Gccint
Gccint
Short Contents
1 Contributing to GCC Development . . . . . . . . . . . . . . . . . . . . . . . 1
2 GCC and Portability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 Interfacing to GCC Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4 The GCC low-level runtime library . . . . . . . . . . . . . . . . . . . . . . . 7
5 Language Front Ends in GCC . . . . . . . . . . . . . . . . . . . . . . . . . . 61
6 Source Tree Structure and Build System . . . . . . . . . . . . . . . . . . 63
7 Testsuites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
8 Option specification files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
9 Passes and Files of the Compiler . . . . . . . . . . . . . . . . . . . . . . . 137
10 Sizes and offsets as runtime invariants . . . . . . . . . . . . . . . . . . . 157
11 GENERIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
12 GIMPLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
13 Analysis and Optimization of GIMPLE tuples . . . . . . . . . . . . 259
14 RTL Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
15 Control Flow Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
16 Analysis and Representation of Loops . . . . . . . . . . . . . . . . . . . 347
17 Machine Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
18 Target Description Macros and Functions . . . . . . . . . . . . . . . . 505
19 Host Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
20 Makefile Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
21 collect2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
22 Standard Header File Directories . . . . . . . . . . . . . . . . . . . . . . . 701
23 Memory Management and Type Information . . . . . . . . . . . . . . 703
24 Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
25 Link Time Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
26 Match and Simplify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
27 Static Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
28 User Experience Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Funding Free Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
The GNU Project and GNU/Linux . . . . . . . . . . . . . . . . . . . . . . . . . 755
GNU General Public License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
GNU Free Documentation License . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Contributors to GCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
ii
Table of Contents
7 Testsuites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
7.1 Idioms Used in Testsuite Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
7.2 Directives used within DejaGnu tests . . . . . . . . . . . . . . . . . . . . . . . . . . 82
7.2.1 Syntax and Descriptions of test directives . . . . . . . . . . . . . . . . . 82
7.2.1.1 Specify how to build the test . . . . . . . . . . . . . . . . . . . . . . . . . 82
7.2.1.2 Specify additional compiler options . . . . . . . . . . . . . . . . . . . 83
7.2.1.3 Modify the test timeout value . . . . . . . . . . . . . . . . . . . . . . . . 83
7.2.1.4 Skip a test for some targets . . . . . . . . . . . . . . . . . . . . . . . . . . 83
7.2.1.5 Expect a test to fail for some targets . . . . . . . . . . . . . . . . . 84
7.2.1.6 Expect the compiler to crash . . . . . . . . . . . . . . . . . . . . . . . . . 84
7.2.1.7 Expect the test executable to fail . . . . . . . . . . . . . . . . . . . . 84
7.2.1.8 Verify compiler messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
7.2.1.9 Verify output of the test executable . . . . . . . . . . . . . . . . . . 86
7.2.1.10 Specify environment variables for a test . . . . . . . . . . . . . 86
7.2.1.11 Specify additional files for a test . . . . . . . . . . . . . . . . . . . . 86
7.2.1.12 Add checks at the end of a test . . . . . . . . . . . . . . . . . . . . . 86
7.2.2 Selecting targets to which a test applies . . . . . . . . . . . . . . . . . . . 86
7.2.3 Keywords describing target attributes . . . . . . . . . . . . . . . . . . . . . 88
7.2.3.1 Endianness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
7.2.3.2 Data type sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
7.2.3.3 Fortran-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
7.2.3.4 Vector-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
7.2.3.5 Thread Local Storage attributes. . . . . . . . . . . . . . . . . . . . . . 95
7.2.3.6 Decimal floating point attributes . . . . . . . . . . . . . . . . . . . . . 95
7.2.3.7 ARM-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
7.2.3.8 AArch64-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . 101
7.2.3.9 MIPS-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
7.2.3.10 MSP430-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . 102
7.2.3.11 PowerPC-specific attributes . . . . . . . . . . . . . . . . . . . . . . . . 102
7.2.3.12 RISC-V specific attributes . . . . . . . . . . . . . . . . . . . . . . . . . 104
7.2.3.13 Other hardware attributes . . . . . . . . . . . . . . . . . . . . . . . . . 104
7.2.3.14 Environment attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
v
11 GENERIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
11.1 Deficiencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
11.2 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
11.2.1 Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
11.2.2 Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
11.2.3 Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
11.3 Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
11.4 Declarations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
11.4.1 Working with declarations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
11.4.2 Internal structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
11.4.2.1 Current structure hierarchy . . . . . . . . . . . . . . . . . . . . . . . . 180
11.4.2.2 Adding new DECL node types . . . . . . . . . . . . . . . . . . . . . 181
11.5 Attributes in trees. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
11.6 Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
11.6.1 Constant expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
11.6.2 References to storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
11.6.3 Unary and Binary Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . 187
11.6.4 Vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
11.7 Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
11.7.1 Basic Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
11.7.2 Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
11.7.3 Statement Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.7.4 Empty Statements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.7.5 Jumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
vii
12 GIMPLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
12.1 Tuple representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
12.1.1 gimple (gsbase) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
12.1.2 gimple_statement_with_ops . . . . . . . . . . . . . . . . . . . . . . . . . . 223
12.1.3 gimple_statement_with_memory_ops . . . . . . . . . . . . . . . . . . 223
12.2 Class hierarchy of GIMPLE statements . . . . . . . . . . . . . . . . . . . . . . 224
12.3 GIMPLE instruction set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
12.4 Exception Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
12.5 Temporaries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
12.6 Operands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
12.6.1 Compound Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.6.2 Compound Lvalues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.6.3 Conditional Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.6.4 Logical Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.6.5 Manipulating operands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.6.6 Operand vector allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
12.6.7 Operand validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.6.8 Statement validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.7 Manipulating GIMPLE statements . . . . . . . . . . . . . . . . . . . . . . . . . . 232
12.7.1 Common accessors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
12.8 Tuple specific accessors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
12.8.1 GIMPLE_ASM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
12.8.2 GIMPLE_ASSIGN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
12.8.3 GIMPLE_BIND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
12.8.4 GIMPLE_CALL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
12.8.5 GIMPLE_CATCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
12.8.6 GIMPLE_COND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
12.8.7 GIMPLE_DEBUG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
12.8.8 GIMPLE_EH_FILTER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
12.8.9 GIMPLE_LABEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
12.8.10 GIMPLE_GOTO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
viii
21 collect2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
24 Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
24.1 Loading Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
24.2 Plugin API. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
24.2.1 Plugin license check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
24.2.2 Plugin initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
24.2.3 Plugin callbacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
24.3 Interacting with the pass manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
24.4 Interacting with the GCC Garbage Collector. . . . . . . . . . . . . . . . . 717
24.5 Giving information about a plugin . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
24.6 Registering custom attributes or pragmas . . . . . . . . . . . . . . . . . . . . 718
24.7 Recording information about pass execution . . . . . . . . . . . . . . . . . 718
24.8 Controlling which passes are being run . . . . . . . . . . . . . . . . . . . . . . 719
24.9 Keeping track of available passes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
24.10 Building GCC plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
There is also a complete group of higher level functions which correspond directly to
comparison operators. They implement the ISO C semantics for floating-point comparisons,
taking NaN into account. Pay careful attention to the return values defined for each set.
Under the hood, all of these routines are implemented as
if (__unordXf2 (a, b))
return E;
return __cmpXf2 (a, b);
where E is a constant chosen to give the proper behavior for NaN. Thus, the meaning
of the return value is different for each set. Do not rely on this implementation; only the
semantics documented below are guaranteed.
There is also a complete group of higher level functions which correspond directly to
comparison operators. They implement the ISO C semantics for floating-point comparisons,
taking NaN into account. Pay careful attention to the return values defined for each set.
Under the hood, all of these routines are implemented as
if (__bid_unordXd2 (a, b))
return E;
return __bid_cmpXd2 (a, b);
where E is a constant chosen to give the proper behavior for NaN. Thus, the meaning
of the return value is different for each set. Do not rely on this implementation; only the
semantics documented below are guaranteed.
For ease of comprehension fract is an alias for the _Fract type, accum an alias for
_Accum, and sat an alias for _Sat.
For illustrative purposes, in this section the fixed-point fractional type short fract is as-
sumed to correspond to machine mode QQmode; unsigned short fract to UQQmode; fract
to HQmode; unsigned fract to UHQmode; long fract to SQmode; unsigned long fract
to USQmode; long long fract to DQmode; and unsigned long long fract to UDQmode.
Similarly the fixed-point accumulator type short accum corresponds to HAmode;
unsigned short accum to UHAmode; accum to SAmode; unsigned accum to USAmode;
long accum to DAmode; unsigned long accum to UDAmode; long long accum to TAmode;
and unsigned long long accum to UTAmode.
long long accum __ssdivta3 (long long accum a, long [Runtime Function]
long accum b)
These functions return the quotient of the signed division of a and b with signed
saturation.
__register_frame_info
__register_frame_info_bases
__register_frame_info_table
__register_frame_info_table_bases
__register_frame_table
__morestack_segments [Variable]
__morestack_current_segment [Variable]
__morestack_initial_sp [Variable]
Internal variables used by the -fsplit-stack implementation.
61
c++tools Contains the sources for the g++-mapper-server, a tool used with C++ modules.
config Autoconf macros and Makefile fragments used throughout the tree.
contrib Contributed scripts that may be found useful in conjunction with GCC. One
of these, contrib/texi2pod.pl, is used to generate man pages from Texinfo
manuals as part of the GCC build process.
fixincludes
The support for fixing system headers to work with GCC. See
fixincludes/README for more information. The headers fixed by this mecha-
nism are installed in libsubdir/include-fixed. Along with those headers,
README-fixinc is also installed, as libsubdir/include-fixed/README.
gcc The main sources of GCC itself (except for runtime libraries), including op-
timizers, support for different target architectures, language front ends, and
testsuites. See Section 6.3 [The gcc Subdirectory], page 65, for details.
gnattools
Support tools for GNAT.
gotools Support tools for Go.
include Headers for the libiberty library.
intl GNU libintl, from GNU gettext, for systems which do not include it in
libc.
libada The Ada runtime library.
libatomic
The runtime support library for atomic operations (e.g. for __sync and __
atomic).
libbacktrace
A library that allows GCC to produce backtraces when it crashes.
libcc1 A library that allows GDB to make use of the compiler.
libcody A compiler dynamism library to allow communication between compilers and
build systems, for purposes such as C++ modules.
libcpp The C preprocessor library.
libdecnumber
The Decimal Float support library.
libffi The libffi library, used as part of the Go runtime library.
libgcc The GCC runtime library.
libgfortran
The Fortran runtime library.
libgm2 The Modula-2 runtime library.
libgo The Go runtime library. The bulk of this library is mirrored from the master
Go repository (https://github.com/golang/go).
Chapter 6: Source Tree Structure and Build System 65
Objective-C++), and lto (for LTO) are documented in this manual (see Chap-
ter 9 [Passes and Files of the Compiler], page 137); those for other languages
are not. See Section 6.3.8 [Anatomy of a Language Front End], page 73, for
details of the files in these directories.
common Source files shared between the compiler drivers (such as gcc) and the compilers
proper (such as cc1). If an architecture defines target hooks shared between
those places, it also has a subdirectory in common/config. See Section 18.1
[Target Structure], page 505.
config Configuration files for supported architectures and operating systems. See Sec-
tion 6.3.9 [Anatomy of a Target Back End], page 77, for details of the files in
this directory.
doc Texinfo documentation for GCC, together with automatically generated man
pages and support for converting the installation manual to HTML. See Sec-
tion 6.3.7 [Documentation], page 71.
ginclude System headers installed by GCC, mainly those required by the C standard of
freestanding implementations. See Section 6.3.6 [Headers Installed by GCC],
page 71, for details of when these and other headers are installed.
po Message catalogs with translations of messages produced by GCC into various
languages, language.po. This directory also contains gcc.pot, the template
for these message catalogues, exgettext, a wrapper around gettext to extract
the messages from the GCC sources and create gcc.pot, which is run by ‘make
gcc.pot’, and EXCLUDES, a list of files from which messages should not be
extracted.
testsuite
The GCC testsuites (except for those for runtime libraries). See Chapter 7
[Testsuites], page 81.
• Each language subdirectory has a file language/config-lang.in that is used for front-
end-specific configuration. See Section 6.3.8.2 [The Front End config-lang.in File],
page 75, for details of this file.
• A helper script configure.frag is used as part of creating the output of configure.
• tm_p.h, which includes the header machine-protos.h that contains prototypes for
functions in the target machine.c file. The machine-protos.h header is included
after the rtl.h and/or tree.h would have been included. The tm_p.h also includes
the header tm-preds.h which is generated by genpreds program during the build to
define the declarations and inline functions for the predicate functions.
check Run the testsuite. This creates a testsuite subdirectory that has various
.sum and .log files containing the results of the testing. You can run subsets
with, for example, ‘make check-gcc’. You can specify specific tests by setting
RUNTESTFLAGS to be the name of the .exp file, optionally followed by (for some
tests) an equals and a file wildcard, like:
make check-gcc RUNTESTFLAGS="execute.exp=19980413-*"
Note that running the testsuite may require additional tools be installed, such
as Tcl or DejaGnu.
The toplevel tree from which you start GCC compilation is not the GCC directory,
but rather a complex Makefile that coordinates the various steps of the build, including
bootstrapping the compiler and using the new compiler to build target libraries.
When GCC is configured for a native configuration, the default action for make is to
do a full three-stage bootstrap. This means that GCC is built three times—once with the
native compiler, once with the native-built compiler it just built, and once with the compiler
it built the second time. In theory, the last two should produce the same results, which
‘make compare’ can check. Each stage is configured separately and compiled into a separate
directory, to minimize problems due to ABI incompatibilities between the native compiler
and GCC.
If you do a change, rebuilding will also start from the first stage and “bubble” up the
change through the three stages. Each stage is taken from its build directory (if it had
been built previously), rebuilt, and copied to its subdirectory. This will allow you to, for
example, continue a bootstrap after fixing a bug which causes the stage2 build to crash.
It does not provide as good coverage of the compiler as bootstrapping from scratch, but it
ensures that the new code is syntactically correct (e.g., that you did not use GCC extensions
by mistake), and avoids spurious bootstrap comparison failures1 .
Other targets available from the top level include:
bootstrap-lean
Like bootstrap, except that the various stages are removed once they’re no
longer needed. This saves disk space.
bootstrap2
bootstrap2-lean
Performs only the first two stages of bootstrap. Unlike a three-stage bootstrap,
this does not perform a comparison to test that the compiler is running prop-
erly. Note that the disk space required by a “lean” bootstrap is approximately
independent of the number of stages.
stageN-bubble (N = 1...4, profile, feedback)
Rebuild all the stages up to N, with the appropriate flags, “bubbling” the
changes as described above.
all-stageN (N = 1...4, profile, feedback)
Assuming that stage N has already been built, rebuild it with the appropriate
flags. This is rarely needed.
1
Except if the compiler was buggy and miscompiled some of the files that were not modified. In this case,
it’s best to use make restrap.
70 GNU Compiler Collection (GCC) Internals
cleanstrap
Remove everything (‘make clean’) and rebuilds (‘make bootstrap’).
compare Compares the results of stages 2 and 3. This ensures that the compiler is
running properly, since it should produce the same object files regardless of
how it itself was compiled.
distclean-stageN (N = 1...4, profile, feedback)
Wipe stage N and all the following ones.
For example, ‘make distclean-stage3’ wipes stage 3 and all the following ones,
so that another make then rebuilds them from scratch. This can be useful if
you’re doing changes where “bubbling” the changes as described above is not
sufficient, but a full make restrap isn’t necessary either.
profiledbootstrap
Builds a compiler with profiling feedback information. In this case, the second
and third stages are named ‘profile’ and ‘feedback’, respectively. For more
information, see the installation instructions.
restrap Restart a bootstrap, so that everything that was not built with the system
compiler is rebuilt.
stageN-start (N = 1...4, profile, feedback)
For each package that is bootstrapped, rename directories so that, for example,
gcc points to the stageN GCC, compiled with the stageN-1 GCC2 .
You will invoke this target if you need to test or debug the stageN GCC. If
you only need to execute GCC (but you need not run ‘make’ either to rebuild
it or to run test suites), you should be able to work directly in the stageN-gcc
directory. This makes it easier to debug multiple stages in parallel.
stage For each package that is bootstrapped, relocate its build directory to indicate
its stage. For example, if the gcc directory points to the stage2 GCC, after
invoking this target it will be renamed to stage2-gcc.
If you wish to use non-default GCC flags when compiling the stage2 and stage3 compilers,
set BOOT_CFLAGS on the command line when doing ‘make’.
Usually, the first stage only builds the languages that the compiler is written in: typically,
C and maybe Ada. If you are debugging a miscompilation of a different stage2 front-end (for
example, of the Fortran front-end), you may want to have front-ends for other languages in
the first stage as well. To do so, set STAGE1_LANGUAGES on the command line when doing
‘make’.
For example, in the aforementioned scenario of debugging a Fortran front-end miscompi-
lation caused by the stage1 compiler, you may need a command like
make stage2-bubble STAGE1_LANGUAGES=c,fortran
Alternatively, you can use per-language targets to build and test languages that are not
enabled by default in stage1. For example, make f951 will build a Fortran compiler even in
the stage1 build directory.
2
Customarily, the system compiler is also termed the stage0 GCC.
Chapter 6: Source Tree Structure and Build System 71
6.3.5 Library Source Files and Headers under the gcc Directory
FIXME: list here, with explanation, all the C source files and headers under the gcc direc-
tory that aren’t built into the GCC executable but rather are part of runtime libraries and
object files, such as crtstuff.c and unwind-dw2.c. See Section 6.3.6 [Headers Installed
by GCC], page 71, for more information about the ginclude directory.
be necessary to add support for more Texinfo features to this script when generating new
man pages. To improve the man page output, some special Texinfo macros are provided in
doc/include/gcc-common.texi which texi2pod.pl understands:
@gcctabopt
Use in the form ‘@table @gcctabopt’ for tables of options, where for printed
output the effect of ‘@code’ is better than that of ‘@option’ but for man page
output a different effect is wanted.
@gccoptlist
Use for summary lists of options in manuals.
FIXME: describe the texi2pod.pl input language and magic comments in more detail.
build_by_default
If defined to ‘no’, this language front end is not built unless enabled in a
--enable-languages argument. Otherwise, front ends are built by default,
subject to any special logic in configure.ac (as is present to disable the Ada
front end if the Ada compiler is not already installed).
boot_language
If defined to ‘yes’, this front end is built in stage1 of the bootstrap. This is
only relevant to front ends written in their own languages.
compilers
If defined, a space-separated list of compiler executables that will be run by the
driver. The names here will each end with ‘\$(exeext)’.
outputs If defined, a space-separated list of files that should be generated by configure
substituting values in them. This mechanism can be used to create a file
language/Makefile from language/Makefile.in, but this is deprecated,
building everything from the single gcc/Makefile is preferred.
gtfiles If defined, a space-separated list of files that should be scanned by gengtype.cc
to generate the garbage collection tables and routines for this language. This
excludes the files that are common to all front ends. See Chapter 23 [Type
Information], page 703.
man Build generated man pages for the front end from Texinfo manuals (see Sec-
tion 6.3.7.2 [Man Page Generation], page 72), in the build directory. This target
is only called if the necessary tools are available, but should ignore errors so
as not to stop the build if errors occur; man pages are optional and the tools
involved may be installed in a broken way.
install-common
Install everything that is part of the front end, apart from the compiler exe-
cutables listed in compilers in config-lang.in.
install-info
Install info documentation for the front end, if it is present in the source direc-
tory. This target should have dependencies on info files that should be installed.
install-man
Install man pages for the front end. This target should ignore errors.
install-plugin
Install headers needed for plugins.
srcextra Copies its dependencies into the source directory. This generally should be used
for generated files such as Bison output files which are not version-controlled,
but should be included in any release tarballs. This target will be executed
during a bootstrap if ‘--enable-generated-files-in-srcdir’ was specified
as a configure option.
srcinfo
srcman Copies its dependencies into the source directory. These targets will be executed
during a bootstrap if ‘--enable-generated-files-in-srcdir’ was specified
as a configure option.
uninstall
Uninstall files installed by installing the compiler. This is currently documented
not to be supported, so the hook need not do anything.
mostlyclean
clean
distclean
maintainer-clean
The language parts of the standard GNU ‘*clean’ targets. See Section “Stan-
dard Targets for Users” in GNU Coding Standards, for details of the standard
targets. For GCC, maintainer-clean should delete all generated files in the
source directory that are not version-controlled, but should not delete anything
that is.
Make-lang.in must also define a variable lang_OBJS to a list of host object files that are
used by that language.
rather than machine-protos.h. Any definitions required for building libgcc must also go
in machine.h.
GCC uses the macro IN_TARGET_CODE to distinguish between machine-specific .c and
.cc files and machine-independent .c and .cc files. Machine-specific files should use the
directive:
#define IN_TARGET_CODE 1
before including config.h.
If the back end is added to the official GCC source repository, the following are also
necessary:
• An entry for the target architecture in readings.html on the GCC web site, with any
relevant links.
• Details of the properties of the back end and target architecture in backends.html on
the GCC web site.
• A news item about the contribution of support for that target architecture, in
index.html on the GCC web site.
• Normally, one or more maintainers of that target listed in MAINTAINERS. Some existing
architectures may be unmaintained, but it would be unusual to add support for a target
that does not have a maintainer when support is added.
• Target triplets covering all config.gcc stanzas for the target, in the list in
contrib/config-list.mk.
81
7 Testsuites
GCC contains several testsuites to help maintain compiler quality. Most of the runtime
libraries and language front ends in GCC have testsuites. Currently only the C language
testsuites are documented here; FIXME: document the others.
It may be necessary to check that an expression is an integer constant expression and has
a certain value. To check that E has value V, an idiom similar to the following is used:
char x[((E) == (V) ? 1 : -1)];
In gcc.dg tests, __typeof__ is sometimes used to make assertions about the types of
expressions. See, for example, gcc.dg/c99-condexpr-1.c. The more subtle uses depend on
the exact rules for the types of conditional expressions in the C standard; see, for example,
gcc.dg/c99-intconst-1.c.
It is useful to be able to test that optimizations are being made properly. This cannot
be done in all cases, but it can be done where the optimization will lead to code being
optimized away (for example, where flow analysis or alias analysis should show that certain
code cannot be called) or to functions not being called because they have been expanded
as built-in functions. Such tests go in gcc.c-torture/execute. Where code should be
optimized away, a call to a nonexistent function such as link_failure () may be inserted;
a definition
#ifndef __OPTIMIZE__
void
link_failure (void)
{
abort ();
}
#endif
82 GNU Compiler Collection (GCC) Internals
will also be needed so that linking still succeeds when the test is run without optimization.
When all calls to a built-in function should have been optimized and no calls to the non-
built-in version of the function should remain, that function may be defined as static to
call abort () (although redeclaring a function as static may not work on all targets).
All testcases must be portable. Target-specific testcases must have appropriate code to
avoid causing failures on unsupported systems; unfortunately, the mechanisms for this differ
by directory.
FIXME: discuss non-C testsuites here.
{ dg-require-support args }
Skip the test if the target does not provide the required support. These di-
rectives must appear after any dg-do directive in the test and before any dg-
additional-sources directive. They require at least one argument, which can
be an empty string if the specific procedure does not examine the argument. See
Section 7.2.5 [Require Support], page 113, for a complete list of these directives.
‘dg-note’ or ‘dg-bogus’. For this directive ‘xfail’ has the same effect as
‘target’.
{ dg-prune-output regexp }
Prune messages matching regexp from the test output.
• a logical expression
Depending on the context, the selector specifies whether a test is skipped and reported
as unsupported or is expected to fail. A context that allows either ‘target’ or ‘xfail’
also allows ‘{ target selector1 xfail selector2 }’ to skip the test for targets that don’t
match selector1 and the test to fail for targets that match selector2.
A selector expression appears within curly braces and uses a single logical operator: one
of ‘!’, ‘&&’, or ‘||’. An operand is one of the following:
• another selector expression, in curly braces
• an effective-target keyword, such as lp64
• a single target triplet
• a list of target triplets within quotes or curly braces
• one of the following:
‘{ any-opts opt1 ... optn }’
Each of opt1 to optn is a space-separated list of option globs. The selector
expression evaluates to true if, for one of these strings, every glob in the
string matches an option that was passed to the compiler. For example:
{ any-opts "-O3 -flto" "-O[2g]" }
is true if any of the following are true:
• -O2 was passed to the compiler
• -Og was passed to the compiler
• both -O3 and -flto were passed to the compiler
This kind of selector can only be used within dg-final directives. Use
dg-skip-if, dg-xfail-if or dg-xfail-run-if to skip whole tests based
on options, or to mark them as expected to fail with certain options.
‘{ no-opts opt1 ... optn }’
As for any-opts above, each of opt1 to optn is a space-separated list of
option globs. The selector expression evaluates to true if, for all of these
strings, there is at least one glob that does not match an option that was
passed to the compiler. It is shorthand for:
{ ! { any-opts opt1 ... optn } }
For example:
{ no-opts "-O3 -flto" "-O[2g]" }
is true if all of the following are true:
• -O2 was not passed to the compiler
• -Og was not passed to the compiler
• at least one of -O3 or -flto was not passed to the compiler
Like any-opts, this kind of selector can only be used within dg-final
directives.
Here are some examples of full target selectors:
{ target { ! "hppa*-*-* ia64*-*-*" } }
{ target { powerpc*-*-* && lp64 } }
{ xfail { lp64 || vect_no_align } }
{ xfail { aarch64*-*-* && { any-opts "-O2" } } }
88 GNU Compiler Collection (GCC) Internals
7.2.3.1 Endianness
be Target uses big-endian memory order for multi-byte and multi-word data.
le Target uses little-endian memory order for multi-byte and multi-word data.
large_double
Target supports double that is longer than float.
large_long_double
Target supports long double that is longer than double.
ptr32plus
Target has pointers that are 32 bits or longer.
size20plus
Target has a 20-bit or larger address space, so supports at least 16-bit array
and structure sizes.
size24plus
Target has a 24-bit or larger address space, so supports at least 20-bit array
and structure sizes.
size32plus
Target has a 32-bit or larger address space, so supports at least 24-bit array
and structure sizes.
4byte_wchar_t
Target has wchar_t that is at least 4 bytes.
floatn Target has the _Floatn type.
floatnx Target has the _Floatnx type.
floatn_runtime
Target has the _Floatn type, including runtime support for any options added
with dg-add-options.
floatnx_runtime
Target has the _Floatnx type, including runtime support for any options added
with dg-add-options.
floatn_nx_runtime
Target has runtime support for any options added with dg-add-options for
any _Floatn or _Floatnx type.
inf Target supports floating point infinite (inf) for type double.
inff Target supports floating point infinite (inf) for type float.
fortran_large_real
Target supports Fortran real kinds larger than real(8).
vect_fully_masked
Target supports fully-masked (also known as fully-predicated) loops, so that
vector loops can handle partial as well as full vectors.
vect_masked_load
Target supports vector masked loads.
vect_masked_store
Target supports vector masked stores.
vect_gather_load_ifn
Target supports vector gather loads using internal functions (rather than via
built-in functions or emulation).
vect_scatter_store
Target supports vector scatter stores.
vect_aligned_arrays
Target aligns arrays to vector alignment boundary.
vect_hw_misalign
Target supports a vector misalign access.
vect_no_align
Target does not support a vector alignment mechanism.
vect_peeling_profitable
Target might require to peel loops for alignment purposes.
vect_no_int_min_max
Target does not support a vector min and max instruction on int.
vect_no_int_add
Target does not support a vector add instruction on int.
vect_no_bitwise
Target does not support vector bitwise instructions.
vect_bool_cmp
Target supports comparison of bool vectors for at least one vector length.
vect_char_add
Target supports addition of char vectors for at least one vector length.
vect_char_mult
Target supports vector char multiplication.
vect_short_mult
Target supports vector short multiplication.
vect_int_mult
Target supports vector int multiplication.
vect_long_mult
Target supports 64 bit vector long multiplication.
vect_extract_even_odd
Target supports vector even/odd element extraction.
92 GNU Compiler Collection (GCC) Internals
vect_extract_even_odd_wide
Target supports vector even/odd element extraction of vectors with elements
SImode or larger.
vect_interleave
Target supports vector interleaving.
vect_strided
Target supports vector interleaving and extract even/odd.
vect_strided_wide
Target supports vector interleaving and extract even/odd for wide element
types.
vect_perm
Target supports vector permutation.
vect_perm_byte
Target supports permutation of vectors with 8-bit elements.
vect_perm_short
Target supports permutation of vectors with 16-bit elements.
vect_perm3_byte
Target supports permutation of vectors with 8-bit elements, and for the default
vector length it is possible to permute:
{ a0, a1, a2, b0, b1, b2, ... }
to:
{ a0, a0, a0, b0, b0, b0, ... }
{ a1, a1, a1, b1, b1, b1, ... }
{ a2, a2, a2, b2, b2, b2, ... }
using only two-vector permutes, regardless of how long the sequence is.
vect_perm3_int
Like vect_perm3_byte, but for 32-bit elements.
vect_perm3_short
Like vect_perm3_byte, but for 16-bit elements.
vect_shift
Target supports a hardware vector shift operation.
vect_unaligned_possible
Target prefers vectors to have an alignment greater than element alignment,
but also allows unaligned vector accesses in some circumstances.
vect_variable_length
Target has variable-length vectors.
vect64 Target supports vectors of 64 bits.
vect32 Target supports vectors of 32 bits.
vect_widen_sum_hi_to_si
Target supports a vector widening summation of short operands into int re-
sults, or can promote (unpack) from short to int.
Chapter 7: Testsuites 93
vect_widen_sum_qi_to_hi
Target supports a vector widening summation of char operands into short
results, or can promote (unpack) from char to short.
vect_widen_sum_qi_to_si
Target supports a vector widening summation of char operands into int results.
vect_widen_mult_qi_to_hi
Target supports a vector widening multiplication of char operands into short
results, or can promote (unpack) from char to short and perform non-widening
multiplication of short.
vect_widen_mult_hi_to_si
Target supports a vector widening multiplication of short operands into int
results, or can promote (unpack) from short to int and perform non-widening
multiplication of int.
vect_widen_mult_si_to_di_pattern
Target supports a vector widening multiplication of int operands into long
results.
vect_sdot_qi
Target supports a vector dot-product of signed char.
vect_udot_qi
Target supports a vector dot-product of unsigned char.
vect_usdot_qi
Target supports a vector dot-product where one operand of the multiply is
signed char and the other of unsigned char.
vect_sdot_hi
Target supports a vector dot-product of signed short.
vect_udot_hi
Target supports a vector dot-product of unsigned short.
vect_pack_trunc
Target supports a vector demotion (packing) of short to char and from int to
short using modulo arithmetic.
vect_unpack
Target supports a vector promotion (unpacking) of char to short and from
char to int.
vect_intfloat_cvt
Target supports conversion from signed int to float.
vect_uintfloat_cvt
Target supports conversion from unsigned int to float.
vect_floatint_cvt
Target supports conversion from float to signed int.
vect_floatuint_cvt
Target supports conversion from float to unsigned int.
94 GNU Compiler Collection (GCC) Internals
vect_intdouble_cvt
Target supports conversion from signed int to double.
vect_doubleint_cvt
Target supports conversion from double to signed int.
vect_max_reduc
Target supports max reduction for vectors.
vect_sizes_16B_8B
Target supports 16- and 8-bytes vectors.
vect_sizes_32B_16B
Target supports 32- and 16-bytes vectors.
vect_logical_reduc
Target supports AND, IOR and XOR reduction on vectors.
vect_fold_extract_last
Target supports the fold_extract_last optab.
vect_len_load_store
Target supports the len_load and len_store optabs.
vect_partial_vectors_usage_1
Target supports loop vectorization with partial vectors and vect-partial-
vector-usage is set to 1.
vect_partial_vectors_usage_2
Target supports loop vectorization with partial vectors and vect-partial-
vector-usage is set to 2.
vect_partial_vectors
Target supports loop vectorization with partial vectors and vect-partial-
vector-usage is nonzero.
vect_slp_v2qi_store_align
Target supports vectorization of 2-byte char stores with 2-byte aligned address
at plain -O2.
vect_slp_v4qi_store_align
Target supports vectorization of 4-byte char stores with 4-byte aligned address
at plain -O2.
vect_slp_v4qi_store_unalign
Target supports vectorization of 4-byte char stores with unaligned address at
plain -O2.
struct_4char_block_move
Target supports block move for 8-byte aligned 4-byte size struct initialization.
vect_slp_v4qi_store_unalign_1
Target supports vectorization of 4-byte char stores with unaligned address or
store them with constant pool at plain -O2.
struct_8char_block_move
Target supports block move for 8-byte aligned 8-byte size struct initialization.
Chapter 7: Testsuites 95
vect_slp_v8qi_store_unalign_1
Target supports vectorization of 8-byte char stores with unaligned address or
store them with constant pool at plain -O2.
struct_16char_block_move
Target supports block move for 8-byte aligned 16-byte size struct initialization.
vect_slp_v16qi_store_unalign_1
Target supports vectorization of 16-byte char stores with unaligned address or
store them with constant pool at plain -O2.
vect_slp_v2hi_store_align
Target supports vectorization of 4-byte short stores with 4-byte aligned addres-
sat plain -O2.
vect_slp_v2hi_store_unalign
Target supports vectorization of 4-byte short stores with unaligned address at
plain -O2.
vect_slp_v4hi_store_unalign
Target supports vectorization of 8-byte short stores with unaligned address at
plain -O2.
vect_slp_v2si_store_align
Target supports vectorization of 8-byte int stores with 8-byte aligned address
at plain -O2.
vect_slp_v4si_store_unalign
Target supports vectorization of 16-byte int stores with unaligned address at
plain -O2.
arm_fp16_ok
Target supports options to generate VFP half-precision floating-point instruc-
tions. Some multilibs may be incompatible with these options. This test is
valid for ARM only.
arm_fp16_hw
Target supports executing VFP half-precision floating-point instructions. This
test is valid for ARM only.
arm_neon_fp16_ok
ARM Target supports -mfpu=neon-fp16 -mfloat-abi=softfp or compatible
options, including -mfp16-format=ieee if necessary to obtain the __fp16 type.
Some multilibs may be incompatible with these options.
arm_neon_fp16_hw
Test system supports executing Neon half-precision float instructions. (Implies
previous.)
arm_fp16_alternative_ok
ARM target supports the ARM FP16 alternative format. Some multilibs may
be incompatible with the options needed.
arm_fp16_none_ok
ARM target supports specifying none as the ARM FP16 format.
arm_thumb1_ok
ARM target generates Thumb-1 code for -mthumb.
arm_thumb2_ok
ARM target generates Thumb-2 code for -mthumb.
arm_nothumb
ARM target that is not using Thumb.
arm_vfp_ok
ARM target supports -mfpu=vfp -mfloat-abi=softfp. Some multilibs may
be incompatible with these options.
arm_vfp3_ok
ARM target supports -mfpu=vfp3 -mfloat-abi=softfp. Some multilibs may
be incompatible with these options.
arm_arch_v8a_hard_ok
The compiler is targeting arm*-*-* and can compile and assemble code using
the options -march=armv8-a -mfpu=neon-fp-armv8 -mfloat-abi=hard. This
is not enough to guarantee that linking works.
arm_arch_v8a_hard_multilib
The compiler is targeting arm*-*-* and can build programs using the options
-march=armv8-a -mfpu=neon-fp-armv8 -mfloat-abi=hard. The target can
also run the resulting binaries.
arm_v8_vfp_ok
ARM target supports -mfpu=fp-armv8 -mfloat-abi=softfp. Some multilibs
may be incompatible with these options.
98 GNU Compiler Collection (GCC) Internals
arm_v8_neon_ok
ARM target supports -mfpu=neon-fp-armv8 -mfloat-abi=softfp. Some
multilibs may be incompatible with these options.
arm_v8_1a_neon_ok
ARM target supports options to generate ARMv8.1-A Adv.SIMD instructions.
Some multilibs may be incompatible with these options.
arm_v8_1a_neon_hw
ARM target supports executing ARMv8.1-A Adv.SIMD instructions.
Some multilibs may be incompatible with the options needed. Implies
arm v8 1a neon ok.
arm_acq_rel
ARM target supports acquire-release instructions.
arm_v8_2a_fp16_scalar_ok
ARM target supports options to generate instructions for ARMv8.2-A and
scalar instructions from the FP16 extension. Some multilibs may be incom-
patible with these options.
arm_v8_2a_fp16_scalar_hw
ARM target supports executing instructions for ARMv8.2-A and scalar instruc-
tions from the FP16 extension. Some multilibs may be incompatible with these
options. Implies arm v8 2a fp16 neon ok.
arm_v8_2a_fp16_neon_ok
ARM target supports options to generate instructions from ARMv8.2-A with
the FP16 extension. Some multilibs may be incompatible with these options.
Implies arm v8 2a fp16 scalar ok.
arm_v8_2a_fp16_neon_hw
ARM target supports executing instructions from ARMv8.2-A with the FP16
extension. Some multilibs may be incompatible with these options. Implies
arm v8 2a fp16 neon ok and arm v8 2a fp16 scalar hw.
arm_v8_2a_dotprod_neon_ok
ARM target supports options to generate instructions from ARMv8.2-A with
the Dot Product extension. Some multilibs may be incompatible with these
options.
arm_v8_2a_dotprod_neon_hw
ARM target supports executing instructions from ARMv8.2-A with the Dot
Product extension. Some multilibs may be incompatible with these options.
Implies arm v8 2a dotprod neon ok.
arm_v8_2a_i8mm_neon_hw
ARM target supports executing instructions from ARMv8.2-A with the 8-bit
Matrix Multiply extension. Some multilibs may be incompatible with these
options. Implies arm v8 2a i8mm ok.
Chapter 7: Testsuites 99
arm_fp16fml_neon_ok
ARM target supports extensions to generate the VFMAL and VFMLS half-precision
floating-point instructions available from ARMv8.2-A and onwards. Some mul-
tilibs may be incompatible with these options.
arm_v8_2a_bf16_neon_ok
ARM target supports options to generate instructions from ARMv8.2-A with
the BFloat16 extension (bf16). Some multilibs may be incompatible with these
options.
arm_v8_2a_i8mm_ok
ARM target supports options to generate instructions from ARMv8.2-A with
the 8-Bit Integer Matrix Multiply extension (i8mm). Some multilibs may be
incompatible with these options.
arm_v8_1m_mve_ok
ARM target supports options to generate instructions from ARMv8.1-M with
the M-Profile Vector Extension (MVE). Some multilibs may be incompatible
with these options.
arm_v8_1m_mve_fp_ok
ARM target supports options to generate instructions from ARMv8.1-M with
the Half-precision floating-point instructions (HP), Floating-point Extension
(FP) along with M-Profile Vector Extension (MVE). Some multilibs may be
incompatible with these options.
arm_mve_hw
Test system supports executing MVE instructions.
arm_v8m_main_cde
ARM target supports options to generate instructions from ARMv8-M with the
Custom Datapath Extension (CDE). Some multilibs may be incompatible with
these options.
arm_v8m_main_cde_fp
ARM target supports options to generate instructions from ARMv8-M with the
Custom Datapath Extension (CDE) and floating-point (VFP). Some multilibs
may be incompatible with these options.
arm_v8_1m_main_cde_mve
ARM target supports options to generate instructions from ARMv8.1-M with
the Custom Datapath Extension (CDE) and M-Profile Vector Extension
(MVE). Some multilibs may be incompatible with these options.
arm_pacbti_hw
Test system supports executing Pointer Authentication and Branch Target
Identification instructions.
arm_prefer_ldrd_strd
ARM target prefers LDRD and STRD instructions over LDM and STM instructions.
arm_thumb1_movt_ok
ARM target generates Thumb-1 code for -mthumb with MOVW and MOVT instruc-
tions available.
100 GNU Compiler Collection (GCC) Internals
arm_thumb1_cbz_ok
ARM target generates Thumb-1 code for -mthumb with CBZ and CBNZ instruc-
tions available.
arm_divmod_simode
ARM target for which divmod transform is disabled, if it supports hardware
div instruction.
arm_cmse_ok
ARM target supports ARMv8-M Security Extensions, enabled by the -mcmse
option.
arm_cmse_hw
Test system supports executing CMSE instructions.
arm_coproc1_ok
ARM target supports the following coprocessor instructions: CDP, LDC, STC,
MCR and MRC.
arm_coproc2_ok
ARM target supports all the coprocessor instructions also listed as supported
in [arm coproc1 ok], page 100, in addition to the following: CDP2, LDC2, LDC2l,
STC2, STC2l, MCR2 and MRC2.
arm_coproc3_ok
ARM target supports all the coprocessor instructions also listed as supported
in [arm coproc2 ok], page 100, in addition the following: MCRR and MRRC.
arm_coproc4_ok
ARM target supports all the coprocessor instructions also listed as supported
in [arm coproc3 ok], page 100, in addition the following: MCRR2 and MRRC2.
arm_simd32_ok
ARM Target supports options suitable for accessing the SIMD32 intrinsics from
arm_acle.h. Some multilibs may be incompatible with these options.
arm_sat_ok
ARM Target supports options suitable for accessing the saturation intrinsics
from arm_acle.h. Some multilibs may be incompatible with these options.
arm_dsp_ok
ARM Target supports options suitable for accessing the DSP intrinsics from
arm_acle.h. Some multilibs may be incompatible with these options.
arm_softfp_ok
ARM target supports the -mfloat-abi=softfp option.
arm_hard_ok
ARM target supports the -mfloat-abi=hard option.
arm_mve ARM target supports generating MVE instructions.
arm_v8_1_lob_ok
ARM Target supports executing the Armv8.1-M Mainline Low Overhead Loop
instructions DLS and LE. Some multilibs may be incompatible with these op-
tions.
Chapter 7: Testsuites 101
arm_thumb2_no_arm_v8_1_lob
ARM target where Thumb-2 is used without options but does not support
executing the Armv8.1-M Mainline Low Overhead Loop instructions DLS and
LE.
arm_thumb2_ok_no_arm_v8_1_lob
ARM target generates Thumb-2 code for -mthumb but does not support exe-
cuting the Armv8.1-M Mainline Low Overhead Loop instructions DLS and LE.
mbranch_protection_ok
ARM target supporting -mbranch-protection=standard.
arm_pacbti_hw
Test system supports for executing non nop pacbti instructions.
powerpc_htm_ok
PowerPC target supports -mhtm
powerpc_p8vector_ok
PowerPC target supports -mpower8-vector
powerpc_popcntb_ok
PowerPC target supports the popcntb instruction, indicating that this target
supports -mcpu=power5.
powerpc_ppu_ok
PowerPC target supports -mcpu=cell.
powerpc_spe
PowerPC target supports PowerPC SPE.
powerpc_spe_nocache
Including the options used to compile this particular test, the PowerPC target
supports PowerPC SPE.
powerpc_spu
PowerPC target supports PowerPC SPU.
powerpc_vsx_ok
PowerPC target supports -mvsx.
powerpc_405_nocache
Including the options used to compile this particular test, the PowerPC target
supports PowerPC 405.
ppc_recip_hw
PowerPC target supports executing reciprocal estimate instructions.
vmx_hw PowerPC target supports executing AltiVec instructions.
vsx_hw PowerPC target supports executing VSX instructions (ISA 2.06).
has_arch_pwr5
PowerPC target pre-defines macro ARCH PWR5 which means the -mcpu set-
ting is Power5 or later.
has_arch_pwr6
PowerPC target pre-defines macro ARCH PWR6 which means the -mcpu set-
ting is Power6 or later.
has_arch_pwr7
PowerPC target pre-defines macro ARCH PWR7 which means the -mcpu set-
ting is Power7 or later.
has_arch_pwr8
PowerPC target pre-defines macro ARCH PWR8 which means the -mcpu set-
ting is Power8 or later.
has_arch_pwr9
PowerPC target pre-defines macro ARCH PWR9 which means the -mcpu set-
ting is Power9 or later.
