULT_DECL
, that indicates that the value should
be returned, via bitwise copy, by the function. You can use
DECL_SIZE
and DECL_ALIGN
on a RESULT_DECL
, just as
with a VAR_DECL
.
TYPE_DECL
typedef
declarations. The TREE_TYPE
is the type declared to have the name given by DECL_NAME
. In
some cases, there is no associated name.
VAR_DECL
DECL_SIZE
and DECL_ALIGN
are
analogous to TYPE_SIZE
and TYPE_ALIGN
. For a declaration,
you should always use the DECL_SIZE
and DECL_ALIGN
rather
than the TYPE_SIZE
and TYPE_ALIGN
given by the
TREE_TYPE
, since special attributes may have been applied to the
variable to give it a particular size and alignment. You may use the
predicates DECL_THIS_STATIC
or DECL_THIS_EXTERN
to test
whether the storage class specifiers static
or extern
were
used to declare a variable.
If this variable is initialized (but does not require a constructor),
the DECL_INITIAL
will be an expression for the initializer. The
initializer should be evaluated, and a bitwise copy into the variable
performed. If the DECL_INITIAL
is the error_mark_node
,
there is an initializer, but it is given by an explicit statement later
in the code; no bitwise copy is required.
GCC provides an extension that allows either automatic variables, or
global variables, to be placed in particular registers. This extension
is being used for a particular VAR_DECL
if DECL_REGISTER
holds for the VAR_DECL
, and if DECL_ASSEMBLER_NAME
is not
equal to DECL_NAME
. In that case, DECL_ASSEMBLER_NAME
is
the name of the register into which the variable will be placed.
PARM_DECL
VAR_DECL
nodes. These nodes only appear in the
DECL_ARGUMENTS
for a FUNCTION_DECL
.
The DECL_ARG_TYPE
for a PARM_DECL
is the type that will
actually be used when a value is passed to this function. It may be a
wider type than the TREE_TYPE
of the parameter; for example, the
ordinary type might be short
while the DECL_ARG_TYPE
is
int
.
DEBUG_EXPR_DECL
FIELD_DECL
DECL_SIZE
and
DECL_ALIGN
behave as for VAR_DECL
nodes.
The position of the field within the parent record is specified by a
combination of three attributes. DECL_FIELD_OFFSET
is the position,
counting in bytes, of the DECL_OFFSET_ALIGN
-bit sized word containing
the bit of the field closest to the beginning of the structure.
DECL_FIELD_BIT_OFFSET
is the bit offset of the first bit of the field
within this word; this may be nonzero even for fields that are not bit-fields,
since DECL_OFFSET_ALIGN
may be greater than the natural alignment
of the field's type.
If DECL_C_BIT_FIELD
holds, this field is a bit-field. In a bit-field,
DECL_BIT_FIELD_TYPE
also contains the type that was originally
specified for it, while DECL_TYPE may be a modified type with lesser precision,
according to the size of the bit field.
NAMESPACE_DECL
DECL_CONTEXT
of other _DECL
nodes.
DECL
nodes are represented internally as a hierarchy of
structures.
struct tree_decl_minimal
DECL
macros to work. The fields it contains are a unique ID,
source location, context, and name.
struct tree_decl_common
struct tree_decl_minimal
. It
contains fields that most DECL
nodes need, such as a field to
store alignment, machine mode, size, and attributes.
struct tree_field_decl
struct tree_decl_common
. It is
used to represent FIELD_DECL
.
struct tree_label_decl
struct tree_decl_common
. It is
used to represent LABEL_DECL
.
struct tree_translation_unit_decl
struct tree_decl_common
. It is
used to represent TRANSLATION_UNIT_DECL
.
struct tree_decl_with_rtl
struct tree_decl_common
. It
contains a field to store the low-level RTL associated with a
DECL
node.
struct tree_result_decl
struct tree_decl_with_rtl
. It is
used to represent RESULT_DECL
.
struct tree_const_decl
struct tree_decl_with_rtl
. It is
used to represent CONST_DECL
.
struct tree_parm_decl
struct tree_decl_with_rtl
. It is
used to represent PARM_DECL
.
struct tree_decl_with_vis
struct tree_decl_with_rtl
. It
contains fields necessary to store visibility information, as well as
a section name and assembler name.
struct tree_var_decl
struct tree_decl_with_vis
. It is
used to represent VAR_DECL
.
struct tree_function_decl
struct tree_decl_with_vis
. It is
used to represent FUNCTION_DECL
.
Adding a new DECL
tree consists of the following steps
DECL
nodeDECL
nodes, there is a .def file
in each frontend directory where the tree code should be added.
For DECL
nodes that are part of the middle-end, the code should
be added to tree.def.
DECL
nodestruct tree_foo_decl { struct tree_decl_with_vis common; }
Would create a structure name tree_foo_decl
that inherits from
struct tree_decl_with_vis
.
For language specific DECL
nodes, this new structure type
should go in the appropriate .h file.
For DECL
nodes that are part of the middle-end, the structure
type should go in tree.h.
DECL
node structure type is required to have a unique enumerator value
specified with it.
For language specific DECL
nodes, this new enumerator value
should go in the appropriate .def file.
For DECL
nodes that are part of the middle-end, the enumerator
values are specified in treestruct.def.
union tree_node
union tree_node
.
For language specific DECL
nodes, a new entry should be added
to the appropriate .h file of the form
struct tree_foo_decl GTY ((tag ("TS_VAR_DECL"))) foo_decl;
For DECL
nodes that are part of the middle-end, the additional
member goes directly into union tree_node
in tree.h.
union tree_node
is legal, and whether a certain DECL
node
contains one of the enumerated DECL
node structures in the
hierarchy, a simple lookup table is used.
This lookup table needs to be kept up to date with the tree structure
hierarchy, or else checking and containment macros will fail
inappropriately.
For language specific DECL
nodes, their is an init_ts
function in an appropriate .c file, which initializes the lookup
table.
Code setting up the table for new DECL
nodes should be added
there.
For each DECL
tree code and enumerator value representing a
member of the inheritance hierarchy, the table should contain 1 if
that tree code inherits (directly or indirectly) from that member.
Thus, a FOO_DECL
node derived from struct decl_with_rtl
,
and enumerator value TS_FOO_DECL
, would be set up as follows
tree_contains_struct[FOO_DECL][TS_FOO_DECL] = 1; tree_contains_struct[FOO_DECL][TS_DECL_WRTL] = 1; tree_contains_struct[FOO_DECL][TS_DECL_COMMON] = 1; tree_contains_struct[FOO_DECL][TS_DECL_MINIMAL] = 1;
For DECL
nodes that are part of the middle-end, the setup code
goes into tree.c.
DECL
nodes access the field.
These macros generally take the following form
#define FOO_DECL_FIELDNAME(NODE) FOO_DECL_CHECK(NODE)->foo_decl.fieldname
However, if the structure is simply a base class for further structures, something like the following should be used
#define BASE_STRUCT_CHECK(T) CONTAINS_STRUCT_CHECK(T, TS_BASE_STRUCT) #define BASE_STRUCT_FIELDNAME(NODE) \ (BASE_STRUCT_CHECK(NODE)->base_struct.fieldname
Reading them from the generated all-tree.def file (which in
turn includes all the tree.def files), gencheck.c is
used during GCC's build to generate the *_CHECK
macros for all
tree codes.
Attributes, as specified using the __attribute__
keyword, are
represented internally as a TREE_LIST
. The TREE_PURPOSE
is the name of the attribute, as an IDENTIFIER_NODE
. The
TREE_VALUE
is a TREE_LIST
of the arguments of the
attribute, if any, or NULL_TREE
if there are no arguments; the
arguments are stored as the TREE_VALUE
of successive entries in
the list, and may be identifiers or expressions. The TREE_CHAIN
of the attribute is the next attribute in a list of attributes applying
to the same declaration or type, or NULL_TREE
if there are no
further attributes in the list.
Attributes may be attached to declarations and to types; these attributes may be accessed with the following macros. All attributes are stored in this way, and many also cause other changes to the declaration or type or to other internal compiler data structures.
This macro returns the attributes on the declaration decl.
The internal representation for expressions is for the most part quite straightforward. However, there are a few facts that one must bear in mind. In particular, the expression “tree” is actually a directed acyclic graph. (For example there may be many references to the integer constant zero throughout the source program; many of these will be represented by the same expression node.) You should not rely on certain kinds of node being shared, nor should you rely on certain kinds of nodes being unshared.
The following macros can be used with all expression nodes:
TREE_TYPE
In what follows, some nodes that one might expect to always have type
bool
are documented to have either integral or boolean type. At
some point in the future, the C front end may also make use of this same
intermediate representation, and at this point these nodes will
certainly have integral type. The previous sentence is not meant to
imply that the C++ front end does not or will not give these nodes
integral type.
Below, we list the various kinds of expression nodes. Except where
noted otherwise, the operands to an expression are accessed using the
TREE_OPERAND
macro. For example, to access the first operand to
a binary plus expression expr
, use:
TREE_OPERAND (expr, 0)
As this example indicates, the operands are zero-indexed.
The table below begins with constants, moves on to unary expressions, then proceeds to binary expressions, and concludes with various other kinds of expressions:
INTEGER_CST
TREE_TYPE
; they are not always of type
int
. In particular, char
constants are represented with
INTEGER_CST
nodes. The value of the integer constant e
is
represented in an array of HOST_WIDE_INT. There are enough elements
in the array to represent the value without taking extra elements for
redundant 0s or -1. The number of elements used to represent e
is available via TREE_INT_CST_NUNITS
. Element i
can be
extracted by using TREE_INT_CST_ELT (e, i)
.
TREE_INT_CST_LOW
is a shorthand for TREE_INT_CST_ELT (e, 0)
.
The functions tree_fits_shwi_p
and tree_fits_uhwi_p
can be used to tell if the value is small enough to fit in a
signed HOST_WIDE_INT or an unsigned HOST_WIDE_INT respectively.
The value can then be extracted using tree_to_shwi
and
tree_to_uhwi
.
REAL_CST
FIXED_CST
TREE_TYPE
. TREE_FIXED_CST_PTR
points to
a struct fixed_value
; TREE_FIXED_CST
returns the structure
itself. struct fixed_value
contains data
with the size of two
HOST_BITS_PER_WIDE_INT
and mode
as the associated fixed-point
machine mode for data
.
COMPLEX_CST
__complex__
whose parts are constant nodes. The
TREE_REALPART
and TREE_IMAGPART
return the real and the
imaginary parts respectively.
VECTOR_CST
TREE_LIST
of the
constant nodes and is accessed through TREE_VECTOR_CST_ELTS
.
STRING_CST
TREE_STRING_LENGTH
returns the length of the string, as an int
. The
TREE_STRING_POINTER
is a char*
containing the string
itself. The string may not be NUL
-terminated, and it may contain
embedded NUL
characters. Therefore, the
TREE_STRING_LENGTH
includes the trailing NUL
if it is
present.
For wide string constants, the TREE_STRING_LENGTH
is the number
of bytes in the string, and the TREE_STRING_POINTER
points to an array of the bytes of the string, as represented on the
target system (that is, as integers in the target endianness). Wide and
non-wide string constants are distinguished only by the TREE_TYPE
of the STRING_CST
.
FIXME: The formats of string constants are not well-defined when the target system bytes are not the same width as host system bytes.
ARRAY_REF
array_ref_low_bound
and array_ref_element_size
instead.
ARRAY_RANGE_REF
ARRAY_REF
and have the same
meanings. The type of these expressions must be an array whose component
type is the same as that of the first operand. The range of that array
type determines the amount of data these expressions access.
TARGET_MEM_REF
TMR_SYMBOL
and must be a VAR_DECL
of an object with
a fixed address. The second argument is TMR_BASE
and the
third one is TMR_INDEX
. The fourth argument is
TMR_STEP
and must be an INTEGER_CST
. The fifth
argument is TMR_OFFSET
and must be an INTEGER_CST
.
Any of the arguments may be NULL if the appropriate component
does not appear in the address. Address of the TARGET_MEM_REF
is determined in the following way.
&TMR_SYMBOL + TMR_BASE + TMR_INDEX * TMR_STEP + TMR_OFFSET
The sixth argument is the reference to the original memory access, which
is preserved for the purposes of the RTL alias analysis. The seventh
argument is a tag representing the results of tree level alias analysis.
ADDR_EXPR
As an extension, GCC allows users to take the address of a label. In
this case, the operand of the ADDR_EXPR
will be a
LABEL_DECL
. The type of such an expression is void*
.
If the object addressed is not an lvalue, a temporary is created, and
the address of the temporary is used.
INDIRECT_REF
MEM_REF
COMPONENT_REF
FIELD_DECL
for the data member. The third operand represents
the byte offset of the field, but should not be used directly; call
component_ref_field_offset
instead.
NEGATE_EXPR
The behavior of this operation on signed arithmetic overflow is
controlled by the flag_wrapv
and flag_trapv
variables.
ABS_EXPR
abs
, labs
and llabs
builtins for
integer types, and the fabs
, fabsf
and fabsl
builtins for floating point types. The type of abs operation can
be determined by looking at the type of the expression.
This node is not used for complex types. To represent the modulus
or complex abs of a complex value, use the BUILT_IN_CABS
,
BUILT_IN_CABSF
or BUILT_IN_CABSL
builtins, as used
to implement the C99 cabs
, cabsf
and cabsl
built-in functions.
BIT_NOT_EXPR
TRUTH_NOT_EXPR
BOOLEAN_TYPE
or INTEGER_TYPE
.
PREDECREMENT_EXPR
PREINCREMENT_EXPR
POSTDECREMENT_EXPR
POSTINCREMENT_EXPR
PREDECREMENT_EXPR
and
PREINCREMENT_EXPR
, the value of the expression is the value
resulting after the increment or decrement; in the case of
POSTDECREMENT_EXPR
and POSTINCREMENT_EXPR
is the value
before the increment or decrement occurs. The type of the operand, like
that of the result, will be either integral, boolean, or floating-point.
FIX_TRUNC_EXPR
FLOAT_EXPR
FIXME: How is the operand supposed to be rounded? Is this dependent on
-mieee?
COMPLEX_EXPR
CONJ_EXPR
REALPART_EXPR
IMAGPART_EXPR
NON_LVALUE_EXPR
NOP_EXPR
char*
to an
int*
does not require any code be generated; such a conversion is
represented by a NOP_EXPR
. The single operand is the expression
to be converted. The conversion from a pointer to a reference is also
represented with a NOP_EXPR
.
CONVERT_EXPR
NOP_EXPR
s, but are used in those
situations where code may need to be generated. For example, if an
int*
is converted to an int
code may need to be generated
on some platforms. These nodes are never used for C++-specific
conversions, like conversions between pointers to different classes in
an inheritance hierarchy. Any adjustments that need to be made in such
cases are always indicated explicitly. Similarly, a user-defined
conversion is never represented by a CONVERT_EXPR
; instead, the
function calls are made explicit.
FIXED_CONVERT_EXPR
LSHIFT_EXPR
RSHIFT_EXPR
BIT_IOR_EXPR
BIT_XOR_EXPR
BIT_AND_EXPR
TRUTH_ANDIF_EXPR
TRUTH_ORIF_EXPR
BOOLEAN_TYPE
or INTEGER_TYPE
.
TRUTH_AND_EXPR
TRUTH_OR_EXPR
TRUTH_XOR_EXPR
BOOLEAN_TYPE
or INTEGER_TYPE
.
POINTER_PLUS_EXPR
PLUS_EXPR
MINUS_EXPR
MULT_EXPR
The behavior of these operations on signed arithmetic overflow is
controlled by the flag_wrapv
and flag_trapv
variables.
MULT_HIGHPART_EXPR
RDIV_EXPR
TRUNC_DIV_EXPR
FLOOR_DIV_EXPR
CEIL_DIV_EXPR
ROUND_DIV_EXPR
TRUNC_DIV_EXPR
rounds towards zero, FLOOR_DIV_EXPR
rounds towards negative infinity, CEIL_DIV_EXPR
rounds towards
positive infinity and ROUND_DIV_EXPR
rounds to the closest integer.
Integer division in C and C++ is truncating, i.e. TRUNC_DIV_EXPR
.
The behavior of these operations on signed arithmetic overflow, when
dividing the minimum signed integer by minus one, is controlled by the
flag_wrapv
and flag_trapv
variables.
TRUNC_MOD_EXPR
FLOOR_MOD_EXPR
CEIL_MOD_EXPR
ROUND_MOD_EXPR
a
and b
is
defined as a - (a/b)*b
where the division calculated using
the corresponding division operator. Hence for TRUNC_MOD_EXPR
this definition assumes division using truncation towards zero, i.e.
TRUNC_DIV_EXPR
. Integer remainder in C and C++ uses truncating
division, i.e. TRUNC_MOD_EXPR
.
EXACT_DIV_EXPR
EXACT_DIV_EXPR
code is used to represent integer divisions where
the numerator is known to be an exact multiple of the denominator. This
allows the backend to choose between the faster of TRUNC_DIV_EXPR
,
CEIL_DIV_EXPR
and FLOOR_DIV_EXPR
for the current target.
LT_EXPR
LE_EXPR
GT_EXPR
GE_EXPR
EQ_EXPR
NE_EXPR
For floating point comparisons, if we honor IEEE NaNs and either operand
is NaN, then NE_EXPR
always returns true and the remaining operators
always return false. On some targets, comparisons against an IEEE NaN,
other than equality and inequality, may generate a floating point exception.
ORDERED_EXPR
UNORDERED_EXPR
UNLT_EXPR
UNLE_EXPR
UNGT_EXPR
UNGE_EXPR
UNEQ_EXPR
LTGT_EXPR
UNLT_EXPR
returns true if either operand is an IEEE
NaN or the first operand is less than the second. With the possible
exception of LTGT_EXPR
, all of these operations are guaranteed
not to generate a floating point exception. The result
type of these expressions will always be of integral or boolean type.
These operations return the result type's zero value for false,
and the result type's one value for true.
MODIFY_EXPR
VAR_DECL
, INDIRECT_REF
, COMPONENT_REF
, or
other lvalue.
These nodes are used to represent not only assignment with ‘=’ but
also compound assignments (like ‘+=’), by reduction to ‘=’
assignment. In other words, the representation for ‘i += 3’ looks
just like that for ‘i = i + 3’.
INIT_EXPR
MODIFY_EXPR
, but are used only when a
variable is initialized, rather than assigned to subsequently. This
means that we can assume that the target of the initialization is not
used in computing its own value; any reference to the lhs in computing
the rhs is undefined.
COMPOUND_EXPR
COND_EXPR
?:
expressions. The first operand
is of boolean or integral type. If it evaluates to a nonzero value,
the second operand should be evaluated, and returned as the value of the
expression. Otherwise, the third operand is evaluated, and returned as
the value of the expression.
The second operand must have the same type as the entire expression,
unless it unconditionally throws an exception or calls a noreturn
function, in which case it should have void type. The same constraints
apply to the third operand. This allows array bounds checks to be
represented conveniently as (i >= 0 && i < 10) ? i : abort()
.
As a GNU extension, the C language front-ends allow the second
operand of the ?:
operator may be omitted in the source.
For example, x ? : 3
is equivalent to x ? x : 3
,
assuming that x
is an expression without side-effects.
In the tree representation, however, the second operand is always
present, possibly protected by SAVE_EXPR
if the first
argument does cause side-effects.
CALL_EXPR
CALL_EXPR
s are implemented as
expression nodes with a variable number of operands. Rather than using
TREE_OPERAND
to extract them, it is preferable to use the
specialized accessor macros and functions that operate specifically on
CALL_EXPR
nodes.
CALL_EXPR_FN
returns a pointer to the
function to call; it is always an expression whose type is a
POINTER_TYPE
.
The number of arguments to the call is returned by call_expr_nargs
,
while the arguments themselves can be accessed with the CALL_EXPR_ARG
macro. The arguments are zero-indexed and numbered left-to-right.
You can iterate over the arguments using FOR_EACH_CALL_EXPR_ARG
, as in:
tree call, arg; call_expr_arg_iterator iter; FOR_EACH_CALL_EXPR_ARG (arg, iter, call) /* arg is bound to successive arguments of call. */ ...;
For non-static
member functions, there will be an operand corresponding to the
this
pointer. There will always be expressions corresponding to
all of the arguments, even if the function is declared with default
arguments and some arguments are not explicitly provided at the call
sites.
CALL_EXPR
s also have a CALL_EXPR_STATIC_CHAIN
operand that
is used to implement nested functions. This operand is otherwise null.
CLEANUP_POINT_EXPR
CONSTRUCTOR
INDEX
, VALUE
) pair.
If the TREE_TYPE
of the CONSTRUCTOR
is a RECORD_TYPE
,
UNION_TYPE
or QUAL_UNION_TYPE
then the INDEX
of each
node in the sequence will be a FIELD_DECL
and the VALUE
will
be the expression used to initialize that field.
If the TREE_TYPE
of the CONSTRUCTOR
is an ARRAY_TYPE
,
then the INDEX
of each node in the sequence will be an
INTEGER_CST
or a RANGE_EXPR
of two INTEGER_CST
s.
A single INTEGER_CST
indicates which element of the array is being
assigned to. A RANGE_EXPR
indicates an inclusive range of elements
to initialize. In both cases the VALUE
is the corresponding
initializer. It is re-evaluated for each element of a
RANGE_EXPR
. If the INDEX
is NULL_TREE
, then
the initializer is for the next available array element.
In the front end, you should not depend on the fields appearing in any
particular order. However, in the middle end, fields must appear in
declaration order. You should not assume that all fields will be
represented. Unrepresented fields will be cleared (zeroed), unless the
CONSTRUCTOR_NO_CLEARING flag is set, in which case their value becomes
undefined.
COMPOUND_LITERAL_EXPR
COMPOUND_LITERAL_EXPR_DECL_EXPR
is a DECL_EXPR
containing an anonymous VAR_DECL
for
the unnamed object represented by the compound literal; the
DECL_INITIAL
of that VAR_DECL
is a CONSTRUCTOR
representing the brace-enclosed list of initializers in the compound
literal. That anonymous VAR_DECL
can also be accessed directly
by the COMPOUND_LITERAL_EXPR_DECL
macro.
SAVE_EXPR
SAVE_EXPR
represents an expression (possibly involving
side-effects) that is used more than once. The side-effects should
occur only the first time the expression is evaluated. Subsequent uses
should just reuse the computed value. The first operand to the
SAVE_EXPR
is the expression to evaluate. The side-effects should
be executed where the SAVE_EXPR
is first encountered in a
depth-first preorder traversal of the expression tree.
TARGET_EXPR
TARGET_EXPR
represents a temporary object. The first operand
is a VAR_DECL
for the temporary variable. The second operand is
the initializer for the temporary. The initializer is evaluated and,
if non-void, copied (bitwise) into the temporary. If the initializer
is void, that means that it will perform the initialization itself.
Often, a TARGET_EXPR
occurs on the right-hand side of an
assignment, or as the second operand to a comma-expression which is
itself the right-hand side of an assignment, etc. In this case, we say
that the TARGET_EXPR
is “normal”; otherwise, we say it is
“orphaned”. For a normal TARGET_EXPR
the temporary variable
should be treated as an alias for the left-hand side of the assignment,
rather than as a new temporary variable.
The third operand to the TARGET_EXPR
, if present, is a
cleanup-expression (i.e., destructor call) for the temporary. If this
expression is orphaned, then this expression must be executed when the
statement containing this expression is complete. These cleanups must
always be executed in the order opposite to that in which they were
encountered. Note that if a temporary is created on one branch of a
conditional operator (i.e., in the second or third operand to a
COND_EXPR
), the cleanup must be run only if that branch is
actually executed.
VA_ARG_EXPR
va_arg (ap, type)
.
Its TREE_TYPE
yields the tree representation for type
and
its sole argument yields the representation for ap
.
ANNOTATE_EXPR
INTEGER_CST
with
a value from enum annot_expr_kind
.
VEC_LSHIFT_EXPR
VEC_RSHIFT_EXPR
VEC_WIDEN_MULT_HI_EXPR
VEC_WIDEN_MULT_LO_EXPR
N
) of the same integral type.
The result is a vector that contains half as many elements, of an integral type
whose size is twice as wide. In the case of VEC_WIDEN_MULT_HI_EXPR
the
high N/2
elements of the two vector are multiplied to produce the
vector of N/2
products. In the case of VEC_WIDEN_MULT_LO_EXPR
the
low N/2
elements of the two vector are multiplied to produce the
vector of N/2
products.
VEC_UNPACK_HI_EXPR
VEC_UNPACK_LO_EXPR
N
elements
of the same integral or floating point type. The result is a vector
that contains half as many elements, of an integral or floating point type
whose size is twice as wide. In the case of VEC_UNPACK_HI_EXPR
the
high N/2
elements of the vector are extracted and widened (promoted).
In the case of VEC_UNPACK_LO_EXPR
the low N/2
elements of the
vector are extracted and widened (promoted).
VEC_UNPACK_FLOAT_HI_EXPR
VEC_UNPACK_FLOAT_LO_EXPR
N
elements of the same
integral type. The result is a vector that contains half as many elements
of a floating point type whose size is twice as wide. In the case of
VEC_UNPACK_HI_EXPR
the high N/2
elements of the vector are
extracted, converted and widened. In the case of VEC_UNPACK_LO_EXPR
the low N/2
elements of the vector are extracted, converted and widened.
VEC_PACK_TRUNC_EXPR
VEC_PACK_SAT_EXPR
VEC_PACK_FIX_TRUNC_EXPR
VEC_COND_EXPR
?:
expressions. The three operands must be
vectors of the same size and number of elements. The second and third
operands must have the same type as the entire expression. The first
operand is of signed integral vector type. If an element of the first
operand evaluates to a zero value, the corresponding element of the
result is taken from the third operand. If it evaluates to a minus one
value, it is taken from the second operand. It should never evaluate to
any other value currently, but optimizations should not rely on that
property. In contrast with a COND_EXPR
, all operands are always
evaluated.
SAD_EXPR
Most statements in GIMPLE are assignment statements, represented by
GIMPLE_ASSIGN
. No other C expressions can appear at statement level;
a reference to a volatile object is converted into a
GIMPLE_ASSIGN
.
There are also several varieties of complex statements.
ASM_EXPR
asm ("mov x, y");
The ASM_STRING
macro will return a STRING_CST
node for
"mov x, y"
. If the original statement made use of the
extended-assembly syntax, then ASM_OUTPUTS
,
ASM_INPUTS
, and ASM_CLOBBERS
will be the outputs, inputs,
and clobbers for the statement, represented as STRING_CST
nodes.
The extended-assembly syntax looks like:
asm ("fsinx %1,%0" : "=f" (result) : "f" (angle));
The first string is the ASM_STRING
, containing the instruction
template. The next two strings are the output and inputs, respectively;
this statement has no clobbers. As this example indicates, “plain”
assembly statements are merely a special case of extended assembly
statements; they have no cv-qualifiers, outputs, inputs, or clobbers.
All of the strings will be NUL
-terminated, and will contain no
embedded NUL
-characters.
If the assembly statement is declared volatile
, or if the
statement was not an extended assembly statement, and is therefore
implicitly volatile, then the predicate ASM_VOLATILE_P
will hold
of the ASM_EXPR
.
DECL_EXPR
DECL_EXPR_DECL
macro
can be used to obtain the entity declared. This declaration may be a
LABEL_DECL
, indicating that the label declared is a local label.
(As an extension, GCC allows the declaration of labels with scope.) In
C, this declaration may be a FUNCTION_DECL
, indicating the
use of the GCC nested function extension. For more information,
see Functions.
LABEL_EXPR
LABEL_DECL
declared by this
statement can be obtained with the LABEL_EXPR_LABEL
macro. The
IDENTIFIER_NODE
giving the name of the label can be obtained from
the LABEL_DECL
with DECL_NAME
.
GOTO_EXPR
goto
statement. The GOTO_DESTINATION
will
usually be a LABEL_DECL
. However, if the “computed goto” extension
has been used, the GOTO_DESTINATION
will be an arbitrary expression
indicating the destination. This expression will always have pointer type.
RETURN_EXPR
return
statement. Operand 0 represents the
value to return. It should either be the RESULT_DECL
for the
containing function, or a MODIFY_EXPR
or INIT_EXPR
setting the function's RESULT_DECL
. It will be
NULL_TREE
if the statement was just
return;
LOOP_EXPR
LOOP_EXPR_BODY
represents the body of the loop. It should be executed forever, unless
an EXIT_EXPR
is encountered.
EXIT_EXPR
LOOP_EXPR
. The single operand is the condition; if it is
nonzero, then the loop should be exited. An EXIT_EXPR
will only
appear within a LOOP_EXPR
.
SWITCH_STMT
switch
statement. The SWITCH_STMT_COND
is the expression on which the switch is occurring. See the documentation
for an IF_STMT
for more information on the representation used
for the condition. The SWITCH_STMT_BODY
is the body of the switch
statement. The SWITCH_STMT_TYPE
is the original type of switch
expression as given in the source, before any compiler conversions.
CASE_LABEL_EXPR
case
label, range of case
labels, or a
default
label. If CASE_LOW
is NULL_TREE
, then this is a
default
label. Otherwise, if CASE_HIGH
is NULL_TREE
, then
this is an ordinary case
label. In this case, CASE_LOW
is
an expression giving the value of the label. Both CASE_LOW
and
CASE_HIGH
are INTEGER_CST
nodes. These values will have
the same type as the condition expression in the switch statement.
Otherwise, if both CASE_LOW
and CASE_HIGH
are defined, the
statement is a range of case labels. Such statements originate with the
extension that allows users to write things of the form:
case 2 ... 5:
The first value will be CASE_LOW
, while the second will be
CASE_HIGH
.
Block scopes and the variables they declare in GENERIC are
expressed using the BIND_EXPR
code, which in previous
versions of GCC was primarily used for the C statement-expression
extension.
Variables in a block are collected into BIND_EXPR_VARS
in
declaration order through their TREE_CHAIN
field. Any runtime
initialization is moved out of DECL_INITIAL
and into a
statement in the controlled block. When gimplifying from C or C++,
this initialization replaces the DECL_STMT
. These variables
will never require cleanups. The scope of these variables is just the
body
Variable-length arrays (VLAs) complicate this process, as their size
often refers to variables initialized earlier in the block and their
initialization involves an explicit stack allocation. To handle this,
we add an indirection and replace them with a pointer to stack space
allocated by means of alloca
. In most cases, we also arrange
for this space to be reclaimed when the enclosing BIND_EXPR
is
exited, the exception to this being when there is an explicit call to
alloca
in the source code, in which case the stack is left
depressed on exit of the BIND_EXPR
.
A C++ program will usually contain more BIND_EXPR
s than
there are syntactic blocks in the source code, since several C++
constructs have implicit scopes associated with them. On the
other hand, although the C++ front end uses pseudo-scopes to
handle cleanups for objects with destructors, these don't
translate into the GIMPLE form; multiple declarations at the same
level use the same BIND_EXPR
.
Multiple statements at the same nesting level are collected into
a STATEMENT_LIST
. Statement lists are modified and
traversed using the interface in ‘tree-iterator.h’.
Whenever possible, statements with no effect are discarded. But
if they are nested within another construct which cannot be
discarded for some reason, they are instead replaced with an
empty statement, generated by build_empty_stmt
.
Initially, all empty statements were shared, after the pattern of
the Java front end, but this caused a lot of trouble in practice.
An empty statement is represented as (void)0
.
Other jumps are expressed by either GOTO_EXPR
or
RETURN_EXPR
.
The operand of a GOTO_EXPR
must be either a label or a
variable containing the address to jump to.
The operand of a RETURN_EXPR
is either NULL_TREE
,
RESULT_DECL
, or a MODIFY_EXPR
which sets the return
value. It would be nice to move the MODIFY_EXPR
into a
separate statement, but the special return semantics in
expand_return
make that difficult. It may still happen in
the future, perhaps by moving most of that logic into
expand_assignment
.
Destructors for local C++ objects and similar dynamic cleanups are
represented in GIMPLE by a TRY_FINALLY_EXPR
.
TRY_FINALLY_EXPR
has two operands, both of which are a sequence
of statements to execute. The first sequence is executed. When it
completes the second sequence is executed.
The first sequence may complete in the following ways:
GOTO_EXPR
) to an ordinary
label outside the sequence.
RETURN_EXPR
).
The second sequence is not executed if the first sequence completes by
calling setjmp
or exit
or any other function that does
not return. The second sequence is also not executed if the first
sequence completes via a non-local goto or a computed goto (in general
the compiler does not know whether such a goto statement exits the
first sequence or not, so we assume that it doesn't).
After the second sequence is executed, if it completes normally by falling off the end, execution continues wherever the first sequence would have continued, by falling off the end, or doing a goto, etc.
TRY_FINALLY_EXPR
complicates the flow graph, since the cleanup
needs to appear on every edge out of the controlled block; this
reduces the freedom to move code across these edges. Therefore, the
EH lowering pass which runs before most of the optimization passes
eliminates these expressions by explicitly adding the cleanup to each
edge. Rethrowing the exception is represented using RESX_EXPR
.
All the statements starting with OMP_
represent directives and
clauses used by the OpenMP API http://www.openmp.org/.
OMP_PARALLEL
#pragma omp parallel [clause1 ... clauseN]
. It
has four operands:
Operand OMP_PARALLEL_BODY
is valid while in GENERIC and
High GIMPLE forms. It contains the body of code to be executed
by all the threads. During GIMPLE lowering, this operand becomes
NULL
and the body is emitted linearly after
OMP_PARALLEL
.
Operand OMP_PARALLEL_CLAUSES
is the list of clauses
associated with the directive.
Operand OMP_PARALLEL_FN
is created by
pass_lower_omp
, it contains the FUNCTION_DECL
for the function that will contain the body of the parallel
region.
Operand OMP_PARALLEL_DATA_ARG
is also created by
pass_lower_omp
. If there are shared variables to be
communicated to the children threads, this operand will contain
the VAR_DECL
that contains all the shared values and
variables.
OMP_FOR
#pragma omp for [clause1 ... clauseN]
. It has
six operands:
Operand OMP_FOR_BODY
contains the loop body.
Operand OMP_FOR_CLAUSES
is the list of clauses
associated with the directive.
Operand OMP_FOR_INIT
is the loop initialization code of
the form VAR = N1
.
Operand OMP_FOR_COND
is the loop conditional expression
of the form VAR {<,>,<=,>=} N2
.
Operand OMP_FOR_INCR
is the loop index increment of the
form VAR {+=,-=} INCR
.
Operand OMP_FOR_PRE_BODY
contains side-effect code from
operands OMP_FOR_INIT
, OMP_FOR_COND
and
OMP_FOR_INC
. These side-effects are part of the
OMP_FOR
block but must be evaluated before the start of
loop body.
The loop index variable VAR
must be a signed integer variable,
which is implicitly private to each thread. Bounds
N1
and N2
and the increment expression
INCR
are required to be loop invariant integer
expressions that are evaluated without any synchronization. The
evaluation order, frequency of evaluation and side-effects are
unspecified by the standard.
OMP_SECTIONS
#pragma omp sections [clause1 ... clauseN]
.
Operand OMP_SECTIONS_BODY
contains the sections body,
which in turn contains a set of OMP_SECTION
nodes for
each of the concurrent sections delimited by #pragma omp
section
.
Operand OMP_SECTIONS_CLAUSES
is the list of clauses
associated with the directive.
OMP_SECTION
OMP_SECTIONS
.
OMP_SINGLE
#pragma omp single
.
Operand OMP_SINGLE_BODY
contains the body of code to be
executed by a single thread.
Operand OMP_SINGLE_CLAUSES
is the list of clauses
associated with the directive.
OMP_MASTER
#pragma omp master
.
Operand OMP_MASTER_BODY
contains the body of code to be
executed by the master thread.
OMP_ORDERED
#pragma omp ordered
.
Operand OMP_ORDERED_BODY
contains the body of code to be
executed in the sequential order dictated by the loop index
variable.
OMP_CRITICAL
#pragma omp critical [name]
.
Operand OMP_CRITICAL_BODY
is the critical section.
Operand OMP_CRITICAL_NAME
is an optional identifier to
label the critical section.
OMP_RETURN
tree-cfg.c
) and OpenMP region
building code (omp-low.c
).
OMP_CONTINUE
OMP_FOR
(and similar codes) as well as
OMP_SECTIONS
to mark the place where the code needs to
loop to the next iteration, or the next section, respectively.
In some cases, OMP_CONTINUE
is placed right before
OMP_RETURN
. But if there are cleanups that need to
occur right after the looping body, it will be emitted between
OMP_CONTINUE
and OMP_RETURN
.
OMP_ATOMIC
#pragma omp atomic
.
Operand 0 is the address at which the atomic operation is to be performed.
Operand 1 is the expression to evaluate. The gimplifier tries
three alternative code generation strategies. Whenever possible,
an atomic update built-in is used. If that fails, a
compare-and-swap loop is attempted. If that also fails, a
regular critical section around the expression is used.
OMP_CLAUSE
OMP_
directives.
Clauses are represented by separate subcodes defined in
tree.h. Clauses codes can be one of:
OMP_CLAUSE_PRIVATE
, OMP_CLAUSE_SHARED
,
OMP_CLAUSE_FIRSTPRIVATE
,
OMP_CLAUSE_LASTPRIVATE
, OMP_CLAUSE_COPYIN
,
OMP_CLAUSE_COPYPRIVATE
, OMP_CLAUSE_IF
,
OMP_CLAUSE_NUM_THREADS
, OMP_CLAUSE_SCHEDULE
,
OMP_CLAUSE_NOWAIT
, OMP_CLAUSE_ORDERED
,
OMP_CLAUSE_DEFAULT
, OMP_CLAUSE_REDUCTION
,
OMP_CLAUSE_COLLAPSE
, OMP_CLAUSE_UNTIED
,
OMP_CLAUSE_FINAL
, and OMP_CLAUSE_MERGEABLE
. Each code
represents the corresponding OpenMP clause.
Clauses associated with the same directive are chained together
via OMP_CLAUSE_CHAIN
. Those clauses that accept a list
of variables are restricted to exactly one, accessed with
OMP_CLAUSE_VAR
. Therefore, multiple variables under the
same clause C
need to be represented as multiple C
clauses
chained together. This facilitates adding new clauses during
compilation.
All the statements starting with OACC_
represent directives and
clauses used by the OpenACC API http://www.openacc.org/.
OACC_CACHE
#pragma acc cache (var ...)
.
OACC_DATA
#pragma acc data [clause1 ... clauseN]
.
OACC_DECLARE
#pragma acc declare [clause1 ... clauseN]
.
OACC_ENTER_DATA
#pragma acc enter data [clause1 ... clauseN]
.
OACC_EXIT_DATA
#pragma acc exit data [clause1 ... clauseN]
.
OACC_HOST_DATA
#pragma acc host_data [clause1 ... clauseN]
.
OACC_KERNELS
#pragma acc kernels [clause1 ... clauseN]
.
OACC_LOOP
#pragma acc loop [clause1 ... clauseN]
.
See the description of the OMP_FOR
code.
OACC_PARALLEL
#pragma acc parallel [clause1 ... clauseN]
.
OACC_UPDATE
#pragma acc update [clause1 ... clauseN]
.
A function is represented by a FUNCTION_DECL
node. It stores
the basic pieces of the function such as body, parameters, and return
type as well as information on the surrounding context, visibility,
and linkage.
A function has four core parts: the name, the parameters, the result,
and the body. The following macros and functions access these parts
of a FUNCTION_DECL
as well as other basic features:
DECL_NAME
IDENTIFIER_NODE
. For an instantiation of a function template,
the DECL_NAME
is the unqualified name of the template, not
something like f<int>
. The value of DECL_NAME
is
undefined when used on a constructor, destructor, overloaded operator,
or type-conversion operator, or any function that is implicitly
generated by the compiler. See below for macros that can be used to
distinguish these cases.
DECL_ASSEMBLER_NAME
IDENTIFIER_NODE
. This name does not contain leading underscores
on systems that prefix all identifiers with underscores. The mangled
name is computed in the same way on all platforms; if special processing
is required to deal with the object file format used on a particular
platform, it is the responsibility of the back end to perform those
modifications. (Of course, the back end should not modify
DECL_ASSEMBLER_NAME
itself.)
Using DECL_ASSEMBLER_NAME
will cause additional memory to be
allocated (for the mangled name of the entity) so it should be used
only when emitting assembly code. It should not be used within the
optimizers to determine whether or not two declarations are the same,
even though some of the existing optimizers do use it in that way.
These uses will be removed over time.
DECL_ARGUMENTS
PARM_DECL
for the first argument to the
function. Subsequent PARM_DECL
nodes can be obtained by
following the TREE_CHAIN
links.
DECL_RESULT
RESULT_DECL
for the function.
DECL_SAVED_TREE
TREE_TYPE
FUNCTION_TYPE
or METHOD_TYPE
for
the function.
DECL_INITIAL
NULL
DECL_INITIAL
. However, back ends should not make
use of the particular value given by DECL_INITIAL
.
It should contain a tree of BLOCK
nodes that mirrors the scopes
that variables are bound in the function. Each block contains a list
of decls declared in a basic block, a pointer to a chain of blocks at
the next lower scope level, then a pointer to the next block at the
same level and a backpointer to the parent BLOCK
or
FUNCTION_DECL
. So given a function as follows:
void foo() { int a; { int b; } int c; }
you would get the following:
tree foo = FUNCTION_DECL; tree decl_a = VAR_DECL; tree decl_b = VAR_DECL; tree decl_c = VAR_DECL; tree block_a = BLOCK; tree block_b = BLOCK; tree block_c = BLOCK; BLOCK_VARS(block_a) = decl_a; BLOCK_SUBBLOCKS(block_a) = block_b; BLOCK_CHAIN(block_a) = block_c; BLOCK_SUPERCONTEXT(block_a) = foo; BLOCK_VARS(block_b) = decl_b; BLOCK_SUPERCONTEXT(block_b) = block_a; BLOCK_VARS(block_c) = decl_c; BLOCK_SUPERCONTEXT(block_c) = foo; DECL_INITIAL(foo) = block_a;
To determine the scope of a function, you can use the
DECL_CONTEXT
macro. This macro will return the class
(either a RECORD_TYPE
or a UNION_TYPE
) or namespace (a
NAMESPACE_DECL
) of which the function is a member. For a virtual
function, this macro returns the class in which the function was
actually defined, not the base class in which the virtual declaration
occurred.
In C, the DECL_CONTEXT
for a function maybe another function.
This representation indicates that the GNU nested function extension
is in use. For details on the semantics of nested functions, see the
GCC Manual. The nested function can refer to local variables in its
containing function. Such references are not explicitly marked in the
tree structure; back ends must look at the DECL_CONTEXT
for the
referenced VAR_DECL
. If the DECL_CONTEXT
for the
referenced VAR_DECL
is not the same as the function currently
being processed, and neither DECL_EXTERNAL
nor
TREE_STATIC
hold, then the reference is to a local variable in
a containing function, and the back end must take appropriate action.
DECL_EXTERNAL
TREE_PUBLIC
TREE_STATIC
TREE_THIS_VOLATILE
TREE_READONLY
DECL_PURE_P
DECL_VIRTUAL_P
DECL_ARTIFICIAL
DECL_FUNCTION_SPECIFIC_TARGET
NULL_TREE
if
the function is to be compiled with the target options specified on
the command line.
DECL_FUNCTION_SPECIFIC_OPTIMIZATION
NULL_TREE
if the function is to be compiled with the
optimization options specified on the command line.
Front ends may wish to keep some state associated with various GENERIC
trees while parsing. To support this, trees provide a set of flags
that may be used by the front end. They are accessed using
TREE_LANG_FLAG_n
where ‘n’ is currently 0 through 6.
If necessary, a front end can use some language-dependent tree codes in its GENERIC representation, so long as it provides a hook for converting them to GIMPLE and doesn't expect them to work with any (hypothetical) optimizers that run before the conversion to GIMPLE. The intermediate representation used while parsing C and C++ looks very little like GENERIC, but the C and C++ gimplifier hooks are perfectly happy to take it as input and spit out GIMPLE.
This section documents the internal representation used by GCC to represent C and C++ source programs. When presented with a C or C++ source program, GCC parses the program, performs semantic analysis (including the generation of error messages), and then produces the internal representation described here. This representation contains a complete representation for the entire translation unit provided as input to the front end. This representation is then typically processed by a code-generator in order to produce machine code, but could also be used in the creation of source browsers, intelligent editors, automatic documentation generators, interpreters, and any other programs needing the ability to process C or C++ code.
This section explains the internal representation. In particular, it documents the internal representation for C and C++ source constructs, and the macros, functions, and variables that can be used to access these constructs. The C++ representation is largely a superset of the representation used in the C front end. There is only one construct used in C that does not appear in the C++ front end and that is the GNU “nested function” extension. Many of the macros documented here do not apply in C because the corresponding language constructs do not appear in C.
The C and C++ front ends generate a mix of GENERIC trees and ones specific to C and C++. These language-specific trees are higher-level constructs than the ones in GENERIC to make the parser's job easier. This section describes those trees that aren't part of GENERIC as well as aspects of GENERIC trees that are treated in a language-specific manner.
If you are developing a “back end”, be it is a code-generator or some other tool, that uses this representation, you may occasionally find that you need to ask questions not easily answered by the functions and macros available here. If that situation occurs, it is quite likely that GCC already supports the functionality you desire, but that the interface is simply not documented here. In that case, you should ask the GCC maintainers (via mail to [email protected]) about documenting the functionality you require. Similarly, if you find yourself writing functions that do not deal directly with your back end, but instead might be useful to other people using the GCC front end, you should submit your patches for inclusion in GCC.
In C++, an array type is not qualified; rather the type of the array
elements is qualified. This situation is reflected in the intermediate
representation. The macros described here will always examine the
qualification of the underlying element type when applied to an array
type. (If the element type is itself an array, then the recursion
continues until a non-array type is found, and the qualification of this
type is examined.) So, for example, CP_TYPE_CONST_P
will hold of
the type const int ()[7]
, denoting an array of seven int
s.
The following functions and macros deal with cv-qualification of types:
cp_type_quals
TYPE_UNQUALIFIED
if no qualifiers have been
applied. The TYPE_QUAL_CONST
bit is set if the type is
const
-qualified. The TYPE_QUAL_VOLATILE
bit is set if the
type is volatile
-qualified. The TYPE_QUAL_RESTRICT
bit is
set if the type is restrict
-qualified.
CP_TYPE_CONST_P
const
-qualified.
CP_TYPE_VOLATILE_P
volatile
-qualified.
CP_TYPE_RESTRICT_P
restrict
-qualified.
CP_TYPE_CONST_NON_VOLATILE_P
const
-qualified, but
not volatile
-qualified; other cv-qualifiers are ignored as
well: only the const
-ness is tested.
A few other macros and functions are usable with all types:
TYPE_SIZE
INTEGER_CST
. For an incomplete type, TYPE_SIZE
will be
NULL_TREE
.
TYPE_ALIGN
int
.
TYPE_NAME
TYPE_DECL
) for
the type. (Note this macro does not return an
IDENTIFIER_NODE
, as you might expect, given its name!) You can
look at the DECL_NAME
of the TYPE_DECL
to obtain the
actual name of the type. The TYPE_NAME
will be NULL_TREE
for a type that is not a built-in type, the result of a typedef, or a
named class type.
CP_INTEGRAL_TYPE
ARITHMETIC_TYPE_P
CLASS_TYPE_P
TYPE_BUILT_IN
TYPE_PTRDATAMEM_P
TYPE_PTR_P
TYPE_PTRFN_P
TYPE_PTROB_P
void *
. You
may use TYPE_PTROBV_P
to test for a pointer to object type as
well as void *
.
The table below describes types specific to C and C++ as well as language-dependent info about GENERIC types.
POINTER_TYPE
TREE_TYPE
is a pointer to data member type, then TYPE_PTRDATAMEM_P
will hold.
For a pointer to data member type of the form ‘T X::*’,
TYPE_PTRMEM_CLASS_TYPE
will be the type X
, while
TYPE_PTRMEM_POINTED_TO_TYPE
will be the type T
.
RECORD_TYPE
struct
and class
types in C and C++. If
TYPE_PTRMEMFUNC_P
holds, then this type is a pointer-to-member
type. In that case, the TYPE_PTRMEMFUNC_FN_TYPE
is a
POINTER_TYPE
pointing to a METHOD_TYPE
. The
METHOD_TYPE
is the type of a function pointed to by the
pointer-to-member function. If TYPE_PTRMEMFUNC_P
does not hold,
this type is a class type. For more information, see Classes.
UNKNOWN_TYPE
TYPENAME_TYPE
typename T::A
. The
TYPE_CONTEXT
is T
; the TYPE_NAME
is an
IDENTIFIER_NODE
for A
. If the type is specified via a
template-id, then TYPENAME_TYPE_FULLNAME
yields a
TEMPLATE_ID_EXPR
. The TREE_TYPE
is non-NULL
if the
node is implicitly generated in support for the implicit typename
extension; in which case the TREE_TYPE
is a type node for the
base-class.
TYPEOF_TYPE
__typeof__
extension. The
TYPE_FIELDS
is the expression the type of which is being
represented.
The root of the entire intermediate representation is the variable
global_namespace
. This is the namespace specified with ::
in C++ source code. All other namespaces, types, variables, functions,
and so forth can be found starting with this namespace.
However, except for the fact that it is distinguished as the root of the representation, the global namespace is no different from any other namespace. Thus, in what follows, we describe namespaces generally, rather than the global namespace in particular.
A namespace is represented by a NAMESPACE_DECL
node.
The following macros and functions can be used on a NAMESPACE_DECL
:
DECL_NAME
IDENTIFIER_NODE
corresponding to
the unqualified name of the name of the namespace (see Identifiers).
The name of the global namespace is ‘::’, even though in C++ the
global namespace is unnamed. However, you should use comparison with
global_namespace
, rather than DECL_NAME
to determine
whether or not a namespace is the global one. An unnamed namespace
will have a DECL_NAME
equal to anonymous_namespace_name
.
Within a single translation unit, all unnamed namespaces will have the
same name.
DECL_CONTEXT
DECL_CONTEXT
for
the global_namespace
is NULL_TREE
.
DECL_NAMESPACE_ALIAS
DECL_NAMESPACE_ALIAS
is the namespace for which this one is an
alias.
Do not attempt to use cp_namespace_decls
for a namespace which is
an alias. Instead, follow DECL_NAMESPACE_ALIAS
links until you
reach an ordinary, non-alias, namespace, and call
cp_namespace_decls
there.
DECL_NAMESPACE_STD_P
::std
namespace.
cp_namespace_decls
NULL_TREE
. The declarations are connected through their
TREE_CHAIN
fields.
Although most entries on this list will be declarations,
TREE_LIST
nodes may also appear. In this case, the
TREE_VALUE
will be an OVERLOAD
. The value of the
TREE_PURPOSE
is unspecified; back ends should ignore this value.
As with the other kinds of declarations returned by
cp_namespace_decls
, the TREE_CHAIN
will point to the next
declaration in this list.
For more information on the kinds of declarations that can occur on this
list, See Declarations. Some declarations will not appear on this
list. In particular, no FIELD_DECL
, LABEL_DECL
, or
PARM_DECL
nodes will appear here.
This function cannot be used with namespaces that have
DECL_NAMESPACE_ALIAS
set.
Besides namespaces, the other high-level scoping construct in C++ is the
class. (Throughout this manual the term class is used to mean the
types referred to in the ANSI/ISO C++ Standard as classes; these include
types defined with the class
, struct
, and union
keywords.)
A class type is represented by either a RECORD_TYPE
or a
UNION_TYPE
. A class declared with the union
tag is
represented by a UNION_TYPE
, while classes declared with either
the struct
or the class
tag are represented by
RECORD_TYPE
s. You can use the CLASSTYPE_DECLARED_CLASS
macro to discern whether or not a particular type is a class
as
opposed to a struct
. This macro will be true only for classes
declared with the class
tag.
Almost all non-function members are available on the TYPE_FIELDS
list. Given one member, the next can be found by following the
TREE_CHAIN
. You should not depend in any way on the order in
which fields appear on this list. All nodes on this list will be
‘DECL’ nodes. A FIELD_DECL
is used to represent a non-static
data member, a VAR_DECL
is used to represent a static data
member, and a TYPE_DECL
is used to represent a type. Note that
the CONST_DECL
for an enumeration constant will appear on this
list, if the enumeration type was declared in the class. (Of course,
the TYPE_DECL
for the enumeration type will appear here as well.)
There are no entries for base classes on this list. In particular,
there is no FIELD_DECL
for the “base-class portion” of an
object.
The TYPE_VFIELD
is a compiler-generated field used to point to
virtual function tables. It may or may not appear on the
TYPE_FIELDS
list. However, back ends should handle the
TYPE_VFIELD
just like all the entries on the TYPE_FIELDS
list.
The function members are available on the TYPE_METHODS
list.
Again, subsequent members are found by following the TREE_CHAIN
field. If a function is overloaded, each of the overloaded functions
appears; no OVERLOAD
nodes appear on the TYPE_METHODS
list. Implicitly declared functions (including default constructors,
copy constructors, assignment operators, and destructors) will appear on
this list as well.
Every class has an associated binfo, which can be obtained with
TYPE_BINFO
. Binfos are used to represent base-classes. The
binfo given by TYPE_BINFO
is the degenerate case, whereby every
class is considered to be its own base-class. The base binfos for a
particular binfo are held in a vector, whose length is obtained with
BINFO_N_BASE_BINFOS
. The base binfos themselves are obtained
with BINFO_BASE_BINFO
and BINFO_BASE_ITERATE
. To add a
new binfo, use BINFO_BASE_APPEND
. The vector of base binfos can
be obtained with BINFO_BASE_BINFOS
, but normally you do not need
to use that. The class type associated with a binfo is given by
BINFO_TYPE
. It is not always the case that BINFO_TYPE
(TYPE_BINFO (x))
, because of typedefs and qualified types. Neither is
it the case that TYPE_BINFO (BINFO_TYPE (y))
is the same binfo as
y
. The reason is that if y
is a binfo representing a
base-class B
of a derived class D
, then BINFO_TYPE
(y)
will be B
, and TYPE_BINFO (BINFO_TYPE (y))
will be
B
as its own base-class, rather than as a base-class of D
.
The access to a base type can be found with BINFO_BASE_ACCESS
.
This will produce access_public_node
, access_private_node
or access_protected_node
. If bases are always public,
BINFO_BASE_ACCESSES
may be NULL
.
BINFO_VIRTUAL_P
is used to specify whether the binfo is inherited
virtually or not. The other flags, BINFO_FLAG_0
to
BINFO_FLAG_6
, can be used for language specific use.
The following macros can be used on a tree node representing a class-type.
LOCAL_CLASS_P
TYPE_POLYMORPHIC_P
TYPE_HAS_DEFAULT_CONSTRUCTOR
CLASSTYPE_HAS_MUTABLE
TYPE_HAS_MUTABLE_P
CLASSTYPE_NON_POD_P
TYPE_HAS_NEW_OPERATOR
operator new
.
TYPE_HAS_ARRAY_NEW_OPERATOR
operator new[]
is defined.
TYPE_OVERLOADS_CALL_EXPR
operator()
is overloaded.
TYPE_OVERLOADS_ARRAY_REF
operator[]
TYPE_OVERLOADS_ARROW
operator->
is
overloaded.
A function is represented by a FUNCTION_DECL
node. A set of
overloaded functions is sometimes represented by an OVERLOAD
node.
An OVERLOAD
node is not a declaration, so none of the
‘DECL_’ macros should be used on an OVERLOAD
. An
OVERLOAD
node is similar to a TREE_LIST
. Use
OVL_CURRENT
to get the function associated with an
OVERLOAD
node; use OVL_NEXT
to get the next
OVERLOAD
node in the list of overloaded functions. The macros
OVL_CURRENT
and OVL_NEXT
are actually polymorphic; you can
use them to work with FUNCTION_DECL
nodes as well as with
overloads. In the case of a FUNCTION_DECL
, OVL_CURRENT
will always return the function itself, and OVL_NEXT
will always
be NULL_TREE
.
To determine the scope of a function, you can use the
DECL_CONTEXT
macro. This macro will return the class
(either a RECORD_TYPE
or a UNION_TYPE
) or namespace (a
NAMESPACE_DECL
) of which the function is a member. For a virtual
function, this macro returns the class in which the function was
actually defined, not the base class in which the virtual declaration
occurred.
If a friend function is defined in a class scope, the
DECL_FRIEND_CONTEXT
macro can be used to determine the class in
which it was defined. For example, in
class C { friend void f() {} };
the DECL_CONTEXT
for f
will be the
global_namespace
, but the DECL_FRIEND_CONTEXT
will be the
RECORD_TYPE
for C
.
The following macros and functions can be used on a FUNCTION_DECL
:
DECL_MAIN_P
::code
.
DECL_LOCAL_FUNCTION_P
DECL_ANTICIPATED
DECL_EXTERN_C_FUNCTION_P
extern "C"
' function.
DECL_LINKONCE_P
DECL_LINKONCE_P
holds; G++
instantiates needed templates in all translation units which require them,
and then relies on the linker to remove duplicate instantiations.
FIXME: This macro is not yet implemented.
DECL_FUNCTION_MEMBER_P
DECL_STATIC_FUNCTION_P
DECL_NONSTATIC_MEMBER_FUNCTION_P
DECL_CONST_MEMFUNC_P
const
-member function.
DECL_VOLATILE_MEMFUNC_P
volatile
-member function.
DECL_CONSTRUCTOR_P
DECL_NONCONVERTING_P
DECL_COMPLETE_CONSTRUCTOR_P
DECL_BASE_CONSTRUCTOR_P
DECL_COPY_CONSTRUCTOR_P
DECL_DESTRUCTOR_P
DECL_COMPLETE_DESTRUCTOR_P
DECL_OVERLOADED_OPERATOR_P
DECL_CONV_FN_P
DECL_GLOBAL_CTOR_P
DECL_GLOBAL_DTOR_P
DECL_THUNK_P
These functions represent stub code that adjusts the this
pointer
and then jumps to another function. When the jumped-to function
returns, control is transferred directly to the caller, without
returning to the thunk. The first parameter to the thunk is always the
this
pointer; the thunk should add THUNK_DELTA
to this
value. (The THUNK_DELTA
is an int
, not an
INTEGER_CST
.)
Then, if THUNK_VCALL_OFFSET
(an INTEGER_CST
) is nonzero
the adjusted this
pointer must be adjusted again. The complete
calculation is given by the following pseudo-code:
this += THUNK_DELTA if (THUNK_VCALL_OFFSET) this += (*((ptrdiff_t **) this))[THUNK_VCALL_OFFSET]
Finally, the thunk should jump to the location given
by DECL_INITIAL
; this will always be an expression for the
address of a function.
DECL_NON_THUNK_FUNCTION_P
GLOBAL_INIT_PRIORITY
DECL_GLOBAL_CTOR_P
or DECL_GLOBAL_DTOR_P
holds,
then this gives the initialization priority for the function. The
linker will arrange that all functions for which
DECL_GLOBAL_CTOR_P
holds are run in increasing order of priority
before main
is called. When the program exits, all functions for
which DECL_GLOBAL_DTOR_P
holds are run in the reverse order.
TYPE_RAISES_EXCEPTIONS
NULL
, is comprised of nodes
whose TREE_VALUE
represents a type.
TYPE_NOTHROW_P
()
'.
DECL_ARRAY_DELETE_OPERATOR_P
operator delete[]
.
A function that has a definition in the current translation unit will
have a non-NULL
DECL_INITIAL
. However, back ends should not make
use of the particular value given by DECL_INITIAL
.
The DECL_SAVED_TREE
macro will give the complete body of the
function.
There are tree nodes corresponding to all of the source-level statement constructs, used within the C and C++ frontends. These are enumerated here, together with a list of the various macros that can be used to obtain information about them. There are a few macros that can be used with all statements:
STMT_IS_FULL_EXPR_P
STMT_IS_FULL_EXPR_P
set. Temporaries
created during such statements should be destroyed when the innermost
enclosing statement with STMT_IS_FULL_EXPR_P
set is exited.
Here is the list of the various statement nodes, and the macros used to access them. This documentation describes the use of these nodes in non-template functions (including instantiations of template functions). In template functions, the same nodes are used, but sometimes in slightly different ways.
Many of the statements have substatements. For example, a while
loop will have a body, which is itself a statement. If the substatement
is NULL_TREE
, it is considered equivalent to a statement
consisting of a single ;
, i.e., an expression statement in which
the expression has been omitted. A substatement may in fact be a list
of statements, connected via their TREE_CHAIN
s. So, you should
always process the statement tree by looping over substatements, like
this:
void process_stmt (stmt)
tree stmt;
{
while (stmt)
{
switch (TREE_CODE (stmt))
{
case IF_STMT:
process_stmt (THEN_CLAUSE (stmt));
/* More processing here. */
break;
...
}
stmt = TREE_CHAIN (stmt);
}
}
In other words, while the then
clause of an if
statement
in C++ can be only one statement (although that one statement may be a
compound statement), the intermediate representation will sometimes use
several statements chained together.
BREAK_STMT
break
statement. There are no additional
fields.
CILK_SPAWN_STMT
_Cilk_spawn
can be written in C in the following way:
_Cilk_spawn
<function_name> (<parameters>);
Detailed description for usage and functionality of _Cilk_spawn
can be
found at https://www.cilkplus.org.
CILK_SYNC_STMT
_Cilk_sync
can be written in C in the
following way:
_Cilk_sync
;
CLEANUP_STMT
CLEANUP_DECL
will be
the VAR_DECL
destroyed. Otherwise, CLEANUP_DECL
will be
NULL_TREE
. In any case, the CLEANUP_EXPR
is the
expression to execute. The cleanups executed on exit from a scope
should be run in the reverse order of the order in which the associated
CLEANUP_STMT
s were encountered.
CONTINUE_STMT
continue
statement. There are no additional
fields.
CTOR_STMT
CTOR_BEGIN_P
holds) or end (if
CTOR_END_P
holds of the main body of a constructor. See also
SUBOBJECT
for more information on how to use these nodes.
DO_STMT
do
loop. The body of the loop is given by
DO_BODY
while the termination condition for the loop is given by
DO_COND
. The condition for a do
-statement is always an
expression.
EMPTY_CLASS_EXPR
TREE_TYPE
represents the type of the object.
EXPR_STMT
EXPR_STMT_EXPR
to
obtain the expression.
FOR_STMT
for
statement. The FOR_INIT_STMT
is
the initialization statement for the loop. The FOR_COND
is the
termination condition. The FOR_EXPR
is the expression executed
right before the FOR_COND
on each loop iteration; often, this
expression increments a counter. The body of the loop is given by
FOR_BODY
. Note that FOR_INIT_STMT
and FOR_BODY
return statements, while FOR_COND
and FOR_EXPR
return
expressions.
HANDLER
catch
block. The HANDLER_TYPE
is the type of exception that will be caught by this handler; it is
equal (by pointer equality) to NULL
if this handler is for all
types. HANDLER_PARMS
is the DECL_STMT
for the catch
parameter, and HANDLER_BODY
is the code for the block itself.
IF_STMT
if
statement. The IF_COND
is the
expression.
If the condition is a TREE_LIST
, then the TREE_PURPOSE
is
a statement (usually a DECL_STMT
). Each time the condition is
evaluated, the statement should be executed. Then, the
TREE_VALUE
should be used as the conditional expression itself.
This representation is used to handle C++ code like this:
C++ distinguishes between this and COND_EXPR
for handling templates.
if (int i = 7) ...
where there is a new local variable (or variables) declared within the condition.
The THEN_CLAUSE
represents the statement given by the then
condition, while the ELSE_CLAUSE
represents the statement given
by the else
condition.
SUBOBJECT
this
is fully constructed. If, after this point, an
exception is thrown before a CTOR_STMT
with CTOR_END_P
set
is encountered, the SUBOBJECT_CLEANUP
must be executed. The
cleanups must be executed in the reverse order in which they appear.
SWITCH_STMT
switch
statement. The SWITCH_STMT_COND
is the expression on which the switch is occurring. See the documentation
for an IF_STMT
for more information on the representation used
for the condition. The SWITCH_STMT_BODY
is the body of the switch
statement. The SWITCH_STMT_TYPE
is the original type of switch
expression as given in the source, before any compiler conversions.
TRY_BLOCK
try
block. The body of the try block is
given by TRY_STMTS
. Each of the catch blocks is a HANDLER
node. The first handler is given by TRY_HANDLERS
. Subsequent
handlers are obtained by following the TREE_CHAIN
link from one
handler to the next. The body of the handler is given by
HANDLER_BODY
.
If CLEANUP_P
holds of the TRY_BLOCK
, then the
TRY_HANDLERS
will not be a HANDLER
node. Instead, it will
be an expression that should be executed if an exception is thrown in
the try block. It must rethrow the exception after executing that code.
And, if an exception is thrown while the expression is executing,
terminate
must be called.
USING_STMT
using
directive. The namespace is given by
USING_STMT_NAMESPACE
, which will be a NAMESPACE_DECL. This node
is needed inside template functions, to implement using directives
during instantiation.
WHILE_STMT
while
loop. The WHILE_COND
is the
termination condition for the loop. See the documentation for an
IF_STMT
for more information on the representation used for the
condition.
The WHILE_BODY
is the body of the loop.
This section describes expressions specific to the C and C++ front ends.
TYPEID_EXPR
typeid
expression.
NEW_EXPR
VEC_NEW_EXPR
new
and new[]
respectively.
DELETE_EXPR
VEC_DELETE_EXPR
delete
and delete[]
respectively.
MEMBER_REF
THROW_EXPR
throw
in the program. Operand 0,
which is the expression to throw, may be NULL_TREE
.
AGGR_INIT_EXPR
AGGR_INIT_EXPR
represents the initialization as the return
value of a function call, or as the result of a constructor. An
AGGR_INIT_EXPR
will only appear as a full-expression, or as the
second operand of a TARGET_EXPR
. AGGR_INIT_EXPR
s have
a representation similar to that of CALL_EXPR
s. You can use
the AGGR_INIT_EXPR_FN
and AGGR_INIT_EXPR_ARG
macros to access
the function to call and the arguments to pass.
If AGGR_INIT_VIA_CTOR_P
holds of the AGGR_INIT_EXPR
, then
the initialization is via a constructor call. The address of the
AGGR_INIT_EXPR_SLOT
operand, which is always a VAR_DECL
,
is taken, and this value replaces the first argument in the argument
list.
In either case, the expression is void.
GIMPLE is a three-address representation derived from GENERIC by
breaking down GENERIC expressions into tuples of no more than 3
operands (with some exceptions like function calls). GIMPLE was
heavily influenced by the SIMPLE IL used by the McCAT compiler
project at McGill University, though we have made some different
choices. For one thing, SIMPLE doesn't support goto
.
Temporaries are introduced to hold intermediate values needed to compute complex expressions. Additionally, all the control structures used in GENERIC are lowered into conditional jumps, lexical scopes are removed and exception regions are converted into an on the side exception region tree.
The compiler pass which converts GENERIC into GIMPLE is referred to as the ‘gimplifier’. The gimplifier works recursively, generating GIMPLE tuples out of the original GENERIC expressions.
One of the early implementation strategies used for the GIMPLE representation was to use the same internal data structures used by front ends to represent parse trees. This simplified implementation because we could leverage existing functionality and interfaces. However, GIMPLE is a much more restrictive representation than abstract syntax trees (AST), therefore it does not require the full structural complexity provided by the main tree data structure.
The GENERIC representation of a function is stored in the
DECL_SAVED_TREE
field of the associated FUNCTION_DECL
tree node. It is converted to GIMPLE by a call to
gimplify_function_tree
.
If a front end wants to include language-specific tree codes in the tree
representation which it provides to the back end, it must provide a
definition of LANG_HOOKS_GIMPLIFY_EXPR
which knows how to
convert the front end trees to GIMPLE. Usually such a hook will involve
much of the same code for expanding front end trees to RTL. This function
can return fully lowered GIMPLE, or it can return GENERIC trees and let the
main gimplifier lower them the rest of the way; this is often simpler.
GIMPLE that is not fully lowered is known as “High GIMPLE” and
consists of the IL before the pass pass_lower_cf
. High GIMPLE
contains some container statements like lexical scopes
(represented by GIMPLE_BIND
) and nested expressions (e.g.,
GIMPLE_TRY
), while “Low GIMPLE” exposes all of the
implicit jumps for control and exception expressions directly in
the IL and EH region trees.
The C and C++ front ends currently convert directly from front end
trees to GIMPLE, and hand that off to the back end rather than first
converting to GENERIC. Their gimplifier hooks know about all the
_STMT
nodes and how to convert them to GENERIC forms. There
was some work done on a genericization pass which would run first, but
the existence of STMT_EXPR
meant that in order to convert all
of the C statements into GENERIC equivalents would involve walking the
entire tree anyway, so it was simpler to lower all the way. This
might change in the future if someone writes an optimization pass
which would work better with higher-level trees, but currently the
optimizers all expect GIMPLE.
You can request to dump a C-like representation of the GIMPLE form with the flag -fdump-tree-gimple.
GIMPLE instructions are tuples of variable size divided in two groups: a header describing the instruction and its locations, and a variable length body with all the operands. Tuples are organized into a hierarchy with 3 main classes of tuples.
gimple
(gsbase)This is the root of the hierarchy, it holds basic information needed by most GIMPLE statements. There are some fields that may not be relevant to every GIMPLE statement, but those were moved into the base structure to take advantage of holes left by other fields (thus making the structure more compact). The structure takes 4 words (32 bytes) on 64 bit hosts:
Field | Size (bits)
|
code | 8
|
subcode | 16
|
no_warning | 1
|
visited | 1
|
nontemporal_move | 1
|
plf | 2
|
modified | 1
|
has_volatile_ops | 1
|
references_memory_p | 1
|
uid | 32
|
location | 32
|
num_ops | 32
|
bb | 64
|
block | 63
|
Total size | 32 bytes
|
code
Main identifier for a GIMPLE instruction.
subcode
Used to distinguish different variants of the same basic
instruction or provide flags applicable to a given code. The
subcode
flags field has different uses depending on the code of
the instruction, but mostly it distinguishes instructions of the
same family. The most prominent use of this field is in
assignments, where subcode indicates the operation done on the
RHS of the assignment. For example, a = b + c is encoded as
GIMPLE_ASSIGN <PLUS_EXPR, a, b, c>
.
no_warning
Bitflag to indicate whether a warning has already been issued on
this statement.
visited
General purpose “visited” marker. Set and cleared by each pass
when needed.
nontemporal_move
Bitflag used in assignments that represent non-temporal moves.
Although this bitflag is only used in assignments, it was moved
into the base to take advantage of the bit holes left by the
previous fields.
plf
Pass Local Flags. This 2-bit mask can be used as general purpose
markers by any pass. Passes are responsible for clearing and
setting these two flags accordingly.
modified
Bitflag to indicate whether the statement has been modified.
Used mainly by the operand scanner to determine when to re-scan a
statement for operands.
has_volatile_ops
Bitflag to indicate whether this statement contains operands that
have been marked volatile.
references_memory_p
Bitflag to indicate whether this statement contains memory
references (i.e., its operands are either global variables, or
pointer dereferences or anything that must reside in memory).
uid
This is an unsigned integer used by passes that want to assign
IDs to every statement. These IDs must be assigned and used by
each pass.
location
This is a location_t
identifier to specify source code
location for this statement. It is inherited from the front
end.
num_ops
Number of operands that this statement has. This specifies the
size of the operand vector embedded in the tuple. Only used in
some tuples, but it is declared in the base tuple to take
advantage of the 32-bit hole left by the previous fields.
bb
Basic block holding the instruction.
block
Lexical block holding this statement. Also used for debug
information generation.
gimple_statement_with_ops
This tuple is actually split in two:
gimple_statement_with_ops_base
and
gimple_statement_with_ops
. This is needed to accommodate the
way the operand vector is allocated. The operand vector is
defined to be an array of 1 element. So, to allocate a dynamic
number of operands, the memory allocator (gimple_alloc
) simply
allocates enough memory to hold the structure itself plus N
- 1
operands which run “off the end” of the structure. For
example, to allocate space for a tuple with 3 operands,
gimple_alloc
reserves sizeof (struct
gimple_statement_with_ops) + 2 * sizeof (tree)
bytes.
On the other hand, several fields in this tuple need to be shared
with the gimple_statement_with_memory_ops
tuple. So, these
common fields are placed in gimple_statement_with_ops_base
which
is then inherited from the other two tuples.
gsbase | 256
|
def_ops | 64
|
use_ops | 64
|
op | num_ops * 64
|
Total size | 48 + 8 * num_ops bytes
|
gsbase
Inherited from struct gimple
.
def_ops
Array of pointers into the operand array indicating all the slots that
contain a variable written-to by the statement. This array is
also used for immediate use chaining. Note that it would be
possible to not rely on this array, but the changes required to
implement this are pretty invasive.
use_ops
Similar to def_ops
but for variables read by the statement.
op
Array of trees with num_ops
slots.
gimple_statement_with_memory_ops
This tuple is essentially identical to gimple_statement_with_ops
,
except that it contains 4 additional fields to hold vectors
related memory stores and loads. Similar to the previous case,
the structure is split in two to accommodate for the operand
vector (gimple_statement_with_memory_ops_base
and
gimple_statement_with_memory_ops
).
Field | Size (bits)
|
gsbase | 256
|
def_ops | 64
|
use_ops | 64
|
vdef_ops | 64
|
vuse_ops | 64
|
stores | 64
|
loads | 64
|
op | num_ops * 64
|
Total size | 80 + 8 * num_ops bytes
|
vdef_ops
Similar to def_ops
but for VDEF
operators. There is
one entry per memory symbol written by this statement. This is
used to maintain the memory SSA use-def and def-def chains.
vuse_ops
Similar to use_ops
but for VUSE
operators. There is
one entry per memory symbol loaded by this statement. This is
used to maintain the memory SSA use-def chains.
stores
Bitset with all the UIDs for the symbols written-to by the
statement. This is different than vdef_ops
in that all the
affected symbols are mentioned in this set. If memory
partitioning is enabled, the vdef_ops
vector will refer to memory
partitions. Furthermore, no SSA information is stored in this
set.
loads
Similar to stores
, but for memory loads. (Note that there
is some amount of redundancy here, it should be possible to
reduce memory utilization further by removing these sets).
All the other tuples are defined in terms of these three basic ones. Each tuple will add some fields.
The following diagram shows the C++ inheritance hierarchy of statement
kinds, along with their relationships to GSS_
values (layouts) and
GIMPLE_
values (codes):
gimple | layout: GSS_BASE | used for 4 codes: GIMPLE_ERROR_MARK | GIMPLE_NOP | GIMPLE_OMP_SECTIONS_SWITCH | GIMPLE_PREDICT | + gimple_statement_with_ops_base | | (no GSS layout) | | | + gimple_statement_with_ops | | | layout: GSS_WITH_OPS | | | | | + gcond | | | code: GIMPLE_COND | | | | | + gdebug | | | code: GIMPLE_DEBUG | | | | | + ggoto | | | code: GIMPLE_GOTO | | | | | + glabel | | | code: GIMPLE_LABEL | | | | | + gswitch | | code: GIMPLE_SWITCH | | | + gimple_statement_with_memory_ops_base | | layout: GSS_WITH_MEM_OPS_BASE | | | + gimple_statement_with_memory_ops | | | layout: GSS_WITH_MEM_OPS | | | | | + gassign | | | code GIMPLE_ASSIGN | | | | | + greturn | | code GIMPLE_RETURN | | | + gcall | | layout: GSS_CALL, code: GIMPLE_CALL | | | + gasm | | layout: GSS_ASM, code: GIMPLE_ASM | | | + gtransaction | layout: GSS_TRANSACTION, code: GIMPLE_TRANSACTION | + gimple_statement_omp | | layout: GSS_OMP. Used for code GIMPLE_OMP_SECTION | | | + gomp_critical | | layout: GSS_OMP_CRITICAL, code: GIMPLE_OMP_CRITICAL | | | + gomp_for | | layout: GSS_OMP_FOR, code: GIMPLE_OMP_FOR | | | + gomp_parallel_layout | | | layout: GSS_OMP_PARALLEL_LAYOUT | | | | | + gimple_statement_omp_taskreg | | | | | | | + gomp_parallel | | | | code: GIMPLE_OMP_PARALLEL | | | | | | | + gomp_task | | | code: GIMPLE_OMP_TASK | | | | | + gimple_statement_omp_target | | code: GIMPLE_OMP_TARGET | | | + gomp_sections | | layout: GSS_OMP_SECTIONS, code: GIMPLE_OMP_SECTIONS | | | + gimple_statement_omp_single_layout | | layout: GSS_OMP_SINGLE_LAYOUT | | | + gomp_single | | code: GIMPLE_OMP_SINGLE | | | + gomp_teams | code: GIMPLE_OMP_TEAMS | + gbind | layout: GSS_BIND, code: GIMPLE_BIND | + gcatch | layout: GSS_CATCH, code: GIMPLE_CATCH | + geh_filter | layout: GSS_EH_FILTER, code: GIMPLE_EH_FILTER | + geh_else | layout: GSS_EH_ELSE, code: GIMPLE_EH_ELSE | + geh_mnt | layout: GSS_EH_MNT, code: GIMPLE_EH_MUST_NOT_THROW | + gphi | layout: GSS_PHI, code: GIMPLE_PHI | + gimple_statement_eh_ctrl | | layout: GSS_EH_CTRL | | | + gresx | | code: GIMPLE_RESX | | | + geh_dispatch | code: GIMPLE_EH_DISPATCH | + gtry | layout: GSS_TRY, code: GIMPLE_TRY | + gimple_statement_wce | layout: GSS_WCE, code: GIMPLE_WITH_CLEANUP_EXPR | + gomp_continue | layout: GSS_OMP_CONTINUE, code: GIMPLE_OMP_CONTINUE | + gomp_atomic_load | layout: GSS_OMP_ATOMIC_LOAD, code: GIMPLE_OMP_ATOMIC_LOAD | + gimple_statement_omp_atomic_store_layout | layout: GSS_OMP_ATOMIC_STORE_LAYOUT, | code: GIMPLE_OMP_ATOMIC_STORE | + gomp_atomic_store | code: GIMPLE_OMP_ATOMIC_STORE | + gomp_return code: GIMPLE_OMP_RETURN
The following table briefly describes the GIMPLE instruction set.
Instruction | High GIMPLE | Low GIMPLE
|
GIMPLE_ASM | x | x
|
GIMPLE_ASSIGN | x | x
|
GIMPLE_BIND | x |
|
GIMPLE_CALL | x | x
|
GIMPLE_CATCH | x |
|
GIMPLE_COND | x | x
|
GIMPLE_DEBUG | x | x
|
GIMPLE_EH_FILTER | x |
|
GIMPLE_GOTO | x | x
|
GIMPLE_LABEL | x | x
|
GIMPLE_NOP | x | x
|
GIMPLE_OMP_ATOMIC_LOAD | x | x
|
GIMPLE_OMP_ATOMIC_STORE | x | x
|
GIMPLE_OMP_CONTINUE | x | x
|
GIMPLE_OMP_CRITICAL | x | x
|
GIMPLE_OMP_FOR | x | x
|
GIMPLE_OMP_MASTER | x | x
|
GIMPLE_OMP_ORDERED | x | x
|
GIMPLE_OMP_PARALLEL | x | x
|
GIMPLE_OMP_RETURN | x | x
|
GIMPLE_OMP_SECTION | x | x
|
GIMPLE_OMP_SECTIONS | x | x
|
GIMPLE_OMP_SECTIONS_SWITCH | x | x
|
GIMPLE_OMP_SINGLE | x | x
|
GIMPLE_PHI | x
| |
GIMPLE_RESX | x
| |
GIMPLE_RETURN | x | x
|
GIMPLE_SWITCH | x | x
|
GIMPLE_TRY | x |
|
Other exception handling constructs are represented using
GIMPLE_TRY_CATCH
. GIMPLE_TRY_CATCH
has two operands. The
first operand is a sequence of statements to execute. If executing
these statements does not throw an exception, then the second operand
is ignored. Otherwise, if an exception is thrown, then the second
operand of the GIMPLE_TRY_CATCH
is checked. The second
operand may have the following forms:
GIMPLE_CATCH
statements. Each
GIMPLE_CATCH
has a list of applicable exception types and
handler code. If the thrown exception matches one of the caught
types, the associated handler code is executed. If the handler
code falls off the bottom, execution continues after the original
GIMPLE_TRY_CATCH
.
GIMPLE_EH_FILTER
statement. This has a list of
permitted exception types, and code to handle a match failure. If the
thrown exception does not match one of the allowed types, the
associated match failure code is executed. If the thrown exception
does match, it continues unwinding the stack looking for the next
handler.
Currently throwing an exception is not directly represented in GIMPLE, since it is implemented by calling a function. At some point in the future we will want to add some way to express that the call will throw an exception of a known type.
Just before running the optimizers, the compiler lowers the
high-level EH constructs above into a set of ‘goto’s, magic
labels, and EH regions. Continuing to unwind at the end of a
cleanup is represented with a GIMPLE_RESX
.
When gimplification encounters a subexpression that is too
complex, it creates a new temporary variable to hold the value of
the subexpression, and adds a new statement to initialize it
before the current statement. These special temporaries are known
as ‘expression temporaries’, and are allocated using
get_formal_tmp_var
. The compiler tries to always evaluate
identical expressions into the same temporary, to simplify
elimination of redundant calculations.
We can only use expression temporaries when we know that it will
not be reevaluated before its value is used, and that it will not
be otherwise modified3. Other temporaries can be allocated
using get_initialized_tmp_var
or create_tmp_var
.
Currently, an expression like a = b + 5
is not reduced any
further. We tried converting it to something like
T1 = b + 5; a = T1;
but this bloated the representation for minimal benefit. However, a variable which must live in memory cannot appear in an expression; its value is explicitly loaded into a temporary first. Similarly, storing the value of an expression to a memory variable goes through a temporary.
In general, expressions in GIMPLE consist of an operation and the
appropriate number of simple operands; these operands must either be a
GIMPLE rvalue (is_gimple_val
), i.e. a constant or a register
variable. More complex operands are factored out into temporaries, so
that
a = b + c + d
becomes
T1 = b + c; a = T1 + d;
The same rule holds for arguments to a GIMPLE_CALL
.
The target of an assignment is usually a variable, but can also be a
MEM_REF
or a compound lvalue as described below.
The left-hand side of a C comma expression is simply moved into a separate statement.
Currently compound lvalues involving array and structure field references
are not broken down; an expression like a.b[2] = 42
is not reduced
any further (though complex array subscripts are). This restriction is a
workaround for limitations in later optimizers; if we were to convert this
to
T1 = &a.b; T1[2] = 42;
alias analysis would not remember that the reference to T1[2]
came
by way of a.b
, so it would think that the assignment could alias
another member of a
; this broke struct-alias-1.c
. Future
optimizer improvements may make this limitation unnecessary.
A C ?:
expression is converted into an if
statement with
each branch assigning to the same temporary. So,
a = b ? c : d;
becomes
if (b == 1) T1 = c; else T1 = d; a = T1;
The GIMPLE level if-conversion pass re-introduces ?:
expression, if appropriate. It is used to vectorize loops with
conditions using vector conditional operations.
Note that in GIMPLE, if
statements are represented using
GIMPLE_COND
, as described below.
Except when they appear in the condition operand of a
GIMPLE_COND
, logical `and' and `or' operators are simplified
as follows: a = b && c
becomes
T1 = (bool)b; if (T1 == true) T1 = (bool)c; a = T1;
Note that T1
in this example cannot be an expression temporary,
because it has two different assignments.
All gimple operands are of type tree
. But only certain
types of trees are allowed to be used as operand tuples. Basic
validation is controlled by the function
get_gimple_rhs_class
, which given a tree code, returns an
enum
with the following values of type enum
gimple_rhs_class
GIMPLE_INVALID_RHS
The tree cannot be used as a GIMPLE operand.
GIMPLE_TERNARY_RHS
The tree is a valid GIMPLE ternary operation.
GIMPLE_BINARY_RHS
The tree is a valid GIMPLE binary operation.
GIMPLE_UNARY_RHS
The tree is a valid GIMPLE unary operation.
GIMPLE_SINGLE_RHS
The tree is a single object, that cannot be split into simpler
operands (for instance, SSA_NAME
, VAR_DECL
, COMPONENT_REF
, etc).
This operand class also acts as an escape hatch for tree nodes
that may be flattened out into the operand vector, but would need
more than two slots on the RHS. For instance, a COND_EXPR
expression of the form (a op b) ? x : y
could be flattened
out on the operand vector using 4 slots, but it would also
require additional processing to distinguish c = a op b
from c = a op b ? x : y
. Something similar occurs with
ASSERT_EXPR
. In time, these special case tree
expressions should be flattened into the operand vector.
For tree nodes in the categories GIMPLE_TERNARY_RHS
,
GIMPLE_BINARY_RHS
and GIMPLE_UNARY_RHS
, they cannot be
stored inside tuples directly. They first need to be flattened and
separated into individual components. For instance, given the GENERIC
expression
a = b + c
its tree representation is:
MODIFY_EXPR <VAR_DECL <a>, PLUS_EXPR <VAR_DECL <b>, VAR_DECL <c>>>
In this case, the GIMPLE form for this statement is logically
identical to its GENERIC form but in GIMPLE, the PLUS_EXPR
on the RHS of the assignment is not represented as a tree,
instead the two operands are taken out of the PLUS_EXPR
sub-tree
and flattened into the GIMPLE tuple as follows:
GIMPLE_ASSIGN <PLUS_EXPR, VAR_DECL <a>, VAR_DECL <b>, VAR_DECL <c>>
The operand vector is stored at the bottom of the three tuple structures that accept operands. This means, that depending on the code of a given statement, its operand vector will be at different offsets from the base of the structure. To access tuple operands use the following accessors
Returns the number of operands in statement G.
Returns a pointer into the operand vector for statement
G
. This is computed using an internal table calledgimple_ops_offset_
[]. This table is indexed by the gimple code ofG
.When the compiler is built, this table is filled-in using the sizes of the structures used by each statement code defined in gimple.def. Since the operand vector is at the bottom of the structure, for a gimple code
C
the offset is computed as sizeof (struct-ofC
) - sizeof (tree).This mechanism adds one memory indirection to every access when using
gimple_op
(), if this becomes a bottleneck, a pass can choose to memoize the result fromgimple_ops
() and use that to access the operands.
When adding a new operand to a gimple statement, the operand will
be validated according to what each tuple accepts in its operand
vector. These predicates are called by the
gimple_
name_set_...()
. Each tuple will use one of the
following predicates (Note, this list is not exhaustive):
Returns true if t is a "GIMPLE value", which are all the non-addressable stack variables (variables for which
is_gimple_reg
returns true) and constants (expressions for whichis_gimple_min_invariant
returns true).
Returns true if t is a symbol or memory reference whose address can be taken.
Similar to
is_gimple_val
but it also accepts hard registers.
Return true if t is a valid expression to use as the function called by a
GIMPLE_CALL
.
Return true if t is a valid expression to use as first operand of a
MEM_REF
expression.
Return true if t is a valid minimal invariant. This is different from constants, in that the specific value of t may not be known at compile time, but it is known that it doesn't change (e.g., the address of a function local variable).
Return true if t is an interprocedural invariant. This means that t is a valid invariant in all functions (e.g. it can be an address of a global variable but not of a local one).
Return true if t is an
ADDR_EXPR
that does not change once the program is running (and which is valid in all functions).
Return true if g is a
GIMPLE_ASSIGN
that performs a type cast operation.
Return true if g is a
GIMPLE_DEBUG
that binds the value of an expression to a variable.
This section documents all the functions available to handle each of the GIMPLE instructions.
The following are common accessors for gimple statements.
Return the basic block to which statement
G
belongs to.
Return the type of the main expression computed by
STMT
. Returnvoid_type_node
ifSTMT
computes nothing. This will only return something meaningful forGIMPLE_ASSIGN
,GIMPLE_COND
andGIMPLE_CALL
. For all other tuple codes, it will returnvoid_type_node
.
Return the tree code for the expression computed by
STMT
. This is only meaningful forGIMPLE_CALL
,GIMPLE_ASSIGN
andGIMPLE_COND
. IfSTMT
isGIMPLE_CALL
, it will returnCALL_EXPR
. ForGIMPLE_COND
, it returns the code of the comparison predicate. ForGIMPLE_ASSIGN
it returns the code of the operation performed by theRHS
of the assignment.
Set the lexical scope block of
G
toBLOCK
.
Set locus information for statement
G
.
Return true if
G
does not have locus information.
Return true if no warnings should be emitted for statement
STMT
.
Set the visited status on statement
STMT
toVISITED_P
.
Set pass local flag
PLF
on statementSTMT
toVAL_P
.
Return the value of pass local flag
PLF
on statementSTMT
.
Return true if statement
G
has register or memory operands.
Return true if statement
G
has memory operands.
Return the number of operands for statement
G
.
Return a pointer to operand
I
for statementG
.
Set operand
I
of statementG
toOP
.
Return the set of symbols that have had their address taken by
STMT
.
Return the set of
DEF
operands for statementG
.
Set
DEF
to be the set ofDEF
operands for statementG
.
Return the set of
USE
operands for statementG
.
Set
USE
to be the set ofUSE
operands for statementG
.
Return the set of
VUSE
operands for statementG
.
Set
OPS
to be the set ofVUSE
operands for statementG
.
Return the set of
VDEF
operands for statementG
.
Set
OPS
to be the set ofVDEF
operands for statementG
.
Return the set of symbols loaded by statement
G
. Each element of the set is theDECL_UID
of the corresponding symbol.
Return the set of symbols stored by statement
G
. Each element of the set is theDECL_UID
of the corresponding symbol.
Return true if statement
G
has operands and the modified field has been set.
Return true if statement
STMT
contains volatile operands.
Return true if statement
STMT
contains volatile operands.
Update statement
S
if it has been marked modified.
GIMPLE_ASM
Build a
GIMPLE_ASM
statement. This statement is used for building in-line assembly constructs.STRING
is the assembly code.INPUTS
,OUTPUTS
,CLOBBERS
andLABELS
are the inputs, outputs, clobbered registers and labels.
Return the number of input operands for
GIMPLE_ASM
G
.
Return the number of output operands for
GIMPLE_ASM
G
.
Return the number of clobber operands for
GIMPLE_ASM
G
.
Return input operand
INDEX
ofGIMPLE_ASM
G
.
Set
IN_OP
to be input operandINDEX
inGIMPLE_ASM
G
.
Return output operand
INDEX
ofGIMPLE_ASM
G
.
Set
OUT_OP
to be output operandINDEX
inGIMPLE_ASM
G
.
Return clobber operand
INDEX
ofGIMPLE_ASM
G
.
Set
CLOBBER_OP
to be clobber operandINDEX
inGIMPLE_ASM
G
.
Return the string representing the assembly instruction in
GIMPLE_ASM
G
.
Return true if
G
is an asm statement marked volatile.
Mark asm statement
G
as volatile or non-volatile based onVOLATILE_P
.
GIMPLE_ASSIGN
Build a
GIMPLE_ASSIGN
statement. The left-hand side is an lvalue passed in lhs. The right-hand side can be either a unary or binary tree expression. The expression tree rhs will be flattened and its operands assigned to the corresponding operand slots in the new statement. This function is useful when you already have a tree expression that you want to convert into a tuple. However, try to avoid building expression trees for the sole purpose of calling this function. If you already have the operands in separate trees, it is better to usegimple_build_assign
withenum tree_code
argument and separate arguments for each operand.
This function is similar to two operand
gimple_build_assign
, but is used to build aGIMPLE_ASSIGN
statement when the operands of the right-hand side of the assignment are already split into different operands.The left-hand side is an lvalue passed in lhs. Subcode is the
tree_code
for the right-hand side of the assignment. Op1, op2 and op3 are the operands.
Like the above 5 operand
gimple_build_assign
, but with the last argumentNULL
- this overload should not be used forGIMPLE_TERNARY_RHS
assignments.
Like the above 4 operand
gimple_build_assign
, but with the last argumentNULL
- this overload should be used only forGIMPLE_UNARY_RHS
andGIMPLE_SINGLE_RHS
assignments.
Build a new
GIMPLE_ASSIGN
tuple and append it to the end of*SEQ_P
.
DST
/SRC
are the destination and source respectively. You can
pass ungimplified trees in DST
or SRC
, in which
case they will be converted to a gimple operand if necessary.
This function returns the newly created GIMPLE_ASSIGN
tuple.
Return the code of the expression computed on the
RHS
of assignment statementG
.
Return the gimple rhs class of the code for the expression computed on the rhs of assignment statement
G
. This will never returnGIMPLE_INVALID_RHS
.
Return a pointer to the
LHS
of assignment statementG
.
Return the first operand on the
RHS
of assignment statementG
.
Return the address of the first operand on the
RHS
of assignment statementG
.
Return the second operand on the
RHS
of assignment statementG
.
Return the address of the second operand on the
RHS
of assignment statementG
.
Return the third operand on the
RHS
of assignment statementG
.
Return the address of the third operand on the
RHS
of assignment statementG
.
Set
LHS
to be theLHS
operand of assignment statementG
.
Set
RHS
to be the first operand on theRHS
of assignment statementG
.
Set
RHS
to be the second operand on theRHS
of assignment statementG
.
Set
RHS
to be the third operand on theRHS
of assignment statementG
.
Return true if
S
is a type-cast assignment.
GIMPLE_BIND
Build a
GIMPLE_BIND
statement with a list of variables inVARS
and a body of statements in sequenceBODY
.
Return the variables declared in the
GIMPLE_BIND
statementG
.
Set
VARS
to be the set of variables declared in theGIMPLE_BIND
statementG
.
Append
VARS
to the set of variables declared in theGIMPLE_BIND
statementG
.
Return the GIMPLE sequence contained in the
GIMPLE_BIND
statementG
.
Set
SEQ
to be sequence contained in theGIMPLE_BIND
statementG
.
Append a statement to the end of a
GIMPLE_BIND
's body.
Append a sequence of statements to the end of a
GIMPLE_BIND
's body.
Return the
TREE_BLOCK
node associated withGIMPLE_BIND
statementG
. This is analogous to theBIND_EXPR_BLOCK
field in trees.
Set
BLOCK
to be theTREE_BLOCK
node associated withGIMPLE_BIND
statementG
.
GIMPLE_CALL
Build a
GIMPLE_CALL
statement to functionFN
. The argumentFN
must be either aFUNCTION_DECL
or a gimple call address as determined byis_gimple_call_addr
.NARGS
are the number of arguments. The rest of the arguments follow the argumentNARGS
, and must be trees that are valid as rvalues in gimple (i.e., each operand is validated withis_gimple_operand
).
Build a
GIMPLE_CALL
from aCALL_EXPR
node. The arguments and the function are taken from the expression directly. This routine assumes thatcall_expr
is already in GIMPLE form. That is, its operands are GIMPLE values and the function call needs no further simplification. All the call flags incall_expr
are copied over to the newGIMPLE_CALL
.
vec<tree>
args)Identical to
gimple_build_call
but the arguments are stored in avec<tree>
.
Return a pointer to the
LHS
of call statementG
.
Set
LHS
to be theLHS
operand of call statementG
.
Return the tree node representing the function called by call statement
G
.
Set
FN
to be the function called by call statementG
. This has to be a gimple value specifying the address of the called function.
If a given
GIMPLE_CALL
's callee is aFUNCTION_DECL
, return it. Otherwise returnNULL
. This function is analogous toget_callee_fndecl
inGENERIC
.
Set the called function to
FNDECL
.
Return the type returned by call statement
G
.
Set
CHAIN
to be the static chain for call statementG
.
Return the number of arguments used by call statement
G
.
Return the argument at position
INDEX
for call statementG
. The first argument is 0.
Return a pointer to the argument at position
INDEX
for call statementG
.
Set
ARG
to be the argument at positionINDEX
for call statementG
.
Mark call statement
S
as being a tail call (i.e., a call just before the exit of a function). These calls are candidate for tail call optimization.
Return true if
GIMPLE_CALL
S
is marked as a tail call.
Build a
GIMPLE_CALL
identical toSTMT
but skipping the arguments in the positions marked by the setARGS_TO_SKIP
.
GIMPLE_CATCH
Build a
GIMPLE_CATCH
statement.TYPES
are the tree types this catch handles.HANDLER
is a sequence of statements with the code for the handler.
Return the types handled by
GIMPLE_CATCH
statementG
.
Return a pointer to the types handled by
GIMPLE_CATCH
statementG
.
Return the GIMPLE sequence representing the body of the handler of
GIMPLE_CATCH
statementG
.
Set
T
to be the set of types handled byGIMPLE_CATCH
G
.
Set
HANDLER
to be the body ofGIMPLE_CATCH
G
.
GIMPLE_COND
Build a
GIMPLE_COND
statement.A
GIMPLE_COND
statement comparesLHS
andRHS
and if the condition inPRED_CODE
is true, jump to the label int_label
, otherwise jump to the label inf_label
.PRED_CODE
are relational operator tree codes likeEQ_EXPR
,LT_EXPR
,LE_EXPR
,NE_EXPR
, etc.
Build a
GIMPLE_COND
statement from the conditional expression treeCOND
.T_LABEL
andF_LABEL
are as ingimple_build_cond
.
Return the code of the predicate computed by conditional statement
G
.
Set
CODE
to be the predicate code for the conditional statementG
.
Return the
LHS
of the predicate computed by conditional statementG
.
Set
LHS
to be theLHS
operand of the predicate computed by conditional statementG
.
Return the
RHS
operand of the predicate computed by conditionalG
.
Set
RHS
to be theRHS
operand of the predicate computed by conditional statementG
.
Return the label used by conditional statement
G
when its predicate evaluates to true.
Set
LABEL
to be the label used by conditional statementG
when its predicate evaluates to true.
Set
LABEL
to be the label used by conditional statementG
when its predicate evaluates to false.
Return the label used by conditional statement
G
when its predicate evaluates to false.
Set the conditional
COND_STMT
to be of the form 'if (1 == 0)'.
Set the conditional
COND_STMT
to be of the form 'if (1 == 1)'.
GIMPLE_DEBUG
Build a
GIMPLE_DEBUG
statement withGIMPLE_DEBUG_BIND
ofsubcode
. The effect of this statement is to tell debug information generation machinery that the value of user variablevar
is given byvalue
at that point, and to remain with that value untilvar
runs out of scope, a dynamically-subsequent debug bind statement overrides the binding, or conflicting values reach a control flow merge point. Even if components of thevalue
expression change afterwards, the variable is supposed to retain the same value, though not necessarily the same location.It is expected that
var
be most often a tree for automatic user variables (VAR_DECL
orPARM_DECL
) that satisfy the requirements for gimple registers, but it may also be a tree for a scalarized component of a user variable (ARRAY_REF
,COMPONENT_REF
), or a debug temporary (DEBUG_EXPR_DECL
).As for
value
, it can be an arbitrary tree expression, but it is recommended that it be in a suitable form for a gimple assignmentRHS
. It is not expected that user variables that could appear asvar
ever appear invalue
, because in the latter we'd have theirSSA_NAME
s instead, but even if they were not in SSA form, user variables appearing invalue
are to be regarded as part of the executable code space, whereas those invar
are to be regarded as part of the source code space. There is no way to refer to the value bound to a user variable within avalue
expression.If
value
isGIMPLE_DEBUG_BIND_NOVALUE
, debug information generation machinery is informed that the variablevar
is unbound, i.e., that its value is indeterminate, which sometimes means it is really unavailable, and other times that the compiler could not keep track of it.Block and location information for the newly-created stmt are taken from
stmt
, if given.
Return the user variable var that is bound at
stmt
.
Return the value expression that is bound to a user variable at
stmt
.
Return a pointer to the value expression that is bound to a user variable at
stmt
.
Modify the user variable bound at
stmt
to var.
Modify the value bound to the user variable bound at
stmt
to value.
Modify the value bound to the user variable bound at
stmt
so that the variable becomes unbound.
Return
TRUE
ifstmt
binds a user variable to a value, andFALSE
if it unbinds the variable.
GIMPLE_EH_FILTER
Build a
GIMPLE_EH_FILTER
statement.TYPES
are the filter's types.FAILURE
is a sequence with the filter's failure action.
Return the types handled by
GIMPLE_EH_FILTER
statementG
.
Return a pointer to the types handled by
GIMPLE_EH_FILTER
statementG
.
Return the sequence of statement to execute when
GIMPLE_EH_FILTER
statement fails.
Set
TYPES
to be the set of types handled byGIMPLE_EH_FILTER
G
.
Set
FAILURE
to be the sequence of statements to execute on failure forGIMPLE_EH_FILTER
G
.
Get the function decl to be called by the MUST_NOT_THROW region.
Set the function decl to be called by GS to DECL.
GIMPLE_LABEL
Build a
GIMPLE_LABEL
statement with corresponding to the tree label,LABEL
.
Return the
LABEL_DECL
node used byGIMPLE_LABEL
statementG
.
Set
LABEL
to be theLABEL_DECL
node used byGIMPLE_LABEL
statementG
.
GIMPLE_GOTO
Build a
GIMPLE_GOTO
statement to labelDEST
.
Return the destination of the unconditional jump
G
.
Set
DEST
to be the destination of the unconditional jumpG
.
GIMPLE_NOP
GIMPLE_OMP_ATOMIC_LOAD
Build a
GIMPLE_OMP_ATOMIC_LOAD
statement.LHS
is the left-hand side of the assignment.RHS
is the right-hand side of the assignment.
Set the
LHS
of an atomic load.
Get the
LHS
of an atomic load.
Set the
RHS
of an atomic set.
Get the
RHS
of an atomic set.
GIMPLE_OMP_ATOMIC_STORE
Build a
GIMPLE_OMP_ATOMIC_STORE
statement.VAL
is the value to be stored.
Set the value being stored in an atomic store.
Return the value being stored in an atomic store.
GIMPLE_OMP_CONTINUE
Build a
GIMPLE_OMP_CONTINUE
statement.CONTROL_DEF
is the definition of the control variable.CONTROL_USE
is the use of the control variable.
Return the definition of the control variable on a
GIMPLE_OMP_CONTINUE
inS
.
Same as above, but return the pointer.
Set the control variable definition for a
GIMPLE_OMP_CONTINUE
statement inS
.
Return the use of the control variable on a
GIMPLE_OMP_CONTINUE
inS
.
Same as above, but return the pointer.
Set the control variable use for a
GIMPLE_OMP_CONTINUE
statement inS
.
GIMPLE_OMP_CRITICAL
Build a
GIMPLE_OMP_CRITICAL
statement.BODY
is the sequence of statements for which only one thread can execute.NAME
is an optional identifier for this critical block.
Return the name associated with
OMP_CRITICAL
statementG
.
Return a pointer to the name associated with
OMP
critical statementG
.
Set
NAME
to be the name associated withOMP
critical statementG
.
GIMPLE_OMP_FOR
Build a
GIMPLE_OMP_FOR
statement.BODY
is sequence of statements inside the for loop.CLAUSES
, are any of the loop construct's clauses.PRE_BODY
is the sequence of statements that are loop invariant.INDEX
is the index variable.INITIAL
is the initial value ofINDEX
.FINAL
is final value ofINDEX
. OMP_FOR_COND is the predicate used to compareINDEX
andFINAL
.INCR
is the increment expression.
Return the clauses associated with
OMP_FOR
G
.
Set
CLAUSES
to be the list of clauses associated withOMP_FOR
G
.
Return a pointer to the index variable for
OMP_FOR
G
.
Set
INDEX
to be the index variable forOMP_FOR
G
.
Return a pointer to the initial value for
OMP_FOR
G
.
Set
INITIAL
to be the initial value forOMP_FOR
G
.
turn a pointer to the final value for
OMP_FOR
G
.
Set
FINAL
to be the final value forOMP_FOR
G
.
Return a pointer to the increment value for
OMP_FOR
G
.
Set
INCR
to be the increment value forOMP_FOR
G
.
Return the sequence of statements to execute before the
OMP_FOR
statementG
starts.
Set
PRE_BODY
to be the sequence of statements to execute before theOMP_FOR
statementG
starts.
Set
COND
to be the condition code forOMP_FOR
G
.
Return the condition code associated with
OMP_FOR
G
.
GIMPLE_OMP_MASTER
Build a
GIMPLE_OMP_MASTER
statement.BODY
is the sequence of statements to be executed by just the master.
GIMPLE_OMP_ORDERED
Build a
GIMPLE_OMP_ORDERED
statement.
BODY
is the sequence of statements inside a loop that will
executed in sequence.
GIMPLE_OMP_PARALLEL
Build a
GIMPLE_OMP_PARALLEL
statement.
BODY
is sequence of statements which are executed in parallel.
CLAUSES
, are the OMP
parallel construct's clauses. CHILD_FN
is
the function created for the parallel threads to execute.
DATA_ARG
are the shared data argument(s).
Return true if
OMP
parallel statementG
has theGF_OMP_PARALLEL_COMBINED
flag set.
Set the
GF_OMP_PARALLEL_COMBINED
field inOMP
parallel statementG
.
Set
BODY
to be the body for theOMP
statementG
.
Return the clauses associated with
OMP_PARALLEL
G
.
Return a pointer to the clauses associated with
OMP_PARALLEL
G
.
Set
CLAUSES
to be the list of clauses associated withOMP_PARALLEL
G
.
Return the child function used to hold the body of
OMP_PARALLEL
G
.
Return a pointer to the child function used to hold the body of
OMP_PARALLEL
G
.
Set
CHILD_FN
to be the child function forOMP_PARALLEL
G
.
Return the artificial argument used to send variables and values from the parent to the children threads in
OMP_PARALLEL
G
.
Return a pointer to the data argument for
OMP_PARALLEL
G
.
Set
DATA_ARG
to be the data argument forOMP_PARALLEL
G
.
GIMPLE_OMP_RETURN
Build a
GIMPLE_OMP_RETURN
statement.WAIT_P
is true if this is a non-waiting return.
Set the nowait flag on
GIMPLE_OMP_RETURN
statementS
.
Return true if
OMP
return statementG
has theGF_OMP_RETURN_NOWAIT
flag set.
GIMPLE_OMP_SECTION
Build a
GIMPLE_OMP_SECTION
statement for a sections statement.
BODY
is the sequence of statements in the section.
Return true if
OMP
section statementG
has theGF_OMP_SECTION_LAST
flag set.
Set the
GF_OMP_SECTION_LAST
flag onG
.
GIMPLE_OMP_SECTIONS
Build a
GIMPLE_OMP_SECTIONS
statement.BODY
is a sequence of section statements.CLAUSES
are any of theOMP
sections construct's clauses: private, firstprivate, lastprivate, reduction, and nowait.
Build a
GIMPLE_OMP_SECTIONS_SWITCH
statement.
Return the control variable associated with the
GIMPLE_OMP_SECTIONS
inG
.
Return a pointer to the clauses associated with the
GIMPLE_OMP_SECTIONS
inG
.
Set
CONTROL
to be the set of clauses associated with theGIMPLE_OMP_SECTIONS
inG
.
Return the clauses associated with
OMP_SECTIONS
G
.
Return a pointer to the clauses associated with
OMP_SECTIONS
G
.
Set
CLAUSES
to be the set of clauses associated withOMP_SECTIONS
G
.
GIMPLE_OMP_SINGLE
Build a
GIMPLE_OMP_SINGLE
statement.BODY
is the sequence of statements that will be executed once.CLAUSES
are any of theOMP
single construct's clauses: private, firstprivate, copyprivate, nowait.
Return the clauses associated with
OMP_SINGLE
G
.
Return a pointer to the clauses associated with
OMP_SINGLE
G
.
Set
CLAUSES
to be the clauses associated withOMP_SINGLE
G
.
GIMPLE_PHI
Return the maximum number of arguments supported by
GIMPLE_PHI
G
.
Return the number of arguments in
GIMPLE_PHI
G
. This must always be exactly the number of incoming edges for the basic block holdingG
.
Return a pointer to the
SSA
name created byGIMPLE_PHI
G
.
Set
RESULT
to be theSSA
name created byGIMPLE_PHI
G
.
Return the
PHI
argument corresponding to incoming edgeINDEX
forGIMPLE_PHI
G
.
Set
PHIARG
to be the argument corresponding to incoming edgeINDEX
forGIMPLE_PHI
G
.
GIMPLE_RESX
Build a
GIMPLE_RESX
statement which is a statement. This statement is a placeholder for _Unwind_Resume before we know if a function call or a branch is needed.REGION
is the exception region from which control is flowing.
Return the region number for
GIMPLE_RESX
G
.
Set
REGION
to be the region number forGIMPLE_RESX
G
.
GIMPLE_RETURN
Build a
GIMPLE_RETURN
statement whose return value is retval.
Return the return value for
GIMPLE_RETURN
G
.
Set
RETVAL
to be the return value forGIMPLE_RETURN
G
.
GIMPLE_SWITCH
vec
<tree> *args)Build a
GIMPLE_SWITCH
statement.INDEX
is the index variable to switch on, andDEFAULT_LABEL
represents the default label.ARGS
is a vector ofCASE_LABEL_EXPR
trees that contain the non-default case labels. Each label is a tree of codeCASE_LABEL_EXPR
.
Return the number of labels associated with the switch statement
G
.
Set
NLABELS
to be the number of labels for the switch statementG
.
Return the index variable used by the switch statement
G
.
Set
INDEX
to be the index variable for switch statementG
.
Return the label numbered
INDEX
. The default label is 0, followed by any labels in a switch statement.
Set the label number
INDEX
toLABEL
. 0 is always the default label.
Return the default label for a switch statement.
Set the default label for a switch statement.
GIMPLE_TRY
Build a
GIMPLE_TRY
statement.EVAL
is a sequence with the expression to evaluate.CLEANUP
is a sequence of statements to run at clean-up time.KIND
is the enumeration valueGIMPLE_TRY_CATCH
if this statement denotes a try/catch construct orGIMPLE_TRY_FINALLY
if this statement denotes a try/finally construct.
Return the kind of try block represented by
GIMPLE_TRY
G
. This is eitherGIMPLE_TRY_CATCH
orGIMPLE_TRY_FINALLY
.
Return the
GIMPLE_TRY_CATCH_IS_CLEANUP
flag.
Return the sequence of statements used as the body for
GIMPLE_TRY
G
.
Return the sequence of statements used as the cleanup body for
GIMPLE_TRY
G
.
Set the
GIMPLE_TRY_CATCH_IS_CLEANUP
flag.
Set
EVAL
to be the sequence of statements to use as the body forGIMPLE_TRY
G
.
Set
CLEANUP
to be the sequence of statements to use as the cleanup body forGIMPLE_TRY
G
.
GIMPLE_WITH_CLEANUP_EXPR
Build a
GIMPLE_WITH_CLEANUP_EXPR
statement.CLEANUP
is the clean-up expression.
Return the cleanup sequence for cleanup statement
G
.
Set
CLEANUP
to be the cleanup sequence forG
.
Return the
CLEANUP_EH_ONLY
flag for aWCE
tuple.
Set the
CLEANUP_EH_ONLY
flag for aWCE
tuple.
GIMPLE sequences are the tuple equivalent of STATEMENT_LIST
's
used in GENERIC
. They are used to chain statements together, and
when used in conjunction with sequence iterators, provide a
framework for iterating through statements.
GIMPLE sequences are of type struct gimple_sequence
, but are more
commonly passed by reference to functions dealing with sequences.
The type for a sequence pointer is gimple_seq
which is the same
as struct gimple_sequence
*. When declaring a local sequence,
you can define a local variable of type struct gimple_sequence
.
When declaring a sequence allocated on the garbage collected
heap, use the function gimple_seq_alloc
documented below.
There are convenience functions for iterating through sequences in the section entitled Sequence Iterators.
Below is a list of functions to manipulate and query sequences.
Link a gimple statement to the end of the sequence *
SEQ
ifG
is notNULL
. If *SEQ
isNULL
, allocate a sequence before linking.
Append sequence
SRC
to the end of sequence *DEST
ifSRC
is notNULL
. If *DEST
isNULL
, allocate a new sequence before appending.
Perform a deep copy of sequence
SRC
and return the result.
Reverse the order of the statements in the sequence
SEQ
. ReturnSEQ
.
Set the last statement in sequence
S
to the statement inLAST
.
Set the first statement in sequence
S
to the statement inFIRST
.
Allocate a new sequence in the garbage collected store and return it.
Copy the sequence
SRC
into the sequenceDEST
.
Sets the sequence of statements in
BB
toSEQ
.
Determine whether
SEQ
contains exactly one statement.
Sequence iterators are convenience constructs for iterating
through statements in a sequence. Given a sequence SEQ
, here is
a typical use of gimple sequence iterators:
gimple_stmt_iterator gsi;
for (gsi = gsi_start (seq); !gsi_end_p (gsi); gsi_next (&gsi))
{
gimple g = gsi_stmt (gsi);
/* Do something with gimple statement G
. */
}
Backward iterations are possible:
for (gsi = gsi_last (seq); !gsi_end_p (gsi); gsi_prev (&gsi))
Forward and backward iterations on basic blocks are possible with
gsi_start_bb
and gsi_last_bb
.
In the documentation below we sometimes refer to enum
gsi_iterator_update
. The valid options for this enumeration are:
GSI_NEW_STMT
Only valid when a single statement is added. Move the iterator to it.
GSI_SAME_STMT
Leave the iterator at the same statement.
GSI_CONTINUE_LINKING
Move iterator to whatever position is suitable for linking other
statements in the same direction.
Below is a list of the functions used to manipulate and use statement iterators.
Return a new iterator pointing to the sequence
SEQ
's first statement. IfSEQ
is empty, the iterator's basic block isNULL
. Usegsi_start_bb
instead when the iterator needs to always have the correct basic block set.
Return a new iterator pointing to the first statement in basic block
BB
.
Return a new iterator initially pointing to the last statement of sequence
SEQ
. IfSEQ
is empty, the iterator's basic block isNULL
. Usegsi_last_bb
instead when the iterator needs to always have the correct basic block set.
Return a new iterator pointing to the last statement in basic block
BB
.
Return
TRUE
if we're one statement before the end ofI
.
Advance the iterator to the next gimple statement.
Advance the iterator to the previous gimple statement.
Return a block statement iterator that points to the first non-label statement in block
BB
.
Return a pointer to the current stmt.
Return the basic block associated with this iterator.
Return the sequence associated with this iterator.
Remove the current stmt from the sequence. The iterator is updated to point to the next statement. When
REMOVE_EH_INFO
is true we remove the statement pointed to by iteratorI
from theEH
tables. Otherwise we do not modify theEH
tables. Generally,REMOVE_EH_INFO
should be true when the statement is going to be removed from theIL
and not reinserted elsewhere.
Links the sequence of statements
SEQ
before the statement pointed by iteratorI
.MODE
indicates what to do with the iterator after insertion (seeenum gsi_iterator_update
above).
Links statement
G
before the statement pointed-to by iteratorI
. Updates iteratorI
according toMODE
.
Links sequence
SEQ
after the statement pointed-to by iteratorI
.MODE
is as ingsi_insert_after
.
Links statement
G
after the statement pointed-to by iteratorI
.MODE
is as ingsi_insert_after
.
Move all statements in the sequence after
I
to a new sequence. Return this new sequence.
Move all statements in the sequence before
I
to a new sequence. Return this new sequence.
Replace the statement pointed-to by
I
toSTMT
. IfUPDATE_EH_INFO
is true, the exception handling information of the original statement is moved to the new statement.
Insert statement
STMT
before the statement pointed-to by iteratorI
, updateSTMT
's basic block and scan it for new operands.MODE
specifies how to update iteratorI
after insertion (see enumgsi_iterator_update
).
Like
gsi_insert_before
, but for all the statements inSEQ
.
Insert statement
STMT
after the statement pointed-to by iteratorI
, updateSTMT
's basic block and scan it for new operands.MODE
specifies how to update iteratorI
after insertion (see enumgsi_iterator_update
).
Like
gsi_insert_after
, but for all the statements inSEQ
.
Move the statement at
FROM
so it comes right after the statement atTO
.
Move the statement at
FROM
so it comes right before the statement atTO
.
Move the statement at
FROM
to the end of basic blockBB
.
Add
STMT
to the pending list of edgeE
. No actual insertion is made until a call togsi_commit_edge_inserts
() is made.
Add the sequence of statements in
SEQ
to the pending list of edgeE
. No actual insertion is made until a call togsi_commit_edge_inserts
() is made.
Similar to
gsi_insert_on_edge
+gsi_commit_edge_inserts
. If a new block has to be created, it is returned.
Commit insertions pending at edge
E
. If a new block is created, setNEW_BB
to this block, otherwise set it toNULL
.
This routine will commit all pending edge insertions, creating any new basic blocks which are necessary.
The first step in adding a new GIMPLE statement code, is
modifying the file gimple.def
, which contains all the GIMPLE
codes. Then you must add a corresponding gimple subclass
located in gimple.h
. This in turn, will require you to add a
corresponding GTY
tag in gsstruct.def
, and code to handle
this tag in gss_for_code
which is located in gimple.c
.
In order for the garbage collector to know the size of the
structure you created in gimple.h
, you need to add a case to
handle your new GIMPLE statement in gimple_size
which is located
in gimple.c
.
You will probably want to create a function to build the new
gimple statement in gimple.c
. The function should be called
gimple_build_
new-tuple-name, and should return the new tuple
as a pointer to the appropriate gimple subclass.
If your new statement requires accessors for any members or
operands it may have, put simple inline accessors in
gimple.h
and any non-trivial accessors in gimple.c
with a
corresponding prototype in gimple.h
.
You should add the new statement subclass to the class hierarchy diagram
in gimple.texi
.
There are two functions available for walking statements and
sequences: walk_gimple_stmt
and walk_gimple_seq
,
accordingly, and a third function for walking the operands in a
statement: walk_gimple_op
.
This function is used to walk the current statement in
GSI
, optionally using traversal state stored inWI
. IfWI
isNULL
, no state is kept during the traversal.The callback
CALLBACK_STMT
is called. IfCALLBACK_STMT
returns true, it means that the callback function has handled all the operands of the statement and it is not necessary to walk its operands.If
CALLBACK_STMT
isNULL
or it returns false,CALLBACK_OP
is called on each operand of the statement viawalk_gimple_op
. Ifwalk_gimple_op
returns non-NULL
for any operand, the remaining operands are not scanned.The return value is that returned by the last call to
walk_gimple_op
, orNULL_TREE
if noCALLBACK_OP
is specified.
Use this function to walk the operands of statement
STMT
. Every operand is walked viawalk_tree
with optional state information inWI
.
CALLBACK_OP
is called on each operand ofSTMT
viawalk_tree
. Additional parameters towalk_tree
must be stored inWI
. For each operandOP
,walk_tree
is called as:walk_tree (&OP
,CALLBACK_OP
,WI
,PSET
)If
CALLBACK_OP
returns non-NULL
for an operand, the remaining operands are not scanned. The return value is that returned by the last call towalk_tree
, orNULL_TREE
if noCALLBACK_OP
is specified.
This function walks all the statements in the sequence
SEQ
callingwalk_gimple_stmt
on each one.WI
is as inwalk_gimple_stmt
. Ifwalk_gimple_stmt
returns non-NULL
, the walk is stopped and the value returned. Otherwise, all the statements are walked andNULL_TREE
returned.
GCC uses three main intermediate languages to represent the program during compilation: GENERIC, GIMPLE and RTL. GENERIC is a language-independent representation generated by each front end. It is used to serve as an interface between the parser and optimizer. GENERIC is a common representation that is able to represent programs written in all the languages supported by GCC.
GIMPLE and RTL are used to optimize the program. GIMPLE is used for target and language independent optimizations (e.g., inlining, constant propagation, tail call elimination, redundancy elimination, etc). Much like GENERIC, GIMPLE is a language independent, tree based representation. However, it differs from GENERIC in that the GIMPLE grammar is more restrictive: expressions contain no more than 3 operands (except function calls), it has no control flow structures and expressions with side-effects are only allowed on the right hand side of assignments. See the chapter describing GENERIC and GIMPLE for more details.
This chapter describes the data structures and functions used in the GIMPLE optimizers (also known as “tree optimizers” or “middle end”). In particular, it focuses on all the macros, data structures, functions and programming constructs needed to implement optimization passes for GIMPLE.
The optimizers need to associate attributes with variables during the
optimization process. For instance, we need to know whether a
variable has aliases. All these attributes are stored in data
structures called annotations which are then linked to the field
ann
in struct tree_common
.
Almost every GIMPLE statement will contain a reference to a variable
or memory location. Since statements come in different shapes and
sizes, their operands are going to be located at various spots inside
the statement's tree. To facilitate access to the statement's
operands, they are organized into lists associated inside each
statement's annotation. Each element in an operand list is a pointer
to a VAR_DECL
, PARM_DECL
or SSA_NAME
tree node.
This provides a very convenient way of examining and replacing
operands.
Data flow analysis and optimization is done on all tree nodes
representing variables. Any node for which SSA_VAR_P
returns
nonzero is considered when scanning statement operands. However, not
all SSA_VAR_P
variables are processed in the same way. For the
purposes of optimization, we need to distinguish between references to
local scalar variables and references to globals, statics, structures,
arrays, aliased variables, etc. The reason is simple, the compiler
can gather complete data flow information for a local scalar. On the
other hand, a global variable may be modified by a function call, it
may not be possible to keep track of all the elements of an array or
the fields of a structure, etc.
The operand scanner gathers two kinds of operands: real and
virtual. An operand for which is_gimple_reg
returns true
is considered real, otherwise it is a virtual operand. We also
distinguish between uses and definitions. An operand is used if its
value is loaded by the statement (e.g., the operand at the RHS of an
assignment). If the statement assigns a new value to the operand, the
operand is considered a definition (e.g., the operand at the LHS of
an assignment).
Virtual and real operands also have very different data flow properties. Real operands are unambiguous references to the full object that they represent. For instance, given
{ int a, b; a = b }
Since a
and b
are non-aliased locals, the statement
a = b
will have one real definition and one real use because
variable a
is completely modified with the contents of
variable b
. Real definition are also known as killing
definitions. Similarly, the use of b
reads all its bits.
In contrast, virtual operands are used with variables that can have a partial or ambiguous reference. This includes structures, arrays, globals, and aliased variables. In these cases, we have two types of definitions. For globals, structures, and arrays, we can determine from a statement whether a variable of these types has a killing definition. If the variable does, then the statement is marked as having a must definition of that variable. However, if a statement is only defining a part of the variable (i.e. a field in a structure), or if we know that a statement might define the variable but we cannot say for sure, then we mark that statement as having a may definition. For instance, given
{ int a, b, *p; if (...) p = &a; else p = &b; *p = 5; return *p; }
The assignment *p = 5
may be a definition of a
or
b
. If we cannot determine statically where p
is
pointing to at the time of the store operation, we create virtual
definitions to mark that statement as a potential definition site for
a
and b
. Memory loads are similarly marked with virtual
use operands. Virtual operands are shown in tree dumps right before
the statement that contains them. To request a tree dump with virtual
operands, use the -vops option to -fdump-tree:
{ int a, b, *p; if (...) p = &a; else p = &b; # a = VDEF <a> # b = VDEF <b> *p = 5; # VUSE <a> # VUSE <b> return *p; }
Notice that VDEF
operands have two copies of the referenced
variable. This indicates that this is not a killing definition of
that variable. In this case we refer to it as a may definition
or aliased store. The presence of the second copy of the
variable in the VDEF
operand will become important when the
function is converted into SSA form. This will be used to link all
the non-killing definitions to prevent optimizations from making
incorrect assumptions about them.
Operands are updated as soon as the statement is finished via a call
to update_stmt
. If statement elements are changed via
SET_USE
or SET_DEF
, then no further action is required
(i.e., those macros take care of updating the statement). If changes
are made by manipulating the statement's tree directly, then a call
must be made to update_stmt
when complete. Calling one of the
bsi_insert
routines or bsi_replace
performs an implicit
call to update_stmt
.
Operands are collected by tree-ssa-operands.c. They are stored inside each statement's annotation and can be accessed through either the operand iterators or an access routine.
The following access routines are available for examining operands:
SINGLE_SSA_{USE,DEF,TREE}_OPERAND
: These accessors will return
NULL unless there is exactly one operand matching the specified flags. If
there is exactly one operand, the operand is returned as either a tree
,
def_operand_p
, or use_operand_p
.
tree t = SINGLE_SSA_TREE_OPERAND (stmt, flags); use_operand_p u = SINGLE_SSA_USE_OPERAND (stmt, SSA_ALL_VIRTUAL_USES); def_operand_p d = SINGLE_SSA_DEF_OPERAND (stmt, SSA_OP_ALL_DEFS);
ZERO_SSA_OPERANDS
: This macro returns true if there are no
operands matching the specified flags.
if (ZERO_SSA_OPERANDS (stmt, SSA_OP_ALL_VIRTUALS)) return;
NUM_SSA_OPERANDS
: This macro Returns the number of operands
matching 'flags'. This actually executes a loop to perform the count, so
only use this if it is really needed.
int count = NUM_SSA_OPERANDS (stmt, flags)
If you wish to iterate over some or all operands, use the
FOR_EACH_SSA_{USE,DEF,TREE}_OPERAND
iterator. For example, to print
all the operands for a statement:
void print_ops (tree stmt) { ssa_op_iter; tree var; FOR_EACH_SSA_TREE_OPERAND (var, stmt, iter, SSA_OP_ALL_OPERANDS) print_generic_expr (stderr, var, TDF_SLIM); }
How to choose the appropriate iterator:
Need Macro: ---- ------- use_operand_p FOR_EACH_SSA_USE_OPERAND def_operand_p FOR_EACH_SSA_DEF_OPERAND tree FOR_EACH_SSA_TREE_OPERAND
#define SSA_OP_USE 0x01 /* Real USE operands. */ #define SSA_OP_DEF 0x02 /* Real DEF operands. */ #define SSA_OP_VUSE 0x04 /* VUSE operands. */ #define SSA_OP_VDEF 0x08 /* VDEF operands. */ /* These are commonly grouped operand flags. */ #define SSA_OP_VIRTUAL_USES (SSA_OP_VUSE) #define SSA_OP_VIRTUAL_DEFS (SSA_OP_VDEF) #define SSA_OP_ALL_VIRTUALS (SSA_OP_VIRTUAL_USES | SSA_OP_VIRTUAL_DEFS) #define SSA_OP_ALL_USES (SSA_OP_VIRTUAL_USES | SSA_OP_USE) #define SSA_OP_ALL_DEFS (SSA_OP_VIRTUAL_DEFS | SSA_OP_DEF) #define SSA_OP_ALL_OPERANDS (SSA_OP_ALL_USES | SSA_OP_ALL_DEFS)
So if you want to look at the use pointers for all the USE
and
VUSE
operands, you would do something like:
use_operand_p use_p; ssa_op_iter iter; FOR_EACH_SSA_USE_OPERAND (use_p, stmt, iter, (SSA_OP_USE | SSA_OP_VUSE)) { process_use_ptr (use_p); }
The TREE
macro is basically the same as the USE
and
DEF
macros, only with the use or def dereferenced via
USE_FROM_PTR (use_p)
and DEF_FROM_PTR (def_p)
. Since we
aren't using operand pointers, use and defs flags can be mixed.
tree var; ssa_op_iter iter; FOR_EACH_SSA_TREE_OPERAND (var, stmt, iter, SSA_OP_VUSE) { print_generic_expr (stderr, var, TDF_SLIM); }
VDEF
s are broken into two flags, one for the
DEF
portion (SSA_OP_VDEF
) and one for the USE portion
(SSA_OP_VUSE
).
There are many examples in the code, in addition to the documentation in tree-ssa-operands.h and ssa-iterators.h.
There are also a couple of variants on the stmt iterators regarding PHI nodes.
FOR_EACH_PHI_ARG
Works exactly like
FOR_EACH_SSA_USE_OPERAND
, except it works over PHI
arguments
instead of statement operands.
/* Look at every virtual PHI use. */ FOR_EACH_PHI_ARG (use_p, phi_stmt, iter, SSA_OP_VIRTUAL_USES) { my_code; } /* Look at every real PHI use. */ FOR_EACH_PHI_ARG (use_p, phi_stmt, iter, SSA_OP_USES) my_code; /* Look at every PHI use. */ FOR_EACH_PHI_ARG (use_p, phi_stmt, iter, SSA_OP_ALL_USES) my_code;
FOR_EACH_PHI_OR_STMT_{USE,DEF}
works exactly like
FOR_EACH_SSA_{USE,DEF}_OPERAND
, except it will function on
either a statement or a PHI
node. These should be used when it is
appropriate but they are not quite as efficient as the individual
FOR_EACH_PHI
and FOR_EACH_SSA
routines.
FOR_EACH_PHI_OR_STMT_USE (use_operand_p, stmt, iter, flags) { my_code; } FOR_EACH_PHI_OR_STMT_DEF (def_operand_p, phi, iter, flags) { my_code; }
Immediate use information is now always available. Using the immediate use
iterators, you may examine every use of any SSA_NAME
. For instance,
to change each use of ssa_var
to ssa_var2
and call fold_stmt on
each stmt after that is done:
use_operand_p imm_use_p; imm_use_iterator iterator; tree ssa_var, stmt; FOR_EACH_IMM_USE_STMT (stmt, iterator, ssa_var) { FOR_EACH_IMM_USE_ON_STMT (imm_use_p, iterator) SET_USE (imm_use_p, ssa_var_2); fold_stmt (stmt); }
There are 2 iterators which can be used. FOR_EACH_IMM_USE_FAST
is
used when the immediate uses are not changed, i.e., you are looking at the
uses, but not setting them.
If they do get changed, then care must be taken that things are not changed
under the iterators, so use the FOR_EACH_IMM_USE_STMT
and
FOR_EACH_IMM_USE_ON_STMT
iterators. They attempt to preserve the
sanity of the use list by moving all the uses for a statement into
a controlled position, and then iterating over those uses. Then the
optimization can manipulate the stmt when all the uses have been
processed. This is a little slower than the FAST version since it adds a
placeholder element and must sort through the list a bit for each statement.
This placeholder element must be also be removed if the loop is
terminated early. The macro BREAK_FROM_IMM_USE_SAFE
is provided
to do this :
FOR_EACH_IMM_USE_STMT (stmt, iterator, ssa_var) { if (stmt == last_stmt) BREAK_FROM_SAFE_IMM_USE (iter); FOR_EACH_IMM_USE_ON_STMT (imm_use_p, iterator) SET_USE (imm_use_p, ssa_var_2); fold_stmt (stmt); }
There are checks in verify_ssa
which verify that the immediate use list
is up to date, as well as checking that an optimization didn't break from the
loop without using this macro. It is safe to simply 'break'; from a
FOR_EACH_IMM_USE_FAST
traverse.
Some useful functions and macros:
has_zero_uses (ssa_var)
: Returns true if there are no uses of
ssa_var
.
has_single_use (ssa_var)
: Returns true if there is only a
single use of ssa_var
.
single_imm_use (ssa_var, use_operand_p *ptr, tree *stmt)
:
Returns true if there is only a single use of ssa_var
, and also returns
the use pointer and statement it occurs in, in the second and third parameters.
num_imm_uses (ssa_var)
: Returns the number of immediate uses of
ssa_var
. It is better not to use this if possible since it simply
utilizes a loop to count the uses.
PHI_ARG_INDEX_FROM_USE (use_p)
: Given a use within a PHI
node, return the index number for the use. An assert is triggered if the use
isn't located in a PHI
node.
USE_STMT (use_p)
: Return the statement a use occurs in.
Note that uses are not put into an immediate use list until their statement is
actually inserted into the instruction stream via a bsi_*
routine.
It is also still possible to utilize lazy updating of statements, but this should be used only when absolutely required. Both alias analysis and the dominator optimizations currently do this.
When lazy updating is being used, the immediate use information is out of date
and cannot be used reliably. Lazy updating is achieved by simply marking
statements modified via calls to gimple_set_modified
instead of
update_stmt
. When lazy updating is no longer required, all the
modified statements must have update_stmt
called in order to bring them
up to date. This must be done before the optimization is finished, or
verify_ssa
will trigger an abort.
This is done with a simple loop over the instruction stream:
block_stmt_iterator bsi; basic_block bb; FOR_EACH_BB (bb) { for (bsi = bsi_start (bb); !bsi_end_p (bsi); bsi_next (&bsi)) update_stmt_if_modified (bsi_stmt (bsi)); }
Most of the tree optimizers rely on the data flow information provided by the Static Single Assignment (SSA) form. We implement the SSA form as described in R. Cytron, J. Ferrante, B. Rosen, M. Wegman, and K. Zadeck. Efficiently Computing Static Single Assignment Form and the Control Dependence Graph. ACM Transactions on Programming Languages and Systems, 13(4):451-490, October 1991.
The SSA form is based on the premise that program variables are assigned in exactly one location in the program. Multiple assignments to the same variable create new versions of that variable. Naturally, actual programs are seldom in SSA form initially because variables tend to be assigned multiple times. The compiler modifies the program representation so that every time a variable is assigned in the code, a new version of the variable is created. Different versions of the same variable are distinguished by subscripting the variable name with its version number. Variables used in the right-hand side of expressions are renamed so that their version number matches that of the most recent assignment.
We represent variable versions using SSA_NAME
nodes. The
renaming process in tree-ssa.c wraps every real and
virtual operand with an SSA_NAME
node which contains
the version number and the statement that created the
SSA_NAME
. Only definitions and virtual definitions may
create new SSA_NAME
nodes.
Sometimes, flow of control makes it impossible to determine the most recent version of a variable. In these cases, the compiler inserts an artificial definition for that variable called PHI function or PHI node. This new definition merges all the incoming versions of the variable to create a new name for it. For instance,
if (...) a_1 = 5; else if (...) a_2 = 2; else a_3 = 13; # a_4 = PHI <a_1, a_2, a_3> return a_4;
Since it is not possible to determine which of the three branches
will be taken at runtime, we don't know which of a_1
,
a_2
or a_3
to use at the return statement. So, the
SSA renamer creates a new version a_4
which is assigned
the result of “merging” a_1
, a_2
and a_3
.
Hence, PHI nodes mean “one of these operands. I don't know
which”.
The following functions can be used to examine PHI nodes
Returns the number of arguments in phi. This number is exactly the number of incoming edges to the basic block holding phi.
Some optimization passes make changes to the function that invalidate the SSA property. This can happen when a pass has added new symbols or changed the program so that variables that were previously aliased aren't anymore. Whenever something like this happens, the affected symbols must be renamed into SSA form again. Transformations that emit new code or replicate existing statements will also need to update the SSA form.
Since GCC implements two different SSA forms for register and virtual variables, keeping the SSA form up to date depends on whether you are updating register or virtual names. In both cases, the general idea behind incremental SSA updates is similar: when new SSA names are created, they typically are meant to replace other existing names in the program.
For instance, given the following code:
1 L0: 2 x_1 = PHI (0, x_5) 3 if (x_1 < 10) 4 if (x_1 > 7) 5 y_2 = 0 6 else 7 y_3 = x_1 + x_7 8 endif 9 x_5 = x_1 + 1 10 goto L0; 11 endif
Suppose that we insert new names x_10
and x_11
(lines
4
and 8
).
1 L0: 2 x_1 = PHI (0, x_5) 3 if (x_1 < 10) 4 x_10 = ... 5 if (x_1 > 7) 6 y_2 = 0 7 else 8 x_11 = ... 9 y_3 = x_1 + x_7 10 endif 11 x_5 = x_1 + 1 12 goto L0; 13 endif
We want to replace all the uses of x_1
with the new definitions
of x_10
and x_11
. Note that the only uses that should
be replaced are those at lines 5
, 9
and 11
.
Also, the use of x_7
at line 9
should not be
replaced (this is why we cannot just mark symbol x
for
renaming).
Additionally, we may need to insert a PHI node at line 11
because that is a merge point for x_10
and x_11
. So the
use of x_1
at line 11
will be replaced with the new PHI
node. The insertion of PHI nodes is optional. They are not strictly
necessary to preserve the SSA form, and depending on what the caller
inserted, they may not even be useful for the optimizers.