104 GNU Compiler Collection (GCC) Internals
vect_cmdline_needed
Target requires a command line argument to enable a SIMD instruction set.
xorsign Target supports the xorsign optab expansion.
inttypes_types
Target has the basic signed and unsigned types in inttypes.h. This is for
tests that GCC’s notions of these types agree with those in the header, as some
systems have only inttypes.h.
lax_strtofp
Target might have errors of a few ULP in string to floating-point conversion
functions and overflow is not always detected correctly by those functions.
mempcpy Target provides mempcpy function.
mmap Target supports mmap.
newlib Target supports Newlib.
newlib_nano_io
GCC was configured with --enable-newlib-nano-formatted-io, which re-
duces the code size of Newlib formatted I/O functions.
posix_memalign
Target supports posix_memalign.
pow10 Target provides pow10 function.
pthread Target can compile using pthread.h with no errors or warnings.
pthread_h
Target has pthread.h.
sockets Target can compile using sys/socket.h with no errors or warnings.
run_expensive_tests
Expensive testcases (usually those that consume excessive amounts of CPU
time) should be run on this target. This can be enabled by setting the GCC_
TEST_RUN_EXPENSIVE environment variable to a non-empty string.
simulator
Test system runs executables on a simulator (i.e. slowly) rather than hardware
(i.e. fast).
signal Target has signal.h.
stabs Target supports the stabs debugging format.
stdint_types
Target has the basic signed and unsigned C types in stdint.h. This will be
obsolete when GCC ensures a working stdint.h for all targets.
stdint_types_mbig_endian
Target accepts the option -mbig-endian and stdint.h can be included without
error when -mbig-endian is passed.
stpcpy Target provides stpcpy function.
sysconf Target supports sysconf.
trampolines
Target supports trampolines.
108 GNU Compiler Collection (GCC) Internals
two_plus_gigs
Target supports linking programs with 2+GiB of data.
uclibc Target supports uClibc.
unwrapped
Target does not use a status wrapper.
vxworks_kernel
Target is a VxWorks kernel.
vxworks_rtp
Target is a VxWorks RTP.
wchar Target supports wide characters.
weak_undefined
Target supports weak undefined symbols
offload_gcn
Target has been configured for OpenACC/OpenMP offloading on AMD GCN.
persistent
Target supports the persistent variable attribute.
pie_enabled
Target generates PIE by default.
pcc_bitfield_type_matters
Target defines PCC_BITFIELD_TYPE_MATTERS.
pe_aligned_commons
Target supports -mpe-aligned-commons.
pie Target supports -pie, -fpie and -fPIE.
rdynamic Target supports -rdynamic.
scalar_all_fma
Target supports all four fused multiply-add optabs for both float and double.
These optabs are: fma_optab, fms_optab, fnma_optab and fnms_optab.
section_anchors
Target supports section anchors.
short_enums
Target defaults to short enums.
stack_size
Target has limited stack size. The stack size limit can be obtained using
the STACK SIZE macro defined by [dg-add-options feature stack_size],
page 113.
static Target supports -static.
static_libgfortran
Target supports statically linking ‘libgfortran’.
string_merging
Target supports merging string constants at link time.
ucn Target supports compiling and assembling UCN.
ucn_nocache
Including the options used to compile this particular test, the target supports
compiling and assembling UCN.
unaligned_stack
Target does not guarantee that its STACK_BOUNDARY is greater than or equal to
the required vector alignment.
vector_alignment_reachable
Vector alignment is reachable for types of 32 bits or less.
vector_alignment_reachable_for_64bit
Vector alignment is reachable for types of 64 bits or less.
Chapter 7: Testsuites 111
vma_equals_lma
Target generates executable with VMA equal to LMA for .data section.
wchar_t_char16_t_compatible
Target supports wchar_t that is compatible with char16_t.
wchar_t_char32_t_compatible
Target supports wchar_t that is compatible with char32_t.
comdat_group
Target uses comdat groups.
indirect_calls
Target supports indirect calls, i.e. calls where the target is not constant.
lgccjit Target supports -lgccjit, i.e. libgccjit.so can be linked into jit tests.
__OPTIMIZE__
Optimizations are enabled (__OPTIMIZE__) per the current compiler flags.
arm_v8_2a_dotprod_neon
Add options for ARMv8.2-A with Adv.SIMD Dot Product support, if this is
supported by the target; see the [arm v8 2a dotprod neon ok], page 98, effec-
tive target keyword.
arm_fp16fml_neon
Add options to enable generation of the VFMAL and VFMSL instructions, if this
is supported by the target; see the [arm fp16fml neon ok], page 99, effective
target keyword.
arm_dsp Add options for ARM DSP intrinsics support, if this is supported by the target;
see the [arm dsp ok effective target keyword], page 100.
bind_pic_locally
Add the target-specific flags needed to enable functions to bind locally when
using pic/PIC passes in the testsuite.
floatn Add the target-specific flags needed to use the _Floatn type.
floatnx Add the target-specific flags needed to use the _Floatnx type.
ieee Add the target-specific flags needed to enable full IEEE compliance mode.
mips16_attribute
mips16 function attributes. Only MIPS targets support this feature, and only
then in certain modes.
stack_size
Add the flags needed to define macro STACK SIZE and set it to the stack size
limit associated with the [stack_size effective target], page 110.
sqrt_insn
Add the target-specific flags needed to enable hardware square root instructions,
if any.
tls Add the target-specific flags needed to use thread-local storage.
weak_undefined
Add the flags needed to enable support for weak undefined symbols.
dg-require-stack-size size
Skip the test if the target does not support a stack size of size.
dg-require-visibility vis
Skip the test if the target does not support the visibility attribute. If vis
is "", support for visibility("hidden") is checked, for visibility("vis")
otherwise.
The original dg-require directives were defined before there was support for effective-
target keywords. The directives that do not take arguments could be replaced with effective-
target keywords.
dg-require-alias ""
Skip the test if the target does not support the ‘alias’ attribute.
dg-require-ascii-locale ""
Skip the test if the host does not support an ASCII locale.
dg-require-compat-dfp ""
Skip this test unless both compilers in a compat testsuite support decimal float-
ing point.
dg-require-cxa-atexit ""
Skip the test if the target does not support __cxa_atexit. This is equivalent
to dg-require-effective-target cxa_atexit.
dg-require-dll ""
Skip the test if the target does not support DLL attributes.
dg-require-dot ""
Skip the test if the host does not have dot.
dg-require-fork ""
Skip the test if the target does not support fork.
dg-require-gc-sections ""
Skip the test if the target’s linker does not support the --gc-sections flags.
This is equivalent to dg-require-effective-target gc-sections.
dg-require-host-local ""
Skip the test if the host is remote, rather than the same as the build system.
Some tests are incompatible with DejaGnu’s handling of remote hosts, which
involves copying the source file to the host and compiling it with a relative path
and "-o a.out".
dg-require-mkfifo ""
Skip the test if the target does not support mkfifo.
dg-require-named-sections ""
Skip the test is the target does not support named sections. This is equivalent
to dg-require-effective-target named_sections.
dg-require-weak ""
Skip the test if the target does not support weak symbols.
dg-require-weak-override ""
Skip the test if the target does not support overriding weak symbols.
Chapter 7: Testsuites 115
** ret
*/
svbool_t cmple_f16_tied (...) { ... }
checks whether cmple_f16_tied is implemented by the fcmge instruction fol-
lowed by ret or by the fcmle instruction followed by ret. The test is still a
single regular rexpression.
A line containing just:
prefix ...
stands for zero or more unmatched lines; the whitespace after prefix is again
not significant.
keep-modules "list-of-modules-not-to-delete"
Whitespace separated list of module names that should not be deleted by
cleanup-modules. If the list of modules is empty, all modules defined in this file
are kept.
module maybe_unneeded
end module maybe_unneeded
module keep1
end module keep1
module keep2
end module keep2
! { dg-final { keep-modules "keep1 keep2" } } ! just keep these two
! { dg-final { keep-modules "" } } ! keep all
dg-keep-saved-temps "list-of-suffixes-not-to-delete"
Whitespace separated list of suffixes that should not be deleted automatically
in a testcase that uses -save-temps.
Chapter 7: Testsuites 119
cleanup-profile-file
Removes profiling files generated for this test.
gcc.dg/format
This subdirectory contains tests of the -Wformat format checking. Tests in this
directory are run with and without -DWIDE.
gcc.dg/noncompile
This subdirectory contains tests of code that should not compile and does not
need any special compilation options. They are run with multiple optimization
options, since sometimes invalid code crashes the compiler with optimization.
gcc.dg/special
FIXME: describe this.
gcc.c-torture
This contains particular code fragments which have historically broken easily.
These tests are run with multiple optimization options, so tests for features
which only break at some optimization levels belong here. This also contains
tests to check that certain optimizations occur. It might be worthwhile to
separate the correctness tests cleanly from the code quality tests, but it hasn’t
been done yet.
gcc.c-torture/compat
FIXME: describe this.
This directory should probably not be used for new tests.
gcc.c-torture/compile
This testsuite contains test cases that should compile, but do not need to link
or run. These test cases are compiled with several different combinations of
optimization options. All warnings are disabled for these test cases, so this
directory is not suitable if you wish to test for the presence or absence of
compiler warnings. While special options can be set, and tests disabled on
specific platforms, by the use of .x files, mostly these test cases should not
contain platform dependencies. FIXME: discuss how defines such as STACK_
SIZE are used.
gcc.c-torture/execute
This testsuite contains test cases that should compile, link and run; otherwise
the same comments as for gcc.c-torture/compile apply.
gcc.c-torture/execute/ieee
This contains tests which are specific to IEEE floating point.
gcc.c-torture/unsorted
FIXME: describe this.
This directory should probably not be used for new tests.
gcc.misc-tests
This directory contains C tests that require special handling. Some of these
tests have individual expect files, and others share special-purpose expect files:
bprob*.c Test -fbranch-probabilities using gcc.misc-
tests/bprob.exp, which in turn uses the generic,
language-independent framework (see Section 7.7 [Sup-
port for testing profile-directed optimizations], page 122).
Chapter 7: Testsuites 121
gcov*.c Test gcov output using gcov.exp, which in turn uses the language-
independent support (see Section 7.6 [Support for testing gcov],
page 121).
i386-pf-*.c
Test i386-specific support for data prefetch using i386-
prefetch.exp.
gcc.test-framework
dg-*.c Test the testsuite itself using gcc.test-framework/test-
framework.exp.
FIXME: merge in testsuite/README.gcc and discuss the format of test cases and magic
comments more.
on procedures in lib/gcc-dg.exp to compile and run the test program. A typical gcov
test contains the following DejaGnu commands within comments:
{ dg-options "--coverage" }
{ dg-do run { target native } }
{ dg-final { run-gcov sourcefile } }
Checks of gcov output can include line counts, branch percentages, and call return per-
centages. All of these checks are requested via commands that appear in comments in the
test’s source file. Commands to check line counts are processed by default. Commands to
check branch percentages and call return percentages are processed if the run-gcov com-
mand has arguments branches or calls, respectively. For example, the following specifies
checking both, as well as passing -b to gcov:
{ dg-final { run-gcov branches calls { -b sourcefile } } }
A line count command appears within a comment on the source line that is expected to
get the specified count and has the form count(cnt). A test should only check line counts
for lines that will get the same count for any architecture.
Commands to check branch percentages (branch) and call return percentages (returns)
are very similar to each other. A beginning command appears on or before the first of a
range of lines that will report the percentage, and the ending command follows that range
of lines. The beginning command can include a list of percentages, all of which are expected
to be found within the range. A range is terminated by the next command of the same kind.
A command branch(end) or returns(end) marks the end of a range without starting a
new one. For example:
if (i > 10 && j > i && j < 20) /* branch(27 50 75) */
/* branch(end) */
foo (i, j);
For a call return percentage, the value specified is the percentage of calls reported to
return. For a branch percentage, the value is either the expected percentage or 100 mi-
nus that value, since the direction of a branch can differ depending on the target or the
optimization level.
Not all branches and calls need to be checked. A test should not check for branches that
might be optimized away or replaced with predicated instructions. Don’t check for calls
inserted by the compiler or ones that might be inlined or optimized away.
A single test can check for combinations of line counts, branch percentages, and call
return percentages. The command to check a line count must appear on the line that will
report that count, but commands to check branch percentages and call return percentages
can bracket the lines that report them.
profopt.exp provides generic support for profile-directed optimizations. Each set of tests
that uses it provides information about a specific optimization:
tool tool being tested, e.g., gcc
profile_option
options used to generate profile data
feedback_option
options used to optimize using that profile data
prof_ext suffix of profile data files
PROFOPT_OPTIONS
list of options with which to run each test, similar to the lists for torture tests
{ dg-final-generate { local-directive } }
This directive is similar to dg-final, but the local-directive is run after the
generation of profile data.
{ dg-final-use { local-directive } }
The local-directive is run after the profile data have been used.
where tsti and alti are lists of options, with tsti used by the compiler under test and alti
used by the alternate compiler. For example, with [list [list {-g -O0} {-O3}] [list
{-fpic} {-fPIC -O2}]], the test is first built with -g -O0 by the compiler under test and
with -O3 by the alternate compiler. The test is built a second time using -fpic by the
compiler under test and -fPIC -O2 by the alternate compiler.
An alternate compiler is specified by defining an environment variable to be the full
pathname of an installed compiler; for C define ALT_CC_UNDER_TEST, and for C++ define
ALT_CXX_UNDER_TEST. These will be written to the site.exp file used by DejaGnu. The
default is to build each test with the compiler under test using the first of each pair of
compiler options from COMPAT_OPTIONS. When ALT_CC_UNDER_TEST or ALT_CXX_UNDER_
TEST is same, each test is built using the compiler under test but with combinations of the
options from COMPAT_OPTIONS.
To run only the C++ compatibility suite using the compiler under test and another version
of GCC using specific compiler options, do the following from objdir/gcc:
rm site.exp
make -k \
ALT_CXX_UNDER_TEST=${alt_prefix}/bin/g++ \
COMPAT_OPTIONS="lists as shown above" \
check-c++ \
RUNTESTFLAGS="compat.exp"
A test that fails when the source files are compiled with different compilers, but passes
when the files are compiled with the same compiler, demonstrates incompatibility of the
generated code or runtime support. A test that fails for the alternate compiler but passes
for the compiler under test probably tests for a bug that was fixed in the compiler under
test but is present in the alternate compiler.
The binary compatibility tests support a small number of test framework commands that
appear within comments in a test file.
dg-require-*
These commands can be used in testname_main.suffix to skip the test if
specific support is not available on the target.
dg-options
The specified options are used for compiling this particular source file, ap-
pended to the options from COMPAT_OPTIONS. When this command appears in
testname_main.suffix the options are also used to link the test program.
dg-xfail-if
This command can be used in a secondary source file to specify that compilation
is expected to fail for particular options on particular targets.
set-torture-options
Set lists of torture options to use for tests with and without loops. Optionally
combine a set of torture options with a set of other options, as is done with
Objective-C runtime options.
torture-finish
Finalize use of torture lists.
The .exp file for a set of tests that use torture options must include calls to these three
procedures if:
• It calls gcc-dg-runtest and overrides DG TORTURE OPTIONS.
• It calls ${tool}-torture or ${tool}-torture-execute, where tool is c, fortran, or
objc.
• It calls dg-pch.
It is not necessary for a .exp file that calls gcc-dg-runtest to call the torture procedures
if the tests should use the list in DG TORTURE OPTIONS defined in gcc-dg.exp.
Most uses of torture options can override the default lists by defin-
ing TORTURE OPTIONS or add to the default list by defining ADDI-
TIONAL TORTURE OPTIONS. Define these in a .dejagnurc file or add them
to the site.exp file; for example
set ADDITIONAL_TORTURE_OPTIONS [list \
{ -O2 -ftree-loop-linear } \
{ -O2 -fpeel-loops } ]
bb_2:
if (a > 4)
goto bb_3;
else
goto bb_4;
bb_3:
a_2 = 10;
goto bb_5;
bb_4:
a_3 = 20;
bb_5:
a_1 = __PHI (bb_3: a_2, bb_4: a_3);
a_4 = a_1 + 4;
126 GNU Compiler Collection (GCC) Internals
return;
}
The startwith argument indicates at which pass to begin.
Use the dump modifier -gimple (e.g. -fdump-tree-all-gimple) to make tree dumps
more closely follow the format accepted by the GIMPLE parser.
Example DejaGnu tests of GIMPLE can be seen in the source tree at
gcc/testsuite/gcc.dg/gimplefe-*.c.
The __GIMPLE parser is integrated with the C tokenizer and preprocessor, so it should be
possible to use macros to build out test coverage.
Type(type)
This property is required; type is the C type for variables set by options
using this enumeration together with Var.
UnknownError(message)
The message message will be used as an error message if the argument is
invalid; for enumerations without UnknownError, a generic error message
is used. message should contain a single ‘%qs’ format, which will be used
to format the invalid argument.
• An enumeration value record to define one of the strings in a set given in an ‘Enum’
record. These records have two fields: the string ‘EnumValue’ and a space-separated
list of properties. Properties use the same format as option properties; the following
are valid:
Enum(name)
This property is required; name says which ‘Enum’ record this ‘EnumValue’
record corresponds to.
String(string)
This property is required; string is the string option argument being de-
scribed by this record.
Value(value)
This property is required; it says what value (representable as int) should
be used for the given string.
Canonical
This property is optional. If present, it says the present string is the
canonical one among all those with the given value. Other strings yielding
that value will be mapped to this one so specs do not need to handle them.
DriverOnly
This property is optional. If present, the present string will only be ac-
cepted by the driver. This is used for cases such as -march=native that
are processed by the driver so that ‘gcc -v’ shows how the options chosen
depended on the system on which the compiler was run.
Set(number)
This property is optional, required for enumerations used in EnumSet op-
tions. number should be decimal number between 1 and 64 inclusive and
divides the enumeration into a set of sets of mutually exclusive arguments.
Arguments with the same number can’t be specified together in the same
option, but arguments with different number can. value needs to be chosen
such that a mask of all value values from the same set number bitwise ored
doesn’t overlap with masks for other sets. When -foption=arg_from_
set1,arg_from_set4 and -fno-option=arg_from_set3 are used, the ef-
fect is that previous value of the Var will get bits from set 1 and 4 masks
cleared, ored Value of arg_from_set1 and arg_from_set4 and then will
get bits from set 3 mask cleared.
• An option definition record. These records have the following fields:
1. the name of the option, with the leading “-” removed
Chapter 8: Option specification files 129
It is possible to specify several different languages for the same option. Each
language must have been declared by an earlier Language record. See Sec-
tion 8.1 [Option file format], page 127.
RejectDriver
The option is only handled by the compilers proper (cc1 etc.) and should not
be accepted by the driver.
RejectNegative
The option does not have a “no-” form. All options beginning with “f”, “g”,
“W” or “m” are assumed to have a “no-” form unless this property is used.
Negative(othername)
The option will turn off another option othername, which is the option name
with the leading “-” removed. This chain action will propagate through the
Negative property of the option to be turned off. The driver will prune op-
tions, removing those that are turned off by some later option. This pruning is
not done for options with Joined or JoinedOrMissing properties, unless the
options have both the RejectNegative property and the Negative property
mentions itself.
As a consequence, if you have a group of mutually-exclusive options, their
Negative properties should form a circular chain. For example, if options -a,
-b and -c are mutually exclusive, their respective Negative properties should
be ‘Negative(b)’, ‘Negative(c)’ and ‘Negative(a)’.
Joined
Separate The option takes a mandatory argument. Joined indicates that the option and
argument can be included in the same argv entry (as with -mflush-func=name,
for example). Separate indicates that the option and argument can be separate
argv entries (as with -o). An option is allowed to have both of these properties.
JoinedOrMissing
The option takes an optional argument. If the argument is given, it will be part
of the same argv entry as the option itself.
This property cannot be used alongside Joined or Separate.
MissingArgError(message)
For an option marked Joined or Separate, the message message will be used
as an error message if the mandatory argument is missing; for options without
MissingArgError, a generic error message is used. message should contain a
single ‘%qs’ format, which will be used to format the name of the option passed.
Args(n) For an option marked Separate, indicate that it takes n arguments. The default
is 1.
UInteger The option’s argument is a non-negative integer consisting of either decimal
or hexadecimal digits interpreted as int. Hexadecimal integers may optionally
start with the 0x or 0X prefix. The option parser validates and converts the
argument before passing it to the relevant option handler. UInteger should
also be used with options like -falign-loops where both -falign-loops and
-falign-loops=n are supported to make sure the saved options are given a
Chapter 8: Option specification files 131
full integer. Positive values of the argument in excess of INT_MAX wrap around
zero.
Host_Wide_Int
The option’s argument is a non-negative integer consisting of either decimal or
hexadecimal digits interpreted as the widest integer type on the host. As with
an UInteger argument, hexadecimal integers may optionally start with the 0x
or 0X prefix. The option parser validates and converts the argument before
passing it to the relevant option handler. Host_Wide_Int should be used with
options that need to accept very large values. Positive values of the argument
in excess of HOST_WIDE_INT_M1U are assigned HOST_WIDE_INT_M1U.
IntegerRange(n, m)
The options’s arguments are integers of type int. The option’s parser validates
that the value of an option integer argument is within the closed range [n, m].
ByteSize A property applicable only to UInteger or Host_Wide_Int arguments. The
option’s integer argument is interpreted as if in infinite precision using satu-
ration arithmetic in the corresponding type. The argument may be followed
by a ‘byte-size’ suffix designating a multiple of bytes such as kB and KiB for
kilobyte and kibibyte, respectively, MB and MiB for megabyte and mebibyte, GB
and GiB for gigabyte and gigibyte, and so on. ByteSize should be used for
with options that take a very large argument representing a size in bytes, such
as -Wlarger-than=.
ToLower The option’s argument should be converted to lowercase as part of putting it in
canonical form, and before comparing with the strings indicated by any Enum
property.
NoDriverArg
For an option marked Separate, the option only takes an argument in the com-
piler proper, not in the driver. This is for compatibility with existing options
that are used both directly and via -Wp,; new options should not have this
property.
Var(var) The state of this option should be stored in variable var (actually a macro for
global_options.x_var). The way that the state is stored depends on the type
of option:
• If the option uses the Mask or InverseMask properties, var is the integer
variable that contains the mask.
• If the option is a normal on/off switch, var is an integer variable that is
nonzero when the option is enabled. The options parser will set the variable
to 1 when the positive form of the option is used and 0 when the “no-”
form is used.
• If the option takes an argument and has the UInteger property, var is an
integer variable that stores the value of the argument.
• If the option takes an argument and has the Enum property, var is a variable
(type given in the Type property of the ‘Enum’ record whose Name property
has the same argument as the Enum property of this option) that stores the
value of the argument.
132 GNU Compiler Collection (GCC) Internals
whole Var isn’t overwritten, but only the bits in all the enumeration values
with the same set bitwise ored together. Or option’s argument can be a comma
separated list of strings where each string is from a different Set(number).
EnumBitSet
Must be used together with the Enum(name) property. Similar to ‘EnumSet’,
but corresponding ‘Enum’ record must not use Set properties, each EnumValue
should have Value that is a power of 2, each value is treated as its own set and
its value as the set’s mask, so there are no mutually exclusive arguments.
Defer The option should be stored in a vector, specified with Var, for later processing.
Alias(opt)
Alias(opt, arg)
Alias(opt, posarg, negarg)
The option is an alias for -opt (or the negative form of that option, depending
on NegativeAlias). In the first form, any argument passed to the alias is
considered to be passed to -opt, and -opt is considered to be negated if the
alias is used in negated form. In the second form, the alias may not be negated
or have an argument, and posarg is considered to be passed as an argument
to -opt. In the third form, the alias may not have an argument, if the alias is
used in the positive form then posarg is considered to be passed to -opt, and
if the alias is used in the negative form then negarg is considered to be passed
to -opt.
Aliases should not specify Var or Mask or UInteger. Aliases should normally
specify the same languages as the target of the alias; the flags on the target
will be used to determine any diagnostic for use of an option for the wrong
language, while those on the alias will be used to identify what command-line
text is the option and what text is any argument to that option.
When an Alias definition is used for an option, driver specs do not need to
handle it and no ‘OPT_’ enumeration value is defined for it; only the canonical
form of the option will be seen in those places.
NegativeAlias
For an option marked with Alias(opt), the option is considered to be an alias
for the positive form of -opt if negated and for the negative form of -opt if
not negated. NegativeAlias may not be used with the forms of Alias taking
more than one argument.
Ignore This option is ignored apart from printing any warning specified using Warn.
The option will not be seen by specs and no ‘OPT_’ enumeration value is defined
for it.
SeparateAlias
For an option marked with Joined, Separate and Alias, the option only acts
as an alias when passed a separate argument; with a joined argument it acts as
a normal option, with an ‘OPT_’ enumeration value. This is for compatibility
with the Java -d option and should not be used for new options.
134 GNU Compiler Collection (GCC) Internals
Warn(message)
If this option is used, output the warning message. message is a format string,
either taking a single operand with a ‘%qs’ format which is the option name, or
not taking any operands, which is passed to the ‘warning’ function. If an alias
is marked Warn, the target of the alias must not also be marked Warn.
Warning This is a warning option and should be shown as such in --help output. This
flag does not currently affect anything other than --help.
Optimization
This is an optimization option. It should be shown as such in --help output,
and any associated variable named using Var should be saved and restored when
the optimization level is changed with optimize attributes.
PerFunction
This is an option that can be overridden on a per-function basis. Optimization
implies PerFunction, but options that do not affect executable code generation
may use this flag instead, so that the option is not taken into account in ways
that might affect executable code generation.
Param This is an option that is a parameter.
Undocumented
The option is deliberately missing documentation and should not be included
in the --help output.
Condition(cond)
The option should only be accepted if preprocessor condition cond is true. Note
that any C declarations associated with the option will be present even if cond
is false; cond simply controls whether the option is accepted and whether it is
printed in the --help output.
Save Build the cl_target_option structure to hold a copy of the option, add the
functions cl_target_option_save and cl_target_option_restore to save
and restore the options.
SetByCombined
The option may also be set by a combined option such as -ffast-math. This
causes the gcc_options struct to have a field frontend_set_name, where name
is the name of the field holding the value of this option (without the leading
x_). This gives the front end a way to indicate that the value has been set
explicitly and should not be changed by the combined option. For example,
some front ends use this to prevent -ffast-math and -fno-fast-math from
changing the value of -fmath-errno for languages that do not use errno.
EnabledBy(opt)
EnabledBy(opt || opt2)
EnabledBy(opt && opt2)
If not explicitly set, the option is set to the value of -opt; multiple options can
be given, separated by ||. The third form using && specifies that the option is
only set if both opt and opt2 are set. The options opt and opt2 must have the
Common property; otherwise, use LangEnabledBy.
Chapter 8: Option specification files 135
LangEnabledBy(language, opt)
LangEnabledBy(language, opt, posarg, negarg)
When compiling for the given language, the option is set to the value of -opt, if
not explicitly set. opt can be also a list of || separated options. In the second
form, if opt is used in the positive form then posarg is considered to be passed
to the option, and if opt is used in the negative form then negarg is considered
to be passed to the option. It is possible to specify several different languages.
Each language must have been declared by an earlier Language record. See
Section 8.1 [Option file format], page 127.
NoDWARFRecord
The option is omitted from the producer string written by -grecord-gcc-
switches.
PchIgnore
Even if this is a target option, this option will not be recorded / compared to
determine if a precompiled header file matches.
CPP(var) The state of this option should be kept in sync with the preprocessor option
var. If this property is set, then properties Var and Init must be set as well.
CppReason(CPP_W_Enum)
This warning option corresponds to cpplib.h warning reason code
CPP W Enum. This should only be used for warning options of the C-family
front-ends.
137
we hide cgraph from the front ends and move back to rest of compilation as the official
interface? Possibly we should rename all three interfaces such that the names match in
some meaningful way and that is more descriptive than "rest of".
The middle-end will, at its option, emit the function and data definitions immediately or
queue them for later processing.
Sometimes passes are supposed to share a dump file / option name. To still give these
unique names, you can use a prefix that is delimited by a space from the part that is used
for the dump file / option name. E.g. When the pass name is "ud dce", the name used for
dump file/options is "dce".
TODO: describe the global variables set up by the pass manager, and a brief description
of how a new pass should use it. I need to look at what info RTL passes use first. . .
• IPA reference
This pass gathers information about how variables whose scope is confined to the
compilation unit are used. It is located in ipa-reference.cc and is described by
pass_ipa_reference.
• IPA single use
This pass checks whether variables are used by a single function. It is located in ipa.cc
and is described by pass_ipa_single_use.
• IPA comdats
This pass looks for static symbols that are used exclusively within one comdat group,
and moves them into that comdat group. It is located in ipa-comdats.cc and is
described by pass_ipa_comdats.
of the control flow graph. The pass is located in omp-low.cc and is described by
pass_lower_omp.
• OpenMP expansion
If OpenMP generation (-fopenmp) is enabled, this pass expands parallel regions into
their own functions to be invoked by the thread library. The pass is located in omp-
low.cc and is described by pass_expand_omp.
• Lower control flow
This pass flattens if statements (COND_EXPR) and moves lexical bindings (BIND_EXPR)
out of line. After this pass, all if statements will have exactly two goto statements in
its then and else arms. Lexical binding information for each statement will be found
in TREE_BLOCK rather than being inferred from its position under a BIND_EXPR. This
pass is found in gimple-low.cc and is described by pass_lower_cf.
• Lower exception handling control flow
This pass decomposes high-level exception handling constructs (TRY_FINALLY_EXPR and
TRY_CATCH_EXPR) into a form that explicitly represents the control flow involved. After
this pass, lookup_stmt_eh_region will return a non-negative number for any state-
ment that may have EH control flow semantics; examine tree_can_throw_internal or
tree_can_throw_external for exact semantics. Exact control flow may be extracted
from foreach_reachable_handler. The EH region nesting tree is defined in except.h
and built in except.cc. The lowering pass itself is in tree-eh.cc and is described by
pass_lower_eh.
• Build the control flow graph
This pass decomposes a function into basic blocks and creates all of the edges that
connect them. It is located in tree-cfg.cc and is described by pass_build_cfg.
• Find all referenced variables
This pass walks the entire function and collects an array of all variables referenced
in the function, referenced_vars. The index at which a variable is found in the
array is used as a UID for the variable within this function. This data is needed by
the SSA rewriting routines. The pass is located in tree-dfa.cc and is described by
pass_referenced_vars.
• Enter static single assignment form
This pass rewrites the function such that it is in SSA form. After this pass, all is_
gimple_reg variables will be referenced by SSA_NAME, and all occurrences of other
variables will be annotated with VDEFS and VUSES; PHI nodes will have been inserted
as necessary for each basic block. This pass is located in tree-ssa.cc and is described
by pass_build_ssa.
• Warn for uninitialized variables
This pass scans the function for uses of SSA_NAMEs that are fed by default definition.
For non-parameter variables, such uses are uninitialized. The pass is run twice, before
and after optimization (if turned on). In the first pass we only warn for uses that
are positively uninitialized; in the second pass we warn for uses that are possibly
uninitialized. The pass is located in tree-ssa.cc and is defined by pass_early_
warn_uninitialized and pass_late_warn_uninitialized.
144 GNU Compiler Collection (GCC) Internals
Induction variable optimizations. This pass performs standard induction variable op-
timizations, including strength reduction, induction variable merging and induction
variable elimination. The pass is implemented in tree-ssa-loop-ivopts.cc.
Loop unswitching. This pass moves the conditional jumps that are invariant out of the
loops. To achieve this, a duplicate of the loop is created for each possible outcome of
conditional jump(s). The pass is implemented in tree-ssa-loop-unswitch.cc.
Loop splitting. If a loop contains a conditional statement that is always true for one
part of the iteration space and false for the other this pass splits the loop into two, one
dealing with one side the other only with the other, thereby removing one inner-loop
conditional. The pass is implemented in tree-ssa-loop-split.cc.
The optimizations also use various utility functions contained in tree-ssa-loop-
manip.cc, cfgloop.cc, cfgloopanal.cc and cfgloopmanip.cc.
Vectorization. This pass transforms loops to operate on vector types instead of scalar
types. Data parallelism across loop iterations is exploited to group data elements from
consecutive iterations into a vector and operate on them in parallel. Depending on
available target support the loop is conceptually unrolled by a factor VF (vectorization
factor), which is the number of elements operated upon in parallel in each iteration, and
the VF copies of each scalar operation are fused to form a vector operation. Additional
loop transformations such as peeling and versioning may take place to align the number
of iterations, and to align the memory accesses in the loop. The pass is implemented in
tree-vectorizer.cc (the main driver), tree-vect-loop.cc and tree-vect-loop-
manip.cc (loop specific parts and general loop utilities), tree-vect-slp (loop-aware
SLP functionality), tree-vect-stmts.cc, tree-vect-data-refs.cc and tree-vect-
slp-patterns.cc containing the SLP pattern matcher. Analysis of data references is
in tree-data-ref.cc.
SLP Vectorization. This pass performs vectorization of straight-line code. The pass
is implemented in tree-vectorizer.cc (the main driver), tree-vect-slp.cc, tree-
vect-stmts.cc and tree-vect-data-refs.cc.
Autoparallelization. This pass splits the loop iteration space to run into several threads.
The pass is implemented in tree-parloops.cc.
Graphite is a loop transformation framework based on the polyhedral model. Graphite
stands for Gimple Represented as Polyhedra. The internals of this infrastructure are
documented in https://gcc.gnu.org/wiki/Graphite. The passes working on this
representation are implemented in the various graphite-* files.
• Tree level if-conversion for vectorizer
This pass applies if-conversion to simple loops to help vectorizer. We identify if con-
vertible loops, if-convert statements and merge basic blocks in one big block. The idea
is to present loop in such form so that vectorizer can have one to one mapping between
statements and available vector operations. This pass is located in tree-if-conv.cc
and is described by pass_if_conversion.
• Conditional constant propagation
This pass relaxes a lattice of values in order to identify those that must be constant
even in the presence of conditional branches. The pass is located in tree-ssa-ccp.cc
and is described by pass_ccp.
Chapter 9: Passes and Files of the Compiler 147
A related pass that works on memory loads and stores, and not just register values, is
located in tree-ssa-ccp.cc and described by pass_store_ccp.
• Conditional copy propagation
This is similar to constant propagation but the lattice of values is the “copy-of” relation.
It eliminates redundant copies from the code. The pass is located in tree-ssa-copy.cc
and described by pass_copy_prop.
A related pass that works on memory copies, and not just register copies, is located in
tree-ssa-copy.cc and described by pass_store_copy_prop.
• Value range propagation
This transformation is similar to constant propagation but instead of propagating sin-
gle constant values, it propagates known value ranges. The implementation is based on
Patterson’s range propagation algorithm (Accurate Static Branch Prediction by Value
Range Propagation, J. R. C. Patterson, PLDI ’95). In contrast to Patterson’s algo-
rithm, this implementation does not propagate branch probabilities nor it uses more
than a single range per SSA name. This means that the current implementation cannot
be used for branch prediction (though adapting it would not be difficult). The pass is
located in tree-vrp.cc and is described by pass_vrp.
• Folding built-in functions
This pass simplifies built-in functions, as applicable, with constant arguments or with
inferable string lengths. It is located in tree-ssa-ccp.cc and is described by pass_
fold_builtins.
• Split critical edges
This pass identifies critical edges and inserts empty basic blocks such that the edge
is no longer critical. The pass is located in tree-cfg.cc and is described by pass_
split_crit_edges.
• Control dependence dead code elimination
This pass is a stronger form of dead code elimination that can eliminate unnecessary
control flow statements. It is located in tree-ssa-dce.cc and is described by pass_
cd_dce.
• Tail call elimination
This pass identifies function calls that may be rewritten into jumps. No code trans-
formation is actually applied here, but the data and control flow problem is solved.
The code transformation requires target support, and so is delayed until RTL. In the
meantime CALL_EXPR_TAILCALL is set indicating the possibility. The pass is located in
tree-tailcall.cc and is described by pass_tail_calls. The RTL transformation is
handled by fixup_tail_calls in calls.cc.
• Warn for function return without value
For non-void functions, this pass locates return statements that do not specify a value
and issues a warning. Such a statement may have been injected by falling off the end
of the function. This pass is run last so that we have as much time as possible to prove
that the statement is not reachable. It is located in tree-cfg.cc and is described by
pass_warn_function_return.
148 GNU Compiler Collection (GCC) Internals
computations to a bank of temporary variables that are rotated at the end of loop. To
avoid the need for this rotation, the loop is then unrolled and the copies of the loop
body are rewritten to use the appropriate version of the temporary variable. This pass
is located in tree-predcom.cc and described by pass_predcom.
• Array prefetching
This pass issues prefetch instructions for array references inside loops. The pass is
located in tree-ssa-loop-prefetch.cc and described by pass_loop_prefetch.
• Reassociation
This pass rewrites arithmetic expressions to enable optimizations that operate on
them, like redundancy elimination and vectorization. The pass is located in tree-
ssa-reassoc.cc and described by pass_reassoc.
• Optimization of stdarg functions
This pass tries to avoid the saving of register arguments into the stack on entry to
stdarg functions. If the function doesn’t use any va_start macros, no registers need
to be saved. If va_start macros are used, the va_list variables don’t escape the
function, it is only necessary to save registers that will be used in va_arg macros.
For instance, if va_arg is only used with integral types in the function, floating point
registers don’t need to be saved. This pass is located in tree-stdarg.cc and described
by pass_stdarg.
copy propagation and addressing mode selection. The pass is run twice, with values
being propagated into loops only on the second run. The code is located in fwprop.cc.
• Common subexpression elimination
This pass removes redundant computation within basic blocks, and optimizes address-
ing modes based on cost. The pass is run twice. The code for this pass is located in
cse.cc.
• Global common subexpression elimination
This pass performs two different types of GCSE depending on whether you are opti-
mizing for size or not (LCM based GCSE tends to increase code size for a gain in speed,
while Morel-Renvoise based GCSE does not). When optimizing for size, GCSE is done
using Morel-Renvoise Partial Redundancy Elimination, with the exception that it does
not try to move invariants out of loops—that is left to the loop optimization pass. If
MR PRE GCSE is done, code hoisting (aka unification) is also done, as well as load
motion. If you are optimizing for speed, LCM (lazy code motion) based GCSE is done.
LCM is based on the work of Knoop, Ruthing, and Steffen. LCM based GCSE also does
loop invariant code motion. We also perform load and store motion when optimizing
for speed. Regardless of which type of GCSE is used, the GCSE pass also performs
global constant and copy propagation. The source file for this pass is gcse.cc, and the
LCM routines are in lcm.cc.
• Loop optimization
This pass performs several loop related optimizations. The source files cfgloopanal.cc
and cfgloopmanip.cc contain generic loop analysis and manipulation code. Initializa-
tion and finalization of loop structures is handled by loop-init.cc. A loop invariant
motion pass is implemented in loop-invariant.cc. Basic block level optimizations—
unrolling, and peeling loops— are implemented in loop-unroll.cc. Replacing of the
exit condition of loops by special machine-dependent instructions is handled by loop-
doloop.cc.
• Jump bypassing
This pass is an aggressive form of GCSE that transforms the control flow graph of a
function by propagating constants into conditional branch instructions. The source file
for this pass is gcse.cc.
• If conversion
This pass attempts to replace conditional branches and surrounding assignments with
arithmetic, boolean value producing comparison instructions, and conditional move
instructions. In the very last invocation after reload/LRA, it will generate predicated
instructions when supported by the target. The code is located in ifcvt.cc.
• Web construction
This pass splits independent uses of each pseudo-register. This can improve effect of
the other transformation, such as CSE or register allocation. The code for this pass is
located in web.cc.
• Instruction combination
This pass attempts to combine groups of two or three instructions that are related by
data flow into single instructions. It combines the RTL expressions for the instructions
Chapter 9: Passes and Files of the Compiler 151
by substitution, simplifies the result using algebra, and then attempts to match the
result against the machine description. The code is located in combine.cc.
• Mode switching optimization
This pass looks for instructions that require the processor to be in a specific “mode”
and minimizes the number of mode changes required to satisfy all users. What these
modes are, and what they apply to are completely target-specific. The code for this
pass is located in mode-switching.cc.
• Modulo scheduling
This pass looks at innermost loops and reorders their instructions by overlapping differ-
ent iterations. Modulo scheduling is performed immediately before instruction schedul-
ing. The code for this pass is located in modulo-sched.cc.
• Instruction scheduling
This pass looks for instructions whose output will not be available by the time that it
is used in subsequent instructions. Memory loads and floating point instructions often
have this behavior on RISC machines. It re-orders instructions within a basic block
to try to separate the definition and use of items that otherwise would cause pipeline
stalls. This pass is performed twice, before and after register allocation. The code for
this pass is located in haifa-sched.cc, sched-deps.cc, sched-ebb.cc, sched-rgn.cc
and sched-vis.c.
• Register allocation
These passes make sure that all occurrences of pseudo registers are eliminated, either
by allocating them to a hard register, replacing them by an equivalent expression (e.g.
a constant) or by placing them on the stack. This is done in several subpasses:
• The integrated register allocator (IRA). It is called integrated because coalescing,
register live range splitting, and hard register preferencing are done on-the-fly
during coloring. It also has better integration with the reload/LRA pass. Pseudo-
registers spilled by the allocator or the reload/LRA have still a chance to get
hard-registers if the reload/LRA evicts some pseudo-registers from hard-registers.
The allocator helps to choose better pseudos for spilling based on their live ranges
and to coalesce stack slots allocated for the spilled pseudo-registers. IRA is a
regional register allocator which is transformed into Chaitin-Briggs allocator if
there is one region. By default, IRA chooses regions using register pressure but
the user can force it to use one region or regions corresponding to all loops.
Source files of the allocator are ira.cc, ira-build.cc, ira-costs.cc,
ira-conflicts.cc, ira-color.cc, ira-emit.cc, ira-lives, plus header files
ira.h and ira-int.h used for the communication between the allocator and the
rest of the compiler and between the IRA files.
• Reloading. This pass renumbers pseudo registers with the hardware registers num-
bers they were allocated. Pseudo registers that did not get hard registers are re-
placed with stack slots. Then it finds instructions that are invalid because a value
has failed to end up in a register, or has ended up in a register of the wrong kind.
It fixes up these instructions by reloading the problematical values temporarily
into registers. Additional instructions are generated to do the copying.
The reload pass also optionally eliminates the frame pointer and inserts instruc-
tions to save and restore call-clobbered registers around calls.
152 GNU Compiler Collection (GCC) Internals
Source files are reload.cc and reload1.cc, plus the header reload.h used for
communication between them.
• This pass is a modern replacement of the reload pass. Source files are lra.cc,
lra-assign.c, lra-coalesce.cc, lra-constraints.cc, lra-eliminations.cc,
lra-lives.cc, lra-remat.cc, lra-spills.cc, the header lra-int.h used for
communication between them, and the header lra.h used for communication be-
tween LRA and the rest of compiler.
Unlike the reload pass, intermediate LRA decisions are reflected in RTL as much as
possible. This reduces the number of target-dependent macros and hooks, leaving
instruction constraints as the primary source of control.
LRA is run on targets for which TARGET LRA P returns true.
• Basic block reordering
This pass implements profile guided code positioning. If profile information is not avail-
able, various types of static analysis are performed to make the predictions normally
coming from the profile feedback (IE execution frequency, branch probability, etc). It
is implemented in the file bb-reorder.cc, and the various prediction routines are in
predict.cc.
• Variable tracking
This pass computes where the variables are stored at each position in code and gener-
ates notes describing the variable locations to RTL code. The location lists are then
generated according to these notes to debug information if the debugging information
format supports location lists. The code is located in var-tracking.cc.
• Delayed branch scheduling
This optional pass attempts to find instructions that can go into the delay slots of other
instructions, usually jumps and calls. The code for this pass is located in reorg.cc.
• Branch shortening
On many RISC machines, branch instructions have a limited range. Thus, longer
sequences of instructions must be used for long branches. In this pass, the compiler
figures out what how far each instruction will be from each other instruction, and
therefore whether the usual instructions, or the longer sequences, must be used for
each branch. The code for this pass is located in final.cc.
• Register-to-stack conversion
Conversion from usage of some hard registers to usage of a register stack may be done
at this point. Currently, this is supported only for the floating-point registers of the
Intel 80387 coprocessor. The code for this pass is located in reg-stack.cc.
• Final
This pass outputs the assembler code for the function. The source files are final.cc
plus insn-output.cc; the latter is generated automatically from the machine descrip-
tion by the tool genoutput. The header file conditions.h is used for communication
between these files.
• Debugging information output
This is run after final because it must output the stack slot offsets for pseudo registers
that did not get hard registers. Source files are dwarfout.c for DWARF symbol table
Chapter 9: Passes and Files of the Compiler 153
format, files dwarf2out.cc and dwarf2asm.cc for DWARF2 symbol table format, and
vmsdbgout.cc for VMS debug symbol table format.
− optimization messages
− RTL dumps
− detailed dumps
int report_flags = MSG_OPTIMIZED_LOCATIONS | TDF_RTL | TDF_DETAILS;
dump_printf_loc (report_flags, insn,
"loop turned into non-loop; it never loops.\n");
dump_basic_block
Output basic block.
dump_generic_expr
Output generic expression.
dump_gimple_stmt
Output gimple statement.