Updating the SSA form is a two step process. First, the pass has to
identify which names need to be updated and/or which symbols need to
be renamed into SSA form for the first time. When new names are
introduced to replace existing names in the program, the mapping
between the old and the new names are registered by calling
register_new_name_mapping
(note that if your pass creates new
code by duplicating basic blocks, the call to tree_duplicate_bb
will set up the necessary mappings automatically).
After the replacement mappings have been registered and new symbols
marked for renaming, a call to update_ssa
makes the registered
changes. This can be done with an explicit call or by creating
TODO
flags in the tree_opt_pass
structure for your pass.
There are several TODO
flags that control the behavior of
update_ssa
:
TODO_update_ssa
. Update the SSA form inserting PHI nodes
for newly exposed symbols and virtual names marked for updating.
When updating real names, only insert PHI nodes for a real name
O_j
in blocks reached by all the new and old definitions for
O_j
. If the iterated dominance frontier for O_j
is not pruned, we may end up inserting PHI nodes in blocks that
have one or more edges with no incoming definition for
O_j
. This would lead to uninitialized warnings for
O_j
's symbol.
TODO_update_ssa_no_phi
. Update the SSA form without
inserting any new PHI nodes at all. This is used by passes that
have either inserted all the PHI nodes themselves or passes that
need only to patch use-def and def-def chains for virtuals
(e.g., DCE).
TODO_update_ssa_full_phi
. Insert PHI nodes everywhere
they are needed. No pruning of the IDF is done. This is used
by passes that need the PHI nodes for O_j
even if it
means that some arguments will come from the default definition
of O_j
's symbol (e.g., pass_linear_transform
).
WARNING: If you need to use this flag, chances are that your pass may be doing something wrong. Inserting PHI nodes for an old name where not all edges carry a new replacement may lead to silent codegen errors or spurious uninitialized warnings.
TODO_update_ssa_only_virtuals
. Passes that update the
SSA form on their own may want to delegate the updating of
virtual names to the generic updater. Since FUD chains are
easier to maintain, this simplifies the work they need to do.
NOTE: If this flag is used, any OLD->NEW mappings for real names
are explicitly destroyed and only the symbols marked for
renaming are processed.
SSA_NAME
nodes
The following macros can be used to examine SSA_NAME
nodes
Returns the statement s that creates the
SSA_NAME
var. If s is an empty statement (i.e.,IS_EMPTY_STMT (
s)
returnstrue
), it means that the first reference to this variable is a USE or a VUSE.
This function walks the dominator tree for the current CFG calling a set of callback functions defined in struct dom_walk_data in domwalk.h. The call back functions you need to define give you hooks to execute custom code at various points during traversal:
- Once to initialize any local data needed while processing bb and its children. This local data is pushed into an internal stack which is automatically pushed and popped as the walker traverses the dominator tree.
- Once before traversing all the statements in the bb.
- Once for every statement inside bb.
- Once after traversing all the statements and before recursing into bb's dominator children.
- It then recurses into all the dominator children of bb.
- After recursing into all the dominator children of bb it can, optionally, traverse every statement in bb again (i.e., repeating steps 2 and 3).
- Once after walking the statements in bb and bb's dominator children. At this stage, the block local data stack is popped.
Alias analysis in GIMPLE SSA form consists of two pieces. First the virtual SSA web ties conflicting memory accesses and provides a SSA use-def chain and SSA immediate-use chains for walking possibly dependent memory accesses. Second an alias-oracle can be queried to disambiguate explicit and implicit memory references.
All statements that may use memory have exactly one accompanied use of a virtual SSA name that represents the state of memory at the given point in the IL.
All statements that may define memory have exactly one accompanied definition of a virtual SSA name using the previous state of memory and defining the new state of memory after the given point in the IL.
int i; int foo (void) { # .MEM_3 = VDEF <.MEM_2(D)> i = 1; # VUSE <.MEM_3> return i; }
The virtual SSA names in this case are .MEM_2(D)
and
.MEM_3
. The store to the global variable i
defines .MEM_3
invalidating .MEM_2(D)
. The
load from i
uses that new state .MEM_3
.
The virtual SSA web serves as constraints to SSA optimizers preventing illegitimate code-motion and optimization. It also provides a way to walk related memory statements.
Points-to analysis builds a set of constraints from the GIMPLE SSA IL representing all pointer operations and facts we do or do not know about pointers. Solving this set of constraints yields a conservatively correct solution for each pointer variable in the program (though we are only interested in SSA name pointers) as to what it may possibly point to.
This points-to solution for a given SSA name pointer is stored
in the pt_solution
sub-structure of the
SSA_NAME_PTR_INFO
record. The following accessor
functions are available:
pt_solution_includes
pt_solutions_intersect
Points-to analysis also computes the solution for two special
set of pointers, ESCAPED
and CALLUSED
. Those
represent all memory that has escaped the scope of analysis
or that is used by pure or nested const calls.
Type-based alias analysis is frontend dependent though generic
support is provided by the middle-end in alias.c
. TBAA
code is used by both tree optimizers and RTL optimizers.
Every language that wishes to perform language-specific alias analysis
should define a function that computes, given a tree
node, an alias set for the node. Nodes in different alias sets are not
allowed to alias. For an example, see the C front-end function
c_get_alias_set
.
The tree alias-oracle provides means to disambiguate two memory references and memory references against statements. The following queries are available:
refs_may_alias_p
ref_maybe_used_by_stmt_p
stmt_may_clobber_ref_p
In addition to those two kind of statement walkers are available
walking statements related to a reference ref.
walk_non_aliased_vuses
walks over dominating memory defining
statements and calls back if the statement does not clobber ref
providing the non-aliased VUSE. The walk stops at
the first clobbering statement or if asked to.
walk_aliased_vdefs
walks over dominating memory defining
statements and calls back on each statement clobbering ref
providing its aliasing VDEF. The walk stops if asked to.
The memory model used by the middle-end models that of the C/C++ languages. The middle-end has the notion of an effective type of a memory region which is used for type-based alias analysis.
The following is a refinement of ISO C99 6.5/6, clarifying the block copy case to follow common sense and extending the concept of a dynamic effective type to objects with a declared type as required for C++.
The effective type of an object for an access to its stored value is the declared type of the object or the effective type determined by a previous store to it. If a value is stored into an object through an lvalue having a type that is not a character type, then the type of the lvalue becomes the effective type of the object for that access and for subsequent accesses that do not modify the stored value. If a value is copied into an object usingmemcpy
ormemmove
, or is copied as an array of character type, then the effective type of the modified object for that access and for subsequent accesses that do not modify the value is undetermined. For all other accesses to an object, the effective type of the object is simply the type of the lvalue used for the access.
The last part of the compiler work is done on a low-level intermediate representation called Register Transfer Language. In this language, the instructions to be output are described, pretty much one by one, in an algebraic form that describes what the instruction does.
RTL is inspired by Lisp lists. It has both an internal form, made up of structures that point at other structures, and a textual form that is used in the machine description and in printed debugging dumps. The textual form uses nested parentheses to indicate the pointers in the internal form.
RTL uses five kinds of objects: expressions, integers, wide integers,
strings and vectors. Expressions are the most important ones. An RTL
expression (“RTX”, for short) is a C structure, but it is usually
referred to with a pointer; a type that is given the typedef name
rtx
.
An integer is simply an int
; their written form uses decimal
digits. A wide integer is an integral object whose type is
HOST_WIDE_INT
; their written form uses decimal digits.
A string is a sequence of characters. In core it is represented as a
char *
in usual C fashion, and it is written in C syntax as well.
However, strings in RTL may never be null. If you write an empty string in
a machine description, it is represented in core as a null pointer rather
than as a pointer to a null character. In certain contexts, these null
pointers instead of strings are valid. Within RTL code, strings are most
commonly found inside symbol_ref
expressions, but they appear in
other contexts in the RTL expressions that make up machine descriptions.
In a machine description, strings are normally written with double quotes, as you would in C. However, strings in machine descriptions may extend over many lines, which is invalid C, and adjacent string constants are not concatenated as they are in C. Any string constant may be surrounded with a single set of parentheses. Sometimes this makes the machine description easier to read.
There is also a special syntax for strings, which can be useful when C code is embedded in a machine description. Wherever a string can appear, it is also valid to write a C-style brace block. The entire brace block, including the outermost pair of braces, is considered to be the string constant. Double quote characters inside the braces are not special. Therefore, if you write string constants in the C code, you need not escape each quote character with a backslash.
A vector contains an arbitrary number of pointers to expressions. The number of elements in the vector is explicitly present in the vector. The written form of a vector consists of square brackets (‘[...]’) surrounding the elements, in sequence and with whitespace separating them. Vectors of length zero are not created; null pointers are used instead.
Expressions are classified by expression codes (also called RTX
codes). The expression code is a name defined in rtl.def, which is
also (in uppercase) a C enumeration constant. The possible expression
codes and their meanings are machine-independent. The code of an RTX can
be extracted with the macro GET_CODE (
x)
and altered with
PUT_CODE (
x,
newcode)
.
The expression code determines how many operands the expression contains,
and what kinds of objects they are. In RTL, unlike Lisp, you cannot tell
by looking at an operand what kind of object it is. Instead, you must know
from its context—from the expression code of the containing expression.
For example, in an expression of code subreg
, the first operand is
to be regarded as an expression and the second operand as an integer. In
an expression of code plus
, there are two operands, both of which
are to be regarded as expressions. In a symbol_ref
expression,
there is one operand, which is to be regarded as a string.
Expressions are written as parentheses containing the name of the expression type, its flags and machine mode if any, and then the operands of the expression (separated by spaces).
Expression code names in the ‘md’ file are written in lowercase,
but when they appear in C code they are written in uppercase. In this
manual, they are shown as follows: const_int
.
In a few contexts a null pointer is valid where an expression is normally
wanted. The written form of this is (nil)
.
The various expression codes are divided into several classes,
which are represented by single characters. You can determine the class
of an RTX code with the macro GET_RTX_CLASS (
code)
.
Currently, rtl.def defines these classes:
RTX_OBJ
REG
) or a memory location (MEM
, SYMBOL_REF
).
LO_SUM
) is also included; instead, SUBREG
and
STRICT_LOW_PART
are not in this class, but in class x
.
RTX_CONST_OBJ
HIGH
is also
included in this class.
RTX_COMPARE
GEU
or
LT
.
RTX_COMM_COMPARE
EQ
or ORDERED
.
RTX_UNARY
NEG
,
NOT
, or ABS
. This category also includes value extension
(sign or zero) and conversions between integer and floating point.
RTX_COMM_ARITH
PLUS
or
AND
. NE
and EQ
are comparisons, so they have class
<
.
RTX_BIN_ARITH
MINUS
,
DIV
, or ASHIFTRT
.
RTX_BITFIELD_OPS
ZERO_EXTRACT
and SIGN_EXTRACT
. These have three inputs
and are lvalues (so they can be used for insertion as well).
See Bit-Fields.
RTX_TERNARY
IF_THEN_ELSE
, VEC_MERGE
, SIGN_EXTRACT
,
ZERO_EXTRACT
, and FMA
.
RTX_INSN
INSN
, JUMP_INSN
, and
CALL_INSN
. See Insns.
RTX_MATCH
MATCH_DUP
. These only occur in machine descriptions.
RTX_AUTOINC
POST_INC
. ‘XEXP (x, 0)’ gives the auto-modified
register.
RTX_EXTRA
DEFINE_*
, etc.). It also includes
all the codes describing side effects (SET
, USE
,
CLOBBER
, etc.) and the non-insns that may appear on an insn
chain, such as NOTE
, BARRIER
, and CODE_LABEL
.
SUBREG
is also part of this class.
For each expression code, rtl.def specifies the number of
contained objects and their kinds using a sequence of characters
called the format of the expression code. For example,
the format of subreg
is ‘ei’.
These are the most commonly used format characters:
e
i
w
s
E
A few other format characters are used occasionally:
u
n
note
insn.
S
V
B
0
There are macros to get the number of operands and the format of an expression code:
GET_RTX_LENGTH (
code)
GET_RTX_FORMAT (
code)
Some classes of RTX codes always have the same format. For example, it
is safe to assume that all comparison operations have format ee
.
1
e
.
<
c
2
ee
.
b
3
eee
.
i
iuueiee
.
See Insns. Note that not all RTL objects linked onto an insn chain
are of class i
.
o
m
x
Operands of expressions are accessed using the macros XEXP
,
XINT
, XWINT
and XSTR
. Each of these macros takes
two arguments: an expression-pointer (RTX) and an operand number
(counting from zero). Thus,
XEXP (x, 2)
accesses operand 2 of expression x, as an expression.
XINT (x, 2)
accesses the same operand as an integer. XSTR
, used in the same
fashion, would access it as a string.
Any operand can be accessed as an integer, as an expression or as a string. You must choose the correct method of access for the kind of value actually stored in the operand. You would do this based on the expression code of the containing expression. That is also how you would know how many operands there are.
For example, if x is a subreg
expression, you know that it has
two operands which can be correctly accessed as XEXP (
x, 0)
and XINT (
x, 1)
. If you did XINT (
x, 0)
, you
would get the address of the expression operand but cast as an integer;
that might occasionally be useful, but it would be cleaner to write
(int) XEXP (
x, 0)
. XEXP (
x, 1)
would also
compile without error, and would return the second, integer operand cast as
an expression pointer, which would probably result in a crash when
accessed. Nothing stops you from writing XEXP (
x, 28)
either,
but this will access memory past the end of the expression with
unpredictable results.
Access to operands which are vectors is more complicated. You can use the
macro XVEC
to get the vector-pointer itself, or the macros
XVECEXP
and XVECLEN
to access the elements and length of a
vector.
XVEC (
exp,
idx)
XVECLEN (
exp,
idx)
int
.
XVECEXP (
exp,
idx,
eltnum)
It is up to you to make sure that eltnum is not negative
and is less than XVECLEN (
exp,
idx)
.
All the macros defined in this section expand into lvalues and therefore can be used to assign the operands, lengths and vector elements as well as to access them.
Some RTL nodes have special annotations associated with them.
MEM
MEM_ALIAS_SET (
x)
MEM
s in a conflicting alias set. This value
is set in a language-dependent manner in the front-end, and should not be
altered in the back-end. In some front-ends, these numbers may correspond
in some way to types, or other language-level entities, but they need not,
and the back-end makes no such assumptions.
These set numbers are tested with alias_sets_conflict_p
.
MEM_EXPR (
x)
COMPONENT_REF
, in which case this is some field reference,
and TREE_OPERAND (
x, 0)
contains the declaration,
or another COMPONENT_REF
, or null if there is no compile-time
object associated with the reference.
MEM_OFFSET_KNOWN_P (
x)
MEM_EXPR
is known.
‘MEM_OFFSET (x)’ provides the offset if so.
MEM_OFFSET (
x)
MEM_EXPR
. The value is only valid if
‘MEM_OFFSET_KNOWN_P (x)’ is true.
MEM_SIZE_KNOWN_P (
x)
MEM_SIZE (
x)
BLKmode
references as otherwise
the size is implied by the mode. The value is only valid if
‘MEM_SIZE_KNOWN_P (x)’ is true.
MEM_ALIGN (
x)
MEM_ADDR_SPACE (
x)
REG
ORIGINAL_REGNO (
x)
REG_EXPR (
x)
REG_OFFSET (
x)
SYMBOL_REF
SYMBOL_REF_DECL (
x)
symbol_ref
x was created for a VAR_DECL
or
a FUNCTION_DECL
, that tree is recorded here. If this value is
null, then x was created by back end code generation routines,
and there is no associated front end symbol table entry.
SYMBOL_REF_DECL
may also point to a tree of class 'c'
,
that is, some sort of constant. In this case, the symbol_ref
is an entry in the per-file constant pool; again, there is no associated
front end symbol table entry.
SYMBOL_REF_CONSTANT (
x)
SYMBOL_REF_DATA (
x)
SYMBOL_REF_DECL
or
SYMBOL_REF_CONSTANT
.
SYMBOL_REF_FLAGS (
x)
symbol_ref
, this is used to communicate various predicates
about the symbol. Some of these are common enough to be computed by
common code, some are specific to the target. The common bits are:
SYMBOL_FLAG_FUNCTION
SYMBOL_FLAG_LOCAL
TARGET_BINDS_LOCAL_P
.
SYMBOL_FLAG_EXTERNAL
SYMBOL_FLAG_LOCAL
.
SYMBOL_FLAG_SMALL
TARGET_IN_SMALL_DATA_P
.
SYMBOL_REF_TLS_MODEL (
x)
tls_model
to be used for a thread-local storage symbol. It returns zero for
non-thread-local symbols.
SYMBOL_FLAG_HAS_BLOCK_INFO
SYMBOL_REF_BLOCK
and
SYMBOL_REF_BLOCK_OFFSET
fields.
SYMBOL_FLAG_ANCHOR
object_block
and that can be used to access nearby members of that block.
They are used to implement -fsection-anchors.
If this flag is set, then SYMBOL_FLAG_HAS_BLOCK_INFO
will be too.
Bits beginning with SYMBOL_FLAG_MACH_DEP
are available for
the target's use.
SYMBOL_REF_BLOCK (
x)
NULL
if it has not been assigned a block.
SYMBOL_REF_BLOCK_OFFSET (
x)
RTL expressions contain several flags (one-bit bit-fields) that are used in certain types of expression. Most often they are accessed with the following macros, which expand into lvalues.
CONSTANT_POOL_ADDRESS_P (
x)
symbol_ref
if it refers to part of the current
function's constant pool. For most targets these addresses are in a
.rodata
section entirely separate from the function, but for
some targets the addresses are close to the beginning of the function.
In either case GCC assumes these addresses can be addressed directly,
perhaps with the help of base registers.
Stored in the unchanging
field and printed as ‘/u’.
RTL_CONST_CALL_P (
x)
call_insn
indicates that the insn represents a call to a
const function. Stored in the unchanging
field and printed as
‘/u’.
RTL_PURE_CALL_P (
x)
call_insn
indicates that the insn represents a call to a
pure function. Stored in the return_val
field and printed as
‘/i’.
RTL_CONST_OR_PURE_CALL_P (
x)
call_insn
, true if RTL_CONST_CALL_P
or
RTL_PURE_CALL_P
is true.
RTL_LOOPING_CONST_OR_PURE_CALL_P (
x)
call_insn
indicates that the insn represents a possibly
infinite looping call to a const or pure function. Stored in the
call
field and printed as ‘/c’. Only true if one of
RTL_CONST_CALL_P
or RTL_PURE_CALL_P
is true.
INSN_ANNULLED_BRANCH_P (
x)
jump_insn
, call_insn
, or insn
indicates
that the branch is an annulling one. See the discussion under
sequence
below. Stored in the unchanging
field and
printed as ‘/u’.
INSN_DELETED_P (
x)
insn
, call_insn
, jump_insn
, code_label
,
jump_table_data
, barrier
, or note
,
nonzero if the insn has been deleted. Stored in the
volatil
field and printed as ‘/v’.
INSN_FROM_TARGET_P (
x)
insn
or jump_insn
or call_insn
in a delay
slot of a branch, indicates that the insn
is from the target of the branch. If the branch insn has
INSN_ANNULLED_BRANCH_P
set, this insn will only be executed if
the branch is taken. For annulled branches with
INSN_FROM_TARGET_P
clear, the insn will be executed only if the
branch is not taken. When INSN_ANNULLED_BRANCH_P
is not set,
this insn will always be executed. Stored in the in_struct
field and printed as ‘/s’.
LABEL_PRESERVE_P (
x)
code_label
or note
, indicates that the label is referenced by
code or data not visible to the RTL of a given function.
Labels referenced by a non-local goto will have this bit set. Stored
in the in_struct
field and printed as ‘/s’.
LABEL_REF_NONLOCAL_P (
x)
label_ref
and reg_label
expressions, nonzero if this is
a reference to a non-local label.
Stored in the volatil
field and printed as ‘/v’.
MEM_KEEP_ALIAS_SET_P (
x)
mem
expressions, 1 if we should keep the alias set for this
mem unchanged when we access a component. Set to 1, for example, when we
are already in a non-addressable component of an aggregate.
Stored in the jump
field and printed as ‘/j’.
MEM_VOLATILE_P (
x)
mem
, asm_operands
, and asm_input
expressions,
nonzero for volatile memory references.
Stored in the volatil
field and printed as ‘/v’.
MEM_NOTRAP_P (
x)
mem
, nonzero for memory references that will not trap.
Stored in the call
field and printed as ‘/c’.
MEM_POINTER (
x)
mem
if the memory reference holds a pointer.
Stored in the frame_related
field and printed as ‘/f’.
REG_FUNCTION_VALUE_P (
x)
reg
if it is the place in which this function's
value is going to be returned. (This happens only in a hard
register.) Stored in the return_val
field and printed as
‘/i’.
REG_POINTER (
x)
reg
if the register holds a pointer. Stored in the
frame_related
field and printed as ‘/f’.
REG_USERVAR_P (
x)
reg
, nonzero if it corresponds to a variable present in
the user's source code. Zero for temporaries generated internally by
the compiler. Stored in the volatil
field and printed as
‘/v’.
The same hard register may be used also for collecting the values of
functions called by this one, but REG_FUNCTION_VALUE_P
is zero
in this kind of use.
RTX_FRAME_RELATED_P (
x)
insn
, call_insn
, jump_insn
,
barrier
, or set
which is part of a function prologue
and sets the stack pointer, sets the frame pointer, or saves a register.
This flag should also be set on an instruction that sets up a temporary
register to use in place of the frame pointer.
Stored in the frame_related
field and printed as ‘/f’.
In particular, on RISC targets where there are limits on the sizes of
immediate constants, it is sometimes impossible to reach the register
save area directly from the stack pointer. In that case, a temporary
register is used that is near enough to the register save area, and the
Canonical Frame Address, i.e., DWARF2's logical frame pointer, register
must (temporarily) be changed to be this temporary register. So, the
instruction that sets this temporary register must be marked as
RTX_FRAME_RELATED_P
.
If the marked instruction is overly complex (defined in terms of what
dwarf2out_frame_debug_expr
can handle), you will also have to
create a REG_FRAME_RELATED_EXPR
note and attach it to the
instruction. This note should contain a simple expression of the
computation performed by this instruction, i.e., one that
dwarf2out_frame_debug_expr
can handle.
This flag is required for exception handling support on targets with RTL prologues.
MEM_READONLY_P (
x)
mem
, if the memory is statically allocated and read-only.
Read-only in this context means never modified during the lifetime of the program, not necessarily in ROM or in write-disabled pages. A common example of the later is a shared library's global offset table. This table is initialized by the runtime loader, so the memory is technically writable, but after control is transferred from the runtime loader to the application, this memory will never be subsequently modified.
Stored in the unchanging
field and printed as ‘/u’.
SCHED_GROUP_P (
x)
insn
, call_insn
,
jump_insn
or jump_table_data
, indicates that the
previous insn must be scheduled together with this insn. This is used to
ensure that certain groups of instructions will not be split up by the
instruction scheduling pass, for example, use
insns before
a call_insn
may not be separated from the call_insn
.
Stored in the in_struct
field and printed as ‘/s’.
SET_IS_RETURN_P (
x)
set
, nonzero if it is for a return.
Stored in the jump
field and printed as ‘/j’.
SIBLING_CALL_P (
x)
call_insn
, nonzero if the insn is a sibling call.
Stored in the jump
field and printed as ‘/j’.
STRING_POOL_ADDRESS_P (
x)
symbol_ref
expression, nonzero if it addresses this function's
string constant pool.
Stored in the frame_related
field and printed as ‘/f’.
SUBREG_PROMOTED_UNSIGNED_P (
x)
subreg
that has
SUBREG_PROMOTED_VAR_P
nonzero if the object being referenced is kept
zero-extended, zero if it is kept sign-extended, and less then zero if it is
extended some other way via the ptr_extend
instruction.
Stored in the unchanging
field and volatil
field, printed as ‘/u’ and ‘/v’.
This macro may only be used to get the value it may not be used to change
the value. Use SUBREG_PROMOTED_UNSIGNED_SET
to change the value.
SUBREG_PROMOTED_UNSIGNED_SET (
x)
unchanging
and volatil
fields in a subreg
to reflect zero, sign, or other extension. If volatil
is
zero, then unchanging
as nonzero means zero extension and as
zero means sign extension. If volatil
is nonzero then some
other type of extension was done via the ptr_extend
instruction.
SUBREG_PROMOTED_VAR_P (
x)
subreg
if it was made when accessing an object that
was promoted to a wider mode in accord with the PROMOTED_MODE
machine
description macro (see Storage Layout). In this case, the mode of
the subreg
is the declared mode of the object and the mode of
SUBREG_REG
is the mode of the register that holds the object.
Promoted variables are always either sign- or zero-extended to the wider
mode on every assignment. Stored in the in_struct
field and
printed as ‘/s’.
SYMBOL_REF_USED (
x)
symbol_ref
, indicates that x has been used. This is
normally only used to ensure that x is only declared external
once. Stored in the used
field.
SYMBOL_REF_WEAK (
x)
symbol_ref
, indicates that x has been declared weak.
Stored in the return_val
field and printed as ‘/i’.
SYMBOL_REF_FLAG (
x)
symbol_ref
, this is used as a flag for machine-specific purposes.
Stored in the volatil
field and printed as ‘/v’.
Most uses of SYMBOL_REF_FLAG
are historic and may be subsumed
by SYMBOL_REF_FLAGS
. Certainly use of SYMBOL_REF_FLAGS
is mandatory if the target requires more than one bit of storage.
PREFETCH_SCHEDULE_BARRIER_P (
x)
prefetch
, indicates that the prefetch is a scheduling barrier.
No other INSNs will be moved over it.
Stored in the volatil
field and printed as ‘/v’.
These are the fields to which the above macros refer:
call
mem
, 1 means that the memory reference will not trap.
In a call
, 1 means that this pure or const call may possibly
infinite loop.
In an RTL dump, this flag is represented as ‘/c’.
frame_related
insn
or set
expression, 1 means that it is part of
a function prologue and sets the stack pointer, sets the frame pointer,
saves a register, or sets up a temporary register to use in place of the
frame pointer.
In reg
expressions, 1 means that the register holds a pointer.
In mem
expressions, 1 means that the memory reference holds a pointer.
In symbol_ref
expressions, 1 means that the reference addresses
this function's string constant pool.
In an RTL dump, this flag is represented as ‘/f’.
in_struct
reg
expressions, it is 1 if the register has its entire life
contained within the test expression of some loop.
In subreg
expressions, 1 means that the subreg
is accessing
an object that has had its mode promoted from a wider mode.
In label_ref
expressions, 1 means that the referenced label is
outside the innermost loop containing the insn in which the label_ref
was found.
In code_label
expressions, it is 1 if the label may never be deleted.
This is used for labels which are the target of non-local gotos. Such a
label that would have been deleted is replaced with a note
of type
NOTE_INSN_DELETED_LABEL
.
In an insn
during dead-code elimination, 1 means that the insn is
dead code.
In an insn
or jump_insn
during reorg for an insn in the
delay slot of a branch,
1 means that this insn is from the target of the branch.
In an insn
during instruction scheduling, 1 means that this insn
must be scheduled as part of a group together with the previous insn.
In an RTL dump, this flag is represented as ‘/s’.
return_val
reg
expressions, 1 means the register contains
the value to be returned by the current function. On
machines that pass parameters in registers, the same register number
may be used for parameters as well, but this flag is not set on such
uses.
In symbol_ref
expressions, 1 means the referenced symbol is weak.
In call
expressions, 1 means the call is pure.
In an RTL dump, this flag is represented as ‘/i’.
jump
mem
expression, 1 means we should keep the alias set for this
mem unchanged when we access a component.
In a set
, 1 means it is for a return.
In a call_insn
, 1 means it is a sibling call.
In an RTL dump, this flag is represented as ‘/j’.
unchanging
reg
and mem
expressions, 1 means
that the value of the expression never changes.
In subreg
expressions, it is 1 if the subreg
references an
unsigned object whose mode has been promoted to a wider mode.
In an insn
or jump_insn
in the delay slot of a branch
instruction, 1 means an annulling branch should be used.
In a symbol_ref
expression, 1 means that this symbol addresses
something in the per-function constant pool.
In a call_insn
1 means that this instruction is a call to a const
function.
In an RTL dump, this flag is represented as ‘/u’.
used
For a reg
, it is used directly (without an access macro) by the
leaf register renumbering code to ensure that each register is only
renumbered once.
In a symbol_ref
, it indicates that an external declaration for
the symbol has already been written.
volatil
mem
, asm_operands
, or asm_input
expression, it is 1 if the memory
reference is volatile. Volatile memory references may not be deleted,
reordered or combined.
In a symbol_ref
expression, it is used for machine-specific
purposes.
In a reg
expression, it is 1 if the value is a user-level variable.
0 indicates an internal compiler temporary.
In an insn
, 1 means the insn has been deleted.
In label_ref
and reg_label
expressions, 1 means a reference
to a non-local label.
In prefetch
expressions, 1 means that the containing insn is a
scheduling barrier.
In an RTL dump, this flag is represented as ‘/v’.
A machine mode describes a size of data object and the representation used
for it. In the C code, machine modes are represented by an enumeration
type, machine_mode
, defined in machmode.def. Each RTL
expression has room for a machine mode and so do certain kinds of tree
expressions (declarations and types, to be precise).
In debugging dumps and machine descriptions, the machine mode of an RTL
expression is written after the expression code with a colon to separate
them. The letters ‘mode’ which appear at the end of each machine mode
name are omitted. For example, (reg:SI 38)
is a reg
expression with machine mode SImode
. If the mode is
VOIDmode
, it is not written at all.
Here is a table of machine modes. The term “byte” below refers to an
object of BITS_PER_UNIT
bits (see Storage Layout).
BImode
QImode
HImode
PSImode
SImode
PDImode
DImode
TImode
OImode
XImode
QFmode
HFmode
TQFmode
SFmode
DFmode
XFmode
SDmode
DDmode
TDmode
TFmode
QQmode
HQmode
SQmode
DQmode
TQmode
UQQmode
UHQmode
USQmode
UDQmode
UTQmode
HAmode
SAmode
DAmode
TAmode
UHAmode
USAmode
UDAmode
UTAmode
CCmode
cc0
(see Condition Code).
BLKmode
BLKmode
will not appear in RTL.
VOIDmode
const_int
have mode
VOIDmode
because they can be taken to have whatever mode the context
requires. In debugging dumps of RTL, VOIDmode
is expressed by
the absence of any mode.
QCmode, HCmode, SCmode, DCmode, XCmode, TCmode
QFmode
,
HFmode
, SFmode
, DFmode
, XFmode
, and
TFmode
, respectively.
CQImode, CHImode, CSImode, CDImode, CTImode, COImode
QImode
, HImode
,
SImode
, DImode
, TImode
, and OImode
,
respectively.
BND32mode BND64mode
The machine description defines Pmode
as a C macro which expands
into the machine mode used for addresses. Normally this is the mode
whose size is BITS_PER_WORD
, SImode
on 32-bit machines.
The only modes which a machine description must support are
QImode
, and the modes corresponding to BITS_PER_WORD
,
FLOAT_TYPE_SIZE
and DOUBLE_TYPE_SIZE
.
The compiler will attempt to use DImode
for 8-byte structures and
unions, but this can be prevented by overriding the definition of
MAX_FIXED_MODE_SIZE
. Alternatively, you can have the compiler
use TImode
for 16-byte structures and unions. Likewise, you can
arrange for the C type short int
to avoid using HImode
.
Very few explicit references to machine modes remain in the compiler and
these few references will soon be removed. Instead, the machine modes
are divided into mode classes. These are represented by the enumeration
type enum mode_class
defined in machmode.h. The possible
mode classes are:
MODE_INT
BImode
, QImode
,
HImode
, SImode
, DImode
, TImode
, and
OImode
.
MODE_PARTIAL_INT
PQImode
, PHImode
,
PSImode
and PDImode
.
MODE_FLOAT
QFmode
,
HFmode
, TQFmode
, SFmode
, DFmode
,
XFmode
and TFmode
.
MODE_DECIMAL_FLOAT
SDmode
,
DDmode
and TDmode
.
MODE_FRACT
QQmode
, HQmode
,
SQmode
, DQmode
and TQmode
.
MODE_UFRACT
UQQmode
, UHQmode
,
USQmode
, UDQmode
and UTQmode
.
MODE_ACCUM
HAmode
,
SAmode
, DAmode
and TAmode
.
MODE_UACCUM
UHAmode
,
USAmode
, UDAmode
and UTAmode
.
MODE_COMPLEX_INT
MODE_COMPLEX_FLOAT
QCmode
,
HCmode
, SCmode
, DCmode
, XCmode
, and
TCmode
.
MODE_FUNCTION
MODE_CC
CCmode
plus
any CC_MODE
modes listed in the machine-modes.def.
See Jump Patterns,
also see Condition Code.
MODE_POINTER_BOUNDS
MODE_RANDOM
VOIDmode
and BLKmode
are in
MODE_RANDOM
.
Here are some C macros that relate to machine modes:
GET_MODE (
x)
PUT_MODE (
x,
newmode)
NUM_MACHINE_MODES
GET_MODE_NAME (
m)
GET_MODE_CLASS (
m)
GET_MODE_WIDER_MODE (
m)
GET_MODE_WIDER_MODE (QImode)
returns HImode
.
GET_MODE_SIZE (
m)
GET_MODE_BITSIZE (
m)
GET_MODE_IBIT (
m)
GET_MODE_FBIT (
m)
GET_MODE_MASK (
m)
HOST_BITS_PER_INT
.
GET_MODE_ALIGNMENT (
m)
GET_MODE_UNIT_SIZE (
m)
GET_MODE_SIZE
except in the case of complex
modes. For them, the unit size is the size of the real or imaginary
part.
GET_MODE_NUNITS (
m)
GET_MODE_SIZE
divided by GET_MODE_UNIT_SIZE
.
GET_CLASS_NARROWEST_MODE (
c)
The following 3 variables are defined on every target. They can be used to allocate buffers that are guaranteed to be large enough to hold any value that can be represented on the target. The first two can be overridden by defining them in the target's mode.def file, however, the value must be a constant that can determined very early in the compilation process. The third symbol cannot be overridden.
BITS_PER_UNIT
MAX_BITSIZE_MODE_ANY_INT
MAX_BITSIZE_MODE_ANY_MODE
The global variables byte_mode
and word_mode
contain modes
whose classes are MODE_INT
and whose bitsizes are either
BITS_PER_UNIT
or BITS_PER_WORD
, respectively. On 32-bit
machines, these are QImode
and SImode
, respectively.
The simplest RTL expressions are those that represent constant values.
(const_int
i)
INTVAL
as in
INTVAL (
exp)
, which is equivalent to XWINT (
exp, 0)
.
Constants generated for modes with fewer bits than in
HOST_WIDE_INT
must be sign extended to full width (e.g., with
gen_int_mode
). For constants for modes with more bits than in
HOST_WIDE_INT
the implied high order bits of that constant are
copies of the top bit. Note however that values are neither
inherently signed nor inherently unsigned; where necessary, signedness
is determined by the rtl operation instead.
There is only one expression object for the integer value zero; it is
the value of the variable const0_rtx
. Likewise, the only
expression for integer value one is found in const1_rtx
, the only
expression for integer value two is found in const2_rtx
, and the
only expression for integer value negative one is found in
constm1_rtx
. Any attempt to create an expression of code
const_int
and value zero, one, two or negative one will return
const0_rtx
, const1_rtx
, const2_rtx
or
constm1_rtx
as appropriate.
Similarly, there is only one object for the integer whose value is
STORE_FLAG_VALUE
. It is found in const_true_rtx
. If
STORE_FLAG_VALUE
is one, const_true_rtx
and
const1_rtx
will point to the same object. If
STORE_FLAG_VALUE
is −1, const_true_rtx
and
constm1_rtx
will point to the same object.
(const_double:
m i0 i1 ...)
TARGET_SUPPORTS_WIDE_INT
) an integer constant too large to fit
into HOST_BITS_PER_WIDE_INT
bits but small enough to fit within
twice that number of bits. In the latter case, m will be
VOIDmode
. For integral values constants for modes with more
bits than twice the number in HOST_WIDE_INT
the implied high
order bits of that constant are copies of the top bit of
CONST_DOUBLE_HIGH
. Note however that integral values are
neither inherently signed nor inherently unsigned; where necessary,
signedness is determined by the rtl operation instead.
On more modern ports, CONST_DOUBLE
only represents floating
point values. New ports define TARGET_SUPPORTS_WIDE_INT
to
make this designation.
If m is VOIDmode
, the bits of the value are stored in
i0 and i1. i0 is customarily accessed with the macro
CONST_DOUBLE_LOW
and i1 with CONST_DOUBLE_HIGH
.
If the constant is floating point (regardless of its precision), then
the number of integers used to store the value depends on the size of
REAL_VALUE_TYPE
(see Floating Point). The integers
represent a floating point number, but not precisely in the target
machine's or host machine's floating point format. To convert them to
the precise bit pattern used by the target machine, use the macro
REAL_VALUE_TO_TARGET_DOUBLE
and friends (see Data Output).
(const_wide_int:
m nunits elt0 ...)
HOST_WIDE_INT
s that is large enough
to hold any constant that can be represented on the target. This form
of rtl is only used on targets that define
TARGET_SUPPORTS_WIDE_INT
to be nonzero and then
CONST_DOUBLE
s are only used to hold floating-point values. If
the target leaves TARGET_SUPPORTS_WIDE_INT
defined as 0,
CONST_WIDE_INT
s are not used and CONST_DOUBLE
s are as
they were before.
The values are stored in a compressed format. The higher-order 0s or -1s are not represented if they are just the logical sign extension of the number that is represented.
CONST_WIDE_INT_VEC (
code)
HOST_WIDE_INT
s that are used to
store the value. This macro should be rarely used.
CONST_WIDE_INT_NUNITS (
code)
HOST_WIDE_INT
s used to represent the number.
Note that this generally is smaller than the number of
HOST_WIDE_INT
s implied by the mode size.
CONST_WIDE_INT_NUNITS (
code,
i)
i
th element of the array. Element 0 is contains
the low order bits of the constant.
(const_fixed:
m ...)
struct fixed_value
and
is accessed with the macro CONST_FIXED_VALUE
. The high part of
data is accessed with CONST_FIXED_VALUE_HIGH
; the low part is
accessed with CONST_FIXED_VALUE_LOW
.
(const_vector:
m [
x0 x1 ...])
const_int
, const_double
or const_fixed
elements.
The number of units in a const_vector
is obtained with the macro
CONST_VECTOR_NUNITS
as in CONST_VECTOR_NUNITS (
v)
.
Individual elements in a vector constant are accessed with the macro
CONST_VECTOR_ELT
as in CONST_VECTOR_ELT (
v,
n)
where v is the vector constant and n is the element
desired.
(const_string
str)
(symbol_ref:
mode symbol)
The symbol_ref
contains a mode, which is usually Pmode
.
Usually that is the only mode for which a symbol is directly valid.
(label_ref:
mode label)
code_label
or a note
of type NOTE_INSN_DELETED_LABEL
that appears in the instruction
sequence to identify the place where the label should go.
The reason for using a distinct expression type for code label references is so that jump optimization can distinguish them.
The label_ref
contains a mode, which is usually Pmode
.
Usually that is the only mode for which a label is directly valid.
(const:
m exp)
const_int
, symbol_ref
and
label_ref
expressions) combined with plus
and
minus
. However, not all combinations are valid, since the
assembler cannot do arbitrary arithmetic on relocatable symbols.
m should be Pmode
.
(high:
m exp)
symbol_ref
. The number of bits is machine-dependent and is
normally the number of bits specified in an instruction that initializes
the high order bits of a register. It is used with lo_sum
to
represent the typical two-instruction sequence used in RISC machines to
reference a global memory location.
m should be Pmode
.
The macro CONST0_RTX (
mode)
refers to an expression with
value 0 in mode mode. If mode mode is of mode class
MODE_INT
, it returns const0_rtx
. If mode mode is of
mode class MODE_FLOAT
, it returns a CONST_DOUBLE
expression in mode mode. Otherwise, it returns a
CONST_VECTOR
expression in mode mode. Similarly, the macro
CONST1_RTX (
mode)
refers to an expression with value 1 in
mode mode and similarly for CONST2_RTX
. The
CONST1_RTX
and CONST2_RTX
macros are undefined
for vector modes.
Here are the RTL expression types for describing access to machine registers and to main memory.
(reg:
m n)
FIRST_PSEUDO_REGISTER
), this stands for a reference to machine
register number n: a hard register. For larger values of
n, it stands for a temporary value or pseudo register.
The compiler's strategy is to generate code assuming an unlimited
number of such pseudo registers, and later convert them into hard
registers or into memory references.
m is the machine mode of the reference. It is necessary because machines can generally refer to each register in more than one mode. For example, a register may contain a full word but there may be instructions to refer to it as a half word or as a single byte, as well as instructions to refer to it as a floating point number of various precisions.
Even for a register that the machine can access in only one mode, the mode must always be specified.
The symbol FIRST_PSEUDO_REGISTER
is defined by the machine
description, since the number of hard registers on the machine is an
invariant characteristic of the machine. Note, however, that not
all of the machine registers must be general registers. All the
machine registers that can be used for storage of data are given
hard register numbers, even those that can be used only in certain
instructions or can hold only certain types of data.
A hard register may be accessed in various modes throughout one
function, but each pseudo register is given a natural mode
and is accessed only in that mode. When it is necessary to describe
an access to a pseudo register using a nonnatural mode, a subreg
expression is used.
A reg
expression with a machine mode that specifies more than
one word of data may actually stand for several consecutive registers.
If in addition the register number specifies a hardware register, then
it actually represents several consecutive hardware registers starting
with the specified one.
Each pseudo register number used in a function's RTL code is
represented by a unique reg
expression.
Some pseudo register numbers, those within the range of
FIRST_VIRTUAL_REGISTER
to LAST_VIRTUAL_REGISTER
only
appear during the RTL generation phase and are eliminated before the
optimization phases. These represent locations in the stack frame that
cannot be determined until RTL generation for the function has been
completed. The following virtual register numbers are defined:
VIRTUAL_INCOMING_ARGS_REGNUM
When RTL generation is complete, this virtual register is replaced
by the sum of the register given by ARG_POINTER_REGNUM
and the
value of FIRST_PARM_OFFSET
.
VIRTUAL_STACK_VARS_REGNUM
FRAME_GROWS_DOWNWARD
is defined to a nonzero value, this points
to immediately above the first variable on the stack. Otherwise, it points
to the first variable on the stack.
VIRTUAL_STACK_VARS_REGNUM
is replaced with the sum of the
register given by FRAME_POINTER_REGNUM
and the value
STARTING_FRAME_OFFSET
.
VIRTUAL_STACK_DYNAMIC_REGNUM
This virtual register is replaced by the sum of the register given by
STACK_POINTER_REGNUM
and the value STACK_DYNAMIC_OFFSET
.
VIRTUAL_OUTGOING_ARGS_REGNUM
STACK_POINTER_REGNUM
).
This virtual register is replaced by the sum of the register given by
STACK_POINTER_REGNUM
and the value STACK_POINTER_OFFSET
.
(subreg:
m1 reg:m2 bytenum)
subreg
expressions are used to refer to a register in a machine
mode other than its natural one, or to refer to one register of
a multi-part reg
that actually refers to several registers.
Each pseudo register has a natural mode. If it is necessary to
operate on it in a different mode, the register must be
enclosed in a subreg
.
There are currently three supported types for the first operand of a
subreg
:
subreg
s have pseudo
reg
s as their first operand.
subreg
s of mem
were common in earlier versions of GCC and
are still supported. During the reload pass these are replaced by plain
mem
s. On machines that do not do instruction scheduling, use of
subreg
s of mem
are still used, but this is no longer
recommended. Such subreg
s are considered to be
register_operand
s rather than memory_operand
s before and
during reload. Because of this, the scheduling passes cannot properly
schedule instructions with subreg
s of mem
, so for machines
that do scheduling, subreg
s of mem
should never be used.
To support this, the combine and recog passes have explicit code to
inhibit the creation of subreg
s of mem
when
INSN_SCHEDULING
is defined.
The use of subreg
s of mem
after the reload pass is an area
that is not well understood and should be avoided. There is still some
code in the compiler to support this, but this code has possibly rotted.
This use of subreg
s is discouraged and will most likely not be
supported in the future.
subreg
s; such
registers would normally reduce to a single reg
rtx. This use of
subreg
s is discouraged and may not be supported in the future.
subreg
s of subreg
s are not supported. Using
simplify_gen_subreg
is the recommended way to avoid this problem.
subreg
s come in two distinct flavors, each having its own
usage and rules:
subreg
expression is called paradoxical. The canonical test for this
class of subreg
is:
GET_MODE_SIZE (m1) > GET_MODE_SIZE (m2)
Paradoxical subreg
s can be used as both lvalues and rvalues.
When used as an lvalue, the low-order bits of the source value
are stored in reg and the high-order bits are discarded.
When used as an rvalue, the low-order bits of the subreg
are
taken from reg while the high-order bits may or may not be
defined.
The high-order bits of rvalues are in the following circumstances:
subreg
s of mem
When m2 is smaller than a word, the macro LOAD_EXTEND_OP
,
can control how the high-order bits are defined.
subreg
of reg
s
The upper bits are defined when SUBREG_PROMOTED_VAR_P
is true.
SUBREG_PROMOTED_UNSIGNED_P
describes what the upper bits hold.
Such subregs usually represent local variables, register variables
and parameter pseudo variables that have been promoted to a wider mode.
bytenum is always zero for a paradoxical subreg
, even on
big-endian targets.
For example, the paradoxical subreg
:
(set (subreg:SI (reg:HI x) 0) y)
stores the lower 2 bytes of y in x and discards the upper 2 bytes. A subsequent:
(set z (subreg:SI (reg:HI x) 0))
would set the lower two bytes of z to y and set the upper
two bytes to an unknown value assuming SUBREG_PROMOTED_VAR_P
is
false.
subreg
expression is called normal.
Normal subreg
s restrict consideration to certain bits of
reg. There are two cases. If m1 is smaller than a word,
the subreg
refers to the least-significant part (or
lowpart) of one word of reg. If m1 is word-sized or
greater, the subreg
refers to one or more complete words.
When used as an lvalue, subreg
is a word-based accessor.
Storing to a subreg
modifies all the words of reg that
overlap the subreg
, but it leaves the other words of reg
alone.
When storing to a normal subreg
that is smaller than a word,
the other bits of the referenced word are usually left in an undefined
state. This laxity makes it easier to generate efficient code for
such instructions. To represent an instruction that preserves all the
bits outside of those in the subreg
, use strict_low_part
or zero_extract
around the subreg
.
bytenum must identify the offset of the first byte of the
subreg
from the start of reg, assuming that reg is
laid out in memory order. The memory order of bytes is defined by
two target macros, WORDS_BIG_ENDIAN
and BYTES_BIG_ENDIAN
:
WORDS_BIG_ENDIAN
, if set to 1, says that byte number zero is
part of the most significant word; otherwise, it is part of the least
significant word.
BYTES_BIG_ENDIAN
, if set to 1, says that byte number zero is
the most significant byte within a word; otherwise, it is the least
significant byte within a word.
On a few targets, FLOAT_WORDS_BIG_ENDIAN
disagrees with
WORDS_BIG_ENDIAN
. However, most parts of the compiler treat
floating point values as if they had the same endianness as integer
values. This works because they handle them solely as a collection of
integer values, with no particular numerical value. Only real.c and
the runtime libraries care about FLOAT_WORDS_BIG_ENDIAN
.
Thus,
(subreg:HI (reg:SI x) 2)
on a BYTES_BIG_ENDIAN
, ‘UNITS_PER_WORD == 4’ target is the same as
(subreg:HI (reg:SI x) 0)
on a little-endian, ‘UNITS_PER_WORD == 4’ target. Both
subreg
s access the lower two bytes of register x.
A MODE_PARTIAL_INT
mode behaves as if it were as wide as the
corresponding MODE_INT
mode, except that it has an unknown
number of undefined bits. For example:
(subreg:PSI (reg:SI 0) 0)
accesses the whole of ‘(reg:SI 0)’, but the exact relationship
between the PSImode
value and the SImode
value is not
defined. If we assume ‘UNITS_PER_WORD <= 4’, then the following
two subreg
s:
(subreg:PSI (reg:DI 0) 0) (subreg:PSI (reg:DI 0) 4)
represent independent 4-byte accesses to the two halves of
‘(reg:DI 0)’. Both subreg
s have an unknown number
of undefined bits.
If ‘UNITS_PER_WORD <= 2’ then these two subreg
s:
(subreg:HI (reg:PSI 0) 0) (subreg:HI (reg:PSI 0) 2)
represent independent 2-byte accesses that together span the whole
of ‘(reg:PSI 0)’. Storing to the first subreg
does not
affect the value of the second, and vice versa. ‘(reg:PSI 0)’
has an unknown number of undefined bits, so the assignment:
(set (subreg:HI (reg:PSI 0) 0) (reg:HI 4))
does not guarantee that ‘(subreg:HI (reg:PSI 0) 0)’ has the value ‘(reg:HI 4)’.
The rules above apply to both pseudo regs and hard regs. If the semantics are not correct for particular combinations of m1, m2 and hard reg, the target-specific code must ensure that those combinations are never used. For example:
CANNOT_CHANGE_MODE_CLASS (m2, m1, class)
must be true for every class class that includes reg.
The first operand of a subreg
expression is customarily accessed
with the SUBREG_REG
macro and the second operand is customarily
accessed with the SUBREG_BYTE
macro.
It has been several years since a platform in which
BYTES_BIG_ENDIAN
not equal to WORDS_BIG_ENDIAN
has
been tested. Anyone wishing to support such a platform in the future
may be confronted with code rot.
(scratch:
m)
reg
by either the local register allocator or
the reload pass.
scratch
is usually present inside a clobber
operation
(see Side Effects).
(cc0)
With this technique, (cc0)
may be validly used in only two
contexts: as the destination of an assignment (in test and compare
instructions) and in comparison operators comparing against zero
(const_int
with value zero; that is to say, const0_rtx
).
With this technique, (cc0)
may be validly used in only two
contexts: as the destination of an assignment (in test and compare
instructions) where the source is a comparison operator, and as the
first operand of if_then_else
(in a conditional branch).
There is only one expression object of code cc0
; it is the
value of the variable cc0_rtx
. Any attempt to create an
expression of code cc0
will return cc0_rtx
.
Instructions can set the condition code implicitly. On many machines,
nearly all instructions set the condition code based on the value that
they compute or store. It is not necessary to record these actions
explicitly in the RTL because the machine description includes a
prescription for recognizing the instructions that do so (by means of
the macro NOTICE_UPDATE_CC
). See Condition Code. Only
instructions whose sole purpose is to set the condition code, and
instructions that use the condition code, need mention (cc0)
.
On some machines, the condition code register is given a register number
and a reg
is used instead of (cc0)
. This is usually the
preferable approach if only a small subset of instructions modify the
condition code. Other machines store condition codes in general
registers; in such cases a pseudo register should be used.
Some machines, such as the SPARC and RS/6000, have two sets of
arithmetic instructions, one that sets and one that does not set the
condition code. This is best handled by normally generating the
instruction that does not set the condition code, and making a pattern
that both performs the arithmetic and sets the condition code register
(which would not be (cc0)
in this case). For examples, search
for ‘addcc’ and ‘andcc’ in sparc.md.
(pc)
(pc)
may be validly used only in
certain specific contexts in jump instructions.
There is only one expression object of code pc
; it is the value
of the variable pc_rtx
. Any attempt to create an expression of
code pc
will return pc_rtx
.
All instructions that do not jump alter the program counter implicitly by incrementing it, but there is no need to mention this in the RTL.
(mem:
m addr alias)
The construct (mem:BLK (scratch))
is considered to alias all
other memories. Thus it may be used as a memory barrier in epilogue
stack deallocation patterns.
(concat
m rtx rtx)
(concatn
m [
rtx ...])
concat
, this should only appear in
declarations, and not in the insn chain.
Unless otherwise specified, all the operands of arithmetic expressions
must be valid for mode m. An operand is valid for mode m
if it has mode m, or if it is a const_int
or
const_double
and m is a mode of class MODE_INT
.
For commutative binary operations, constants should be placed in the second operand.
(plus:
m x y)
(ss_plus:
m x y)
(us_plus:
m x y)
plus
wraps round modulo the width of m; ss_plus
saturates at the maximum signed value representable in m;
us_plus
saturates at the maximum unsigned value.
(lo_sum:
m x y)
high
(see Constants) to
represent the typical two-instruction sequence used in RISC machines
to reference a global memory location.
The number of low order bits is machine-dependent but is
normally the number of bits in a Pmode
item minus the number of
bits set by high
.
m should be Pmode
.
(minus:
m x y)
(ss_minus:
m x y)
(us_minus:
m x y)
plus
(see above).
(compare:
m x y)
Of course, machines can't really subtract with infinite precision.
However, they can pretend to do so when only the sign of the result will
be used, which is the case when the result is stored in the condition
code. And that is the only way this kind of expression may
validly be used: as a value to be stored in the condition codes, either
(cc0)
or a register. See Comparisons.
The mode m is not related to the modes of x and y, but
instead is the mode of the condition code value. If (cc0)
is
used, it is VOIDmode
. Otherwise it is some mode in class
MODE_CC
, often CCmode
. See Condition Code. If m
is VOIDmode
or CCmode
, the operation returns sufficient
information (in an unspecified format) so that any comparison operator
can be applied to the result of the COMPARE
operation. For other
modes in class MODE_CC
, the operation only returns a subset of
this information.
Normally, x and y must have the same mode. Otherwise,
compare
is valid only if the mode of x is in class
MODE_INT
and y is a const_int
or
const_double
with mode VOIDmode
. The mode of x
determines what mode the comparison is to be done in; thus it must not
be VOIDmode
.
If one of the operands is a constant, it should be placed in the second operand and the comparison code adjusted as appropriate.
A compare
specifying two VOIDmode
constants is not valid
since there is no way to know in what mode the comparison is to be
performed; the comparison must either be folded during the compilation
or the first operand must be loaded into a register while its mode is
still known.
(neg:
m x)
(ss_neg:
m x)
(us_neg:
m x)
neg
, the negation of the operand may be a number not representable
in mode m, in which case it is truncated to m. ss_neg
and us_neg
ensure that an out-of-bounds result saturates to the
maximum or minimum signed or unsigned value.
(mult:
m x y)
(ss_mult:
m x y)
(us_mult:
m x y)
ss_mult
and us_mult
ensure that an out-of-bounds result
saturates to the maximum or minimum signed or unsigned value.
Some machines support a multiplication that generates a product wider than the operands. Write the pattern for this as
(mult:m (sign_extend:m x) (sign_extend:m y))
where m is wider than the modes of x and y, which need not be the same.
For unsigned widening multiplication, use the same idiom, but with
zero_extend
instead of sign_extend
.
(fma:
m x y z)
fma
, fmaf
, and fmal
builtin
functions, which compute ‘x * y + z’
without doing an intermediate rounding step.
(div:
m x y)
(ss_div:
m x y)
ss_div
ensures that an out-of-bounds result saturates to the maximum
or minimum signed value.
Some machines have division instructions in which the operands and
quotient widths are not all the same; you should represent
such instructions using truncate
and sign_extend
as in,
(truncate:m1 (div:m2 x (sign_extend:m2 y)))
(udiv:
m x y)
(us_div:
m x y)
div
but represents unsigned division.
us_div
ensures that an out-of-bounds result saturates to the maximum
or minimum unsigned value.
(mod:
m x y)
(umod:
m x y)
div
and udiv
but represent the remainder instead of
the quotient.
(smin:
m x y)
(smax:
m x y)
smin
) or larger (for smax
) of
x and y, interpreted as signed values in mode m.
When used with floating point, if both operands are zeros, or if either
operand is NaN
, then it is unspecified which of the two operands
is returned as the result.
(umin:
m x y)
(umax:
m x y)
smin
and smax
, but the values are interpreted as unsigned
integers.
(not:
m x)
(and:
m x y)
(ior:
m x y)
(xor:
m x y)
(ashift:
m x c)
(ss_ashift:
m x c)
(us_ashift:
m x c)
ashift
operation is a plain shift with no special behavior
in case of a change in the sign bit; ss_ashift
and us_ashift
saturates to the minimum or maximum representable value if any of the bits
shifted out differs from the final sign bit.
x have mode m, a fixed-point machine mode. c
be a fixed-point mode or be a constant with mode VOIDmode
; which
mode is determined by the mode called for in the machine description
entry for the left-shift instruction. For example, on the VAX, the mode
of c is QImode
regardless of m.
(lshiftrt:
m x c)
(ashiftrt:
m x c)
ashift
but for right shift. Unlike the case for left shift,
these two operations are distinct.
(rotate:
m x c)
(rotatert:
m x c)
rotate
.
(abs:
m x)
(ss_abs:
m x)
ss_abs
ensures that an out-of-bounds result saturates to the
maximum signed value.
(sqrt:
m x)
(ffs:
m x)
VOIDmode
.
(clrsb:
m x)
VOIDmode
.
(clz:
m x)
CLZ_DEFINED_VALUE_AT_ZERO
(see Misc). Note that this is one of
the few expressions that is not invariant under widening. The mode of
x must be m or VOIDmode
.
(ctz:
m x)
CTZ_DEFINED_VALUE_AT_ZERO
(see Misc). Except for this case,
ctz(x)
is equivalent to ffs(
x) - 1
. The mode of
x must be m or VOIDmode
.
(popcount:
m x)
VOIDmode
.
(parity:
m x)
VOIDmode
.
(bswap:
m x)
VOIDmode
.
Comparison operators test a relation on two operands and are considered
to represent a machine-dependent nonzero value described by, but not
necessarily equal to, STORE_FLAG_VALUE
(see Misc)
if the relation holds, or zero if it does not, for comparison operators
whose results have a `MODE_INT' mode,
FLOAT_STORE_FLAG_VALUE
(see Misc) if the relation holds, or
zero if it does not, for comparison operators that return floating-point
values, and a vector of either VECTOR_STORE_FLAG_VALUE
(see Misc)
if the relation holds, or of zeros if it does not, for comparison operators
that return vector results.
The mode of the comparison operation is independent of the mode
of the data being compared. If the comparison operation is being tested
(e.g., the first operand of an if_then_else
), the mode must be
VOIDmode
.
There are two ways that comparison operations may be used. The
comparison operators may be used to compare the condition codes
(cc0)
against zero, as in (eq (cc0) (const_int 0))
. Such
a construct actually refers to the result of the preceding instruction
in which the condition codes were set. The instruction setting the
condition code must be adjacent to the instruction using the condition
code; only note
insns may separate them.
Alternatively, a comparison operation may directly compare two data objects. The mode of the comparison is determined by the operands; they must both be valid for a common machine mode. A comparison with both operands constant would be invalid as the machine mode could not be deduced from it, but such a comparison should never exist in RTL due to constant folding.
In the example above, if (cc0)
were last set to
(compare
x y)
, the comparison operation is
identical to (eq
x y)
. Usually only one style
of comparisons is supported on a particular machine, but the combine
pass will try to merge the operations to produce the eq
shown
in case it exists in the context of the particular insn involved.
Inequality comparisons come in two flavors, signed and unsigned. Thus,
there are distinct expression codes gt
and gtu
for signed and
unsigned greater-than. These can produce different results for the same
pair of integer values: for example, 1 is signed greater-than −1 but not
unsigned greater-than, because −1 when regarded as unsigned is actually
0xffffffff
which is greater than 1.
The signed comparisons are also used for floating point values. Floating point comparisons are distinguished by the machine modes of the operands.
(eq:
m x y)
STORE_FLAG_VALUE
if the values represented by x and y
are equal, otherwise 0.
(ne:
m x y)
STORE_FLAG_VALUE
if the values represented by x and y
are not equal, otherwise 0.
(gt:
m x y)
STORE_FLAG_VALUE
if the x is greater than y. If they
are fixed-point, the comparison is done in a signed sense.
(gtu:
m x y)
gt
but does unsigned comparison, on fixed-point numbers only.
(lt:
m x y)
(ltu:
m x y)
gt
and gtu
but test for “less than”.
(ge:
m x y)
(geu:
m x y)
gt
and gtu
but test for “greater than or equal”.
(le:
m x y)
(leu:
m x y)
gt
and gtu
but test for “less than or equal”.
(if_then_else
cond then else)
On most machines, if_then_else
expressions are valid only
to express conditional jumps.
(cond [
test1 value1 test2 value2 ...]
default)
if_then_else
, but more general. Each of test1,
test2, ... is performed in turn. The result of this expression is
the value corresponding to the first nonzero test, or default if
none of the tests are nonzero expressions.
This is currently not valid for instruction patterns and is supported only for insn attributes. See Insn Attributes.
Special expression codes exist to represent bit-field instructions.
(sign_extract:
m loc size pos)
BITS_BIG_ENDIAN
says which end of the memory unit
pos counts from.
If loc is in memory, its mode must be a single-byte integer mode.
If loc is in a register, the mode to use is specified by the
operand of the insv
or extv
pattern
(see Standard Names) and is usually a full-word integer mode,
which is the default if none is specified.
The mode of pos is machine-specific and is also specified
in the insv
or extv
pattern.
The mode m is the same as the mode that would be used for loc if it were a register.
A sign_extract
can not appear as an lvalue, or part thereof,
in RTL.
(zero_extract:
m loc size pos)
sign_extract
but refers to an unsigned or zero-extended
bit-field. The same sequence of bits are extracted, but they
are filled to an entire word with zeros instead of by sign-extension.
Unlike sign_extract
, this type of expressions can be lvalues
in RTL; they may appear on the left side of an assignment, indicating
insertion of a value into the specified bit-field.
All normal RTL expressions can be used with vector modes; they are interpreted as operating on each part of the vector independently. Additionally, there are a few new expressions to describe specific vector operations.
(vec_merge:
m vec1 vec2 items)
const_int
; a zero bit indicates the
corresponding element in the result vector is taken from vec2 while
a set bit indicates it is taken from vec1.
(vec_select:
m vec1 selection)
parallel
that contains a
const_int
for each of the subparts of the result vector, giving the
number of the source subpart that should be stored into it.
The result mode m is either the submode for a single element of
vec1 (if only one subpart is selected), or another vector mode
with that element submode (if multiple subparts are selected).
(vec_concat:
m x1 x2)
(vec_duplicate:
m x)
All conversions between machine modes must be represented by
explicit conversion operations. For example, an expression
which is the sum of a byte and a full word cannot be written as
(plus:SI (reg:QI 34) (reg:SI 80))
because the plus
operation requires two operands of the same machine mode.
Therefore, the byte-sized operand is enclosed in a conversion
operation, as in
(plus:SI (sign_extend:SI (reg:QI 34)) (reg:SI 80))
The conversion operation is not a mere placeholder, because there may be more than one way of converting from a given starting mode to the desired final mode. The conversion operation code says how to do it.
For all conversion operations, x must not be VOIDmode
because the mode in which to do the conversion would not be known.
The conversion must either be done at compile-time or x
must be placed into a register.
(sign_extend:
m x)
(zero_extend:
m x)
(float_extend:
m x)
(truncate:
m x)
(ss_truncate:
m x)
(us_truncate:
m x)
(float_truncate:
m x)
(float:
m x)
(unsigned_float:
m x)
(fix:
m x)
When m is a fixed-point mode, represents the result of converting floating point value x to mode m, regarded as signed. How rounding is done is not specified, so this operation may be used validly in compiling C code only for integer-valued operands.
(unsigned_fix:
m x)
(fract_convert:
m x)
(sat_fract:
m x)
(unsigned_fract_convert:
m x)
(unsigned_sat_fract:
m x)
Declaration expression codes do not represent arithmetic operations but rather state assertions about their operands.
(strict_low_part (subreg:
m (reg:
n r) 0))
set
expression. In addition, the operand of this expression
must be a non-paradoxical subreg
expression.
The presence of strict_low_part
says that the part of the
register which is meaningful in mode n, but is not part of
mode m, is not to be altered. Normally, an assignment to such
a subreg is allowed to have undefined effects on the rest of the
register when m is less than a word.
The expression codes described so far represent values, not actions. But machine instructions never produce values; they are meaningful only for their side effects on the state of the machine. Special expression codes are used to represent side effects.
The body of an instruction is always one of these side effect codes; the codes described above, which represent values, appear only as the operands of these.
(set
lval x)
reg
(or subreg
,
strict_low_part
or zero_extract
), mem
, pc
,
parallel
, or cc0
.
If lval is a reg
, subreg
or mem
, it has a
machine mode; then x must be valid for that mode.
If lval is a reg
whose machine mode is less than the full
width of the register, then it means that the part of the register
specified by the machine mode is given the specified value and the
rest of the register receives an undefined value. Likewise, if
lval is a subreg
whose machine mode is narrower than
the mode of the register, the rest of the register can be changed in
an undefined way.
If lval is a strict_low_part
of a subreg, then the part
of the register specified by the machine mode of the subreg
is
given the value x and the rest of the register is not changed.
If lval is a zero_extract
, then the referenced part of
the bit-field (a memory or register reference) specified by the
zero_extract
is given the value x and the rest of the
bit-field is not changed. Note that sign_extract
can not
appear in lval.
If lval is (cc0)
, it has no machine mode, and x may
be either a compare
expression or a value that may have any mode.
The latter case represents a “test” instruction. The expression
(set (cc0) (reg:
m n))
is equivalent to
(set (cc0) (compare (reg:
m n) (const_int 0)))
.
Use the former expression to save space during the compilation.
If lval is a parallel
, it is used to represent the case of
a function returning a structure in multiple registers. Each element
of the parallel
is an expr_list
whose first operand is a
reg
and whose second operand is a const_int
representing the
offset (in bytes) into the structure at which the data in that register
corresponds. The first element may be null to indicate that the structure
is also passed partly in memory.
If lval is (pc)
, we have a jump instruction, and the
possibilities for x are very limited. It may be a
label_ref
expression (unconditional jump). It may be an
if_then_else
(conditional jump), in which case either the
second or the third operand must be (pc)
(for the case which
does not jump) and the other of the two must be a label_ref
(for the case which does jump). x may also be a mem
or
(plus:SI (pc)
y)
, where y may be a reg
or a
mem
; these unusual patterns are used to represent jumps through
branch tables.
If lval is neither (cc0)
nor (pc)
, the mode of
lval must not be VOIDmode
and the mode of x must be
valid for the mode of lval.
lval is customarily accessed with the SET_DEST
macro and
x with the SET_SRC
macro.
(return)
return
expression code is never used.
Inside an if_then_else
expression, represents the value to be
placed in pc
to return to the caller.
Note that an insn pattern of (return)
is logically equivalent to
(set (pc) (return))
, but the latter form is never used.
(simple_return)
(return)
, but truly represents only a function return, while
(return)
may represent an insn that also performs other functions
of the function epilogue. Like (return)
, this may also occur in
conditional jumps.
(call
function nargs)
mem
expression
whose address is the address of the function to be called.
nargs is an expression which can be used for two purposes: on
some machines it represents the number of bytes of stack argument; on
others, it represents the number of argument registers.
Each machine has a standard machine mode which function must
have. The machine description defines macro FUNCTION_MODE
to
expand into the requisite mode name. The purpose of this mode is to
specify what kind of addressing is allowed, on machines where the
allowed kinds of addressing depend on the machine mode being
addressed.
(clobber
x)
reg
,
scratch
, parallel
or mem
expression.
One place this is used is in string instructions that store standard values into particular hard registers. It may not be worth the trouble to describe the values that are stored, but it is essential to inform the compiler that the registers will be altered, lest it attempt to keep data in them across the string instruction.
If x is (mem:BLK (const_int 0))
or
(mem:BLK (scratch))
, it means that all memory
locations must be presumed clobbered. If x is a parallel
,
it has the same meaning as a parallel
in a set
expression.
Note that the machine description classifies certain hard registers as
“call-clobbered”. All function call instructions are assumed by
default to clobber these registers, so there is no need to use
clobber
expressions to indicate this fact. Also, each function
call is assumed to have the potential to alter any memory location,
unless the function is declared const
.
If the last group of expressions in a parallel
are each a
clobber
expression whose arguments are reg
or
match_scratch
(see RTL Template) expressions, the combiner
phase can add the appropriate clobber
expressions to an insn it
has constructed when doing so will cause a pattern to be matched.
This feature can be used, for example, on a machine that whose multiply and add instructions don't use an MQ register but which has an add-accumulate instruction that does clobber the MQ register. Similarly, a combined instruction might require a temporary register while the constituent instructions might not.
When a clobber
expression for a register appears inside a
parallel
with other side effects, the register allocator
guarantees that the register is unoccupied both before and after that
insn if it is a hard register clobber. For pseudo-register clobber,
the register allocator and the reload pass do not assign the same hard
register to the clobber and the input operands if there is an insn
alternative containing the ‘&’ constraint (see Modifiers) for
the clobber and the hard register is in register classes of the
clobber in the alternative. You can clobber either a specific hard
register, a pseudo register, or a scratch
expression; in the
latter two cases, GCC will allocate a hard register that is available
there for use as a temporary.
For instructions that require a temporary register, you should use
scratch
instead of a pseudo-register because this will allow the
combiner phase to add the clobber
when required. You do this by
coding (clobber
(match_scratch
...)). If you do
clobber a pseudo register, use one which appears nowhere else—generate
a new one each time. Otherwise, you may confuse CSE.
There is one other known use for clobbering a pseudo register in a
parallel
: when one of the input operands of the insn is also
clobbered by the insn. In this case, using the same pseudo register in
the clobber and elsewhere in the insn produces the expected results.
(use
x)
reg
expression.
In some situations, it may be tempting to add a use
of a
register in a parallel
to describe a situation where the value
of a special register will modify the behavior of the instruction.
A hypothetical example might be a pattern for an addition that can
either wrap around or use saturating addition depending on the value
of a special control register:
(parallel [(set (reg:SI 2) (unspec:SI [(reg:SI 3) (reg:SI 4)] 0)) (use (reg:SI 1))])
This will not work, several of the optimizers only look at expressions
locally; it is very likely that if you have multiple insns with
identical inputs to the unspec
, they will be optimized away even
if register 1 changes in between.
This means that use
can only be used to describe
that the register is live. You should think twice before adding
use
statements, more often you will want to use unspec
instead. The use
RTX is most commonly useful to describe that
a fixed register is implicitly used in an insn. It is also safe to use
in patterns where the compiler knows for other reasons that the result
of the whole pattern is variable, such as ‘movmemm’ or
‘call’ patterns.
During the reload phase, an insn that has a use
as pattern
can carry a reg_equal note. These use
insns will be deleted
before the reload phase exits.
During the delayed branch scheduling phase, x may be an insn.
This indicates that x previously was located at this place in the
code and its data dependencies need to be taken into account. These
use
insns will be deleted before the delayed branch scheduling
phase exits.
(parallel [
x0 x1 ...])
parallel
is a
vector of expressions. x0, x1 and so on are individual
side effect expressions—expressions of code set
, call
,
return
, simple_return
, clobber
or use
.
“In parallel” means that first all the values used in the individual side-effects are computed, and second all the actual side-effects are performed. For example,
(parallel [(set (reg:SI 1) (mem:SI (reg:SI 1))) (set (mem:SI (reg:SI 1)) (reg:SI 1))])
says unambiguously that the values of hard register 1 and the memory
location addressed by it are interchanged. In both places where
(reg:SI 1)
appears as a memory address it refers to the value
in register 1 before the execution of the insn.
It follows that it is incorrect to use parallel
and
expect the result of one set
to be available for the next one.
For example, people sometimes attempt to represent a jump-if-zero
instruction this way:
(parallel [(set (cc0) (reg:SI 34)) (set (pc) (if_then_else (eq (cc0) (const_int 0)) (label_ref ...) (pc)))])
But this is incorrect, because it says that the jump condition depends on the condition code value before this instruction, not on the new value that is set by this instruction.
Peephole optimization, which takes place together with final assembly
code output, can produce insns whose patterns consist of a parallel
whose elements are the operands needed to output the resulting
assembler code—often reg
, mem
or constant expressions.
This would not be well-formed RTL at any other stage in compilation,
but it is OK then because no further optimization remains to be done.
However, the definition of the macro NOTICE_UPDATE_CC
, if
any, must deal with such insns if you define any peephole optimizations.
(cond_exec [
cond expr])
(sequence [
insns ...])
sequence
appears in the
chain of insns, then each of the insns that appears in the sequence
must be suitable for appearing in the chain of insns, i.e. must satisfy
the INSN_P
predicate.
After delay-slot scheduling is completed, an insn and all the insns that
reside in its delay slots are grouped together into a sequence
.
The insn requiring the delay slot is the first insn in the vector;
subsequent insns are to be placed in the delay slot.
INSN_ANNULLED_BRANCH_P
is set on an insn in a delay slot to
indicate that a branch insn should be used that will conditionally annul
the effect of the insns in the delay slots. In such a case,
INSN_FROM_TARGET_P
indicates that the insn is from the target of
the branch and should be executed only if the branch is taken; otherwise
the insn should be executed only if the branch is not taken.
See Delay Slots.
Some back ends also use sequence
objects for purposes other than
delay-slot groups. This is not supported in the common parts of the
compiler, which treat such sequences as delay-slot groups.
DWARF2 Call Frame Address (CFA) adjustments are sometimes also expressed
using sequence
objects as the value of a RTX_FRAME_RELATED_P
note. This only happens if the CFA adjustments cannot be easily derived
from the pattern of the instruction to which the note is attached. In
such cases, the value of the note is used instead of best-guesing the
semantics of the instruction. The back end can attach notes containing
a sequence
of set
patterns that express the effect of the
parent instruction.
These expression codes appear in place of a side effect, as the body of an insn, though strictly speaking they do not always describe side effects as such:
(asm_input
s)
(unspec [
operands ...]
index)
(unspec_volatile [
operands ...]
index)
unspec_volatile
is used for volatile operations and operations
that may trap; unspec
is used for other operations.
These codes may appear inside a pattern
of an
insn, inside a parallel
, or inside an expression.
(addr_vec:
m [
lr0 lr1 ...])
label_ref
expressions. The mode m specifies
how much space is given to each address; normally m would be
Pmode
.
(addr_diff_vec:
m base [
lr0 lr1 ...]
min max flags)
label_ref
expressions and so is base. The mode m specifies how much
space is given to each address-difference. min and max
are set up by branch shortening and hold a label with a minimum and a
maximum address, respectively. flags indicates the relative
position of base, min and max to the containing insn
and of min and max to base. See rtl.def for details.
(prefetch:
m addr rw locality)
This insn is used to minimize cache-miss latency by moving data into a cache before it is accessed. It should use only non-faulting data prefetch instructions.
Six special side-effect expression codes appear as memory addresses.
(pre_dec:
m x)
reg
or mem
, but most
machines allow only a reg
. m must be the machine mode
for pointers on the machine in use. The amount x is decremented
by is the length in bytes of the machine mode of the containing memory
reference of which this expression serves as the address. Here is an
example of its use:
(mem:DF (pre_dec:SI (reg:SI 39)))
This says to decrement pseudo register 39 by the length of a DFmode
value and use the result to address a DFmode
value.
(pre_inc:
m x)
(post_dec:
m x)
pre_dec
but a different
value. The value represented here is the value x has before
being decremented.
(post_inc:
m x)
(post_modify:
m x y)
reg
or mem
, but most machines allow only a reg
.
m must be the machine mode for pointers on the machine in use.
The expression y must be one of three forms:
(plus:
m x z)
,
(minus:
m x z)
, or
(plus:
m x i)
,
where z is an index register and i is a constant.
Here is an example of its use:
(mem:SF (post_modify:SI (reg:SI 42) (plus (reg:SI 42) (reg:SI 48))))
This says to modify pseudo register 42 by adding the contents of pseudo register 48 to it, after the use of what ever 42 points to.
(pre_modify:
m x expr)
These embedded side effect expressions must be used with care. Instruction patterns may not use them. Until the ‘flow’ pass of the compiler, they may occur only to represent pushes onto the stack. The ‘flow’ pass finds cases where registers are incremented or decremented in one instruction and used as an address shortly before or after; these cases are then transformed to use pre- or post-increment or -decrement.
If a register used as the operand of these expressions is used in another address in an insn, the original value of the register is used. Uses of the register outside of an address are not permitted within the same insn as a use in an embedded side effect expression because such insns behave differently on different machines and hence must be treated as ambiguous and disallowed.
An instruction that can be represented with an embedded side effect
could also be represented using parallel
containing an additional
set
to describe how the address register is altered. This is not
done because machines that allow these operations at all typically
allow them wherever a memory address is called for. Describing them as
additional parallel stores would require doubling the number of entries
in the machine description.
The RTX code asm_operands
represents a value produced by a
user-specified assembler instruction. It is used to represent
an asm
statement with arguments. An asm
statement with
a single output operand, like this:
asm ("foo %1,%2,%0" : "=a" (outputvar) : "g" (x + y), "di" (*z));
is represented using a single asm_operands
RTX which represents
the value that is stored in outputvar
:
(set rtx-for-outputvar (asm_operands "foo %1,%2,%0" "a" 0 [rtx-for-addition-result rtx-for-*z] [(asm_input:m1 "g") (asm_input:m2 "di")]))
Here the operands of the asm_operands
RTX are the assembler
template string, the output-operand's constraint, the index-number of the
output operand among the output operands specified, a vector of input
operand RTX's, and a vector of input-operand modes and constraints. The
mode m1 is the mode of the sum x+y
; m2 is that of
*z
.
When an asm
statement has multiple output values, its insn has
several such set
RTX's inside of a parallel
. Each set
contains an asm_operands
; all of these share the same assembler
template and vectors, but each contains the constraint for the respective
output operand. They are also distinguished by the output-operand index
number, which is 0, 1, ... for successive output operands.
Variable tracking relies on MEM_EXPR
and REG_EXPR
annotations to determine what user variables memory and register
references refer to.
Variable tracking at assignments uses these notes only when they refer to variables that live at fixed locations (e.g., addressable variables, global non-automatic variables). For variables whose location may vary, it relies on the following types of notes.
(var_location:
mode var exp stat)
var
, a tree, to value exp, an RTL
expression. It appears only in NOTE_INSN_VAR_LOCATION
and
DEBUG_INSN
s, with slightly different meanings. mode, if
present, represents the mode of exp, which is useful if it is a
modeless expression. stat is only meaningful in notes,
indicating whether the variable is known to be initialized or
uninitialized.
(debug_expr:
mode decl)
DEBUG_EXPR_DECL
decl,
that points back to it, within value expressions in
VAR_LOCATION
nodes.
The RTL representation of the code for a function is a doubly-linked
chain of objects called insns. Insns are expressions with
special codes that are used for no other purpose. Some insns are
actual instructions; others represent dispatch tables for switch
statements; others represent labels to jump to or various sorts of
declarative information.
In addition to its own specific data, each insn must have a unique
id-number that distinguishes it from all other insns in the current
function (after delayed branch scheduling, copies of an insn with the
same id-number may be present in multiple places in a function, but
these copies will always be identical and will only appear inside a
sequence
), and chain pointers to the preceding and following
insns. These three fields occupy the same position in every insn,
independent of the expression code of the insn. They could be accessed
with XEXP
and XINT
, but instead three special macros are
always used:
INSN_UID (
i)
PREV_INSN (
i)
NEXT_INSN (
i)
The first insn in the chain is obtained by calling get_insns
; the
last insn is the result of calling get_last_insn
. Within the
chain delimited by these insns, the NEXT_INSN
and
PREV_INSN
pointers must always correspond: if insn is not
the first insn,
NEXT_INSN (PREV_INSN (insn)) == insn
is always true and if insn is not the last insn,
PREV_INSN (NEXT_INSN (insn)) == insn
is always true.
After delay slot scheduling, some of the insns in the chain might be
sequence
expressions, which contain a vector of insns. The value
of NEXT_INSN
in all but the last of these insns is the next insn
in the vector; the value of NEXT_INSN
of the last insn in the vector
is the same as the value of NEXT_INSN
for the sequence
in
which it is contained. Similar rules apply for PREV_INSN
.
This means that the above invariants are not necessarily true for insns
inside sequence
expressions. Specifically, if insn is the
first insn in a sequence
, NEXT_INSN (PREV_INSN (
insn))
is the insn containing the sequence
expression, as is the value
of PREV_INSN (NEXT_INSN (
insn))
if insn is the last
insn in the sequence
expression. You can use these expressions
to find the containing sequence
expression.
Every insn has one of the following expression codes:
insn
insn
is used for instructions that do not jump
and do not do function calls. sequence
expressions are always
contained in insns with code insn
even if one of those insns
should jump or do function calls.
Insns with code insn
have four additional fields beyond the three
mandatory ones listed above. These four are described in a table below.
jump_insn
jump_insn
is used for instructions that may
jump (or, more generally, may contain label_ref
expressions to
which pc
can be set in that instruction). If there is an
instruction to return from the current function, it is recorded as a
jump_insn
.
jump_insn
insns have the same extra fields as insn
insns,
accessed in the same way and in addition contain a field
JUMP_LABEL
which is defined once jump optimization has completed.
For simple conditional and unconditional jumps, this field contains
the code_label
to which this insn will (possibly conditionally)
branch. In a more complex jump, JUMP_LABEL
records one of the
labels that the insn refers to; other jump target labels are recorded
as REG_LABEL_TARGET
notes. The exception is addr_vec
and addr_diff_vec
, where JUMP_LABEL
is NULL_RTX
and the only way to find the labels is to scan the entire body of the
insn.
Return insns count as jumps, but their JUMP_LABEL
is RETURN
or SIMPLE_RETURN
.
call_insn
call_insn
is used for instructions that may do
function calls. It is important to distinguish these instructions because
they imply that certain registers and memory locations may be altered
unpredictably.
call_insn
insns have the same extra fields as insn
insns,
accessed in the same way and in addition contain a field
CALL_INSN_FUNCTION_USAGE
, which contains a list (chain of
expr_list
expressions) containing use
, clobber
and
sometimes set
expressions that denote hard registers and
mem
s used or clobbered by the called function.
A mem
generally points to a stack slot in which arguments passed
to the libcall by reference (see TARGET_PASS_BY_REFERENCE) are stored. If the argument is
caller-copied (see TARGET_CALLEE_COPIES),
the stack slot will be mentioned in clobber
and use
entries; if it's callee-copied, only a use
will appear, and the
mem
may point to addresses that are not stack slots.
Registers occurring inside a clobber
in this list augment
registers specified in CALL_USED_REGISTERS
(see Register Basics).
If the list contains a set
involving two registers, it indicates
that the function returns one of its arguments. Such a set
may
look like a no-op if the same register holds the argument and the return
value.
code_label
code_label
insn represents a label that a jump insn can jump
to. It contains two special fields of data in addition to the three
standard ones. CODE_LABEL_NUMBER
is used to hold the label
number, a number that identifies this label uniquely among all the
labels in the compilation (not just in the current function).
Ultimately, the label is represented in the assembler output as an
assembler label, usually of the form ‘Ln’ where n is
the label number.
When a code_label
appears in an RTL expression, it normally
appears within a label_ref
which represents the address of
the label, as a number.
Besides as a code_label
, a label can also be represented as a
note
of type NOTE_INSN_DELETED_LABEL
.
The field LABEL_NUSES
is only defined once the jump optimization
phase is completed. It contains the number of times this label is
referenced in the current function.
The field LABEL_KIND
differentiates four different types of
labels: LABEL_NORMAL
, LABEL_STATIC_ENTRY
,
LABEL_GLOBAL_ENTRY
, and LABEL_WEAK_ENTRY
. The only labels
that do not have type LABEL_NORMAL
are alternate entry
points to the current function. These may be static (visible only in
the containing translation unit), global (exposed to all translation
units), or weak (global, but can be overridden by another symbol with the
same name).
Much of the compiler treats all four kinds of label identically. Some
of it needs to know whether or not a label is an alternate entry point;
for this purpose, the macro LABEL_ALT_ENTRY_P
is provided. It is
equivalent to testing whether ‘LABEL_KIND (label) == LABEL_NORMAL’.
The only place that cares about the distinction between static, global,
and weak alternate entry points, besides the front-end code that creates
them, is the function output_alternate_entry_point
, in
final.c.
To set the kind of a label, use the SET_LABEL_KIND
macro.
jump_table_data
jump_table_data
insn is a placeholder for the jump-table data
of a casesi
or tablejump
insn. They are placed after
a tablejump_p
insn. A jump_table_data
insn is not part o
a basic blockm but it is associated with the basic block that ends with
the tablejump_p
insn. The PATTERN
of a jump_table_data
is always either an addr_vec
or an addr_diff_vec
, and a
jump_table_data
insn is always preceded by a code_label
.
The tablejump_p
insn refers to that code_label
via its
JUMP_LABEL
.
barrier
volatile
functions, which do not return (e.g., exit
).
They contain no information beyond the three standard fields.
note
note
insns are used to represent additional debugging and
declarative information. They contain two nonstandard fields, an
integer which is accessed with the macro NOTE_LINE_NUMBER
and a
string accessed with NOTE_SOURCE_FILE
.
If NOTE_LINE_NUMBER
is positive, the note represents the
position of a source line and NOTE_SOURCE_FILE
is the source file name
that the line came from. These notes control generation of line
number data in the assembler output.
Otherwise, NOTE_LINE_NUMBER
is not really a line number but a
code with one of the following values (and NOTE_SOURCE_FILE
must contain a null pointer):
NOTE_INSN_DELETED
NOTE_INSN_DELETED_LABEL
code_label
, but was not used for other
purposes than taking its address and was transformed to mark that no
code jumps to it.
NOTE_INSN_BLOCK_BEG
NOTE_INSN_BLOCK_END
NOTE_INSN_EH_REGION_BEG
NOTE_INSN_EH_REGION_END
NOTE_EH_HANDLER
identifies which region is associated with these notes.
NOTE_INSN_FUNCTION_BEG
NOTE_INSN_VAR_LOCATION
VAR_LOCATION
operand
is at the location given in the RTL expression, or holds a value that
can be computed by evaluating the RTL expression from that static
point in the program up to the next such note for the same user
variable.
These codes are printed symbolically when they appear in debugging dumps.
debug_insn
debug_insn
is used for pseudo-instructions
that hold debugging information for variable tracking at assignments
(see -fvar-tracking-assignments option). They are the RTL
representation of GIMPLE_DEBUG
statements
(GIMPLE_DEBUG
), with a VAR_LOCATION
operand that
binds a user variable tree to an RTL representation of the
value
in the corresponding statement. A DEBUG_EXPR
in
it stands for the value bound to the corresponding
DEBUG_EXPR_DECL
.
Throughout optimization passes, binding information is kept in pseudo-instruction form, so that, unlike notes, it gets the same treatment and adjustments that regular instructions would. It is the variable tracking pass that turns these pseudo-instructions into var location notes, analyzing control flow, value equivalences and changes to registers and memory referenced in value expressions, propagating the values of debug temporaries and determining expressions that can be used to compute the value of each user variable at as many points (ranges, actually) in the program as possible.
Unlike NOTE_INSN_VAR_LOCATION
, the value expression in an
INSN_VAR_LOCATION
denotes a value at that specific point in the
program, rather than an expression that can be evaluated at any later
point before an overriding VAR_LOCATION
is encountered. E.g.,
if a user variable is bound to a REG
and then a subsequent insn
modifies the REG
, the note location would keep mapping the user
variable to the register across the insn, whereas the insn location
would keep the variable bound to the value, so that the variable
tracking pass would emit another location note for the variable at the
point in which the register is modified.
The machine mode of an insn is normally VOIDmode
, but some
phases use the mode for various purposes.
The common subexpression elimination pass sets the mode of an insn to
QImode
when it is the first insn in a block that has already
been processed.
The second Haifa scheduling pass, for targets that can multiple issue,
sets the mode of an insn to TImode
when it is believed that the
instruction begins an issue group. That is, when the instruction
cannot issue simultaneously with the previous. This may be relied on
by later passes, in particular machine-dependent reorg.
Here is a table of the extra fields of insn
, jump_insn
and call_insn
insns:
PATTERN (
i)
set
, call
, use
,
clobber
, return
, simple_return
, asm_input
,
asm_output
, addr_vec
, addr_diff_vec
,
trap_if
, unspec
, unspec_volatile
,
parallel
, cond_exec
, or sequence
. If it is a
parallel
, each element of the parallel
must be one these
codes, except that parallel
expressions cannot be nested and
addr_vec
and addr_diff_vec
are not permitted inside a
parallel
expression.
INSN_CODE (
i)
Such matching is never attempted and this field remains −1 on an insn
whose pattern consists of a single use
, clobber
,
asm_input
, addr_vec
or addr_diff_vec
expression.
Matching is also never attempted on insns that result from an asm
statement. These contain at least one asm_operands
expression.
The function asm_noperands
returns a non-negative value for
such insns.
In the debugging output, this field is printed as a number followed by a symbolic representation that locates the pattern in the md file as some small positive or negative offset from a named pattern.
LOG_LINKS (
i)
insn_list
expressions) giving information about
dependencies between instructions within a basic block. Neither a jump
nor a label may come between the related insns. These are only used by
the schedulers and by combine. This is a deprecated data structure.
Def-use and use-def chains are now preferred.
REG_NOTES (
i)
expr_list
, insn_list
and int_list
expressions) giving miscellaneous information about the insn. It is often
information pertaining to the registers used in this insn.
The LOG_LINKS
field of an insn is a chain of insn_list
expressions. Each of these has two operands: the first is an insn,
and the second is another insn_list
expression (the next one in
the chain). The last insn_list
in the chain has a null pointer
as second operand. The significant thing about the chain is which
insns appear in it (as first operands of insn_list
expressions). Their order is not significant.
This list is originally set up by the flow analysis pass; it is a null pointer until then. Flow only adds links for those data dependencies which can be used for instruction combination. For each insn, the flow analysis pass adds a link to insns which store into registers values that are used for the first time in this insn.
The REG_NOTES
field of an insn is a chain similar to the
LOG_LINKS
field but it includes expr_list
and int_list
expressions in addition to insn_list
expressions. There are several
kinds of register notes, which are distinguished by the machine mode, which
in a register note is really understood as being an enum reg_note
.
The first operand op of the note is data whose meaning depends on
the kind of note.
The macro REG_NOTE_KIND (
x)
returns the kind of
register note. Its counterpart, the macro PUT_REG_NOTE_KIND
(
x,
newkind)
sets the register note type of x to be
newkind.
Register notes are of three classes: They may say something about an
input to an insn, they may say something about an output of an insn, or
they may create a linkage between two insns. There are also a set
of values that are only used in LOG_LINKS
.
These register notes annotate inputs to an insn:
REG_DEAD
It does not follow that the register op has no useful value after this insn since op is not necessarily modified by this insn. Rather, no subsequent instruction uses the contents of op.
REG_UNUSED
REG_DEAD
note, which
indicates that the value in an input will not be used subsequently.
These two notes are independent; both may be present for the same
register.
REG_INC
post_inc
, pre_inc
,
post_dec
or pre_dec
expression.
REG_NONNEG
The REG_NONNEG
note is added to insns only if the machine
description has a ‘decrement_and_branch_until_zero’ pattern.
REG_LABEL_OPERAND
code_label
or a note
of type
NOTE_INSN_DELETED_LABEL
, but is not a jump_insn
, or it
is a jump_insn
that refers to the operand as an ordinary
operand. The label may still eventually be a jump target, but if so
in an indirect jump in a subsequent insn. The presence of this note
allows jump optimization to be aware that op is, in fact, being
used, and flow optimization to build an accurate flow graph.
REG_LABEL_TARGET
jump_insn
but not an addr_vec
or
addr_diff_vec
. It uses op, a code_label
as a
direct or indirect jump target. Its purpose is similar to that of
REG_LABEL_OPERAND
. This note is only present if the insn has
multiple targets; the last label in the insn (in the highest numbered
insn-field) goes into the JUMP_LABEL
field and does not have a
REG_LABEL_TARGET
note. See JUMP_LABEL.
REG_CROSSING_JUMP
REG_SETJMP
CALL_INSN
to setjmp
or a
related function.
The following notes describe attributes of outputs of an insn:
REG_EQUIV
REG_EQUAL
set
is a strict_low_part
or
zero_extract
expression, the note refers to the register that
is contained in its first operand.
For REG_EQUIV
, the register is equivalent to op throughout
the entire function, and could validly be replaced in all its
occurrences by op. (“Validly” here refers to the data flow of
the program; simple replacement may make some insns invalid.) For
example, when a constant is loaded into a register that is never
assigned any other value, this kind of note is used.
When a parameter is copied into a pseudo-register at entry to a function, a note of this kind records that the register is equivalent to the stack slot where the parameter was passed. Although in this case the register may be set by other insns, it is still valid to replace the register by the stack slot throughout the function.
A REG_EQUIV
note is also used on an instruction which copies a
register parameter into a pseudo-register at entry to a function, if
there is a stack slot where that parameter could be stored. Although
other insns may set the pseudo-register, it is valid for the compiler to
replace the pseudo-register by stack slot throughout the function,
provided the compiler ensures that the stack slot is properly
initialized by making the replacement in the initial copy instruction as
well. This is used on machines for which the calling convention
allocates stack space for register parameters. See
REG_PARM_STACK_SPACE
in Stack Arguments.
In the case of REG_EQUAL
, the register that is set by this insn
will be equal to op at run time at the end of this insn but not
necessarily elsewhere in the function. In this case, op
is typically an arithmetic expression. For example, when a sequence of
insns such as a library call is used to perform an arithmetic operation,
this kind of note is attached to the insn that produces or copies the
final value.
These two notes are used in different ways by the compiler passes.
REG_EQUAL
is used by passes prior to register allocation (such as
common subexpression elimination and loop optimization) to tell them how
to think of that value. REG_EQUIV
notes are used by register
allocation to indicate that there is an available substitute expression
(either a constant or a mem
expression for the location of a
parameter on the stack) that may be used in place of a register if
insufficient registers are available.
Except for stack homes for parameters, which are indicated by a
REG_EQUIV
note and are not useful to the early optimization
passes and pseudo registers that are equivalent to a memory location
throughout their entire life, which is not detected until later in
the compilation, all equivalences are initially indicated by an attached
REG_EQUAL
note. In the early stages of register allocation, a
REG_EQUAL
note is changed into a REG_EQUIV
note if
op is a constant and the insn represents the only set of its
destination register.
Thus, compiler passes prior to register allocation need only check for
REG_EQUAL
notes and passes subsequent to register allocation
need only check for REG_EQUIV
notes.
These notes describe linkages between insns. They occur in pairs: one insn has one of a pair of notes that points to a second insn, which has the inverse note pointing back to the first insn.
REG_CC_SETTER
REG_CC_USER
cc0
, the insns which set and use cc0
set and use cc0
are adjacent. However, when branch delay slot
filling is done, this may no longer be true. In this case a
REG_CC_USER
note will be placed on the insn setting cc0
to
point to the insn using cc0
and a REG_CC_SETTER
note will
be placed on the insn using cc0
to point to the insn setting
cc0
.
These values are only used in the LOG_LINKS
field, and indicate
the type of dependency that each link represents. Links which indicate
a data dependence (a read after write dependence) do not use any code,
they simply have mode VOIDmode
, and are printed without any
descriptive text.
REG_DEP_TRUE
REG_DEP_OUTPUT
REG_DEP_ANTI
These notes describe information gathered from gcov profile data. They
are stored in the REG_NOTES
field of an insn.
REG_BR_PROB
int_list
expression whose integer value is between 0 and
REG_BR_PROB_BASE. Larger values indicate a higher probability that
the branch will be taken.
REG_BR_PRED
REG_FRAME_RELATED_EXPR
For convenience, the machine mode in an insn_list
or
expr_list
is printed using these symbolic codes in debugging dumps.
The only difference between the expression codes insn_list
and
expr_list
is that the first operand of an insn_list
is
assumed to be an insn and is printed in debugging dumps as the insn's
unique id; the first operand of an expr_list
is printed in the
ordinary way as an expression.
Insns that call subroutines have the RTL expression code call_insn
.
These insns must satisfy special rules, and their bodies must use a special
RTL expression code, call
.
A call
expression has two operands, as follows:
(call (mem:fm addr) nbytes)
Here nbytes is an operand that represents the number of bytes of
argument data being passed to the subroutine, fm is a machine mode
(which must equal as the definition of the FUNCTION_MODE
macro in
the machine description) and addr represents the address of the
subroutine.
For a subroutine that returns no value, the call
expression as
shown above is the entire body of the insn, except that the insn might
also contain use
or clobber
expressions.
For a subroutine that returns a value whose mode is not BLKmode
,
the value is returned in a hard register. If this register's number is
r, then the body of the call insn looks like this:
(set (reg:m r) (call (mem:fm addr) nbytes))
This RTL expression makes it clear (to the optimizer passes) that the appropriate register receives a useful value in this insn.
When a subroutine returns a BLKmode
value, it is handled by
passing to the subroutine the address of a place to store the value.
So the call insn itself does not “return” any value, and it has the
same RTL form as a call that returns nothing.
On some machines, the call instruction itself clobbers some register,
for example to contain the return address. call_insn
insns
on these machines should have a body which is a parallel
that contains both the call
expression and clobber
expressions that indicate which registers are destroyed. Similarly,
if the call instruction requires some register other than the stack
pointer that is not explicitly mentioned in its RTL, a use
subexpression should mention that register.
Functions that are called are assumed to modify all registers listed in
the configuration macro CALL_USED_REGISTERS
(see Register Basics) and, with the exception of const
functions and library
calls, to modify all of memory.
Insns containing just use
expressions directly precede the
call_insn
insn to indicate which registers contain inputs to the
function. Similarly, if registers other than those in
CALL_USED_REGISTERS
are clobbered by the called function, insns
containing a single clobber
follow immediately after the call to
indicate which registers.
The compiler assumes that certain kinds of RTL expressions are unique; there do not exist two distinct objects representing the same value. In other cases, it makes an opposite assumption: that no RTL expression object of a certain kind appears in more than one place in the containing structure.
These assumptions refer to a single function; except for the RTL objects that describe global variables and external functions, and a few standard objects such as small integer constants, no RTL objects are common to two functions.
reg
object to represent it,
and therefore only a single machine mode.
symbol_ref
object
referring to it.
const_int
expressions with equal values are shared.
pc
expression.
cc0
expression.
const_double
expression with value 0 for
each floating point mode. Likewise for values 1 and 2.
const_vector
expression with value 0 for
each vector mode, be it an integer or a double constant vector.
label_ref
or scratch
appears in more than one place in
the RTL structure; in other words, it is safe to do a tree-walk of all
the insns in the function and assume that each time a label_ref
or scratch
is seen it is distinct from all others that are seen.
mem
object is normally created for each static
variable or stack slot, so these objects are frequently shared in all
the places they appear. However, separate but equal objects for these
variables are occasionally made.
asm
statement has multiple output operands, a
distinct asm_operands
expression is made for each output operand.
However, these all share the vector which contains the sequence of input
operands. This sharing is used later on to test whether two
asm_operands
expressions come from the same statement, so all
optimizations must carefully preserve the sharing if they copy the
vector at all.
unshare_all_rtl
in emit-rtl.c,
after which the above rules are guaranteed to be followed.
copy_rtx_if_shared
, which is a subroutine of
unshare_all_rtl
.
To read an RTL object from a file, call read_rtx
. It takes one
argument, a stdio stream, and returns a single RTL object. This routine
is defined in read-rtl.c. It is not available in the compiler
itself, only the various programs that generate the compiler back end
from the machine description.
People frequently have the idea of using RTL stored as text in a file as an interface between a language front end and the bulk of GCC. This idea is not feasible.
GCC was designed to use RTL internally only. Correct RTL for a given program is very dependent on the particular target machine. And the RTL does not contain all the information about the program.
The proper way to interface GCC to a new language front end is with the “tree” data structure, described in the files tree.h and tree.def. The documentation for this structure (see GENERIC) is incomplete.
A control flow graph (CFG) is a data structure built on top of the
intermediate code representation (the RTL or GIMPLE
instruction
stream) abstracting the control flow behavior of a function that is
being compiled. The CFG is a directed graph where the vertices
represent basic blocks and edges represent possible transfer of
control flow from one basic block to another. The data structures
used to represent the control flow graph are defined in
basic-block.h.
In GCC, the representation of control flow is maintained throughout
the compilation process, from constructing the CFG early in
pass_build_cfg
to pass_free_cfg
(see passes.def).
The CFG takes various different modes and may undergo extensive
manipulations, but the graph is always valid between its construction
and its release. This way, transfer of information such as data flow,
a measured profile, or the loop tree, can be propagated through the
passes pipeline, and even from GIMPLE
to RTL
.
Often the CFG may be better viewed as integral part of instruction chain, than structure built on the top of it. Updating the compiler's intermediate representation for instructions can not be easily done without proper maintenance of the CFG simultaneously.
A basic block is a straight-line sequence of code with only one entry
point and only one exit. In GCC, basic blocks are represented using
the basic_block
data type.
Special basic blocks represent possible entry and exit points of a
function. These blocks are called ENTRY_BLOCK_PTR
and
EXIT_BLOCK_PTR
. These blocks do not contain any code.
The BASIC_BLOCK
array contains all basic blocks in an
unspecified order. Each basic_block
structure has a field
that holds a unique integer identifier index
that is the
index of the block in the BASIC_BLOCK
array.
The total number of basic blocks in the function is
n_basic_blocks
. Both the basic block indices and
the total number of basic blocks may vary during the compilation
process, as passes reorder, create, duplicate, and destroy basic
blocks. The index for any block should never be greater than
last_basic_block
. The indices 0 and 1 are special codes
reserved for ENTRY_BLOCK
and EXIT_BLOCK
, the
indices of ENTRY_BLOCK_PTR
and EXIT_BLOCK_PTR
.
Two pointer members of the basic_block
structure are the
pointers next_bb
and prev_bb
. These are used to keep
doubly linked chain of basic blocks in the same order as the
underlying instruction stream. The chain of basic blocks is updated
transparently by the provided API for manipulating the CFG. The macro
FOR_EACH_BB
can be used to visit all the basic blocks in
lexicographical order, except ENTRY_BLOCK
and EXIT_BLOCK
.
The macro FOR_ALL_BB
also visits all basic blocks in
lexicographical order, including ENTRY_BLOCK
and EXIT_BLOCK
.
The functions post_order_compute
and inverted_post_order_compute
can be used to compute topological orders of the CFG. The orders are
stored as vectors of basic block indices. The BASIC_BLOCK
array
can be used to iterate each basic block by index.
Dominator traversals are also possible using
walk_dominator_tree
. Given two basic blocks A and B, block A
dominates block B if A is always executed before B.
Each basic_block
also contains pointers to the first
instruction (the head) and the last instruction (the tail)
or end of the instruction stream contained in a basic block. In
fact, since the basic_block
data type is used to represent
blocks in both major intermediate representations of GCC (GIMPLE
and RTL), there are pointers to the head and end of a basic block for
both representations, stored in intermediate representation specific
data in the il
field of struct basic_block_def
.
For RTL, these pointers are BB_HEAD
and BB_END
.
In the RTL representation of a function, the instruction stream contains not only the “real” instructions, but also notes or insn notes (to distinguish them from reg notes). Any function that moves or duplicates the basic blocks needs to take care of updating of these notes. Many of these notes expect that the instruction stream consists of linear regions, so updating can sometimes be tedious. All types of insn notes are defined in insn-notes.def.
In the RTL function representation, the instructions contained in a
basic block always follow a NOTE_INSN_BASIC_BLOCK
, but zero
or more CODE_LABEL
nodes can precede the block note.
A basic block ends with a control flow instruction or with the last
instruction before the next CODE_LABEL
or
NOTE_INSN_BASIC_BLOCK
.
By definition, a CODE_LABEL
cannot appear in the middle of
the instruction stream of a basic block.
In addition to notes, the jump table vectors are also represented as
“pseudo-instructions” inside the insn stream. These vectors never
appear in the basic block and should always be placed just after the
table jump instructions referencing them. After removing the
table-jump it is often difficult to eliminate the code computing the
address and referencing the vector, so cleaning up these vectors is
postponed until after liveness analysis. Thus the jump table vectors
may appear in the insn stream unreferenced and without any purpose.
Before any edge is made fall-thru, the existence of such
construct in the way needs to be checked by calling
can_fallthru
function.
For the GIMPLE
representation, the PHI nodes and statements
contained in a basic block are in a gimple_seq
pointed to by
the basic block intermediate language specific pointers.
Abstract containers and iterators are used to access the PHI nodes
and statements in a basic blocks. These iterators are called
GIMPLE statement iterators (GSIs). Grep for ^gsi
in the various gimple-* and tree-* files.
There is a gimple_stmt_iterator
type for iterating over
all kinds of statement, and a gphi_iterator
subclass for
iterating over PHI nodes.
The following snippet will pretty-print all PHI nodes the statements
of the current function in the GIMPLE representation.
basic_block bb; FOR_EACH_BB (bb) { gphi_iterator pi; gimple_stmt_iterator si; for (pi = gsi_start_phis (bb); !gsi_end_p (pi); gsi_next (&pi)) { gphi *phi = pi.phi (); print_gimple_stmt (dump_file, phi, 0, TDF_SLIM); } for (si = gsi_start_bb (bb); !gsi_end_p (si); gsi_next (&si)) { gimple stmt = gsi_stmt (si); print_gimple_stmt (dump_file, stmt, 0, TDF_SLIM); } }
Edges represent possible control flow transfers from the end of some
basic block A to the head of another basic block B. We say that A is
a predecessor of B, and B is a successor of A. Edges are represented
in GCC with the edge
data type. Each edge
acts as a
link between two basic blocks: The src
member of an edge
points to the predecessor basic block of the dest
basic block.
The members preds
and succs
of the basic_block
data
type point to type-safe vectors of edges to the predecessors and
successors of the block.
When walking the edges in an edge vector, edge iterators should
be used. Edge iterators are constructed using the
edge_iterator
data structure and several methods are available
to operate on them:
ei_start
edge_iterator
that points to the
first edge in a vector of edges.
ei_last
edge_iterator
that points to the
last edge in a vector of edges.
ei_end_p
true
if an edge_iterator
represents
the last edge in an edge vector.
ei_one_before_end_p
true
if an edge_iterator
represents
the second last edge in an edge vector.
ei_next
edge_iterator
and makes it
point to the next edge in the sequence.
ei_prev
edge_iterator
and makes it
point to the previous edge in the sequence.
ei_edge
edge
currently pointed to by an
edge_iterator
.
ei_safe_safe
edge
currently pointed to by an
edge_iterator
, but returns NULL
if the iterator is
pointing at the end of the sequence. This function has been provided
for existing code makes the assumption that a NULL
edge
indicates the end of the sequence.
The convenience macro FOR_EACH_EDGE
can be used to visit all of
the edges in a sequence of predecessor or successor edges. It must
not be used when an element might be removed during the traversal,
otherwise elements will be missed. Here is an example of how to use
the macro:
edge e; edge_iterator ei; FOR_EACH_EDGE (e, ei, bb->succs) { if (e->flags & EDGE_FALLTHRU) break; }
There are various reasons why control flow may transfer from one block
to another. One possibility is that some instruction, for example a
CODE_LABEL
, in a linearized instruction stream just always
starts a new basic block. In this case a fall-thru edge links
the basic block to the first following basic block. But there are
several other reasons why edges may be created. The flags
field of the edge
data type is used to store information
about the type of edge we are dealing with. Each edge is of one of
the following types:
EDGE_FALLTHRU
flag set. Unlike other types of edges, these
edges must come into the basic block immediately following in the
instruction stream. The function force_nonfallthru
is
available to insert an unconditional jump in the case that redirection
is needed. Note that this may require creation of a new basic block.
EDGE_ABNORMAL
and EDGE_EH
flags set.
When updating the instruction stream it is easy to change possibly
trapping instruction to non-trapping, by simply removing the exception
edge. The opposite conversion is difficult, but should not happen
anyway. The edges can be eliminated via purge_dead_edges
call.
In the RTL representation, the destination of an exception edge is
specified by REG_EH_REGION
note attached to the insn.
In case of a trapping call the EDGE_ABNORMAL_CALL
flag is set
too. In the GIMPLE
representation, this extra flag is not set.
In the RTL representation, the predicate may_trap_p
may be used
to check whether instruction still may trap or not. For the tree
representation, the tree_could_trap_p
predicate is available,
but this predicate only checks for possible memory traps, as in
dereferencing an invalid pointer location.
EDGE_SIBCALL
and EDGE_ABNORMAL
are set in such case.
These edges only exist in the RTL representation.
EDGE_ABNORMAL
flag set.
The edges used to represent computed jumps often cause compile time
performance problems, since functions consisting of many taken labels
and many computed jumps may have very dense flow graphs, so
these edges need to be handled with special care. During the earlier
stages of the compilation process, GCC tries to avoid such dense flow
graphs by factoring computed jumps. For example, given the following
series of jumps,
goto *x; [ ... ] goto *x; [ ... ] goto *x; [ ... ]
factoring the computed jumps results in the following code sequence which has a much simpler flow graph:
goto y; [ ... ] goto y; [ ... ] goto y; [ ... ] y: goto *x;
However, the classic problem with this transformation is that it has a
runtime cost in there resulting code: An extra jump. Therefore, the
computed jumps are un-factored in the later passes of the compiler
(in the pass called pass_duplicate_computed_gotos
).
Be aware of that when you work on passes in that area. There have
been numerous examples already where the compile time for code with
unfactored computed jumps caused some serious headaches.
goto
to a label passed to as an argument to the callee. The labels passed
to nested functions contain special code to cleanup after function
call. Such sections of code are referred to as “nonlocal goto
receivers”. If a function contains such nonlocal goto receivers, an
edge from the call to the label is created with the
EDGE_ABNORMAL
and EDGE_ABNORMAL_CALL
flags set.
ENTRY_BLOCK_PTR
to basic block 0.
There is no GIMPLE
representation for alternate entry points at
this moment. In RTL, alternate entry points are specified by
CODE_LABEL
with LABEL_ALTERNATE_NAME
defined. This
feature is currently used for multiple entry point prologues and is
limited to post-reload passes only. This can be used by back-ends to
emit alternate prologues for functions called from different contexts.
In future full support for multiple entry functions defined by Fortran
90 needs to be implemented.
In many cases a compiler must make a choice whether to trade speed in one part of code for speed in another, or to trade code size for code speed. In such cases it is useful to know information about how often some given block will be executed. That is the purpose for maintaining profile within the flow graph. GCC can handle profile information obtained through profile feedback, but it can also estimate branch probabilities based on statics and heuristics.
The feedback based profile is produced by compiling the program with instrumentation, executing it on a train run and reading the numbers of executions of basic blocks and edges back to the compiler while re-compiling the program to produce the final executable. This method provides very accurate information about where a program spends most of its time on the train run. Whether it matches the average run of course depends on the choice of train data set, but several studies have shown that the behavior of a program usually changes just marginally over different data sets.
When profile feedback is not available, the compiler may be asked to attempt to predict the behavior of each branch in the program using a set of heuristics (see predict.def for details) and compute estimated frequencies of each basic block by propagating the probabilities over the graph.
Each basic_block
contains two integer fields to represent
profile information: frequency
and count
. The
frequency
is an estimation how often is basic block executed
within a function. It is represented as an integer scaled in the
range from 0 to BB_FREQ_BASE
. The most frequently executed
basic block in function is initially set to BB_FREQ_BASE
and
the rest of frequencies are scaled accordingly. During optimization,
the frequency of the most frequent basic block can both decrease (for
instance by loop unrolling) or grow (for instance by cross-jumping
optimization), so scaling sometimes has to be performed multiple
times.
The count
contains hard-counted numbers of execution measured
during training runs and is nonzero only when profile feedback is
available. This value is represented as the host's widest integer
(typically a 64 bit integer) of the special type gcov_type
.
Most optimization passes can use only the frequency information of a basic block, but a few passes may want to know hard execution counts. The frequencies should always match the counts after scaling, however during updating of the profile information numerical error may accumulate into quite large errors.
Each edge also contains a branch probability field: an integer in the
range from 0 to REG_BR_PROB_BASE
. It represents probability of
passing control from the end of the src
basic block to the
dest
basic block, i.e. the probability that control will flow
along this edge. The EDGE_FREQUENCY
macro is available to
compute how frequently a given edge is taken. There is a count
field for each edge as well, representing same information as for a
basic block.
The basic block frequencies are not represented in the instruction
stream, but in the RTL representation the edge frequencies are
represented for conditional jumps (via the REG_BR_PROB
macro) since they are used when instructions are output to the
assembly file and the flow graph is no longer maintained.
The probability that control flow arrives via a given edge to its destination basic block is called reverse probability and is not directly represented, but it may be easily computed from frequencies of basic blocks.
Updating profile information is a delicate task that can unfortunately
not be easily integrated with the CFG manipulation API. Many of the
functions and hooks to modify the CFG, such as
redirect_edge_and_branch
, do not have enough information to
easily update the profile, so updating it is in the majority of cases
left up to the caller. It is difficult to uncover bugs in the profile
updating code, because they manifest themselves only by producing
worse code, and checking profile consistency is not possible because
of numeric error accumulation. Hence special attention needs to be
given to this issue in each pass that modifies the CFG.
It is important to point out that REG_BR_PROB_BASE
and
BB_FREQ_BASE
are both set low enough to be possible to compute
second power of any frequency or probability in the flow graph, it is
not possible to even square the count
field, as modern CPUs are
fast enough to execute $2^32$ operations quickly.
An important task of each compiler pass is to keep both the control flow graph and all profile information up-to-date. Reconstruction of the control flow graph after each pass is not an option, since it may be very expensive and lost profile information cannot be reconstructed at all.
GCC has two major intermediate representations, and both use the
basic_block
and edge
data types to represent control
flow. Both representations share as much of the CFG maintenance code
as possible. For each representation, a set of hooks is defined
so that each representation can provide its own implementation of CFG
manipulation routines when necessary. These hooks are defined in
cfghooks.h. There are hooks for almost all common CFG
manipulations, including block splitting and merging, edge redirection
and creating and deleting basic blocks. These hooks should provide
everything you need to maintain and manipulate the CFG in both the RTL
and GIMPLE
representation.
At the moment, the basic block boundaries are maintained transparently when modifying instructions, so there rarely is a need to move them manually (such as in case someone wants to output instruction outside basic block explicitly).
In the RTL representation, each instruction has a
BLOCK_FOR_INSN
value that represents pointer to the basic block
that contains the instruction. In the GIMPLE
representation, the
function gimple_bb
returns a pointer to the basic block
containing the queried statement.
When changes need to be applied to a function in its GIMPLE
representation, GIMPLE statement iterators should be used. These
iterators provide an integrated abstraction of the flow graph and the
instruction stream. Block statement iterators are constructed using
the gimple_stmt_iterator
data structure and several modifiers are
available, including the following:
gsi_start
gimple_stmt_iterator
that points to
the first non-empty statement in a basic block.
gsi_last
gimple_stmt_iterator
that points to
the last statement in a basic block.
gsi_end_p
true
if a gimple_stmt_iterator
represents the end of a basic block.
gsi_next
gimple_stmt_iterator
and makes it point to
its successor.
gsi_prev
gimple_stmt_iterator
and makes it point to
its predecessor.
gsi_insert_after
gimple_stmt_iterator
passed in. The final parameter determines whether the statement
iterator is updated to point to the newly inserted statement, or left
pointing to the original statement.
gsi_insert_before
gimple_stmt_iterator
passed in. The final parameter determines whether the statement
iterator is updated to point to the newly inserted statement, or left
pointing to the original statement.
gsi_remove
gimple_stmt_iterator
passed in and
rechains the remaining statements in a basic block, if any.
In the RTL representation, the macros BB_HEAD
and BB_END
may be used to get the head and end rtx
of a basic block. No
abstract iterators are defined for traversing the insn chain, but you
can just use NEXT_INSN
and PREV_INSN
instead. See Insns.
Usually a code manipulating pass simplifies the instruction stream and
the flow of control, possibly eliminating some edges. This may for
example happen when a conditional jump is replaced with an
unconditional jump, but also when simplifying possibly trapping
instruction to non-trapping while compiling Java. Updating of edges
is not transparent and each optimization pass is required to do so
manually. However only few cases occur in practice. The pass may
call purge_dead_edges
on a given basic block to remove
superfluous edges, if any.
Another common scenario is redirection of branch instructions, but
this is best modeled as redirection of edges in the control flow graph
and thus use of redirect_edge_and_branch
is preferred over more
low level functions, such as redirect_jump
that operate on RTL
chain only. The CFG hooks defined in cfghooks.h should provide
the complete API required for manipulating and maintaining the CFG.
It is also possible that a pass has to insert control flow instruction
into the middle of a basic block, thus creating an entry point in the
middle of the basic block, which is impossible by definition: The
block must be split to make sure it only has one entry point, i.e. the
head of the basic block. The CFG hook split_block
may be used
when an instruction in the middle of a basic block has to become the
target of a jump or branch instruction.
For a global optimizer, a common operation is to split edges in the
flow graph and insert instructions on them. In the RTL
representation, this can be easily done using the
insert_insn_on_edge
function that emits an instruction
“on the edge”, caching it for a later commit_edge_insertions
call that will take care of moving the inserted instructions off the
edge into the instruction stream contained in a basic block. This
includes the creation of new basic blocks where needed. In the
GIMPLE
representation, the equivalent functions are
gsi_insert_on_edge
which inserts a block statement
iterator on an edge, and gsi_commit_edge_inserts
which flushes
the instruction to actual instruction stream.
While debugging the optimization pass, the verify_flow_info
function may be useful to find bugs in the control flow graph updating
code.
Liveness information is useful to determine whether some register is “live” at given point of program, i.e. that it contains a value that may be used at a later point in the program. This information is used, for instance, during register allocation, as the pseudo registers only need to be assigned to a unique hard register or to a stack slot if they are live. The hard registers and stack slots may be freely reused for other values when a register is dead.
Liveness information is available in the back end starting with
pass_df_initialize
and ending with pass_df_finish
. Three
flavors of live analysis are available: With LR
, it is possible
to determine at any point P
in the function if the register may be
used on some path from P
to the end of the function. With
UR
, it is possible to determine if there is a path from the
beginning of the function to P
that defines the variable.
LIVE
is the intersection of the LR
and UR
and a
variable is live at P
if there is both an assignment that reaches
it from the beginning of the function and a use that can be reached on
some path from P
to the end of the function.
In general LIVE
is the most useful of the three. The macros
DF_[LR,UR,LIVE]_[IN,OUT]
can be used to access this information.
The macros take a basic block number and return a bitmap that is indexed
by the register number. This information is only guaranteed to be up to
date after calls are made to df_analyze
. See the file
df-core.c
for details on using the dataflow.
The liveness information is stored partly in the RTL instruction stream
and partly in the flow graph. Local information is stored in the
instruction stream: Each instruction may contain REG_DEAD
notes
representing that the value of a given register is no longer needed, or
REG_UNUSED
notes representing that the value computed by the
instruction is never used. The second is useful for instructions
computing multiple values at once.
GCC provides extensive infrastructure for work with natural loops, i.e., strongly connected components of CFG with only one entry block. This chapter describes representation of loops in GCC, both on GIMPLE and in RTL, as well as the interfaces to loop-related analyses (induction variable analysis and number of iterations analysis).
This chapter describes the representation of loops in GCC, and functions that can be used to build, modify and analyze this representation. Most of the interfaces and data structures are declared in cfgloop.h. Loop structures are analyzed and this information disposed or updated at the discretion of individual passes. Still most of the generic CFG manipulation routines are aware of loop structures and try to keep them up-to-date. By this means an increasing part of the compilation pipeline is setup to maintain loop structure across passes to allow attaching meta information to individual loops for consumption by later passes.
In general, a natural loop has one entry block (header) and possibly
several back edges (latches) leading to the header from the inside of
the loop. Loops with several latches may appear if several loops share
a single header, or if there is a branching in the middle of the loop.
The representation of loops in GCC however allows only loops with a
single latch. During loop analysis, headers of such loops are split and
forwarder blocks are created in order to disambiguate their structures.
Heuristic based on profile information and structure of the induction
variables in the loops is used to determine whether the latches
correspond to sub-loops or to control flow in a single loop. This means
that the analysis sometimes changes the CFG, and if you run it in the
middle of an optimization pass, you must be able to deal with the new
blocks. You may avoid CFG changes by passing
LOOPS_MAY_HAVE_MULTIPLE_LATCHES
flag to the loop discovery,
note however that most other loop manipulation functions will not work
correctly for loops with multiple latch edges (the functions that only
query membership of blocks to loops and subloop relationships, or
enumerate and test loop exits, can be expected to work).
Body of the loop is the set of blocks that are dominated by its header,
and reachable from its latch against the direction of edges in CFG. The
loops are organized in a containment hierarchy (tree) such that all the
loops immediately contained inside loop L are the children of L in the
tree. This tree is represented by the struct loops
structure.
The root of this tree is a fake loop that contains all blocks in the
function. Each of the loops is represented in a struct loop
structure. Each loop is assigned an index (num
field of the
struct loop
structure), and the pointer to the loop is stored in
the corresponding field of the larray
vector in the loops
structure. The indices do not have to be continuous, there may be
empty (NULL
) entries in the larray
created by deleting
loops. Also, there is no guarantee on the relative order of a loop
and its subloops in the numbering. The index of a loop never changes.
The entries of the larray
field should not be accessed directly.
The function get_loop
returns the loop description for a loop with
the given index. number_of_loops
function returns number of
loops in the function. To traverse all loops, use FOR_EACH_LOOP
macro. The flags
argument of the macro is used to determine
the direction of traversal and the set of loops visited. Each loop is
guaranteed to be visited exactly once, regardless of the changes to the
loop tree, and the loops may be removed during the traversal. The newly
created loops are never traversed, if they need to be visited, this
must be done separately after their creation. The FOR_EACH_LOOP
macro allocates temporary variables. If the FOR_EACH_LOOP
loop
were ended using break or goto, they would not be released;
FOR_EACH_LOOP_BREAK
macro must be used instead.
Each basic block contains the reference to the innermost loop it belongs
to (loop_father
). For this reason, it is only possible to have
one struct loops
structure initialized at the same time for each
CFG. The global variable current_loops
contains the
struct loops
structure. Many of the loop manipulation functions
assume that dominance information is up-to-date.
The loops are analyzed through loop_optimizer_init
function. The
argument of this function is a set of flags represented in an integer
bitmask. These flags specify what other properties of the loop
structures should be calculated/enforced and preserved later:
LOOPS_MAY_HAVE_MULTIPLE_LATCHES
: If this flag is set, no
changes to CFG will be performed in the loop analysis, in particular,
loops with multiple latch edges will not be disambiguated. If a loop
has multiple latches, its latch block is set to NULL. Most of
the loop manipulation functions will not work for loops in this shape.
No other flags that require CFG changes can be passed to
loop_optimizer_init.
LOOPS_HAVE_PREHEADERS
: Forwarder blocks are created in such
a way that each loop has only one entry edge, and additionally, the
source block of this entry edge has only one successor. This creates a
natural place where the code can be moved out of the loop, and ensures
that the entry edge of the loop leads from its immediate super-loop.
LOOPS_HAVE_SIMPLE_LATCHES
: Forwarder blocks are created to
force the latch block of each loop to have only one successor. This
ensures that the latch of the loop does not belong to any of its
sub-loops, and makes manipulation with the loops significantly easier.
Most of the loop manipulation functions assume that the loops are in
this shape. Note that with this flag, the “normal” loop without any
control flow inside and with one exit consists of two basic blocks.
LOOPS_HAVE_MARKED_IRREDUCIBLE_REGIONS
: Basic blocks and
edges in the strongly connected components that are not natural loops
(have more than one entry block) are marked with
BB_IRREDUCIBLE_LOOP
and EDGE_IRREDUCIBLE_LOOP
flags. The
flag is not set for blocks and edges that belong to natural loops that
are in such an irreducible region (but it is set for the entry and exit
edges of such a loop, if they lead to/from this region).
LOOPS_HAVE_RECORDED_EXITS
: The lists of exits are recorded
and updated for each loop. This makes some functions (e.g.,
get_loop_exit_edges
) more efficient. Some functions (e.g.,
single_exit
) can be used only if the lists of exits are
recorded.
These properties may also be computed/enforced later, using functions
create_preheaders
, force_single_succ_latches
,
mark_irreducible_loops
and record_loop_exits
.
The properties can be queried using loops_state_satisfies_p
.
The memory occupied by the loops structures should be freed with
loop_optimizer_finalize
function. When loop structures are
setup to be preserved across passes this function reduces the
information to be kept up-to-date to a minimum (only
LOOPS_MAY_HAVE_MULTIPLE_LATCHES
set).
The CFG manipulation functions in general do not update loop structures.
Specialized versions that additionally do so are provided for the most
common tasks. On GIMPLE, cleanup_tree_cfg_loop
function can be
used to cleanup CFG while updating the loops structures if
current_loops
is set.
At the moment loop structure is preserved from the start of GIMPLE
loop optimizations until the end of RTL loop optimizations. During
this time a loop can be tracked by its struct loop
and number.
The functions to query the information about loops are declared in
cfgloop.h. Some of the information can be taken directly from
the structures. loop_father
field of each basic block contains
the innermost loop to that the block belongs. The most useful fields of
loop structure (that are kept up-to-date at all times) are:
header
, latch
: Header and latch basic blocks of the
loop.
num_nodes
: Number of basic blocks in the loop (including
the basic blocks of the sub-loops).
outer
, inner
, next
: The super-loop, the first
sub-loop, and the sibling of the loop in the loops tree.
There are other fields in the loop structures, many of them used only by some of the passes, or not updated during CFG changes; in general, they should not be accessed directly.
The most important functions to query loop structures are:
loop_depth
: The depth of the loop in the loops tree, i.e., the
number of super-loops of the loop.
flow_loops_dump
: Dumps the information about loops to a
file.
verify_loop_structure
: Checks consistency of the loop
structures.
loop_latch_edge
: Returns the latch edge of a loop.
loop_preheader_edge
: If loops have preheaders, returns
the preheader edge of a loop.
flow_loop_nested_p
: Tests whether loop is a sub-loop of
another loop.
flow_bb_inside_loop_p
: Tests whether a basic block belongs
to a loop (including its sub-loops).
find_common_loop
: Finds the common super-loop of two loops.
superloop_at_depth
: Returns the super-loop of a loop with
the given depth.
tree_num_loop_insns
, num_loop_insns
: Estimates the
number of insns in the loop, on GIMPLE and on RTL.
loop_exit_edge_p
: Tests whether edge is an exit from a
loop.
mark_loop_exit_edges
: Marks all exit edges of all loops
with EDGE_LOOP_EXIT
flag.
get_loop_body
, get_loop_body_in_dom_order
,
get_loop_body_in_bfs_order
: Enumerates the basic blocks in the
loop in depth-first search order in reversed CFG, ordered by dominance
relation, and breath-first search order, respectively.
single_exit
: Returns the single exit edge of the loop, or
NULL
if the loop has more than one exit. You can only use this
function if LOOPS_HAVE_MARKED_SINGLE_EXITS property is used.
get_loop_exit_edges
: Enumerates the exit edges of a loop.
just_once_each_iteration_p
: Returns true if the basic block
is executed exactly once during each iteration of a loop (that is, it
does not belong to a sub-loop, and it dominates the latch of the loop).
The loops tree can be manipulated using the following functions:
flow_loop_tree_node_add
: Adds a node to the tree.
flow_loop_tree_node_remove
: Removes a node from the tree.
add_bb_to_loop
: Adds a basic block to a loop.
remove_bb_from_loops
: Removes a basic block from loops.
Most low-level CFG functions update loops automatically. The following functions handle some more complicated cases of CFG manipulations:
remove_path
: Removes an edge and all blocks it dominates.
split_loop_exit_edge
: Splits exit edge of the loop,
ensuring that PHI node arguments remain in the loop (this ensures that
loop-closed SSA form is preserved). Only useful on GIMPLE.
Finally, there are some higher-level loop transformations implemented. While some of them are written so that they should work on non-innermost loops, they are mostly untested in that case, and at the moment, they are only reliable for the innermost loops:
create_iv
: Creates a new induction variable. Only works on
GIMPLE. standard_iv_increment_position
can be used to find a
suitable place for the iv increment.
duplicate_loop_to_header_edge
,
tree_duplicate_loop_to_header_edge
: These functions (on RTL and
on GIMPLE) duplicate the body of the loop prescribed number of times on
one of the edges entering loop header, thus performing either loop
unrolling or loop peeling. can_duplicate_loop_p
(can_unroll_loop_p
on GIMPLE) must be true for the duplicated
loop.
loop_version
, tree_ssa_loop_version
: These function
create a copy of a loop, and a branch before them that selects one of
them depending on the prescribed condition. This is useful for
optimizations that need to verify some assumptions in runtime (one of
the copies of the loop is usually left unchanged, while the other one is
transformed in some way).
tree_unroll_loop
: Unrolls the loop, including peeling the
extra iterations to make the number of iterations divisible by unroll
factor, updating the exit condition, and removing the exits that now
cannot be taken. Works only on GIMPLE.
Throughout the loop optimizations on tree level, one extra condition is enforced on the SSA form: No SSA name is used outside of the loop in that it is defined. The SSA form satisfying this condition is called “loop-closed SSA form” – LCSSA. To enforce LCSSA, PHI nodes must be created at the exits of the loops for the SSA names that are used outside of them. Only the real operands (not virtual SSA names) are held in LCSSA, in order to save memory.
There are various benefits of LCSSA:
However, it also means LCSSA must be updated. This is usually
straightforward, unless you create a new value in loop and use it
outside, or unless you manipulate loop exit edges (functions are
provided to make these manipulations simple).
rewrite_into_loop_closed_ssa
is used to rewrite SSA form to
LCSSA, and verify_loop_closed_ssa
to check that the invariant of
LCSSA is preserved.
Scalar evolutions (SCEV) are used to represent results of induction
variable analysis on GIMPLE. They enable us to represent variables with
complicated behavior in a simple and consistent way (we only use it to
express values of polynomial induction variables, but it is possible to
extend it). The interfaces to SCEV analysis are declared in
tree-scalar-evolution.h. To use scalar evolutions analysis,
scev_initialize
must be used. To stop using SCEV,
scev_finalize
should be used. SCEV analysis caches results in
order to save time and memory. This cache however is made invalid by
most of the loop transformations, including removal of code. If such a
transformation is performed, scev_reset
must be called to clean
the caches.
Given an SSA name, its behavior in loops can be analyzed using the
analyze_scalar_evolution
function. The returned SCEV however
does not have to be fully analyzed and it may contain references to
other SSA names defined in the loop. To resolve these (potentially
recursive) references, instantiate_parameters
or
resolve_mixers
functions must be used.
instantiate_parameters
is useful when you use the results of SCEV
only for some analysis, and when you work with whole nest of loops at
once. It will try replacing all SSA names by their SCEV in all loops,
including the super-loops of the current loop, thus providing a complete
information about the behavior of the variable in the loop nest.
resolve_mixers
is useful if you work with only one loop at a
time, and if you possibly need to create code based on the value of the
induction variable. It will only resolve the SSA names defined in the
current loop, leaving the SSA names defined outside unchanged, even if
their evolution in the outer loops is known.
The SCEV is a normal tree expression, except for the fact that it may
contain several special tree nodes. One of them is
SCEV_NOT_KNOWN
, used for SSA names whose value cannot be
expressed. The other one is POLYNOMIAL_CHREC
. Polynomial chrec
has three arguments – base, step and loop (both base and step may
contain further polynomial chrecs). Type of the expression and of base
and step must be the same. A variable has evolution
POLYNOMIAL_CHREC(base, step, loop)
if it is (in the specified
loop) equivalent to x_1
in the following example
while (...) { x_1 = phi (base, x_2); x_2 = x_1 + step; }
Note that this includes the language restrictions on the operations.
For example, if we compile C code and x
has signed type, then the
overflow in addition would cause undefined behavior, and we may assume
that this does not happen. Hence, the value with this SCEV cannot
overflow (which restricts the number of iterations of such a loop).
In many cases, one wants to restrict the attention just to affine
induction variables. In this case, the extra expressive power of SCEV
is not useful, and may complicate the optimizations. In this case,
simple_iv
function may be used to analyze a value – the result
is a loop-invariant base and step.
The induction variable on RTL is simple and only allows analysis of
affine induction variables, and only in one loop at once. The interface
is declared in cfgloop.h. Before analyzing induction variables
in a loop L, iv_analysis_loop_init
function must be called on L.
After the analysis (possibly calling iv_analysis_loop_init
for
several loops) is finished, iv_analysis_done
should be called.
The following functions can be used to access the results of the
analysis:
iv_analyze
: Analyzes a single register used in the given
insn. If no use of the register in this insn is found, the following
insns are scanned, so that this function can be called on the insn
returned by get_condition.
iv_analyze_result
: Analyzes result of the assignment in the
given insn.
iv_analyze_expr
: Analyzes a more complicated expression.
All its operands are analyzed by iv_analyze
, and hence they must
be used in the specified insn or one of the following insns.
The description of the induction variable is provided in struct
rtx_iv
. In order to handle subregs, the representation is a bit
complicated; if the value of the extend
field is not
UNKNOWN
, the value of the induction variable in the i-th
iteration is
delta + mult * extend_{extend_mode} (subreg_{mode} (base + i * step)),
with the following exception: if first_special
is true, then the
value in the first iteration (when i
is zero) is delta +
mult * base
. However, if extend
is equal to UNKNOWN
,
then first_special
must be false, delta
0, mult
1
and the value in the i-th iteration is
subreg_{mode} (base + i * step)
The function get_iv_value
can be used to perform these
calculations.
Both on GIMPLE and on RTL, there are functions available to determine the number of iterations of a loop, with a similar interface. The number of iterations of a loop in GCC is defined as the number of executions of the loop latch. In many cases, it is not possible to determine the number of iterations unconditionally – the determined number is correct only if some assumptions are satisfied. The analysis tries to verify these conditions using the information contained in the program; if it fails, the conditions are returned together with the result. The following information and conditions are provided by the analysis:
assumptions
: If this condition is false, the rest of
the information is invalid.
noloop_assumptions
on RTL, may_be_zero
on GIMPLE: If
this condition is true, the loop exits in the first iteration.
infinite
: If this condition is true, the loop is infinite.
This condition is only available on RTL. On GIMPLE, conditions for
finiteness of the loop are included in assumptions
.
niter_expr
on RTL, niter
on GIMPLE: The expression
that gives number of iterations. The number of iterations is defined as
the number of executions of the loop latch.
Both on GIMPLE and on RTL, it necessary for the induction variable
analysis framework to be initialized (SCEV on GIMPLE, loop-iv on RTL).
On GIMPLE, the results are stored to struct tree_niter_desc
structure. Number of iterations before the loop is exited through a
given exit can be determined using number_of_iterations_exit
function. On RTL, the results are returned in struct niter_desc
structure. The corresponding function is named
check_simple_exit
. There are also functions that pass through
all the exits of a loop and try to find one with easy to determine
number of iterations – find_loop_niter
on GIMPLE and
find_simple_exit
on RTL. Finally, there are functions that
provide the same information, but additionally cache it, so that
repeated calls to number of iterations are not so costly –
number_of_latch_executions
on GIMPLE and get_simple_loop_desc
on RTL.
Note that some of these functions may behave slightly differently than
others – some of them return only the expression for the number of
iterations, and fail if there are some assumptions. The function
number_of_latch_executions
works only for single-exit loops.
The function number_of_cond_exit_executions
can be used to
determine number of executions of the exit condition of a single-exit
loop (i.e., the number_of_latch_executions
increased by one).
The code for the data dependence analysis can be found in
tree-data-ref.c and its interface and data structures are
described in tree-data-ref.h. The function that computes the
data dependences for all the array and pointer references for a given
loop is compute_data_dependences_for_loop
. This function is
currently used by the linear loop transform and the vectorization
passes. Before calling this function, one has to allocate two vectors:
a first vector will contain the set of data references that are
contained in the analyzed loop body, and the second vector will contain
the dependence relations between the data references. Thus if the
vector of data references is of size n
, the vector containing the
dependence relations will contain n*n
elements. However if the
analyzed loop contains side effects, such as calls that potentially can
interfere with the data references in the current analyzed loop, the
analysis stops while scanning the loop body for data references, and
inserts a single chrec_dont_know
in the dependence relation
array.
The data references are discovered in a particular order during the scanning of the loop body: the loop body is analyzed in execution order, and the data references of each statement are pushed at the end of the data reference array. Two data references syntactically occur in the program in the same order as in the array of data references. This syntactic order is important in some classical data dependence tests, and mapping this order to the elements of this array avoids costly queries to the loop body representation.
Three types of data references are currently handled: ARRAY_REF,
INDIRECT_REF and COMPONENT_REF. The data structure for the data reference
is data_reference
, where data_reference_p
is a name of a
pointer to the data reference structure. The structure contains the
following elements:
base_object_info
: Provides information about the base object
of the data reference and its access functions. These access functions
represent the evolution of the data reference in the loop relative to
its base, in keeping with the classical meaning of the data reference
access function for the support of arrays. For example, for a reference
a.b[i][j]
, the base object is a.b
and the access functions,
one for each array subscript, are:
{i_init, + i_step}_1, {j_init, +, j_step}_2
.
first_location_in_loop
: Provides information about the first
location accessed by the data reference in the loop and about the access
function used to represent evolution relative to this location. This data
is used to support pointers, and is not used for arrays (for which we
have base objects). Pointer accesses are represented as a one-dimensional
access that starts from the first location accessed in the loop. For
example:
for1 i for2 j *((int *)p + i + j) = a[i][j];
The access function of the pointer access is {0, + 4B}_for2
relative to p + i
. The access functions of the array are
{i_init, + i_step}_for1
and {j_init, +, j_step}_for2
relative to a
.
Usually, the object the pointer refers to is either unknown, or we can't prove that the access is confined to the boundaries of a certain object.
Two data references can be compared only if at least one of these two representations has all its fields filled for both data references.
The current strategy for data dependence tests is as follows:
If both a
and b
are represented as arrays, compare
a.base_object
and b.base_object
;
if they are equal, apply dependence tests (use access functions based on
base_objects).
Else if both a
and b
are represented as pointers, compare
a.first_location
and b.first_location
;
if they are equal, apply dependence tests (use access functions based on
first location).
However, if a
and b
are represented differently, only try
to prove that the bases are definitely different.
The structure describing the relation between two data references is
data_dependence_relation
and the shorter name for a pointer to
such a structure is ddr_p
. This structure contains:
are_dependent
that is set to chrec_known
if the analysis has proved that there is no dependence between these two
data references, chrec_dont_know
if the analysis was not able to
determine any useful result and potentially there could exist a
dependence between these data references, and are_dependent
is
set to NULL_TREE
if there exist a dependence relation between the
data references, and the description of this dependence relation is
given in the subscripts
, dir_vects
, and dist_vects
arrays,
subscripts
that contains a description of each
subscript of the data references. Given two array accesses a
subscript is the tuple composed of the access functions for a given
dimension. For example, given A[f1][f2][f3]
and
B[g1][g2][g3]
, there are three subscripts: (f1, g1), (f2,
g2), (f3, g3)
.
dir_vects
and dist_vects
that contain
classical representations of the data dependences under the form of
direction and distance dependence vectors,
loop_nest
that contains the loops to
which the distance and direction vectors refer to.
Several functions for pretty printing the information extracted by the
data dependence analysis are available: dump_ddrs
prints with a
maximum verbosity the details of a data dependence relations array,
dump_dist_dir_vectors
prints only the classical distance and
direction vectors for a data dependence relations array, and
dump_data_references
prints the details of the data references
contained in a data reference array.
A machine description has two parts: a file of instruction patterns (.md file) and a C header file of macro definitions.
The .md file for a target machine contains a pattern for each instruction that the target machine supports (or at least each instruction that is worth telling the compiler about). It may also contain comments. A semicolon causes the rest of the line to be a comment, unless the semicolon is inside a quoted string.
See the next chapter for information on the C header file.
There are three main conversions that happen in the compiler:
For the generate pass, only the names of the insns matter, from either a
named define_insn
or a define_expand
. The compiler will
choose the pattern with the right name and apply the operands according
to the documentation later in this chapter, without regard for the RTL
template or operand constraints. Note that the names the compiler looks
for are hard-coded in the compiler—it will ignore unnamed patterns and
patterns with names it doesn't know about, but if you don't provide a
named pattern it needs, it will abort.
If a define_insn
is used, the template given is inserted into the
insn list. If a define_expand
is used, one of three things
happens, based on the condition logic. The condition logic may manually
create new insns for the insn list, say via emit_insn()
, and
invoke DONE
. For certain named patterns, it may invoke FAIL
to tell the
compiler to use an alternate way of performing that task. If it invokes
neither DONE
nor FAIL
, the template given in the pattern
is inserted, as if the define_expand
were a define_insn
.
Once the insn list is generated, various optimization passes convert,
replace, and rearrange the insns in the insn list. This is where the
define_split
and define_peephole
patterns get used, for
example.
Finally, the insn list's RTL is matched up with the RTL templates in the
define_insn
patterns, and those patterns are used to emit the
final assembly code. For this purpose, each named define_insn
acts like it's unnamed, since the names are ignored.
A define_insn
expression is used to define instruction patterns
to which insns may be matched. A define_insn
expression contains
an incomplete RTL expression, with pieces to be filled in later, operand
constraints that restrict how the pieces can be filled in, and an output
template or C code to generate the assembler output.
A define_insn
is an RTL expression containing four or five operands:
The absence of a name is indicated by writing an empty string where the name should go. Nameless instruction patterns are never used for generating RTL code, but they may permit several simpler insns to be combined later on.
Names that are not thus known and used in RTL-generation have no effect; they are equivalent to no name at all.
For the purpose of debugging the compiler, you may also specify a name beginning with the ‘*’ character. Such a name is used only for identifying the instruction in RTL dumps; it is equivalent to having a nameless pattern for all other purposes. Names beginning with the ‘*’ character are not required to be unique.
match_operand
,
match_operator
, and match_dup
expressions that stand for
operands of the instruction.
If the vector has multiple elements, the RTL template is treated as a
parallel
expression.
true
, the match is
permitted. The condition may be an empty string, which is treated
as always true
.
For a named pattern, the condition may not depend on the data in the insn being matched, but only the target-machine-type flags. The compiler needs to test these conditions during initialization in order to learn exactly which named instructions are available in a particular run.
For nameless patterns, the condition is applied only when matching an
individual insn, and only after the insn has matched the pattern's
recognition template. The insn's operands may be found in the vector
operands
.
For an insn where the condition has once matched, it cannot later be used to control register allocation by excluding certain register or value combinations.
When simple substitution isn't general enough, you can specify a piece of C code to compute the output. See Output Statement.
define_insn
Here is an example of an instruction pattern, taken from the machine description for the 68000/68020.
(define_insn "tstsi" [(set (cc0) (match_operand:SI 0 "general_operand" "rm"))] "" "* { if (TARGET_68020 || ! ADDRESS_REG_P (operands[0])) return \"tstl %0\"; return \"cmpl #0,%0\"; }")
This can also be written using braced strings:
(define_insn "tstsi" [(set (cc0) (match_operand:SI 0 "general_operand" "rm"))] "" { if (TARGET_68020 || ! ADDRESS_REG_P (operands[0])) return "tstl %0"; return "cmpl #0,%0"; })
This describes an instruction which sets the condition codes based on the
value of a general operand. It has no condition, so any insn with an RTL
description of the form shown may be matched to this pattern. The name
‘tstsi’ means “test a SImode
value” and tells the RTL
generation pass that, when it is necessary to test such a value, an insn
to do so can be constructed using this pattern.
The output control string is a piece of C code which chooses which output template to return based on the kind of operand and the specific type of CPU for which code is being generated.
‘"rm"’ is an operand constraint. Its meaning is explained below.
The RTL template is used to define which insns match the particular pattern and how to find their operands. For named patterns, the RTL template also says how to construct an insn from specified operands.
Construction involves substituting specified operands into a copy of the template. Matching involves determining the values that serve as the operands in the insn being matched. Both of these activities are controlled by special expression types that direct matching and substitution of the operands.
(match_operand:
m n predicate constraint)
Operand numbers must be chosen consecutively counting from zero in
each instruction pattern. There may be only one match_operand
expression in the pattern for each operand number. Usually operands
are numbered in the order of appearance in match_operand
expressions. In the case of a define_expand
, any operand numbers
used only in match_dup
expressions have higher values than all
other operand numbers.
predicate is a string that is the name of a function that
accepts two arguments, an expression and a machine mode.
See Predicates. During matching, the function will be called with
the putative operand as the expression and m as the mode
argument (if m is not specified, VOIDmode
will be used,
which normally causes predicate to accept any mode). If it
returns zero, this instruction pattern fails to match.
predicate may be an empty string; then it means no test is to be
done on the operand, so anything which occurs in this position is
valid.
Most of the time, predicate will reject modes other than m—but
not always. For example, the predicate address_operand
uses
m as the mode of memory ref that the address should be valid for.
Many predicates accept const_int
nodes even though their mode is
VOIDmode
.
constraint controls reloading and the choice of the best register class to use for a value, as explained later (see Constraints). If the constraint would be an empty string, it can be omitted.
People are often unclear on the difference between the constraint and the predicate. The predicate helps decide whether a given insn matches the pattern. The constraint plays no role in this decision; instead, it controls various decisions in the case of an insn which does match.
(match_scratch:
m n constraint)
scratch
or reg
expression.
When matching patterns, this is equivalent to
(match_operand:m n "scratch_operand" constraint)
but, when generating RTL, it produces a (scratch
:m)
expression.
If the last few expressions in a parallel
are clobber
expressions whose operands are either a hard register or
match_scratch
, the combiner can add or delete them when
necessary. See Side Effects.
(match_dup
n)
In construction, match_dup
acts just like match_operand
:
the operand is substituted into the insn being constructed. But in
matching, match_dup
behaves differently. It assumes that operand
number n has already been determined by a match_operand
appearing earlier in the recognition template, and it matches only an
identical-looking expression.
Note that match_dup
should not be used to tell the compiler that
a particular register is being used for two operands (example:
add
that adds one register to another; the second register is
both an input operand and the output operand). Use a matching
constraint (see Simple Constraints) for those. match_dup
is for the cases where one
operand is used in two places in the template, such as an instruction
that computes both a quotient and a remainder, where the opcode takes
two input operands but the RTL template has to refer to each of those
twice; once for the quotient pattern and once for the remainder pattern.
(match_operator:
m n predicate [
operands...])
When constructing an insn, it stands for an RTL expression whose expression code is taken from that of operand n, and whose operands are constructed from the patterns operands.
When matching an expression, it matches an expression if the function predicate returns nonzero on that expression and the patterns operands match the operands of the expression.
Suppose that the function commutative_operator
is defined as
follows, to match any expression whose operator is one of the
commutative arithmetic operators of RTL and whose mode is mode:
int commutative_integer_operator (x, mode) rtx x; machine_mode mode; { enum rtx_code code = GET_CODE (x); if (GET_MODE (x) != mode) return 0; return (GET_RTX_CLASS (code) == RTX_COMM_ARITH || code == EQ || code == NE); }
Then the following pattern will match any RTL expression consisting of a commutative operator applied to two general operands:
(match_operator:SI 3 "commutative_operator" [(match_operand:SI 1 "general_operand" "g") (match_operand:SI 2 "general_operand" "g")])
Here the vector [
operands...]
contains two patterns
because the expressions to be matched all contain two operands.
When this pattern does match, the two operands of the commutative
operator are recorded as operands 1 and 2 of the insn. (This is done
by the two instances of match_operand
.) Operand 3 of the insn
will be the entire commutative expression: use GET_CODE
(operands[3])
to see which commutative operator was used.
The machine mode m of match_operator
works like that of
match_operand
: it is passed as the second argument to the
predicate function, and that function is solely responsible for
deciding whether the expression to be matched “has” that mode.
When constructing an insn, argument 3 of the gen-function will specify the operation (i.e. the expression code) for the expression to be made. It should be an RTL expression, whose expression code is copied into a new expression whose operands are arguments 1 and 2 of the gen-function. The subexpressions of argument 3 are not used; only its expression code matters.
When match_operator
is used in a pattern for matching an insn,
it usually best if the operand number of the match_operator
is higher than that of the actual operands of the insn. This improves
register allocation because the register allocator often looks at
operands 1 and 2 of insns to see if it can do register tying.
There is no way to specify constraints in match_operator
. The
operand of the insn which corresponds to the match_operator
never has any constraints because it is never reloaded as a whole.
However, if parts of its operands are matched by
match_operand
patterns, those parts may have constraints of
their own.
(match_op_dup:
m n[
operands...])
match_dup
, except that it applies to operators instead of
operands. When constructing an insn, operand number n will be
substituted at this point. But in matching, match_op_dup
behaves
differently. It assumes that operand number n has already been
determined by a match_operator
appearing earlier in the
recognition template, and it matches only an identical-looking
expression.
(match_parallel
n predicate [
subpat...])
parallel
expression with a variable number of elements. This
expression should only appear at the top level of an insn pattern.
When constructing an insn, operand number n will be substituted at
this point. When matching an insn, it matches if the body of the insn
is a parallel
expression with at least as many elements as the
vector of subpat expressions in the match_parallel
, if each
subpat matches the corresponding element of the parallel
,
and the function predicate returns nonzero on the
parallel
that is the body of the insn. It is the responsibility
of the predicate to validate elements of the parallel
beyond
those listed in the match_parallel
.
A typical use of match_parallel
is to match load and store
multiple expressions, which can contain a variable number of elements
in a parallel
. For example,
(define_insn "" [(match_parallel 0 "load_multiple_operation" [(set (match_operand:SI 1 "gpc_reg_operand" "=r") (match_operand:SI 2 "memory_operand" "m")) (use (reg:SI 179)) (clobber (reg:SI 179))])] "" "loadm 0,0,%1,%2")
This example comes from a29k.md. The function
load_multiple_operation
is defined in a29k.c and checks
that subsequent elements in the parallel
are the same as the
set
in the pattern, except that they are referencing subsequent
registers and memory locations.
An insn that matches this pattern might look like:
(parallel [(set (reg:SI 20) (mem:SI (reg:SI 100))) (use (reg:SI 179)) (clobber (reg:SI 179)) (set (reg:SI 21) (mem:SI (plus:SI (reg:SI 100) (const_int 4)))) (set (reg:SI 22) (mem:SI (plus:SI (reg:SI 100) (const_int 8))))])
(match_par_dup
n [
subpat...])
match_op_dup
, but for match_parallel
instead of
match_operator
.
The output template is a string which specifies how to output the assembler code for an instruction pattern. Most of the template is a fixed string which is output literally. The character ‘%’ is used to specify where to substitute an operand; it can also be used to identify places where different variants of the assembler require different syntax.
In the simplest case, a ‘%’ followed by a digit n says to output operand n at that point in the string.
‘%’ followed by a letter and a digit says to output an operand in an
alternate fashion. Four letters have standard, built-in meanings described
below. The machine description macro PRINT_OPERAND
can define
additional letters with nonstandard meanings.
‘%cdigit’ can be used to substitute an operand that is a constant value without the syntax that normally indicates an immediate operand.
‘%ndigit’ is like ‘%cdigit’ except that the value of the constant is negated before printing.
‘%adigit’ can be used to substitute an operand as if it were a memory reference, with the actual operand treated as the address. This may be useful when outputting a “load address” instruction, because often the assembler syntax for such an instruction requires you to write the operand as if it were a memory reference.
‘%ldigit’ is used to substitute a label_ref
into a jump
instruction.
‘%=’ outputs a number which is unique to each instruction in the entire compilation. This is useful for making local labels to be referred to more than once in a single template that generates multiple assembler instructions.
‘%’ followed by a punctuation character specifies a substitution that
does not use an operand. Only one case is standard: ‘%%’ outputs a
‘%’ into the assembler code. Other nonstandard cases can be
defined in the PRINT_OPERAND
macro. You must also define
which punctuation characters are valid with the
PRINT_OPERAND_PUNCT_VALID_P
macro.
The template may generate multiple assembler instructions. Write the text for the instructions, with ‘\;’ between them.
When the RTL contains two operands which are required by constraint to match each other, the output template must refer only to the lower-numbered operand. Matching operands are not always identical, and the rest of the compiler arranges to put the proper RTL expression for printing into the lower-numbered operand.
One use of nonstandard letters or punctuation following ‘%’ is to
distinguish between different assembler languages for the same machine; for
example, Motorola syntax versus MIT syntax for the 68000. Motorola syntax
requires periods in most opcode names, while MIT syntax does not. For
example, the opcode ‘movel’ in MIT syntax is ‘move.l’ in Motorola
syntax. The same file of patterns is used for both kinds of output syntax,
but the character sequence ‘%.’ is used in each place where Motorola
syntax wants a period. The PRINT_OPERAND
macro for Motorola syntax
defines the sequence to output a period; the macro for MIT syntax defines
it to do nothing.
As a special case, a template consisting of the single character #
instructs the compiler to first split the insn, and then output the
resulting instructions separately. This helps eliminate redundancy in the
output templates. If you have a define_insn
that needs to emit
multiple assembler instructions, and there is a matching define_split
already defined, then you can simply use #
as the output template
instead of writing an output template that emits the multiple assembler
instructions.
If the macro ASSEMBLER_DIALECT
is defined, you can use construct
of the form ‘{option0|option1|option2}’ in the templates. These
describe multiple variants of assembler language syntax.
See Instruction Output.
Often a single fixed template string cannot produce correct and efficient assembler code for all the cases that are recognized by a single instruction pattern. For example, the opcodes may depend on the kinds of operands; or some unfortunate combinations of operands may require extra machine instructions.
If the output control string starts with a ‘@’, then it is actually a series of templates, each on a separate line. (Blank lines and leading spaces and tabs are ignored.) The templates correspond to the pattern's constraint alternatives (see Multi-Alternative). For example, if a target machine has a two-address add instruction ‘addr’ to add into a register and another ‘addm’ to add a register to memory, you might write this pattern:
(define_insn "addsi3" [(set (match_operand:SI 0 "general_operand" "=r,m") (plus:SI (match_operand:SI 1 "general_operand" "0,0") (match_operand:SI 2 "general_operand" "g,r")))] "" "@ addr %2,%0 addm %2,%0")
If the output control string starts with a ‘*’, then it is not an
output template but rather a piece of C program that should compute a
template. It should execute a return
statement to return the
template-string you want. Most such templates use C string literals, which
require doublequote characters to delimit them. To include these
doublequote characters in the string, prefix each one with ‘\’.
If the output control string is written as a brace block instead of a double-quoted string, it is automatically assumed to be C code. In that case, it is not necessary to put in a leading asterisk, or to escape the doublequotes surrounding C string literals.
The operands may be found in the array operands
, whose C data type
is rtx []
.
It is very common to select different ways of generating assembler code
based on whether an immediate operand is within a certain range. Be
careful when doing this, because the result of INTVAL
is an
integer on the host machine. If the host machine has more bits in an
int
than the target machine has in the mode in which the constant
will be used, then some of the bits you get from INTVAL
will be
superfluous. For proper results, you must carefully disregard the
values of those bits.
It is possible to output an assembler instruction and then go on to output
or compute more of them, using the subroutine output_asm_insn
. This
receives two arguments: a template-string and a vector of operands. The
vector may be operands
, or it may be another array of rtx
that you declare locally and initialize yourself.
When an insn pattern has multiple alternatives in its constraints, often
the appearance of the assembler code is determined mostly by which alternative
was matched. When this is so, the C code can test the variable
which_alternative
, which is the ordinal number of the alternative
that was actually satisfied (0 for the first, 1 for the second alternative,
etc.).
For example, suppose there are two opcodes for storing zero, ‘clrreg’
for registers and ‘clrmem’ for memory locations. Here is how
a pattern could use which_alternative
to choose between them:
(define_insn "" [(set (match_operand:SI 0 "general_operand" "=r,m") (const_int 0))] "" { return (which_alternative == 0 ? "clrreg %0" : "clrmem %0"); })
The example above, where the assembler code to generate was solely determined by the alternative, could also have been specified as follows, having the output control string start with a ‘@’:
(define_insn "" [(set (match_operand:SI 0 "general_operand" "=r,m") (const_int 0))] "" "@ clrreg %0 clrmem %0")
If you just need a little bit of C code in one (or a few) alternatives, you can use ‘*’ inside of a ‘@’ multi-alternative template:
(define_insn "" [(set (match_operand:SI 0 "general_operand" "=r,<,m") (const_int 0))] "" "@ clrreg %0 * return stack_mem_p (operands[0]) ? \"push 0\" : \"clrmem %0\"; clrmem %0")
A predicate determines whether a match_operand
or
match_operator
expression matches, and therefore whether the
surrounding instruction pattern will be used for that combination of
operands. GCC has a number of machine-independent predicates, and you
can define machine-specific predicates as needed. By convention,
predicates used with match_operand
have names that end in
‘_operand’, and those used with match_operator
have names
that end in ‘_operator’.
All predicates are Boolean functions (in the mathematical sense) of
two arguments: the RTL expression that is being considered at that
position in the instruction pattern, and the machine mode that the
match_operand
or match_operator
specifies. In this
section, the first argument is called op and the second argument
mode. Predicates can be called from C as ordinary two-argument
functions; this can be useful in output templates or other
machine-specific code.
Operand predicates can allow operands that are not actually acceptable to the hardware, as long as the constraints give reload the ability to fix them up (see Constraints). However, GCC will usually generate better code if the predicates specify the requirements of the machine instructions as closely as possible. Reload cannot fix up operands that must be constants (“immediate operands”); you must use a predicate that allows only constants, or else enforce the requirement in the extra condition.
Most predicates handle their mode argument in a uniform manner.
If mode is VOIDmode
(unspecified), then op can have
any mode. If mode is anything else, then op must have the
same mode, unless op is a CONST_INT
or integer
CONST_DOUBLE
. These RTL expressions always have
VOIDmode
, so it would be counterproductive to check that their
mode matches. Instead, predicates that accept CONST_INT
and/or
integer CONST_DOUBLE
check that the value stored in the
constant will fit in the requested mode.
Predicates with this behavior are called normal. genrecog can optimize the instruction recognizer based on knowledge of how normal predicates treat modes. It can also diagnose certain kinds of common errors in the use of normal predicates; for instance, it is almost always an error to use a normal predicate without specifying a mode.
Predicates that do something different with their mode argument
are called special. The generic predicates
address_operand
and pmode_register_operand
are special
predicates. genrecog does not do any optimizations or
diagnosis when special predicates are used.
These are the generic predicates available to all back ends. They are defined in recog.c. The first category of predicates allow only constant, or immediate, operands.
This predicate allows any sort of constant that fits in mode. It is an appropriate choice for instructions that take operands that must be constant.
This predicate allows any
CONST_INT
expression that fits in mode. It is an appropriate choice for an immediate operand that does not allow a symbol or label.
This predicate accepts any
CONST_DOUBLE
expression that has exactly mode. If mode isVOIDmode
, it will also acceptCONST_INT
. It is intended for immediate floating point constants.
The second category of predicates allow only some kind of machine register.
This predicate allows any
REG
orSUBREG
expression that is valid for mode. It is often suitable for arithmetic instruction operands on a RISC machine.
This is a slight variant on
register_operand
which works around a limitation in the machine-description reader.(match_operand n "pmode_register_operand" constraint)means exactly what
(match_operand:P n "register_operand" constraint)would mean, if the machine-description reader accepted ‘:P’ mode suffixes. Unfortunately, it cannot, because
Pmode
is an alias for some other mode, and might vary with machine-specific options. See Misc.
This predicate allows hard registers and
SCRATCH
expressions, but not pseudo-registers. It is used internally bymatch_scratch
; it should not be used directly.
The third category of predicates allow only some kind of memory reference.
This predicate allows any valid reference to a quantity of mode mode in memory, as determined by the weak form of
GO_IF_LEGITIMATE_ADDRESS
(see Addressing Modes).
This predicate is a little unusual; it allows any operand that is a valid expression for the address of a quantity of mode mode, again determined by the weak form of
GO_IF_LEGITIMATE_ADDRESS
. To first order, if ‘(mem:mode (exp))’ is acceptable tomemory_operand
, then exp is acceptable toaddress_operand
. Note that exp does not necessarily have the mode mode.
This is a stricter form of
memory_operand
which allows only memory references with ageneral_operand
as the address expression. New uses of this predicate are discouraged, becausegeneral_operand
is very permissive, so it's hard to tell what anindirect_operand
does or does not allow. If a target has different requirements for memory operands for different instructions, it is better to define target-specific predicates which enforce the hardware's requirements explicitly.
This predicate allows a memory reference suitable for pushing a value onto the stack. This will be a
MEM
which refers tostack_pointer_rtx
, with a side-effect in its address expression (see Incdec); which one is determined by theSTACK_PUSH_CODE
macro (see Frame Layout).
This predicate allows a memory reference suitable for popping a value off the stack. Again, this will be a
MEM
referring tostack_pointer_rtx
, with a side-effect in its address expression. However, this timeSTACK_POP_CODE
is expected.
The fourth category of predicates allow some combination of the above operands.
This predicate allows any immediate or register operand valid for mode.
This predicate allows any register or memory operand valid for mode.
This predicate allows any immediate, register, or memory operand valid for mode.
Finally, there are two generic operator predicates.
This predicate matches any expression which performs an arithmetic comparison in mode; that is,
COMPARISON_P
is true for the expression code.
This predicate matches any expression which performs an arithmetic comparison in mode and whose expression code is valid for integer modes; that is, the expression code will be one of
eq
,ne
,lt
,ltu
,le
,leu
,gt
,gtu
,ge
,geu
.
Many machines have requirements for their operands that cannot be
expressed precisely using the generic predicates. You can define
additional predicates using define_predicate
and
define_special_predicate
expressions. These expressions have
three operands:
match_operand
or match_operator
expressions.
MATCH_OPERAND
MATCH_OPERAND
expression evaluates to true if the predicate it names would allow
op. The operand number and constraint are ignored. Due to
limitations in genrecog, you can only refer to generic
predicates and predicates that have already been defined.
MATCH_CODE
The first operand of this expression is a string constant containing a
comma-separated list of RTX code names (in lower case). These are the
codes for which the MATCH_CODE
will be true.
The second operand is a string constant which indicates what
subexpression of op to examine. If it is absent or the empty
string, op itself is examined. Otherwise, the string constant
must be a sequence of digits and/or lowercase letters. Each character
indicates a subexpression to extract from the current expression; for
the first character this is op, for the second and subsequent
characters it is the result of the previous character. A digit
n extracts ‘XEXP (e, n)’; a letter l
extracts ‘XVECEXP (e, 0, n)’ where n is the
alphabetic ordinal of l (0 for `a', 1 for 'b', and so on). The
MATCH_CODE
then examines the RTX code of the subexpression
extracted by the complete string. It is not possible to extract
components of an rtvec
that is not at position 0 within its RTX
object.
MATCH_TEST
MATCH_TEST
evaluates to true if the C expression evaluates to a nonzero value.
MATCH_TEST
expressions must not have side effects.
AND
IOR
NOT
IF_THEN_ELSE
AND
or IOR
expression an
arbitrary number of arguments; this has exactly the same effect as
writing a chain of two-argument AND
or IOR
expressions.
If a code block is present in a predicate definition, then the RTL expression must evaluate to true and the code block must execute ‘return true’ for the predicate to allow the operand. The RTL expression is evaluated first; do not re-check anything in the code block that was checked in the RTL expression.
The program genrecog scans define_predicate
and
define_special_predicate
expressions to determine which RTX
codes are possibly allowed. You should always make this explicit in
the RTL predicate expression, using MATCH_OPERAND
and
MATCH_CODE
.
Here is an example of a simple predicate definition, from the IA64 machine description:
;; True if op is a SYMBOL_REF
which refers to the sdata section.
(define_predicate "small_addr_symbolic_operand"
(and (match_code "symbol_ref")
(match_test "SYMBOL_REF_SMALL_ADDR_P (op)")))
And here is another, showing the use of the C block.
;; True if op is a register operand that is (or could be) a GR reg. (define_predicate "gr_register_operand" (match_operand 0 "register_operand") { unsigned int regno; if (GET_CODE (op) == SUBREG) op = SUBREG_REG (op); regno = REGNO (op); return (regno >= FIRST_PSEUDO_REGISTER || GENERAL_REGNO_P (regno)); })
Predicates written with define_predicate
automatically include
a test that mode is VOIDmode
, or op has the same
mode as mode, or op is a CONST_INT
or
CONST_DOUBLE
. They do not check specifically for
integer CONST_DOUBLE
, nor do they test that the value of either
kind of constant fits in the requested mode. This is because
target-specific predicates that take constants usually have to do more
stringent value checks anyway. If you need the exact same treatment
of CONST_INT
or CONST_DOUBLE
that the generic predicates
provide, use a MATCH_OPERAND
subexpression to call
const_int_operand
, const_double_operand
, or
immediate_operand
.
Predicates written with define_special_predicate
do not get any
automatic mode checks, and are treated as having special mode handling
by genrecog.
The program genpreds is responsible for generating code to test predicates. It also writes a header file containing function declarations for all machine-specific predicates. It is not necessary to declare these predicates in cpu-protos.h.
Each match_operand
in an instruction pattern can specify
constraints for the operands allowed. The constraints allow you to
fine-tune matching within the set of operands allowed by the
predicate.
Constraints can say whether
an operand may be in a register, and which kinds of register; whether the
operand can be a memory reference, and which kinds of address; whether the
operand may be an immediate constant, and which possible values it may
have. Constraints can also require two operands to match.
Side-effects aren't allowed in operands of inline asm
, unless
‘<’ or ‘>’ constraints are used, because there is no guarantee
that the side-effects will happen exactly once in an instruction that can update
the addressing register.
The simplest kind of constraint is a string full of letters, each of which describes one kind of operand that is permitted. Here are the letters that are allowed:
TARGET_MEM_CONSTRAINT
macro.
For example, an address which is constant is offsettable; so is an address that is the sum of a register and a constant (as long as a slightly larger constant is also within the range of address-offsets supported by the machine); but an autoincrement or autodecrement address is not offsettable. More complicated indirect/indexed addresses may or may not be offsettable depending on the other addressing modes that the machine supports.
Note that in an output operand which can be matched by another operand, the constraint letter ‘o’ is valid only when accompanied by both ‘<’ (if the target machine has predecrement addressing) and ‘>’ (if the target machine has preincrement addressing).
asm
this constraint is only
allowed if the operand is used exactly once in an instruction that can
handle the side-effects. Not using an operand with ‘<’ in constraint
string in the inline asm
pattern at all or using it in multiple
instructions isn't valid, because the side-effects wouldn't be performed
or would be performed more than once. Furthermore, on some targets
the operand with ‘<’ in constraint string must be accompanied by
special instruction suffixes like %U0
instruction suffix on PowerPC
or %P0
on IA-64.
asm
the same restrictions
as for ‘<’ apply.
const_double
) is
allowed, but only if the target floating point format is the same as
that of the host machine (on which the compiler is running).
const_double
or
const_vector
) is allowed.
This might appear strange; if an insn allows a constant operand with a value not known at compile time, it certainly must allow any known value. So why use ‘s’ instead of ‘i’? Sometimes it allows better code to be generated.
For example, on the 68000 in a fullword instruction it is possible to use an immediate operand; but if the immediate value is between −128 and 127, better code results from loading the value into a register and using the register. This is because the load into the register can be done with a ‘moveq’ instruction. We arrange for this to happen by defining the letter ‘K’ to mean “any integer outside the range −128 to 127”, and then specifying ‘Ks’ in the operand constraints.
general_operand
. This is normally used in the constraint of
a match_scratch
when certain alternatives will not actually
require a scratch register.
This number is allowed to be more than a single digit. If multiple digits are encountered consecutively, they are interpreted as a single decimal integer. There is scant chance for ambiguity, since to-date it has never been desirable that ‘10’ be interpreted as matching either operand 1 or operand 0. Should this be desired, one can use multiple alternatives instead.
This is called a matching constraint and what it really means is that the assembler has only a single operand that fills two roles considered separate in the RTL insn. For example, an add insn has two input operands and one output operand in the RTL, but on most CISC machines an add instruction really has only two operands, one of them an input-output operand:
addl #35,r12
Matching constraints are used in these circumstances. More precisely, the two operands that match must include one input-only operand and one output-only operand. Moreover, the digit must be a smaller number than the number of the operand that uses it in the constraint.
For operands to match in a particular case usually means that they
are identical-looking RTL expressions. But in a few special cases
specific kinds of dissimilarity are allowed. For example, *x
as an input operand will match *x++
as an output operand.
For proper results in such cases, the output template should always
use the output-operand's number when printing the operand.
‘p’ in the constraint must be accompanied by address_operand
as the predicate in the match_operand
. This predicate interprets
the mode specified in the match_operand
as the mode of the memory
reference for which the address would be valid.
In order to have valid assembler code, each operand must satisfy its constraint. But a failure to do so does not prevent the pattern from applying to an insn. Instead, it directs the compiler to modify the code so that the constraint will be satisfied. Usually this is done by copying an operand into a register.
Contrast, therefore, the two instruction patterns that follow:
(define_insn "" [(set (match_operand:SI 0 "general_operand" "=r") (plus:SI (match_dup 0) (match_operand:SI 1 "general_operand" "r")))] "" "...")
which has two operands, one of which must appear in two places, and
(define_insn "" [(set (match_operand:SI 0 "general_operand" "=r") (plus:SI (match_operand:SI 1 "general_operand" "0") (match_operand:SI 2 "general_operand" "r")))] "" "...")
which has three operands, two of which are required by a constraint to be identical. If we are considering an insn of the form
(insn n prev next (set (reg:SI 3) (plus:SI (reg:SI 6) (reg:SI 109))) ...)
the first pattern would not apply at all, because this insn does not contain two identical subexpressions in the right place. The pattern would say, “That does not look like an add instruction; try other patterns”. The second pattern would say, “Yes, that's an add instruction, but there is something wrong with it”. It would direct the reload pass of the compiler to generate additional insns to make the constraint true. The results might look like this:
(insn n2 prev n (set (reg:SI 3) (reg:SI 6)) ...) (insn n n2 next (set (reg:SI 3) (plus:SI (reg:SI 3) (reg:SI 109))) ...)
It is up to you to make sure that each operand, in each pattern, has constraints that can handle any RTL expression that could be present for that operand. (When multiple alternatives are in use, each pattern must, for each possible combination of operand expressions, have at least one alternative which can handle that combination of operands.) The constraints don't need to allow any possible operand—when this is the case, they do not constrain—but they must at least point the way to reloading any possible operand so that it will fit.
For example, an operand whose constraints permit everything except registers is safe provided its predicate rejects registers.
An operand whose predicate accepts only constant values is safe provided its constraints include the letter ‘i’. If any possible constant value is accepted, then nothing less than ‘i’ will do; if the predicate is more selective, then the constraints may also be more selective.
If the operand's predicate can recognize registers, but the constraint does not permit them, it can make the compiler crash. When this operand happens to be a register, the reload pass will be stymied, because it does not know how to copy a register temporarily into memory.
If the predicate accepts a unary operator, the constraint applies to the
operand. For example, the MIPS processor at ISA level 3 supports an
instruction which adds two registers in SImode
to produce a
DImode
result, but only if the registers are correctly sign
extended. This predicate for the input operands accepts a
sign_extend
of an SImode
register. Write the constraint
to indicate the type of register that is required for the operand of the
sign_extend
.
Sometimes a single instruction has multiple alternative sets of possible operands. For example, on the 68000, a logical-or instruction can combine register or an immediate value into memory, or it can combine any kind of operand into a register; but it cannot combine one memory location into another.
These constraints are represented as multiple alternatives. An alternative can be described by a series of letters for each operand. The overall constraint for an operand is made from the letters for this operand from the first alternative, a comma, the letters for this operand from the second alternative, a comma, and so on until the last alternative. All operands for a single instruction must have the same number of alternatives. Here is how it is done for fullword logical-or on the 68000:
(define_insn "iorsi3" [(set (match_operand:SI 0 "general_operand" "=m,d") (ior:SI (match_operand:SI 1 "general_operand" "%0,0") (match_operand:SI 2 "general_operand" "dKs,dmKs")))] ...)
The first alternative has ‘m’ (memory) for operand 0, ‘0’ for operand 1 (meaning it must match operand 0), and ‘dKs’ for operand 2. The second alternative has ‘d’ (data register) for operand 0, ‘0’ for operand 1, and ‘dmKs’ for operand 2. The ‘=’ and ‘%’ in the constraints apply to all the alternatives; their meaning is explained in the next section (see Class Preferences).
If all the operands fit any one alternative, the instruction is valid. Otherwise, for each alternative, the compiler counts how many instructions must be added to copy the operands so that that alternative applies. The alternative requiring the least copying is chosen. If two alternatives need the same amount of copying, the one that comes first is chosen. These choices can be altered with the ‘?’ and ‘!’ characters:
?
!
^
$
When an insn pattern has multiple alternatives in its constraints, often
the appearance of the assembler code is determined mostly by which
alternative was matched. When this is so, the C code for writing the
assembler code can use the variable which_alternative
, which is
the ordinal number of the alternative that was actually satisfied (0 for
the first, 1 for the second alternative, etc.). See Output Statement.
The operand constraints have another function: they enable the compiler to decide which kind of hardware register a pseudo register is best allocated to. The compiler examines the constraints that apply to the insns that use the pseudo register, looking for the machine-dependent letters such as ‘d’ and ‘a’ that specify classes of registers. The pseudo register is put in whichever class gets the most “votes”. The constraint letters ‘g’ and ‘r’ also vote: they vote in favor of a general register. The machine description says which registers are considered general.
Of course, on some machines all registers are equivalent, and no register classes are defined. Then none of this complexity is relevant.
Here are constraint modifier characters.
When the compiler fixes up the operands to satisfy the constraints, it needs to know which operands are read by the instruction and which are written by it. ‘=’ identifies an operand which is only written; ‘+’ identifies an operand that is both read and written; all other operands are assumed to only be read.
If you specify ‘=’ or ‘+’ in a constraint, you put it in the first character of the constraint string.
‘&’ applies only to the alternative in which it is written. In constraints with multiple alternatives, sometimes one alternative requires ‘&’ while others do not. See, for example, the ‘movdf’ insn of the 68000.
A operand which is read by the instruction can be tied to an earlyclobber operand if its only use as an input occurs before the early result is written. Adding alternatives of this form often allows GCC to produce better code when only some of the read operands can be affected by the earlyclobber. See, for example, the ‘mulsi3’ insn of the ARM.
Furthermore, if the earlyclobber operand is also a read/write operand, then that operand is written only after it's used.
‘&’ does not obviate the need to write ‘=’ or ‘+’. As earlyclobber operands are always written, a read-only earlyclobber operand is ill-formed and will be rejected by the compiler.
This is often used in patterns for addition instructions that really have only two operands: the result must go in one of the arguments. Here for example, is how the 68000 halfword-add instruction is defined:
(define_insn "addhi3" [(set (match_operand:HI 0 "general_operand" "=m,r") (plus:HI (match_operand:HI 1 "general_operand" "%0,0") (match_operand:HI 2 "general_operand" "di,g")))] ...)
GCC can only handle one commutative pair in an asm; if you use more,
the compiler may fail. Note that you need not use the modifier if
the two alternatives are strictly identical; this would only waste
time in the reload pass.
The modifier is not operational after
register allocation, so the result of define_peephole2
and define_split
s performed after reload cannot rely on
‘%’ to make the intended insn match.
Here is an example: the 68000 has an instruction to sign-extend a halfword in a data register, and can also sign-extend a value by copying it into an address register. While either kind of register is acceptable, the constraints on an address-register destination are less strict, so it is best if register allocation makes an address register its goal. Therefore, ‘*’ is used so that the ‘d’ constraint letter (for data register) is ignored when computing register preferences.
(define_insn "extendhisi2" [(set (match_operand:SI 0 "general_operand" "=*d,a") (sign_extend:SI (match_operand:HI 1 "general_operand" "0,g")))] ...)
Whenever possible, you should use the general-purpose constraint letters
in asm
arguments, since they will convey meaning more readily to
people reading your code. Failing that, use the constraint letters
that usually have very similar meanings across architectures. The most
commonly used constraints are ‘m’ and ‘r’ (for memory and
general-purpose registers respectively; see Simple Constraints), and
‘I’, usually the letter indicating the most common
immediate-constant format.
Each architecture defines additional constraints. These constraints
are used by the compiler itself for instruction generation, as well as
for asm
statements; therefore, some of the constraints are not
particularly useful for asm
. Here is a summary of some of the
machine-dependent constraints available on some particular machines;
it includes both constraints that are useful for asm
and
constraints that aren't. The compiler source file mentioned in the
table heading for each architecture is the definitive reference for
the meanings of that architecture's constraints.
k
SP
)
w
I
ADD
instruction
J
SUB
instruction (once negated)
K
L
M
MOV
pseudo instruction. The MOV
may be assembled to one of several different
machine instructions depending on the value
N
MOV
pseudo instruction
S
Y
Z
Ush
Q
Ump
q
r0
-r3
,
r12
-r15
. This constraint can only match when the -mq
option is in effect.
e
r0
-r3
, r12
-r15
, sp
.
This constraint can only match when the -mq
option is in effect.
D
D0
, D1
.
I
Cal
K
L
CnL
CmL
M
O
P
H
h
r8
-r15
.
k
l
r0
-r7
. In ARM state this
is an alias for the r
constraint.
t
s0
-s31
. Used for 32 bit values.
w
d0
-d31
and the appropriate
subset d0
-d15
based on command line options.
Used for 64 bit values only. Not valid for Thumb1.
y
z
G
I
J
K
L
M
Q
asm
statements)
R
S
Uv
Uy
Uq
l
a
d
w
e
b
q
t
x
y
z
I
J
K
L
M
N
O
P
G
Q
a
d
z
q
nA
, then the register P0.
D
W
e
A
B
b
v
f
c
C
t
k
u
x
y
w
Ksh
Kuh
Ks7
Ku7
Ku5
Ks4
Ks3
Ku3
P
nPA
PB
M1
M2
J
L
H
Q
b
t
p
I
J
K
L
M
N
G
U16
K
L
Cm1
Cl1
Cr1
Cal
i
, except that for position independent code,
no symbols / expressions needing relocations are allowed.
Csy
Rcs
Rsc
Rct
Rgs
Car
Rra
Rcc
Sra
Cfm
UNSPEC_FP_MODE
.
a
ACC_REGS
(acc0
to acc7
).
b
EVEN_ACC_REGS
(acc0
to acc7
).
c
CC_REGS
(fcc0
to fcc3
and
icc0
to icc3
).
d
GPR_REGS
(gr0
to gr63
).
e
EVEN_REGS
(gr0
to gr63
).
Odd registers are excluded not in the class but through the use of a machine
mode larger than 4 bytes.
f
FPR_REGS
(fr0
to fr63
).
h
FEVEN_REGS
(fr0
to fr63
).
Odd registers are excluded not in the class but through the use of a machine
mode larger than 4 bytes.
l
LR_REG
(the lr
register).
q
QUAD_REGS
(gr2
to gr63
).
Register numbers not divisible by 4 are excluded not in the class but through
the use of a machine mode larger than 8 bytes.
t
ICC_REGS
(icc0
to icc3
).
u
FCC_REGS
(fcc0
to fcc3
).
v
ICR_REGS
(cc4
to cc7
).
w
FCR_REGS
(cc0
to cc3
).
x
QUAD_FPR_REGS
(fr0
to fr63
).
Register numbers not divisible by 4 are excluded not in the class but through
the use of a machine mode larger than 8 bytes.
z
SPR_REGS
(lcr
and lr
).
A
QUAD_ACC_REGS
(acc0
to acc7
).
B
ACCG_REGS
(accg0
to accg7
).
C
CR_REGS
(cc0
to cc7
).
G
I
J
L
M
N
O
P
A
B
W
e
f
O
I
w
x
L
S
b
KA
a
f
q
x
y
Z
I
J
K
zdepi
instruction
L
M
N
ldil
instruction
O
P
and
operations in depi
and extru
instructions
S
U
G
A
lo_sum
data-linkage-table memory operand
Q
R
T
W
a
r0
to r3
for addl
instruction
b
c
d
e
f
m
G
I
J
K
L
M
N
O
P
dep
instruction
Q
R
shladd
instruction
S
Rsp
Rfb
Rsb
Rcr
Rcl
R0w
R1w
R2w
R3w
R02
R13
Rdi
Rhl
R23
Raa
Raw
Ral
Rqi
Rad
Rsi
Rhi
Rhc
Rra
Rfl
Rmm
Rpi
Rpa
Is3
IS1
IS2
IU2
In4
In5
In6
IM2
Ilb
Ilw
Sd
Sa
Si
Ss
Sf
Ss
S1
a
b
c
d
em
ex
er
h
j
l
t
v
x
y
z
A
B
C
D
I
J
K
L
M
N
O
S
T
U
W
Y
Z
d
r0
to r31
).
z
rmsr
, $fcc1
to $fcc7
).
d
r
unless
generating MIPS16 code.
f
h
hi
register. This constraint is no longer supported.
l
lo
register. Use this register to store values that are
no bigger than a word.
x
hi
and lo
registers. Use this register
to store doubleword values.
c
$25
for -mabicalls.
v
$3
. Do not use this constraint in new code;
it is retained only for compatibility with glibc.
y
r
; retained for backwards compatibility.
z
I
J
K
L
lui
.
M
lui
, addiu
or ori
.
N
O
P
G
R
ZC
ll
and sc
.
ZD
prefetch
instruction, or for any other
instruction with the same addressing mode as prefetch
.
a
d
f
I
J
K
L
M
N
O
P
R
G
S
T
Q
U
W
Cs
Ci
C0
Cj
Cmvq
Capsw
Cmvz
Cmvs
Ap
Ac
A
B
W
I
N
R12
R13
K
L
M
Ya
Yl
Ys
w
l
d
h
t
k
Iu03
In03
Iu04
Is05
Iu05
In05
Ip05
Iu06
Iu08
Iu09
Is10
Is11
Is15
Iu15
Ic15
Ie15
It15
Ii15
Is16
Is17
Is19
Is20
Ihig
Izeb
Izeh
Ixls
Ix11
Ibms
Ifex
U33
U45
U37
I
J
K
L
M
z
to use r0
instead of 0
in the assembly output.
N
P
S
gp
as a 16-bit immediate to re-create their 32-bit value.
U
v
w
T
const
wrapped UNSPEC
expression,
representing a supported PIC or TLS relocation.
a
d
f
G
I
J
K
L
M
N
O
Q
R
b
d
f
v
wa
When using any of the register constraints (wa
, wd
,
wf
, wg
, wh
, wi
, wj
, wk
,
wl
, wm
, wo
, wp
, wq
, ws
,
wt
, wu
, wv
, ww
, or wy
)
that take VSX registers, you must use %x<n>
in the template so
that the correct register is used. Otherwise the register number
output in the assembly file will be incorrect if an Altivec register
is an operand of a VSX instruction that expects VSX register
numbering.
asm ("xvadddp %x0,%x1,%x2" : "=wa" (v1) : "wa" (v2), "wa" (v3));
is correct, but:
asm ("xvadddp %0,%1,%2" : "=wa" (v1) : "wa" (v2), "wa" (v3));
is not correct.
If an instruction only takes Altivec registers, you do not want to use
%x<n>
.
asm ("xsaddqp %0,%1,%2" : "=v" (v1) : "v" (v2), "v" (v3));
is correct because the xsaddqp
instruction only takes Altivec
registers, while:
asm ("xsaddqp %x0,%x1,%x2" : "=v" (v1) : "v" (v2), "v" (v3));
is incorrect.
wb
wd
we
wf
wg
wh
wi
wj
wk
wl
wm
wn
wo
wp
wq
wr
ws
wt
wu
wv
ww
wx
wy
wz
wA
wD
wE
wF
wG
wL
wM
wO
wQ
lq
and stq
instructions.
wS
h
c
l
x
y
z
I
J
SImode
constants)
K
L
M
N
O
P
G
H
m
m
does not allow addresses that update the base register.
If ‘<’ or ‘>’ constraint is also used, they are allowed and
therefore on PowerPC targets in that case it is only safe
to use ‘m<>’ in an asm
statement if that asm
statement
accesses the operand exactly once. The asm
statement must also
use ‘%U<opno>’ as a placeholder for the “update” flag in the
corresponding load or store instruction. For example:
asm ("st%U0 %1,%0" : "=m<>" (mem) : "r" (val));
is correct but:
asm ("st %1,%0" : "=m<>" (mem) : "r" (val));
is not.
es
Q
asm
statements)
Z
asm
statements)
R
a
asm
statements)
U
W
j
Int3
Int8
J
K
L
M
N
O
P
Qbi
Qsc
Wab
Wbc
BC
as a base register, with an optional offset.
Wca
AX
, BC
, DE
, or HL
for the address, for calls.
Wcv
Wd2
DE
as a base register, with an optional offset.
Wde
DE
as a base register, without any offset.
Wfr
Wh1
HL
as a base register, with an optional one-byte offset.
Whb
HL
as a base register, with B
or C
as the index register.
Whl
HL
as a base register, without any offset.
Ws1
SP
as a base register, with an optional one-byte offset.
Y
A
AX
register.
B
BC
register.
D
DE
register.
R
A
through L
registers.
S
SP
register.
T
HL
register.
Z08W
R8
register.
Z10W
R10
register.
Zint
R24
to R31
).
a
A
register.
b
B
register.
c
C
register.
d
D
register.
e
E
register.
h
H
register.
l
L
register.
v
w
PSW
register.
x
X
register.
Q
Symbol
Int08
Sint08
Sint16
Sint24
Uint04
a
c
d
f
I
J
K
L
(0..4095)
(−524288..524287)
M
N
0..9:
H,Q:
D,S,H:
0,F:
Q
R
S
T
U
W
Y
f
e
c
d
b
h
C
A
D
I
J
K
sethi
instruction)
L
movcc
instructions (11-bit
signed immediate)
M
movrcc
instructions (10-bit
signed immediate)
N
SImode
O
G
H
P
Q
R
S
T
U
W
w
Y
a
c
d
iohl
instruction. const_int is treated as a 64 bit value.
f
fsmbi
.
A
B
C
D
iohl
instruction. const_int is treated as a 32 bit value.
I
J
K
M
stop
.
N
iohl
and fsmbi
.
O
P
R
S
T
U
W
Y
Z
iohl
instruction. const_int is sign extended to 128 bit.
a
b
A
B
C
Da
Db
Iu4
Iu5
In5
Is5
I5x
IuB
IsB
IsC
Jc
Js
Q
R
S0
S1
SYMBOL_REF
, for use in a call address.
Si
T
W
Z
R00
R01
R02
R03
R04
R05
R06
R07
R08
R09
R10
I
J
K
L
m
asm ("st_add %I0,%1,%i0" : "=m<>" (*mem) : "r" (val));
M
N
O
P
Q
S
T
U
W
Y
Z0
Z1
R00
R01
R02
R03
R04
R05
R06
R07
R08
R09
R10
I
J
K
L
m
asm ("swadd %I0,%1,%i0" : "=m<>" (mem) : "r" (val));
M
N
O
P
Q
T
U
W
Y
b
mdb
c
mdc
f
k
l
r29
, r30
and r31
t
r1
u
r2
v
r3
G
J
K
L
M
O
P
R
a
, b
, c
, d
,
si
, di
, bp
, sp
).
q
l
. In 32-bit mode, a
,
b
, c
, and d
; in 64-bit mode, any integer register.
Q
h
: a
, b
,
c
, and d
.
l
a
a
register.
b
b
register.
c
c
register.
d
d
register.
S
si
register.
D
di
register.
A
a
and d
registers. This class is used for instructions
that return double word results in the ax:dx
register pair. Single
word values will be allocated either in ax
or dx
.
For example on i386 the following implements rdtsc
:
unsigned long long rdtsc (void) { unsigned long long tick; __asm__ __volatile__("rdtsc":"=A"(tick)); return tick; }
This is not correct on x86-64 as it would allocate tick in either ax
or dx
. You have to use the following variant instead:
unsigned long long rdtsc (void) { unsigned int tickl, tickh; __asm__ __volatile__("rdtsc":"=a"(tickl),"=d"(tickh)); return ((unsigned long long)tickh << 32)|tickl; }
f
t
%st(0)
).
u
%st(1)
).
y
x
Yz
%xmm0
).
Y2
Yi
Ym
I
J
K
L
0xFF
or 0xFFFF
, for andsi as a zero-extending move.
M
lea
instruction).
N
in
and out
instructions).
O
G
C
e
Z
a
b
c
d
e
t
y
z
I
J
K
L
M
N
O
P
Q
R
S
T
U
Z
a
b
A
I
J
K
L
enabled
attributeThere are three insn attributes that may be used to selectively disable instruction alternatives:
enabled
preferred_for_size
preferred_for_speed
All these attributes should use (const_int 1)
to allow an alternative
or (const_int 0)
to disallow it. The attributes must be a static
property of the subtarget; they cannot for example depend on the
current operands, on the current optimization level, on the location
of the insn within the body of a loop, on whether register allocation
has finished, or on the current compiler pass.
The enabled
attribute is a correctness property. It tells GCC to act
as though the disabled alternatives were never defined in the first place.
This is useful when adding new instructions to an existing pattern in
cases where the new instructions are only available for certain cpu
architecture levels (typically mapped to the -march=
command-line
option).
In contrast, the preferred_for_size
and preferred_for_speed
attributes are strong optimization hints rather than correctness properties.
preferred_for_size
tells GCC which alternatives to consider when
adding or modifying an instruction that GCC wants to optimize for size.
preferred_for_speed
does the same thing for speed. Note that things
like code motion can lead to cases where code optimized for size uses
alternatives that are not preferred for size, and similarly for speed.
Although define_insn
s can in principle specify the enabled
attribute directly, it is often clearer to have subsiduary attributes
for each architectural feature of interest. The define_insn
s
can then use these subsiduary attributes to say which alternatives
require which features. The example below does this for cpu_facility
.
E.g. the following two patterns could easily be merged using the enabled
attribute:
(define_insn "*movdi_old" [(set (match_operand:DI 0 "register_operand" "=d") (match_operand:DI 1 "register_operand" " d"))] "!TARGET_NEW" "lgr %0,%1") (define_insn "*movdi_new" [(set (match_operand:DI 0 "register_operand" "=d,f,d") (match_operand:DI 1 "register_operand" " d,d,f"))] "TARGET_NEW" "@ lgr %0,%1 ldgr %0,%1 lgdr %0,%1")
to:
(define_insn "*movdi_combined" [(set (match_operand:DI 0 "register_operand" "=d,f,d") (match_operand:DI 1 "register_operand" " d,d,f"))] "" "@ lgr %0,%1 ldgr %0,%1 lgdr %0,%1" [(set_attr "cpu_facility" "*,new,new")])
with the enabled
attribute defined like this:
(define_attr "cpu_facility" "standard,new" (const_string "standard")) (define_attr "enabled" "" (cond [(eq_attr "cpu_facility" "standard") (const_int 1) (and (eq_attr "cpu_facility" "new") (ne (symbol_ref "TARGET_NEW") (const_int 0))) (const_int 1)] (const_int 0)))
Machine-specific constraints fall into two categories: register and
non-register constraints. Within the latter category, constraints
which allow subsets of all possible memory or address operands should
be specially marked, to give reload
more information.
Machine-specific constraints can be given names of arbitrary length, but they must be entirely composed of letters, digits, underscores (‘_’), and angle brackets (‘< >’). Like C identifiers, they must begin with a letter or underscore.
In order to avoid ambiguity in operand constraint strings, no
constraint can have a name that begins with any other constraint's
name. For example, if x
is defined as a constraint name,
xy
may not be, and vice versa. As a consequence of this rule,
no constraint may begin with one of the generic constraint letters:
‘E F V X g i m n o p r s’.
Register constraints correspond directly to register classes. See Register Classes. There is thus not much flexibility in their definitions.
All three arguments are string constants. name is the name of the constraint, as it will appear in
match_operand
expressions. If name is a multi-letter constraint its length shall be the same for all constraints starting with the same letter. regclass can be either the name of the corresponding register class (see Register Classes), or a C expression which evaluates to the appropriate register class. If it is an expression, it must have no side effects, and it cannot look at the operand. The usual use of expressions is to map some register constraints toNO_REGS
when the register class is not available on a given subarchitecture.docstring is a sentence documenting the meaning of the constraint. Docstrings are explained further below.
Non-register constraints are more like predicates: the constraint definition gives a Boolean expression which indicates whether the constraint matches.
The name and docstring arguments are the same as for
define_register_constraint
, but note that the docstring comes immediately after the name for these expressions. exp is an RTL expression, obeying the same rules as the RTL expressions in predicate definitions. See Defining Predicates, for details. If it evaluates true, the constraint matches; if it evaluates false, it doesn't. Constraint expressions should indicate which RTL codes they might match, just like predicate expressions.
match_test
C expressions have access to the following variables:
- op
- The RTL object defining the operand.
- mode
- The machine mode of op.
- ival
- ‘INTVAL (op)’, if op is a
const_int
.- hval
- ‘CONST_DOUBLE_HIGH (op)’, if op is an integer
const_double
.- lval
- ‘CONST_DOUBLE_LOW (op)’, if op is an integer
const_double
.- rval
- ‘CONST_DOUBLE_REAL_VALUE (op)’, if op is a floating-point
const_double
.The *val variables should only be used once another piece of the expression has verified that op is the appropriate kind of RTL object.
Most non-register constraints should be defined with
define_constraint
. The remaining two definition expressions
are only appropriate for constraints that should be handled specially
by reload
if they fail to match.
Use this expression for constraints that match a subset of all memory operands: that is,
reload
can make them match by converting the operand to the form ‘(mem (reg X))’, where X is a base register (from the register class specified byBASE_REG_CLASS
, see Register Classes).For example, on the S/390, some instructions do not accept arbitrary memory references, but only those that do not make use of an index register. The constraint letter ‘Q’ is defined to represent a memory address of this type. If ‘Q’ is defined with
define_memory_constraint
, a ‘Q’ constraint can handle any memory operand, becausereload
knows it can simply copy the memory address into a base register if required. This is analogous to the way an ‘o’ constraint can handle any memory operand.The syntax and semantics are otherwise identical to
define_constraint
.
Use this expression for constraints that match a subset of all memory operands: that is,
reload
can not make them match by reloading the address as it is described fordefine_memory_constraint
or such address reload is undesirable with the performance point of view.For example,
define_special_memory_constraint
can be useful if specifically aligned memory is necessary or desirable for some insn operand.The syntax and semantics are otherwise identical to
define_constraint
.
Use this expression for constraints that match a subset of all address operands: that is,
reload
can make the constraint match by converting the operand to the form ‘(reg X)’, again with X a base register.Constraints defined with
define_address_constraint
can only be used with theaddress_operand
predicate, or machine-specific predicates that work the same way. They are treated analogously to the generic ‘p’ constraint.The syntax and semantics are otherwise identical to
define_constraint
.
For historical reasons, names beginning with the letters ‘G H’
are reserved for constraints that match only const_double
s, and
names beginning with the letters ‘I J K L M N O P’ are reserved
for constraints that match only const_int
s. This may change in
the future. For the time being, constraints with these names must be
written in a stylized form, so that genpreds
can tell you did
it correctly:
(define_constraint "[GHIJKLMNOP]..." "doc..." (and (match_code "const_int") ;const_double
for G/H condition...)) ; usually amatch_test
It is fine to use names beginning with other letters for constraints
that match const_double
s or const_int
s.
Each docstring in a constraint definition should be one or more complete
sentences, marked up in Texinfo format. They are currently unused.
In the future they will be copied into the GCC manual, in Machine Constraints, replacing the hand-maintained tables currently found in
that section. Also, in the future the compiler may use this to give
more helpful diagnostics when poor choice of asm
constraints
causes a reload failure.
If you put the pseudo-Texinfo directive ‘@internal’ at the
beginning of a docstring, then (in the future) it will appear only in
the internals manual's version of the machine-specific constraint tables.
Use this for constraints that should not appear in asm
statements.
It is occasionally useful to test a constraint from C code rather than
implicitly via the constraint string in a match_operand
. The
generated file tm_p.h declares a few interfaces for working
with constraints. At present these are defined for all constraints
except g
(which is equivalent to general_operand
).
Some valid constraint names are not valid C identifiers, so there is a mangling scheme for referring to them from C. Constraint names that do not contain angle brackets or underscores are left unchanged. Underscores are doubled, each ‘<’ is replaced with ‘_l’, and each ‘>’ with ‘_g’. Here are some examples:
Original | Mangled |
x | x |
P42x | P42x |
P4_x | P4__x |
P4>x | P4_gx |
P4>> | P4_g_g |
P4_g> | P4__g_g
|
Throughout this section, the variable c is either a constraint
in the abstract sense, or a constant from enum constraint_num
;
the variable m is a mangled constraint name (usually as part of
a larger identifier).
For each constraint except
g
, there is a corresponding enumeration constant: ‘CONSTRAINT_’ plus the mangled name of the constraint. Functions that take anenum constraint_num
as an argument expect one of these constants.
For each non-register constraint m except
g
, there is one of these functions; it returnstrue
if exp satisfies the constraint. These functions are only visible if rtl.h was included before tm_p.h.
Like the
satisfies_constraint_
m functions, but the constraint to test is given as an argument, c. If c specifies a register constraint, this function will always returnfalse
.
Returns the register class associated with c. If c is not a register constraint, or those registers are not available for the currently selected subtarget, returns
NO_REGS
.
Here is an example use of satisfies_constraint_
m. In
peephole optimizations (see Peephole Definitions), operand
constraint strings are ignored, so if there are relevant constraints,
they must be tested in the C condition. In the example, the
optimization is applied if operand 2 does not satisfy the
‘K’ constraint. (This is a simplified version of a peephole
definition from the i386 machine description.)
(define_peephole2 [(match_scratch:SI 3 "r") (set (match_operand:SI 0 "register_operand" "") (mult:SI (match_operand:SI 1 "memory_operand" "") (match_operand:SI 2 "immediate_operand" "")))] "!satisfies_constraint_K (operands[2])" [(set (match_dup 3) (match_dup 1)) (set (match_dup 0) (mult:SI (match_dup 3) (match_dup 2)))] "")
Here is a table of the instruction names that are meaningful in the RTL generation pass of the compiler. Giving one of these names to an instruction pattern tells the RTL generation pass that it can use the pattern to accomplish a certain task.
If operand 0 is a subreg
with mode m of a register whose
own mode is wider than m, the effect of this instruction is
to store the specified value in the part of the register that corresponds
to mode m. Bits outside of m, but which are within the
same target word as the subreg
are undefined. Bits which are
outside the target word are left unchanged.
This class of patterns is special in several ways. First of all, each of these names up to and including full word size must be defined, because there is no other way to copy a datum from one place to another. If there are patterns accepting operands in larger modes, ‘movm’ must be defined for integer modes of those sizes.
Second, these patterns are not used solely in the RTL generation pass. Even the reload pass can generate move insns to copy values from stack slots into temporary registers. When it does so, one of the operands is a hard register and the other is an operand that can need to be reloaded into a register.
Therefore, when given such a pair of operands, the pattern must generate
RTL which needs no reloading and needs no temporary registers—no
registers other than the operands. For example, if you support the
pattern with a define_expand
, then in such a case the
define_expand
mustn't call force_reg
or any other such
function which might generate new pseudo registers.
This requirement exists even for subword modes on a RISC machine where fetching those modes from memory normally requires several insns and some temporary registers.
During reload a memory reference with an invalid address may be passed
as an operand. Such an address will be replaced with a valid address
later in the reload pass. In this case, nothing may be done with the
address except to use it as it stands. If it is copied, it will not be
replaced with a valid address. No attempt should be made to make such
an address into a valid address and no routine (such as
change_address
) that will do so may be called. Note that
general_operand
will fail when applied to such an address.
The global variable reload_in_progress
(which must be explicitly
declared if required) can be used to determine whether such special
handling is required.
The variety of operands that have reloads depends on the rest of the machine description, but typically on a RISC machine these can only be pseudo registers that did not get hard registers, while on other machines explicit memory references will get optional reloads.
If a scratch register is required to move an object to or from memory,
it can be allocated using gen_reg_rtx
prior to life analysis.
If there are cases which need scratch registers during or after reload, you must provide an appropriate secondary_reload target hook.
The macro can_create_pseudo_p
can be used to determine if it
is unsafe to create new pseudo registers. If this variable is nonzero, then
it is unsafe to call gen_reg_rtx
to allocate a new pseudo.
The constraints on a ‘movm’ must permit moving any hard
register to any other hard register provided that
HARD_REGNO_MODE_OK
permits mode m in both registers and
TARGET_REGISTER_MOVE_COST
applied to their classes returns a value
of 2.
It is obligatory to support floating point ‘movm’
instructions into and out of any registers that can hold fixed point
values, because unions and structures (which have modes SImode
or
DImode
) can be in those registers and they may have floating
point members.
There may also be a need to support fixed point ‘movm’
instructions in and out of floating point registers. Unfortunately, I
have forgotten why this was so, and I don't know whether it is still
true. If HARD_REGNO_MODE_OK
rejects fixed point values in
floating point registers, then the constraints of the fixed point
‘movm’ instructions must be designed to avoid ever trying to
reload into a floating point register.
secondary_reload
.
Like ‘movm’, but used when a scratch register is required to
move between operand 0 and operand 1. Operand 2 describes the scratch
register. See the discussion of the SECONDARY_RELOAD_CLASS
macro in see Register Classes.
There are special restrictions on the form of the match_operand
s
used in these patterns. First, only the predicate for the reload
operand is examined, i.e., reload_in
examines operand 1, but not
the predicates for operand 0 or 2. Second, there may be only one
alternative in the constraints. Third, only a single register class
letter may be used for the constraint; subsequent constraint letters
are ignored. As a special exception, an empty constraint string
matches the ALL_REGS
register class. This may relieve ports
of the burden of defining an ALL_REGS
constraint letter just
for these patterns.
subreg
with mode m of a register whose natural mode is wider,
the ‘movstrictm’ instruction is guaranteed not to alter
any of the register except the part which belongs to mode m.
This pattern is used by the autovectorizer, and when expanding a
MISALIGNED_INDIRECT_REF
expression.
Define this only if the target machine really has such an instruction; do not define this if the most efficient way of loading consecutive registers from memory is to do them one at a time.
On some machines, there are restrictions as to which consecutive
registers can be stored into memory, such as particular starting or
ending register numbers or only a range of valid counts. For those
machines, use a define_expand
(see Expander Definitions)
and make the pattern fail if the restrictions are not met.
Write the generated insn as a parallel
with elements being a
set
of one register from the appropriate memory location (you may
also need use
or clobber
elements). Use a
match_parallel
(see RTL Template) to recognize the insn. See
rs6000.md for examples of the use of this insn pattern.
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n); for (j = 0; j < GET_MODE_NUNITS (n); j++) for (i = 0; i < c; i++) operand0[i][j] = operand1[j * c + i];
For example, ‘vec_load_lanestiv4hi’ loads 8 16-bit values from memory into a register of mode ‘TI’. The register contains two consecutive vectors of mode ‘V4HI’.
This pattern can only be used if:
TARGET_ARRAY_MODE_SUPPORTED_P (n, c)
is true. GCC assumes that, if a target supports this kind of instruction for some mode n, it also supports unaligned loads for vectors of mode n.
This pattern is not allowed to FAIL
.
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n); for (j = 0; j < GET_MODE_NUNITS (n); j++) for (i = 0; i < c; i++) operand0[j * c + i] = operand1[i][j];
for a memory operand 0 and register operand 1.
This pattern is not allowed to FAIL
.
vec_cmp
mn but perform unsigned vector comparison.
vcond
mn but performs unsigned vector
comparison.
vcond
mn but operand 3 holds a pre-computed
result of vector comparison.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
The input elements are numbered from 0 in operand 1 through
2*N-1 in operand 2. The elements of the selector must
be computed modulo 2*N. Note that if
rtx_equal_p(operand1, operand2)
, this can be implemented
with just operand 1 and selector elements modulo N.
In order to make things easy for a number of targets, if there is no
‘vec_perm’ pattern for mode m, but there is for mode q
where q is a vector of QImode
of the same width as m,
the middle-end will lower the mode m VEC_PERM_EXPR
to
mode q.
CONST_VECTOR
.
Some targets cannot perform a permutation with a variable selector,
but can efficiently perform a constant permutation. Further, the
target hook vec_perm_ok
is queried to determine if the
specific constant permutation is available efficiently; the named
pattern is never expanded without vec_perm_ok
returning true.
There is no need for a target to supply both ‘vec_permm’ and ‘vec_perm_constm’ if the former can trivially implement the operation with, say, the vector constant loaded into a register.
PUSH_ROUNDING
is defined. For historical reason, this pattern may be
missing and in such case an mov
expander is used instead, with a
MEM
expression forming the push operation. The mov
expander
method is deprecated.
add
m3
but takes a code_label
as operand 3 and
emits code to jump to it if signed overflow occurs during the addition.
This pattern is used to implement the built-in functions performing
signed integer addition with overflow checking.
addv
m4
but for unsigned addition. That is to
say, the operation is the same as signed addition but the jump
is taken only on unsigned overflow.
add
m3
but is guaranteed to only be used for address
calculations. The expanded code is not allowed to clobber the
condition code. It only needs to be defined if add
m3
sets the condition code. If adds used for address calculations and
normal adds are not compatible it is required to expand a distinct
pattern (e.g. using an unspec). The pattern is used by LRA to emit
address calculations. add
m3
is used if
addptr
m3
is not defined.
fma
, fmaf
, and fmal
builtin functions from
the ISO C99 standard.
fma
m4
, except operand 3 subtracted from the
product instead of added to the product. This is represented
in the rtl as
(fma:m op1 op2 (neg:m op3))
fma
m4
except that the intermediate product
is negated before being added to operand 3. This is represented
in the rtl as
(fma:m (neg:m op1) op2 op3)
fms
m4
except that the intermediate product
is negated before subtracting operand 3. This is represented
in the rtl as
(fma:m (neg:m op1) op2 (neg:m op3))
NaN
, then
it is unspecified which of the two operands is returned as the result.
NaN
, then the other operand is returned. If both operands are quiet
NaN
, then a quiet NaN
is returned. In the case when gcc supports
signalling NaN
(-fsignaling-nans) an invalid floating point exception is
raised and a quiet NaN
is returned.
All operands have mode m, which is a scalar or vector
floating-point mode. These patterns are not allowed to FAIL
.
HImode
, and store
a SImode
product in operand 0.
In other words, madd
mn4
is like
mul
mn3
except that it also adds operand 3.
These instructions are not allowed to FAIL
.
madd
mn4
, but zero-extend the multiplication
operands instead of sign-extending them.
madd
mn4
, but all involved operations must be
signed-saturating.
umadd
mn4
, but all involved operations must be
unsigned-saturating.
In other words, msub
mn4
is like
mul
mn3
except that it also subtracts the result
from operand 3.
These instructions are not allowed to FAIL
.
msub
mn4
, but zero-extend the multiplication
operands instead of sign-extending them.
msub
mn4
, but all involved operations must be
signed-saturating.
umsub
mn4
, but all involved operations must be
unsigned-saturating.
For machines with an instruction that produces both a quotient and a remainder, provide a pattern for ‘divmodm4’ but do not provide patterns for ‘divm3’ and ‘modm3’. This allows optimization in the relatively common case when both the quotient and remainder are computed.
If an instruction that just produces a quotient or just a remainder
exists and is more efficient than the instruction that produces both,
write the output routine of ‘divmodm4’ to call
find_reg_note
and look for a REG_UNUSED
note on the
quotient or remainder and generate the appropriate instruction.
VOIDmode
. The meaning of out-of-range shift
counts can optionally be specified by TARGET_SHIFT_TRUNCATION_MASK
.
See TARGET_SHIFT_TRUNCATION_MASK. Operand 2 is always a scalar type.
ashl
m3
instructions. Operand 2 is always a scalar type.
neg
m2
but takes a code_label
as operand 2 and
emits code to jump to it if signed overflow occurs during the negation.
This pattern is not allowed to FAIL
.
On most architectures this pattern is only approximate, so either
its C condition or the TARGET_OPTAB_SUPPORTED_P
hook should
check for the appropriate math flags. (Using the C condition is
more direct, but using TARGET_OPTAB_SUPPORTED_P
can be useful
if a target-specific built-in also uses the ‘rsqrtm2’
pattern.)
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
FLT_RADIX
to the power of operand 2, multiply it by
operand 1, and store the result in operand 0. All operands have
mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL
.
int
. The integers are signed.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
Targets that can calculate the sine and cosine simultaneously can
implement this pattern as opposed to implementing individual
sin
m2
and cos
m2
patterns. The sin
and cos
built-in functions will then be expanded to the
sincos
m3
pattern, with one of the output values
left unused.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
For inputs close to zero, the pattern is expected to be more
accurate than a separate exp
m2
and sub
m3
would be.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
For inputs close to zero, the pattern is expected to be more
accurate than a separate add
m3
and log
m2
would be.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
FLT_RADIX
logarithm of operand 1 into operand 0.
Both operands have mode m, which is a scalar or vector
floating-point mode.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
This pattern is not allowed to FAIL
.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
CLZ_DEFINED_VALUE_AT_ZERO
(see Misc) macro defines if
the result is undefined or has a useful value.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
CTZ_DEFINED_VALUE_AT_ZERO
(see Misc) macro defines if
the result is undefined or has a useful value.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
m is either a scalar or vector integer mode. When it is a scalar,
operand 1 has mode m but operand 0 can have whatever scalar
integer mode is suitable for the target. The compiler will insert
conversion instructions as necessary (typically to convert the result
to the same width as int
). When m is a vector, both
operands must have mode m.
This pattern is not allowed to FAIL
.
mem:BLK
s with an
address in mode Pmode
.
The number of bytes to move is the third operand, in mode m.
Usually, you specify Pmode
for m. However, if you can
generate better code knowing the range of valid lengths is smaller than
those representable in a full Pmode pointer, you should provide
a pattern with a
mode corresponding to the range of values you can handle efficiently
(e.g., QImode
for values in the range 0–127; note we avoid numbers
that appear negative) and also a pattern with Pmode
.
The fourth operand is the known shared alignment of the source and
destination, in the form of a const_int
rtx. Thus, if the
compiler knows that both source and destination are word-aligned,
it may provide the value 4 for this operand.
Optional operands 5 and 6 specify expected alignment and size of block
respectively. The expected alignment differs from alignment in operand 4
in a way that the blocks are not required to be aligned according to it in
all cases. This expected alignment is also in bytes, just like operand 4.
Expected size, when unknown, is set to (const_int -1)
.
Descriptions of multiple movmem
m patterns can only be
beneficial if the patterns for smaller modes have fewer restrictions
on their first, second and fourth operands. Note that the mode m
in movmem
m does not impose any restriction on the mode of
individually moved data units in the block.
These patterns need not give special consideration to the possibility that the source and destination strings might overlap.
stpcpy
semantics. Operand 0 is
an output operand in mode Pmode
. The addresses of the
destination and source strings are operands 1 and 2, and both are
mem:BLK
s with addresses in mode Pmode
. The execution of
the expansion of this pattern should store in operand 0 the address in
which the NUL
terminator was stored in the destination string.
This patern has also several optional operands that are same as in
setmem
.
mem:BLK
whose address is in mode Pmode
. The
number of bytes to set is the second operand, in mode m. The value to
initialize the memory with is the third operand. Targets that only support the
clearing of memory should reject any value that is not the constant 0. See
‘movmemm’ for a discussion of the choice of mode.
The fourth operand is the known alignment of the destination, in the form
of a const_int
rtx. Thus, if the compiler knows that the
destination is word-aligned, it may provide the value 4 for this
operand.
Optional operands 5 and 6 specify expected alignment and size of block
respectively. The expected alignment differs from alignment in operand 4
in a way that the blocks are not required to be aligned according to it in
all cases. This expected alignment is also in bytes, just like operand 4.
Expected size, when unknown, is set to (const_int -1)
.
Operand 7 is the minimal size of the block and operand 8 is the
maximal size of the block (NULL if it can not be represented as CONST_INT).
Operand 9 is the probable maximal size (i.e. we can not rely on it for correctness,
but it can be used for choosing proper code sequence for a given size).
The use for multiple setmem
m is as for movmem
m.
mem:BLK
with an address in mode
Pmode
.
The fourth operand is the known shared alignment of the source and
destination, in the form of a const_int
rtx. Thus, if the
compiler knows that both source and destination are word-aligned,
it may provide the value 4 for this operand.
The two memory blocks specified are compared byte by byte in lexicographic order starting at the beginning of each string. The instruction is not allowed to prefetch more than one byte at a time since either string may end in the first byte and reading past that may access an invalid page or segment and cause a fault. The comparison will terminate when the fetched bytes are different or if they are equal to zero. The effect of the instruction is to store a value in operand 0 whose sign indicates the result of the comparison.
mem
referring to the first character of the string,
operand 2 is the character to search for (normally zero),
and operand 3 is a constant describing the known alignment
of the beginning of the string.
If the machine description defines this pattern, it also needs to
define the ftrunc
pattern.
Operands 0 and 1 both have mode m. Operands 2 and 3 have a target-specific mode.
Operand 0 has mode m while operand 1 has BLK
mode.
Operands 2 and 3 have a target-specific mode.
The instruction must not read beyond the last byte of the bit-field.
Operands 0 and 3 both have mode m. Operands 1 and 2 have a target-specific mode.
Operand 3 has mode m while operand 0 has BLK
mode.
Operands 1 and 2 have a target-specific mode.
The instruction must not read or write beyond the last byte of the bit-field.
word_mode
.
Operand 1 may have mode byte_mode
or word_mode
; often
word_mode
is allowed only for registers. Operands 2 and 3 must
be valid for word_mode
.
The RTL generation pass generates this instruction only with constants for operands 2 and 3 and the constant is never zero for operand 2.
The bit-field value is sign-extended to a full word integer before it is stored in operand 0.
This pattern is deprecated; please use ‘extvm’ and
extvmisalign
m instead.
This pattern is deprecated; please use ‘extzvm’ and
extzvmisalign
m instead.
word_mode
) into a
bit-field in operand 0, where operand 1 specifies the width in bits and
operand 2 the starting bit. Operand 0 may have mode byte_mode
or
word_mode
; often word_mode
is allowed only for registers.
Operands 1 and 2 must be valid for word_mode
.
The RTL generation pass generates this instruction only with constants for operands 1 and 2 and the constant is never zero for operand 1.
This pattern is deprecated; please use ‘insvm’ and
insvmisalign
m instead.
The mode of the operands being compared need not be the same as the operands being moved. Some machines, sparc64 for example, have instructions that conditionally move an integer value based on the floating point condition codes and vice versa.
If the machine does not have conditional move instructions, do not define these patterns.
match_operand
expression. The compiler automatically sees which
mode you have used and supplies an operand of that mode.
The value stored for a true condition must have 1 as its low bit, or
else must be negative. Otherwise the instruction is not suitable and
you should omit it from the machine description. You describe to the
compiler exactly which value is stored by defining the macro
STORE_FLAG_VALUE
(see Misc). If a description cannot be
found that can be used for all the possible comparison operators, you
should pick one and use a define_expand
to map all results
onto the one you chose.
These operations may FAIL
, but should do so only in relatively
uncommon cases; if they would FAIL
for common cases involving
integer comparisons, it is best to restrict the predicates to not
allow these operands. Likewise if a given comparison operator will
always fail, independent of the operands (for floating-point modes, the
ordered_comparison_operator
predicate is often useful in this case).
If this pattern is omitted, the compiler will generate a conditional
branch—for example, it may copy a constant one to the target and branching
around an assignment of zero to the target—or a libcall. If the predicate
for operand 1 only rejects some operators, it will also try reordering the
operands and/or inverting the result value (e.g. by an exclusive OR).
These possibilities could be cheaper or equivalent to the instructions
used for the ‘cstoremode4’ pattern followed by those required
to convert a positive result from STORE_FLAG_VALUE
to 1; in this
case, you can and should make operand 1's predicate reject some operators
in the ‘cstoremode4’ pattern, or remove the pattern altogether
from the machine description.
code_label
to jump to.
code_label
to jump to. This pattern name is mandatory on all
machines.
const_int
; operand 2 is the number of registers used as
operands.
On most machines, operand 2 is not actually stored into the RTL pattern. It is supplied for the sake of some RISC machines which need to put this information into the assembler code; they can put it in the RTL instead of operand 1.
Operand 0 should be a mem
RTX whose address is the address of the
function. Note, however, that this address can be a symbol_ref
expression even if it would not be a legitimate memory address on the
target machine. If it is also not a valid argument for a call
instruction, the pattern for this operation should be a
define_expand
(see Expander Definitions) that places the
address into a register and uses that register in the call instruction.
Subroutines that return BLKmode
objects use the ‘call’
insn.
RETURN_POPS_ARGS
is nonzero. They should emit a parallel
that contains both the function call and a set
to indicate the
adjustment made to the frame pointer.
For machines where RETURN_POPS_ARGS
can be nonzero, the use of these
patterns increases the number of functions for which the frame pointer
can be eliminated, if desired.
parallel
expression where each element is a set
expression that indicates
the saving of a function return value into the result block.
This instruction pattern should be defined to support
__builtin_apply
on machines where special instructions are needed
to call a subroutine with arbitrary arguments or to save the value
returned. This instruction pattern is required on machines that have
multiple registers that can hold a return value
(i.e. FUNCTION_VALUE_REGNO_P
is true for more than one register).
Like the ‘movm’ patterns, this pattern is also used after the RTL generation phase. In this case it is to support machines where multiple instructions are usually needed to return from a function, but some class of functions only requires one instruction to implement a return. Normally, the applicable functions are those which do not need to save any registers or allocate stack space.
It is valid for this pattern to expand to an instruction using
simple_return
if no epilogue is required.
return
instruction pattern, but it is emitted
only by the shrink-wrapping optimization on paths where the function
prologue has not been executed, and a function return should occur without
any of the effects of the epilogue. Additional uses may be introduced on
paths where both the prologue and the epilogue have executed.
For such machines, the condition specified in this pattern should only
be true when reload_completed
is nonzero and the function's
epilogue would only be a single instruction. For machines with register
windows, the routine leaf_function_p
may be used to determine if
a register window push is required.
Machines that have conditional return instructions should define patterns such as
(define_insn "" [(set (pc) (if_then_else (match_operator 0 "comparison_operator" [(cc0) (const_int 0)]) (return) (pc)))] "condition" "...")
where condition would normally be the same condition specified on the named ‘return’ pattern.
__builtin_return
on machines where special
instructions are needed to return a value of any type.
Operand 0 is a memory location where the result of calling a function
with __builtin_apply
is stored; operand 1 is a parallel
expression where each element is a set
expression that indicates
the restoring of a function return value from the result block.
(const_int 0)
will do as an
RTL pattern.
SImode
.
The table is an addr_vec
or addr_diff_vec
inside of a
jump_table_data
. The number of elements in the table is one plus the
difference between the upper bound and the lower bound.
This pattern requires two operands: the address or offset, and a label
which should immediately precede the jump table. If the macro
CASE_VECTOR_PC_RELATIVE
evaluates to a nonzero value then the first
operand is an offset which counts from the address of the table; otherwise,
it is an absolute address to jump to. In either case, the first operand has
mode Pmode
.
The ‘tablejump’ insn is always the last insn before the jump table it uses. Its assembler code normally has no need to use the second operand, but you should incorporate it in the RTL pattern so that the jump optimizer will not delete the table as unreachable code.
This optional instruction pattern is only used by the combiner, typically for loops reversed by the loop optimizer when strength reduction is enabled.
This optional instruction pattern should be defined for machines with
low-overhead looping instructions as the loop optimizer will try to
modify suitable loops to utilize it. The target hook
TARGET_CAN_USE_DOLOOP_P
controls the conditions under which
low-overhead loops can be used.
doloop_end
required for machines that
need to perform some initialization, such as loading a special counter
register. Operand 1 is the associated doloop_end
pattern and
operand 0 is the register that it decrements.
If initialization insns do not always need to be emitted, use a
define_expand
(see Expander Definitions) and make it fail.
Operand 0 is always a reg
and has mode Pmode
; operand 1
may be a reg
, mem
, symbol_ref
, const_int
, etc
and also has mode Pmode
.
Canonicalization of a function pointer usually involves computing the address of the function which would be called if the function pointer were used in an indirect call.
Only define this pattern if function pointers on the target machine can have different values but still call the same function when used in an indirect call.
Pmode
. Do not define these patterns on
such machines.
Some machines require special handling for stack pointer saves and
restores. On those machines, define the patterns corresponding to the
non-standard cases by using a define_expand
(see Expander Definitions) that produces the required insns. The three types of
saves and restores are:
alloca
. Only
the epilogue uses the restored stack pointer, allowing a simpler save or
restore sequence on some machines.
When saving the stack pointer, operand 0 is the save area and operand 1
is the stack pointer. The mode used to allocate the save area defaults
to Pmode
but you can override that choice by defining the
STACK_SAVEAREA_MODE
macro (see Storage Layout). You must
specify an integral mode, or VOIDmode
if no save area is needed
for a particular type of save (either because no save is needed or
because a machine-specific save area can be used). Operand 0 is the
stack pointer and operand 1 is the save area for restore operations. If
‘save_stack_block’ is defined, operand 0 must not be
VOIDmode
since these saves can be arbitrarily nested.
A save area is a mem
that is at a constant offset from
virtual_stack_vars_rtx
when the stack pointer is saved for use by
nonlocal gotos and a reg
in the other two cases.
STACK_GROWS_DOWNWARD
is undefined) operand 1 from
the stack pointer to create space for dynamically allocated data.
Store the resultant pointer to this space into operand 0. If you
are allocating space from the main stack, do this by emitting a
move insn to copy virtual_stack_dynamic_rtx
to operand 0.
If you are allocating the space elsewhere, generate code to copy the
location of the space to operand 0. In the latter case, you must
ensure this space gets freed when the corresponding space on the main
stack is free.
Do not define this pattern if all that must be done is the subtraction. Some machines require other operations such as stack probes or maintaining the back chain. Define this pattern to emit those operations in addition to updating the stack pointer.
On most machines you need not define this pattern, since GCC will already generate the correct code, which is to load the frame pointer and static chain, restore the stack (using the ‘restore_stack_nonlocal’ pattern, if defined), and jump indirectly to the dispatcher. You need only define this pattern if this code will not work on your machine.
jmp_buf
. You will not normally need to define this pattern.
A typical reason why you might need this pattern is if some value, such
as a pointer to a global table, must be restored. Though it is
preferred that the pointer value be recalculated if possible (given the
address of a label for instance). The single argument is a pointer to
the jmp_buf
. Note that the buffer is five words long and that
the first three are normally used by the generic mechanism.
builtin_setjmp_setup
. The single argument is a pointer to the
jmp_buf
.
__builtin_eh_return
,
and thence the call frame exception handling library routines, are
built. It is intended to handle non-trivial actions needed along
the abnormal return path.
The address of the exception handler to which the function should return
is passed as operand to this pattern. It will normally need to copied by
the pattern to some special register or memory location.
If the pattern needs to determine the location of the target call
frame in order to do so, it may use EH_RETURN_STACKADJ_RTX
,
if defined; it will have already been assigned.
If this pattern is not defined, the default action will be to simply
copy the return address to EH_RETURN_HANDLER_RTX
. Either
that macro or this pattern needs to be defined if call frame exception
handling is to be used.
Using a prologue pattern is generally preferred over defining
TARGET_ASM_FUNCTION_PROLOGUE
to emit assembly code for the prologue.
The prologue
pattern is particularly useful for targets which perform
instruction scheduling.
Using an epilogue pattern is generally preferred over defining
TARGET_ASM_FUNCTION_EPILOGUE
to emit assembly code for the epilogue.
The epilogue
pattern is particularly useful for targets which perform
instruction scheduling or which have delay slots for their return instruction.
The sibcall_epilogue
pattern must not clobber any arguments used for
parameter passing or any stack slots for arguments passed to the current
function.
A typical ctrap
pattern looks like
(define_insn "ctrapsi4" [(trap_if (match_operator 0 "trap_operator" [(match_operand 1 "register_operand") (match_operand 2 "immediate_operand")]) (match_operand 3 "const_int_operand" "i"))] "" "...")
Targets that do not support write prefetches or locality hints can ignore the values of operands 1 and 2.
This pattern must show that both operand 0 and operand 1 are modified.
This pattern must issue any memory barrier instructions such that all memory operations before the atomic operation occur before the atomic operation and all memory operations after the atomic operation occur after the atomic operation.
For targets where the success or failure of the compare-and-swap
operation is available via the status flags, it is possible to
avoid a separate compare operation and issue the subsequent
branch or store-flag operation immediately after the compare-and-swap.
To this end, GCC will look for a MODE_CC
set in the
output of sync_compare_and_swap
mode; if the machine
description includes such a set, the target should also define special
cbranchcc4
and/or cstorecc4
instructions. GCC will then
be able to take the destination of the MODE_CC
set and pass it
to the cbranchcc4
or cstorecc4
pattern as the first
operand of the comparison (the second will be (const_int 0)
).
For targets where the operating system may provide support for this
operation via library calls, the sync_compare_and_swap_optab
may be initialized to a function with the same interface as the
__sync_val_compare_and_swap_
n built-in. If the entire
set of __sync builtins are supported via library calls, the
target can initialize all of the optabs at once with
init_sync_libfuncs
.
For the purposes of C++11 std::atomic::is_lock_free
, it is
assumed that these library calls do not use any kind of
interruptable locking.
This pattern must issue any memory barrier instructions such that all memory operations before the atomic operation occur before the atomic operation and all memory operations after the atomic operation occur after the atomic operation.
If these patterns are not defined, the operation will be constructed from a compare-and-swap operation, if defined.
This pattern must issue any memory barrier instructions such that all memory operations before the atomic operation occur before the atomic operation and all memory operations after the atomic operation occur after the atomic operation.
If these patterns are not defined, the operation will be constructed from a compare-and-swap operation, if defined.
sync_old_
op counterparts,
except that they return the value that exists in the memory location
after the operation, rather than before the operation.
In the ideal case, this operation is an atomic exchange operation, in which the previous value in memory operand is copied into the result operand, and the value operand is stored in the memory operand.
For less capable targets, any value operand that is not the constant 1
should be rejected with FAIL
. In this case the target may use
an atomic test-and-set bit operation. The result operand should contain
1 if the bit was previously set and 0 if the bit was previously clear.
The true contents of the memory operand are implementation defined.
This pattern must issue any memory barrier instructions such that the pattern as a whole acts as an acquire barrier, that is all memory operations after the pattern do not occur until the lock is acquired.
If this pattern is not defined, the operation will be constructed from a compare-and-swap operation, if defined.
sync_lock_test_and_set
mode. Operand 0 is the memory
that contains the lock; operand 1 is the value to store in the lock.
If the target doesn't implement full semantics for
sync_lock_test_and_set
mode, any value operand which is not
the constant 0 should be rejected with FAIL
, and the true contents
of the memory operand are implementation defined.
This pattern must issue any memory barrier instructions such that the pattern as a whole acts as a release barrier, that is the lock is released only after all previous memory operations have completed.
If this pattern is not defined, then a memory_barrier
pattern
will be emitted, followed by a store of the value to the memory operand.
If memory referred to in operand 2 contains the value in operand 3, then operand 4 is stored in memory pointed to by operand 2 and fencing based on the memory model in operand 6 is issued.
If memory referred to in operand 2 does not contain the value in operand 3, then fencing based on the memory model in operand 7 is issued.
If a target does not support weak compare-and-swap operations, or the port elects not to implement weak operations, the argument in operand 5 can be ignored. Note a strong implementation must be provided.
If this pattern is not provided, the __atomic_compare_exchange
built-in functions will utilize the legacy sync_compare_and_swap
pattern with an __ATOMIC_SEQ_CST
memory model.
If not present, the __atomic_load
built-in function will either
resort to a normal load with memory barriers, or a compare-and-swap
operation if a normal load would not be atomic.
If not present, the __atomic_store
built-in function will attempt to
perform a normal store and surround it with any required memory fences. If
the store would not be atomic, then an __atomic_exchange
is
attempted with the result being ignored.
If this pattern is not present, the built-in function
__atomic_exchange
will attempt to preform the operation with a
compare and swap loop.
If these patterns are not defined, attempts will be made to use legacy
sync
patterns, or equivalent patterns which return a result. If
none of these are available a compare-and-swap loop will be used.
If these patterns are not defined, attempts will be made to use legacy
sync
patterns. If none of these are available a compare-and-swap
loop will be used.
If these patterns are not defined, attempts will be made to use legacy
sync
patterns, or equivalent patterns which return the result before
the operation followed by the arithmetic operation required to produce the
result. If none of these are available a compare-and-swap loop will be
used.
__builtin_atomic_test_and_set
.
Operand 0 is an output operand which is set to true if the previous
previous contents of the byte was "set", and false otherwise. Operand 1
is the QImode
memory to be modified. Operand 2 is the memory
model to be used.
The specific value that defines "set" is implementation defined, and is normally based on what is performed by the native atomic test and set instruction.
If this pattern is not specified, all memory models except
__ATOMIC_RELAXED
will result in issuing a sync_synchronize
barrier pattern.
This pattern should impact the compiler optimizers the same way that mem_signal_fence does, but it does not need to issue any barrier instructions.
If this pattern is not specified, all memory models except
__ATOMIC_RELAXED
will result in issuing a sync_synchronize
barrier pattern.
__builtin_thread_pointer
and __builtin_set_thread_pointer
builtins.
The get/set patterns have a single output/input operand respectively,
with mode intended to be Pmode
.
ptr_mode
value from the memory
in operand 1 to the memory in operand 0 without leaving the value in
a register afterward. This is to avoid leaking the value some place
that an attacker might use to rewrite the stack guard slot after
having clobbered it.
If this pattern is not defined, then a plain move pattern is generated.
ptr_mode
value from the
memory in operand 1 with the memory in operand 0 without leaving the
value in a register afterward and branches to operand 2 if the values
were equal.
If this pattern is not defined, then a plain compare pattern and conditional branch pattern is used.
If this pattern is not defined, a call to the library function
__clear_cache
is used.
Sometimes an insn can match more than one instruction pattern. Then the pattern that appears first in the machine description is the one used. Therefore, more specific patterns (patterns that will match fewer things) and faster instructions (those that will produce better code when they do match) should usually go first in the description.
In some cases the effect of ordering the patterns can be used to hide a pattern when it is not valid. For example, the 68000 has an instruction for converting a fullword to floating point and another for converting a byte to floating point. An instruction converting an integer to floating point could match either one. We put the pattern to convert the fullword first to make sure that one will be used rather than the other. (Otherwise a large integer might be generated as a single-byte immediate quantity, which would not work.) Instead of using this pattern ordering it would be possible to make the pattern for convert-a-byte smart enough to deal properly with any constant value.
In some cases machines support instructions identical except for the machine mode of one or more operands. For example, there may be “sign-extend halfword” and “sign-extend byte” instructions whose patterns are
(set (match_operand:SI 0 ...) (extend:SI (match_operand:HI 1 ...))) (set (match_operand:SI 0 ...) (extend:SI (match_operand:QI 1 ...)))
Constant integers do not specify a machine mode, so an instruction to
extend a constant value could match either pattern. The pattern it
actually will match is the one that appears first in the file. For correct
results, this must be the one for the widest possible mode (HImode
,
here). If the pattern matches the QImode
instruction, the results
will be incorrect if the constant value does not actually fit that mode.
Such instructions to extend constants are rarely generated because they are optimized away, but they do occasionally happen in nonoptimized compilations.
If a constraint in a pattern allows a constant, the reload pass may replace a register with a constant permitted by the constraint in some cases. Similarly for memory references. Because of this substitution, you should not provide separate patterns for increment and decrement instructions. Instead, they should be generated from the same pattern that supports register-register add insns by examining the operands and generating the appropriate machine instruction.
GCC does not assume anything about how the machine realizes jumps.
The machine description should define a single pattern, usually
a define_expand
, which expands to all the required insns.
Usually, this would be a comparison insn to set the condition code
and a separate branch insn testing the condition code and branching
or not according to its value. For many machines, however,
separating compares and branches is limiting, which is why the
more flexible approach with one define_expand
is used in GCC.
The machine description becomes clearer for architectures that
have compare-and-branch instructions but no condition code. It also
works better when different sets of comparison operators are supported
by different kinds of conditional branches (e.g. integer vs. floating-point),
or by conditional branches with respect to conditional stores.
Two separate insns are always used if the machine description represents
a condition code register using the legacy RTL expression (cc0)
,
and on most machines that use a separate condition code register
(see Condition Code). For machines that use (cc0)
, in
fact, the set and use of the condition code must be separate and
adjacent4, thus
allowing flags in cc_status
to be used (see Condition Code) and
so that the comparison and branch insns could be located from each other
by using the functions prev_cc0_setter
and next_cc0_user
.
Even in this case having a single entry point for conditional branches is advantageous, because it handles equally well the case where a single comparison instruction records the results of both signed and unsigned comparison of the given operands (with the branch insns coming in distinct signed and unsigned flavors) as in the x86 or SPARC, and the case where there are distinct signed and unsigned compare instructions and only one set of conditional branch instructions as in the PowerPC.
Some machines have special jump instructions that can be utilized to make loops more efficient. A common example is the 68000 ‘dbra’ instruction which performs a decrement of a register and a branch if the result was greater than zero. Other machines, in particular digital signal processors (DSPs), have special block repeat instructions to provide low-overhead loop support. For example, the TI TMS320C3x/C4x DSPs have a block repeat instruction that loads special registers to mark the top and end of a loop and to count the number of loop iterations. This avoids the need for fetching and executing a ‘dbra’-like instruction and avoids pipeline stalls associated with the jump.
GCC has three special named patterns to support low overhead looping.
They are ‘decrement_and_branch_until_zero’, ‘doloop_begin’,
and ‘doloop_end’. The first pattern,
‘decrement_and_branch_until_zero’, is not emitted during RTL
generation but may be emitted during the instruction combination phase.
This requires the assistance of the loop optimizer, using information
collected during strength reduction, to reverse a loop to count down to
zero. Some targets also require the loop optimizer to add a
REG_NONNEG
note to indicate that the iteration count is always
positive. This is needed if the target performs a signed loop
termination test. For example, the 68000 uses a pattern similar to the
following for its dbra
instruction:
(define_insn "decrement_and_branch_until_zero" [(set (pc) (if_then_else (ge (plus:SI (match_operand:SI 0 "general_operand" "+d*am") (const_int -1)) (const_int 0)) (label_ref (match_operand 1 "" "")) (pc))) (set (match_dup 0) (plus:SI (match_dup 0) (const_int -1)))] "find_reg_note (insn, REG_NONNEG, 0)" "...")
Note that since the insn is both a jump insn and has an output, it must deal with its own reloads, hence the `m' constraints. Also note that since this insn is generated by the instruction combination phase combining two sequential insns together into an implicit parallel insn, the iteration counter needs to be biased by the same amount as the decrement operation, in this case −1. Note that the following similar pattern will not be matched by the combiner.
(define_insn "decrement_and_branch_until_zero" [(set (pc) (if_then_else (ge (match_operand:SI 0 "general_operand" "+d*am") (const_int 1)) (label_ref (match_operand 1 "" "")) (pc))) (set (match_dup 0) (plus:SI (match_dup 0) (const_int -1)))] "find_reg_note (insn, REG_NONNEG, 0)" "...")
The other two special looping patterns, ‘doloop_begin’ and ‘doloop_end’, are emitted by the loop optimizer for certain well-behaved loops with a finite number of loop iterations using information collected during strength reduction.
The ‘doloop_end’ pattern describes the actual looping instruction (or the implicit looping operation) and the ‘doloop_begin’ pattern is an optional companion pattern that can be used for initialization needed for some low-overhead looping instructions.
Note that some machines require the actual looping instruction to be
emitted at the top of the loop (e.g., the TMS320C3x/C4x DSPs). Emitting
the true RTL for a looping instruction at the top of the loop can cause
problems with flow analysis. So instead, a dummy doloop
insn is
emitted at the end of the loop. The machine dependent reorg pass checks
for the presence of this doloop
insn and then searches back to
the top of the loop, where it inserts the true looping insn (provided
there are no instructions in the loop which would cause problems). Any
additional labels can be emitted at this point. In addition, if the
desired special iteration counter register was not allocated, this
machine dependent reorg pass could emit a traditional compare and jump
instruction pair.
The essential difference between the ‘decrement_and_branch_until_zero’ and the ‘doloop_end’ patterns is that the loop optimizer allocates an additional pseudo register for the latter as an iteration counter. This pseudo register cannot be used within the loop (i.e., general induction variables cannot be derived from it), however, in many cases the loop induction variable may become redundant and removed by the flow pass.
There are often cases where multiple RTL expressions could represent an operation performed by a single machine instruction. This situation is most commonly encountered with logical, branch, and multiply-accumulate instructions. In such cases, the compiler attempts to convert these multiple RTL expressions into a single canonical form to reduce the number of insn patterns required.
In addition to algebraic simplifications, following canonicalizations are performed:
plus
can itself be a plus
. and
, ior
, xor
,
plus
, mult
, smin
, smax
, umin
, and
umax
are associative when applied to integers, and sometimes to
floating-point.
neg
, not
,
mult
, plus
, or minus
expression, it will be the
first operand.
neg
, mult
, plus
, and
minus
, the neg
operations (if any) will be moved inside
the operations as far as possible. For instance,
(neg (mult A B))
is canonicalized as (mult (neg A) B)
, but
(plus (mult (neg B) C) A)
is canonicalized as
(minus A (mult B C))
.
compare
operator, a constant is always the second operand
if the first argument is a condition code register or (cc0)
.
neg
, not
, mult
, plus
, or
minus
is made the first operand under the same conditions as
above.
(ltu (plus
a b)
b)
is converted to
(ltu (plus
a b)
a)
. Likewise with geu
instead
of ltu
.
(minus
x (const_int
n))
is converted to
(plus
x (const_int
-n))
.
mem
), a left shift is
converted into the appropriate multiplication by a power of two.
not
expression, it will be the first one.
A machine that has an instruction that performs a bitwise logical-and of one operand with the bitwise negation of the other should specify the pattern for that instruction as
(define_insn "" [(set (match_operand:m 0 ...) (and:m (not:m (match_operand:m 1 ...)) (match_operand:m 2 ...)))] "..." "...")
Similarly, a pattern for a “NAND” instruction should be written
(define_insn "" [(set (match_operand:m 0 ...) (ior:m (not:m (match_operand:m 1 ...)) (not:m (match_operand:m 2 ...))))] "..." "...")
In both cases, it is not necessary to include patterns for the many logically equivalent RTL expressions.
(xor:
m x y)
and (not:
m (xor:
m x y))
.
(plus:m (plus:m x y) constant)
zero_extract
rather than the equivalent
and
or sign_extract
operations.
(sign_extend:
m1 (mult:
m2 (sign_extend:
m2 x)
(sign_extend:
m2 y)))
is converted to (mult:
m1
(sign_extend:
m1 x) (sign_extend:
m1 y))
, and likewise
for zero_extend
.
(sign_extend:
m1 (mult:
m2 (ashiftrt:
m2
x s) (sign_extend:
m2 y)))
is converted
to (mult:
m1 (sign_extend:
m1 (ashiftrt:
m2
x s)) (sign_extend:
m1 y))
, and likewise for
patterns using zero_extend
and lshiftrt
. If the second
operand of mult
is also a shift, then that is extended also.
This transformation is only applied when it can be proven that the
original operation had sufficient precision to prevent overflow.
Further canonicalization rules are defined in the function
commutative_operand_precedence
in gcc/rtlanal.c.
On some target machines, some standard pattern names for RTL generation
cannot be handled with single insn, but a sequence of RTL insns can
represent them. For these target machines, you can write a
define_expand
to specify how to generate the sequence of RTL.
A define_expand
is an RTL expression that looks almost like a
define_insn
; but, unlike the latter, a define_expand
is used
only for RTL generation and it can produce more than one RTL insn.
A define_expand
RTX has four operands:
define_expand
must have a name, since the only
use for it is to refer to it by name.
define_insn
, there
is no implicit surrounding PARALLEL
.
define_insn
that
has a standard name. Therefore, the condition (if present) may not
depend on the data in the insn being matched, but only the
target-machine-type flags. The compiler needs to test these conditions
during initialization in order to learn exactly which named instructions
are available in a particular run.
Usually these statements prepare temporary registers for use as
internal operands in the RTL template, but they can also generate RTL
insns directly by calling routines such as emit_insn
, etc.
Any such insns precede the ones that come from the RTL template.
Every RTL insn emitted by a define_expand
must match some
define_insn
in the machine description. Otherwise, the compiler
will crash when trying to generate code for the insn or trying to optimize
it.
The RTL template, in addition to controlling generation of RTL insns, also describes the operands that need to be specified when this pattern is used. In particular, it gives a predicate for each operand.
A true operand, which needs to be specified in order to generate RTL from
the pattern, should be described with a match_operand
in its first
occurrence in the RTL template. This enters information on the operand's
predicate into the tables that record such things. GCC uses the
information to preload the operand into a register if that is required for
valid RTL code. If the operand is referred to more than once, subsequent
references should use match_dup
.
The RTL template may also refer to internal “operands” which are
temporary registers or labels used only within the sequence made by the
define_expand
. Internal operands are substituted into the RTL
template with match_dup
, never with match_operand
. The
values of the internal operands are not passed in as arguments by the
compiler when it requests use of this pattern. Instead, they are computed
within the pattern, in the preparation statements. These statements
compute the values and store them into the appropriate elements of
operands
so that match_dup
can find them.
There are two special macros defined for use in the preparation statements:
DONE
and FAIL
. Use them with a following semicolon,
as a statement.
DONE
DONE
macro to end RTL generation for the pattern. The
only RTL insns resulting from the pattern on this occasion will be
those already emitted by explicit calls to emit_insn
within the
preparation statements; the RTL template will not be generated.
FAIL
Failure is currently supported only for binary (addition, multiplication,
shifting, etc.) and bit-field (extv
, extzv
, and insv
)
operations.
If the preparation falls through (invokes neither DONE
nor
FAIL
), then the define_expand
acts like a
define_insn
in that the RTL template is used to generate the
insn.
The RTL template is not used for matching, only for generating the
initial insn list. If the preparation statement always invokes
DONE
or FAIL
, the RTL template may be reduced to a simple
list of operands, such as this example:
(define_expand "addsi3" [(match_operand:SI 0 "register_operand" "") (match_operand:SI 1 "register_operand" "") (match_operand:SI 2 "register_operand" "")] "" " { handle_add (operands[0], operands[1], operands[2]); DONE; }")
Here is an example, the definition of left-shift for the SPUR chip:
(define_expand "ashlsi3" [(set (match_operand:SI 0 "register_operand" "") (ashift:SI (match_operand:SI 1 "register_operand" "") (match_operand:SI 2 "nonmemory_operand" "")))] "" "
{ if (GET_CODE (operands[2]) != CONST_INT || (unsigned) INTVAL (operands[2]) > 3) FAIL; }")
This example uses define_expand
so that it can generate an RTL insn
for shifting when the shift-count is in the supported range of 0 to 3 but
fail in other cases where machine insns aren't available. When it fails,
the compiler tries another strategy using different patterns (such as, a
library call).
If the compiler were able to handle nontrivial condition-strings in
patterns with names, then it would be possible to use a
define_insn
in that case. Here is another case (zero-extension
on the 68000) which makes more use of the power of define_expand
:
(define_expand "zero_extendhisi2" [(set (match_operand:SI 0 "general_operand" "") (const_int 0)) (set (strict_low_part (subreg:HI (match_dup 0) 0)) (match_operand:HI 1 "general_operand" ""))] "" "operands[1] = make_safe_from (operands[1], operands[0]);")
Here two RTL insns are generated, one to clear the entire output operand
and the other to copy the input operand into its low half. This sequence
is incorrect if the input operand refers to [the old value of] the output
operand, so the preparation statement makes sure this isn't so. The
function make_safe_from
copies the operands[1]
into a
temporary register if it refers to operands[0]
. It does this
by emitting another RTL insn.
Finally, a third example shows the use of an internal operand.
Zero-extension on the SPUR chip is done by and
-ing the result
against a halfword mask. But this mask cannot be represented by a
const_int
because the constant value is too large to be legitimate
on this machine. So it must be copied into a register with
force_reg
and then the register used in the and
.
(define_expand "zero_extendhisi2" [(set (match_operand:SI 0 "register_operand" "") (and:SI (subreg:SI (match_operand:HI 1 "register_operand" "") 0) (match_dup 2)))] "" "operands[2] = force_reg (SImode, GEN_INT (65535)); ")
Note: If the define_expand
is used to serve a
standard binary or unary arithmetic operation or a bit-field operation,
then the last insn it generates must not be a code_label
,
barrier
or note
. It must be an insn
,
jump_insn
or call_insn
. If you don't need a real insn
at the end, emit an insn to copy the result of the operation into
itself. Such an insn will generate no code, but it can avoid problems
in the compiler.
There are two cases where you should specify how to split a pattern into multiple insns. On machines that have instructions requiring delay slots (see Delay Slots) or that have instructions whose output is not available for multiple cycles (see Processor pipeline description), the compiler phases that optimize these cases need to be able to move insns into one-instruction delay slots. However, some insns may generate more than one machine instruction. These insns cannot be placed into a delay slot.
Often you can rewrite the single insn as a list of individual insns, each corresponding to one machine instruction. The disadvantage of doing so is that it will cause the compilation to be slower and require more space. If the resulting insns are too complex, it may also suppress some optimizations. The compiler splits the insn if there is a reason to believe that it might improve instruction or delay slot scheduling.
The insn combiner phase also splits putative insns. If three insns are
merged into one insn with a complex expression that cannot be matched by
some define_insn
pattern, the combiner phase attempts to split
the complex pattern into two insns that are recognized. Usually it can
break the complex pattern into two patterns by splitting out some
subexpression. However, in some other cases, such as performing an
addition of a large constant in two insns on a RISC machine, the way to
split the addition into two insns is machine-dependent.
The define_split
definition tells the compiler how to split a
complex insn into several simpler insns. It looks like this:
(define_split [insn-pattern] "condition" [new-insn-pattern-1 new-insn-pattern-2 ...] "preparation-statements")
insn-pattern is a pattern that needs to be split and
condition is the final condition to be tested, as in a
define_insn
. When an insn matching insn-pattern and
satisfying condition is found, it is replaced in the insn list
with the insns given by new-insn-pattern-1,
new-insn-pattern-2, etc.
The preparation-statements are similar to those statements that
are specified for define_expand
(see Expander Definitions)
and are executed before the new RTL is generated to prepare for the
generated code or emit some insns whose pattern is not fixed. Unlike
those in define_expand
, however, these statements must not
generate any new pseudo-registers. Once reload has completed, they also
must not allocate any space in the stack frame.
Patterns are matched against insn-pattern in two different
circumstances. If an insn needs to be split for delay slot scheduling
or insn scheduling, the insn is already known to be valid, which means
that it must have been matched by some define_insn
and, if
reload_completed
is nonzero, is known to satisfy the constraints
of that define_insn
. In that case, the new insn patterns must
also be insns that are matched by some define_insn
and, if
reload_completed
is nonzero, must also satisfy the constraints
of those definitions.
As an example of this usage of define_split
, consider the following
example from a29k.md, which splits a sign_extend
from
HImode
to SImode
into a pair of shift insns:
(define_split [(set (match_operand:SI 0 "gen_reg_operand" "") (sign_extend:SI (match_operand:HI 1 "gen_reg_operand" "")))] "" [(set (match_dup 0) (ashift:SI (match_dup 1) (const_int 16))) (set (match_dup 0) (ashiftrt:SI (match_dup 0) (const_int 16)))] " { operands[1] = gen_lowpart (SImode, operands[1]); }")
When the combiner phase tries to split an insn pattern, it is always the
case that the pattern is not matched by any define_insn
.
The combiner pass first tries to split a single set
expression
and then the same set
expression inside a parallel
, but
followed by a clobber
of a pseudo-reg to use as a scratch
register. In these cases, the combiner expects exactly two new insn
patterns to be generated. It will verify that these patterns match some
define_insn
definitions, so you need not do this test in the
define_split
(of course, there is no point in writing a
define_split
that will never produce insns that match).
Here is an example of this use of define_split
, taken from
rs6000.md:
(define_split [(set (match_operand:SI 0 "gen_reg_operand" "") (plus:SI (match_operand:SI 1 "gen_reg_operand" "") (match_operand:SI 2 "non_add_cint_operand" "")))] "" [(set (match_dup 0) (plus:SI (match_dup 1) (match_dup 3))) (set (match_dup 0) (plus:SI (match_dup 0) (match_dup 4)))] " { int low = INTVAL (operands[2]) & 0xffff; int high = (unsigned) INTVAL (operands[2]) >> 16; if (low & 0x8000) high++, low |= 0xffff0000; operands[3] = GEN_INT (high << 16); operands[4] = GEN_INT (low); }")
Here the predicate non_add_cint_operand
matches any
const_int
that is not a valid operand of a single add
insn. The add with the smaller displacement is written so that it
can be substituted into the address of a subsequent operation.
An example that uses a scratch register, from the same file, generates an equality comparison of a register and a large constant:
(define_split
[(set (match_operand:CC 0 "cc_reg_operand" "")
(compare:CC (match_operand:SI 1 "gen_reg_operand" "")
(match_operand:SI 2 "non_short_cint_operand" "")))
(clobber (match_operand:SI 3 "gen_reg_operand" ""))]
"find_single_use (operands[0], insn, 0)
&& (GET_CODE (*find_single_use (operands[0], insn, 0)) == EQ
|| GET_CODE (*find_single_use (operands[0], insn, 0)) == NE)"
[(set (match_dup 3) (xor:SI (match_dup 1) (match_dup 4)))
(set (match_dup 0) (compare:CC (match_dup 3) (match_dup 5)))]
"
{
/* Get the constant we are comparing against, C, and see what it
looks like sign-extended to 16 bits. Then see what constant
could be XOR'ed with C to get the sign-extended value. */
int c = INTVAL (operands[2]);
int sextc = (c << 16) >> 16;
int xorv = c ^ sextc;
operands[4] = GEN_INT (xorv);
operands[5] = GEN_INT (sextc);
}")
To avoid confusion, don't write a single define_split
that
accepts some insns that match some define_insn
as well as some
insns that don't. Instead, write two separate define_split
definitions, one for the insns that are valid and one for the insns that
are not valid.
The splitter is allowed to split jump instructions into sequence of jumps or create new jumps in while splitting non-jump instructions. As the central flowgraph and branch prediction information needs to be updated, several restriction apply.
Splitting of jump instruction into sequence that over by another jump
instruction is always valid, as compiler expect identical behavior of new
jump. When new sequence contains multiple jump instructions or new labels,
more assistance is needed. Splitter is required to create only unconditional
jumps, or simple conditional jump instructions. Additionally it must attach a
REG_BR_PROB
note to each conditional jump. A global variable
split_branch_probability
holds the probability of the original branch in case
it was a simple conditional jump, −1 otherwise. To simplify
recomputing of edge frequencies, the new sequence is required to have only
forward jumps to the newly created labels.
For the common case where the pattern of a define_split exactly matches the
pattern of a define_insn, use define_insn_and_split
. It looks like
this:
(define_insn_and_split [insn-pattern] "condition" "output-template" "split-condition" [new-insn-pattern-1 new-insn-pattern-2 ...] "preparation-statements" [insn-attributes])
insn-pattern, condition, output-template, and
insn-attributes are used as in define_insn
. The
new-insn-pattern vector and the preparation-statements are used as
in a define_split
. The split-condition is also used as in
define_split
, with the additional behavior that if the condition starts
with ‘&&’, the condition used for the split will be the constructed as a
logical “and” of the split condition with the insn condition. For example,
from i386.md:
(define_insn_and_split "zero_extendhisi2_and" [(set (match_operand:SI 0 "register_operand" "=r") (zero_extend:SI (match_operand:HI 1 "register_operand" "0"))) (clobber (reg:CC 17))] "TARGET_ZERO_EXTEND_WITH_AND && !optimize_size" "#" "&& reload_completed" [(parallel [(set (match_dup 0) (and:SI (match_dup 0) (const_int 65535))) (clobber (reg:CC 17))])] "" [(set_attr "type" "alu1")])
In this case, the actual split condition will be ‘TARGET_ZERO_EXTEND_WITH_AND && !optimize_size && reload_completed’.
The define_insn_and_split
construction provides exactly the same
functionality as two separate define_insn
and define_split
patterns. It exists for compactness, and as a maintenance tool to prevent
having to ensure the two patterns' templates match.
The include
pattern tells the compiler tools where to
look for patterns that are in files other than in the file
.md. This is used only at build time and there is no preprocessing allowed.
It looks like:
(include pathname)
For example:
(include "filestuff")
Where pathname is a string that specifies the location of the file, specifies the include file to be in gcc/config/target/filestuff. The directory gcc/config/target is regarded as the default directory.
Machine descriptions may be split up into smaller more manageable subsections and placed into subdirectories.
By specifying:
(include "BOGUS/filestuff")
the include file is specified to be in gcc/config/target/BOGUS/filestuff.
Specifying an absolute path for the include file such as;
(include "/u2/BOGUS/filestuff")
is permitted but is not encouraged.
The -Idir option specifies directories to search for machine descriptions. For example:
genrecog -I/p1/abc/proc1 -I/p2/abcd/pro2 target.md
Add the directory dir to the head of the list of directories to be searched for header files. This can be used to override a system machine definition file, substituting your own version, since these directories are searched before the default machine description file directories. If you use more than one -I option, the directories are scanned in left-to-right order; the standard default directory come after.
In addition to instruction patterns the md file may contain definitions of machine-specific peephole optimizations.
The combiner does not notice certain peephole optimizations when the data flow in the program does not suggest that it should try them. For example, sometimes two consecutive insns related in purpose can be combined even though the second one does not appear to use a register computed in the first one. A machine-specific peephole optimizer can detect such opportunities.
There are two forms of peephole definitions that may be used. The
original define_peephole
is run at assembly output time to
match insns and substitute assembly text. Use of define_peephole
is deprecated.
A newer define_peephole2
matches insns and substitutes new
insns. The peephole2
pass is run after register allocation
but before scheduling, which may result in much better code for
targets that do scheduling.
(define_peephole [insn-pattern-1 insn-pattern-2 ...] "condition" "template" "optional-insn-attributes")
The last string operand may be omitted if you are not using any
machine-specific information in this machine description. If present,
it must obey the same rules as in a define_insn
.
In this skeleton, insn-pattern-1 and so on are patterns to match consecutive insns. The optimization applies to a sequence of insns when insn-pattern-1 matches the first one, insn-pattern-2 matches the next, and so on.
Each of the insns matched by a peephole must also match a
define_insn
. Peepholes are checked only at the last stage just
before code generation, and only optionally. Therefore, any insn which
would match a peephole but no define_insn
will cause a crash in code
generation in an unoptimized compilation, or at various optimization
stages.
The operands of the insns are matched with match_operands
,
match_operator
, and match_dup
, as usual. What is not
usual is that the operand numbers apply to all the insn patterns in the
definition. So, you can check for identical operands in two insns by
using match_operand
in one insn and match_dup
in the
other.
The operand constraints used in match_operand
patterns do not have
any direct effect on the applicability of the peephole, but they will
be validated afterward, so make sure your constraints are general enough
to apply whenever the peephole matches. If the peephole matches
but the constraints are not satisfied, the compiler will crash.
It is safe to omit constraints in all the operands of the peephole; or you can write constraints which serve as a double-check on the criteria previously tested.
Once a sequence of insns matches the patterns, the condition is checked. This is a C expression which makes the final decision whether to perform the optimization (we do so if the expression is nonzero). If condition is omitted (in other words, the string is empty) then the optimization is applied to every sequence of insns that matches the patterns.
The defined peephole optimizations are applied after register allocation is complete. Therefore, the peephole definition can check which operands have ended up in which kinds of registers, just by looking at the operands.
The way to refer to the operands in condition is to write
operands[
i]
for operand number i (as matched by
(match_operand
i ...)
). Use the variable insn
to refer to the last of the insns being matched; use
prev_active_insn
to find the preceding insns.
When optimizing computations with intermediate results, you can use
condition to match only when the intermediate results are not used
elsewhere. Use the C expression dead_or_set_p (
insn,
op)
, where insn is the insn in which you expect the value
to be used for the last time (from the value of insn
, together
with use of prev_nonnote_insn
), and op is the intermediate
value (from operands[
i]
).
Applying the optimization means replacing the sequence of insns with one
new insn. The template controls ultimate output of assembler code
for this combined insn. It works exactly like the template of a
define_insn
. Operand numbers in this template are the same ones
used in matching the original sequence of insns.
The result of a defined peephole optimizer does not need to match any of the insn patterns in the machine description; it does not even have an opportunity to match them. The peephole optimizer definition itself serves as the insn pattern to control how the insn is output.
Defined peephole optimizers are run as assembler code is being output, so the insns they produce are never combined or rearranged in any way.
Here is an example, taken from the 68000 machine description:
(define_peephole [(set (reg:SI 15) (plus:SI (reg:SI 15) (const_int 4))) (set (match_operand:DF 0 "register_operand" "=f") (match_operand:DF 1 "register_operand" "ad"))] "FP_REG_P (operands[0]) && ! FP_REG_P (operands[1])" { rtx xoperands[2]; xoperands[1] = gen_rtx_REG (SImode, REGNO (operands[1]) + 1); #ifdef MOTOROLA output_asm_insn ("move.l %1,(sp)", xoperands); output_asm_insn ("move.l %1,-(sp)", operands); return "fmove.d (sp)+,%0"; #else output_asm_insn ("movel %1,sp@", xoperands); output_asm_insn ("movel %1,sp@-", operands); return "fmoved sp@+,%0"; #endif })
The effect of this optimization is to change
jbsr _foobar addql #4,sp movel d1,sp@- movel d0,sp@- fmoved sp@+,fp0
into
jbsr _foobar movel d1,sp@ movel d0,sp@- fmoved sp@+,fp0
insn-pattern-1 and so on look almost like the second
operand of define_insn
. There is one important difference: the
second operand of define_insn
consists of one or more RTX's
enclosed in square brackets. Usually, there is only one: then the same
action can be written as an element of a define_peephole
. But
when there are multiple actions in a define_insn
, they are
implicitly enclosed in a parallel
. Then you must explicitly
write the parallel
, and the square brackets within it, in the
define_peephole
. Thus, if an insn pattern looks like this,
(define_insn "divmodsi4" [(set (match_operand:SI 0 "general_operand" "=d") (div:SI (match_operand:SI 1 "general_operand" "0") (match_operand:SI 2 "general_operand" "dmsK"))) (set (match_operand:SI 3 "general_operand" "=d") (mod:SI (match_dup 1) (match_dup 2)))] "TARGET_68020" "divsl%.l %2,%3:%0")
then the way to mention this insn in a peephole is as follows:
(define_peephole [... (parallel [(set (match_operand:SI 0 "general_operand" "=d") (div:SI (match_operand:SI 1 "general_operand" "0") (match_operand:SI 2 "general_operand" "dmsK"))) (set (match_operand:SI 3 "general_operand" "=d") (mod:SI (match_dup 1) (match_dup 2)))]) ...] ...)
The define_peephole2
definition tells the compiler how to
substitute one sequence of instructions for another sequence,
what additional scratch registers may be needed and what their
lifetimes must be.
(define_peephole2 [insn-pattern-1 insn-pattern-2 ...] "condition" [new-insn-pattern-1 new-insn-pattern-2 ...] "preparation-statements")
The definition is almost identical to define_split
(see Insn Splitting) except that the pattern to match is not a
single instruction, but a sequence of instructions.
It is possible to request additional scratch registers for use in the output template. If appropriate registers are not free, the pattern will simply not match.
Scratch registers are requested with a match_scratch
pattern at
the top level of the input pattern. The allocated register (initially) will
be dead at the point requested within the original sequence. If the scratch
is used at more than a single point, a match_dup
pattern at the
top level of the input pattern marks the last position in the input sequence
at which the register must be available.
Here is an example from the IA-32 machine description:
(define_peephole2 [(match_scratch:SI 2 "r") (parallel [(set (match_operand:SI 0 "register_operand" "") (match_operator:SI 3 "arith_or_logical_operator" [(match_dup 0) (match_operand:SI 1 "memory_operand" "")])) (clobber (reg:CC 17))])] "! optimize_size && ! TARGET_READ_MODIFY" [(set (match_dup 2) (match_dup 1)) (parallel [(set (match_dup 0) (match_op_dup 3 [(match_dup 0) (match_dup 2)])) (clobber (reg:CC 17))])] "")
This pattern tries to split a load from its use in the hopes that we'll be
able to schedule around the memory load latency. It allocates a single
SImode
register of class GENERAL_REGS
("r"
) that needs
to be live only at the point just before the arithmetic.
A real example requiring extended scratch lifetimes is harder to come by, so here's a silly made-up example:
(define_peephole2
[(match_scratch:SI 4 "r")
(set (match_operand:SI 0 "" "") (match_operand:SI 1 "" ""))
(set (match_operand:SI 2 "" "") (match_dup 1))
(match_dup 4)
(set (match_operand:SI 3 "" "") (match_dup 1))]
"/* determine 1 does not overlap 0 and 2 */"
[(set (match_dup 4) (match_dup 1))
(set (match_dup 0) (match_dup 4))
(set (match_dup 2) (match_dup 4))
(set (match_dup 3) (match_dup 4))]
"")
If we had not added the (match_dup 4)
in the middle of the input
sequence, it might have been the case that the register we chose at the
beginning of the sequence is killed by the first or second set
.
In addition to describing the instruction supported by the target machine,
the md file also defines a group of attributes and a set of
values for each. Every generated insn is assigned a value for each attribute.
One possible attribute would be the effect that the insn has on the machine's
condition code. This attribute can then be used by NOTICE_UPDATE_CC
to track the condition codes.
The define_attr
expression is used to define each attribute required
by the target machine. It looks like:
(define_attr name list-of-values default)
name is a string specifying the name of the attribute being
defined. Some attributes are used in a special way by the rest of the
compiler. The enabled
attribute can be used to conditionally
enable or disable insn alternatives (see Disable Insn Alternatives). The predicable
attribute, together with a
suitable define_cond_exec
(see Conditional Execution), can
be used to automatically generate conditional variants of instruction
patterns. The mnemonic
attribute can be used to check for the
instruction mnemonic (see Mnemonic Attribute). The compiler
internally uses the names ce_enabled
and nonce_enabled
,
so they should not be used elsewhere as alternative names.
list-of-values is either a string that specifies a comma-separated list of values that can be assigned to the attribute, or a null string to indicate that the attribute takes numeric values.
default is an attribute expression that gives the value of this attribute for insns that match patterns whose definition does not include an explicit value for this attribute. See Attr Example, for more information on the handling of defaults. See Constant Attributes, for information on attributes that do not depend on any particular insn.
For each defined attribute, a number of definitions are written to the insn-attr.h file. For cases where an explicit set of values is specified for an attribute, the following are defined:
For example, if the following is present in the md file:
(define_attr "type" "branch,fp,load,store,arith" ...)
the following lines will be written to the file insn-attr.h.
#define HAVE_ATTR_type 1 enum attr_type {TYPE_BRANCH, TYPE_FP, TYPE_LOAD, TYPE_STORE, TYPE_ARITH}; extern enum attr_type get_attr_type ();
If the attribute takes numeric values, no enum
type will be
defined and the function to obtain the attribute's value will return
int
.
There are attributes which are tied to a specific meaning. These attributes are not free to use for other purposes:
length
length
attribute is used to calculate the length of emitted
code chunks. This is especially important when verifying branch
distances. See Insn Lengths.
enabled
enabled
attribute can be defined to prevent certain
alternatives of an insn definition from being used during code
generation. See Disable Insn Alternatives.
mnemonic
mnemonic
attribute can be defined to implement instruction
specific checks in e.g. the pipeline description.
See Mnemonic Attribute.
For each of these special attributes, the corresponding ‘HAVE_ATTR_name’ ‘#define’ is also written when the attribute is not defined; in that case, it is defined as ‘0’.
Another way of defining an attribute is to use:
(define_enum_attr "attr" "enum" default)
This works in just the same way as define_attr
, except that
the list of values is taken from a separate enumeration called
enum (see define_enum). This form allows you to use
the same list of values for several attributes without having to
repeat the list each time. For example:
(define_enum "processor" [ model_a model_b ... ]) (define_enum_attr "arch" "processor" (const (symbol_ref "target_arch"))) (define_enum_attr "tune" "processor" (const (symbol_ref "target_tune")))
defines the same attributes as:
(define_attr "arch" "model_a,model_b,..." (const (symbol_ref "target_arch"))) (define_attr "tune" "model_a,model_b,..." (const (symbol_ref "target_tune")))
but without duplicating the processor list. The second example defines two
separate C enums (attr_arch
and attr_tune
) whereas the first
defines a single C enum (processor
).
RTL expressions used to define attributes use the codes described above plus a few specific to attribute definitions, to be discussed below. Attribute value expressions must have one of the following forms:
(const_int
i)
The value of a numeric attribute can be specified either with a
const_int
, or as an integer represented as a string in
const_string
, eq_attr
(see below), attr
,
symbol_ref
, simple arithmetic expressions, and set_attr
overrides on specific instructions (see Tagging Insns).
(const_string
value)
define_attr
.
If the attribute whose value is being specified is numeric, value
must be a string containing a non-negative integer (normally
const_int
would be used in this case). Otherwise, it must
contain one of the valid values for the attribute.
(if_then_else
test true-value false-value)
(cond [
test1 value1 ...]
default)
cond
expression is that of the
value corresponding to the first true test expression. If
none of the test expressions are true, the value of the cond
expression is that of the default expression.
test expressions can have one of the following forms:
(const_int
i)
(not
test)
(ior
test1 test2)
(and
test1 test2)
(match_operand:
m n pred constraints)
VOIDmode
) and the function specified by the string
pred returns a nonzero value when passed operand n and mode
m (this part of the test is ignored if pred is the null
string).
The constraints operand is ignored and should be the null string.
(match_test
c-expr)
define_insn
alternative that insn matches.
See Output Statement.
c-expr behaves like the condition in a C if
statement,
so there is no need to explicitly convert the expression into a boolean
0 or 1 value. For example, the following two tests are equivalent:
(match_test "x & 2") (match_test "(x & 2) != 0")
(le
arith1 arith2)
(leu
arith1 arith2)
(lt
arith1 arith2)
(ltu
arith1 arith2)
(gt
arith1 arith2)
(gtu
arith1 arith2)
(ge
arith1 arith2)
(geu
arith1 arith2)
(ne
arith1 arith2)
(eq
arith1 arith2)
plus
, minus
, mult
, div
, mod
,
abs
, neg
, and
, ior
, xor
, not
,
ashift
, lshiftrt
, and ashiftrt
expressions.
const_int
and symbol_ref
are always valid terms (see Insn Lengths,for additional forms). symbol_ref
is a string
denoting a C expression that yields an int
when evaluated by the
‘get_attr_...’ routine. It should normally be a global
variable.
(eq_attr
name value)
value is a string that is either a valid value for attribute name, a comma-separated list of values, or ‘!’ followed by a value or list. If value does not begin with a ‘!’, this test is true if the value of the name attribute of the current insn is in the list specified by value. If value begins with a ‘!’, this test is true if the attribute's value is not in the specified list.
For example,
(eq_attr "type" "load,store")
is equivalent to
(ior (eq_attr "type" "load") (eq_attr "type" "store"))
If name specifies an attribute of ‘alternative’, it refers to the
value of the compiler variable which_alternative
(see Output Statement) and the values must be small integers. For
example,
(eq_attr "alternative" "2,3")
is equivalent to
(ior (eq (symbol_ref "which_alternative") (const_int 2)) (eq (symbol_ref "which_alternative") (const_int 3)))
Note that, for most attributes, an eq_attr
test is simplified in cases
where the value of the attribute being tested is known for all insns matching
a particular pattern. This is by far the most common case.
(attr_flag
name)
attr_flag
expression is true if the flag
specified by name is true for the insn
currently being
scheduled.
name is a string specifying one of a fixed set of flags to test.
Test the flags forward
and backward
to determine the
direction of a conditional branch.
This example describes a conditional branch delay slot which can be nullified for forward branches that are taken (annul-true) or for backward branches which are not taken (annul-false).
(define_delay (eq_attr "type" "cbranch") [(eq_attr "in_branch_delay" "true") (and (eq_attr "in_branch_delay" "true") (attr_flag "forward")) (and (eq_attr "in_branch_delay" "true") (attr_flag "backward"))])
The forward
and backward
flags are false if the current
insn
being scheduled is not a conditional branch.
attr_flag
is only used during delay slot scheduling and has no
meaning to other passes of the compiler.
(attr
name)
eq_attr
and attr_flag
produce more efficient code for non-numeric attributes.
The value assigned to an attribute of an insn is primarily determined by
which pattern is matched by that insn (or which define_peephole
generated it). Every define_insn
and define_peephole
can
have an optional last argument to specify the values of attributes for
matching insns. The value of any attribute not specified in a particular
insn is set to the default value for that attribute, as specified in its
define_attr
. Extensive use of default values for attributes
permits the specification of the values for only one or two attributes
in the definition of most insn patterns, as seen in the example in the
next section.
The optional last argument of define_insn
and
define_peephole
is a vector of expressions, each of which defines
the value for a single attribute. The most general way of assigning an
attribute's value is to use a set
expression whose first operand is an
attr
expression giving the name of the attribute being set. The
second operand of the set
is an attribute expression
(see Expressions) giving the value of the attribute.
When the attribute value depends on the ‘alternative’ attribute
(i.e., which is the applicable alternative in the constraint of the
insn), the set_attr_alternative
expression can be used. It
allows the specification of a vector of attribute expressions, one for
each alternative.
When the generality of arbitrary attribute expressions is not required,
the simpler set_attr
expression can be used, which allows
specifying a string giving either a single attribute value or a list
of attribute values, one for each alternative.
The form of each of the above specifications is shown below. In each case, name is a string specifying the attribute to be set.
(set_attr
name value-string)
Note that it may be useful to specify ‘*’ for some alternative, in which case the attribute will assume its default value for insns matching that alternative.
(set_attr_alternative
name [
value1 value2 ...])
cond
with
tests on the ‘alternative’ attribute.
(set (attr
name)
value)
set
must be the special RTL expression
attr
, whose sole operand is a string giving the name of the
attribute being set. value is the value of the attribute.
The following shows three different ways of representing the same attribute value specification:
(set_attr "type" "load,store,arith") (set_attr_alternative "type" [(const_string "load") (const_string "store") (const_string "arith")]) (set (attr "type") (cond [(eq_attr "alternative" "1") (const_string "load") (eq_attr "alternative" "2") (const_string "store")] (const_string "arith")))
The define_asm_attributes
expression provides a mechanism to
specify the attributes assigned to insns produced from an asm
statement. It has the form:
(define_asm_attributes [attr-sets])
where attr-sets is specified the same as for both the
define_insn
and the define_peephole
expressions.
These values will typically be the “worst case” attribute values. For example, they might indicate that the condition code will be clobbered.
A specification for a length
attribute is handled specially. The
way to compute the length of an asm
insn is to multiply the
length specified in the expression define_asm_attributes
by the
number of machine instructions specified in the asm
statement,
determined by counting the number of semicolons and newlines in the
string. Therefore, the value of the length
attribute specified
in a define_asm_attributes
should be the maximum possible length
of a single machine instruction.
The judicious use of defaulting is important in the efficient use of
insn attributes. Typically, insns are divided into types and an
attribute, customarily called type
, is used to represent this
value. This attribute is normally used only to define the default value
for other attributes. An example will clarify this usage.
Assume we have a RISC machine with a condition code and in which only full-word operations are performed in registers. Let us assume that we can divide all insns into loads, stores, (integer) arithmetic operations, floating point operations, and branches.
Here we will concern ourselves with determining the effect of an insn on the condition code and will limit ourselves to the following possible effects: The condition code can be set unpredictably (clobbered), not be changed, be set to agree with the results of the operation, or only changed if the item previously set into the condition code has been modified.