Note that the above methods also have variants prefixed with _loc, such as
dump_printf_loc, which are similar except they also output the source location
information. The _loc variants take a const dump_location_t &. This class
can be constructed from a gimple * or from a rtx_insn *, and so callers can
pass a gimple * or a rtx_insn * as the _loc argument. The dump_location_t
constructor will extract the source location from the statement or instruction,
along with the profile count, and the location in GCC’s own source code (or
the plugin) from which the dump call was emitted. Only the source location
is currently used. There is also a dump_user_location_t class, capturing the
source location and profile count, but not the dump emission location, so that
locations in the user’s code can be passed around. This can also be constructed
from a gimple * and from a rtx_insn *, and it too can be passed as the _loc
argument.
Here the two output file names vec.miss and loop.opt are in conflict since only one
output file is allowed. In this case, only the first option takes effect and the subsequent
options are ignored. Thus only the vec.miss is produced which containts dumps from the
vectorizer about missed opportunities.
157
The header file poly-int-types.h provides typedefs for the most common forms of
poly_int, all having NUM_POLY_INT_COEFFS coefficients:
poly_uint16
a ‘poly_int’ with unsigned short coefficients.
poly_int64
a ‘poly_int’ with HOST_WIDE_INT coefficients.
poly_uint64
a ‘poly_int’ with unsigned HOST_WIDE_INT coefficients.
poly_offset_int
a ‘poly_int’ with offset_int coefficients.
poly_wide_int
a ‘poly_int’ with wide_int coefficients.
poly_widest_int
a ‘poly_int’ with widest_int coefficients.
Since the main purpose of poly_int is to represent sizes and offsets, the last two typedefs
are only rarely used.
p1 + p2
p1 + c2
c1 + p2
p1 - p2
p1 - c2
c1 - p2
c1 * p2
p1 * c2
p1 << c2
p1 += p2
p1 += c2
p1 -= p2
p1 -= c2
p1 *= c2
p1 <<= c2
These arithmetic operations handle integer ranks in a similar way to C++. The main
difference is that every coefficient narrower than HOST_WIDE_INT promotes to HOST_WIDE_
INT, whereas in C++ everything narrower than int promotes to int. For example:
poly_uint16 + int -> poly_int64
unsigned int + poly_uint16 -> poly_int64
164 GNU Compiler Collection (GCC) Internals
‘value.to_uhwi (&p2)’
Return true if ‘poly_int<N, T>’ value can be represented without loss of pre-
cision as a ‘poly_int<N, unsigned HOST_WIDE_INT>’, storing it in that form
in p2 if so.
‘value.force_shwi ()’
Forcibly convert each coefficient of ‘poly_int<N, T>’ value to HOST_WIDE_INT,
truncating any that are out of range. Return the result as a ‘poly_int<N,
HOST_WIDE_INT>’.
‘value.force_uhwi ()’
Forcibly convert each coefficient of ‘poly_int<N, T>’ value to unsigned
HOST_WIDE_INT, truncating any that are out of range. Return the result as a
‘poly_int<N, unsigned HOST_WIDE_INT>’.
‘wi::shwi (value, precision)’
Return a poly_int with the same value as value, but with the coefficients
converted from HOST_WIDE_INT to wide_int. precision specifies the precision of
the wide_int cofficients; if this is wider than a HOST_WIDE_INT, the coefficients
of value will be sign-extended to fit.
‘wi::uhwi (value, precision)’
Like wi::shwi, except that value has coefficients of type unsigned HOST_WIDE_
INT. If precision is wider than a HOST_WIDE_INT, the coefficients of value will
be zero-extended to fit.
‘wi::sext (value, precision)’
Return a poly_int of the same type as value, sign-extending every coefficient
from the low precision bits. This in effect applies wi::sext to each coefficient
individually.
‘wi::zext (value, precision)’
Like wi::sext, but for zero extension.
‘poly_wide_int::from (value, precision, sign)’
Convert value to a poly_wide_int in which each coefficient has precision bits.
Extend the coefficients according to sign if the coefficients have fewer bits.
‘poly_offset_int::from (value, sign)’
Convert value to a poly_offset_int, extending its coefficients according to
sign if they have fewer bits than offset_int.
‘poly_widest_int::from (value, sign)’
Convert value to a poly_widest_int, extending its coefficients according to
sign if they have fewer bits than widest_int.
example, if some work is divided into an analysis phase and an implementation phase, the
analysis phase might reject inputs that are not is_constant, in which case the implementa-
tion phase can reasonably use to_constant on the remaining inputs. The assertions should
not be used to discover whether a condition ever occurs “in the field”; in other words,
they should not be used to restrict code to constants at first, with the intention of only
implementing a poly_int version if a user hits the assertion.
If a particular asserting function like to_constant is needed more than once for the same
reason, it is probably worth adding a helper function or macro for that situation, so that
the justification only needs to be given once. For example:
/* Return the size of an element in a vector of size SIZE, given that
the vector has NELTS elements. The return value is in the same units
as SIZE (either bits or bytes).
11 GENERIC
The purpose of GENERIC is simply to provide a language-independent way of representing
an entire function in trees. To this end, it was necessary to add a few new tree codes to the
back end, but almost everything was already there. If you can express it with the codes in
gcc/tree.def, it’s GENERIC.
Early on, there was a great deal of debate about how to think about statements in a
tree IL. In GENERIC, a statement is defined as any expression whose value, if any, is
ignored. A statement will always have TREE_SIDE_EFFECTS set (or it will be discarded),
but a non-statement expression may also have side effects. A CALL_EXPR, for instance.
It would be possible for some local optimizations to work on the GENERIC form of a
function; indeed, the adapted tree inliner works fine on GENERIC, but the current compiler
performs inlining after lowering to GIMPLE (a restricted form described in the next section).
Indeed, currently the frontends perform this lowering before handing off to tree_rest_of_
compilation, but this seems inelegant.
11.1 Deficiencies
There are many places in which this document is incomplet and incorrekt. It is, as of yet,
only preliminary documentation.
11.2 Overview
The central data structure used by the internal representation is the tree. These nodes,
while all of the C type tree, are of many varieties. A tree is a pointer type, but the object
to which it points may be of a variety of types. From this point forward, we will refer to
trees in ordinary type, rather than in this font, except when talking about the actual C
type tree.
You can tell what kind of node a particular tree is by using the TREE_CODE macro. Many,
many macros take trees as input and return trees as output. However, most macros require
a certain kind of tree node as input. In other words, there is a type-system for trees, but it
is not reflected in the C type-system.
For safety, it is useful to configure GCC with --enable-checking. Although this results
in a significant performance penalty (since all tree types are checked at run-time), and is
therefore inappropriate in a release version, it is extremely helpful during the development
process.
Many macros behave as predicates. Many, although not all, of these predicates end in
‘_P’. Do not rely on the result type of these macros being of any particular type. You may,
however, rely on the fact that the type can be compared to 0, so that statements like
if (TEST_P (t) && !TEST_P (y))
x = 1;
and
int i = (TEST_P (t) != 0);
are legal. Macros that return int values now may be changed to return tree values, or
other pointers in the future. Even those that continue to return int may return multiple
172 GNU Compiler Collection (GCC) Internals
nonzero codes where previously they returned only zero and one. Therefore, you should not
write code like
if (TEST_P (t) == 1)
as this code is not guaranteed to work correctly in the future.
You should not take the address of values returned by the macros or functions described
here. In particular, no guarantee is given that the values are lvalues.
In general, the names of macros are all in uppercase, while the names of functions are
entirely in lowercase. There are rare exceptions to this rule. You should assume that any
macro or function whose name is made up entirely of uppercase letters may evaluate its
arguments more than once. You may assume that a macro or function whose name is made
up entirely of lowercase letters will evaluate its arguments only once.
The error_mark_node is a special tree. Its tree code is ERROR_MARK, but since there is
only ever one node with that code, the usual practice is to compare the tree against error_
mark_node. (This test is just a test for pointer equality.) If an error has occurred during
front-end processing the flag errorcount will be set. If the front end has encountered code
it cannot handle, it will issue a message to the user and set sorrycount. When these
flags are set, any macro or function which normally returns a tree of a particular kind may
instead return the error_mark_node. Thus, if you intend to do any processing of erroneous
code, you must be prepared to deal with the error_mark_node.
Occasionally, a particular tree slot (like an operand to an expression, or a particular field
in a declaration) will be referred to as “reserved for the back end”. These slots are used to
store RTL when the tree is converted to RTL for use by the GCC back end. However, if
that process is not taking place (e.g., if the front end is being hooked up to an intelligent
editor), then those slots may be used by the back end presently in use.
If you encounter situations that do not match this documentation, such as tree nodes of
types not mentioned here, or macros documented to return entities of a particular kind that
instead return entities of some different kind, you have found a bug, either in the front end
or in the documentation. Please report these bugs as you would any other bug.
11.2.1 Trees
All GENERIC trees have two fields in common. First, TREE_CHAIN is a pointer that can be
used as a singly-linked list to other trees. The other is TREE_TYPE. Many trees store the
type of an expression or declaration in this field.
These are some other functions for handling trees:
tree_size
Return the number of bytes a tree takes.
build0
build1
build2
build3
build4
build5
build6
Chapter 11: GENERIC 173
These functions build a tree and supply values to put in each parameter. The
basic signature is ‘code, type, [operands]’. code is the TREE_CODE, and type
is a tree representing the TREE_TYPE. These are followed by the operands, each
of which is also a tree.
11.2.2 Identifiers
An IDENTIFIER_NODE represents a slightly more general concept than the standard C or
C++ concept of identifier. In particular, an IDENTIFIER_NODE may contain a ‘$’, or other
extraordinary characters.
There are never two distinct IDENTIFIER_NODEs representing the same identifier. There-
fore, you may use pointer equality to compare IDENTIFIER_NODEs, rather than using a
routine like strcmp. Use get_identifier to obtain the unique IDENTIFIER_NODE for a
supplied string.
You can use the following macros to access identifiers:
IDENTIFIER_POINTER
The string represented by the identifier, represented as a char*. This string is
always NUL-terminated, and contains no embedded NUL characters.
IDENTIFIER_LENGTH
The length of the string returned by IDENTIFIER_POINTER, not including the
trailing NUL. This value of IDENTIFIER_LENGTH (x) is always the same as
strlen (IDENTIFIER_POINTER (x)).
IDENTIFIER_OPNAME_P
This predicate holds if the identifier represents the name of an overloaded
operator. In this case, you should not depend on the contents of either the
IDENTIFIER_POINTER or the IDENTIFIER_LENGTH.
IDENTIFIER_TYPENAME_P
This predicate holds if the identifier represents the name of a user-defined con-
version operator. In this case, the TREE_TYPE of the IDENTIFIER_NODE holds
the type to which the conversion operator converts.
11.2.3 Containers
Two common container data structures can be represented directly with tree nodes. A
TREE_LIST is a singly linked list containing two trees per node. These are the TREE_
PURPOSE and TREE_VALUE of each node. (Often, the TREE_PURPOSE contains some kind of
tag, or additional information, while the TREE_VALUE contains the majority of the payload.
In other cases, the TREE_PURPOSE is simply NULL_TREE, while in still others both the TREE_
PURPOSE and TREE_VALUE are of equal stature.) Given one TREE_LIST node, the next node
is found by following the TREE_CHAIN. If the TREE_CHAIN is NULL_TREE, then you have
reached the end of the list.
A TREE_VEC is a simple vector. The TREE_VEC_LENGTH is an integer (not a tree) giving the
number of nodes in the vector. The nodes themselves are accessed using the TREE_VEC_ELT
macro, which takes two arguments. The first is the TREE_VEC in question; the second is an
integer indicating which element in the vector is desired. The elements are indexed from
zero.
174 GNU Compiler Collection (GCC) Internals
11.3 Types
All types have corresponding tree nodes. However, you should not assume that there is
exactly one tree node corresponding to each type. There are often multiple nodes corre-
sponding to the same type.
For the most part, different kinds of types have different tree codes. (For example, pointer
types use a POINTER_TYPE code while arrays use an ARRAY_TYPE code.) However, pointers to
member functions use the RECORD_TYPE code. Therefore, when writing a switch statement
that depends on the code associated with a particular type, you should take care to handle
pointers to member functions under the RECORD_TYPE case label.
The following functions and macros deal with cv-qualification of types:
TYPE_MAIN_VARIANT
This macro returns the unqualified version of a type. It may be applied to an
unqualified type, but it is not always the identity function in that case.
A few other macros and functions are usable with all types:
TYPE_SIZE
The number of bits required to represent the type, represented as an INTEGER_
CST. For an incomplete type, TYPE_SIZE will be NULL_TREE.
TYPE_ALIGN
The alignment of the type, in bits, represented as an int.
TYPE_NAME
This macro returns a declaration (in the form of a TYPE_DECL) for the type.
(Note this macro does not return an IDENTIFIER_NODE, as you might expect,
given its name!) You can look at the DECL_NAME of the TYPE_DECL to obtain
the actual name of the type. The TYPE_NAME will be NULL_TREE for a type that
is not a built-in type, the result of a typedef, or a named class type.
TYPE_CANONICAL
This macro returns the “canonical” type for the given type node. Canonical
types are used to improve performance in the C++ and Objective-C++ front
ends by allowing efficient comparison between two type nodes in same_type_p:
if the TYPE_CANONICAL values of the types are equal, the types are equivalent;
otherwise, the types are not equivalent. The notion of equivalence for canonical
types is the same as the notion of type equivalence in the language itself. For
instance,
When TYPE_CANONICAL is NULL_TREE, there is no canonical type for the given
type node. In this case, comparison between this type and any other type
requires the compiler to perform a deep, “structural” comparison to see if the
two type nodes have the same form and properties.
The canonical type for a node is always the most fundamental type in the
equivalence class of types. For instance, int is its own canonical type. A
typedef I of int will have int as its canonical type. Similarly, I* and a typedef
IP (defined to I*) will has int* as their canonical type. When building a new
type node, be sure to set TYPE_CANONICAL to the appropriate canonical type.
If the new type is a compound type (built from other types), and any of those
Chapter 11: GENERIC 175
TYPE_STRUCTURAL_EQUALITY_P
This predicate holds when the node requires structural equality checks, e.g.,
when TYPE_CANONICAL is NULL_TREE.
SET_TYPE_STRUCTURAL_EQUALITY
This macro states that the type node it is given requires structural equality
checks, e.g., it sets TYPE_CANONICAL to NULL_TREE.
same_type_p
This predicate takes two types as input, and holds if they are the same type.
For example, if one type is a typedef for the other, or both are typedefs
for the same type. This predicate also holds if the two trees given as input
are simply copies of one another; i.e., there is no difference between them at
the source level, but, for whatever reason, a duplicate has been made in the
representation. You should never use == (pointer equality) to compare types;
always use same_type_p instead.
Detailed below are the various kinds of types, and the macros that can be used to access
them. Although other kinds of types are used elsewhere in G++, the types described here
are the only ones that you will encounter while examining the intermediate representation.
VOID_TYPE
Used to represent the void type.
INTEGER_TYPE
Used to represent the various integral types, including char, short, int, long,
and long long. This code is not used for enumeration types, nor for the bool
type. The TYPE_PRECISION is the number of bits used in the representation,
represented as an unsigned int. (Note that in the general case this is not
the same value as TYPE_SIZE; suppose that there were a 24-bit integer type,
but that alignment requirements for the ABI required 32-bit alignment. Then,
TYPE_SIZE would be an INTEGER_CST for 32, while TYPE_PRECISION would be
24.) The integer type is unsigned if TYPE_UNSIGNED holds; otherwise, it is
signed.
The TYPE_MIN_VALUE is an INTEGER_CST for the smallest integer that may be
represented by this type. Similarly, the TYPE_MAX_VALUE is an INTEGER_CST for
the largest integer that may be represented by this type.
176 GNU Compiler Collection (GCC) Internals
REAL_TYPE
Used to represent the float, double, and long double types. The number of
bits in the floating-point representation is given by TYPE_PRECISION, as in the
INTEGER_TYPE case.
FIXED_POINT_TYPE
Used to represent the short _Fract, _Fract, long _Fract, long long _Fract,
short _Accum, _Accum, long _Accum, and long long _Accum types. The num-
ber of bits in the fixed-point representation is given by TYPE_PRECISION, as in
the INTEGER_TYPE case. There may be padding bits, fractional bits and integral
bits. The number of fractional bits is given by TYPE_FBIT, and the number of
integral bits is given by TYPE_IBIT. The fixed-point type is unsigned if TYPE_
UNSIGNED holds; otherwise, it is signed. The fixed-point type is saturating if
TYPE_SATURATING holds; otherwise, it is not saturating.
COMPLEX_TYPE
Used to represent GCC built-in __complex__ data types. The TREE_TYPE is
the type of the real and imaginary parts.
ENUMERAL_TYPE
Used to represent an enumeration type. The TYPE_PRECISION gives (as an
int), the number of bits used to represent the type. If there are no negative
enumeration constants, TYPE_UNSIGNED will hold. The minimum and maximum
enumeration constants may be obtained with TYPE_MIN_VALUE and TYPE_MAX_
VALUE, respectively; each of these macros returns an INTEGER_CST.
The actual enumeration constants themselves may be obtained by looking at
the TYPE_VALUES. This macro will return a TREE_LIST, containing the con-
stants. The TREE_PURPOSE of each node will be an IDENTIFIER_NODE giving
the name of the constant; the TREE_VALUE will be an INTEGER_CST giving the
value assigned to that constant. These constants will appear in the order in
which they were declared. The TREE_TYPE of each of these constants will be
the type of enumeration type itself.
OPAQUE_TYPE
Used for things that have a MODE_OPAQUE mode class in the backend. Opaque
types have a size and precision, and can be held in memory or registers. They
are used when we do not want the compiler to make assumptions about the
availability of other operations as would happen with integer types.
BOOLEAN_TYPE
Used to represent the bool type.
POINTER_TYPE
Used to represent pointer types, and pointer to data member types. The TREE_
TYPE gives the type to which this type points.
REFERENCE_TYPE
Used to represent reference types. The TREE_TYPE gives the type to which this
type refers.
Chapter 11: GENERIC 177
FUNCTION_TYPE
Used to represent the type of non-member functions and of static member
functions. The TREE_TYPE gives the return type of the function. The TYPE_
ARG_TYPES are a TREE_LIST of the argument types. The TREE_VALUE of each
node in this list is the type of the corresponding argument; the TREE_PURPOSE is
an expression for the default argument value, if any. If the last node in the list
is void_list_node (a TREE_LIST node whose TREE_VALUE is the void_type_
node), then functions of this type do not take variable arguments. Otherwise,
they do take a variable number of arguments.
Note that in C (but not in C++) a function declared like void f() is an unpro-
totyped function taking a variable number of arguments; the TYPE_ARG_TYPES
of such a function will be NULL.
METHOD_TYPE
Used to represent the type of a non-static member function. Like a FUNCTION_
TYPE, the return type is given by the TREE_TYPE. The type of *this, i.e., the
class of which functions of this type are a member, is given by the TYPE_METHOD_
BASETYPE. The TYPE_ARG_TYPES is the parameter list, as for a FUNCTION_TYPE,
and includes the this argument.
ARRAY_TYPE
Used to represent array types. The TREE_TYPE gives the type of the elements
in the array. If the array-bound is present in the type, the TYPE_DOMAIN is an
INTEGER_TYPE whose TYPE_MIN_VALUE and TYPE_MAX_VALUE will be the lower
and upper bounds of the array, respectively. The TYPE_MIN_VALUE will always
be an INTEGER_CST for zero, while the TYPE_MAX_VALUE will be one less than
the number of elements in the array, i.e., the highest value which may be used
to index an element in the array.
RECORD_TYPE
Used to represent struct and class types, as well as pointers to member
functions and similar constructs in other languages. TYPE_FIELDS contains the
items contained in this type, each of which can be a FIELD_DECL, VAR_DECL,
CONST_DECL, or TYPE_DECL. You may not make any assumptions about the
ordering of the fields in the type or whether one or more of them overlap.
UNION_TYPE
Used to represent union types. Similar to RECORD_TYPE except that all FIELD_
DECL nodes in TYPE_FIELD start at bit position zero.
QUAL_UNION_TYPE
Used to represent part of a variant record in Ada. Similar to UNION_TYPE except
that each FIELD_DECL has a DECL_QUALIFIER field, which contains a boolean
expression that indicates whether the field is present in the object. The type
will only have one field, so each field’s DECL_QUALIFIER is only evaluated if none
of the expressions in the previous fields in TYPE_FIELDS are nonzero. Normally
these expressions will reference a field in the outer object using a PLACEHOLDER_
EXPR.
178 GNU Compiler Collection (GCC) Internals
LANG_TYPE
This node is used to represent a language-specific type. The front end must
handle it.
OFFSET_TYPE
This node is used to represent a pointer-to-data member. For a data member
X::m the TYPE_OFFSET_BASETYPE is X and the TREE_TYPE is the type of m.
There are variables whose values represent some of the basic types. These include:
void_type_node
A node for void.
integer_type_node
A node for int.
unsigned_type_node.
A node for unsigned int.
char_type_node.
A node for char.
It may sometimes be useful to compare one of these variables with a type in hand, using
same_type_p.
11.4 Declarations
This section covers the various kinds of declarations that appear in the internal represen-
tation, except for declarations of functions (represented by FUNCTION_DECL nodes), which
are described in Section 11.8 [Functions], page 204.
LABEL_DECL
These nodes are used to represent labels in function bodies. For more informa-
tion, see Section 11.8 [Functions], page 204. These nodes only appear in block
scopes.
CONST_DECL
These nodes are used to represent enumeration constants. The value of the
constant is given by DECL_INITIAL which will be an INTEGER_CST with the
same type as the TREE_TYPE of the CONST_DECL, i.e., an ENUMERAL_TYPE.
RESULT_DECL
These nodes represent the value returned by a function. When a value is as-
signed to a RESULT_DECL, that indicates that the value should be returned, via
bitwise copy, by the function. You can use DECL_SIZE and DECL_ALIGN on a
RESULT_DECL, just as with a VAR_DECL.
TYPE_DECL
These nodes represent typedef declarations. The TREE_TYPE is the type de-
clared to have the name given by DECL_NAME. In some cases, there is no asso-
ciated name.
VAR_DECL These nodes represent variables with namespace or block scope, as well as static
data members. The DECL_SIZE and DECL_ALIGN are analogous to TYPE_SIZE
and TYPE_ALIGN. For a declaration, you should always use the DECL_SIZE and
DECL_ALIGN rather than the TYPE_SIZE and TYPE_ALIGN given by the TREE_
TYPE, since special attributes may have been applied to the variable to give it a
particular size and alignment. You may use the predicates DECL_THIS_STATIC
or DECL_THIS_EXTERN to test whether the storage class specifiers static or
extern were used to declare a variable.
If this variable is initialized (but does not require a constructor), the DECL_
INITIAL will be an expression for the initializer. The initializer should be
evaluated, and a bitwise copy into the variable performed. If the DECL_INITIAL
is the error_mark_node, there is an initializer, but it is given by an explicit
statement later in the code; no bitwise copy is required.
GCC provides an extension that allows either automatic variables, or global
variables, to be placed in particular registers. This extension is being used for
a particular VAR_DECL if DECL_REGISTER holds for the VAR_DECL, and if DECL_
ASSEMBLER_NAME is not equal to DECL_NAME. In that case, DECL_ASSEMBLER_
NAME is the name of the register into which the variable will be placed.
180 GNU Compiler Collection (GCC) Internals
PARM_DECL
Used to represent a parameter to a function. Treat these nodes similarly to VAR_
DECL nodes. These nodes only appear in the DECL_ARGUMENTS for a FUNCTION_
DECL.
The DECL_ARG_TYPE for a PARM_DECL is the type that will actually be used when
a value is passed to this function. It may be a wider type than the TREE_TYPE
of the parameter; for example, the ordinary type might be short while the
DECL_ARG_TYPE is int.
DEBUG_EXPR_DECL
Used to represent an anonymous debug-information temporary created to hold
an expression as it is optimized away, so that its value can be referenced in
debug bind statements.
FIELD_DECL
These nodes represent non-static data members. The DECL_SIZE and DECL_
ALIGN behave as for VAR_DECL nodes. The position of the field within the
parent record is specified by a combination of three attributes. DECL_FIELD_
OFFSET is the position, counting in bytes, of the DECL_OFFSET_ALIGN-bit sized
word containing the bit of the field closest to the beginning of the structure.
DECL_FIELD_BIT_OFFSET is the bit offset of the first bit of the field within this
word; this may be nonzero even for fields that are not bit-fields, since DECL_
OFFSET_ALIGN may be greater than the natural alignment of the field’s type.
If DECL_C_BIT_FIELD holds, this field is a bit-field. In a bit-field, DECL_BIT_
FIELD_TYPE also contains the type that was originally specified for it, while
DECL TYPE may be a modified type with lesser precision, according to the
size of the bit field.
NAMESPACE_DECL
Namespaces provide a name hierarchy for other declarations. They appear in
the DECL_CONTEXT of other _DECL nodes.
struct tree_label_decl
This structure inherits from struct tree_decl_common. It is used to represent
LABEL_DECL.
struct tree_translation_unit_decl
This structure inherits from struct tree_decl_common. It is used to represent
TRANSLATION_UNIT_DECL.
struct tree_decl_with_rtl
This structure inherits from struct tree_decl_common. It contains a field to
store the low-level RTL associated with a DECL node.
struct tree_result_decl
This structure inherits from struct tree_decl_with_rtl. It is used to repre-
sent RESULT_DECL.
struct tree_const_decl
This structure inherits from struct tree_decl_with_rtl. It is used to repre-
sent CONST_DECL.
struct tree_parm_decl
This structure inherits from struct tree_decl_with_rtl. It is used to repre-
sent PARM_DECL.
struct tree_decl_with_vis
This structure inherits from struct tree_decl_with_rtl. It contains fields
necessary to store visibility information, as well as a section name and assembler
name.
struct tree_var_decl
This structure inherits from struct tree_decl_with_vis. It is used to repre-
sent VAR_DECL.
struct tree_function_decl
This structure inherits from struct tree_decl_with_vis. It is used to repre-
sent FUNCTION_DECL.
Would create a structure name tree_foo_decl that inherits from struct tree_
decl_with_vis.
For language specific DECL nodes, this new structure type should go in the ap-
propriate .h file. For DECL nodes that are part of the middle-end, the structure
type should go in tree.h.
Add a member to the tree structure enumerator for the node
For garbage collection and dynamic checking purposes, each DECL node struc-
ture type is required to have a unique enumerator value specified with it. For
language specific DECL nodes, this new enumerator value should go in the appro-
priate .def file. For DECL nodes that are part of the middle-end, the enumerator
values are specified in treestruct.def.
Update union tree_node
In order to make your new structure type usable, it must be added to union
tree_node. For language specific DECL nodes, a new entry should be added to
the appropriate .h file of the form
struct tree_foo_decl GTY ((tag ("TS_VAR_DECL"))) foo_decl;
For DECL nodes that are part of the middle-end, the additional member goes
directly into union tree_node in tree.h.
Update dynamic checking info
In order to be able to check whether accessing a named portion of union tree_
node is legal, and whether a certain DECL node contains one of the enumerated
DECL node structures in the hierarchy, a simple lookup table is used. This
lookup table needs to be kept up to date with the tree structure hierarchy, or
else checking and containment macros will fail inappropriately.
For language specific DECL nodes, there is an init_ts function in an appropriate
.c file, which initializes the lookup table. Code setting up the table for new DECL
nodes should be added there. For each DECL tree code and enumerator value
representing a member of the inheritance hierarchy, the table should contain
1 if that tree code inherits (directly or indirectly) from that member. Thus,
a FOO_DECL node derived from struct decl_with_rtl, and enumerator value
TS_FOO_DECL, would be set up as follows
tree_contains_struct[FOO_DECL][TS_FOO_DECL] = 1;
tree_contains_struct[FOO_DECL][TS_DECL_WRTL] = 1;
tree_contains_struct[FOO_DECL][TS_DECL_COMMON] = 1;
tree_contains_struct[FOO_DECL][TS_DECL_MINIMAL] = 1;
For DECL nodes that are part of the middle-end, the setup code goes into
tree.cc.
Add macros to access any new fields and flags
Each added field or flag should have a macro that is used to access it, that
performs appropriate checking to ensure only the right type of DECL nodes
access the field.
These macros generally take the following form
#define FOO_DECL_FIELDNAME(NODE) FOO_DECL_CHECK(NODE)->foo_decl.fieldname
However, if the structure is simply a base class for further structures, something
like the following should be used
Chapter 11: GENERIC 183
11.6 Expressions
The internal representation for expressions is for the most part quite straightforward. How-
ever, there are a few facts that one must bear in mind. In particular, the expression “tree”
is actually a directed acyclic graph. (For example there may be many references to the
integer constant zero throughout the source program; many of these will be represented by
the same expression node.) You should not rely on certain kinds of node being shared, nor
should you rely on certain kinds of nodes being unshared.
The following macros can be used with all expression nodes:
TREE_TYPE
Returns the type of the expression. This value may not be precisely the same
type that would be given the expression in the original program.
In what follows, some nodes that one might expect to always have type bool are docu-
mented to have either integral or boolean type. At some point in the future, the C front
end may also make use of this same intermediate representation, and at this point these
nodes will certainly have integral type. The previous sentence is not meant to imply that
the C++ front end does not or will not give these nodes integral type.
Below, we list the various kinds of expression nodes. Except where noted otherwise, the
operands to an expression are accessed using the TREE_OPERAND macro. For example, to
access the first operand to a binary plus expression expr, use:
TREE_OPERAND (expr, 0)
As this example indicates, the operands are zero-indexed.
184 GNU Compiler Collection (GCC) Internals
ARRAY_RANGE_REF
These nodes represent access to a range (or “slice”) of an array. The operands
are the same as that for ARRAY_REF and have the same meanings. The type of
these expressions must be an array whose component type is the same as that
of the first operand. The range of that array type determines the amount of
data these expressions access.
COMPONENT_REF
These nodes represent non-static data member accesses. The first operand is
the object (rather than a pointer to it); the second operand is the FIELD_DECL
for the data member. The third operand represents the byte offset of the field,
but should not be used directly; call component_ref_field_offset instead.
ADDR_EXPR
These nodes are used to represent the address of an object. (These expres-
sions will always have pointer or reference type.) The operand may be another
expression, or it may be a declaration.
As an extension, GCC allows users to take the address of a label. In this case,
the operand of the ADDR_EXPR will be a LABEL_DECL. The type of such an
expression is void*.
If the object addressed is not an lvalue, a temporary is created, and the address
of the temporary is used.
INDIRECT_REF
These nodes are used to represent the object pointed to by a pointer. The
operand is the pointer being dereferenced; it will always have pointer or refer-
ence type.
MEM_REF These nodes are used to represent the object pointed to by a pointer offset by a
constant. The first operand is the pointer being dereferenced; it will always have
pointer or reference type. The second operand is a pointer constant serving as
constant offset applied to the pointer being dereferenced with its type specifying
the type to be used for type-based alias analysis. The type of the node specifies
the alignment of the access.
Chapter 11: GENERIC 187
TARGET_MEM_REF
These nodes represent memory accesses whose address directly map to an ad-
dressing mode of the target architecture. The first argument is TMR_BASE and
is a pointer to the object being accessed. The second argument is TMR_OFFSET
which is a pointer constant with dual purpose serving both as constant offset
and holder of the type used for type-based alias analysis. The first two operands
have exactly the same semantics as MEM_REF. The third and fourth operand are
TMR_INDEX and TMR_STEP where the former is an integer and the latter an in-
teger constant. The fifth and last operand is TMR_INDEX2 which is an alternate
non-constant offset. Any of the third to last operands may be NULL if the
corresponding component does not appear in the address, but TMR_INDEX and
TMR_STEP shall be always supplied in pair. The Address of the TARGET_MEM_REF
is determined in the following way.
TMR_BASE + TMR_OFFSET + TMR_INDEX * TMR_STEP + TMR_INDEX2
ABS_EXPR These nodes represent the absolute value of the single operand, for both integer
and floating-point types. This is typically used to implement the abs, labs and
llabs builtins for integer types, and the fabs, fabsf and fabsl builtins for
floating point types. The type of abs operation can be determined by looking
at the type of the expression.
This node is not used for complex types. To represent the modulus or complex
abs of a complex value, use the BUILT_IN_CABS, BUILT_IN_CABSF or BUILT_IN_
CABSL builtins, as used to implement the C99 cabs, cabsf and cabsl built-in
functions.
ABSU_EXPR
These nodes represent the absolute value of the single operand in equivalent
unsigned type such that ABSU_EXPR of TYPE_MIN is well defined.
BIT_NOT_EXPR
These nodes represent bitwise complement, and will always have integral type.
The only operand is the value to be complemented.
TRUTH_NOT_EXPR
These nodes represent logical negation, and will always have integral (or
boolean) type. The operand is the value being negated. The type of the
operand and that of the result are always of BOOLEAN_TYPE or INTEGER_TYPE.
188 GNU Compiler Collection (GCC) Internals
PREDECREMENT_EXPR
PREINCREMENT_EXPR
POSTDECREMENT_EXPR
POSTINCREMENT_EXPR
These nodes represent increment and decrement expressions. The value of the
single operand is computed, and the operand incremented or decremented. In
the case of PREDECREMENT_EXPR and PREINCREMENT_EXPR, the value of the ex-
pression is the value resulting after the increment or decrement; in the case of
POSTDECREMENT_EXPR and POSTINCREMENT_EXPR is the value before the incre-
ment or decrement occurs. The type of the operand, like that of the result, will
be either integral, boolean, or floating-point.
FIX_TRUNC_EXPR
These nodes represent conversion of a floating-point value to an integer. The
single operand will have a floating-point type, while the complete expression
will have an integral (or boolean) type. The operand is rounded towards zero.
FLOAT_EXPR
These nodes represent conversion of an integral (or boolean) value to a floating-
point value. The single operand will have integral type, while the complete
expression will have a floating-point type.
FIXME: How is the operand supposed to be rounded? Is this dependent on
-mieee?
COMPLEX_EXPR
These nodes are used to represent complex numbers constructed from two ex-
pressions of the same (integer or real) type. The first operand is the real part
and the second operand is the imaginary part.
CONJ_EXPR
These nodes represent the conjugate of their operand.
REALPART_EXPR
IMAGPART_EXPR
These nodes represent respectively the real and the imaginary parts of complex
numbers (their sole argument).
NON_LVALUE_EXPR
These nodes indicate that their one and only operand is not an lvalue. A back
end can treat these identically to the single operand.
NOP_EXPR These nodes are used to represent conversions that do not require any code-
generation. For example, conversion of a char* to an int* does not require any
code be generated; such a conversion is represented by a NOP_EXPR. The single
operand is the expression to be converted. The conversion from a pointer to a
reference is also represented with a NOP_EXPR.
CONVERT_EXPR
These nodes are similar to NOP_EXPRs, but are used in those situations where
code may need to be generated. For example, if an int* is converted to an
int code may need to be generated on some platforms. These nodes are never
Chapter 11: GENERIC 189
POINTER_DIFF_EXPR
This node represents pointer subtraction. The two operands always have
pointer/reference type. It returns a signed integer of the same precision as the
pointers. The behavior is undefined if the difference of the two pointers, seen
as infinite precision non-negative integers, does not fit in the result type. The
result does not depend on the pointer type, it is not divided by the size of the
pointed-to type.
PLUS_EXPR
MINUS_EXPR
MULT_EXPR
These nodes represent various binary arithmetic operations. Respectively, these
operations are addition, subtraction (of the second operand from the first) and
multiplication. Their operands may have either integral or floating type, but
there will never be case in which one operand is of floating type and the other
is of integral type.
The behavior of these operations on signed arithmetic overflow is controlled by
the flag_wrapv and flag_trapv variables.
WIDEN_MULT_EXPR
This node represents a widening multiplication. The operands have integral
types with same b bits of precision, producing an integral type result with
at least 2b bits of precision. The behaviour is equivalent to extending both
operands, possibly of different signedness, to the result type, then multiplying
them.
MULT_HIGHPART_EXPR
This node represents the “high-part” of a widening multiplication. For an
integral type with b bits of precision, the result is the most significant b bits
of the full 2b product. Both operands must have the same precision and same
signedness.
RDIV_EXPR
This node represents a floating point division operation.
TRUNC_DIV_EXPR
FLOOR_DIV_EXPR
CEIL_DIV_EXPR
ROUND_DIV_EXPR
These nodes represent integer division operations that return an integer result.
TRUNC_DIV_EXPR rounds towards zero, FLOOR_DIV_EXPR rounds towards nega-
tive infinity, CEIL_DIV_EXPR rounds towards positive infinity and ROUND_DIV_
EXPR rounds to the closest integer. Integer division in C and C++ is truncating,
i.e. TRUNC_DIV_EXPR.
The behavior of these operations on signed arithmetic overflow, when dividing
the minimum signed integer by minus one, is controlled by the flag_wrapv and
flag_trapv variables.
Chapter 11: GENERIC 191
TRUNC_MOD_EXPR
FLOOR_MOD_EXPR
CEIL_MOD_EXPR
ROUND_MOD_EXPR
These nodes represent the integer remainder or modulus operation. The integer
modulus of two operands a and b is defined as a - (a/b)*b where the division
calculated using the corresponding division operator. Hence for TRUNC_MOD_
EXPR this definition assumes division using truncation towards zero, i.e. TRUNC_
DIV_EXPR. Integer remainder in C and C++ uses truncating division, i.e. TRUNC_
MOD_EXPR.
EXACT_DIV_EXPR
The EXACT_DIV_EXPR code is used to represent integer divisions where the nu-
merator is known to be an exact multiple of the denominator. This allows the
backend to choose between the faster of TRUNC_DIV_EXPR, CEIL_DIV_EXPR and
FLOOR_DIV_EXPR for the current target.
LT_EXPR
LE_EXPR
GT_EXPR
GE_EXPR
LTGT_EXPR
EQ_EXPR
NE_EXPR These nodes represent the less than, less than or equal to, greater than, greater
than or equal to, less or greater than, equal, and not equal comparison opera-
tors. The first and second operands will either be both of integral type, both of
floating type or both of vector type, except for LTGT EXPR where they will
only be both of floating type. The result type of these expressions will always
be of integral, boolean or signed integral vector type. These operations return
the result type’s zero value for false, the result type’s one value for true, and a
vector whose elements are zero (false) or minus one (true) for vectors.
For floating point comparisons, if we honor IEEE NaNs and either operand is
NaN, then NE_EXPR always returns true and the remaining operators always
return false. On some targets, comparisons against an IEEE NaN, other than
equality and inequality, may generate a floating-point exception.
ORDERED_EXPR
UNORDERED_EXPR
These nodes represent non-trapping ordered and unordered comparison opera-
tors. These operations take two floating point operands and determine whether
they are ordered or unordered relative to each other. If either operand is an
IEEE NaN, their comparison is defined to be unordered, otherwise the compar-
ison is defined to be ordered. The result type of these expressions will always
be of integral or boolean type. These operations return the result type’s zero
value for false, and the result type’s one value for true.
192 GNU Compiler Collection (GCC) Internals
UNLT_EXPR
UNLE_EXPR
UNGT_EXPR
UNGE_EXPR
UNEQ_EXPR
These nodes represent the unordered comparison operators. These operations
take two floating point operands and determine whether the operands are un-
ordered or are less than, less than or equal to, greater than, greater than or
equal to, or equal respectively. For example, UNLT_EXPR returns true if either
operand is an IEEE NaN or the first operand is less than the second. All these
operations are guaranteed not to generate a floating point exception. The re-
sult type of these expressions will always be of integral or boolean type. These
operations return the result type’s zero value for false, and the result type’s one
value for true.
MODIFY_EXPR
These nodes represent assignment. The left-hand side is the first operand; the
right-hand side is the second operand. The left-hand side will be a VAR_DECL,
INDIRECT_REF, COMPONENT_REF, or other lvalue.
These nodes are used to represent not only assignment with ‘=’ but also com-
pound assignments (like ‘+=’), by reduction to ‘=’ assignment. In other words,
the representation for ‘i += 3’ looks just like that for ‘i = i + 3’.
INIT_EXPR
These nodes are just like MODIFY_EXPR, but are used only when a variable
is initialized, rather than assigned to subsequently. This means that we can
assume that the target of the initialization is not used in computing its own
value; any reference to the lhs in computing the rhs is undefined.
COMPOUND_EXPR
These nodes represent comma-expressions. The first operand is an expression
whose value is computed and thrown away prior to the evaluation of the second
operand. The value of the entire expression is the value of the second operand.
COND_EXPR
These nodes represent ?: expressions. The first operand is of boolean or integral
type. If it evaluates to a nonzero value, the second operand should be evaluated,
and returned as the value of the expression. Otherwise, the third operand is
evaluated, and returned as the value of the expression.
The second operand must have the same type as the entire expression, unless
it unconditionally throws an exception or calls a noreturn function, in which
case it should have void type. The same constraints apply to the third operand.
This allows array bounds checks to be represented conveniently as (i >= 0 &&
i < 10) ? i : abort().
As a GNU extension, the C language front-ends allow the second operand of the
?: operator may be omitted in the source. For example, x ? : 3 is equivalent
to x ? x : 3, assuming that x is an expression without side effects. In the
tree representation, however, the second operand is always present, possibly
protected by SAVE_EXPR if the first argument does cause side effects.
Chapter 11: GENERIC 193
CALL_EXPR
These nodes are used to represent calls to functions, including non-static mem-
ber functions. CALL_EXPRs are implemented as expression nodes with a variable
number of operands. Rather than using TREE_OPERAND to extract them, it is
preferable to use the specialized accessor macros and functions that operate
specifically on CALL_EXPR nodes.
CALL_EXPR_FN returns a pointer to the function to call; it is always an expression
whose type is a POINTER_TYPE.
The number of arguments to the call is returned by call_expr_nargs, while
the arguments themselves can be accessed with the CALL_EXPR_ARG macro. The
arguments are zero-indexed and numbered left-to-right. You can iterate over
the arguments using FOR_EACH_CALL_EXPR_ARG, as in:
tree call, arg;
call_expr_arg_iterator iter;
FOR_EACH_CALL_EXPR_ARG (arg, iter, call)
/* arg is bound to successive arguments of call. */
...;
For non-static member functions, there will be an operand corresponding to
the this pointer. There will always be expressions corresponding to all of the
arguments, even if the function is declared with default arguments and some
arguments are not explicitly provided at the call sites.
CALL_EXPRs also have a CALL_EXPR_STATIC_CHAIN operand that is used to im-
plement nested functions. This operand is otherwise null.
CLEANUP_POINT_EXPR
These nodes represent full-expressions. The single operand is an expression
to evaluate. Any destructor calls engendered by the creation of temporaries
during the evaluation of that expression should be performed immediately after
the expression is evaluated.
CONSTRUCTOR
These nodes represent the brace-enclosed initializers for a structure or an ar-
ray. They contain a sequence of component values made out of a vector of
constructor elt, which is a (INDEX, VALUE) pair.
If the TREE_TYPE of the CONSTRUCTOR is a RECORD_TYPE, UNION_TYPE or QUAL_
UNION_TYPE then the INDEX of each node in the sequence will be a FIELD_DECL
and the VALUE will be the expression used to initialize that field.
If the TREE_TYPE of the CONSTRUCTOR is an ARRAY_TYPE, then the INDEX of
each node in the sequence will be an INTEGER_CST or a RANGE_EXPR of two
INTEGER_CSTs. A single INTEGER_CST indicates which element of the array is
being assigned to. A RANGE_EXPR indicates an inclusive range of elements to
initialize. In both cases the VALUE is the corresponding initializer. It is re-
evaluated for each element of a RANGE_EXPR. If the INDEX is NULL_TREE, then
the initializer is for the next available array element.
In the front end, you should not depend on the fields appearing in any particular
order. However, in the middle end, fields must appear in declaration order. You
should not assume that all fields will be represented. Unrepresented fields will
194 GNU Compiler Collection (GCC) Internals
11.6.4 Vectors
VEC_DUPLICATE_EXPR
This node has a single operand and represents a vector in which every element
is equal to that operand.
VEC_SERIES_EXPR
This node represents a vector formed from a scalar base and step, given as the
first and second operands respectively. Element i of the result is equal to ‘base
+ i*step’.
This node is restricted to integral types, in order to avoid specifying the round-
ing behavior for floating-point types.
VEC_LSHIFT_EXPR
VEC_RSHIFT_EXPR
These nodes represent whole vector left and right shifts, respectively. The first
operand is the vector to shift; it will always be of vector type. The second
operand is an expression for the number of bits by which to shift. Note that
the result is undefined if the second operand is larger than or equal to the first
operand’s type size.