Here is part of a sample md file for such a machine:
(define_attr "type" "load,store,arith,fp,branch" (const_string "arith")) (define_attr "cc" "clobber,unchanged,set,change0" (cond [(eq_attr "type" "load") (const_string "change0") (eq_attr "type" "store,branch") (const_string "unchanged") (eq_attr "type" "arith") (if_then_else (match_operand:SI 0 "" "") (const_string "set") (const_string "clobber"))] (const_string "clobber"))) (define_insn "" [(set (match_operand:SI 0 "general_operand" "=r,r,m") (match_operand:SI 1 "general_operand" "r,m,r"))] "" "@ move %0,%1 load %0,%1 store %0,%1" [(set_attr "type" "arith,load,store")])
Note that we assume in the above example that arithmetic operations performed on quantities smaller than a machine word clobber the condition code since they will set the condition code to a value corresponding to the full-word result.
For many machines, multiple types of branch instructions are provided, each
for different length branch displacements. In most cases, the assembler
will choose the correct instruction to use. However, when the assembler
cannot do so, GCC can when a special attribute, the length
attribute, is defined. This attribute must be defined to have numeric
values by specifying a null string in its define_attr
.
In the case of the length
attribute, two additional forms of
arithmetic terms are allowed in test expressions:
(match_dup
n)
label_ref
.
(pc)
For normal insns, the length will be determined by value of the
length
attribute. In the case of addr_vec
and
addr_diff_vec
insn patterns, the length is computed as
the number of vectors multiplied by the size of each vector.
Lengths are measured in addressable storage units (bytes).
Note that it is possible to call functions via the symbol_ref
mechanism to compute the length of an insn. However, if you use this
mechanism you must provide dummy clauses to express the maximum length
without using the function call. You can an example of this in the
pa
machine description for the call_symref
pattern.
The following macros can be used to refine the length computation:
ADJUST_INSN_LENGTH (
insn,
length)
This macro will normally not be required. A case in which it is
required is the ROMP. On this machine, the size of an addr_vec
insn must be increased by two to compensate for the fact that alignment
may be required.
The routine that returns get_attr_length
(the value of the
length
attribute) can be used by the output routine to
determine the form of the branch instruction to be written, as the
example below illustrates.
As an example of the specification of variable-length branches, consider the IBM 360. If we adopt the convention that a register will be set to the starting address of a function, we can jump to labels within 4k of the start using a four-byte instruction. Otherwise, we need a six-byte sequence to load the address from memory and then branch to it.
On such a machine, a pattern for a branch instruction might be specified as follows:
(define_insn "jump" [(set (pc) (label_ref (match_operand 0 "" "")))] "" { return (get_attr_length (insn) == 4 ? "b %l0" : "l r15,=a(%l0); br r15"); } [(set (attr "length") (if_then_else (lt (match_dup 0) (const_int 4096)) (const_int 4) (const_int 6)))])
A special form of define_attr
, where the expression for the
default value is a const
expression, indicates an attribute that
is constant for a given run of the compiler. Constant attributes may be
used to specify which variety of processor is used. For example,
(define_attr "cpu" "m88100,m88110,m88000" (const (cond [(symbol_ref "TARGET_88100") (const_string "m88100") (symbol_ref "TARGET_88110") (const_string "m88110")] (const_string "m88000")))) (define_attr "memory" "fast,slow" (const (if_then_else (symbol_ref "TARGET_FAST_MEM") (const_string "fast") (const_string "slow"))))
The routine generated for constant attributes has no parameters as it
does not depend on any particular insn. RTL expressions used to define
the value of a constant attribute may use the symbol_ref
form,
but may not use either the match_operand
form or eq_attr
forms involving insn attributes.
The mnemonic
attribute is a string type attribute holding the
instruction mnemonic for an insn alternative. The attribute values
will automatically be generated by the machine description parser if
there is an attribute definition in the md file:
(define_attr "mnemonic" "unknown" (const_string "unknown"))
The default value can be freely chosen as long as it does not collide
with any of the instruction mnemonics. This value will be used
whenever the machine description parser is not able to determine the
mnemonic string. This might be the case for output templates
containing more than a single instruction as in
"mvcle\t%0,%1,0\;jo\t.-4"
.
The mnemonic
attribute set is not generated automatically if the
instruction string is generated via C code.
An existing mnemonic
attribute set in an insn definition will not
be overriden by the md file parser. That way it is possible to
manually set the instruction mnemonics for the cases where the md file
parser fails to determine it automatically.
The mnemonic
attribute is useful for dealing with instruction
specific properties in the pipeline description without defining
additional insn attributes.
(define_attr "ooo_expanded" "" (cond [(eq_attr "mnemonic" "dlr,dsgr,d,dsgf,stam,dsgfr,dlgr") (const_int 1)] (const_int 0)))
The insn attribute mechanism can be used to specify the requirements for delay slots, if any, on a target machine. An instruction is said to require a delay slot if some instructions that are physically after the instruction are executed as if they were located before it. Classic examples are branch and call instructions, which often execute the following instruction before the branch or call is performed.
On some machines, conditional branch instructions can optionally annul instructions in the delay slot. This means that the instruction will not be executed for certain branch outcomes. Both instructions that annul if the branch is true and instructions that annul if the branch is false are supported.
Delay slot scheduling differs from instruction scheduling in that determining whether an instruction needs a delay slot is dependent only on the type of instruction being generated, not on data flow between the instructions. See the next section for a discussion of data-dependent instruction scheduling.
The requirement of an insn needing one or more delay slots is indicated
via the define_delay
expression. It has the following form:
(define_delay test [delay-1 annul-true-1 annul-false-1 delay-2 annul-true-2 annul-false-2 ...])
test is an attribute test that indicates whether this
define_delay
applies to a particular insn. If so, the number of
required delay slots is determined by the length of the vector specified
as the second argument. An insn placed in delay slot n must
satisfy attribute test delay-n. annul-true-n is an
attribute test that specifies which insns may be annulled if the branch
is true. Similarly, annul-false-n specifies which insns in the
delay slot may be annulled if the branch is false. If annulling is not
supported for that delay slot, (nil)
should be coded.
For example, in the common case where branch and call insns require a single delay slot, which may contain any insn other than a branch or call, the following would be placed in the md file:
(define_delay (eq_attr "type" "branch,call") [(eq_attr "type" "!branch,call") (nil) (nil)])
Multiple define_delay
expressions may be specified. In this
case, each such expression specifies different delay slot requirements
and there must be no insn for which tests in two define_delay
expressions are both true.
For example, if we have a machine that requires one delay slot for branches but two for calls, no delay slot can contain a branch or call insn, and any valid insn in the delay slot for the branch can be annulled if the branch is true, we might represent this as follows:
(define_delay (eq_attr "type" "branch") [(eq_attr "type" "!branch,call") (eq_attr "type" "!branch,call") (nil)]) (define_delay (eq_attr "type" "call") [(eq_attr "type" "!branch,call") (nil) (nil) (eq_attr "type" "!branch,call") (nil) (nil)])
To achieve better performance, most modern processors (super-pipelined, superscalar RISC, and VLIW processors) have many functional units on which several instructions can be executed simultaneously. An instruction starts execution if its issue conditions are satisfied. If not, the instruction is stalled until its conditions are satisfied. Such interlock (pipeline) delay causes interruption of the fetching of successor instructions (or demands nop instructions, e.g. for some MIPS processors).
There are two major kinds of interlock delays in modern processors. The first one is a data dependence delay determining instruction latency time. The instruction execution is not started until all source data have been evaluated by prior instructions (there are more complex cases when the instruction execution starts even when the data are not available but will be ready in given time after the instruction execution start). Taking the data dependence delays into account is simple. The data dependence (true, output, and anti-dependence) delay between two instructions is given by a constant. In most cases this approach is adequate. The second kind of interlock delays is a reservation delay. The reservation delay means that two instructions under execution will be in need of shared processors resources, i.e. buses, internal registers, and/or functional units, which are reserved for some time. Taking this kind of delay into account is complex especially for modern RISC processors.
The task of exploiting more processor parallelism is solved by an instruction scheduler. For a better solution to this problem, the instruction scheduler has to have an adequate description of the processor parallelism (or pipeline description). GCC machine descriptions describe processor parallelism and functional unit reservations for groups of instructions with the aid of regular expressions.
The GCC instruction scheduler uses a pipeline hazard recognizer to figure out the possibility of the instruction issue by the processor on a given simulated processor cycle. The pipeline hazard recognizer is automatically generated from the processor pipeline description. The pipeline hazard recognizer generated from the machine description is based on a deterministic finite state automaton (DFA): the instruction issue is possible if there is a transition from one automaton state to another one. This algorithm is very fast, and furthermore, its speed is not dependent on processor complexity5.
The rest of this section describes the directives that constitute an automaton-based processor pipeline description. The order of these constructions within the machine description file is not important.
The following optional construction describes names of automata generated and used for the pipeline hazards recognition. Sometimes the generated finite state automaton used by the pipeline hazard recognizer is large. If we use more than one automaton and bind functional units to the automata, the total size of the automata is usually less than the size of the single automaton. If there is no one such construction, only one finite state automaton is generated.
(define_automaton automata-names)
automata-names is a string giving names of the automata. The
names are separated by commas. All the automata should have unique names.
The automaton name is used in the constructions define_cpu_unit
and
define_query_cpu_unit
.
Each processor functional unit used in the description of instruction reservations should be described by the following construction.
(define_cpu_unit unit-names [automaton-name])
unit-names is a string giving the names of the functional units separated by commas. Don't use name ‘nothing’, it is reserved for other goals.
automaton-name is a string giving the name of the automaton with
which the unit is bound. The automaton should be described in
construction define_automaton
. You should give
automaton-name, if there is a defined automaton.
The assignment of units to automata are constrained by the uses of the units in insn reservations. The most important constraint is: if a unit reservation is present on a particular cycle of an alternative for an insn reservation, then some unit from the same automaton must be present on the same cycle for the other alternatives of the insn reservation. The rest of the constraints are mentioned in the description of the subsequent constructions.
The following construction describes CPU functional units analogously
to define_cpu_unit
. The reservation of such units can be
queried for an automaton state. The instruction scheduler never
queries reservation of functional units for given automaton state. So
as a rule, you don't need this construction. This construction could
be used for future code generation goals (e.g. to generate
VLIW insn templates).
(define_query_cpu_unit unit-names [automaton-name])
unit-names is a string giving names of the functional units separated by commas.
automaton-name is a string giving the name of the automaton with which the unit is bound.
The following construction is the major one to describe pipeline characteristics of an instruction.
(define_insn_reservation insn-name default_latency condition regexp)
default_latency is a number giving latency time of the
instruction. There is an important difference between the old
description and the automaton based pipeline description. The latency
time is used for all dependencies when we use the old description. In
the automaton based pipeline description, the given latency time is only
used for true dependencies. The cost of anti-dependencies is always
zero and the cost of output dependencies is the difference between
latency times of the producing and consuming insns (if the difference
is negative, the cost is considered to be zero). You can always
change the default costs for any description by using the target hook
TARGET_SCHED_ADJUST_COST
(see Scheduling).
insn-name is a string giving the internal name of the insn. The
internal names are used in constructions define_bypass
and in
the automaton description file generated for debugging. The internal
name has nothing in common with the names in define_insn
. It is a
good practice to use insn classes described in the processor manual.
condition defines what RTL insns are described by this
construction. You should remember that you will be in trouble if
condition for two or more different
define_insn_reservation
constructions is TRUE for an insn. In
this case what reservation will be used for the insn is not defined.
Such cases are not checked during generation of the pipeline hazards
recognizer because in general recognizing that two conditions may have
the same value is quite difficult (especially if the conditions
contain symbol_ref
). It is also not checked during the
pipeline hazard recognizer work because it would slow down the
recognizer considerably.
regexp is a string describing the reservation of the cpu's functional units by the instruction. The reservations are described by a regular expression according to the following syntax:
regexp = regexp "," oneof | oneof oneof = oneof "|" allof | allof allof = allof "+" repeat | repeat repeat = element "*" number | element element = cpu_function_unit_name | reservation_name | result_name | "nothing" | "(" regexp ")"
Sometimes unit reservations for different insns contain common parts. In such case, you can simplify the pipeline description by describing the common part by the following construction
(define_reservation reservation-name regexp)
reservation-name is a string giving name of regexp. Functional unit names and reservation names are in the same name space. So the reservation names should be different from the functional unit names and can not be the reserved name ‘nothing’.
The following construction is used to describe exceptions in the latency time for given instruction pair. This is so called bypasses.
(define_bypass number out_insn_names in_insn_names [guard])
number defines when the result generated by the instructions
given in string out_insn_names will be ready for the
instructions given in string in_insn_names. Each of these
strings is a comma-separated list of filename-style globs and
they refer to the names of define_insn_reservation
s.
For example:
(define_bypass 1 "cpu1_load_*, cpu1_store_*" "cpu1_load_*")
defines a bypass between instructions that start with ‘cpu1_load_’ or ‘cpu1_store_’ and those that start with ‘cpu1_load_’.
guard is an optional string giving the name of a C function which defines an additional guard for the bypass. The function will get the two insns as parameters. If the function returns zero the bypass will be ignored for this case. The additional guard is necessary to recognize complicated bypasses, e.g. when the consumer is only an address of insn ‘store’ (not a stored value).
If there are more one bypass with the same output and input insns, the chosen bypass is the first bypass with a guard in description whose guard function returns nonzero. If there is no such bypass, then bypass without the guard function is chosen.
The following five constructions are usually used to describe VLIW processors, or more precisely, to describe a placement of small instructions into VLIW instruction slots. They can be used for RISC processors, too.
(exclusion_set unit-names unit-names) (presence_set unit-names patterns) (final_presence_set unit-names patterns) (absence_set unit-names patterns) (final_absence_set unit-names patterns)
unit-names is a string giving names of functional units separated by commas.
patterns is a string giving patterns of functional units separated by comma. Currently pattern is one unit or units separated by white-spaces.
The first construction (‘exclusion_set’) means that each functional unit in the first string can not be reserved simultaneously with a unit whose name is in the second string and vice versa. For example, the construction is useful for describing processors (e.g. some SPARC processors) with a fully pipelined floating point functional unit which can execute simultaneously only single floating point insns or only double floating point insns.
The second construction (‘presence_set’) means that each functional unit in the first string can not be reserved unless at least one of pattern of units whose names are in the second string is reserved. This is an asymmetric relation. For example, it is useful for description that VLIW ‘slot1’ is reserved after ‘slot0’ reservation. We could describe it by the following construction
(presence_set "slot1" "slot0")
Or ‘slot1’ is reserved only after ‘slot0’ and unit ‘b0’ reservation. In this case we could write
(presence_set "slot1" "slot0 b0")
The third construction (‘final_presence_set’) is analogous to ‘presence_set’. The difference between them is when checking is done. When an instruction is issued in given automaton state reflecting all current and planned unit reservations, the automaton state is changed. The first state is a source state, the second one is a result state. Checking for ‘presence_set’ is done on the source state reservation, checking for ‘final_presence_set’ is done on the result reservation. This construction is useful to describe a reservation which is actually two subsequent reservations. For example, if we use
(presence_set "slot1" "slot0")
the following insn will be never issued (because ‘slot1’ requires ‘slot0’ which is absent in the source state).
(define_reservation "insn_and_nop" "slot0 + slot1")
but it can be issued if we use analogous ‘final_presence_set’.
The forth construction (‘absence_set’) means that each functional unit in the first string can be reserved only if each pattern of units whose names are in the second string is not reserved. This is an asymmetric relation (actually ‘exclusion_set’ is analogous to this one but it is symmetric). For example it might be useful in a VLIW description to say that ‘slot0’ cannot be reserved after either ‘slot1’ or ‘slot2’ have been reserved. This can be described as:
(absence_set "slot0" "slot1, slot2")
Or ‘slot2’ can not be reserved if ‘slot0’ and unit ‘b0’ are reserved or ‘slot1’ and unit ‘b1’ are reserved. In this case we could write
(absence_set "slot2" "slot0 b0, slot1 b1")
All functional units mentioned in a set should belong to the same automaton.
The last construction (‘final_absence_set’) is analogous to ‘absence_set’ but checking is done on the result (state) reservation. See comments for ‘final_presence_set’.
You can control the generator of the pipeline hazard recognizer with the following construction.
(automata_option options)
options is a string giving options which affect the generated code. Currently there are the following options:
const0_rtx
to
state_transition. In such an automaton, cycle advance transitions are
available only for these collapsed states. This option is useful for
ports that want to use the ndfa
option, but also want to use
define_query_cpu_unit
to assign units to insns issued in a cycle.
As an example, consider a superscalar RISC machine which can issue three insns (two integer insns and one floating point insn) on the cycle but can finish only two insns. To describe this, we define the following functional units.
(define_cpu_unit "i0_pipeline, i1_pipeline, f_pipeline") (define_cpu_unit "port0, port1")
All simple integer insns can be executed in any integer pipeline and their result is ready in two cycles. The simple integer insns are issued into the first pipeline unless it is reserved, otherwise they are issued into the second pipeline. Integer division and multiplication insns can be executed only in the second integer pipeline and their results are ready correspondingly in 8 and 4 cycles. The integer division is not pipelined, i.e. the subsequent integer division insn can not be issued until the current division insn finished. Floating point insns are fully pipelined and their results are ready in 3 cycles. Where the result of a floating point insn is used by an integer insn, an additional delay of one cycle is incurred. To describe all of this we could specify
(define_cpu_unit "div") (define_insn_reservation "simple" 2 (eq_attr "type" "int") "(i0_pipeline | i1_pipeline), (port0 | port1)") (define_insn_reservation "mult" 4 (eq_attr "type" "mult") "i1_pipeline, nothing*2, (port0 | port1)") (define_insn_reservation "div" 8 (eq_attr "type" "div") "i1_pipeline, div*7, div + (port0 | port1)") (define_insn_reservation "float" 3 (eq_attr "type" "float") "f_pipeline, nothing, (port0 | port1)) (define_bypass 4 "float" "simple,mult,div")
To simplify the description we could describe the following reservation
(define_reservation "finish" "port0|port1")
and use it in all define_insn_reservation
as in the following
construction
(define_insn_reservation "simple" 2 (eq_attr "type" "int") "(i0_pipeline | i1_pipeline), finish")
A number of architectures provide for some form of conditional
execution, or predication. The hallmark of this feature is the
ability to nullify most of the instructions in the instruction set.
When the instruction set is large and not entirely symmetric, it
can be quite tedious to describe these forms directly in the
.md file. An alternative is the define_cond_exec
template.
(define_cond_exec [predicate-pattern] "condition" "output-template" "optional-insn-attribues")
predicate-pattern is the condition that must be true for the
insn to be executed at runtime and should match a relational operator.
One can use match_operator
to match several relational operators
at once. Any match_operand
operands must have no more than one
alternative.
condition is a C expression that must be true for the generated pattern to match.
output-template is a string similar to the define_insn
output template (see Output Template), except that the ‘*’
and ‘@’ special cases do not apply. This is only useful if the
assembly text for the predicate is a simple prefix to the main insn.
In order to handle the general case, there is a global variable
current_insn_predicate
that will contain the entire predicate
if the current insn is predicated, and will otherwise be NULL
.
optional-insn-attributes is an optional vector of attributes that gets appended to the insn attributes of the produced cond_exec rtx. It can be used to add some distinguishing attribute to cond_exec rtxs produced that way. An example usage would be to use this attribute in conjunction with attributes on the main pattern to disable particular alternatives under certain conditions.
When define_cond_exec
is used, an implicit reference to
the predicable
instruction attribute is made.
See Insn Attributes. This attribute must be a boolean (i.e. have
exactly two elements in its list-of-values), with the possible
values being no
and yes
. The default and all uses in
the insns must be a simple constant, not a complex expressions. It
may, however, depend on the alternative, by using a comma-separated
list of values. If that is the case, the port should also define an
enabled
attribute (see Disable Insn Alternatives), which
should also allow only no
and yes
as its values.
For each define_insn
for which the predicable
attribute is true, a new define_insn
pattern will be
generated that matches a predicated version of the instruction.
For example,
(define_insn "addsi" [(set (match_operand:SI 0 "register_operand" "r") (plus:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r")))] "test1" "add %2,%1,%0") (define_cond_exec [(ne (match_operand:CC 0 "register_operand" "c") (const_int 0))] "test2" "(%0)")
generates a new pattern
(define_insn "" [(cond_exec (ne (match_operand:CC 3 "register_operand" "c") (const_int 0)) (set (match_operand:SI 0 "register_operand" "r") (plus:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r"))))] "(test2) && (test1)" "(%3) add %2,%1,%0")
For some hardware architectures there are common cases when the RTL
templates for the instructions can be derived from the other RTL
templates using simple transformations. E.g., i386.md contains
an RTL template for the ordinary sub
instruction—
*subsi_1
, and for the sub
instruction with subsequent
zero-extension—*subsi_1_zext
. Such cases can be easily
implemented by a single meta-template capable of generating a modified
case based on the initial one:
(define_subst "name" [input-template] "condition" [output-template])
input-template is a pattern describing the source RTL template, which will be transformed.
condition is a C expression that is conjunct with the condition from the input-template to generate a condition to be used in the output-template.
output-template is a pattern that will be used in the resulting template.
define_subst
mechanism is tightly coupled with the notion of the
subst attribute (see Subst Iterators). The use of
define_subst
is triggered by a reference to a subst attribute in
the transforming RTL template. This reference initiates duplication of
the source RTL template and substitution of the attributes with their
values. The source RTL template is left unchanged, while the copy is
transformed by define_subst
. This transformation can fail in the
case when the source RTL template is not matched against the
input-template of the define_subst
. In such case the copy is
deleted.
define_subst
can be used only in define_insn
and
define_expand
, it cannot be used in other expressions (e.g. in
define_insn_and_split
).
define_subst
Example
To illustrate how define_subst
works, let us examine a simple
template transformation.
Suppose there are two kinds of instructions: one that touches flags and
the other that does not. The instructions of the second type could be
generated with the following define_subst
:
(define_subst "add_clobber_subst" [(set (match_operand:SI 0 "" "") (match_operand:SI 1 "" ""))] "" [(set (match_dup 0) (match_dup 1)) (clobber (reg:CC FLAGS_REG))]
This define_subst
can be applied to any RTL pattern containing
set
of mode SI and generates a copy with clobber when it is
applied.
Assume there is an RTL template for a max
instruction to be used
in define_subst
mentioned above:
(define_insn "maxsi" [(set (match_operand:SI 0 "register_operand" "=r") (max:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r")))] "" "max\t{%2, %1, %0|%0, %1, %2}" [...])
To mark the RTL template for define_subst
application,
subst-attributes are used. They should be declared in advance:
(define_subst_attr "add_clobber_name" "add_clobber_subst" "_noclobber" "_clobber")
Here ‘add_clobber_name’ is the attribute name,
‘add_clobber_subst’ is the name of the corresponding
define_subst
, the third argument (‘_noclobber’) is the
attribute value that would be substituted into the unchanged version of
the source RTL template, and the last argument (‘_clobber’) is the
value that would be substituted into the second, transformed,
version of the RTL template.
Once the subst-attribute has been defined, it should be used in RTL
templates which need to be processed by the define_subst
. So,
the original RTL template should be changed:
(define_insn "maxsi<add_clobber_name>" [(set (match_operand:SI 0 "register_operand" "=r") (max:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r")))] "" "max\t{%2, %1, %0|%0, %1, %2}" [...])
The result of the define_subst
usage would look like the following:
(define_insn "maxsi_noclobber" [(set (match_operand:SI 0 "register_operand" "=r") (max:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r")))] "" "max\t{%2, %1, %0|%0, %1, %2}" [...]) (define_insn "maxsi_clobber" [(set (match_operand:SI 0 "register_operand" "=r") (max:SI (match_operand:SI 1 "register_operand" "r") (match_operand:SI 2 "register_operand" "r"))) (clobber (reg:CC FLAGS_REG))] "" "max\t{%2, %1, %0|%0, %1, %2}" [...])
define_subst
All expressions, allowed in define_insn
or define_expand
,
are allowed in the input-template of define_subst
, except
match_par_dup
, match_scratch
, match_parallel
. The
meanings of expressions in the input-template were changed:
match_operand
matches any expression (possibly, a subtree in
RTL-template), if modes of the match_operand
and this expression
are the same, or mode of the match_operand
is VOIDmode
, or
this expression is match_dup
, match_op_dup
. If the
expression is match_operand
too, and predicate of
match_operand
from the input pattern is not empty, then the
predicates are compared. That can be used for more accurate filtering
of accepted RTL-templates.
match_operator
matches common operators (like plus
,
minus
), unspec
, unspec_volatile
operators and
match_operator
s from the original pattern if the modes match and
match_operator
from the input pattern has the same number of
operands as the operator from the original pattern.
define_subst
If all necessary checks for define_subst
application pass, a new
RTL-pattern, based on the output-template, is created to replace the old
template. Like in input-patterns, meanings of some RTL expressions are
changed when they are used in output-patterns of a define_subst
.
Thus, match_dup
is used for copying the whole expression from the
original pattern, which matched corresponding match_operand
from
the input pattern.
match_dup N
is used in the output template to be replaced with
the expression from the original pattern, which matched
match_operand N
from the input pattern. As a consequence,
match_dup
cannot be used to point to match_operand
s from
the output pattern, it should always refer to a match_operand
from the input pattern.
In the output template one can refer to the expressions from the
original pattern and create new ones. For instance, some operands could
be added by means of standard match_operand
.
After replacing match_dup
with some RTL-subtree from the original
pattern, it could happen that several match_operand
s in the
output pattern have the same indexes. It is unknown, how many and what
indexes would be used in the expression which would replace
match_dup
, so such conflicts in indexes are inevitable. To
overcome this issue, match_operands
and match_operators
,
which were introduced into the output pattern, are renumerated when all
match_dup
s are replaced.
Number of alternatives in match_operand
s introduced into the
output template M
could differ from the number of alternatives in
the original pattern N
, so in the resultant pattern there would
be N*M
alternatives. Thus, constraints from the original pattern
would be duplicated N
times, constraints from the output pattern
would be duplicated M
times, producing all possible combinations.
Using literal constants inside instruction patterns reduces legibility and can be a maintenance problem.
To overcome this problem, you may use the define_constants
expression. It contains a vector of name-value pairs. From that
point on, wherever any of the names appears in the MD file, it is as
if the corresponding value had been written instead. You may use
define_constants
multiple times; each appearance adds more
constants to the table. It is an error to redefine a constant with
a different value.
To come back to the a29k load multiple example, instead of
(define_insn "" [(match_parallel 0 "load_multiple_operation" [(set (match_operand:SI 1 "gpc_reg_operand" "=r") (match_operand:SI 2 "memory_operand" "m")) (use (reg:SI 179)) (clobber (reg:SI 179))])] "" "loadm 0,0,%1,%2")
You could write:
(define_constants [ (R_BP 177) (R_FC 178) (R_CR 179) (R_Q 180) ]) (define_insn "" [(match_parallel 0 "load_multiple_operation" [(set (match_operand:SI 1 "gpc_reg_operand" "=r") (match_operand:SI 2 "memory_operand" "m")) (use (reg:SI R_CR)) (clobber (reg:SI R_CR))])] "" "loadm 0,0,%1,%2")
The constants that are defined with a define_constant are also output in the insn-codes.h header file as #defines.
You can also use the machine description file to define enumerations.
Like the constants defined by define_constant
, these enumerations
are visible to both the machine description file and the main C code.
The syntax is as follows:
(define_c_enum "name" [ value0 value1 ... valuen ])
This definition causes the equivalent of the following C code to appear in insn-constants.h:
enum name { value0 = 0, value1 = 1, ... valuen = n }; #define NUM_cname_VALUES (n + 1)
where cname is the capitalized form of name. It also makes each valuei available in the machine description file, just as if it had been declared with:
(define_constants [(valuei i)])
Each valuei is usually an upper-case identifier and usually begins with cname.
You can split the enumeration definition into as many statements as you like. The above example is directly equivalent to:
(define_c_enum "name" [value0]) (define_c_enum "name" [value1]) ... (define_c_enum "name" [valuen])
Splitting the enumeration helps to improve the modularity of each
individual .md
file. For example, if a port defines its
synchronization instructions in a separate sync.md file,
it is convenient to define all synchronization-specific enumeration
values in sync.md rather than in the main .md file.
Some enumeration names have special significance to GCC:
unspecv
unspecv
is defined, GCC will use it
when printing out unspec_volatile
expressions. For example:
(define_c_enum "unspecv" [ UNSPECV_BLOCKAGE ])
causes GCC to print ‘(unspec_volatile ... 0)’ as:
(unspec_volatile ... UNSPECV_BLOCKAGE)
unspec
unspec
is defined, GCC will use
it when printing out unspec
expressions. GCC will also use
it when printing out unspec_volatile
expressions unless an
unspecv
enumeration is also defined. You can therefore
decide whether to keep separate enumerations for volatile and
non-volatile expressions or whether to use the same enumeration
for both.
Another way of defining an enumeration is to use define_enum
:
(define_enum "name" [ value0 value1 ... valuen ])
This directive implies:
(define_c_enum "name" [ cname_cvalue0 cname_cvalue1 ... cname_cvaluen ])
where cvaluei is the capitalized form of valuei.
However, unlike define_c_enum
, the enumerations defined
by define_enum
can be used in attribute specifications
(see define_enum_attr).
Ports often need to define similar patterns for more than one machine mode or for more than one rtx code. GCC provides some simple iterator facilities to make this process easier.
Ports often need to define similar patterns for two or more different modes. For example:
SFmode
patterns tend to be
very similar to the DFmode
ones.
SImode
pointers in one configuration and
DImode
pointers in another, it will usually have very similar
SImode
and DImode
patterns for manipulating pointers.
Mode iterators allow several patterns to be instantiated from one
.md file template. They can be used with any type of
rtx-based construct, such as a define_insn
,
define_split
, or define_peephole2
.
The syntax for defining a mode iterator is:
(define_mode_iterator name [(mode1 "cond1") ... (moden "condn")])
This allows subsequent .md file constructs to use the mode suffix
:
name. Every construct that does so will be expanded
n times, once with every use of :
name replaced by
:
mode1, once with every use replaced by :
mode2,
and so on. In the expansion for a particular modei, every
C condition will also require that condi be true.
For example:
(define_mode_iterator P [(SI "Pmode == SImode") (DI "Pmode == DImode")])
defines a new mode suffix :P
. Every construct that uses
:P
will be expanded twice, once with every :P
replaced
by :SI
and once with every :P
replaced by :DI
.
The :SI
version will only apply if Pmode == SImode
and
the :DI
version will only apply if Pmode == DImode
.
As with other .md conditions, an empty string is treated
as “always true”. (
mode "")
can also be abbreviated
to mode. For example:
(define_mode_iterator GPR [SI (DI "TARGET_64BIT")])
means that the :DI
expansion only applies if TARGET_64BIT
but that the :SI
expansion has no such constraint.
Iterators are applied in the order they are defined. This can be significant if two iterators are used in a construct that requires substitutions. See Substitutions.
If an .md file construct uses mode iterators, each version of the construct will often need slightly different strings or modes. For example:
define_expand
defines several add
m3
patterns
(see Standard Names), each expander will need to use the
appropriate mode name for m.
define_insn
defines several instruction patterns,
each instruction will often use a different assembler mnemonic.
define_insn
requires operands with different modes,
using an iterator for one of the operand modes usually requires a specific
mode for the other operand(s).
GCC supports such variations through a system of “mode attributes”.
There are two standard attributes: mode
, which is the name of
the mode in lower case, and MODE
, which is the same thing in
upper case. You can define other attributes using:
(define_mode_attr name [(mode1 "value1") ... (moden "valuen")])
where name is the name of the attribute and valuei is the value associated with modei.
When GCC replaces some :iterator with :mode, it will scan
each string and mode in the pattern for sequences of the form
<
iterator:
attr>
, where attr is the name of a
mode attribute. If the attribute is defined for mode, the whole
<...>
sequence will be replaced by the appropriate attribute
value.
For example, suppose an .md file has:
(define_mode_iterator P [(SI "Pmode == SImode") (DI "Pmode == DImode")]) (define_mode_attr load [(SI "lw") (DI "ld")])
If one of the patterns that uses :P
contains the string
"<P:load>\t%0,%1"
, the SI
version of that pattern
will use "lw\t%0,%1"
and the DI
version will use
"ld\t%0,%1"
.
Here is an example of using an attribute for a mode:
(define_mode_iterator LONG [SI DI]) (define_mode_attr SHORT [(SI "HI") (DI "SI")]) (define_insn ... (sign_extend:LONG (match_operand:<LONG:SHORT> ...)) ...)
The iterator:
prefix may be omitted, in which case the
substitution will be attempted for every iterator expansion.
Here is an example from the MIPS port. It defines the following modes and attributes (among others):
(define_mode_iterator GPR [SI (DI "TARGET_64BIT")]) (define_mode_attr d [(SI "") (DI "d")])
and uses the following template to define both subsi3
and subdi3
:
(define_insn "sub<mode>3" [(set (match_operand:GPR 0 "register_operand" "=d") (minus:GPR (match_operand:GPR 1 "register_operand" "d") (match_operand:GPR 2 "register_operand" "d")))] "" "<d>subu\t%0,%1,%2" [(set_attr "type" "arith") (set_attr "mode" "<MODE>")])
This is exactly equivalent to:
(define_insn "subsi3" [(set (match_operand:SI 0 "register_operand" "=d") (minus:SI (match_operand:SI 1 "register_operand" "d") (match_operand:SI 2 "register_operand" "d")))] "" "subu\t%0,%1,%2" [(set_attr "type" "arith") (set_attr "mode" "SI")]) (define_insn "subdi3" [(set (match_operand:DI 0 "register_operand" "=d") (minus:DI (match_operand:DI 1 "register_operand" "d") (match_operand:DI 2 "register_operand" "d")))] "" "dsubu\t%0,%1,%2" [(set_attr "type" "arith") (set_attr "mode" "DI")])
Code iterators operate in a similar way to mode iterators. See Mode Iterators.
The construct:
(define_code_iterator name [(code1 "cond1") ... (coden "condn")])
defines a pseudo rtx code name that can be instantiated as codei if condition condi is true. Each codei must have the same rtx format. See RTL Classes.
As with mode iterators, each pattern that uses name will be expanded n times, once with all uses of name replaced by code1, once with all uses replaced by code2, and so on. See Defining Mode Iterators.
It is possible to define attributes for codes as well as for modes.
There are two standard code attributes: code
, the name of the
code in lower case, and CODE
, the name of the code in upper case.
Other attributes are defined using:
(define_code_attr name [(code1 "value1") ... (coden "valuen")])
Here's an example of code iterators in action, taken from the MIPS port:
(define_code_iterator any_cond [unordered ordered unlt unge uneq ltgt unle ungt eq ne gt ge lt le gtu geu ltu leu]) (define_expand "b<code>" [(set (pc) (if_then_else (any_cond:CC (cc0) (const_int 0)) (label_ref (match_operand 0 "")) (pc)))] "" { gen_conditional_branch (operands, <CODE>); DONE; })
This is equivalent to:
(define_expand "bunordered" [(set (pc) (if_then_else (unordered:CC (cc0) (const_int 0)) (label_ref (match_operand 0 "")) (pc)))] "" { gen_conditional_branch (operands, UNORDERED); DONE; }) (define_expand "bordered" [(set (pc) (if_then_else (ordered:CC (cc0) (const_int 0)) (label_ref (match_operand 0 "")) (pc)))] "" { gen_conditional_branch (operands, ORDERED); DONE; }) ...
Int iterators operate in a similar way to code iterators. See Code Iterators.
The construct:
(define_int_iterator name [(int1 "cond1") ... (intn "condn")])
defines a pseudo integer constant name that can be instantiated as inti if condition condi is true. Each int must have the same rtx format. See RTL Classes. Int iterators can appear in only those rtx fields that have 'i' as the specifier. This means that each int has to be a constant defined using define_constant or define_c_enum.
As with mode and code iterators, each pattern that uses name will be expanded n times, once with all uses of name replaced by int1, once with all uses replaced by int2, and so on. See Defining Mode Iterators.
It is possible to define attributes for ints as well as for codes and modes. Attributes are defined using:
(define_int_attr name [(int1 "value1") ... (intn "valuen")])
Here's an example of int iterators in action, taken from the ARM port:
(define_int_iterator QABSNEG [UNSPEC_VQABS UNSPEC_VQNEG]) (define_int_attr absneg [(UNSPEC_VQABS "abs") (UNSPEC_VQNEG "neg")]) (define_insn "neon_vq<absneg><mode>" [(set (match_operand:VDQIW 0 "s_register_operand" "=w") (unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w") (match_operand:SI 2 "immediate_operand" "i")] QABSNEG))] "TARGET_NEON" "vq<absneg>.<V_s_elem>\t%<V_reg>0, %<V_reg>1" [(set_attr "type" "neon_vqneg_vqabs")] )
This is equivalent to:
(define_insn "neon_vqabs<mode>" [(set (match_operand:VDQIW 0 "s_register_operand" "=w") (unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w") (match_operand:SI 2 "immediate_operand" "i")] UNSPEC_VQABS))] "TARGET_NEON" "vqabs.<V_s_elem>\t%<V_reg>0, %<V_reg>1" [(set_attr "type" "neon_vqneg_vqabs")] ) (define_insn "neon_vqneg<mode>" [(set (match_operand:VDQIW 0 "s_register_operand" "=w") (unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w") (match_operand:SI 2 "immediate_operand" "i")] UNSPEC_VQNEG))] "TARGET_NEON" "vqneg.<V_s_elem>\t%<V_reg>0, %<V_reg>1" [(set_attr "type" "neon_vqneg_vqabs")] )
Subst iterators are special type of iterators with the following restrictions: they could not be declared explicitly, they always have only two values, and they do not have explicit dedicated name. Subst-iterators are triggered only when corresponding subst-attribute is used in RTL-pattern.
Subst iterators transform templates in the following way: the templates
are duplicated, the subst-attributes in these templates are replaced
with the corresponding values, and a new attribute is implicitly added
to the given define_insn
/define_expand
. The name of the
added attribute matches the name of define_subst
. Such
attributes are declared implicitly, and it is not allowed to have a
define_attr
named as a define_subst
.
Each subst iterator is linked to a define_subst
. It is declared
implicitly by the first appearance of the corresponding
define_subst_attr
, and it is not allowed to define it explicitly.
Declarations of subst-attributes have the following syntax:
(define_subst_attr "name" "subst-name" "no-subst-value" "subst-applied-value")
name is a string with which the given subst-attribute could be referred to.
subst-name shows which define_subst
should be applied to an
RTL-template if the given subst-attribute is present in the
RTL-template.
no-subst-value is a value with which subst-attribute would be replaced in the first copy of the original RTL-template.
subst-applied-value is a value with which subst-attribute would be replaced in the second copy of the original RTL-template.
In addition to the file machine.md, a machine description
includes a C header file conventionally given the name
machine.h and a C source file named machine.c.
The header file defines numerous macros that convey the information
about the target machine that does not fit into the scheme of the
.md file. The file tm.h should be a link to
machine.h. The header file config.h includes
tm.h and most compiler source files include config.h. The
source file defines a variable targetm
, which is a structure
containing pointers to functions and data relating to the target
machine. machine.c should also contain their definitions,
if they are not defined elsewhere in GCC, and other functions called
through the macros defined in the .h file.
targetm
VariableThe target .c file must define the global
targetm
variable which contains pointers to functions and data relating to the target machine. The variable is declared in target.h; target-def.h defines the macroTARGET_INITIALIZER
which is used to initialize the variable, and macros for the default initializers for elements of the structure. The .c file should override those macros for which the default definition is inappropriate. For example:#include "target.h" #include "target-def.h" /* Initialize the GCC target structure. */ #undef TARGET_COMP_TYPE_ATTRIBUTES #define TARGET_COMP_TYPE_ATTRIBUTES machine_comp_type_attributes struct gcc_target targetm = TARGET_INITIALIZER;
Where a macro should be defined in the .c file in this manner to
form part of the targetm
structure, it is documented below as a
“Target Hook” with a prototype. Many macros will change in future
from being defined in the .h file to being part of the
targetm
structure.
Similarly, there is a targetcm
variable for hooks that are
specific to front ends for C-family languages, documented as “C
Target Hook”. This is declared in c-family/c-target.h, the
initializer TARGETCM_INITIALIZER
in
c-family/c-target-def.h. If targets initialize targetcm
themselves, they should set target_has_targetcm=yes
in
config.gcc; otherwise a default definition is used.
Similarly, there is a targetm_common
variable for hooks that
are shared between the compiler driver and the compilers proper,
documented as “Common Target Hook”. This is declared in
common/common-target.h, the initializer
TARGETM_COMMON_INITIALIZER
in
common/common-target-def.h. If targets initialize
targetm_common
themselves, they should set
target_has_targetm_common=yes
in config.gcc; otherwise a
default definition is used.
You can control the compilation driver.
A list of specs for the driver itself. It should be a suitable initializer for an array of strings, with no surrounding braces.
The driver applies these specs to its own command line between loading default specs files (but not command-line specified ones) and choosing the multilib directory or running any subcommands. It applies them in the order given, so each spec can depend on the options added by earlier ones. It is also possible to remove options using ‘%<option’ in the usual way.
This macro can be useful when a port has several interdependent target options. It provides a way of standardizing the command line so that the other specs are easier to write.
Do not define this macro if it does not need to do anything.
A list of specs used to support configure-time default options (i.e. --with options) in the driver. It should be a suitable initializer for an array of structures, each containing two strings, without the outermost pair of surrounding braces.
The first item in the pair is the name of the default. This must match the code in config.gcc for the target. The second item is a spec to apply if a default with this name was specified. The string ‘%(VALUE)’ in the spec will be replaced by the value of the default everywhere it occurs.
The driver will apply these specs to its own command line between loading default specs files and processing
DRIVER_SELF_SPECS
, using the same mechanism asDRIVER_SELF_SPECS
.Do not define this macro if it does not need to do anything.
A C string constant that tells the GCC driver program options to pass to CPP. It can also specify how to translate options you give to GCC into options for GCC to pass to the CPP.
Do not define this macro if it does not need to do anything.
This macro is just like
CPP_SPEC
, but is used for C++, rather than C. If you do not define this macro, then the value ofCPP_SPEC
(if any) will be used instead.
A C string constant that tells the GCC driver program options to pass to
cc1
,cc1plus
,f771
, and the other language front ends. It can also specify how to translate options you give to GCC into options for GCC to pass to front ends.Do not define this macro if it does not need to do anything.
A C string constant that tells the GCC driver program options to pass to
cc1plus
. It can also specify how to translate options you give to GCC into options for GCC to pass to thecc1plus
.Do not define this macro if it does not need to do anything. Note that everything defined in CC1_SPEC is already passed to
cc1plus
so there is no need to duplicate the contents of CC1_SPEC in CC1PLUS_SPEC.
A C string constant that tells the GCC driver program options to pass to the assembler. It can also specify how to translate options you give to GCC into options for GCC to pass to the assembler. See the file sun3.h for an example of this.
Do not define this macro if it does not need to do anything.
A C string constant that tells the GCC driver program how to run any programs which cleanup after the normal assembler. Normally, this is not needed. See the file mips.h for an example of this.
Do not define this macro if it does not need to do anything.
Define this macro, with no value, if the driver should give the assembler an argument consisting of a single dash, -, to instruct it to read from its standard input (which will be a pipe connected to the output of the compiler proper). This argument is given after any -o option specifying the name of the output file.
If you do not define this macro, the assembler is assumed to read its standard input if given no non-option arguments. If your assembler cannot read standard input at all, use a ‘%{pipe:%e}’ construct; see mips.h for instance.
A C string constant that tells the GCC driver program options to pass to the linker. It can also specify how to translate options you give to GCC into options for GCC to pass to the linker.
Do not define this macro if it does not need to do anything.
Another C string constant used much like
LINK_SPEC
. The difference between the two is thatLIB_SPEC
is used at the end of the command given to the linker.If this macro is not defined, a default is provided that loads the standard C library from the usual place. See gcc.c.
Another C string constant that tells the GCC driver program how and when to place a reference to libgcc.a into the linker command line. This constant is placed both before and after the value of
LIB_SPEC
.If this macro is not defined, the GCC driver provides a default that passes the string -lgcc to the linker.
By default, if
ENABLE_SHARED_LIBGCC
is defined, theLIBGCC_SPEC
is not directly used by the driver program but is instead modified to refer to different versions of libgcc.a depending on the values of the command line flags -static, -shared, -static-libgcc, and -shared-libgcc. On targets where these modifications are inappropriate, defineREAL_LIBGCC_SPEC
instead.REAL_LIBGCC_SPEC
tells the driver how to place a reference to libgcc on the link command line, but, unlikeLIBGCC_SPEC
, it is used unmodified.
A macro that controls the modifications to
LIBGCC_SPEC
mentioned inREAL_LIBGCC_SPEC
. If nonzero, a spec will be generated that uses --as-needed or equivalent options and the shared libgcc in place of the static exception handler library, when linking without any of-static
,-static-libgcc
, or-shared-libgcc
.
If defined, this C string constant is added to
LINK_SPEC
. WhenUSE_LD_AS_NEEDED
is zero or undefined, it also affects the modifications toLIBGCC_SPEC
mentioned inREAL_LIBGCC_SPEC
.
Another C string constant used much like
LINK_SPEC
. The difference between the two is thatSTARTFILE_SPEC
is used at the very beginning of the command given to the linker.If this macro is not defined, a default is provided that loads the standard C startup file from the usual place. See gcc.c.
Another C string constant used much like
LINK_SPEC
. The difference between the two is thatENDFILE_SPEC
is used at the very end of the command given to the linker.Do not define this macro if it does not need to do anything.
GCC
-v
will print the thread model GCC was configured to use. However, this doesn't work on platforms that are multilibbed on thread models, such as AIX 4.3. On such platforms, defineTHREAD_MODEL_SPEC
such that it evaluates to a string without blanks that names one of the recognized thread models.%*
, the default value of this macro, will expand to the value ofthread_file
set in config.gcc.
Define this macro to add a suffix to the target sysroot when GCC is configured with a sysroot. This will cause GCC to search for usr/lib, et al, within sysroot+suffix.
Define this macro to add a headers_suffix to the target sysroot when GCC is configured with a sysroot. This will cause GCC to pass the updated sysroot+headers_suffix to CPP, causing it to search for usr/include, et al, within sysroot+headers_suffix.
Define this macro to provide additional specifications to put in the specs file that can be used in various specifications like
CC1_SPEC
.The definition should be an initializer for an array of structures, containing a string constant, that defines the specification name, and a string constant that provides the specification.
Do not define this macro if it does not need to do anything.
EXTRA_SPECS
is useful when an architecture contains several related targets, which have various..._SPECS
which are similar to each other, and the maintainer would like one central place to keep these definitions.For example, the PowerPC System V.4 targets use
EXTRA_SPECS
to define either_CALL_SYSV
when the System V calling sequence is used or_CALL_AIX
when the older AIX-based calling sequence is used.The config/rs6000/rs6000.h target file defines:
#define EXTRA_SPECS \ { "cpp_sysv_default", CPP_SYSV_DEFAULT }, #define CPP_SYS_DEFAULT ""The config/rs6000/sysv.h target file defines:
#undef CPP_SPEC #define CPP_SPEC \ "%{posix: -D_POSIX_SOURCE } \ %{mcall-sysv: -D_CALL_SYSV } \ %{!mcall-sysv: %(cpp_sysv_default) } \ %{msoft-float: -D_SOFT_FLOAT} %{mcpu=403: -D_SOFT_FLOAT}" #undef CPP_SYSV_DEFAULT #define CPP_SYSV_DEFAULT "-D_CALL_SYSV"while the config/rs6000/eabiaix.h target file defines
CPP_SYSV_DEFAULT
as:#undef CPP_SYSV_DEFAULT #define CPP_SYSV_DEFAULT "-D_CALL_AIX"
Define this macro if the driver program should find the library libgcc.a. If you do not define this macro, the driver program will pass the argument -lgcc to tell the linker to do the search.
The sequence in which libgcc and libc are specified to the linker. By default this is
%G %L %G
.
Define this macro to add additional steps to be executed after linker. The default value of this macro is empty string.
A C string constant giving the complete command line need to execute the linker. When you do this, you will need to update your port each time a change is made to the link command line within gcc.c. Therefore, define this macro only if you need to completely redefine the command line for invoking the linker and there is no other way to accomplish the effect you need. Overriding this macro may be avoidable by overriding
LINK_GCC_C_SEQUENCE_SPEC
instead.
True if .. components should always be removed from directory names computed relative to GCC's internal directories, false (default) if such components should be preserved and directory names containing them passed to other tools such as the linker.
Define this macro as a C expression for the initializer of an array of string to tell the driver program which options are defaults for this target and thus do not need to be handled specially when using
MULTILIB_OPTIONS
.Do not define this macro if
MULTILIB_OPTIONS
is not defined in the target makefile fragment or if none of the options listed inMULTILIB_OPTIONS
are set by default. See Target Fragment.
Define this macro to tell gcc that it should only translate a -B prefix into a -L linker option if the prefix indicates an absolute file name.
If defined, this macro is an additional prefix to try after
STANDARD_EXEC_PREFIX
.MD_EXEC_PREFIX
is not searched when the compiler is built as a cross compiler. If you defineMD_EXEC_PREFIX
, then be sure to add it to the list of directories used to find the assembler in configure.ac.
Define this macro as a C string constant if you wish to override the standard choice of
libdir
as the default prefix to try when searching for startup files such as crt0.o.STANDARD_STARTFILE_PREFIX
is not searched when the compiler is built as a cross compiler.
Define this macro as a C string constant if you wish to override the standard choice of
/lib
as a prefix to try after the default prefix when searching for startup files such as crt0.o.STANDARD_STARTFILE_PREFIX_1
is not searched when the compiler is built as a cross compiler.
Define this macro as a C string constant if you wish to override the standard choice of
/lib
as yet another prefix to try after the default prefix when searching for startup files such as crt0.o.STANDARD_STARTFILE_PREFIX_2
is not searched when the compiler is built as a cross compiler.
If defined, this macro supplies an additional prefix to try after the standard prefixes.
MD_EXEC_PREFIX
is not searched when the compiler is built as a cross compiler.
If defined, this macro supplies yet another prefix to try after the standard prefixes. It is not searched when the compiler is built as a cross compiler.
Define this macro as a C string constant if you wish to set environment variables for programs called by the driver, such as the assembler and loader. The driver passes the value of this macro to
putenv
to initialize the necessary environment variables.
Define this macro as a C string constant if you wish to override the standard choice of /usr/local/include as the default prefix to try when searching for local header files.
LOCAL_INCLUDE_DIR
comes beforeNATIVE_SYSTEM_HEADER_DIR
(set in config.gcc, normally /usr/include) in the search order.Cross compilers do not search either /usr/local/include or its replacement.
The “component” corresponding to
NATIVE_SYSTEM_HEADER_DIR
. SeeINCLUDE_DEFAULTS
, below, for the description of components. If you do not define this macro, no component is used.
Define this macro if you wish to override the entire default search path for include files. For a native compiler, the default search path usually consists of
GCC_INCLUDE_DIR
,LOCAL_INCLUDE_DIR
,GPLUSPLUS_INCLUDE_DIR
, andNATIVE_SYSTEM_HEADER_DIR
. In addition,GPLUSPLUS_INCLUDE_DIR
andGCC_INCLUDE_DIR
are defined automatically by Makefile, and specify private search areas for GCC. The directoryGPLUSPLUS_INCLUDE_DIR
is used only for C++ programs.The definition should be an initializer for an array of structures. Each array element should have four elements: the directory name (a string constant), the component name (also a string constant), a flag for C++-only directories, and a flag showing that the includes in the directory don't need to be wrapped in
extern ‘
C’
when compiling C++. Mark the end of the array with a null element.The component name denotes what GNU package the include file is part of, if any, in all uppercase letters. For example, it might be ‘GCC’ or ‘BINUTILS’. If the package is part of a vendor-supplied operating system, code the component name as ‘0’.
For example, here is the definition used for VAX/VMS:
#define INCLUDE_DEFAULTS \ { \ { "GNU_GXX_INCLUDE:", "G++", 1, 1}, \ { "GNU_CC_INCLUDE:", "GCC", 0, 0}, \ { "SYS$SYSROOT:[SYSLIB.]", 0, 0, 0}, \ { ".", 0, 0, 0}, \ { 0, 0, 0, 0} \ }
Here is the order of prefixes tried for exec files:
GCC_EXEC_PREFIX
or, if GCC_EXEC_PREFIX
is not set and the compiler has not been installed in the configure-time
prefix, the location in which the compiler has actually been installed.
COMPILER_PATH
.
STANDARD_EXEC_PREFIX
, if the compiler has been installed
in the configured-time prefix.
MD_EXEC_PREFIX
, if defined, but only if this is a native
compiler.
Here is the order of prefixes tried for startfiles:
GCC_EXEC_PREFIX
or its automatically determined
value based on the installed toolchain location.
LIBRARY_PATH
(or port-specific name; native only, cross compilers do not use this).
STANDARD_EXEC_PREFIX
, but only if the toolchain is installed
in the configured prefix or this is a native compiler.
MD_EXEC_PREFIX
, if defined, but only if this is a native
compiler.
MD_STARTFILE_PREFIX
, if defined, but only if this is a
native compiler, or we have a target system root.
MD_STARTFILE_PREFIX_1
, if defined, but only if this is a
native compiler, or we have a target system root.
STANDARD_STARTFILE_PREFIX
, with any sysroot modifications.
If this path is relative it will be prefixed by GCC_EXEC_PREFIX
and
the machine suffix or STANDARD_EXEC_PREFIX
and the machine suffix.
STANDARD_STARTFILE_PREFIX_1
, but only if this is a native
compiler, or we have a target system root. The default for this macro is
/lib/.
STANDARD_STARTFILE_PREFIX_2
, but only if this is a native
compiler, or we have a target system root. The default for this macro is
/usr/lib/.
Here are run-time target specifications.
This function-like macro expands to a block of code that defines built-in preprocessor macros and assertions for the target CPU, using the functions
builtin_define
,builtin_define_std
andbuiltin_assert
. When the front end calls this macro it provides a trailing semicolon, and since it has finished command line option processing your code can use those results freely.
builtin_assert
takes a string in the form you pass to the command-line option -A, such ascpu=mips
, and creates the assertion.builtin_define
takes a string in the form accepted by option -D and unconditionally defines the macro.
builtin_define_std
takes a string representing the name of an object-like macro. If it doesn't lie in the user's namespace,builtin_define_std
defines it unconditionally. Otherwise, it defines a version with two leading underscores, and another version with two leading and trailing underscores, and defines the original only if an ISO standard was not requested on the command line. For example, passingunix
defines__unix
,__unix__
and possiblyunix
; passing_mips
defines__mips
,__mips__
and possibly_mips
, and passing_ABI64
defines only_ABI64
.You can also test for the C dialect being compiled. The variable
c_language
is set to one ofclk_c
,clk_cplusplus
orclk_objective_c
. Note that if we are preprocessing assembler, this variable will beclk_c
but the function-like macropreprocessing_asm_p()
will return true, so you might want to check for that first. If you need to check for strict ANSI, the variableflag_iso
can be used. The function-like macropreprocessing_trad_p()
can be used to check for traditional preprocessing.
Similarly to
TARGET_CPU_CPP_BUILTINS
but this macro is optional and is used for the target operating system instead.
Similarly to
TARGET_CPU_CPP_BUILTINS
but this macro is optional and is used for the target object format. elfos.h uses this macro to define__ELF__
, so you probably do not need to define it yourself.
This variable is declared in options.h, which is included before any target-specific headers.
This variable specifies the initial value of
target_flags
. Its default setting is 0.
This hook is called whenever the user specifies one of the target-specific options described by the .opt definition files (see Options). It has the opportunity to do some option-specific processing and should return true if the option is valid. The default definition does nothing but return true.
decoded specifies the option and its arguments. opts and opts_set are the
gcc_options
structures to be used for storing option state, and loc is the location at which the option was passed (UNKNOWN_LOCATION
except for options passed via attributes).
This target hook is called whenever the user specifies one of the target-specific C language family options described by the .opt definition files(see Options). It has the opportunity to do some option-specific processing and should return true if the option is valid. The arguments are like for
TARGET_HANDLE_OPTION
. The default definition does nothing but return false.In general, you should use
TARGET_HANDLE_OPTION
to handle options. However, if processing an option requires routines that are only available in the C (and related language) front ends, then you should useTARGET_HANDLE_C_OPTION
instead.
Targets may provide a string object type that can be used within and between C, C++ and their respective Objective-C dialects. A string object might, for example, embed encoding and length information. These objects are considered opaque to the compiler and handled as references. An ideal implementation makes the composition of the string object match that of the Objective-C
NSString
(NXString
for GNUStep), allowing efficient interworking between C-only and Objective-C code. If a target implements string objects then this hook should return a reference to such an object constructed from the normal `C' string representation provided in string. At present, the hook is used by Objective-C only, to obtain a common-format string object when the target provides one.
Declare that Objective C class classname is referenced by the current TU.
Declare that Objective C class classname is defined by the current TU.
If a target implements string objects then this hook should return
true
if stringref is a valid reference to such an object.
If a target implements string objects then this hook should should provide a facility to check the function arguments in args_list against the format specifiers in format_arg where the type of format_arg is one recognized as a valid string reference type.
This target function is similar to the hook
TARGET_OPTION_OVERRIDE
but is called when the optimize level is changed via an attribute or pragma or when it is reset at the end of the code affected by the attribute or pragma. It is not called at the beginning of compilation whenTARGET_OPTION_OVERRIDE
is called so if you want to perform these actions then, you should haveTARGET_OPTION_OVERRIDE
callTARGET_OVERRIDE_OPTIONS_AFTER_CHANGE
.
This is similar to the
TARGET_OPTION_OVERRIDE
hook but is only used in the C language frontends (C, Objective-C, C++, Objective-C++) and so can be used to alter option flag variables which only exist in those frontends.
Some machines may desire to change what optimizations are performed for various optimization levels. This variable, if defined, describes options to enable at particular sets of optimization levels. These options are processed once just after the optimization level is determined and before the remainder of the command options have been parsed, so may be overridden by other options passed explicitly.
This processing is run once at program startup and when the optimization options are changed via
#pragma GCC optimize
or by using theoptimize
attribute.
Set target-dependent initial values of fields in opts.
Set target-dependent default values for --param settings, using calls to
set_default_param_value
.
Some targets need to switch between substantially different subtargets during compilation. For example, the MIPS target has one subtarget for the traditional MIPS architecture and another for MIPS16. Source code can switch between these two subarchitectures using the
mips16
andnomips16
attributes.Such subtargets can differ in things like the set of available registers, the set of available instructions, the costs of various operations, and so on. GCC caches a lot of this type of information in global variables, and recomputing them for each subtarget takes a significant amount of time. The compiler therefore provides a facility for maintaining several versions of the global variables and quickly switching between them; see target-globals.h for details.
Define this macro to 1 if your target needs this facility. The default is 0.
Returns true if the target supports IEEE 754 floating-point exceptions and rounding modes, false otherwise. This is intended to relate to the
float
anddouble
types, but not necessarilylong double
. By default, returns true if theadddf3
instruction pattern is available and false otherwise, on the assumption that hardware floating point supports exceptions and rounding modes but software floating point does not.
If the target needs to store information on a per-function basis, GCC provides a macro and a couple of variables to allow this. Note, just using statics to store the information is a bad idea, since GCC supports nested functions, so you can be halfway through encoding one function when another one comes along.
GCC defines a data structure called struct function
which
contains all of the data specific to an individual function. This
structure contains a field called machine
whose type is
struct machine_function *
, which can be used by targets to point
to their own specific data.
If a target needs per-function specific data it should define the type
struct machine_function
and also the macro INIT_EXPANDERS
.
This macro should be used to initialize the function pointer
init_machine_status
. This pointer is explained below.
One typical use of per-function, target specific data is to create an
RTX to hold the register containing the function's return address. This
RTX can then be used to implement the __builtin_return_address
function, for level 0.
Note—earlier implementations of GCC used a single data area to hold
all of the per-function information. Thus when processing of a nested
function began the old per-function data had to be pushed onto a
stack, and when the processing was finished, it had to be popped off the
stack. GCC used to provide function pointers called
save_machine_status
and restore_machine_status
to handle
the saving and restoring of the target specific information. Since the
single data area approach is no longer used, these pointers are no
longer supported.
Macro called to initialize any target specific information. This macro is called once per function, before generation of any RTL has begun. The intention of this macro is to allow the initialization of the function pointer
init_machine_status
.
If this function pointer is non-
NULL
it will be called once per function, before function compilation starts, in order to allow the target to perform any target specific initialization of thestruct function
structure. It is intended that this would be used to initialize themachine
of that structure.
struct machine_function
structures are expected to be freed by GC. Generally, any memory that they reference must be allocated by using GC allocation, including the structure itself.
Note that the definitions of the macros in this table which are sizes or
alignments measured in bits do not need to be constant. They can be C
expressions that refer to static variables, such as the target_flags
.
See Run-time Target.
Define this macro to have the value 1 if the most significant bit in a byte has the lowest number; otherwise define it to have the value zero. This means that bit-field instructions count from the most significant bit. If the machine has no bit-field instructions, then this must still be defined, but it doesn't matter which value it is defined to. This macro need not be a constant.
This macro does not affect the way structure fields are packed into bytes or words; that is controlled by
BYTES_BIG_ENDIAN
.
Define this macro to have the value 1 if the most significant byte in a word has the lowest number. This macro need not be a constant.
Define this macro to have the value 1 if, in a multiword object, the most significant word has the lowest number. This applies to both memory locations and registers; see
REG_WORDS_BIG_ENDIAN
if the order of words in memory is not the same as the order in registers. This macro need not be a constant.
On some machines, the order of words in a multiword object differs between registers in memory. In such a situation, define this macro to describe the order of words in a register. The macro
WORDS_BIG_ENDIAN
controls the order of words in memory.
Define this macro to have the value 1 if
DFmode
,XFmode
orTFmode
floating point numbers are stored in memory with the word containing the sign bit at the lowest address; otherwise define it to have the value 0. This macro need not be a constant.You need not define this macro if the ordering is the same as for multi-word integers.
Number of bits in a word. If you do not define this macro, the default is
BITS_PER_UNIT * UNITS_PER_WORD
.
Maximum number of bits in a word. If this is undefined, the default is
BITS_PER_WORD
. Otherwise, it is the constant value that is the largest value thatBITS_PER_WORD
can have at run-time.
Number of storage units in a word; normally the size of a general-purpose register, a power of two from 1 or 8.
Minimum number of units in a word. If this is undefined, the default is
UNITS_PER_WORD
. Otherwise, it is the constant value that is the smallest value thatUNITS_PER_WORD
can have at run-time.
Width of a pointer, in bits. You must specify a value no wider than the width of
Pmode
. If it is not equal to the width ofPmode
, you must definePOINTERS_EXTEND_UNSIGNED
. If you do not specify a value the default isBITS_PER_WORD
.
A C expression that determines how pointers should be extended from
ptr_mode
to eitherPmode
orword_mode
. It is greater than zero if pointers should be zero-extended, zero if they should be sign-extended, and negative if some other sort of conversion is needed. In the last case, the extension is done by the target'sptr_extend
instruction.You need not define this macro if the
ptr_mode
,Pmode
andword_mode
are all the same width.
A macro to update m and unsignedp when an object whose type is type and which has the specified mode and signedness is to be stored in a register. This macro is only called when type is a scalar type.
On most RISC machines, which only have operations that operate on a full register, define this macro to set m to
word_mode
if m is an integer mode narrower thanBITS_PER_WORD
. In most cases, only integer modes should be widened because wider-precision floating-point operations are usually more expensive than their narrower counterparts.For most machines, the macro definition does not change unsignedp. However, some machines, have instructions that preferentially handle either signed or unsigned quantities of certain modes. For example, on the DEC Alpha, 32-bit loads from memory and 32-bit add instructions sign-extend the result to 64 bits. On such machines, set unsignedp according to which kind of extension is more efficient.
Do not define this macro if it would never modify m.
Like
PROMOTE_MODE
, but it is applied to outgoing function arguments or function return values. The target hook should return the new mode and possibly change*
punsignedp if the promotion should change signedness. This function is called only for scalar or pointer types.for_return allows to distinguish the promotion of arguments and return values. If it is
1
, a return value is being promoted andTARGET_FUNCTION_VALUE
must perform the same promotions done here. If it is2
, the returned mode should be that of the register in which an incoming parameter is copied, or the outgoing result is computed; then the hook should return the same mode aspromote_mode
, though the signedness may be different.type can be NULL when promoting function arguments of libcalls.
The default is to not promote arguments and return values. You can also define the hook to
default_promote_function_mode_always_promote
if you would like to apply the same rules given byPROMOTE_MODE
.
Normal alignment required for function parameters on the stack, in bits. All stack parameters receive at least this much alignment regardless of data type. On most machines, this is the same as the size of an integer.
Define this macro to the minimum alignment enforced by hardware for the stack pointer on this machine. The definition is a C expression for the desired alignment (measured in bits). This value is used as a default if
PREFERRED_STACK_BOUNDARY
is not defined. On most machines, this should be the same asPARM_BOUNDARY
.
Define this macro if you wish to preserve a certain alignment for the stack pointer, greater than what the hardware enforces. The definition is a C expression for the desired alignment (measured in bits). This macro must evaluate to a value equal to or larger than
STACK_BOUNDARY
.
Define this macro if the incoming stack boundary may be different from
PREFERRED_STACK_BOUNDARY
. This macro must evaluate to a value equal to or larger thanSTACK_BOUNDARY
.
Biggest alignment that any data type can require on this machine, in bits. Note that this is not the biggest alignment that is supported, just the biggest alignment that, when violated, may cause a fault.
If defined, this target hook specifies the absolute biggest alignment that a type or variable can have on this machine, otherwise,
BIGGEST_ALIGNMENT
is used.
Alignment, in bits, a C conformant malloc implementation has to provide. If not defined, the default value is
BITS_PER_WORD
.
Alignment used by the
__attribute__ ((aligned))
construct. If not defined, the default value isBIGGEST_ALIGNMENT
.
If defined, the smallest alignment, in bits, that can be given to an object that can be referenced in one operation, without disturbing any nearby object. Normally, this is
BITS_PER_UNIT
, but may be larger on machines that don't have byte or half-word store operations.
Biggest alignment that any structure or union field can require on this machine, in bits. If defined, this overrides
BIGGEST_ALIGNMENT
for structure and union fields only, unless the field alignment has been set by the__attribute__ ((aligned (
n)))
construct.
An expression for the alignment of a structure field field if the alignment computed in the usual way (including applying of
BIGGEST_ALIGNMENT
andBIGGEST_FIELD_ALIGNMENT
to the alignment) is computed. It overrides alignment only if the field alignment has not been set by the__attribute__ ((aligned (
n)))
construct.
Biggest stack alignment guaranteed by the backend. Use this macro to specify the maximum alignment of a variable on stack.
If not defined, the default value is
STACK_BOUNDARY
.
Biggest alignment supported by the object file format of this machine. Use this macro to limit the alignment which can be specified using the
__attribute__ ((aligned (
n)))
construct. If not defined, the default value isBIGGEST_ALIGNMENT
.On systems that use ELF, the default (in config/elfos.h) is the largest supported 32-bit ELF section alignment representable on a 32-bit host e.g. ‘(((uint64_t) 1 << 28) * 8)’. On 32-bit ELF the largest supported section alignment in bits is ‘(0x80000000 * 8)’, but this is not representable on 32-bit hosts.
If defined, a C expression to compute the alignment for a variable in the static store. type is the data type, and basic-align is the alignment that the object would ordinarily have. The value of this macro is used instead of that alignment to align the object.
If this macro is not defined, then basic-align is used.
One use of this macro is to increase alignment of medium-size data to make it all fit in fewer cache lines. Another is to cause character arrays to be word-aligned so that
strcpy
calls that copy constants to character arrays can be done inline.
Similar to
DATA_ALIGNMENT
, but for the cases where the ABI mandates some alignment increase, instead of optimization only purposes. E.g. AMD x86-64 psABI says that variables with array type larger than 15 bytes must be aligned to 16 byte boundaries.If this macro is not defined, then basic-align is used.
If defined, a C expression to compute the alignment given to a constant that is being placed in memory. constant is the constant and basic-align is the alignment that the object would ordinarily have. The value of this macro is used instead of that alignment to align the object.
The default definition just returns basic-align.
The typical use of this macro is to increase alignment for string constants to be word aligned so that
strcpy
calls that copy constants can be done inline.
If defined, a C expression to compute the alignment for a variable in the local store. type is the data type, and basic-align is the alignment that the object would ordinarily have. The value of this macro is used instead of that alignment to align the object.
If this macro is not defined, then basic-align is used.
One use of this macro is to increase alignment of medium-size data to make it all fit in fewer cache lines.
If the value of this macro has a type, it should be an unsigned type.
This hook can be used to define the alignment for a vector of type type, in order to comply with a platform ABI. The default is to require natural alignment for vector types. The alignment returned by this hook must be a power-of-two multiple of the default alignment of the vector element type.
If defined, a C expression to compute the alignment for stack slot. type is the data type, mode is the widest mode available, and basic-align is the alignment that the slot would ordinarily have. The value of this macro is used instead of that alignment to align the slot.
If this macro is not defined, then basic-align is used when type is
NULL
. Otherwise,LOCAL_ALIGNMENT
will be used.This macro is to set alignment of stack slot to the maximum alignment of all possible modes which the slot may have.
If the value of this macro has a type, it should be an unsigned type.
If defined, a C expression to compute the alignment for a local variable decl.
If this macro is not defined, then
LOCAL_ALIGNMENT (TREE_TYPE (
decl), DECL_ALIGN (
decl))
is used.One use of this macro is to increase alignment of medium-size data to make it all fit in fewer cache lines.
If the value of this macro has a type, it should be an unsigned type.
If defined, a C expression to compute the minimum required alignment for dynamic stack realignment purposes for exp (a type or decl), mode, assuming normal alignment align.
If this macro is not defined, then align will be used.
Alignment in bits to be given to a structure bit-field that follows an empty field such as
int : 0;
.If
PCC_BITFIELD_TYPE_MATTERS
is true, it overrides this macro.
Number of bits which any structure or union's size must be a multiple of. Each structure or union's size is rounded up to a multiple of this.
If you do not define this macro, the default is the same as
BITS_PER_UNIT
.
Define this macro to be the value 1 if instructions will fail to work if given data not on the nominal alignment. If instructions will merely go slower in that case, define this macro as 0.
Define this if you wish to imitate the way many other C compilers handle alignment of bit-fields and the structures that contain them.
The behavior is that the type written for a named bit-field (
int
,short
, or other integer type) imposes an alignment for the entire structure, as if the structure really did contain an ordinary field of that type. In addition, the bit-field is placed within the structure so that it would fit within such a field, not crossing a boundary for it.Thus, on most machines, a named bit-field whose type is written as
int
would not cross a four-byte boundary, and would force four-byte alignment for the whole structure. (The alignment used may not be four bytes; it is controlled by the other alignment parameters.)An unnamed bit-field will not affect the alignment of the containing structure.
If the macro is defined, its definition should be a C expression; a nonzero value for the expression enables this behavior.
Note that if this macro is not defined, or its value is zero, some bit-fields may cross more than one alignment boundary. The compiler can support such references if there are ‘insv’, ‘extv’, and ‘extzv’ insns that can directly reference memory.
The other known way of making bit-fields work is to define
STRUCTURE_SIZE_BOUNDARY
as large asBIGGEST_ALIGNMENT
. Then every structure can be accessed with fullwords.Unless the machine has bit-field instructions or you define
STRUCTURE_SIZE_BOUNDARY
that way, you must definePCC_BITFIELD_TYPE_MATTERS
to have a nonzero value.If your aim is to make GCC use the same conventions for laying out bit-fields as are used by another compiler, here is how to investigate what the other compiler does. Compile and run this program:
struct foo1 { char x; char :0; char y; }; struct foo2 { char x; int :0; char y; }; main () { printf ("Size of foo1 is %d\n", sizeof (struct foo1)); printf ("Size of foo2 is %d\n", sizeof (struct foo2)); exit (0); }If this prints 2 and 5, then the compiler's behavior is what you would get from
PCC_BITFIELD_TYPE_MATTERS
.
Like
PCC_BITFIELD_TYPE_MATTERS
except that its effect is limited to aligning a bit-field within the structure.
When
PCC_BITFIELD_TYPE_MATTERS
is true this hook will determine whether unnamed bitfields affect the alignment of the containing structure. The hook should return true if the structure should inherit the alignment requirements of an unnamed bitfield's type.
This target hook should return
true
if accesses to volatile bitfields should use the narrowest mode possible. It should returnfalse
if these accesses should use the bitfield container type.The default is
false
.
Return true if a structure, union or array containing field should be accessed using
BLKMODE
.If field is the only field in the structure, mode is its mode, otherwise mode is VOIDmode. mode is provided in the case where structures of one field would require the structure's mode to retain the field's mode.
Normally, this is not needed.
Define this macro as an expression for the alignment of a type (given by type as a tree node) if the alignment computed in the usual way is computed and the alignment explicitly specified was specified.
The default is to use specified if it is larger; otherwise, use the smaller of computed and
BIGGEST_ALIGNMENT
An integer expression for the size in bits of the largest integer machine mode that should actually be used. All integer machine modes of this size or smaller can be used for structures and unions with the appropriate sizes. If this macro is undefined,
GET_MODE_BITSIZE (DImode)
is assumed.
If defined, an expression of type
machine_mode
that specifies the mode of the save area operand of asave_stack_
level named pattern (see Standard Names). save_level is one ofSAVE_BLOCK
,SAVE_FUNCTION
, orSAVE_NONLOCAL
and selects which of the three named patterns is having its mode specified.You need not define this macro if it always returns
Pmode
. You would most commonly define this macro if thesave_stack_
level patterns need to support both a 32- and a 64-bit mode.
If defined, an expression of type
machine_mode
that specifies the mode of the size increment operand of anallocate_stack
named pattern (see Standard Names).You need not define this macro if it always returns
word_mode
. You would most commonly define this macro if theallocate_stack
pattern needs to support both a 32- and a 64-bit mode.
This target hook should return the mode to be used for the return value of compare instructions expanded to libgcc calls. If not defined
word_mode
is returned which is the right choice for a majority of targets.
This target hook should return the mode to be used for the shift count operand of shift instructions expanded to libgcc calls. If not defined
word_mode
is returned which is the right choice for a majority of targets.
Return machine mode to be used for
_Unwind_Word
type. The default is to useword_mode
.
This target hook returns
true
if bit-fields in the given record_type are to be laid out following the rules of Microsoft Visual C/C++, namely: (i) a bit-field won't share the same storage unit with the previous bit-field if their underlying types have different sizes, and the bit-field will be aligned to the highest alignment of the underlying types of itself and of the previous bit-field; (ii) a zero-sized bit-field will affect the alignment of the whole enclosing structure, even if it is unnamed; except that (iii) a zero-sized bit-field will be disregarded unless it follows another bit-field of nonzero size. If this hook returnstrue
, other macros that control bit-field layout are ignored.When a bit-field is inserted into a packed record, the whole size of the underlying type is used by one or more same-size adjacent bit-fields (that is, if its long:3, 32 bits is used in the record, and any additional adjacent long bit-fields are packed into the same chunk of 32 bits. However, if the size changes, a new field of that size is allocated). In an unpacked record, this is the same as using alignment, but not equivalent when packing.
If both MS bit-fields and ‘__attribute__((packed))’ are used, the latter will take precedence. If ‘__attribute__((packed))’ is used on a single field when MS bit-fields are in use, it will take precedence for that field, but the alignment of the rest of the structure may affect its placement.
Returns true if the target supports decimal floating point.
Returns true if the target supports fixed-point arithmetic.
This hook is called just before expansion into rtl, allowing the target to perform additional initializations or analysis before the expansion. For example, the rs6000 port uses it to allocate a scratch stack slot for use in copying SDmode values between memory and floating point registers whenever the function being expanded has any SDmode usage.
This hook allows the backend to perform additional instantiations on rtl that are not actually in any insns yet, but will be later.
If your target defines any fundamental types, or any types your target uses should be mangled differently from the default, define this hook to return the appropriate encoding for these types as part of a C++ mangled name. The type argument is the tree structure representing the type to be mangled. The hook may be applied to trees which are not target-specific fundamental types; it should return
NULL
for all such types, as well as arguments it does not recognize. If the return value is notNULL
, it must point to a statically-allocated string constant.Target-specific fundamental types might be new fundamental types or qualified versions of ordinary fundamental types. Encode new fundamental types as ‘u n name’, where name is the name used for the type in source code, and n is the length of name in decimal. Encode qualified versions of ordinary types as ‘U n name code’, where name is the name used for the type qualifier in source code, n is the length of name as above, and code is the code used to represent the unqualified version of this type. (See
write_builtin_type
in cp/mangle.c for the list of codes.) In both cases the spaces are for clarity; do not include any spaces in your string.This hook is applied to types prior to typedef resolution. If the mangled name for a particular type depends only on that type's main variant, you can perform typedef resolution yourself using
TYPE_MAIN_VARIANT
before mangling.The default version of this hook always returns
NULL
, which is appropriate for a target that does not define any new fundamental types.
These macros define the sizes and other characteristics of the standard basic data types used in programs being compiled. Unlike the macros in the previous section, these apply to specific features of C and related languages, rather than to fundamental aspects of storage layout.
A C expression for the size in bits of the type
int
on the target machine. If you don't define this, the default is one word.
A C expression for the size in bits of the type
short
on the target machine. If you don't define this, the default is half a word. (If this would be less than one storage unit, it is rounded up to one unit.)
A C expression for the size in bits of the type
long
on the target machine. If you don't define this, the default is one word.
On some machines, the size used for the Ada equivalent of the type
long
by a native Ada compiler differs from that used by C. In that situation, define this macro to be a C expression to be used for the size of that type. If you don't define this, the default is the value ofLONG_TYPE_SIZE
.
A C expression for the size in bits of the type
long long
on the target machine. If you don't define this, the default is two words. If you want to support GNU Ada on your machine, the value of this macro must be at least 64.
A C expression for the size in bits of the type
char
on the target machine. If you don't define this, the default isBITS_PER_UNIT
.
A C expression for the size in bits of the C++ type
bool
and C99 type_Bool
on the target machine. If you don't define this, and you probably shouldn't, the default isCHAR_TYPE_SIZE
.
A C expression for the size in bits of the type
float
on the target machine. If you don't define this, the default is one word.
A C expression for the size in bits of the type
double
on the target machine. If you don't define this, the default is two words.
A C expression for the size in bits of the type
long double
on the target machine. If you don't define this, the default is two words.
A C expression for the size in bits of the type
short _Fract
on the target machine. If you don't define this, the default isBITS_PER_UNIT
.
A C expression for the size in bits of the type
_Fract
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 2
.
A C expression for the size in bits of the type
long _Fract
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 4
.
A C expression for the size in bits of the type
long long _Fract
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 8
.
A C expression for the size in bits of the type
short _Accum
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 2
.
A C expression for the size in bits of the type
_Accum
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 4
.
A C expression for the size in bits of the type
long _Accum
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 8
.
A C expression for the size in bits of the type
long long _Accum
on the target machine. If you don't define this, the default isBITS_PER_UNIT * 16
.
This macro corresponds to the
TARGET_LIBFUNC_GNU_PREFIX
target hook and should be defined if that hook is overriden to be true. It causes function names in libgcc to be changed to use a__gnu_
prefix for their name rather than the default__
. A port which uses this macro should also arrange to use t-gnu-prefix in the libgcc config.host.
A C expression for the value for
FLT_EVAL_METHOD
in float.h, assuming, if applicable, that the floating-point control word is in its default state. If you do not define this macro the value ofFLT_EVAL_METHOD
will be zero.
A C expression for the size in bits of the widest floating-point format supported by the hardware. If you define this macro, you must specify a value less than or equal to the value of
LONG_DOUBLE_TYPE_SIZE
. If you do not define this macro, the value ofLONG_DOUBLE_TYPE_SIZE
is the default.
An expression whose value is 1 or 0, according to whether the type
char
should be signed or unsigned by default. The user can always override this default with the options -fsigned-char and -funsigned-char.
This target hook should return true if the compiler should give an
enum
type only as many bytes as it takes to represent the range of possible values of that type. It should return false if allenum
types should be allocated likeint
.The default is to return false.
A C expression for a string describing the name of the data type to use for size values. The typedef name
size_t
is defined using the contents of the string.The string can contain more than one keyword. If so, separate them with spaces, and write first any length keyword, then
unsigned
if appropriate, and finallyint
. The string must exactly match one of the data type names defined in the functionc_common_nodes_and_builtins
in the file c-family/c-common.c. You may not omitint
or change the order—that would cause the compiler to crash on startup.If you don't define this macro, the default is
"long unsigned int"
.
GCC defines internal types (
sizetype
,ssizetype
,bitsizetype
andsbitsizetype
) for expressions dealing with size. This macro is a C expression for a string describing the name of the data type from which the precision ofsizetype
is extracted.The string has the same restrictions as
SIZE_TYPE
string.If you don't define this macro, the default is
SIZE_TYPE
.
A C expression for a string describing the name of the data type to use for the result of subtracting two pointers. The typedef name
ptrdiff_t
is defined using the contents of the string. SeeSIZE_TYPE
above for more information.If you don't define this macro, the default is
"long int"
.
A C expression for a string describing the name of the data type to use for wide characters. The typedef name
wchar_t
is defined using the contents of the string. SeeSIZE_TYPE
above for more information.If you don't define this macro, the default is
"int"
.
A C expression for the size in bits of the data type for wide characters. This is used in
cpp
, which cannot make use ofWCHAR_TYPE
.
A C expression for a string describing the name of the data type to use for wide characters passed to
printf
and returned fromgetwc
. The typedef namewint_t
is defined using the contents of the string. SeeSIZE_TYPE
above for more information.If you don't define this macro, the default is
"unsigned int"
.
A C expression for a string describing the name of the data type that can represent any value of any standard or extended signed integer type. The typedef name
intmax_t
is defined using the contents of the string. SeeSIZE_TYPE
above for more information.If you don't define this macro, the default is the first of
"int"
,"long int"
, or"long long int"
that has as much precision aslong long int
.
A C expression for a string describing the name of the data type that can represent any value of any standard or extended unsigned integer type. The typedef name
uintmax_t
is defined using the contents of the string. SeeSIZE_TYPE
above for more information.If you don't define this macro, the default is the first of
"unsigned int"
,"long unsigned int"
, or"long long unsigned int"
that has as much precision aslong long unsigned int
.
C expressions for the standard types
sig_atomic_t
,int8_t
,int16_t
,int32_t
,int64_t
,uint8_t
,uint16_t
,uint32_t
,uint64_t
,int_least8_t
,int_least16_t
,int_least32_t
,int_least64_t
,uint_least8_t
,uint_least16_t
,uint_least32_t
,uint_least64_t
,int_fast8_t
,int_fast16_t
,int_fast32_t
,int_fast64_t
,uint_fast8_t
,uint_fast16_t
,uint_fast32_t
,uint_fast64_t
,intptr_t
, anduintptr_t
. SeeSIZE_TYPE
above for more information.If any of these macros evaluates to a null pointer, the corresponding type is not supported; if GCC is configured to provide
<stdint.h>
in such a case, the header provided may not conform to C99, depending on the type in question. The defaults for all of these macros are null pointers.
The C++ compiler represents a pointer-to-member-function with a struct that looks like:
struct { union { void (*fn)(); ptrdiff_t vtable_index; }; ptrdiff_t delta; };The C++ compiler must use one bit to indicate whether the function that will be called through a pointer-to-member-function is virtual. Normally, we assume that the low-order bit of a function pointer must always be zero. Then, by ensuring that the vtable_index is odd, we can distinguish which variant of the union is in use. But, on some platforms function pointers can be odd, and so this doesn't work. In that case, we use the low-order bit of the
delta
field, and shift the remainder of thedelta
field to the left.GCC will automatically make the right selection about where to store this bit using the
FUNCTION_BOUNDARY
setting for your platform. However, some platforms such as ARM/Thumb haveFUNCTION_BOUNDARY
set such that functions always start at even addresses, but the lowest bit of pointers to functions indicate whether the function at that address is in ARM or Thumb mode. If this is the case of your architecture, you should define this macro toptrmemfunc_vbit_in_delta
.In general, you should not have to define this macro. On architectures in which function addresses are always even, according to
FUNCTION_BOUNDARY
, GCC will automatically define this macro toptrmemfunc_vbit_in_pfn
.
Normally, the C++ compiler uses function pointers in vtables. This macro allows the target to change to use “function descriptors” instead. Function descriptors are found on targets for whom a function pointer is actually a small data structure. Normally the data structure consists of the actual code address plus a data pointer to which the function's data is relative.
If vtables are used, the value of this macro should be the number of words that the function descriptor occupies.
By default, the vtable entries are void pointers, the so the alignment is the same as pointer alignment. The value of this macro specifies the alignment of the vtable entry in bits. It should be defined only when special alignment is necessary. */
There are a few non-descriptor entries in the vtable at offsets below zero. If these entries must be padded (say, to preserve the alignment specified by
TARGET_VTABLE_ENTRY_ALIGN
), set this to the number of words in each data entry.
This section explains how to describe what registers the target machine has, and how (in general) they can be used.
The description of which registers a specific instruction can use is done with register classes; see Register Classes. For information on using registers to access a stack frame, see Frame Registers. For passing values in registers, see Register Arguments. For returning values in registers, see Scalar Return.
Registers have various characteristics.
Number of hardware registers known to the compiler. They receive numbers 0 through
FIRST_PSEUDO_REGISTER-1
; thus, the first pseudo register's number really is assigned the numberFIRST_PSEUDO_REGISTER
.
An initializer that says which registers are used for fixed purposes all throughout the compiled code and are therefore not available for general allocation. These would include the stack pointer, the frame pointer (except on machines where that can be used as a general register when no frame pointer is needed), the program counter on machines where that is considered one of the addressable registers, and any other numbered register with a standard use.
This information is expressed as a sequence of numbers, separated by commas and surrounded by braces. The nth number is 1 if register n is fixed, 0 otherwise.
The table initialized from this macro, and the table initialized by the following one, may be overridden at run time either automatically, by the actions of the macro
CONDITIONAL_REGISTER_USAGE
, or by the user with the command options -ffixed-reg, -fcall-used-reg and -fcall-saved-reg.
Like
FIXED_REGISTERS
but has 1 for each register that is clobbered (in general) by function calls as well as for fixed registers. This macro therefore identifies the registers that are not available for general allocation of values that must live across function calls.If a register has 0 in
CALL_USED_REGISTERS
, the compiler automatically saves it on function entry and restores it on function exit, if the register is used within the function.
Like
CALL_USED_REGISTERS
except this macro doesn't require that the entire set ofFIXED_REGISTERS
be included. (CALL_USED_REGISTERS
must be a superset ofFIXED_REGISTERS
). This macro is optional. If not specified, it defaults to the value ofCALL_USED_REGISTERS
.
A C expression that is nonzero if it is not permissible to store a value of mode mode in hard register number regno across a call without some part of it being clobbered. For most machines this macro need not be defined. It is only required for machines that do not preserve the entire contents of a register across a call.
This hook may conditionally modify five variables
fixed_regs
,call_used_regs
,global_regs
,reg_names
, andreg_class_contents
, to take into account any dependence of these register sets on target flags. The first three of these are of typechar []
(interpreted as Boolean vectors).global_regs
is aconst char *[]
, andreg_class_contents
is aHARD_REG_SET
. Before the macro is called,fixed_regs
,call_used_regs
,reg_class_contents
, andreg_names
have been initialized fromFIXED_REGISTERS
,CALL_USED_REGISTERS
,REG_CLASS_CONTENTS
, andREGISTER_NAMES
, respectively.global_regs
has been cleared, and any -ffixed-reg, -fcall-used-reg and -fcall-saved-reg command options have been applied.If the usage of an entire class of registers depends on the target flags, you may indicate this to GCC by using this macro to modify
fixed_regs
andcall_used_regs
to 1 for each of the registers in the classes which should not be used by GCC. Also makedefine_register_constraint
s returnNO_REGS
for constraints that shouldn't be used.(However, if this class is not included in
GENERAL_REGS
and all of the insn patterns whose constraints permit this class are controlled by target switches, then GCC will automatically avoid using these registers when the target switches are opposed to them.)
Define this macro if the target machine has register windows. This C expression returns the register number as seen by the called function corresponding to the register number out as seen by the calling function. Return out if register number out is not an outbound register.
Define this macro if the target machine has register windows. This C expression returns the register number as seen by the calling function corresponding to the register number in as seen by the called function. Return in if register number in is not an inbound register.
Define this macro if the target machine has register windows. This C expression returns true if the register is call-saved but is in the register window. Unlike most call-saved registers, such registers need not be explicitly restored on function exit or during non-local gotos.
If the program counter has a register number, define this as that register number. Otherwise, do not define it.
Registers are allocated in order.
If defined, an initializer for a vector of integers, containing the numbers of hard registers in the order in which GCC should prefer to use them (from most preferred to least).
If this macro is not defined, registers are used lowest numbered first (all else being equal).
One use of this macro is on machines where the highest numbered registers must always be saved and the save-multiple-registers instruction supports only sequences of consecutive registers. On such machines, define
REG_ALLOC_ORDER
to be an initializer that lists the highest numbered allocable register first.
A C statement (sans semicolon) to choose the order in which to allocate hard registers for pseudo-registers local to a basic block.
Store the desired register order in the array
reg_alloc_order
. Element 0 should be the register to allocate first; element 1, the next register; and so on.The macro body should not assume anything about the contents of
reg_alloc_order
before execution of the macro.On most machines, it is not necessary to define this macro.
Normally, IRA tries to estimate the costs for saving a register in the prologue and restoring it in the epilogue. This discourages it from using call-saved registers. If a machine wants to ensure that IRA allocates registers in the order given by REG_ALLOC_ORDER even if some call-saved registers appear earlier than call-used ones, then define this macro as a C expression to nonzero. Default is 0.
In some case register allocation order is not enough for the Integrated Register Allocator (IRA) to generate a good code. If this macro is defined, it should return a floating point value based on regno. The cost of using regno for a pseudo will be increased by approximately the pseudo's usage frequency times the value returned by this macro. Not defining this macro is equivalent to having it always return
0.0
.On most machines, it is not necessary to define this macro.
This section discusses the macros that describe which kinds of values (specifically, which machine modes) each register can hold, and how many consecutive registers are needed for a given mode.
A C expression for the number of consecutive hard registers, starting at register number regno, required to hold a value of mode mode. This macro must never return zero, even if a register cannot hold the requested mode - indicate that with HARD_REGNO_MODE_OK and/or CANNOT_CHANGE_MODE_CLASS instead.
On a machine where all registers are exactly one word, a suitable definition of this macro is
#define HARD_REGNO_NREGS(REGNO, MODE) \ ((GET_MODE_SIZE (MODE) + UNITS_PER_WORD - 1) \ / UNITS_PER_WORD)
A C expression that is nonzero if a value of mode mode, stored in memory, ends with padding that causes it to take up more space than in registers starting at register number regno (as determined by multiplying GCC's notion of the size of the register when containing this mode by the number of registers returned by
HARD_REGNO_NREGS
). By default this is zero.For example, if a floating-point value is stored in three 32-bit registers but takes up 128 bits in memory, then this would be nonzero.
This macros only needs to be defined if there are cases where
subreg_get_info
would otherwise wrongly determine that asubreg
can be represented by an offset to the register number, when in fact such asubreg
would contain some of the padding not stored in registers and so not be representable.
For values of regno and mode for which
HARD_REGNO_NREGS_HAS_PADDING
returns nonzero, a C expression returning the greater number of registers required to hold the value including any padding. In the example above, the value would be four.
Define this macro if the natural size of registers that hold values of mode mode is not the word size. It is a C expression that should give the natural size in bytes for the specified mode. It is used by the register allocator to try to optimize its results. This happens for example on SPARC 64-bit where the natural size of floating-point registers is still 32-bit.
A C expression that is nonzero if it is permissible to store a value of mode mode in hard register number regno (or in several registers starting with that one). For a machine where all registers are equivalent, a suitable definition is
#define HARD_REGNO_MODE_OK(REGNO, MODE) 1You need not include code to check for the numbers of fixed registers, because the allocation mechanism considers them to be always occupied.
On some machines, double-precision values must be kept in even/odd register pairs. You can implement that by defining this macro to reject odd register numbers for such modes.
The minimum requirement for a mode to be OK in a register is that the ‘movmode’ instruction pattern support moves between the register and other hard register in the same class and that moving a value into the register and back out not alter it.
Since the same instruction used to move
word_mode
will work for all narrower integer modes, it is not necessary on any machine forHARD_REGNO_MODE_OK
to distinguish between these modes, provided you define patterns ‘movhi’, etc., to take advantage of this. This is useful because of the interaction betweenHARD_REGNO_MODE_OK
andMODES_TIEABLE_P
; it is very desirable for all integer modes to be tieable.Many machines have special registers for floating point arithmetic. Often people assume that floating point machine modes are allowed only in floating point registers. This is not true. Any registers that can hold integers can safely hold a floating point machine mode, whether or not floating arithmetic can be done on it in those registers. Integer move instructions can be used to move the values.
On some machines, though, the converse is true: fixed-point machine modes may not go in floating registers. This is true if the floating registers normalize any value stored in them, because storing a non-floating value there would garble it. In this case,
HARD_REGNO_MODE_OK
should reject fixed-point machine modes in floating registers. But if the floating registers do not automatically normalize, if you can store any bit pattern in one and retrieve it unchanged without a trap, then any machine mode may go in a floating register, so you can define this macro to say so.The primary significance of special floating registers is rather that they are the registers acceptable in floating point arithmetic instructions. However, this is of no concern to
HARD_REGNO_MODE_OK
. You handle it by writing the proper constraints for those instructions.On some machines, the floating registers are especially slow to access, so that it is better to store a value in a stack frame than in such a register if floating point arithmetic is not being done. As long as the floating registers are not in class
GENERAL_REGS
, they will not be used unless some pattern's constraint asks for one.
A C expression that is nonzero if it is OK to rename a hard register from to another hard register to.
One common use of this macro is to prevent renaming of a register to another register that is not saved by a prologue in an interrupt handler.
The default is always nonzero.
A C expression that is nonzero if a value of mode mode1 is accessible in mode mode2 without copying.
If
HARD_REGNO_MODE_OK (
r,
mode1)
andHARD_REGNO_MODE_OK (
r,
mode2)
are always the same for any r, thenMODES_TIEABLE_P (
mode1,
mode2)
should be nonzero. If they differ for any r, you should define this macro to return zero unless some other mechanism ensures the accessibility of the value in a narrower mode.You should define this macro to return nonzero in as many cases as possible since doing so will allow GCC to perform better register allocation.
This target hook should return
true
if it is OK to use a hard register regno as scratch reg in peephole2.One common use of this macro is to prevent using of a register that is not saved by a prologue in an interrupt handler.
The default version of this hook always returns
true
.
Define this macro if the compiler should avoid copies to/from
CCmode
registers. You should only define this macro if support for copying to/fromCCmode
is incomplete.
On some machines, a leaf function (i.e., one which makes no calls) can run more efficiently if it does not make its own register window. Often this means it is required to receive its arguments in the registers where they are passed by the caller, instead of the registers where they would normally arrive.
The special treatment for leaf functions generally applies only when other conditions are met; for example, often they may use only those registers for its own variables and temporaries. We use the term “leaf function” to mean a function that is suitable for this special handling, so that functions with no calls are not necessarily “leaf functions”.
GCC assigns register numbers before it knows whether the function is suitable for leaf function treatment. So it needs to renumber the registers in order to output a leaf function. The following macros accomplish this.
Name of a char vector, indexed by hard register number, which contains 1 for a register that is allowable in a candidate for leaf function treatment.
If leaf function treatment involves renumbering the registers, then the registers marked here should be the ones before renumbering—those that GCC would ordinarily allocate. The registers which will actually be used in the assembler code, after renumbering, should not be marked with 1 in this vector.
Define this macro only if the target machine offers a way to optimize the treatment of leaf functions.
A C expression whose value is the register number to which regno should be renumbered, when a function is treated as a leaf function.
If regno is a register number which should not appear in a leaf function before renumbering, then the expression should yield −1, which will cause the compiler to abort.
Define this macro only if the target machine offers a way to optimize the treatment of leaf functions, and registers need to be renumbered to do this.
TARGET_ASM_FUNCTION_PROLOGUE
and
TARGET_ASM_FUNCTION_EPILOGUE
must usually treat leaf functions
specially. They can test the C variable current_function_is_leaf
which is nonzero for leaf functions. current_function_is_leaf
is
set prior to local register allocation and is valid for the remaining
compiler passes. They can also test the C variable
current_function_uses_only_leaf_regs
which is nonzero for leaf
functions which only use leaf registers.
current_function_uses_only_leaf_regs
is valid after all passes
that modify the instructions have been run and is only useful if
LEAF_REGISTERS
is defined.
There are special features to handle computers where some of the “registers” form a stack. Stack registers are normally written by pushing onto the stack, and are numbered relative to the top of the stack.
Currently, GCC can only handle one group of stack-like registers, and they must be consecutively numbered. Furthermore, the existing support for stack-like registers is specific to the 80387 floating point coprocessor. If you have a new architecture that uses stack-like registers, you will need to do substantial work on reg-stack.c and write your machine description to cooperate with it, as well as defining these macros.
This is a cover class containing the stack registers. Define this if the machine has any stack-like registers.
The number of the first stack-like register. This one is the top of the stack.
The number of the last stack-like register. This one is the bottom of the stack.
On many machines, the numbered registers are not all equivalent. For example, certain registers may not be allowed for indexed addressing; certain registers may not be allowed in some instructions. These machine restrictions are described to the compiler using register classes.
You define a number of register classes, giving each one a name and saying which of the registers belong to it. Then you can specify register classes that are allowed as operands to particular instruction patterns.
In general, each register will belong to several classes. In fact, one
class must be named ALL_REGS
and contain all the registers. Another
class must be named NO_REGS
and contain no registers. Often the
union of two classes will be another class; however, this is not required.
One of the classes must be named GENERAL_REGS
. There is nothing
terribly special about the name, but the operand constraint letters
‘r’ and ‘g’ specify this class. If GENERAL_REGS
is
the same as ALL_REGS
, just define it as a macro which expands
to ALL_REGS
.
Order the classes so that if class x is contained in class y then x has a lower class number than y.
The way classes other than GENERAL_REGS
are specified in operand
constraints is through machine-dependent operand constraint letters.
You can define such letters to correspond to various classes, then use
them in operand constraints.
You must define the narrowest register classes for allocatable registers, so that each class either has no subclasses, or that for some mode, the move cost between registers within the class is cheaper than moving a register in the class to or from memory (see Costs).
You should define a class for the union of two classes whenever some
instruction allows both classes. For example, if an instruction allows
either a floating point (coprocessor) register or a general register for a
certain operand, you should define a class FLOAT_OR_GENERAL_REGS
which includes both of them. Otherwise you will get suboptimal code,
or even internal compiler errors when reload cannot find a register in the
class computed via reg_class_subunion
.
You must also specify certain redundant information about the register classes: for each class, which classes contain it and which ones are contained in it; for each pair of classes, the largest class contained in their union.
When a value occupying several consecutive registers is expected in a
certain class, all the registers used must belong to that class.
Therefore, register classes cannot be used to enforce a requirement for
a register pair to start with an even-numbered register. The way to
specify this requirement is with HARD_REGNO_MODE_OK
.
Register classes used for input-operands of bitwise-and or shift
instructions have a special requirement: each such class must have, for
each fixed-point machine mode, a subclass whose registers can transfer that
mode to or from memory. For example, on some machines, the operations for
single-byte values (QImode
) are limited to certain registers. When
this is so, each register class that is used in a bitwise-and or shift
instruction must have a subclass consisting of registers from which
single-byte values can be loaded or stored. This is so that
PREFERRED_RELOAD_CLASS
can always have a possible value to return.
An enumerated type that must be defined with all the register class names as enumerated values.
NO_REGS
must be first.ALL_REGS
must be the last register class, followed by one more enumerated value,LIM_REG_CLASSES
, which is not a register class but rather tells how many classes there are.Each register class has a number, which is the value of casting the class name to type
int
. The number serves as an index in many of the tables described below.
The number of distinct register classes, defined as follows:
#define N_REG_CLASSES (int) LIM_REG_CLASSES
An initializer containing the names of the register classes as C string constants. These names are used in writing some of the debugging dumps.
An initializer containing the contents of the register classes, as integers which are bit masks. The nth integer specifies the contents of class n. The way the integer mask is interpreted is that register r is in the class if mask
& (1 <<
r)
is 1.When the machine has more than 32 registers, an integer does not suffice. Then the integers are replaced by sub-initializers, braced groupings containing several integers. Each sub-initializer must be suitable as an initializer for the type
HARD_REG_SET
which is defined in hard-reg-set.h. In this situation, the first integer in each sub-initializer corresponds to registers 0 through 31, the second integer to registers 32 through 63, and so on.
A C expression whose value is a register class containing hard register regno. In general there is more than one such class; choose a class which is minimal, meaning that no smaller class also contains the register.
A macro whose definition is the name of the class to which a valid base register must belong. A base register is one used in an address which is the register value plus a displacement.
This is a variation of the
BASE_REG_CLASS
macro which allows the selection of a base register in a mode dependent manner. If mode is VOIDmode then it should return the same value asBASE_REG_CLASS
.
A C expression whose value is the register class to which a valid base register must belong in order to be used in a base plus index register address. You should define this macro if base plus index addresses have different requirements than other base register uses.
A C expression whose value is the register class to which a valid base register for a memory reference in mode mode to address space address_space must belong. outer_code and index_code define the context in which the base register occurs. outer_code is the code of the immediately enclosing expression (
MEM
for the top level of an address,ADDRESS
for something that occurs in anaddress_operand
). index_code is the code of the corresponding index expression if outer_code isPLUS
;SCRATCH
otherwise.
A macro whose definition is the name of the class to which a valid index register must belong. An index register is one used in an address where its value is either multiplied by a scale factor or added to another register (as well as added to a displacement).
A C expression which is nonzero if register number num is suitable for use as a base register in operand addresses.
A C expression that is just like
REGNO_OK_FOR_BASE_P
, except that that expression may examine the mode of the memory reference in mode. You should define this macro if the mode of the memory reference affects whether a register may be used as a base register. If you define this macro, the compiler will use it instead ofREGNO_OK_FOR_BASE_P
. The mode may beVOIDmode
for addresses that appear outside aMEM
, i.e., as anaddress_operand
.
A C expression which is nonzero if register number num is suitable for use as a base register in base plus index operand addresses, accessing memory in mode mode. It may be either a suitable hard register or a pseudo register that has been allocated such a hard register. You should define this macro if base plus index addresses have different requirements than other base register uses.
Use of this macro is deprecated; please use the more general
REGNO_MODE_CODE_OK_FOR_BASE_P
.
A C expression which is nonzero if register number num is suitable for use as a base register in operand addresses, accessing memory in mode mode in address space address_space. This is similar to
REGNO_MODE_OK_FOR_BASE_P
, except that that expression may examine the context in which the register appears in the memory reference. outer_code is the code of the immediately enclosing expression (MEM
if at the top level of the address,ADDRESS
for something that occurs in anaddress_operand
). index_code is the code of the corresponding index expression if outer_code isPLUS
;SCRATCH
otherwise. The mode may beVOIDmode
for addresses that appear outside aMEM
, i.e., as anaddress_operand
.
A C expression which is nonzero if register number num is suitable for use as an index register in operand addresses. It may be either a suitable hard register or a pseudo register that has been allocated such a hard register.
The difference between an index register and a base register is that the index register may be scaled. If an address involves the sum of two registers, neither one of them scaled, then either one may be labeled the “base” and the other the “index”; but whichever labeling is used must fit the machine's constraints of which registers may serve in each capacity. The compiler will try both labelings, looking for one that is valid, and will reload one or both registers only if neither labeling works.
A target hook that places additional preference on the register class to use when it is necessary to rename a register in class rclass to another class, or perhaps NO_REGS, if no preferred register class is found or hook
preferred_rename_class
is not implemented. Sometimes returning a more restrictive class makes better code. For example, on ARM, thumb-2 instructions usingLO_REGS
may be smaller than instructions usingGENERIC_REGS
. By returningLO_REGS
frompreferred_rename_class
, code size can be reduced.
A target hook that places additional restrictions on the register class to use when it is necessary to copy value x into a register in class rclass. The value is a register class; perhaps rclass, or perhaps another, smaller class.
The default version of this hook always returns value of
rclass
argument.Sometimes returning a more restrictive class makes better code. For example, on the 68000, when x is an integer constant that is in range for a ‘moveq’ instruction, the value of this macro is always
DATA_REGS
as long as rclass includes the data registers. Requiring a data register guarantees that a ‘moveq’ will be used.One case where
TARGET_PREFERRED_RELOAD_CLASS
must not return rclass is if x is a legitimate constant which cannot be loaded into some register class. By returningNO_REGS
you can force x into a memory location. For example, rs6000 can load immediate values into general-purpose registers, but does not have an instruction for loading an immediate value into a floating-point register, soTARGET_PREFERRED_RELOAD_CLASS
returnsNO_REGS
when x is a floating-point constant. If the constant can't be loaded into any kind of register, code generation will be better ifTARGET_LEGITIMATE_CONSTANT_P
makes the constant illegitimate instead of usingTARGET_PREFERRED_RELOAD_CLASS
.If an insn has pseudos in it after register allocation, reload will go through the alternatives and call repeatedly
TARGET_PREFERRED_RELOAD_CLASS
to find the best one. ReturningNO_REGS
, in this case, makes reload add a!
in front of the constraint: the x86 back-end uses this feature to discourage usage of 387 registers when math is done in the SSE registers (and vice versa).
A C expression that places additional restrictions on the register class to use when it is necessary to copy value x into a register in class class. The value is a register class; perhaps class, or perhaps another, smaller class. On many machines, the following definition is safe:
#define PREFERRED_RELOAD_CLASS(X,CLASS) CLASSSometimes returning a more restrictive class makes better code. For example, on the 68000, when x is an integer constant that is in range for a ‘moveq’ instruction, the value of this macro is always
DATA_REGS
as long as class includes the data registers. Requiring a data register guarantees that a ‘moveq’ will be used.One case where
PREFERRED_RELOAD_CLASS
must not return class is if x is a legitimate constant which cannot be loaded into some register class. By returningNO_REGS
you can force x into a memory location. For example, rs6000 can load immediate values into general-purpose registers, but does not have an instruction for loading an immediate value into a floating-point register, soPREFERRED_RELOAD_CLASS
returnsNO_REGS
when x is a floating-point constant. If the constant can't be loaded into any kind of register, code generation will be better ifTARGET_LEGITIMATE_CONSTANT_P
makes the constant illegitimate instead of usingTARGET_PREFERRED_RELOAD_CLASS
.If an insn has pseudos in it after register allocation, reload will go through the alternatives and call repeatedly
PREFERRED_RELOAD_CLASS
to find the best one. ReturningNO_REGS
, in this case, makes reload add a!
in front of the constraint: the x86 back-end uses this feature to discourage usage of 387 registers when math is done in the SSE registers (and vice versa).
Like
TARGET_PREFERRED_RELOAD_CLASS
, but for output reloads instead of input reloads.The default version of this hook always returns value of
rclass
argument.You can also use
TARGET_PREFERRED_OUTPUT_RELOAD_CLASS
to discourage reload from using some alternatives, likeTARGET_PREFERRED_RELOAD_CLASS
.
A C expression that places additional restrictions on the register class to use when it is necessary to be able to hold a value of mode mode in a reload register for which class class would ordinarily be used.
Unlike
PREFERRED_RELOAD_CLASS
, this macro should be used when there are certain modes that simply can't go in certain reload classes.The value is a register class; perhaps class, or perhaps another, smaller class.
Don't define this macro unless the target machine has limitations which require the macro to do something nontrivial.
Many machines have some registers that cannot be copied directly to or from memory or even from other types of registers. An example is the ‘MQ’ register, which on most machines, can only be copied to or from general registers, but not memory. Below, we shall be using the term 'intermediate register' when a move operation cannot be performed directly, but has to be done by copying the source into the intermediate register first, and then copying the intermediate register to the destination. An intermediate register always has the same mode as source and destination. Since it holds the actual value being copied, reload might apply optimizations to re-use an intermediate register and eliding the copy from the source when it can determine that the intermediate register still holds the required value.
Another kind of secondary reload is required on some machines which allow copying all registers to and from memory, but require a scratch register for stores to some memory locations (e.g., those with symbolic address on the RT, and those with certain symbolic address on the SPARC when compiling PIC). Scratch registers need not have the same mode as the value being copied, and usually hold a different value than that being copied. Special patterns in the md file are needed to describe how the copy is performed with the help of the scratch register; these patterns also describe the number, register class(es) and mode(s) of the scratch register(s).
In some cases, both an intermediate and a scratch register are required.
For input reloads, this target hook is called with nonzero in_p, and x is an rtx that needs to be copied to a register of class reload_class in reload_mode. For output reloads, this target hook is called with zero in_p, and a register of class reload_class needs to be copied to rtx x in reload_mode.
If copying a register of reload_class from/to x requires an intermediate register, the hook
secondary_reload
should return the register class required for this intermediate register. If no intermediate register is required, it should return NO_REGS. If more than one intermediate register is required, describe the one that is closest in the copy chain to the reload register.If scratch registers are needed, you also have to describe how to perform the copy from/to the reload register to/from this closest intermediate register. Or if no intermediate register is required, but still a scratch register is needed, describe the copy from/to the reload register to/from the reload operand x.
You do this by setting
sri->icode
to the instruction code of a pattern in the md file which performs the move. Operands 0 and 1 are the output and input of this copy, respectively. Operands from operand 2 onward are for scratch operands. These scratch operands must have a mode, and a single-register-class output constraint.When an intermediate register is used, the
secondary_reload
hook will be called again to determine how to copy the intermediate register to/from the reload operand x, so your hook must also have code to handle the register class of the intermediate operand.x might be a pseudo-register or a
subreg
of a pseudo-register, which could either be in a hard register or in memory. Usetrue_regnum
to find out; it will return −1 if the pseudo is in memory and the hard register number if it is in a register.Scratch operands in memory (constraint
"=m"
/"=&m"
) are currently not supported. For the time being, you will have to continue to useSECONDARY_MEMORY_NEEDED
for that purpose.
copy_cost
also uses this target hook to find out how values are copied. If you want it to include some extra cost for the need to allocate (a) scratch register(s), setsri->extra_cost
to the additional cost. Or if two dependent moves are supposed to have a lower cost than the sum of the individual moves due to expected fortuitous scheduling and/or special forwarding logic, you can setsri->extra_cost
to a negative amount.
These macros are obsolete, new ports should use the target hook
TARGET_SECONDARY_RELOAD
instead.These are obsolete macros, replaced by the
TARGET_SECONDARY_RELOAD
target hook. Older ports still define these macros to indicate to the reload phase that it may need to allocate at least one register for a reload in addition to the register to contain the data. Specifically, if copying x to a register class in mode requires an intermediate register, you were supposed to defineSECONDARY_INPUT_RELOAD_CLASS
to return the largest register class all of whose registers can be used as intermediate registers or scratch registers.If copying a register class in mode to x requires an intermediate or scratch register,
SECONDARY_OUTPUT_RELOAD_CLASS
was supposed to be defined be defined to return the largest register class required. If the requirements for input and output reloads were the same, the macroSECONDARY_RELOAD_CLASS
should have been used instead of defining both macros identically.The values returned by these macros are often
GENERAL_REGS
. ReturnNO_REGS
if no spare register is needed; i.e., if x can be directly copied to or from a register of class in mode without requiring a scratch register. Do not define this macro if it would always returnNO_REGS
.If a scratch register is required (either with or without an intermediate register), you were supposed to define patterns for ‘reload_inm’ or ‘reload_outm’, as required (see Standard Names. These patterns, which were normally implemented with a
define_expand
, should be similar to the ‘movm’ patterns, except that operand 2 is the scratch register.These patterns need constraints for the reload register and scratch register that contain a single register class. If the original reload register (whose class is class) can meet the constraint given in the pattern, the value returned by these macros is used for the class of the scratch register. Otherwise, two additional reload registers are required. Their classes are obtained from the constraints in the insn pattern.
x might be a pseudo-register or a
subreg
of a pseudo-register, which could either be in a hard register or in memory. Usetrue_regnum
to find out; it will return −1 if the pseudo is in memory and the hard register number if it is in a register.These macros should not be used in the case where a particular class of registers can only be copied to memory and not to another class of registers. In that case, secondary reload registers are not needed and would not be helpful. Instead, a stack location must be used to perform the copy and the
mov
m pattern should use memory as an intermediate storage. This case often occurs between floating-point and general registers.
Certain machines have the property that some registers cannot be copied to some other registers without using memory. Define this macro on those machines to be a C expression that is nonzero if objects of mode m in registers of class1 can only be copied to registers of class class2 by storing a register of class1 into memory and loading that memory location into a register of class2.
Do not define this macro if its value would always be zero.
Normally when
SECONDARY_MEMORY_NEEDED
is defined, the compiler allocates a stack slot for a memory location needed for register copies. If this macro is defined, the compiler instead uses the memory location defined by this macro.Do not define this macro if you do not define
SECONDARY_MEMORY_NEEDED
.
When the compiler needs a secondary memory location to copy between two registers of mode mode, it normally allocates sufficient memory to hold a quantity of
BITS_PER_WORD
bits and performs the store and load operations in a mode that many bits wide and whose class is the same as that of mode.This is right thing to do on most machines because it ensures that all bits of the register are copied and prevents accesses to the registers in a narrower mode, which some machines prohibit for floating-point registers.
However, this default behavior is not correct on some machines, such as the DEC Alpha, that store short integers in floating-point registers differently than in integer registers. On those machines, the default widening will not work correctly and you must define this macro to suppress that widening in some cases. See the file alpha.h for details.
Do not define this macro if you do not define
SECONDARY_MEMORY_NEEDED
or if widening mode to a mode that isBITS_PER_WORD
bits wide is correct for your machine.
A target hook which returns
true
if pseudos that have been assigned to registers of class rclass would likely be spilled because registers of rclass are needed for spill registers.The default version of this target hook returns
true
if rclass has exactly one register andfalse
otherwise. On most machines, this default should be used. For generally register-starved machines, such as i386, or machines with right register constraints, such as SH, this hook can be used to avoid excessive spilling.This hook is also used by some of the global intra-procedural code transformations to throtle code motion, to avoid increasing register pressure.
A target hook returns the maximum number of consecutive registers of class rclass needed to hold a value of mode mode.
This is closely related to the macro
HARD_REGNO_NREGS
. In fact, the value returned byTARGET_CLASS_MAX_NREGS (
rclass,
mode)
target hook should be the maximum value ofHARD_REGNO_NREGS (
regno,
mode)
for all regno values in the class rclass.This target hook helps control the handling of multiple-word values in the reload pass.
The default version of this target hook returns the size of mode in words.
A C expression for the maximum number of consecutive registers of class class needed to hold a value of mode mode.
This is closely related to the macro
HARD_REGNO_NREGS
. In fact, the value of the macroCLASS_MAX_NREGS (
class,
mode)
should be the maximum value ofHARD_REGNO_NREGS (
regno,
mode)
for all regno values in the class class.This macro helps control the handling of multiple-word values in the reload pass.
If defined, a C expression that returns nonzero for a class for which a change from mode from to mode to is invalid.
For example, loading 32-bit integer or floating-point objects into floating-point registers on Alpha extends them to 64 bits. Therefore loading a 64-bit object and then storing it as a 32-bit object does not store the low-order 32 bits, as would be the case for a normal register. Therefore, alpha.h defines
CANNOT_CHANGE_MODE_CLASS
as below:#define CANNOT_CHANGE_MODE_CLASS(FROM, TO, CLASS) \ (GET_MODE_SIZE (FROM) != GET_MODE_SIZE (TO) \ ? reg_classes_intersect_p (FLOAT_REGS, (CLASS)) : 0)Even if storing from a register in mode to would be valid, if both from and
raw_reg_mode
for class are wider thanword_mode
, then we must prevent to narrowing the mode. This happens when the middle-end assumes that it can load or store pieces of an N-word pseudo, and that the pseudo will eventually be allocated to Nword_mode
hard registers. Failure to prevent this kind of mode change will result in the entireraw_reg_mode
being modified instead of the partial value that the middle-end intended.
A target hook which can change allocno class for given pseudo from allocno and best class calculated by IRA.
The default version of this target hook always returns given class.
A target hook which returns true if we use LRA instead of reload pass. The default version of this target hook returns always false, but new ports should use LRA.
A target hook which returns the register priority number to which the register hard_regno belongs to. The bigger the number, the more preferable the hard register usage (when all other conditions are the same). This hook can be used to prefer some hard register over others in LRA. For example, some x86-64 register usage needs additional prefix which makes instructions longer. The hook can return lower priority number for such registers make them less favorable and as result making the generated code smaller. The default version of this target hook returns always zero.
A target hook which returns true if we need register usage leveling. That means if a few hard registers are equally good for the assignment, we choose the least used hard register. The register usage leveling may be profitable for some targets. Don't use the usage leveling for targets with conditional execution or targets with big register files as it hurts if-conversion and cross-jumping optimizations. The default version of this target hook returns always false.
A target hook which returns true if an address with the same structure can have different maximal legitimate displacement. For example, the displacement can depend on memory mode or on operand combinations in the insn. The default version of this target hook returns always false.
A target hook which returns
true
if subst can't substitute safely pseudos with equivalent memory values during register allocation. The default version of this target hook returnsfalse
. On most machines, this default should be used. For generally machines with non orthogonal register usage for addressing, such as SH, this hook can be used to avoid excessive spilling.
A target hook which returns
true
if *disp is legitimezed to valid address displacement with subtracting *offset at memory mode mode. The default version of this target hook returnsfalse
. This hook will benefit machines with limited base plus displacement addressing.
This hook defines a class of registers which could be used for spilling pseudos of the given mode and class, or
NO_REGS
if only memory should be used. Not defining this hook is equivalent to returningNO_REGS
for all inputs.
This hook defines the machine mode to use for the boolean result of conditional store patterns. The ICODE argument is the instruction code for the cstore being performed. Not definiting this hook is the same as accepting the mode encoded into operand 0 of the cstore expander patterns.
This describes the stack layout and calling conventions.
Here is the basic stack layout.
Define this macro to be true if pushing a word onto the stack moves the stack pointer to a smaller address, and false otherwise.
This macro defines the operation used when something is pushed on the stack. In RTL, a push operation will be
(set (mem (STACK_PUSH_CODE (reg sp))) ...)
The choices are
PRE_DEC
,POST_DEC
,PRE_INC
, andPOST_INC
. Which of these is correct depends on the stack direction and on whether the stack pointer points to the last item on the stack or whether it points to the space for the next item on the stack.The default is
PRE_DEC
whenSTACK_GROWS_DOWNWARD
is true, which is almost always right, andPRE_INC
otherwise, which is often wrong.
Define this macro to nonzero value if the addresses of local variable slots are at negative offsets from the frame pointer.
Define this macro if successive arguments to a function occupy decreasing addresses on the stack.
Offset from the frame pointer to the first local variable slot to be allocated.
If
FRAME_GROWS_DOWNWARD
, find the next slot's offset by subtracting the first slot's length fromSTARTING_FRAME_OFFSET
. Otherwise, it is found by adding the length of the first slot to the valueSTARTING_FRAME_OFFSET
.
Define to zero to disable final alignment of the stack during reload. The nonzero default for this macro is suitable for most ports.
On ports where
STARTING_FRAME_OFFSET
is nonzero or where there is a register save block following the local block that doesn't require alignment toSTACK_BOUNDARY
, it may be beneficial to disable stack alignment and do it in the backend.
Offset from the stack pointer register to the first location at which outgoing arguments are placed. If not specified, the default value of zero is used. This is the proper value for most machines.
If
ARGS_GROW_DOWNWARD
, this is the offset to the location above the first location at which outgoing arguments are placed.
Offset from the argument pointer register to the first argument's address. On some machines it may depend on the data type of the function.
If
ARGS_GROW_DOWNWARD
, this is the offset to the location above the first argument's address.
Offset from the stack pointer register to an item dynamically allocated on the stack, e.g., by
alloca
.The default value for this macro is
STACK_POINTER_OFFSET
plus the length of the outgoing arguments. The default is correct for most machines. See function.c for details.
A C expression whose value is RTL representing the address of the initial stack frame. This address is passed to
RETURN_ADDR_RTX
andDYNAMIC_CHAIN_ADDRESS
. If you don't define this macro, a reasonable default value will be used. Define this macro in order to make frame pointer elimination work in the presence of__builtin_frame_address (count)
and__builtin_return_address (count)
forcount
not equal to zero.
A C expression whose value is RTL representing the address in a stack frame where the pointer to the caller's frame is stored. Assume that frameaddr is an RTL expression for the address of the stack frame itself.
If you don't define this macro, the default is to return the value of frameaddr—that is, the stack frame address is also the address of the stack word that points to the previous frame.
A C expression that produces the machine-specific code to setup the stack so that arbitrary frames can be accessed. For example, on the SPARC, we must flush all of the register windows to the stack before we can access arbitrary stack frames. You will seldom need to define this macro. The default is to do nothing.
This target hook should return an rtx that is used to store the address of the current frame into the built in
setjmp
buffer. The default value,virtual_stack_vars_rtx
, is correct for most machines. One reason you may need to define this target hook is ifhard_frame_pointer_rtx
is the appropriate value on your machine.
A C expression whose value is RTL representing the value of the frame address for the current frame. frameaddr is the frame pointer of the current frame. This is used for __builtin_frame_address. You need only define this macro if the frame address is not the same as the frame pointer. Most machines do not need to define it.
A C expression whose value is RTL representing the value of the return address for the frame count steps up from the current frame, after the prologue. frameaddr is the frame pointer of the count frame, or the frame pointer of the count − 1 frame if
RETURN_ADDR_IN_PREVIOUS_FRAME
is nonzero.The value of the expression must always be the correct address when count is zero, but may be
NULL_RTX
if there is no way to determine the return address of other frames.
Define this macro to nonzero value if the return address of a particular stack frame is accessed from the frame pointer of the previous stack frame. The zero default for this macro is suitable for most ports.
A C expression whose value is RTL representing the location of the incoming return address at the beginning of any function, before the prologue. This RTL is either a
REG
, indicating that the return value is saved in ‘REG’, or aMEM
representing a location in the stack.You only need to define this macro if you want to support call frame debugging information like that provided by DWARF 2.
If this RTL is a
REG
, you should also defineDWARF_FRAME_RETURN_COLUMN
toDWARF_FRAME_REGNUM (REGNO)
.
A C expression whose value is an integer giving a DWARF 2 column number that may be used as an alternative return column. The column must not correspond to any gcc hard register (that is, it must not be in the range of
DWARF_FRAME_REGNUM
).This macro can be useful if
DWARF_FRAME_RETURN_COLUMN
is set to a general register, but an alternative column needs to be used for signal frames. Some targets have also used different frame return columns over time.
A C expression whose value is an integer giving a DWARF 2 register number that is considered to always have the value zero. This should only be defined if the target has an architected zero register, and someone decided it was a good idea to use that register number to terminate the stack backtrace. New ports should avoid this.
This target hook allows the backend to emit frame-related insns that contain UNSPECs or UNSPEC_VOLATILEs. The DWARF 2 call frame debugging info engine will invoke it on insns of the form
(set (reg) (unspec [...] UNSPEC_INDEX))and
(set (reg) (unspec_volatile [...] UNSPECV_INDEX)).to let the backend emit the call frame instructions. label is the CFI label attached to the insn, pattern is the pattern of the insn and index is
UNSPEC_INDEX
orUNSPECV_INDEX
.
A C expression whose value is an integer giving the offset, in bytes, from the value of the stack pointer register to the top of the stack frame at the beginning of any function, before the prologue. The top of the frame is defined to be the value of the stack pointer in the previous frame, just before the call instruction.
You only need to define this macro if you want to support call frame debugging information like that provided by DWARF 2.
A C expression whose value is an integer giving the offset, in bytes, from the argument pointer to the canonical frame address (cfa). The final value should coincide with that calculated by
INCOMING_FRAME_SP_OFFSET
. Which is unfortunately not usable during virtual register instantiation.The default value for this macro is
FIRST_PARM_OFFSET (fundecl) + crtl->args.pretend_args_size
, which is correct for most machines; in general, the arguments are found immediately before the stack frame. Note that this is not the case on some targets that save registers into the caller's frame, such as SPARC and rs6000, and so such targets need to define this macro.You only need to define this macro if the default is incorrect, and you want to support call frame debugging information like that provided by DWARF 2.
If defined, a C expression whose value is an integer giving the offset in bytes from the frame pointer to the canonical frame address (cfa). The final value should coincide with that calculated by
INCOMING_FRAME_SP_OFFSET
.Normally the CFA is calculated as an offset from the argument pointer, via
ARG_POINTER_CFA_OFFSET
, but if the argument pointer is variable due to the ABI, this may not be possible. If this macro is defined, it implies that the virtual register instantiation should be based on the frame pointer instead of the argument pointer. Only one ofFRAME_POINTER_CFA_OFFSET
andARG_POINTER_CFA_OFFSET
should be defined.
If defined, a C expression whose value is an integer giving the offset in bytes from the canonical frame address (cfa) to the frame base used in DWARF 2 debug information. The default is zero. A different value may reduce the size of debug information on some ports.
A C expression whose value is the Nth register number used for data by exception handlers, or
INVALID_REGNUM
if fewer than N registers are usable.The exception handling library routines communicate with the exception handlers via a set of agreed upon registers. Ideally these registers should be call-clobbered; it is possible to use call-saved registers, but may negatively impact code size. The target must support at least 2 data registers, but should define 4 if there are enough free registers.
You must define this macro if you want to support call frame exception handling like that provided by DWARF 2.
A C expression whose value is RTL representing a location in which to store a stack adjustment to be applied before function return. This is used to unwind the stack to an exception handler's call frame. It will be assigned zero on code paths that return normally.
Typically this is a call-clobbered hard register that is otherwise untouched by the epilogue, but could also be a stack slot.
Do not define this macro if the stack pointer is saved and restored by the regular prolog and epilog code in the call frame itself; in this case, the exception handling library routines will update the stack location to be restored in place. Otherwise, you must define this macro if you want to support call frame exception handling like that provided by DWARF 2.
A C expression whose value is RTL representing a location in which to store the address of an exception handler to which we should return. It will not be assigned on code paths that return normally.
Typically this is the location in the call frame at which the normal return address is stored. For targets that return by popping an address off the stack, this might be a memory address just below the target call frame rather than inside the current call frame. If defined,
EH_RETURN_STACKADJ_RTX
will have already been assigned, so it may be used to calculate the location of the target call frame.Some targets have more complex requirements than storing to an address calculable during initial code generation. In that case the
eh_return
instruction pattern should be used instead.If you want to support call frame exception handling, you must define either this macro or the
eh_return
instruction pattern.
If defined, an integer-valued C expression for which rtl will be generated to add it to the exception handler address before it is searched in the exception handling tables, and to subtract it again from the address before using it to return to the exception handler.
This macro chooses the encoding of pointers embedded in the exception handling sections. If at all possible, this should be defined such that the exception handling section will not require dynamic relocations, and so may be read-only.
code is 0 for data, 1 for code labels, 2 for function pointers. global is true if the symbol may be affected by dynamic relocations. The macro should return a combination of the
DW_EH_PE_*
defines as found in dwarf2.h.If this macro is not defined, pointers will not be encoded but represented directly.
This macro allows the target to emit whatever special magic is required to represent the encoding chosen by
ASM_PREFERRED_EH_DATA_FORMAT
. Generic code takes care of pc-relative and indirect encodings; this must be defined if the target uses text-relative or data-relative encodings.This is a C statement that branches to done if the format was handled. encoding is the format chosen, size is the number of bytes that the format occupies, addr is the
SYMBOL_REF
to be emitted.
This macro allows the target to add CPU and operating system specific code to the call-frame unwinder for use when there is no unwind data available. The most common reason to implement this macro is to unwind through signal frames.
This macro is called from
uw_frame_state_for
in unwind-dw2.c, unwind-dw2-xtensa.c and unwind-ia64.c. context is an_Unwind_Context
; fs is an_Unwind_FrameState
. Examinecontext->ra
for the address of the code being executed andcontext->cfa
for the stack pointer value. If the frame can be decoded, the register save addresses should be updated in fs and the macro should evaluate to_URC_NO_REASON
. If the frame cannot be decoded, the macro should evaluate to_URC_END_OF_STACK
.For proper signal handling in Java this macro is accompanied by
MAKE_THROW_FRAME
, defined in libjava/include/*-signal.h headers.
This macro allows the target to add operating system specific code to the call-frame unwinder to handle the IA-64
.unwabi
unwinding directive, usually used for signal or interrupt frames.This macro is called from
uw_update_context
in libgcc's unwind-ia64.c. context is an_Unwind_Context
; fs is an_Unwind_FrameState
. Examinefs->unwabi
for the abi and context in the.unwabi
directive. If the.unwabi
directive can be handled, the register save addresses should be updated in fs.
A C expression that evaluates to true if the target requires unwind info to be given comdat linkage. Define it to be
1
if comdat linkage is necessary. The default is0
.
GCC will check that stack references are within the boundaries of the stack, if the option -fstack-check is specified, in one of three ways:
STACK_CHECK_BUILTIN
macro is nonzero, GCC
will assume that you have arranged for full stack checking to be done
at appropriate places in the configuration files. GCC will not do
other special processing.
STACK_CHECK_BUILTIN
is zero and the value of the
STACK_CHECK_STATIC_BUILTIN
macro is nonzero, GCC will assume
that you have arranged for static stack checking (checking of the
static stack frame of functions) to be done at appropriate places
in the configuration files. GCC will only emit code to do dynamic
stack checking (checking on dynamic stack allocations) using the third
approach below.
If neither STACK_CHECK_BUILTIN nor STACK_CHECK_STATIC_BUILTIN is defined,
GCC will change its allocation strategy for large objects if the option
-fstack-check is specified: they will always be allocated
dynamically if their size exceeds STACK_CHECK_MAX_VAR_SIZE
bytes.
A nonzero value if stack checking is done by the configuration files in a machine-dependent manner. You should define this macro if stack checking is required by the ABI of your machine or if you would like to do stack checking in some more efficient way than the generic approach. The default value of this macro is zero.
A nonzero value if static stack checking is done by the configuration files in a machine-dependent manner. You should define this macro if you would like to do static stack checking in some more efficient way than the generic approach. The default value of this macro is zero.
An integer specifying the interval at which GCC must generate stack probe instructions, defined as 2 raised to this integer. You will normally define this macro so that the interval be no larger than the size of the “guard pages” at the end of a stack area. The default value of 12 (4096-byte interval) is suitable for most systems.
An integer which is nonzero if GCC should move the stack pointer page by page when doing probes. This can be necessary on systems where the stack pointer contains the bottom address of the memory area accessible to the executing thread at any point in time. In this situation an alternate signal stack is required in order to be able to recover from a stack overflow. The default value of this macro is zero.
The number of bytes of stack needed to recover from a stack overflow, for languages where such a recovery is supported. The default value of 4KB/8KB with the
setjmp
/longjmp
-based exception handling mechanism and 8KB/12KB with other exception handling mechanisms should be adequate for most architectures and operating systems.
The following macros are relevant only if neither STACK_CHECK_BUILTIN nor STACK_CHECK_STATIC_BUILTIN is defined; you can omit them altogether in the opposite case.
The maximum size of a stack frame, in bytes. GCC will generate probe instructions in non-leaf functions to ensure at least this many bytes of stack are available. If a stack frame is larger than this size, stack checking will not be reliable and GCC will issue a warning. The default is chosen so that GCC only generates one instruction on most systems. You should normally not change the default value of this macro.
GCC uses this value to generate the above warning message. It represents the amount of fixed frame used by a function, not including space for any callee-saved registers, temporaries and user variables. You need only specify an upper bound for this amount and will normally use the default of four words.
The maximum size, in bytes, of an object that GCC will place in the fixed area of the stack frame when the user specifies -fstack-check. GCC computed the default from the values of the above macros and you will normally not need to override that default.
This discusses registers that address the stack frame.
The register number of the stack pointer register, which must also be a fixed register according to
FIXED_REGISTERS
. On most machines, the hardware determines which register this is.
The register number of the frame pointer register, which is used to access automatic variables in the stack frame. On some machines, the hardware determines which register this is. On other machines, you can choose any register you wish for this purpose.
On some machines the offset between the frame pointer and starting offset of the automatic variables is not known until after register allocation has been done (for example, because the saved registers are between these two locations). On those machines, define
FRAME_POINTER_REGNUM
the number of a special, fixed register to be used internally until the offset is known, and defineHARD_FRAME_POINTER_REGNUM
to be the actual hard register number used for the frame pointer.You should define this macro only in the very rare circumstances when it is not possible to calculate the offset between the frame pointer and the automatic variables until after register allocation has been completed. When this macro is defined, you must also indicate in your definition of
ELIMINABLE_REGS
how to eliminateFRAME_POINTER_REGNUM
into eitherHARD_FRAME_POINTER_REGNUM
orSTACK_POINTER_REGNUM
.Do not define this macro if it would be the same as
FRAME_POINTER_REGNUM
.
The register number of the arg pointer register, which is used to access the function's argument list. On some machines, this is the same as the frame pointer register. On some machines, the hardware determines which register this is. On other machines, you can choose any register you wish for this purpose. If this is not the same register as the frame pointer register, then you must mark it as a fixed register according to
FIXED_REGISTERS
, or arrange to be able to eliminate it (see Elimination).
Define this to a preprocessor constant that is nonzero if
hard_frame_pointer_rtx
andframe_pointer_rtx
should be the same. The default definition is ‘(HARD_FRAME_POINTER_REGNUM == FRAME_POINTER_REGNUM)’; you only need to define this macro if that definition is not suitable for use in preprocessor conditionals.
Define this to a preprocessor constant that is nonzero if
hard_frame_pointer_rtx
andarg_pointer_rtx
should be the same. The default definition is ‘(HARD_FRAME_POINTER_REGNUM == ARG_POINTER_REGNUM)’; you only need to define this macro if that definition is not suitable for use in preprocessor conditionals.
The register number of the return address pointer register, which is used to access the current function's return address from the stack. On some machines, the return address is not at a fixed offset from the frame pointer or stack pointer or argument pointer. This register can be defined to point to the return address on the stack, and then be converted by
ELIMINABLE_REGS
into either the frame pointer or stack pointer.Do not define this macro unless there is no other way to get the return address from the stack.
Register numbers used for passing a function's static chain pointer. If register windows are used, the register number as seen by the called function is
STATIC_CHAIN_INCOMING_REGNUM
, while the register number as seen by the calling function isSTATIC_CHAIN_REGNUM
. If these registers are the same,STATIC_CHAIN_INCOMING_REGNUM
need not be defined.The static chain register need not be a fixed register.
If the static chain is passed in memory, these macros should not be defined; instead, the
TARGET_STATIC_CHAIN
hook should be used.
This hook replaces the use of
STATIC_CHAIN_REGNUM
et al for targets that may use different static chain locations for different nested functions. This may be required if the target has function attributes that affect the calling conventions of the function and those calling conventions use different static chain locations.The default version of this hook uses
STATIC_CHAIN_REGNUM
et al.If the static chain is passed in memory, this hook should be used to provide rtx giving
mem
expressions that denote where they are stored. Often themem
expression as seen by the caller will be at an offset from the stack pointer and themem
expression as seen by the callee will be at an offset from the frame pointer. The variablesstack_pointer_rtx
,frame_pointer_rtx
, andarg_pointer_rtx
will have been initialized and should be used to refer to those items.
This macro specifies the maximum number of hard registers that can be saved in a call frame. This is used to size data structures used in DWARF2 exception handling.
Prior to GCC 3.0, this macro was needed in order to establish a stable exception handling ABI in the face of adding new hard registers for ISA extensions. In GCC 3.0 and later, the EH ABI is insulated from changes in the number of hard registers. Nevertheless, this macro can still be used to reduce the runtime memory requirements of the exception handling routines, which can be substantial if the ISA contains a lot of registers that are not call-saved.
If this macro is not defined, it defaults to
FIRST_PSEUDO_REGISTER
.
This macro is similar to
DWARF_FRAME_REGISTERS
, but is provided for backward compatibility in pre GCC 3.0 compiled code.If this macro is not defined, it defaults to
DWARF_FRAME_REGISTERS
.
Define this macro if the target's representation for dwarf registers is different than the internal representation for unwind column. Given a dwarf register, this macro should return the internal unwind column number to use instead.
See the PowerPC's SPE target for an example.
Define this macro if the target's representation for dwarf registers used in .eh_frame or .debug_frame is different from that used in other debug info sections. Given a GCC hard register number, this macro should return the .eh_frame register number. The default is
DBX_REGISTER_NUMBER (
regno)
.
Define this macro to map register numbers held in the call frame info that GCC has collected using
DWARF_FRAME_REGNUM
to those that should be output in .debug_frame (for_eh is zero) and .eh_frame (for_eh is nonzero). The default is to return regno.
Define this macro if the target stores register values as
_Unwind_Word
type in unwind context. It should be defined if target register size is larger than the size ofvoid *
. The default is to store register values asvoid *
type.
Define this macro to be 1 if the target always uses extended unwind context with version, args_size and by_value fields. If it is undefined, it will be defined to 1 when
REG_VALUE_IN_UNWIND_CONTEXT
is defined and 0 otherwise.
This is about eliminating the frame pointer and arg pointer.
This target hook should return
true
if a function must have and use a frame pointer. This target hook is called in the reload pass. If its return value istrue
the function will have a frame pointer.This target hook can in principle examine the current function and decide according to the facts, but on most machines the constant
false
or the constanttrue
suffices. Usefalse
when the machine allows code to be generated with no frame pointer, and doing so saves some time or space. Usetrue
when there is no possible advantage to avoiding a frame pointer.In certain cases, the compiler does not know how to produce valid code without a frame pointer. The compiler recognizes those cases and automatically gives the function a frame pointer regardless of what
TARGET_FRAME_POINTER_REQUIRED
returns. You don't need to worry about them.In a function that does not require a frame pointer, the frame pointer register can be allocated for ordinary usage, unless you mark it as a fixed register. See
FIXED_REGISTERS
for more information.Default return value is
false
.
A C statement to store in the variable depth-var the difference between the frame pointer and the stack pointer values immediately after the function prologue. The value would be computed from information such as the result of
get_frame_size ()
and the tables of registersregs_ever_live
andcall_used_regs
.If
ELIMINABLE_REGS
is defined, this macro will be not be used and need not be defined. Otherwise, it must be defined even ifTARGET_FRAME_POINTER_REQUIRED
always returns true; in that case, you may set depth-var to anything.
If defined, this macro specifies a table of register pairs used to eliminate unneeded registers that point into the stack frame. If it is not defined, the only elimination attempted by the compiler is to replace references to the frame pointer with references to the stack pointer.
The definition of this macro is a list of structure initializations, each of which specifies an original and replacement register.
On some machines, the position of the argument pointer is not known until the compilation is completed. In such a case, a separate hard register must be used for the argument pointer. This register can be eliminated by replacing it with either the frame pointer or the argument pointer, depending on whether or not the frame pointer has been eliminated.
In this case, you might specify:
#define ELIMINABLE_REGS \ {{ARG_POINTER_REGNUM, STACK_POINTER_REGNUM}, \ {ARG_POINTER_REGNUM, FRAME_POINTER_REGNUM}, \ {FRAME_POINTER_REGNUM, STACK_POINTER_REGNUM}}Note that the elimination of the argument pointer with the stack pointer is specified first since that is the preferred elimination.
This target hook should returns
true
if the compiler is allowed to try to replace register number from_reg with register number to_reg. This target hook need only be defined ifELIMINABLE_REGS
is defined, and will usually betrue
, since most of the cases preventing register elimination are things that the compiler already knows about.Default return value is
true
.
This macro is similar to
INITIAL_FRAME_POINTER_OFFSET
. It specifies the initial difference between the specified pair of registers. This macro must be defined ifELIMINABLE_REGS
is defined.
The macros in this section control how arguments are passed on the stack. See the following section for other macros that control passing certain arguments in registers.
This target hook returns
true
if an argument declared in a prototype as an integral type smaller thanint
should actually be passed as anint
. In addition to avoiding errors in certain cases of mismatch, it also makes for better code on certain machines. The default is to not promote prototypes.
A C expression. If nonzero, push insns will be used to pass outgoing arguments. If the target machine does not have a push instruction, set it to zero. That directs GCC to use an alternate strategy: to allocate the entire argument block and then store the arguments into it. When
PUSH_ARGS
is nonzero,PUSH_ROUNDING
must be defined too.
A C expression. If nonzero, function arguments will be evaluated from last to first, rather than from first to last. If this macro is not defined, it defaults to
PUSH_ARGS
on targets where the stack and args grow in opposite directions, and 0 otherwise.
A C expression that is the number of bytes actually pushed onto the stack when an instruction attempts to push npushed bytes.
On some machines, the definition
#define PUSH_ROUNDING(BYTES) (BYTES)will suffice. But on other machines, instructions that appear to push one byte actually push two bytes in an attempt to maintain alignment. Then the definition should be
#define PUSH_ROUNDING(BYTES) (((BYTES) + 1) & ~1)If the value of this macro has a type, it should be an unsigned type.
A C expression. If nonzero, the maximum amount of space required for outgoing arguments will be computed and placed into
crtl->outgoing_args_size
. No space will be pushed onto the stack for each call; instead, the function prologue should increase the stack frame size by this amount.Setting both
PUSH_ARGS
andACCUMULATE_OUTGOING_ARGS
is not proper.
Define this macro if functions should assume that stack space has been allocated for arguments even when their values are passed in registers.
The value of this macro is the size, in bytes, of the area reserved for arguments passed in registers for the function represented by fndecl, which can be zero if GCC is calling a library function. The argument fndecl can be the FUNCTION_DECL, or the type itself of the function.
This space can be allocated by the caller, or be a part of the machine-dependent stack frame:
OUTGOING_REG_PARM_STACK_SPACE
says which.
Like
REG_PARM_STACK_SPACE
, but for incoming register arguments. Define this macro if space guaranteed when compiling a function body is different to space required when making a call, a situation that can arise with K&R style function definitions.
Define this to a nonzero value if it is the responsibility of the caller to allocate the area reserved for arguments passed in registers when calling a function of fntype. fntype may be NULL if the function called is a library function.
If
ACCUMULATE_OUTGOING_ARGS
is defined, this macro controls whether the space for these arguments counts in the value ofcrtl->outgoing_args_size
.
Define this macro if
REG_PARM_STACK_SPACE
is defined, but the stack parameters don't skip the area specified by it.Normally, when a parameter is not passed in registers, it is placed on the stack beyond the
REG_PARM_STACK_SPACE
area. Defining this macro suppresses this behavior and causes the parameter to be passed on the stack in its natural location.
This target hook returns the number of bytes of its own arguments that a function pops on returning, or 0 if the function pops no arguments and the caller must therefore pop them all after the function returns.
fundecl is a C variable whose value is a tree node that describes the function in question. Normally it is a node of type
FUNCTION_DECL
that describes the declaration of the function. From this you can obtain theDECL_ATTRIBUTES
of the function.funtype is a C variable whose value is a tree node that describes the function in question. Normally it is a node of type
FUNCTION_TYPE
that describes the data type of the function. From this it is possible to obtain the data types of the value and arguments (if known).When a call to a library function is being considered, fundecl will contain an identifier node for the library function. Thus, if you need to distinguish among various library functions, you can do so by their names. Note that “library function” in this context means a function used to perform arithmetic, whose name is known specially in the compiler and was not mentioned in the C code being compiled.
size is the number of bytes of arguments passed on the stack. If a variable number of bytes is passed, it is zero, and argument popping will always be the responsibility of the calling function.
On the VAX, all functions always pop their arguments, so the definition of this macro is size. On the 68000, using the standard calling convention, no functions pop their arguments, so the value of the macro is always 0 in this case. But an alternative calling convention is available in which functions that take a fixed number of arguments pop them but other functions (such as
printf
) pop nothing (the caller pops all). When this convention is in use, funtype is examined to determine whether a function takes a fixed number of arguments.
A C expression that should indicate the number of bytes a call sequence pops off the stack. It is added to the value of
RETURN_POPS_ARGS
when compiling a function call.cum is the variable in which all arguments to the called function have been accumulated.
On certain architectures, such as the SH5, a call trampoline is used that pops certain registers off the stack, depending on the arguments that have been passed to the function. Since this is a property of the call site, not of the called function,
RETURN_POPS_ARGS
is not appropriate.
This section describes the macros which let you control how various types of arguments are passed in registers or how they are arranged in the stack.
Return an RTX indicating whether a function argument is passed in a register and if so, which register.
The arguments are ca, which summarizes all the previous arguments; mode, the machine mode of the argument; type, the data type of the argument as a tree node or 0 if that is not known (which happens for C support library functions); and named, which is
true
for an ordinary argument andfalse
for nameless arguments that correspond to ‘...’ in the called function's prototype. type can be an incomplete type if a syntax error has previously occurred.The return value is usually either a
reg
RTX for the hard register in which to pass the argument, or zero to pass the argument on the stack.The return value can be a
const_int
which means argument is passed in a target specific slot with specified number. Target hooks should be used to store or load argument in such case. SeeTARGET_STORE_BOUNDS_FOR_ARG
andTARGET_LOAD_BOUNDS_FOR_ARG
for more information.The value of the expression can also be a
parallel
RTX. This is used when an argument is passed in multiple locations. The mode of theparallel
should be the mode of the entire argument. Theparallel
holds any number ofexpr_list
pairs; each one describes where part of the argument is passed. In eachexpr_list
the first operand must be areg
RTX for the hard register in which to pass this part of the argument, and the mode of the register RTX indicates how large this part of the argument is. The second operand of theexpr_list
is aconst_int
which gives the offset in bytes into the entire argument of where this part starts. As a special exception the firstexpr_list
in theparallel
RTX may have a first operand of zero. This indicates that the entire argument is also stored on the stack.The last time this hook is called, it is called with
MODE == VOIDmode
, and its result is passed to thecall
orcall_value
pattern as operands 2 and 3 respectively.The usual way to make the ISO library stdarg.h work on a machine where some arguments are usually passed in registers, is to cause nameless arguments to be passed on the stack instead. This is done by making
TARGET_FUNCTION_ARG
return 0 whenever named isfalse
.You may use the hook
targetm.calls.must_pass_in_stack
in the definition of this macro to determine if this argument is of a type that must be passed in the stack. IfREG_PARM_STACK_SPACE
is not defined andTARGET_FUNCTION_ARG
returns nonzero for such an argument, the compiler will abort. IfREG_PARM_STACK_SPACE
is defined, the argument will be computed in the stack and then loaded into a register.
This target hook should return
true
if we should not pass type solely in registers. The file expr.h defines a definition that is usually appropriate, refer to expr.h for additional documentation.
Define this hook if the target machine has “register windows”, so that the register in which a function sees an arguments is not necessarily the same as the one in which the caller passed the argument.
For such machines,
TARGET_FUNCTION_ARG
computes the register in which the caller passes the value, andTARGET_FUNCTION_INCOMING_ARG
should be defined in a similar fashion to tell the function being called where the arguments will arrive.If
TARGET_FUNCTION_INCOMING_ARG
is not defined,TARGET_FUNCTION_ARG
serves both purposes.
This hook should return 1 in case pseudo register should be created for pic_offset_table_rtx during function expand.
Perform a target dependent initialization of pic_offset_table_rtx. This hook is called at the start of register allocation.
This target hook returns the number of bytes at the beginning of an argument that must be put in registers. The value must be zero for arguments that are passed entirely in registers or that are entirely pushed on the stack.
On some machines, certain arguments must be passed partially in registers and partially in memory. On these machines, typically the first few words of arguments are passed in registers, and the rest on the stack. If a multi-word argument (a
double
or a structure) crosses that boundary, its first few words must be passed in registers and the rest must be pushed. This macro tells the compiler when this occurs, and how many bytes should go in registers.
TARGET_FUNCTION_ARG
for these arguments should return the first register to be used by the caller for this argument; likewiseTARGET_FUNCTION_INCOMING_ARG
, for the called function.
This target hook should return
true
if an argument at the position indicated by cum should be passed by reference. This predicate is queried after target independent reasons for being passed by reference, such asTREE_ADDRESSABLE (type)
.If the hook returns true, a copy of that argument is made in memory and a pointer to the argument is passed instead of the argument itself. The pointer is passed in whatever way is appropriate for passing a pointer to that type.
The function argument described by the parameters to this hook is known to be passed by reference. The hook should return true if the function argument should be copied by the callee instead of copied by the caller.
For any argument for which the hook returns true, if it can be determined that the argument is not modified, then a copy need not be generated.
The default version of this hook always returns false.
A C type for declaring a variable that is used as the first argument of
TARGET_FUNCTION_ARG
and other related values. For some target machines, the typeint
suffices and can hold the number of bytes of argument so far.There is no need to record in
CUMULATIVE_ARGS
anything about the arguments that have been passed on the stack. The compiler has other variables to keep track of that. For target machines on which all arguments are passed on the stack, there is no need to store anything inCUMULATIVE_ARGS
; however, the data structure must exist and should not be empty, so useint
.
If defined, this macro is called before generating any code for a function, but after the cfun descriptor for the function has been created. The back end may use this macro to update cfun to reflect an ABI other than that which would normally be used by default. If the compiler is generating code for a compiler-generated function, fndecl may be
NULL
.
A C statement (sans semicolon) for initializing the variable cum for the state at the beginning of the argument list. The variable has type
CUMULATIVE_ARGS
. The value of fntype is the tree node for the data type of the function which will receive the args, or 0 if the args are to a compiler support library function. For direct calls that are not libcalls, fndecl contain the declaration node of the function. fndecl is also set whenINIT_CUMULATIVE_ARGS
is used to find arguments for the function being compiled. n_named_args is set to the number of named arguments, including a structure return address if it is passed as a parameter, when making a call. When processing incoming arguments, n_named_args is set to −1.When processing a call to a compiler support library function, libname identifies which one. It is a
symbol_ref
rtx which contains the name of the function, as a string. libname is 0 when an ordinary C function call is being processed. Thus, each time this macro is called, either libname or fntype is nonzero, but never both of them at once.
Like
INIT_CUMULATIVE_ARGS
but only used for outgoing libcalls, it gets aMODE
argument instead of fntype, that would beNULL
. indirect would always be zero, too. If this macro is not defined,INIT_CUMULATIVE_ARGS (cum, NULL_RTX, libname, 0)
is used instead.
Like
INIT_CUMULATIVE_ARGS
but overrides it for the purposes of finding the arguments for the function being compiled. If this macro is undefined,INIT_CUMULATIVE_ARGS
is used instead.The value passed for libname is always 0, since library routines with special calling conventions are never compiled with GCC. The argument libname exists for symmetry with
INIT_CUMULATIVE_ARGS
.
This hook updates the summarizer variable pointed to by ca to advance past an argument in the argument list. The values mode, type and named describe that argument. Once this is done, the variable cum is suitable for analyzing the following argument with
TARGET_FUNCTION_ARG
, etc.This hook need not do anything if the argument in question was passed on the stack. The compiler knows how to track the amount of stack space used for arguments without any special help.
If defined, a C expression that is the number of bytes to add to the offset of the argument passed in memory. This is needed for the SPU, which passes
char
andshort
arguments in the preferred slot that is in the middle of the quad word instead of starting at the top.
If defined, a C expression which determines whether, and in which direction, to pad out an argument with extra space. The value should be of type
enum direction
: eitherupward
to pad above the argument,downward
to pad below, ornone
to inhibit padding.The amount of padding is not controlled by this macro, but by the target hook
TARGET_FUNCTION_ARG_ROUND_BOUNDARY
. It is always just enough to reach the next multiple of that boundary.This macro has a default definition which is right for most systems. For little-endian machines, the default is to pad upward. For big-endian machines, the default is to pad downward for an argument of constant size shorter than an
int
, and upward otherwise.
If defined, a C expression which determines whether the default implementation of va_arg will attempt to pad down before reading the next argument, if that argument is smaller than its aligned space as controlled by
PARM_BOUNDARY
. If this macro is not defined, all such arguments are padded down ifBYTES_BIG_ENDIAN
is true.
Specify padding for the last element of a block move between registers and memory. first is nonzero if this is the only element. Defining this macro allows better control of register function parameters on big-endian machines, without using
PARALLEL
rtl. In particular,MUST_PASS_IN_STACK
need not test padding and mode of types in registers, as there is no longer a "wrong" part of a register; For example, a three byte aggregate may be passed in the high part of a register if so required.
This hook returns the alignment boundary, in bits, of an argument with the specified mode and type. The default hook returns
PARM_BOUNDARY
for all arguments.
Normally, the size of an argument is rounded up to
PARM_BOUNDARY
, which is the default value for this hook. You can define this hook to return a different value if an argument size must be rounded to a larger value.
A C expression that is nonzero if regno is the number of a hard register in which function arguments are sometimes passed. This does not include implicit arguments such as the static chain and the structure-value address. On many machines, no registers can be used for this purpose since all function arguments are pushed on the stack.
This hook should return true if parameter of type type are passed as two scalar parameters. By default, GCC will attempt to pack complex arguments into the target's word size. Some ABIs require complex arguments to be split and treated as their individual components. For example, on AIX64, complex floats should be passed in a pair of floating point registers, even though a complex float would fit in one 64-bit floating point register.
The default value of this hook is
NULL
, which is treated as always false.
This hook returns a type node for
va_list
for the target. The default version of the hook returnsvoid*
.
This target hook is used in function
c_common_nodes_and_builtins
to iterate through the target specific builtin types for va_list. The variable idx is used as iterator. pname has to be a pointer to aconst char *
and ptree a pointer to atree
typed variable. The arguments pname and ptree are used to store the result of this macro and are set to the name of the va_list builtin type and its internal type. If the return value of this macro is zero, then there is no more element. Otherwise the IDX should be increased for the next call of this macro to iterate through all types.
This hook returns the va_list type of the calling convention specified by fndecl. The default version of this hook returns
va_list_type_node
.
This hook returns the va_list type of the calling convention specified by the type of type. If type is not a valid va_list type, it returns
NULL_TREE
.
This hook performs target-specific gimplification of
VA_ARG_EXPR
. The first two parameters correspond to the arguments tova_arg
; the latter two are as ingimplify.c:gimplify_expr
.
Define this to return nonzero if the port can handle pointers with machine mode mode. The default version of this hook returns true for both
ptr_mode
andPmode
.
Define this to return nonzero if the memory reference ref may alias with the system C library errno location. The default version of this hook assumes the system C library errno location is either a declaration of type int or accessed by dereferencing a pointer to int.
Define this to return nonzero if the port is prepared to handle insns involving scalar mode mode. For a scalar mode to be considered supported, all the basic arithmetic and comparisons must work.
The default version of this hook returns true for any mode required to handle the basic C types (as defined by the port). Included here are the double-word arithmetic supported by the code in optabs.c.
Define this to return nonzero if the port is prepared to handle insns involving vector mode mode. At the very least, it must have move patterns for this mode.
Return true if GCC should try to use a scalar mode to store an array of nelems elements, given that each element has mode mode. Returning true here overrides the usual
MAX_FIXED_MODE
limit and allows GCC to use any defined integer mode.One use of this hook is to support vector load and store operations that operate on several homogeneous vectors. For example, ARM NEON has operations like:
int8x8x3_t vld3_s8 (const int8_t *)where the return type is defined as:
typedef struct int8x8x3_t { int8x8_t val[3]; } int8x8x3_t;If this hook allows
val
to have a scalar mode, thenint8x8x3_t
can have the same mode. GCC can then storeint8x8x3_t
s in registers rather than forcing them onto the stack.
Define this to return nonzero if libgcc provides support for the floating-point mode mode, which is known to pass
TARGET_SCALAR_MODE_SUPPORTED_P
. The default version of this hook returns true for all ofSFmode
,DFmode
,XFmode
andTFmode
, if such modes exist.
Define this to return nonzero for machine modes for which the port has small register classes. If this target hook returns nonzero for a given mode, the compiler will try to minimize the lifetime of registers in mode. The hook may be called with
VOIDmode
as argument. In this case, the hook is expected to return nonzero if it returns nonzero for any mode.On some machines, it is risky to let hard registers live across arbitrary insns. Typically, these machines have instructions that require values to be in specific registers (like an accumulator), and reload will fail if the required hard register is used for another purpose across such an insn.
Passes before reload do not know which hard registers will be used in an instruction, but the machine modes of the registers set or used in the instruction are already known. And for some machines, register classes are small for, say, integer registers but not for floating point registers. For example, the AMD x86-64 architecture requires specific registers for the legacy x86 integer instructions, but there are many SSE registers for floating point operations. On such targets, a good strategy may be to return nonzero from this hook for
INTEGRAL_MODE_P
machine modes but zero for the SSE register classes.The default version of this hook returns false for any mode. It is always safe to redefine this hook to return with a nonzero value. But if you unnecessarily define it, you will reduce the amount of optimizations that can be performed in some cases. If you do not define this hook to return a nonzero value when it is required, the compiler will run out of spill registers and print a fatal error message.
This section discusses the macros that control returning scalars as values—values that can fit in registers.
Define this to return an RTX representing the place where a function returns or receives a value of data type ret_type, a tree node representing a data type. fn_decl_or_type is a tree node representing
FUNCTION_DECL
orFUNCTION_TYPE
of a function being called. If outgoing is false, the hook should compute the register in which the caller will see the return value. Otherwise, the hook should return an RTX representing the place where a function returns a value.On many machines, only
TYPE_MODE (
ret_type)
is relevant. (Actually, on most machines, scalar values are returned in the same place regardless of mode.) The value of the expression is usually areg
RTX for the hard register where the return value is stored. The value can also be aparallel
RTX, if the return value is in multiple places. SeeTARGET_FUNCTION_ARG
for an explanation of theparallel
form. Note that the callee will populate every location specified in theparallel
, but if the first element of theparallel
contains the whole return value, callers will use that element as the canonical location and ignore the others. The m68k port uses this type ofparallel
to return pointers in both ‘%a0’ (the canonical location) and ‘%d0’.If
TARGET_PROMOTE_FUNCTION_RETURN
returns true, you must apply the same promotion rules specified inPROMOTE_MODE
if valtype is a scalar type.If the precise function being called is known, func is a tree node (
FUNCTION_DECL
) for it; otherwise, func is a null pointer. This makes it possible to use a different value-returning convention for specific functions when all their calls are known.Some target machines have “register windows” so that the register in which a function returns its value is not the same as the one in which the caller sees the value. For such machines, you should return different RTX depending on outgoing.
TARGET_FUNCTION_VALUE
is not used for return values with aggregate data types, because these are returned in another way. SeeTARGET_STRUCT_VALUE_RTX
and related macros, below.
This macro has been deprecated. Use
TARGET_FUNCTION_VALUE
for a new target instead.
A C expression to create an RTX representing the place where a library function returns a value of mode mode.
Note that “library function” in this context means a compiler support routine, used to perform arithmetic, whose name is known specially by the compiler and was not mentioned in the C code being compiled.
Define this hook if the back-end needs to know the name of the libcall function in order to determine where the result should be returned.
The mode of the result is given by mode and the name of the called library function is given by fun. The hook should return an RTX representing the place where the library function result will be returned.
If this hook is not defined, then LIBCALL_VALUE will be used.
A C expression that is nonzero if regno is the number of a hard register in which the values of called function may come back.
A register whose use for returning values is limited to serving as the second of a pair (for a value of type
double
, say) need not be recognized by this macro. So for most machines, this definition suffices:#define FUNCTION_VALUE_REGNO_P(N) ((N) == 0)If the machine has register windows, so that the caller and the called function use different registers for the return value, this macro should recognize only the caller's register numbers.
This macro has been deprecated. Use
TARGET_FUNCTION_VALUE_REGNO_P
for a new target instead.
A target hook that return
true
if regno is the number of a hard register in which the values of called function may come back.A register whose use for returning values is limited to serving as the second of a pair (for a value of type
double
, say) need not be recognized by this target hook.If the machine has register windows, so that the caller and the called function use different registers for the return value, this target hook should recognize only the caller's register numbers.
If this hook is not defined, then FUNCTION_VALUE_REGNO_P will be used.
Define this macro if ‘untyped_call’ and ‘untyped_return’ need more space than is implied by
FUNCTION_VALUE_REGNO_P
for saving and restoring an arbitrary return value.
Normally, when a function returns a structure by memory, the address is passed as an invisible pointer argument, but the compiler also arranges to return the address from the function like it would a normal pointer return value. Define this to true if that behavior is undesirable on your target.
This hook should return true if values of type type are returned at the most significant end of a register (in other words, if they are padded at the least significant end). You can assume that type is returned in a register; the caller is required to check this.
Note that the register provided by
TARGET_FUNCTION_VALUE
must be able to hold the complete return value. For example, if a 1-, 2- or 3-byte structure is returned at the most significant end of a 4-byte register,TARGET_FUNCTION_VALUE
should provide anSImode
rtx.
When a function value's mode is BLKmode
(and in some other
cases), the value is not returned according to
TARGET_FUNCTION_VALUE
(see Scalar Return). Instead, the
caller passes the address of a block of memory in which the value
should be stored. This address is called the structure value
address.
This section describes how to control returning structure values in memory.
This target hook should return a nonzero value to say to return the function value in memory, just as large structures are always returned. Here type will be the data type of the value, and fntype will be the type of the function doing the returning, or
NULL
for libcalls.Note that values of mode
BLKmode
must be explicitly handled by this function. Also, the option -fpcc-struct-return takes effect regardless of this macro. On most systems, it is possible to leave the hook undefined; this causes a default definition to be used, whose value is the constant 1 forBLKmode
values, and 0 otherwise.Do not use this hook to indicate that structures and unions should always be returned in memory. You should instead use
DEFAULT_PCC_STRUCT_RETURN
to indicate this.
Define this macro to be 1 if all structure and union return values must be in memory. Since this results in slower code, this should be defined only if needed for compatibility with other compilers or with an ABI. If you define this macro to be 0, then the conventions used for structure and union return values are decided by the
TARGET_RETURN_IN_MEMORY
target hook.If not defined, this defaults to the value 1.
This target hook should return the location of the structure value address (normally a
mem
orreg
), or 0 if the address is passed as an “invisible” first argument. Note that fndecl may beNULL
, for libcalls. You do not need to define this target hook if the address is always passed as an “invisible” first argument.On some architectures the place where the structure value address is found by the called function is not the same place that the caller put it. This can be due to register windows, or it could be because the function prologue moves it to a different place. incoming is
1
or2
when the location is needed in the context of the called function, and0
in the context of the caller.If incoming is nonzero and the address is to be found on the stack, return a
mem
which refers to the frame pointer. If incoming is2
, the result is being used to fetch the structure value address at the beginning of a function. If you need to emit adjusting code, you should do it at this point.
Define this macro if the usual system convention on the target machine for returning structures and unions is for the called function to return the address of a static variable containing the value.
Do not define this if the usual system convention is for the caller to pass an address to the subroutine.
This macro has effect in -fpcc-struct-return mode, but it does nothing when you use -freg-struct-return mode.
This target hook returns the mode to be used when accessing raw return registers in
__builtin_return
. Define this macro if the value in reg_raw_mode is not correct.
This target hook returns the mode to be used when accessing raw argument registers in
__builtin_apply_args
. Define this macro if the value in reg_raw_mode is not correct.
If you enable it, GCC can save registers around function calls. This makes it possible to use call-clobbered registers to hold variables that must live across calls.
A C expression specifying which mode is required for saving nregs of a pseudo-register in call-clobbered hard register regno. If regno is unsuitable for caller save,
VOIDmode
should be returned. For most machines this macro need not be defined since GCC will select the smallest suitable mode.
This section describes the macros that output function entry (prologue) and exit (epilogue) code.
If defined, a function that outputs the assembler code for entry to a function. The prologue is responsible for setting up the stack frame, initializing the frame pointer register, saving registers that must be saved, and allocating size additional bytes of storage for the local variables. size is an integer. file is a stdio stream to which the assembler code should be output.
The label for the beginning of the function need not be output by this macro. That has already been done when the macro is run.
To determine which registers to save, the macro can refer to the array
regs_ever_live
: element r is nonzero if hard register r is used anywhere within the function. This implies the function prologue should save register r, provided it is not one of the call-used registers. (TARGET_ASM_FUNCTION_EPILOGUE
must likewise useregs_ever_live
.)On machines that have “register windows”, the function entry code does not save on the stack the registers that are in the windows, even if they are supposed to be preserved by function calls; instead it takes appropriate steps to “push” the register stack, if any non-call-used registers are used in the function.
On machines where functions may or may not have frame-pointers, the function entry code must vary accordingly; it must set up the frame pointer if one is wanted, and not otherwise. To determine whether a frame pointer is in wanted, the macro can refer to the variable
frame_pointer_needed
. The variable's value will be 1 at run time in a function that needs a frame pointer. See Elimination.The function entry code is responsible for allocating any stack space required for the function. This stack space consists of the regions listed below. In most cases, these regions are allocated in the order listed, with the last listed region closest to the top of the stack (the lowest address if
STACK_GROWS_DOWNWARD
is defined, and the highest address if it is not defined). You can use a different order for a machine if doing so is more convenient or required for compatibility reasons. Except in cases where required by standard or by a debugger, there is no reason why the stack layout used by GCC need agree with that used by other compilers for a machine.
If defined, a function that outputs assembler code at the end of a prologue. This should be used when the function prologue is being emitted as RTL, and you have some extra assembler that needs to be emitted. See prologue instruction pattern.
If defined, a function that outputs assembler code at the start of an epilogue. This should be used when the function epilogue is being emitted as RTL, and you have some extra assembler that needs to be emitted. See epilogue instruction pattern.
If defined, a function that outputs the assembler code for exit from a function. The epilogue is responsible for restoring the saved registers and stack pointer to their values when the function was called, and returning control to the caller. This macro takes the same arguments as the macro
TARGET_ASM_FUNCTION_PROLOGUE
, and the registers to restore are determined fromregs_ever_live
andCALL_USED_REGISTERS
in the same way.On some machines, there is a single instruction that does all the work of returning from the function. On these machines, give that instruction the name ‘return’ and do not define the macro
TARGET_ASM_FUNCTION_EPILOGUE
at all.Do not define a pattern named ‘return’ if you want the
TARGET_ASM_FUNCTION_EPILOGUE
to be used. If you want the target switches to control whether return instructions or epilogues are used, define a ‘return’ pattern with a validity condition that tests the target switches appropriately. If the ‘return’ pattern's validity condition is false, epilogues will be used.On machines where functions may or may not have frame-pointers, the function exit code must vary accordingly. Sometimes the code for these two cases is completely different. To determine whether a frame pointer is wanted, the macro can refer to the variable
frame_pointer_needed
. The variable's value will be 1 when compiling a function that needs a frame pointer.Normally,
TARGET_ASM_FUNCTION_PROLOGUE
andTARGET_ASM_FUNCTION_EPILOGUE
must treat leaf functions specially. The C variablecurrent_function_is_leaf
is nonzero for such a function. See Leaf Functions.On some machines, some functions pop their arguments on exit while others leave that for the caller to do. For example, the 68020 when given -mrtd pops arguments in functions that take a fixed number of arguments.
Your definition of the macro
RETURN_POPS_ARGS
decides which functions pop their own arguments.TARGET_ASM_FUNCTION_EPILOGUE
needs to know what was decided. The number of bytes of the current function's arguments that this function should pop is available incrtl->args.pops_args
. See Scalar Return.
crtl->args.pretend_args_size
bytes of
uninitialized space just underneath the first argument arriving on the
stack. (This may not be at the very start of the allocated stack region
if the calling sequence has pushed anything else since pushing the stack
arguments. But usually, on such machines, nothing else has been pushed
yet, because the function prologue itself does all the pushing.) This
region is used on machines where an argument may be passed partly in
registers and partly in memory, and, in some cases to support the
features in <stdarg.h>
.
ACCUMULATE_OUTGOING_ARGS
is defined, a region of
crtl->outgoing_args_size
bytes to be used for outgoing
argument lists of the function. See Stack Arguments.
Define this macro as a C expression that is nonzero if the return instruction or the function epilogue ignores the value of the stack pointer; in other words, if it is safe to delete an instruction to adjust the stack pointer before a return from the function. The default is 0.
Note that this macro's value is relevant only for functions for which frame pointers are maintained. It is never safe to delete a final stack adjustment in a function that has no frame pointer, and the compiler knows this regardless of
EXIT_IGNORE_STACK
.
Define this macro as a C expression that is nonzero for registers that are used by the epilogue or the ‘return’ pattern. The stack and frame pointer registers are already assumed to be used as needed.
Define this macro as a C expression that is nonzero for registers that are used by the exception handling mechanism, and so should be considered live on entry to an exception edge.
A function that outputs the assembler code for a thunk function, used to implement C++ virtual function calls with multiple inheritance. The thunk acts as a wrapper around a virtual function, adjusting the implicit object parameter before handing control off to the real function.
First, emit code to add the integer delta to the location that contains the incoming first argument. Assume that this argument contains a pointer, and is the one used to pass the
this
pointer in C++. This is the incoming argument before the function prologue, e.g. ‘%o0’ on a sparc. The addition must preserve the values of all other incoming arguments.Then, if vcall_offset is nonzero, an additional adjustment should be made after adding
delta
. In particular, if p is the adjusted pointer, the following adjustment should be made:p += (*((ptrdiff_t **)p))[vcall_offset/sizeof(ptrdiff_t)]After the additions, emit code to jump to function, which is a
FUNCTION_DECL
. This is a direct pure jump, not a call, and does not touch the return address. Hence returning from FUNCTION will return to whoever called the current ‘thunk’.The effect must be as if function had been called directly with the adjusted first argument. This macro is responsible for emitting all of the code for a thunk function;
TARGET_ASM_FUNCTION_PROLOGUE
andTARGET_ASM_FUNCTION_EPILOGUE
are not invoked.The thunk_fndecl is redundant. (delta and function have already been extracted from it.) It might possibly be useful on some targets, but probably not.
If you do not define this macro, the target-independent code in the C++ front end will generate a less efficient heavyweight thunk that calls function instead of jumping to it. The generic approach does not support varargs.
A function that returns true if TARGET_ASM_OUTPUT_MI_THUNK would be able to output the assembler code for the thunk function specified by the arguments it is passed, and false otherwise. In the latter case, the generic approach will be used by the C++ front end, with the limitations previously exposed.
These macros will help you generate code for profiling.
A C statement or compound statement to output to file some assembler code to call the profiling subroutine
mcount
.The details of how
mcount
expects to be called are determined by your operating system environment, not by GCC. To figure them out, compile a small program for profiling using the system's installed C compiler and look at the assembler code that results.Older implementations of
mcount
expect the address of a counter variable to be loaded into some register. The name of this variable is ‘LP’ followed by the number labelno, so you would generate the name using ‘LP%d’ in afprintf
.
A C statement or compound statement to output to file some assembly code to call the profiling subroutine
mcount
even the target does not support profiling.
Define this macro to be an expression with a nonzero value if the
mcount
subroutine on your system does not need a counter variable allocated for each function. This is true for almost all modern implementations. If you define this macro, you must not use the labelno argument toFUNCTION_PROFILER
.
Define this macro if the code for function profiling should come before the function prologue. Normally, the profiling code comes after.
This target hook returns true if the target wants the leaf flag for the current function to stay true even if it calls mcount. This might make sense for targets using the leaf flag only to determine whether a stack frame needs to be generated or not and for which the call to mcount is generated before the function prologue.
True if it is OK to do sibling call optimization for the specified call expression exp. decl will be the called function, or
NULL
if this is an indirect call.It is not uncommon for limitations of calling conventions to prevent tail calls to functions outside the current unit of translation, or during PIC compilation. The hook is used to enforce these restrictions, as the
sibcall
md pattern can not fail, or fall over to a “normal” call. The criteria for successful sibling call optimization may vary greatly between different architectures.
Add any hard registers to regs that are live on entry to the function. This hook only needs to be defined to provide registers that cannot be found by examination of FUNCTION_ARG_REGNO_P, the callee saved registers, STATIC_CHAIN_INCOMING_REGNUM, STATIC_CHAIN_REGNUM, TARGET_STRUCT_VALUE_RTX, FRAME_POINTER_REGNUM, EH_USES, FRAME_POINTER_REGNUM, ARG_POINTER_REGNUM, and the PIC_OFFSET_TABLE_REGNUM.
This hook should add additional registers that are computed by the prologue to the hard regset for shrink-wrapping optimization purposes.
True if a function's return statements should be checked for matching the function's return type. This includes checking for falling off the end of a non-void function. Return false if no such check should be made.
This hook returns a
DECL
node for the external variable to use for the stack protection guard. This variable is initialized by the runtime to some random value and is used to initialize the guard value that is placed at the top of the local stack frame. The type of this variable must beptr_type_node
.The default version of this hook creates a variable called ‘__stack_chk_guard’, which is normally defined in libgcc2.c.
This hook returns a
CALL_EXPR
that alerts the runtime that the stack protect guard variable has been modified. This expression should involve a call to anoreturn
function.The default version of this hook invokes a function called ‘__stack_chk_fail’, taking no arguments. This function is normally defined in libgcc2.c.
Whether this target supports splitting the stack when the options described in opts have been passed. This is called after options have been parsed, so the target may reject splitting the stack in some configurations. The default version of this hook returns false. If report is true, this function may issue a warning or error; if report is false, it must simply return a value
Set to true if each call that binds to a local definition explicitly clobbers or sets all non-fixed registers modified by performing the call. That is, by the call pattern itself, or by code that might be inserted by the linker (e.g. stubs, veneers, branch islands), but not including those modifiable by the callee. The affected registers may be mentioned explicitly in the call pattern, or included as clobbers in CALL_INSN_FUNCTION_USAGE. The default version of this hook is set to false. The purpose of this hook is to enable the fipa-ra optimization.
GCC comes with an implementation of <varargs.h>
and
<stdarg.h>
that work without change on machines that pass arguments
on the stack. Other machines require their own implementations of
varargs, and the two machine independent header files must have
conditionals to include it.
ISO <stdarg.h>
differs from traditional <varargs.h>
mainly in
the calling convention for va_start
. The traditional
implementation takes just one argument, which is the variable in which
to store the argument pointer. The ISO implementation of
va_start
takes an additional second argument. The user is
supposed to write the last named argument of the function here.
However, va_start
should not use this argument. The way to find
the end of the named arguments is with the built-in functions described
below.
Use this built-in function to save the argument registers in memory so that the varargs mechanism can access them. Both ISO and traditional versions of
va_start
must use__builtin_saveregs
, unless you useTARGET_SETUP_INCOMING_VARARGS
(see below) instead.On some machines,
__builtin_saveregs
is open-coded under the control of the target hookTARGET_EXPAND_BUILTIN_SAVEREGS
. On other machines, it calls a routine written in assembler language, found in libgcc2.c.Code generated for the call to
__builtin_saveregs
appears at the beginning of the function, as opposed to where the call to__builtin_saveregs
is written, regardless of what the code is. This is because the registers must be saved before the function starts to use them for its own purposes.
This builtin returns the address of the first anonymous stack argument, as type
void *
. IfARGS_GROW_DOWNWARD
, it returns the address of the location above the first anonymous stack argument. Use it inva_start
to initialize the pointer for fetching arguments from the stack. Also use it inva_start
to verify that the second parameter lastarg is the last named argument of the current function.
Since each machine has its own conventions for which data types are passed in which kind of register, your implementation of
va_arg
has to embody these conventions. The easiest way to categorize the specified data type is to use__builtin_classify_type
together withsizeof
and__alignof__
.
__builtin_classify_type
ignores the value of object, considering only its data type. It returns an integer describing what kind of type that is—integer, floating, pointer, structure, and so on.The file typeclass.h defines an enumeration that you can use to interpret the values of
__builtin_classify_type
.
These machine description macros help implement varargs:
If defined, this hook produces the machine-specific code for a call to
__builtin_saveregs
. This code will be moved to the very beginning of the function, before any parameter access are made. The return value of this function should be an RTX that contains the value to use as the return of__builtin_saveregs
.
This target hook offers an alternative to using
__builtin_saveregs
and defining the hookTARGET_EXPAND_BUILTIN_SAVEREGS
. Use it to store the anonymous register arguments into the stack so that all the arguments appear to have been passed consecutively on the stack. Once this is done, you can use the standard implementation of varargs that works for machines that pass all their arguments on the stack.The argument args_so_far points to the
CUMULATIVE_ARGS
data structure, containing the values that are obtained after processing the named arguments. The arguments mode and type describe the last named argument—its machine mode and its data type as a tree node.The target hook should do two things: first, push onto the stack all the argument registers not used for the named arguments, and second, store the size of the data thus pushed into the
int
-valued variable pointed to by pretend_args_size. The value that you store here will serve as additional offset for setting up the stack frame.Because you must generate code to push the anonymous arguments at compile time without knowing their data types,
TARGET_SETUP_INCOMING_VARARGS
is only useful on machines that have just a single category of argument register and use it uniformly for all data types.If the argument second_time is nonzero, it means that the arguments of the function are being analyzed for the second time. This happens for an inline function, which is not actually compiled until the end of the source file. The hook
TARGET_SETUP_INCOMING_VARARGS
should not generate any instructions in this case.
Define this hook to return
true
if the location where a function argument is passed depends on whether or not it is a named argument.This hook controls how the named argument to
TARGET_FUNCTION_ARG
is set for varargs and stdarg functions. If this hook returnstrue
, the named argument is always true for named arguments, and false for unnamed arguments. If it returnsfalse
, butTARGET_PRETEND_OUTGOING_VARARGS_NAMED
returnstrue
, then all arguments are treated as named. Otherwise, all named arguments except the last are treated as named.You need not define this hook if it always returns
false
.
While generating RTL for a function call, this target hook is invoked once for each argument passed to the function, either a register returned by
TARGET_FUNCTION_ARG
or a memory location. It is called just before the point where argument registers are stored. The type of the function to be called is also passed as the second argument; it isNULL_TREE
for libcalls. TheTARGET_END_CALL_ARGS
hook is invoked just after the code to copy the return reg has been emitted. This functionality can be used to perform special setup of call argument registers if a target needs it. For functions without arguments, the hook is called once withpc_rtx
passed instead of an argument register. Most ports do not need to implement anything for this hook.
This target hook is invoked while generating RTL for a function call, just after the point where the return reg is copied into a pseudo. It signals that all the call argument and return registers for the just emitted call are now no longer in use. Most ports do not need to implement anything for this hook.
If you need to conditionally change ABIs so that one works with
TARGET_SETUP_INCOMING_VARARGS
, but the other works like neitherTARGET_SETUP_INCOMING_VARARGS
norTARGET_STRICT_ARGUMENT_NAMING
was defined, then define this hook to returntrue
ifTARGET_SETUP_INCOMING_VARARGS
is used,false
otherwise. Otherwise, you should not define this hook.
This hook is used by expand pass to emit insn to load bounds of arg passed in slot. Expand pass uses this hook in case bounds of arg are not passed in register. If slot is a memory, then bounds are loaded as for regular pointer loaded from memory. If slot is not a memory then slot_no is an integer constant holding number of the target dependent special slot which should be used to obtain bounds. Hook returns RTX holding loaded bounds.
This hook is used by expand pass to emit insns to store bounds of arg passed in slot. Expand pass uses this hook in case bounds of arg are not passed in register. If slot is a memory, then bounds are stored as for regular pointer stored in memory. If slot is not a memory then slot_no is an integer constant holding number of the target dependent special slot which should be used to store bounds.
This hook is used by expand pass to emit insn to load bounds returned by function call in slot. Hook returns RTX holding loaded bounds.
This hook is used by expand pass to emit insn to store bounds returned by function call into slot.
Define this to return an RTX representing the place where a function returns bounds for returned pointers. Arguments meaning is similar to
TARGET_FUNCTION_VALUE
.
Use it to store bounds for anonymous register arguments stored into the stack. Arguments meaning is similar to
TARGET_SETUP_INCOMING_VARARGS
.
A trampoline is a small piece of code that is created at run time when the address of a nested function is taken. It normally resides on the stack, in the stack frame of the containing function. These macros tell GCC how to generate code to allocate and initialize a trampoline.
The instructions in the trampoline must do two things: load a constant address into the static chain register, and jump to the real address of the nested function. On CISC machines such as the m68k, this requires two instructions, a move immediate and a jump. Then the two addresses exist in the trampoline as word-long immediate operands. On RISC machines, it is often necessary to load each address into a register in two parts. Then pieces of each address form separate immediate operands.
The code generated to initialize the trampoline must store the variable parts—the static chain value and the function address—into the immediate operands of the instructions. On a CISC machine, this is simply a matter of copying each address to a memory reference at the proper offset from the start of the trampoline. On a RISC machine, it may be necessary to take out pieces of the address and store them separately.
This hook is called by
assemble_trampoline_template
to output, on the stream f, assembler code for a block of data that contains the constant parts of a trampoline. This code should not include a label—the label is taken care of automatically.If you do not define this hook, it means no template is needed for the target. Do not define this hook on systems where the block move code to copy the trampoline into place would be larger than the code to generate it on the spot.
Return the section into which the trampoline template is to be placed (see Sections). The default value is
readonly_data_section
.
Alignment required for trampolines, in bits.
If you don't define this macro, the value of
FUNCTION_ALIGNMENT
is used for aligning trampolines.
This hook is called to initialize a trampoline. m_tramp is an RTX for the memory block for the trampoline; fndecl is the
FUNCTION_DECL
for the nested function; static_chain is an RTX for the static chain value that should be passed to the function when it is called.If the target defines
TARGET_ASM_TRAMPOLINE_TEMPLATE
, then the first thing this hook should do is emit a block move into m_tramp from the memory block returned byassemble_trampoline_template
. Note that the block move need only cover the constant parts of the trampoline. If the target isolates the variable parts of the trampoline to the end, not allTRAMPOLINE_SIZE
bytes need be copied.If the target requires any other actions, such as flushing caches or enabling stack execution, these actions should be performed after initializing the trampoline proper.
This hook should perform any machine-specific adjustment in the address of the trampoline. Its argument contains the address of the memory block that was passed to
TARGET_TRAMPOLINE_INIT
. In case the address to be used for a function call should be different from the address at which the template was stored, the different address should be returned; otherwise addr should be returned unchanged. If this hook is not defined, addr will be used for function calls.
Implementing trampolines is difficult on many machines because they have separate instruction and data caches. Writing into a stack location fails to clear the memory in the instruction cache, so when the program jumps to that location, it executes the old contents.
Here are two possible solutions. One is to clear the relevant parts of the instruction cache whenever a trampoline is set up. The other is to make all trampolines identical, by having them jump to a standard subroutine. The former technique makes trampoline execution faster; the latter makes initialization faster.
To clear the instruction cache when a trampoline is initialized, define the following macro.
If defined, expands to a C expression clearing the instruction cache in the specified interval. The definition of this macro would typically be a series of
asm
statements. Both beg and end are both pointer expressions.
To use a standard subroutine, define the following macro. In addition, you must make sure that the instructions in a trampoline fill an entire cache line with identical instructions, or else ensure that the beginning of the trampoline code is always aligned at the same point in its cache line. Look in m68k.h as a guide.
Define this macro if trampolines need a special subroutine to do their work. The macro should expand to a series of
asm
statements which will be compiled with GCC. They go in a library function named__transfer_from_trampoline
.If you need to avoid executing the ordinary prologue code of a compiled C function when you jump to the subroutine, you can do so by placing a special label of your own in the assembler code. Use one
asm
statement to generate an assembler label, and another to make the label global. Then trampolines can use that label to jump directly to your special assembler code.
Here is an explanation of implicit calls to library routines.
This macro, if defined, should expand to a piece of C code that will get expanded when compiling functions for libgcc.a. It can be used to provide alternate names for GCC's internal library functions if there are ABI-mandated names that the compiler should provide.
This hook should declare additional library routines or rename existing ones, using the functions
set_optab_libfunc
andinit_one_libfunc
defined in optabs.c.init_optabs
calls this macro after initializing all the normal library routines.The default is to do nothing. Most ports don't need to define this hook.
If false (the default), internal library routines start with two underscores. If set to true, these routines start with
__gnu_
instead. E.g.,__muldi3
changes to__gnu_muldi3
. This currently only affects functions defined in libgcc2.c. If this is set to true, the tm.h file must also#define LIBGCC2_GNU_PREFIX
.
This macro should return
true
if the library routine that implements the floating point comparison operator comparison in mode mode will return a boolean, and false if it will return a tristate.GCC's own floating point libraries return tristates from the comparison operators, so the default returns false always. Most ports don't need to define this macro.
This macro should evaluate to
true
if the integer comparison functions (like__cmpdi2
) return 0 to indicate that the first operand is smaller than the second, 1 to indicate that they are equal, and 2 to indicate that the first operand is greater than the second. If this macro evaluates tofalse
the comparison functions return −1, 0, and 1 instead of 0, 1, and 2. If the target uses the routines in libgcc.a, you do not need to define this macro.
This macro should be defined if the target has no hardware divide instructions. If this macro is defined, GCC will use an algorithm which make use of simple logical and arithmetic operations for 64-bit division. If the macro is not defined, GCC will use an algorithm which make use of a 64-bit by 32-bit divide primitive.
The value of
EDOM
on the target machine, as a C integer constant expression. If you don't define this macro, GCC does not attempt to deposit the value ofEDOM
intoerrno
directly. Look in /usr/include/errno.h to find the value ofEDOM
on your system.If you do not define
TARGET_EDOM
, then compiled code reports domain errors by calling the library function and letting it report the error. If mathematical functions on your system usematherr
when there is an error, then you should leaveTARGET_EDOM
undefined so thatmatherr
is used normally.
Define this macro as a C expression to create an rtl expression that refers to the global “variable”
errno
. (On certain systems,errno
may not actually be a variable.) If you don't define this macro, a reasonable default is used.
This hook determines whether a function from a class of functions fn_class is present at the runtime.
Set this macro to 1 to use the "NeXT" Objective-C message sending conventions by default. This calling convention involves passing the object, the selector and the method arguments all at once to the method-lookup library function. This is the usual setting when targeting Darwin/Mac OS X systems, which have the NeXT runtime installed.
If the macro is set to 0, the "GNU" Objective-C message sending convention will be used by default. This convention passes just the object and the selector to the method-lookup function, which returns a pointer to the method.
In either case, it remains possible to select code-generation for the alternate scheme, by means of compiler command line switches.
This is about addressing modes.
A C expression that is nonzero if the machine supports pre-increment, pre-decrement, post-increment, or post-decrement addressing respectively.
A C expression that is nonzero if the machine supports pre- or post-address side-effect generation involving constants other than the size of the memory operand.
A C expression that is nonzero if the machine supports pre- or post-address side-effect generation involving a register displacement.
A C expression that is 1 if the RTX x is a constant which is a valid address. On most machines the default definition of
(CONSTANT_P (
x) && GET_CODE (
x) != CONST_DOUBLE)
is acceptable, but a few machines are more restrictive as to which constant addresses are supported.
CONSTANT_P
, which is defined by target-independent code, accepts integer-values expressions whose values are not explicitly known, such assymbol_ref
,label_ref
, andhigh
expressions andconst
arithmetic expressions, in addition toconst_int
andconst_double
expressions.
A number, the maximum number of registers that can appear in a valid memory address. Note that it is up to you to specify a value equal to the maximum number that
TARGET_LEGITIMATE_ADDRESS_P
would ever accept.
A function that returns whether x (an RTX) is a legitimate memory address on the target machine for a memory operand of mode mode.
Legitimate addresses are defined in two variants: a strict variant and a non-strict one. The strict parameter chooses which variant is desired by the caller.
The strict variant is used in the reload pass. It must be defined so that any pseudo-register that has not been allocated a hard register is considered a memory reference. This is because in contexts where some kind of register is required, a pseudo-register with no hard register must be rejected. For non-hard registers, the strict variant should look up the
reg_renumber
array; it should then proceed using the hard register number in the array, or treat the pseudo as a memory reference if the array holds-1
.The non-strict variant is used in other passes. It must be defined to accept all pseudo-registers in every context where some kind of register is required.
Normally, constant addresses which are the sum of a
symbol_ref
and an integer are stored inside aconst
RTX to mark them as constant. Therefore, there is no need to recognize such sums specifically as legitimate addresses. Normally you would simply recognize anyconst
as legitimate.Usually
PRINT_OPERAND_ADDRESS
is not prepared to handle constant sums that are not marked withconst
. It assumes that a nakedplus
indicates indexing. If so, then you must reject such naked constant sums as illegitimate addresses, so that none of them will be given toPRINT_OPERAND_ADDRESS
.On some machines, whether a symbolic address is legitimate depends on the section that the address refers to. On these machines, define the target hook
TARGET_ENCODE_SECTION_INFO
to store the information into thesymbol_ref
, and then check for it here. When you see aconst
, you will have to look inside it to find thesymbol_ref
in order to determine the section. See Assembler Format.Some ports are still using a deprecated legacy substitute for this hook, the
GO_IF_LEGITIMATE_ADDRESS
macro. This macro has this syntax:#define GO_IF_LEGITIMATE_ADDRESS (mode, x, label)and should
goto
label if the address x is a valid address on the target machine for a memory operand of mode mode.Compiler source files that want to use the strict variant of this macro define the macro
REG_OK_STRICT
. You should use an#ifdef REG_OK_STRICT
conditional to define the strict variant in that case and the non-strict variant otherwise.Using the hook is usually simpler because it limits the number of files that are recompiled when changes are made.
A single character to be used instead of the default
'm'
character for general memory addresses. This defines the constraint letter which matches the memory addresses accepted byTARGET_LEGITIMATE_ADDRESS_P
. Define this macro if you want to support new address formats in your back end without changing the semantics of the'm'
constraint. This is necessary in order to preserve functionality of inline assembly constructs using the'm'
constraint.
A C expression to determine the base term of address x, or to provide a simplified version of x from which alias.c can easily find the base term. This macro is used in only two places:
find_base_value
andfind_base_term
in alias.c.It is always safe for this macro to not be defined. It exists so that alias analysis can understand machine-dependent addresses.
The typical use of this macro is to handle addresses containing a label_ref or symbol_ref within an UNSPEC.
This hook is given an invalid memory address x for an operand of mode mode and should try to return a valid memory address.
x will always be the result of a call to
break_out_memory_refs
, and oldx will be the operand that was given to that function to produce x.The code of the hook should not alter the substructure of x. If it transforms x into a more legitimate form, it should return the new x.
It is not necessary for this hook to come up with a legitimate address, with the exception of native TLS addresses (see Emulated TLS). The compiler has standard ways of doing so in all cases. In fact, if the target supports only emulated TLS, it is safe to omit this hook or make it return x if it cannot find a valid way to legitimize the address. But often a machine-dependent strategy can generate better code.
A C compound statement that attempts to replace x, which is an address that needs reloading, with a valid memory address for an operand of mode mode. win will be a C statement label elsewhere in the code. It is not necessary to define this macro, but it might be useful for performance reasons.
For example, on the i386, it is sometimes possible to use a single reload register instead of two by reloading a sum of two pseudo registers into a register. On the other hand, for number of RISC processors offsets are limited so that often an intermediate address needs to be generated in order to address a stack slot. By defining
LEGITIMIZE_RELOAD_ADDRESS
appropriately, the intermediate addresses generated for adjacent some stack slots can be made identical, and thus be shared.Note: This macro should be used with caution. It is necessary to know something of how reload works in order to effectively use this, and it is quite easy to produce macros that build in too much knowledge of reload internals.
Note: This macro must be able to reload an address created by a previous invocation of this macro. If it fails to handle such addresses then the compiler may generate incorrect code or abort.
The macro definition should use
push_reload
to indicate parts that need reloading; opnum, type and ind_levels are usually suitable to be passed unaltered topush_reload
.The code generated by this macro must not alter the substructure of x. If it transforms x into a more legitimate form, it should assign x (which will always be a C variable) a new value. This also applies to parts that you change indirectly by calling
push_reload
.The macro definition may use
strict_memory_address_p
to test if the address has become legitimate.If you want to change only a part of x, one standard way of doing this is to use
copy_rtx
. Note, however, that it unshares only a single level of rtl. Thus, if the part to be changed is not at the top level, you'll need to replace first the top level. It is not necessary for this macro to come up with a legitimate address; but often a machine-dependent strategy can generate better code.
This hook returns
true
if memory address addr in address space addrspace can have different meanings depending on the machine mode of the memory reference it is used for or if the address is valid for some modes but not others.Autoincrement and autodecrement addresses typically have mode-dependent effects because the amount of the increment or decrement is the size of the operand being addressed. Some machines have other mode-dependent addresses. Many RISC machines have no mode-dependent addresses.
You may assume that addr is a valid address for the machine.
The default version of this hook returns
false
.
This hook returns true if x is a legitimate constant for a mode-mode immediate operand on the target machine. You can assume that x satisfies
CONSTANT_P
, so you need not check this.The default definition returns true.
This hook is used to undo the possibly obfuscating effects of the
LEGITIMIZE_ADDRESS
andLEGITIMIZE_RELOAD_ADDRESS
target macros. Some backend implementations of these macros wrap symbol references inside anUNSPEC
rtx to represent PIC or similar addressing modes. This target hook allows GCC's optimizers to understand the semantics of these opaqueUNSPEC
s by converting them back into their original form.
This hook should return true if x should not be emitted into debug sections.
This hook should return true if x is of a form that cannot (or should not) be spilled to the constant pool. mode is the mode of x.
The default version of this hook returns false.
The primary reason to define this hook is to prevent reload from deciding that a non-legitimate constant would be better reloaded from the constant pool instead of spilling and reloading a register holding the constant. This restriction is often true of addresses of TLS symbols for various targets.
This hook should return true if pool entries for constant x can be placed in an
object_block
structure. mode is the mode of x.The default version returns false for all constants.
This hook should return true if pool entries for decl should be placed in an
object_block
structure.The default version returns true for all decls.
This hook should return the DECL of a function that implements the reciprocal of the machine-specific builtin function fndecl, or
NULL_TREE
if such a function is not available.
This hook should return the DECL of a function f that given an address addr as an argument returns a mask m that can be used to extract from two vectors the relevant data that resides in addr in case addr is not properly aligned.
The autovectorizer, when vectorizing a load operation from an address addr that may be unaligned, will generate two vector loads from the two aligned addresses around addr. It then generates a
REALIGN_LOAD
operation to extract the relevant data from the two loaded vectors. The first two arguments toREALIGN_LOAD
, v1 and v2, are the two vectors, each of size VS, and the third argument, OFF, defines how the data will be extracted from these two vectors: if OFF is 0, then the returned vector is v2; otherwise, the returned vector is composed from the last VS-OFF elements of v1 concatenated to the first OFF elements of v2.If this hook is defined, the autovectorizer will generate a call to f (using the DECL tree that this hook returns) and will use the return value of f as the argument OFF to
REALIGN_LOAD
. Therefore, the mask m returned by f should comply with the semantics expected byREALIGN_LOAD
described above. If this hook is not defined, then addr will be used as the argument OFF toREALIGN_LOAD
, in which case the low log2(VS) − 1 bits of addr will be considered.
Returns cost of different scalar or vector statements for vectorization cost model. For vector memory operations the cost may depend on type (vectype) and misalignment value (misalign).
Return true if vector alignment is reachable (by peeling N iterations) for the given scalar type type. is_packed is false if the scalar access using type is known to be naturally aligned.
Return true if a vector created for
vec_perm_const
is valid.
This hook should return the DECL of a function that implements conversion of the input vector of type src_type to type dest_type. The value of code is one of the enumerators in
enum tree_code
and specifies how the conversion is to be applied (truncation, rounding, etc.).If this hook is defined, the autovectorizer will use the
TARGET_VECTORIZE_BUILTIN_CONVERSION
target hook when vectorizing conversion. Otherwise, it will returnNULL_TREE
.
This hook should return the decl of a function that implements the vectorized variant of the function with the
combined_fn
code code orNULL_TREE
if such a function is not available. The return type of the vectorized function shall be of vector type vec_type_out and the argument types should be vec_type_in.
This hook should return the decl of a function that implements the vectorized variant of target built-in function
fndecl
. The return type of the vectorized function shall be of vector type vec_type_out and the argument types should be vec_type_in.
This hook should return true if the target supports misaligned vector store/load of a specific factor denoted in the misalignment parameter. The vector store/load should be of machine mode mode and the elements in the vectors should be of type type. is_packed parameter is true if the memory access is defined in a packed struct.
This hook should return the preferred mode for vectorizing scalar mode mode. The default is equal to
word_mode
, because the vectorizer can do some transformations even in absence of specialized SIMD hardware.
This hook should return a mask of sizes that should be iterated over after trying to autovectorize using the vector size derived from the mode returned by
TARGET_VECTORIZE_PREFERRED_SIMD_MODE
. The default is zero which means to not iterate over other vector sizes.
This hook returns mode to be used for a mask to be used for a vector of specified length with nunits elements. By default an integer vector mode of a proper size is returned.
This hook should initialize target-specific data structures in preparation for modeling the costs of vectorizing a loop or basic block. The default allocates three unsigned integers for accumulating costs for the prologue, body, and epilogue of the loop or basic block. If loop_info is non-NULL, it identifies the loop being vectorized; otherwise a single block is being vectorized.
This hook should update the target-specific data in response to adding count copies of the given kind of statement to a loop or basic block. The default adds the builtin vectorizer cost for the copies of the statement to the accumulator specified by where, (the prologue, body, or epilogue) and returns the amount added. The return value should be viewed as a tentative cost that may later be revised.
This hook should complete calculations of the cost of vectorizing a loop or basic block based on data, and return the prologue, body, and epilogue costs as unsigned integers. The default returns the value of the three accumulators.
This hook should release data and any related data structures allocated by TARGET_VECTORIZE_INIT_COST. The default releases the accumulator.
Target builtin that implements vector gather operation. mem_vectype is the vector type of the load and index_type is scalar type of the index, scaled by scale. The default is
NULL_TREE
which means to not vectorize gather loads.
Target builtin that implements vector scatter operation. vectype is the vector type of the store and index_type is scalar type of the index, scaled by scale. The default is
NULL_TREE
which means to not vectorize scatter stores.
This hook should set vecsize_mangle, vecsize_int, vecsize_float fields in simd_clone structure pointed by clone_info argument and also simdlen field if it was previously 0. The hook should return 0 if SIMD clones shouldn't be emitted, or number of vecsize_mangle variants that should be emitted.
This hook should add implicit
attribute(target("..."))
attribute to SIMD clone node if needed.
This hook should return -1 if SIMD clone node shouldn't be used in vectorized loops in current function, or non-negative number if it is usable. In that case, the smaller the number is, the more desirable it is to use it.
This hook should check the launch dimensions provided for an OpenACC compute region, or routine. Defaulted values are represented as -1 and non-constant values as 0. The fn_level is negative for the function corresponding to the compute region. For a routine is is the outermost level at which partitioned execution may be spawned. The hook should verify non-default values. If DECL is NULL, global defaults are being validated and unspecified defaults should be filled in. Diagnostics should be issued as appropriate. Return true, if changes have been made. You must override this hook to provide dimensions larger than 1.
This hook should return the maximum size of a particular dimension, or zero if unbounded.
This hook can be used to convert IFN_GOACC_FORK and IFN_GOACC_JOIN function calls to target-specific gimple, or indicate whether they should be retained. It is executed during the oacc_device_lower pass. It should return true, if the call should be retained. It should return false, if it is to be deleted (either because target-specific gimple has been inserted before it, or there is no need for it). The default hook returns false, if there are no RTL expanders for them.
This hook is used by the oacc_transform pass to expand calls to the GOACC_REDUCTION internal function, into a sequence of gimple instructions. call is gimple statement containing the call to the function. This hook removes statement call after the expanded sequence has been inserted. This hook is also responsible for allocating any storage for reductions when necessary.
GCC usually addresses every static object as a separate entity. For example, if we have:
static int a, b, c; int foo (void) { return a + b + c; }
the code for foo
will usually calculate three separate symbolic
addresses: those of a
, b
and c
. On some targets,
it would be better to calculate just one symbolic address and access
the three variables relative to it. The equivalent pseudocode would
be something like:
int foo (void) { register int *xr = &x; return xr[&a - &x] + xr[&b - &x] + xr[&c - &x]; }
(which isn't valid C). We refer to shared addresses like x
as
“section anchors”. Their use is controlled by -fsection-anchors.
The hooks below describe the target properties that GCC needs to know
in order to make effective use of section anchors. It won't use
section anchors at all unless either TARGET_MIN_ANCHOR_OFFSET
or TARGET_MAX_ANCHOR_OFFSET
is set to a nonzero value.
The minimum offset that should be applied to a section anchor. On most targets, it should be the smallest offset that can be applied to a base register while still giving a legitimate address for every mode. The default value is 0.
Like
TARGET_MIN_ANCHOR_OFFSET
, but the maximum (inclusive) offset that should be applied to section anchors. The default value is 0.
Write the assembly code to define section anchor x, which is a
SYMBOL_REF
for which ‘SYMBOL_REF_ANCHOR_P (x)’ is true. The hook is called with the assembly output position set to the beginning ofSYMBOL_REF_BLOCK (
x)
.If
ASM_OUTPUT_DEF
is available, the hook's default definition uses it to define the symbol as ‘. + SYMBOL_REF_BLOCK_OFFSET (x)’. IfASM_OUTPUT_DEF
is not available, the hook's default definition isNULL
, which disables the use of section anchors altogether.
Return true if GCC should attempt to use anchors to access
SYMBOL_REF
x. You can assume ‘SYMBOL_REF_HAS_BLOCK_INFO_P (x)’ and ‘!SYMBOL_REF_ANCHOR_P (x)’.The default version is correct for most targets, but you might need to intercept this hook to handle things like target-specific attributes or target-specific sections.
The macros in this section can be split in two families, according to the two ways of representing condition codes in GCC.
The first representation is the so called (cc0)
representation
(see Jump Patterns), where all instructions can have an implicit
clobber of the condition codes. The second is the condition code
register representation, which provides better schedulability for
architectures that do have a condition code register, but on which
most instructions do not affect it. The latter category includes
most RISC machines.
The implicit clobbering poses a strong restriction on the placement of
the definition and use of the condition code. In the past the definition
and use were always adjacent. However, recent changes to support trapping
arithmatic may result in the definition and user being in different blocks.
Thus, there may be a NOTE_INSN_BASIC_BLOCK
between them. Additionally,
the definition may be the source of exception handling edges.
These restrictions can prevent important optimizations on some machines. For example, on the IBM RS/6000, there is a delay for taken branches unless the condition code register is set three instructions earlier than the conditional branch. The instruction scheduler cannot perform this optimization if it is not permitted to separate the definition and use of the condition code register.
For this reason, it is possible and suggested to use a register to
represent the condition code for new ports. If there is a specific
condition code register in the machine, use a hard register. If the
condition code or comparison result can be placed in any general register,
or if there are multiple condition registers, use a pseudo register.
Registers used to store the condition code value will usually have a mode
that is in class MODE_CC
.
Alternatively, you can use BImode
if the comparison operator is
specified already in the compare instruction. In this case, you are not
interested in most macros in this section.
(cc0)
The file conditions.h defines a variable cc_status
to
describe how the condition code was computed (in case the interpretation of
the condition code depends on the instruction that it was set by). This
variable contains the RTL expressions on which the condition code is
currently based, and several standard flags.
Sometimes additional machine-specific flags must be defined in the machine
description header file. It can also add additional machine-specific
information by defining CC_STATUS_MDEP
.
C code for a data type which is used for declaring the
mdep
component ofcc_status
. It defaults toint
.This macro is not used on machines that do not use
cc0
.
A C expression to initialize the
mdep
field to “empty”. The default definition does nothing, since most machines don't use the field anyway. If you want to use the field, you should probably define this macro to initialize it.This macro is not used on machines that do not use
cc0
.
A C compound statement to set the components of
cc_status
appropriately for an insn insn whose body is exp. It is this macro's responsibility to recognize insns that set the condition code as a byproduct of other activity as well as those that explicitly set(cc0)
.This macro is not used on machines that do not use
cc0
.If there are insns that do not set the condition code but do alter other machine registers, this macro must check to see whether they invalidate the expressions that the condition code is recorded as reflecting. For example, on the 68000, insns that store in address registers do not set the condition code, which means that usually
NOTICE_UPDATE_CC
can leavecc_status
unaltered for such insns. But suppose that the previous insn set the condition code based on location ‘a4@(102)’ and the current insn stores a new value in ‘a4’. Although the condition code is not changed by this, it will no longer be true that it reflects the contents of ‘a4@(102)’. Therefore,NOTICE_UPDATE_CC
must altercc_status
in this case to say that nothing is known about the condition code value.The definition of
NOTICE_UPDATE_CC
must be prepared to deal with the results of peephole optimization: insns whose patterns areparallel
RTXs containing variousreg
,mem
or constants which are just the operands. The RTL structure of these insns is not sufficient to indicate what the insns actually do. WhatNOTICE_UPDATE_CC
should do when it sees one is just to runCC_STATUS_INIT
.A possible definition of
NOTICE_UPDATE_CC
is to call a function that looks at an attribute (see Insn Attributes) named, for example, ‘cc’. This avoids having detailed information about patterns in two places, the md file and inNOTICE_UPDATE_CC
.
On many machines, the condition code may be produced by other instructions than compares, for example the branch can use directly the condition code set by a subtract instruction. However, on some machines when the condition code is set this way some bits (such as the overflow bit) are not set in the same way as a test instruction, so that a different branch instruction must be used for some conditional branches. When this happens, use the machine mode of the condition code register to record different formats of the condition code register. Modes can also be used to record which compare instruction (e.g. a signed or an unsigned comparison) produced the condition codes.
If other modes than
CCmode
are required, add them to machine-modes.def and defineSELECT_CC_MODE
to choose a mode given an operand of a compare. This is needed because the modes have to be chosen not only during RTL generation but also, for example, by instruction combination. The result ofSELECT_CC_MODE
should be consistent with the mode used in the patterns; for example to support the case of the add on the SPARC discussed above, we have the pattern(define_insn "" [(set (reg:CC_NOOV 0) (compare:CC_NOOV (plus:SI (match_operand:SI 0 "register_operand" "%r") (match_operand:SI 1 "arith_operand" "rI")) (const_int 0)))] "" "...")together with a
SELECT_CC_MODE
that returnsCC_NOOVmode
for comparisons whose argument is aplus
:#define SELECT_CC_MODE(OP,X,Y) \ (GET_MODE_CLASS (GET_MODE (X)) == MODE_FLOAT \ ? ((OP == LT || OP == LE || OP == GT || OP == GE) \ ? CCFPEmode : CCFPmode) \ : ((GET_CODE (X) == PLUS || GET_CODE (X) == MINUS \ || GET_CODE (X) == NEG || GET_CODE (x) == ASHIFT) \ ? CC_NOOVmode : CCmode))Another reason to use modes is to retain information on which operands were used by the comparison; see
REVERSIBLE_CC_MODE
later in this section.You should define this macro if and only if you define extra CC modes in machine-modes.def.
On some machines not all possible comparisons are defined, but you can convert an invalid comparison into a valid one. For example, the Alpha does not have a
GT
comparison, but you can use anLT
comparison instead and swap the order of the operands.On such machines, implement this hook to do any required conversions. code is the initial comparison code and op0 and op1 are the left and right operands of the comparison, respectively. If op0_preserve_value is
true
the implementation is not allowed to change the value of op0 since the value might be used in RTXs which aren't comparisons. E.g. the implementation is not allowed to swap operands in that case.GCC will not assume that the comparison resulting from this macro is valid but will see if the resulting insn matches a pattern in the md file.
You need not to implement this hook if it would never change the comparison code or operands.
A C expression whose value is one if it is always safe to reverse a comparison whose mode is mode. If
SELECT_CC_MODE
can ever return mode for a floating-point inequality comparison, thenREVERSIBLE_CC_MODE (
mode)
must be zero.You need not define this macro if it would always returns zero or if the floating-point format is anything other than
IEEE_FLOAT_FORMAT
. For example, here is the definition used on the SPARC, where floating-point inequality comparisons are given eitherCCFPEmode
orCCFPmode
:#define REVERSIBLE_CC_MODE(MODE) \ ((MODE) != CCFPEmode && (MODE) != CCFPmode)
A C expression whose value is reversed condition code of the code for comparison done in CC_MODE mode. The macro is used only in case
REVERSIBLE_CC_MODE (
mode)
is nonzero. Define this macro in case machine has some non-standard way how to reverse certain conditionals. For instance in case all floating point conditions are non-trapping, compiler may freely convert unordered compares to ordered ones. Then definition may look like:#define REVERSE_CONDITION(CODE, MODE) \ ((MODE) != CCFPmode ? reverse_condition (CODE) \ : reverse_condition_maybe_unordered (CODE))
On targets which do not use
(cc0)
, and which use a hard register rather than a pseudo-register to hold condition codes, the regular CSE passes are often not able to identify cases in which the hard register is set to a common value. Use this hook to enable a small pass which optimizes such cases. This hook should return true to enable this pass, and it should set the integers to which its arguments point to the hard register numbers used for condition codes. When there is only one such register, as is true on most systems, the integer pointed to by p2 should be set toINVALID_REGNUM
.The default version of this hook returns false.
On targets which use multiple condition code modes in class
MODE_CC
, it is sometimes the case that a comparison can be validly done in more than one mode. On such a system, define this target hook to take two mode arguments and to return a mode in which both comparisons may be validly done. If there is no such mode, returnVOIDmode
.The default version of this hook checks whether the modes are the same. If they are, it returns that mode. If they are different, it returns
VOIDmode
.
If the target has a dedicated flags register, and it needs to use the post-reload comparison elimination pass, then this value should be set appropriately.
These macros let you describe the relative speed of various operations on the target machine.
A C expression for the cost of moving data of mode mode from a register in class from to one in class to. The classes are expressed using the enumeration values such as
GENERAL_REGS
. A value of 2 is the default; other values are interpreted relative to that.It is not required that the cost always equal 2 when from is the same as to; on some machines it is expensive to move between registers if they are not general registers.
If reload sees an insn consisting of a single
set
between two hard registers, and ifREGISTER_MOVE_COST
applied to their classes returns a value of 2, reload does not check to ensure that the constraints of the insn are met. Setting a cost of other than 2 will allow reload to verify that the constraints are met. You should do this if the ‘movm’ pattern's constraints do not allow such copying.These macros are obsolete, new ports should use the target hook
TARGET_REGISTER_MOVE_COST
instead.
This target hook should return the cost of moving data of mode mode from a register in class from to one in class to. The classes are expressed using the enumeration values such as
GENERAL_REGS
. A value of 2 is the default; other values are interpreted relative to that.It is not required that the cost always equal 2 when from is the same as to; on some machines it is expensive to move between registers if they are not general registers.
If reload sees an insn consisting of a single
set
between two hard registers, and ifTARGET_REGISTER_MOVE_COST
applied to their classes returns a value of 2, reload does not check to ensure that the constraints of the insn are met. Setting a cost of other than 2 will allow reload to verify that the constraints are met. You should do this if the ‘movm’ pattern's constraints do not allow such copying.The default version of this function returns 2.
A C expression for the cost of moving data of mode mode between a register of class class and memory; in is zero if the value is to be written to memory, nonzero if it is to be read in. This cost is relative to those in
REGISTER_MOVE_COST
. If moving between registers and memory is more expensive than between two registers, you should define this macro to express the relative cost.If you do not define this macro, GCC uses a default cost of 4 plus the cost of copying via a secondary reload register, if one is needed. If your machine requires a secondary reload register to copy between memory and a register of class but the reload mechanism is more complex than copying via an intermediate, define this macro to reflect the actual cost of the move.
GCC defines the function
memory_move_secondary_cost
if secondary reloads are needed. It computes the costs due to copying via a secondary register. If your machine copies from memory using a secondary register in the conventional way but the default base value of 4 is not correct for your machine, define this macro to add some other value to the result of that function. The arguments to that function are the same as to this macro.These macros are obsolete, new ports should use the target hook
TARGET_MEMORY_MOVE_COST
instead.
This target hook should return the cost of moving data of mode mode between a register of class rclass and memory; in is
false
if the value is to be written to memory,true
if it is to be read in. This cost is relative to those inTARGET_REGISTER_MOVE_COST
. If moving between registers and memory is more expensive than between two registers, you should add this target hook to express the relative cost.If you do not add this target hook, GCC uses a default cost of 4 plus the cost of copying via a secondary reload register, if one is needed. If your machine requires a secondary reload register to copy between memory and a register of rclass but the reload mechanism is more complex than copying via an intermediate, use this target hook to reflect the actual cost of the move.
GCC defines the function
memory_move_secondary_cost
if secondary reloads are needed. It computes the costs due to copying via a secondary register. If your machine copies from memory using a secondary register in the conventional way but the default base value of 4 is not correct for your machine, use this target hook to add some other value to the result of that function. The arguments to that function are the same as to this target hook.
A C expression for the cost of a branch instruction. A value of 1 is the default; other values are interpreted relative to that. Parameter speed_p is true when the branch in question should be optimized for speed. When it is false,
BRANCH_COST
should return a value optimal for code size rather than performance. predictable_p is true for well-predicted branches. On many architectures theBRANCH_COST
can be reduced then.
Here are additional macros which do not specify precise relative costs, but only that certain actions are more expensive than GCC would ordinarily expect.
Define this macro as a C expression which is nonzero if accessing less than a word of memory (i.e. a
char
or ashort
) is no faster than accessing a word of memory, i.e., if such access require more than one instruction or if there is no difference in cost between byte and (aligned) word loads.When this macro is not defined, the compiler will access a field by finding the smallest containing object; when it is defined, a fullword load will be used if alignment permits. Unless bytes accesses are faster than word accesses, using word accesses is preferable since it may eliminate subsequent memory access if subsequent accesses occur to other fields in the same word of the structure, but to different bytes.
Define this macro to be the value 1 if memory accesses described by the mode and alignment parameters have a cost many times greater than aligned accesses, for example if they are emulated in a trap handler.
When this macro is nonzero, the compiler will act as if
STRICT_ALIGNMENT
were nonzero when generating code for block moves. This can cause significantly more instructions to be produced. Therefore, do not set this macro nonzero if unaligned accesses only add a cycle or two to the time for a memory access.If the value of this macro is always zero, it need not be defined. If this macro is defined, it should produce a nonzero value when
STRICT_ALIGNMENT
is nonzero.
The threshold of number of scalar memory-to-memory move insns, below which a sequence of insns should be generated instead of a string move insn or a library call. Increasing the value will always make code faster, but eventually incurs high cost in increased code size.
Note that on machines where the corresponding move insn is a
define_expand
that emits a sequence of insns, this macro counts the number of such sequences.The parameter speed is true if the code is currently being optimized for speed rather than size.
If you don't define this, a reasonable default is used.
GCC will attempt several strategies when asked to copy between two areas of memory, or to set, clear or store to memory, for example when copying a
struct
. Theby_pieces
infrastructure implements such memory operations as a sequence of load, store or move insns. Alternate strategies are to expand themovmem
orsetmem
optabs, to emit a library call, or to emit unit-by-unit, loop-based operations.This target hook should return true if, for a memory operation with a given size and alignment, using the
by_pieces
infrastructure is expected to result in better code generation. Both size and alignment are measured in terms of storage units.The parameter op is one of:
CLEAR_BY_PIECES
,MOVE_BY_PIECES
,SET_BY_PIECES
,STORE_BY_PIECES
. These describe the type of memory operation under consideration.The parameter speed_p is true if the code is currently being optimized for speed rather than size.
Returning true for higher values of size can improve code generation for speed if the target does not provide an implementation of the
movmem
orsetmem
standard names, if themovmem
orsetmem
implementation would be more expensive than a sequence of insns, or if the overhead of a library call would dominate that of the body of the memory operation.Returning true for higher values of
size
may also cause an increase in code size, for example where the number of insns emitted to perform a move would be greater than that of a library call.
A C expression used by
move_by_pieces
to determine the largest unit a load or store used to copy memory is. Defaults toMOVE_MAX
.
The threshold of number of scalar move insns, below which a sequence of insns should be generated to clear memory instead of a string clear insn or a library call. Increasing the value will always make code faster, but eventually incurs high cost in increased code size.
The parameter speed is true if the code is currently being optimized for speed rather than size.
If you don't define this, a reasonable default is used.
The threshold of number of scalar move insns, below which a sequence of insns should be generated to set memory to a constant value, instead of a block set insn or a library call. Increasing the value will always make code faster, but eventually incurs high cost in increased code size.
The parameter speed is true if the code is currently being optimized for speed rather than size.
If you don't define this, it defaults to the value of
MOVE_RATIO
.
A C expression used to determine whether a load postincrement is a good thing to use for a given mode. Defaults to the value of
HAVE_POST_INCREMENT
.
A C expression used to determine whether a load postdecrement is a good thing to use for a given mode. Defaults to the value of
HAVE_POST_DECREMENT
.
A C expression used to determine whether a load preincrement is a good thing to use for a given mode. Defaults to the value of
HAVE_PRE_INCREMENT
.
A C expression used to determine whether a load predecrement is a good thing to use for a given mode. Defaults to the value of
HAVE_PRE_DECREMENT
.
A C expression used to determine whether a store postincrement is a good thing to use for a given mode. Defaults to the value of
HAVE_POST_INCREMENT
.
A C expression used to determine whether a store postdecrement is a good thing to use for a given mode. Defaults to the value of
HAVE_POST_DECREMENT
.
This macro is used to determine whether a store preincrement is a good thing to use for a given mode. Defaults to the value of
HAVE_PRE_INCREMENT
.
This macro is used to determine whether a store predecrement is a good thing to use for a given mode. Defaults to the value of
HAVE_PRE_DECREMENT
.
Define this macro to be true if it is as good or better to call a constant function address than to call an address kept in a register.
Define this macro if a non-short-circuit operation produced by ‘fold_range_test ()’ is optimal. This macro defaults to true if
BRANCH_COST
is greater than or equal to the value 2.
Return true if the optimizers should use optab op with modes mode1 and mode2 for optimization type opt_type. The optab is known to have an associated .md instruction whose C condition is true. mode2 is only meaningful for conversion optabs; for direct optabs it is a copy of mode1.
For example, when called with op equal to
rint_optab
and mode1 equal toDFmode
, the hook should say whether the optimizers should use optabrintdf2
.The default hook returns true for all inputs.
This target hook describes the relative costs of RTL expressions.
The cost may depend on the precise form of the expression, which is available for examination in x, and the fact that x appears as operand opno of an expression with rtx code outer_code. That is, the hook can assume that there is some rtx y such that ‘GET_CODE (y) == outer_code’ and such that either (a) ‘XEXP (y, opno) == x’ or (b) ‘XVEC (y, opno)’ contains x.
mode is x's machine mode, or for cases like
const_int
that do not have a mode, the mode in which x is used.In implementing this hook, you can use the construct
COSTS_N_INSNS (
n)
to specify a cost equal to n fast instructions.On entry to the hook,
*
total contains a default estimate for the cost of the expression. The hook should modify this value as necessary. Traditionally, the default costs areCOSTS_N_INSNS (5)
for multiplications,COSTS_N_INSNS (7)
for division and modulus operations, andCOSTS_N_INSNS (1)
for all other operations.When optimizing for code size, i.e. when
speed
is false, this target hook should be used to estimate the relative size cost of an expression, again relative toCOSTS_N_INSNS
.The hook returns true when all subexpressions of x have been processed, and false when
rtx_cost
should recurse.
This hook computes the cost of an addressing mode that contains address. If not defined, the cost is computed from the address expression and the
TARGET_RTX_COST
hook.For most CISC machines, the default cost is a good approximation of the true cost of the addressing mode. However, on RISC machines, all instructions normally have the same length and execution time. Hence all addresses will have equal costs.
In cases where more than one form of an address is known, the form with the lowest cost will be used. If multiple forms have the same, lowest, cost, the one that is the most complex will be used.
For example, suppose an address that is equal to the sum of a register and a constant is used twice in the same basic block. When this macro is not defined, the address will be computed in a register and memory references will be indirect through that register. On machines where the cost of the addressing mode containing the sum is no higher than that of a simple indirect reference, this will produce an additional instruction and possibly require an additional register. Proper specification of this macro eliminates this overhead for such machines.
This hook is never called with an invalid address.
On machines where an address involving more than one register is as cheap as an address computation involving only one register, defining
TARGET_ADDRESS_COST
to reflect this can cause two registers to be live over a region of code where only one would have been ifTARGET_ADDRESS_COST
were not defined in that manner. This effect should be considered in the definition of this macro. Equivalent costs should probably only be given to addresses with different numbers of registers on machines with lots of registers.
This predicate controls the use of the eager delay slot filler to disallow speculatively executed instructions being placed in delay slots. Targets such as certain MIPS architectures possess both branches with and without delay slots. As the eager delay slot filler can decrease performance, disabling it is beneficial when ordinary branches are available. Use of delay slot branches filled using the basic filler is often still desirable as the delay slot can hide a pipeline bubble.
The instruction scheduler may need a fair amount of machine-specific adjustment in order to produce good code. GCC provides several target hooks for this purpose. It is usually enough to define just a few of them: try the first ones in this list first.
This hook returns the maximum number of instructions that can ever issue at the same time on the target machine. The default is one. Although the insn scheduler can define itself the possibility of issue an insn on the same cycle, the value can serve as an additional constraint to issue insns on the same simulated processor cycle (see hooks ‘TARGET_SCHED_REORDER’ and ‘TARGET_SCHED_REORDER2’). This value must be constant over the entire compilation. If you need it to vary depending on what the instructions are, you must use ‘TARGET_SCHED_VARIABLE_ISSUE’.
This hook is executed by the scheduler after it has scheduled an insn from the ready list. It should return the number of insns which can still be issued in the current cycle. The default is ‘more - 1’ for insns other than
CLOBBER
andUSE
, which normally are not counted against the issue rate. You should define this hook if some insns take more machine resources than others, so that fewer insns can follow them in the same cycle. file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n. insn is the instruction that was scheduled.
This function corrects the value of cost based on the relationship between insn and dep_insn through the dependence link. It should return the new value. The default is to make no adjustment to cost. This can be used for example to specify to the scheduler using the traditional pipeline description that an output- or anti-dependence does not incur the same cost as a data-dependence. If the scheduler using the automaton based pipeline description, the cost of anti-dependence is zero and the cost of output-dependence is maximum of one and the difference of latency times of the first and the second insns. If these values are not acceptable, you could use the hook to modify them too. See also see Processor pipeline description.
This hook adjusts the integer scheduling priority priority of insn. It should return the new priority. Increase the priority to execute insn earlier, reduce the priority to execute insn later. Do not define this hook if you do not need to adjust the scheduling priorities of insns.
This hook is executed by the scheduler after it has scheduled the ready list, to allow the machine description to reorder it (for example to combine two small instructions together on ‘VLIW’ machines). file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n. ready is a pointer to the ready list of instructions that are ready to be scheduled. n_readyp is a pointer to the number of elements in the ready list. The scheduler reads the ready list in reverse order, starting with ready[*n_readyp − 1] and going to ready[0]. clock is the timer tick of the scheduler. You may modify the ready list and the number of ready insns. The return value is the number of insns that can issue this cycle; normally this is just
issue_rate
. See also ‘TARGET_SCHED_REORDER2’.
Like ‘TARGET_SCHED_REORDER’, but called at a different time. That function is called whenever the scheduler starts a new cycle. This one is called once per iteration over a cycle, immediately after ‘TARGET_SCHED_VARIABLE_ISSUE’; it can reorder the ready list and return the number of insns to be scheduled in the same cycle. Defining this hook can be useful if there are frequent situations where scheduling one insn causes other insns to become ready in the same cycle. These other insns can then be taken into account properly.
This hook is used to check whether target platform supports macro fusion.
This hook is used to check whether two insns should be macro fused for a target microarchitecture. If this hook returns true for the given insn pair (prev and curr), the scheduler will put them into a sched group, and they will not be scheduled apart. The two insns will be either two SET insns or a compare and a conditional jump and this hook should validate any dependencies needed to fuse the two insns together.
This hook is called after evaluation forward dependencies of insns in chain given by two parameter values (head and tail correspondingly) but before insns scheduling of the insn chain. For example, it can be used for better insn classification if it requires analysis of dependencies. This hook can use backward and forward dependencies of the insn scheduler because they are already calculated.
This hook is executed by the scheduler at the beginning of each block of instructions that are to be scheduled. file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n. max_ready is the maximum number of insns in the current scheduling region that can be live at the same time. This can be used to allocate scratch space if it is needed, e.g. by ‘TARGET_SCHED_REORDER’.
This hook is executed by the scheduler at the end of each block of instructions that are to be scheduled. It can be used to perform cleanup of any actions done by the other scheduling hooks. file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n.
This hook is executed by the scheduler after function level initializations. file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n. old_max_uid is the maximum insn uid when scheduling begins.
This is the cleanup hook corresponding to
TARGET_SCHED_INIT_GLOBAL
. file is either a null pointer, or a stdio stream to write any debug output to. verbose is the verbose level provided by -fsched-verbose-n.
The hook returns an RTL insn. The automaton state used in the pipeline hazard recognizer is changed as if the insn were scheduled when the new simulated processor cycle starts. Usage of the hook may simplify the automaton pipeline description for some VLIW processors. If the hook is defined, it is used only for the automaton based pipeline description. The default is not to change the state when the new simulated processor cycle starts.
The hook can be used to initialize data used by the previous hook.
The hook is analogous to ‘TARGET_SCHED_DFA_PRE_CYCLE_INSN’ but used to changed the state as if the insn were scheduled when the new simulated processor cycle finishes.
The hook is analogous to ‘TARGET_SCHED_INIT_DFA_PRE_CYCLE_INSN’ but used to initialize data used by the previous hook.
The hook to notify target that the current simulated cycle is about to finish. The hook is analogous to ‘TARGET_SCHED_DFA_PRE_CYCLE_INSN’ but used to change the state in more complicated situations - e.g., when advancing state on a single insn is not enough.
The hook to notify target that new simulated cycle has just started. The hook is analogous to ‘TARGET_SCHED_DFA_POST_CYCLE_INSN’ but used to change the state in more complicated situations - e.g., when advancing state on a single insn is not enough.
This hook controls better choosing an insn from the ready insn queue for the DFA-based insn scheduler. Usually the scheduler chooses the first insn from the queue. If the hook returns a positive value, an additional scheduler code tries all permutations of ‘TARGET_SCHED_FIRST_CYCLE_MULTIPASS_DFA_LOOKAHEAD ()’ subsequent ready insns to choose an insn whose issue will result in maximal number of issued insns on the same cycle. For the VLIW processor, the code could actually solve the problem of packing simple insns into the VLIW insn. Of course, if the rules of VLIW packing are described in the automaton.
This code also could be used for superscalar RISC processors. Let us consider a superscalar RISC processor with 3 pipelines. Some insns can be executed in pipelines A or B, some insns can be executed only in pipelines B or C, and one insn can be executed in pipeline B. The processor may issue the 1st insn into A and the 2nd one into B. In this case, the 3rd insn will wait for freeing B until the next cycle. If the scheduler issues the 3rd insn the first, the processor could issue all 3 insns per cycle.
Actually this code demonstrates advantages of the automaton based pipeline hazard recognizer. We try quickly and easy many insn schedules to choose the best one.
The default is no multipass scheduling.
This hook controls what insns from the ready insn queue will be considered for the multipass insn scheduling. If the hook returns zero for insn, the insn will be considered in multipass scheduling. Positive return values will remove insn from consideration on the current round of multipass scheduling. Negative return values will remove insn from consideration for given number of cycles. Backends should be careful about returning non-zero for highest priority instruction at position 0 in the ready list. ready_index is passed to allow backends make correct judgements.
The default is that any ready insns can be chosen to be issued.
This hook prepares the target backend for a new round of multipass scheduling.
This hook is called when multipass scheduling evaluates instruction INSN.
This is called when multipass scheduling backtracks from evaluation of an instruction.
This hook notifies the target about the result of the concluded current round of multipass scheduling.
This hook initializes target-specific data used in multipass scheduling.
This hook finalizes target-specific data used in multipass scheduling.
This hook is called by the insn scheduler before issuing insn on cycle clock. If the hook returns nonzero, insn is not issued on this processor cycle. Instead, the processor cycle is advanced. If *sort_p is zero, the insn ready queue is not sorted on the new cycle start as usually. dump and verbose specify the file and verbosity level to use for debugging output. last_clock and clock are, respectively, the processor cycle on which the previous insn has been issued, and the current processor cycle.
This hook is used to define which dependences are considered costly by the target, so costly that it is not advisable to schedule the insns that are involved in the dependence too close to one another. The parameters to this hook are as follows: The first parameter _dep is the dependence being evaluated. The second parameter cost is the cost of the dependence as estimated by the scheduler, and the third parameter distance is the distance in cycles between the two insns. The hook returns
true
if considering the distance between the two insns the dependence between them is considered costly by the target, andfalse
otherwise.Defining this hook can be useful in multiple-issue out-of-order machines, where (a) it's practically hopeless to predict the actual data/resource delays, however: (b) there's a better chance to predict the actual grouping that will be formed, and (c) correctly emulating the grouping can be very important. In such targets one may want to allow issuing dependent insns closer to one another—i.e., closer than the dependence distance; however, not in cases of “costly dependences”, which this hooks allows to define.
This hook is called by the insn scheduler after emitting a new instruction to the instruction stream. The hook notifies a target backend to extend its per instruction data structures.
Return a pointer to a store large enough to hold target scheduling context.
Initialize store pointed to by tc to hold target scheduling context. It clean_p is true then initialize tc as if scheduler is at the beginning of the block. Otherwise, copy the current context into tc.
Copy target scheduling context pointed to by tc to the current context.
Deallocate internal data in target scheduling context pointed to by tc.
Deallocate a store for target scheduling context pointed to by tc.
This hook is called by the insn scheduler when insn has only speculative dependencies and therefore can be scheduled speculatively. The hook is used to check if the pattern of insn has a speculative version and, in case of successful check, to generate that speculative pattern. The hook should return 1, if the instruction has a speculative form, or −1, if it doesn't. request describes the type of requested speculation. If the return value equals 1 then new_pat is assigned the generated speculative pattern.
This hook is called by the insn scheduler during generation of recovery code for insn. It should return
true
, if the corresponding check instruction should branch to recovery code, orfalse
otherwise.
This hook is called by the insn scheduler to generate a pattern for recovery check instruction. If mutate_p is zero, then insn is a speculative instruction for which the check should be generated. label is either a label of a basic block, where recovery code should be emitted, or a null pointer, when requested check doesn't branch to recovery code (a simple check). If mutate_p is nonzero, then a pattern for a branchy check corresponding to a simple check denoted by insn should be generated. In this case label can't be null.
This hook is used by the insn scheduler to find out what features should be enabled/used. The structure *spec_info should be filled in by the target. The structure describes speculation types that can be used in the scheduler.
This hook is called by the swing modulo scheduler to calculate a resource-based lower bound which is based on the resources available in the machine and the resources required by each instruction. The target backend can use g to calculate such bound. A very simple lower bound will be used in case this hook is not implemented: the total number of instructions divided by the issue rate.
This hook is called by Haifa Scheduler. It returns true if dispatch scheduling is supported in hardware and the condition specified in the parameter is true.
This hook is called by Haifa Scheduler. It performs the operation specified in its second parameter.
True if the processor has an exposed pipeline, which means that not just the order of instructions is important for correctness when scheduling, but also the latencies of operations.
This hook is called by tree reassociator to determine a level of parallelism required in output calculations chain.
This hook is called by scheduling fusion pass. It calculates fusion priorities for each instruction passed in by parameter. The priorities are returned via pointer parameters.
insn is the instruction whose priorities need to be calculated. max_pri is the maximum priority can be returned in any cases. fusion_pri is the pointer parameter through which insn's fusion priority should be calculated and returned. pri is the pointer parameter through which insn's priority should be calculated and returned.
Same fusion_pri should be returned for instructions which should be scheduled together. Different pri should be returned for instructions with same fusion_pri. fusion_pri is the major sort key, pri is the minor sort key. All instructions will be scheduled according to the two priorities. All priorities calculated should be between 0 (exclusive) and max_pri (inclusive). To avoid false dependencies, fusion_pri of instructions which need to be scheduled together should be smaller than fusion_pri of irrelevant instructions.
Given below example:
ldr r10, [r1, 4] add r4, r4, r10 ldr r15, [r2, 8] sub r5, r5, r15 ldr r11, [r1, 0] add r4, r4, r11 ldr r16, [r2, 12] sub r5, r5, r16On targets like ARM/AArch64, the two pairs of consecutive loads should be merged. Since peephole2 pass can't help in this case unless consecutive loads are actually next to each other in instruction flow. That's where this scheduling fusion pass works. This hook calculates priority for each instruction based on its fustion type, like:
ldr r10, [r1, 4] ; fusion_pri=99, pri=96 add r4, r4, r10 ; fusion_pri=100, pri=100 ldr r15, [r2, 8] ; fusion_pri=98, pri=92 sub r5, r5, r15 ; fusion_pri=100, pri=100 ldr r11, [r1, 0] ; fusion_pri=99, pri=100 add r4, r4, r11 ; fusion_pri=100, pri=100 ldr r16, [r2, 12] ; fusion_pri=98, pri=88 sub r5, r5, r16 ; fusion_pri=100, pri=100Scheduling fusion pass then sorts all ready to issue instructions according to the priorities. As a result, instructions of same fusion type will be pushed together in instruction flow, like:
ldr r11, [r1, 0] ldr r10, [r1, 4] ldr r15, [r2, 8] ldr r16, [r2, 12] add r4, r4, r10 sub r5, r5, r15 add r4, r4, r11 sub r5, r5, r16Now peephole2 pass can simply merge the two pairs of loads.
Since scheduling fusion pass relies on peephole2 to do real fusion work, it is only enabled by default when peephole2 is in effect.
This is firstly introduced on ARM/AArch64 targets, please refer to the hook implementation for how different fusion types are supported.
An object file is divided into sections containing different types of data. In the most common case, there are three sections: the text section, which holds instructions and read-only data; the data section, which holds initialized writable data; and the bss section, which holds uninitialized data. Some systems have other kinds of sections.
varasm.c provides several well-known sections, such as
text_section
, data_section
and bss_section
.
The normal way of controlling a foo_section
variable
is to define the associated FOO_SECTION_ASM_OP
macro,
as described below. The macros are only read once, when varasm.c
initializes itself, so their values must be run-time constants.
They may however depend on command-line flags.
Note: Some run-time files, such crtstuff.c, also make
use of the FOO_SECTION_ASM_OP
macros, and expect them
to be string literals.
Some assemblers require a different string to be written every time a
section is selected. If your assembler falls into this category, you
should define the TARGET_ASM_INIT_SECTIONS
hook and use
get_unnamed_section
to set up the sections.
You must always create a text_section
, either by defining
TEXT_SECTION_ASM_OP
or by initializing text_section
in TARGET_ASM_INIT_SECTIONS
. The same is true of
data_section
and DATA_SECTION_ASM_OP
. If you do not
create a distinct readonly_data_section
, the default is to
reuse text_section
.
All the other varasm.c sections are optional, and are null if the target does not provide them.
A C expression whose value is a string, including spacing, containing the assembler operation that should precede instructions and read-only data. Normally
"\t.text"
is right.
If defined, a C string constant for the name of the section containing most frequently executed functions of the program. If not defined, GCC will provide a default definition if the target supports named sections.
If defined, a C string constant for the name of the section containing unlikely executed functions in the program.
A C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as writable initialized data. Normally
"\t.data"
is right.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as initialized, writable small data.
A C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as read-only initialized data.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as uninitialized global data. If not defined, and
ASM_OUTPUT_ALIGNED_BSS
not defined, uninitialized global data will be output in the data section if -fno-common is passed, otherwiseASM_OUTPUT_COMMON
will be used.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as uninitialized, writable small data.
If defined, a C expression whose value is a string containing the assembler operation to identify the following data as thread-local common data. The default is
".tls_common"
.
If defined, a C expression whose value is a character constant containing the flag used to mark a section as a TLS section. The default is
'T'
.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as initialization code. If not defined, GCC will assume such a section does not exist. This section has no corresponding
init_section
variable; it is used entirely in runtime code.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as finalization code. If not defined, GCC will assume such a section does not exist. This section has no corresponding
fini_section
variable; it is used entirely in runtime code.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as part of the
.init_array
(or equivalent) section. If not defined, GCC will assume such a section does not exist. Do not define both this macro andINIT_SECTION_ASM_OP
.
If defined, a C expression whose value is a string, including spacing, containing the assembler operation to identify the following data as part of the
.fini_array
(or equivalent) section. If not defined, GCC will assume such a section does not exist. Do not define both this macro andFINI_SECTION_ASM_OP
.
If defined, an ASM statement that switches to a different section via section_op, calls function, and switches back to the text section. This is used in crtstuff.c if
INIT_SECTION_ASM_OP
orFINI_SECTION_ASM_OP
to calls to initialization and finalization functions from the init and fini sections. By default, this macro uses a simple function call. Some ports need hand-crafted assembly code to avoid dependencies on registers initialized in the function prologue or to ensure that constant pools don't end up too far way in the text section.
If defined, a string which names the section into which small variables defined in crtstuff and libgcc should go. This is useful when the target has options for optimizing access to small data, and you want the crtstuff and libgcc routines to be conservative in what they expect of your application yet liberal in what your application expects. For example, for targets with a
.sdata
section (like MIPS), you could compile crtstuff with-G 0
so that it doesn't require small data support from your application, but use this macro to put small data into.sdata
so that your application can access these variables whether it uses small data or not.
If defined, an ASM statement that aligns a code section to some arbitrary boundary. This is used to force all fragments of the
.init
and.fini
sections to have to same alignment and thus prevent the linker from having to add any padding.
Define this macro to be an expression with a nonzero value if jump tables (for
tablejump
insns) should be output in the text section, along with the assembler instructions. Otherwise, the readonly data section is used.This macro is irrelevant if there is no separate readonly data section.
Define this hook if you need to do something special to set up the varasm.c sections, or if your target has some special sections of its own that you need to create.
GCC calls this hook after processing the command line, but before writing any assembly code, and before calling any of the section-returning hooks described below.
Return a mask describing how relocations should be treated when selecting sections. Bit 1 should be set if global relocations should be placed in a read-write section; bit 0 should be set if local relocations should be placed in a read-write section.
The default version of this function returns 3 when -fpic is in effect, and 0 otherwise. The hook is typically redefined when the target cannot support (some kinds of) dynamic relocations in read-only sections even in executables.
Return the section into which exp should be placed. You can assume that exp is either a
VAR_DECL
node or a constant of some sort. reloc indicates whether the initial value of exp requires link-time relocations. Bit 0 is set when variable contains local relocations only, while bit 1 is set for global relocations. align is the constant alignment in bits.The default version of this function takes care of putting read-only variables in
readonly_data_section
.See also USE_SELECT_SECTION_FOR_FUNCTIONS.
Define this macro if you wish TARGET_ASM_SELECT_SECTION to be called for
FUNCTION_DECL
s as well as for variables and constants.In the case of a
FUNCTION_DECL
, reloc will be zero if the function has been determined to be likely to be called, and nonzero if it is unlikely to be called.
Build up a unique section name, expressed as a
STRING_CST
node, and assign it to ‘DECL_SECTION_NAME (decl)’. As withTARGET_ASM_SELECT_SECTION
, reloc indicates whether the initial value of exp requires link-time relocations.The default version of this function appends the symbol name to the ELF section name that would normally be used for the symbol. For example, the function
foo
would be placed in.text.foo
. Whatever the actual target object format, this is often good enough.
Return the readonly data section associated with ‘DECL_SECTION_NAME (decl)’. The default version of this function selects
.gnu.linkonce.r.name
if the function's section is.gnu.linkonce.t.name
,.rodata.name
if function is in.text.name
, and the normal readonly-data section otherwise.
Usually, the compiler uses the prefix
".rodata"
to construct section names for mergeable constant data. Define this macro to override the string if a different section name should be used.
Return the section that should be used for transactional memory clone tables.
Return the section into which a constant x, of mode mode, should be placed. You can assume that x is some kind of constant in RTL. The argument mode is redundant except in the case of a
const_int
rtx. align is the constant alignment in bits.The default version of this function takes care of putting symbolic constants in
flag_pic
mode indata_section
and everything else inreadonly_data_section
.
Define this hook if you need to postprocess the assembler name generated by target-independent code. The id provided to this hook will be the computed name (e.g., the macro
DECL_NAME
of the decl in C, or the mangled name of the decl in C++). The return value of the hook is anIDENTIFIER_NODE
for the appropriate mangled name on your target system. The default implementation of this hook just returns the id provided.
Define this hook if references to a symbol or a constant must be treated differently depending on something about the variable or function named by the symbol (such as what section it is in).
The hook is executed immediately after rtl has been created for decl, which may be a variable or function declaration or an entry in the constant pool. In either case, rtl is the rtl in question. Do not use
DECL_RTL (
decl)
in this hook; that field may not have been initialized yet.In the case of a constant, it is safe to assume that the rtl is a
mem
whose address is asymbol_ref
. Most decls will also have this form, but that is not guaranteed. Global register variables, for instance, will have areg
for their rtl. (Normally the right thing to do with such unusual rtl is leave it alone.)The new_decl_p argument will be true if this is the first time that
TARGET_ENCODE_SECTION_INFO
has been invoked on this decl. It will be false for subsequent invocations, which will happen for duplicate declarations. Whether or not anything must be done for the duplicate declaration depends on whether the hook examinesDECL_ATTRIBUTES
. new_decl_p is always true when the hook is called for a constant.The usual thing for this hook to do is to record flags in the
symbol_ref
, usingSYMBOL_REF_FLAG
orSYMBOL_REF_FLAGS
. Historically, the name string was modified if it was necessary to encode more than one bit of information, but this practice is now discouraged; useSYMBOL_REF_FLAGS
.The default definition of this hook,
default_encode_section_info
in varasm.c, sets a number of commonly-useful bits inSYMBOL_REF_FLAGS
. Check whether the default does what you need before overriding it.
Decode name and return the real name part, sans the characters that
TARGET_ENCODE_SECTION_INFO
may have added.
Returns true if exp should be placed into a “small data” section. The default version of this hook always returns false.
Contains the value true if the target places read-only “small data” into a separate section. The default value is false.
It returns true if target wants profile code emitted before prologue.
The default version of this hook use the target macro
PROFILE_BEFORE_PROLOGUE
.
Returns true if exp names an object for which name resolution rules must resolve to the current “module” (dynamic shared library or executable image).
The default version of this hook implements the name resolution rules for ELF, which has a looser model of global name binding than other currently supported object file formats.
Contains the value true if the target supports thread-local storage. The default value is false.
This section describes macros that help implement generation of position
independent code. Simply defining these macros is not enough to
generate valid PIC; you must also add support to the hook
TARGET_LEGITIMATE_ADDRESS_P
and to the macro
PRINT_OPERAND_ADDRESS
, as well as LEGITIMIZE_ADDRESS
. You
must modify the definition of ‘movsi’ to do something appropriate
when the source operand contains a symbolic address. You may also
need to alter the handling of switch statements so that they use
relative addresses.
The register number of the register used to address a table of static data addresses in memory. In some cases this register is defined by a processor's “application binary interface” (ABI). When this macro is defined, RTL is generated for this register once, as with the stack pointer and frame pointer registers. If this macro is not defined, it is up to the machine-dependent files to allocate such a register (if necessary). Note that this register must be fixed when in use (e.g. when
flag_pic
is true).
A C expression that is nonzero if the register defined by
PIC_OFFSET_TABLE_REGNUM
is clobbered by calls. If not defined, the default is zero. Do not define this macro ifPIC_OFFSET_TABLE_REGNUM
is not defined.
A C expression that is nonzero if x is a legitimate immediate operand on the target machine when generating position independent code. You can assume that x satisfies
CONSTANT_P
, so you need not check this. You can also assume flag_pic is true, so you need not check it either. You need not define this macro if all constants (includingSYMBOL_REF
) can be immediate operands when generating position independent code.
This section describes macros whose principal purpose is to describe how to write instructions in assembler language—rather than what the instructions do.
This describes the overall framework of an assembly file.
Output to
asm_out_file
any text which the assembler expects to find at the beginning of a file. The default behavior is controlled by two flags, documented below. Unless your target's assembler is quite unusual, if you override the default, you should calldefault_file_start
at some point in your target hook. This lets other target files rely on these variables.
If this flag is true, the text of the macro
ASM_APP_OFF
will be printed as the very first line in the assembly file, unless -fverbose-asm is in effect. (If that macro has been defined to the empty string, this variable has no effect.) With the normal definition ofASM_APP_OFF
, the effect is to notify the GNU assembler that it need not bother stripping comments or extra whitespace from its input. This allows it to work a bit faster.The default is false. You should not set it to true unless you have verified that your port does not generate any extra whitespace or comments that will cause GAS to issue errors in NO_APP mode.
If this flag is true,
output_file_directive
will be called for the primary source file, immediately after printingASM_APP_OFF
(if that is enabled). Most ELF assemblers expect this to be done. The default is false.
Output to
asm_out_file
any text which the assembler expects to find at the end of a file. The default is to output nothing.
Some systems use a common convention, the ‘.note.GNU-stack’ special section, to indicate whether or not an object file relies on the stack being executable. If your system uses this convention, you should define
TARGET_ASM_FILE_END
to this function. If you need to do other things in that hook, have your hook function call this function.
Output to
asm_out_file
any text which the assembler expects to find at the start of an LTO section. The default is to output nothing.
Output to
asm_out_file
any text which the assembler expects to find at the end of an LTO section. The default is to output nothing.
Output to
asm_out_file
any text which is needed before emitting unwind info and debug info at the end of a file. Some targets emit here PIC setup thunks that cannot be emitted at the end of file, because they couldn't have unwind info then. The default is to output nothing.
A C string constant describing how to begin a comment in the target assembler language. The compiler assumes that the comment will end at the end of the line.
A C string constant for text to be output before each
asm
statement or group of consecutive ones. Normally this is"#APP"
, which is a comment that has no effect on most assemblers but tells the GNU assembler that it must check the lines that follow for all valid assembler constructs.
A C string constant for text to be output after each
asm
statement or group of consecutive ones. Normally this is"#NO_APP"
, which tells the GNU assembler to resume making the time-saving assumptions that are valid for ordinary compiler output.
A C statement to output COFF information or DWARF debugging information which indicates that filename name is the current source file to the stdio stream stream.
This macro need not be defined if the standard form of output for the file format in use is appropriate.
Output COFF information or DWARF debugging information which indicates that filename name is the current source file to the stdio stream file.
This target hook need not be defined if the standard form of output for the file format in use is appropriate.
Output a string based on name, suitable for the ‘#ident’ directive, or the equivalent directive or pragma in non-C-family languages. If this hook is not defined, nothing is output for the ‘#ident’ directive.
A C statement to output the string string to the stdio stream stream. If you do not call the function
output_quoted_string
in your config files, GCC will only call it to output filenames to the assembler source. So you can use it to canonicalize the format of the filename using this macro.
Output assembly directives to switch to section name. The section should have attributes as specified by flags, which is a bit mask of the
SECTION_*
flags defined in output.h. If decl is non-NULL, it is theVAR_DECL
orFUNCTION_DECL
with which this section is associated.
Return preferred text (sub)section for function decl. Main purpose of this function is to separate cold, normal and hot functions. startup is true when function is known to be used only at startup (from static constructors or it is
main()
). exit is true when function is known to be used only at exit (from static destructors). Return NULL if function should go to default text section.
Used by the target to emit any assembler directives or additional labels needed when a function is partitioned between different sections. Output should be written to file. The function decl is available as decl and the new section is `cold' if new_is_cold is
true
.
This flag is true if the target supports
TARGET_ASM_NAMED_SECTION
. It must not be modified by command-line option processing.
This flag is true if we can create zeroed data by switching to a BSS section and then using
ASM_OUTPUT_SKIP
to allocate the space. This is true on most ELF targets.
Choose a set of section attributes for use by
TARGET_ASM_NAMED_SECTION
based on a variable or function decl, a section name, and whether or not the declaration's initializer may contain runtime relocations. decl may be null, in which case read-write data should be assumed.The default version of this function handles choosing code vs data, read-only vs read-write data, and
flag_pic
. You should only need to override this if your target has special flags that might be set via__attribute__
.
Provides the target with the ability to record the gcc command line switches that have been passed to the compiler, and options that are enabled. The type argument specifies what is being recorded. It can take the following values:
SWITCH_TYPE_PASSED
- text is a command line switch that has been set by the user.
SWITCH_TYPE_ENABLED
- text is an option which has been enabled. This might be as a direct result of a command line switch, or because it is enabled by default or because it has been enabled as a side effect of a different command line switch. For example, the -O2 switch enables various different individual optimization passes.
SWITCH_TYPE_DESCRIPTIVE
- text is either NULL or some descriptive text which should be ignored. If text is NULL then it is being used to warn the target hook that either recording is starting or ending. The first time type is SWITCH_TYPE_DESCRIPTIVE and text is NULL, the warning is for start up and the second time the warning is for wind down. This feature is to allow the target hook to make any necessary preparations before it starts to record switches and to perform any necessary tidying up after it has finished recording switches.
SWITCH_TYPE_LINE_START
- This option can be ignored by this target hook.
SWITCH_TYPE_LINE_END
- This option can be ignored by this target hook.
The hook's return value must be zero. Other return values may be supported in the future.
By default this hook is set to NULL, but an example implementation is provided for ELF based targets. Called elf_record_gcc_switches, it records the switches as ASCII text inside a new, string mergeable section in the assembler output file. The name of the new section is provided by the
TARGET_ASM_RECORD_GCC_SWITCHES_SECTION
target hook.
This is the name of the section that will be created by the example ELF implementation of the
TARGET_ASM_RECORD_GCC_SWITCHES
target hook.
These hooks specify assembly directives for creating certain kinds of integer object. The
TARGET_ASM_BYTE_OP
directive creates a byte-sized object, theTARGET_ASM_ALIGNED_HI_OP
one creates an aligned two-byte object, and so on. Any of the hooks may beNULL
, indicating that no suitable directive is available.The compiler will print these strings at the start of a new line, followed immediately by the object's initial value. In most cases, the string should contain a tab, a pseudo-op, and then another tab.
The
assemble_integer
function uses this hook to output an integer object. x is the object's value, size is its size in bytes and aligned_p indicates whether it is aligned. The function should returntrue
if it was able to output the object. If it returns false,assemble_integer
will try to split the object into smaller parts.The default implementation of this hook will use the
TARGET_ASM_BYTE_OP
family of strings, returningfalse
when the relevant string isNULL
.
Define this hook if the target assembler requires a special marker to terminate an initialized variable declaration.
A target hook to recognize rtx patterns that
output_addr_const
can't deal with, and output assembly code to file corresponding to the pattern x. This may be used to allow machine-dependentUNSPEC
s to appear within constants.If target hook fails to recognize a pattern, it must return
false
, so that a standard error message is printed. If it prints an error message itself, by calling, for example,output_operand_lossage
, it may just returntrue
.
A C statement to output to the stdio stream stream an assembler instruction to assemble a string constant containing the len bytes at ptr. ptr will be a C expression of type
char *
and len a C expression of typeint
.If the assembler has a
.ascii
pseudo-op as found in the Berkeley Unix assembler, do not define the macroASM_OUTPUT_ASCII
.
A C statement to output word n of a function descriptor for decl. This must be defined if
TARGET_VTABLE_USES_DESCRIPTORS
is defined, and is otherwise unused.
You may define this macro as a C expression. You should define the expression to have a nonzero value if GCC should output the constant pool for a function before the code for the function, or a zero value if GCC should output the constant pool after the function. If you do not define this macro, the usual case, GCC will output the constant pool before the function.
A C statement to output assembler commands to define the start of the constant pool for a function. funname is a string giving the name of the function. Should the return type of the function be required, it can be obtained via fundecl. size is the size, in bytes, of the constant pool that will be written immediately after this call.
If no constant-pool prefix is required, the usual case, this macro need not be defined.
A C statement (with or without semicolon) to output a constant in the constant pool, if it needs special treatment. (This macro need not do anything for RTL expressions that can be output normally.)
The argument file is the standard I/O stream to output the assembler code on. x is the RTL expression for the constant to output, and mode is the machine mode (in case x is a ‘const_int’). align is the required alignment for the value x; you should output an assembler directive to force this much alignment.
The argument labelno is a number to use in an internal label for the address of this pool entry. The definition of this macro is responsible for outputting the label definition at the proper place. Here is how to do this:
(*targetm.asm_out.internal_label)
(file, "LC", labelno);When you output a pool entry specially, you should end with a
goto
to the label jumpto. This will prevent the same pool entry from being output a second time in the usual manner.You need not define this macro if it would do nothing.
A C statement to output assembler commands to at the end of the constant pool for a function. funname is a string giving the name of the function. Should the return type of the function be required, you can obtain it via fundecl. size is the size, in bytes, of the constant pool that GCC wrote immediately before this call.
If no constant-pool epilogue is required, the usual case, you need not define this macro.
Define this macro as a C expression which is nonzero if C is used as a logical line separator by the assembler. STR points to the position in the string where C was found; this can be used if a line separator uses multiple characters.
If you do not define this macro, the default is that only the character ‘;’ is treated as a logical line separator.
These target hooks are C string constants, describing the syntax in the assembler for grouping arithmetic expressions. If not overridden, they default to normal parentheses, which is correct for most assemblers.
These macros are provided by real.h for writing the definitions
of ASM_OUTPUT_DOUBLE
and the like:
These translate x, of type
REAL_VALUE_TYPE
, to the target's floating point representation, and store its bit pattern in the variable l. ForREAL_VALUE_TO_TARGET_SINGLE
andREAL_VALUE_TO_TARGET_DECIMAL32
, this variable should be a simplelong int
. For the others, it should be an array oflong int
. The number of elements in this array is determined by the size of the desired target floating point data type: 32 bits of it go in eachlong int
array element. Each array element holds 32 bits of the result, even iflong int
is wider than 32 bits on the host machine.The array element values are designed so that you can print them out using
fprintf
in the order they should appear in the target machine's memory.
Each of the macros in this section is used to do the whole job of outputting a single uninitialized variable.
A C statement (sans semicolon) to output to the stdio stream stream the assembler definition of a common-label named name whose size is size bytes. The variable rounded is the size rounded up to whatever alignment the caller wants. It is possible that size may be zero, for instance if a struct with no other member than a zero-length array is defined. In this case, the backend must output a symbol definition that allocates at least one byte, both so that the address of the resulting object does not compare equal to any other, and because some object formats cannot even express the concept of a zero-sized common symbol, as that is how they represent an ordinary undefined external.
Use the expression
assemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for defining the name, and a newline.This macro controls how the assembler definitions of uninitialized common global variables are output.
Like
ASM_OUTPUT_COMMON
except takes the required alignment as a separate, explicit argument. If you define this macro, it is used in place ofASM_OUTPUT_COMMON
, and gives you more flexibility in handling the required alignment of the variable. The alignment is specified as the number of bits.
Like
ASM_OUTPUT_ALIGNED_COMMON
except that decl of the variable to be output, if there is one, orNULL_TREE
if there is no corresponding variable. If you define this macro, GCC will use it in place of bothASM_OUTPUT_COMMON
andASM_OUTPUT_ALIGNED_COMMON
. Define this macro when you need to see the variable's decl in order to chose what to output.
A C statement (sans semicolon) to output to the stdio stream stream the assembler definition of uninitialized global decl named name whose size is size bytes. The variable alignment is the alignment specified as the number of bits.
Try to use function
asm_output_aligned_bss
defined in file varasm.c when defining this macro. If unable, use the expressionassemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for defining the name, and a newline.There are two ways of handling global BSS. One is to define this macro. The other is to have
TARGET_ASM_SELECT_SECTION
return a switchable BSS section (see TARGET_HAVE_SWITCHABLE_BSS_SECTIONS). You do not need to do both.Some languages do not have
common
data, and require a non-common form of global BSS in order to handle uninitialized globals efficiently. C++ is one example of this. However, if the target does not support global BSS, the front end may choose to make globals common in order to save space in the object file.
A C statement (sans semicolon) to output to the stdio stream stream the assembler definition of a local-common-label named name whose size is size bytes. The variable rounded is the size rounded up to whatever alignment the caller wants.
Use the expression
assemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for defining the name, and a newline.This macro controls how the assembler definitions of uninitialized static variables are output.
Like
ASM_OUTPUT_LOCAL
except takes the required alignment as a separate, explicit argument. If you define this macro, it is used in place ofASM_OUTPUT_LOCAL
, and gives you more flexibility in handling the required alignment of the variable. The alignment is specified as the number of bits.
Like
ASM_OUTPUT_ALIGNED_DECL
except that decl of the variable to be output, if there is one, orNULL_TREE
if there is no corresponding variable. If you define this macro, GCC will use it in place of bothASM_OUTPUT_DECL
andASM_OUTPUT_ALIGNED_DECL
. Define this macro when you need to see the variable's decl in order to chose what to output.
This is about outputting labels.
A C statement (sans semicolon) to output to the stdio stream stream the assembler definition of a label named name. Use the expression
assemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for defining the name, and a newline. A default definition of this macro is provided which is correct for most systems.
A C statement (sans semicolon) to output to the stdio stream stream the assembler definition of a label named name of a function. Use the expression
assemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for defining the name, and a newline. A default definition of this macro is provided which is correct for most systems.If this macro is not defined, then the function name is defined in the usual manner as a label (by means of
ASM_OUTPUT_LABEL
).
Identical to
ASM_OUTPUT_LABEL
, except that name is known to refer to a compiler-generated label. The default definition usesassemble_name_raw
, which is likeassemble_name
except that it is more efficient.
A C string containing the appropriate assembler directive to specify the size of a symbol, without any arguments. On systems that use ELF, the default (in config/elfos.h) is ‘"\t.size\t"’; on other systems, the default is not to define this macro.
Define this macro only if it is correct to use the default definitions of
ASM_OUTPUT_SIZE_DIRECTIVE
andASM_OUTPUT_MEASURED_SIZE
for your system. If you need your own custom definitions of those macros, or if you do not need explicit symbol sizes at all, do not define this macro.
A C statement (sans semicolon) to output to the stdio stream stream a directive telling the assembler that the size of the symbol name is size. size is a
HOST_WIDE_INT
. If you defineSIZE_ASM_OP
, a default definition of this macro is provided.
A C statement (sans semicolon) to output to the stdio stream stream a directive telling the assembler to calculate the size of the symbol name by subtracting its address from the current address.
If you define
SIZE_ASM_OP
, a default definition of this macro is provided. The default assumes that the assembler recognizes a special ‘.’ symbol as referring to the current address, and can calculate the difference between this and another symbol. If your assembler does not recognize ‘.’ or cannot do calculations with it, you will need to redefineASM_OUTPUT_MEASURED_SIZE
to use some other technique.
Define this macro if the assembler does not accept the character ‘$’ in label names. By default constructors and destructors in G++ have ‘$’ in the identifiers. If this macro is defined, ‘.’ is used instead.
Define this macro if the assembler does not accept the character ‘.’ in label names. By default constructors and destructors in G++ have names that use ‘.’. If this macro is defined, these names are rewritten to avoid ‘.’.
A C string containing the appropriate assembler directive to specify the type of a symbol, without any arguments. On systems that use ELF, the default (in config/elfos.h) is ‘"\t.type\t"’; on other systems, the default is not to define this macro.
Define this macro only if it is correct to use the default definition of
ASM_OUTPUT_TYPE_DIRECTIVE
for your system. If you need your own custom definition of this macro, or if you do not need explicit symbol types at all, do not define this macro.
A C string which specifies (using
printf
syntax) the format of the second operand toTYPE_ASM_OP
. On systems that use ELF, the default (in config/elfos.h) is ‘"@%s"’; on other systems, the default is not to define this macro.Define this macro only if it is correct to use the default definition of
ASM_OUTPUT_TYPE_DIRECTIVE
for your system. If you need your own custom definition of this macro, or if you do not need explicit symbol types at all, do not define this macro.
A C statement (sans semicolon) to output to the stdio stream stream a directive telling the assembler that the type of the symbol name is type. type is a C string; currently, that string is always either ‘"function"’ or ‘"object"’, but you should not count on this.
If you define
TYPE_ASM_OP
andTYPE_OPERAND_FMT
, a default definition of this macro is provided.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the name name of a function which is being defined. This macro is responsible for outputting the label definition (perhaps using
ASM_OUTPUT_FUNCTION_LABEL
). The argument decl is theFUNCTION_DECL
tree node representing the function.If this macro is not defined, then the function name is defined in the usual manner as a label (by means of
ASM_OUTPUT_FUNCTION_LABEL
).You may wish to use
ASM_OUTPUT_TYPE_DIRECTIVE
in the definition of this macro.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the size of a function which is being defined. The argument name is the name of the function. The argument decl is the
FUNCTION_DECL
tree node representing the function.If this macro is not defined, then the function size is not defined.
You may wish to use
ASM_OUTPUT_MEASURED_SIZE
in the definition of this macro.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the name name of a cold function partition which is being defined. This macro is responsible for outputting the label definition (perhaps using
ASM_OUTPUT_FUNCTION_LABEL
). The argument decl is theFUNCTION_DECL
tree node representing the function.If this macro is not defined, then the cold partition name is defined in the usual manner as a label (by means of
ASM_OUTPUT_LABEL
).You may wish to use
ASM_OUTPUT_TYPE_DIRECTIVE
in the definition of this macro.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the size of a cold function partition which is being defined. The argument name is the name of the cold partition of the function. The argument decl is the
FUNCTION_DECL
tree node representing the function.If this macro is not defined, then the partition size is not defined.
You may wish to use
ASM_OUTPUT_MEASURED_SIZE
in the definition of this macro.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the name name of an initialized variable which is being defined. This macro must output the label definition (perhaps using
ASM_OUTPUT_LABEL
). The argument decl is theVAR_DECL
tree node representing the variable.If this macro is not defined, then the variable name is defined in the usual manner as a label (by means of
ASM_OUTPUT_LABEL
).You may wish to use
ASM_OUTPUT_TYPE_DIRECTIVE
and/orASM_OUTPUT_SIZE_DIRECTIVE
in the definition of this macro.
A target hook to output to the stdio stream file any text necessary for declaring the name name of a constant which is being defined. This target hook is responsible for outputting the label definition (perhaps using
assemble_label
). The argument exp is the value of the constant, and size is the size of the constant in bytes. The name will be an internal label.The default version of this target hook, define the name in the usual manner as a label (by means of
assemble_label
).You may wish to use
ASM_OUTPUT_TYPE_DIRECTIVE
in this target hook.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for claiming a register regno for a global variable decl with name name.
If you don't define this macro, that is equivalent to defining it to do nothing.
A C statement (sans semicolon) to finish up declaring a variable name once the compiler has processed its initializer fully and thus has had a chance to determine the size of an array when controlled by an initializer. This is used on systems where it's necessary to declare something about the size of the object.
If you don't define this macro, that is equivalent to defining it to do nothing.
You may wish to use
ASM_OUTPUT_SIZE_DIRECTIVE
and/orASM_OUTPUT_MEASURED_SIZE
in the definition of this macro.
This target hook is a function to output to the stdio stream stream some commands that will make the label name global; that is, available for reference from other files.
The default implementation relies on a proper definition of
GLOBAL_ASM_OP
.
This target hook is a function to output to the stdio stream stream some commands that will make the name associated with decl global; that is, available for reference from other files.
The default implementation uses the TARGET_ASM_GLOBALIZE_LABEL target hook.
This target hook is a function to output to the stdio stream stream some commands that will declare the name associated with decl which is not defined in the current translation unit. Most assemblers do not require anything to be output in this case.
A C statement (sans semicolon) to output to the stdio stream stream some commands that will make the label name weak; that is, available for reference from other files but only used if no other definition is available. Use the expression
assemble_name (
stream,
name)
to output the name itself; before and after that, output the additional assembler syntax for making that name weak, and a newline.If you don't define this macro or
ASM_WEAKEN_DECL
, GCC will not support weak symbols and you should not define theSUPPORTS_WEAK
macro.
Combines (and replaces) the function of
ASM_WEAKEN_LABEL
andASM_OUTPUT_WEAK_ALIAS
, allowing access to the associated function or variable decl. If value is notNULL
, this C statement should output to the stdio stream stream assembler code which defines (equates) the weak symbol name to have the value value. If value isNULL
, it should output commands to make name weak.
Outputs a directive that enables name to be used to refer to symbol value with weak-symbol semantics.
decl
is the declaration ofname
.
A preprocessor constant expression which evaluates to true if the target supports weak symbols.
If you don't define this macro, defaults.h provides a default definition. If either
ASM_WEAKEN_LABEL
orASM_WEAKEN_DECL
is defined, the default definition is ‘1’; otherwise, it is ‘0’.
A C expression which evaluates to true if the target supports weak symbols.
If you don't define this macro, defaults.h provides a default definition. The default definition is ‘(SUPPORTS_WEAK)’. Define this macro if you want to control weak symbol support with a compiler flag such as -melf.
A C statement (sans semicolon) to mark decl to be emitted as a public symbol such that extra copies in multiple translation units will be discarded by the linker. Define this macro if your object file format provides support for this concept, such as the ‘COMDAT’ section flags in the Microsoft Windows PE/COFF format, and this support requires changes to decl, such as putting it in a separate section.
A C expression which evaluates to true if the target supports one-only semantics.
If you don't define this macro, varasm.c provides a default definition. If
MAKE_DECL_ONE_ONLY
is defined, the default definition is ‘1’; otherwise, it is ‘0’. Define this macro if you want to control one-only symbol support with a compiler flag, or if setting theDECL_ONE_ONLY
flag is enough to mark a declaration to be emitted as one-only.
This target hook is a function to output to asm_out_file some commands that will make the symbol(s) associated with decl have hidden, protected or internal visibility as specified by visibility.
A C expression that evaluates to true if the target's linker expects that weak symbols do not appear in a static archive's table of contents. The default is
0
.Leaving weak symbols out of an archive's table of contents means that, if a symbol will only have a definition in one translation unit and will have undefined references from other translation units, that symbol should not be weak. Defining this macro to be nonzero will thus have the effect that certain symbols that would normally be weak (explicit template instantiations, and vtables for polymorphic classes with noninline key methods) will instead be nonweak.
The C++ ABI requires this macro to be zero. Define this macro for targets where full C++ ABI compliance is impossible and where linker restrictions require weak symbols to be left out of a static archive's table of contents.
A C statement (sans semicolon) to output to the stdio stream stream any text necessary for declaring the name of an external symbol named name which is referenced in this compilation but not defined. The value of decl is the tree node for the declaration.
This macro need not be defined if it does not need to output anything. The GNU assembler and most Unix assemblers don't require anything.
This target hook is a function to output to asm_out_file an assembler pseudo-op to declare a library function name external. The name of the library function is given by symref, which is a
symbol_ref
.
This target hook is a function to output to asm_out_file an assembler directive to annotate symbol as used. The Darwin target uses the .no_dead_code_strip directive.
A C statement (sans semicolon) to output to the stdio stream stream a reference in assembler syntax to a label named name. This should add ‘_’ to the front of the name, if that is customary on your operating system, as it is in most Berkeley Unix systems. This macro is used in
assemble_name
.
Given a symbol name, perform same mangling as
varasm.c
'sassemble_name
, but in memory rather than to a file stream, returning result as anIDENTIFIER_NODE
. Required for correct LTO symtabs. The default implementation calls theTARGET_STRIP_NAME_ENCODING
hook and then prepends theUSER_LABEL_PREFIX
, if any.
A C statement (sans semicolon) to output a reference to
SYMBOL_REF
sym. If not defined,assemble_name
will be used to output the name of the symbol. This macro may be used to modify the way a symbol is referenced depending on information encoded byTARGET_ENCODE_SECTION_INFO
.
A C statement (sans semicolon) to output a reference to buf, the result of
ASM_GENERATE_INTERNAL_LABEL
. If not defined,assemble_name
will be used to output the name of the symbol. This macro is not used byoutput_asm_label
, or the%l
specifier that calls it; the intention is that this macro should be set when it is necessary to output a label differently when its address is being taken.
A function to output to the stdio stream stream a label whose name is made from the string prefix and the number labelno.
It is absolutely essential that these labels be distinct from the labels used for user-level functions and variables. Otherwise, certain programs will have name conflicts with internal labels.
It is desirable to exclude internal labels from the symbol table of the object file. Most assemblers have a naming convention for labels that should be excluded; on many systems, the letter ‘L’ at the beginning of a label has this effect. You should find out what convention your system uses, and follow it.
The default version of this function utilizes
ASM_GENERATE_INTERNAL_LABEL
.
A C statement to output to the stdio stream stream a debug info label whose name is made from the string prefix and the number num. This is useful for VLIW targets, where debug info labels may need to be treated differently than branch target labels. On some systems, branch target labels must be at the beginning of instruction bundles, but debug info labels can occur in the middle of instruction bundles.
If this macro is not defined, then
(*targetm.asm_out.internal_label)
will be used.
A C statement to store into the string string a label whose name is made from the string prefix and the number num.
This string, when output subsequently by
assemble_name
, should produce the output that(*targetm.asm_out.internal_label)
would produce with the same prefix and num.If the string begins with ‘*’, then
assemble_name
will output the rest of the string unchanged. It is often convenient forASM_GENERATE_INTERNAL_LABEL
to use ‘*’ in this way. If the string doesn't start with ‘*’, thenASM_OUTPUT_LABELREF
gets to output the string, and may change it. (Of course,ASM_OUTPUT_LABELREF
is also part of your machine description, so you should know what it does on your machine.)
A C expression to assign to outvar (which is a variable of type
char *
) a newly allocated string made from the string name and the number number, with some suitable punctuation added. Usealloca
to get space for the string.The string will be used as an argument to
ASM_OUTPUT_LABELREF
to produce an assembler label for an internal static variable whose name is name. Therefore, the string must be such as to result in valid assembler code. The argument number is different each time this macro is executed; it prevents conflicts between similarly-named internal static variables in different scopes.Ideally this string should not be a valid C identifier, to prevent any conflict with the user's own symbols. Most assemblers allow periods or percent signs in assembler symbols; putting at least one of these between the name and the number will suffice.
If this macro is not defined, a default definition will be provided which is correct for most systems.
A C statement to output to the stdio stream stream assembler code which defines (equates) the symbol name to have the value value.
If
SET_ASM_OP
is defined, a default definition is provided which is correct for most systems.
A C statement to output to the stdio stream stream assembler code which defines (equates) the symbol whose tree node is decl_of_name to have the value of the tree node decl_of_value. This macro will be used in preference to ‘ASM_OUTPUT_DEF’ if it is defined and if the tree nodes are available.
If
SET_ASM_OP
is defined, a default definition is provided which is correct for most systems.
A C statement that evaluates to true if the assembler code which defines (equates) the symbol whose tree node is decl_of_name to have the value of the tree node decl_of_value should be emitted near the end of the current compilation unit. The default is to not defer output of defines. This macro affects defines output by ‘ASM_OUTPUT_DEF’ and ‘ASM_OUTPUT_DEF_FROM_DECLS’.
A C statement to output to the stdio stream stream assembler code which defines (equates) the weak symbol name to have the value value. If value is
NULL
, it defines name as an undefined weak symbol.Define this macro if the target only supports weak aliases; define
ASM_OUTPUT_DEF
instead if possible.
Define this macro to override the default assembler names used for Objective-C methods.
The default name is a unique method number followed by the name of the class (e.g. ‘_1_Foo’). For methods in categories, the name of the category is also included in the assembler name (e.g. ‘_1_Foo_Bar’).
These names are safe on most systems, but make debugging difficult since the method's selector is not present in the name. Therefore, particular systems define other ways of computing names.
buf is an expression of type
char *
which gives you a buffer in which to store the name; its length is as long as class_name, cat_name and sel_name put together, plus 50 characters extra.The argument is_inst specifies whether the method is an instance method or a class method; class_name is the name of the class; cat_name is the name of the category (or
NULL
if the method is not in a category); and sel_name is the name of the selector.On systems where the assembler can handle quoted names, you can use this macro to provide more human-readable names.