VEC_WIDEN_MULT_HI_EXPR
VEC_WIDEN_MULT_LO_EXPR
These nodes represent widening vector multiplication of the high and low parts
of the two input vectors, respectively. Their operands are vectors that contain
the same number of elements (N) of the same integral type. The result is a
vector that contains half as many elements, of an integral type whose size is
twice as wide. In the case of VEC_WIDEN_MULT_HI_EXPR the high N/2 elements
of the two vector are multiplied to produce the vector of N/2 products. In the
case of VEC_WIDEN_MULT_LO_EXPR the low N/2 elements of the two vector are
multiplied to produce the vector of N/2 products.
VEC_WIDEN_PLUS_HI_EXPR
VEC_WIDEN_PLUS_LO_EXPR
These nodes represent widening vector addition of the high and low parts of
the two input vectors, respectively. Their operands are vectors that contain the
same number of elements (N) of the same integral type. The result is a vector
that contains half as many elements, of an integral type whose size is twice as
wide. In the case of VEC_WIDEN_PLUS_HI_EXPR the high N/2 elements of the
two vectors are added to produce the vector of N/2 products. In the case of
VEC_WIDEN_PLUS_LO_EXPR the low N/2 elements of the two vectors are added
to produce the vector of N/2 products.
VEC_WIDEN_MINUS_HI_EXPR
VEC_WIDEN_MINUS_LO_EXPR
These nodes represent widening vector subtraction of the high and low parts of
the two input vectors, respectively. Their operands are vectors that contain the
same number of elements (N) of the same integral type. The high/low elements
of the second vector are subtracted from the high/low elements of the first. The
result is a vector that contains half as many elements, of an integral type whose
196 GNU Compiler Collection (GCC) Internals
contains twice as many elements of an integral type whose size is half as wide.
The elements of the two vectors are demoted and merged (concatenated) to
form the output vector.
VEC_PACK_FIX_TRUNC_EXPR
This node represents packing of elements of the two input vectors into the
output vector, where the values are converted from floating point to fixed point.
Input operands are vectors that contain the same number of elements of a
floating point type. The result is a vector that contains twice as many elements
of an integral type whose size is half as wide. The elements of the two vectors
are merged (concatenated) to form the output vector.
VEC_PACK_FLOAT_EXPR
This node represents packing of elements of the two input vectors into the
output vector, where the values are converted from fixed point to floating point.
Input operands are vectors that contain the same number of elements of an
integral type. The result is a vector that contains twice as many elements of
floating point type whose size is half as wide. The elements of the two vectors
are merged (concatenated) to form the output vector.
VEC_COND_EXPR
These nodes represent ?: expressions. The three operands must be vectors of
the same size and number of elements. The second and third operands must
have the same type as the entire expression. The first operand is of signed
integral vector type. If an element of the first operand evaluates to a zero
value, the corresponding element of the result is taken from the third operand.
If it evaluates to a minus one value, it is taken from the second operand. It
should never evaluate to any other value currently, but optimizations should not
rely on that property. In contrast with a COND_EXPR, all operands are always
evaluated.
SAD_EXPR This node represents the Sum of Absolute Differences operation. The three
operands must be vectors of integral types. The first and second operand must
have the same type. The size of the vector element of the third operand must
be at lease twice of the size of the vector element of the first and second one.
The SAD is calculated between the first and second operands, added to the
third operand, and returned.
11.7 Statements
Most statements in GIMPLE are assignment statements, represented by GIMPLE_ASSIGN.
No other C expressions can appear at statement level; a reference to a volatile object is
converted into a GIMPLE_ASSIGN.
There are also several varieties of complex statements.
DECL_EXPR
Used to represent a local declaration. The DECL_EXPR_DECL macro can be
used to obtain the entity declared. This declaration may be a LABEL_DECL,
indicating that the label declared is a local label. (As an extension, GCC
allows the declaration of labels with scope.) In C, this declaration may be a
FUNCTION_DECL, indicating the use of the GCC nested function extension. For
more information, see Section 11.8 [Functions], page 204.
LABEL_EXPR
Used to represent a label. The LABEL_DECL declared by this statement can be
obtained with the LABEL_EXPR_LABEL macro. The IDENTIFIER_NODE giving the
name of the label can be obtained from the LABEL_DECL with DECL_NAME.
GOTO_EXPR
Used to represent a goto statement. The GOTO_DESTINATION will usually be
a LABEL_DECL. However, if the “computed goto” extension has been used, the
GOTO_DESTINATION will be an arbitrary expression indicating the destination.
This expression will always have pointer type.
RETURN_EXPR
Used to represent a return statement. Operand 0 represents the value to
return. It should either be the RESULT_DECL for the containing function, or
a MODIFY_EXPR or INIT_EXPR setting the function’s RESULT_DECL. It will be
NULL_TREE if the statement was just
return;
LOOP_EXPR
These nodes represent “infinite” loops. The LOOP_EXPR_BODY represents the
body of the loop. It should be executed forever, unless an EXIT_EXPR is en-
countered.
Chapter 11: GENERIC 199
EXIT_EXPR
These nodes represent conditional exits from the nearest enclosing LOOP_EXPR.
The single operand is the condition; if it is nonzero, then the loop should be
exited. An EXIT_EXPR will only appear within a LOOP_EXPR.
SWITCH_EXPR
Used to represent a switch statement. The SWITCH_COND is the expression on
which the switch is occurring. The SWITCH_BODY is the body of the switch
statement. SWITCH_ALL_CASES_P is true if the switch includes a default label
or the case label ranges cover all possible values of the condition expression.
Note that TREE_TYPE for a SWITCH_EXPR represents the original type of switch
expression as given in the source, before any compiler conversions, instead of
the type of the switch expression itself (which is not meaningful).
CASE_LABEL_EXPR
Use to represent a case label, range of case labels, or a default label. If
CASE_LOW is NULL_TREE, then this is a default label. Otherwise, if CASE_HIGH
is NULL_TREE, then this is an ordinary case label. In this case, CASE_LOW is
an expression giving the value of the label. Both CASE_LOW and CASE_HIGH
are INTEGER_CST nodes. These values will have the same type as the condition
expression in the switch statement.
Otherwise, if both CASE_LOW and CASE_HIGH are defined, the statement is a
range of case labels. Such statements originate with the extension that allows
users to write things of the form:
case 2 ... 5:
The first value will be CASE_LOW, while the second will be CASE_HIGH.
DEBUG_BEGIN_STMT
Marks the beginning of a source statement, for purposes of debug information
generation.
11.7.2 Blocks
Block scopes and the variables they declare in GENERIC are expressed using the BIND_EXPR
code, which in previous versions of GCC was primarily used for the C statement-expression
extension.
Variables in a block are collected into BIND_EXPR_VARS in declaration order through their
TREE_CHAIN field. Any runtime initialization is moved out of DECL_INITIAL and into a
statement in the controlled block. When gimplifying from C or C++, this initialization
replaces the DECL_STMT. These variables will never require cleanups. The scope of these
variables is just the body
Variable-length arrays (VLAs) complicate this process, as their size often refers to vari-
ables initialized earlier in the block and their initialization involves an explicit stack allo-
cation. To handle this, we add an indirection and replace them with a pointer to stack
space allocated by means of alloca. In most cases, we also arrange for this space to be
reclaimed when the enclosing BIND_EXPR is exited, the exception to this being when there
is an explicit call to alloca in the source code, in which case the stack is left depressed on
exit of the BIND_EXPR.
200 GNU Compiler Collection (GCC) Internals
A C++ program will usually contain more BIND_EXPRs than there are syntactic blocks in
the source code, since several C++ constructs have implicit scopes associated with them.
On the other hand, although the C++ front end uses pseudo-scopes to handle cleanups for
objects with destructors, these don’t translate into the GIMPLE form; multiple declarations
at the same level use the same BIND_EXPR.
11.7.5 Jumps
Other jumps are expressed by either GOTO_EXPR or RETURN_EXPR.
The operand of a GOTO_EXPR must be either a label or a variable containing the address
to jump to.
The operand of a RETURN_EXPR is either NULL_TREE, RESULT_DECL, or a MODIFY_EXPR
which sets the return value. It would be nice to move the MODIFY_EXPR into a separate
statement, but the special return semantics in expand_return make that difficult. It may
still happen in the future, perhaps by moving most of that logic into expand_assignment.
11.7.6 Cleanups
Destructors for local C++ objects and similar dynamic cleanups are represented in GIM-
PLE by a TRY_FINALLY_EXPR. TRY_FINALLY_EXPR has two operands, both of which are a
sequence of statements to execute. The first sequence is executed. When it completes the
second sequence is executed.
The first sequence may complete in the following ways:
1. Execute the last statement in the sequence and fall off the end.
2. Execute a goto statement (GOTO_EXPR) to an ordinary label outside the sequence.
3. Execute a return statement (RETURN_EXPR).
4. Throw an exception. This is currently not explicitly represented in GIMPLE.
The second sequence is not executed if the first sequence completes by calling setjmp or
exit or any other function that does not return. The second sequence is also not executed
if the first sequence completes via a non-local goto or a computed goto (in general the
compiler does not know whether such a goto statement exits the first sequence or not, so
we assume that it doesn’t).
After the second sequence is executed, if it completes normally by falling off the end,
execution continues wherever the first sequence would have continued, by falling off the
end, or doing a goto, etc.
Chapter 11: GENERIC 201
If the second sequence is an EH_ELSE_EXPR selector, then the sequence in its first operand
is used when the first sequence completes normally, and that in its second operand is used
for exceptional cleanups, i.e., when an exception propagates out of the first sequence.
TRY_FINALLY_EXPR complicates the flow graph, since the cleanup needs to appear on
every edge out of the controlled block; this reduces the freedom to move code across these
edges. Therefore, the EH lowering pass which runs before most of the optimization passes
eliminates these expressions by explicitly adding the cleanup to each edge. Rethrowing the
exception is represented using RESX_EXPR.
11.7.7 OpenMP
All the statements starting with OMP_ represent directives and clauses used by the OpenMP
API https://www.openmp.org.
OMP_PARALLEL
Represents #pragma omp parallel [clause1 ... clauseN]. It has four
operands:
Operand OMP_PARALLEL_BODY is valid while in GENERIC and High GIMPLE
forms. It contains the body of code to be executed by all the threads. During
GIMPLE lowering, this operand becomes NULL and the body is emitted linearly
after OMP_PARALLEL.
Operand OMP_PARALLEL_CLAUSES is the list of clauses associated with the di-
rective.
Operand OMP_PARALLEL_FN is created by pass_lower_omp, it contains the
FUNCTION_DECL for the function that will contain the body of the parallel
region.
Operand OMP_PARALLEL_DATA_ARG is also created by pass_lower_omp. If there
are shared variables to be communicated to the children threads, this operand
will contain the VAR_DECL that contains all the shared values and variables.
OMP_FOR
OMP_SIMD
OMP_DISTRIBUTE
OMP_TASKLOOP
OMP_LOOP
Represents #pragma omp for [clause1 ... clauseN] and related loop
constructs (respectively).
A single OMP_FOR node represents an entire nest of collapsed loops; as noted
below, some of its arguments are vectors of length equal to the collapse depth,
and the corresponding elements holding data specific to a particular loop in the
nest. These vectors are numbered from the outside in so that the outermost
loop is element 0.
These constructs have seven operands:
Operand OMP_FOR_BODY contains the loop body.
Operand OMP_FOR_CLAUSES is the list of clauses associated with the directive.
Operand OMP_FOR_INIT is a vector containing iteration variable initializations
of the form VAR = N1.
202 GNU Compiler Collection (GCC) Internals
OMP_MASTER
Represents #pragma omp master.
Operand OMP_MASTER_BODY contains the body of code to be executed by the
master thread.
OMP_ORDERED
Represents #pragma omp ordered.
Operand OMP_ORDERED_BODY contains the body of code to be executed in the
sequential order dictated by the loop index variable.
OMP_CRITICAL
Represents #pragma omp critical [name].
Operand OMP_CRITICAL_BODY is the critical section.
Operand OMP_CRITICAL_NAME is an optional identifier to label the critical sec-
tion.
OMP_RETURN
This does not represent any OpenMP directive, it is an artificial marker to
indicate the end of the body of an OpenMP. It is used by the flow graph
(tree-cfg.cc) and OpenMP region building code (omp-low.cc).
OMP_CONTINUE
Similarly, this instruction does not represent an OpenMP directive, it is used by
OMP_FOR (and similar codes) as well as OMP_SECTIONS to mark the place where
the code needs to loop to the next iteration, or the next section, respectively.
In some cases, OMP_CONTINUE is placed right before OMP_RETURN. But if there
are cleanups that need to occur right after the looping body, it will be emitted
between OMP_CONTINUE and OMP_RETURN.
OMP_ATOMIC
Represents #pragma omp atomic.
Operand 0 is the address at which the atomic operation is to be performed.
Operand 1 is the expression to evaluate. The gimplifier tries three alternative
code generation strategies. Whenever possible, an atomic update built-in is
used. If that fails, a compare-and-swap loop is attempted. If that also fails, a
regular critical section around the expression is used.
OMP_CLAUSE
Represents clauses associated with one of the OMP_ directives. Clauses are
represented by separate subcodes defined in tree.h. Clauses codes can be one
of: OMP_CLAUSE_PRIVATE, OMP_CLAUSE_SHARED, OMP_CLAUSE_FIRSTPRIVATE,
OMP_CLAUSE_LASTPRIVATE, OMP_CLAUSE_COPYIN, OMP_CLAUSE_COPYPRIVATE,
OMP_CLAUSE_IF, OMP_CLAUSE_NUM_THREADS, OMP_CLAUSE_SCHEDULE,
OMP_CLAUSE_NOWAIT, OMP_CLAUSE_ORDERED, OMP_CLAUSE_DEFAULT,
OMP_CLAUSE_REDUCTION, OMP_CLAUSE_COLLAPSE, OMP_CLAUSE_UNTIED,
OMP_CLAUSE_FINAL, and OMP_CLAUSE_MERGEABLE. Each code represents the
corresponding OpenMP clause.
Clauses associated with the same directive are chained together via
OMP_CLAUSE_CHAIN. Those clauses that accept a list of variables are restricted
204 GNU Compiler Collection (GCC) Internals
11.7.8 OpenACC
All the statements starting with OACC_ represent directives and clauses used by the Ope-
nACC API https://www.openacc.org.
OACC_CACHE
Represents #pragma acc cache (var ...).
OACC_DATA
Represents #pragma acc data [clause1 ... clauseN].
OACC_DECLARE
Represents #pragma acc declare [clause1 ... clauseN].
OACC_ENTER_DATA
Represents #pragma acc enter data [clause1 ... clauseN].
OACC_EXIT_DATA
Represents #pragma acc exit data [clause1 ... clauseN].
OACC_HOST_DATA
Represents #pragma acc host_data [clause1 ... clauseN].
OACC_KERNELS
Represents #pragma acc kernels [clause1 ... clauseN].
OACC_LOOP
Represents #pragma acc loop [clause1 ... clauseN].
See the description of the OMP_FOR code.
OACC_PARALLEL
Represents #pragma acc parallel [clause1 ... clauseN].
OACC_SERIAL
Represents #pragma acc serial [clause1 ... clauseN].
OACC_UPDATE
Represents #pragma acc update [clause1 ... clauseN].
11.8 Functions
A function is represented by a FUNCTION_DECL node. It stores the basic pieces of the function
such as body, parameters, and return type as well as information on the surrounding context,
visibility, and linkage.
DECL_NAME
This macro returns the unqualified name of the function, as an IDENTIFIER_
NODE. For an instantiation of a function template, the DECL_NAME is the unqual-
ified name of the template, not something like f<int>. The value of DECL_NAME
is undefined when used on a constructor, destructor, overloaded operator, or
type-conversion operator, or any function that is implicitly generated by the
compiler. See below for macros that can be used to distinguish these cases.
DECL_ASSEMBLER_NAME
This macro returns the mangled name of the function, also an IDENTIFIER_
NODE. This name does not contain leading underscores on systems that prefix
all identifiers with underscores. The mangled name is computed in the same
way on all platforms; if special processing is required to deal with the object
file format used on a particular platform, it is the responsibility of the back end
to perform those modifications. (Of course, the back end should not modify
DECL_ASSEMBLER_NAME itself.)
Using DECL_ASSEMBLER_NAME will cause additional memory to be allocated (for
the mangled name of the entity) so it should be used only when emitting assem-
bly code. It should not be used within the optimizers to determine whether or
not two declarations are the same, even though some of the existing optimizers
do use it in that way. These uses will be removed over time.
DECL_ARGUMENTS
This macro returns the PARM_DECL for the first argument to the function. Sub-
sequent PARM_DECL nodes can be obtained by following the TREE_CHAIN links.
DECL_RESULT
This macro returns the RESULT_DECL for the function.
DECL_SAVED_TREE
This macro returns the complete body of the function.
TREE_TYPE
This macro returns the FUNCTION_TYPE or METHOD_TYPE for the function.
DECL_INITIAL
A function that has a definition in the current translation unit will have a non-
NULL DECL_INITIAL. However, back ends should not make use of the particular
value given by DECL_INITIAL.
It should contain a tree of BLOCK nodes that mirrors the scopes that variables
are bound in the function. Each block contains a list of decls declared in a
basic block, a pointer to a chain of blocks at the next lower scope level, then
a pointer to the next block at the same level and a backpointer to the parent
BLOCK or FUNCTION_DECL. So given a function as follows:
void foo()
{
int a;
{
int b;
}
int c;
206 GNU Compiler Collection (GCC) Internals
}
you would get the following:
tree foo = FUNCTION_DECL;
tree decl_a = VAR_DECL;
tree decl_b = VAR_DECL;
tree decl_c = VAR_DECL;
tree block_a = BLOCK;
tree block_b = BLOCK;
tree block_c = BLOCK;
BLOCK_VARS(block_a) = decl_a;
BLOCK_SUBBLOCKS(block_a) = block_b;
BLOCK_CHAIN(block_a) = block_c;
BLOCK_SUPERCONTEXT(block_a) = foo;
BLOCK_VARS(block_b) = decl_b;
BLOCK_SUPERCONTEXT(block_b) = block_a;
BLOCK_VARS(block_c) = decl_c;
BLOCK_SUPERCONTEXT(block_c) = foo;
DECL_INITIAL(foo) = block_a;
DECL_VIRTUAL_P
This predicate holds if the function is virtual.
DECL_ARTIFICIAL
This macro holds if the function was implicitly generated by the compiler,
rather than explicitly declared. In addition to implicitly generated class member
functions, this macro holds for the special functions created to implement static
initialization and destruction, to compute run-time type information, and so
forth.
DECL_FUNCTION_SPECIFIC_TARGET
This macro returns a tree node that holds the target options that are to be
used to compile this particular function or NULL_TREE if the function is to be
compiled with the target options specified on the command line.
DECL_FUNCTION_SPECIFIC_OPTIMIZATION
This macro returns a tree node that holds the optimization options that are to
be used to compile this particular function or NULL_TREE if the function is to
be compiled with the optimization options specified on the command line.
Many of the macros documented here do not apply in C because the corresponding language
constructs do not appear in C.
The C and C++ front ends generate a mix of GENERIC trees and ones specific to C and
C++. These language-specific trees are higher-level constructs than the ones in GENERIC to
make the parser’s job easier. This section describes those trees that aren’t part of GENERIC
as well as aspects of GENERIC trees that are treated in a language-specific manner.
If you are developing a “back end”, be it is a code-generator or some other tool, that uses
this representation, you may occasionally find that you need to ask questions not easily
answered by the functions and macros available here. If that situation occurs, it is quite
likely that GCC already supports the functionality you desire, but that the interface is
simply not documented here. In that case, you should ask the GCC maintainers (via mail
to gcc@gcc.gnu.org) about documenting the functionality you require. Similarly, if you
find yourself writing functions that do not deal directly with your back end, but instead
might be useful to other people using the GCC front end, you should submit your patches
for inclusion in GCC.
TYPE_ALIGN
The alignment of the type, in bits, represented as an int.
TYPE_NAME
This macro returns a declaration (in the form of a TYPE_DECL) for the type.
(Note this macro does not return an IDENTIFIER_NODE, as you might expect,
given its name!) You can look at the DECL_NAME of the TYPE_DECL to obtain
the actual name of the type. The TYPE_NAME will be NULL_TREE for a type that
is not a built-in type, the result of a typedef, or a named class type.
CP_INTEGRAL_TYPE
This predicate holds if the type is an integral type. Notice that in C++, enu-
merations are not integral types.
ARITHMETIC_TYPE_P
This predicate holds if the type is an integral type (in the C++ sense) or a
floating point type.
CLASS_TYPE_P
This predicate holds for a class-type.
TYPE_BUILT_IN
This predicate holds for a built-in type.
TYPE_PTRDATAMEM_P
This predicate holds if the type is a pointer to data member.
TYPE_PTR_P
This predicate holds if the type is a pointer type, and the pointee is not a data
member.
TYPE_PTRFN_P
This predicate holds for a pointer to function type.
TYPE_PTROB_P
This predicate holds for a pointer to object type. Note however that it does not
hold for the generic pointer to object type void *. You may use TYPE_PTROBV_P
to test for a pointer to object type as well as void *.
The table below describes types specific to C and C++ as well as language-dependent info
about GENERIC types.
POINTER_TYPE
Used to represent pointer types, and pointer to data member types. If TREE_
TYPE is a pointer to data member type, then TYPE_PTRDATAMEM_P will hold. For
a pointer to data member type of the form ‘T X::*’, TYPE_PTRMEM_CLASS_TYPE
will be the type X, while TYPE_PTRMEM_POINTED_TO_TYPE will be the type T.
RECORD_TYPE
Used to represent struct and class types in C and C++. If TYPE_PTRMEMFUNC_
P holds, then this type is a pointer-to-member type. In that case, the TYPE_
PTRMEMFUNC_FN_TYPE is a POINTER_TYPE pointing to a METHOD_TYPE. The
METHOD_TYPE is the type of a function pointed to by the pointer-to-member
function. If TYPE_PTRMEMFUNC_P does not hold, this type is a class type. For
more information, see Section 11.10.3 [Classes], page 211.
210 GNU Compiler Collection (GCC) Internals
UNKNOWN_TYPE
This node is used to represent a type the knowledge of which is insufficient for
a sound processing.
TYPENAME_TYPE
Used to represent a construct of the form typename T::A. The TYPE_CONTEXT
is T; the TYPE_NAME is an IDENTIFIER_NODE for A. If the type is specified via a
template-id, then TYPENAME_TYPE_FULLNAME yields a TEMPLATE_ID_EXPR. The
TREE_TYPE is non-NULL if the node is implicitly generated in support for the
implicit typename extension; in which case the TREE_TYPE is a type node for
the base-class.
TYPEOF_TYPE
Used to represent the __typeof__ extension. The TYPE_FIELDS is the expres-
sion the type of which is being represented.
11.10.2 Namespaces
The root of the entire intermediate representation is the variable global_namespace. This is
the namespace specified with :: in C++ source code. All other namespaces, types, variables,
functions, and so forth can be found starting with this namespace.
However, except for the fact that it is distinguished as the root of the representation,
the global namespace is no different from any other namespace. Thus, in what follows, we
describe namespaces generally, rather than the global namespace in particular.
A namespace is represented by a NAMESPACE_DECL node.
The following macros and functions can be used on a NAMESPACE_DECL:
DECL_NAME
This macro is used to obtain the IDENTIFIER_NODE corresponding to the un-
qualified name of the name of the namespace (see Section 11.2.2 [Identifiers],
page 173). The name of the global namespace is ‘::’, even though in C++
the global namespace is unnamed. However, you should use comparison with
global_namespace, rather than DECL_NAME to determine whether or not a
namespace is the global one. An unnamed namespace will have a DECL_NAME
equal to anonymous_namespace_name. Within a single translation unit, all un-
named namespaces will have the same name.
DECL_CONTEXT
This macro returns the enclosing namespace. The DECL_CONTEXT for the
global_namespace is NULL_TREE.
DECL_NAMESPACE_ALIAS
If this declaration is for a namespace alias, then DECL_NAMESPACE_ALIAS is the
namespace for which this one is an alias.
Do not attempt to use cp_namespace_decls for a namespace which is an alias.
Instead, follow DECL_NAMESPACE_ALIAS links until you reach an ordinary, non-
alias, namespace, and call cp_namespace_decls there.
DECL_NAMESPACE_STD_P
This predicate holds if the namespace is the special ::std namespace.
Chapter 11: GENERIC 211
cp_namespace_decls
This function will return the declarations contained in the namespace, including
types, overloaded functions, other namespaces, and so forth. If there are no dec-
larations, this function will return NULL_TREE. The declarations are connected
through their TREE_CHAIN fields.
Although most entries on this list will be declarations, TREE_LIST nodes may
also appear. In this case, the TREE_VALUE will be an OVERLOAD. The value of the
TREE_PURPOSE is unspecified; back ends should ignore this value. As with the
other kinds of declarations returned by cp_namespace_decls, the TREE_CHAIN
will point to the next declaration in this list.
For more information on the kinds of declarations that can occur on this list,
See Section 11.4 [Declarations], page 178. Some declarations will not appear on
this list. In particular, no FIELD_DECL, LABEL_DECL, or PARM_DECL nodes will
appear here.
This function cannot be used with namespaces that have DECL_NAMESPACE_
ALIAS set.
11.10.3 Classes
Besides namespaces, the other high-level scoping construct in C++ is the class. (Through-
out this manual the term class is used to mean the types referred to in the ANSI/ISO
C++ Standard as classes; these include types defined with the class, struct, and union
keywords.)
A class type is represented by either a RECORD_TYPE or a UNION_TYPE. A class declared
with the union tag is represented by a UNION_TYPE, while classes declared with either the
struct or the class tag are represented by RECORD_TYPEs. You can use the CLASSTYPE_
DECLARED_CLASS macro to discern whether or not a particular type is a class as opposed
to a struct. This macro will be true only for classes declared with the class tag.
Almost all members are available on the TYPE_FIELDS list. Given one member, the next
can be found by following the TREE_CHAIN. You should not depend in any way on the
order in which fields appear on this list. All nodes on this list will be ‘DECL’ nodes. A
FIELD_DECL is used to represent a non-static data member, a VAR_DECL is used to represent
a static data member, and a TYPE_DECL is used to represent a type. Note that the CONST_
DECL for an enumeration constant will appear on this list, if the enumeration type was
declared in the class. (Of course, the TYPE_DECL for the enumeration type will appear here
as well.) There are no entries for base classes on this list. In particular, there is no FIELD_
DECL for the “base-class portion” of an object. If a function member is overloaded, each
of the overloaded functions appears; no OVERLOAD nodes appear on the TYPE_FIELDS list.
Implicitly declared functions (including default constructors, copy constructors, assignment
operators, and destructors) will appear on this list as well.
The TYPE_VFIELD is a compiler-generated field used to point to virtual function tables.
It may or may not appear on the TYPE_FIELDS list. However, back ends should handle the
TYPE_VFIELD just like all the entries on the TYPE_FIELDS list.
Every class has an associated binfo, which can be obtained with TYPE_BINFO. Binfos
are used to represent base-classes. The binfo given by TYPE_BINFO is the degenerate case,
whereby every class is considered to be its own base-class. The base binfos for a particular
212 GNU Compiler Collection (GCC) Internals
binfo are held in a vector, whose length is obtained with BINFO_N_BASE_BINFOS. The base
binfos themselves are obtained with BINFO_BASE_BINFO and BINFO_BASE_ITERATE. To add
a new binfo, use BINFO_BASE_APPEND. The vector of base binfos can be obtained with
BINFO_BASE_BINFOS, but normally you do not need to use that. The class type associated
with a binfo is given by BINFO_TYPE. It is not always the case that BINFO_TYPE (TYPE_
BINFO (x)), because of typedefs and qualified types. Neither is it the case that TYPE_BINFO
(BINFO_TYPE (y)) is the same binfo as y. The reason is that if y is a binfo representing a
base-class B of a derived class D, then BINFO_TYPE (y) will be B, and TYPE_BINFO (BINFO_
TYPE (y)) will be B as its own base-class, rather than as a base-class of D.
The access to a base type can be found with BINFO_BASE_ACCESS. This will produce
access_public_node, access_private_node or access_protected_node. If bases are
always public, BINFO_BASE_ACCESSES may be NULL.
BINFO_VIRTUAL_P is used to specify whether the binfo is inherited virtually or not. The
other flags, BINFO_FLAG_0 to BINFO_FLAG_6, can be used for language specific use.
The following macros can be used on a tree node representing a class-type.
LOCAL_CLASS_P
This predicate holds if the class is local class i.e. declared inside a function
body.
TYPE_POLYMORPHIC_P
This predicate holds if the class has at least one virtual function (declared or
inherited).
TYPE_HAS_DEFAULT_CONSTRUCTOR
This predicate holds whenever its argument represents a class-type with default
constructor.
CLASSTYPE_HAS_MUTABLE
TYPE_HAS_MUTABLE_P
These predicates hold for a class-type having a mutable data member.
CLASSTYPE_NON_POD_P
This predicate holds only for class-types that are not PODs.
TYPE_HAS_NEW_OPERATOR
This predicate holds for a class-type that defines operator new.
TYPE_HAS_ARRAY_NEW_OPERATOR
This predicate holds for a class-type for which operator new[] is defined.
TYPE_OVERLOADS_CALL_EXPR
This predicate holds for class-type for which the function call operator() is
overloaded.
TYPE_OVERLOADS_ARRAY_REF
This predicate holds for a class-type that overloads operator[]
TYPE_OVERLOADS_ARROW
This predicate holds for a class-type for which operator-> is overloaded.
Chapter 11: GENERIC 213
DECL_STATIC_FUNCTION_P
This predicate holds if the function a static member function.
DECL_NONSTATIC_MEMBER_FUNCTION_P
This macro holds for a non-static member function.
DECL_CONST_MEMFUNC_P
This predicate holds for a const-member function.
DECL_VOLATILE_MEMFUNC_P
This predicate holds for a volatile-member function.
DECL_CONSTRUCTOR_P
This macro holds if the function is a constructor.
DECL_NONCONVERTING_P
This predicate holds if the constructor is a non-converting constructor.
DECL_COMPLETE_CONSTRUCTOR_P
This predicate holds for a function which is a constructor for an object of a
complete type.
DECL_BASE_CONSTRUCTOR_P
This predicate holds for a function which is a constructor for a base class sub-
object.
DECL_COPY_CONSTRUCTOR_P
This predicate holds for a function which is a copy-constructor.
DECL_DESTRUCTOR_P
This macro holds if the function is a destructor.
DECL_COMPLETE_DESTRUCTOR_P
This predicate holds if the function is the destructor for an object a complete
type.
DECL_OVERLOADED_OPERATOR_P
This macro holds if the function is an overloaded operator.
DECL_CONV_FN_P
This macro holds if the function is a type-conversion operator.
DECL_GLOBAL_CTOR_P
This predicate holds if the function is a file-scope initialization function.
DECL_GLOBAL_DTOR_P
This predicate holds if the function is a file-scope finalization function.
DECL_THUNK_P
This predicate holds if the function is a thunk.
These functions represent stub code that adjusts the this pointer and then
jumps to another function. When the jumped-to function returns, control is
transferred directly to the caller, without returning to the thunk. The first
parameter to the thunk is always the this pointer; the thunk should add THUNK_
DELTA to this value. (The THUNK_DELTA is an int, not an INTEGER_CST.)
Chapter 11: GENERIC 215
instantiations of template functions). In template functions, the same nodes are used, but
sometimes in slightly different ways.
Many of the statements have substatements. For example, a while loop has a body,
which is itself a statement. If the substatement is NULL_TREE, it is considered equivalent to
a statement consisting of a single ;, i.e., an expression statement in which the expression has
been omitted. A substatement may in fact be a list of statements, connected via their TREE_
CHAINs. So, you should always process the statement tree by looping over substatements,
like this:
void process_stmt (stmt)
tree stmt;
{
while (stmt)
{
switch (TREE_CODE (stmt))
{
case IF_STMT:
process_stmt (THEN_CLAUSE (stmt));
/* More processing here. */
break;
...
}
Used to represent a do loop. The body of the loop is given by DO_BODY while
the termination condition for the loop is given by DO_COND. The condition for
a do-statement is always an expression.
EMPTY_CLASS_EXPR
Used to represent a temporary object of a class with no data whose address is
never taken. (All such objects are interchangeable.) The TREE_TYPE represents
the type of the object.
EXPR_STMT
Used to represent an expression statement. Use EXPR_STMT_EXPR to obtain the
expression.
FOR_STMT
Used to represent a for statement. The FOR_INIT_STMT is the initialization
statement for the loop. The FOR_COND is the termination condition. The FOR_
EXPR is the expression executed right before the FOR_COND on each loop iteration;
often, this expression increments a counter. The body of the loop is given by
FOR_BODY. FOR_SCOPE holds the scope of the for statement (used in the C++
front end only). Note that FOR_INIT_STMT and FOR_BODY return statements,
while FOR_COND and FOR_EXPR return expressions.
HANDLER
Used to represent a C++ catch block. The HANDLER_TYPE is the type of ex-
ception that will be caught by this handler; it is equal (by pointer equality) to
NULL if this handler is for all types. HANDLER_PARMS is the DECL_STMT for the
catch parameter, and HANDLER_BODY is the code for the block itself.
IF_STMT
Used to represent an if statement. The IF_COND is the expression.
If the condition is a TREE_LIST, then the TREE_PURPOSE is a statement (usually
a DECL_STMT). Each time the condition is evaluated, the statement should be
executed. Then, the TREE_VALUE should be used as the conditional expression
itself. This representation is used to handle C++ code like this:
if (int i = 7) ...
where there is a new local variable (or variables) declared within the condition.
The THEN_CLAUSE represents the statement given by the then condition, while
the ELSE_CLAUSE represents the statement given by the else condition.
C++ distinguishes between this and COND_EXPR for handling templates.
SUBOBJECT
In a constructor, these nodes are used to mark the point at which a subobject
of this is fully constructed. If, after this point, an exception is thrown before a
CTOR_STMT with CTOR_END_P set is encountered, the SUBOBJECT_CLEANUP must
be executed. The cleanups must be executed in the reverse order in which they
appear.
SWITCH_STMT
Used to represent a switch statement. The SWITCH_STMT_COND is the expres-
sion on which the switch is occurring. See the documentation for an IF_STMT
218 GNU Compiler Collection (GCC) Internals
for more information on the representation used for the condition. The SWITCH_
STMT_BODY is the body of the switch statement. The SWITCH_STMT_TYPE is the
original type of switch expression as given in the source, before any compiler
conversions. The SWITCH_STMT_SCOPE is the statement scope (used in the C++
front end only).
There are also two boolean flags used with SWITCH_STMT. SWITCH_STMT_ALL_
CASES_P is true if the switch includes a default label or the case label ranges
cover all possible values of the condition expression. SWITCH_STMT_NO_BREAK_P
is true if there are no break statements in the switch.
TRY_BLOCK
Used to represent a try block. The body of the try block is given by TRY_
STMTS. Each of the catch blocks is a HANDLER node. The first handler is given
by TRY_HANDLERS. Subsequent handlers are obtained by following the TREE_
CHAIN link from one handler to the next. The body of the handler is given by
HANDLER_BODY.
If CLEANUP_P holds of the TRY_BLOCK, then the TRY_HANDLERS will not be a
HANDLER node. Instead, it will be an expression that should be executed if
an exception is thrown in the try block. It must rethrow the exception after
executing that code. And, if an exception is thrown while the expression is
executing, terminate must be called.
USING_STMT
Used to represent a using directive. The namespace is given by USING_STMT_
NAMESPACE, which will be a NAMESPACE DECL. This node is needed inside
template functions, to implement using directives during instantiation.
WHILE_STMT
Used to represent a while loop. The WHILE_COND is the termination condition
for the loop. See the documentation for an IF_STMT for more information on
the representation used for the condition.
The WHILE_BODY is the body of the loop.
THROW_EXPR
Represents an instance of throw in the program. Operand 0, which is the
expression to throw, may be NULL_TREE.
AGGR_INIT_EXPR
An AGGR_INIT_EXPR represents the initialization as the return value of a func-
tion call, or as the result of a constructor. An AGGR_INIT_EXPR will only appear
as a full-expression, or as the second operand of a TARGET_EXPR. AGGR_INIT_
EXPRs have a representation similar to that of CALL_EXPRs. You can use the
AGGR_INIT_EXPR_FN and AGGR_INIT_EXPR_ARG macros to access the function
to call and the arguments to pass.
If AGGR_INIT_VIA_CTOR_P holds of the AGGR_INIT_EXPR, then the initialization
is via a constructor call. The address of the AGGR_INIT_EXPR_SLOT operand,
which is always a VAR_DECL, is taken, and this value replaces the first argument
in the argument list.
In either case, the expression is void.
221
12 GIMPLE
12.1.2 gimple_statement_with_ops
This tuple is actually split in two: gimple_statement_with_ops_base and gimple_
statement_with_ops. This is needed to accommodate the way the operand vector is
allocated. The operand vector is defined to be an array of 1 element. So, to allocate a
dynamic number of operands, the memory allocator (gimple_alloc) simply allocates
enough memory to hold the structure itself plus N - 1 operands which run “off the end” of
the structure. For example, to allocate space for a tuple with 3 operands, gimple_alloc
reserves sizeof (struct gimple_statement_with_ops) + 2 * sizeof (tree) bytes.
On the other hand, several fields in this tuple need to be shared with the
gimple_statement_with_memory_ops tuple. So, these common fields are placed in
gimple_statement_with_ops_base which is then inherited from the other two tuples.
gsbase 256
def_ops 64
use_ops 64
op num_ops * 64
Total 48 + 8 * num_ops bytes
size
• gsbase Inherited from struct gimple.
• def_ops Array of pointers into the operand array indicating all the slots that contain
a variable written-to by the statement. This array is also used for immediate use
chaining. Note that it would be possible to not rely on this array, but the changes
required to implement this are pretty invasive.
• use_ops Similar to def_ops but for variables read by the statement.
• op Array of trees with num_ops slots.
12.1.3 gimple_statement_with_memory_ops
This tuple is essentially identical to gimple_statement_with_ops, except that it contains
4 additional fields to hold vectors related memory stores and loads. Similar to the pre-
224 GNU Compiler Collection (GCC) Internals
vious case, the structure is split in two to accommodate for the operand vector (gimple_
statement_with_memory_ops_base and gimple_statement_with_memory_ops).
Field Size (bits)
gsbase 256
def_ops 64
use_ops 64
vdef_ops 64
vuse_ops 64
stores 64
loads 64
op num_ops * 64
Total size 80 + 8 * num_ops bytes
• vdef_ops Similar to def_ops but for VDEF operators. There is one entry per memory
symbol written by this statement. This is used to maintain the memory SSA use-def
and def-def chains.
• vuse_ops Similar to use_ops but for VUSE operators. There is one entry per memory
symbol loaded by this statement. This is used to maintain the memory SSA use-def
chains.
• stores Bitset with all the UIDs for the symbols written-to by the statement. This is
different than vdef_ops in that all the affected symbols are mentioned in this set. If
memory partitioning is enabled, the vdef_ops vector will refer to memory partitions.
Furthermore, no SSA information is stored in this set.
• loads Similar to stores, but for memory loads. (Note that there is some amount
of redundancy here, it should be possible to reduce memory utilization further by
removing these sets).
All the other tuples are defined in terms of these three basic ones. Each tuple will add
some fields.
| | | code: GIMPLE_DEBUG
| | |
| | + ggoto
| | | code: GIMPLE_GOTO
| | |
| | + glabel
| | | code: GIMPLE_LABEL
| | |
| | + gswitch
| | code: GIMPLE_SWITCH
| |
| + gimple_statement_with_memory_ops_base
| | layout: GSS_WITH_MEM_OPS_BASE
| |
| + gimple_statement_with_memory_ops
| | | layout: GSS_WITH_MEM_OPS
| | |
| | + gassign
| | | code GIMPLE_ASSIGN
| | |
| | + greturn
| | code GIMPLE_RETURN
| |
| + gcall
| | layout: GSS_CALL, code: GIMPLE_CALL
| |
| + gasm
| | layout: GSS_ASM, code: GIMPLE_ASM
| |
| + gtransaction
| layout: GSS_TRANSACTION, code: GIMPLE_TRANSACTION
|
+ gimple_statement_omp
| | layout: GSS_OMP. Used for code GIMPLE_OMP_SECTION
| |
| + gomp_critical
| | layout: GSS_OMP_CRITICAL, code: GIMPLE_OMP_CRITICAL
| |
| + gomp_for
| | layout: GSS_OMP_FOR, code: GIMPLE_OMP_FOR
| |
| + gomp_parallel_layout
| | | layout: GSS_OMP_PARALLEL_LAYOUT
| | |
| | + gimple_statement_omp_taskreg
| | | |
| | | + gomp_parallel
| | | | code: GIMPLE_OMP_PARALLEL
| | | |
| | | + gomp_task
| | | code: GIMPLE_OMP_TASK
| | |
| | + gimple_statement_omp_target
| | code: GIMPLE_OMP_TARGET
| |
| + gomp_sections
| | layout: GSS_OMP_SECTIONS, code: GIMPLE_OMP_SECTIONS
| |
226 GNU Compiler Collection (GCC) Internals
| + gimple_statement_omp_single_layout
| | layout: GSS_OMP_SINGLE_LAYOUT
| |
| + gomp_single
| | code: GIMPLE_OMP_SINGLE
| |
| + gomp_teams
| code: GIMPLE_OMP_TEAMS
|
+ gbind
| layout: GSS_BIND, code: GIMPLE_BIND
|
+ gcatch
| layout: GSS_CATCH, code: GIMPLE_CATCH
|
+ geh_filter
| layout: GSS_EH_FILTER, code: GIMPLE_EH_FILTER
|
+ geh_else
| layout: GSS_EH_ELSE, code: GIMPLE_EH_ELSE
|
+ geh_mnt
| layout: GSS_EH_MNT, code: GIMPLE_EH_MUST_NOT_THROW
|
+ gphi
| layout: GSS_PHI, code: GIMPLE_PHI
|
+ gimple_statement_eh_ctrl
| | layout: GSS_EH_CTRL
| |
| + gresx
| | code: GIMPLE_RESX
| |
| + geh_dispatch
| code: GIMPLE_EH_DISPATCH
|
+ gtry
| layout: GSS_TRY, code: GIMPLE_TRY
|
+ gimple_statement_wce
| layout: GSS_WCE, code: GIMPLE_WITH_CLEANUP_EXPR
|
+ gomp_continue
| layout: GSS_OMP_CONTINUE, code: GIMPLE_OMP_CONTINUE
|
+ gomp_atomic_load
| layout: GSS_OMP_ATOMIC_LOAD, code: GIMPLE_OMP_ATOMIC_LOAD
|
+ gimple_statement_omp_atomic_store_layout
| layout: GSS_OMP_ATOMIC_STORE_LAYOUT,
| code: GIMPLE_OMP_ATOMIC_STORE
|
+ gomp_atomic_store
| code: GIMPLE_OMP_ATOMIC_STORE
|
+ gomp_return
code: GIMPLE_OMP_RETURN
Chapter 12: GIMPLE 227
12.5 Temporaries
When gimplification encounters a subexpression that is too complex, it creates a new tem-
porary variable to hold the value of the subexpression, and adds a new statement to initial-
ize it before the current statement. These special temporaries are known as ‘expression
temporaries’, and are allocated using get_formal_tmp_var. The compiler tries to always
evaluate identical expressions into the same temporary, to simplify elimination of redundant
calculations.
We can only use expression temporaries when we know that it will not be reevaluated
before its value is used, and that it will not be otherwise modified1 . Other temporaries can
be allocated using get_initialized_tmp_var or create_tmp_var.
Currently, an expression like a = b + 5 is not reduced any further. We tried converting it
to something like
T1 = b + 5;
a = T1;
but this bloated the representation for minimal benefit. However, a variable which must
live in memory cannot appear in an expression; its value is explicitly loaded into a temporary
first. Similarly, storing the value of an expression to a memory variable goes through a
temporary.
12.6 Operands
In general, expressions in GIMPLE consist of an operation and the appropriate number of
simple operands; these operands must either be a GIMPLE rvalue (is_gimple_val), i.e. a
constant or a register variable. More complex operands are factored out into temporaries,
so that
a = b + c + d
becomes
T1 = b + c;
a = T1 + d;
The same rule holds for arguments to a GIMPLE_CALL.
The target of an assignment is usually a variable, but can also be a MEM_REF or a compound
lvalue as described below.