The compiled code for certain languages includes constructors
(also called initialization routines)—functions to initialize
data in the program when the program is started. These functions need
to be called before the program is “started”—that is to say, before
main
is called.
Compiling some languages generates destructors (also called termination routines) that should be called when the program terminates.
To make the initialization and termination functions work, the compiler must output something in the assembler code to cause those functions to be called at the appropriate time. When you port the compiler to a new system, you need to specify how to do this.
There are two major ways that GCC currently supports the execution of initialization and termination functions. Each way has two variants. Much of the structure is common to all four variations.
The linker must build two lists of these functions—a list of
initialization functions, called __CTOR_LIST__
, and a list of
termination functions, called __DTOR_LIST__
.
Each list always begins with an ignored function pointer (which may hold 0, −1, or a count of the function pointers after it, depending on the environment). This is followed by a series of zero or more function pointers to constructors (or destructors), followed by a function pointer containing zero.
Depending on the operating system and its executable file format, either crtstuff.c or libgcc2.c traverses these lists at startup time and exit time. Constructors are called in reverse order of the list; destructors in forward order.
The best way to handle static constructors works only for object file formats which provide arbitrarily-named sections. A section is set aside for a list of constructors, and another for a list of destructors. Traditionally these are called ‘.ctors’ and ‘.dtors’. Each object file that defines an initialization function also puts a word in the constructor section to point to that function. The linker accumulates all these words into one contiguous ‘.ctors’ section. Termination functions are handled similarly.
This method will be chosen as the default by target-def.h if
TARGET_ASM_NAMED_SECTION
is defined. A target that does not
support arbitrary sections, but does support special designated
constructor and destructor sections may define CTORS_SECTION_ASM_OP
and DTORS_SECTION_ASM_OP
to achieve the same effect.
When arbitrary sections are available, there are two variants, depending upon how the code in crtstuff.c is called. On systems that support a .init section which is executed at program startup, parts of crtstuff.c are compiled into that section. The program is linked by the gcc driver like this:
ld -o output_file crti.o crtbegin.o ... -lgcc crtend.o crtn.o
The prologue of a function (__init
) appears in the .init
section of crti.o; the epilogue appears in crtn.o. Likewise
for the function __fini
in the .fini section. Normally these
files are provided by the operating system or by the GNU C library, but
are provided by GCC for a few targets.
The objects crtbegin.o and crtend.o are (for most targets)
compiled from crtstuff.c. They contain, among other things, code
fragments within the .init
and .fini
sections that branch
to routines in the .text
section. The linker will pull all parts
of a section together, which results in a complete __init
function
that invokes the routines we need at startup.
To use this variant, you must define the INIT_SECTION_ASM_OP
macro properly.
If no init section is available, when GCC compiles any function called
main
(or more accurately, any function designated as a program
entry point by the language front end calling expand_main_function
),
it inserts a procedure call to __main
as the first executable code
after the function prologue. The __main
function is defined
in libgcc2.c and runs the global constructors.
In file formats that don't support arbitrary sections, there are again
two variants. In the simplest variant, the GNU linker (GNU ld
)
and an `a.out' format must be used. In this case,
TARGET_ASM_CONSTRUCTOR
is defined to produce a .stabs
entry of type ‘N_SETT’, referencing the name __CTOR_LIST__
,
and with the address of the void function containing the initialization
code as its value. The GNU linker recognizes this as a request to add
the value to a set; the values are accumulated, and are eventually
placed in the executable as a vector in the format described above, with
a leading (ignored) count and a trailing zero element.
TARGET_ASM_DESTRUCTOR
is handled similarly. Since no init
section is available, the absence of INIT_SECTION_ASM_OP
causes
the compilation of main
to call __main
as above, starting
the initialization process.
The last variant uses neither arbitrary sections nor the GNU linker.
This is preferable when you want to do dynamic linking and when using
file formats which the GNU linker does not support, such as `ECOFF'. In
this case, TARGET_HAVE_CTORS_DTORS
is false, initialization and
termination functions are recognized simply by their names. This requires
an extra program in the linkage step, called collect2. This program
pretends to be the linker, for use with GCC; it does its job by running
the ordinary linker, but also arranges to include the vectors of
initialization and termination functions. These functions are called
via __main
as described above. In order to use this method,
use_collect2
must be defined in the target in config.gcc.
Here are the macros that control how the compiler handles initialization and termination functions:
If defined, a C string constant, including spacing, for the assembler operation to identify the following data as initialization code. If not defined, GCC will assume such a section does not exist. When you are using special sections for initialization and termination functions, this macro also controls how crtstuff.c and libgcc2.c arrange to run the initialization functions.
If defined,
main
will not call__main
as described above. This macro should be defined for systems that control start-up code on a symbol-by-symbol basis, such as OSF/1, and should not be defined explicitly for systems that supportINIT_SECTION_ASM_OP
.
If defined, a C string constant for a switch that tells the linker that the following symbol is an initialization routine.
If defined, a C string constant for a switch that tells the linker that the following symbol is a finalization routine.
If defined, a C statement that will write a function that can be automatically called when a shared library is loaded. The function should call func, which takes no arguments. If not defined, and the object format requires an explicit initialization function, then a function called
_GLOBAL__DI
will be generated.This function and the following one are used by collect2 when linking a shared library that needs constructors or destructors, or has DWARF2 exception tables embedded in the code.
If defined, a C statement that will write a function that can be automatically called when a shared library is unloaded. The function should call func, which takes no arguments. If not defined, and the object format requires an explicit finalization function, then a function called
_GLOBAL__DD
will be generated.
If defined,
main
will call__main
despite the presence ofINIT_SECTION_ASM_OP
. This macro should be defined for systems where the init section is not actually run automatically, but is still useful for collecting the lists of constructors and destructors.
If nonzero, the C++
init_priority
attribute is supported and the compiler should emit instructions to control the order of initialization of objects. If zero, the compiler will issue an error message upon encountering aninit_priority
attribute.
This value is true if the target supports some “native” method of collecting constructors and destructors to be run at startup and exit. It is false if we must use collect2.
If defined, a function that outputs assembler code to arrange to call the function referenced by symbol at initialization time.
Assume that symbol is a
SYMBOL_REF
for a function taking no arguments and with no return value. If the target supports initialization priorities, priority is a value between 0 andMAX_INIT_PRIORITY
; otherwise it must beDEFAULT_INIT_PRIORITY
.If this macro is not defined by the target, a suitable default will be chosen if (1) the target supports arbitrary section names, (2) the target defines
CTORS_SECTION_ASM_OP
, or (3)USE_COLLECT2
is not defined.
This is like
TARGET_ASM_CONSTRUCTOR
but used for termination functions rather than initialization functions.
If TARGET_HAVE_CTORS_DTORS
is true, the initialization routine
generated for the generated object file will have static linkage.
If your system uses collect2 as the means of processing constructors, then that program normally uses nm to scan an object file for constructor functions to be called.
On certain kinds of systems, you can define this macro to make collect2 work faster (and, in some cases, make it work at all):
Define this macro if the system uses COFF (Common Object File Format) object files, so that collect2 can assume this format and scan object files directly for dynamic constructor/destructor functions.
This macro is effective only in a native compiler; collect2 as part of a cross compiler always uses nm for the target machine.
Define this macro as a C string constant containing the file name to use to execute nm. The default is to search the path normally for nm.
collect2 calls nm to scan object files for static constructors and destructors and LTO info. By default, -n is passed. Define
NM_FLAGS
to a C string constant if other options are needed to get the same output format as GNU nm -n produces.
If your system supports shared libraries and has a program to list the dynamic dependencies of a given library or executable, you can define these macros to enable support for running initialization and termination functions in shared libraries:
Define this macro to a C string constant containing the name of the program which lists dynamic dependencies, like ldd under SunOS 4.
Define this macro to be C code that extracts filenames from the output of the program denoted by
LDD_SUFFIX
. ptr is a variable of typechar *
that points to the beginning of a line of output fromLDD_SUFFIX
. If the line lists a dynamic dependency, the code must advance ptr to the beginning of the filename on that line. Otherwise, it must set ptr toNULL
.
Define this macro to a C string constant containing the default shared library extension of the target (e.g., ‘".so"’). collect2 strips version information after this suffix when generating global constructor and destructor names. This define is only needed on targets that use collect2 to process constructors and destructors.
This describes assembler instruction output.
A C initializer containing the assembler's names for the machine registers, each one as a C string constant. This is what translates register numbers in the compiler into assembler language.
If defined, a C initializer for an array of structures containing a name and a register number. This macro defines additional names for hard registers, thus allowing the
asm
option in declarations to refer to registers using alternate names.
If defined, a C initializer for an array of structures containing a name, a register number and a count of the number of consecutive machine registers the name overlaps. This macro defines additional names for hard registers, thus allowing the
asm
option in declarations to refer to registers using alternate names. UnlikeADDITIONAL_REGISTER_NAMES
, this macro should be used when the register name implies multiple underlying registers.This macro should be used when it is important that a clobber in an
asm
statement clobbers all the underlying values implied by the register name. For example, on ARM, clobbering the double-precision VFP register “d0” implies clobbering both single-precision registers “s0” and “s1”.
Define this macro if you are using an unusual assembler that requires different names for the machine instructions.
The definition is a C statement or statements which output an assembler instruction opcode to the stdio stream stream. The macro-operand ptr is a variable of type
char *
which points to the opcode name in its “internal” form—the form that is written in the machine description. The definition should output the opcode name to stream, performing any translation you desire, and increment the variable ptr to point at the end of the opcode so that it will not be output twice.In fact, your macro definition may process less than the entire opcode name, or more than the opcode name; but if you want to process text that includes ‘%’-sequences to substitute operands, you must take care of the substitution yourself. Just be sure to increment ptr over whatever text should not be output normally.
If you need to look at the operand values, they can be found as the elements of
recog_data.operand
.If the macro definition does nothing, the instruction is output in the usual way.
If defined, a C statement to be executed just prior to the output of assembler code for insn, to modify the extracted operands so they will be output differently.
Here the argument opvec is the vector containing the operands extracted from insn, and noperands is the number of elements of the vector which contain meaningful data for this insn. The contents of this vector are what will be used to convert the insn template into assembler code, so you can change the assembler output by changing the contents of the vector.
This macro is useful when various assembler syntaxes share a single file of instruction patterns; by defining this macro differently, you can cause a large class of instructions to be output differently (such as with rearranged operands). Naturally, variations in assembler syntax affecting individual insn patterns ought to be handled by writing conditional output routines in those patterns.
If this macro is not defined, it is equivalent to a null statement.
If defined, this target hook is a function which is executed just after the output of assembler code for insn, to change the mode of the assembler if necessary.
Here the argument opvec is the vector containing the operands extracted from insn, and noperands is the number of elements of the vector which contain meaningful data for this insn. The contents of this vector are what was used to convert the insn template into assembler code, so you can change the assembler mode by checking the contents of the vector.
A C compound statement to output to stdio stream stream the assembler syntax for an instruction operand x. x is an RTL expression.
code is a value that can be used to specify one of several ways of printing the operand. It is used when identical operands must be printed differently depending on the context. code comes from the ‘%’ specification that was used to request printing of the operand. If the specification was just ‘%digit’ then code is 0; if the specification was ‘%ltr digit’ then code is the ASCII code for ltr.
If x is a register, this macro should print the register's name. The names can be found in an array
reg_names
whose type ischar *[]
.reg_names
is initialized fromREGISTER_NAMES
.When the machine description has a specification ‘%punct’ (a ‘%’ followed by a punctuation character), this macro is called with a null pointer for x and the punctuation character for code.
A C expression which evaluates to true if code is a valid punctuation character for use in the
PRINT_OPERAND
macro. IfPRINT_OPERAND_PUNCT_VALID_P
is not defined, it means that no punctuation characters (except for the standard one, ‘%’) are used in this way.
A C compound statement to output to stdio stream stream the assembler syntax for an instruction operand that is a memory reference whose address is x. x is an RTL expression.
On some machines, the syntax for a symbolic address depends on the section that the address refers to. On these machines, define the hook
TARGET_ENCODE_SECTION_INFO
to store the information into thesymbol_ref
, and then check for it here. See Assembler Format.
A C statement, to be executed after all slot-filler instructions have been output. If necessary, call
dbr_sequence_length
to determine the number of slots filled in a sequence (zero if not currently outputting a sequence), to decide how many no-ops to output, or whatever.Don't define this macro if it has nothing to do, but it is helpful in reading assembly output if the extent of the delay sequence is made explicit (e.g. with white space).
Note that output routines for instructions with delay slots must be
prepared to deal with not being output as part of a sequence
(i.e. when the scheduling pass is not run, or when no slot fillers could be
found.) The variable final_sequence
is null when not
processing a sequence, otherwise it contains the sequence
rtx
being output.
If defined, C string expressions to be used for the ‘%R’, ‘%L’, ‘%U’, and ‘%I’ options of
asm_fprintf
(see final.c). These are useful when a single md file must support multiple assembler formats. In that case, the various tm.h files can define these macros differently.
If defined this macro should expand to a series of
case
statements which will be parsed inside theswitch
statement of theasm_fprintf
function. This allows targets to define extra printf formats which may useful when generating their assembler statements. Note that uppercase letters are reserved for future generic extensions to asm_fprintf, and so are not available to target specific code. The output file is given by the parameter file. The varargs input pointer is argptr and the rest of the format string, starting the character after the one that is being switched upon, is pointed to by format.
If your target supports multiple dialects of assembler language (such as different opcodes), define this macro as a C expression that gives the numeric index of the assembler language dialect to use, with zero as the first variant.
If this macro is defined, you may use constructs of the form
‘{option0|option1|option2...}’
in the output templates of patterns (see Output Template) or in the first argument of
asm_fprintf
. This construct outputs ‘option0’, ‘option1’, ‘option2’, etc., if the value ofASSEMBLER_DIALECT
is zero, one, two, etc. Any special characters within these strings retain their usual meaning. If there are fewer alternatives within the braces than the value ofASSEMBLER_DIALECT
, the construct outputs nothing. If it's needed to print curly braces or ‘|’ character in assembler output directly, ‘%{’, ‘%}’ and ‘%|’ can be used.If you do not define this macro, the characters ‘{’, ‘|’ and ‘}’ do not have any special meaning when used in templates or operands to
asm_fprintf
.Define the macros
REGISTER_PREFIX
,LOCAL_LABEL_PREFIX
,USER_LABEL_PREFIX
andIMMEDIATE_PREFIX
if you can express the variations in assembler language syntax with that mechanism. DefineASSEMBLER_DIALECT
and use the ‘{option0|option1}’ syntax if the syntax variant are larger and involve such things as different opcodes or operand order.
A C expression to output to stream some assembler code which will push hard register number regno onto the stack. The code need not be optimal, since this macro is used only when profiling.
A C expression to output to stream some assembler code which will pop hard register number regno off of the stack. The code need not be optimal, since this macro is used only when profiling.
This concerns dispatch tables.
A C statement to output to the stdio stream stream an assembler pseudo-instruction to generate a difference between two labels. value and rel are the numbers of two internal labels. The definitions of these labels are output using
(*targetm.asm_out.internal_label)
, and they must be printed in the same way here. For example,fprintf (stream, "\t.word L%d-L%d\n", value, rel)You must provide this macro on machines where the addresses in a dispatch table are relative to the table's own address. If defined, GCC will also use this macro on all machines when producing PIC. body is the body of the
ADDR_DIFF_VEC
; it is provided so that the mode and flags can be read.
This macro should be provided on machines where the addresses in a dispatch table are absolute.
The definition should be a C statement to output to the stdio stream stream an assembler pseudo-instruction to generate a reference to a label. value is the number of an internal label whose definition is output using
(*targetm.asm_out.internal_label)
. For example,fprintf (stream, "\t.word L%d\n", value)
Define this if the label before a jump-table needs to be output specially. The first three arguments are the same as for
(*targetm.asm_out.internal_label)
; the fourth argument is the jump-table which follows (ajump_table_data
containing anaddr_vec
oraddr_diff_vec
).This feature is used on system V to output a
swbeg
statement for the table.If this macro is not defined, these labels are output with
(*targetm.asm_out.internal_label)
.
Define this if something special must be output at the end of a jump-table. The definition should be a C statement to be executed after the assembler code for the table is written. It should write the appropriate code to stdio stream stream. The argument table is the jump-table insn, and num is the label-number of the preceding label.
If this macro is not defined, nothing special is output at the end of the jump-table.
This target hook emits a label at the beginning of each FDE. It should be defined on targets where FDEs need special labels, and it should write the appropriate label, for the FDE associated with the function declaration decl, to the stdio stream stream. The third argument, for_eh, is a boolean: true if this is for an exception table. The fourth argument, empty, is a boolean: true if this is a placeholder label for an omitted FDE.
The default is that FDEs are not given nonlocal labels.
This target hook emits a label at the beginning of the exception table. It should be defined on targets where it is desirable for the table to be broken up according to function.
The default is that no label is emitted.
If the target implements
TARGET_ASM_UNWIND_EMIT
, this hook may be used to emit a directive to install a personality hook into the unwind info. This hook should not be used if dwarf2 unwind info is used.
This target hook emits assembly directives required to unwind the given instruction. This is only used when
TARGET_EXCEPT_UNWIND_INFO
returnsUI_TARGET
.
True if the
TARGET_ASM_UNWIND_EMIT
hook should be called before the assembly for insn has been emitted, false if the hook should be called afterward.
This describes commands marking the start and the end of an exception region.
If defined, a C string constant for the name of the section containing exception handling frame unwind information. If not defined, GCC will provide a default definition if the target supports named sections. crtstuff.c uses this macro to switch to the appropriate section.
You should define this symbol if your target supports DWARF 2 frame unwind information and the default definition does not work.
If defined, DWARF 2 frame unwind information will identified by specially named labels. The collect2 process will locate these labels and generate code to register the frames.
This might be necessary, for instance, if the system linker will not place the eh_frames in-between the sentinals from crtstuff.c, or if the system linker does garbage collection and sections cannot be marked as not to be collected.
Define this macro to 1 if your target is such that no frame unwind information encoding used with non-PIC code will ever require a runtime relocation, but the linker may not support merging read-only and read-write sections into a single read-write section.
An rtx used to mask the return address found via
RETURN_ADDR_RTX
, so that it does not contain any extraneous set bits in it.
Define this macro to 0 if your target supports DWARF 2 frame unwind information, but it does not yet work with exception handling. Otherwise, if your target supports this information (if it defines
INCOMING_RETURN_ADDR_RTX
andOBJECT_FORMAT_ELF
), GCC will provide a default definition of 1.
This hook defines the mechanism that will be used for exception handling by the target. If the target has ABI specified unwind tables, the hook should return
UI_TARGET
. If the target is to use thesetjmp
/longjmp
-based exception handling scheme, the hook should returnUI_SJLJ
. If the target supports DWARF 2 frame unwind information, the hook should returnUI_DWARF2
.A target may, if exceptions are disabled, choose to return
UI_NONE
. This may end up simplifying other parts of target-specific code. The default implementation of this hook never returnsUI_NONE
.Note that the value returned by this hook should be constant. It should not depend on anything except the command-line switches described by opts. In particular, the setting
UI_SJLJ
must be fixed at compiler start-up as C pre-processor macros and builtin functions related to exception handling are set up depending on this setting.The default implementation of the hook first honors the --enable-sjlj-exceptions configure option, then
DWARF2_UNWIND_INFO
, and finally defaults toUI_SJLJ
. IfDWARF2_UNWIND_INFO
depends on command-line options, the target must define this hook so that opts is used correctly.
This variable should be set to
true
if the target ABI requires unwinding tables even when exceptions are not used. It must not be modified by command-line option processing.
Define this macro to 1 if the
setjmp
/longjmp
-based scheme should use thesetjmp
/longjmp
functions from the C library instead of the__builtin_setjmp
/__builtin_longjmp
machinery.
This macro has no effect unless
DONT_USE_BUILTIN_SETJMP
is also defined. Define this macro if the default size ofjmp_buf
buffer for thesetjmp
/longjmp
-based exception handling mechanism is not large enough, or if it is much too large. The default size isFIRST_PSEUDO_REGISTER * sizeof(void *)
.
This macro need only be defined if the target might save registers in the function prologue at an offset to the stack pointer that is not aligned to
UNITS_PER_WORD
. The definition should be the negative minimum alignment ifSTACK_GROWS_DOWNWARD
is true, and the positive minimum alignment otherwise. See SDB and DWARF. Only applicable if the target supports DWARF 2 frame unwind information.
Contains the value true if the target should add a zero word onto the end of a Dwarf-2 frame info section when used for exception handling. Default value is false if
EH_FRAME_SECTION_NAME
is defined, and true otherwise.
Given a register, this hook should return a parallel of registers to represent where to find the register pieces. Define this hook if the register and its mode are represented in Dwarf in non-contiguous locations, or if the register should be represented in more than one register in Dwarf. Otherwise, this hook should return
NULL_RTX
. If not defined, the default is to returnNULL_RTX
.
Given a register, this hook should return the mode which the corresponding Dwarf frame register should have. This is normally used to return a smaller mode than the raw mode to prevent call clobbered parts of a register altering the frame register size
If some registers are represented in Dwarf-2 unwind information in multiple pieces, define this hook to fill in information about the sizes of those pieces in the table used by the unwinder at runtime. It will be called by
expand_builtin_init_dwarf_reg_sizes
after filling in a single size corresponding to each hard register; address is the address of the table.
This hook is used to output a reference from a frame unwinding table to the type_info object identified by sym. It should return
true
if the reference was output. Returningfalse
will cause the reference to be output using the normal Dwarf2 routines.
This flag should be set to
true
on targets that use an ARM EABI based unwinding library, andfalse
on other targets. This effects the format of unwinding tables, and how the unwinder in entered after running a cleanup. The default isfalse
.
This describes commands for alignment.
The alignment (log base 2) to put in front of label, which is a common destination of jumps and has no fallthru incoming edge.
This macro need not be defined if you don't want any special alignment to be done at such a time. Most machine descriptions do not currently define the macro.
Unless it's necessary to inspect the label parameter, it is better to set the variable align_jumps in the target's
TARGET_OPTION_OVERRIDE
. Otherwise, you should try to honor the user's selection in align_jumps in aJUMP_ALIGN
implementation.
The maximum number of bytes to skip before label when applying
JUMP_ALIGN
. This works only ifASM_OUTPUT_MAX_SKIP_ALIGN
is defined.
The alignment (log base 2) to put in front of label, which follows a
BARRIER
.This macro need not be defined if you don't want any special alignment to be done at such a time. Most machine descriptions do not currently define the macro.
The maximum number of bytes to skip before label when applying
LABEL_ALIGN_AFTER_BARRIER
. This works only ifASM_OUTPUT_MAX_SKIP_ALIGN
is defined.
The alignment (log base 2) to put in front of label that heads a frequently executed basic block (usually the header of a loop).
This macro need not be defined if you don't want any special alignment to be done at such a time. Most machine descriptions do not currently define the macro.
Unless it's necessary to inspect the label parameter, it is better to set the variable
align_loops
in the target'sTARGET_OPTION_OVERRIDE
. Otherwise, you should try to honor the user's selection inalign_loops
in aLOOP_ALIGN
implementation.
The maximum number of bytes to skip when applying
LOOP_ALIGN
to label. This works only ifASM_OUTPUT_MAX_SKIP_ALIGN
is defined.
The alignment (log base 2) to put in front of label. If
LABEL_ALIGN_AFTER_BARRIER
/LOOP_ALIGN
specify a different alignment, the maximum of the specified values is used.Unless it's necessary to inspect the label parameter, it is better to set the variable
align_labels
in the target'sTARGET_OPTION_OVERRIDE
. Otherwise, you should try to honor the user's selection inalign_labels
in aLABEL_ALIGN
implementation.
The maximum number of bytes to skip when applying
LABEL_ALIGN
to label. This works only ifASM_OUTPUT_MAX_SKIP_ALIGN
is defined.
A C statement to output to the stdio stream stream an assembler instruction to advance the location counter by nbytes bytes. Those bytes should be zero when loaded. nbytes will be a C expression of type
unsigned HOST_WIDE_INT
.
Define this macro if
ASM_OUTPUT_SKIP
should not be used in the text section because it fails to put zeros in the bytes that are skipped. This is true on many Unix systems, where the pseudo–op to skip bytes produces no-op instructions rather than zeros when used in the text section.
A C statement to output to the stdio stream stream an assembler command to advance the location counter to a multiple of 2 to the power bytes. power will be a C expression of type
int
.
Like
ASM_OUTPUT_ALIGN
, except that the “nop” instruction is used for padding, if necessary.
A C statement to output to the stdio stream stream an assembler command to advance the location counter to a multiple of 2 to the power bytes, but only if max_skip or fewer bytes are needed to satisfy the alignment request. power and max_skip will be a C expression of type
int
.
This describes how to specify debugging information.
These macros affect all debugging formats.
A C expression that returns the DBX register number for the compiler register number regno. In the default macro provided, the value of this expression will be regno itself. But sometimes there are some registers that the compiler knows about and DBX does not, or vice versa. In such cases, some register may need to have one number in the compiler and another for DBX.
If two registers have consecutive numbers inside GCC, and they can be used as a pair to hold a multiword value, then they must have consecutive numbers after renumbering with
DBX_REGISTER_NUMBER
. Otherwise, debuggers will be unable to access such a pair, because they expect register pairs to be consecutive in their own numbering scheme.If you find yourself defining
DBX_REGISTER_NUMBER
in way that does not preserve register pairs, then what you must do instead is redefine the actual register numbering scheme.
A C expression that returns the integer offset value for an automatic variable having address x (an RTL expression). The default computation assumes that x is based on the frame-pointer and gives the offset from the frame-pointer. This is required for targets that produce debugging output for DBX or COFF-style debugging output for SDB and allow the frame-pointer to be eliminated when the -g options is used.
A C expression that returns the integer offset value for an argument having address x (an RTL expression). The nominal offset is offset.
A C expression that returns the type of debugging output GCC should produce when the user specifies just -g. Define this if you have arranged for GCC to support more than one format of debugging output. Currently, the allowable values are
DBX_DEBUG
,SDB_DEBUG
,DWARF_DEBUG
,DWARF2_DEBUG
,XCOFF_DEBUG
,VMS_DEBUG
, andVMS_AND_DWARF2_DEBUG
.When the user specifies -ggdb, GCC normally also uses the value of this macro to select the debugging output format, but with two exceptions. If
DWARF2_DEBUGGING_INFO
is defined, GCC uses the valueDWARF2_DEBUG
. Otherwise, ifDBX_DEBUGGING_INFO
is defined, GCC usesDBX_DEBUG
.The value of this macro only affects the default debugging output; the user can always get a specific type of output by using -gstabs, -gcoff, -gdwarf-2, -gxcoff, or -gvms.
These are specific options for DBX output.
Define this macro if GCC should produce debugging output for DBX in response to the -g option.
Define this macro if GCC should produce XCOFF format debugging output in response to the -g option. This is a variant of DBX format.
Define this macro to control whether GCC should by default generate GDB's extended version of DBX debugging information (assuming DBX-format debugging information is enabled at all). If you don't define the macro, the default is 1: always generate the extended information if there is any occasion to.
Define this macro if all
.stabs
commands should be output while in the text section.
A C string constant, including spacing, naming the assembler pseudo op to use instead of
"\t.stabs\t"
to define an ordinary debugging symbol. If you don't define this macro,"\t.stabs\t"
is used. This macro applies only to DBX debugging information format.
A C string constant, including spacing, naming the assembler pseudo op to use instead of
"\t.stabd\t"
to define a debugging symbol whose value is the current location. If you don't define this macro,"\t.stabd\t"
is used. This macro applies only to DBX debugging information format.
A C string constant, including spacing, naming the assembler pseudo op to use instead of
"\t.stabn\t"
to define a debugging symbol with no name. If you don't define this macro,"\t.stabn\t"
is used. This macro applies only to DBX debugging information format.
Define this macro if DBX on your system does not support the construct ‘xstagname’. On some systems, this construct is used to describe a forward reference to a structure named tagname. On other systems, this construct is not supported at all.
A symbol name in DBX-format debugging information is normally continued (split into two separate
.stabs
directives) when it exceeds a certain length (by default, 80 characters). On some operating systems, DBX requires this splitting; on others, splitting must not be done. You can inhibit splitting by defining this macro with the value zero. You can override the default splitting-length by defining this macro as an expression for the length you desire.
Normally continuation is indicated by adding a ‘\’ character to the end of a
.stabs
string when a continuation follows. To use a different character instead, define this macro as a character constant for the character you want to use. Do not define this macro if backslash is correct for your system.
Define this macro if it is necessary to go to the data section before outputting the ‘.stabs’ pseudo-op for a non-global static variable.
The value to use in the “code” field of the
.stabs
directive for a typedef. The default isN_LSYM
.
The value to use in the “code” field of the
.stabs
directive for a static variable located in the text section. DBX format does not provide any “right” way to do this. The default isN_FUN
.
The value to use in the “code” field of the
.stabs
directive for a parameter passed in registers. DBX format does not provide any “right” way to do this. The default isN_RSYM
.
The letter to use in DBX symbol data to identify a symbol as a parameter passed in registers. DBX format does not customarily provide any way to do this. The default is
'P'
.
Define this macro if the DBX information for a function and its arguments should precede the assembler code for the function. Normally, in DBX format, the debugging information entirely follows the assembler code.
Define this macro, with value 1, if the value of a symbol describing the scope of a block (
N_LBRAC
orN_RBRAC
) should be relative to the start of the enclosing function. Normally, GCC uses an absolute address.
Define this macro, with value 1, if the value of a symbol indicating the current line number (
N_SLINE
) should be relative to the start of the enclosing function. Normally, GCC uses an absolute address.
Define this macro if GCC should generate
N_BINCL
andN_EINCL
stabs for included header files, as on Sun systems. This macro also directs GCC to output a type number as a pair of a file number and a type number within the file. Normally, GCC does not generateN_BINCL
orN_EINCL
stabs, and it outputs a single number for a type number.
These are hooks for DBX format.
A C statement to output DBX debugging information before code for line number line of the current source file to the stdio stream stream. counter is the number of time the macro was invoked, including the current invocation; it is intended to generate unique labels in the assembly output.
This macro should not be defined if the default output is correct, or if it can be made correct by defining
DBX_LINES_FUNCTION_RELATIVE
.
Some stabs encapsulation formats (in particular ECOFF), cannot handle the
.stabs "",N_FUN,,0,0,Lscope-function-1
gdb dbx extension construct. On those machines, define this macro to turn this feature off without disturbing the rest of the gdb extensions.
Some assemblers cannot handle the
.stabd BNSYM/ENSYM,0,0
gdb dbx extension construct. On those machines, define this macro to turn this feature off without disturbing the rest of the gdb extensions.
This describes file names in DBX format.
A C statement to output DBX debugging information to the stdio stream stream, which indicates that file name is the main source file—the file specified as the input file for compilation. This macro is called only once, at the beginning of compilation.
This macro need not be defined if the standard form of output for DBX debugging information is appropriate.
It may be necessary to refer to a label equal to the beginning of the text section. You can use ‘assemble_name (stream, ltext_label_name)’ to do so. If you do this, you must also set the variable used_ltext_label_name to
true
.
Define this macro, with value 1, if GCC should not emit an indication of the current directory for compilation and current source language at the beginning of the file.
Define this macro, with value 1, if GCC should not emit an indication that this object file was compiled by GCC. The default is to emit an
N_OPT
stab at the beginning of every source file, with ‘gcc2_compiled.’ for the string and value 0.
A C statement to output DBX debugging information at the end of compilation of the main source file name. Output should be written to the stdio stream stream.
If you don't define this macro, nothing special is output at the end of compilation, which is correct for most machines.
Define this macro instead of defining
DBX_OUTPUT_MAIN_SOURCE_FILE_END
, if what needs to be output at the end of compilation is anN_SO
stab with an empty string, whose value is the highest absolute text address in the file.
Here are macros for SDB and DWARF output.
Define this macro to 1 if GCC should produce COFF-style debugging output for SDB in response to the -g option.
Define this macro if GCC should produce dwarf version 2 format debugging output in response to the -g option.
— Target Hook: int TARGET_DWARF_CALLING_CONVENTION (const_tree function)
Define this to enable the dwarf attribute
DW_AT_calling_convention
to be emitted for each function. Instead of an integer return the enum value for theDW_CC_
tag.To support optional call frame debugging information, you must also define
INCOMING_RETURN_ADDR_RTX
and either setRTX_FRAME_RELATED_P
on the prologue insns if you use RTL for the prologue, or calldwarf2out_def_cfa
anddwarf2out_reg_save
as appropriate fromTARGET_ASM_FUNCTION_PROLOGUE
if you don't.
Define this macro to a nonzero value if GCC should always output Dwarf 2 frame information. If
TARGET_EXCEPT_UNWIND_INFO
(see Exception Region Output) returnsUI_DWARF2
, and exceptions are enabled, GCC will output this information not matter how you defineDWARF2_FRAME_INFO
.
This hook defines the mechanism that will be used for describing frame unwind information to the debugger. Normally the hook will return
UI_DWARF2
if DWARF 2 debug information is enabled, and returnUI_NONE
otherwise.A target may return
UI_DWARF2
even when DWARF 2 debug information is disabled in order to always output DWARF 2 frame information.A target may return
UI_TARGET
if it has ABI specified unwind tables. This will suppress generation of the normal debug frame unwind information.
Define this macro to be a nonzero value if the assembler can generate Dwarf 2 line debug info sections. This will result in much more compact line number tables, and hence is desirable if it works.
True if the
.debug_pubtypes
and.debug_pubnames
sections should be emitted. These sections are not used on most platforms, and in particular GDB does not use them.
True if the
DW_AT_comp_dir
attribute should be emitted for each compilation unit. This attribute is required for the darwin linker to emit debug information.
True if sched2 is not to be run at its normal place. This usually means it will be run as part of machine-specific reorg.
True if vartrack is not to be run at its normal place. This usually means it will be run as part of machine-specific reorg.
True if register allocation and the passes following it should not be run. Usually true only for virtual assembler targets.
A C statement to issue assembly directives that create a difference lab1 minus lab2, using an integer of the given size.
A C statement to issue assembly directives that create a difference between the two given labels in system defined units, e.g. instruction slots on IA64 VMS, using an integer of the given size.
A C statement to issue assembly directives that create a section-relative reference to the given label, using an integer of the given size. The label is known to be defined in the given section.
A C statement to issue assembly directives that create a self-relative reference to the given label, using an integer of the given size.
A C statement to issue assembly directives that create a reference to the given label relative to the dbase, using an integer of the given size.
A C statement to issue assembly directives that create a reference to the DWARF table identifier label from the current section. This is used on some systems to avoid garbage collecting a DWARF table which is referenced by a function.
If defined, this target hook is a function which outputs a DTP-relative reference to the given TLS symbol of the specified size.
Define these macros to override the assembler syntax for the special SDB assembler directives. See sdbout.c for a list of these macros and their arguments. If the standard syntax is used, you need not define them yourself.
Some assemblers do not support a semicolon as a delimiter, even between SDB assembler directives. In that case, define this macro to be the delimiter to use (usually ‘\n’). It is not necessary to define a new set of
PUT_SDB_
op macros if this is the only change required.
Define this macro to allow references to unknown structure, union, or enumeration tags to be emitted. Standard COFF does not allow handling of unknown references, MIPS ECOFF has support for it.
Define this macro to allow references to structure, union, or enumeration tags that have not yet been seen to be handled. Some assemblers choke if forward tags are used, while some require it.
A C statement to output SDB debugging information before code for line number line of the current source file to the stdio stream stream. The default is to emit an
.ln
directive.
Here are macros for VMS debug format.
Define this macro if GCC should produce debugging output for VMS in response to the -g option. The default behavior for VMS is to generate minimal debug info for a traceback in the absence of -g unless explicitly overridden with -g0. This behavior is controlled by
TARGET_OPTION_OPTIMIZATION
andTARGET_OPTION_OVERRIDE
.
While all modern machines use twos-complement representation for integers, there are a variety of representations for floating point numbers. This means that in a cross-compiler the representation of floating point numbers in the compiled program may be different from that used in the machine doing the compilation.
Because different representation systems may offer different amounts of range and precision, all floating point constants must be represented in the target machine's format. Therefore, the cross compiler cannot safely use the host machine's floating point arithmetic; it must emulate the target's arithmetic. To ensure consistency, GCC always uses emulation to work with floating point values, even when the host and target floating point formats are identical.
The following macros are provided by real.h for the compiler to use. All parts of the compiler which generate or optimize floating-point calculations must use these macros. They may evaluate their operands more than once, so operands must not have side effects.
The C data type to be used to hold a floating point value in the target machine's format. Typically this is a
struct
containing an array ofHOST_WIDE_INT
, but all code should treat it as an opaque quantity.
Truncates x to a signed integer, rounding toward zero.
Truncates x to an unsigned integer, rounding toward zero. If x is negative, returns zero.
Converts string into a floating point number in the target machine's representation for mode mode. This routine can handle both decimal and hexadecimal floating point constants, using the syntax defined by the C language for both.
Returns 1 if x is negative (including negative zero), 0 otherwise.
Determines whether x represents infinity (positive or negative).
Determines whether x represents a “NaN” (not-a-number).
Returns the negative of the floating point value x.
The following macros control mode switching optimizations:
Define this macro if the port needs extra instructions inserted for mode switching in an optimizing compilation.
For an example, the SH4 can perform both single and double precision floating point operations, but to perform a single precision operation, the FPSCR PR bit has to be cleared, while for a double precision operation, this bit has to be set. Changing the PR bit requires a general purpose register as a scratch register, hence these FPSCR sets have to be inserted before reload, i.e. you can't put this into instruction emitting or
TARGET_MACHINE_DEPENDENT_REORG
.You can have multiple entities that are mode-switched, and select at run time which entities actually need it.
OPTIMIZE_MODE_SWITCHING
should return nonzero for any entity that needs mode-switching. If you define this macro, you also have to defineNUM_MODES_FOR_MODE_SWITCHING
,TARGET_MODE_NEEDED
,TARGET_MODE_PRIORITY
andTARGET_MODE_EMIT
.TARGET_MODE_AFTER
,TARGET_MODE_ENTRY
, andTARGET_MODE_EXIT
are optional.
If you define
OPTIMIZE_MODE_SWITCHING
, you have to define this as initializer for an array of integers. Each initializer element N refers to an entity that needs mode switching, and specifies the number of different modes that might need to be set for this entity. The position of the initializer in the initializer—starting counting at zero—determines the integer that is used to refer to the mode-switched entity in question. In macros that take mode arguments / yield a mode result, modes are represented as numbers 0 ... N − 1. N is used to specify that no mode switch is needed / supplied.
Generate one or more insns to set entity to mode. hard_reg_live is the set of hard registers live at the point where the insn(s) are to be inserted. prev_moxde indicates the mode to switch from. Sets of a lower numbered entity will be emitted before sets of a higher numbered entity to a mode of the same or lower priority.
entity is an integer specifying a mode-switched entity. If
OPTIMIZE_MODE_SWITCHING
is defined, you must define this macro to return an integer value not larger than the corresponding element inNUM_MODES_FOR_MODE_SWITCHING
, to denote the mode that entity must be switched into prior to the execution of insn.
entity is an integer specifying a mode-switched entity. If this macro is defined, it is evaluated for every insn during mode switching. It determines the mode that an insn results in (if different from the incoming mode).
If this macro is defined, it is evaluated for every entity that needs mode switching. It should evaluate to an integer, which is a mode that entity is assumed to be switched to at function entry. If
TARGET_MODE_ENTRY
is defined thenTARGET_MODE_EXIT
must be defined.
If this macro is defined, it is evaluated for every entity that needs mode switching. It should evaluate to an integer, which is a mode that entity is assumed to be switched to at function exit. If
TARGET_MODE_EXIT
is defined thenTARGET_MODE_ENTRY
must be defined.
This macro specifies the order in which modes for entity are processed. 0 is the highest priority,
NUM_MODES_FOR_MODE_SWITCHING[
entity] - 1
the lowest. The value of the macro should be an integer designating a mode for entity. For any fixed entity,mode_priority
(entity, n) shall be a bijection in 0 ...num_modes_for_mode_switching[
entity] - 1
.
__attribute__
Target-specific attributes may be defined for functions, data and types. These are described using the following target hooks; they also need to be documented in extend.texi.
If defined, this target hook points to an array of ‘struct attribute_spec’ (defined in tree-core.h) specifying the machine specific attributes for this target and some of the restrictions on the entities to which these attributes are applied and the arguments they take.
If defined, this target hook is a function which returns true if the machine-specific attribute named name expects an identifier given as its first argument to be passed on as a plain identifier, not subjected to name lookup. If this is not defined, the default is false for all machine-specific attributes.
If defined, this target hook is a function which returns zero if the attributes on type1 and type2 are incompatible, one if they are compatible, and two if they are nearly compatible (which causes a warning to be generated). If this is not defined, machine-specific attributes are supposed always to be compatible.
If defined, this target hook is a function which assigns default attributes to the newly defined type.
Define this target hook if the merging of type attributes needs special handling. If defined, the result is a list of the combined
TYPE_ATTRIBUTES
of type1 and type2. It is assumed thatcomptypes
has already been called and returned 1. This function may callmerge_attributes
to handle machine-independent merging.
Define this target hook if the merging of decl attributes needs special handling. If defined, the result is a list of the combined
DECL_ATTRIBUTES
of olddecl and newdecl. newdecl is a duplicate declaration of olddecl. Examples of when this is needed are when one attribute overrides another, or when an attribute is nullified by a subsequent definition. This function may callmerge_attributes
to handle machine-independent merging.If the only target-specific handling you require is ‘dllimport’ for Microsoft Windows targets, you should define the macro
TARGET_DLLIMPORT_DECL_ATTRIBUTES
to1
. The compiler will then define a function calledmerge_dllimport_decl_attributes
which can then be defined as the expansion ofTARGET_MERGE_DECL_ATTRIBUTES
. You can also addhandle_dll_attribute
in the attribute table for your port to perform initial processing of the ‘dllimport’ and ‘dllexport’ attributes. This is done in i386/cygwin.h and i386/i386.c, for example.
decl is a variable or function with
__attribute__((dllimport))
specified. Use this hook if the target needs to add extra validation checks tohandle_dll_attribute
.
Define this macro to a nonzero value if you want to treat
__declspec(X)
as equivalent to__attribute((X))
. By default, this behavior is enabled only for targets that defineTARGET_DLLIMPORT_DECL_ATTRIBUTES
. The current implementation of__declspec
is via a built-in macro, but you should not rely on this implementation detail.
Define this target hook if you want to be able to add attributes to a decl when it is being created. This is normally useful for back ends which wish to implement a pragma by using the attributes which correspond to the pragma's effect. The node argument is the decl which is being created. The attr_ptr argument is a pointer to the attribute list for this decl. The list itself should not be modified, since it may be shared with other decls, but attributes may be chained on the head of the list and
*
attr_ptr modified to point to the new attributes, or a copy of the list may be made if further changes are needed.
This target hook returns
true
if it is OK to inline fndecl into the current function, despite its having target-specific attributes,false
otherwise. By default, if a function has a target specific attribute attached to it, it will not be inlined.
This hook is called to parse
attribute(target("..."))
, which allows setting target-specific options on individual functions. These function-specific options may differ from the options specified on the command line. The hook should returntrue
if the options are valid.The hook should set the
DECL_FUNCTION_SPECIFIC_TARGET
field in the function declaration to hold a pointer to a target-specificstruct cl_target_option
structure.
This hook is called to save any additional target-specific information in the
struct cl_target_option
structure for function-specific options from thestruct gcc_options
structure. See Option file format.
This hook is called to restore any additional target-specific information in the
struct cl_target_option
structure for function-specific options to thestruct gcc_options
structure.
This hook is called to update target-specific information in the
struct cl_target_option
structure after it is streamed in from LTO bytecode.
This hook is called to print any additional target-specific information in the
struct cl_target_option
structure for function-specific options.
This target hook parses the options for
#pragma GCC target
, which sets the target-specific options for functions that occur later in the input stream. The options accepted should be the same as those handled by theTARGET_OPTION_VALID_ATTRIBUTE_P
hook.
Sometimes certain combinations of command options do not make sense on a particular target machine. You can override the hook
TARGET_OPTION_OVERRIDE
to take account of this. This hooks is called once just after all the command options have been parsed.Don't use this hook to turn on various extra optimizations for -O. That is what
TARGET_OPTION_OPTIMIZATION
is for.If you need to do something whenever the optimization level is changed via the optimize attribute or pragma, see
TARGET_OVERRIDE_OPTIONS_AFTER_CHANGE
This target hook returns
true
if DECL1 and DECL2 are versions of the same function. DECL1 and DECL2 are function versions if and only if they have the same function signature and different target specific attributes, that is, they are compiled for different target machines.
This target hook returns
false
if the caller function cannot inline callee, based on target specific information. By default, inlining is not allowed if the callee function has function specific target options and the caller does not use the same options.
This target hook fixes function fndecl after attributes are processed. Default does nothing. On ARM, the default function's alignment is updated with the attribute target.
For targets whose psABI does not provide Thread Local Storage via specific relocations and instruction sequences, an emulation layer is used. A set of target hooks allows this emulation layer to be configured for the requirements of a particular target. For instance the psABI may in fact specify TLS support in terms of an emulation layer.
The emulation layer works by creating a control object for every TLS object. To access the TLS object, a lookup function is provided which, when given the address of the control object, will return the address of the current thread's instance of the TLS object.
Contains the name of the helper function that uses a TLS control object to locate a TLS instance. The default causes libgcc's emulated TLS helper function to be used.
Contains the name of the helper function that should be used at program startup to register TLS objects that are implicitly initialized to zero. If this is
NULL
, all TLS objects will have explicit initializers. The default causes libgcc's emulated TLS registration function to be used.
Contains the name of the section in which TLS control variables should be placed. The default of
NULL
allows these to be placed in any section.
Contains the name of the section in which TLS initializers should be placed. The default of
NULL
allows these to be placed in any section.
Contains the prefix to be prepended to TLS control variable names. The default of
NULL
uses a target-specific prefix.
Contains the prefix to be prepended to TLS initializer objects. The default of
NULL
uses a target-specific prefix.
Specifies a function that generates the FIELD_DECLs for a TLS control object type. type is the RECORD_TYPE the fields are for and name should be filled with the structure tag, if the default of
__emutls_object
is unsuitable. The default creates a type suitable for libgcc's emulated TLS function.
Specifies a function that generates the CONSTRUCTOR to initialize a TLS control object. var is the TLS control object, decl is the TLS object and tmpl_addr is the address of the initializer. The default initializes libgcc's emulated TLS control object.
Specifies whether the alignment of TLS control variable objects is fixed and should not be increased as some backends may do to optimize single objects. The default is false.
Specifies whether a DWARF
DW_OP_form_tls_address
location descriptor may be used to describe emulated TLS control objects.
The MIPS specification allows MIPS implementations to have as many as 4 coprocessors, each with as many as 32 private registers. GCC supports accessing these registers and transferring values between the registers and memory using asm-ized variables. For example:
register unsigned int cp0count asm ("c0r1"); unsigned int d; d = cp0count + 3;
(“c0r1” is the default name of register 1 in coprocessor 0; alternate
names may be added as described below, or the default names may be
overridden entirely in SUBTARGET_CONDITIONAL_REGISTER_USAGE
.)
Coprocessor registers are assumed to be epilogue-used; sets to them will be preserved even if it does not appear that the register is used again later in the function.
Another note: according to the MIPS spec, coprocessor 1 (if present) is the FPU. One accesses COP1 registers through standard mips floating-point support; they are not included in this mechanism.
This hook returns a pointer to the data needed by
TARGET_PCH_VALID_P
and sets ‘*sz’ to the size of the data in bytes.
This hook checks whether the options used to create a PCH file are compatible with the current settings. It returns
NULL
if so and a suitable error message if not. Error messages will be presented to the user and must be localized using ‘_(msg)’.data is the data that was returned by
TARGET_GET_PCH_VALIDITY
when the PCH file was created and sz is the size of that data in bytes. It's safe to assume that the data was created by the same version of the compiler, so no format checking is needed.The default definition of
default_pch_valid_p
should be suitable for most targets.
If this hook is nonnull, the default implementation of
TARGET_PCH_VALID_P
will use it to check for compatible values oftarget_flags
. pch_flags specifies the value thattarget_flags
had when the PCH file was created. The return value is the same as forTARGET_PCH_VALID_P
.
Called before writing out a PCH file. If the target has some garbage-collected data that needs to be in a particular state on PCH loads, it can use this hook to enforce that state. Very few targets need to do anything here.
Define this hook to override the integer type used for guard variables. These are used to implement one-time construction of static objects. The default is long_long_integer_type_node.
This hook determines how guard variables are used. It should return
false
(the default) if the first byte should be used. A return value oftrue
indicates that only the least significant bit should be used.
This hook returns the size of the cookie to use when allocating an array whose elements have the indicated type. Assumes that it is already known that a cookie is needed. The default is
max(sizeof (size_t), alignof(type))
, as defined in section 2.7 of the IA64/Generic C++ ABI.
This hook should return
true
if the element size should be stored in array cookies. The default is to returnfalse
.
If defined by a backend this hook allows the decision made to export class type to be overruled. Upon entry import_export will contain 1 if the class is going to be exported, −1 if it is going to be imported and 0 otherwise. This function should return the modified value and perform any other actions necessary to support the backend's targeted operating system.
This hook should return
true
if constructors and destructors return the address of the object created/destroyed. The default is to returnfalse
.
This hook returns true if the key method for a class (i.e., the method which, if defined in the current translation unit, causes the virtual table to be emitted) may be an inline function. Under the standard Itanium C++ ABI the key method may be an inline function so long as the function is not declared inline in the class definition. Under some variants of the ABI, an inline function can never be the key method. The default is to return
true
.
decl is a virtual table, virtual table table, typeinfo object, or other similar implicit class data object that will be emitted with external linkage in this translation unit. No ELF visibility has been explicitly specified. If the target needs to specify a visibility other than that of the containing class, use this hook to set
DECL_VISIBILITY
andDECL_VISIBILITY_SPECIFIED
.
This hook returns true (the default) if virtual tables and other similar implicit class data objects are always COMDAT if they have external linkage. If this hook returns false, then class data for classes whose virtual table will be emitted in only one translation unit will not be COMDAT.
This hook returns true (the default) if the RTTI information for the basic types which is defined in the C++ runtime should always be COMDAT, false if it should not be COMDAT.
This hook returns true if
__aeabi_atexit
(as defined by the ARM EABI) should be used to register static destructors when -fuse-cxa-atexit is in effect. The default is to return false to use__cxa_atexit
.
This hook returns true if the target
atexit
function can be used in the same manner as__cxa_atexit
to register C++ static destructors. This requires thatatexit
-registered functions in shared libraries are run in the correct order when the libraries are unloaded. The default is to return false.
type is a C++ class (i.e., RECORD_TYPE or UNION_TYPE) that has just been defined. Use this hook to make adjustments to the class (eg, tweak visibility or perform any other required target modifications).
Return target-specific mangling context of decl or
NULL_TREE
.
The draft technical report of the ISO/IEC JTC1 S22 WG14 N1275
standards committee, Programming Languages - C - Extensions to
support embedded processors, specifies a syntax for embedded
processors to specify alternate address spaces. You can configure a
GCC port to support section 5.1 of the draft report to add support for
address spaces other than the default address space. These address
spaces are new keywords that are similar to the volatile
and
const
type attributes.
Pointers to named address spaces can have a different size than pointers to the generic address space.
For example, the SPU port uses the __ea
address space to refer
to memory in the host processor, rather than memory local to the SPU
processor. Access to memory in the __ea
address space involves
issuing DMA operations to move data between the host processor and the
local processor memory address space. Pointers in the __ea
address space are either 32 bits or 64 bits based on the
-mea32 or -mea64 switches (native SPU pointers are
always 32 bits).
Internally, address spaces are represented as a small integer in the range 0 to 15 with address space 0 being reserved for the generic address space.
To register a named address space qualifier keyword with the C front end,
the target may call the c_register_addr_space
routine. For example,
the SPU port uses the following to declare __ea
as the keyword for
named address space #1:
#define ADDR_SPACE_EA 1 c_register_addr_space ("__ea", ADDR_SPACE_EA);
Define this to return the machine mode to use for pointers to address_space if the target supports named address spaces. The default version of this hook returns
ptr_mode
.
Define this to return the machine mode to use for addresses in address_space if the target supports named address spaces. The default version of this hook returns
Pmode
.
Define this to return nonzero if the port can handle pointers with machine mode mode to address space as. This target hook is the same as the
TARGET_VALID_POINTER_MODE
target hook, except that it includes explicit named address space support. The default version of this hook returns true for the modes returned by either theTARGET_ADDR_SPACE_POINTER_MODE
orTARGET_ADDR_SPACE_ADDRESS_MODE
target hooks for the given address space.
Define this to return true if exp is a valid address for mode mode in the named address space as. The strict parameter says whether strict addressing is in effect after reload has finished. This target hook is the same as the
TARGET_LEGITIMATE_ADDRESS_P
target hook, except that it includes explicit named address space support.
Define this to modify an invalid address x to be a valid address with mode mode in the named address space as. This target hook is the same as the
TARGET_LEGITIMIZE_ADDRESS
target hook, except that it includes explicit named address space support.
Define this to return whether the subset named address space is contained within the superset named address space. Pointers to a named address space that is a subset of another named address space will be converted automatically without a cast if used together in arithmetic operations. Pointers to a superset address space can be converted to pointers to a subset address space via explicit casts.
Define this to modify the default handling of address 0 for the address space. Return true if 0 should be considered a valid address.
Define this to convert the pointer expression represented by the RTL op with type from_type that points to a named address space to a new pointer expression with type to_type that points to a different named address space. When this hook it called, it is guaranteed that one of the two address spaces is a subset of the other, as determined by the
TARGET_ADDR_SPACE_SUBSET_P
target hook.
Define this to define how the address space is encoded in dwarf. The result is the value to be used with
DW_AT_address_class
.
Here are several miscellaneous parameters.
Define this boolean macro to indicate whether or not your architecture has conditional branches that can span all of memory. It is used in conjunction with an optimization that partitions hot and cold basic blocks into separate sections of the executable. If this macro is set to false, gcc will convert any conditional branches that attempt to cross between sections into unconditional branches or indirect jumps.
Define this boolean macro to indicate whether or not your architecture has unconditional branches that can span all of memory. It is used in conjunction with an optimization that partitions hot and cold basic blocks into separate sections of the executable. If this macro is set to false, gcc will convert any unconditional branches that attempt to cross between sections into indirect jumps.
An alias for a machine mode name. This is the machine mode that elements of a jump-table should have.
Optional: return the preferred mode for an
addr_diff_vec
when the minimum and maximum offset are known. If you define this, it enables extra code in branch shortening to deal withaddr_diff_vec
. To make this work, you also have to defineINSN_ALIGN
and make the alignment foraddr_diff_vec
explicit. The body argument is provided so that the offset_unsigned and scale flags can be updated.
Define this macro to be a C expression to indicate when jump-tables should contain relative addresses. You need not define this macro if jump-tables never contain relative addresses, or jump-tables should contain relative addresses only when -fPIC or -fPIC is in effect.
This function return the smallest number of different values for which it is best to use a jump-table instead of a tree of conditional branches. The default is four for machines with a
casesi
instruction and five otherwise. This is best for most machines.
Define this macro to 1 if operations between registers with integral mode smaller than a word are always performed on the entire register. Most RISC machines have this property and most CISC machines do not.
Define this macro to be a C expression indicating when insns that read memory in mem_mode, an integral mode narrower than a word, set the bits outside of mem_mode to be either the sign-extension or the zero-extension of the data read. Return
SIGN_EXTEND
for values of mem_mode for which the insn sign-extends,ZERO_EXTEND
for which it zero-extends, andUNKNOWN
for other modes.This macro is not called with mem_mode non-integral or with a width greater than or equal to
BITS_PER_WORD
, so you may return any value in this case. Do not define this macro if it would always returnUNKNOWN
. On machines where this macro is defined, you will normally define it as the constantSIGN_EXTEND
orZERO_EXTEND
.You may return a non-
UNKNOWN
value even if for some hard registers the sign extension is not performed, if for theREGNO_REG_CLASS
of these hard registersCANNOT_CHANGE_MODE_CLASS
returns nonzero when the from mode is mem_mode and the to mode is any integral mode larger than this but not larger thanword_mode
.You must return
UNKNOWN
if for some hard registers that allow this mode,CANNOT_CHANGE_MODE_CLASS
says that they cannot change toword_mode
, but that they can change to another integral mode that is larger then mem_mode but still smaller thanword_mode
.
Define this macro to 1 if loading short immediate values into registers sign extends.
When -ffast-math is in effect, GCC tries to optimize divisions by the same divisor, by turning them into multiplications by the reciprocal. This target hook specifies the minimum number of divisions that should be there for GCC to perform the optimization for a variable of mode mode. The default implementation returns 3 if the machine has an instruction for the division, and 2 if it does not.
The maximum number of bytes that a single instruction can move quickly between memory and registers or between two memory locations.
The maximum number of bytes that a single instruction can move quickly between memory and registers or between two memory locations. If this is undefined, the default is
MOVE_MAX
. Otherwise, it is the constant value that is the largest value thatMOVE_MAX
can have at run-time.
A C expression that is nonzero if on this machine the number of bits actually used for the count of a shift operation is equal to the number of bits needed to represent the size of the object being shifted. When this macro is nonzero, the compiler will assume that it is safe to omit a sign-extend, zero-extend, and certain bitwise `and' instructions that truncates the count of a shift operation. On machines that have instructions that act on bit-fields at variable positions, which may include `bit test' instructions, a nonzero
SHIFT_COUNT_TRUNCATED
also enables deletion of truncations of the values that serve as arguments to bit-field instructions.If both types of instructions truncate the count (for shifts) and position (for bit-field operations), or if no variable-position bit-field instructions exist, you should define this macro.
However, on some machines, such as the 80386 and the 680x0, truncation only applies to shift operations and not the (real or pretended) bit-field operations. Define
SHIFT_COUNT_TRUNCATED
to be zero on such machines. Instead, add patterns to the md file that include the implied truncation of the shift instructions.You need not define this macro if it would always have the value of zero.
This function describes how the standard shift patterns for mode deal with shifts by negative amounts or by more than the width of the mode. See shift patterns.
On many machines, the shift patterns will apply a mask m to the shift count, meaning that a fixed-width shift of x by y is equivalent to an arbitrary-width shift of x by y & m. If this is true for mode mode, the function should return m, otherwise it should return 0. A return value of 0 indicates that no particular behavior is guaranteed.
Note that, unlike
SHIFT_COUNT_TRUNCATED
, this function does not apply to general shift rtxes; it applies only to instructions that are generated by the named shift patterns.The default implementation of this function returns
GET_MODE_BITSIZE (
mode) - 1
ifSHIFT_COUNT_TRUNCATED
and 0 otherwise. This definition is always safe, but ifSHIFT_COUNT_TRUNCATED
is false, and some shift patterns nevertheless truncate the shift count, you may get better code by overriding it.
A C expression which is nonzero if on this machine it is safe to “convert” an integer of inprec bits to one of outprec bits (where outprec is smaller than inprec) by merely operating on it as if it had only outprec bits.
On many machines, this expression can be 1.
When
TRULY_NOOP_TRUNCATION
returns 1 for a pair of sizes for modes for whichMODES_TIEABLE_P
is 0, suboptimal code can result. If this is the case, makingTRULY_NOOP_TRUNCATION
return 0 in such cases may improve things.
The representation of an integral mode can be such that the values are always extended to a wider integral mode. Return
SIGN_EXTEND
if values of mode are represented in sign-extended form to rep_mode. ReturnUNKNOWN
otherwise. (Currently, none of the targets use zero-extended representation this way so unlikeLOAD_EXTEND_OP
,TARGET_MODE_REP_EXTENDED
is expected to return eitherSIGN_EXTEND
orUNKNOWN
. Also no target extends mode to rep_mode so that rep_mode is not the next widest integral mode and currently we take advantage of this fact.)Similarly to
LOAD_EXTEND_OP
you may return a non-UNKNOWN
value even if the extension is not performed on certain hard registers as long as for theREGNO_REG_CLASS
of these hard registersCANNOT_CHANGE_MODE_CLASS
returns nonzero.Note that
TARGET_MODE_REP_EXTENDED
andLOAD_EXTEND_OP
describe two related properties. If you defineTARGET_MODE_REP_EXTENDED (mode, word_mode)
you probably also want to defineLOAD_EXTEND_OP (mode)
to return the same type of extension.In order to enforce the representation of
mode
,TRULY_NOOP_TRUNCATION
should return false when truncating tomode
.
A C expression describing the value returned by a comparison operator with an integral mode and stored by a store-flag instruction (‘cstoremode4’) when the condition is true. This description must apply to all the ‘cstoremode4’ patterns and all the comparison operators whose results have a
MODE_INT
mode.A value of 1 or −1 means that the instruction implementing the comparison operator returns exactly 1 or −1 when the comparison is true and 0 when the comparison is false. Otherwise, the value indicates which bits of the result are guaranteed to be 1 when the comparison is true. This value is interpreted in the mode of the comparison operation, which is given by the mode of the first operand in the ‘cstoremode4’ pattern. Either the low bit or the sign bit of
STORE_FLAG_VALUE
be on. Presently, only those bits are used by the compiler.If
STORE_FLAG_VALUE
is neither 1 or −1, the compiler will generate code that depends only on the specified bits. It can also replace comparison operators with equivalent operations if they cause the required bits to be set, even if the remaining bits are undefined. For example, on a machine whose comparison operators return anSImode
value and whereSTORE_FLAG_VALUE
is defined as ‘0x80000000’, saying that just the sign bit is relevant, the expression(ne:SI (and:SI x (const_int power-of-2)) (const_int 0))can be converted to
(ashift:SI x (const_int n))where n is the appropriate shift count to move the bit being tested into the sign bit.
There is no way to describe a machine that always sets the low-order bit for a true value, but does not guarantee the value of any other bits, but we do not know of any machine that has such an instruction. If you are trying to port GCC to such a machine, include an instruction to perform a logical-and of the result with 1 in the pattern for the comparison operators and let us know at [email protected].
Often, a machine will have multiple instructions that obtain a value from a comparison (or the condition codes). Here are rules to guide the choice of value for
STORE_FLAG_VALUE
, and hence the instructions to be used:
- Use the shortest sequence that yields a valid definition for
STORE_FLAG_VALUE
. It is more efficient for the compiler to “normalize” the value (convert it to, e.g., 1 or 0) than for the comparison operators to do so because there may be opportunities to combine the normalization with other operations.- For equal-length sequences, use a value of 1 or −1, with −1 being slightly preferred on machines with expensive jumps and 1 preferred on other machines.
- As a second choice, choose a value of ‘0x80000001’ if instructions exist that set both the sign and low-order bits but do not define the others.
- Otherwise, use a value of ‘0x80000000’.
Many machines can produce both the value chosen for
STORE_FLAG_VALUE
and its negation in the same number of instructions. On those machines, you should also define a pattern for those cases, e.g., one matching(set A (neg:m (ne:m B C)))Some machines can also perform
and
orplus
operations on condition code values with less instructions than the corresponding ‘cstoremode4’ insn followed byand
orplus
. On those machines, define the appropriate patterns. Use the namesincscc
anddecscc
, respectively, for the patterns which performplus
orminus
operations on condition code values. See rs6000.md for some examples. The GNU Superoptimizer can be used to find such instruction sequences on other machines.If this macro is not defined, the default value, 1, is used. You need not define
STORE_FLAG_VALUE
if the machine has no store-flag instructions, or if the value generated by these instructions is 1.
A C expression that gives a nonzero
REAL_VALUE_TYPE
value that is returned when comparison operators with floating-point results are true. Define this macro on machines that have comparison operations that return floating-point values. If there are no such operations, do not define this macro.
A C expression that gives a rtx representing the nonzero true element for vector comparisons. The returned rtx should be valid for the inner mode of mode which is guaranteed to be a vector mode. Define this macro on machines that have vector comparison operations that return a vector result. If there are no such operations, do not define this macro. Typically, this macro is defined as
const1_rtx
orconstm1_rtx
. This macro may returnNULL_RTX
to prevent the compiler optimizing such vector comparison operations for the given mode.
A C expression that indicates whether the architecture defines a value for
clz
orctz
with a zero operand. A result of0
indicates the value is undefined. If the value is defined for only the RTL expression, the macro should evaluate to1
; if the value applies also to the corresponding optab entry (which is normally the case if it expands directly into the corresponding RTL), then the macro should evaluate to2
. In the cases where the value is defined, value should be set to this value.If this macro is not defined, the value of
clz
orctz
at zero is assumed to be undefined.This macro must be defined if the target's expansion for
ffs
relies on a particular value to get correct results. Otherwise it is not necessary, though it may be used to optimize some corner cases, and to provide a default expansion for theffs
optab.Note that regardless of this macro the “definedness” of
clz
andctz
at zero do not extend to the builtin functions visible to the user. Thus one may be free to adjust the value at will to match the target expansion of these operations without fear of breaking the API.
An alias for the machine mode for pointers. On most machines, define this to be the integer mode corresponding to the width of a hardware pointer;
SImode
on 32-bit machine orDImode
on 64-bit machines. On some machines you must define this to be one of the partial integer modes, such asPSImode
.The width of
Pmode
must be at least as large as the value ofPOINTER_SIZE
. If it is not equal, you must define the macroPOINTERS_EXTEND_UNSIGNED
to specify how pointers are extended toPmode
.
An alias for the machine mode used for memory references to functions being called, in
call
RTL expressions. On most CISC machines, where an instruction can begin at any byte address, this should beQImode
. On most RISC machines, where all instructions have fixed size and alignment, this should be a mode with the same size and alignment as the machine instruction words - typicallySImode
orHImode
.
In normal operation, the preprocessor expands
__STDC__
to the constant 1, to signify that GCC conforms to ISO Standard C. On some hosts, like Solaris, the system compiler uses a different convention, where__STDC__
is normally 0, but is 1 if the user specifies strict conformance to the C Standard.Defining
STDC_0_IN_SYSTEM_HEADERS
makes GNU CPP follows the host convention when processing system header files, but when processing user files__STDC__
will always expand to 1.
Define this hook to return the name of a header file to be included at the start of all compilations, as if it had been included with
#include <
file>
. If this hook returnsNULL
, or is not defined, or the header is not found, or if the user specifies -ffreestanding or -nostdinc, no header is included.This hook can be used together with a header provided by the system C library to implement ISO C requirements for certain macros to be predefined that describe properties of the whole implementation rather than just the compiler.
Define this hook to add target-specific C++ implicit extern C functions. If this function returns true for the name of a file-scope function, that function implicitly gets extern "C" linkage rather than whatever language linkage the declaration would normally have. An example of such function is WinMain on Win32 targets.
Define this macro if the system header files support C++ as well as C. This macro inhibits the usual method of using system header files in C++, which is to pretend that the file's contents are enclosed in ‘extern "C" {...}’.
Define this macro if you want to implement any target-specific pragmas. If defined, it is a C expression which makes a series of calls to
c_register_pragma
orc_register_pragma_with_expansion
for each pragma. The macro may also do any setup required for the pragmas.The primary reason to define this macro is to provide compatibility with other compilers for the same target. In general, we discourage definition of target-specific pragmas for GCC.
If the pragma can be implemented by attributes then you should consider defining the target hook ‘TARGET_INSERT_ATTRIBUTES’ as well.
Preprocessor macros that appear on pragma lines are not expanded. All ‘#pragma’ directives that do not match any registered pragma are silently ignored, unless the user specifies -Wunknown-pragmas.
Each call to
c_register_pragma
orc_register_pragma_with_expansion
establishes one pragma. The callback routine will be called when the preprocessor encounters a pragma of the form#pragma [space] name ...space is the case-sensitive namespace of the pragma, or
NULL
to put the pragma in the global namespace. The callback routine receives pfile as its first argument, which can be passed on to cpplib's functions if necessary. You can lex tokens after the name by callingpragma_lex
. Tokens that are not read by the callback will be silently ignored. The end of the line is indicated by a token of typeCPP_EOF
. Macro expansion occurs on the arguments of pragmas registered withc_register_pragma_with_expansion
but not on the arguments of pragmas registered withc_register_pragma
.Note that the use of
pragma_lex
is specific to the C and C++ compilers. It will not work in the Java or Fortran compilers, or any other language compilers for that matter. Thus ifpragma_lex
is going to be called from target-specific code, it must only be done so when building the C and C++ compilers. This can be done by defining the variablesc_target_objs
andcxx_target_objs
in the target entry in the config.gcc file. These variables should name the target-specific, language-specific object file which contains the code that usespragma_lex
. Note it will also be necessary to add a rule to the makefile fragment pointed to bytmake_file
that shows how to build this object file.
Define this macro if macros should be expanded in the arguments of ‘#pragma pack’.
If your target requires a structure packing default other than 0 (meaning the machine default), define this macro to the necessary value (in bytes). This must be a value that would also be valid to use with ‘#pragma pack()’ (that is, a small power of two).
Define this macro to control use of the character ‘$’ in identifier names for the C family of languages. 0 means ‘$’ is not allowed by default; 1 means it is allowed. 1 is the default; there is no need to define this macro in that case.
Define this macro as a C expression that is nonzero if it is safe for the delay slot scheduler to place instructions in the delay slot of insn, even if they appear to use a resource set or clobbered in insn. insn is always a
jump_insn
or aninsn
; GCC knows that everycall_insn
has this behavior. On machines where someinsn
orjump_insn
is really a function call and hence has this behavior, you should define this macro.You need not define this macro if it would always return zero.
Define this macro as a C expression that is nonzero if it is safe for the delay slot scheduler to place instructions in the delay slot of insn, even if they appear to set or clobber a resource referenced in insn. insn is always a
jump_insn
or aninsn
. On machines where someinsn
orjump_insn
is really a function call and its operands are registers whose use is actually in the subroutine it calls, you should define this macro. Doing so allows the delay slot scheduler to move instructions which copy arguments into the argument registers into the delay slot of insn.You need not define this macro if it would always return zero.
Define this macro as a C expression that is nonzero if, in some cases, global symbols from one translation unit may not be bound to undefined symbols in another translation unit without user intervention. For instance, under Microsoft Windows symbols must be explicitly imported from shared libraries (DLLs).
You need not define this macro if it would always evaluate to zero.
This target hook may add clobbers to clobbers and clobbered_regs for any hard regs the port wishes to automatically clobber for an asm. The outputs and inputs may be inspected to avoid clobbering a register that is already used by the asm.
It may modify the outputs, inputs, and constraints as necessary for other pre-processing. In this case the return value is a sequence of insns to emit after the asm.
Define this macro as a C string constant for the linker argument to link in the system math library, minus the initial ‘"-l"’, or ‘""’ if the target does not have a separate math library.
You need only define this macro if the default of ‘"m"’ is wrong.
Define this macro as a C string constant for the environment variable that specifies where the linker should look for libraries.
You need only define this macro if the default of ‘"LIBRARY_PATH"’ is wrong.
Define this macro if the target supports the following POSIX file functions, access, mkdir and file locking with fcntl / F_SETLKW. Defining
TARGET_POSIX_IO
will enable the test coverage code to use file locking when exiting a program, which avoids race conditions if the program has forked. It will also create directories at run-time for cross-profiling.
A C expression for the maximum number of instructions to execute via conditional execution instructions instead of a branch. A value of
BRANCH_COST
+1 is the default if the machine does not use cc0, and 1 if it does use cc0.
Used if the target needs to perform machine-dependent modifications on the conditionals used for turning basic blocks into conditionally executed code. ce_info points to a data structure,
struct ce_if_block
, which contains information about the currently processed blocks. true_expr and false_expr are the tests that are used for converting the then-block and the else-block, respectively. Set either true_expr or false_expr to a null pointer if the tests cannot be converted.
Like
IFCVT_MODIFY_TESTS
, but used when converting more complicated if-statements into conditions combined byand
andor
operations. bb contains the basic block that contains the test that is currently being processed and about to be turned into a condition.
A C expression to modify the PATTERN of an INSN that is to be converted to conditional execution format. ce_info points to a data structure,
struct ce_if_block
, which contains information about the currently processed blocks.
A C expression to perform any final machine dependent modifications in converting code to conditional execution. The involved basic blocks can be found in the
struct ce_if_block
structure that is pointed to by ce_info.
A C expression to cancel any machine dependent modifications in converting code to conditional execution. The involved basic blocks can be found in the
struct ce_if_block
structure that is pointed to by ce_info.
A C expression to initialize any machine specific data for if-conversion of the if-block in the
struct ce_if_block
structure that is pointed to by ce_info.
If non-null, this hook performs a target-specific pass over the instruction stream. The compiler will run it at all optimization levels, just before the point at which it normally does delayed-branch scheduling.
The exact purpose of the hook varies from target to target. Some use it to do transformations that are necessary for correctness, such as laying out in-function constant pools or avoiding hardware hazards. Others use it as an opportunity to do some machine-dependent optimizations.
You need not implement the hook if it has nothing to do. The default definition is null.
Define this hook if you have any machine-specific built-in functions that need to be defined. It should be a function that performs the necessary setup.
Machine specific built-in functions can be useful to expand special machine instructions that would otherwise not normally be generated because they have no equivalent in the source language (for example, SIMD vector instructions or prefetch instructions).
To create a built-in function, call the function
lang_hooks.builtin_function
which is defined by the language front end. You can use any type nodes set up bybuild_common_tree_nodes
; only language front ends that use those two functions will call ‘TARGET_INIT_BUILTINS’.
Define this hook if you have any machine-specific built-in functions that need to be defined. It should be a function that returns the builtin function declaration for the builtin function code code. If there is no such builtin and it cannot be initialized at this time if initialize_p is true the function should return
NULL_TREE
. If code is out of range the function should returnerror_mark_node
.
Expand a call to a machine specific built-in function that was set up by ‘TARGET_INIT_BUILTINS’. exp is the expression for the function call; the result should go to target if that is convenient, and have mode mode if that is convenient. subtarget may be used as the target for computing one of exp's operands. ignore is nonzero if the value is to be ignored. This function should return the result of the call to the built-in function.
This hook allows target to redefine built-in functions used by Pointer Bounds Checker for code instrumentation. Hook should return fndecl of function implementing generic builtin whose code is passed in fcode. Currently following built-in functions are obtained using this hook:
— Built-in Function: __bounds_type __chkp_bndmk (const void *lb, size_t size)
Function code - BUILT_IN_CHKP_BNDMK. This built-in function is used by Pointer Bounds Checker to create bound values. lb holds low bound of the resulting bounds. size holds size of created bounds.
— Built-in Function: void __chkp_bndstx (const void *ptr, __bounds_type b, const void **loc)
Function code -
BUILT_IN_CHKP_BNDSTX
. This built-in function is used by Pointer Bounds Checker to store bounds b for pointer ptr when ptr is stored by address loc.— Built-in Function: __bounds_type __chkp_bndldx (const void **loc, const void *ptr)
Function code -
BUILT_IN_CHKP_BNDLDX
. This built-in function is used by Pointer Bounds Checker to get bounds of pointer ptr loaded by address loc.— Built-in Function: void __chkp_bndcl (const void *ptr, __bounds_type b)
Function code -
BUILT_IN_CHKP_BNDCL
. This built-in function is used by Pointer Bounds Checker to perform check for pointer ptr against lower bound of bounds b.— Built-in Function: void __chkp_bndcu (const void *ptr, __bounds_type b)
Function code -
BUILT_IN_CHKP_BNDCU
. This built-in function is used by Pointer Bounds Checker to perform check for pointer ptr against upper bound of bounds b.— Built-in Function: __bounds_type __chkp_bndret (void *ptr)
Function code -
BUILT_IN_CHKP_BNDRET
. This built-in function is used by Pointer Bounds Checker to obtain bounds returned by a call statement. ptr passed to built-in isSSA_NAME
returned by the call.— Built-in Function: __bounds_type __chkp_intersect (__bounds_type b1, __bounds_type b2)
Function code -
BUILT_IN_CHKP_INTERSECT
. This built-in function returns intersection of bounds b1 and b2.— Built-in Function: __bounds_type __chkp_narrow (const void *ptr, __bounds_type b, size_t s)
Function code -
BUILT_IN_CHKP_NARROW
. This built-in function returns intersection of bounds b and [ptr, ptr + s -1
].— Built-in Function: size_t __chkp_sizeof (const void *ptr)
Function code -
BUILT_IN_CHKP_SIZEOF
. This built-in function returns size of object referenced by ptr. ptr is alwaysADDR_EXPR
ofVAR_DECL
. This built-in is used by Pointer Bounds Checker when bounds of object cannot be computed statically (e.g. object has incomplete type).
Return constant used to statically initialize constant bounds with specified lower bound lb and upper bounds ub.
Generate a list of statements stmts to initialize pointer bounds variable var with bounds lb and ub. Return the number of generated statements.
Select a replacement for a machine specific built-in function that was set up by ‘TARGET_INIT_BUILTINS’. This is done before regular type checking, and so allows the target to implement a crude form of function overloading. fndecl is the declaration of the built-in function. arglist is the list of arguments passed to the built-in function. The result is a complete expression that implements the operation, usually another
CALL_EXPR
. arglist really has type ‘VEC(tree,gc)*’
Fold a call to a machine specific built-in function that was set up by ‘TARGET_INIT_BUILTINS’. fndecl is the declaration of the built-in function. n_args is the number of arguments passed to the function; the arguments themselves are pointed to by argp. The result is another tree, valid for both GIMPLE and GENERIC, containing a simplified expression for the call's result. If ignore is true the value will be ignored.
Fold a call to a machine specific built-in function that was set up by ‘TARGET_INIT_BUILTINS’. gsi points to the gimple statement holding the function call. Returns true if any change was made to the GIMPLE stream.
This hook is used to compare the target attributes in two functions to determine which function's features get higher priority. This is used during function multi-versioning to figure out the order in which two versions must be dispatched. A function version with a higher priority is checked for dispatching earlier. decl1 and decl2 are the two function decls that will be compared.
This hook is used to get the dispatcher function for a set of function versions. The dispatcher function is called to invoke the right function version at run-time. decl is one version from a set of semantically identical versions.
This hook is used to generate the dispatcher logic to invoke the right function version at run-time for a given set of function versions. arg points to the callgraph node of the dispatcher function whose body must be generated.
Return true if it is possible to use low-overhead loops (
doloop_end
anddoloop_begin
) for a particular loop. iterations gives the exact number of iterations, or 0 if not known. iterations_max gives the maximum number of iterations, or 0 if not known. loop_depth is the nesting depth of the loop, with 1 for innermost loops, 2 for loops that contain innermost loops, and so on. entered_at_top is true if the loop is only entered from the top.This hook is only used if
doloop_end
is available. The default implementation returns true. You can usecan_use_doloop_if_innermost
if the loop must be the innermost, and if there are no other restrictions.
Take an instruction in insn and return NULL if it is valid within a low-overhead loop, otherwise return a string explaining why doloop could not be applied.
Many targets use special registers for low-overhead looping. For any instruction that clobbers these this function should return a string indicating the reason why the doloop could not be applied. By default, the RTL loop optimizer does not use a present doloop pattern for loops containing function calls or branch on table instructions.
Take an instruction in insn and return
false
if the instruction is not appropriate as a combination of two or more instructions. The default is to accept all instructions.
FOLLOWER and FOLLOWEE are JUMP_INSN instructions; return true if FOLLOWER may be modified to follow FOLLOWEE; false, if it can't. For example, on some targets, certain kinds of branches can't be made to follow through a hot/cold partitioning.
This target hook returns
true
if x is considered to be commutative. Usually, this is just COMMUTATIVE_P (x), but the HP PA doesn't consider PLUS to be commutative inside a MEM. outer_code is the rtx code of the enclosing rtl, if known, otherwise it is UNKNOWN.
When the initial value of a hard register has been copied in a pseudo register, it is often not necessary to actually allocate another register to this pseudo register, because the original hard register or a stack slot it has been saved into can be used.
TARGET_ALLOCATE_INITIAL_VALUE
is called at the start of register allocation once for each hard register that had its initial value copied by usingget_func_hard_reg_initial_val
orget_hard_reg_initial_val
. Possible values areNULL_RTX
, if you don't want to do any special allocation, aREG
rtx—that would typically be the hard register itself, if it is known not to be clobbered—or aMEM
. If you are returning aMEM
, this is only a hint for the allocator; it might decide to use another register anyways. You may usecurrent_function_is_leaf
orREG_N_SETS
in the hook to determine if the hard register in question will not be clobbered. The default value of this hook isNULL
, which disables any special allocation.
This target hook returns nonzero if x, an
unspec
orunspec_volatile
operation, might cause a trap. Targets can use this hook to enhance precision of analysis forunspec
andunspec_volatile
operations. You may callmay_trap_p_1
to analyze inner elements of x in which case flags should be passed along.
The compiler invokes this hook whenever it changes its current function context (
cfun
). You can define this function if the back end needs to perform any initialization or reset actions on a per-function basis. For example, it may be used to implement function attributes that affect register usage or code generation patterns. The argument decl is the declaration for the new function context, and may be null to indicate that the compiler has left a function context and is returning to processing at the top level. The default hook function does nothing.GCC sets
cfun
to a dummy function context during initialization of some parts of the back end. The hook function is not invoked in this situation; you need not worry about the hook being invoked recursively, or when the back end is in a partially-initialized state.cfun
might beNULL
to indicate processing at top level, outside of any function scope.
Define this macro to be a C string representing the suffix for object files on your target machine. If you do not define this macro, GCC will use ‘.o’ as the suffix for object files.
Define this macro to be a C string representing the suffix to be automatically added to executable files on your target machine. If you do not define this macro, GCC will use the null string as the suffix for executable files.
If defined,
collect2
will scan the individual object files specified on its command line and create an export list for the linker. Define this macro for systems like AIX, where the linker discards object files that are not referenced frommain
and uses export lists.
Define this macro to a C expression representing a variant of the method call mdecl, if Java Native Interface (JNI) methods must be invoked differently from other methods on your target. For example, on 32-bit Microsoft Windows, JNI methods must be invoked using the
stdcall
calling convention and this macro is then defined as this expression:build_type_attribute_variant (mdecl, build_tree_list (get_identifier ("stdcall"), NULL))
This target hook returns
true
past the point in which new jump instructions could be created. On machines that require a register for every jump such as the SHmedia ISA of SH5, this point would typically be reload, so this target hook should be defined to a function such as:static bool cannot_modify_jumps_past_reload_p () { return (reload_completed || reload_in_progress); }
This target hook returns a register class for which branch target register optimizations should be applied. All registers in this class should be usable interchangeably. After reload, registers in this class will be re-allocated and loads will be hoisted out of loops and be subjected to inter-block scheduling.
Branch target register optimization will by default exclude callee-saved registers that are not already live during the current function; if this target hook returns true, they will be included. The target code must than make sure that all target registers in the class returned by ‘TARGET_BRANCH_TARGET_REGISTER_CLASS’ that might need saving are saved. after_prologue_epilogue_gen indicates if prologues and epilogues have already been generated. Note, even if you only return true when after_prologue_epilogue_gen is false, you still are likely to have to make special provisions in
INITIAL_ELIMINATION_OFFSET
to reserve space for caller-saved target registers.
This target hook returns true if the target supports conditional execution. This target hook is required only when the target has several different modes and they have different conditional execution capability, such as ARM.
This function prepares to emit a comparison insn for the first compare in a sequence of conditional comparisions. It returns an appropriate comparison with
CC
for passing togen_ccmp_next
orcbranch_optab
. The insns to prepare the compare are saved in prep_seq and the compare insns are saved in gen_seq. They will be emitted when all the compares in the the conditional comparision are generated without error. code is thertx_code
of the compare for op0 and op1.
This function prepares to emit a conditional comparison within a sequence of conditional comparisons. It returns an appropriate comparison with
CC
for passing togen_ccmp_next
orcbranch_optab
. The insns to prepare the compare are saved in prep_seq and the compare insns are saved in gen_seq. They will be emitted when all the compares in the conditional comparision are generated without error. The prev expression is the result of a prior call togen_ccmp_first
orgen_ccmp_next
. It may returnNULL
if the combination of prev and this comparison is not supported, otherwise the result must be appropriate for passing togen_ccmp_next
orcbranch_optab
. code is thertx_code
of the compare for op0 and op1. bit_code isAND
orIOR
, which is the op on the compares.
This target hook returns a new value for the number of times loop should be unrolled. The parameter nunroll is the number of times the loop is to be unrolled. The parameter loop is a pointer to the loop, which is going to be checked for unrolling. This target hook is required only when the target has special constraints like maximum number of memory accesses.
If defined, this macro is interpreted as a signed integer C expression that specifies the maximum number of floating point multiplications that should be emitted when expanding exponentiation by an integer constant inline. When this value is defined, exponentiation requiring more than this number of multiplications is implemented by calling the system library's
pow
,powf
orpowl
routines. The default value places no upper bound on the multiplication count.
This target hook should register any extra include files for the target. The parameter stdinc indicates if normal include files are present. The parameter sysroot is the system root directory. The parameter iprefix is the prefix for the gcc directory.
This target hook should register any extra include files for the target before any standard headers. The parameter stdinc indicates if normal include files are present. The parameter sysroot is the system root directory. The parameter iprefix is the prefix for the gcc directory.
This target hook should register special include paths for the target. The parameter path is the include to register. On Darwin systems, this is used for Framework includes, which have semantics that are different from -I.
This target macro returns
true
if it is safe to use a local alias for a virtual function fndecl when constructing thunks,false
otherwise. By default, the macro returnstrue
for all functions, if a target supports aliases (i.e. definesASM_OUTPUT_DEF
),false
otherwise,
If defined, this macro is the name of a global variable containing target-specific format checking information for the -Wformat option. The default is to have no target-specific format checks.
If defined, this macro is the number of entries in
TARGET_FORMAT_TYPES
.
If defined, this macro is the name of a global variable containing target-specific format overrides for the -Wformat option. The default is to have no target-specific format overrides. If defined,
TARGET_FORMAT_TYPES
must be defined, too.
If defined, this macro specifies the number of entries in
TARGET_OVERRIDES_FORMAT_ATTRIBUTES
.
If defined, this macro specifies the optional initialization routine for target specific customizations of the system printf and scanf formatter settings.
If defined, this macro returns the diagnostic message when it is illegal to pass argument val to function funcdecl with prototype typelist.
If defined, this macro returns the diagnostic message when it is invalid to convert from fromtype to totype, or
NULL
if validity should be determined by the front end.
If defined, this macro returns the diagnostic message when it is invalid to apply operation op (where unary plus is denoted by
CONVERT_EXPR
) to an operand of type type, orNULL
if validity should be determined by the front end.
If defined, this macro returns the diagnostic message when it is invalid to apply operation op to operands of types type1 and type2, or
NULL
if validity should be determined by the front end.
If defined, this macro returns the diagnostic message when it is invalid for functions to include parameters of type type, or
NULL
if validity should be determined by the front end. This is currently used only by the C and C++ front ends.
If defined, this macro returns the diagnostic message when it is invalid for functions to have return type type, or
NULL
if validity should be determined by the front end. This is currently used only by the C and C++ front ends.
If defined, this target hook returns the type to which values of type should be promoted when they appear in expressions, analogous to the integer promotions, or
NULL_TREE
to use the front end's normal promotion rules. This hook is useful when there are target-specific types with special promotion rules. This is currently used only by the C and C++ front ends.
If defined, this hook returns the result of converting expr to type. It should return the converted expression, or
NULL_TREE
to apply the front end's normal conversion rules. This hook is useful when there are target-specific types with special conversion rules. This is currently used only by the C and C++ front ends.
This macro determines whether to use the JCR section to register Java classes. By default, TARGET_USE_JCR_SECTION is defined to 1 if both SUPPORTS_WEAK and TARGET_HAVE_NAMED_SECTIONS are true, else 0.
This macro determines the size of the objective C jump buffer for the NeXT runtime. By default, OBJC_JBLEN is defined to an innocuous value.
Define this macro if any target-specific attributes need to be attached to the functions in libgcc that provide low-level support for call stack unwinding. It is used in declarations in unwind-generic.h and the associated definitions of those functions.
Define this macro to update the current function stack boundary if necessary.
This hook should return an rtx for Dynamic Realign Argument Pointer (DRAP) if a different argument pointer register is needed to access the function's argument list due to stack realignment. Return
NULL
if no DRAP is needed.
When optimization is disabled, this hook indicates whether or not arguments should be allocated to stack slots. Normally, GCC allocates stacks slots for arguments when not optimizing in order to make debugging easier. However, when a function is declared with
__attribute__((naked))
, there is no stack frame, and the compiler cannot safely move arguments from the registers in which they are passed to the stack. Therefore, this hook should return true in general, but false for naked functions. The default implementation always returns true.
On some architectures it can take multiple instructions to synthesize a constant. If there is another constant already in a register that is close enough in value then it is preferable that the new constant is computed from this register using immediate addition or subtraction. We accomplish this through CSE. Besides the value of the constant we also add a lower and an upper constant anchor to the available expressions. These are then queried when encountering new constants. The anchors are computed by rounding the constant up and down to a multiple of the value of
TARGET_CONST_ANCHOR
.TARGET_CONST_ANCHOR
should be the maximum positive value accepted by immediate-add plus one. We currently assume that the value ofTARGET_CONST_ANCHOR
is a power of 2. For example, on MIPS, where add-immediate takes a 16-bit signed value,TARGET_CONST_ANCHOR
is set to ‘0x8000’. The default value is zero, which disables this optimization.
Return the offset bitwise ored into shifted address to get corresponding Address Sanitizer shadow memory address. NULL if Address Sanitizer is not supported by the target.
Validate target specific memory model mask bits. When NULL no target specific memory model bits are allowed.
This value should be set if the result written by
atomic_test_and_set
is not exactly 1, i.e. thebool
true
.
It returns true if the target supports GNU indirect functions. The support includes the assembler, linker and dynamic linker. The default value of this hook is based on target's libc.
If defined, this function returns an appropriate alignment in bits for an atomic object of machine_mode mode. If 0 is returned then the default alignment for the specified mode is used.
ISO C11 requires atomic compound assignments that may raise floating-point exceptions to raise exceptions corresponding to the arithmetic operation whose result was successfully stored in a compare-and-exchange sequence. This requires code equivalent to calls to
feholdexcept
,feclearexcept
andfeupdateenv
to be generated at appropriate points in the compare-and-exchange sequence. This hook should set*
hold to an expression equivalent to the call tofeholdexcept
,*
clear to an expression equivalent to the call tofeclearexcept
and*
update to an expression equivalent to the call tofeupdateenv
. The three expressions areNULL_TREE
on entry to the hook and may be left asNULL_TREE
if no code is required in a particular place. The default implementation leaves all three expressions asNULL_TREE
. The__atomic_feraiseexcept
function fromlibatomic
may be of use as part of the code generated in*
update.
Used when offloaded functions are seen in the compilation unit and no named sections are available. It is called once for each symbol that must be recorded in the offload function and variable table.
Used when writing out the list of options into an LTO file. It should translate any relevant target-specific options (such as the ABI in use) into one of the -foffload options that exist as a common interface to express such options. It should return a string containing these options, separated by spaces, which the caller will free.
On older ports, large integers are stored in
CONST_DOUBLE
rtl objects. Newer ports defineTARGET_SUPPORTS_WIDE_INT
to be nonzero to indicate that large integers are stored inCONST_WIDE_INT
rtl objects. TheCONST_WIDE_INT
allows very large integer constants to be represented.CONST_DOUBLE
is limited to twice the size of the host'sHOST_WIDE_INT
representation.Converting a port mostly requires looking for the places where
CONST_DOUBLE
s are used withVOIDmode
and replacing that code with code that accessesCONST_WIDE_INT
s. ‘"grep -i const_double"’ at the port level gets you to 95% of the changes that need to be made. There are a few places that require a deeper look.
- There is no equivalent to
hval
andlval
forCONST_WIDE_INT
s. This would be difficult to express in the md language since there are a variable number of elements.Most ports only check that
hval
is either 0 or -1 to see if the value is small. As mentioned above, this will no longer be necessary since small constants are alwaysCONST_INT
. Of course there are still a few exceptions, the alpha's constraint used by the zap instruction certainly requires careful examination by C code. However, all the current code does is pass the hval and lval to C code, so evolving the c code to look at theCONST_WIDE_INT
is not really a large change.- Because there is no standard template that ports use to materialize constants, there is likely to be some futzing that is unique to each port in this code.
- The rtx costs may have to be adjusted to properly account for larger constants that are represented as
CONST_WIDE_INT
.All and all it does not take long to convert ports that the maintainer is familiar with.
Most details about the machine and system on which the compiler is actually running are detected by the configure script. Some things are impossible for configure to detect; these are described in two ways, either by macros defined in a file named xm-machine.h or by hook functions in the file specified by the out_host_hook_obj variable in config.gcc. (The intention is that very few hosts will need a header file but nearly every fully supported host will need to override some hooks.)
If you need to define only a few macros, and they have simple
definitions, consider using the xm_defines
variable in your
config.gcc entry instead of creating a host configuration
header. See System Config.
Some things are just not portable, even between similar operating systems, and are too difficult for autoconf to detect. They get implemented using hook functions in the file specified by the host_hook_obj variable in config.gcc.
This host hook is used to set up handling for extra signals. The most common thing to do in this hook is to detect stack overflow.
This host hook returns the address of some space that is likely to be free in some subsequent invocation of the compiler. We intend to load the PCH data at this address such that the data need not be relocated. The area should be able to hold size bytes. If the host uses
mmap
, fd is an open file descriptor that can be used for probing.
This host hook is called when a PCH file is about to be loaded. We want to load size bytes from fd at offset into memory at address. The given address will be the result of a previous invocation of
HOST_HOOKS_GT_PCH_GET_ADDRESS
. Return −1 if we couldn't allocate size bytes at address. Return 0 if the memory is allocated but the data is not loaded. Return 1 if the hook has performed everything.If the implementation uses reserved address space, free any reserved space beyond size, regardless of the return value. If no PCH will be loaded, this hook may be called with size zero, in which case all reserved address space should be freed.
Do not try to handle values of address that could not have been returned by this executable; just return −1. Such values usually indicate an out-of-date PCH file (built by some other GCC executable), and such a PCH file won't work.
This host hook returns the alignment required for allocating virtual memory. Usually this is the same as getpagesize, but on some hosts the alignment for reserving memory differs from the pagesize for committing memory.
GCC needs to know a number of things about the semantics of the host machine's filesystem. Filesystems with Unix and MS-DOS semantics are automatically detected. For other systems, you can define the following macros in xm-machine.h.
HAVE_DOS_BASED_FILE_SYSTEM
DIR_SEPARATOR
DIR_SEPARATOR_2
However, operating systems like VMS, where constructing a pathname is
more complicated than just stringing together directory names
separated by a special character, should not define either of these
macros.
PATH_SEPARATOR
VMS
HOST_OBJECT_SUFFIX
HOST_EXECUTABLE_SUFFIX
HOST_BIT_BUCKET
UPDATE_PATH_HOST_CANONICALIZE (
path)
DUMPFILE_FORMAT
If you do not define this macro, GCC will use ‘.%02d.’. You should
define this macro if using the default will create an invalid file name.
DELETE_IF_ORDINARY
If you do not define this macro, GCC will use the default version. You
should define this macro if the default version does not reliably remove
the temp file as, for example, on VMS which allows multiple versions
of a file.
HOST_LACKS_INODE_NUMBERS
FATAL_EXIT_CODE
SUCCESS_EXIT_CODE
USE_C_ALLOCA
alloca
provided by libiberty.a. This only affects how some parts of the
compiler itself allocate memory. It does not change code generation.
When GCC is built with a compiler other than itself, the C alloca
is always used. This is because most other implementations have serious
bugs. You should define this macro only on a system where no
stack-based alloca
can possibly work. For instance, if a system
has a small limit on the size of the stack, GCC's builtin alloca
will not work reliably.
COLLECT2_HOST_INITIALIZATION
collect2
is being initialized.
GCC_DRIVER_HOST_INITIALIZATION
HOST_LONG_LONG_FORMAT
long
long
to functions like printf
. The default value is
"ll"
.
HOST_LONG_FORMAT
long
to functions like printf
. The default value is "l"
.
HOST_PTR_PRINTF
void *
to functions like printf
. The default value is "%p"
.
In addition, if configure generates an incorrect definition of any of the macros in auto-host.h, you can override that definition in a host configuration header. If you need to do this, first see if it is possible to fix configure.
When you configure GCC using the configure script, it will construct the file Makefile from the template file Makefile.in. When it does this, it can incorporate makefile fragments from the config directory. These are used to set Makefile parameters that are not amenable to being calculated by autoconf. The list of fragments to incorporate is set by config.gcc (and occasionally config.build and config.host); See System Config.
Fragments are named either t-target or x-host, depending on whether they are relevant to configuring GCC to produce code for a particular target, or to configuring GCC to run on a particular host. Here target and host are mnemonics which usually have some relationship to the canonical system name, but no formal connection.
If these files do not exist, it means nothing needs to be added for a given target or host. Most targets need a few t-target fragments, but needing x-host fragments is rare.
Target makefile fragments can set these Makefile variables.
LIBGCC2_CFLAGS
LIB2FUNCS_EXTRA
CRTSTUFF_T_CFLAGS
CRTSTUFF_T_CFLAGS_S
EXTRA-PARTS
.
See Initialization.
MULTILIB_OPTIONS
The MULTILIB_OPTIONS
macro lists the set of options for which
special versions of libgcc.a must be built. Write options that
are mutually incompatible side by side, separated by a slash. Write
options that may be used together separated by a space. The build
procedure will build all combinations of compatible options.
For example, if you set MULTILIB_OPTIONS
to ‘m68000/m68020
msoft-float’, Makefile will build special versions of
libgcc.a using the following sets of options: -m68000,
-m68020, -msoft-float, ‘-m68000 -msoft-float’, and
‘-m68020 -msoft-float’.
MULTILIB_DIRNAMES
MULTILIB_OPTIONS
is used, this variable specifies the
directory names that should be used to hold the various libraries.
Write one element in MULTILIB_DIRNAMES
for each element in
MULTILIB_OPTIONS
. If MULTILIB_DIRNAMES
is not used, the
default value will be MULTILIB_OPTIONS
, with all slashes treated
as spaces.
MULTILIB_DIRNAMES
describes the multilib directories using GCC
conventions and is applied to directories that are part of the GCC
installation. When multilib-enabled, the compiler will add a
subdirectory of the form prefix/multilib before each
directory in the search path for libraries and crt files.
For example, if MULTILIB_OPTIONS
is set to ‘m68000/m68020
msoft-float’, then the default value of MULTILIB_DIRNAMES
is
‘m68000 m68020 msoft-float’. You may specify a different value if
you desire a different set of directory names.
MULTILIB_MATCHES
MULTILIB_OPTIONS
, GCC needs to know about
any synonyms. In that case, set MULTILIB_MATCHES
to a list of
items of the form ‘option=option’ to describe all relevant
synonyms. For example, ‘m68000=mc68000 m68020=mc68020’.
MULTILIB_EXCEPTIONS
MULTILIB_OPTIONS
being
specified, there are combinations that should not be built. In that
case, set MULTILIB_EXCEPTIONS
to be all of the switch exceptions
in shell case syntax that should not be built.
For example the ARM processor cannot execute both hardware floating
point instructions and the reduced size THUMB instructions at the same
time, so there is no need to build libraries with both of these
options enabled. Therefore MULTILIB_EXCEPTIONS
is set to:
*mthumb/*mhard-float*
MULTILIB_REQUIRED
MULTILIB_EXCEPTIONS
list to
cover all undesired ones. In such a case, just listing all the required
combinations in MULTILIB_REQUIRED
would be more straightforward.
The way to specify the entries in MULTILIB_REQUIRED
is same with
the way used for MULTILIB_EXCEPTIONS
, only this time what are
required will be specified. Suppose there are multiple sets of
MULTILIB_OPTIONS
and only two combinations are required, one
for ARMv7-M and one for ARMv7-R with hard floating-point ABI and FPU, the
MULTILIB_REQUIRED
can be set to:
MULTILIB_REQUIRED
= mthumb/march=armv7-mMULTILIB_REQUIRED
+= march=armv7-r/mfloat-abi=hard/mfpu=vfpv3-d16
The MULTILIB_REQUIRED
can be used together with
MULTILIB_EXCEPTIONS
. The option combinations generated from
MULTILIB_OPTIONS
will be filtered by MULTILIB_EXCEPTIONS
and then by MULTILIB_REQUIRED
.
MULTILIB_REUSE
MULTILIB_REUSE
.
A reuse rule is comprised of two parts connected by equality sign. The left part
is option set used to build multilib and the right part is option set that will
reuse this multilib. The order of options in the left part matters and should be
same with those specified in MULTILIB_REQUIRED
or aligned with order in
MULTILIB_OPTIONS
. There is no such limitation for options in right part
as we don't build multilib from them. But the equality sign in both parts should
be replaced with period.
The MULTILIB_REUSE
is different from MULTILIB_MATCHES
in that it
sets up relations between two option sets rather than two options. Here is an
example to demo how we reuse libraries built in Thumb mode for applications built
in ARM mode:
MULTILIB_REUSE
= mthumb/march.armv7-r=marm/march.armv7-r
Before the advent of MULTILIB_REUSE
, GCC select multilib by comparing command
line options with options used to build multilib. The MULTILIB_REUSE
is
complementary to that way. Only when the original comparison matches nothing it will
work to see if it is OK to reuse some existing multilib.
MULTILIB_EXTRA_OPTS
MULTILIB_EXTRA_OPTS
to be the list
of options to be used for all builds. If you set this, you should
probably set CRTSTUFF_T_CFLAGS
to a dash followed by it.
MULTILIB_OSDIRNAMES
MULTILIB_OPTIONS
is used, this variable specifies
a list of subdirectory names, that are used to modify the search
path depending on the chosen multilib. Unlike MULTILIB_DIRNAMES
,
MULTILIB_OSDIRNAMES
describes the multilib directories using
operating systems conventions, and is applied to the directories such as
lib
or those in the LIBRARY_PATH environment variable.
The format is either the same as of
MULTILIB_DIRNAMES
, or a set of mappings. When it is the same
as MULTILIB_DIRNAMES
, it describes the multilib directories
using operating system conventions, rather than GCC conventions. When it is a set
of mappings of the form gccdir=osdir, the left side gives
the GCC convention and the right gives the equivalent OS defined
location. If the osdir part begins with a ‘!’,
GCC will not search in the non-multilib directory and use
exclusively the multilib directory. Otherwise, the compiler will
examine the search path for libraries and crt files twice; the first
time it will add multilib to each directory in the search path,
the second it will not.
For configurations that support both multilib and multiarch,
MULTILIB_OSDIRNAMES
also encodes the multiarch name, thus
subsuming MULTIARCH_DIRNAME
. The multiarch name is appended to
each directory name, separated by a colon (e.g.
‘../lib32:i386-linux-gnu’).
Each multiarch subdirectory will be searched before the corresponding OS
multilib directory, for example ‘/lib/i386-linux-gnu’ before
‘/lib/../lib32’. The multiarch name will also be used to modify the
system header search path, as explained for MULTIARCH_DIRNAME
.
MULTIARCH_DIRNAME
The multiarch name is used to augment the search path for libraries, crt
files and system header files with additional locations. The compiler
will add a multiarch subdirectory of the form
prefix/multiarch before each directory in the library and
crt search path. It will also add two directories
LOCAL_INCLUDE_DIR
/multiarch and
NATIVE_SYSTEM_HEADER_DIR
/multiarch) to the system header
search path, respectively before LOCAL_INCLUDE_DIR
and
NATIVE_SYSTEM_HEADER_DIR
.
MULTIARCH_DIRNAME
is not used for configurations that support
both multilib and multiarch. In that case, multiarch names are encoded
in MULTILIB_OSDIRNAMES
instead.
More documentation about multiarch can be found at https://wiki.debian.org/Multiarch.
SPECS
MULTILIB_EXTRA_OPTS
is not enough, since
it does not affect the build of target libraries, at least not the
build of the default multilib. One possible work-around is to use
DRIVER_SELF_SPECS
to bring options from the specs file
as if they had been passed in the compiler driver command line.
However, you don't want to be adding these options after the toolchain
is installed, so you can instead tweak the specs file that will
be used during the toolchain build, while you still install the
original, built-in specs. The trick is to set SPECS
to
some other filename (say specs.install), that will then be
created out of the built-in specs, and introduce a Makefile
rule to generate the specs file that's going to be used at
build time out of your specs.install.
T_CFLAGS
The use of x-host fragments is discouraged. You should only use it for makefile dependencies.
collect2
GCC uses a utility called collect2
on nearly all systems to arrange
to call various initialization functions at start time.
The program collect2
works by linking the program once and
looking through the linker output file for symbols with particular names
indicating they are constructor functions. If it finds any, it
creates a new temporary ‘.c’ file containing a table of them,
compiles it, and links the program a second time including that file.
The actual calls to the constructors are carried out by a subroutine
called __main
, which is called (automatically) at the beginning
of the body of main
(provided main
was compiled with GNU
CC). Calling __main
is necessary, even when compiling C code, to
allow linking C and C++ object code together. (If you use
-nostdlib, you get an unresolved reference to __main
,
since it's defined in the standard GCC library. Include -lgcc at
the end of your compiler command line to resolve this reference.)
The program collect2
is installed as ld
in the directory
where the passes of the compiler are installed. When collect2
needs to find the real ld
, it tries the following file
names:
PATH
.
REAL_LD_FILE_NAME
configuration macro,
if specified.
collect2
will not execute itself recursively.
PATH
.
“The compiler's search directories” means all the directories where gcc searches for passes of the compiler. This includes directories that you specify with -B.
Cross-compilers search a little differently:
PATH
.
REAL_LD_FILE_NAME
configuration macro,
if specified.
PATH
.
collect2
explicitly avoids running ld
using the file name
under which collect2
itself was invoked. In fact, it remembers
up a list of such names—in case one copy of collect2
finds
another copy (or version) of collect2
installed as ld
in a
second place in the search path.
collect2
searches for the utilities nm
and strip
using the same algorithm as above for ld
.
GCC_INCLUDE_DIR
means the same thing for native and cross. It is
where GCC stores its private include files, and also where GCC
stores the fixed include files. A cross compiled GCC runs
fixincludes
on the header files in $(tooldir)/include.
(If the cross compilation header files need to be fixed, they must be
installed before GCC is built. If the cross compilation header files
are already suitable for GCC, nothing special need be done).
GPLUSPLUS_INCLUDE_DIR
means the same thing for native and cross. It
is where g++ looks first for header files. The C++ library
installs only target independent header files in that directory.
LOCAL_INCLUDE_DIR
is used only by native compilers. GCC
doesn't install anything there. It is normally
/usr/local/include. This is where local additions to a packaged
system should place header files.
CROSS_INCLUDE_DIR
is used only by cross compilers. GCC
doesn't install anything there.
TOOL_INCLUDE_DIR
is used for both native and cross compilers. It
is the place for other packages to install header files that GCC will
use. For a cross-compiler, this is the equivalent of
/usr/include. When you build a cross-compiler,
fixincludes
processes any header files in this directory.
GCC uses some fairly sophisticated memory management techniques, which involve determining information about GCC's data structures from GCC's source code and using this information to perform garbage collection and implement precompiled headers.
A full C++ parser would be too complicated for this task, so a limited
subset of C++ is interpreted and special markers are used to determine
what parts of the source to look at. All struct
, union
and template
structure declarations that define data structures
that are allocated under control of the garbage collector must be
marked. All global variables that hold pointers to garbage-collected
memory must also be marked. Finally, all global variables that need
to be saved and restored by a precompiled header must be marked. (The
precompiled header mechanism can only save static variables if they're
scalar. Complex data structures must be allocated in garbage-collected
memory to be saved in a precompiled header.)
The full format of a marker is
GTY (([option] [(param)], [option] [(param)] ...))
but in most cases no options are needed. The outer double parentheses
are still necessary, though: GTY(())
. Markers can appear:
static
or
extern
; and
Here are some examples of marking simple data structures and globals.
struct GTY(()) tag { fields... }; typedef struct GTY(()) tag { fields... } *typename; static GTY(()) struct tag *list; /* points to GC memory */ static GTY(()) int counter; /* save counter in a PCH */
The parser understands simple typedefs such as
typedef struct
tag *
name;
and
typedef int
name;
.
These don't need to be marked.
Since gengtype
's understanding of C++ is limited, there are
several constructs and declarations that are not supported inside
classes/structures marked for automatic GC code generation. The
following C++ constructs produce a gengtype
error on
structures/classes marked for automatic GC code generation:
If you have a class or structure using any of the above constructs,
you need to mark that class as GTY ((user))
and provide your
own marking routines (see section User GC for details).
It is always valid to include function definitions inside classes.
Those are always ignored by gengtype
, as it only cares about
data members.
GTY(())
Sometimes the C code is not enough to fully describe the type
structure. Extra information can be provided with GTY
options
and additional markers. Some options take a parameter, which may be
either a string or a type name, depending on the parameter. If an
option takes no parameter, it is acceptable either to omit the
parameter entirely, or to provide an empty string as a parameter. For
example, GTY ((skip))
and GTY ((skip ("")))
are
equivalent.
When the parameter is a string, often it is a fragment of C code. Four special escapes may be used in these strings, to refer to pieces of the data structure being marked:
%h
%1
%0
%a
[i1][i2]...
that indexes
the array item currently being marked.
For instance, suppose that you have a structure of the form
struct A { ... }; struct B { struct A foo[12]; };
and b
is a variable of type struct B
. When marking
‘b.foo[11]’, %h
would expand to ‘b.foo[11]’,
%0
and %1
would both expand to ‘b’, and %a
would expand to ‘[11]’.
As in ordinary C, adjacent strings will be concatenated; this is helpful when you have a complicated expression.
GTY ((chain_next ("TREE_CODE (&%h.generic) == INTEGER_TYPE" " ? TYPE_NEXT_VARIANT (&%h.generic)" " : TREE_CHAIN (&%h.generic)")))
length ("
expression")
struct GTY(()) rtvec_def {
int num_elem; /* number of elements */
rtx GTY ((length ("%h.num_elem"))) elem[1];
};
In this case, the length
option is used to override the specified
array length (which should usually be 1
). The parameter of the
option is a fragment of C code that calculates the length.
The second case is when a structure or a global variable contains a pointer to an array, like this:
struct gimple_omp_for_iter * GTY((length ("%h.collapse"))) iter;
In this case, iter
has been allocated by writing something like
x->iter = ggc_alloc_cleared_vec_gimple_omp_for_iter (collapse);
and the collapse
provides the length of the field.
This second use of length
also works on global variables, like:
static GTY((length("reg_known_value_size"))) rtx *reg_known_value;
Note that the length
option is only meant for use with arrays of
non-atomic objects, that is, objects that contain pointers pointing to
other GTY-managed objects. For other GC-allocated arrays and strings
you should use atomic
.
skip
skip
is applied to a field, the type machinery will ignore it.
This is somewhat dangerous; the only safe use is in a union when one
field really isn't ever used.
Use this to mark types that need to be marked by user gc routines, but are not refered to in a template argument. So if you have some user gc type T1 and a non user gc type T2 you can give T2 the for_user option so that the marking functions for T1 can call non mangled functions to mark T2.
desc ("
expression")
tag ("
constant")
default
union
is
currently active. This is done by giving each field a constant
tag
value, and then specifying a discriminator using desc
.
The value of the expression given by desc
is compared against
each tag
value, each of which should be different. If no
tag
is matched, the field marked with default
is used if
there is one, otherwise no field in the union will be marked.
In the desc
option, the “current structure” is the union that
it discriminates. Use %1
to mean the structure containing it.
There are no escapes available to the tag
option, since it is a
constant.
For example,
struct GTY(()) tree_binding { struct tree_common common; union tree_binding_u { tree GTY ((tag ("0"))) scope; struct cp_binding_level * GTY ((tag ("1"))) level; } GTY ((desc ("BINDING_HAS_LEVEL_P ((tree)&%0)"))) xscope; tree value; };
In this example, the value of BINDING_HAS_LEVEL_P when applied to a
struct tree_binding *
is presumed to be 0 or 1. If 1, the type
mechanism will treat the field level
as being present and if 0,
will treat the field scope
as being present.
The desc
and tag
options can also be used for inheritance
to denote which subclass an instance is. See Inheritance and GTY
for more information.
cache
cache
option is applied to a global variable gt_clear_cache is
called on that variable between the mark and sweep phases of garbage
collection. The gt_clear_cache function is free to mark blocks as used, or to
clear pointers in the variable.
deletable
deletable
, when applied to a global variable, indicates that when
garbage collection runs, there's no need to mark anything pointed to
by this variable, it can just be set to NULL
instead. This is used
to keep a list of free structures around for re-use.
maybe_undef
maybe_undef
indicates that it's OK if
the structure that this fields points to is never defined, so long as
this field is always NULL
. This is used to avoid requiring
backends to define certain optional structures. It doesn't work with
language frontends.
nested_ptr (
type, "
to expression", "
from expression")
%h
escape.
chain_next ("
expression")
chain_prev ("
expression")
chain_circular ("
expression")
chain_next
is an expression for the next item in the list,
chain_prev
is an expression for the previous item. For singly
linked lists, use only chain_next
; for doubly linked lists, use
both. The machinery requires that taking the next item of the
previous item gives the original item. chain_circular
is similar
to chain_next
, but can be used for circular single linked lists.
reorder ("
function name")
reorder
option, before
changing the pointers in the object that's pointed to by the field the
option applies to. The function must take four arguments, with the
signature ‘void *, void *, gt_pointer_operator, void *’.
The first parameter is a pointer to the structure that contains the
object being updated, or the object itself if there is no containing
structure. The second parameter is a cookie that should be ignored.
The third parameter is a routine that, given a pointer, will update it
to its correct new value. The fourth parameter is a cookie that must
be passed to the second parameter.
PCH cannot handle data structures that depend on the absolute values
of pointers. reorder
functions can be expensive. When
possible, it is better to depend on properties of the data, like an ID
number or the hash of a string instead.
atomic
atomic
option can only be used with pointers. It informs
the GC machinery that the memory that the pointer points to does not
contain any pointers, and hence it should be treated by the GC and PCH
machinery as an “atomic” block of memory that does not need to be
examined when scanning memory for pointers. In particular, the
machinery will not scan that memory for pointers to mark them as
reachable (when marking pointers for GC) or to relocate them (when
writing a PCH file).
The atomic
option differs from the skip
option.
atomic
keeps the memory under Garbage Collection, but makes the
GC ignore the contents of the memory. skip
is more drastic in
that it causes the pointer and the memory to be completely ignored by
the Garbage Collector. So, memory marked as atomic
is
automatically freed when no longer reachable, while memory marked as
skip
is not.
The atomic
option must be used with great care, because all
sorts of problem can occur if used incorrectly, that is, if the memory
the pointer points to does actually contain a pointer.
Here is an example of how to use it:
struct GTY(()) my_struct { int number_of_elements; unsigned int * GTY ((atomic)) elements; };
In this case, elements
is a pointer under GC, and the memory it
points to needs to be allocated using the Garbage Collector, and will
be freed automatically by the Garbage Collector when it is no longer
referenced. But the memory that the pointer points to is an array of
unsigned int
elements, and the GC must not try to scan it to
find pointers to mark or relocate, which is why it is marked with the
atomic
option.
Note that, currently, global variables can not be marked with
atomic
; only fields of a struct can. This is a known
limitation. It would be useful to be able to mark global pointers
with atomic
to make the PCH machinery aware of them so that
they are saved and restored correctly to PCH files.
special ("
name")
special
option is used to mark types that have to be dealt
with by special case machinery. The parameter is the name of the
special case. See gengtype.c for further details. Avoid
adding new special cases unless there is no other alternative.
user
user
option indicates that the code to mark structure
fields is completely handled by user-provided routines. See section
User GC for details on what functions need to be provided.
gengtype has some support for simple class hierarchies. You can use this to have gengtype autogenerate marking routines, provided:
If your class hierarchy does not fit in this pattern, you must use User GC instead.
The base class and its discriminator must be identified using the “desc” option. Each concrete subclass must use the “tag” option to identify which value of the discriminator it corresponds to.
Every class in the hierarchy must have a GTY(())
marker, as
gengtype will only attempt to parse classes that have such a marker
6.
class GTY((desc("%h.kind"), tag("0"))) example_base { public: int kind; tree a; }; class GTY((tag("1"))) some_subclass : public example_base { public: tree b; }; class GTY((tag("2"))) some_other_subclass : public example_base { public: tree c; };
The generated marking routines for the above will contain a “switch” on “kind”, visiting all appropriate fields. For example, if kind is 2, it will cast to “some_other_subclass” and visit fields a, b, and c.
The garbage collector supports types for which no automatic marking code is generated. For these types, the user is required to provide three functions: one to act as a marker for garbage collection, and two functions to act as marker and pointer walker for pre-compiled headers.
Given a structure struct GTY((user)) my_struct
, the following functions
should be defined to mark my_struct
:
void gt_ggc_mx (my_struct *p) { /* This marks field 'fld'. */ gt_ggc_mx (p->fld); } void gt_pch_nx (my_struct *p) { /* This marks field 'fld'. */ gt_pch_nx (tp->fld); } void gt_pch_nx (my_struct *p, gt_pointer_operator op, void *cookie) { /* For every field 'fld', call the given pointer operator. */ op (&(tp->fld), cookie); }
In general, each marker M
should call M
for every
pointer field in the structure. Fields that are not allocated in GC
or are not pointers must be ignored.
For embedded lists (e.g., structures with a next
or prev
pointer), the marker must follow the chain and mark every element in
it.
Note that the rules for the pointer walker gt_pch_nx (my_struct
*, gt_pointer_operator, void *)
are slightly different. In this
case, the operation op
must be applied to the address of
every pointer field.
When a template type TP
is marked with GTY
, all
instances of that type are considered user-provided types. This means
that the individual instances of TP
do not need to be marked
with GTY
. The user needs to provide template functions to mark
all the fields of the type.
The following code snippets represent all the functions that need to
be provided. Note that type TP
may reference to more than one
type. In these snippets, there is only one type T
, but there
could be more.
template<typename T> void gt_ggc_mx (TP<T> *tp) { extern void gt_ggc_mx (T&); /* This marks field 'fld' of type 'T'. */ gt_ggc_mx (tp->fld); } template<typename T> void gt_pch_nx (TP<T> *tp) { extern void gt_pch_nx (T&); /* This marks field 'fld' of type 'T'. */ gt_pch_nx (tp->fld); } template<typename T> void gt_pch_nx (TP<T *> *tp, gt_pointer_operator op, void *cookie) { /* For every field 'fld' of 'tp' with type 'T *', call the given pointer operator. */ op (&(tp->fld), cookie); } template<typename T> void gt_pch_nx (TP<T> *tp, gt_pointer_operator, void *cookie) { extern void gt_pch_nx (T *, gt_pointer_operator, void *); /* For every field 'fld' of 'tp' with type 'T', call the pointer walker for all the fields of T. */ gt_pch_nx (&(tp->fld), op, cookie); }
Support for user-defined types is currently limited. The following restrictions apply:
TP
and all the argument types T
must be
marked with GTY
.
TP
can only have type names in its argument list.
TP<T>
and
TP<T *>
. In the case of TP<T>
, references to
T
must be handled by calling gt_pch_nx
(which
will, in turn, walk all the pointers inside fields of T
).
In the case of TP<T *>
, references to T *
must be
handled by calling the op
function on the address of the
pointer (see the code snippets above).
In addition to keeping track of types, the type machinery also locates the global variables (roots) that the garbage collector starts at. Roots must be declared using one of the following syntaxes:
extern GTY(([
options]))
type name;
static GTY(([
options]))
type name;
GTY(([
options]))
type name;
extern
declaration
of such a variable in a header somewhere—mark that, not the
definition. Or, if the variable is only used in one file, make it
static
.
Whenever you add GTY
markers to a source file that previously
had none, or create a new source file containing GTY
markers,
there are three things you need to do:
target_gtfiles
in
the appropriate port's entries in config.gcc.
GTFILES
variable in Makefile.in.
gtfiles
variable defined in the appropriate
config-lang.in.
Headers should appear before non-headers in this list.
gtfiles
variable of all the front ends
that use it.
ifiles
in open_base_file
in gengtype.c.
For source files that aren't header files, the machinery will generate a header file that should be included in the source file you just changed. The file will be called gt-path.h where path is the pathname relative to the gcc directory with slashes replaced by -, so for example the header file to be included in cp/parser.c is called gt-cp-parser.c. The generated header file should be included after everything else in the source file. Don't forget to mention this file as a dependency in the Makefile!
For language frontends, there is another file that needs to be included somewhere. It will be called gtype-lang.h, where lang is the name of the subdirectory the language is contained in.
Plugins can add additional root tables. Run the gengtype
utility in plugin mode as gengtype -P pluginout.h
source-dir
file-list plugin*.c with your plugin files
plugin*.c using GTY
to generate the pluginout.h file.
The GCC build tree is needed to be present in that mode.
The GCC garbage collector GGC is only invoked explicitly. In contrast
with many other garbage collectors, it is not implicitly invoked by
allocation routines when a lot of memory has been consumed. So the
only way to have GGC reclaim storage is to call the ggc_collect
function explicitly. This call is an expensive operation, as it may
have to scan the entire heap. Beware that local variables (on the GCC
call stack) are not followed by such an invocation (as many other
garbage collectors do): you should reference all your data from static
or external GTY
-ed variables, and it is advised to call
ggc_collect
with a shallow call stack. The GGC is an exact mark
and sweep garbage collector (so it does not scan the call stack for
pointers). In practice GCC passes don't often call ggc_collect
themselves, because it is called by the pass manager between passes.
At the time of the ggc_collect
call all pointers in the GC-marked
structures must be valid or NULL
. In practice this means that
there should not be uninitialized pointer fields in the structures even
if your code never reads or writes those fields at a particular
instance. One way to ensure this is to use cleared versions of
allocators unless all the fields are initialized manually immediately
after allocation.
With the current garbage collector implementation, most issues should show up as GCC compilation errors. Some of the most commonly encountered issues are described below.
GTY
-marked type.
Gengtype checks if there is at least one possible path from GC roots to
at least one instance of each type before outputting allocators. If
there is no such path, the GTY
markers will be ignored and no
allocators will be output. Solve this by making sure that there exists
at least one such path. If creating it is unfeasible or raises a “code
smell”, consider if you really must use GC for allocating such type.
gt_ggc_r_foo_bar
and
similarly-named symbols. Check if your foo_bar source file has
#include "gt-foo_bar.h"
as its very last line.
GCC plugins are loadable modules that provide extra features to the compiler. Like GCC itself they can be distributed in source and binary forms.
GCC plugins provide developers with a rich subset of the GCC API to allow them to extend GCC as they see fit. Whether it is writing an additional optimization pass, transforming code, or analyzing information, plugins can be quite useful.
Plugins are supported on platforms that support -ldl
-rdynamic. They are loaded by the compiler using dlopen
and invoked at pre-determined locations in the compilation
process.
Plugins are loaded with
-fplugin=/path/to/name.so -fplugin-arg-name-key1[=value1]
The plugin arguments are parsed by GCC and passed to respective plugins as key-value pairs. Multiple plugins can be invoked by specifying multiple -fplugin arguments.
A plugin can be simply given by its short name (no dots or slashes). When simply passing -fplugin=name, the plugin is loaded from the plugin directory, so -fplugin=name is the same as -fplugin=`gcc -print-file-name=plugin`/name.so, using backquote shell syntax to query the plugin directory.
Plugins are activated by the compiler at specific events as defined in
gcc-plugin.h. For each event of interest, the plugin should
call register_callback
specifying the name of the event and
address of the callback function that will handle that event.
The header gcc-plugin.h must be the first gcc header to be included.
Every plugin should define the global symbol plugin_is_GPL_compatible
to assert that it has been licensed under a GPL-compatible license.
If this symbol does not exist, the compiler will emit a fatal error
and exit with the error message:
fatal error: plugin name is not licensed under a GPL-compatible license name: undefined symbol: plugin_is_GPL_compatible compilation terminated
The declared type of the symbol should be int, to match a forward declaration in gcc-plugin.h that suppresses C++ mangling. It does not need to be in any allocated section, though. The compiler merely asserts that the symbol exists in the global scope. Something like this is enough:
int plugin_is_GPL_compatible;
Every plugin should export a function called plugin_init
that
is called right after the plugin is loaded. This function is
responsible for registering all the callbacks required by the plugin
and do any other required initialization.
This function is called from compile_file
right before invoking
the parser. The arguments to plugin_init
are:
plugin_info
: Plugin invocation information.
version
: GCC version.
The plugin_info
struct is defined as follows:
struct plugin_name_args { char *base_name; /* Short name of the plugin (filename without .so suffix). */ const char *full_name; /* Path to the plugin as specified with -fplugin=. */ int argc; /* Number of arguments specified with -fplugin-arg-.... */ struct plugin_argument *argv; /* Array of ARGC key-value pairs. */ const char *version; /* Version string provided by plugin. */ const char *help; /* Help string provided by plugin. */ }
If initialization fails, plugin_init
must return a non-zero
value. Otherwise, it should return 0.
The version of the GCC compiler loading the plugin is described by the following structure:
struct plugin_gcc_version { const char *basever; const char *datestamp; const char *devphase; const char *revision; const char *configuration_arguments; };
The function plugin_default_version_check
takes two pointers to
such structure and compare them field by field. It can be used by the
plugin's plugin_init
function.
The version of GCC used to compile the plugin can be found in the symbol
gcc_version
defined in the header plugin-version.h. The
recommended version check to perform looks like
#include "plugin-version.h" ... int plugin_init (struct plugin_name_args *plugin_info, struct plugin_gcc_version *version) { if (!plugin_default_version_check (version, &gcc_version)) return 1; }
but you can also check the individual fields if you want a less strict check.
Callback functions have the following prototype:
/* The prototype for a plugin callback function. gcc_data - event-specific data provided by GCC user_data - plugin-specific data provided by the plug-in. */ typedef void (*plugin_callback_func)(void *gcc_data, void *user_data);
Callbacks can be invoked at the following pre-determined events:
enum plugin_event { PLUGIN_START_PARSE_FUNCTION, /* Called before parsing the body of a function. */ PLUGIN_FINISH_PARSE_FUNCTION, /* After finishing parsing a function. */ PLUGIN_PASS_MANAGER_SETUP, /* To hook into pass manager. */ PLUGIN_FINISH_TYPE, /* After finishing parsing a type. */ PLUGIN_FINISH_DECL, /* After finishing parsing a declaration. */ PLUGIN_FINISH_UNIT, /* Useful for summary processing. */ PLUGIN_PRE_GENERICIZE, /* Allows to see low level AST in C and C++ frontends. */ PLUGIN_FINISH, /* Called before GCC exits. */ PLUGIN_INFO, /* Information about the plugin. */ PLUGIN_GGC_START, /* Called at start of GCC Garbage Collection. */ PLUGIN_GGC_MARKING, /* Extend the GGC marking. */ PLUGIN_GGC_END, /* Called at end of GGC. */ PLUGIN_REGISTER_GGC_ROOTS, /* Register an extra GGC root table. */ PLUGIN_ATTRIBUTES, /* Called during attribute registration */ PLUGIN_START_UNIT, /* Called before processing a translation unit. */ PLUGIN_PRAGMAS, /* Called during pragma registration. */ /* Called before first pass from all_passes. */ PLUGIN_ALL_PASSES_START, /* Called after last pass from all_passes. */ PLUGIN_ALL_PASSES_END, /* Called before first ipa pass. */ PLUGIN_ALL_IPA_PASSES_START, /* Called after last ipa pass. */ PLUGIN_ALL_IPA_PASSES_END, /* Allows to override pass gate decision for current_pass. */ PLUGIN_OVERRIDE_GATE, /* Called before executing a pass. */ PLUGIN_PASS_EXECUTION, /* Called before executing subpasses of a GIMPLE_PASS in execute_ipa_pass_list. */ PLUGIN_EARLY_GIMPLE_PASSES_START, /* Called after executing subpasses of a GIMPLE_PASS in execute_ipa_pass_list. */ PLUGIN_EARLY_GIMPLE_PASSES_END, /* Called when a pass is first instantiated. */ PLUGIN_NEW_PASS, /* Called when a file is #include-d or given via the #line directive. This could happen many times. The event data is the included file path, as a const char* pointer. */ PLUGIN_INCLUDE_FILE, PLUGIN_EVENT_FIRST_DYNAMIC /* Dummy event used for indexing callback array. */ };
In addition, plugins can also look up the enumerator of a named event,
and / or generate new events dynamically, by calling the function
get_named_event_id
.
To register a callback, the plugin calls register_callback
with
the arguments:
char *name
: Plugin name.
int event
: The event code.
plugin_callback_func callback
: The function that handles event
.
void *user_data
: Pointer to plugin-specific data.
For the PLUGIN_PASS_MANAGER_SETUP, PLUGIN_INFO, and
PLUGIN_REGISTER_GGC_ROOTS pseudo-events the callback
should be null,
and the user_data
is specific.
When the PLUGIN_PRAGMAS event is triggered (with a null pointer as
data from GCC), plugins may register their own pragmas. Notice that
pragmas are not available from lto1, so plugins used with
-flto
option to GCC during link-time optimization cannot use
pragmas and do not even see functions like c_register_pragma
or
pragma_lex
.
The PLUGIN_INCLUDE_FILE event, with a const char*
file path as
GCC data, is triggered for processing of #include
or
#line
directives.
The PLUGIN_FINISH event is the last time that plugins can call GCC
functions, notably emit diagnostics with warning
, error
etc.
There needs to be a way to add/reorder/remove passes dynamically. This is useful for both analysis plugins (plugging in after a certain pass such as CFG or an IPA pass) and optimization plugins.
Basic support for inserting new passes or replacing existing passes is
provided. A plugin registers a new pass with GCC by calling
register_callback
with the PLUGIN_PASS_MANAGER_SETUP
event and a pointer to a struct register_pass_info
object defined as follows
enum pass_positioning_ops { PASS_POS_INSERT_AFTER, // Insert after the reference pass. PASS_POS_INSERT_BEFORE, // Insert before the reference pass. PASS_POS_REPLACE // Replace the reference pass. }; struct register_pass_info { struct opt_pass *pass; /* New pass provided by the plugin. */ const char *reference_pass_name; /* Name of the reference pass for hooking up the new pass. */ int ref_pass_instance_number; /* Insert the pass at the specified instance number of the reference pass. */ /* Do it for every instance if it is 0. */ enum pass_positioning_ops pos_op; /* how to insert the new pass. */ }; /* Sample plugin code that registers a new pass. */ int plugin_init (struct plugin_name_args *plugin_info, struct plugin_gcc_version *version) { struct register_pass_info pass_info; ... /* Code to fill in the pass_info object with new pass information. */ ... /* Register the new pass. */ register_callback (plugin_info->base_name, PLUGIN_PASS_MANAGER_SETUP, NULL, &pass_info); ... }
Some plugins may want to be informed when GGC (the GCC Garbage
Collector) is running. They can register callbacks for the
PLUGIN_GGC_START
and PLUGIN_GGC_END
events (for which
the callback is called with a null gcc_data
) to be notified of
the start or end of the GCC garbage collection.
Some plugins may need to have GGC mark additional data. This can be
done by registering a callback (called with a null gcc_data
)
for the PLUGIN_GGC_MARKING
event. Such callbacks can call the
ggc_set_mark
routine, preferably through the ggc_mark
macro
(and conversely, these routines should usually not be used in plugins
outside of the PLUGIN_GGC_MARKING
event). Plugins that wish to hold
weak references to gc data may also use this event to drop weak references when
the object is about to be collected. The ggc_marked_p
function can be
used to tell if an object is marked, or is about to be collected. The
gt_clear_cache
overloads which some types define may also be of use in
managing weak references.
Some plugins may need to add extra GGC root tables, e.g. to handle their own
GTY
-ed data. This can be done with the PLUGIN_REGISTER_GGC_ROOTS
pseudo-event with a null callback and the extra root table (of type struct
ggc_root_tab*
) as user_data
. Running the
gengtype -p
source-dir file-list plugin*.c ...
utility generates these extra root tables.
You should understand the details of memory management inside GCC
before using PLUGIN_GGC_MARKING
or PLUGIN_REGISTER_GGC_ROOTS
.
A plugin should give some information to the user about itself. This uses the following structure:
struct plugin_info { const char *version; const char *help; };
Such a structure is passed as the user_data
by the plugin's
init routine using register_callback
with the
PLUGIN_INFO
pseudo-event and a null callback.
For analysis (or other) purposes it is useful to be able to add custom attributes or pragmas.
The PLUGIN_ATTRIBUTES
callback is called during attribute
registration. Use the register_attribute
function to register
custom attributes.
/* Attribute handler callback */ static tree handle_user_attribute (tree *node, tree name, tree args, int flags, bool *no_add_attrs) { return NULL_TREE; } /* Attribute definition */ static struct attribute_spec user_attr = { "user", 1, 1, false, false, false, handle_user_attribute, false }; /* Plugin callback called during attribute registration. Registered with register_callback (plugin_name, PLUGIN_ATTRIBUTES, register_attributes, NULL) */ static void register_attributes (void *event_data, void *data) { warning (0, G_("Callback to register attributes")); register_attribute (&user_attr); }
The PLUGIN_PRAGMAS callback is called once during pragmas
registration. Use the c_register_pragma
,
c_register_pragma_with_data
,
c_register_pragma_with_expansion
,
c_register_pragma_with_expansion_and_data
functions to register
custom pragmas and their handlers (which often want to call
pragma_lex
) from c-family/c-pragma.h.
/* Plugin callback called during pragmas registration. Registered with register_callback (plugin_name, PLUGIN_PRAGMAS, register_my_pragma, NULL); */ static void register_my_pragma (void *event_data, void *data) { warning (0, G_("Callback to register pragmas")); c_register_pragma ("GCCPLUGIN", "sayhello", handle_pragma_sayhello); }
It is suggested to pass "GCCPLUGIN"
(or a short name identifying
your plugin) as the “space” argument of your pragma.
Pragmas registered with c_register_pragma_with_expansion
or
c_register_pragma_with_expansion_and_data
support
preprocessor expansions. For example:
#define NUMBER 10 #pragma GCCPLUGIN foothreshold (NUMBER)
The event PLUGIN_PASS_EXECUTION passes the pointer to the executed pass
(the same as current_pass) as gcc_data
to the callback. You can also
inspect cfun to find out about which function this pass is executed for.
Note that this event will only be invoked if the gate check (if
applicable, modified by PLUGIN_OVERRIDE_GATE) succeeds.
You can use other hooks, like PLUGIN_ALL_PASSES_START
,
PLUGIN_ALL_PASSES_END
, PLUGIN_ALL_IPA_PASSES_START
,
PLUGIN_ALL_IPA_PASSES_END
, PLUGIN_EARLY_GIMPLE_PASSES_START
,
and/or PLUGIN_EARLY_GIMPLE_PASSES_END
to manipulate global state
in your plugin(s) in order to get context for the pass execution.
After the original gate function for a pass is called, its result
- the gate status - is stored as an integer.
Then the event PLUGIN_OVERRIDE_GATE
is invoked, with a pointer
to the gate status in the gcc_data
parameter to the callback function.
A nonzero value of the gate status means that the pass is to be executed.
You can both read and write the gate status via the passed pointer.
When your plugin is loaded, you can inspect the various
pass lists to determine what passes are available. However, other
plugins might add new passes. Also, future changes to GCC might cause
generic passes to be added after plugin loading.
When a pass is first added to one of the pass lists, the event
PLUGIN_NEW_PASS
is invoked, with the callback parameter
gcc_data
pointing to the new pass.
If plugins are enabled, GCC installs the headers needed to build a plugin (somewhere in the installation tree, e.g. under /usr/local). In particular a plugin/include directory is installed, containing all the header files needed to build plugins.
On most systems, you can query this plugin
directory by
invoking gcc -print-file-name=plugin (replace if needed
gcc with the appropriate program path).
Inside plugins, this plugin
directory name can be queried by
calling default_plugin_dir_name ()
.
Plugins may know, when they are compiled, the GCC version for which
plugin-version.h is provided. The constant macros
GCCPLUGIN_VERSION_MAJOR
, GCCPLUGIN_VERSION_MINOR
,
GCCPLUGIN_VERSION_PATCHLEVEL
, GCCPLUGIN_VERSION
are
integer numbers, so a plugin could ensure it is built for GCC 4.7 with
#if GCCPLUGIN_VERSION != 4007 #error this GCC plugin is for GCC 4.7 #endif
The following GNU Makefile excerpt shows how to build a simple plugin:
HOST_GCC=g++ TARGET_GCC=gcc PLUGIN_SOURCE_FILES= plugin1.c plugin2.cc GCCPLUGINS_DIR:= $(shell $(TARGET_GCC) -print-file-name=plugin) CXXFLAGS+= -I$(GCCPLUGINS_DIR)/include -fPIC -fno-rtti -O2 plugin.so: $(PLUGIN_SOURCE_FILES) $(HOST_GCC) -shared $(CXXFLAGS) $^ -o $@
A single source file plugin may be built with g++ -I`gcc
-print-file-name=plugin`/include -fPIC -shared -fno-rtti -O2 plugin.c -o
plugin.so
, using backquote shell syntax to query the plugin
directory.
When a plugin needs to use gengtype, be sure that both gengtype and gtype.state have the same version as the GCC for which the plugin is built.
Link Time Optimization (LTO) gives GCC the capability of dumping its internal representation (GIMPLE) to disk, so that all the different compilation units that make up a single executable can be optimized as a single module. This expands the scope of inter-procedural optimizations to encompass the whole program (or, rather, everything that is visible at link time).
Link time optimization is implemented as a GCC front end for a
bytecode representation of GIMPLE that is emitted in special sections
of .o
files. Currently, LTO support is enabled in most
ELF-based systems, as well as darwin, cygwin and mingw systems.
Since GIMPLE bytecode is saved alongside final object code, object
files generated with LTO support are larger than regular object files.
This “fat” object format makes it easy to integrate LTO into
existing build systems, as one can, for instance, produce archives of
the files. Additionally, one might be able to ship one set of fat
objects which could be used both for development and the production of
optimized builds. A, perhaps surprising, side effect of this feature
is that any mistake in the toolchain leads to LTO information not
being used (e.g. an older libtool
calling ld
directly).
This is both an advantage, as the system is more robust, and a
disadvantage, as the user is not informed that the optimization has
been disabled.
The current implementation only produces “fat” objects, effectively
doubling compilation time and increasing file sizes up to 5x the
original size. This hides the problem that some tools, such as
ar
and nm
, need to understand symbol tables of LTO
sections. These tools were extended to use the plugin infrastructure,
and with these problems solved, GCC will also support “slim” objects
consisting of the intermediate code alone.
At the highest level, LTO splits the compiler in two. The first half (the “writer”) produces a streaming representation of all the internal data structures needed to optimize and generate code. This includes declarations, types, the callgraph and the GIMPLE representation of function bodies.
When -flto is given during compilation of a source file, the
pass manager executes all the passes in all_lto_gen_passes
.
Currently, this phase is composed of two IPA passes:
pass_ipa_lto_gimple_out
This pass executes the function lto_output
in
lto-streamer-out.c, which traverses the call graph encoding
every reachable declaration, type and function. This generates a
memory representation of all the file sections described below.
pass_ipa_lto_finish_out
This pass executes the function produce_asm_for_decls
in
lto-streamer-out.c, which takes the memory image built in the
previous pass and encodes it in the corresponding ELF file sections.
The second half of LTO support is the “reader”. This is implemented
as the GCC front end lto1 in lto/lto.c. When
collect2 detects a link set of .o
/.a
files with
LTO information and the -flto is enabled, it invokes
lto1 which reads the set of files and aggregates them into a
single translation unit for optimization. The main entry point for
the reader is lto/lto.c:lto_main
.
One of the main goals of the GCC link-time infrastructure was to allow effective compilation of large programs. For this reason GCC implements two link-time compilation modes.
.o
files and distributes the compilation of the sub-graphs to different
CPUs.
Note that distributed compilation is not implemented yet, but since
the parallelism is facilitated via generating a Makefile
, it
would be easy to implement.
WHOPR splits LTO into three main stages:
WHOPR can be seen as an extension of the usual LTO mode of compilation. In LTO, WPA and LTRANS are executed within a single execution of the compiler, after the whole program has been read into memory.
When compiling in WHOPR mode, the callgraph is partitioned during the WPA stage. The whole program is split into a given number of partitions of roughly the same size. The compiler tries to minimize the number of references which cross partition boundaries. The main advantage of WHOPR is to allow the parallel execution of LTRANS stages, which are the most time-consuming part of the compilation process. Additionally, it avoids the need to load the whole program into memory.
LTO information is stored in several ELF sections inside object files. Data structures and enum codes for sections are defined in lto-streamer.h.
These sections are emitted from lto-streamer-out.c and mapped
in all at once from lto/lto.c:lto_file_read
. The
individual functions dealing with the reading/writing of each section
are described below.
.gnu.lto_.opts
)
This section contains the command line options used to generate the object files. This is used at link time to determine the optimization level and other settings when they are not explicitly specified at the linker command line.
Currently, GCC does not support combining LTO object files compiled
with different set of the command line options into a single binary.
At link time, the options given on the command line and the options
saved on all the files in a link-time set are applied globally. No
attempt is made at validating the combination of flags (other than the
usual validation done by option processing). This is implemented in
lto/lto.c:lto_read_all_file_options
.
.gnu.lto_.symtab
)
This table replaces the ELF symbol table for functions and variables represented in the LTO IL. Symbols used and exported by the optimized assembly code of “fat” objects might not match the ones used and exported by the intermediate code. This table is necessary because the intermediate code is less optimized and thus requires a separate symbol table.
Additionally, the binary code in the “fat” object will lack a call to a function, since the call was optimized out at compilation time after the intermediate language was streamed out. In some special cases, the same optimization may not happen during link-time optimization. This would lead to an undefined symbol if only one symbol table was used.
The symbol table is emitted in
lto-streamer-out.c:produce_symtab
.
.gnu.lto_.decls
)
This section contains an intermediate language dump of all declarations and types required to represent the callgraph, static variables and top-level debug info.
The contents of this section are emitted in
lto-streamer-out.c:produce_asm_for_decls
. Types and
symbols are emitted in a topological order that preserves the sharing
of pointers when the file is read back in
(lto.c:read_cgraph_and_symbols
).
.gnu.lto_.cgraph
)
This section contains the basic data structure used by the GCC
inter-procedural optimization infrastructure. This section stores an
annotated multi-graph which represents the functions and call sites as
well as the variables, aliases and top-level asm
statements.
This section is emitted in
lto-streamer-out.c:output_cgraph
and read in
lto-cgraph.c:input_cgraph
.
.gnu.lto_.refs
)
This section contains references between function and static
variables. It is emitted by lto-cgraph.c:output_refs
and read by lto-cgraph.c:input_refs
.
.gnu.lto_.function_body.<name>
)
This section contains function bodies in the intermediate language representation. Every function body is in a separate section to allow copying of the section independently to different object files or reading the function on demand.
Functions are emitted in
lto-streamer-out.c:output_function
and read in
lto-streamer-in.c:input_function
.
.gnu.lto_.vars
)
This section contains all the symbols in the global variable pool. It
is emitted by lto-cgraph.c:output_varpool
and read in
lto-cgraph.c:input_cgraph
.
.gnu.lto_.<xxx>
, where <xxx>
is one of jmpfuncs
,
pureconst
or reference
)
These sections are used by IPA passes that need to emit summary information during LTO generation to be read and aggregated at link time. Each pass is responsible for implementing two pass manager hooks: one for writing the summary and another for reading it in. The format of these sections is entirely up to each individual pass. The only requirement is that the writer and reader hooks agree on the format.
Programs are represented internally as a callgraph (a multi-graph where nodes are functions and edges are call sites) and a varpool (a list of static and external variables in the program).
The inter-procedural optimization is organized as a sequence of individual passes, which operate on the callgraph and the varpool. To make the implementation of WHOPR possible, every inter-procedural optimization pass is split into several stages that are executed at different times during WHOPR compilation:
generate_summary
in
struct ipa_opt_pass_d
). This stage analyzes every function
body and variable initializer is examined and stores relevant
information into a pass-specific data structure.
write_summary
in
struct ipa_opt_pass_d
). This stage writes all the
pass-specific information generated by generate_summary
.
Summaries go into their own LTO_section_*
sections that
have to be declared in lto-streamer.h:enum
lto_section_type
. A new section is created by calling
create_output_block
and data can be written using the
lto_output_*
routines.
read_summary
in
struct ipa_opt_pass_d
). This stage reads all the
pass-specific information in exactly the same order that it was
written by write_summary
.
execute
in struct
opt_pass
). This performs inter-procedural propagation. This
must be done without actual access to the individual function
bodies or variable initializers. Typically, this results in a
transitive closure operation over the summary information of all
the nodes in the callgraph.
write_optimization_summary
in struct
ipa_opt_pass_d
). This writes the result of the inter-procedural
propagation into the object file. This can use the same data
structures and helper routines used in write_summary
.
read_optimization_summary
in struct
ipa_opt_pass_d
). The counterpart to
write_optimization_summary
. This reads the interprocedural
optimization decisions in exactly the same format emitted by
write_optimization_summary
.
function_transform
and
variable_transform
in struct ipa_opt_pass_d
).
The actual function bodies and variable initializers are updated
based on the information passed down from the Execute stage.
The implementation of the inter-procedural passes are shared between LTO, WHOPR and classic non-LTO compilation.
To simplify development, the GCC pass manager differentiates
between normal inter-procedural passes and small inter-procedural
passes. A small inter-procedural pass
(SIMPLE_IPA_PASS
) is a pass that does
everything at once and thus it can not be executed during WPA in
WHOPR mode. It defines only the Execute stage and during
this stage it accesses and modifies the function bodies. Such
passes are useful for optimization at LGEN or LTRANS time and are
used, for example, to implement early optimization before writing
object files. The simple inter-procedural passes can also be used
for easier prototyping and development of a new inter-procedural
pass.
One of the main challenges of introducing the WHOPR compilation mode was addressing the interactions between optimization passes. In LTO compilation mode, the passes are executed in a sequence, each of which consists of analysis (or Generate summary), propagation (or Execute) and Transform stages. Once the work of one pass is finished, the next pass sees the updated program representation and can execute. This makes the individual passes dependent on each other.
In WHOPR mode all passes first execute their Generate summary stage. Then summary writing marks the end of the LGEN stage. At WPA time, the summaries are read back into memory and all passes run the Execute stage. Optimization summaries are streamed and sent to LTRANS, where all the passes execute the Transform stage.
Most optimization passes split naturally into analysis, propagation and transformation stages. But some do not. The main problem arises when one pass performs changes and the following pass gets confused by seeing different callgraphs between the Transform stage and the Generate summary or Execute stage. This means that the passes are required to communicate their decisions with each other.
To facilitate this communication, the GCC callgraph infrastructure implements virtual clones, a method of representing the changes performed by the optimization passes in the callgraph without needing to update function bodies.
A virtual clone in the callgraph is a function that has no associated body, just a description of how to create its body based on a different function (which itself may be a virtual clone).
The description of function modifications includes adjustments to the function's signature (which allows, for example, removing or adding function arguments), substitutions to perform on the function body, and, for inlined functions, a pointer to the function that it will be inlined into.
It is also possible to redirect any edge of the callgraph from a function to its virtual clone. This implies updating of the call site to adjust for the new function signature.
Most of the transformations performed by inter-procedural optimizations can be represented via virtual clones. For instance, a constant propagation pass can produce a virtual clone of the function which replaces one of its arguments by a constant. The inliner can represent its decisions by producing a clone of a function whose body will be later integrated into a given function.
Using virtual clones, the program can be easily updated during the Execute stage, solving most of pass interactions problems that would otherwise occur during Transform.
Virtual clones are later materialized in the LTRANS stage and turned into real functions. Passes executed after the virtual clone were introduced also perform their Transform stage on new functions, so for a pass there is no significant difference between operating on a real function or a virtual clone introduced before its Execute stage.
Optimization passes then work on virtual clones introduced before their Execute stage as if they were real functions. The only difference is that clones are not visible during the Generate Summary stage.
To keep function summaries updated, the callgraph interface allows an optimizer to register a callback that is called every time a new clone is introduced as well as when the actual function or variable is generated or when a function or variable is removed. These hooks are registered in the Generate summary stage and allow the pass to keep its information intact until the Execute stage. The same hooks can also be registered during the Execute stage to keep the optimization summaries updated for the Transform stage.
GCC represents IPA references in the callgraph. For a function
or variable A
, the IPA reference is a list of all
locations where the address of A
is taken and, when
A
is a variable, a list of all direct stores and reads
to/from A
. References represent an oriented multi-graph on
the union of nodes of the callgraph and the varpool. See
ipa-reference.c:ipa_reference_write_optimization_summary
and
ipa-reference.c:ipa_reference_read_optimization_summary
for details.
Suppose that an optimization pass sees a function A
and it
knows the values of (some of) its arguments. The jump
function describes the value of a parameter of a given function
call in function A
based on this knowledge.
Jump functions are used by several optimizations, such as the inter-procedural constant propagation pass and the devirtualization pass. The inliner also uses jump functions to perform inlining of callbacks.
Link-time optimization gives relatively minor benefits when used alone. The problem is that propagation of inter-procedural information does not work well across functions and variables that are called or referenced by other compilation units (such as from a dynamically linked library). We say that such functions and variables are externally visible.
To make the situation even more difficult, many applications
organize themselves as a set of shared libraries, and the default
ELF visibility rules allow one to overwrite any externally
visible symbol with a different symbol at runtime. This
basically disables any optimizations across such functions and
variables, because the compiler cannot be sure that the function
body it is seeing is the same function body that will be used at
runtime. Any function or variable not declared static
in
the sources degrades the quality of inter-procedural
optimization.
To avoid this problem the compiler must assume that it sees the
whole program when doing link-time optimization. Strictly
speaking, the whole program is rarely visible even at link-time.
Standard system libraries are usually linked dynamically or not
provided with the link-time information. In GCC, the whole
program option (-fwhole-program) asserts that every
function and variable defined in the current compilation
unit is static, except for function main
(note: at
link time, the current unit is the union of all objects compiled
with LTO). Since some functions and variables need to
be referenced externally, for example by another DSO or from an
assembler file, GCC also provides the function and variable
attribute externally_visible
which can be used to disable
the effect of -fwhole-program on a specific symbol.
The whole program mode assumptions are slightly more complex in C++, where inline functions in headers are put into COMDAT sections. COMDAT function and variables can be defined by multiple object files and their bodies are unified at link-time and dynamic link-time. COMDAT functions are changed to local only when their address is not taken and thus un-sharing them with a library is not harmful. COMDAT variables always remain externally visible, however for readonly variables it is assumed that their initializers cannot be overwritten by a different value.
GCC provides the function and variable attribute
visibility
that can be used to specify the visibility of
externally visible symbols (or alternatively an
-fdefault-visibility command line option). ELF defines
the default
, protected
, hidden
and
internal
visibilities.
The most commonly used is visibility is hidden
. It
specifies that the symbol cannot be referenced from outside of
the current shared library. Unfortunately, this information
cannot be used directly by the link-time optimization in the
compiler since the whole shared library also might contain
non-LTO objects and those are not visible to the compiler.
GCC solves this problem using linker plugins. A linker plugin is an interface to the linker that allows an external program to claim the ownership of a given object file. The linker then performs the linking procedure by querying the plugin about the symbol table of the claimed objects and once the linking decisions are complete, the plugin is allowed to provide the final object file before the actual linking is made. The linker plugin obtains the symbol resolution information which specifies which symbols provided by the claimed objects are bound from the rest of a binary being linked.
GCC is designed to be independent of the rest of the toolchain
and aims to support linkers without plugin support. For this
reason it does not use the linker plugin by default. Instead,
the object files are examined by collect2 before being
passed to the linker and objects found to have LTO sections are
passed to lto1 first. This mode does not work for
library archives. The decision on what object files from the
archive are needed depends on the actual linking and thus GCC
would have to implement the linker itself. The resolution
information is missing too and thus GCC needs to make an educated
guess based on -fwhole-program. Without the linker
plugin GCC also assumes that symbols are declared hidden
and not referred by non-LTO code by default.
lto1
The following flags are passed into lto1 and are not meant to be used directly from the command line.
The GIMPLE and GENERIC pattern matching project match-and-simplify tries to address several issues.
To address these the project introduces a simple domain specific language to write expression simplifications from which code targeting GIMPLE and GENERIC is auto-generated. The GENERIC variant follows the fold_buildN API while for the GIMPLE variant and to address 2) new APIs are introduced.
The main GIMPLE API entry to the expression simplifications mimicing that of the GENERIC fold_{unary,binary,ternary} functions.
thus providing n-ary overloads for operation or function. The
additional arguments are a gimple_seq where built statements are
inserted on (if NULL
then simplifications requiring new statements
are not performed) and a valueization hook that can be used to
tie simplifications to a SSA lattice.
In addition to those APIs fold_stmt
is overloaded with
a valueization hook:
Ontop of these a fold_buildN
-like API for GIMPLE is introduced:
which is supposed to replace force_gimple_operand (fold_buildN (...), ...)
and calls to fold_convert
. Overloads without the location_t
argument exist. Built statements are inserted on the provided sequence
and simplification is performed using the optional valueization hook.
The language to write expression simplifications in resembles other domain-specific languages GCC uses. Thus it is lispy. Lets start with an example from the match.pd file:
(simplify (bit_and @0 integer_all_onesp) @0)
This example contains all required parts of an expression simplification.
A simplification is wrapped inside a (simplify ...)
expression.
That contains at least two operands - an expression that is matched
with the GIMPLE or GENERIC IL and a replacement expression that is
returned if the match was successful.
Expressions have an operator ID, bit_and
in this case. Expressions can
be lower-case tree codes with _expr
stripped off or builtin
function code names in all-caps, like BUILT_IN_SQRT
.
@n
denotes a so-called capture. It captures the operand and lets
you refer to it in other places of the match-and-simplify. In the
above example it is refered to in the replacement expression. Captures
are @
followed by a number or an identifier.
(simplify (bit_xor @0 @0) { build_zero_cst (type); })
In this example @0
is mentioned twice which constrains the matched
expression to have two equal operands. This example also introduces
operands written in C code. These can be used in the expression
replacements and are supposed to evaluate to a tree node which has to
be a valid GIMPLE operand (so you cannot generate expressions in C code).
(simplify (trunc_mod integer_zerop@0 @1) (if (!integer_zerop (@1)) @0))
Here @0
captures the first operand of the trunc_mod expression
which is also predicated with integer_zerop
. Expression operands
may be either expressions, predicates or captures. Captures
can be unconstrained or capture expresions or predicates.
This example introduces an optional operand of simplify,
the if-expression. This condition is evaluated after the
expression matched in the IL and is required to evaluate to true
to enable the replacement expression in the second operand
position. The expression operand of the if
is a standard C
expression which may contain references to captures. The if
has an optional third operand which may contain the replacement
expression that is enabled when the condition evaluates to false.
A if
expression can be used to specify a common condition
for multiple simplify patterns, avoiding the need
to repeat that multiple times:
(if (!TYPE_SATURATING (type) && !FLOAT_TYPE_P (type) && !FIXED_POINT_TYPE_P (type)) (simplify (minus (plus @0 @1) @0) @1) (simplify (minus (minus @0 @1) @0) (negate @1)))
Note that if
s in outer position do not have the optional
else clause but instead have multiple then clauses.
Ifs can be nested.
There exists a switch
expression which can be used to
chain conditions avoiding nesting if
s too much:
(simplify (simple_comparison @0 REAL_CST@1) (switch /* a CMP (-0) -> a CMP 0 */ (if (REAL_VALUE_MINUS_ZERO (TREE_REAL_CST (@1))) (cmp @0 { build_real (TREE_TYPE (@1), dconst0); })) /* x != NaN is always true, other ops are always false. */ (if (REAL_VALUE_ISNAN (TREE_REAL_CST (@1)) && ! HONOR_SNANS (@1)) { constant_boolean_node (cmp == NE_EXPR, type); })))
Is equal to
(simplify (simple_comparison @0 REAL_CST@1) (switch /* a CMP (-0) -> a CMP 0 */ (if (REAL_VALUE_MINUS_ZERO (TREE_REAL_CST (@1))) (cmp @0 { build_real (TREE_TYPE (@1), dconst0); }) /* x != NaN is always true, other ops are always false. */ (if (REAL_VALUE_ISNAN (TREE_REAL_CST (@1)) && ! HONOR_SNANS (@1)) { constant_boolean_node (cmp == NE_EXPR, type); }))))
which has the second if
in the else operand of the first.
The switch
expression takes if
expressions as
operands (which may not have else clauses) and as a last operand
a replacement expression which should be enabled by default if
no other condition evaluated to true.
Captures can also be used for capturing results of sub-expressions.
#if GIMPLE (simplify (pointer_plus (addr@2 @0) INTEGER_CST_P@1) (if (is_gimple_min_invariant (@2))) { HOST_WIDE_INT off; tree base = get_addr_base_and_unit_offset (@0, &off); off += tree_to_uhwi (@1); /* Now with that we should be able to simply write (addr (mem_ref (addr @base) (plus @off @1))) */ build1 (ADDR_EXPR, type, build2 (MEM_REF, TREE_TYPE (TREE_TYPE (@2)), build_fold_addr_expr (base), build_int_cst (ptr_type_node, off))); }) #endif
In the above example, @2
captures the result of the expression
(addr @0)
. For outermost expression only its type can be captured,
and the keyword type
is reserved for this purpose. The above
example also gives a way to conditionalize patterns to only apply
to GIMPLE
or GENERIC
by means of using the pre-defined
preprocessor macros GIMPLE
and GENERIC
and using
preprocessor directives.
(simplify (bit_and:c integral_op_p@0 (bit_ior:c (bit_not @0) @1)) (bit_and @1 @0))
Here we introduce flags on match expressions. The flag used
above, c
, denotes that the expression should
be also matched commutated. Thus the above match expression
is really the following four match expressions:
(bit_and integral_op_p@0 (bit_ior (bit_not @0) @1)) (bit_and (bit_ior (bit_not @0) @1) integral_op_p@0) (bit_and integral_op_p@0 (bit_ior @1 (bit_not @0))) (bit_and (bit_ior @1 (bit_not @0)) integral_op_p@0)
Usual canonicalizations you know from GENERIC expressions are applied before matching, so for example constant operands always come second in commutative expressions.
The second supported flag is s
which tells the code
generator to fail the pattern if the expression marked with
s
does have more than one use. For example in
(simplify (pointer_plus (pointer_plus:s @0 @1) @3) (pointer_plus @0 (plus @1 @3)))
this avoids the association if (pointer_plus @0 @1)
is
used outside of the matched expression and thus it would stay
live and not trivially removed by dead code elimination.
More features exist to avoid too much repetition.
(for op (plus pointer_plus minus bit_ior bit_xor) (simplify (op @0 integer_zerop) @0))
A for
expression can be used to repeat a pattern for each
operator specified, substituting op
. for
can be
nested and a for
can have multiple operators to iterate.
(for opa (plus minus) opb (minus plus) (for opc (plus minus) (simplify...
In this example the pattern will be repeated four times with
opa, opb, opc
being plus, minus, plus
,
plus, minus, minus
, minus, plus, plus
,
minus, plus, minus
.
To avoid repeating operator lists in for
you can name
them via
(define_operator_list pmm plus minus mult)
and use them in for
operator lists where they get expanded.
(for opa (pmm trunc_div) (simplify...
So this example iterates over plus
, minus
, mult
and trunc_div
.
Using operator lists can also remove the need to explicitely write
a for
. All operator list uses that appear in a simplify
or match
pattern in operator positions will implicitely
be added to a new for
. For example
(define_operator_list SQRT BUILT_IN_SQRTF BUILT_IN_SQRT BUILT_IN_SQRTL) (define_operator_list POW BUILT_IN_POWF BUILT_IN_POW BUILT_IN_POWL) (simplify (SQRT (POW @0 @1)) (POW (abs @0) (mult @1 { built_real (TREE_TYPE (@1), dconsthalf); })))
is the same as
(for SQRT (BUILT_IN_SQRTF BUILT_IN_SQRT BUILT_IN_SQRTL) POW (BUILT_IN_POWF BUILT_IN_POW BUILT_IN_POWL) (simplify (SQRT (POW @0 @1)) (POW (abs @0) (mult @1 { built_real (TREE_TYPE (@1), dconsthalf); }))))
for
s and operator lists can include the special identifier
null
that matches nothing and can never be generated. This can
be used to pad an operator list so that it has a standard form,
even if there isn't a suitable operator for every form.
Another building block are with
expressions in the
result expression which nest the generated code in a new C block
followed by its argument:
(simplify (convert (mult @0 @1)) (with { tree utype = unsigned_type_for (type); } (convert (mult (convert:utype @0) (convert:utype @1)))))
This allows code nested in the with
to refer to the declared
variables. In the above case we use the feature to specify the
type of a generated expression with the :type
syntax where
type
needs to be an identifier that refers to the desired type.
Usually the types of the generated result expressions are
determined from the context, but sometimes like in the above case
it is required that you specify them explicitely.
As intermediate conversions are often optional there is a way to
avoid the need to repeat patterns both with and without such
conversions. Namely you can mark a conversion as being optional
with a ?
:
(simplify (eq (convert@0 @1) (convert? @2)) (eq @1 (convert @2)))
which will match both (eq (convert @1) (convert @2))
and
(eq (convert @1) @2)
. The optional converts are supposed
to be all either present or not, thus
(eq (convert? @1) (convert? @2))
will result in two
patterns only. If you want to match all four combinations you
have access to two additional conditional converts as in
(eq (convert1? @1) (convert2? @2))
.
Predicates available from the GCC middle-end need to be made
available explicitely via define_predicates
:
(define_predicates integer_onep integer_zerop integer_all_onesp)
You can also define predicates using the pattern matching language
and the match
form:
(match negate_expr_p INTEGER_CST (if (TYPE_OVERFLOW_WRAPS (type) || may_negate_without_overflow_p (t)))) (match negate_expr_p (negate @0))
This shows that for match
expressions there is t
available which captures the outermost expression (something
not possible in the simplify
context). As you can see
match
has an identifier as first operand which is how
you refer to the predicate in patterns. Multiple match
for the same identifier add additional cases where the predicate
matches.
Predicates can also match an expression in which case you need to provide a template specifying the identifier and where to get its operands from:
(match (logical_inverted_value @0) (eq @0 integer_zerop)) (match (logical_inverted_value @0) (bit_not truth_valued_p@0))
You can use the above predicate like
(simplify (bit_and @0 (logical_inverted_value @0)) { build_zero_cst (type); })
Which will match a bitwise and of an operand with its logical inverted value.
If you want to have more free software a few years from now, it makes sense for you to help encourage people to contribute funds for its development. The most effective approach known is to encourage commercial redistributors to donate.
Users of free software systems can boost the pace of development by encouraging for-a-fee distributors to donate part of their selling price to free software developers—the Free Software Foundation, and others.
The way to convince distributors to do this is to demand it and expect it from them. So when you compare distributors, judge them partly by how much they give to free software development. Show distributors they must compete to be the one who gives the most.
To make this approach work, you must insist on numbers that you can compare, such as, “We will donate ten dollars to the Frobnitz project for each disk sold.” Don't be satisfied with a vague promise, such as “A portion of the profits are donated,” since it doesn't give a basis for comparison.
Even a precise fraction “of the profits from this disk” is not very meaningful, since creative accounting and unrelated business decisions can greatly alter what fraction of the sales price counts as profit. If the price you pay is $50, ten percent of the profit is probably less than a dollar; it might be a few cents, or nothing at all.
Some redistributors do development work themselves. This is useful too; but to keep everyone honest, you need to inquire how much they do, and what kind. Some kinds of development make much more long-term difference than others. For example, maintaining a separate version of a program contributes very little; maintaining the standard version of a program for the whole community contributes much. Easy new ports contribute little, since someone else would surely do them; difficult ports such as adding a new CPU to the GNU Compiler Collection contribute more; major new features or packages contribute the most.
By establishing the idea that supporting further development is “the proper thing to do” when distributing free software for a fee, we can assure a steady flow of resources into making more free software.
Copyright © 1994 Free Software Foundation, Inc. Verbatim copying and redistribution of this section is permitted without royalty; alteration is not permitted.
The GNU Project was launched in 1984 to develop a complete Unix-like operating system which is free software: the GNU system. (GNU is a recursive acronym for “GNU's Not Unix”; it is pronounced “guh-NEW”.) Variants of the GNU operating system, which use the kernel Linux, are now widely used; though these systems are often referred to as “Linux”, they are more accurately called GNU/Linux systems.
For more information, see:
http://www.gnu.org/ http://www.gnu.org/gnu/linux-and-gnu.html
Copyright © 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
The GNU General Public License is a free, copyleft license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program–to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.
A “covered work” means either the unmodified Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.
The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.
A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.
A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.
If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.
You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.
Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.
A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.
Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.
one line to give the program's name and a brief idea of what it does. Copyright (C) year name of author This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:
program Copyright (C) year name of author This program comes with ABSOLUTELY NO WARRANTY; for details type ‘show w’. This is free software, and you are welcome to redistribute it under certain conditions; type ‘show c’ for details.
The hypothetical commands ‘show w’ and ‘show c’ should show the appropriate parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an “about box”.
You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see http://www.gnu.org/licenses/.
The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read http://www.gnu.org/philosophy/why-not-lgpl.html.
Copyright © 2000, 2001, 2002, 2007, 2008 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
The purpose of this License is to make a manual, textbook, or other functional and useful document free in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others.
This License is a kind of “copyleft”, which means that derivative works of the document must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software.
We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction or reference.
This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The “Document”, below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as “you”. You accept the license if you copy, modify or distribute the work in a way requiring permission under copyright law.
A “Modified Version” of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modifications and/or translated into another language.
A “Secondary Section” is a named appendix or a front-matter section of the Document that deals exclusively with the relationship of the publishers or authors of the Document to the Document's overall subject (or to related matters) and contains nothing that could fall directly within that overall subject. (Thus, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.
The “Invariant Sections” are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License. If a section does not fit the above definition of Secondary then it is not allowed to be designated as Invariant. The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none.
The “Cover Texts” are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words.
A “Transparent” copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup, or absence of markup, has been arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not “Transparent” is called “Opaque”.
Examples of suitable formats for Transparent copies include plain ascii without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats include proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only.
The “Title Page” means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, “Title Page” means the text near the most prominent appearance of the work's title, preceding the beginning of the body of the text.
The “publisher” means any person or entity that distributes copies of the Document to the public.
A section “Entitled XYZ” means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in another language. (Here XYZ stands for a specific section name mentioned below, such as “Acknowledgements”, “Dedications”, “Endorsements”, or “History”.) To “Preserve the Title” of such a section when you modify the Document means that it remains a section “Entitled XYZ” according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers may have is void and has no effect on the meaning of this License.
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document.
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:
If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version's license notice. These titles must be distinct from any other section titles.
You may add a section Entitled “Endorsements”, provided it contains nothing but endorsements of your Modified Version by various parties—for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version.
You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections Entitled “History” in the various original documents, forming one section Entitled “History”; likewise combine any sections Entitled “Acknowledgements”, and any sections Entitled “Dedications”. You must delete all sections Entitled “Endorsements.”
You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, is called an “aggregate” if the copyright resulting from the compilation is not used to limit the legal rights of the compilation's users beyond what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate, the Document's Cover Texts may be placed on covers that bracket the Document within the aggregate, or the electronic equivalent of covers if the Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate.
Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail.
If a section in the Document is Entitled “Acknowledgements”, “Dedications”, or “History”, the requirement (section 4) to Preserve its Title (section 1) will typically require changing the actual title.
You may not copy, modify, sublicense, or distribute the Document except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, or distribute it is void, and will automatically terminate your rights under this License.
However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, receipt of a copy of some or all of the same material does not give you any rights to use it.
The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/.
Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License “or any later version” applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation. If the Document specifies that a proxy can decide which future versions of this License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Document.
“Massive Multiauthor Collaboration Site” (or “MMC Site”) means any World Wide Web server that publishes copyrightable works and also provides prominent facilities for anybody to edit those works. A public wiki that anybody can edit is an example of such a server. A “Massive Multiauthor Collaboration” (or “MMC”) contained in the site means any set of copyrightable works thus published on the MMC site.
“CC-BY-SA” means the Creative Commons Attribution-Share Alike 3.0 license published by Creative Commons Corporation, a not-for-profit corporation with a principal place of business in San Francisco, California, as well as future copyleft versions of that license published by that same organization.
“Incorporate” means to publish or republish a Document, in whole or in part, as part of another Document.
An MMC is “eligible for relicensing” if it is licensed under this License, and if all works that were first published under this License somewhere other than this MMC, and subsequently incorporated in whole or in part into the MMC, (1) had no cover texts or invariant sections, and (2) were thus incorporated prior to November 1, 2008.
The operator of an MMC Site may republish an MMC contained in the site under CC-BY-SA on the same site at any time before August 1, 2009, provided the MMC is eligible for relicensing.
To use this License in a document you have written, include a copy of the License in the document and put the following copyright and license notices just after the title page:
Copyright (C) year your name. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled ``GNU Free Documentation License''.
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the “with...Texts.” line with this:
with the Invariant Sections being list their titles, with the Front-Cover Texts being list, and with the Back-Cover Texts being list.
If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.
The GCC project would like to thank its many contributors. Without them the project would not have been nearly as successful as it has been. Any omissions in this list are accidental. Feel free to contact [email protected] or [email protected] if you have been left out or some of your contributions are not listed. Please keep this list in alphabetical order.
valarray<>
, complex<>
, maintaining the numerics library
(including that pesky <limits>
:-) and keeping up-to-date anything
to do with numbers.
complex<>
, sanity checking and disbursement, configuration
architecture, libio maintenance, and early math work.
debug-mode
and associative and unordered containers.
collect2's
--help documentation.
restrict
support, and serving as release manager from 2000
to 2011.
<regex>
.
<random>
, and various improvements to C++11 features.
INTEGER*1
, INTEGER*2
, and
LOGICAL*1
.
<regex>
effort.
The following people are recognized for their contributions to GNAT, the Ada front end of GCC:
The following people are recognized for their contributions of new features, bug reports, testing and integration of classpath/libgcj for GCC version 4.1:
JTree
implementation and lots Free Swing
additions and bug fixes.
GapContent
bug fixes.
JList
, Free Swing 1.5 updates and mouse event
fixes, lots of Free Swing work including JTable
editing.
HTTPURLConnection
fixes.
MessageFormat
fixes.
Serialization
fixes.
StAX
and DOM xml:id
support.
TreePath
and TreeSelection
fixes.
URLClassLoader
updates.
SocketTimeoutException
.
BitSet
bug fixes, HttpURLConnection
rewrite and improvements.
ClassLoader
and nio cleanups, serialization fixes,
better Proxy
support, bug fixes and IKVM integration.
AccessControlContext
fixes.
VMClassLoader
and AccessController
improvements.
basic
and metal
icon and plaf support
and lots of documenting, Lots of Free Swing and metal theme
additions. MetalIconFactory
implementation.
MIDI
framework, ALSA
and DSSI
providers.
Serialization
and URLClassLoader
fixes,
gcj build speedups.
JFileChooser
implementation.
Locale
and net fixes, URI RFC2986
updates, Serialization
fixes, Properties
XML support and
generic branch work, VMIntegration guide update.
TimeZone
bug fixing.
NetworkInterface
implementation and updates.
BoxLayout
, GrayFilter
and
SplitPane
, plus bug fixes all over. Lots of Free Swing work
including styled text.
String
cleanups and optimization suggestions.
Locale
updates, bug and
build fixes.
Pointer
updates. Logger bug fixes.
Graphics2D
upgraded to Cairo 0.5 and new regex
features.
TextLayout
fixes. GtkImage
rewrite, 2D, awt, free swing and date/time fixes and
implementing the Qt4 peers.
FileChannel
lock,
SystemLogger
and FileHandler
rotate implementations, NIO
FileChannel.map
support, security and policy updates.
File
locking fixes.
Image
, Logger
and URLClassLoader
updates.
MenuSelectionManager
implementation.
BasicTreeUI
and JTree
fixes.
TreeNode
enumerations and ActionCommand
and various
fixes, XML and URL, AWT and Free Swing bug fixes.
CACAO
integration, fdlibm
updates.
VMClassLoader
boot packages support suggestions.
Qt4
support for Darwin/OS X, Graphics2D
support, gtk+
updates.
DEBUG
support, build cleanups and
Kaffe integration. Qt4
build infrastructure, SHA1PRNG
and GdkPixbugDecoder
updates.
Clipboard
implementation, system call interrupts and network
timeouts and GdkPixpufDecoder
fixes.
In addition to the above, all of which also contributed time and energy in testing GCC, we would like to thank the following for their contributions to testing:
And finally we'd like to thank everyone who uses the compiler, provides feedback and generally reminds us why we're doing this work in the first place.
GCC's command line options are indexed here without any initial ‘-’ or ‘--’. Where an option has both positive and negative forms (such as -foption and -fno-option), relevant entries in the manual are indexed under the most appropriate form; it may sometimes be useful to look up both forms.
fltrans
: Internal flagsfltrans-output-list
: Internal flagsfresolution
: Internal flagsfwpa
: Internal flagsmsoft-float
: Soft float library routines#
in template: Output Template#pragma
: Misc(
: GIMPLE API*
in template: Output Statement*gimple_build_asm_vec
: <code>GIMPLE_ASM</code>*gimple_build_assign
: <code>GIMPLE_ASSIGN</code>*gimple_build_bind
: <code>GIMPLE_BIND</code>*gimple_build_call
: <code>GIMPLE_CALL</code>*gimple_build_call_from_tree
: <code>GIMPLE_CALL</code>*gimple_build_call_vec
: <code>GIMPLE_CALL</code>*gimple_build_catch
: <code>GIMPLE_CATCH</code>*gimple_build_cond
: <code>GIMPLE_COND</code>*gimple_build_cond_from_tree
: <code>GIMPLE_COND</code>*gimple_build_debug_bind
: <code>GIMPLE_DEBUG</code>*gimple_build_eh_filter
: <code>GIMPLE_EH_FILTER</code>*gimple_build_goto
: <code>GIMPLE_GOTO</code>*gimple_build_label
: <code>GIMPLE_LABEL</code>*gimple_build_omp_atomic_load
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>*gimple_build_omp_atomic_store
: <code>GIMPLE_OMP_ATOMIC_STORE</code>*gimple_build_omp_continue
: <code>GIMPLE_OMP_CONTINUE</code>*gimple_build_omp_critical
: <code>GIMPLE_OMP_CRITICAL</code>*gimple_build_omp_for
: <code>GIMPLE_OMP_FOR</code>*gimple_build_omp_parallel
: <code>GIMPLE_OMP_PARALLEL</code>*gimple_build_omp_sections
: <code>GIMPLE_OMP_SECTIONS</code>*gimple_build_omp_single
: <code>GIMPLE_OMP_SINGLE</code>*gimple_build_resx
: <code>GIMPLE_RESX</code>*gimple_build_return
: <code>GIMPLE_RETURN</code>*gimple_build_switch
: <code>GIMPLE_SWITCH</code>*gimple_build_try
: <code>GIMPLE_TRY</code>__absvdi2
: Integer library routines__absvsi2
: Integer library routines__addda3
: Fixed-point fractional library routines__adddf3
: Soft float library routines__adddq3
: Fixed-point fractional library routines__addha3
: Fixed-point fractional library routines__addhq3
: Fixed-point fractional library routines__addqq3
: Fixed-point fractional library routines__addsa3
: Fixed-point fractional library routines__addsf3
: Soft float library routines__addsq3
: Fixed-point fractional library routines__addta3
: Fixed-point fractional library routines__addtf3
: Soft float library routines__adduda3
: Fixed-point fractional library routines__addudq3
: Fixed-point fractional library routines__adduha3
: Fixed-point fractional library routines__adduhq3
: Fixed-point fractional library routines__adduqq3
: Fixed-point fractional library routines__addusa3
: Fixed-point fractional library routines__addusq3
: Fixed-point fractional library routines__adduta3
: Fixed-point fractional library routines__addvdi3
: Integer library routines__addvsi3
: Integer library routines__addxf3
: Soft float library routines__ashlda3
: Fixed-point fractional library routines__ashldi3
: Integer library routines__ashldq3
: Fixed-point fractional library routines__ashlha3
: Fixed-point fractional library routines__ashlhq3
: Fixed-point fractional library routines__ashlqq3
: Fixed-point fractional library routines__ashlsa3
: Fixed-point fractional library routines__ashlsi3
: Integer library routines__ashlsq3
: Fixed-point fractional library routines__ashlta3
: Fixed-point fractional library routines__ashlti3
: Integer library routines__ashluda3
: Fixed-point fractional library routines__ashludq3
: Fixed-point fractional library routines__ashluha3
: Fixed-point fractional library routines__ashluhq3
: Fixed-point fractional library routines__ashluqq3
: Fixed-point fractional library routines__ashlusa3
: Fixed-point fractional library routines__ashlusq3
: Fixed-point fractional library routines__ashluta3
: Fixed-point fractional library routines__ashrda3
: Fixed-point fractional library routines__ashrdi3
: Integer library routines__ashrdq3
: Fixed-point fractional library routines__ashrha3
: Fixed-point fractional library routines__ashrhq3
: Fixed-point fractional library routines__ashrqq3
: Fixed-point fractional library routines__ashrsa3
: Fixed-point fractional library routines__ashrsi3
: Integer library routines__ashrsq3
: Fixed-point fractional library routines__ashrta3
: Fixed-point fractional library routines__ashrti3
: Integer library routines__bid_adddd3
: Decimal float library routines__bid_addsd3
: Decimal float library routines__bid_addtd3
: Decimal float library routines__bid_divdd3
: Decimal float library routines__bid_divsd3
: Decimal float library routines__bid_divtd3
: Decimal float library routines__bid_eqdd2
: Decimal float library routines__bid_eqsd2
: Decimal float library routines__bid_eqtd2
: Decimal float library routines__bid_extendddtd2
: Decimal float library routines__bid_extendddtf
: Decimal float library routines__bid_extendddxf
: Decimal float library routines__bid_extenddfdd
: Decimal float library routines__bid_extenddftd
: Decimal float library routines__bid_extendsddd2
: Decimal float library routines__bid_extendsddf
: Decimal float library routines__bid_extendsdtd2
: Decimal float library routines__bid_extendsdtf
: Decimal float library routines__bid_extendsdxf
: Decimal float library routines__bid_extendsfdd
: Decimal float library routines__bid_extendsfsd
: Decimal float library routines__bid_extendsftd
: Decimal float library routines__bid_extendtftd
: Decimal float library routines__bid_extendxftd
: Decimal float library routines__bid_fixdddi
: Decimal float library routines__bid_fixddsi
: Decimal float library routines__bid_fixsddi
: Decimal float library routines__bid_fixsdsi
: Decimal float library routines__bid_fixtddi
: Decimal float library routines__bid_fixtdsi
: Decimal float library routines__bid_fixunsdddi
: Decimal float library routines__bid_fixunsddsi
: Decimal float library routines__bid_fixunssddi
: Decimal float library routines__bid_fixunssdsi
: Decimal float library routines__bid_fixunstddi
: Decimal float library routines__bid_fixunstdsi
: Decimal float library routines__bid_floatdidd
: Decimal float library routines__bid_floatdisd
: Decimal float library routines__bid_floatditd
: Decimal float library routines__bid_floatsidd
: Decimal float library routines__bid_floatsisd
: Decimal float library routines__bid_floatsitd
: Decimal float library routines__bid_floatunsdidd
: Decimal float library routines__bid_floatunsdisd
: Decimal float library routines__bid_floatunsditd
: Decimal float library routines__bid_floatunssidd
: Decimal float library routines__bid_floatunssisd
: Decimal float library routines__bid_floatunssitd
: Decimal float library routines__bid_gedd2
: Decimal float library routines__bid_gesd2
: Decimal float library routines__bid_getd2
: Decimal float library routines__bid_gtdd2
: Decimal float library routines__bid_gtsd2
: Decimal float library routines__bid_gttd2
: Decimal float library routines__bid_ledd2
: Decimal float library routines__bid_lesd2
: Decimal float library routines__bid_letd2
: Decimal float library routines__bid_ltdd2
: Decimal float library routines__bid_ltsd2
: Decimal float library routines__bid_lttd2
: Decimal float library routines__bid_muldd3
: Decimal float library routines__bid_mulsd3
: Decimal float library routines__bid_multd3
: Decimal float library routines__bid_nedd2
: Decimal float library routines__bid_negdd2
: Decimal float library routines__bid_negsd2
: Decimal float library routines__bid_negtd2
: Decimal float library routines__bid_nesd2
: Decimal float library routines__bid_netd2
: Decimal float library routines__bid_subdd3
: Decimal float library routines__bid_subsd3
: Decimal float library routines__bid_subtd3
: Decimal float library routines__bid_truncdddf
: Decimal float library routines__bid_truncddsd2
: Decimal float library routines__bid_truncddsf
: Decimal float library routines__bid_truncdfsd
: Decimal float library routines__bid_truncsdsf
: Decimal float library routines__bid_trunctddd2
: Decimal float library routines__bid_trunctddf
: Decimal float library routines__bid_trunctdsd2
: Decimal float library routines__bid_trunctdsf
: Decimal float library routines__bid_trunctdtf
: Decimal float library routines__bid_trunctdxf
: Decimal float library routines__bid_trunctfdd
: Decimal float library routines__bid_trunctfsd
: Decimal float library routines__bid_truncxfdd
: Decimal float library routines__bid_truncxfsd
: Decimal float library routines__bid_unorddd2
: Decimal float library routines__bid_unordsd2
: Decimal float library routines__bid_unordtd2
: Decimal float library routines__bswapdi2
: Integer library routines__bswapsi2
: Integer library routines__builtin_classify_type
: Varargs__builtin_next_arg
: Varargs__builtin_saveregs
: Varargs__chkp_bndcl
: Misc__chkp_bndcu
: Misc__chkp_bndldx
: Misc__chkp_bndmk
: Misc__chkp_bndret
: Misc__chkp_bndstx
: Misc__chkp_intersect
: Misc__chkp_narrow
: Misc__chkp_sizeof
: Misc__clear_cache
: Miscellaneous routines__clzdi2
: Integer library routines__clzsi2
: Integer library routines__clzti2
: Integer library routines__cmpda2
: Fixed-point fractional library routines__cmpdf2
: Soft float library routines__cmpdi2
: Integer library routines__cmpdq2
: Fixed-point fractional library routines__cmpha2
: Fixed-point fractional library routines__cmphq2
: Fixed-point fractional library routines__cmpqq2
: Fixed-point fractional library routines__cmpsa2
: Fixed-point fractional library routines__cmpsf2
: Soft float library routines__cmpsq2
: Fixed-point fractional library routines__cmpta2
: Fixed-point fractional library routines__cmptf2
: Soft float library routines__cmpti2
: Integer library routines__cmpuda2
: Fixed-point fractional library routines__cmpudq2
: Fixed-point fractional library routines__cmpuha2
: Fixed-point fractional library routines__cmpuhq2
: Fixed-point fractional library routines__cmpuqq2
: Fixed-point fractional library routines__cmpusa2
: Fixed-point fractional library routines__cmpusq2
: Fixed-point fractional library routines__cmputa2
: Fixed-point fractional library routines__CTOR_LIST__
: Initialization__ctzdi2
: Integer library routines__ctzsi2
: Integer library routines__ctzti2
: Integer library routines__divda3
: Fixed-point fractional library routines__divdc3
: Soft float library routines__divdf3
: Soft float library routines__divdi3
: Integer library routines__divdq3
: Fixed-point fractional library routines__divha3
: Fixed-point fractional library routines__divhq3
: Fixed-point fractional library routines__divqq3
: Fixed-point fractional library routines__divsa3
: Fixed-point fractional library routines__divsc3
: Soft float library routines__divsf3
: Soft float library routines__divsi3
: Integer library routines__divsq3
: Fixed-point fractional library routines__divta3
: Fixed-point fractional library routines__divtc3
: Soft float library routines__divtf3
: Soft float library routines__divti3
: Integer library routines__divxc3
: Soft float library routines__divxf3
: Soft float library routines__dpd_adddd3
: Decimal float library routines__dpd_addsd3
: Decimal float library routines__dpd_addtd3
: Decimal float library routines__dpd_divdd3
: Decimal float library routines__dpd_divsd3
: Decimal float library routines__dpd_divtd3
: Decimal float library routines__dpd_eqdd2
: Decimal float library routines__dpd_eqsd2
: Decimal float library routines__dpd_eqtd2
: Decimal float library routines__dpd_extendddtd2
: Decimal float library routines__dpd_extendddtf
: Decimal float library routines__dpd_extendddxf
: Decimal float library routines__dpd_extenddfdd
: Decimal float library routines__dpd_extenddftd
: Decimal float library routines__dpd_extendsddd2
: Decimal float library routines__dpd_extendsddf
: Decimal float library routines__dpd_extendsdtd2
: Decimal float library routines__dpd_extendsdtf
: Decimal float library routines__dpd_extendsdxf
: Decimal float library routines__dpd_extendsfdd
: Decimal float library routines__dpd_extendsfsd
: Decimal float library routines__dpd_extendsftd
: Decimal float library routines__dpd_extendtftd
: Decimal float library routines__dpd_extendxftd
: Decimal float library routines__dpd_fixdddi
: Decimal float library routines__dpd_fixddsi
: Decimal float library routines__dpd_fixsddi
: Decimal float library routines__dpd_fixsdsi
: Decimal float library routines__dpd_fixtddi
: Decimal float library routines__dpd_fixtdsi
: Decimal float library routines__dpd_fixunsdddi
: Decimal float library routines__dpd_fixunsddsi
: Decimal float library routines__dpd_fixunssddi
: Decimal float library routines__dpd_fixunssdsi
: Decimal float library routines__dpd_fixunstddi
: Decimal float library routines__dpd_fixunstdsi
: Decimal float library routines__dpd_floatdidd
: Decimal float library routines__dpd_floatdisd
: Decimal float library routines__dpd_floatditd
: Decimal float library routines__dpd_floatsidd
: Decimal float library routines__dpd_floatsisd
: Decimal float library routines__dpd_floatsitd
: Decimal float library routines__dpd_floatunsdidd
: Decimal float library routines__dpd_floatunsdisd
: Decimal float library routines__dpd_floatunsditd
: Decimal float library routines__dpd_floatunssidd
: Decimal float library routines__dpd_floatunssisd
: Decimal float library routines__dpd_floatunssitd
: Decimal float library routines__dpd_gedd2
: Decimal float library routines__dpd_gesd2
: Decimal float library routines__dpd_getd2
: Decimal float library routines__dpd_gtdd2
: Decimal float library routines__dpd_gtsd2
: Decimal float library routines__dpd_gttd2
: Decimal float library routines__dpd_ledd2
: Decimal float library routines__dpd_lesd2
: Decimal float library routines__dpd_letd2
: Decimal float library routines__dpd_ltdd2
: Decimal float library routines__dpd_ltsd2
: Decimal float library routines__dpd_lttd2
: Decimal float library routines__dpd_muldd3
: Decimal float library routines__dpd_mulsd3
: Decimal float library routines__dpd_multd3
: Decimal float library routines__dpd_nedd2
: Decimal float library routines__dpd_negdd2
: Decimal float library routines__dpd_negsd2
: Decimal float library routines__dpd_negtd2
: Decimal float library routines__dpd_nesd2
: Decimal float library routines__dpd_netd2
: Decimal float library routines__dpd_subdd3
: Decimal float library routines__dpd_subsd3
: Decimal float library routines__dpd_subtd3
: Decimal float library routines__dpd_truncdddf
: Decimal float library routines__dpd_truncddsd2
: Decimal float library routines__dpd_truncddsf
: Decimal float library routines__dpd_truncdfsd
: Decimal float library routines__dpd_truncsdsf
: Decimal float library routines__dpd_trunctddd2
: Decimal float library routines__dpd_trunctddf
: Decimal float library routines__dpd_trunctdsd2
: Decimal float library routines__dpd_trunctdsf
: Decimal float library routines__dpd_trunctdtf
: Decimal float library routines__dpd_trunctdxf
: Decimal float library routines__dpd_trunctfdd
: Decimal float library routines__dpd_trunctfsd
: Decimal float library routines__dpd_truncxfdd
: Decimal float library routines__dpd_truncxfsd
: Decimal float library routines__dpd_unorddd2
: Decimal float library routines__dpd_unordsd2
: Decimal float library routines__dpd_unordtd2
: Decimal float library routines__DTOR_LIST__
: Initialization__eqdf2
: Soft float library routines__eqsf2
: Soft float library routines__eqtf2
: Soft float library routines__extenddftf2
: Soft float library routines__extenddfxf2
: Soft float library routines__extendsfdf2
: Soft float library routines__extendsftf2
: Soft float library routines__extendsfxf2
: Soft float library routines__ffsdi2
: Integer library routines__ffsti2
: Integer library routines__fixdfdi
: Soft float library routines__fixdfsi
: Soft float library routines__fixdfti
: Soft float library routines__fixsfdi
: Soft float library routines__fixsfsi
: Soft float library routines__fixsfti
: Soft float library routines__fixtfdi
: Soft float library routines__fixtfsi
: Soft float library routines__fixtfti
: Soft float library routines__fixunsdfdi
: Soft float library routines__fixunsdfsi
: Soft float library routines__fixunsdfti
: Soft float library routines__fixunssfdi
: Soft float library routines__fixunssfsi
: Soft float library routines__fixunssfti
: Soft float library routines__fixunstfdi
: Soft float library routines__fixunstfsi
: Soft float library routines__fixunstfti
: Soft float library routines__fixunsxfdi
: Soft float library routines__fixunsxfsi
: Soft float library routines__fixunsxfti
: Soft float library routines__fixxfdi
: Soft float library routines__fixxfsi
: Soft float library routines__fixxfti
: Soft float library routines__floatdidf
: Soft float library routines__floatdisf
: Soft float library routines__floatditf
: Soft float library routines__floatdixf
: Soft float library routines__floatsidf
: Soft float library routines__floatsisf
: Soft float library routines__floatsitf
: Soft float library routines__floatsixf
: Soft float library routines__floattidf
: Soft float library routines__floattisf
: Soft float library routines__floattitf
: Soft float library routines__floattixf
: Soft float library routines__floatundidf
: Soft float library routines__floatundisf
: Soft float library routines__floatunditf
: Soft float library routines__floatundixf
: Soft float library routines__floatunsidf
: Soft float library routines__floatunsisf
: Soft float library routines__floatunsitf
: Soft float library routines__floatunsixf
: Soft float library routines__floatuntidf
: Soft float library routines__floatuntisf
: Soft float library routines__floatuntitf
: Soft float library routines__floatuntixf
: Soft float library routines__fractdadf
: Fixed-point fractional library routines__fractdadi
: Fixed-point fractional library routines__fractdadq
: Fixed-point fractional library routines__fractdaha2
: Fixed-point fractional library routines__fractdahi
: Fixed-point fractional library routines__fractdahq
: Fixed-point fractional library routines__fractdaqi
: Fixed-point fractional library routines__fractdaqq
: Fixed-point fractional library routines__fractdasa2
: Fixed-point fractional library routines__fractdasf
: Fixed-point fractional library routines__fractdasi
: Fixed-point fractional library routines__fractdasq
: Fixed-point fractional library routines__fractdata2
: Fixed-point fractional library routines__fractdati
: Fixed-point fractional library routines__fractdauda
: Fixed-point fractional library routines__fractdaudq
: Fixed-point fractional library routines__fractdauha
: Fixed-point fractional library routines__fractdauhq
: Fixed-point fractional library routines__fractdauqq
: Fixed-point fractional library routines__fractdausa
: Fixed-point fractional library routines__fractdausq
: Fixed-point fractional library routines__fractdauta
: Fixed-point fractional library routines__fractdfda
: Fixed-point fractional library routines__fractdfdq
: Fixed-point fractional library routines__fractdfha
: Fixed-point fractional library routines__fractdfhq
: Fixed-point fractional library routines__fractdfqq
: Fixed-point fractional library routines__fractdfsa
: Fixed-point fractional library routines__fractdfsq
: Fixed-point fractional library routines__fractdfta
: Fixed-point fractional library routines__fractdfuda
: Fixed-point fractional library routines__fractdfudq
: Fixed-point fractional library routines__fractdfuha
: Fixed-point fractional library routines__fractdfuhq
: Fixed-point fractional library routines__fractdfuqq
: Fixed-point fractional library routines__fractdfusa
: Fixed-point fractional library routines__fractdfusq
: Fixed-point fractional library routines__fractdfuta
: Fixed-point fractional library routines__fractdida
: Fixed-point fractional library routines__fractdidq
: Fixed-point fractional library routines__fractdiha
: Fixed-point fractional library routines__fractdihq
: Fixed-point fractional library routines__fractdiqq
: Fixed-point fractional library routines__fractdisa
: Fixed-point fractional library routines__fractdisq
: Fixed-point fractional library routines__fractdita
: Fixed-point fractional library routines__fractdiuda
: Fixed-point fractional library routines__fractdiudq
: Fixed-point fractional library routines__fractdiuha
: Fixed-point fractional library routines__fractdiuhq
: Fixed-point fractional library routines__fractdiuqq
: Fixed-point fractional library routines__fractdiusa
: Fixed-point fractional library routines__fractdiusq
: Fixed-point fractional library routines__fractdiuta
: Fixed-point fractional library routines__fractdqda
: Fixed-point fractional library routines__fractdqdf
: Fixed-point fractional library routines__fractdqdi
: Fixed-point fractional library routines__fractdqha
: Fixed-point fractional library routines__fractdqhi
: Fixed-point fractional library routines__fractdqhq2
: Fixed-point fractional library routines__fractdqqi
: Fixed-point fractional library routines__fractdqqq2
: Fixed-point fractional library routines__fractdqsa
: Fixed-point fractional library routines__fractdqsf
: Fixed-point fractional library routines__fractdqsi
: Fixed-point fractional library routines__fractdqsq2
: Fixed-point fractional library routines__fractdqta
: Fixed-point fractional library routines__fractdqti
: Fixed-point fractional library routines__fractdquda
: Fixed-point fractional library routines__fractdqudq
: Fixed-point fractional library routines__fractdquha
: Fixed-point fractional library routines__fractdquhq
: Fixed-point fractional library routines__fractdquqq
: Fixed-point fractional library routines__fractdqusa
: Fixed-point fractional library routines__fractdqusq
: Fixed-point fractional library routines__fractdquta
: Fixed-point fractional library routines__fracthada2
: Fixed-point fractional library routines__fracthadf
: Fixed-point fractional library routines__fracthadi
: Fixed-point fractional library routines__fracthadq
: Fixed-point fractional library routines__fracthahi
: Fixed-point fractional library routines__fracthahq
: Fixed-point fractional library routines__fracthaqi
: Fixed-point fractional library routines__fracthaqq
: Fixed-point fractional library routines__fracthasa2
: Fixed-point fractional library routines__fracthasf
: Fixed-point fractional library routines__fracthasi
: Fixed-point fractional library routines__fracthasq
: Fixed-point fractional library routines__fracthata2
: Fixed-point fractional library routines__fracthati
: Fixed-point fractional library routines__fracthauda
: Fixed-point fractional library routines__fracthaudq
: Fixed-point fractional library routines__fracthauha
: Fixed-point fractional library routines__fracthauhq
: Fixed-point fractional library routines__fracthauqq
: Fixed-point fractional library routines__fracthausa
: Fixed-point fractional library routines__fracthausq
: Fixed-point fractional library routines__fracthauta
: Fixed-point fractional library routines__fracthida
: Fixed-point fractional library routines__fracthidq
: Fixed-point fractional library routines__fracthiha
: Fixed-point fractional library routines__fracthihq
: Fixed-point fractional library routines__fracthiqq
: Fixed-point fractional library routines__fracthisa
: Fixed-point fractional library routines__fracthisq
: Fixed-point fractional library routines__fracthita
: Fixed-point fractional library routines__fracthiuda
: Fixed-point fractional library routines__fracthiudq
: Fixed-point fractional library routines__fracthiuha
: Fixed-point fractional library routines__fracthiuhq
: Fixed-point fractional library routines__fracthiuqq
: Fixed-point fractional library routines__fracthiusa
: Fixed-point fractional library routines__fracthiusq
: Fixed-point fractional library routines__fracthiuta
: Fixed-point fractional library routines__fracthqda
: Fixed-point fractional library routines__fracthqdf
: Fixed-point fractional library routines__fracthqdi
: Fixed-point fractional library routines__fracthqdq2
: Fixed-point fractional library routines__fracthqha
: Fixed-point fractional library routines__fracthqhi
: Fixed-point fractional library routines__fracthqqi
: Fixed-point fractional library routines__fracthqqq2
: Fixed-point fractional library routines__fracthqsa
: Fixed-point fractional library routines__fracthqsf
: Fixed-point fractional library routines__fracthqsi
: Fixed-point fractional library routines__fracthqsq2
: Fixed-point fractional library routines__fracthqta
: Fixed-point fractional library routines__fracthqti
: Fixed-point fractional library routines__fracthquda
: Fixed-point fractional library routines__fracthqudq
: Fixed-point fractional library routines__fracthquha
: Fixed-point fractional library routines__fracthquhq
: Fixed-point fractional library routines__fracthquqq
: Fixed-point fractional library routines__fracthqusa
: Fixed-point fractional library routines__fracthqusq
: Fixed-point fractional library routines__fracthquta
: Fixed-point fractional library routines__fractqida
: Fixed-point fractional library routines__fractqidq
: Fixed-point fractional library routines__fractqiha
: Fixed-point fractional library routines__fractqihq
: Fixed-point fractional library routines__fractqiqq
: Fixed-point fractional library routines__fractqisa
: Fixed-point fractional library routines__fractqisq
: Fixed-point fractional library routines__fractqita
: Fixed-point fractional library routines__fractqiuda
: Fixed-point fractional library routines__fractqiudq
: Fixed-point fractional library routines__fractqiuha
: Fixed-point fractional library routines__fractqiuhq
: Fixed-point fractional library routines__fractqiuqq
: Fixed-point fractional library routines__fractqiusa
: Fixed-point fractional library routines__fractqiusq
: Fixed-point fractional library routines__fractqiuta
: Fixed-point fractional library routines__fractqqda
: Fixed-point fractional library routines__fractqqdf
: Fixed-point fractional library routines__fractqqdi
: Fixed-point fractional library routines__fractqqdq2
: Fixed-point fractional library routines__fractqqha
: Fixed-point fractional library routines__fractqqhi
: Fixed-point fractional library routines__fractqqhq2
: Fixed-point fractional library routines__fractqqqi
: Fixed-point fractional library routines__fractqqsa
: Fixed-point fractional library routines__fractqqsf
: Fixed-point fractional library routines__fractqqsi
: Fixed-point fractional library routines__fractqqsq2
: Fixed-point fractional library routines__fractqqta
: Fixed-point fractional library routines__fractqqti
: Fixed-point fractional library routines__fractqquda
: Fixed-point fractional library routines__fractqqudq
: Fixed-point fractional library routines__fractqquha
: Fixed-point fractional library routines__fractqquhq
: Fixed-point fractional library routines__fractqquqq
: Fixed-point fractional library routines__fractqqusa
: Fixed-point fractional library routines__fractqqusq
: Fixed-point fractional library routines__fractqquta
: Fixed-point fractional library routines__fractsada2
: Fixed-point fractional library routines__fractsadf
: Fixed-point fractional library routines__fractsadi
: Fixed-point fractional library routines__fractsadq
: Fixed-point fractional library routines__fractsaha2
: Fixed-point fractional library routines__fractsahi
: Fixed-point fractional library routines__fractsahq
: Fixed-point fractional library routines__fractsaqi
: Fixed-point fractional library routines__fractsaqq
: Fixed-point fractional library routines__fractsasf
: Fixed-point fractional library routines__fractsasi
: Fixed-point fractional library routines__fractsasq
: Fixed-point fractional library routines__fractsata2
: Fixed-point fractional library routines__fractsati
: Fixed-point fractional library routines__fractsauda
: Fixed-point fractional library routines__fractsaudq
: Fixed-point fractional library routines__fractsauha
: Fixed-point fractional library routines__fractsauhq
: Fixed-point fractional library routines__fractsauqq
: Fixed-point fractional library routines__fractsausa
: Fixed-point fractional library routines__fractsausq
: Fixed-point fractional library routines__fractsauta
: Fixed-point fractional library routines__fractsfda
: Fixed-point fractional library routines__fractsfdq
: Fixed-point fractional library routines__fractsfha
: Fixed-point fractional library routines__fractsfhq
: Fixed-point fractional library routines__fractsfqq
: Fixed-point fractional library routines__fractsfsa
: Fixed-point fractional library routines__fractsfsq
: Fixed-point fractional library routines__fractsfta
: Fixed-point fractional library routines__fractsfuda
: Fixed-point fractional library routines__fractsfudq
: Fixed-point fractional library routines__fractsfuha
: Fixed-point fractional library routines__fractsfuhq
: Fixed-point fractional library routines__fractsfuqq
: Fixed-point fractional library routines__fractsfusa
: Fixed-point fractional library routines__fractsfusq
: Fixed-point fractional library routines__fractsfuta
: Fixed-point fractional library routines__fractsida
: Fixed-point fractional library routines__fractsidq
: Fixed-point fractional library routines__fractsiha
: Fixed-point fractional library routines__fractsihq
: Fixed-point fractional library routines__fractsiqq
: Fixed-point fractional library routines__fractsisa
: Fixed-point fractional library routines__fractsisq
: Fixed-point fractional library routines__fractsita
: Fixed-point fractional library routines__fractsiuda
: Fixed-point fractional library routines__fractsiudq
: Fixed-point fractional library routines__fractsiuha
: Fixed-point fractional library routines__fractsiuhq
: Fixed-point fractional library routines__fractsiuqq
: Fixed-point fractional library routines__fractsiusa
: Fixed-point fractional library routines__fractsiusq
: Fixed-point fractional library routines__fractsiuta
: Fixed-point fractional library routines__fractsqda
: Fixed-point fractional library routines__fractsqdf
: Fixed-point fractional library routines__fractsqdi
: Fixed-point fractional library routines__fractsqdq2
: Fixed-point fractional library routines__fractsqha
: Fixed-point fractional library routines__fractsqhi
: Fixed-point fractional library routines__fractsqhq2
: Fixed-point fractional library routines__fractsqqi
: Fixed-point fractional library routines__fractsqqq2
: Fixed-point fractional library routines__fractsqsa
: Fixed-point fractional library routines__fractsqsf
: Fixed-point fractional library routines__fractsqsi
: Fixed-point fractional library routines__fractsqta
: Fixed-point fractional library routines__fractsqti
: Fixed-point fractional library routines__fractsquda
: Fixed-point fractional library routines__fractsqudq
: Fixed-point fractional library routines__fractsquha
: Fixed-point fractional library routines__fractsquhq
: Fixed-point fractional library routines__fractsquqq
: Fixed-point fractional library routines__fractsqusa
: Fixed-point fractional library routines__fractsqusq
: Fixed-point fractional library routines__fractsquta
: Fixed-point fractional library routines__fracttada2
: Fixed-point fractional library routines__fracttadf
: Fixed-point fractional library routines__fracttadi
: Fixed-point fractional library routines__fracttadq
: Fixed-point fractional library routines__fracttaha2
: Fixed-point fractional library routines__fracttahi
: Fixed-point fractional library routines__fracttahq
: Fixed-point fractional library routines__fracttaqi
: Fixed-point fractional library routines__fracttaqq
: Fixed-point fractional library routines__fracttasa2
: Fixed-point fractional library routines__fracttasf
: Fixed-point fractional library routines__fracttasi
: Fixed-point fractional library routines__fracttasq
: Fixed-point fractional library routines__fracttati
: Fixed-point fractional library routines__fracttauda
: Fixed-point fractional library routines__fracttaudq
: Fixed-point fractional library routines__fracttauha
: Fixed-point fractional library routines__fracttauhq
: Fixed-point fractional library routines__fracttauqq
: Fixed-point fractional library routines__fracttausa
: Fixed-point fractional library routines__fracttausq
: Fixed-point fractional library routines__fracttauta
: Fixed-point fractional library routines__fracttida
: Fixed-point fractional library routines__fracttidq
: Fixed-point fractional library routines__fracttiha
: Fixed-point fractional library routines__fracttihq
: Fixed-point fractional library routines__fracttiqq
: Fixed-point fractional library routines__fracttisa
: Fixed-point fractional library routines__fracttisq
: Fixed-point fractional library routines__fracttita
: Fixed-point fractional library routines__fracttiuda
: Fixed-point fractional library routines__fracttiudq
: Fixed-point fractional library routines__fracttiuha
: Fixed-point fractional library routines__fracttiuhq
: Fixed-point fractional library routines__fracttiuqq
: Fixed-point fractional library routines__fracttiusa
: Fixed-point fractional library routines__fracttiusq
: Fixed-point fractional library routines__fracttiuta
: Fixed-point fractional library routines__fractudada
: Fixed-point fractional library routines__fractudadf
: Fixed-point fractional library routines__fractudadi
: Fixed-point fractional library routines__fractudadq
: Fixed-point fractional library routines__fractudaha
: Fixed-point fractional library routines__fractudahi
: Fixed-point fractional library routines__fractudahq
: Fixed-point fractional library routines__fractudaqi
: Fixed-point fractional library routines__fractudaqq
: Fixed-point fractional library routines__fractudasa
: Fixed-point fractional library routines__fractudasf
: Fixed-point fractional library routines__fractudasi
: Fixed-point fractional library routines__fractudasq
: Fixed-point fractional library routines__fractudata
: Fixed-point fractional library routines__fractudati
: Fixed-point fractional library routines__fractudaudq
: Fixed-point fractional library routines__fractudauha2
: Fixed-point fractional library routines__fractudauhq
: Fixed-point fractional library routines__fractudauqq
: Fixed-point fractional library routines__fractudausa2
: Fixed-point fractional library routines__fractudausq
: Fixed-point fractional library routines__fractudauta2
: Fixed-point fractional library routines__fractudqda
: Fixed-point fractional library routines__fractudqdf
: Fixed-point fractional library routines__fractudqdi
: Fixed-point fractional library routines__fractudqdq
: Fixed-point fractional library routines__fractudqha
: Fixed-point fractional library routines__fractudqhi
: Fixed-point fractional library routines__fractudqhq
: Fixed-point fractional library routines__fractudqqi
: Fixed-point fractional library routines__fractudqqq
: Fixed-point fractional library routines__fractudqsa
: Fixed-point fractional library routines__fractudqsf
: Fixed-point fractional library routines__fractudqsi
: Fixed-point fractional library routines__fractudqsq
: Fixed-point fractional library routines__fractudqta
: Fixed-point fractional library routines__fractudqti
: Fixed-point fractional library routines__fractudquda
: Fixed-point fractional library routines__fractudquha
: Fixed-point fractional library routines__fractudquhq2
: Fixed-point fractional library routines__fractudquqq2
: Fixed-point fractional library routines__fractudqusa
: Fixed-point fractional library routines__fractudqusq2
: Fixed-point fractional library routines__fractudquta
: Fixed-point fractional library routines__fractuhada
: Fixed-point fractional library routines__fractuhadf
: Fixed-point fractional library routines__fractuhadi
: Fixed-point fractional library routines__fractuhadq
: Fixed-point fractional library routines__fractuhaha
: Fixed-point fractional library routines__fractuhahi
: Fixed-point fractional library routines__fractuhahq
: Fixed-point fractional library routines__fractuhaqi
: Fixed-point fractional library routines__fractuhaqq
: Fixed-point fractional library routines__fractuhasa
: Fixed-point fractional library routines__fractuhasf
: Fixed-point fractional library routines__fractuhasi
: Fixed-point fractional library routines__fractuhasq
: Fixed-point fractional library routines__fractuhata
: Fixed-point fractional library routines__fractuhati
: Fixed-point fractional library routines__fractuhauda2
: Fixed-point fractional library routines__fractuhaudq
: Fixed-point fractional library routines__fractuhauhq
: Fixed-point fractional library routines__fractuhauqq
: Fixed-point fractional library routines__fractuhausa2
: Fixed-point fractional library routines__fractuhausq
: Fixed-point fractional library routines__fractuhauta2
: Fixed-point fractional library routines__fractuhqda
: Fixed-point fractional library routines__fractuhqdf
: Fixed-point fractional library routines__fractuhqdi
: Fixed-point fractional library routines__fractuhqdq
: Fixed-point fractional library routines__fractuhqha
: Fixed-point fractional library routines__fractuhqhi
: Fixed-point fractional library routines__fractuhqhq
: Fixed-point fractional library routines__fractuhqqi
: Fixed-point fractional library routines__fractuhqqq
: Fixed-point fractional library routines__fractuhqsa
: Fixed-point fractional library routines__fractuhqsf
: Fixed-point fractional library routines__fractuhqsi
: Fixed-point fractional library routines__fractuhqsq
: Fixed-point fractional library routines__fractuhqta
: Fixed-point fractional library routines__fractuhqti
: Fixed-point fractional library routines__fractuhquda
: Fixed-point fractional library routines__fractuhqudq2
: Fixed-point fractional library routines__fractuhquha
: Fixed-point fractional library routines__fractuhquqq2
: Fixed-point fractional library routines__fractuhqusa
: Fixed-point fractional library routines__fractuhqusq2
: Fixed-point fractional library routines__fractuhquta
: Fixed-point fractional library routines__fractunsdadi
: Fixed-point fractional library routines__fractunsdahi
: Fixed-point fractional library routines__fractunsdaqi
: Fixed-point fractional library routines__fractunsdasi
: Fixed-point fractional library routines__fractunsdati
: Fixed-point fractional library routines__fractunsdida
: Fixed-point fractional library routines__fractunsdidq
: Fixed-point fractional library routines__fractunsdiha
: Fixed-point fractional library routines__fractunsdihq
: Fixed-point fractional library routines__fractunsdiqq
: Fixed-point fractional library routines__fractunsdisa
: Fixed-point fractional library routines__fractunsdisq
: Fixed-point fractional library routines__fractunsdita
: Fixed-point fractional library routines__fractunsdiuda
: Fixed-point fractional library routines__fractunsdiudq
: Fixed-point fractional library routines__fractunsdiuha
: Fixed-point fractional library routines__fractunsdiuhq
: Fixed-point fractional library routines__fractunsdiuqq
: Fixed-point fractional library routines__fractunsdiusa
: Fixed-point fractional library routines__fractunsdiusq
: Fixed-point fractional library routines__fractunsdiuta
: Fixed-point fractional library routines__fractunsdqdi
: Fixed-point fractional library routines__fractunsdqhi
: Fixed-point fractional library routines__fractunsdqqi
: Fixed-point fractional library routines__fractunsdqsi
: Fixed-point fractional library routines__fractunsdqti
: Fixed-point fractional library routines__fractunshadi
: Fixed-point fractional library routines__fractunshahi
: Fixed-point fractional library routines__fractunshaqi
: Fixed-point fractional library routines__fractunshasi
: Fixed-point fractional library routines__fractunshati
: Fixed-point fractional library routines__fractunshida
: Fixed-point fractional library routines__fractunshidq
: Fixed-point fractional library routines__fractunshiha
: Fixed-point fractional library routines__fractunshihq
: Fixed-point fractional library routines__fractunshiqq
: Fixed-point fractional library routines__fractunshisa
: Fixed-point fractional library routines__fractunshisq
: Fixed-point fractional library routines__fractunshita
: Fixed-point fractional library routines__fractunshiuda
: Fixed-point fractional library routines__fractunshiudq
: Fixed-point fractional library routines__fractunshiuha
: Fixed-point fractional library routines__fractunshiuhq
: Fixed-point fractional library routines__fractunshiuqq
: Fixed-point fractional library routines__fractunshiusa
: Fixed-point fractional library routines__fractunshiusq
: Fixed-point fractional library routines__fractunshiuta
: Fixed-point fractional library routines__fractunshqdi
: Fixed-point fractional library routines__fractunshqhi
: Fixed-point fractional library routines__fractunshqqi
: Fixed-point fractional library routines__fractunshqsi
: Fixed-point fractional library routines__fractunshqti
: Fixed-point fractional library routines__fractunsqida
: Fixed-point fractional library routines__fractunsqidq
: Fixed-point fractional library routines__fractunsqiha
: Fixed-point fractional library routines__fractunsqihq
: Fixed-point fractional library routines__fractunsqiqq
: Fixed-point fractional library routines__fractunsqisa
: Fixed-point fractional library routines__fractunsqisq
: Fixed-point fractional library routines__fractunsqita
: Fixed-point fractional library routines__fractunsqiuda
: Fixed-point fractional library routines__fractunsqiudq
: Fixed-point fractional library routines__fractunsqiuha
: Fixed-point fractional library routines__fractunsqiuhq
: Fixed-point fractional library routines__fractunsqiuqq
: Fixed-point fractional library routines__fractunsqiusa
: Fixed-point fractional library routines__fractunsqiusq
: Fixed-point fractional library routines__fractunsqiuta
: Fixed-point fractional library routines__fractunsqqdi
: Fixed-point fractional library routines__fractunsqqhi
: Fixed-point fractional library routines__fractunsqqqi
: Fixed-point fractional library routines__fractunsqqsi
: Fixed-point fractional library routines__fractunsqqti
: Fixed-point fractional library routines__fractunssadi
: Fixed-point fractional library routines__fractunssahi
: Fixed-point fractional library routines__fractunssaqi
: Fixed-point fractional library routines__fractunssasi
: Fixed-point fractional library routines__fractunssati
: Fixed-point fractional library routines__fractunssida
: Fixed-point fractional library routines__fractunssidq
: Fixed-point fractional library routines__fractunssiha
: Fixed-point fractional library routines__fractunssihq
: Fixed-point fractional library routines__fractunssiqq
: Fixed-point fractional library routines__fractunssisa
: Fixed-point fractional library routines__fractunssisq
: Fixed-point fractional library routines__fractunssita
: Fixed-point fractional library routines__fractunssiuda
: Fixed-point fractional library routines__fractunssiudq
: Fixed-point fractional library routines__fractunssiuha
: Fixed-point fractional library routines__fractunssiuhq
: Fixed-point fractional library routines__fractunssiuqq
: Fixed-point fractional library routines__fractunssiusa
: Fixed-point fractional library routines__fractunssiusq
: Fixed-point fractional library routines__fractunssiuta
: Fixed-point fractional library routines__fractunssqdi
: Fixed-point fractional library routines__fractunssqhi
: Fixed-point fractional library routines__fractunssqqi
: Fixed-point fractional library routines__fractunssqsi
: Fixed-point fractional library routines__fractunssqti
: Fixed-point fractional library routines__fractunstadi
: Fixed-point fractional library routines__fractunstahi
: Fixed-point fractional library routines__fractunstaqi
: Fixed-point fractional library routines__fractunstasi
: Fixed-point fractional library routines__fractunstati
: Fixed-point fractional library routines__fractunstida
: Fixed-point fractional library routines__fractunstidq
: Fixed-point fractional library routines__fractunstiha
: Fixed-point fractional library routines__fractunstihq
: Fixed-point fractional library routines__fractunstiqq
: Fixed-point fractional library routines__fractunstisa
: Fixed-point fractional library routines__fractunstisq
: Fixed-point fractional library routines__fractunstita
: Fixed-point fractional library routines__fractunstiuda
: Fixed-point fractional library routines__fractunstiudq
: Fixed-point fractional library routines__fractunstiuha
: Fixed-point fractional library routines__fractunstiuhq
: Fixed-point fractional library routines__fractunstiuqq
: Fixed-point fractional library routines__fractunstiusa
: Fixed-point fractional library routines__fractunstiusq
: Fixed-point fractional library routines__fractunstiuta
: Fixed-point fractional library routines__fractunsudadi
: Fixed-point fractional library routines__fractunsudahi
: Fixed-point fractional library routines__fractunsudaqi
: Fixed-point fractional library routines__fractunsudasi
: Fixed-point fractional library routines__fractunsudati
: Fixed-point fractional library routines__fractunsudqdi
: Fixed-point fractional library routines__fractunsudqhi
: Fixed-point fractional library routines__fractunsudqqi
: Fixed-point fractional library routines__fractunsudqsi
: Fixed-point fractional library routines__fractunsudqti
: Fixed-point fractional library routines__fractunsuhadi
: Fixed-point fractional library routines__fractunsuhahi
: Fixed-point fractional library routines__fractunsuhaqi
: Fixed-point fractional library routines__fractunsuhasi
: Fixed-point fractional library routines__fractunsuhati
: Fixed-point fractional library routines__fractunsuhqdi
: Fixed-point fractional library routines__fractunsuhqhi
: Fixed-point fractional library routines__fractunsuhqqi
: Fixed-point fractional library routines__fractunsuhqsi
: Fixed-point fractional library routines__fractunsuhqti
: Fixed-point fractional library routines__fractunsuqqdi
: Fixed-point fractional library routines__fractunsuqqhi
: Fixed-point fractional library routines__fractunsuqqqi
: Fixed-point fractional library routines__fractunsuqqsi
: Fixed-point fractional library routines__fractunsuqqti
: Fixed-point fractional library routines__fractunsusadi
: Fixed-point fractional library routines__fractunsusahi
: Fixed-point fractional library routines__fractunsusaqi
: Fixed-point fractional library routines__fractunsusasi
: Fixed-point fractional library routines__fractunsusati
: Fixed-point fractional library routines__fractunsusqdi
: Fixed-point fractional library routines__fractunsusqhi
: Fixed-point fractional library routines__fractunsusqqi
: Fixed-point fractional library routines__fractunsusqsi
: Fixed-point fractional library routines__fractunsusqti
: Fixed-point fractional library routines__fractunsutadi
: Fixed-point fractional library routines__fractunsutahi
: Fixed-point fractional library routines__fractunsutaqi
: Fixed-point fractional library routines__fractunsutasi
: Fixed-point fractional library routines__fractunsutati
: Fixed-point fractional library routines__fractuqqda
: Fixed-point fractional library routines__fractuqqdf
: Fixed-point fractional library routines__fractuqqdi
: Fixed-point fractional library routines__fractuqqdq
: Fixed-point fractional library routines__fractuqqha
: Fixed-point fractional library routines__fractuqqhi
: Fixed-point fractional library routines__fractuqqhq
: Fixed-point fractional library routines__fractuqqqi
: Fixed-point fractional library routines__fractuqqqq
: Fixed-point fractional library routines__fractuqqsa
: Fixed-point fractional library routines__fractuqqsf
: Fixed-point fractional library routines__fractuqqsi
: Fixed-point fractional library routines__fractuqqsq
: Fixed-point fractional library routines__fractuqqta
: Fixed-point fractional library routines__fractuqqti
: Fixed-point fractional library routines__fractuqquda
: Fixed-point fractional library routines__fractuqqudq2
: Fixed-point fractional library routines__fractuqquha
: Fixed-point fractional library routines__fractuqquhq2
: Fixed-point fractional library routines__fractuqqusa
: Fixed-point fractional library routines__fractuqqusq2
: Fixed-point fractional library routines__fractuqquta
: Fixed-point fractional library routines__fractusada
: Fixed-point fractional library routines__fractusadf
: Fixed-point fractional library routines__fractusadi
: Fixed-point fractional library routines__fractusadq
: Fixed-point fractional library routines__fractusaha
: Fixed-point fractional library routines__fractusahi
: Fixed-point fractional library routines__fractusahq
: Fixed-point fractional library routines__fractusaqi
: Fixed-point fractional library routines__fractusaqq
: Fixed-point fractional library routines__fractusasa
: Fixed-point fractional library routines__fractusasf
: Fixed-point fractional library routines__fractusasi
: Fixed-point fractional library routines__fractusasq
: Fixed-point fractional library routines__fractusata
: Fixed-point fractional library routines__fractusati
: Fixed-point fractional library routines__fractusauda2
: Fixed-point fractional library routines__fractusaudq
: Fixed-point fractional library routines__fractusauha2
: Fixed-point fractional library routines__fractusauhq
: Fixed-point fractional library routines__fractusauqq
: Fixed-point fractional library routines__fractusausq
: Fixed-point fractional library routines__fractusauta2
: Fixed-point fractional library routines__fractusqda
: Fixed-point fractional library routines__fractusqdf
: Fixed-point fractional library routines__fractusqdi
: Fixed-point fractional library routines__fractusqdq
: Fixed-point fractional library routines__fractusqha
: Fixed-point fractional library routines__fractusqhi
: Fixed-point fractional library routines__fractusqhq
: Fixed-point fractional library routines__fractusqqi
: Fixed-point fractional library routines__fractusqqq
: Fixed-point fractional library routines__fractusqsa
: Fixed-point fractional library routines__fractusqsf
: Fixed-point fractional library routines__fractusqsi
: Fixed-point fractional library routines__fractusqsq
: Fixed-point fractional library routines__fractusqta
: Fixed-point fractional library routines__fractusqti
: Fixed-point fractional library routines__fractusquda
: Fixed-point fractional library routines__fractusqudq2
: Fixed-point fractional library routines__fractusquha
: Fixed-point fractional library routines__fractusquhq2
: Fixed-point fractional library routines__fractusquqq2
: Fixed-point fractional library routines__fractusqusa
: Fixed-point fractional library routines__fractusquta
: Fixed-point fractional library routines__fractutada
: Fixed-point fractional library routines__fractutadf
: Fixed-point fractional library routines__fractutadi
: Fixed-point fractional library routines__fractutadq
: Fixed-point fractional library routines__fractutaha
: Fixed-point fractional library routines__fractutahi
: Fixed-point fractional library routines__fractutahq
: Fixed-point fractional library routines__fractutaqi
: Fixed-point fractional library routines__fractutaqq
: Fixed-point fractional library routines__fractutasa
: Fixed-point fractional library routines__fractutasf
: Fixed-point fractional library routines__fractutasi
: Fixed-point fractional library routines__fractutasq
: Fixed-point fractional library routines__fractutata
: Fixed-point fractional library routines__fractutati
: Fixed-point fractional library routines__fractutauda2
: Fixed-point fractional library routines__fractutaudq
: Fixed-point fractional library routines__fractutauha2
: Fixed-point fractional library routines__fractutauhq
: Fixed-point fractional library routines__fractutauqq
: Fixed-point fractional library routines__fractutausa2
: Fixed-point fractional library routines__fractutausq
: Fixed-point fractional library routines__gedf2
: Soft float library routines__gesf2
: Soft float library routines__getf2
: Soft float library routines__gtdf2
: Soft float library routines__gtsf2
: Soft float library routines__gttf2
: Soft float library routines__ledf2
: Soft float library routines__lesf2
: Soft float library routines__letf2
: Soft float library routines__lshrdi3
: Integer library routines__lshrsi3
: Integer library routines__lshrti3
: Integer library routines__lshruda3
: Fixed-point fractional library routines__lshrudq3
: Fixed-point fractional library routines__lshruha3
: Fixed-point fractional library routines__lshruhq3
: Fixed-point fractional library routines__lshruqq3
: Fixed-point fractional library routines__lshrusa3
: Fixed-point fractional library routines__lshrusq3
: Fixed-point fractional library routines__lshruta3
: Fixed-point fractional library routines__ltdf2
: Soft float library routines__ltsf2
: Soft float library routines__lttf2
: Soft float library routines__main
: Collect2__moddi3
: Integer library routines__modsi3
: Integer library routines__modti3
: Integer library routines__morestack_current_segment
: Miscellaneous routines__morestack_initial_sp
: Miscellaneous routines__morestack_segments
: Miscellaneous routines__mulda3
: Fixed-point fractional library routines__muldc3
: Soft float library routines__muldf3
: Soft float library routines__muldi3
: Integer library routines__muldq3
: Fixed-point fractional library routines__mulha3
: Fixed-point fractional library routines__mulhq3
: Fixed-point fractional library routines__mulqq3
: Fixed-point fractional library routines__mulsa3
: Fixed-point fractional library routines__mulsc3
: Soft float library routines__mulsf3
: Soft float library routines__mulsi3
: Integer library routines__mulsq3
: Fixed-point fractional library routines__multa3
: Fixed-point fractional library routines__multc3
: Soft float library routines__multf3
: Soft float library routines__multi3
: Integer library routines__muluda3
: Fixed-point fractional library routines__muludq3
: Fixed-point fractional library routines__muluha3
: Fixed-point fractional library routines__muluhq3
: Fixed-point fractional library routines__muluqq3
: Fixed-point fractional library routines__mulusa3
: Fixed-point fractional library routines__mulusq3
: Fixed-point fractional library routines__muluta3
: Fixed-point fractional library routines__mulvdi3
: Integer library routines__mulvsi3
: Integer library routines__mulxc3
: Soft float library routines__mulxf3
: Soft float library routines__nedf2
: Soft float library routines__negda2
: Fixed-point fractional library routines__negdf2
: Soft float library routines__negdi2
: Integer library routines__negdq2
: Fixed-point fractional library routines__negha2
: Fixed-point fractional library routines__neghq2
: Fixed-point fractional library routines__negqq2
: Fixed-point fractional library routines__negsa2
: Fixed-point fractional library routines__negsf2
: Soft float library routines__negsq2
: Fixed-point fractional library routines__negta2
: Fixed-point fractional library routines__negtf2
: Soft float library routines__negti2
: Integer library routines__neguda2
: Fixed-point fractional library routines__negudq2
: Fixed-point fractional library routines__neguha2
: Fixed-point fractional library routines__neguhq2
: Fixed-point fractional library routines__neguqq2
: Fixed-point fractional library routines__negusa2
: Fixed-point fractional library routines__negusq2
: Fixed-point fractional library routines__neguta2
: Fixed-point fractional library routines__negvdi2
: Integer library routines__negvsi2
: Integer library routines__negxf2
: Soft float library routines__nesf2
: Soft float library routines__netf2
: Soft float library routines__paritydi2
: Integer library routines__paritysi2
: Integer library routines__parityti2
: Integer library routines__popcountdi2
: Integer library routines__popcountsi2
: Integer library routines__popcountti2
: Integer library routines__powidf2
: Soft float library routines__powisf2
: Soft float library routines__powitf2
: Soft float library routines__powixf2
: Soft float library routines__satfractdadq
: Fixed-point fractional library routines__satfractdaha2
: Fixed-point fractional library routines__satfractdahq
: Fixed-point fractional library routines__satfractdaqq
: Fixed-point fractional library routines__satfractdasa2
: Fixed-point fractional library routines__satfractdasq
: Fixed-point fractional library routines__satfractdata2
: Fixed-point fractional library routines__satfractdauda
: Fixed-point fractional library routines__satfractdaudq
: Fixed-point fractional library routines__satfractdauha
: Fixed-point fractional library routines__satfractdauhq
: Fixed-point fractional library routines__satfractdauqq
: Fixed-point fractional library routines__satfractdausa
: Fixed-point fractional library routines__satfractdausq
: Fixed-point fractional library routines__satfractdauta
: Fixed-point fractional library routines__satfractdfda
: Fixed-point fractional library routines__satfractdfdq
: Fixed-point fractional library routines__satfractdfha
: Fixed-point fractional library routines__satfractdfhq
: Fixed-point fractional library routines__satfractdfqq
: Fixed-point fractional library routines__satfractdfsa
: Fixed-point fractional library routines__satfractdfsq
: Fixed-point fractional library routines__satfractdfta
: Fixed-point fractional library routines__satfractdfuda
: Fixed-point fractional library routines__satfractdfudq
: Fixed-point fractional library routines__satfractdfuha
: Fixed-point fractional library routines__satfractdfuhq
: Fixed-point fractional library routines__satfractdfuqq
: Fixed-point fractional library routines__satfractdfusa
: Fixed-point fractional library routines__satfractdfusq
: Fixed-point fractional library routines__satfractdfuta
: Fixed-point fractional library routines__satfractdida
: Fixed-point fractional library routines__satfractdidq
: Fixed-point fractional library routines__satfractdiha
: Fixed-point fractional library routines__satfractdihq
: Fixed-point fractional library routines__satfractdiqq
: Fixed-point fractional library routines__satfractdisa
: Fixed-point fractional library routines__satfractdisq
: Fixed-point fractional library routines__satfractdita
: Fixed-point fractional library routines__satfractdiuda
: Fixed-point fractional library routines__satfractdiudq
: Fixed-point fractional library routines__satfractdiuha
: Fixed-point fractional library routines__satfractdiuhq
: Fixed-point fractional library routines__satfractdiuqq
: Fixed-point fractional library routines__satfractdiusa
: Fixed-point fractional library routines__satfractdiusq
: Fixed-point fractional library routines__satfractdiuta
: Fixed-point fractional library routines__satfractdqda
: Fixed-point fractional library routines__satfractdqha
: Fixed-point fractional library routines__satfractdqhq2
: Fixed-point fractional library routines__satfractdqqq2
: Fixed-point fractional library routines__satfractdqsa
: Fixed-point fractional library routines__satfractdqsq2
: Fixed-point fractional library routines__satfractdqta
: Fixed-point fractional library routines__satfractdquda
: Fixed-point fractional library routines__satfractdqudq
: Fixed-point fractional library routines__satfractdquha
: Fixed-point fractional library routines__satfractdquhq
: Fixed-point fractional library routines__satfractdquqq
: Fixed-point fractional library routines__satfractdqusa
: Fixed-point fractional library routines__satfractdqusq
: Fixed-point fractional library routines__satfractdquta
: Fixed-point fractional library routines__satfracthada2
: Fixed-point fractional library routines__satfracthadq
: Fixed-point fractional library routines__satfracthahq
: Fixed-point fractional library routines__satfracthaqq
: Fixed-point fractional library routines__satfracthasa2
: Fixed-point fractional library routines__satfracthasq
: Fixed-point fractional library routines__satfracthata2
: Fixed-point fractional library routines__satfracthauda
: Fixed-point fractional library routines__satfracthaudq
: Fixed-point fractional library routines__satfracthauha
: Fixed-point fractional library routines__satfracthauhq
: Fixed-point fractional library routines__satfracthauqq
: Fixed-point fractional library routines__satfracthausa
: Fixed-point fractional library routines__satfracthausq
: Fixed-point fractional library routines__satfracthauta
: Fixed-point fractional library routines__satfracthida
: Fixed-point fractional library routines__satfracthidq
: Fixed-point fractional library routines__satfracthiha
: Fixed-point fractional library routines__satfracthihq
: Fixed-point fractional library routines__satfracthiqq
: Fixed-point fractional library routines__satfracthisa
: Fixed-point fractional library routines__satfracthisq
: Fixed-point fractional library routines__satfracthita
: Fixed-point fractional library routines__satfracthiuda
: Fixed-point fractional library routines__satfracthiudq
: Fixed-point fractional library routines__satfracthiuha
: Fixed-point fractional library routines__satfracthiuhq
: Fixed-point fractional library routines__satfracthiuqq
: Fixed-point fractional library routines__satfracthiusa
: Fixed-point fractional library routines__satfracthiusq
: Fixed-point fractional library routines__satfracthiuta
: Fixed-point fractional library routines__satfracthqda
: Fixed-point fractional library routines__satfracthqdq2
: Fixed-point fractional library routines__satfracthqha
: Fixed-point fractional library routines__satfracthqqq2
: Fixed-point fractional library routines__satfracthqsa
: Fixed-point fractional library routines__satfracthqsq2
: Fixed-point fractional library routines__satfracthqta
: Fixed-point fractional library routines__satfracthquda
: Fixed-point fractional library routines__satfracthqudq
: Fixed-point fractional library routines__satfracthquha
: Fixed-point fractional library routines__satfracthquhq
: Fixed-point fractional library routines__satfracthquqq
: Fixed-point fractional library routines__satfracthqusa
: Fixed-point fractional library routines__satfracthqusq
: Fixed-point fractional library routines__satfracthquta
: Fixed-point fractional library routines__satfractqida
: Fixed-point fractional library routines__satfractqidq
: Fixed-point fractional library routines__satfractqiha
: Fixed-point fractional library routines__satfractqihq
: Fixed-point fractional library routines__satfractqiqq
: Fixed-point fractional library routines__satfractqisa
: Fixed-point fractional library routines__satfractqisq
: Fixed-point fractional library routines__satfractqita
: Fixed-point fractional library routines__satfractqiuda
: Fixed-point fractional library routines__satfractqiudq
: Fixed-point fractional library routines__satfractqiuha
: Fixed-point fractional library routines__satfractqiuhq
: Fixed-point fractional library routines__satfractqiuqq
: Fixed-point fractional library routines__satfractqiusa
: Fixed-point fractional library routines__satfractqiusq
: Fixed-point fractional library routines__satfractqiuta
: Fixed-point fractional library routines__satfractqqda
: Fixed-point fractional library routines__satfractqqdq2
: Fixed-point fractional library routines__satfractqqha
: Fixed-point fractional library routines__satfractqqhq2
: Fixed-point fractional library routines__satfractqqsa
: Fixed-point fractional library routines__satfractqqsq2
: Fixed-point fractional library routines__satfractqqta
: Fixed-point fractional library routines__satfractqquda
: Fixed-point fractional library routines__satfractqqudq
: Fixed-point fractional library routines__satfractqquha
: Fixed-point fractional library routines__satfractqquhq
: Fixed-point fractional library routines__satfractqquqq
: Fixed-point fractional library routines__satfractqqusa
: Fixed-point fractional library routines__satfractqqusq
: Fixed-point fractional library routines__satfractqquta
: Fixed-point fractional library routines__satfractsada2
: Fixed-point fractional library routines__satfractsadq
: Fixed-point fractional library routines__satfractsaha2
: Fixed-point fractional library routines__satfractsahq
: Fixed-point fractional library routines__satfractsaqq
: Fixed-point fractional library routines__satfractsasq
: Fixed-point fractional library routines__satfractsata2
: Fixed-point fractional library routines__satfractsauda
: Fixed-point fractional library routines__satfractsaudq
: Fixed-point fractional library routines__satfractsauha
: Fixed-point fractional library routines__satfractsauhq
: Fixed-point fractional library routines__satfractsauqq
: Fixed-point fractional library routines__satfractsausa
: Fixed-point fractional library routines__satfractsausq
: Fixed-point fractional library routines__satfractsauta
: Fixed-point fractional library routines__satfractsfda
: Fixed-point fractional library routines__satfractsfdq
: Fixed-point fractional library routines__satfractsfha
: Fixed-point fractional library routines__satfractsfhq
: Fixed-point fractional library routines__satfractsfqq
: Fixed-point fractional library routines__satfractsfsa
: Fixed-point fractional library routines__satfractsfsq
: Fixed-point fractional library routines__satfractsfta
: Fixed-point fractional library routines__satfractsfuda
: Fixed-point fractional library routines__satfractsfudq
: Fixed-point fractional library routines__satfractsfuha
: Fixed-point fractional library routines__satfractsfuhq
: Fixed-point fractional library routines__satfractsfuqq
: Fixed-point fractional library routines__satfractsfusa
: Fixed-point fractional library routines__satfractsfusq
: Fixed-point fractional library routines__satfractsfuta
: Fixed-point fractional library routines__satfractsida
: Fixed-point fractional library routines__satfractsidq
: Fixed-point fractional library routines__satfractsiha
: Fixed-point fractional library routines__satfractsihq
: Fixed-point fractional library routines__satfractsiqq
: Fixed-point fractional library routines__satfractsisa
: Fixed-point fractional library routines__satfractsisq
: Fixed-point fractional library routines__satfractsita
: Fixed-point fractional library routines__satfractsiuda
: Fixed-point fractional library routines__satfractsiudq
: Fixed-point fractional library routines__satfractsiuha
: Fixed-point fractional library routines__satfractsiuhq
: Fixed-point fractional library routines__satfractsiuqq
: Fixed-point fractional library routines__satfractsiusa
: Fixed-point fractional library routines__satfractsiusq
: Fixed-point fractional library routines__satfractsiuta
: Fixed-point fractional library routines__satfractsqda
: Fixed-point fractional library routines__satfractsqdq2
: Fixed-point fractional library routines__satfractsqha
: Fixed-point fractional library routines__satfractsqhq2
: Fixed-point fractional library routines__satfractsqqq2
: Fixed-point fractional library routines__satfractsqsa
: Fixed-point fractional library routines__satfractsqta
: Fixed-point fractional library routines__satfractsquda
: Fixed-point fractional library routines__satfractsqudq
: Fixed-point fractional library routines__satfractsquha
: Fixed-point fractional library routines__satfractsquhq
: Fixed-point fractional library routines__satfractsquqq
: Fixed-point fractional library routines__satfractsqusa
: Fixed-point fractional library routines__satfractsqusq
: Fixed-point fractional library routines__satfractsquta
: Fixed-point fractional library routines__satfracttada2
: Fixed-point fractional library routines__satfracttadq
: Fixed-point fractional library routines__satfracttaha2
: Fixed-point fractional library routines__satfracttahq
: Fixed-point fractional library routines__satfracttaqq
: Fixed-point fractional library routines__satfracttasa2
: Fixed-point fractional library routines__satfracttasq
: Fixed-point fractional library routines__satfracttauda
: Fixed-point fractional library routines__satfracttaudq
: Fixed-point fractional library routines__satfracttauha
: Fixed-point fractional library routines__satfracttauhq
: Fixed-point fractional library routines__satfracttauqq
: Fixed-point fractional library routines__satfracttausa
: Fixed-point fractional library routines__satfracttausq
: Fixed-point fractional library routines__satfracttauta
: Fixed-point fractional library routines__satfracttida
: Fixed-point fractional library routines__satfracttidq
: Fixed-point fractional library routines__satfracttiha
: Fixed-point fractional library routines__satfracttihq
: Fixed-point fractional library routines__satfracttiqq
: Fixed-point fractional library routines__satfracttisa
: Fixed-point fractional library routines__satfracttisq
: Fixed-point fractional library routines__satfracttita
: Fixed-point fractional library routines__satfracttiuda
: Fixed-point fractional library routines__satfracttiudq
: Fixed-point fractional library routines__satfracttiuha
: Fixed-point fractional library routines__satfracttiuhq
: Fixed-point fractional library routines__satfracttiuqq
: Fixed-point fractional library routines__satfracttiusa
: Fixed-point fractional library routines__satfracttiusq
: Fixed-point fractional library routines__satfracttiuta
: Fixed-point fractional library routines__satfractudada
: Fixed-point fractional library routines__satfractudadq
: Fixed-point fractional library routines__satfractudaha
: Fixed-point fractional library routines__satfractudahq
: Fixed-point fractional library routines__satfractudaqq
: Fixed-point fractional library routines__satfractudasa
: Fixed-point fractional library routines__satfractudasq
: Fixed-point fractional library routines__satfractudata
: Fixed-point fractional library routines__satfractudaudq
: Fixed-point fractional library routines__satfractudauha2
: Fixed-point fractional library routines__satfractudauhq
: Fixed-point fractional library routines__satfractudauqq
: Fixed-point fractional library routines__satfractudausa2
: Fixed-point fractional library routines__satfractudausq
: Fixed-point fractional library routines__satfractudauta2
: Fixed-point fractional library routines__satfractudqda
: Fixed-point fractional library routines__satfractudqdq
: Fixed-point fractional library routines__satfractudqha
: Fixed-point fractional library routines__satfractudqhq
: Fixed-point fractional library routines__satfractudqqq
: Fixed-point fractional library routines__satfractudqsa
: Fixed-point fractional library routines__satfractudqsq
: Fixed-point fractional library routines__satfractudqta
: Fixed-point fractional library routines__satfractudquda
: Fixed-point fractional library routines__satfractudquha
: Fixed-point fractional library routines__satfractudquhq2
: Fixed-point fractional library routines__satfractudquqq2
: Fixed-point fractional library routines__satfractudqusa
: Fixed-point fractional library routines__satfractudqusq2
: Fixed-point fractional library routines__satfractudquta
: Fixed-point fractional library routines__satfractuhada
: Fixed-point fractional library routines__satfractuhadq
: Fixed-point fractional library routines__satfractuhaha
: Fixed-point fractional library routines__satfractuhahq
: Fixed-point fractional library routines__satfractuhaqq
: Fixed-point fractional library routines__satfractuhasa
: Fixed-point fractional library routines__satfractuhasq
: Fixed-point fractional library routines__satfractuhata
: Fixed-point fractional library routines__satfractuhauda2
: Fixed-point fractional library routines__satfractuhaudq
: Fixed-point fractional library routines__satfractuhauhq
: Fixed-point fractional library routines__satfractuhauqq
: Fixed-point fractional library routines__satfractuhausa2
: Fixed-point fractional library routines__satfractuhausq
: Fixed-point fractional library routines__satfractuhauta2
: Fixed-point fractional library routines__satfractuhqda
: Fixed-point fractional library routines__satfractuhqdq
: Fixed-point fractional library routines__satfractuhqha
: Fixed-point fractional library routines__satfractuhqhq
: Fixed-point fractional library routines__satfractuhqqq
: Fixed-point fractional library routines__satfractuhqsa
: Fixed-point fractional library routines__satfractuhqsq
: Fixed-point fractional library routines__satfractuhqta
: Fixed-point fractional library routines__satfractuhquda
: Fixed-point fractional library routines__satfractuhqudq2
: Fixed-point fractional library routines__satfractuhquha
: Fixed-point fractional library routines__satfractuhquqq2
: Fixed-point fractional library routines__satfractuhqusa
: Fixed-point fractional library routines__satfractuhqusq2
: Fixed-point fractional library routines__satfractuhquta
: Fixed-point fractional library routines__satfractunsdida
: Fixed-point fractional library routines__satfractunsdidq
: Fixed-point fractional library routines__satfractunsdiha
: Fixed-point fractional library routines__satfractunsdihq
: Fixed-point fractional library routines__satfractunsdiqq
: Fixed-point fractional library routines__satfractunsdisa
: Fixed-point fractional library routines__satfractunsdisq
: Fixed-point fractional library routines__satfractunsdita
: Fixed-point fractional library routines__satfractunsdiuda
: Fixed-point fractional library routines__satfractunsdiudq
: Fixed-point fractional library routines__satfractunsdiuha
: Fixed-point fractional library routines__satfractunsdiuhq
: Fixed-point fractional library routines__satfractunsdiuqq
: Fixed-point fractional library routines__satfractunsdiusa
: Fixed-point fractional library routines__satfractunsdiusq
: Fixed-point fractional library routines__satfractunsdiuta
: Fixed-point fractional library routines__satfractunshida
: Fixed-point fractional library routines__satfractunshidq
: Fixed-point fractional library routines__satfractunshiha
: Fixed-point fractional library routines__satfractunshihq
: Fixed-point fractional library routines__satfractunshiqq
: Fixed-point fractional library routines__satfractunshisa
: Fixed-point fractional library routines__satfractunshisq
: Fixed-point fractional library routines__satfractunshita
: Fixed-point fractional library routines__satfractunshiuda
: Fixed-point fractional library routines__satfractunshiudq
: Fixed-point fractional library routines__satfractunshiuha
: Fixed-point fractional library routines__satfractunshiuhq
: Fixed-point fractional library routines__satfractunshiuqq
: Fixed-point fractional library routines__satfractunshiusa