1
These restrictions are derived from those in Morgan 4.8.
Chapter 12: GIMPLE 229
12.8.2 GIMPLE_ASSIGN
gassign *gimple_build_assign (tree lhs, tree rhs) [GIMPLE function]
Build a GIMPLE_ASSIGN statement. The left-hand side is an lvalue passed in lhs. The
right-hand side can be either a unary or binary tree expression. The expression tree
rhs will be flattened and its operands assigned to the corresponding operand slots in
the new statement. This function is useful when you already have a tree expression
that you want to convert into a tuple. However, try to avoid building expression
trees for the sole purpose of calling this function. If you already have the operands
in separate trees, it is better to use gimple_build_assign with enum tree_code
argument and separate arguments for each operand.
DST/SRC are the destination and source respectively. You can pass ungimplified trees in
DST or SRC, in which case they will be converted to a gimple operand if necessary.
This function returns the newly created GIMPLE_ASSIGN tuple.
12.8.3 GIMPLE_BIND
gbind *gimple_build_bind (tree vars, gimple_seq [GIMPLE function]
body)
Build a GIMPLE_BIND statement with a list of variables in VARS and a body of state-
ments in sequence BODY.
12.8.4 GIMPLE_CALL
gcall *gimple_build_call (tree fn, unsigned nargs, [GIMPLE function]
...)
Build a GIMPLE_CALL statement to function FN. The argument FN must be either
a FUNCTION_DECL or a gimple call address as determined by is_gimple_call_addr.
NARGS are the number of arguments. The rest of the arguments follow the argument
NARGS, and must be trees that are valid as rvalues in gimple (i.e., each operand is
validated with is_gimple_operand).
12.8.5 GIMPLE_CATCH
gcatch *gimple_build_catch (tree types, gimple_seq [GIMPLE function]
handler)
Build a GIMPLE_CATCH statement. TYPES are the tree types this catch handles.
HANDLER is a sequence of statements with the code for the handler.
12.8.6 GIMPLE_COND
gcond *gimple_build_cond ( enum tree_code [GIMPLE function]
pred_code, tree lhs, tree rhs, tree t_label, tree f_label)
Build a GIMPLE_COND statement. A GIMPLE_COND statement compares LHS and RHS
and if the condition in PRED_CODE is true, jump to the label in t_label, otherwise
jump to the label in f_label. PRED_CODE are relational operator tree codes like
EQ_EXPR, LT_EXPR, LE_EXPR, NE_EXPR, etc.
12.8.7 GIMPLE_DEBUG
gdebug *gimple_build_debug_bind (tree var, tree [GIMPLE function]
value, gimple stmt)
Build a GIMPLE_DEBUG statement with GIMPLE_DEBUG_BIND subcode. The effect of
this statement is to tell debug information generation machinery that the value of
user variable var is given by value at that point, and to remain with that value until
var runs out of scope, a dynamically-subsequent debug bind statement overrides the
binding, or conflicting values reach a control flow merge point. Even if components of
the value expression change afterwards, the variable is supposed to retain the same
value, though not necessarily the same location.
It is expected that var be most often a tree for automatic user variables (VAR_DECL
or PARM_DECL) that satisfy the requirements for gimple registers, but it may also be
a tree for a scalarized component of a user variable (ARRAY_REF, COMPONENT_REF), or
a debug temporary (DEBUG_EXPR_DECL).
As for value, it can be an arbitrary tree expression, but it is recommended that it be
in a suitable form for a gimple assignment RHS. It is not expected that user variables
that could appear as var ever appear in value, because in the latter we’d have their
SSA_NAMEs instead, but even if they were not in SSA form, user variables appearing
in value are to be regarded as part of the executable code space, whereas those in
var are to be regarded as part of the source code space. There is no way to refer to
the value bound to a user variable within a value expression.
242 GNU Compiler Collection (GCC) Internals
12.8.8 GIMPLE_EH_FILTER
geh_filter *gimple_build_eh_filter (tree types, [GIMPLE function]
gimple_seq failure)
Build a GIMPLE_EH_FILTER statement. TYPES are the filter’s types. FAILURE is a
sequence with the filter’s failure action.
tree gimple_eh_filter_types (gimple g) [GIMPLE function]
Return the types handled by GIMPLE_EH_FILTER statement G.
tree * gimple_eh_filter_types_ptr (gimple g) [GIMPLE function]
Return a pointer to the types handled by GIMPLE_EH_FILTER statement G.
gimple_seq gimple_eh_filter_failure (gimple g) [GIMPLE function]
Return the sequence of statement to execute when GIMPLE_EH_FILTER statement fails.
void gimple_eh_filter_set_types (geh_filter *g, [GIMPLE function]
tree types)
Set TYPES to be the set of types handled by GIMPLE_EH_FILTER G.
void gimple_eh_filter_set_failure (geh_filter *g, [GIMPLE function]
gimple_seq failure)
Set FAILURE to be the sequence of statements to execute on failure for GIMPLE_EH_
FILTER G.
tree gimple_eh_must_not_throw_fndecl ( geh_mnt [GIMPLE function]
*eh_mnt_stmt)
Get the function decl to be called by the MUST NOT THROW region.
void gimple_eh_must_not_throw_set_fndecl ( geh_mnt [GIMPLE function]
*eh_mnt_stmt, tree decl)
Set the function decl to be called by GS to DECL.
12.8.9 GIMPLE_LABEL
glabel *gimple_build_label (tree label) [GIMPLE function]
Build a GIMPLE_LABEL statement with corresponding to the tree label, LABEL.
tree gimple_label_label (const glabel *g) [GIMPLE function]
Return the LABEL_DECL node used by GIMPLE_LABEL statement G.
void gimple_label_set_label (glabel *g, tree label) [GIMPLE function]
Set LABEL to be the LABEL_DECL node used by GIMPLE_LABEL statement G.
12.8.10 GIMPLE_GOTO
ggoto *gimple_build_goto (tree dest) [GIMPLE function]
Build a GIMPLE_GOTO statement to label DEST.
tree gimple_goto_dest (gimple g) [GIMPLE function]
Return the destination of the unconditional jump G.
void gimple_goto_set_dest (ggoto *g, tree dest) [GIMPLE function]
Set DEST to be the destination of the unconditional jump G.
244 GNU Compiler Collection (GCC) Internals
12.8.11 GIMPLE_NOP
gimple gimple_build_nop (void) [GIMPLE function]
Build a GIMPLE_NOP statement.
bool gimple_nop_p (gimple g) [GIMPLE function]
Returns TRUE if statement G is a GIMPLE_NOP.
12.8.12 GIMPLE_OMP_ATOMIC_LOAD
gomp_atomic_load *gimple_build_omp_atomic_load ( [GIMPLE function]
tree lhs, tree rhs)
Build a GIMPLE_OMP_ATOMIC_LOAD statement. LHS is the left-hand side of the assign-
ment. RHS is the right-hand side of the assignment.
void gimple_omp_atomic_load_set_lhs ( [GIMPLE function]
gomp_atomic_load *g, tree lhs)
Set the LHS of an atomic load.
tree gimple_omp_atomic_load_lhs ( const [GIMPLE function]
gomp_atomic_load *g)
Get the LHS of an atomic load.
void gimple_omp_atomic_load_set_rhs ( [GIMPLE function]
gomp_atomic_load *g, tree rhs)
Set the RHS of an atomic set.
tree gimple_omp_atomic_load_rhs ( const [GIMPLE function]
gomp_atomic_load *g)
Get the RHS of an atomic set.
12.8.13 GIMPLE_OMP_ATOMIC_STORE
gomp_atomic_store *gimple_build_omp_atomic_store ( [GIMPLE function]
tree val)
Build a GIMPLE_OMP_ATOMIC_STORE statement. VAL is the value to be stored.
void gimple_omp_atomic_store_set_val ( [GIMPLE function]
gomp_atomic_store *g, tree val)
Set the value being stored in an atomic store.
tree gimple_omp_atomic_store_val ( const [GIMPLE function]
gomp_atomic_store *g)
Return the value being stored in an atomic store.
12.8.14 GIMPLE_OMP_CONTINUE
gomp_continue *gimple_build_omp_continue ( tree [GIMPLE function]
control_def, tree control_use)
Build a GIMPLE_OMP_CONTINUE statement. CONTROL_DEF is the definition of the con-
trol variable. CONTROL_USE is the use of the control variable.
Chapter 12: GIMPLE 245
12.8.15 GIMPLE_OMP_CRITICAL
gomp_critical *gimple_build_omp_critical ( [GIMPLE function]
gimple_seq body, tree name)
Build a GIMPLE_OMP_CRITICAL statement. BODY is the sequence of statements for
which only one thread can execute. NAME is an optional identifier for this critical
block.
tree gimple_omp_critical_name ( const gomp_critical [GIMPLE function]
*g)
Return the name associated with OMP_CRITICAL statement G.
tree * gimple_omp_critical_name_ptr ( gomp_critical [GIMPLE function]
*g)
Return a pointer to the name associated with OMP critical statement G.
void gimple_omp_critical_set_name ( gomp_critical [GIMPLE function]
*g, tree name)
Set NAME to be the name associated with OMP critical statement G.
12.8.16 GIMPLE_OMP_FOR
gomp_for *gimple_build_omp_for (gimple_seq body, [GIMPLE function]
tree clauses, tree index, tree initial, tree final, tree
incr, gimple_seq pre_body, enum tree_code omp_for_cond)
Build a GIMPLE_OMP_FOR statement. BODY is sequence of statements inside the for
loop. CLAUSES, are any of the loop construct’s clauses. PRE_BODY is the sequence of
246 GNU Compiler Collection (GCC) Internals
statements that are loop invariant. INDEX is the index variable. INITIAL is the initial
value of INDEX. FINAL is final value of INDEX. OMP FOR COND is the predicate
used to compare INDEX and FINAL. INCR is the increment expression.
12.8.17 GIMPLE_OMP_MASTER
gimple gimple_build_omp_master (gimple_seq body) [GIMPLE function]
Build a GIMPLE_OMP_MASTER statement. BODY is the sequence of statements to be
executed by just the master.
12.8.18 GIMPLE_OMP_ORDERED
gimple gimple_build_omp_ordered (gimple_seq body) [GIMPLE function]
Build a GIMPLE_OMP_ORDERED statement.
BODY is the sequence of statements inside a loop that will executed in sequence.
12.8.19 GIMPLE_OMP_PARALLEL
gomp_parallel *gimple_build_omp_parallel ( [GIMPLE function]
gimple_seq body, tree clauses, tree child_fn, tree data_arg)
Build a GIMPLE_OMP_PARALLEL statement.
BODY is sequence of statements which are executed in parallel. CLAUSES, are the OMP
parallel construct’s clauses. CHILD_FN is the function created for the parallel threads
to execute. DATA_ARG are the shared data argument(s).
bool gimple_omp_parallel_combined_p (gimple g) [GIMPLE function]
Return true if OMP parallel statement G has the GF_OMP_PARALLEL_COMBINED flag set.
void gimple_omp_parallel_set_combined_p (gimple g) [GIMPLE function]
Set the GF_OMP_PARALLEL_COMBINED field in OMP parallel statement G.
gimple_seq gimple_omp_body (gimple g) [GIMPLE function]
Return the body for the OMP statement G.
void gimple_omp_set_body (gimple g, gimple_seq [GIMPLE function]
body)
Set BODY to be the body for the OMP statement G.
tree gimple_omp_parallel_clauses (gimple g) [GIMPLE function]
Return the clauses associated with OMP_PARALLEL G.
248 GNU Compiler Collection (GCC) Internals
12.8.20 GIMPLE_OMP_RETURN
gimple gimple_build_omp_return (bool wait_p) [GIMPLE function]
Build a GIMPLE_OMP_RETURN statement. WAIT_P is true if this is a non-waiting return.
12.8.21 GIMPLE_OMP_SECTION
gimple gimple_build_omp_section (gimple_seq body) [GIMPLE function]
Build a GIMPLE_OMP_SECTION statement for a sections statement.
BODY is the sequence of statements in the section.
Chapter 12: GIMPLE 249
12.8.22 GIMPLE_OMP_SECTIONS
gomp_sections *gimple_build_omp_sections ( [GIMPLE function]
gimple_seq body, tree clauses)
Build a GIMPLE_OMP_SECTIONS statement. BODY is a sequence of section statements.
CLAUSES are any of the OMP sections construct’s clauses: private, firstprivate, lastpri-
vate, reduction, and nowait.
gimple gimple_build_omp_sections_switch (void) [GIMPLE function]
Build a GIMPLE_OMP_SECTIONS_SWITCH statement.
tree gimple_omp_sections_control (gimple g) [GIMPLE function]
Return the control variable associated with the GIMPLE_OMP_SECTIONS in G.
tree * gimple_omp_sections_control_ptr (gimple g) [GIMPLE function]
Return a pointer to the clauses associated with the GIMPLE_OMP_SECTIONS in G.
void gimple_omp_sections_set_control (gimple g, [GIMPLE function]
tree control)
Set CONTROL to be the set of clauses associated with the GIMPLE_OMP_SECTIONS in G.
tree gimple_omp_sections_clauses (gimple g) [GIMPLE function]
Return the clauses associated with OMP_SECTIONS G.
tree * gimple_omp_sections_clauses_ptr (gimple g) [GIMPLE function]
Return a pointer to the clauses associated with OMP_SECTIONS G.
void gimple_omp_sections_set_clauses (gimple g, [GIMPLE function]
tree clauses)
Set CLAUSES to be the set of clauses associated with OMP_SECTIONS G.
12.8.23 GIMPLE_OMP_SINGLE
gomp_single *gimple_build_omp_single ( gimple_seq [GIMPLE function]
body, tree clauses)
Build a GIMPLE_OMP_SINGLE statement. BODY is the sequence of statements that will
be executed once. CLAUSES are any of the OMP single construct’s clauses: private,
firstprivate, copyprivate, nowait.
tree gimple_omp_single_clauses (gimple g) [GIMPLE function]
Return the clauses associated with OMP_SINGLE G.
tree * gimple_omp_single_clauses_ptr (gimple g) [GIMPLE function]
Return a pointer to the clauses associated with OMP_SINGLE G.
void gimple_omp_single_set_clauses ( gomp_single [GIMPLE function]
*g, tree clauses)
Set CLAUSES to be the clauses associated with OMP_SINGLE G.
250 GNU Compiler Collection (GCC) Internals
12.8.24 GIMPLE_PHI
unsigned gimple_phi_capacity (gimple g) [GIMPLE function]
Return the maximum number of arguments supported by GIMPLE_PHI G.
12.8.25 GIMPLE_RESX
gresx *gimple_build_resx (int region) [GIMPLE function]
Build a GIMPLE_RESX statement which is a statement. This statement is a placeholder
for Unwind Resume before we know if a function call or a branch is needed. REGION
is the exception region from which control is flowing.
12.8.26 GIMPLE_RETURN
greturn *gimple_build_return (tree retval) [GIMPLE function]
Build a GIMPLE_RETURN statement whose return value is retval.
12.8.27 GIMPLE_SWITCH
gswitch *gimple_build_switch (tree index, tree [GIMPLE function]
default_label, vec<tree> *args)
Build a GIMPLE_SWITCH statement. INDEX is the index variable to switch on, and
DEFAULT_LABEL represents the default label. ARGS is a vector of CASE_LABEL_EXPR
trees that contain the non-default case labels. Each label is a tree of code CASE_
LABEL_EXPR.
12.8.28 GIMPLE_TRY
gtry *gimple_build_try (gimple_seq eval, gimple_seq [GIMPLE function]
cleanup, unsigned int kind)
Build a GIMPLE_TRY statement. EVAL is a sequence with the expression to evaluate.
CLEANUP is a sequence of statements to run at clean-up time. KIND is the enumeration
value GIMPLE_TRY_CATCH if this statement denotes a try/catch construct or GIMPLE_
TRY_FINALLY if this statement denotes a try/finally construct.
252 GNU Compiler Collection (GCC) Internals
12.8.29 GIMPLE_WITH_CLEANUP_EXPR
gimple gimple_build_wce (gimple_seq cleanup) [GIMPLE function]
Build a GIMPLE_WITH_CLEANUP_EXPR statement. CLEANUP is the clean-up expression.
gimple_seq gimple_wce_cleanup (gimple g) [GIMPLE function]
Return the cleanup sequence for cleanup statement G.
void gimple_wce_set_cleanup (gimple g, gimple_seq [GIMPLE function]
cleanup)
Set CLEANUP to be the cleanup sequence for G.
bool gimple_wce_cleanup_eh_only (gimple g) [GIMPLE function]
Return the CLEANUP_EH_ONLY flag for a WCE tuple.
void gimple_wce_set_cleanup_eh_only (gimple g, bool [GIMPLE function]
eh_only_p)
Set the CLEANUP_EH_ONLY flag for a WCE tuple.
can define a local variable of type struct gimple_sequence. When declaring a sequence
allocated on the garbage collected heap, use the function gimple_seq_alloc documented
below.
There are convenience functions for iterating through sequences in the section entitled
Sequence Iterators.
Below is a list of functions to manipulate and query sequences.
13.1 Annotations
The optimizers need to associate attributes with variables during the optimization process.
For instance, we need to know whether a variable has aliases. All these attributes are stored
in data structures called annotations which are then linked to the field ann in struct tree_
common.
new value to the operand, the operand is considered a definition (e.g., the operand at the
LHS of an assignment).
Virtual and real operands also have very different data flow properties. Real operands
are unambiguous references to the full object that they represent. For instance, given
{
int a, b;
a = b
}
Since a and b are non-aliased locals, the statement a = b will have one real definition and
one real use because variable a is completely modified with the contents of variable b. Real
definition are also known as killing definitions. Similarly, the use of b reads all its bits.
In contrast, virtual operands are used with variables that can have a partial or ambiguous
reference. This includes structures, arrays, globals, and aliased variables. In these cases, we
have two types of definitions. For globals, structures, and arrays, we can determine from
a statement whether a variable of these types has a killing definition. If the variable does,
then the statement is marked as having a must definition of that variable. However, if a
statement is only defining a part of the variable (i.e. a field in a structure), or if we know
that a statement might define the variable but we cannot say for sure, then we mark that
statement as having a may definition. For instance, given
{
int a, b, *p;
if (...)
p = &a;
else
p = &b;
*p = 5;
return *p;
}
if (...)
p = &a;
else
p = &b;
# a = VDEF <a>
# b = VDEF <b>
*p = 5;
# VUSE <a>
# VUSE <b>
return *p;
}
Chapter 13: Analysis and Optimization of GIMPLE tuples 261
Notice that VDEF operands have two copies of the referenced variable. This indicates that
this is not a killing definition of that variable. In this case we refer to it as a may definition
or aliased store. The presence of the second copy of the variable in the VDEF operand will
become important when the function is converted into SSA form. This will be used to link
all the non-killing definitions to prevent optimizations from making incorrect assumptions
about them.
Operands are updated as soon as the statement is finished via a call to update_stmt.
If statement elements are changed via SET_USE or SET_DEF, then no further action is re-
quired (i.e., those macros take care of updating the statement). If changes are made by
manipulating the statement’s tree directly, then a call must be made to update_stmt when
complete. Calling one of the bsi_insert routines or bsi_replace performs an implicit call
to update_stmt.
If you wish to iterate over some or all operands, use the FOR_EACH_SSA_{USE,DEF,TREE}_
OPERAND iterator. For example, to print all the operands for a statement:
void
print_ops (tree stmt)
{
ssa_op_iter;
tree var;
def_operand_p FOR_EACH_SSA_DEF_OPERAND
tree FOR_EACH_SSA_TREE_OPERAND
2. You need to declare a variable of the type you are interested in, and an ssa op iter
structure which serves as the loop controlling variable.
3. Determine which operands you wish to use, and specify the flags of those you are
interested in. They are documented in tree-ssa-operands.h:
#define SSA_OP_USE 0x01 /* Real USE operands. */
#define SSA_OP_DEF 0x02 /* Real DEF operands. */
#define SSA_OP_VUSE 0x04 /* VUSE operands. */
#define SSA_OP_VDEF 0x08 /* VDEF operands. */
So if you want to look at the use pointers for all the USE and VUSE operands, you would
do something like:
use_operand_p use_p;
ssa_op_iter iter;
version number and the statement that created the SSA_NAME. Only definitions and virtual
definitions may create new SSA_NAME nodes.
Sometimes, flow of control makes it impossible to determine the most recent version of a
variable. In these cases, the compiler inserts an artificial definition for that variable called
PHI function or PHI node. This new definition merges all the incoming versions of the
variable to create a new name for it. For instance,
if (...)
a_1 = 5;
else if (...)
a_2 = 2;
else
a_3 = 13;
Suppose that we insert new names x_10 and x_11 (lines 4 and 8).
1 L0:
2 x_1 = PHI (0, x_5)
3 if (x_1 < 10)
4 x_10 = ...
5 if (x_1 > 7)
6 y_2 = 0
7 else
8 x_11 = ...
9 y_3 = x_1 + x_7
10 endif
11 x_5 = x_1 + 1
12 goto L0;
13 endif
We want to replace all the uses of x_1 with the new definitions of x_10 and x_11. Note
that the only uses that should be replaced are those at lines 5, 9 and 11. Also, the use of x_7
at line 9 should not be replaced (this is why we cannot just mark symbol x for renaming).
Additionally, we may need to insert a PHI node at line 11 because that is a merge point
for x_10 and x_11. So the use of x_1 at line 11 will be replaced with the new PHI node.
The insertion of PHI nodes is optional. They are not strictly necessary to preserve the
SSA form, and depending on what the caller inserted, they may not even be useful for the
optimizers.
Updating the SSA form is a two step process. First, the pass has to identify which
names need to be updated and/or which symbols need to be renamed into SSA form for
the first time. When new names are introduced to replace existing names in the program,
the mapping between the old and the new names are registered by calling register_new_
name_mapping (note that if your pass creates new code by duplicating basic blocks, the call
to tree_duplicate_bb will set up the necessary mappings automatically).
After the replacement mappings have been registered and new symbols marked for re-
naming, a call to update_ssa makes the registered changes. This can be done with an
explicit call or by creating TODO flags in the tree_opt_pass structure for your pass. There
are several TODO flags that control the behavior of update_ssa:
• TODO_update_ssa. Update the SSA form inserting PHI nodes for newly exposed sym-
bols and virtual names marked for updating. When updating real names, only insert
PHI nodes for a real name O_j in blocks reached by all the new and old definitions for
O_j. If the iterated dominance frontier for O_j is not pruned, we may end up inserting
PHI nodes in blocks that have one or more edges with no incoming definition for O_j.
This would lead to uninitialized warnings for O_j’s symbol.
Chapter 13: Analysis and Optimization of GIMPLE tuples 267
• TODO_update_ssa_no_phi. Update the SSA form without inserting any new PHI nodes
at all. This is used by passes that have either inserted all the PHI nodes themselves or
passes that need only to patch use-def and def-def chains for virtuals (e.g., DCE).
• TODO_update_ssa_full_phi. Insert PHI nodes everywhere they are needed. No prun-
ing of the IDF is done. This is used by passes that need the PHI nodes for O_j even
if it means that some arguments will come from the default definition of O_j’s symbol
(e.g., pass_linear_transform).
WARNING: If you need to use this flag, chances are that your pass may be doing
something wrong. Inserting PHI nodes for an old name where not all edges carry a
new replacement may lead to silent codegen errors or spurious uninitialized warnings.
• TODO_update_ssa_only_virtuals. Passes that update the SSA form on their own
may want to delegate the updating of virtual names to the generic updater. Since
FUD chains are easier to maintain, this simplifies the work they need to do. NOTE:
If this flag is used, any OLD->NEW mappings for real names are explicitly destroyed
and only the symbols marked for renaming are processed.
alias sets are not allowed to alias. For an example, see the C front-end function c_get_
alias_set.
4. Tree alias-oracle
The tree alias-oracle provides means to disambiguate two memory references and mem-
ory references against statements. The following queries are available:
• refs_may_alias_p
• ref_maybe_used_by_stmt_p
• stmt_may_clobber_ref_p
In addition to those two kind of statement walkers are available walking statements
related to a reference ref. walk_non_aliased_vuses walks over dominating memory
defining statements and calls back if the statement does not clobber ref providing the
non-aliased VUSE. The walk stops at the first clobbering statement or if asked to.
walk_aliased_vdefs walks over dominating memory defining statements and calls
back on each statement clobbering ref providing its aliasing VDEF. The walk stops if
asked to.
14 RTL Representation
The last part of the compiler work is done on a low-level intermediate representation called
Register Transfer Language. In this language, the instructions to be output are described,
pretty much one by one, in an algebraic form that describes what the instruction does.
RTL is inspired by Lisp lists. It has both an internal form, made up of structures that
point at other structures, and a textual form that is used in the machine description and
in printed debugging dumps. The textual form uses nested parentheses to indicate the
pointers in the internal form.
The expression code determines how many operands the expression contains, and what
kinds of objects they are. In RTL, unlike Lisp, you cannot tell by looking at an operand
what kind of object it is. Instead, you must know from its context—from the expression
code of the containing expression. For example, in an expression of code subreg, the first
operand is to be regarded as an expression and the second operand as a polynomial integer.
In an expression of code plus, there are two operands, both of which are to be regarded as
expressions. In a symbol_ref expression, there is one operand, which is to be regarded as
a string.
Expressions are written as parentheses containing the name of the expression type, its
flags and machine mode if any, and then the operands of the expression (separated by
spaces).
Expression code names in the ‘md’ file are written in lowercase, but when they appear in C
code they are written in uppercase. In this manual, they are shown as follows: const_int.
In a few contexts a null pointer is valid where an expression is normally wanted. The
written form of this is (nil).
RTX_BITFIELD_OPS
An RTX code for a bit-field operation. Currently only ZERO_EXTRACT and
SIGN_EXTRACT. These have three inputs and are lvalues (so they can be used
for insertion as well). See Section 14.11 [Bit-Fields], page 305.
RTX_TERNARY
An RTX code for other three input operations. Currently only IF_THEN_ELSE,
VEC_MERGE, SIGN_EXTRACT, ZERO_EXTRACT, and FMA.
RTX_INSN An RTX code for an entire instruction: INSN, JUMP_INSN, and CALL_INSN. See
Section 14.19 [Insns], page 316.
RTX_MATCH
An RTX code for something that matches in insns, such as MATCH_DUP. These
only occur in machine descriptions.
RTX_AUTOINC
An RTX code for an auto-increment addressing mode, such as POST_INC. ‘XEXP
(x, 0)’ gives the auto-modified register.
RTX_EXTRA
All other RTX codes. This category includes the remaining codes used only in
machine descriptions (DEFINE_*, etc.). It also includes all the codes describing
side effects (SET, USE, CLOBBER, etc.) and the non-insns that may appear on
an insn chain, such as NOTE, BARRIER, and CODE_LABEL. SUBREG is also part of
this class.
For each expression code, rtl.def specifies the number of contained objects and their
kinds using a sequence of characters called the format of the expression code. For example,
the format of subreg is ‘ep’.
These are the most commonly used format characters:
e An expression (actually a pointer to an expression).
i An integer.
w A wide integer.
s A string.
E A vector of expressions.
A few other format characters are used occasionally:
u ‘u’ is equivalent to ‘e’ except that it is printed differently in debugging dumps.
It is used for pointers to insns.
n ‘n’ is equivalent to ‘i’ except that it is printed differently in debugging dumps.
It is used for the line number or code number of a note insn.
S ‘S’ indicates a string which is optional. In the RTL objects in core, ‘S’ is
equivalent to ‘s’, but when the object is read, from an ‘md’ file, the string value
of this operand may be omitted. An omitted string is taken to be the null
string.
274 GNU Compiler Collection (GCC) Internals
V ‘V’ indicates a vector which is optional. In the RTL objects in core, ‘V’ is
equivalent to ‘E’, but when the object is read from an ‘md’ file, the vector value
of this operand may be omitted. An omitted vector is effectively the same as a
vector of no elements.
B ‘B’ indicates a pointer to basic block structure.
p A polynomial integer. At present this is used only for SUBREG_BYTE.
0 ‘0’ means a slot whose contents do not fit any normal category. ‘0’ slots are
not printed at all in dumps, and are often used in special ways by small parts
of the compiler.
There are macros to get the number of operands and the format of an expression code:
GET_RTX_LENGTH (code)
Number of operands of an RTX of code code.
GET_RTX_FORMAT (code)
The format of an RTX of code code, as a C string.
Some classes of RTX codes always have the same format. For example, it is safe to assume
that all comparison operations have format ee.
RTX_UNARY
All codes of this class have format e.
RTX_BIN_ARITH
RTX_COMM_ARITH
RTX_COMM_COMPARE
RTX_COMPARE
All codes of these classes have format ee.
RTX_BITFIELD_OPS
RTX_TERNARY
All codes of these classes have format eee.
RTX_INSN All codes of this class have formats that begin with iuueiee. See Section 14.19
[Insns], page 316. Note that not all RTL objects linked onto an insn chain are
of class RTX_INSN.
RTX_CONST_OBJ
RTX_OBJ
RTX_MATCH
RTX_EXTRA
You can make no assumptions about the format of these codes.
SYMBOL_REF_CONSTANT (x)
If ‘CONSTANT_POOL_ADDRESS_P (x)’ is true, this is the constant pool
entry for x. It is null otherwise.
SYMBOL_REF_DATA (x)
A field of opaque type used to store SYMBOL_REF_DECL or SYMBOL_
REF_CONSTANT.
SYMBOL_REF_FLAGS (x)
In a symbol_ref, this is used to communicate various predicates
about the symbol. Some of these are common enough to be com-
puted by common code, some are specific to the target. The com-
mon bits are:
SYMBOL_FLAG_FUNCTION
Set if the symbol refers to a function.
SYMBOL_FLAG_LOCAL
Set if the symbol is local to this “module”. See TARGET_
BINDS_LOCAL_P.
SYMBOL_FLAG_EXTERNAL
Set if this symbol is not defined in this translation
unit. Note that this is not the inverse of SYMBOL_FLAG_
LOCAL.
SYMBOL_FLAG_SMALL
Set if the symbol is located in the small data section.
See TARGET_IN_SMALL_DATA_P.
SYMBOL_REF_TLS_MODEL (x)
This is a multi-bit field accessor that returns the tls_
model to be used for a thread-local storage symbol. It
returns zero for non-thread-local symbols.
SYMBOL_FLAG_HAS_BLOCK_INFO
Set if the symbol has SYMBOL_REF_BLOCK and SYMBOL_
REF_BLOCK_OFFSET fields.
SYMBOL_FLAG_ANCHOR
Set if the symbol is used as a section anchor. “Sec-
tion anchors” are symbols that have a known position
within an object_block and that can be used to ac-
cess nearby members of that block. They are used to
implement -fsection-anchors.
If this flag is set, then SYMBOL_FLAG_HAS_BLOCK_INFO
will be too.
Bits beginning with SYMBOL_FLAG_MACH_DEP are available for the
target’s use.
SYMBOL_REF_BLOCK (x)
If ‘SYMBOL_REF_HAS_BLOCK_INFO_P (x)’, this is the ‘object_block’ structure
to which the symbol belongs, or NULL if it has not been assigned a block.
278 GNU Compiler Collection (GCC) Internals
SYMBOL_REF_BLOCK_OFFSET (x)
If ‘SYMBOL_REF_HAS_BLOCK_INFO_P (x)’, this is the offset of x from the first
object in ‘SYMBOL_REF_BLOCK (x)’. The value is negative if x has not yet been
assigned to a block, or it has not been given an offset within that block.
MEM_KEEP_ALIAS_SET_P (x)
In mem expressions, 1 if we should keep the alias set for this mem unchanged
when we access a component. Set to 1, for example, when we are already in
a non-addressable component of an aggregate. Stored in the jump field and
printed as ‘/j’.
MEM_VOLATILE_P (x)
In mem, asm_operands, and asm_input expressions, nonzero for volatile memory
references. Stored in the volatil field and printed as ‘/v’.
MEM_NOTRAP_P (x)
In mem, nonzero for memory references that will not trap. Stored in the call
field and printed as ‘/c’.
MEM_POINTER (x)
Nonzero in a mem if the memory reference holds a pointer. Stored in the frame_
related field and printed as ‘/f’.
MEM_READONLY_P (x)
Nonzero in a mem, if the memory is statically allocated and read-only.
Read-only in this context means never modified during the lifetime of the pro-
gram, not necessarily in ROM or in write-disabled pages. A common example
of the later is a shared library’s global offset table. This table is initialized by
the runtime loader, so the memory is technically writable, but after control is
transferred from the runtime loader to the application, this memory will never
be subsequently modified.
Stored in the unchanging field and printed as ‘/u’.
PREFETCH_SCHEDULE_BARRIER_P (x)
In a prefetch, indicates that the prefetch is a scheduling barrier. No other
INSNs will be moved over it. Stored in the volatil field and printed as ‘/v’.
REG_FUNCTION_VALUE_P (x)
Nonzero in a reg if it is the place in which this function’s value is going to be
returned. (This happens only in a hard register.) Stored in the return_val
field and printed as ‘/i’.
REG_POINTER (x)
Nonzero in a reg if the register holds a pointer. Stored in the frame_related
field and printed as ‘/f’.
REG_USERVAR_P (x)
In a reg, nonzero if it corresponds to a variable present in the user’s source
code. Zero for temporaries generated internally by the compiler. Stored in the
volatil field and printed as ‘/v’.
The same hard register may be used also for collecting the values of functions
called by this one, but REG_FUNCTION_VALUE_P is zero in this kind of use.
RTL_CONST_CALL_P (x)
In a call_insn indicates that the insn represents a call to a const function.
Stored in the unchanging field and printed as ‘/u’.
280 GNU Compiler Collection (GCC) Internals
RTL_PURE_CALL_P (x)
In a call_insn indicates that the insn represents a call to a pure function.
Stored in the return_val field and printed as ‘/i’.
RTL_CONST_OR_PURE_CALL_P (x)
In a call_insn, true if RTL_CONST_CALL_P or RTL_PURE_CALL_P is true.
RTL_LOOPING_CONST_OR_PURE_CALL_P (x)
In a call_insn indicates that the insn represents a possibly infinite looping
call to a const or pure function. Stored in the call field and printed as ‘/c’.
Only true if one of RTL_CONST_CALL_P or RTL_PURE_CALL_P is true.
RTX_FRAME_RELATED_P (x)
Nonzero in an insn, call_insn, jump_insn, barrier, or set which is part of a
function prologue and sets the stack pointer, sets the frame pointer, or saves a
register. This flag should also be set on an instruction that sets up a temporary
register to use in place of the frame pointer. Stored in the frame_related field
and printed as ‘/f’.
In particular, on RISC targets where there are limits on the sizes of immediate
constants, it is sometimes impossible to reach the register save area directly from
the stack pointer. In that case, a temporary register is used that is near enough
to the register save area, and the Canonical Frame Address, i.e., DWARF2’s
logical frame pointer, register must (temporarily) be changed to be this tem-
porary register. So, the instruction that sets this temporary register must be
marked as RTX_FRAME_RELATED_P.
If the marked instruction is overly complex (defined in terms of what
dwarf2out_frame_debug_expr can handle), you will also have to create a
REG_FRAME_RELATED_EXPR note and attach it to the instruction. This note
should contain a simple expression of the computation performed by this
instruction, i.e., one that dwarf2out_frame_debug_expr can handle.
This flag is required for exception handling support on targets with RTL pro-
logues.
SCHED_GROUP_P (x)
During instruction scheduling, in an insn, call_insn, jump_insn or jump_
table_data, indicates that the previous insn must be scheduled together with
this insn. This is used to ensure that certain groups of instructions will not
be split up by the instruction scheduling pass, for example, use insns before a
call_insn may not be separated from the call_insn. Stored in the in_struct
field and printed as ‘/s’.
SET_IS_RETURN_P (x)
For a set, nonzero if it is for a return. Stored in the jump field and printed as
‘/j’.
SIBLING_CALL_P (x)
For a call_insn, nonzero if the insn is a sibling call. Stored in the jump field
and printed as ‘/j’.
Chapter 14: RTL Representation 281
STRING_POOL_ADDRESS_P (x)
For a symbol_ref expression, nonzero if it addresses this function’s string con-
stant pool. Stored in the frame_related field and printed as ‘/f’.
SUBREG_PROMOTED_UNSIGNED_P (x)
Returns a value greater then zero for a subreg that has SUBREG_PROMOTED_
VAR_P nonzero if the object being referenced is kept zero-extended, zero if it
is kept sign-extended, and less then zero if it is extended some other way via
the ptr_extend instruction. Stored in the unchanging field and volatil field,
printed as ‘/u’ and ‘/v’. This macro may only be used to get the value it
may not be used to change the value. Use SUBREG_PROMOTED_UNSIGNED_SET to
change the value.
SUBREG_PROMOTED_UNSIGNED_SET (x)
Set the unchanging and volatil fields in a subreg to reflect zero, sign, or
other extension. If volatil is zero, then unchanging as nonzero means zero
extension and as zero means sign extension. If volatil is nonzero then some
other type of extension was done via the ptr_extend instruction.
SUBREG_PROMOTED_VAR_P (x)
Nonzero in a subreg if it was made when accessing an object that was promoted
to a wider mode in accord with the PROMOTED_MODE machine description macro
(see Section 18.5 [Storage Layout], page 516). In this case, the mode of the
subreg is the declared mode of the object and the mode of SUBREG_REG is the
mode of the register that holds the object. Promoted variables are always either
sign- or zero-extended to the wider mode on every assignment. Stored in the
in_struct field and printed as ‘/s’.
SYMBOL_REF_USED (x)
In a symbol_ref, indicates that x has been used. This is normally only used
to ensure that x is only declared external once. Stored in the used field.
SYMBOL_REF_WEAK (x)
In a symbol_ref, indicates that x has been declared weak. Stored in the
return_val field and printed as ‘/i’.
SYMBOL_REF_FLAG (x)
In a symbol_ref, this is used as a flag for machine-specific purposes. Stored in
the volatil field and printed as ‘/v’.
Most uses of SYMBOL_REF_FLAG are historic and may be subsumed by SYMBOL_
REF_FLAGS. Certainly use of SYMBOL_REF_FLAGS is mandatory if the target
requires more than one bit of storage.
call In a mem, 1 means that the memory reference will not trap.
In a call, 1 means that this pure or const call may possibly infinite loop.
In an RTL dump, this flag is represented as ‘/c’.
282 GNU Compiler Collection (GCC) Internals
frame_related
In an insn or set expression, 1 means that it is part of a function prologue
and sets the stack pointer, sets the frame pointer, saves a register, or sets up a
temporary register to use in place of the frame pointer.
In reg expressions, 1 means that the register holds a pointer.
In mem expressions, 1 means that the memory reference holds a pointer.
In symbol_ref expressions, 1 means that the reference addresses this function’s
string constant pool.
In an RTL dump, this flag is represented as ‘/f’.
in_struct
In reg expressions, it is 1 if the register has its entire life contained within the
test expression of some loop.
In subreg expressions, 1 means that the subreg is accessing an object that has
had its mode promoted from a wider mode.
In label_ref expressions, 1 means that the referenced label is outside the
innermost loop containing the insn in which the label_ref was found.
In code_label expressions, it is 1 if the label may never be deleted. This is
used for labels which are the target of non-local gotos. Such a label that would
have been deleted is replaced with a note of type NOTE_INSN_DELETED_LABEL.
In an insn during dead-code elimination, 1 means that the insn is dead code.
In an insn or jump_insn during reorg for an insn in the delay slot of a branch,
1 means that this insn is from the target of the branch.
In an insn during instruction scheduling, 1 means that this insn must be sched-
uled as part of a group together with the previous insn.
In an RTL dump, this flag is represented as ‘/s’.
return_val
In reg expressions, 1 means the register contains the value to be returned by
the current function. On machines that pass parameters in registers, the same
register number may be used for parameters as well, but this flag is not set on
such uses.
In symbol_ref expressions, 1 means the referenced symbol is weak.
In call expressions, 1 means the call is pure.
In an RTL dump, this flag is represented as ‘/i’.
jump In a mem expression, 1 means we should keep the alias set for this mem un-
changed when we access a component.
In a set, 1 means it is for a return.
In a call_insn, 1 means it is a sibling call.
In a jump_insn, 1 means it is a crossing jump.
In an RTL dump, this flag is represented as ‘/j’.
unchanging
In reg and mem expressions, 1 means that the value of the expression never
changes.
Chapter 14: RTL Representation 283
BLKmode “Block” mode represents values that are aggregates to which none of the other
modes apply. In RTL, only memory references can have this mode, and only if
they appear in string-move or vector instructions. On machines which have no
such instructions, BLKmode will not appear in RTL.
VOIDmode Void mode means the absence of a mode or an unspecified mode. For example,
RTL expressions of code const_int have mode VOIDmode because they can be
taken to have whatever mode the context requires. In debugging dumps of
RTL, VOIDmode is expressed by the absence of any mode.
QCmode, HCmode, SCmode, DCmode, XCmode, TCmode
These modes stand for a complex number represented as a pair of floating
point values. The floating point values are in QFmode, HFmode, SFmode, DFmode,
XFmode, and TFmode, respectively.
CQImode, CHImode, CSImode, CDImode, CTImode, COImode, CPSImode
These modes stand for a complex number represented as a pair of integer values.
The integer values are in QImode, HImode, SImode, DImode, TImode, OImode,
and PSImode, respectively.
BND32mode BND64mode
These modes stand for bounds for pointer of 32 and 64 bit size respectively.
Mode size is double pointer mode size.
The machine description defines Pmode as a C macro which expands into the machine
mode used for addresses. Normally this is the mode whose size is BITS_PER_WORD, SImode
on 32-bit machines.
The only modes which a machine description must support are QImode, and the modes
corresponding to BITS_PER_WORD, FLOAT_TYPE_SIZE and DOUBLE_TYPE_SIZE. The compiler
will attempt to use DImode for 8-byte structures and unions, but this can be prevented by
overriding the definition of MAX_FIXED_MODE_SIZE. Alternatively, you can have the compiler
use TImode for 16-byte structures and unions. Likewise, you can arrange for the C type
short int to avoid using HImode.
Very few explicit references to machine modes remain in the compiler and these few
references will soon be removed. Instead, the machine modes are divided into mode classes.
These are represented by the enumeration type enum mode_class defined in machmode.h.
The possible mode classes are:
MODE_INT Integer modes. By default these are BImode, QImode, HImode, SImode, DImode,
TImode, and OImode.
MODE_PARTIAL_INT
The “partial integer” modes, PQImode, PHImode, PSImode and PDImode.
MODE_FLOAT
Floating point modes. By default these are QFmode, HFmode, TQFmode, SFmode,
DFmode, XFmode and TFmode.
MODE_DECIMAL_FLOAT
Decimal floating point modes. By default these are SDmode, DDmode and TDmode.
Chapter 14: RTL Representation 287
MODE_FRACT
Signed fractional modes. By default these are QQmode, HQmode, SQmode, DQmode
and TQmode.
MODE_UFRACT
Unsigned fractional modes. By default these are UQQmode, UHQmode, USQmode,
UDQmode and UTQmode.
MODE_ACCUM
Signed accumulator modes. By default these are HAmode, SAmode, DAmode and
TAmode.
MODE_UACCUM
Unsigned accumulator modes. By default these are UHAmode, USAmode, UDAmode
and UTAmode.
MODE_COMPLEX_INT
Complex integer modes. (These are not currently implemented).
MODE_COMPLEX_FLOAT
Complex floating point modes. By default these are QCmode, HCmode, SCmode,
DCmode, XCmode, and TCmode.
MODE_CC Modes representing condition code values. These are CCmode plus any CC_MODE
modes listed in the machine-modes.def. See Section 17.12 [Jump Patterns],
page 458, also see Section 18.15 [Condition Code], page 600.
MODE_POINTER_BOUNDS
Pointer bounds modes. Used to represent values of pointer bounds type. Opera-
tions in these modes may be executed as NOPs depending on hardware features
and environment setup.
MODE_OPAQUE
This is a mode class for modes that don’t want to provide operations other than
register moves, memory moves, loads, stores, and unspecs. They have a size
and precision and that’s all.
MODE_RANDOM
This is a catchall mode class for modes which don’t fit into the above classes.
Currently VOIDmode and BLKmode are in MODE_RANDOM.
machmode.h also defines various wrapper classes that combine a machine_mode with a
static assertion that a particular condition holds. The classes are:
scalar_int_mode
A mode that has class MODE_INT or MODE_PARTIAL_INT.
scalar_float_mode
A mode that has class MODE_FLOAT or MODE_DECIMAL_FLOAT.
scalar_mode
A mode that holds a single numerical value. In practice this means that the
mode is a scalar_int_mode, is a scalar_float_mode, or has class MODE_FRACT,
MODE_UFRACT, MODE_ACCUM, MODE_UACCUM or MODE_POINTER_BOUNDS.
288 GNU Compiler Collection (GCC) Internals
complex_mode
A mode that has class MODE_COMPLEX_INT or MODE_COMPLEX_FLOAT.
fixed_size_mode
A mode whose size is known at compile time.
Named modes use the most constrained of the available wrapper classes, if one exists,
otherwise they use machine_mode. For example, QImode is a scalar_int_mode, SFmode is
a scalar_float_mode and BLKmode is a plain machine_mode. It is possible to refer to any
mode as a raw machine_mode by adding the E_ prefix, where E stands for “enumeration”.
For example, the raw machine_mode names of the modes just mentioned are E_QImode,
E_SFmode and E_BLKmode respectively.
The wrapper classes implicitly convert to machine_mode and to any wrapper class that
represents a more general condition; for example scalar_int_mode and scalar_float_
mode both convert to scalar_mode and all three convert to fixed_size_mode. The classes
act like machine_modes that accept only certain named modes.
machmode.h also defines a template class opt_mode<T> that holds a T or nothing, where
T can be either machine_mode or one of the wrapper classes above. The main operations
on an opt_mode<T> x are as follows:
‘x.exists ()’
Return true if x holds a mode rather than nothing.
‘x.exists (&y)’
Return true if x holds a mode rather than nothing, storing the mode in y if so.
y must be assignment-compatible with T.
‘x.require ()’
Assert that x holds a mode rather than nothing and return that mode.
‘x = y’ Set x to y, where y is a T or implicitly converts to a T.
The default constructor sets an opt_mode<T> to nothing. There is also a constructor that
takes an initial value of type T.
It is possible to use the is-a.h accessors on a machine_mode or machine mode wrapper
x:
‘is_a <T> (x)’
Return true if x meets the conditions for wrapper class T.
‘is_a <T> (x, &y)’
Return true if x meets the conditions for wrapper class T, storing it in y if so.
y must be assignment-compatible with T.
‘as_a <T> (x)’
Assert that x meets the conditions for wrapper class T and return it as a T.
‘dyn_cast <T> (x)’
Return an opt_mode<T> that holds x if x meets the conditions for wrapper class
T and that holds nothing otherwise.
The purpose of these wrapper classes is to give stronger static type checking. For example,
if a function takes a scalar_int_mode, a caller that has a general machine_mode must either
check or assert that the code is indeed a scalar integer first, using one of the functions above.
Chapter 14: RTL Representation 289
The wrapper classes are normal C++ classes, with user-defined constructors. Sometimes
it is useful to have a POD version of the same type, particularly if the type appears in a
union. The template class pod_mode<T> provides a POD version of wrapper class T. It is
assignment-compatible with T and implicitly converts to both machine_mode and T.
Here are some C macros that relate to machine modes:
GET_MODE (x)
Returns the machine mode of the RTX x.
PUT_MODE (x, newmode)
Alters the machine mode of the RTX x to be newmode.
NUM_MACHINE_MODES
Stands for the number of machine modes available on the target machine. This
is one greater than the largest numeric value of any machine mode.
GET_MODE_NAME (m)
Returns the name of mode m as a string.
GET_MODE_CLASS (m)
Returns the mode class of mode m.
GET_MODE_WIDER_MODE (m)
Returns the next wider natural mode. For example, the expression GET_MODE_
WIDER_MODE (QImode) returns HImode.
GET_MODE_SIZE (m)
Returns the size in bytes of a datum of mode m.
GET_MODE_BITSIZE (m)
Returns the size in bits of a datum of mode m.
GET_MODE_IBIT (m)
Returns the number of integral bits of a datum of fixed-point mode m.
GET_MODE_FBIT (m)
Returns the number of fractional bits of a datum of fixed-point mode m.
GET_MODE_MASK (m)
Returns a bitmask containing 1 for all bits in a word that fit within mode m.
This macro can only be used for modes whose bitsize is less than or equal to
HOST_BITS_PER_INT.
GET_MODE_ALIGNMENT (m)
Return the required alignment, in bits, for an object of mode m.
GET_MODE_UNIT_SIZE (m)
Returns the size in bytes of the subunits of a datum of mode m. This is the
same as GET_MODE_SIZE except in the case of complex modes. For them, the
unit size is the size of the real or imaginary part.
GET_MODE_NUNITS (m)
Returns the number of units contained in a mode, i.e., GET_MODE_SIZE divided
by GET_MODE_UNIT_SIZE.
290 GNU Compiler Collection (GCC) Internals
GET_CLASS_NARROWEST_MODE (c)
Returns the narrowest mode in mode class c.
The following 3 variables are defined on every target. They can be used to allocate buffers
that are guaranteed to be large enough to hold any value that can be represented on the
target. The first two can be overridden by defining them in the target’s mode.def file,
however, the value must be a constant that can determined very early in the compilation
process. The third symbol cannot be overridden.
BITS_PER_UNIT
The number of bits in an addressable storage unit (byte). If you do not define
this, the default is 8.
MAX_BITSIZE_MODE_ANY_INT
The maximum bitsize of any mode that is used in integer math. This should be
overridden by the target if it uses large integers as containers for larger vectors
but otherwise never uses the contents to compute integer values.
MAX_BITSIZE_MODE_ANY_MODE
The bitsize of the largest mode on the target. The default value is the largest
mode size given in the mode definition file, which is always correct for targets
whose modes have a fixed size. Targets that might increase the size of a mode
beyond this default should define MAX_BITSIZE_MODE_ANY_MODE to the actual
upper limit in machine-modes.def.
The global variables byte_mode and word_mode contain modes whose classes are MODE_
INT and whose bitsizes are either BITS_PER_UNIT or BITS_PER_WORD, respectively. On 32-bit
machines, these are QImode and SImode, respectively.
Similarly, there is only one object for the integer whose value is STORE_FLAG_
VALUE. It is found in const_true_rtx. If STORE_FLAG_VALUE is one, const_
true_rtx and const1_rtx will point to the same object. If STORE_FLAG_VALUE
is −1, const_true_rtx and constm1_rtx will point to the same object.
(const_double:m i0 i1 ...)
This represents either a floating-point constant of mode m or (on older ports
that do not define TARGET_SUPPORTS_WIDE_INT) an integer constant too large
to fit into HOST_BITS_PER_WIDE_INT bits but small enough to fit within twice
that number of bits. In the latter case, m will be VOIDmode. For integral values
constants for modes with more bits than twice the number in HOST_WIDE_INT
the implied high order bits of that constant are copies of the top bit of CONST_
DOUBLE_HIGH. Note however that integral values are neither inherently signed
nor inherently unsigned; where necessary, signedness is determined by the rtl
operation instead.
On more modern ports, CONST_DOUBLE only represents floating point values.
New ports define TARGET_SUPPORTS_WIDE_INT to make this designation.
If m is VOIDmode, the bits of the value are stored in i0 and i1. i0 is customarily
accessed with the macro CONST_DOUBLE_LOW and i1 with CONST_DOUBLE_HIGH.
If the constant is floating point (regardless of its precision), then the number
of integers used to store the value depends on the size of REAL_VALUE_TYPE
(see Section 18.22 [Floating Point], page 655). The integers represent a float-
ing point number, but not precisely in the target machine’s or host machine’s
floating point format. To convert them to the precise bit pattern used by the
target machine, use the macro REAL_VALUE_TO_TARGET_DOUBLE and friends (see
Section 18.20.2 [Data Output], page 627).
The host dependency for the number of integers used to store a double value
makes it problematic for machine descriptions to use expressions of code const_
double and therefore a syntactic alias has been provided:
(const_double_zero:m)
standing for:
(const_double:m 0 0 ...)
for matching the floating-point value zero, possibly the only useful one.
(const_wide_int:m nunits elt0 ...)
This contains an array of HOST_WIDE_INTs that is large enough to hold any
constant that can be represented on the target. This form of rtl is only used
on targets that define TARGET_SUPPORTS_WIDE_INT to be nonzero and then
CONST_DOUBLEs are only used to hold floating-point values. If the target leaves
TARGET_SUPPORTS_WIDE_INT defined as 0, CONST_WIDE_INTs are not used and
CONST_DOUBLEs are as they were before.
The values are stored in a compressed format. The higher-order 0s or -1s are
not represented if they are just the logical sign extension of the number that is
represented.
CONST_WIDE_INT_VEC (code)
Returns the entire array of HOST_WIDE_INTs that are used to store the value.
This macro should be rarely used.
292 GNU Compiler Collection (GCC) Internals
CONST_WIDE_INT_NUNITS (code)
The number of HOST_WIDE_INTs used to represent the number. Note that this
generally is smaller than the number of HOST_WIDE_INTs implied by the mode
size.
CONST_WIDE_INT_ELT (code,i)
Returns the ith element of the array. Element 0 is contains the low order bits
of the constant.
(const_fixed:m ...)
Represents a fixed-point constant of mode m. The operand is a data structure
of type struct fixed_value and is accessed with the macro CONST_FIXED_
VALUE. The high part of data is accessed with CONST_FIXED_VALUE_HIGH; the
low part is accessed with CONST_FIXED_VALUE_LOW.
(const_poly_int:m [c0 c1 ...])
Represents a poly_int-style polynomial integer with coefficients c0, c1, . . . .
The coefficients are wide_int-based integers rather than rtxes. CONST_POLY_
INT_COEFFS gives the values of individual coefficients (which is mostly only
useful in low-level routines) and const_poly_int_value gives the full poly_
int value.
(const_vector:m [x0 x1 ...])
Represents a vector constant. The values in square brackets are elements of
the vector, which are always const_int, const_wide_int, const_double or
const_fixed expressions.
Each vector constant v is treated as a specific instance of an arbitrary-length
sequence that itself contains ‘CONST_VECTOR_NPATTERNS (v)’ interleaved pat-
terns. Each pattern has the form:
{ base0, base1, base1 + step, base1 + step * 2, ... }
The first three elements in each pattern are enough to determine the values of
the other elements. However, if all steps are zero, only the first two elements are
needed. If in addition each base1 is equal to the corresponding base0, only the
first element in each pattern is needed. The number of determining elements
per pattern is given by ‘CONST_VECTOR_NELTS_PER_PATTERN (v)’.
For example, the constant:
{ 0, 1, 2, 6, 3, 8, 4, 10, 5, 12, 6, 14, 7, 16, 8, 18 }
is interpreted as an interleaving of the sequences:
{ 0, 2, 3, 4, 5, 6, 7, 8 }
{ 1, 6, 8, 10, 12, 14, 16, 18 }
where the sequences are represented by the following patterns:
base0 == 0, base1 == 2, step == 1
base0 == 1, base1 == 6, step == 2
In this case:
CONST_VECTOR_NPATTERNS (v) == 2
CONST_VECTOR_NELTS_PER_PATTERN (v) == 3
Thus the first 6 elements (‘{ 0, 1, 2, 6, 3, 8 }’) are enough to determine the
whole sequence; we refer to them as the “encoded” elements. They are the
Chapter 14: RTL Representation 293
(const:m exp)
Represents a constant that is the result of an assembly-time arithmetic compu-
tation. The operand, exp, contains only const_int, symbol_ref, label_ref
or unspec expressions, combined with plus and minus. Any such unspecs
are target-specific and typically represent some form of relocation operator. m
should be a valid address mode.
(high:m exp)
Represents the high-order bits of exp. The number of bits is machine-dependent
and is normally the number of bits specified in an instruction that initializes the
high order bits of a register. It is used with lo_sum to represent the typical two-
instruction sequence used in RISC machines to reference large immediate values
and/or link-time constants such as global memory addresses. In the latter case,
m is Pmode and exp is usually a constant expression involving symbol_ref.
The macro CONST0_RTX (mode) refers to an expression with value 0 in mode mode. If
mode mode is of mode class MODE_INT, it returns const0_rtx. If mode mode is of mode class
MODE_FLOAT, it returns a CONST_DOUBLE expression in mode mode. Otherwise, it returns a
CONST_VECTOR expression in mode mode. Similarly, the macro CONST1_RTX (mode) refers to
an expression with value 1 in mode mode and similarly for CONST2_RTX. The CONST1_RTX
and CONST2_RTX macros are undefined for vector modes.
VIRTUAL_INCOMING_ARGS_REGNUM
This points to the first word of the incoming arguments passed
on the stack. Normally these arguments are placed there by the
caller, but the callee may have pushed some arguments that were
previously passed in registers.
When RTL generation is complete, this virtual register is replaced
by the sum of the register given by ARG_POINTER_REGNUM and the
value of FIRST_PARM_OFFSET.
VIRTUAL_STACK_VARS_REGNUM
If FRAME_GROWS_DOWNWARD is defined to a nonzero value, this points
to immediately above the first variable on the stack. Otherwise, it
points to the first variable on the stack.
VIRTUAL_STACK_VARS_REGNUM is replaced with the sum of
the register given by FRAME_POINTER_REGNUM and the value
TARGET_STARTING_FRAME_OFFSET.
VIRTUAL_STACK_DYNAMIC_REGNUM
This points to the location of dynamically allocated memory on the
stack immediately after the stack pointer has been adjusted by the
amount of memory desired.
This virtual register is replaced by the sum of the register given by
STACK_POINTER_REGNUM and the value STACK_DYNAMIC_OFFSET.
VIRTUAL_OUTGOING_ARGS_REGNUM
This points to the location in the stack at which outgoing arguments
should be written when the stack is pre-pushed (arguments pushed
using push insns should always use STACK_POINTER_REGNUM).
This virtual register is replaced by the sum of the register given by
STACK_POINTER_REGNUM and the value STACK_POINTER_OFFSET.
296 GNU Compiler Collection (GCC) Internals
The rules above apply to both pseudo regs and hard regs. If the semantics
are not correct for particular combinations of m1, m2 and hard reg, the target-
specific code must ensure that those combinations are never used. For example:
TARGET_CAN_CHANGE_MODE_CLASS (m2, m1, class)
must be false for every class class that includes reg.
GCC must be able to determine at compile time whether a subreg is paradoxical,
whether it occupies a whole number of blocks, or whether it is a lowpart of a
block. This means that certain combinations of variable-sized mode are not
permitted. For example, if m2 holds n SI values, where n is greater than zero,
it is not possible to form a DI subreg of it; such a subreg would be paradoxical
when n is 1 but not when n is greater than 1.
The first operand of a subreg expression is customarily accessed with the
SUBREG_REG macro and the second operand is customarily accessed with the
SUBREG_BYTE macro.
It has been several years since a platform in which BYTES_BIG_ENDIAN not
equal to WORDS_BIG_ENDIAN has been tested. Anyone wishing to support such
a platform in the future may be confronted with code rot.
(scratch:m)
This represents a scratch register that will be required for the execution of a
single instruction and not used subsequently. It is converted into a reg by either
the local register allocator or the reload pass.
scratch is usually present inside a clobber operation (see Section 14.15 [Side
Effects], page 308).
On some machines, the condition code register is given a register number and a
reg is used. Other machines store condition codes in general registers; in such
cases a pseudo register should be used.
Some machines, such as the SPARC and RS/6000, have two sets of arithmetic
instructions, one that sets and one that does not set the condition code. This
is best handled by normally generating the instruction that does not set the
condition code, and making a pattern that both performs the arithmetic and
sets the condition code register. For examples, search for ‘addcc’ and ‘andcc’
in sparc.md.
(pc) This represents the machine’s program counter. It has no operands and may
not have a machine mode. (pc) may be validly used only in certain specific
contexts in jump instructions.
There is only one expression object of code pc; it is the value of the variable
pc_rtx. Any attempt to create an expression of code pc will return pc_rtx.
All instructions that do not jump alter the program counter implicitly by in-
crementing it, but there is no need to mention this in the RTL.
(mem:m addr alias)
This RTX represents a reference to main memory at an address represented by
the expression addr. m specifies how large a unit of memory is accessed. alias
specifies an alias set for the reference. In general two items are in different alias
sets if they cannot reference the same memory address.
300 GNU Compiler Collection (GCC) Internals
way this kind of expression may validly be used: as a value to be stored in the
condition codes, in a register. See Section 14.10 [Comparisons], page 304.
The mode m is not related to the modes of x and y, but instead is the mode
of the condition code value. It is some mode in class MODE_CC, often CCmode.
See Section 18.15 [Condition Code], page 600. If m is CCmode, the operation
returns sufficient information (in an unspecified format) so that any comparison
operator can be applied to the result of the COMPARE operation. For other modes
in class MODE_CC, the operation only returns a subset of this information.
Normally, x and y must have the same mode. Otherwise, compare is valid only
if the mode of x is in class MODE_INT and y is a const_int or const_double
with mode VOIDmode. The mode of x determines what mode the comparison is
to be done in; thus it must not be VOIDmode.
If one of the operands is a constant, it should be placed in the second operand
and the comparison code adjusted as appropriate.
A compare specifying two VOIDmode constants is not valid since there is no way
to know in what mode the comparison is to be performed; the comparison must
either be folded during the compilation or the first operand must be loaded into
a register while its mode is still known.
(neg:m x)
(ss_neg:m x)
(us_neg:m x)
These two expressions represent the negation (subtraction from zero) of the
value represented by x, carried out in mode m. They differ in the behavior
on overflow of integer modes. In the case of neg, the negation of the operand
may be a number not representable in mode m, in which case it is truncated
to m. ss_neg and us_neg ensure that an out-of-bounds result saturates to the
maximum or minimum signed or unsigned value.
(mult:m x y)
(ss_mult:m x y)
(us_mult:m x y)
Represents the signed product of the values represented by x and y carried out
in machine mode m. ss_mult and us_mult ensure that an out-of-bounds result
saturates to the maximum or minimum signed or unsigned value.
Some machines support a multiplication that generates a product wider than
the operands. Write the pattern for this as
(mult:m (sign_extend:m x) (sign_extend:m y))
where m is wider than the modes of x and y, which need not be the same.
For unsigned widening multiplication, use the same idiom, but with zero_
extend instead of sign_extend.
(smul_highpart:m x y)
(umul_highpart:m x y)
Represents the high-part multiplication of x and y carried out in machine mode
m. smul_highpart returns the high part of a signed multiplication, umul_
highpart returns the high part of an unsigned multiplication.
302 GNU Compiler Collection (GCC) Internals
(fma:m x y z)
Represents the fma, fmaf, and fmal builtin functions, which compute ‘x * y +
z’ without doing an intermediate rounding step.
(div:m x y)
(ss_div:m x y)
Represents the quotient in signed division of x by y, carried out in machine mode
m. If m is a floating point mode, it represents the exact quotient; otherwise,
the integerized quotient. ss_div ensures that an out-of-bounds result saturates
to the maximum or minimum signed value.
Some machines have division instructions in which the operands and quo-
tient widths are not all the same; you should represent such instructions using
truncate and sign_extend as in,
(truncate:m1 (div:m2 x (sign_extend:m2 y)))
(udiv:m x y)
(us_div:m x y)
Like div but represents unsigned division. us_div ensures that an out-of-
bounds result saturates to the maximum or minimum unsigned value.
(mod:m x y)
(umod:m x y)
Like div and udiv but represent the remainder instead of the quotient.
(smin:m x y)
(smax:m x y)
Represents the smaller (for smin) or larger (for smax) of x and y, interpreted
as signed values in mode m. When used with floating point, if both operands
are zeros, or if either operand is NaN, then it is unspecified which of the two
operands is returned as the result.
(umin:m x y)
(umax:m x y)
Like smin and smax, but the values are interpreted as unsigned integers.
(not:m x) Represents the bitwise complement of the value represented by x, carried out
in mode m, which must be a fixed-point machine mode.
(and:m x y)
Represents the bitwise logical-and of the values represented by x and y, carried
out in machine mode m, which must be a fixed-point machine mode.
(ior:m x y)
Represents the bitwise inclusive-or of the values represented by x and y, carried
out in machine mode m, which must be a fixed-point mode.
(xor:m x y)
Represents the bitwise exclusive-or of the values represented by x and y, carried
out in machine mode m, which must be a fixed-point mode.
Chapter 14: RTL Representation 303
(ashift:m x c)
(ss_ashift:m x c)
(us_ashift:m x c)
These three expressions represent the result of arithmetically shifting x left by
c places. They differ in their behavior on overflow of integer modes. An ashift
operation is a plain shift with no special behavior in case of a change in the
sign bit; ss_ashift and us_ashift saturates to the minimum or maximum
representable value if any of the bits shifted out differs from the final sign bit.
x have mode m, a fixed-point machine mode. c be a fixed-point mode or be a
constant with mode VOIDmode; which mode is determined by the mode called
for in the machine description entry for the left-shift instruction. For example,
on the VAX, the mode of c is QImode regardless of m.
(lshiftrt:m x c)
(ashiftrt:m x c)
Like ashift but for right shift. Unlike the case for left shift, these two opera-
tions are distinct.
(rotate:m x c)
(rotatert:m x c)
Similar but represent left and right rotate. If c is a constant, use rotate.
(abs:m x)
(ss_abs:m x)
Represents the absolute value of x, computed in mode m. ss_abs ensures that
an out-of-bounds result saturates to the maximum signed value.
(sqrt:m x)
Represents the square root of x, computed in mode m. Most often m will be a
floating point mode.
(ffs:m x) Represents one plus the index of the least significant 1-bit in x, represented as
an integer of mode m. (The value is zero if x is zero.) The mode of x must be
m or VOIDmode.
(clrsb:m x)
Represents the number of redundant leading sign bits in x, represented as an
integer of mode m, starting at the most significant bit position. This is one less
than the number of leading sign bits (either 0 or 1), with no special cases. The
mode of x must be m or VOIDmode.
(clz:m x) Represents the number of leading 0-bits in x, represented as an integer of mode
m, starting at the most significant bit position. If x is zero, the value is deter-
mined by CLZ_DEFINED_VALUE_AT_ZERO (see Section 18.31 [Misc], page 668).
Note that this is one of the few expressions that is not invariant under widening.
The mode of x must be m or VOIDmode.
(ctz:m x) Represents the number of trailing 0-bits in x, represented as an integer of mode
m, starting at the least significant bit position. If x is zero, the value is deter-
mined by CTZ_DEFINED_VALUE_AT_ZERO (see Section 18.31 [Misc], page 668).
304 GNU Compiler Collection (GCC) Internals
Except for this case, ctz(x) is equivalent to ffs(x) - 1. The mode of x must
be m or VOIDmode.
(popcount:m x)
Represents the number of 1-bits in x, represented as an integer of mode m. The
mode of x must be m or VOIDmode.
(parity:m x)
Represents the number of 1-bits modulo 2 in x, represented as an integer of
mode m. The mode of x must be m or VOIDmode.
(bswap:m x)
Represents the value x with the order of bytes reversed, carried out in mode
m, which must be a fixed-point machine mode. The mode of x must be m or
VOIDmode.
(gt:m x y)
STORE_FLAG_VALUE if the x is greater than y. If they are fixed-point, the com-
parison is done in a signed sense.
(gtu:m x y)
Like gt but does unsigned comparison, on fixed-point numbers only.
(lt:m x y)
(ltu:m x y)
Like gt and gtu but test for “less than”.
(ge:m x y)
(geu:m x y)
Like gt and gtu but test for “greater than or equal”.
(le:m x y)
(leu:m x y)
Like gt and gtu but test for “less than or equal”.
(if_then_else cond then else)
This is not a comparison operation but is listed here because it is always used in
conjunction with a comparison operation. To be precise, cond is a comparison
expression. This expression represents a choice, according to cond, between the
value represented by then and the one represented by else.
On most machines, if_then_else expressions are valid only to express condi-
tional jumps.
(cond [test1 value1 test2 value2 ...] default)
Similar to if_then_else, but more general. Each of test1, test2, . . . is per-
formed in turn. The result of this expression is the value corresponding to the
first nonzero test, or default if none of the tests are nonzero expressions.
This is currently not valid for instruction patterns and is supported only for
insn attributes. See Section 17.19 [Insn Attributes], page 475.
14.11 Bit-Fields
Special expression codes exist to represent bit-field instructions.
(sign_extract:m loc size pos)
This represents a reference to a sign-extended bit-field contained or starting in
loc (a memory or register reference). The bit-field is size bits wide and starts
at bit pos. The compilation option BITS_BIG_ENDIAN says which end of the
memory unit pos counts from.
If loc is in memory, its mode must be a single-byte integer mode. If loc is in a
register, the mode to use is specified by the operand of the insv or extv pattern
(see Section 17.9 [Standard Names], page 411) and is usually a full-word integer
mode, which is the default if none is specified.
The mode of pos is machine-specific and is also specified in the insv or extv
pattern.
The mode m is the same as the mode that would be used for loc if it were a
register.
306 GNU Compiler Collection (GCC) Internals
14.13 Conversions
All conversions between machine modes must be represented by explicit conversion oper-
ations. For example, an expression which is the sum of a byte and a full word cannot be
written as (plus:SI (reg:QI 34) (reg:SI 80)) because the plus operation requires two
Chapter 14: RTL Representation 307
operands of the same machine mode. Therefore, the byte-sized operand is enclosed in a
conversion operation, as in
(plus:SI (sign_extend:SI (reg:QI 34)) (reg:SI 80))
The conversion operation is not a mere placeholder, because there may be more than one
way of converting from a given starting mode to the desired final mode. The conversion
operation code says how to do it.
For all conversion operations, x must not be VOIDmode because the mode in which to do
the conversion would not be known. The conversion must either be done at compile-time
or x must be placed into a register.
(sign_extend:m x)
Represents the result of sign-extending the value x to machine mode m. m
must be a fixed-point mode and x a fixed-point value of a mode narrower than
m.
(zero_extend:m x)
Represents the result of zero-extending the value x to machine mode m. m
must be a fixed-point mode and x a fixed-point value of a mode narrower than
m.
(float_extend:m x)
Represents the result of extending the value x to machine mode m. m must be
a floating point mode and x a floating point value of a mode narrower than m.
(truncate:m x)
Represents the result of truncating the value x to machine mode m. m must
be a fixed-point mode and x a fixed-point value of a mode wider than m.
(ss_truncate:m x)
Represents the result of truncating the value x to machine mode m, using
signed saturation in the case of overflow. Both m and the mode of x must be
fixed-point modes.
(us_truncate:m x)
Represents the result of truncating the value x to machine mode m, using
unsigned saturation in the case of overflow. Both m and the mode of x must
be fixed-point modes.
(float_truncate:m x)
Represents the result of truncating the value x to machine mode m. m must
be a floating point mode and x a floating point value of a mode wider than m.
(float:m x)
Represents the result of converting fixed point value x, regarded as signed, to
floating point mode m.
(unsigned_float:m x)
Represents the result of converting fixed point value x, regarded as unsigned,
to floating point mode m.
(fix:m x) When m is a floating-point mode, represents the result of converting floating
point value x (valid for mode m) to an integer, still represented in floating point
mode m, by rounding towards zero.
308 GNU Compiler Collection (GCC) Internals
14.14 Declarations
Declaration expression codes do not represent arithmetic operations but rather state asser-
tions about their operands.
(strict_low_part (subreg:m (reg:n r) 0))
This expression code is used in only one context: as the destination operand
of a set expression. In addition, the operand of this expression must be a
non-paradoxical subreg expression.
The presence of strict_low_part says that the part of the register which is
meaningful in mode n, but is not part of mode m, is not to be altered. Normally,
an assignment to such a subreg is allowed to have undefined effects on the rest
of the register when m is smaller than ‘REGMODE_NATURAL_SIZE (n)’.
The body of an instruction is always one of these side effect codes; the codes described
above, which represent values, appear only as the operands of these.
(set lval x)
Represents the action of storing the value of x into the place represented by
lval. lval must be an expression representing a place that can be stored in: reg
(or subreg, strict_low_part or zero_extract), mem, pc, or parallel.
If lval is a reg, subreg or mem, it has a machine mode; then x must be valid
for that mode.
If lval is a reg whose machine mode is less than the full width of the register,
then it means that the part of the register specified by the machine mode is
given the specified value and the rest of the register receives an undefined value.
Likewise, if lval is a subreg whose machine mode is narrower than the mode of
the register, the rest of the register can be changed in an undefined way.
If lval is a strict_low_part of a subreg, then the part of the register specified
by the machine mode of the subreg is given the value x and the rest of the
register is not changed.
If lval is a zero_extract, then the referenced part of the bit-field (a memory
or register reference) specified by the zero_extract is given the value x and
the rest of the bit-field is not changed. Note that sign_extract cannot appear
in lval.
If lval is a parallel, it is used to represent the case of a function returning a
structure in multiple registers. Each element of the parallel is an expr_list
whose first operand is a reg and whose second operand is a const_int repre-
senting the offset (in bytes) into the structure at which the data in that register
corresponds. The first element may be null to indicate that the structure is also
passed partly in memory.
If lval is (pc), we have a jump instruction, and the possibilities for x are very
limited. It may be a label_ref expression (unconditional jump). It may be an
if_then_else (conditional jump), in which case either the second or the third
operand must be (pc) (for the case which does not jump) and the other of the
two must be a label_ref (for the case which does jump). x may also be a mem
or (plus:SI (pc) y), where y may be a reg or a mem; these unusual patterns
are used to represent jumps through branch tables.
If lval is not (pc), the mode of lval must not be VOIDmode and the mode of x
must be valid for the mode of lval.
lval is customarily accessed with the SET_DEST macro and x with the SET_SRC
macro.
(return) As the sole expression in a pattern, represents a return from the current func-
tion, on machines where this can be done with one instruction, such as VAXen.
On machines where a multi-instruction “epilogue” must be executed in order
to return from the function, returning is done by jumping to a label which
precedes the epilogue, and the return expression code is never used.
Inside an if_then_else expression, represents the value to be placed in pc to
return to the caller.
310 GNU Compiler Collection (GCC) Internals
same hard register to the clobber and the input operands if there is an insn al-
ternative containing the ‘&’ constraint (see Section 17.8.4 [Modifiers], page 376)
for the clobber and the hard register is in register classes of the clobber in the
alternative. You can clobber either a specific hard register, a pseudo register, or
a scratch expression; in the latter two cases, GCC will allocate a hard register
that is available there for use as a temporary.
For instructions that require a temporary register, you should use scratch
instead of a pseudo-register because this will allow the combiner phase to add
the clobber when required. You do this by coding (clobber (match_scratch
. . . )). If you do clobber a pseudo register, use one which appears nowhere
else—generate a new one each time. Otherwise, you may confuse CSE.
There is one other known use for clobbering a pseudo register in a parallel:
when one of the input operands of the insn is also clobbered by the insn. In
this case, using the same pseudo register in the clobber and elsewhere in the
insn produces the expected results.
(use x) Represents the use of the value of x. It indicates that the value in x at this
point in the program is needed, even though it may not be apparent why this
is so. Therefore, the compiler will not attempt to delete previous instructions
whose only effect is to store a value in x. x must be a reg expression.
In some situations, it may be tempting to add a use of a register in a parallel
to describe a situation where the value of a special register will modify the
behavior of the instruction. A hypothetical example might be a pattern for an
addition that can either wrap around or use saturating addition depending on
the value of a special control register:
(parallel [(set (reg:SI 2) (unspec:SI [(reg:SI 3)
(reg:SI 4)] 0))
(use (reg:SI 1))])
This will not work, several of the optimizers only look at expressions locally; it
is very likely that if you have multiple insns with identical inputs to the unspec,
they will be optimized away even if register 1 changes in between.
This means that use can only be used to describe that the register is live. You
should think twice before adding use statements, more often you will want to
use unspec instead. The use RTX is most commonly useful to describe that
a fixed register is implicitly used in an insn. It is also safe to use in patterns
where the compiler knows for other reasons that the result of the whole pattern
is variable, such as ‘cpymemm’ or ‘call’ patterns.
During the reload phase, an insn that has a use as pattern can carry a reg equal
note. These use insns will be deleted before the reload phase exits.
During the delayed branch scheduling phase, x may be an insn. This indicates
that x previously was located at this place in the code and its data dependencies
need to be taken into account. These use insns will be deleted before the delayed
branch scheduling phase exits.
(parallel [x0 x1 ...])
Represents several side effects performed in parallel. The square brackets stand
for a vector; the operand of parallel is a vector of expressions. x0, x1 and so
312 GNU Compiler Collection (GCC) Internals
Some back ends also use sequence objects for purposes other than delay-slot
groups. This is not supported in the common parts of the compiler, which treat
such sequences as delay-slot groups.
DWARF2 Call Frame Address (CFA) adjustments are sometimes also expressed
using sequence objects as the value of a RTX_FRAME_RELATED_P note. This only
happens if the CFA adjustments cannot be easily derived from the pattern of
the instruction to which the note is attached. In such cases, the value of the
note is used instead of best-guesing the semantics of the instruction. The back
end can attach notes containing a sequence of set patterns that express the
effect of the parent instruction.
These expression codes appear in place of a side effect, as the body of an insn, though
strictly speaking they do not always describe side effects as such:
(asm_input s)
Represents literal assembler code as described by the string s.
An instruction that can be represented with an embedded side effect could also be rep-
resented using parallel containing an additional set to describe how the address register
is altered. This is not done because machines that allow these operations at all typically
allow them wherever a memory address is called for. Describing them as additional parallel
stores would require doubling the number of entries in the machine description.
(entry_value:mode decl)
Stands for the value a decl had at the entry point of the containing function.
(debug_parameter_ref:mode decl)
Refers to a parameter that was completely optimized out.
(debug_marker:mode)
Marks a program location. With VOIDmode, it stands for the beginning of a
statement, a recommended inspection point logically after all prior side effects,
and before any subsequent side effects. With BLKmode, it indicates an inline
entry point: the lexical block encoded in the INSN_LOCATION is the enclosing
block that encloses the inlined function.
14.19 Insns
The RTL representation of the code for a function is a doubly-linked chain of objects called
insns. Insns are expressions with special codes that are used for no other purpose. Some
insns are actual instructions; others represent dispatch tables for switch statements; others
represent labels to jump to or various sorts of declarative information.
In addition to its own specific data, each insn must have a unique id-number that dis-
tinguishes it from all other insns in the current function (after delayed branch scheduling,
copies of an insn with the same id-number may be present in multiple places in a function,
but these copies will always be identical and will only appear inside a sequence), and chain
pointers to the preceding and following insns. These three fields occupy the same position
in every insn, independent of the expression code of the insn. They could be accessed with
XEXP and XINT, but instead three special macros are always used:
INSN_UID (i)
Accesses the unique id of insn i.
PREV_INSN (i)
Accesses the chain pointer to the insn preceding i. If i is the first insn, this is
a null pointer.
NEXT_INSN (i)
Accesses the chain pointer to the insn following i. If i is the last insn, this is a
null pointer.
The first insn in the chain is obtained by calling get_insns; the last insn is the result
of calling get_last_insn. Within the chain delimited by these insns, the NEXT_INSN and
PREV_INSN pointers must always correspond: if insn is not the first insn,
NEXT_INSN (PREV_INSN (insn)) == insn
is always true and if insn is not the last insn,
PREV_INSN (NEXT_INSN (insn)) == insn
is always true.
After delay slot scheduling, some of the insns in the chain might be sequence expressions,
which contain a vector of insns. The value of NEXT_INSN in all but the last of these insns
is the next insn in the vector; the value of NEXT_INSN of the last insn in the vector is the
same as the value of NEXT_INSN for the sequence in which it is contained. Similar rules
apply for PREV_INSN.
Chapter 14: RTL Representation 317
This means that the above invariants are not necessarily true for insns inside sequence
expressions. Specifically, if insn is the first insn in a sequence, NEXT_INSN (PREV_INSN
(insn)) is the insn containing the sequence expression, as is the value of PREV_INSN
(NEXT_INSN (insn)) if insn is the last insn in the sequence expression. You can use these
expressions to find the containing sequence expression.
Every insn has one of the following expression codes:
insn The expression code insn is used for instructions that do not jump and do not
do function calls. sequence expressions are always contained in insns with code
insn even if one of those insns should jump or do function calls.
Insns with code insn have four additional fields beyond the three mandatory
ones listed above. These four are described in a table below.
jump_insn
The expression code jump_insn is used for instructions that may jump (or,
more generally, may contain label_ref expressions to which pc can be set in
that instruction). If there is an instruction to return from the current function,
it is recorded as a jump_insn.
jump_insn insns have the same extra fields as insn insns, accessed in the same
way and in addition contain a field JUMP_LABEL which is defined once jump
optimization has completed.
For simple conditional and unconditional jumps, this field contains the code_
label to which this insn will (possibly conditionally) branch. In a more complex
jump, JUMP_LABEL records one of the labels that the insn refers to; other jump
target labels are recorded as REG_LABEL_TARGET notes. The exception is addr_
vec and addr_diff_vec, where JUMP_LABEL is NULL_RTX and the only way to
find the labels is to scan the entire body of the insn.
Return insns count as jumps, but their JUMP_LABEL is RETURN or SIMPLE_
RETURN.
call_insn
The expression code call_insn is used for instructions that may do function
calls. It is important to distinguish these instructions because they imply that
certain registers and memory locations may be altered unpredictably.
call_insn insns have the same extra fields as insn insns, accessed in the same
way and in addition contain a field CALL_INSN_FUNCTION_USAGE, which contains
a list (chain of expr_list expressions) containing use, clobber and sometimes
set expressions that denote hard registers and mems used or clobbered by the
called function.
A mem generally points to a stack slot in which arguments passed to the libcall by
reference (see Section 18.9.7 [Register Arguments], page 563) are stored. If the
argument is caller-copied (see Section 18.9.7 [Register Arguments], page 563),
the stack slot will be mentioned in clobber and use entries; if it’s callee-copied,
only a use will appear, and the mem may point to addresses that are not stack
slots.
Registers occurring inside a clobber in this list augment registers specified in
CALL_USED_REGISTERS (see Section 18.7.1 [Register Basics], page 532).
318 GNU Compiler Collection (GCC) Internals
If the list contains a set involving two registers, it indicates that the function
returns one of its arguments. Such a set may look like a no-op if the same
register holds the argument and the return value.
code_label
A code_label insn represents a label that a jump insn can jump to. It con-
tains two special fields of data in addition to the three standard ones. CODE_
LABEL_NUMBER is used to hold the label number, a number that identifies this
label uniquely among all the labels in the compilation (not just in the current
function). Ultimately, the label is represented in the assembler output as an
assembler label, usually of the form ‘Ln’ where n is the label number.
When a code_label appears in an RTL expression, it normally appears within
a label_ref which represents the address of the label, as a number.
Besides as a code_label, a label can also be represented as a note of type
NOTE_INSN_DELETED_LABEL.
The field LABEL_NUSES is only defined once the jump optimization phase is
completed. It contains the number of times this label is referenced in the
current function.
The field LABEL_KIND differentiates four different types of labels: LABEL_
NORMAL, LABEL_STATIC_ENTRY, LABEL_GLOBAL_ENTRY, and LABEL_WEAK_ENTRY.
The only labels that do not have type LABEL_NORMAL are alternate entry points
to the current function. These may be static (visible only in the containing
translation unit), global (exposed to all translation units), or weak (global,
but can be overridden by another symbol with the same name).
Much of the compiler treats all four kinds of label identically. Some of it needs
to know whether or not a label is an alternate entry point; for this purpose,
the macro LABEL_ALT_ENTRY_P is provided. It is equivalent to testing whether
‘LABEL_KIND (label) == LABEL_NORMAL’. The only place that cares about the
distinction between static, global, and weak alternate entry points, besides the
front-end code that creates them, is the function output_alternate_entry_
point, in final.cc.
To set the kind of a label, use the SET_LABEL_KIND macro.
jump_table_data
A jump_table_data insn is a placeholder for the jump-table data of a casesi
or tablejump insn. They are placed after a tablejump_p insn. A jump_table_
data insn is not part o a basic blockm but it is associated with the basic block
that ends with the tablejump_p insn. The PATTERN of a jump_table_data
is always either an addr_vec or an addr_diff_vec, and a jump_table_data
insn is always preceded by a code_label. The tablejump_p insn refers to that
code_label via its JUMP_LABEL.
barrier Barriers are placed in the instruction stream when control cannot flow past
them. They are placed after unconditional jump instructions to indicate that
the jumps are unconditional and after calls to volatile functions, which do
not return (e.g., exit). They contain no information beyond the three standard
fields.
Chapter 14: RTL Representation 319
note note insns are used to represent additional debugging and declarative informa-
tion. They contain two nonstandard fields, an integer which is accessed with
the macro NOTE_LINE_NUMBER and a string accessed with NOTE_SOURCE_FILE.
If NOTE_LINE_NUMBER is positive, the note represents the position of a source
line and NOTE_SOURCE_FILE is the source file name that the line came from.
These notes control generation of line number data in the assembler output.
Otherwise, NOTE_LINE_NUMBER is not really a line number but a code with one
of the following values (and NOTE_SOURCE_FILE must contain a null pointer):
NOTE_INSN_DELETED
Such a note is completely ignorable. Some passes of the compiler
delete insns by altering them into notes of this kind.
NOTE_INSN_DELETED_LABEL
This marks what used to be a code_label, but was not used for
other purposes than taking its address and was transformed to mark
that no code jumps to it.
NOTE_INSN_BLOCK_BEG
NOTE_INSN_BLOCK_END
These types of notes indicate the position of the beginning and end
of a level of scoping of variable names. They control the output of
debugging information.
NOTE_INSN_EH_REGION_BEG
NOTE_INSN_EH_REGION_END
These types of notes indicate the position of the beginning and
end of a level of scoping for exception handling. NOTE_EH_HANDLER
identifies which region is associated with these notes.
NOTE_INSN_FUNCTION_BEG
Appears at the start of the function body, after the function pro-
logue.
NOTE_INSN_VAR_LOCATION
This note is used to generate variable location debugging infor-
mation. It indicates that the user variable in its VAR_LOCATION
operand is at the location given in the RTL expression, or holds a
value that can be computed by evaluating the RTL expression from
that static point in the program up to the next such note for the
same user variable.
NOTE_INSN_BEGIN_STMT
This note is used to generate is_stmt markers in line number de-
bugging information. It indicates the beginning of a user statement.
NOTE_INSN_INLINE_ENTRY
This note is used to generate entry_pc for inlined subroutines in
debugging information. It indicates an inspection point at which
all arguments for the inlined function have been bound, and before
its first statement.
320 GNU Compiler Collection (GCC) Internals
These codes are printed symbolically when they appear in debugging dumps.
debug_insn
The expression code debug_insn is used for pseudo-instructions that hold de-
bugging information for variable tracking at assignments (see -fvar-tracking-
assignments option). They are the RTL representation of GIMPLE_DEBUG state-
ments (Section 12.8.7 [GIMPLE_DEBUG], page 241), with a VAR_LOCATION operand
that binds a user variable tree to an RTL representation of the value in the
corresponding statement. A DEBUG_EXPR in it stands for the value bound to the
corresponding DEBUG_EXPR_DECL.
GIMPLE_DEBUG_BEGIN_STMT and GIMPLE_DEBUG_INLINE_ENTRY are expanded to
RTL as a DEBUG_INSN with a DEBUG_MARKER PATTERN; the difference is the RTL
mode: the former’s DEBUG_MARKER is VOIDmode, whereas the latter is BLKmode;
information about the inlined function can be taken from the lexical block
encoded in the INSN_LOCATION. These DEBUG_INSNs, that do not carry VAR_
LOCATION information, just DEBUG_MARKERs, can be detected by testing DEBUG_
MARKER_INSN_P, whereas those that do can be recognized as DEBUG_BIND_INSN_
P.
Throughout optimization passes, DEBUG_INSNs are not reordered with respect
to each other, particularly during scheduling. Binding information is kept in
pseudo-instruction form, so that, unlike notes, it gets the same treatment and
adjustments that regular instructions would. It is the variable tracking pass that
turns these pseudo-instructions into NOTE_INSN_VAR_LOCATION, NOTE_INSN_
BEGIN_STMT and NOTE_INSN_INLINE_ENTRY notes, analyzing control flow, value
equivalences and changes to registers and memory referenced in value expres-
sions, propagating the values of debug temporaries and determining expressions
that can be used to compute the value of each user variable at as many points
(ranges, actually) in the program as possible.
Unlike NOTE_INSN_VAR_LOCATION, the value expression in an INSN_VAR_
LOCATION denotes a value at that specific point in the program, rather than
an expression that can be evaluated at any later point before an overriding
VAR_LOCATION is encountered. E.g., if a user variable is bound to a REG
and then a subsequent insn modifies the REG, the note location would keep
mapping the user variable to the register across the insn, whereas the insn
location would keep the variable bound to the value, so that the variable
tracking pass would emit another location note for the variable at the point in
which the register is modified.
The machine mode of an insn is normally VOIDmode, but some phases use the mode for
various purposes.