: Fixed-point fractional library routines__satfractunshiusq
: Fixed-point fractional library routines__satfractunshiuta
: Fixed-point fractional library routines__satfractunsqida
: Fixed-point fractional library routines__satfractunsqidq
: Fixed-point fractional library routines__satfractunsqiha
: Fixed-point fractional library routines__satfractunsqihq
: Fixed-point fractional library routines__satfractunsqiqq
: Fixed-point fractional library routines__satfractunsqisa
: Fixed-point fractional library routines__satfractunsqisq
: Fixed-point fractional library routines__satfractunsqita
: Fixed-point fractional library routines__satfractunsqiuda
: Fixed-point fractional library routines__satfractunsqiudq
: Fixed-point fractional library routines__satfractunsqiuha
: Fixed-point fractional library routines__satfractunsqiuhq
: Fixed-point fractional library routines__satfractunsqiuqq
: Fixed-point fractional library routines__satfractunsqiusa
: Fixed-point fractional library routines__satfractunsqiusq
: Fixed-point fractional library routines__satfractunsqiuta
: Fixed-point fractional library routines__satfractunssida
: Fixed-point fractional library routines__satfractunssidq
: Fixed-point fractional library routines__satfractunssiha
: Fixed-point fractional library routines__satfractunssihq
: Fixed-point fractional library routines__satfractunssiqq
: Fixed-point fractional library routines__satfractunssisa
: Fixed-point fractional library routines__satfractunssisq
: Fixed-point fractional library routines__satfractunssita
: Fixed-point fractional library routines__satfractunssiuda
: Fixed-point fractional library routines__satfractunssiudq
: Fixed-point fractional library routines__satfractunssiuha
: Fixed-point fractional library routines__satfractunssiuhq
: Fixed-point fractional library routines__satfractunssiuqq
: Fixed-point fractional library routines__satfractunssiusa
: Fixed-point fractional library routines__satfractunssiusq
: Fixed-point fractional library routines__satfractunssiuta
: Fixed-point fractional library routines__satfractunstida
: Fixed-point fractional library routines__satfractunstidq
: Fixed-point fractional library routines__satfractunstiha
: Fixed-point fractional library routines__satfractunstihq
: Fixed-point fractional library routines__satfractunstiqq
: Fixed-point fractional library routines__satfractunstisa
: Fixed-point fractional library routines__satfractunstisq
: Fixed-point fractional library routines__satfractunstita
: Fixed-point fractional library routines__satfractunstiuda
: Fixed-point fractional library routines__satfractunstiudq
: Fixed-point fractional library routines__satfractunstiuha
: Fixed-point fractional library routines__satfractunstiuhq
: Fixed-point fractional library routines__satfractunstiuqq
: Fixed-point fractional library routines__satfractunstiusa
: Fixed-point fractional library routines__satfractunstiusq
: Fixed-point fractional library routines__satfractunstiuta
: Fixed-point fractional library routines__satfractuqqda
: Fixed-point fractional library routines__satfractuqqdq
: Fixed-point fractional library routines__satfractuqqha
: Fixed-point fractional library routines__satfractuqqhq
: Fixed-point fractional library routines__satfractuqqqq
: Fixed-point fractional library routines__satfractuqqsa
: Fixed-point fractional library routines__satfractuqqsq
: Fixed-point fractional library routines__satfractuqqta
: Fixed-point fractional library routines__satfractuqquda
: Fixed-point fractional library routines__satfractuqqudq2
: Fixed-point fractional library routines__satfractuqquha
: Fixed-point fractional library routines__satfractuqquhq2
: Fixed-point fractional library routines__satfractuqqusa
: Fixed-point fractional library routines__satfractuqqusq2
: Fixed-point fractional library routines__satfractuqquta
: Fixed-point fractional library routines__satfractusada
: Fixed-point fractional library routines__satfractusadq
: Fixed-point fractional library routines__satfractusaha
: Fixed-point fractional library routines__satfractusahq
: Fixed-point fractional library routines__satfractusaqq
: Fixed-point fractional library routines__satfractusasa
: Fixed-point fractional library routines__satfractusasq
: Fixed-point fractional library routines__satfractusata
: Fixed-point fractional library routines__satfractusauda2
: Fixed-point fractional library routines__satfractusaudq
: Fixed-point fractional library routines__satfractusauha2
: Fixed-point fractional library routines__satfractusauhq
: Fixed-point fractional library routines__satfractusauqq
: Fixed-point fractional library routines__satfractusausq
: Fixed-point fractional library routines__satfractusauta2
: Fixed-point fractional library routines__satfractusqda
: Fixed-point fractional library routines__satfractusqdq
: Fixed-point fractional library routines__satfractusqha
: Fixed-point fractional library routines__satfractusqhq
: Fixed-point fractional library routines__satfractusqqq
: Fixed-point fractional library routines__satfractusqsa
: Fixed-point fractional library routines__satfractusqsq
: Fixed-point fractional library routines__satfractusqta
: Fixed-point fractional library routines__satfractusquda
: Fixed-point fractional library routines__satfractusqudq2
: Fixed-point fractional library routines__satfractusquha
: Fixed-point fractional library routines__satfractusquhq2
: Fixed-point fractional library routines__satfractusquqq2
: Fixed-point fractional library routines__satfractusqusa
: Fixed-point fractional library routines__satfractusquta
: Fixed-point fractional library routines__satfractutada
: Fixed-point fractional library routines__satfractutadq
: Fixed-point fractional library routines__satfractutaha
: Fixed-point fractional library routines__satfractutahq
: Fixed-point fractional library routines__satfractutaqq
: Fixed-point fractional library routines__satfractutasa
: Fixed-point fractional library routines__satfractutasq
: Fixed-point fractional library routines__satfractutata
: Fixed-point fractional library routines__satfractutauda2
: Fixed-point fractional library routines__satfractutaudq
: Fixed-point fractional library routines__satfractutauha2
: Fixed-point fractional library routines__satfractutauhq
: Fixed-point fractional library routines__satfractutauqq
: Fixed-point fractional library routines__satfractutausa2
: Fixed-point fractional library routines__satfractutausq
: Fixed-point fractional library routines__splitstack_find
: Miscellaneous routines__ssaddda3
: Fixed-point fractional library routines__ssadddq3
: Fixed-point fractional library routines__ssaddha3
: Fixed-point fractional library routines__ssaddhq3
: Fixed-point fractional library routines__ssaddqq3
: Fixed-point fractional library routines__ssaddsa3
: Fixed-point fractional library routines__ssaddsq3
: Fixed-point fractional library routines__ssaddta3
: Fixed-point fractional library routines__ssashlda3
: Fixed-point fractional library routines__ssashldq3
: Fixed-point fractional library routines__ssashlha3
: Fixed-point fractional library routines__ssashlhq3
: Fixed-point fractional library routines__ssashlsa3
: Fixed-point fractional library routines__ssashlsq3
: Fixed-point fractional library routines__ssashlta3
: Fixed-point fractional library routines__ssdivda3
: Fixed-point fractional library routines__ssdivdq3
: Fixed-point fractional library routines__ssdivha3
: Fixed-point fractional library routines__ssdivhq3
: Fixed-point fractional library routines__ssdivqq3
: Fixed-point fractional library routines__ssdivsa3
: Fixed-point fractional library routines__ssdivsq3
: Fixed-point fractional library routines__ssdivta3
: Fixed-point fractional library routines__ssmulda3
: Fixed-point fractional library routines__ssmuldq3
: Fixed-point fractional library routines__ssmulha3
: Fixed-point fractional library routines__ssmulhq3
: Fixed-point fractional library routines__ssmulqq3
: Fixed-point fractional library routines__ssmulsa3
: Fixed-point fractional library routines__ssmulsq3
: Fixed-point fractional library routines__ssmulta3
: Fixed-point fractional library routines__ssnegda2
: Fixed-point fractional library routines__ssnegdq2
: Fixed-point fractional library routines__ssnegha2
: Fixed-point fractional library routines__ssneghq2
: Fixed-point fractional library routines__ssnegqq2
: Fixed-point fractional library routines__ssnegsa2
: Fixed-point fractional library routines__ssnegsq2
: Fixed-point fractional library routines__ssnegta2
: Fixed-point fractional library routines__sssubda3
: Fixed-point fractional library routines__sssubdq3
: Fixed-point fractional library routines__sssubha3
: Fixed-point fractional library routines__sssubhq3
: Fixed-point fractional library routines__sssubqq3
: Fixed-point fractional library routines__sssubsa3
: Fixed-point fractional library routines__sssubsq3
: Fixed-point fractional library routines__sssubta3
: Fixed-point fractional library routines__subda3
: Fixed-point fractional library routines__subdf3
: Soft float library routines__subdq3
: Fixed-point fractional library routines__subha3
: Fixed-point fractional library routines__subhq3
: Fixed-point fractional library routines__subqq3
: Fixed-point fractional library routines__subsa3
: Fixed-point fractional library routines__subsf3
: Soft float library routines__subsq3
: Fixed-point fractional library routines__subta3
: Fixed-point fractional library routines__subtf3
: Soft float library routines__subuda3
: Fixed-point fractional library routines__subudq3
: Fixed-point fractional library routines__subuha3
: Fixed-point fractional library routines__subuhq3
: Fixed-point fractional library routines__subuqq3
: Fixed-point fractional library routines__subusa3
: Fixed-point fractional library routines__subusq3
: Fixed-point fractional library routines__subuta3
: Fixed-point fractional library routines__subvdi3
: Integer library routines__subvsi3
: Integer library routines__subxf3
: Soft float library routines__truncdfsf2
: Soft float library routines__trunctfdf2
: Soft float library routines__trunctfsf2
: Soft float library routines__truncxfdf2
: Soft float library routines__truncxfsf2
: Soft float library routines__ucmpdi2
: Integer library routines__ucmpti2
: Integer library routines__udivdi3
: Integer library routines__udivmoddi4
: Integer library routines__udivmodti4
: Integer library routines__udivsi3
: Integer library routines__udivti3
: Integer library routines__udivuda3
: Fixed-point fractional library routines__udivudq3
: Fixed-point fractional library routines__udivuha3
: Fixed-point fractional library routines__udivuhq3
: Fixed-point fractional library routines__udivuqq3
: Fixed-point fractional library routines__udivusa3
: Fixed-point fractional library routines__udivusq3
: Fixed-point fractional library routines__udivuta3
: Fixed-point fractional library routines__umoddi3
: Integer library routines__umodsi3
: Integer library routines__umodti3
: Integer library routines__unorddf2
: Soft float library routines__unordsf2
: Soft float library routines__unordtf2
: Soft float library routines__usadduda3
: Fixed-point fractional library routines__usaddudq3
: Fixed-point fractional library routines__usadduha3
: Fixed-point fractional library routines__usadduhq3
: Fixed-point fractional library routines__usadduqq3
: Fixed-point fractional library routines__usaddusa3
: Fixed-point fractional library routines__usaddusq3
: Fixed-point fractional library routines__usadduta3
: Fixed-point fractional library routines__usashluda3
: Fixed-point fractional library routines__usashludq3
: Fixed-point fractional library routines__usashluha3
: Fixed-point fractional library routines__usashluhq3
: Fixed-point fractional library routines__usashluqq3
: Fixed-point fractional library routines__usashlusa3
: Fixed-point fractional library routines__usashlusq3
: Fixed-point fractional library routines__usashluta3
: Fixed-point fractional library routines__usdivuda3
: Fixed-point fractional library routines__usdivudq3
: Fixed-point fractional library routines__usdivuha3
: Fixed-point fractional library routines__usdivuhq3
: Fixed-point fractional library routines__usdivuqq3
: Fixed-point fractional library routines__usdivusa3
: Fixed-point fractional library routines__usdivusq3
: Fixed-point fractional library routines__usdivuta3
: Fixed-point fractional library routines__usmuluda3
: Fixed-point fractional library routines__usmuludq3
: Fixed-point fractional library routines__usmuluha3
: Fixed-point fractional library routines__usmuluhq3
: Fixed-point fractional library routines__usmuluqq3
: Fixed-point fractional library routines__usmulusa3
: Fixed-point fractional library routines__usmulusq3
: Fixed-point fractional library routines__usmuluta3
: Fixed-point fractional library routines__usneguda2
: Fixed-point fractional library routines__usnegudq2
: Fixed-point fractional library routines__usneguha2
: Fixed-point fractional library routines__usneguhq2
: Fixed-point fractional library routines__usneguqq2
: Fixed-point fractional library routines__usnegusa2
: Fixed-point fractional library routines__usnegusq2
: Fixed-point fractional library routines__usneguta2
: Fixed-point fractional library routines__ussubuda3
: Fixed-point fractional library routines__ussubudq3
: Fixed-point fractional library routines__ussubuha3
: Fixed-point fractional library routines__ussubuhq3
: Fixed-point fractional library routines__ussubuqq3
: Fixed-point fractional library routines__ussubusa3
: Fixed-point fractional library routines__ussubusq3
: Fixed-point fractional library routines__ussubuta3
: Fixed-point fractional library routinesabort
: Portabilityabs
: Arithmeticabs
and attributes: ExpressionsABS_EXPR
: Unary and Binary Expressionsabsence_set
: Processor pipeline descriptionabs
m2
instruction pattern: Standard NamesACCUM_TYPE_SIZE
: Type LayoutACCUMULATE_OUTGOING_ARGS
: Stack ArgumentsACCUMULATE_OUTGOING_ARGS
and stack frames: Function Entryacos
m2
instruction pattern: Standard NamesADA_LONG_TYPE_SIZE
: Type LayoutADDITIONAL_REGISTER_NAMES
: Instruction Outputadd
m3
instruction pattern: Standard Namesadd
modecc
instruction pattern: Standard Namesaddptr
m3
instruction pattern: Standard Namesaddr_diff_vec
: Side Effectsaddr_diff_vec
, length of: Insn LengthsADDR_EXPR
: Storage Referencesaddr_vec
: Side Effectsaddr_vec
, length of: Insn Lengthsaddress_operand
: Simple Constraintsaddress_operand
: Machine-Independent Predicatesaddv
m4
instruction pattern: Standard NamesADJUST_FIELD_ALIGN
: Storage LayoutADJUST_INSN_LENGTH
: Insn LengthsADJUST_REG_ALLOC_ORDER
: Allocation OrderALL_REGS
: Register Classesallocate_stack
instruction pattern: Standard Namesand
: Arithmeticand
and attributes: Expressionsand
, canonicalization of: Insn Canonicalizationsand
m3
instruction pattern: Standard NamesANNOTATE_EXPR
: Unary and Binary ExpressionsAPPLY_RESULT_SIZE
: Scalar ReturnARG_POINTER_CFA_OFFSET
: Frame LayoutARG_POINTER_REGNUM
: Frame RegistersARG_POINTER_REGNUM
and virtual registers: Regs and Memoryarg_pointer_rtx
: Frame RegistersARGS_GROW_DOWNWARD
: Frame LayoutARITHMETIC_TYPE_P
: Types for C++ARRAY_RANGE_REF
: Storage ReferencesARRAY_REF
: Storage ReferencesARRAY_TYPE
: TypesAS_NEEDS_DASH_FOR_PIPED_INPUT
: Driverashift
: Arithmeticashift
and attributes: Expressionsashiftrt
: Arithmeticashiftrt
and attributes: Expressionsashl
m3
instruction pattern: Standard Namesashr
m3
instruction pattern: Standard Namesasin
m2
instruction pattern: Standard NamesASM_APP_OFF
: File FrameworkASM_APP_ON
: File FrameworkASM_COMMENT_START
: File FrameworkASM_DECLARE_COLD_FUNCTION_NAME
: Label OutputASM_DECLARE_COLD_FUNCTION_SIZE
: Label OutputASM_DECLARE_FUNCTION_NAME
: Label OutputASM_DECLARE_FUNCTION_SIZE
: Label OutputASM_DECLARE_OBJECT_NAME
: Label OutputASM_DECLARE_REGISTER_GLOBAL
: Label OutputASM_FINAL_SPEC
: DriverASM_FINISH_DECLARE_OBJECT
: Label OutputASM_FORMAT_PRIVATE_NAME
: Label Outputasm_fprintf
: Instruction OutputASM_FPRINTF_EXTENSIONS
: Instruction OutputASM_GENERATE_INTERNAL_LABEL
: Label Outputasm_input
: Side Effectsasm_input
and ‘/v’: FlagsASM_MAYBE_OUTPUT_ENCODED_ADDR_RTX
: Exception HandlingASM_NO_SKIP_IN_TEXT
: Alignment Outputasm_noperands
: Insnsasm_operands
and ‘/v’: Flagsasm_operands
, RTL sharing: Sharingasm_operands
, usage: AssemblerASM_OUTPUT_ADDR_DIFF_ELT
: Dispatch TablesASM_OUTPUT_ADDR_VEC_ELT
: Dispatch TablesASM_OUTPUT_ALIGN
: Alignment OutputASM_OUTPUT_ALIGN_WITH_NOP
: Alignment OutputASM_OUTPUT_ALIGNED_BSS
: Uninitialized DataASM_OUTPUT_ALIGNED_COMMON
: Uninitialized DataASM_OUTPUT_ALIGNED_DECL_COMMON
: Uninitialized DataASM_OUTPUT_ALIGNED_DECL_LOCAL
: Uninitialized DataASM_OUTPUT_ALIGNED_LOCAL
: Uninitialized DataASM_OUTPUT_ASCII
: Data OutputASM_OUTPUT_CASE_END
: Dispatch TablesASM_OUTPUT_CASE_LABEL
: Dispatch TablesASM_OUTPUT_COMMON
: Uninitialized DataASM_OUTPUT_DEBUG_LABEL
: Label OutputASM_OUTPUT_DEF
: Label OutputASM_OUTPUT_DEF_FROM_DECLS
: Label OutputASM_OUTPUT_DWARF_DATAREL
: SDB and DWARFASM_OUTPUT_DWARF_DELTA
: SDB and DWARFASM_OUTPUT_DWARF_OFFSET
: SDB and DWARFASM_OUTPUT_DWARF_PCREL
: SDB and DWARFASM_OUTPUT_DWARF_TABLE_REF
: SDB and DWARFASM_OUTPUT_DWARF_VMS_DELTA
: SDB and DWARFASM_OUTPUT_EXTERNAL
: Label OutputASM_OUTPUT_FDESC
: Data OutputASM_OUTPUT_FUNCTION_LABEL
: Label OutputASM_OUTPUT_INTERNAL_LABEL
: Label OutputASM_OUTPUT_LABEL
: Label OutputASM_OUTPUT_LABEL_REF
: Label OutputASM_OUTPUT_LABELREF
: Label OutputASM_OUTPUT_LOCAL
: Uninitialized DataASM_OUTPUT_MAX_SKIP_ALIGN
: Alignment OutputASM_OUTPUT_MEASURED_SIZE
: Label OutputASM_OUTPUT_OPCODE
: Instruction OutputASM_OUTPUT_POOL_EPILOGUE
: Data OutputASM_OUTPUT_POOL_PROLOGUE
: Data OutputASM_OUTPUT_REG_POP
: Instruction OutputASM_OUTPUT_REG_PUSH
: Instruction OutputASM_OUTPUT_SIZE_DIRECTIVE
: Label OutputASM_OUTPUT_SKIP
: Alignment OutputASM_OUTPUT_SOURCE_FILENAME
: File FrameworkASM_OUTPUT_SPECIAL_POOL_ENTRY
: Data OutputASM_OUTPUT_SYMBOL_REF
: Label OutputASM_OUTPUT_TYPE_DIRECTIVE
: Label OutputASM_OUTPUT_WEAK_ALIAS
: Label OutputASM_OUTPUT_WEAKREF
: Label OutputASM_PREFERRED_EH_DATA_FORMAT
: Exception HandlingASM_SPEC
: DriverASM_STABD_OP
: DBX OptionsASM_STABN_OP
: DBX OptionsASM_STABS_OP
: DBX OptionsASM_WEAKEN_DECL
: Label OutputASM_WEAKEN_LABEL
: Label Outputassemble_name
: Label Outputassemble_name_raw
: Label OutputASSEMBLER_DIALECT
: Instruction OutputASSUME_EXTENDED_UNWIND_CONTEXT
: Frame Registersatan2
m3
instruction pattern: Standard Namesatan
m2
instruction pattern: Standard Namesatomic
: GTY Optionsatomic_add_fetch
mode instruction pattern: Standard Namesatomic_add
mode instruction pattern: Standard Namesatomic_and_fetch
mode instruction pattern: Standard Namesatomic_and
mode instruction pattern: Standard Namesatomic_compare_and_swap
mode instruction pattern: Standard Namesatomic_exchange
mode instruction pattern: Standard Namesatomic_fetch_add
mode instruction pattern: Standard Namesatomic_fetch_and
mode instruction pattern: Standard Namesatomic_fetch_nand
mode instruction pattern: Standard Namesatomic_fetch_or
mode instruction pattern: Standard Namesatomic_fetch_sub
mode instruction pattern: Standard Namesatomic_fetch_xor
mode instruction pattern: Standard Namesatomic_load
mode instruction pattern: Standard Namesatomic_nand_fetch
mode instruction pattern: Standard Namesatomic_nand
mode instruction pattern: Standard Namesatomic_or_fetch
mode instruction pattern: Standard Namesatomic_or
mode instruction pattern: Standard Namesatomic_store
mode instruction pattern: Standard Namesatomic_sub_fetch
mode instruction pattern: Standard Namesatomic_sub
mode instruction pattern: Standard Namesatomic_test_and_set
instruction pattern: Standard Namesatomic_xor_fetch
mode instruction pattern: Standard Namesatomic_xor
mode instruction pattern: Standard Namesattr
: Tagging Insnsattr
: Expressionsattr_flag
: ExpressionsATTRIBUTE_ALIGNED_VALUE
: Storage Layoutautomata_option
: Processor pipeline descriptionAVOID_CCMODE_COPIES
: Values in Registersbarrier
: Insnsbarrier
and ‘/f’: Flagsbarrier
and ‘/v’: FlagsBASE_REG_CLASS
: Register Classesbasic-block.h
: Control FlowBASIC_BLOCK
: Basic Blocksbasic_block
: Basic BlocksBB_HEAD, BB_END
: Maintaining the CFGbb_seq
: GIMPLE sequencesBIGGEST_ALIGNMENT
: Storage LayoutBIGGEST_FIELD_ALIGNMENT
: Storage LayoutBImode
: Machine ModesBIND_EXPR
: Unary and Binary ExpressionsBINFO_TYPE
: ClassesBIT_AND_EXPR
: Unary and Binary ExpressionsBIT_IOR_EXPR
: Unary and Binary ExpressionsBIT_NOT_EXPR
: Unary and Binary ExpressionsBIT_XOR_EXPR
: Unary and Binary ExpressionsBITFIELD_NBYTES_LIMITED
: Storage LayoutBITS_BIG_ENDIAN
: Storage LayoutBITS_BIG_ENDIAN
, effect on sign_extract
: Bit-FieldsBITS_PER_UNIT
: Machine ModesBITS_PER_WORD
: Storage LayoutBLKmode
: Machine ModesBLKmode
, and function return values: CallsBLOCK_FOR_INSN, gimple_bb
: Maintaining the CFGBLOCK_REG_PADDING
: Register Argumentsblockage
instruction pattern: Standard NamesBND32mode
: Machine ModesBND64mode
: Machine Modesbool
: MiscBOOL_TYPE_SIZE
: Type LayoutBOOLEAN_TYPE
: TypesBRANCH_COST
: Costsbreak_out_memory_refs
: Addressing ModesBREAK_STMT
: Statements for C++BSS_SECTION_ASM_OP
: Sectionsbswap
: Arithmeticbswap
m2
instruction pattern: Standard Namesbtrunc
m2
instruction pattern: Standard Namesbuild0
: Macros and Functionsbuild1
: Macros and Functionsbuild2
: Macros and Functionsbuild3
: Macros and Functionsbuild4
: Macros and Functionsbuild5
: Macros and Functionsbuild6
: Macros and Functionsbuiltin_longjmp
instruction pattern: Standard Namesbuiltin_setjmp_receiver
instruction pattern: Standard Namesbuiltin_setjmp_setup
instruction pattern: Standard Namesbyte_mode
: Machine ModesBYTES_BIG_ENDIAN
: Storage LayoutBYTES_BIG_ENDIAN
, effect on subreg
: Regs and MemoryC_COMMON_OVERRIDE_OPTIONS
: Run-time Targetc_register_pragma
: Miscc_register_pragma_with_expansion
: Misccache
: GTY Optionscall
: Side Effectscall
: Flagscall
instruction pattern: Standard Namescall
usage: Callscall
, in call_insn
: Flagscall
, in mem
: FlagsCALL_EXPR
: Unary and Binary Expressionscall_insn
: Insnscall_insn
and ‘/c’: Flagscall_insn
and ‘/f’: Flagscall_insn
and ‘/i’: Flagscall_insn
and ‘/j’: Flagscall_insn
and ‘/s’: Flagscall_insn
and ‘/u’: Flagscall_insn
and ‘/u’ or ‘/i’: Flagscall_insn
and ‘/v’: FlagsCALL_INSN_FUNCTION_USAGE
: Insnscall_pop
instruction pattern: Standard NamesCALL_POPS_ARGS
: Stack ArgumentsCALL_REALLY_USED_REGISTERS
: Register BasicsCALL_USED_REGISTERS
: Register Basicscall_used_regs
: Register Basicscall_value
instruction pattern: Standard Namescall_value_pop
instruction pattern: Standard Namescan_create_pseudo_p
: Standard Namescan_fallthru
: Basic BlocksCANNOT_CHANGE_MODE_CLASS
: Register ClassesCANNOT_CHANGE_MODE_CLASS
and subreg semantics: Regs and Memorycanonicalize_funcptr_for_compare
instruction pattern: Standard NamesCASE_VECTOR_MODE
: MiscCASE_VECTOR_PC_RELATIVE
: MiscCASE_VECTOR_SHORTEN_MODE
: Misccasesi
instruction pattern: Standard Namescbranch
mode4
instruction pattern: Standard Namescc0
: CC0 Condition Codescc0
: Regs and Memorycc0
, RTL sharing: Sharingcc0_rtx
: Regs and MemoryCC1_SPEC
: DriverCC1PLUS_SPEC
: Drivercc_status
: CC0 Condition CodesCC_STATUS_MDEP
: CC0 Condition CodesCC_STATUS_MDEP_INIT
: CC0 Condition CodesCCmode
: MODE_CC Condition CodesCCmode
: Machine ModesCDImode
: Machine ModesCEIL_DIV_EXPR
: Unary and Binary ExpressionsCEIL_MOD_EXPR
: Unary and Binary Expressionsceil
m2
instruction pattern: Standard NamesCFA_FRAME_BASE_OFFSET
: Frame Layoutcfghooks.h
: Maintaining the CFGcgraph_finalize_function
: Parsing passchain_circular
: GTY Optionschain_next
: GTY Optionschain_prev
: GTY Optionschange_address
: Standard NamesCHAR_TYPE_SIZE
: Type Layoutcheck_stack
instruction pattern: Standard NamesCHImode
: Machine ModesCLASS_MAX_NREGS
: Register ClassesCLASS_TYPE_P
: Types for C++CLASSTYPE_DECLARED_CLASS
: ClassesCLASSTYPE_HAS_MUTABLE
: ClassesCLASSTYPE_NON_POD_P
: ClassesCLEANUP_DECL
: Statements for C++CLEANUP_EXPR
: Statements for C++CLEANUP_POINT_EXPR
: Unary and Binary ExpressionsCLEANUP_STMT
: Statements for C++clear_cache
instruction pattern: Standard NamesCLEAR_INSN_CACHE
: TrampolinesCLEAR_RATIO
: Costsclobber
: Side Effectsclrsb
: Arithmeticclrsb
m2
instruction pattern: Standard Namesclz
: ArithmeticCLZ_DEFINED_VALUE_AT_ZERO
: Miscclz
m2
instruction pattern: Standard Namescmpmem
m instruction pattern: Standard Namescmpstr
m instruction pattern: Standard Namescmpstrn
m instruction pattern: Standard NamesCODE_LABEL
: Basic Blockscode_label
: Insnscode_label
and ‘/i’: Flagscode_label
and ‘/v’: FlagsCODE_LABEL_NUMBER
: InsnsCOImode
: Machine ModesCOLLECT2_HOST_INITIALIZATION
: Host MiscCOLLECT_EXPORT_LIST
: MiscCOLLECT_SHARED_FINI_FUNC
: Macros for InitializationCOLLECT_SHARED_INIT_FUNC
: Macros for Initializationcommit_edge_insertions
: Maintaining the CFGcompare
: Arithmeticcompare
, canonicalization of: Insn Canonicalizationscomparison_operator
: Machine-Independent PredicatesCOMPLEX_CST
: Constant expressionsCOMPLEX_EXPR
: Unary and Binary ExpressionsCOMPLEX_TYPE
: TypesCOMPONENT_REF
: Storage ReferencesCOMPOUND_EXPR
: Unary and Binary ExpressionsCOMPOUND_LITERAL_EXPR
: Unary and Binary ExpressionsCOMPOUND_LITERAL_EXPR_DECL
: Unary and Binary ExpressionsCOMPOUND_LITERAL_EXPR_DECL_EXPR
: Unary and Binary Expressionsconcat
: Regs and Memoryconcatn
: Regs and Memorycond
: Comparisonscond
and attributes: Expressionscond_exec
: Side EffectsCOND_EXPR
: Unary and Binary ExpressionsCONJ_EXPR
: Unary and Binary Expressionsconst
: ConstantsCONST0_RTX
: Constantsconst0_rtx
: ConstantsCONST1_RTX
: Constantsconst1_rtx
: ConstantsCONST2_RTX
: Constantsconst2_rtx
: ConstantsCONST_DECL
: Declarationsconst_double
: Constantsconst_double
, RTL sharing: SharingCONST_DOUBLE_LOW
: Constantsconst_double_operand
: Machine-Independent Predicatesconst_fixed
: Constantsconst_int
: Constantsconst_int
and attribute tests: Expressionsconst_int
and attributes: Expressionsconst_int
, RTL sharing: Sharingconst_int_operand
: Machine-Independent Predicatesconst_string
: Constantsconst_string
and attributes: Expressionsconst_true_rtx
: Constantsconst_vector
: Constantsconst_vector
, RTL sharing: SharingCONST_WIDE_INT
: ConstantsCONST_WIDE_INT_ELT
: ConstantsCONST_WIDE_INT_NUNITS
: ConstantsCONST_WIDE_INT_VEC
: ConstantsCONSTANT_ADDRESS_P
: Addressing ModesCONSTANT_ALIGNMENT
: Storage LayoutCONSTANT_P
: Addressing ModesCONSTANT_POOL_ADDRESS_P
: FlagsCONSTANT_POOL_BEFORE_FUNCTION
: Data Outputconstm1_rtx
: Constantsconstraint_num
: C Constraint Interfaceconstraint_satisfied_p
: C Constraint InterfaceCONSTRUCTOR
: Unary and Binary ExpressionsCONTINUE_STMT
: Statements for C++CONVERT_EXPR
: Unary and Binary Expressionscopy_rtx
: Addressing Modescopy_rtx_if_shared
: Sharingcopysign
m3
instruction pattern: Standard Namescos
m2
instruction pattern: Standard NamesCP_INTEGRAL_TYPE
: Types for C++cp_namespace_decls
: NamespacesCP_TYPE_CONST_NON_VOLATILE_P
: Types for C++CP_TYPE_CONST_P
: Types for C++cp_type_quals
: Types for C++CP_TYPE_RESTRICT_P
: Types for C++CP_TYPE_VOLATILE_P
: Types for C++CPLUSPLUS_CPP_SPEC
: DriverCPP_SPEC
: DriverCQImode
: Machine ModesCRT_CALL_STATIC_FUNCTION
: Sectionscrtl->args.pops_args
: Function Entrycrtl->args.pretend_args_size
: Function Entrycrtl->outgoing_args_size
: Stack ArgumentsCRTSTUFF_T_CFLAGS
: Target FragmentCRTSTUFF_T_CFLAGS_S
: Target FragmentCSImode
: Machine Modescstore
mode4
instruction pattern: Standard NamesCTImode
: Machine Modesctrap
MM4
instruction pattern: Standard Namesctz
: ArithmeticCTZ_DEFINED_VALUE_AT_ZERO
: Miscctz
m2
instruction pattern: Standard NamesCUMULATIVE_ARGS
: Register Argumentscurrent_function_is_leaf
: Leaf Functionscurrent_function_uses_only_leaf_regs
: Leaf Functionscurrent_insn_predicate
: Conditional ExecutionDAmode
: Machine ModesDATA_ABI_ALIGNMENT
: Storage LayoutDATA_ALIGNMENT
: Storage LayoutDATA_SECTION_ASM_OP
: SectionsDBR_OUTPUT_SEQEND
: Instruction Outputdbr_sequence_length
: Instruction OutputDBX_BLOCKS_FUNCTION_RELATIVE
: DBX OptionsDBX_CONTIN_CHAR
: DBX OptionsDBX_CONTIN_LENGTH
: DBX OptionsDBX_DEBUGGING_INFO
: DBX OptionsDBX_FUNCTION_FIRST
: DBX OptionsDBX_LINES_FUNCTION_RELATIVE
: DBX OptionsDBX_NO_XREFS
: DBX OptionsDBX_OUTPUT_MAIN_SOURCE_FILE_END
: File Names and DBXDBX_OUTPUT_MAIN_SOURCE_FILENAME
: File Names and DBXDBX_OUTPUT_NULL_N_SO_AT_MAIN_SOURCE_FILE_END
: File Names and DBXDBX_OUTPUT_SOURCE_LINE
: DBX HooksDBX_REGISTER_NUMBER
: All DebuggersDBX_REGPARM_STABS_CODE
: DBX OptionsDBX_REGPARM_STABS_LETTER
: DBX OptionsDBX_STATIC_CONST_VAR_CODE
: DBX OptionsDBX_STATIC_STAB_DATA_SECTION
: DBX OptionsDBX_TYPE_DECL_STABS_CODE
: DBX OptionsDBX_USE_BINCL
: DBX OptionsDCmode
: Machine ModesDDmode
: Machine Modesdead_or_set_p
: define_peepholedebug_expr
: Debug InformationDEBUG_EXPR_DECL
: Declarationsdebug_insn
: InsnsDEBUG_SYMS_TEXT
: DBX OptionsDEBUGGER_ARG_OFFSET
: All DebuggersDEBUGGER_AUTO_OFFSET
: All DebuggersDECL_ALIGN
: DeclarationsDECL_ANTICIPATED
: Functions for C++DECL_ARGUMENTS
: Function BasicsDECL_ARRAY_DELETE_OPERATOR_P
: Functions for C++DECL_ARTIFICIAL
: Function PropertiesDECL_ARTIFICIAL
: Function BasicsDECL_ARTIFICIAL
: Working with declarationsDECL_ASSEMBLER_NAME
: Function BasicsDECL_ATTRIBUTES
: AttributesDECL_BASE_CONSTRUCTOR_P
: Functions for C++DECL_COMPLETE_CONSTRUCTOR_P
: Functions for C++DECL_COMPLETE_DESTRUCTOR_P
: Functions for C++DECL_CONST_MEMFUNC_P
: Functions for C++DECL_CONSTRUCTOR_P
: Functions for C++DECL_CONTEXT
: NamespacesDECL_CONV_FN_P
: Functions for C++DECL_COPY_CONSTRUCTOR_P
: Functions for C++DECL_DESTRUCTOR_P
: Functions for C++DECL_EXTERN_C_FUNCTION_P
: Functions for C++DECL_EXTERNAL
: Function PropertiesDECL_EXTERNAL
: DeclarationsDECL_FUNCTION_MEMBER_P
: Functions for C++DECL_FUNCTION_SPECIFIC_OPTIMIZATION
: Function PropertiesDECL_FUNCTION_SPECIFIC_OPTIMIZATION
: Function BasicsDECL_FUNCTION_SPECIFIC_TARGET
: Function PropertiesDECL_FUNCTION_SPECIFIC_TARGET
: Function BasicsDECL_GLOBAL_CTOR_P
: Functions for C++DECL_GLOBAL_DTOR_P
: Functions for C++DECL_INITIAL
: Function BasicsDECL_INITIAL
: DeclarationsDECL_LINKONCE_P
: Functions for C++DECL_LOCAL_FUNCTION_P
: Functions for C++DECL_MAIN_P
: Functions for C++DECL_NAME
: NamespacesDECL_NAME
: Function BasicsDECL_NAME
: Working with declarationsDECL_NAMESPACE_ALIAS
: NamespacesDECL_NAMESPACE_STD_P
: NamespacesDECL_NON_THUNK_FUNCTION_P
: Functions for C++DECL_NONCONVERTING_P
: Functions for C++DECL_NONSTATIC_MEMBER_FUNCTION_P
: Functions for C++DECL_OVERLOADED_OPERATOR_P
: Functions for C++DECL_PURE_P
: Function PropertiesDECL_RESULT
: Function BasicsDECL_SAVED_TREE
: Function BasicsDECL_SIZE
: DeclarationsDECL_STATIC_FUNCTION_P
: Functions for C++DECL_STMT
: Statements for C++DECL_STMT_DECL
: Statements for C++DECL_THUNK_P
: Functions for C++DECL_VIRTUAL_P
: Function PropertiesDECL_VOLATILE_MEMFUNC_P
: Functions for C++DECLARE_LIBRARY_RENAMES
: Library Callsdecrement_and_branch_until_zero
instruction pattern: Standard Namesdefault
: GTY Optionsdefault_file_start
: File FrameworkDEFAULT_GDB_EXTENSIONS
: DBX OptionsDEFAULT_PCC_STRUCT_RETURN
: Aggregate ReturnDEFAULT_SIGNED_CHAR
: Type Layoutdefine_address_constraint
: Define Constraintsdefine_asm_attributes
: Tagging Insnsdefine_attr
: Defining Attributesdefine_automaton
: Processor pipeline descriptiondefine_bypass
: Processor pipeline descriptiondefine_c_enum
: Constant Definitionsdefine_code_attr
: Code Iteratorsdefine_code_iterator
: Code Iteratorsdefine_cond_exec
: Conditional Executiondefine_constants
: Constant Definitionsdefine_constraint
: Define Constraintsdefine_cpu_unit
: Processor pipeline descriptiondefine_delay
: Delay Slotsdefine_enum
: Constant Definitionsdefine_enum_attr
: Constant Definitionsdefine_enum_attr
: Defining Attributesdefine_expand
: Expander Definitionsdefine_insn
: Patternsdefine_insn
example: Exampledefine_insn_and_split
: Insn Splittingdefine_insn_reservation
: Processor pipeline descriptiondefine_int_attr
: Int Iteratorsdefine_int_iterator
: Int Iteratorsdefine_memory_constraint
: Define Constraintsdefine_mode_attr
: Substitutionsdefine_mode_iterator
: Defining Mode Iteratorsdefine_peephole
: define_peepholedefine_peephole2
: define_peephole2define_predicate
: Defining Predicatesdefine_query_cpu_unit
: Processor pipeline descriptiondefine_register_constraint
: Define Constraintsdefine_reservation
: Processor pipeline descriptiondefine_special_memory_constraint
: Define Constraintsdefine_special_predicate
: Defining Predicatesdefine_split
: Insn Splittingdefine_subst
: Subst Iteratorsdefine_subst_attr
: Subst Iteratorsdeletable
: GTY OptionsDELETE_IF_ORDINARY
: Filesystemdesc
: GTY OptionsDFmode
: Machine ModesDImode
: Machine ModesDIR_SEPARATOR
: FilesystemDIR_SEPARATOR_2
: Filesystemdiv
: Arithmeticdiv
and attributes: Expressionsdiv
m3
instruction pattern: Standard Namesdivmod
m4
instruction pattern: Standard NamesDO_BODY
: Statements for C++DO_COND
: Statements for C++DO_STMT
: Statements for C++DOLLARS_IN_IDENTIFIERS
: Miscdoloop_begin
instruction pattern: Standard Namesdoloop_end
instruction pattern: Standard NamesDONE
: Expander DefinitionsDONT_USE_BUILTIN_SETJMP
: Exception Region OutputDOUBLE_TYPE_SIZE
: Type LayoutDQmode
: Machine ModesDRIVER_SELF_SPECS
: Driverdump_basic_block
: Dump typesdump_generic_expr
: Dump typesdump_gimple_stmt
: Dump typesdump_printf
: Dump typesDUMPFILE_FORMAT
: FilesystemDWARF2_ASM_LINE_DEBUG_INFO
: SDB and DWARFDWARF2_DEBUGGING_INFO
: SDB and DWARFDWARF2_FRAME_INFO
: SDB and DWARFDWARF2_FRAME_REG_OUT
: Frame RegistersDWARF2_UNWIND_INFO
: Exception Region OutputDWARF_ALT_FRAME_RETURN_COLUMN
: Frame LayoutDWARF_CIE_DATA_ALIGNMENT
: Exception Region OutputDWARF_FRAME_REGISTERS
: Frame RegistersDWARF_FRAME_REGNUM
: Frame RegistersDWARF_REG_TO_UNWIND_COLUMN
: Frame RegistersDWARF_ZERO_REG
: Frame LayoutDYNAMIC_CHAIN_ADDRESS
: Frame Layoutedge
: EdgesEDGE_ABNORMAL
: EdgesEDGE_ABNORMAL, EDGE_ABNORMAL_CALL
: EdgesEDGE_ABNORMAL, EDGE_EH
: EdgesEDGE_ABNORMAL, EDGE_SIBCALL
: EdgesEDGE_FALLTHRU, force_nonfallthru
: EdgesEDOM
, implicit usage: Library CallsEH_FRAME_SECTION_NAME
: Exception Region OutputEH_FRAME_THROUGH_COLLECT2
: Exception Region Outputeh_return
instruction pattern: Standard NamesEH_RETURN_DATA_REGNO
: Exception HandlingEH_RETURN_HANDLER_RTX
: Exception HandlingEH_RETURN_STACKADJ_RTX
: Exception HandlingEH_TABLES_CAN_BE_READ_ONLY
: Exception Region OutputEH_USES
: Function Entryei_edge
: Edgesei_end_p
: Edgesei_last
: Edgesei_next
: Edgesei_one_before_end_p
: Edgesei_prev
: Edgesei_safe_safe
: Edgesei_start
: EdgesELIMINABLE_REGS
: EliminationELSE_CLAUSE
: Statements for C++EMPTY_CLASS_EXPR
: Statements for C++EMPTY_FIELD_BOUNDARY
: Storage LayoutENDFILE_SPEC
: DriverENTRY_BLOCK_PTR, EXIT_BLOCK_PTR
: Basic Blocksenum reg_class
: Register ClassesENUMERAL_TYPE
: Typesepilogue
instruction pattern: Standard NamesEPILOGUE_USES
: Function Entryeq
: Comparisonseq
and attributes: Expressionseq_attr
: ExpressionsEQ_EXPR
: Unary and Binary Expressionserrno
, implicit usage: Library CallsEXACT_DIV_EXPR
: Unary and Binary Expressionsexception_receiver
instruction pattern: Standard Namesexclusion_set
: Processor pipeline descriptionEXIT_EXPR
: Unary and Binary ExpressionsEXIT_IGNORE_STACK
: Function Entryexp10
m2
instruction pattern: Standard Namesexp2
m2
instruction pattern: Standard Namesexpm1
m2
instruction pattern: Standard Namesexp
m2
instruction pattern: Standard NamesEXPR_FILENAME
: Working with declarationsEXPR_LINENO
: Working with declarationsexpr_list
: InsnsEXPR_STMT
: Statements for C++EXPR_STMT_EXPR
: Statements for C++extend
mn2
instruction pattern: Standard NamesEXTRA_SPECS
: Driverextv
instruction pattern: Standard Namesextv
m instruction pattern: Standard Namesextvmisalign
m instruction pattern: Standard Namesextzv
instruction pattern: Standard Namesextzv
m instruction pattern: Standard Namesextzvmisalign
m instruction pattern: Standard NamesFAIL
: Expander Definitionsfall-thru
: EdgesFATAL_EXIT_CODE
: Host Miscffs
: Arithmeticffs
m2
instruction pattern: Standard NamesFIELD_DECL
: Declarationsfile_end_indicate_exec_stack
: File Frameworkfinal_absence_set
: Processor pipeline descriptionFINAL_PRESCAN_INSN
: Instruction Outputfinal_presence_set
: Processor pipeline descriptionfinal_sequence
: Instruction OutputFIND_BASE_TERM
: Addressing ModesFINI_ARRAY_SECTION_ASM_OP
: SectionsFINI_SECTION_ASM_OP
: SectionsFIRST_PARM_OFFSET
: Frame LayoutFIRST_PARM_OFFSET
and virtual registers: Regs and MemoryFIRST_PSEUDO_REGISTER
: Register BasicsFIRST_STACK_REG
: Stack RegistersFIRST_VIRTUAL_REGISTER
: Regs and Memoryfix
: ConversionsFIX_TRUNC_EXPR
: Unary and Binary Expressionsfix_trunc
mn2
instruction pattern: Standard NamesFIXED_CONVERT_EXPR
: Unary and Binary ExpressionsFIXED_CST
: Constant expressionsFIXED_POINT_TYPE
: TypesFIXED_REGISTERS
: Register Basicsfixed_regs
: Register Basicsfix
mn2
instruction pattern: Standard Namesfixuns_trunc
mn2
instruction pattern: Standard Namesfixuns
mn2
instruction pattern: Standard Namesfloat
: ConversionsFLOAT_EXPR
: Unary and Binary Expressionsfloat_extend
: ConversionsFLOAT_LIB_COMPARE_RETURNS_BOOL
: Library CallsFLOAT_STORE_FLAG_VALUE
: Miscfloat_truncate
: ConversionsFLOAT_TYPE_SIZE
: Type LayoutFLOAT_WORDS_BIG_ENDIAN
: Storage LayoutFLOAT_WORDS_BIG_ENDIAN
, (lack of) effect on subreg
: Regs and Memoryfloat
mn2
instruction pattern: Standard Namesfloatuns
mn2
instruction pattern: Standard NamesFLOOR_DIV_EXPR
: Unary and Binary ExpressionsFLOOR_MOD_EXPR
: Unary and Binary Expressionsfloor
m2
instruction pattern: Standard Namesfma
: Arithmeticfma
m4
instruction pattern: Standard Namesfmax
m3
instruction pattern: Standard Namesfmin
m3
instruction pattern: Standard Namesfmod
m3
instruction pattern: Standard Namesfms
m4
instruction pattern: Standard Namesfnma
m4
instruction pattern: Standard Namesfnms
m4
instruction pattern: Standard NamesFOR_BODY
: Statements for C++FOR_COND
: Statements for C++FOR_EXPR
: Statements for C++FOR_INIT_STMT
: Statements for C++FOR_STMT
: Statements for C++for_user
: GTY OptionsFORCE_CODE_SECTION_ALIGN
: Sectionsforce_reg
: Standard Namesfract_convert
: ConversionsFRACT_TYPE_SIZE
: Type Layoutfract
mn2
instruction pattern: Standard Namesfractuns
mn2
instruction pattern: Standard NamesFRAME_ADDR_RTX
: Frame LayoutFRAME_GROWS_DOWNWARD
: Frame LayoutFRAME_GROWS_DOWNWARD
and virtual registers: Regs and MemoryFRAME_POINTER_CFA_OFFSET
: Frame Layoutframe_pointer_needed
: Function EntryFRAME_POINTER_REGNUM
: Frame RegistersFRAME_POINTER_REGNUM
and virtual registers: Regs and Memoryframe_pointer_rtx
: Frame Registersframe_related
: Flagsframe_related
, in insn
, call_insn
, jump_insn
, barrier
, and set
: Flagsframe_related
, in mem
: Flagsframe_related
, in reg
: Flagsframe_related
, in symbol_ref
: Flagsfrequency, count, BB_FREQ_BASE
: Profile informationftrunc
m2
instruction pattern: Standard NamesFUNCTION_ARG_OFFSET
: Register ArgumentsFUNCTION_ARG_PADDING
: Register ArgumentsFUNCTION_ARG_REGNO_P
: Register ArgumentsFUNCTION_BOUNDARY
: Storage LayoutFUNCTION_DECL
: Functions for C++FUNCTION_DECL
: FunctionsFUNCTION_MODE
: MiscFUNCTION_PROFILER
: ProfilingFUNCTION_TYPE
: TypesFUNCTION_VALUE
: Scalar ReturnFUNCTION_VALUE_REGNO_P
: Scalar ReturnGCC_DRIVER_HOST_INITIALIZATION
: Host Miscgcov_type
: Profile informationge
: Comparisonsge
and attributes: ExpressionsGE_EXPR
: Unary and Binary ExpressionsGEN_ERRNO_RTX
: Library Callsgencodes
: RTL passesgeneral_operand
: Machine-Independent PredicatesGENERAL_REGS
: Register Classesgenflags
: RTL passesget_attr
: Expressionsget_attr_length
: Insn LengthsGET_CLASS_NARROWEST_MODE
: Machine ModesGET_CODE
: RTL Objectsget_frame_size
: Eliminationget_insns
: Insnsget_last_insn
: InsnsGET_MODE
: Machine ModesGET_MODE_ALIGNMENT
: Machine ModesGET_MODE_BITSIZE
: Machine ModesGET_MODE_CLASS
: Machine ModesGET_MODE_FBIT
: Machine ModesGET_MODE_IBIT
: Machine ModesGET_MODE_MASK
: Machine ModesGET_MODE_NAME
: Machine ModesGET_MODE_NUNITS
: Machine ModesGET_MODE_SIZE
: Machine ModesGET_MODE_UNIT_SIZE
: Machine ModesGET_MODE_WIDER_MODE
: Machine ModesGET_RTX_CLASS
: RTL ClassesGET_RTX_FORMAT
: RTL ClassesGET_RTX_LENGTH
: RTL Classesget_thread_pointer
mode instruction pattern: Standard Namesgeu
: Comparisonsgeu
and attributes: Expressionsggc_collect
: Invoking the garbage collectorgimple_addresses_taken
: Manipulating GIMPLE statementsGIMPLE_ASM
: <code>GIMPLE_ASM</code>gimple_asm_clobber_op
: <code>GIMPLE_ASM</code>gimple_asm_input_op
: <code>GIMPLE_ASM</code>gimple_asm_nclobbers
: <code>GIMPLE_ASM</code>gimple_asm_ninputs
: <code>GIMPLE_ASM</code>gimple_asm_noutputs
: <code>GIMPLE_ASM</code>gimple_asm_output_op
: <code>GIMPLE_ASM</code>gimple_asm_set_clobber_op
: <code>GIMPLE_ASM</code>gimple_asm_set_input_op
: <code>GIMPLE_ASM</code>gimple_asm_set_output_op
: <code>GIMPLE_ASM</code>gimple_asm_set_volatile
: <code>GIMPLE_ASM</code>gimple_asm_string
: <code>GIMPLE_ASM</code>gimple_asm_volatile_p
: <code>GIMPLE_ASM</code>GIMPLE_ASSIGN
: <code>GIMPLE_ASSIGN</code>gimple_assign_cast_p
: <code>GIMPLE_ASSIGN</code>gimple_assign_cast_p
: Logical Operatorsgimple_assign_lhs
: <code>GIMPLE_ASSIGN</code>gimple_assign_lhs_ptr
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs1
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs1_ptr
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs2
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs2_ptr
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs3
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs3_ptr
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs_class
: <code>GIMPLE_ASSIGN</code>gimple_assign_rhs_code
: <code>GIMPLE_ASSIGN</code>gimple_assign_set_lhs
: <code>GIMPLE_ASSIGN</code>gimple_assign_set_rhs1
: <code>GIMPLE_ASSIGN</code>gimple_assign_set_rhs2
: <code>GIMPLE_ASSIGN</code>gimple_assign_set_rhs3
: <code>GIMPLE_ASSIGN</code>gimple_bb
: Manipulating GIMPLE statementsGIMPLE_BIND
: <code>GIMPLE_BIND</code>gimple_bind_add_seq
: <code>GIMPLE_BIND</code>gimple_bind_add_stmt
: <code>GIMPLE_BIND</code>gimple_bind_append_vars
: <code>GIMPLE_BIND</code>gimple_bind_block
: <code>GIMPLE_BIND</code>gimple_bind_body
: <code>GIMPLE_BIND</code>gimple_bind_set_block
: <code>GIMPLE_BIND</code>gimple_bind_set_body
: <code>GIMPLE_BIND</code>gimple_bind_set_vars
: <code>GIMPLE_BIND</code>gimple_bind_vars
: <code>GIMPLE_BIND</code>gimple_block
: Manipulating GIMPLE statementsgimple_build
: GIMPLE APIgimple_build_nop
: <code>GIMPLE_NOP</code>gimple_build_omp_master
: <code>GIMPLE_OMP_MASTER</code>gimple_build_omp_ordered
: <code>GIMPLE_OMP_ORDERED</code>gimple_build_omp_return
: <code>GIMPLE_OMP_RETURN</code>gimple_build_omp_section
: <code>GIMPLE_OMP_SECTION</code>gimple_build_omp_sections_switch
: <code>GIMPLE_OMP_SECTIONS</code>gimple_build_wce
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>GIMPLE_CALL
: <code>GIMPLE_CALL</code>gimple_call_arg
: <code>GIMPLE_CALL</code>gimple_call_arg_ptr
: <code>GIMPLE_CALL</code>gimple_call_chain
: <code>GIMPLE_CALL</code>gimple_call_copy_skip_args
: <code>GIMPLE_CALL</code>gimple_call_fn
: <code>GIMPLE_CALL</code>gimple_call_fndecl
: <code>GIMPLE_CALL</code>gimple_call_lhs
: <code>GIMPLE_CALL</code>gimple_call_lhs_ptr
: <code>GIMPLE_CALL</code>gimple_call_noreturn_p
: <code>GIMPLE_CALL</code>gimple_call_num_args
: <code>GIMPLE_CALL</code>gimple_call_return_type
: <code>GIMPLE_CALL</code>gimple_call_set_arg
: <code>GIMPLE_CALL</code>gimple_call_set_chain
: <code>GIMPLE_CALL</code>gimple_call_set_fn
: <code>GIMPLE_CALL</code>gimple_call_set_fndecl
: <code>GIMPLE_CALL</code>gimple_call_set_lhs
: <code>GIMPLE_CALL</code>gimple_call_set_tail
: <code>GIMPLE_CALL</code>gimple_call_tail_p
: <code>GIMPLE_CALL</code>GIMPLE_CATCH
: <code>GIMPLE_CATCH</code>gimple_catch_handler
: <code>GIMPLE_CATCH</code>gimple_catch_set_handler
: <code>GIMPLE_CATCH</code>gimple_catch_set_types
: <code>GIMPLE_CATCH</code>gimple_catch_types
: <code>GIMPLE_CATCH</code>gimple_catch_types_ptr
: <code>GIMPLE_CATCH</code>gimple_code
: Manipulating GIMPLE statementsGIMPLE_COND
: <code>GIMPLE_COND</code>gimple_cond_code
: <code>GIMPLE_COND</code>gimple_cond_false_label
: <code>GIMPLE_COND</code>gimple_cond_lhs
: <code>GIMPLE_COND</code>gimple_cond_make_false
: <code>GIMPLE_COND</code>gimple_cond_make_true
: <code>GIMPLE_COND</code>gimple_cond_rhs
: <code>GIMPLE_COND</code>gimple_cond_set_code
: <code>GIMPLE_COND</code>gimple_cond_set_false_label
: <code>GIMPLE_COND</code>gimple_cond_set_lhs
: <code>GIMPLE_COND</code>gimple_cond_set_rhs
: <code>GIMPLE_COND</code>gimple_cond_set_true_label
: <code>GIMPLE_COND</code>gimple_cond_true_label
: <code>GIMPLE_COND</code>gimple_convert
: GIMPLE APIgimple_copy
: Manipulating GIMPLE statementsGIMPLE_DEBUG
: <code>GIMPLE_DEBUG</code>GIMPLE_DEBUG_BIND
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_get_value
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_get_value_ptr
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_get_var
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_has_value_p
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_p
: Logical Operatorsgimple_debug_bind_reset_value
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_set_value
: <code>GIMPLE_DEBUG</code>gimple_debug_bind_set_var
: <code>GIMPLE_DEBUG</code>gimple_def_ops
: Manipulating GIMPLE statementsGIMPLE_EH_FILTER
: <code>GIMPLE_EH_FILTER</code>gimple_eh_filter_failure
: <code>GIMPLE_EH_FILTER</code>gimple_eh_filter_set_failure
: <code>GIMPLE_EH_FILTER</code>gimple_eh_filter_set_types
: <code>GIMPLE_EH_FILTER</code>gimple_eh_filter_types
: <code>GIMPLE_EH_FILTER</code>gimple_eh_filter_types_ptr
: <code>GIMPLE_EH_FILTER</code>gimple_eh_must_not_throw_fndecl
: <code>GIMPLE_EH_FILTER</code>gimple_eh_must_not_throw_set_fndecl
: <code>GIMPLE_EH_FILTER</code>gimple_expr_code
: Manipulating GIMPLE statementsgimple_expr_type
: Manipulating GIMPLE statementsGIMPLE_GOTO
: <code>GIMPLE_GOTO</code>gimple_goto_dest
: <code>GIMPLE_GOTO</code>gimple_goto_set_dest
: <code>GIMPLE_GOTO</code>gimple_has_mem_ops
: Manipulating GIMPLE statementsgimple_has_ops
: Manipulating GIMPLE statementsgimple_has_volatile_ops
: Manipulating GIMPLE statementsGIMPLE_LABEL
: <code>GIMPLE_LABEL</code>gimple_label_label
: <code>GIMPLE_LABEL</code>gimple_label_set_label
: <code>GIMPLE_LABEL</code>gimple_loaded_syms
: Manipulating GIMPLE statementsgimple_locus
: Manipulating GIMPLE statementsgimple_locus_empty_p
: Manipulating GIMPLE statementsgimple_modified_p
: Manipulating GIMPLE statementsgimple_no_warning_p
: Manipulating GIMPLE statementsGIMPLE_NOP
: <code>GIMPLE_NOP</code>gimple_nop_p
: <code>GIMPLE_NOP</code>gimple_num_ops
: Manipulating GIMPLE statementsgimple_num_ops
: Logical OperatorsGIMPLE_OMP_ATOMIC_LOAD
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>gimple_omp_atomic_load_lhs
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>gimple_omp_atomic_load_rhs
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>gimple_omp_atomic_load_set_lhs
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>gimple_omp_atomic_load_set_rhs
: <code>GIMPLE_OMP_ATOMIC_LOAD</code>GIMPLE_OMP_ATOMIC_STORE
: <code>GIMPLE_OMP_ATOMIC_STORE</code>gimple_omp_atomic_store_set_val
: <code>GIMPLE_OMP_ATOMIC_STORE</code>gimple_omp_atomic_store_val
: <code>GIMPLE_OMP_ATOMIC_STORE</code>gimple_omp_body
: <code>GIMPLE_OMP_PARALLEL</code>GIMPLE_OMP_CONTINUE
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_control_def
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_control_def_ptr
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_control_use
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_control_use_ptr
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_set_control_def
: <code>GIMPLE_OMP_CONTINUE</code>gimple_omp_continue_set_control_use
: <code>GIMPLE_OMP_CONTINUE</code>GIMPLE_OMP_CRITICAL
: <code>GIMPLE_OMP_CRITICAL</code>gimple_omp_critical_name
: <code>GIMPLE_OMP_CRITICAL</code>gimple_omp_critical_name_ptr
: <code>GIMPLE_OMP_CRITICAL</code>gimple_omp_critical_set_name
: <code>GIMPLE_OMP_CRITICAL</code>GIMPLE_OMP_FOR
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_clauses
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_clauses_ptr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_cond
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_final
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_final_ptr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_incr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_incr_ptr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_index
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_index_ptr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_initial
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_initial_ptr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_pre_body
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_clauses
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_cond
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_final
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_incr
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_index
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_initial
: <code>GIMPLE_OMP_FOR</code>gimple_omp_for_set_pre_body
: <code>GIMPLE_OMP_FOR</code>GIMPLE_OMP_MASTER
: <code>GIMPLE_OMP_MASTER</code>GIMPLE_OMP_ORDERED
: <code>GIMPLE_OMP_ORDERED</code>GIMPLE_OMP_PARALLEL
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_child_fn
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_child_fn_ptr
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_clauses
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_clauses_ptr
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_combined_p
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_data_arg
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_data_arg_ptr
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_set_child_fn
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_set_clauses
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_set_combined_p
: <code>GIMPLE_OMP_PARALLEL</code>gimple_omp_parallel_set_data_arg
: <code>GIMPLE_OMP_PARALLEL</code>GIMPLE_OMP_RETURN
: <code>GIMPLE_OMP_RETURN</code>gimple_omp_return_nowait_p
: <code>GIMPLE_OMP_RETURN</code>gimple_omp_return_set_nowait
: <code>GIMPLE_OMP_RETURN</code>GIMPLE_OMP_SECTION
: <code>GIMPLE_OMP_SECTION</code>gimple_omp_section_last_p
: <code>GIMPLE_OMP_SECTION</code>gimple_omp_section_set_last
: <code>GIMPLE_OMP_SECTION</code>GIMPLE_OMP_SECTIONS
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_clauses
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_clauses_ptr
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_control
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_control_ptr
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_set_clauses
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_sections_set_control
: <code>GIMPLE_OMP_SECTIONS</code>gimple_omp_set_body
: <code>GIMPLE_OMP_PARALLEL</code>GIMPLE_OMP_SINGLE
: <code>GIMPLE_OMP_SINGLE</code>gimple_omp_single_clauses
: <code>GIMPLE_OMP_SINGLE</code>gimple_omp_single_clauses_ptr
: <code>GIMPLE_OMP_SINGLE</code>gimple_omp_single_set_clauses
: <code>GIMPLE_OMP_SINGLE</code>gimple_op
: Manipulating GIMPLE statementsgimple_op
: Logical Operatorsgimple_op_ptr
: Manipulating GIMPLE statementsgimple_ops
: Manipulating GIMPLE statementsgimple_ops
: Logical OperatorsGIMPLE_PHI
: <code>GIMPLE_PHI</code>gimple_phi_arg
: SSAgimple_phi_arg
: <code>GIMPLE_PHI</code>gimple_phi_arg_def
: SSAgimple_phi_arg_edge
: SSAgimple_phi_capacity
: <code>GIMPLE_PHI</code>gimple_phi_num_args
: SSAgimple_phi_num_args
: <code>GIMPLE_PHI</code>gimple_phi_result
: SSAgimple_phi_result
: <code>GIMPLE_PHI</code>gimple_phi_result_ptr
: <code>GIMPLE_PHI</code>gimple_phi_set_arg
: <code>GIMPLE_PHI</code>gimple_phi_set_result
: <code>GIMPLE_PHI</code>gimple_plf
: Manipulating GIMPLE statementsGIMPLE_RESX
: <code>GIMPLE_RESX</code>gimple_resx_region
: <code>GIMPLE_RESX</code>gimple_resx_set_region
: <code>GIMPLE_RESX</code>GIMPLE_RETURN
: <code>GIMPLE_RETURN</code>gimple_return_retval
: <code>GIMPLE_RETURN</code>gimple_return_set_retval
: <code>GIMPLE_RETURN</code>gimple_seq_add_seq
: GIMPLE sequencesgimple_seq_add_stmt
: GIMPLE sequencesgimple_seq_alloc
: GIMPLE sequencesgimple_seq_copy
: GIMPLE sequencesgimple_seq_deep_copy
: GIMPLE sequencesgimple_seq_empty_p
: GIMPLE sequencesgimple_seq_first
: GIMPLE sequencesgimple_seq_init
: GIMPLE sequencesgimple_seq_last
: GIMPLE sequencesgimple_seq_reverse
: GIMPLE sequencesgimple_seq_set_first
: GIMPLE sequencesgimple_seq_set_last
: GIMPLE sequencesgimple_seq_singleton_p
: GIMPLE sequencesgimple_set_block
: Manipulating GIMPLE statementsgimple_set_def_ops
: Manipulating GIMPLE statementsgimple_set_has_volatile_ops
: Manipulating GIMPLE statementsgimple_set_locus
: Manipulating GIMPLE statementsgimple_set_op
: Manipulating GIMPLE statementsgimple_set_plf
: Manipulating GIMPLE statementsgimple_set_use_ops
: Manipulating GIMPLE statementsgimple_set_vdef_ops
: Manipulating GIMPLE statementsgimple_set_visited
: Manipulating GIMPLE statementsgimple_set_vuse_ops
: Manipulating GIMPLE statementsgimple_simplify
: GIMPLE APIgimple_stored_syms
: Manipulating GIMPLE statementsGIMPLE_SWITCH
: <code>GIMPLE_SWITCH</code>gimple_switch_default_label
: <code>GIMPLE_SWITCH</code>gimple_switch_index
: <code>GIMPLE_SWITCH</code>gimple_switch_label
: <code>GIMPLE_SWITCH</code>gimple_switch_num_labels
: <code>GIMPLE_SWITCH</code>gimple_switch_set_default_label
: <code>GIMPLE_SWITCH</code>gimple_switch_set_index
: <code>GIMPLE_SWITCH</code>gimple_switch_set_label
: <code>GIMPLE_SWITCH</code>gimple_switch_set_num_labels
: <code>GIMPLE_SWITCH</code>GIMPLE_TRY
: <code>GIMPLE_TRY</code>gimple_try_catch_is_cleanup
: <code>GIMPLE_TRY</code>gimple_try_cleanup
: <code>GIMPLE_TRY</code>gimple_try_eval
: <code>GIMPLE_TRY</code>gimple_try_kind
: <code>GIMPLE_TRY</code>gimple_try_set_catch_is_cleanup
: <code>GIMPLE_TRY</code>gimple_try_set_cleanup
: <code>GIMPLE_TRY</code>gimple_try_set_eval
: <code>GIMPLE_TRY</code>gimple_use_ops
: Manipulating GIMPLE statementsgimple_vdef_ops
: Manipulating GIMPLE statementsgimple_visited_p
: Manipulating GIMPLE statementsgimple_vuse_ops
: Manipulating GIMPLE statementsgimple_wce_cleanup
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>gimple_wce_cleanup_eh_only
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>gimple_wce_set_cleanup
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>gimple_wce_set_cleanup_eh_only
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>GIMPLE_WITH_CLEANUP_EXPR
: <code>GIMPLE_WITH_CLEANUP_EXPR</code>gimplify_assign
: <code>GIMPLE_ASSIGN</code>gimplify_expr
: Gimplification passgimplify_function_tree
: Gimplification passGLOBAL_INIT_PRIORITY
: Functions for C++global_regs
: Register BasicsGO_IF_LEGITIMATE_ADDRESS
: Addressing Modesgsi_after_labels
: Sequence iteratorsgsi_bb
: Sequence iteratorsgsi_commit_edge_inserts
: Maintaining the CFGgsi_commit_edge_inserts
: Sequence iteratorsgsi_commit_one_edge_insert
: Sequence iteratorsgsi_end_p
: Maintaining the CFGgsi_end_p
: Sequence iteratorsgsi_for_stmt
: Sequence iteratorsgsi_insert_after
: Maintaining the CFGgsi_insert_after
: Sequence iteratorsgsi_insert_before
: Maintaining the CFGgsi_insert_before
: Sequence iteratorsgsi_insert_on_edge
: Maintaining the CFGgsi_insert_on_edge
: Sequence iteratorsgsi_insert_on_edge_immediate
: Sequence iteratorsgsi_insert_seq_after
: Sequence iteratorsgsi_insert_seq_before
: Sequence iteratorsgsi_insert_seq_on_edge
: Sequence iteratorsgsi_last
: Maintaining the CFGgsi_last
: Sequence iteratorsgsi_last_bb
: Sequence iteratorsgsi_link_after
: Sequence iteratorsgsi_link_before
: Sequence iteratorsgsi_link_seq_after
: Sequence iteratorsgsi_link_seq_before
: Sequence iteratorsgsi_move_after
: Sequence iteratorsgsi_move_before
: Sequence iteratorsgsi_move_to_bb_end
: Sequence iteratorsgsi_next
: Maintaining the CFGgsi_next
: Sequence iteratorsgsi_one_before_end_p
: Sequence iteratorsgsi_prev
: Maintaining the CFGgsi_prev
: Sequence iteratorsgsi_remove
: Maintaining the CFGgsi_remove
: Sequence iteratorsgsi_replace
: Sequence iteratorsgsi_seq
: Sequence iteratorsgsi_split_seq_after
: Sequence iteratorsgsi_split_seq_before
: Sequence iteratorsgsi_start
: Maintaining the CFGgsi_start
: Sequence iteratorsgsi_start_bb
: Sequence iteratorsgsi_stmt
: Sequence iteratorsgsi_stmt_ptr
: Sequence iteratorsgt
: Comparisonsgt
and attributes: ExpressionsGT_EXPR
: Unary and Binary Expressionsgtu
: Comparisonsgtu
and attributes: ExpressionsGTY
: Type InformationHAmode
: Machine ModesHANDLE_PRAGMA_PACK_WITH_EXPANSION
: MiscHANDLER
: Statements for C++HANDLER_BODY
: Statements for C++HANDLER_PARMS
: Statements for C++HARD_FRAME_POINTER_IS_ARG_POINTER
: Frame RegistersHARD_FRAME_POINTER_IS_FRAME_POINTER
: Frame RegistersHARD_FRAME_POINTER_REGNUM
: Frame RegistersHARD_REGNO_CALL_PART_CLOBBERED
: Register BasicsHARD_REGNO_CALLER_SAVE_MODE
: Caller SavesHARD_REGNO_MODE_OK
: Values in RegistersHARD_REGNO_NREGS
: Values in RegistersHARD_REGNO_NREGS_HAS_PADDING
: Values in RegistersHARD_REGNO_NREGS_WITH_PADDING
: Values in RegistersHARD_REGNO_RENAME_OK
: Values in RegistersHAS_INIT_SECTION
: Macros for InitializationHAS_LONG_COND_BRANCH
: MiscHAS_LONG_UNCOND_BRANCH
: MiscHAVE_DOS_BASED_FILE_SYSTEM
: FilesystemHAVE_POST_DECREMENT
: Addressing ModesHAVE_POST_INCREMENT
: Addressing ModesHAVE_POST_MODIFY_DISP
: Addressing ModesHAVE_POST_MODIFY_REG
: Addressing ModesHAVE_PRE_DECREMENT
: Addressing ModesHAVE_PRE_INCREMENT
: Addressing ModesHAVE_PRE_MODIFY_DISP
: Addressing ModesHAVE_PRE_MODIFY_REG
: Addressing ModesHCmode
: Machine ModesHFmode
: Machine Modeshigh
: ConstantsHImode
: Machine ModesHImode
, in insn
: InsnsHONOR_REG_ALLOC_ORDER
: Allocation OrderHOST_BIT_BUCKET
: FilesystemHOST_EXECUTABLE_SUFFIX
: FilesystemHOST_HOOKS_EXTRA_SIGNALS
: Host CommonHOST_HOOKS_GT_PCH_ALLOC_GRANULARITY
: Host CommonHOST_HOOKS_GT_PCH_GET_ADDRESS
: Host CommonHOST_HOOKS_GT_PCH_USE_ADDRESS
: Host CommonHOST_LACKS_INODE_NUMBERS
: FilesystemHOST_LONG_FORMAT
: Host MiscHOST_LONG_LONG_FORMAT
: Host MiscHOST_OBJECT_SUFFIX
: FilesystemHOST_PTR_PRINTF
: Host MiscHOT_TEXT_SECTION_NAME
: SectionsHQmode
: Machine ModesIDENTIFIER_LENGTH
: IdentifiersIDENTIFIER_NODE
: IdentifiersIDENTIFIER_OPNAME_P
: IdentifiersIDENTIFIER_POINTER
: IdentifiersIDENTIFIER_TYPENAME_P
: IdentifiersIF_COND
: Statements for C++IF_STMT
: Statements for C++if_then_else
: Comparisonsif_then_else
and attributes: Expressionsif_then_else
usage: Side EffectsIFCVT_MACHDEP_INIT
: MiscIFCVT_MODIFY_CANCEL
: MiscIFCVT_MODIFY_FINAL
: MiscIFCVT_MODIFY_INSN
: MiscIFCVT_MODIFY_MULTIPLE_TESTS
: MiscIFCVT_MODIFY_TESTS
: MiscIMAGPART_EXPR
: Unary and Binary Expressionsimmediate_operand
: Machine-Independent PredicatesIMMEDIATE_PREFIX
: Instruction Outputin_struct
: Flagsin_struct
, in code_label
and note
: Flagsin_struct
, in insn
and jump_insn
and call_insn
: Flagsin_struct
, in insn
, call_insn
, jump_insn
and jump_table_data
: Flagsin_struct
, in subreg
: Flagsinclude
: Including PatternsINCLUDE_DEFAULTS
: DriverINCOMING_FRAME_SP_OFFSET
: Frame LayoutINCOMING_REG_PARM_STACK_SPACE
: Stack ArgumentsINCOMING_REGNO
: Register BasicsINCOMING_RETURN_ADDR_RTX
: Frame LayoutINCOMING_STACK_BOUNDARY
: Storage LayoutINDEX_REG_CLASS
: Register Classesindirect_jump
instruction pattern: Standard Namesindirect_operand
: Machine-Independent PredicatesINDIRECT_REF
: Storage ReferencesINIT_ARRAY_SECTION_ASM_OP
: SectionsINIT_CUMULATIVE_ARGS
: Register ArgumentsINIT_CUMULATIVE_INCOMING_ARGS
: Register ArgumentsINIT_CUMULATIVE_LIBCALL_ARGS
: Register ArgumentsINIT_ENVIRONMENT
: DriverINIT_EXPANDERS
: Per-Function DataINIT_EXPR
: Unary and Binary Expressionsinit_machine_status
: Per-Function Datainit_one_libfunc
: Library CallsINIT_SECTION_ASM_OP
: Macros for InitializationINIT_SECTION_ASM_OP
: SectionsINITIAL_ELIMINATION_OFFSET
: EliminationINITIAL_FRAME_ADDRESS_RTX
: Frame LayoutINITIAL_FRAME_POINTER_OFFSET
: Eliminationinsert_insn_on_edge
: Maintaining the CFGinsn
: Insnsinsn
and ‘/f’: Flagsinsn
and ‘/j’: Flagsinsn
and ‘/s’: Flagsinsn
and ‘/u’: Flagsinsn
and ‘/v’: Flagsinsn-attr.h
: Defining AttributesINSN_ANNULLED_BRANCH_P
: FlagsINSN_CODE
: InsnsINSN_DELETED_P
: FlagsINSN_FROM_TARGET_P
: Flagsinsn_list
: InsnsINSN_REFERENCES_ARE_DELAYED
: MiscINSN_SETS_ARE_DELAYED
: MiscINSN_UID
: InsnsINSN_VAR_LOCATION
: Insnsinsv
instruction pattern: Standard Namesinsv
m instruction pattern: Standard Namesinsvmisalign
m instruction pattern: Standard NamesINT16_TYPE
: Type LayoutINT32_TYPE
: Type LayoutINT64_TYPE
: Type LayoutINT8_TYPE
: Type LayoutINT_FAST16_TYPE
: Type LayoutINT_FAST32_TYPE
: Type LayoutINT_FAST64_TYPE
: Type LayoutINT_FAST8_TYPE
: Type LayoutINT_LEAST16_TYPE
: Type LayoutINT_LEAST32_TYPE
: Type LayoutINT_LEAST64_TYPE
: Type LayoutINT_LEAST8_TYPE
: Type LayoutINT_TYPE_SIZE
: Type LayoutINTEGER_CST
: Constant expressionsINTEGER_TYPE
: TypesINTMAX_TYPE
: Type LayoutINTPTR_TYPE
: Type LayoutINVOKE__main
: Macros for Initializationior
: Arithmeticior
and attributes: Expressionsior
, canonicalization of: Insn Canonicalizationsior
m3
instruction pattern: Standard NamesIRA_HARD_REGNO_ADD_COST_MULTIPLIER
: Allocation OrderIS_ASM_LOGICAL_LINE_SEPARATOR
: Data Outputis_gimple_addressable
: Logical Operatorsis_gimple_asm_val
: Logical Operatorsis_gimple_assign
: Logical Operatorsis_gimple_call
: Logical Operatorsis_gimple_call_addr
: Logical Operatorsis_gimple_constant
: Logical Operatorsis_gimple_debug
: Logical Operatorsis_gimple_ip_invariant
: Logical Operatorsis_gimple_ip_invariant_address
: Logical Operatorsis_gimple_mem_ref_addr
: Logical Operatorsis_gimple_min_invariant
: Logical Operatorsis_gimple_omp
: Logical Operatorsis_gimple_val
: Logical OperatorsJMP_BUF_SIZE
: Exception Region Outputjump
: Flagsjump
instruction pattern: Standard Namesset
: Side Effectsjump
, in call_insn
: Flagsjump
, in insn
: Flagsjump
, in mem
: FlagsJUMP_ALIGN
: Alignment Outputjump_insn
: Insnsjump_insn
and ‘/f’: Flagsjump_insn
and ‘/s’: Flagsjump_insn
and ‘/u’: Flagsjump_insn
and ‘/v’: FlagsJUMP_LABEL
: Insnsjump_table_data
: Insnsjump_table_data
and ‘/s’: Flagsjump_table_data
and ‘/v’: FlagsJUMP_TABLES_IN_TEXT_SECTION
: SectionsLABEL_ALIGN
: Alignment OutputLABEL_ALIGN_AFTER_BARRIER
: Alignment OutputLABEL_ALT_ENTRY_P
: InsnsLABEL_ALTERNATE_NAME
: EdgesLABEL_DECL
: DeclarationsLABEL_KIND
: InsnsLABEL_NUSES
: InsnsLABEL_PRESERVE_P
: Flagslabel_ref
: Constantslabel_ref
and ‘/v’: Flagslabel_ref
, RTL sharing: SharingLABEL_REF_NONLOCAL_P
: Flagslang_hooks.gimplify_expr
: Gimplification passlang_hooks.parse_file
: Parsing passLAST_STACK_REG
: Stack RegistersLAST_VIRTUAL_REGISTER
: Regs and Memorylceil
mn2
: Standard NamesLD_FINI_SWITCH
: Macros for InitializationLD_INIT_SWITCH
: Macros for InitializationLDD_SUFFIX
: Macros for Initializationldexp
m3
instruction pattern: Standard Namesle
: Comparisonsle
and attributes: ExpressionsLE_EXPR
: Unary and Binary Expressionsleaf_function_p
: Standard NamesLEAF_REG_REMAP
: Leaf FunctionsLEAF_REGISTERS
: Leaf FunctionsLEGITIMATE_PIC_OPERAND_P
: PICLEGITIMIZE_RELOAD_ADDRESS
: Addressing Modeslength
: GTY Optionsleu
: Comparisonsleu
and attributes: Expressionslfloor
mn2
: Standard NamesLIB2FUNCS_EXTRA
: Target FragmentLIB_SPEC
: DriverLIBCALL_VALUE
: Scalar ReturnLIBGCC2_CFLAGS
: Target FragmentLIBGCC2_GNU_PREFIX
: Type LayoutLIBGCC2_UNWIND_ATTRIBUTE
: MiscLIBGCC_SPEC
: DriverLIBRARY_PATH_ENV
: MiscLIMIT_RELOAD_CLASS
: Register ClassesLINK_COMMAND_SPEC
: DriverLINK_EH_SPEC
: DriverLINK_GCC_C_SEQUENCE_SPEC
: DriverLINK_LIBGCC_SPECIAL_1
: DriverLINK_SPEC
: Driverlo_sum
: ArithmeticLOAD_EXTEND_OP
: Miscload_multiple
instruction pattern: Standard NamesLOCAL_ALIGNMENT
: Storage LayoutLOCAL_CLASS_P
: ClassesLOCAL_DECL_ALIGNMENT
: Storage LayoutLOCAL_INCLUDE_DIR
: DriverLOCAL_LABEL_PREFIX
: Instruction OutputLOCAL_REGNO
: Register Basicslog10
m2
instruction pattern: Standard Nameslog1p
m2
instruction pattern: Standard Nameslog2
m2
instruction pattern: Standard NamesLOG_LINKS
: Insnslogb
m2
instruction pattern: Standard NamesLOGICAL_OP_NON_SHORT_CIRCUIT
: Costslog
m2
instruction pattern: Standard NamesLONG_ACCUM_TYPE_SIZE
: Type LayoutLONG_DOUBLE_TYPE_SIZE
: Type LayoutLONG_FRACT_TYPE_SIZE
: Type LayoutLONG_LONG_ACCUM_TYPE_SIZE
: Type LayoutLONG_LONG_FRACT_TYPE_SIZE
: Type LayoutLONG_LONG_TYPE_SIZE
: Type LayoutLONG_TYPE_SIZE
: Type Layoutlongjmp
and automatic variables: InterfaceLOOP_ALIGN
: Alignment OutputLOOP_EXPR
: Unary and Binary Expressionslrint
mn2
: Standard Nameslround
mn2
: Standard NamesLSHIFT_EXPR
: Unary and Binary Expressionslshiftrt
: Arithmeticlshiftrt
and attributes: Expressionslshr
m3
instruction pattern: Standard Nameslt
: Comparisonslt
and attributes: ExpressionsLT_EXPR
: Unary and Binary ExpressionsLTGT_EXPR
: Unary and Binary Expressionsltu
: Comparisonsmachine_mode
: Machine Modesmadd
mn4
instruction pattern: Standard NamesMAKE_DECL_ONE_ONLY
: Label Outputmake_safe_from
: Expander DefinitionsMALLOC_ABI_ALIGNMENT
: Storage LayoutMASK_RETURN_ADDR
: Exception Region Outputmaskload
mn instruction pattern: Standard Namesmaskstore
mn instruction pattern: Standard Namesmatch_dup
: define_peephole2match_dup
: RTL Templatematch_dup
and attributes: Insn Lengthsmatch_op_dup
: RTL Templatematch_operand
: RTL Templatematch_operand
and attributes: Expressionsmatch_operator
: RTL Templatematch_par_dup
: RTL Templatematch_parallel
: RTL Templatematch_scratch
: define_peephole2match_scratch
: RTL Templatematch_test
and attributes: ExpressionsMATH_LIBRARY
: Miscmatherr
: Library CallsMAX_BITS_PER_WORD
: Storage LayoutMAX_BITSIZE_MODE_ANY_INT
: Machine ModesMAX_BITSIZE_MODE_ANY_MODE
: Machine ModesMAX_CONDITIONAL_EXECUTE
: MiscMAX_FIXED_MODE_SIZE
: Storage LayoutMAX_MOVE_MAX
: MiscMAX_OFILE_ALIGNMENT
: Storage LayoutMAX_REGS_PER_ADDRESS
: Addressing ModesMAX_STACK_ALIGNMENT
: Storage Layoutmax
m3
instruction pattern: Standard Namesmay_trap_p, tree_could_trap_p
: Edgesmaybe_undef
: GTY Optionsmcount
: ProfilingMD_EXEC_PREFIX
: DriverMD_FALLBACK_FRAME_STATE_FOR
: Exception HandlingMD_HANDLE_UNWABI
: Exception HandlingMD_STARTFILE_PREFIX
: DriverMD_STARTFILE_PREFIX_1
: Drivermem
: Regs and Memorymem
and ‘/c’: Flagsmem
and ‘/f’: Flagsmem
and ‘/j’: Flagsmem
and ‘/u’: Flagsmem
and ‘/v’: Flagsmem
, RTL sharing: SharingMEM_ADDR_SPACE
: Special AccessorsMEM_ALIAS_SET
: Special AccessorsMEM_ALIGN
: Special AccessorsMEM_EXPR
: Special AccessorsMEM_KEEP_ALIAS_SET_P
: FlagsMEM_NOTRAP_P
: FlagsMEM_OFFSET
: Special AccessorsMEM_OFFSET_KNOWN_P
: Special AccessorsMEM_POINTER
: FlagsMEM_READONLY_P
: FlagsMEM_REF
: Storage Referencesmem_signal_fence
mode instruction pattern: Standard NamesMEM_SIZE
: Special AccessorsMEM_SIZE_KNOWN_P
: Special Accessorsmem_thread_fence
mode instruction pattern: Standard NamesMEM_VOLATILE_P
: Flagsmemory_barrier
instruction pattern: Standard NamesMEMORY_MOVE_COST
: Costsmemory_operand
: Machine-Independent PredicatesMETHOD_TYPE
: TypesMIN_UNITS_PER_WORD
: Storage LayoutMINIMUM_ALIGNMENT
: Storage LayoutMINIMUM_ATOMIC_ALIGNMENT
: Storage Layoutmin
m3
instruction pattern: Standard Namesminus
: Arithmeticminus
and attributes: Expressionsminus
, canonicalization of: Insn CanonicalizationsMINUS_EXPR
: Unary and Binary Expressionsmod
: Arithmeticmod
and attributes: ExpressionsMODE_ACCUM
: Machine ModesMODE_BASE_REG_CLASS
: Register ClassesMODE_BASE_REG_REG_CLASS
: Register ClassesMODE_CC
: MODE_CC Condition CodesMODE_CC
: Machine ModesMODE_CODE_BASE_REG_CLASS
: Register ClassesMODE_COMPLEX_FLOAT
: Machine ModesMODE_COMPLEX_INT
: Machine ModesMODE_DECIMAL_FLOAT
: Machine ModesMODE_FLOAT
: Machine ModesMODE_FRACT
: Machine ModesMODE_FUNCTION
: Machine ModesMODE_INT
: Machine ModesMODE_PARTIAL_INT
: Machine ModesMODE_POINTER_BOUNDS
: Machine ModesMODE_RANDOM
: Machine ModesMODE_UACCUM
: Machine ModesMODE_UFRACT
: Machine ModesMODES_TIEABLE_P
: Values in RegistersMODIFY_EXPR
: Unary and Binary ExpressionsMODIFY_JNI_METHOD_CALL
: Miscmod
m3
instruction pattern: Standard NamesMOVE_MAX
: MiscMOVE_MAX_PIECES
: CostsMOVE_RATIO
: Costsmov
m instruction pattern: Standard Namesmovmem
m instruction pattern: Standard Namesmovmisalign
m instruction pattern: Standard Namesmov
modecc
instruction pattern: Standard Namesmovstr
instruction pattern: Standard Namesmovstrict
m instruction pattern: Standard Namesmsub
mn4
instruction pattern: Standard Namesmulhisi3
instruction pattern: Standard Namesmul
m3
instruction pattern: Standard Namesmulqihi3
instruction pattern: Standard Namesmulsidi3
instruction pattern: Standard Namesmult
: Arithmeticmult
and attributes: Expressionsmult
, canonicalization of: Insn CanonicalizationsMULT_EXPR
: Unary and Binary ExpressionsMULT_HIGHPART_EXPR
: Unary and Binary ExpressionsMULTIARCH_DIRNAME
: Target FragmentMULTILIB_DEFAULTS
: DriverMULTILIB_DIRNAMES
: Target FragmentMULTILIB_EXCEPTIONS
: Target FragmentMULTILIB_EXTRA_OPTS
: Target FragmentMULTILIB_MATCHES
: Target FragmentMULTILIB_OPTIONS
: Target FragmentMULTILIB_OSDIRNAMES
: Target FragmentMULTILIB_REQUIRED
: Target FragmentMULTILIB_REUSE
: Target FragmentMULTIPLE_SYMBOL_SPACES
: Miscmulv
m4
instruction pattern: Standard NamesN_REG_CLASSES
: Register ClassesNAMESPACE_DECL
: NamespacesNAMESPACE_DECL
: DeclarationsNATIVE_SYSTEM_HEADER_COMPONENT
: Driverne
: Comparisonsne
and attributes: ExpressionsNE_EXPR
: Unary and Binary Expressionsnearbyint
m2
instruction pattern: Standard Namesneg
: Arithmeticneg
and attributes: Expressionsneg
, canonicalization of: Insn CanonicalizationsNEGATE_EXPR
: Unary and Binary Expressionsneg
m2
instruction pattern: Standard Namesneg
modecc
instruction pattern: Standard Namesnegv
m3
instruction pattern: Standard Namesnested_ptr
: GTY Optionsnext_bb, prev_bb, FOR_EACH_BB, FOR_ALL_BB
: Basic BlocksNEXT_INSN
: InsnsNEXT_OBJC_RUNTIME
: Library CallsNM_FLAGS
: Macros for InitializationNO_DBX_BNSYM_ENSYM
: DBX HooksNO_DBX_FUNCTION_END
: DBX HooksNO_DBX_GCC_MARKER
: File Names and DBXNO_DBX_MAIN_SOURCE_DIRECTORY
: File Names and DBXNO_DOLLAR_IN_LABEL
: Label OutputNO_DOT_IN_LABEL
: Label OutputNO_FUNCTION_CSE
: CostsNO_IMPLICIT_EXTERN_C
: MiscNO_PROFILE_COUNTERS
: ProfilingNO_REGS
: Register ClassesNON_LVALUE_EXPR
: Unary and Binary Expressionsnonimmediate_operand
: Machine-Independent Predicatesnonlocal_goto
instruction pattern: Standard Namesnonlocal_goto_receiver
instruction pattern: Standard Namesnonmemory_operand
: Machine-Independent Predicatesnop
instruction pattern: Standard NamesNOP_EXPR
: Unary and Binary Expressionsnot
: Arithmeticnot
and attributes: Expressionsnot
, canonicalization of: Insn Canonicalizationsnote
: Insnsnote
and ‘/i’: Flagsnote
and ‘/v’: FlagsNOTE_INSN_BASIC_BLOCK
: Basic BlocksNOTE_INSN_BLOCK_BEG
: InsnsNOTE_INSN_BLOCK_END
: InsnsNOTE_INSN_DELETED
: InsnsNOTE_INSN_DELETED_LABEL
: InsnsNOTE_INSN_EH_REGION_BEG
: InsnsNOTE_INSN_EH_REGION_END
: InsnsNOTE_INSN_FUNCTION_BEG
: InsnsNOTE_INSN_VAR_LOCATION
: InsnsNOTE_LINE_NUMBER
: InsnsNOTE_SOURCE_FILE
: InsnsNOTE_VAR_LOCATION
: InsnsNOTICE_UPDATE_CC
: CC0 Condition Codesnot
modecc
instruction pattern: Standard NamesNUM_MACHINE_MODES
: Machine ModesNUM_MODES_FOR_MODE_SWITCHING
: Mode SwitchingOACC_CACHE
: OpenACCOACC_DATA
: OpenACCOACC_DECLARE
: OpenACCOACC_ENTER_DATA
: OpenACCOACC_EXIT_DATA
: OpenACCOACC_HOST_DATA
: OpenACCOACC_KERNELS
: OpenACCOACC_LOOP
: OpenACCOACC_PARALLEL
: OpenACCOACC_UPDATE
: OpenACCOBJC_GEN_METHOD_LABEL
: Label OutputOBJC_JBLEN
: MiscOBJECT_FORMAT_COFF
: Macros for InitializationOFFSET_TYPE
: TypesOImode
: Machine ModesOMP_ATOMIC
: OpenMPOMP_CLAUSE
: OpenMPOMP_CONTINUE
: OpenMPOMP_CRITICAL
: OpenMPOMP_FOR
: OpenMPOMP_MASTER
: OpenMPOMP_ORDERED
: OpenMPOMP_PARALLEL
: OpenMPOMP_RETURN
: OpenMPOMP_SECTION
: OpenMPOMP_SECTIONS
: OpenMPOMP_SINGLE
: OpenMPone_cmpl
m2
instruction pattern: Standard Namesoperands
: PatternsOPTGROUP_ALL
: Optimization groupsOPTGROUP_INLINE
: Optimization groupsOPTGROUP_IPA
: Optimization groupsOPTGROUP_LOOP
: Optimization groupsOPTGROUP_OTHER
: Optimization groupsOPTGROUP_VEC
: Optimization groupsOPTIMIZE_MODE_SWITCHING
: Mode SwitchingOPTION_DEFAULT_SPECS
: Driverordered_comparison_operator
: Machine-Independent PredicatesORDERED_EXPR
: Unary and Binary ExpressionsORIGINAL_REGNO
: Special Accessorsoutgoing_args_size
: Stack ArgumentsOUTGOING_REG_PARM_STACK_SPACE
: Stack ArgumentsOUTGOING_REGNO
: Register Basicsoutput_asm_insn
: Output StatementOUTPUT_QUOTED_STRING
: File FrameworkOVERLAPPING_REGISTER_NAMES
: Instruction OutputOVERLOAD
: Functions for C++OVERRIDE_ABI_FORMAT
: Register ArgumentsOVL_CURRENT
: Functions for C++OVL_NEXT
: Functions for C++PAD_VARARGS_DOWN
: Register Argumentsparallel
: Side Effectsparity
: Arithmeticparity
m2
instruction pattern: Standard NamesPARM_BOUNDARY
: Storage LayoutPARM_DECL
: DeclarationsPARSE_LDD_OUTPUT
: Macros for Initializationpass_duplicate_computed_gotos
: EdgesPATH_SEPARATOR
: FilesystemPATTERN
: Insnspc
: Regs and Memorypc
and attributes: Insn Lengthspc
, RTL sharing: SharingPC_REGNUM
: Register Basicspc_rtx
: Regs and MemoryPCC_BITFIELD_TYPE_MATTERS
: Storage LayoutPCC_STATIC_STRUCT_RETURN
: Aggregate ReturnPDImode
: Machine ModesPIC_OFFSET_TABLE_REG_CALL_CLOBBERED
: PICPIC_OFFSET_TABLE_REGNUM
: PICplus
: Arithmeticplus
and attributes: Expressionsplus
, canonicalization of: Insn CanonicalizationsPLUS_EXPR
: Unary and Binary ExpressionsPmode
: Miscpmode_register_operand
: Machine-Independent PredicatesPOINTER_PLUS_EXPR
: Unary and Binary ExpressionsPOINTER_SIZE
: Storage LayoutPOINTER_TYPE
: TypesPOINTERS_EXTEND_UNSIGNED
: Storage Layoutpop_operand
: Machine-Independent Predicatespopcount
: Arithmeticpopcount
m2
instruction pattern: Standard Namespops_args
: Function Entrypost_dec
: Incdecpost_inc
: IncdecPOST_LINK_SPEC
: Driverpost_modify
: Incdecpost_order_compute, inverted_post_order_compute, walk_dominator_tree
: Basic BlocksPOSTDECREMENT_EXPR
: Unary and Binary ExpressionsPOSTINCREMENT_EXPR
: Unary and Binary ExpressionsPOWI_MAX_MULTS
: Miscpow
m3
instruction pattern: Standard Namespragma
: Miscpre_dec
: IncdecPRE_GCC3_DWARF_FRAME_REGISTERS
: Frame Registerspre_inc
: Incdecpre_modify
: IncdecPREDECREMENT_EXPR
: Unary and Binary Expressionspredict.def
: Profile informationPREFERRED_DEBUGGING_TYPE
: All DebuggersPREFERRED_RELOAD_CLASS
: Register ClassesPREFERRED_STACK_BOUNDARY
: Storage Layoutprefetch
: Side Effectsprefetch
and ‘/v’: Flagsprefetch
instruction pattern: Standard NamesPREFETCH_SCHEDULE_BARRIER_P
: FlagsPREINCREMENT_EXPR
: Unary and Binary Expressionspresence_set
: Processor pipeline descriptionpretend_args_size
: Function Entryprev_active_insn
: define_peepholePREV_INSN
: InsnsPRINT_OPERAND
: Instruction OutputPRINT_OPERAND_ADDRESS
: Instruction OutputPRINT_OPERAND_PUNCT_VALID_P
: Instruction Outputprobe_stack
instruction pattern: Standard Namesprobe_stack_address
instruction pattern: Standard NamesPROFILE_BEFORE_PROLOGUE
: ProfilingPROFILE_HOOK
: Profilingprologue
instruction pattern: Standard NamesPROMOTE_MODE
: Storage LayoutPSImode
: Machine ModesPTRDIFF_TYPE
: Type Layoutpurge_dead_edges
: Maintaining the CFGpurge_dead_edges
: EdgesPUSH_ARGS
: Stack ArgumentsPUSH_ARGS_REVERSED
: Stack Argumentspush_operand
: Machine-Independent Predicatespush_reload
: Addressing ModesPUSH_ROUNDING
: Stack Argumentspush
m1
instruction pattern: Standard NamesPUT_CODE
: RTL ObjectsPUT_MODE
: Machine ModesPUT_REG_NOTE_KIND
: InsnsPUT_SDB_
: SDB and DWARFQCmode
: Machine ModesQFmode
: Machine ModesQImode
: Machine ModesQImode
, in insn
: InsnsQQmode
: Machine ModesRDIV_EXPR
: Unary and Binary ExpressionsREADONLY_DATA_SECTION_ASM_OP
: SectionsREAL_CST
: Constant expressionsREAL_LIBGCC_SPEC
: DriverREAL_NM_FILE_NAME
: Macros for InitializationREAL_TYPE
: TypesREAL_VALUE_ABS
: Floating PointREAL_VALUE_ATOF
: Floating PointREAL_VALUE_FIX
: Floating PointREAL_VALUE_ISINF
: Floating PointREAL_VALUE_ISNAN
: Floating PointREAL_VALUE_NEGATE
: Floating PointREAL_VALUE_NEGATIVE
: Floating PointREAL_VALUE_TO_TARGET_DECIMAL128
: Data OutputREAL_VALUE_TO_TARGET_DECIMAL32
: Data OutputREAL_VALUE_TO_TARGET_DECIMAL64
: Data OutputREAL_VALUE_TO_TARGET_DOUBLE
: Data OutputREAL_VALUE_TO_TARGET_LONG_DOUBLE
: Data OutputREAL_VALUE_TO_TARGET_SINGLE
: Data OutputREAL_VALUE_TYPE
: Floating PointREAL_VALUE_UNSIGNED_FIX
: Floating PointREALPART_EXPR
: Unary and Binary Expressionsrecog_data.operand
: Instruction OutputRECORD_TYPE
: ClassesRECORD_TYPE
: Typesredirect_edge_and_branch
: Profile informationredirect_edge_and_branch, redirect_jump
: Maintaining the CFGreduc_plus_scal_
m instruction pattern: Standard Namesreduc_smax_scal_
m instruction pattern: Standard Namesreduc_smin_scal_
m instruction pattern: Standard Namesreduc_umax_scal_
m instruction pattern: Standard Namesreduc_umin_scal_
m instruction pattern: Standard NamesREFERENCE_TYPE
: Typesreg
: Regs and Memoryreg
and ‘/f’: Flagsreg
and ‘/i’: Flagsreg
and ‘/v’: Flagsreg
, RTL sharing: SharingREG_ALLOC_ORDER
: Allocation OrderREG_BR_PRED
: InsnsREG_BR_PROB
: InsnsREG_BR_PROB_BASE, BB_FREQ_BASE, count
: Profile informationREG_BR_PROB_BASE, EDGE_FREQUENCY
: Profile informationREG_CC_SETTER
: InsnsREG_CC_USER
: InsnsREG_CLASS_CONTENTS
: Register Classesreg_class_contents
: Register Basicsreg_class_for_constraint
: C Constraint InterfaceREG_CLASS_NAMES
: Register ClassesREG_CROSSING_JUMP
: InsnsREG_DEAD
: InsnsREG_DEAD, REG_UNUSED
: Liveness informationREG_DEP_ANTI
: InsnsREG_DEP_OUTPUT
: InsnsREG_DEP_TRUE
: InsnsREG_EH_REGION, EDGE_ABNORMAL_CALL
: EdgesREG_EQUAL
: InsnsREG_EQUIV
: InsnsREG_EXPR
: Special AccessorsREG_FRAME_RELATED_EXPR
: InsnsREG_FUNCTION_VALUE_P
: FlagsREG_INC
: Insnsreg_label
and ‘/v’: FlagsREG_LABEL_OPERAND
: InsnsREG_LABEL_TARGET
: Insnsreg_names
: Instruction Outputreg_names
: Register BasicsREG_NONNEG
: InsnsREG_NOTE_KIND
: InsnsREG_NOTES
: InsnsREG_OFFSET
: Special AccessorsREG_OK_STRICT
: Addressing ModesREG_PARM_STACK_SPACE
: Stack ArgumentsREG_PARM_STACK_SPACE
, and TARGET_FUNCTION_ARG
: Register ArgumentsREG_POINTER
: FlagsREG_SETJMP
: InsnsREG_UNUSED
: InsnsREG_USERVAR_P
: FlagsREG_VALUE_IN_UNWIND_CONTEXT
: Frame RegistersREG_WORDS_BIG_ENDIAN
: Storage LayoutREGISTER_MOVE_COST
: CostsREGISTER_NAMES
: Instruction Outputregister_operand
: Machine-Independent PredicatesREGISTER_PREFIX
: Instruction OutputREGISTER_TARGET_PRAGMAS
: MiscREGMODE_NATURAL_SIZE
: Values in RegistersREGNO_MODE_CODE_OK_FOR_BASE_P
: Register ClassesREGNO_MODE_OK_FOR_BASE_P
: Register ClassesREGNO_MODE_OK_FOR_REG_BASE_P
: Register ClassesREGNO_OK_FOR_BASE_P
: Register ClassesREGNO_OK_FOR_INDEX_P
: Register ClassesREGNO_REG_CLASS
: Register Classesregs_ever_live
: Function EntryRELATIVE_PREFIX_NOT_LINKDIR
: Driverreload_completed
: Standard Namesreload_in
instruction pattern: Standard Namesreload_in_progress
: Standard Namesreload_out
instruction pattern: Standard Namesremainder
m3
instruction pattern: Standard Namesreorder
: GTY Optionsrest_of_decl_compilation
: Parsing passrest_of_type_compilation
: Parsing passrestore_stack_block
instruction pattern: Standard Namesrestore_stack_function
instruction pattern: Standard Namesrestore_stack_nonlocal
instruction pattern: Standard NamesRESULT_DECL
: Declarationsreturn
: Side Effectsreturn
instruction pattern: Standard NamesRETURN_ADDR_IN_PREVIOUS_FRAME
: Frame LayoutRETURN_ADDR_OFFSET
: Exception HandlingRETURN_ADDR_RTX
: Frame LayoutRETURN_ADDRESS_POINTER_REGNUM
: Frame RegistersRETURN_EXPR
: Statements for C++RETURN_STMT
: Statements for C++return_val
: Flagsreturn_val
, in call_insn
: Flagsreturn_val
, in reg
: Flagsreturn_val
, in symbol_ref
: FlagsREVERSE_CONDITION
: MODE_CC Condition CodesREVERSIBLE_CC_MODE
: MODE_CC Condition Codesrint
m2
instruction pattern: Standard Namesrotate
: Arithmeticrotatert
: Arithmeticrotl
m3
instruction pattern: Standard Namesrotr
m3
instruction pattern: Standard NamesROUND_DIV_EXPR
: Unary and Binary ExpressionsROUND_MOD_EXPR
: Unary and Binary ExpressionsROUND_TYPE_ALIGN
: Storage Layoutround
m2
instruction pattern: Standard NamesRSHIFT_EXPR
: Unary and Binary Expressionsrsqrt
m2
instruction pattern: Standard NamesRTL_CONST_CALL_P
: FlagsRTL_CONST_OR_PURE_CALL_P
: FlagsRTL_LOOPING_CONST_OR_PURE_CALL_P
: FlagsRTL_PURE_CALL_P
: FlagsRTX_FRAME_RELATED_P
: FlagsSAD_EXPR
: Vectorssame_type_p
: TypesSAmode
: Machine Modessat_fract
: Conversionssatfract
mn2
instruction pattern: Standard Namessatfractuns
mn2
instruction pattern: Standard Namessatisfies_constraint_
: C Constraint InterfaceSAVE_EXPR
: Unary and Binary Expressionssave_stack_block
instruction pattern: Standard Namessave_stack_function
instruction pattern: Standard Namessave_stack_nonlocal
instruction pattern: Standard NamesSBSS_SECTION_ASM_OP
: Sectionsscalb
m3
instruction pattern: Standard NamesSCHED_GROUP_P
: FlagsSCmode
: Machine Modesscratch
: Regs and Memoryscratch
, RTL sharing: Sharingscratch_operand
: Machine-Independent PredicatesSDATA_SECTION_ASM_OP
: SectionsSDB_ALLOW_FORWARD_REFERENCES
: SDB and DWARFSDB_ALLOW_UNKNOWN_REFERENCES
: SDB and DWARFSDB_DEBUGGING_INFO
: SDB and DWARFSDB_DELIM
: SDB and DWARFSDB_OUTPUT_SOURCE_LINE
: SDB and DWARFSDmode
: Machine Modessdot_prod
m instruction pattern: Standard NamesSECONDARY_INPUT_RELOAD_CLASS
: Register ClassesSECONDARY_MEMORY_NEEDED
: Register ClassesSECONDARY_MEMORY_NEEDED_MODE
: Register ClassesSECONDARY_MEMORY_NEEDED_RTX
: Register ClassesSECONDARY_OUTPUT_RELOAD_CLASS
: Register ClassesSECONDARY_RELOAD_CLASS
: Register ClassesSELECT_CC_MODE
: MODE_CC Condition Codessequence
: Side Effectsset
: Side Effectsset
and ‘/f’: FlagsSET_ASM_OP
: Label Outputset_attr
: Tagging Insnsset_attr_alternative
: Tagging Insnsset_bb_seq
: GIMPLE sequencesSET_DEST
: Side EffectsSET_IS_RETURN_P
: FlagsSET_LABEL_KIND
: Insnsset_optab_libfunc
: Library CallsSET_RATIO
: CostsSET_SRC
: Side Effectsset_thread_pointer
mode instruction pattern: Standard NamesSET_TYPE_STRUCTURAL_EQUALITY
: Typessetmem
m instruction pattern: Standard NamesSETUP_FRAME_ADDRESSES
: Frame LayoutSFmode
: Machine ModesSHIFT_COUNT_TRUNCATED
: MiscSHLIB_SUFFIX
: Macros for InitializationSHORT_ACCUM_TYPE_SIZE
: Type LayoutSHORT_FRACT_TYPE_SIZE
: Type LayoutSHORT_IMMEDIATES_SIGN_EXTEND
: MiscSHORT_TYPE_SIZE
: Type Layoutsibcall_epilogue
instruction pattern: Standard NamesSIBLING_CALL_P
: FlagsSIG_ATOMIC_TYPE
: Type Layoutsign_extend
: Conversionssign_extract
: Bit-Fieldssign_extract
, canonicalization of: Insn Canonicalizationssignificand
m2
instruction pattern: Standard NamesSImode
: Machine Modessimple_return
: Side Effectssimple_return
instruction pattern: Standard Namessincos
m3
instruction pattern: Standard Namessin
m2
instruction pattern: Standard NamesSIZE_ASM_OP
: Label OutputSIZE_TYPE
: Type LayoutSIZETYPE
: Type Layoutskip
: GTY OptionsSLOW_BYTE_ACCESS
: CostsSLOW_UNALIGNED_ACCESS
: Costssmax
: Arithmeticsmin
: Arithmeticsmul
m3_highpart
instruction pattern: Standard Namesspecial
: GTY OptionsSPECS
: Target Fragmentsplit_block
: Maintaining the CFGSQmode
: Machine Modessqrt
: Arithmeticsqrt
m2
instruction pattern: Standard Namesss_abs
: Arithmeticss_ashift
: Arithmeticss_div
: Arithmeticss_minus
: Arithmeticss_mult
: Arithmeticss_neg
: Arithmeticss_plus
: Arithmeticss_truncate
: ConversionsSSA_NAME_DEF_STMT
: SSASSA_NAME_VERSION
: SSAssadd
m3
instruction pattern: Standard Namesssad
m instruction pattern: Standard Namesssashl
m3
instruction pattern: Standard Namesssdiv
m3
instruction pattern: Standard Namesssmadd
mn4
instruction pattern: Standard Namesssmsub
mn4
instruction pattern: Standard Namesssmul
m3
instruction pattern: Standard Namesssneg
m2
instruction pattern: Standard Namessssub
m3
instruction pattern: Standard NamesSTACK_ALIGNMENT_NEEDED
: Frame LayoutSTACK_BOUNDARY
: Storage LayoutSTACK_CHECK_BUILTIN
: Stack CheckingSTACK_CHECK_FIXED_FRAME_SIZE
: Stack CheckingSTACK_CHECK_MAX_FRAME_SIZE
: Stack CheckingSTACK_CHECK_MAX_VAR_SIZE
: Stack CheckingSTACK_CHECK_MOVING_SP
: Stack CheckingSTACK_CHECK_PROBE_INTERVAL_EXP
: Stack CheckingSTACK_CHECK_PROTECT
: Stack CheckingSTACK_CHECK_STATIC_BUILTIN
: Stack CheckingSTACK_DYNAMIC_OFFSET
: Frame LayoutSTACK_DYNAMIC_OFFSET
and virtual registers: Regs and MemorySTACK_GROWS_DOWNWARD
: Frame LayoutSTACK_PARMS_IN_REG_PARM_AREA
: Stack ArgumentsSTACK_POINTER_OFFSET
: Frame LayoutSTACK_POINTER_OFFSET
and virtual registers: Regs and MemorySTACK_POINTER_REGNUM
: Frame RegistersSTACK_POINTER_REGNUM
and virtual registers: Regs and Memorystack_pointer_rtx
: Frame Registersstack_protect_set
instruction pattern: Standard Namesstack_protect_test
instruction pattern: Standard NamesSTACK_PUSH_CODE
: Frame LayoutSTACK_REG_COVER_CLASS
: Stack RegistersSTACK_REGS
: Stack RegistersSTACK_SAVEAREA_MODE
: Storage LayoutSTACK_SIZE_MODE
: Storage LayoutSTACK_SLOT_ALIGNMENT
: Storage LayoutSTANDARD_STARTFILE_PREFIX
: DriverSTANDARD_STARTFILE_PREFIX_1
: DriverSTANDARD_STARTFILE_PREFIX_2
: DriverSTARTFILE_SPEC
: DriverSTARTING_FRAME_OFFSET
: Frame LayoutSTARTING_FRAME_OFFSET
and virtual registers: Regs and MemorySTATIC_CHAIN_INCOMING_REGNUM
: Frame RegistersSTATIC_CHAIN_REGNUM
: Frame RegistersSTDC_0_IN_SYSTEM_HEADERS
: MiscSTMT_EXPR
: Unary and Binary ExpressionsSTMT_IS_FULL_EXPR_P
: Statements for C++STORE_FLAG_VALUE
: Miscstrcpy
: Storage LayoutSTRICT_ALIGNMENT
: Storage Layoutstrict_low_part
: RTL Declarationsstrict_memory_address_p
: Addressing ModesSTRING_CST
: Constant expressionsSTRING_POOL_ADDRESS_P
: Flagsstrlen
m instruction pattern: Standard NamesSTRUCTURE_SIZE_BOUNDARY
: Storage Layoutsub
m3
instruction pattern: Standard NamesSUBOBJECT
: Statements for C++SUBOBJECT_CLEANUP
: Statements for C++subreg
: Regs and Memorysubreg
and ‘/s’: Flagssubreg
and ‘/u’: Flagssubreg
and ‘/u’ and ‘/v’: Flagssubreg
, in strict_low_part
: RTL DeclarationsSUBREG_BYTE
: Regs and MemorySUBREG_PROMOTED_UNSIGNED_P
: FlagsSUBREG_PROMOTED_UNSIGNED_SET
: FlagsSUBREG_PROMOTED_VAR_P
: FlagsSUBREG_REG
: Regs and Memorysubv
m4
instruction pattern: Standard NamesSUCCESS_EXIT_CODE
: Host MiscSUPPORTS_INIT_PRIORITY
: Macros for InitializationSUPPORTS_ONE_ONLY
: Label OutputSUPPORTS_WEAK
: Label OutputSWITCH_BODY
: Statements for C++SWITCH_COND
: Statements for C++SWITCH_STMT
: Statements for C++SWITCHABLE_TARGET
: Run-time TargetSYMBOL_FLAG_ANCHOR
: Special AccessorsSYMBOL_FLAG_EXTERNAL
: Special AccessorsSYMBOL_FLAG_FUNCTION
: Special AccessorsSYMBOL_FLAG_HAS_BLOCK_INFO
: Special AccessorsSYMBOL_FLAG_LOCAL
: Special AccessorsSYMBOL_FLAG_SMALL
: Special AccessorsSYMBOL_FLAG_TLS_SHIFT
: Special Accessorssymbol_ref
: Constantssymbol_ref
and ‘/f’: Flagssymbol_ref
and ‘/i’: Flagssymbol_ref
and ‘/u’: Flagssymbol_ref
and ‘/v’: Flagssymbol_ref
, RTL sharing: SharingSYMBOL_REF_ANCHOR_P
: Special AccessorsSYMBOL_REF_BLOCK
: Special AccessorsSYMBOL_REF_BLOCK_OFFSET
: Special AccessorsSYMBOL_REF_CONSTANT
: Special AccessorsSYMBOL_REF_DATA
: Special AccessorsSYMBOL_REF_DECL
: Special AccessorsSYMBOL_REF_EXTERNAL_P
: Special AccessorsSYMBOL_REF_FLAG
: FlagsSYMBOL_REF_FLAG
, in TARGET_ENCODE_SECTION_INFO
: SectionsSYMBOL_REF_FLAGS
: Special AccessorsSYMBOL_REF_FUNCTION_P
: Special AccessorsSYMBOL_REF_HAS_BLOCK_INFO_P
: Special AccessorsSYMBOL_REF_LOCAL_P
: Special AccessorsSYMBOL_REF_SMALL_P
: Special AccessorsSYMBOL_REF_TLS_MODEL
: Special AccessorsSYMBOL_REF_USED
: FlagsSYMBOL_REF_WEAK
: Flagssync_add
mode instruction pattern: Standard Namessync_and
mode instruction pattern: Standard Namessync_compare_and_swap
mode instruction pattern: Standard Namessync_ior
mode instruction pattern: Standard Namessync_lock_release
mode instruction pattern: Standard Namessync_lock_test_and_set
mode instruction pattern: Standard Namessync_nand
mode instruction pattern: Standard Namessync_new_add
mode instruction pattern: Standard Namessync_new_and
mode instruction pattern: Standard Namessync_new_ior
mode instruction pattern: Standard Namessync_new_nand
mode instruction pattern: Standard Namessync_new_sub
mode instruction pattern: Standard Namessync_new_xor
mode instruction pattern: Standard Namessync_old_add
mode instruction pattern: Standard Namessync_old_and
mode instruction pattern: Standard Namessync_old_ior
mode instruction pattern: Standard Namessync_old_nand
mode instruction pattern: Standard Namessync_old_sub
mode instruction pattern: Standard Namessync_old_xor
mode instruction pattern: Standard Namessync_sub
mode instruction pattern: Standard Namessync_xor
mode instruction pattern: Standard NamesSYSROOT_HEADERS_SUFFIX_SPEC
: DriverSYSROOT_SUFFIX_SPEC
: Drivertablejump
instruction pattern: Standard Namestag
: GTY OptionsTAmode
: Machine Modestan
m2
instruction pattern: Standard NamesTARGET_ABSOLUTE_BIGGEST_ALIGNMENT
: Storage LayoutTARGET_ADDR_SPACE_ADDRESS_MODE
: Named Address SpacesTARGET_ADDR_SPACE_CONVERT
: Named Address SpacesTARGET_ADDR_SPACE_DEBUG
: Named Address SpacesTARGET_ADDR_SPACE_LEGITIMATE_ADDRESS_P
: Named Address SpacesTARGET_ADDR_SPACE_LEGITIMIZE_ADDRESS
: Named Address SpacesTARGET_ADDR_SPACE_POINTER_MODE
: Named Address SpacesTARGET_ADDR_SPACE_SUBSET_P
: Named Address SpacesTARGET_ADDR_SPACE_VALID_POINTER_MODE
: Named Address SpacesTARGET_ADDR_SPACE_ZERO_ADDRESS_VALID
: Named Address SpacesTARGET_ADDRESS_COST
: CostsTARGET_ALIGN_ANON_BITFIELD
: Storage LayoutTARGET_ALLOCATE_INITIAL_VALUE
: MiscTARGET_ALLOCATE_STACK_SLOTS_FOR_ARGS
: MiscTARGET_ALWAYS_STRIP_DOTDOT
: DriverTARGET_ARG_PARTIAL_BYTES
: Register ArgumentsTARGET_ARM_EABI_UNWINDER
: Exception Region OutputTARGET_ARRAY_MODE_SUPPORTED_P
: Register ArgumentsTARGET_ASAN_SHADOW_OFFSET
: MiscTARGET_ASM_ALIGNED_DI_OP
: Data OutputTARGET_ASM_ALIGNED_HI_OP
: Data OutputTARGET_ASM_ALIGNED_SI_OP
: Data OutputTARGET_ASM_ALIGNED_TI_OP
: Data OutputTARGET_ASM_ASSEMBLE_UNDEFINED_DECL
: Label OutputTARGET_ASM_ASSEMBLE_VISIBILITY
: Label OutputTARGET_ASM_BYTE_OP
: Data OutputTARGET_ASM_CAN_OUTPUT_MI_THUNK
: Function EntryTARGET_ASM_CLOSE_PAREN
: Data OutputTARGET_ASM_CODE_END
: File FrameworkTARGET_ASM_CONSTRUCTOR
: Macros for InitializationTARGET_ASM_DECL_END
: Data OutputTARGET_ASM_DECLARE_CONSTANT_NAME
: Label OutputTARGET_ASM_DESTRUCTOR
: Macros for InitializationTARGET_ASM_EMIT_EXCEPT_PERSONALITY
: Dispatch TablesTARGET_ASM_EMIT_EXCEPT_TABLE_LABEL
: Dispatch TablesTARGET_ASM_EMIT_UNWIND_LABEL
: Dispatch TablesTARGET_ASM_EXTERNAL_LIBCALL
: Label OutputTARGET_ASM_FILE_END
: File FrameworkTARGET_ASM_FILE_START
: File FrameworkTARGET_ASM_FILE_START_APP_OFF
: File FrameworkTARGET_ASM_FILE_START_FILE_DIRECTIVE
: File FrameworkTARGET_ASM_FINAL_POSTSCAN_INSN
: Instruction OutputTARGET_ASM_FUNCTION_BEGIN_EPILOGUE
: Function EntryTARGET_ASM_FUNCTION_END_PROLOGUE
: Function EntryTARGET_ASM_FUNCTION_EPILOGUE
: Function EntryTARGET_ASM_FUNCTION_PROLOGUE
: Function EntryTARGET_ASM_FUNCTION_RODATA_SECTION
: SectionsTARGET_ASM_FUNCTION_SECTION
: File FrameworkTARGET_ASM_FUNCTION_SWITCHED_TEXT_SECTIONS
: File FrameworkTARGET_ASM_GLOBALIZE_DECL_NAME
: Label OutputTARGET_ASM_GLOBALIZE_LABEL
: Label OutputTARGET_ASM_INIT_SECTIONS
: SectionsTARGET_ASM_INTEGER
: Data OutputTARGET_ASM_INTERNAL_LABEL
: Label OutputTARGET_ASM_JUMP_ALIGN_MAX_SKIP
: Alignment OutputTARGET_ASM_LABEL_ALIGN_AFTER_BARRIER_MAX_SKIP
: Alignment OutputTARGET_ASM_LABEL_ALIGN_MAX_SKIP
: Alignment OutputTARGET_ASM_LOOP_ALIGN_MAX_SKIP
: Alignment OutputTARGET_ASM_LTO_END
: File FrameworkTARGET_ASM_LTO_START
: File FrameworkTARGET_ASM_MARK_DECL_PRESERVED
: Label OutputTARGET_ASM_MERGEABLE_RODATA_PREFIX
: SectionsTARGET_ASM_NAMED_SECTION
: File FrameworkTARGET_ASM_OPEN_PAREN
: Data OutputTARGET_ASM_OUTPUT_ADDR_CONST_EXTRA
: Data OutputTARGET_ASM_OUTPUT_ANCHOR
: Anchored AddressesTARGET_ASM_OUTPUT_DWARF_DTPREL
: SDB and DWARFTARGET_ASM_OUTPUT_IDENT
: File FrameworkTARGET_ASM_OUTPUT_MI_THUNK
: Function EntryTARGET_ASM_OUTPUT_SOURCE_FILENAME
: File FrameworkTARGET_ASM_RECORD_GCC_SWITCHES
: File FrameworkTARGET_ASM_RECORD_GCC_SWITCHES_SECTION
: File FrameworkTARGET_ASM_RELOC_RW_MASK
: SectionsTARGET_ASM_SELECT_RTX_SECTION
: SectionsTARGET_ASM_SELECT_SECTION
: SectionsTARGET_ASM_TM_CLONE_TABLE_SECTION
: SectionsTARGET_ASM_TRAMPOLINE_TEMPLATE
: TrampolinesTARGET_ASM_TTYPE
: Exception Region OutputTARGET_ASM_UNALIGNED_DI_OP
: Data OutputTARGET_ASM_UNALIGNED_HI_OP
: Data OutputTARGET_ASM_UNALIGNED_SI_OP
: Data OutputTARGET_ASM_UNALIGNED_TI_OP
: Data OutputTARGET_ASM_UNIQUE_SECTION
: SectionsTARGET_ASM_UNWIND_EMIT
: Dispatch TablesTARGET_ASM_UNWIND_EMIT_BEFORE_INSN
: Dispatch TablesTARGET_ATOMIC_ALIGN_FOR_MODE
: MiscTARGET_ATOMIC_ASSIGN_EXPAND_FENV
: MiscTARGET_ATOMIC_TEST_AND_SET_TRUEVAL
: MiscTARGET_ATTRIBUTE_TABLE
: Target AttributesTARGET_ATTRIBUTE_TAKES_IDENTIFIER_P
: Target AttributesTARGET_BINDS_LOCAL_P
: SectionsTARGET_BRANCH_TARGET_REGISTER_CALLEE_SAVED
: MiscTARGET_BRANCH_TARGET_REGISTER_CLASS
: MiscTARGET_BUILD_BUILTIN_VA_LIST
: Register ArgumentsTARGET_BUILTIN_CHKP_FUNCTION
: MiscTARGET_BUILTIN_DECL
: MiscTARGET_BUILTIN_RECIPROCAL
: Addressing ModesTARGET_BUILTIN_SETJMP_FRAME_VALUE
: Frame LayoutTARGET_C_PREINCLUDE
: MiscTARGET_CALL_ARGS
: VarargsTARGET_CALL_FUSAGE_CONTAINS_NON_CALLEE_CLOBBERS
: Miscellaneous Register HooksTARGET_CALLEE_COPIES
: Register ArgumentsTARGET_CAN_ELIMINATE
: EliminationTARGET_CAN_FOLLOW_JUMP
: MiscTARGET_CAN_INLINE_P
: Target AttributesTARGET_CAN_USE_DOLOOP_P
: MiscTARGET_CANNOT_FORCE_CONST_MEM
: Addressing ModesTARGET_CANNOT_MODIFY_JUMPS_P
: MiscTARGET_CANNOT_SUBSTITUTE_MEM_EQUIV_P
: Register ClassesTARGET_CANONICAL_VA_LIST_TYPE
: Register ArgumentsTARGET_CANONICALIZE_COMPARISON
: MODE_CC Condition CodesTARGET_CASE_VALUES_THRESHOLD
: MiscTARGET_CC_MODES_COMPATIBLE
: MODE_CC Condition CodesTARGET_CHECK_PCH_TARGET_FLAGS
: PCH TargetTARGET_CHECK_STRING_OBJECT_FORMAT_ARG
: Run-time TargetTARGET_CHKP_BOUND_MODE
: MiscTARGET_CHKP_BOUND_TYPE
: MiscTARGET_CHKP_FUNCTION_VALUE_BOUNDS
: VarargsTARGET_CHKP_INITIALIZE_BOUNDS
: MiscTARGET_CHKP_MAKE_BOUNDS_CONSTANT
: MiscTARGET_CLASS_LIKELY_SPILLED_P
: Register ClassesTARGET_CLASS_MAX_NREGS
: Register ClassesTARGET_COMMUTATIVE_P
: MiscTARGET_COMP_TYPE_ATTRIBUTES
: Target AttributesTARGET_COMPARE_VERSION_PRIORITY
: MiscTARGET_CONDITIONAL_REGISTER_USAGE
: Register BasicsTARGET_CONST_ANCHOR
: MiscTARGET_CONST_NOT_OK_FOR_DEBUG_P
: Addressing ModesTARGET_CONVERT_TO_TYPE
: MiscTARGET_CPU_CPP_BUILTINS
: Run-time TargetTARGET_CSTORE_MODE
: Register ClassesTARGET_CXX_ADJUST_CLASS_AT_DEFINITION
: C++ ABITARGET_CXX_CDTOR_RETURNS_THIS
: C++ ABITARGET_CXX_CLASS_DATA_ALWAYS_COMDAT
: C++ ABITARGET_CXX_COOKIE_HAS_SIZE
: C++ ABITARGET_CXX_DECL_MANGLING_CONTEXT
: C++ ABITARGET_CXX_DETERMINE_CLASS_DATA_VISIBILITY
: C++ ABITARGET_CXX_GET_COOKIE_SIZE
: C++ ABITARGET_CXX_GUARD_MASK_BIT
: C++ ABITARGET_CXX_GUARD_TYPE
: C++ ABITARGET_CXX_IMPLICIT_EXTERN_C
: MiscTARGET_CXX_IMPORT_EXPORT_CLASS
: C++ ABITARGET_CXX_KEY_METHOD_MAY_BE_INLINE
: C++ ABITARGET_CXX_LIBRARY_RTTI_COMDAT
: C++ ABITARGET_CXX_USE_AEABI_ATEXIT
: C++ ABITARGET_CXX_USE_ATEXIT_FOR_CXA_ATEXIT
: C++ ABITARGET_DEBUG_UNWIND_INFO
: SDB and DWARFTARGET_DECIMAL_FLOAT_SUPPORTED_P
: Storage LayoutTARGET_DECLSPEC
: Target AttributesTARGET_DEFAULT_PACK_STRUCT
: MiscTARGET_DEFAULT_SHORT_ENUMS
: Type LayoutTARGET_DEFAULT_TARGET_FLAGS
: Run-time TargetTARGET_DEFERRED_OUTPUT_DEFS
: Label OutputTARGET_DELAY_SCHED2
: SDB and DWARFTARGET_DELAY_VARTRACK
: SDB and DWARFTARGET_DELEGITIMIZE_ADDRESS
: Addressing ModesTARGET_DIFFERENT_ADDR_DISPLACEMENT_P
: Register ClassesTARGET_DLLIMPORT_DECL_ATTRIBUTES
: Target AttributesTARGET_DWARF_CALLING_CONVENTION
: SDB and DWARFTARGET_DWARF_FRAME_REG_MODE
: Exception Region OutputTARGET_DWARF_HANDLE_FRAME_UNSPEC
: Frame LayoutTARGET_DWARF_REGISTER_SPAN
: Exception Region OutputTARGET_EDOM
: Library CallsTARGET_EMUTLS_DEBUG_FORM_TLS_ADDRESS
: Emulated TLSTARGET_EMUTLS_GET_ADDRESS
: Emulated TLSTARGET_EMUTLS_REGISTER_COMMON
: Emulated TLSTARGET_EMUTLS_TMPL_PREFIX
: Emulated TLSTARGET_EMUTLS_TMPL_SECTION
: Emulated TLSTARGET_EMUTLS_VAR_ALIGN_FIXED
: Emulated TLSTARGET_EMUTLS_VAR_FIELDS
: Emulated TLSTARGET_EMUTLS_VAR_INIT
: Emulated TLSTARGET_EMUTLS_VAR_PREFIX
: Emulated TLSTARGET_EMUTLS_VAR_SECTION
: Emulated TLSTARGET_ENCODE_SECTION_INFO
: SectionsTARGET_ENCODE_SECTION_INFO
and address validation: Addressing ModesTARGET_ENCODE_SECTION_INFO
usage: Instruction OutputTARGET_END_CALL_ARGS
: VarargsTARGET_ENUM_VA_LIST_P
: Register ArgumentsTARGET_EXCEPT_UNWIND_INFO
: Exception Region OutputTARGET_EXECUTABLE_SUFFIX
: MiscTARGET_EXPAND_BUILTIN
: MiscTARGET_EXPAND_BUILTIN_SAVEREGS
: VarargsTARGET_EXPAND_TO_RTL_HOOK
: Storage LayoutTARGET_EXPR
: Unary and Binary ExpressionsTARGET_EXTRA_INCLUDES
: MiscTARGET_EXTRA_LIVE_ON_ENTRY
: Tail CallsTARGET_EXTRA_PRE_INCLUDES
: MiscTARGET_FIXED_CONDITION_CODE_REGS
: MODE_CC Condition CodesTARGET_FIXED_POINT_SUPPORTED_P
: Storage Layouttarget_flags
: Run-time TargetTARGET_FLAGS_REGNUM
: MODE_CC Condition CodesTARGET_FLOAT_EXCEPTIONS_ROUNDING_SUPPORTED_P
: Run-time TargetTARGET_FLT_EVAL_METHOD
: Type LayoutTARGET_FN_ABI_VA_LIST
: Register ArgumentsTARGET_FOLD_BUILTIN
: MiscTARGET_FORCE_AT_COMP_DIR
: SDB and DWARFTARGET_FORMAT_TYPES
: MiscTARGET_FRAME_POINTER_REQUIRED
: EliminationTARGET_FUNCTION_ARG
: Register ArgumentsTARGET_FUNCTION_ARG_ADVANCE
: Register ArgumentsTARGET_FUNCTION_ARG_BOUNDARY
: Register ArgumentsTARGET_FUNCTION_ARG_ROUND_BOUNDARY
: Register ArgumentsTARGET_FUNCTION_ATTRIBUTE_INLINABLE_P
: Target AttributesTARGET_FUNCTION_INCOMING_ARG
: Register ArgumentsTARGET_FUNCTION_OK_FOR_SIBCALL
: Tail CallsTARGET_FUNCTION_VALUE
: Scalar ReturnTARGET_FUNCTION_VALUE_REGNO_P
: Scalar ReturnTARGET_GEN_CCMP_FIRST
: MiscTARGET_GEN_CCMP_NEXT
: MiscTARGET_GENERATE_VERSION_DISPATCHER_BODY
: MiscTARGET_GET_DRAP_RTX
: MiscTARGET_GET_FUNCTION_VERSIONS_DISPATCHER
: MiscTARGET_GET_PCH_VALIDITY
: PCH TargetTARGET_GET_RAW_ARG_MODE
: Aggregate ReturnTARGET_GET_RAW_RESULT_MODE
: Aggregate ReturnTARGET_GIMPLE_FOLD_BUILTIN
: MiscTARGET_GIMPLIFY_VA_ARG_EXPR
: Register ArgumentsTARGET_GOACC_DIM_LIMIT
: Addressing ModesTARGET_GOACC_FORK_JOIN
: Addressing ModesTARGET_GOACC_REDUCTION
: Addressing ModesTARGET_GOACC_VALIDATE_DIMS
: Addressing ModesTARGET_HANDLE_C_OPTION
: Run-time TargetTARGET_HANDLE_OPTION
: Run-time TargetTARGET_HARD_REGNO_SCRATCH_OK
: Values in RegistersTARGET_HAS_IFUNC_P
: MiscTARGET_HAS_NO_HW_DIVIDE
: Library CallsTARGET_HAVE_CONDITIONAL_EXECUTION
: MiscTARGET_HAVE_CTORS_DTORS
: Macros for InitializationTARGET_HAVE_NAMED_SECTIONS
: File FrameworkTARGET_HAVE_SRODATA_SECTION
: SectionsTARGET_HAVE_SWITCHABLE_BSS_SECTIONS
: File FrameworkTARGET_HAVE_TLS
: SectionsTARGET_IN_SMALL_DATA_P
: SectionsTARGET_INIT_BUILTINS
: MiscTARGET_INIT_DWARF_REG_SIZES_EXTRA
: Exception Region OutputTARGET_INIT_LIBFUNCS
: Library CallsTARGET_INIT_PIC_REG
: Register ArgumentsTARGET_INSERT_ATTRIBUTES
: Target AttributesTARGET_INSTANTIATE_DECLS
: Storage LayoutTARGET_INVALID_ARG_FOR_UNPROTOTYPED_FN
: MiscTARGET_INVALID_BINARY_OP
: MiscTARGET_INVALID_CONVERSION
: MiscTARGET_INVALID_PARAMETER_TYPE
: MiscTARGET_INVALID_RETURN_TYPE
: MiscTARGET_INVALID_UNARY_OP
: MiscTARGET_INVALID_WITHIN_DOLOOP
: MiscTARGET_IRA_CHANGE_PSEUDO_ALLOCNO_CLASS
: Register ClassesTARGET_KEEP_LEAF_WHEN_PROFILED
: ProfilingTARGET_LEGITIMATE_ADDRESS_P
: Addressing ModesTARGET_LEGITIMATE_COMBINED_INSN
: MiscTARGET_LEGITIMATE_CONSTANT_P
: Addressing ModesTARGET_LEGITIMIZE_ADDRESS
: Addressing ModesTARGET_LEGITIMIZE_ADDRESS_DISPLACEMENT
: Register ClassesTARGET_LIB_INT_CMP_BIASED
: Library CallsTARGET_LIBC_HAS_FUNCTION
: Library CallsTARGET_LIBCALL_VALUE
: Scalar ReturnTARGET_LIBFUNC_GNU_PREFIX
: Library CallsTARGET_LIBGCC_CMP_RETURN_MODE
: Storage LayoutTARGET_LIBGCC_FLOATING_MODE_SUPPORTED_P
: Register ArgumentsTARGET_LIBGCC_SDATA_SECTION
: SectionsTARGET_LIBGCC_SHIFT_COUNT_MODE
: Storage LayoutTARGET_LOAD_BOUNDS_FOR_ARG
: VarargsTARGET_LOAD_RETURNED_BOUNDS
: VarargsTARGET_LOOP_UNROLL_ADJUST
: MiscTARGET_LRA_P
: Register ClassesTARGET_MACHINE_DEPENDENT_REORG
: MiscTARGET_MANGLE_ASSEMBLER_NAME
: Label OutputTARGET_MANGLE_DECL_ASSEMBLER_NAME
: SectionsTARGET_MANGLE_TYPE
: Storage LayoutTARGET_MAX_ANCHOR_OFFSET
: Anchored AddressesTARGET_MD_ASM_ADJUST
: MiscTARGET_MEM_CONSTRAINT
: Addressing ModesTARGET_MEM_REF
: Storage ReferencesTARGET_MEMBER_TYPE_FORCES_BLK
: Storage LayoutTARGET_MEMMODEL_CHECK
: MiscTARGET_MEMORY_MOVE_COST
: CostsTARGET_MERGE_DECL_ATTRIBUTES
: Target AttributesTARGET_MERGE_TYPE_ATTRIBUTES
: Target AttributesTARGET_MIN_ANCHOR_OFFSET
: Anchored AddressesTARGET_MIN_DIVISIONS_FOR_RECIP_MUL
: MiscTARGET_MODE_AFTER
: Mode SwitchingTARGET_MODE_DEPENDENT_ADDRESS_P
: Addressing ModesTARGET_MODE_EMIT
: Mode SwitchingTARGET_MODE_ENTRY
: Mode SwitchingTARGET_MODE_EXIT
: Mode SwitchingTARGET_MODE_NEEDED
: Mode SwitchingTARGET_MODE_PRIORITY
: Mode SwitchingTARGET_MODE_REP_EXTENDED
: MiscTARGET_MS_BITFIELD_LAYOUT_P
: Storage LayoutTARGET_MUST_PASS_IN_STACK
: Register ArgumentsTARGET_MUST_PASS_IN_STACK
, and TARGET_FUNCTION_ARG
: Register ArgumentsTARGET_N_FORMAT_TYPES
: MiscTARGET_NARROW_VOLATILE_BITFIELD
: Storage LayoutTARGET_NO_REGISTER_ALLOCATION
: SDB and DWARFTARGET_NO_SPECULATION_IN_DELAY_SLOTS_P
: CostsTARGET_OBJC_CONSTRUCT_STRING_OBJECT
: Run-time TargetTARGET_OBJC_DECLARE_CLASS_DEFINITION
: Run-time TargetTARGET_OBJC_DECLARE_UNRESOLVED_CLASS_REFERENCE
: Run-time TargetTARGET_OBJECT_SUFFIX
: MiscTARGET_OBJFMT_CPP_BUILTINS
: Run-time TargetTARGET_OFFLOAD_OPTIONS
: MiscTARGET_OMIT_STRUCT_RETURN_REG
: Scalar ReturnTARGET_OPTAB_SUPPORTED_P
: CostsTARGET_OPTF
: MiscTARGET_OPTION_DEFAULT_PARAMS
: Run-time TargetTARGET_OPTION_FUNCTION_VERSIONS
: Target AttributesTARGET_OPTION_INIT_STRUCT
: Run-time TargetTARGET_OPTION_OPTIMIZATION_TABLE
: Run-time TargetTARGET_OPTION_OVERRIDE
: Target AttributesTARGET_OPTION_POST_STREAM_IN
: Target AttributesTARGET_OPTION_PRAGMA_PARSE
: Target AttributesTARGET_OPTION_PRINT
: Target AttributesTARGET_OPTION_RESTORE
: Target AttributesTARGET_OPTION_SAVE
: Target AttributesTARGET_OPTION_VALID_ATTRIBUTE_P
: Target AttributesTARGET_OS_CPP_BUILTINS
: Run-time TargetTARGET_OVERRIDE_OPTIONS_AFTER_CHANGE
: Run-time TargetTARGET_OVERRIDES_FORMAT_ATTRIBUTES
: MiscTARGET_OVERRIDES_FORMAT_ATTRIBUTES_COUNT
: MiscTARGET_OVERRIDES_FORMAT_INIT
: MiscTARGET_PASS_BY_REFERENCE
: Register ArgumentsTARGET_PCH_VALID_P
: PCH TargetTARGET_POSIX_IO
: MiscTARGET_PREFERRED_OUTPUT_RELOAD_CLASS
: Register ClassesTARGET_PREFERRED_RELOAD_CLASS
: Register ClassesTARGET_PREFERRED_RENAME_CLASS
: Register ClassesTARGET_PREPARE_PCH_SAVE
: PCH TargetTARGET_PRETEND_OUTGOING_VARARGS_NAMED
: VarargsTARGET_PROFILE_BEFORE_PROLOGUE
: SectionsTARGET_PROMOTE_FUNCTION_MODE
: Storage LayoutTARGET_PROMOTE_PROTOTYPES
: Stack ArgumentsTARGET_PROMOTED_TYPE
: MiscTARGET_PTRMEMFUNC_VBIT_LOCATION
: Type LayoutTARGET_RECORD_OFFLOAD_SYMBOL
: MiscTARGET_REF_MAY_ALIAS_ERRNO
: Register ArgumentsTARGET_REGISTER_MOVE_COST
: CostsTARGET_REGISTER_PRIORITY
: Register ClassesTARGET_REGISTER_USAGE_LEVELING_P
: Register ClassesTARGET_RELAYOUT_FUNCTION
: Target AttributesTARGET_RESOLVE_OVERLOADED_BUILTIN
: MiscTARGET_RETURN_IN_MEMORY
: Aggregate ReturnTARGET_RETURN_IN_MSB
: Scalar ReturnTARGET_RETURN_POPS_ARGS
: Stack ArgumentsTARGET_RTX_COSTS
: CostsTARGET_SCALAR_MODE_SUPPORTED_P
: Register ArgumentsTARGET_SCHED_ADJUST_COST
: SchedulingTARGET_SCHED_ADJUST_PRIORITY
: SchedulingTARGET_SCHED_ALLOC_SCHED_CONTEXT
: SchedulingTARGET_SCHED_CLEAR_SCHED_CONTEXT
: SchedulingTARGET_SCHED_DEPENDENCIES_EVALUATION_HOOK
: SchedulingTARGET_SCHED_DFA_NEW_CYCLE
: SchedulingTARGET_SCHED_DFA_POST_ADVANCE_CYCLE
: SchedulingTARGET_SCHED_DFA_POST_CYCLE_INSN
: SchedulingTARGET_SCHED_DFA_PRE_ADVANCE_CYCLE
: SchedulingTARGET_SCHED_DFA_PRE_CYCLE_INSN
: SchedulingTARGET_SCHED_DISPATCH
: SchedulingTARGET_SCHED_DISPATCH_DO
: SchedulingTARGET_SCHED_EXPOSED_PIPELINE
: SchedulingTARGET_SCHED_FINISH
: SchedulingTARGET_SCHED_FINISH_GLOBAL
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_BACKTRACK
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_BEGIN
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_DFA_LOOKAHEAD
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_DFA_LOOKAHEAD_GUARD
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_END
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_FINI
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_INIT
: SchedulingTARGET_SCHED_FIRST_CYCLE_MULTIPASS_ISSUE
: SchedulingTARGET_SCHED_FREE_SCHED_CONTEXT
: SchedulingTARGET_SCHED_FUSION_PRIORITY
: SchedulingTARGET_SCHED_GEN_SPEC_CHECK
: SchedulingTARGET_SCHED_H_I_D_EXTENDED
: SchedulingTARGET_SCHED_INIT
: SchedulingTARGET_SCHED_INIT_DFA_POST_CYCLE_INSN
: SchedulingTARGET_SCHED_INIT_DFA_PRE_CYCLE_INSN
: SchedulingTARGET_SCHED_INIT_GLOBAL
: SchedulingTARGET_SCHED_INIT_SCHED_CONTEXT
: SchedulingTARGET_SCHED_IS_COSTLY_DEPENDENCE
: SchedulingTARGET_SCHED_ISSUE_RATE
: SchedulingTARGET_SCHED_MACRO_FUSION_P
: SchedulingTARGET_SCHED_MACRO_FUSION_PAIR_P
: SchedulingTARGET_SCHED_NEEDS_BLOCK_P
: SchedulingTARGET_SCHED_REASSOCIATION_WIDTH
: SchedulingTARGET_SCHED_REORDER
: SchedulingTARGET_SCHED_REORDER2
: SchedulingTARGET_SCHED_SET_SCHED_CONTEXT
: SchedulingTARGET_SCHED_SET_SCHED_FLAGS
: SchedulingTARGET_SCHED_SMS_RES_MII
: SchedulingTARGET_SCHED_SPECULATE_INSN
: SchedulingTARGET_SCHED_VARIABLE_ISSUE
: SchedulingTARGET_SECONDARY_RELOAD
: Register ClassesTARGET_SECTION_TYPE_FLAGS
: File FrameworkTARGET_SET_CURRENT_FUNCTION
: MiscTARGET_SET_DEFAULT_TYPE_ATTRIBUTES
: Target AttributesTARGET_SET_UP_BY_PROLOGUE
: Tail CallsTARGET_SETUP_INCOMING_VARARG_BOUNDS
: VarargsTARGET_SETUP_INCOMING_VARARGS
: VarargsTARGET_SHIFT_TRUNCATION_MASK
: MiscTARGET_SIMD_CLONE_ADJUST
: Addressing ModesTARGET_SIMD_CLONE_COMPUTE_VECSIZE_AND_SIMDLEN
: Addressing ModesTARGET_SIMD_CLONE_USABLE
: Addressing ModesTARGET_SMALL_REGISTER_CLASSES_FOR_MODE_P
: Register ArgumentsTARGET_SPILL_CLASS
: Register ClassesTARGET_SPLIT_COMPLEX_ARG
: Register ArgumentsTARGET_STACK_PROTECT_FAIL
: Stack Smashing ProtectionTARGET_STACK_PROTECT_GUARD
: Stack Smashing ProtectionTARGET_STATIC_CHAIN
: Frame RegistersTARGET_STORE_BOUNDS_FOR_ARG
: VarargsTARGET_STORE_RETURNED_BOUNDS
: VarargsTARGET_STRICT_ARGUMENT_NAMING
: VarargsTARGET_STRING_OBJECT_REF_TYPE_P
: Run-time TargetTARGET_STRIP_NAME_ENCODING
: SectionsTARGET_STRUCT_VALUE_RTX
: Aggregate ReturnTARGET_SUPPORTS_SPLIT_STACK
: Stack Smashing ProtectionTARGET_SUPPORTS_WEAK
: Label OutputTARGET_SUPPORTS_WIDE_INT
: MiscTARGET_TERMINATE_DW2_EH_FRAME_INFO
: Exception Region OutputTARGET_TRAMPOLINE_ADJUST_ADDRESS
: TrampolinesTARGET_TRAMPOLINE_INIT
: TrampolinesTARGET_UNSPEC_MAY_TRAP_P
: MiscTARGET_UNWIND_TABLES_DEFAULT
: Exception Region OutputTARGET_UNWIND_WORD_MODE
: Storage LayoutTARGET_UPDATE_STACK_BOUNDARY
: MiscTARGET_USE_ANCHORS_FOR_SYMBOL_P
: Anchored AddressesTARGET_USE_BLOCKS_FOR_CONSTANT_P
: Addressing ModesTARGET_USE_BLOCKS_FOR_DECL_P
: Addressing ModesTARGET_USE_BY_PIECES_INFRASTRUCTURE_P
: CostsTARGET_USE_JCR_SECTION
: MiscTARGET_USE_PSEUDO_PIC_REG
: Register ArgumentsTARGET_USES_WEAK_UNWIND_INFO
: Exception HandlingTARGET_VALID_DLLIMPORT_ATTRIBUTE_P
: Target AttributesTARGET_VALID_POINTER_MODE
: Register ArgumentsTARGET_VECTOR_ALIGNMENT
: Storage LayoutTARGET_VECTOR_MODE_SUPPORTED_P
: Register ArgumentsTARGET_VECTORIZE_ADD_STMT_COST
: Addressing ModesTARGET_VECTORIZE_AUTOVECTORIZE_VECTOR_SIZES
: Addressing ModesTARGET_VECTORIZE_BUILTIN_CONVERSION
: Addressing ModesTARGET_VECTORIZE_BUILTIN_GATHER
: Addressing ModesTARGET_VECTORIZE_BUILTIN_MASK_FOR_LOAD
: Addressing ModesTARGET_VECTORIZE_BUILTIN_MD_VECTORIZED_FUNCTION
: Addressing ModesTARGET_VECTORIZE_BUILTIN_SCATTER
: Addressing ModesTARGET_VECTORIZE_BUILTIN_VECTORIZATION_COST
: Addressing ModesTARGET_VECTORIZE_BUILTIN_VECTORIZED_FUNCTION
: Addressing ModesTARGET_VECTORIZE_DESTROY_COST_DATA
: Addressing ModesTARGET_VECTORIZE_FINISH_COST
: Addressing ModesTARGET_VECTORIZE_GET_MASK_MODE
: Addressing ModesTARGET_VECTORIZE_INIT_COST
: Addressing ModesTARGET_VECTORIZE_PREFERRED_SIMD_MODE
: Addressing ModesTARGET_VECTORIZE_SUPPORT_VECTOR_MISALIGNMENT
: Addressing ModesTARGET_VECTORIZE_VEC_PERM_CONST_OK
: Addressing ModesTARGET_VECTORIZE_VECTOR_ALIGNMENT_REACHABLE
: Addressing ModesTARGET_VTABLE_DATA_ENTRY_DISTANCE
: Type LayoutTARGET_VTABLE_ENTRY_ALIGN
: Type LayoutTARGET_VTABLE_USES_DESCRIPTORS
: Type LayoutTARGET_WANT_DEBUG_PUB_SECTIONS
: SDB and DWARFTARGET_WARN_FUNC_RETURN
: Tail CallsTARGET_WEAK_NOT_IN_ARCHIVE_TOC
: Label Outputtargetm
: Target StructureTCmode
: Machine ModesTDmode
: Machine ModesTEMPLATE_DECL
: DeclarationsTEXT_SECTION_ASM_OP
: SectionsTFmode
: Machine ModesTHEN_CLAUSE
: Statements for C++THREAD_MODEL_SPEC
: DriverTHROW_EXPR
: Unary and Binary ExpressionsTHUNK_DECL
: DeclarationsTHUNK_DELTA
: DeclarationsTImode
: Machine ModesTImode
, in insn
: InsnsTLS_COMMON_ASM_OP
: SectionsTLS_SECTION_ASM_FLAG
: SectionsTQFmode
: Machine ModesTQmode
: Machine ModesTRAMPOLINE_ALIGNMENT
: TrampolinesTRAMPOLINE_SECTION
: TrampolinesTRAMPOLINE_SIZE
: TrampolinesTRANSFER_FROM_TRAMPOLINE
: Trampolinestrap
instruction pattern: Standard NamesTREE_CHAIN
: Macros and FunctionsTREE_CODE
: Tree overviewtree_fits_shwi_p
: Constant expressionstree_fits_uhwi_p
: Constant expressionsTREE_INT_CST_ELT
: Constant expressionstree_int_cst_equal
: Constant expressionsTREE_INT_CST_LOW
: Constant expressionstree_int_cst_lt
: Constant expressionsTREE_INT_CST_NUNITS
: Constant expressionsTREE_LIST
: ContainersTREE_OPERAND
: Expression treesTREE_PUBLIC
: Function PropertiesTREE_PUBLIC
: Function BasicsTREE_PURPOSE
: ContainersTREE_READONLY
: Function Propertiestree_size
: Macros and FunctionsTREE_STATIC
: Function PropertiesTREE_STRING_LENGTH
: Constant expressionsTREE_STRING_POINTER
: Constant expressionsTREE_THIS_VOLATILE
: Function Propertiestree_to_shwi
: Constant expressionstree_to_uhwi
: Constant expressionsTREE_TYPE
: Types for C++TREE_TYPE
: Function BasicsTREE_TYPE
: Expression treesTREE_TYPE
: Working with declarationsTREE_TYPE
: TypesTREE_TYPE
: Macros and FunctionsTREE_VALUE
: ContainersTREE_VEC
: ContainersTREE_VEC_ELT
: ContainersTREE_VEC_LENGTH
: ContainersTRULY_NOOP_TRUNCATION
: MiscTRUNC_DIV_EXPR
: Unary and Binary ExpressionsTRUNC_MOD_EXPR
: Unary and Binary Expressionstruncate
: Conversionstrunc
mn2
instruction pattern: Standard NamesTRUTH_AND_EXPR
: Unary and Binary ExpressionsTRUTH_ANDIF_EXPR
: Unary and Binary ExpressionsTRUTH_NOT_EXPR
: Unary and Binary ExpressionsTRUTH_OR_EXPR
: Unary and Binary ExpressionsTRUTH_ORIF_EXPR
: Unary and Binary ExpressionsTRUTH_XOR_EXPR
: Unary and Binary ExpressionsTRY_BLOCK
: Statements for C++TRY_HANDLERS
: Statements for C++TRY_STMTS
: Statements for C++TYPE_ALIGN
: Types for C++TYPE_ALIGN
: TypesTYPE_ARG_TYPES
: Types for C++TYPE_ARG_TYPES
: TypesTYPE_ASM_OP
: Label OutputTYPE_ATTRIBUTES
: AttributesTYPE_BINFO
: ClassesTYPE_BUILT_IN
: Types for C++TYPE_CANONICAL
: TypesTYPE_CONTEXT
: Types for C++TYPE_CONTEXT
: TypesTYPE_DECL
: DeclarationsTYPE_FIELDS
: ClassesTYPE_FIELDS
: Types for C++TYPE_FIELDS
: TypesTYPE_HAS_ARRAY_NEW_OPERATOR
: ClassesTYPE_HAS_DEFAULT_CONSTRUCTOR
: ClassesTYPE_HAS_MUTABLE_P
: ClassesTYPE_HAS_NEW_OPERATOR
: ClassesTYPE_MAIN_VARIANT
: Types for C++TYPE_MAIN_VARIANT
: TypesTYPE_MAX_VALUE
: TypesTYPE_METHOD_BASETYPE
: Types for C++TYPE_METHOD_BASETYPE
: TypesTYPE_METHODS
: ClassesTYPE_MIN_VALUE
: TypesTYPE_NAME
: Types for C++TYPE_NAME
: TypesTYPE_NOTHROW_P
: Functions for C++TYPE_OFFSET_BASETYPE
: Types for C++TYPE_OFFSET_BASETYPE
: TypesTYPE_OPERAND_FMT
: Label OutputTYPE_OVERLOADS_ARRAY_REF
: ClassesTYPE_OVERLOADS_ARROW
: ClassesTYPE_OVERLOADS_CALL_EXPR
: ClassesTYPE_POLYMORPHIC_P
: ClassesTYPE_PRECISION
: Types for C++TYPE_PRECISION
: TypesTYPE_PTR_P
: Types for C++TYPE_PTRDATAMEM_P
: Types for C++TYPE_PTRFN_P
: Types for C++TYPE_PTROB_P
: Types for C++TYPE_PTROBV_P
: Types for C++TYPE_QUAL_CONST
: Types for C++TYPE_QUAL_CONST
: TypesTYPE_QUAL_RESTRICT
: Types for C++TYPE_QUAL_RESTRICT
: TypesTYPE_QUAL_VOLATILE
: Types for C++TYPE_QUAL_VOLATILE
: TypesTYPE_RAISES_EXCEPTIONS
: Functions for C++TYPE_SIZE
: Types for C++TYPE_SIZE
: TypesTYPE_STRUCTURAL_EQUALITY_P
: TypesTYPE_UNQUALIFIED
: Types for C++TYPE_UNQUALIFIED
: TypesTYPE_VFIELD
: ClassesTYPENAME_TYPE
: Types for C++TYPENAME_TYPE_FULLNAME
: Types for C++TYPENAME_TYPE_FULLNAME
: TypesTYPEOF_TYPE
: Types for C++uaddv
m4
instruction pattern: Standard NamesUDAmode
: Machine Modesudiv
: Arithmeticudiv
m3
instruction pattern: Standard Namesudivmod
m4
instruction pattern: Standard Namesudot_prod
m instruction pattern: Standard NamesUDQmode
: Machine ModesUHAmode
: Machine ModesUHQmode
: Machine ModesUINT16_TYPE
: Type LayoutUINT32_TYPE
: Type LayoutUINT64_TYPE
: Type LayoutUINT8_TYPE
: Type LayoutUINT_FAST16_TYPE
: Type LayoutUINT_FAST32_TYPE
: Type LayoutUINT_FAST64_TYPE
: Type LayoutUINT_FAST8_TYPE
: Type LayoutUINT_LEAST16_TYPE
: Type LayoutUINT_LEAST32_TYPE
: Type LayoutUINT_LEAST64_TYPE
: Type LayoutUINT_LEAST8_TYPE
: Type LayoutUINTMAX_TYPE
: Type LayoutUINTPTR_TYPE
: Type Layoutumadd
mn4
instruction pattern: Standard Namesumax
: Arithmeticumax
m3
instruction pattern: Standard Namesumin
: Arithmeticumin
m3
instruction pattern: Standard Namesumod
: Arithmeticumod
m3
instruction pattern: Standard Namesumsub
mn4
instruction pattern: Standard Namesumulhisi3
instruction pattern: Standard Namesumul
m3_highpart
instruction pattern: Standard Namesumulqihi3
instruction pattern: Standard Namesumulsidi3
instruction pattern: Standard Namesumulv
m4
instruction pattern: Standard Namesunchanging
: Flagsunchanging
, in call_insn
: Flagsunchanging
, in jump_insn
, call_insn
and insn
: Flagsunchanging
, in mem
: Flagsunchanging
, in subreg
: Flagsunchanging
, in symbol_ref
: FlagsUNEQ_EXPR
: Unary and Binary ExpressionsUNGE_EXPR
: Unary and Binary ExpressionsUNGT_EXPR
: Unary and Binary ExpressionsUNION_TYPE
: ClassesUNION_TYPE
: TypesUNITS_PER_WORD
: Storage LayoutUNKNOWN_TYPE
: Types for C++UNKNOWN_TYPE
: TypesUNLE_EXPR
: Unary and Binary ExpressionsUNLIKELY_EXECUTED_TEXT_SECTION_NAME
: SectionsUNLT_EXPR
: Unary and Binary ExpressionsUNORDERED_EXPR
: Unary and Binary Expressionsunshare_all_rtl
: Sharingunsigned_fix
: Conversionsunsigned_float
: Conversionsunsigned_fract_convert
: Conversionsunsigned_sat_fract
: Conversionsunspec
: Constant Definitionsunspec
: Side Effectsunspec_volatile
: Constant Definitionsunspec_volatile
: Side Effectsuntyped_call
instruction pattern: Standard Namesuntyped_return
instruction pattern: Standard NamesUPDATE_PATH_HOST_CANONICALIZE (
path)
: Filesystemupdate_ssa
: SSAupdate_stmt
: SSA Operandsupdate_stmt
: Manipulating GIMPLE statementsupdate_stmt_if_modified
: Manipulating GIMPLE statementsUQQmode
: Machine Modesus_ashift
: Arithmeticus_minus
: Arithmeticus_mult
: Arithmeticus_neg
: Arithmeticus_plus
: Arithmeticus_truncate
: Conversionsusadd
m3
instruction pattern: Standard Namesusad
m instruction pattern: Standard NamesUSAmode
: Machine Modesusashl
m3
instruction pattern: Standard Namesusdiv
m3
instruction pattern: Standard Namesuse
: Side EffectsUSE_C_ALLOCA
: Host MiscUSE_LD_AS_NEEDED
: DriverUSE_LOAD_POST_DECREMENT
: CostsUSE_LOAD_POST_INCREMENT
: CostsUSE_LOAD_PRE_DECREMENT
: CostsUSE_LOAD_PRE_INCREMENT
: CostsUSE_SELECT_SECTION_FOR_FUNCTIONS
: SectionsUSE_STORE_POST_DECREMENT
: CostsUSE_STORE_POST_INCREMENT
: CostsUSE_STORE_PRE_DECREMENT
: CostsUSE_STORE_PRE_INCREMENT
: Costsused
: Flagsused
, in symbol_ref
: Flagsuser
: GTY OptionsUSER_LABEL_PREFIX
: Instruction OutputUSING_STMT
: Statements for C++usmadd
mn4
instruction pattern: Standard Namesusmsub
mn4
instruction pattern: Standard Namesusmulhisi3
instruction pattern: Standard Namesusmul
m3
instruction pattern: Standard Namesusmulqihi3
instruction pattern: Standard Namesusmulsidi3
instruction pattern: Standard Namesusneg
m2
instruction pattern: Standard NamesUSQmode
: Machine Modesussub
m3
instruction pattern: Standard Namesusubv
m4
instruction pattern: Standard NamesUTAmode
: Machine ModesUTQmode
: Machine ModesVA_ARG_EXPR
: Unary and Binary ExpressionsVAR_DECL
: Declarationsvar_location
: Debug Informationvashl
m3
instruction pattern: Standard Namesvashr
m3
instruction pattern: Standard Namesvcond_mask_
mn instruction pattern: Standard Namesvcond
mn instruction pattern: Standard Namesvcondu
mn instruction pattern: Standard Namesvec_cmp
mn instruction pattern: Standard Namesvec_cmpu
mn instruction pattern: Standard Namesvec_concat
: Vector Operationsvec_duplicate
: Vector Operationsvec_extract
m instruction pattern: Standard Namesvec_init
m instruction pattern: Standard Namesvec_load_lanes
mn instruction pattern: Standard NamesVEC_LSHIFT_EXPR
: Vectorsvec_merge
: Vector OperationsVEC_PACK_FIX_TRUNC_EXPR
: VectorsVEC_PACK_SAT_EXPR
: Vectorsvec_pack_sfix_trunc_
m instruction pattern: Standard Namesvec_pack_ssat_
m instruction pattern: Standard NamesVEC_PACK_TRUNC_EXPR
: Vectorsvec_pack_trunc_
m instruction pattern: Standard Namesvec_pack_ufix_trunc_
m instruction pattern: Standard Namesvec_pack_usat_
m instruction pattern: Standard Namesvec_perm_const
m instruction pattern: Standard Namesvec_perm
m instruction pattern: Standard NamesVEC_RSHIFT_EXPR
: Vectorsvec_select
: Vector Operationsvec_set
m instruction pattern: Standard Namesvec_shr_
m instruction pattern: Standard Namesvec_store_lanes
mn instruction pattern: Standard NamesVEC_UNPACK_FLOAT_HI_EXPR
: VectorsVEC_UNPACK_FLOAT_LO_EXPR
: VectorsVEC_UNPACK_HI_EXPR
: VectorsVEC_UNPACK_LO_EXPR
: Vectorsvec_unpacks_float_hi_
m instruction pattern: Standard Namesvec_unpacks_float_lo_
m instruction pattern: Standard Namesvec_unpacks_hi_
m instruction pattern: Standard Namesvec_unpacks_lo_
m instruction pattern: Standard Namesvec_unpacku_float_hi_
m instruction pattern: Standard Namesvec_unpacku_float_lo_
m instruction pattern: Standard Namesvec_unpacku_hi_
m instruction pattern: Standard Namesvec_unpacku_lo_
m instruction pattern: Standard NamesVEC_WIDEN_MULT_HI_EXPR
: VectorsVEC_WIDEN_MULT_LO_EXPR
: Vectorsvec_widen_smult_even_
m instruction pattern: Standard Namesvec_widen_smult_hi_
m instruction pattern: Standard Namesvec_widen_smult_lo_
m instruction pattern: Standard Namesvec_widen_smult_odd_
m instruction pattern: Standard Namesvec_widen_sshiftl_hi_
m instruction pattern: Standard Namesvec_widen_sshiftl_lo_
m instruction pattern: Standard Namesvec_widen_umult_even_
m instruction pattern: Standard Namesvec_widen_umult_hi_
m instruction pattern: Standard Namesvec_widen_umult_lo_
m instruction pattern: Standard Namesvec_widen_umult_odd_
m instruction pattern: Standard Namesvec_widen_ushiftl_hi_
m instruction pattern: Standard Namesvec_widen_ushiftl_lo_
m instruction pattern: Standard NamesVECTOR_CST
: Constant expressionsVECTOR_STORE_FLAG_VALUE
: Miscverify_flow_info
: Maintaining the CFGVIRTUAL_INCOMING_ARGS_REGNUM
: Regs and MemoryVIRTUAL_OUTGOING_ARGS_REGNUM
: Regs and MemoryVIRTUAL_STACK_DYNAMIC_REGNUM
: Regs and MemoryVIRTUAL_STACK_VARS_REGNUM
: Regs and Memoryvlshr
m3
instruction pattern: Standard NamesVMS
: FilesystemVMS_DEBUGGING_INFO
: VMS Debugvoid
: MiscVOID_TYPE
: TypesVOIDmode
: Machine Modesvolatil
: Flagsvolatil
, in insn
, call_insn
, jump_insn
, code_label
, jump_table_data
, barrier
, and note
: Flagsvolatil
, in label_ref
and reg_label
: Flagsvolatil
, in mem
, asm_operands
, and asm_input
: Flagsvolatil
, in reg
: Flagsvolatil
, in subreg
: Flagsvolatil
, in symbol_ref
: Flagsvolatile
, in prefetch
: Flagsvrotl
m3
instruction pattern: Standard Namesvrotr
m3
instruction pattern: Standard Nameswalk_dominator_tree
: SSAwalk_gimple_op
: Statement and operand traversalswalk_gimple_seq
: Statement and operand traversalswalk_gimple_stmt
: Statement and operand traversalsWCHAR_TYPE
: Type LayoutWCHAR_TYPE_SIZE
: Type Layoutwhich_alternative
: Output StatementWHILE_BODY
: Statements for C++WHILE_COND
: Statements for C++WHILE_STMT
: Statements for C++widen_ssum
m3 instruction pattern: Standard Nameswiden_usum
m3 instruction pattern: Standard NamesWIDEST_HARDWARE_FP_SIZE
: Type Layoutwindow_save
instruction pattern: Standard NamesWINT_TYPE
: Type Layoutword_mode
: Machine ModesWORD_REGISTER_OPERATIONS
: MiscWORDS_BIG_ENDIAN
: Storage LayoutWORDS_BIG_ENDIAN
, effect on subreg
: Regs and MemoryXCmode
: Machine ModesXCOFF_DEBUGGING_INFO
: DBX OptionsXEXP
: AccessorsXFmode
: Machine ModesXImode
: Machine ModesXINT
: Accessorsxor
: Arithmeticxor
, canonicalization of: Insn Canonicalizationsxor
m3
instruction pattern: Standard NamesXSTR
: AccessorsXVEC
: AccessorsXVECEXP
: AccessorsXVECLEN
: AccessorsXWINT
: Accessorszero_extend
: Conversionszero_extend
mn2
instruction pattern: Standard Nameszero_extract
: Bit-Fieldszero_extract
, canonicalization of: Insn Canonicalizations[1] Except if the compiler was buggy and miscompiled some of the files that were not modified. In this case, it's best to use make restrap.
[2] Customarily, the system compiler is also termed the stage0 GCC.
[3] These restrictions are derived from those in Morgan 4.8.
[4] note
insns can separate them, though.
[5] However, the size of the automaton depends on processor complexity. To limit this effect, machine descriptions can split orthogonal parts of the machine description among several automata: but then, since each of these must be stepped independently, this does cause a small decrease in the algorithm's performance.
[6] Classes lacking such a marker will not be identified as being part of the hierarchy, and so the marking routines will not handle them, leading to a assertion failure within the marking routines due to an unknown tag value (assuming that assertions are enabled).