The common subexpression elimination pass sets the mode of an insn to QImode when it
is the first insn in a block that has already been processed.
The second Haifa scheduling pass, for targets that can multiple issue, sets the mode of
an insn to TImode when it is believed that the instruction begins an issue group. That is,
when the instruction cannot issue simultaneously with the previous. This may be relied on
by later passes, in particular machine-dependent reorg.
Here is a table of the extra fields of insn, jump_insn and call_insn insns:
Chapter 14: RTL Representation 321
PATTERN (i)
An expression for the side effect performed by this insn. This must be one of the
following codes: set, call, use, clobber, return, simple_return, asm_input,
asm_output, addr_vec, addr_diff_vec, trap_if, unspec, unspec_volatile,
parallel, cond_exec, or sequence. If it is a parallel, each element of the
parallel must be one these codes, except that parallel expressions cannot be
nested and addr_vec and addr_diff_vec are not permitted inside a parallel
expression.
INSN_CODE (i)
An integer that says which pattern in the machine description matches this
insn, or −1 if the matching has not yet been attempted.
Such matching is never attempted and this field remains −1 on an insn whose
pattern consists of a single use, clobber, asm_input, addr_vec or addr_diff_
vec expression.
Matching is also never attempted on insns that result from an asm state-
ment. These contain at least one asm_operands expression. The function
asm_noperands returns a non-negative value for such insns.
In the debugging output, this field is printed as a number followed by a symbolic
representation that locates the pattern in the md file as some small positive or
negative offset from a named pattern.
REG_NOTES (i)
A list (chain of expr_list, insn_list and int_list expressions) giving mis-
cellaneous information about the insn. It is often information pertaining to the
registers used in this insn.
The REG_NOTES field of an insn is a chain that includes expr_list and int_list expres-
sions as well as insn_list expressions. There are several kinds of register notes, which are
distinguished by the machine mode, which in a register note is really understood as being
an enum reg_note. The first operand op of the note is data whose meaning depends on the
kind of note.
The macro REG_NOTE_KIND (x) returns the kind of register note. Its counterpart, the
macro PUT_REG_NOTE_KIND (x, newkind) sets the register note type of x to be newkind.
Register notes are of three classes: They may say something about an input to an insn,
they may say something about an output of an insn, or they may create a linkage between
two insns.
These register notes annotate inputs to an insn:
REG_DEAD The value in op dies in this insn; that is to say, altering the value immediately
after this insn would not affect the future behavior of the program.
It does not follow that the register op has no useful value after this insn since
op is not necessarily modified by this insn. Rather, no subsequent instruction
uses the contents of op.
REG_UNUSED
The register op being set by this insn will not be used in a subsequent insn.
This differs from a REG_DEAD note, which indicates that the value in an input
322 GNU Compiler Collection (GCC) Internals
will not be used subsequently. These two notes are independent; both may be
present for the same register.
REG_INC The register op is incremented (or decremented; at this level there is no dis-
tinction) by an embedded side effect inside this insn. This means it appears in
a post_inc, pre_inc, post_dec or pre_dec expression.
REG_NONNEG
The register op is known to have a nonnegative value when this insn is reached.
This is used by special looping instructions that terminate when the register
goes negative.
The REG_NONNEG note is added only to ‘doloop_end’ insns, if its pattern uses a
ge condition.
REG_LABEL_OPERAND
This insn uses op, a code_label or a note of type NOTE_INSN_DELETED_LABEL,
but is not a jump_insn, or it is a jump_insn that refers to the operand as an
ordinary operand. The label may still eventually be a jump target, but if so in
an indirect jump in a subsequent insn. The presence of this note allows jump
optimization to be aware that op is, in fact, being used, and flow optimization
to build an accurate flow graph.
REG_LABEL_TARGET
This insn is a jump_insn but not an addr_vec or addr_diff_vec. It uses op,
a code_label as a direct or indirect jump target. Its purpose is similar to
that of REG_LABEL_OPERAND. This note is only present if the insn has multiple
targets; the last label in the insn (in the highest numbered insn-field) goes
into the JUMP_LABEL field and does not have a REG_LABEL_TARGET note. See
Section 14.19 [Insns], page 316.
REG_SETJMP
Appears attached to each CALL_INSN to setjmp or a related function.
The following notes describe attributes of outputs of an insn:
REG_EQUIV
REG_EQUAL
This note is only valid on an insn that sets only one register and indicates that
that register will be equal to op at run time; the scope of this equivalence differs
between the two types of notes. The value which the insn explicitly copies into
the register may look different from op, but they will be equal at run time. If
the output of the single set is a strict_low_part or zero_extract expression,
the note refers to the register that is contained in its first operand.
For REG_EQUIV, the register is equivalent to op throughout the entire function,
and could validly be replaced in all its occurrences by op. (“Validly” here refers
to the data flow of the program; simple replacement may make some insns
invalid.) For example, when a constant is loaded into a register that is never
assigned any other value, this kind of note is used.
When a parameter is copied into a pseudo-register at entry to a function, a note
of this kind records that the register is equivalent to the stack slot where the
Chapter 14: RTL Representation 323
parameter was passed. Although in this case the register may be set by other
insns, it is still valid to replace the register by the stack slot throughout the
function.
A REG_EQUIV note is also used on an instruction which copies a register param-
eter into a pseudo-register at entry to a function, if there is a stack slot where
that parameter could be stored. Although other insns may set the pseudo-
register, it is valid for the compiler to replace the pseudo-register by stack slot
throughout the function, provided the compiler ensures that the stack slot is
properly initialized by making the replacement in the initial copy instruction as
well. This is used on machines for which the calling convention allocates stack
space for register parameters. See REG_PARM_STACK_SPACE in Section 18.9.6
[Stack Arguments], page 561.
In the case of REG_EQUAL, the register that is set by this insn will be equal
to op at run time at the end of this insn but not necessarily elsewhere in the
function. In this case, op is typically an arithmetic expression. For example,
when a sequence of insns such as a library call is used to perform an arithmetic
operation, this kind of note is attached to the insn that produces or copies the
final value.
These two notes are used in different ways by the compiler passes. REG_EQUAL
is used by passes prior to register allocation (such as common subexpression
elimination and loop optimization) to tell them how to think of that value.
REG_EQUIV notes are used by register allocation to indicate that there is an
available substitute expression (either a constant or a mem expression for the
location of a parameter on the stack) that may be used in place of a register if
insufficient registers are available.
Except for stack homes for parameters, which are indicated by a REG_EQUIV note
and are not useful to the early optimization passes and pseudo registers that
are equivalent to a memory location throughout their entire life, which is not
detected until later in the compilation, all equivalences are initially indicated
by an attached REG_EQUAL note. In the early stages of register allocation, a
REG_EQUAL note is changed into a REG_EQUIV note if op is a constant and the
insn represents the only set of its destination register.
Thus, compiler passes prior to register allocation need only check for REG_
EQUAL notes and passes subsequent to register allocation need only check for
REG_EQUIV notes.
These notes describe linkages between insns. They occur in pairs: one insn has one of a
pair of notes that points to a second insn, which has the inverse note pointing back to the
first insn.
REG_DEP_TRUE
This indicates a true dependence (a read after write dependence).
REG_DEP_OUTPUT
This indicates an output dependence (a write after write dependence).
REG_DEP_ANTI
This indicates an anti dependence (a write after read dependence).
324 GNU Compiler Collection (GCC) Internals
These notes describe information gathered from gcov profile data. They are stored in the
REG_NOTES field of an insn.
REG_BR_PROB
This is used to specify the ratio of branches to non-branches of a branch insn
according to the profile data. The note is represented as an int_list expression
whose integer value is an encoding of profile_probability type. profile_
probability provide member function from_reg_br_prob_note and to_reg_
br_prob_note to extract and store the probability into the RTL encoding.
REG_BR_PRED
These notes are found in JUMP insns after delayed branch scheduling has taken
place. They indicate both the direction and the likelihood of the JUMP. The
format is a bitmask of ATTR FLAG * values.
REG_FRAME_RELATED_EXPR
This is used on an RTX FRAME RELATED P insn wherein the attached ex-
pression is used in place of the actual insn pattern. This is done in cases where
the pattern is either complex or misleading.
The note REG_CALL_NOCF_CHECK is used in conjunction with the -fcf-
protection=branch option. The note is set if a nocf_check attribute is specified for a
function type or a pointer to function type. The note is stored in the REG_NOTES field of
an insn.
REG_CALL_NOCF_CHECK
Users have control through the nocf_check attribute to identify which calls to a
function should be skipped from control-flow instrumentation when the option
-fcf-protection=branch is specified. The compiler puts a REG_CALL_NOCF_
CHECK note on each CALL_INSN instruction that has a function type marked
with a nocf_check attribute.
For convenience, the machine mode in an insn_list or expr_list is printed using these
symbolic codes in debugging dumps.
The only difference between the expression codes insn_list and expr_list is that the
first operand of an insn_list is assumed to be an insn and is printed in debugging dumps
as the insn’s unique id; the first operand of an expr_list is printed in the ordinary way as
an expression.
For a subroutine that returns no value, the call expression as shown above is the entire
body of the insn, except that the insn might also contain use or clobber expressions.
For a subroutine that returns a value whose mode is not BLKmode, the value is returned
in a hard register. If this register’s number is r, then the body of the call insn looks like
this:
(set (reg:m r)
(call (mem:fm addr) nbytes))
This RTL expression makes it clear (to the optimizer passes) that the appropriate register
receives a useful value in this insn.
When a subroutine returns a BLKmode value, it is handled by passing to the subroutine
the address of a place to store the value. So the call insn itself does not “return” any value,
and it has the same RTL form as a call that returns nothing.
On some machines, the call instruction itself clobbers some register, for example to contain
the return address. call_insn insns on these machines should have a body which is a
parallel that contains both the call expression and clobber expressions that indicate
which registers are destroyed. Similarly, if the call instruction requires some register other
than the stack pointer that is not explicitly mentioned in its RTL, a use subexpression
should mention that register.
Functions that are called are assumed to modify all registers listed in the configuration
macro CALL_USED_REGISTERS (see Section 18.7.1 [Register Basics], page 532) and, with the
exception of const functions and library calls, to modify all of memory.
Insns containing just use expressions directly precede the call_insn insn to indicate
which registers contain inputs to the function. Similarly, if registers other than those
in CALL_USED_REGISTERS are clobbered by the called function, insns containing a single
clobber follow immediately after the call to indicate which registers.
#include "rtl-ssa.h"
All the RTL SSA code is contained in the rtl_ssa namespace, so most passes will then
want to do:
using namespace rtl_ssa;
However, this is purely a matter of taste, and the examples in the rest of this section do
not require it.
The RTL SSA represention is an optional on-the-side feature that applies on top of
the normal RTL instructions. It is currently local to individual RTL passes and is not
maintained across passes.
However, in order to allow the RTL SSA information to be preserved across passes in
future, ‘crtl->ssa’ points to the current function’s SSA form (if any). Passes that want to
use the RTL SSA form should first do:
crtl->ssa = new rtl_ssa::function_info (fn);
where fn is the function that the pass is processing. (Passes that are using namespace
rtl_ssa do not need the ‘rtl_ssa::’.)
Once the pass has finished with the SSA form, it should do the following:
free_dominance_info (CDI_DOMINATORS);
if (crtl->ssa->perform_pending_updates ())
cleanup_cfg (0);
delete crtl->ssa;
crtl->ssa = nullptr;
The free_dominance_info call is necessary because dominance information is not cur-
rently maintained between RTL passes. The next two lines commit any changes to the RTL
instructions that were queued for later; see the comment above the declaration of perform_
pending_updates for details. The final two lines discard the RTL SSA form and free the
associated memory.
In dumps, a basic block is identified as bbn, where n is the index of the associated CFG
basic_block structure. An EBB is in turn identified by the index of its first block. For
example, an EBB that contains ‘bb10’, bb5, bb6 and bb9 is identified as ebb10.
2
Note that this excludes non-instruction things like notes and barriers that also appear in the chain of
RTL instructions.
328 GNU Compiler Collection (GCC) Internals
3
The exceptions are call clobbers, which are generally represented separately. See the comment above
rtl_ssa::insn_info for details.
Chapter 14: RTL Representation 329
The first and second parts individually follow reverse postorder. The third part has no
particular order.
The last use by a real nondebug instruction always comes earlier in the reverse postorder
than the next definition of the resource (if any). This means that the accesses follow a
linear sequence of the form:
• first definition of resource R
• first use by a real nondebug instruction of the first definition of resource R
• ...
• last use by a real nondebug instruction of the first definition of resource R
• second definition of resource R
• first use by a real nondebug instruction of the second definition of resource R
• ...
• last use by a real nondebug instruction of the second definition of resource R
• ...
• last definition of resource R
• first use by a real nondebug instruction of the last definition of resource R
• ...
• last use by a real nondebug instruction of the last definition of resource R
(Note that clobbers never have uses; only sets do.)
This linear view is easy to achieve when there is only a single definition of a resource,
which is commonly true for pseudo registers. However, things are more complex if code has
a structure like the following:
// ebb2, bb2
R = va; // A
if (...)
{
// ebb2, bb3
use1 (R); // B
...
R = vc; // C
}
else
{
// ebb4, bb4
use2 (R); // D
}
The list of accesses would begin as follows:
• definition of R by A
• use of A’s definition of R by B
• definition of R by C
The next access to R is in D, but the value of R that D uses comes from A rather than
C.
This is resolved by adding a phi node for ebb4. All inputs to this phi node have the
same value, which in the example above is A’s definition of R. In other circumstances, it
Chapter 14: RTL Representation 331
would not be necessary to create a phi node when all inputs are equal, so these phi nodes
are referred to as “degenerate” phi nodes.
The full list of accesses to R is therefore:
• definition of R by A
• use of A’s definition of R by B
• definition of R by C
• definition of R by ebb4’s phi instruction, with the input coming from A
• use of the ebb4’s R phi definition of R by B
Note that A’s definition is also used by ebb4’s phi node, but this use belongs to the third
part of the use list described above and so does not form part of the linear sequence.
It is possible to “look through” any degenerate phi to the ultimate definition using the
function look_through_degenerate_phi. Note that the input to a degenerate phi is never
itself provided by a degenerate phi.
At present, the SSA form takes this principle one step further and guarantees that, for
any given resource res, one of the following is true:
• The resource has a single definition def, which is not a phi node. Excluding uses of
undefined registers, all uses of res by real nondebug instructions use the value provided
by def.
• Excluding uses of undefined registers, all uses of res use values provided by definitions
that occur earlier in the same extended basic block. These definitions might come from
phi nodes or from real instructions.
If a pass was attempting to change all these properties of an instruction insn, it might
do something like this:
rtl_ssa::insn_change change (insn);
change.new_defs = ...;
change.new_uses = ...;
change.move_range = ...;
This rtl_ssa::insn_change only describes something that the pass might do; at this
stage, nothing has actually changed.
As noted above, the default move_range requires the instruction to remain where it is.
At the other extreme, it is possible to allow the instruction to move anywhere within its
extended basic block, provided that all the new uses and definitions can be performed at
the new location. The way to do this is:
change.move_range = insn->ebb ()->insn_range ();
In either case, the next step is to make sure that move range is consistent with the new
uses and definitions. The way to do this is:
if (!rtl_ssa::restrict_movement (change))
return false;
This function tries to limit move_range to a range of instructions at which new_uses
and new_defs can be correctly performed. It returns true on success or false if no suitable
location exists.
The pass should also tentatively change the pattern of the instruction to whatever form
the pass wants the instruction to have. This should use the facilities provided by recog.cc.
For example:
rtl_insn *rtl = insn->rtl ();
insn_change_watermark watermark;
validate_change (rtl, &PATTERN (rtl), new_pat, 1);
will tentatively replace insn’s pattern with new_pat.
These changes and the construction of the rtl_ssa::insn_change can happen in either
order or be interleaved.
After the tentative changes to the instruction are complete, the pass should check whether
the new pattern matches a target instruction or satisfies the requirements of an inline asm:
if (!rtl_ssa::recog (change))
return false;
This step might change the instruction pattern further in order to make it match. It
might also add new definitions or restrict the range of the move. For example, if the new
pattern did not match in its original form, but could be made to match by adding a clobber
of the flags register, rtl_ssa::recog will check whether the flags register is free at an
appropriate point. If so, it will add a clobber of the flags register to new_defs and restrict
move_range to the locations at which the flags register can be safely clobbered.
Even if the proposed new instruction is valid according to rtl_ssa::recog, the change
might not be worthwhile. For example, when optimizing for speed, the new instruction
might turn out to be slower than the original one. When optimizing for size, the new
instruction might turn out to be bigger than the original one.
Passes should check for this case using change_is_worthwhile. For example:
if (!rtl_ssa::change_is_worthwhile (change))
return false;
Chapter 14: RTL Representation 333
If the change passes this test too then the pass can perform the change using:
confirm_change_group ();
crtl->ssa->change_insn (change);
Putting all this together, the change has the following form:
auto attempt = crtl->ssa->new_change_attempt ();
if (!rtl_ssa::restrict_movement (change))
return false;
insn_change_watermark watermark;
// Use validate_change etc. to change INSN's pattern.
...
if (!rtl_ssa::recog (change)
|| !rtl_ssa::change_is_worthwhile (change))
return false;
confirm_change_group ();
crtl->ssa->change_insn (change);
positions and retain their current form. It is again more effective to ignore changing in-
structions (which might, for example, no longer need to clobber the flags register). The way
to do this is:
if (!rtl_ssa::recog (change, insn_is_changing (changes)))
return false;
When changing multiple instructions, the important question is usually not whether each
individual change is worthwhile, but whether the changes as a whole are worthwhile. The
way to test this is:
if (!rtl_ssa::changes_are_worthwhile (changes))
return false;
The process for changing single instructions makes sure that one rtl_ssa::insn_change
in isolation is valid. But when changing multiple instructions, it is also necessary to test
whether the sequence as a whole is valid. For example, it might be impossible to satisfy all
of the move_ranges at once.
Therefore, once the pass has a sequence of changes that are individually correct, it should
use:
if (!crtl->ssa->verify_insn_changes (changes))
return false;
to check whether the sequence as a whole is valid. If all checks pass, the final step is:
confirm_change_group ();
crtl->ssa->change_insns (changes);
Putting all this together, the process for a two-instruction change is:
auto attempt = crtl->ssa->new_change_attempt ();
insn_change_watermark watermark;
// Use validate_change etc. to change INSN1's and INSN2's patterns.
...
if (!rtl_ssa::recog (change1, is_changing)
|| !rtl_ssa::recog (change2, is_changing)
|| !rtl_ssa::changes_are_worthwhile (changes)
|| !crtl->ssa->verify_insn_changes (changes))
return false;
confirm_change_group ();
crtl->ssa->change_insns (changes);
Chapter 14: RTL Representation 335
in the compiler itself, only the various programs that generate the compiler back end from
the machine description.
People frequently have the idea of using RTL stored as text in a file as an interface
between a language front end and the bulk of GCC. This idea is not feasible.
GCC was designed to use RTL internally only. Correct RTL for a given program is
very dependent on the particular target machine. And the RTL does not contain all the
information about the program.
The proper way to interface GCC to a new language front end is with the “tree” data
structure, described in the files tree.h and tree.def. The documentation for this structure
(see Chapter 11 [GENERIC], page 171) is incomplete.
337
since the basic_block data type is used to represent blocks in both major intermediate
representations of GCC (GIMPLE and RTL), there are pointers to the head and end of a
basic block for both representations, stored in intermediate representation specific data in
the il field of struct basic_block_def.
For RTL, these pointers are BB_HEAD and BB_END.
In the RTL representation of a function, the instruction stream contains not only the
“real” instructions, but also notes or insn notes (to distinguish them from reg notes). Any
function that moves or duplicates the basic blocks needs to take care of updating of these
notes. Many of these notes expect that the instruction stream consists of linear regions, so
updating can sometimes be tedious. All types of insn notes are defined in insn-notes.def.
In the RTL function representation, the instructions contained in a basic block always
follow a NOTE_INSN_BASIC_BLOCK, but zero or more CODE_LABEL nodes can precede the
block note. A basic block ends with a control flow instruction or with the last instruction
before the next CODE_LABEL or NOTE_INSN_BASIC_BLOCK. By definition, a CODE_LABEL
cannot appear in the middle of the instruction stream of a basic block.
In addition to notes, the jump table vectors are also represented as “pseudo-instructions”
inside the insn stream. These vectors never appear in the basic block and should always be
placed just after the table jump instructions referencing them. After removing the table-
jump it is often difficult to eliminate the code computing the address and referencing the
vector, so cleaning up these vectors is postponed until after liveness analysis. Thus the
jump table vectors may appear in the insn stream unreferenced and without any purpose.
Before any edge is made fall-thru, the existence of such construct in the way needs to be
checked by calling can_fallthru function.
For the GIMPLE representation, the PHI nodes and statements contained in a basic block
are in a gimple_seq pointed to by the basic block intermediate language specific pointers.
Abstract containers and iterators are used to access the PHI nodes and statements in a
basic blocks. These iterators are called GIMPLE statement iterators (GSIs). Grep for
^gsi in the various gimple-* and tree-* files. There is a gimple_stmt_iterator type for
iterating over all kinds of statement, and a gphi_iterator subclass for iterating over PHI
nodes. The following snippet will pretty-print all PHI nodes the statements of the current
function in the GIMPLE representation.
basic_block bb;
FOR_EACH_BB (bb)
{
gphi_iterator pi;
gimple_stmt_iterator si;
15.2 Edges
Edges represent possible control flow transfers from the end of some basic block A to the
head of another basic block B. We say that A is a predecessor of B, and B is a successor
of A. Edges are represented in GCC with the edge data type. Each edge acts as a link
between two basic blocks: The src member of an edge points to the predecessor basic block
of the dest basic block. The members preds and succs of the basic_block data type
point to type-safe vectors of edges to the predecessors and successors of the block.
When walking the edges in an edge vector, edge iterators should be used. Edge iterators
are constructed using the edge_iterator data structure and several methods are available
to operate on them:
ei_start This function initializes an edge_iterator that points to the first edge in a
vector of edges.
ei_last This function initializes an edge_iterator that points to the last edge in a
vector of edges.
ei_end_p This predicate is true if an edge_iterator represents the last edge in an edge
vector.
ei_one_before_end_p
This predicate is true if an edge_iterator represents the second last edge in
an edge vector.
ei_next This function takes a pointer to an edge_iterator and makes it point to the
next edge in the sequence.
ei_prev This function takes a pointer to an edge_iterator and makes it point to the
previous edge in the sequence.
ei_edge This function returns the edge currently pointed to by an edge_iterator.
ei_safe_edge
This function returns the edge currently pointed to by an edge_iterator,
but returns NULL if the iterator is pointing at the end of the sequence. This
function has been provided for existing code makes the assumption that a NULL
edge indicates the end of the sequence.
The convenience macro FOR_EACH_EDGE can be used to visit all of the edges in a sequence
of predecessor or successor edges. It must not be used when an element might be removed
during the traversal, otherwise elements will be missed. Here is an example of how to use
the macro:
edge e;
edge_iterator ei;
stream just always starts a new basic block. In this case a fall-thru edge links the basic
block to the first following basic block. But there are several other reasons why edges may
be created. The flags field of the edge data type is used to store information about the
type of edge we are dealing with. Each edge is of one of the following types:
jump No type flags are set for edges corresponding to jump instructions. These edges
are used for unconditional or conditional jumps and in RTL also for table jumps.
They are the easiest to manipulate as they may be freely redirected when the
flow graph is not in SSA form.
fall-thru Fall-thru edges are present in case where the basic block may continue exe-
cution to the following one without branching. These edges have the EDGE_
FALLTHRU flag set. Unlike other types of edges, these edges must come into
the basic block immediately following in the instruction stream. The function
force_nonfallthru is available to insert an unconditional jump in the case
that redirection is needed. Note that this may require creation of a new basic
block.
exception handling
Exception handling edges represent possible control transfers from a trapping
instruction to an exception handler. The definition of “trapping” varies. In
C++, only function calls can throw, but for Ada exceptions like division by zero
or segmentation fault are defined and thus each instruction possibly throwing
this kind of exception needs to be handled as control flow instruction. Exception
edges have the EDGE_ABNORMAL and EDGE_EH flags set.
When updating the instruction stream it is easy to change possibly trapping
instruction to non-trapping, by simply removing the exception edge. The op-
posite conversion is difficult, but should not happen anyway. The edges can be
eliminated via purge_dead_edges call.
In the RTL representation, the destination of an exception edge is specified by
REG_EH_REGION note attached to the insn. In case of a trapping call the EDGE_
ABNORMAL_CALL flag is set too. In the GIMPLE representation, this extra flag is
not set.
In the RTL representation, the predicate may_trap_p may be used to check
whether instruction still may trap or not. For the tree representation, the
tree_could_trap_p predicate is available, but this predicate only checks for
possible memory traps, as in dereferencing an invalid pointer location.
sibling calls
Sibling calls or tail calls terminate the function in a non-standard way and thus
an edge to the exit must be present. EDGE_SIBCALL and EDGE_ABNORMAL are
set in such case. These edges only exist in the RTL representation.
computed jumps
Computed jumps contain edges to all labels in the function referenced from
the code. All those edges have EDGE_ABNORMAL flag set. The edges used to
represent computed jumps often cause compile time performance problems,
since functions consisting of many taken labels and many computed jumps may
have very dense flow graphs, so these edges need to be handled with special
Chapter 15: Control Flow Graph 341
care. During the earlier stages of the compilation process, GCC tries to avoid
such dense flow graphs by factoring computed jumps. For example, given the
following series of jumps,
goto *x;
[ ... ]
goto *x;
[ ... ]
goto *x;
[ ... ]
factoring the computed jumps results in the following code sequence which has
a much simpler flow graph:
goto y;
[ ... ]
goto y;
[ ... ]
goto y;
[ ... ]
y:
goto *x;
However, the classic problem with this transformation is that it has a runtime
cost in there resulting code: An extra jump. Therefore, the computed jumps
are un-factored in the later passes of the compiler (in the pass called pass_
duplicate_computed_gotos). Be aware of that when you work on passes in
that area. There have been numerous examples already where the compile time
for code with unfactored computed jumps caused some serious headaches.
nonlocal goto handlers
GCC allows nested functions to return into caller using a goto to a label passed
to as an argument to the callee. The labels passed to nested functions contain
special code to cleanup after function call. Such sections of code are referred to
as “nonlocal goto receivers”. If a function contains such nonlocal goto receivers,
an edge from the call to the label is created with the EDGE_ABNORMAL and EDGE_
ABNORMAL_CALL flags set.
function entry points
By definition, execution of function starts at basic block 0, so there is always
an edge from the ENTRY_BLOCK_PTR to basic block 0. There is no GIMPLE
representation for alternate entry points at this moment. In RTL, alternate
entry points are specified by CODE_LABEL with LABEL_ALTERNATE_NAME defined.
This feature is currently used for multiple entry point prologues and is limited
to post-reload passes only. This can be used by back-ends to emit alternate
prologues for functions called from different contexts. In future full support for
multiple entry functions defined by Fortran 90 needs to be implemented.
function exits
In the pre-reload representation a function terminates after the last instruction
in the insn chain and no explicit return instructions are used. This corresponds
342 GNU Compiler Collection (GCC) Internals
to the fall-thru edge into exit block. After reload, optimal RTL epilogues are
used that use explicit (conditional) return instructions that are represented by
edges with no flags set.
PROB macro) since they are used when instructions are output to the assembly file and the
flow graph is no longer maintained.
The probability that control flow arrives via a given edge to its destination basic block
is called reverse probability and is not directly represented, but it may be easily computed
from frequencies of basic blocks.
Updating profile information is a delicate task that can unfortunately not be easily in-
tegrated with the CFG manipulation API. Many of the functions and hooks to modify
the CFG, such as redirect_edge_and_branch, do not have enough information to easily
update the profile, so updating it is in the majority of cases left up to the caller. It is
difficult to uncover bugs in the profile updating code, because they manifest themselves
only by producing worse code, and checking profile consistency is not possible because of
numeric error accumulation. Hence special attention needs to be given to this issue in each
pass that modifies the CFG.
It is important to point out that REG_BR_PROB_BASE and BB_FREQ_BASE are both set low
enough to be possible to compute second power of any frequency or probability in the flow
graph, it is not possible to even square the count field, as modern CPUs are fast enough to
execute $2^32$ operations quickly.
gsi_last This function initializes a gimple_stmt_iterator that points to the last state-
ment in a basic block.
gsi_end_p
This predicate is true if a gimple_stmt_iterator represents the end of a basic
block.
gsi_next This function takes a gimple_stmt_iterator and makes it point to its succes-
sor.
gsi_prev This function takes a gimple_stmt_iterator and makes it point to its prede-
cessor.
gsi_insert_after
This function inserts a statement after the gimple_stmt_iterator passed in.
The final parameter determines whether the statement iterator is updated to
point to the newly inserted statement, or left pointing to the original statement.
gsi_insert_before
This function inserts a statement before the gimple_stmt_iterator passed in.
The final parameter determines whether the statement iterator is updated to
point to the newly inserted statement, or left pointing to the original statement.
gsi_remove
This function removes the gimple_stmt_iterator passed in and rechains the
remaining statements in a basic block, if any.
In the RTL representation, the macros BB_HEAD and BB_END may be used to get the head
and end rtx of a basic block. No abstract iterators are defined for traversing the insn chain,
but you can just use NEXT_INSN and PREV_INSN instead. See Section 14.19 [Insns], page 316.
Usually a code manipulating pass simplifies the instruction stream and the flow of control,
possibly eliminating some edges. This may for example happen when a conditional jump
is replaced with an unconditional jump. Updating of edges is not transparent and each
optimization pass is required to do so manually. However only few cases occur in practice.
The pass may call purge_dead_edges on a given basic block to remove superfluous edges,
if any.
Another common scenario is redirection of branch instructions, but this is best modeled as
redirection of edges in the control flow graph and thus use of redirect_edge_and_branch is
preferred over more low level functions, such as redirect_jump that operate on RTL chain
only. The CFG hooks defined in cfghooks.h should provide the complete API required for
manipulating and maintaining the CFG.
It is also possible that a pass has to insert control flow instruction into the middle of a
basic block, thus creating an entry point in the middle of the basic block, which is impossible
by definition: The block must be split to make sure it only has one entry point, i.e. the
head of the basic block. The CFG hook split_block may be used when an instruction in
the middle of a basic block has to become the target of a jump or branch instruction.
For a global optimizer, a common operation is to split edges in the flow graph and
insert instructions on them. In the RTL representation, this can be easily done using the
insert_insn_on_edge function that emits an instruction “on the edge”, caching it for a
later commit_edge_insertions call that will take care of moving the inserted instructions
Chapter 15: Control Flow Graph 345
off the edge into the instruction stream contained in a basic block. This includes the
creation of new basic blocks where needed. In the GIMPLE representation, the equivalent
functions are gsi_insert_on_edge which inserts a block statement iterator on an edge,
and gsi_commit_edge_inserts which flushes the instruction to actual instruction stream.
While debugging the optimization pass, the verify_flow_info function may be useful
to find bugs in the control flow graph updating code.
Each loop is guaranteed to be visited exactly once, regardless of the changes to the loop
tree, and the loops may be removed during the traversal. The newly created loops are never
traversed, if they need to be visited, this must be done separately after their creation.
Each basic block contains the reference to the innermost loop it belongs to (loop_father).
For this reason, it is only possible to have one struct loops structure initialized at the
same time for each CFG. The global variable current_loops contains the struct loops
structure. Many of the loop manipulation functions assume that dominance information is
up-to-date.
The loops are analyzed through loop_optimizer_init function. The argument of this
function is a set of flags represented in an integer bitmask. These flags specify what other
properties of the loop structures should be calculated/enforced and preserved later:
• LOOPS_MAY_HAVE_MULTIPLE_LATCHES: If this flag is set, no changes to CFG will be
performed in the loop analysis, in particular, loops with multiple latch edges will not
be disambiguated. If a loop has multiple latches, its latch block is set to NULL. Most
of the loop manipulation functions will not work for loops in this shape. No other flags
that require CFG changes can be passed to loop optimizer init.
• LOOPS_HAVE_PREHEADERS: Forwarder blocks are created in such a way that each loop
has only one entry edge, and additionally, the source block of this entry edge has only
one successor. This creates a natural place where the code can be moved out of the
loop, and ensures that the entry edge of the loop leads from its immediate super-loop.
• LOOPS_HAVE_SIMPLE_LATCHES: Forwarder blocks are created to force the latch block
of each loop to have only one successor. This ensures that the latch of the loop does
not belong to any of its sub-loops, and makes manipulation with the loops significantly
easier. Most of the loop manipulation functions assume that the loops are in this shape.
Note that with this flag, the “normal” loop without any control flow inside and with
one exit consists of two basic blocks.
• LOOPS_HAVE_MARKED_IRREDUCIBLE_REGIONS: Basic blocks and edges in the strongly
connected components that are not natural loops (have more than one entry block) are
marked with BB_IRREDUCIBLE_LOOP and EDGE_IRREDUCIBLE_LOOP flags. The flag is
not set for blocks and edges that belong to natural loops that are in such an irreducible
region (but it is set for the entry and exit edges of such a loop, if they lead to/from
this region).
• LOOPS_HAVE_RECORDED_EXITS: The lists of exits are recorded and updated for each
loop. This makes some functions (e.g., get_loop_exit_edges) more efficient. Some
functions (e.g., single_exit) can be used only if the lists of exits are recorded.
These properties may also be computed/enforced later, using functions create_
preheaders, force_single_succ_latches, mark_irreducible_loops and
record_loop_exits. The properties can be queried using loops_state_satisfies_p.
The memory occupied by the loops structures should be freed with loop_optimizer_
finalize function. When loop structures are setup to be preserved across passes this
function reduces the information to be kept up-to-date to a minimum (only LOOPS_MAY_
HAVE_MULTIPLE_LATCHES set).
The CFG manipulation functions in general do not update loop structures. Specialized
versions that additionally do so are provided for the most common tasks. On GIMPLE,
Chapter 16: Analysis and Representation of Loops 349
cleanup_tree_cfg_loop function can be used to cleanup CFG while updating the loops
structures if current_loops is set.
At the moment loop structure is preserved from the start of GIMPLE loop optimizations
until the end of RTL loop optimizations. During this time a loop can be tracked by its
struct loop and number.
expression and of base and step must be the same. A variable has evolution POLYNOMIAL_
CHREC(base, step, loop) if it is (in the specified loop) equivalent to x_1 in the following
example
while (...)
{
x_1 = phi (base, x_2);
x_2 = x_1 + step;
}
Note that this includes the language restrictions on the operations. For example, if we
compile C code and x has signed type, then the overflow in addition would cause undefined
behavior, and we may assume that this does not happen. Hence, the value with this SCEV
cannot overflow (which restricts the number of iterations of such a loop).
In many cases, one wants to restrict the attention just to affine induction variables.
In this case, the extra expressive power of SCEV is not useful, and may complicate the
optimizations. In this case, simple_iv function may be used to analyze a value – the result
is a loop-invariant base and step.
is defined as the number of executions of the loop latch. In many cases, it is not possible
to determine the number of iterations unconditionally – the determined number is correct
only if some assumptions are satisfied. The analysis tries to verify these conditions using
the information contained in the program; if it fails, the conditions are returned together
with the result. The following information and conditions are provided by the analysis:
• assumptions: If this condition is false, the rest of the information is invalid.
• noloop_assumptions on RTL, may_be_zero on GIMPLE: If this condition is true, the
loop exits in the first iteration.
• infinite: If this condition is true, the loop is infinite. This condition is only avail-
able on RTL. On GIMPLE, conditions for finiteness of the loop are included in
assumptions.
• niter_expr on RTL, niter on GIMPLE: The expression that gives number of iter-
ations. The number of iterations is defined as the number of executions of the loop
latch.
Both on GIMPLE and on RTL, it necessary for the induction variable analysis framework
to be initialized (SCEV on GIMPLE, loop-iv on RTL). On GIMPLE, the results are stored
to struct tree_niter_desc structure. Number of iterations before the loop is exited
through a given exit can be determined using number_of_iterations_exit function. On
RTL, the results are returned in struct niter_desc structure. The corresponding function
is named check_simple_exit. There are also functions that pass through all the exits of
a loop and try to find one with easy to determine number of iterations – find_loop_niter
on GIMPLE and find_simple_exit on RTL. Finally, there are functions that provide the
same information, but additionally cache it, so that repeated calls to number of iterations
are not so costly – number_of_latch_executions on GIMPLE and get_simple_loop_
desc on RTL.
Note that some of these functions may behave slightly differently than others – some of
them return only the expression for the number of iterations, and fail if there are some
assumptions. The function number_of_latch_executions works only for single-exit loops.
The function number_of_cond_exit_executions can be used to determine number of ex-
ecutions of the exit condition of a single-exit loop (i.e., the number_of_latch_executions
increased by one).
On GIMPLE, below constraint flags affect semantics of some APIs of number of iterations
analyzer:
• LOOP_C_INFINITE: If this constraint flag is set, the loop is known to be infinite. APIs
like number_of_iterations_exit can return false directly without doing any analysis.
• LOOP_C_FINITE: If this constraint flag is set, the loop is known to be finite, in other
words, loop’s number of iterations can be computed with assumptions be true.
Generally, the constraint flags are set/cleared by consumers which are loop optimizers.
It’s also the consumers’ responsibility to set/clear constraints correctly. Failing to do that
might result in hard to track down bugs in scev/niter consumers. One typical use case is
vectorizer: it drives number of iterations analyzer by setting LOOP_C_FINITE and vectorizes
possibly infinite loop by versioning loop with analysis result. In return, constraints set by
consumers can also help number of iterations analyzer in following optimizers. For example,
niter of a loop versioned under assumptions is valid unconditionally.
354 GNU Compiler Collection (GCC) Internals
Other constraints may be added in the future, for example, a constraint indicating that
loops’ latch must roll thus may_be_zero would be false unconditionally.
Two data references can be compared only if at least one of these two representations
has all its fields filled for both data references.
The current strategy for data dependence tests is as follows: If both a and b are
represented as arrays, compare a.base_object and b.base_object; if they are equal,
apply dependence tests (use access functions based on base objects). Else if both a and
b are represented as pointers, compare a.first_location and b.first_location; if
they are equal, apply dependence tests (use access functions based on first location).
However, if a and b are represented differently, only try to prove that the bases are
definitely different.
• Aliasing information.
• Alignment information.
The structure describing the relation between two data references is data_dependence_
relation and the shorter name for a pointer to such a structure is ddr_p. This structure
contains:
• a pointer to each data reference,
• a tree node are_dependent that is set to chrec_known if the analysis has proved that
there is no dependence between these two data references, chrec_dont_know if the
analysis was not able to determine any useful result and potentially there could exist
a dependence between these data references, and are_dependent is set to NULL_TREE
if there exist a dependence relation between the data references, and the description
of this dependence relation is given in the subscripts, dir_vects, and dist_vects
arrays,
• a boolean that determines whether the dependence relation can be represented by a
classical distance vector,
• an array subscripts that contains a description of each subscript of the data references.
Given two array accesses a subscript is the tuple composed of the access functions for
a given dimension. For example, given A[f1][f2][f3] and B[g1][g2][g3], there are
three subscripts: (f1, g1), (f2, g2), (f3, g3).
• two arrays dir_vects and dist_vects that contain classical representations of the
data dependences under the form of direction and distance dependence vectors,
• an array of loops loop_nest that contains the loops to which the distance and direction
vectors refer to.
Several functions for pretty printing the information extracted by the data dependence
analysis are available: dump_ddrs prints with a maximum verbosity the details of a data
dependence relations array, dump_dist_dir_vectors prints only the classical distance and
direction vectors for a data dependence relations array, and dump_data_references prints
the details of the data references contained in a data reference array.
357
17 Machine Descriptions
A machine description has two parts: a file of instruction patterns (.md file) and a C header
file of macro definitions.
The .md file for a target machine contains a pattern for each instruction that the target
machine supports (or at least each instruction that is worth telling the compiler about).
It may also contain comments. A semicolon causes the rest of the line to be a comment,
unless the semicolon is inside a quoted string.
See the next chapter for information on the C header file.
returns the instruction’s rtx pattern. The compiler also assigns the instruction a unique
code ‘CODE_FOR_n’, with all such codes belonging to an enum called insn_code.
These names serve one of two purposes. The first is to indicate that the instruction
performs a certain standard job for the RTL-generation pass of the compiler, such as
a move, an addition, or a conditional jump. The second is to help the target generate
certain target-specific operations, such as when implementing target-specific intrinsic
functions.
It is better to prefix target-specific names with the name of the target, to avoid any
clash with current or future standard names.
The absence of a name is indicated by writing an empty string where the name should
go. Nameless instruction patterns are never used for generating RTL code, but they
may permit several simpler insns to be combined later on.
For the purpose of debugging the compiler, you may also specify a name beginning
with the ‘*’ character. Such a name is used only for identifying the instruction in RTL
dumps; it is equivalent to having a nameless pattern for all other purposes. Names
beginning with the ‘*’ character are not required to be unique.
The name may also have the form ‘@n’. This has the same effect as a name ‘n’, but
in addition tells the compiler to generate further helper functions; see Section 17.23.5
[Parameterized Names], page 502, for details.
2. The RTL template: This is a vector of incomplete RTL expressions which describe
the semantics of the instruction (see Section 17.4 [RTL Template], page 359). It is
incomplete because it may contain match_operand, match_operator, and match_dup
expressions that stand for operands of the instruction.
If the vector has multiple elements, the RTL template is treated as a parallel expres-
sion.
3. The condition: This is a string which contains a C expression. When the compiler
attempts to match RTL against a pattern, the condition is evaluated. If the condition
evaluates to true, the match is permitted. The condition may be an empty string,
which is treated as always true.
For a named pattern, the condition may not depend on the data in the insn being
matched, but only the target-machine-type flags. The compiler needs to test these
conditions during initialization in order to learn exactly which named instructions are
available in a particular run.
For nameless patterns, the condition is applied only when matching an individual insn,
and only after the insn has matched the pattern’s recognition template. The insn’s
operands may be found in the vector operands.
An instruction condition cannot become more restrictive as compilation progresses.
If the condition accepts a particular RTL instruction at one stage of compilation,
it must continue to accept that instruction until the final pass. For example,
‘!reload_completed’ and ‘can_create_pseudo_p ()’ are both invalid instruction
conditions, because they are true during the earlier RTL passes and false during the
later ones. For the same reason, if a condition accepts an instruction before register
allocation, it cannot later try to control register allocation by excluding certain
register or value combinations.
Chapter 17: Machine Descriptions 359
Construction involves substituting specified operands into a copy of the template. Match-
ing involves determining the values that serve as the operands in the insn being matched.
Both of these activities are controlled by special expression types that direct matching and
substitution of the operands.
(match_operand:m n predicate constraint)
This expression is a placeholder for operand number n of the insn. When
constructing an insn, operand number n will be substituted at this point. When
matching an insn, whatever appears at this position in the insn will be taken
as operand number n; but it must satisfy predicate or this instruction pattern
will not match at all.
Operand numbers must be chosen consecutively counting from zero in each
instruction pattern. There may be only one match_operand expression in the
pattern for each operand number. Usually operands are numbered in the order
of appearance in match_operand expressions. In the case of a define_expand,
any operand numbers used only in match_dup expressions have higher values
than all other operand numbers.
predicate is a string that is the name of a function that accepts two arguments,
an expression and a machine mode. See Section 17.7 [Predicates], page 366.
During matching, the function will be called with the putative operand as the
expression and m as the mode argument (if m is not specified, VOIDmode will be
used, which normally causes predicate to accept any mode). If it returns zero,
this instruction pattern fails to match. predicate may be an empty string; then
it means no test is to be done on the operand, so anything which occurs in this
position is valid.
Most of the time, predicate will reject modes other than m—but not always.
For example, the predicate address_operand uses m as the mode of memory
ref that the address should be valid for. Many predicates accept const_int
nodes even though their mode is VOIDmode.
constraint controls reloading and the choice of the best register class to use for
a value, as explained later (see Section 17.8 [Constraints], page 370). If the
constraint would be an empty string, it can be omitted.
People are often unclear on the difference between the constraint and the predi-
cate. The predicate helps decide whether a given insn matches the pattern. The
constraint plays no role in this decision; instead, it controls various decisions in
the case of an insn which does match.
(match_scratch:m n constraint)
This expression is also a placeholder for operand number n and indicates that
operand must be a scratch or reg expression.
When matching patterns, this is equivalent to
(match_operand:m n "scratch_operand" constraint)
but, when generating RTL, it produces a (scratch:m) expression.
If the last few expressions in a parallel are clobber expressions whose
operands are either a hard register or match_scratch, the combiner can add
or delete them when necessary. See Section 14.15 [Side Effects], page 308.
Chapter 17: Machine Descriptions 361
(match_dup n)
This expression is also a placeholder for operand number n. It is used when the
operand needs to appear more than once in the insn.
In construction, match_dup acts just like match_operand: the operand is sub-
stituted into the insn being constructed. But in matching, match_dup behaves
differently. It assumes that operand number n has already been determined by
a match_operand appearing earlier in the recognition template, and it matches
only an identical-looking expression.
Note that match_dup should not be used to tell the compiler that a particular
register is being used for two operands (example: add that adds one register to
another; the second register is both an input operand and the output operand).
Use a matching constraint (see Section 17.8.1 [Simple Constraints], page 371)
for those. match_dup is for the cases where one operand is used in two places
in the template, such as an instruction that computes both a quotient and a
remainder, where the opcode takes two input operands but the RTL template
has to refer to each of those twice; once for the quotient pattern and once for
the remainder pattern.
(match_operator:m n predicate [operands...])
This pattern is a kind of placeholder for a variable RTL expression code.
When constructing an insn, it stands for an RTL expression whose expression
code is taken from that of operand n, and whose operands are constructed from
the patterns operands.
When matching an expression, it matches an expression if the function predi-
cate returns nonzero on that expression and the patterns operands match the
operands of the expression.
Suppose that the function commutative_operator is defined as follows, to
match any expression whose operator is one of the commutative arithmetic
operators of RTL and whose mode is mode:
int
commutative_operator (x, mode)
rtx x;
machine_mode mode;
{
enum rtx_code code = GET_CODE (x);
if (GET_MODE (x) != mode)
return 0;
return (GET_RTX_CLASS (code) == RTX_COMM_ARITH
|| code == EQ || code == NE);
}
Then the following pattern will match any RTL expression consisting of a com-
mutative operator applied to two general operands:
(match_operator:SI 3 "commutative_operator"
[(match_operand:SI 1 "general_operand" "g")
(match_operand:SI 2 "general_operand" "g")])
Here the vector [operands...] contains two patterns because the expressions
to be matched all contain two operands.
When this pattern does match, the two operands of the commutative operator
are recorded as operands 1 and 2 of the insn. (This is done by the two instances
362 GNU Compiler Collection (GCC) Internals
(match_par_dup n [subpat...])
Like match_op_dup, but for match_parallel instead of match_operator.
nonstandard cases can be defined in the PRINT_OPERAND macro. You must also define
which punctuation characters are valid with the PRINT_OPERAND_PUNCT_VALID_P macro.
The template may generate multiple assembler instructions. Write the text for the in-
structions, with ‘\;’ between them.
When the RTL contains two operands which are required by constraint to match each
other, the output template must refer only to the lower-numbered operand. Matching
operands are not always identical, and the rest of the compiler arranges to put the proper
RTL expression for printing into the lower-numbered operand.
One use of nonstandard letters or punctuation following ‘%’ is to distinguish between
different assembler languages for the same machine; for example, Motorola syntax versus
MIT syntax for the 68000. Motorola syntax requires periods in most opcode names, while
MIT syntax does not. For example, the opcode ‘movel’ in MIT syntax is ‘move.l’ in
Motorola syntax. The same file of patterns is used for both kinds of output syntax, but
the character sequence ‘%.’ is used in each place where Motorola syntax wants a period.
The PRINT_OPERAND macro for Motorola syntax defines the sequence to output a period;
the macro for MIT syntax defines it to do nothing.
As a special case, a template consisting of the single character # instructs the compiler
to first split the insn, and then output the resulting instructions separately. This helps
eliminate redundancy in the output templates. If you have a define_insn that needs
to emit multiple assembler instructions, and there is a matching define_split already
defined, then you can simply use # as the output template instead of writing an output
template that emits the multiple assembler instructions.
Note that # only has an effect while generating assembly code; it does not affect whether
a split occurs earlier. An associated define_split must exist and it must be suitable for
use after register allocation.
If the macro ASSEMBLER_DIALECT is defined, you can use construct of the form
‘{option0|option1|option2}’ in the templates. These describe multiple variants of
assembler language syntax. See Section 18.20.7 [Instruction Output], page 643.
addr %2,%0
addm %2,%0")
If the output control string starts with a ‘*’, then it is not an output template but rather a
piece of C program that should compute a template. It should execute a return statement
to return the template-string you want. Most such templates use C string literals, which
require doublequote characters to delimit them. To include these doublequote characters in
the string, prefix each one with ‘\’.
If the output control string is written as a brace block instead of a double-quoted string,
it is automatically assumed to be C code. In that case, it is not necessary to put in a leading
asterisk, or to escape the doublequotes surrounding C string literals.
The operands may be found in the array operands, whose C data type is rtx [].
It is very common to select different ways of generating assembler code based on whether
an immediate operand is within a certain range. Be careful when doing this, because the
result of INTVAL is an integer on the host machine. If the host machine has more bits in an
int than the target machine has in the mode in which the constant will be used, then some
of the bits you get from INTVAL will be superfluous. For proper results, you must carefully
disregard the values of those bits.
It is possible to output an assembler instruction and then go on to output or compute
more of them, using the subroutine output_asm_insn. This receives two arguments: a
template-string and a vector of operands. The vector may be operands, or it may be
another array of rtx that you declare locally and initialize yourself.
When an insn pattern has multiple alternatives in its constraints, often the appearance
of the assembler code is determined mostly by which alternative was matched. When this
is so, the C code can test the variable which_alternative, which is the ordinal number of
the alternative that was actually satisfied (0 for the first, 1 for the second alternative, etc.).
For example, suppose there are two opcodes for storing zero, ‘clrreg’ for registers and
‘clrmem’ for memory locations. Here is how a pattern could use which_alternative to
choose between them:
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r,m")
(const_int 0))]
""
{
return (which_alternative == 0
? "clrreg %0" : "clrmem %0");
})
The example above, where the assembler code to generate was solely determined by the
alternative, could also have been specified as follows, having the output control string start
with a ‘@’:
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r,m")
(const_int 0))]
""
"@
clrreg %0
clrmem %0")
If you just need a little bit of C code in one (or a few) alternatives, you can use ‘*’ inside
of a ‘@’ multi-alternative template:
366 GNU Compiler Collection (GCC) Internals
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r,<,m")
(const_int 0))]
""
"@
clrreg %0
* return stack_mem_p (operands[0]) ? \"push 0\" : \"clrmem %0\";
clrmem %0")
17.7 Predicates
A predicate determines whether a match_operand or match_operator expression matches,
and therefore whether the surrounding instruction pattern will be used for that combination
of operands. GCC has a number of machine-independent predicates, and you can define
machine-specific predicates as needed. By convention, predicates used with match_operand
have names that end in ‘_operand’, and those used with match_operator have names that
end in ‘_operator’.
All predicates are boolean functions (in the mathematical sense) of two arguments: the
RTL expression that is being considered at that position in the instruction pattern, and
the machine mode that the match_operand or match_operator specifies. In this section,
the first argument is called op and the second argument mode. Predicates can be called
from C as ordinary two-argument functions; this can be useful in output templates or other
machine-specific code.
Operand predicates can allow operands that are not actually acceptable to the hard-
ware, as long as the constraints give reload the ability to fix them up (see Section 17.8
[Constraints], page 370). However, GCC will usually generate better code if the predicates
specify the requirements of the machine instructions as closely as possible. Reload cannot
fix up operands that must be constants (“immediate operands”); you must use a predicate
that allows only constants, or else enforce the requirement in the extra condition.
Most predicates handle their mode argument in a uniform manner. If mode is VOIDmode
(unspecified), then op can have any mode. If mode is anything else, then op must have the
same mode, unless op is a CONST_INT or integer CONST_DOUBLE. These RTL expressions
always have VOIDmode, so it would be counterproductive to check that their mode matches.
Instead, predicates that accept CONST_INT and/or integer CONST_DOUBLE check that the
value stored in the constant will fit in the requested mode.
Predicates with this behavior are called normal. genrecog can optimize the instruction
recognizer based on knowledge of how normal predicates treat modes. It can also diagnose
certain kinds of common errors in the use of normal predicates; for instance, it is almost
always an error to use a normal predicate without specifying a mode.
Predicates that do something different with their mode argument are called special. The
generic predicates address_operand and pmode_register_operand are special predicates.
genrecog does not do any optimizations or diagnosis when special predicates are used.
immediate_operand [Function]
This predicate allows any sort of constant that fits in mode. It is an appropriate
choice for instructions that take operands that must be constant.
const_int_operand [Function]
This predicate allows any CONST_INT expression that fits in mode. It is an appropriate
choice for an immediate operand that does not allow a symbol or label.
const_double_operand [Function]
This predicate accepts any CONST_DOUBLE expression that has exactly mode. If mode
is VOIDmode, it will also accept CONST_INT. It is intended for immediate floating point
constants.
The second category of predicates allow only some kind of machine register.
register_operand [Function]
This predicate allows any REG or SUBREG expression that is valid for mode. It is often
suitable for arithmetic instruction operands on a RISC machine.
pmode_register_operand [Function]
This is a slight variant on register_operand which works around a limitation in the
machine-description reader.
(match_operand n "pmode_register_operand" constraint)
means exactly what
(match_operand:P n "register_operand" constraint)
would mean, if the machine-description reader accepted ‘:P’ mode suffixes. Unfor-
tunately, it cannot, because Pmode is an alias for some other mode, and might vary
with machine-specific options. See Section 18.31 [Misc], page 668.
scratch_operand [Function]
This predicate allows hard registers and SCRATCH expressions, but not pseudo-
registers. It is used internally by match_scratch; it should not be used
directly.
The third category of predicates allow only some kind of memory reference.
memory_operand [Function]
This predicate allows any valid reference to a quantity of mode mode in memory,
as determined by the weak form of GO_IF_LEGITIMATE_ADDRESS (see Section 18.13
[Addressing Modes], page 589).
address_operand [Function]
This predicate is a little unusual; it allows any operand that is a valid expression
for the address of a quantity of mode mode, again determined by the weak form of
GO_IF_LEGITIMATE_ADDRESS. To first order, if ‘(mem:mode (exp))’ is acceptable to
memory_operand, then exp is acceptable to address_operand. Note that exp does
not necessarily have the mode mode.
368 GNU Compiler Collection (GCC) Internals
indirect_operand [Function]
This is a stricter form of memory_operand which allows only memory references with
a general_operand as the address expression. New uses of this predicate are dis-
couraged, because general_operand is very permissive, so it’s hard to tell what an
indirect_operand does or does not allow. If a target has different requirements
for memory operands for different instructions, it is better to define target-specific
predicates which enforce the hardware’s requirements explicitly.
push_operand [Function]
This predicate allows a memory reference suitable for pushing a value onto the stack.
This will be a MEM which refers to stack_pointer_rtx, with a side effect in its address
expression (see Section 14.16 [Incdec], page 314); which one is determined by the
STACK_PUSH_CODE macro (see Section 18.9.1 [Frame Layout], page 549).
pop_operand [Function]
This predicate allows a memory reference suitable for popping a value off the stack.
Again, this will be a MEM referring to stack_pointer_rtx, with a side effect in its
address expression. However, this time STACK_POP_CODE is expected.
The fourth category of predicates allow some combination of the above operands.
nonmemory_operand [Function]
This predicate allows any immediate or register operand valid for mode.
nonimmediate_operand [Function]
This predicate allows any register or memory operand valid for mode.
general_operand [Function]
This predicate allows any immediate, register, or memory operand valid for mode.
comparison_operator [Function]
This predicate matches any expression which performs an arithmetic comparison in
mode; that is, COMPARISON_P is true for the expression code.
ordered_comparison_operator [Function]
This predicate matches any expression which performs an arithmetic comparison in
mode and whose expression code is valid for integer modes; that is, the expression
code will be one of eq, ne, lt, ltu, le, leu, gt, gtu, ge, geu.
• An RTL expression which evaluates to true if the predicate allows the operand op, false
if it does not. This expression can only use the following RTL codes:
MATCH_OPERAND
When written inside a predicate expression, a MATCH_OPERAND expression
evaluates to true if the predicate it names would allow op. The operand
number and constraint are ignored. Due to limitations in genrecog, you
can only refer to generic predicates and predicates that have already been
defined.
MATCH_CODE
This expression evaluates to true if op or a specified subexpression of op
has one of a given list of RTX codes.
The first operand of this expression is a string constant containing a
comma-separated list of RTX code names (in lower case). These are the
codes for which the MATCH_CODE will be true.
The second operand is a string constant which indicates what subexpres-
sion of op to examine. If it is absent or the empty string, op itself is
examined. Otherwise, the string constant must be a sequence of digits
and/or lowercase letters. Each character indicates a subexpression to ex-
tract from the current expression; for the first character this is op, for the
second and subsequent characters it is the result of the previous character.
A digit n extracts ‘XEXP (e, n)’; a letter l extracts ‘XVECEXP (e, 0, n)’
where n is the alphabetic ordinal of l (0 for ‘a’, 1 for ’b’, and so on). The
MATCH_CODE then examines the RTX code of the subexpression extracted
by the complete string. It is not possible to extract components of an
rtvec that is not at position 0 within its RTX object.
MATCH_TEST
This expression has one operand, a string constant containing a C expres-
sion. The predicate’s arguments, op and mode, are available with those
names in the C expression. The MATCH_TEST evaluates to true if the C
expression evaluates to a nonzero value. MATCH_TEST expressions must not
have side effects.
AND
IOR
NOT
IF_THEN_ELSE
The basic ‘MATCH_’ expressions can be combined using these logical opera-
tors, which have the semantics of the C operators ‘&&’, ‘||’, ‘!’, and ‘? :’
respectively. As in Common Lisp, you may give an AND or IOR expres-
sion an arbitrary number of arguments; this has exactly the same effect as
writing a chain of two-argument AND or IOR expressions.
• An optional block of C code, which should execute ‘return true’ if the predicate is
found to match and ‘return false’ if it does not. It must not have any side effects.
The predicate arguments, op and mode, are available with those names.
If a code block is present in a predicate definition, then the RTL expression must
evaluate to true and the code block must execute ‘return true’ for the predicate to
370 GNU Compiler Collection (GCC) Internals
allow the operand. The RTL expression is evaluated first; do not re-check anything in
the code block that was checked in the RTL expression.
The program genrecog scans define_predicate and define_special_predicate ex-
pressions to determine which RTX codes are possibly allowed. You should always make this
explicit in the RTL predicate expression, using MATCH_OPERAND and MATCH_CODE.
Here is an example of a simple predicate definition, from the IA64 machine description:
;; True if op is a SYMBOL_REF which refers to the sdata section.
(define_predicate "small_addr_symbolic_operand"
(and (match_code "symbol_ref")
(match_test "SYMBOL_REF_SMALL_ADDR_P (op)")))
And here is another, showing the use of the C block.
;; True if op is a register operand that is (or could be) a GR reg.
(define_predicate "gr_register_operand"
(match_operand 0 "register_operand")
{
unsigned int regno;
if (GET_CODE (op) == SUBREG)
op = SUBREG_REG (op);
‘n’ An immediate integer operand with a known numeric value is allowed. Many
systems cannot support assembly-time constants for operands less than a word
wide. Constraints for these operands should use ‘n’ rather than ‘i’.
‘I’, ‘J’, ‘K’, . . . ‘P’
Other letters in the range ‘I’ through ‘P’ may be defined in a machine-dependent
fashion to permit immediate integer operands with explicit integer values in
specified ranges. For example, on the 68000, ‘I’ is defined to stand for the
range of values 1 to 8. This is the range permitted as a shift count in the shift
instructions.
‘E’ An immediate floating operand (expression code const_double) is allowed, but
only if the target floating point format is the same as that of the host machine
(on which the compiler is running).
‘F’ An immediate floating operand (expression code const_double or
const_vector) is allowed.
‘G’, ‘H’ ‘G’ and ‘H’ may be defined in a machine-dependent fashion to permit immediate
floating operands in particular ranges of values.
‘s’ An immediate integer operand whose value is not an explicit integer is allowed.
This might appear strange; if an insn allows a constant operand with a value
not known at compile time, it certainly must allow any known value. So why
use ‘s’ instead of ‘i’? Sometimes it allows better code to be generated.
For example, on the 68000 in a fullword instruction it is possible to use an
immediate operand; but if the immediate value is between −128 and 127, better
code results from loading the value into a register and using the register. This
is because the load into the register can be done with a ‘moveq’ instruction. We
arrange for this to happen by defining the letter ‘K’ to mean “any integer outside
the range −128 to 127”, and then specifying ‘Ks’ in the operand constraints.
‘g’ Any register, memory or immediate integer operand is allowed, except for reg-
isters that are not general registers.
‘X’ Any operand whatsoever is allowed, even if it does not satisfy general_
operand. This is normally used in the constraint of a match_scratch when
certain alternatives will not actually require a scratch register.
‘0’, ‘1’, ‘2’, . . . ‘9’
An operand that matches the specified operand number is allowed. If a digit
is used together with letters within the same alternative, the digit should come
last.
This number is allowed to be more than a single digit. If multiple digits are en-
countered consecutively, they are interpreted as a single decimal integer. There
is scant chance for ambiguity, since to-date it has never been desirable that
‘10’ be interpreted as matching either operand 1 or operand 0. Should this be
desired, one can use multiple alternatives instead.
This is called a matching constraint and what it really means is that the as-
sembler has only a single operand that fills two roles considered separate in the
Chapter 17: Machine Descriptions 373
RTL insn. For example, an add insn has two input operands and one output
operand in the RTL, but on most CISC machines an add instruction really has
only two operands, one of them an input-output operand:
addl #35,r12
Matching constraints are used in these circumstances. More precisely, the two
operands that match must include one input-only operand and one output-only
operand. Moreover, the digit must be a smaller number than the number of
the operand that uses it in the constraint.
For operands to match in a particular case usually means that they are identical-
looking RTL expressions. But in a few special cases specific kinds of dissimi-
larity are allowed. For example, *x as an input operand will match *x++ as an
output operand. For proper results in such cases, the output template should
always use the output-operand’s number when printing the operand.
‘p’ An operand that is a valid memory address is allowed. This is for “load address”
and “push address” instructions.
‘p’ in the constraint must be accompanied by address_operand as the predicate
in the match_operand. This predicate interprets the mode specified in the
match_operand as the mode of the memory reference for which the address
would be valid.
other-letters
Other letters can be defined in machine-dependent fashion to stand for par-
ticular classes of registers or other arbitrary operand types. ‘d’, ‘a’ and ‘f’
are defined on the 68000/68020 to stand for data, address and floating point
registers.
In order to have valid assembler code, each operand must satisfy its constraint. But a
failure to do so does not prevent the pattern from applying to an insn. Instead, it directs
the compiler to modify the code so that the constraint will be satisfied. Usually this is done
by copying an operand into a register.
Contrast, therefore, the two instruction patterns that follow:
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r")
(plus:SI (match_dup 0)
(match_operand:SI 1 "general_operand" "r")))]
""
"...")
which has two operands, one of which must appear in two places, and
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r")
(plus:SI (match_operand:SI 1 "general_operand" "0")
(match_operand:SI 2 "general_operand" "r")))]
""
"...")
which has three operands, two of which are required by a constraint to be identical. If we
are considering an insn of the form
(insn n prev next
(set (reg:SI 3)
374 GNU Compiler Collection (GCC) Internals
(insn n n2 next
(set (reg:SI 3)
(plus:SI (reg:SI 3) (reg:SI 109)))
...)
It is up to you to make sure that each operand, in each pattern, has constraints that
can handle any RTL expression that could be present for that operand. (When multiple
alternatives are in use, each pattern must, for each possible combination of operand expres-
sions, have at least one alternative which can handle that combination of operands.) The
constraints don’t need to allow any possible operand—when this is the case, they do not
constrain—but they must at least point the way to reloading any possible operand so that
it will fit.
• If the constraint accepts whatever operands the predicate permits, there is no problem:
reloading is never necessary for this operand.
For example, an operand whose constraints permit everything except registers is safe
provided its predicate rejects registers.
An operand whose predicate accepts only constant values is safe provided its constraints
include the letter ‘i’. If any possible constant value is accepted, then nothing less than
‘i’ will do; if the predicate is more selective, then the constraints may also be more
selective.
• Any operand expression can be reloaded by copying it into a register. So if an operand’s
constraints allow some kind of register, it is certain to be safe. It need not permit all
classes of registers; the compiler knows how to copy a register into another register of
the proper class in order to make an instruction valid.
• A nonoffsettable memory reference can be reloaded by copying the address into a
register. So if the constraint uses the letter ‘o’, all memory references are taken care
of.
• A constant operand can be reloaded by allocating space in memory to hold it as preini-
tialized data. Then the memory reference can be used in place of the constant. So if
the constraint uses the letters ‘o’ or ‘m’, constant operands are not a problem.
• If the constraint permits a constant and a pseudo register used in an insn was not
allocated to a hard register and is equivalent to a constant, the register will be replaced
with the constant. If the predicate does not permit a constant and the insn is re-
recognized for some reason, the compiler will crash. Thus the predicate must always
recognize any objects allowed by the constraint.
Chapter 17: Machine Descriptions 375
If the operand’s predicate can recognize registers, but the constraint does not permit
them, it can make the compiler crash. When this operand happens to be a register, the
reload pass will be stymied, because it does not know how to copy a register temporarily
into memory.
If the predicate accepts a unary operator, the constraint applies to the operand. For
example, the MIPS processor at ISA level 3 supports an instruction which adds two registers
in SImode to produce a DImode result, but only if the registers are correctly sign extended.
This predicate for the input operands accepts a sign_extend of an SImode register. Write
the constraint to indicate the type of register that is required for the operand of the sign_
extend.
‘&’ does not obviate the need to write ‘=’ or ‘+’. As earlyclobber operands
are always written, a read-only earlyclobber operand is ill-formed and will be
rejected by the compiler.
‘%’ Declares the instruction to be commutative for this operand and the following
operand. This means that the compiler may interchange the two operands if
that is the cheapest way to make all operands fit the constraints. ‘%’ applies to
all alternatives and must appear as the first character in the constraint. Only
read-only operands can use ‘%’.
This is often used in patterns for addition instructions that really have only
two operands: the result must go in one of the arguments. Here for example,
is how the 68000 halfword-add instruction is defined:
(define_insn "addhi3"
[(set (match_operand:HI 0 "general_operand" "=m,r")
(plus:HI (match_operand:HI 1 "general_operand" "%0,0")
(match_operand:HI 2 "general_operand" "di,g")))]
...)
GCC can only handle one commutative pair in an asm; if you use more, the
compiler may fail. Note that you need not use the modifier if the two alterna-
tives are strictly identical; this would only waste time in the reload pass. The
modifier is not operational after register allocation, so the result of define_
peephole2 and define_splits performed after reload cannot rely on ‘%’ to
make the intended insn match.
‘#’ Says that all following characters, up to the next comma, are to be ignored as
a constraint. They are significant only for choosing register preferences.
‘*’ Says that the following character should be ignored when choosing register
preferences. ‘*’ has no effect on the meaning of the constraint as a constraint,
and no effect on reloading. For LRA ‘*’ additionally disparages slightly the
alternative if the following character matches the operand.
Here is an example: the 68000 has an instruction to sign-extend a halfword
in a data register, and can also sign-extend a value by copying it into an ad-
dress register. While either kind of register is acceptable, the constraints on
an address-register destination are less strict, so it is best if register allocation
makes an address register its goal. Therefore, ‘*’ is used so that the ‘d’ con-
straint letter (for data register) is ignored when computing register preferences.
(define_insn "extendhisi2"
[(set (match_operand:SI 0 "general_operand" "=*d,a")
(sign_extend:SI
(match_operand:HI 1 "general_operand" "0,g")))]
...)
Each architecture defines additional constraints. These constraints are used by the com-
piler itself for instruction generation, as well as for asm statements; therefore, some of the
constraints are not particularly useful for asm. Here is a summary of some of the machine-
dependent constraints available on some particular machines; it includes both constraints
that are useful for asm and constraints that aren’t. The compiler source file mentioned in
the table heading for each architecture is the definitive reference for the meanings of that
architecture’s constraints.
AArch64 family—config/aarch64/constraints.md
k The stack pointer register (SP)
w Floating point register, Advanced SIMD vector register or SVE
vector register
x Like w, but restricted to registers 0 to 15 inclusive.
y Like w, but restricted to registers 0 to 7 inclusive.
Upl One of the low eight SVE predicate registers (P0 to P7)
Upa Any of the SVE predicate registers (P0 to P15)
I Integer constant that is valid as an immediate operand in an ADD
instruction
J Integer constant that is valid as an immediate operand in a SUB
instruction (once negated)
K Integer constant that can be used with a 32-bit logical instruction
L Integer constant that can be used with a 64-bit logical instruction
M Integer constant that is valid as an immediate operand in a 32-
bit MOV pseudo instruction. The MOV may be assembled to one of
several different machine instructions depending on the value
N Integer constant that is valid as an immediate operand in a 64-bit
MOV pseudo instruction
S An absolute symbolic address or a label reference
Y Floating point constant zero
Z Integer constant zero
Ush The high part (bits 12 and upwards) of the pc-relative address of a
symbol within 4GB of the instruction
Q A memory address which uses a single base register with no offset
Ump A memory address suitable for a load/store pair instruction in SI,
DI, SF and DF modes
AMD GCN —config/gcn/constraints.md
I Immediate integer in the range −16 to 64
J Immediate 16-bit signed integer
Chapter 17: Machine Descriptions 379
Kf Immediate constant −1
L Immediate 15-bit unsigned integer
A Immediate constant that can be inlined in an instruction encod-
ing: integer −16..64, or float 0.0, +/−0.5, +/−1.0, +/−2.0, +/−4.0,
1.0/(2.0*PI)
B Immediate 32-bit signed integer that can be attached to an instruc-
tion encoding
C Immediate 32-bit integer in range −16..4294967295 (i.e. 32-bit un-
signed integer or ‘A’ constraint)
DA Immediate 64-bit constant that can be split into two ‘A’ constants
DB Immediate 64-bit constant that can be split into two ‘B’ constants
U Any unspec
Y Any symbol_ref or label_ref
v VGPR register
Sg SGPR register
SD SGPR registers valid for instruction destinations, including VCC,
M0 and EXEC
SS SGPR registers valid for instruction sources, including VCC, M0,
EXEC and SCC
Sm SGPR registers valid as a source for scalar memory instructions
(excludes M0 and EXEC)
Sv SGPR registers valid as a source or destination for vector instruc-
tions (excludes EXEC)
ca All condition registers: SCC, VCCZ, EXECZ
cs Scalar condition register: SCC
cV Vector condition register: VCC, VCC LO, VCC HI
e EXEC register (EXEC LO and EXEC HI)
RB Memory operand with address space suitable for buffer_* instruc-
tions
RF Memory operand with address space suitable for flat_* instruc-
tions
RS Memory operand with address space suitable for s_* instructions
RL Memory operand with address space suitable for ds_* LDS instruc-
tions
RG Memory operand with address space suitable for ds_* GDS instruc-
tions
380 GNU Compiler Collection (GCC) Internals
RD Memory operand with address space suitable for any ds_* instruc-
tions
RM Memory operand with address space suitable for global_* instruc-
tions
ARC —config/arc/constraints.md
q Registers usable in ARCompact 16-bit instructions: r0-r3, r12-
r15. This constraint can only match when the -mq option is in
effect.
e Registers usable as base-regs of memory addresses in ARCompact
16-bit memory instructions: r0-r3, r12-r15, sp. This constraint
can only match when the -mq option is in effect.
D ARC FPX (dpfp) 64-bit registers. D0, D1.
I A signed 12-bit integer constant.
Cal constant for arithmetic/logical operations. This might be any con-
stant that can be put into a long immediate by the assmbler or
linker without involving a PIC relocation.
K A 3-bit unsigned integer constant.
L A 6-bit unsigned integer constant.
CnL One’s complement of a 6-bit unsigned integer constant.
CmL Two’s complement of a 6-bit unsigned integer constant.
M A 5-bit unsigned integer constant.
O A 7-bit unsigned integer constant.
P A 8-bit unsigned integer constant.
H Any const double value.
ARM family—config/arm/constraints.md
h In Thumb state, the core registers r8-r15.
k The stack pointer register.
l In Thumb State the core registers r0-r7. In ARM state this is an
alias for the r constraint.
t VFP floating-point registers s0-s31. Used for 32 bit values.
w VFP floating-point registers d0-d31 and the appropriate subset d0-
d15 based on command line options. Used for 64 bit values only.
Not valid for Thumb1.
y The iWMMX co-processor registers.
z The iWMMX GR registers.
G The floating-point constant 0.0
Chapter 17: Machine Descriptions 381
N Constant integer −1
O Constant integer 8, 16, or 24
P Constant integer 1
G A floating point constant 0.0
Q A memory address based on Y or Z pointer with displacement.
Blackfin family—config/bfin/constraints.md
a P register
d D register
z A call clobbered P register.
qn A single register. If n is in the range 0 to 7, the corresponding D
register. If it is A, then the register P0.
D Even-numbered D register
W Odd-numbered D register
e Accumulator register.
A Even-numbered accumulator register.
B Odd-numbered accumulator register.
b I register
v B register
f M register
c Registers used for circular buffering, i.e. I, B, or L registers.
C The CC register.
t LT0 or LT1.
k LC0 or LC1.
u LB0 or LB1.
x Any D, P, B, M, I or L register.
y Additional registers typically used only in prologues and epilogues:
RETS, RETN, RETI, RETX, RETE, ASTAT, SEQSTAT and USP.
w Any register except accumulators or CC.
Ksh Signed 16 bit integer (in the range −32768 to 32767)
Kuh Unsigned 16 bit integer (in the range 0 to 65535)
Ks7 Signed 7 bit integer (in the range −64 to 63)
Ku7 Unsigned 7 bit integer (in the range 0 to 127)
Ku5 Unsigned 5 bit integer (in the range 0 to 31)
Chapter 17: Machine Descriptions 383
Cm1 A signed 11-bit constant added to −1. Can only match when the
-m1reg-reg option is active.
Cl1 Left-shift of −1, i.e., a bit mask with a block of leading ones, the
rest being a block of trailing zeroes. Can only match when the
-m1reg-reg option is active.
Cr1 Right-shift of −1, i.e., a bit mask with a trailing block of ones, the
rest being zeroes. Or to put it another way, one less than a power
of two. Can only match when the -m1reg-reg option is active.
Cal Constant for arithmetic/logical operations. This is like i, except
that for position independent code, no symbols / expressions need-
ing relocations are allowed.
Csy Symbolic constant for call/jump instruction.
Rcs The register class usable in short insns. This is a register class
constraint, and can thus drive register allocation. This constraint
won’t match unless -mprefer-short-insn-regs is in effect.
Rsc The register class of registers that can be used to hold a sibcall call
address. I.e., a caller-saved register.
Rct Core control register class.
Rgs The register group usable in short insns. This constraint does not
use a register class, so that it only passively matches suitable reg-
isters, and doesn’t drive register allocation.
Car Constant suitable for the addsi3 r pattern. This is a valid offset
For byte, halfword, or word addressing.
Rra Matches the return address if it can be replaced with the link reg-
ister.
Rcc Matches the integer condition code register.
Sra Matches the return address if it is in a stack slot.
Cfm Matches control register values to switch fp mode, which are en-
capsulated in UNSPEC_FP_MODE.
FRV—config/frv/frv.h
a Register in the class ACC_REGS (acc0 to acc7).
b Register in the class EVEN_ACC_REGS (acc0 to acc7).
c Register in the class CC_REGS (fcc0 to fcc3 and icc0 to icc3).
d Register in the class GPR_REGS (gr0 to gr63).
e Register in the class EVEN_REGS (gr0 to gr63). Odd registers are
excluded not in the class but through the use of a machine mode
larger than 4 bytes.
f Register in the class FPR_REGS (fr0 to fr63).
Chapter 17: Machine Descriptions 385
Intel IA-64—config/ia64/ia64.h
a General register r0 to r3 for addl instruction
b Branch register
c Predicate register (‘c’ as in “conditional”)
d Application register residing in M-unit
e Application register residing in I-unit
f Floating-point register
m Memory operand. If used together with ‘<’ or ‘>’, the operand can
have postincrement and postdecrement which require printing with
‘%Pn’ on IA-64.
G Floating-point constant 0.0 or 1.0
I 14-bit signed integer constant
J 22-bit signed integer constant
K 8-bit signed integer constant for logical instructions
L 8-bit adjusted signed integer constant for compare pseudo-ops
M 6-bit unsigned integer constant for shift counts
N 9-bit signed integer constant for load and store postincrements
O The constant zero
P 0 or −1 for dep instruction
Q Non-volatile memory for floating-point loads and stores
R Integer constant in the range 1 to 4 for shladd instruction
S Memory operand except postincrement and postdecrement. This
is now roughly the same as ‘m’ when not used together with ‘<’ or
‘>’.
M32C—config/m32c/m32c.cc
Rsp
Rfb
Rsb ‘$sp’, ‘$fb’, ‘$sb’.
Rcr Any control register, when they’re 16 bits wide (nothing if control
registers are 24 bits wide)
Rcl Any control register, when they’re 24 bits wide.
R0w
R1w
R2w
R3w $r0, $r1, $r2, $r3.
R02 $r0 or $r2, or $r2r0 for 32 bit values.
388 GNU Compiler Collection (GCC) Internals
J Integer zero.
K An unsigned 16-bit constant (for logic instructions).
L A signed 32-bit constant in which the lower 16 bits are zero. Such
constants can be loaded using lui.
M A constant that cannot be loaded using lui, addiu or ori.
N A constant in the range −65535 to −1 (inclusive).
O A signed 15-bit constant.
P A constant in the range 1 to 65535 (inclusive).
G Floating-point zero.
R An address that can be used in a non-macro load or store.
ZC A memory operand whose address is formed by a base register
and offset that is suitable for use in instructions with the same
addressing mode as ll and sc.
ZD An address suitable for a prefetch instruction, or for any other
instruction with the same addressing mode as prefetch.
Motorola 680x0—config/m68k/constraints.md
a Address register
d Data register
f 68881 floating-point register, if available
I Integer in the range 1 to 8
J 16-bit signed number
K Signed number whose magnitude is greater than 0x80
L Integer in the range −8 to −1
M Signed number whose magnitude is greater than 0x100
N Range 24 to 31, rotatert:SI 8 to 1 expressed as rotate
O 16 (for rotate using swap)
P Range 8 to 15, rotatert:HI 8 to 1 expressed as rotate
R Numbers that mov3q can handle
G Floating point constant that is not a 68881 constant
S Operands that satisfy ’m’ when -mpcrel is in effect
T Operands that satisfy ’s’ when -mpcrel is not in effect
Q Address register indirect addressing mode
U Register offset addressing
W const call operand
Chapter 17: Machine Descriptions 391
PDP-11—config/pdp11/constraints.md
a Floating point registers AC0 through AC3. These can be loaded
from/to memory with a single instruction.
d Odd numbered general registers (R1, R3, R5). These are used for
16-bit multiply operations.
D A memory reference that is encoded within the opcode, but not
auto-increment or auto-decrement.
f Any of the floating point registers (AC0 through AC5).
G Floating point constant 0.
h Floating point registers AC4 and AC5. These cannot be loaded
from/to memory with a single instruction.
I An integer constant that fits in 16 bits.
J An integer constant whose low order 16 bits are zero.
K An integer constant that does not meet the constraints for codes
‘I’ or ‘J’.
L The integer constant 1.
M The integer constant −1.
N The integer constant 0.
O Integer constants 0 through 3; shifts by these amounts are han-
dled as multiple single-bit shifts rather than a single variable-length
shift.
Q A memory reference which requires an additional word (address or
offset) after the opcode.
R A memory reference that is encoded within the opcode.
PowerPC and IBM RS6000—config/rs6000/constraints.md
r A general purpose register (GPR), r0. . . r31.
b A base register. Like r, but r0 is not allowed, so r1. . . r31.
f A floating point register (FPR), f0. . . f31.
d A floating point register. This is the same as f nowadays; his-
torically f was for single-precision and d was for double-precision
floating point.
v An Altivec vector register (VR), v0. . . v31.
wa A VSX register (VSR), vs0. . . vs63. This is either an FPR
(vs0. . . vs31 are f0. . . f31) or a VR (vs32. . . vs63 are v0. . . v31).
When using wa, you should use the %x output modifier, so that the
correct register number is printed. For example:
asm ("xvadddp %x0,%x1,%x2"
Chapter 17: Machine Descriptions 395
: "=wa" (v1)
: "wa" (v2), "wa" (v3));
You should not use %x for v operands:
asm ("xsaddqp %0,%1,%2"
: "=v" (v1)
: "v" (v2), "v" (v3));
RX—config/rx/constraints.md
Q An address which does not involve register indirect addressing or
pre/post increment/decrement addressing.
Symbol A symbol reference.
Int08 A constant in the range −256 to 255, inclusive.
Sint08 A constant in the range −128 to 127, inclusive.
Sint16 A constant in the range −32768 to 32767, inclusive.
Sint24 A constant in the range −8388608 to 8388607, inclusive.
Uint04 A constant in the range 0 to 15, inclusive.
S/390 and zSeries—config/s390/s390.h
a Address register (general purpose register except r0)
c Condition code register
d Data register (arbitrary general purpose register)
f Floating-point register
I Unsigned 8-bit constant (0–255)
J Unsigned 12-bit constant (0–4095)
K Signed 16-bit constant (−32768–32767)
L Value appropriate as displacement.
(0..4095)
for short displacement
(−524288..524287)
for long displacement
M Constant integer with a value of 0x7fffffff.
N Multiple letter constraint followed by 4 parameter letters.
0..9: number of the part counting from most to least signif-
icant
H,Q: mode of the part
D,S,H: mode of the containing operand
0,F: value of the other parts (F—all bits set)
The constraint matches if the specified part of a constant has a
value different from its other parts.
Q Memory reference without index register and with short displace-
ment.
R Memory reference with index register and short displacement.
S Memory reference without index register but with long displace-
ment.
400 GNU Compiler Collection (GCC) Internals
SPARC—config/sparc/sparc.h
f Floating-point register on the SPARC-V8 architecture and lower
floating-point register on the SPARC-V9 architecture.
e Floating-point register. It is equivalent to ‘f’ on the SPARC-V8
architecture and contains both lower and upper floating-point reg-
isters on the SPARC-V9 architecture.
c Floating-point condition code register.
d Lower floating-point register. It is only valid on the SPARC-V9
architecture when the Visual Instruction Set is available.
b Floating-point register. It is only valid on the SPARC-V9 architec-
ture when the Visual Instruction Set is available.
h 64-bit global or out register for the SPARC-V8+ architecture.
C The constant all-ones, for floating-point.
A Signed 5-bit constant
D A vector constant
I Signed 13-bit constant
J Zero
K 32-bit constant with the low 12 bits clear (a constant that can be
loaded with the sethi instruction)
L A constant in the range supported by movcc instructions (11-bit
signed immediate)
M A constant in the range supported by movrcc instructions (10-bit
signed immediate)
N Same as ‘K’, except that it verifies that bits that are not in the
lower 32-bit range are all zero. Must be used instead of ‘K’ for
modes wider than SImode
O The constant 4096
G Floating-point zero
H Signed 13-bit constant, sign-extended to 32 or 64 bits
P The constant -1
Q Floating-point constant whose integral representation can be moved
into an integer register using a single sethi instruction
Chapter 17: Machine Descriptions 401
S The si register.
D The di register.
A The a and d registers. This class is used for instructions that re-
turn double word results in the ax:dx register pair. Single word
values will be allocated either in ax or dx. For example on i386 the
following implements rdtsc:
unsigned long long rdtsc (void)
{
unsigned long long tick;
__asm__ __volatile__("rdtsc":"=A"(tick));
return tick;
}
This is not correct on x86-64 as it would allocate tick in either ax
or dx. You have to use the following variant instead:
unsigned long long rdtsc (void)
{
unsigned int tickl, tickh;
__asm__ __volatile__("rdtsc":"=a"(tickl),"=d"(tickh));
return ((unsigned long long)tickh << 32)|tickl;
}
Yb Any register that can be used as the GOT base when calling
___tls_get_addr: that is, any general register except a and sp
registers, for -fno-plt if linker supports it. Otherwise, b register.
Yf Any x87 register when 80387 floating-point arithmetic is enabled.
Yr Lower SSE register when avoiding REX prefix and all SSE registers
otherwise.
Yv For AVX512VL, any EVEX-encodable SSE register (%xmm0-
%xmm31), otherwise any SSE register.
Yh Any EVEX-encodable SSE register, that has number factor of four.
Bf Flags register operand.
Bg GOT memory operand.
Bm Vector memory operand.
Bc Constant memory operand.
Bn Memory operand without REX prefix.
Bs Sibcall memory operand.
Bw Call memory operand.
Bz Constant call address operand.
BC SSE constant -1 operand.
I Integer constant in the range 0 . . . 31, for 32-bit shifts.
J Integer constant in the range 0 . . . 63, for 64-bit shifts.
K Signed 8-bit integer constant.
L 0xFF or 0xFFFF, for andsi as a zero-extending move.
M 0, 1, 2, or 3 (shifts for the lea instruction).
N Unsigned 8-bit integer constant (for in and out instructions).
O Integer constant in the range 0 . . . 127, for 128-bit shifts.
G Standard 80387 floating point constant.
C SSE constant zero operand.
e 32-bit signed integer constant, or a symbolic reference known to
fit that range (for immediate operands in sign-extending x86-64
instructions).
We 32-bit signed integer constant, or a symbolic reference known to fit
that range (for sign-extending conversion operations that require
non-VOIDmode immediate operands).
Wz 32-bit unsigned integer constant, or a symbolic reference known to
fit that range (for zero-extending conversion operations that require
non-VOIDmode immediate operands).
Chapter 17: Machine Descriptions 405
Wd 128-bit integer constant where both the high and low 64-bit word
satisfy the e constraint.
Z 32-bit unsigned integer constant, or a symbolic reference known to
fit that range (for immediate operands in zero-extending x86-64
instructions).
Tv VSIB address operand.
Ts Address operand without segment register.
Xstormy16—config/stormy16/stormy16.h
a Register r0.
b Register r1.
c Register r2.
d Register r8.
e Registers r0 through r7.
t Registers r0 and r1.
y The carry register.
z Registers r8 and r9.
I A constant between 0 and 3 inclusive.
J A constant that has exactly one bit set.
K A constant that has exactly one bit clear.
L A constant between 0 and 255 inclusive.
M A constant between −255 and 0 inclusive.
N A constant between −3 and 0 inclusive.
O A constant between 1 and 4 inclusive.
P A constant between −4 and −1 inclusive.
Q A memory reference that is a stack push.
R A memory reference that is a stack pop.
S A memory reference that refers to a constant address of known
value.
T The register indicated by Rx (not implemented yet).
U A constant that is not between 2 and 15 inclusive.
Z The constant 0.
Xtensa—config/xtensa/constraints.md
a General-purpose 32-bit register
b One-bit boolean register
406 GNU Compiler Collection (GCC) Internals
(define_insn "*movdi_old"
[(set (match_operand:DI 0 "register_operand" "=d")
(match_operand:DI 1 "register_operand" " d"))]
"!TARGET_NEW"
"lgr %0,%1")
(define_insn "*movdi_new"
Chapter 17: Machine Descriptions 407
to:
(define_insn "*movdi_combined"
[(set (match_operand:DI 0 "register_operand" "=d,f,d")
(match_operand:DI 1 "register_operand" " d,d,f"))]
""
"@
lgr %0,%1
ldgr %0,%1
lgdr %0,%1"
[(set_attr "cpu_facility" "*,new,new")])
For historical reasons, names beginning with the letters ‘G H’ are reserved for constraints
that match only const_doubles, and names beginning with the letters ‘I J K L M N O P’ are
reserved for constraints that match only const_ints. This may change in the future. For
the time being, constraints with these names must be written in a stylized form, so that
genpreds can tell you did it correctly:
(define_constraint "[GHIJKLMNOP]..."
"doc..."
(and (match_code "const_int") ; const_double for G/H
condition...)) ; usually a match_test
It is fine to use names beginning with other letters for constraints that match const_
doubles or const_ints.
410 GNU Compiler Collection (GCC) Internals
constraint_num [Enum]
For each constraint except g, there is a corresponding enumeration constant:
‘CONSTRAINT_’ plus the mangled name of the constraint. Functions that take an
enum constraint_num as an argument expect one of these constants.
"!satisfies_constraint_K (operands[2])"
"")
expand, then in such a case the define_expand mustn’t call force_reg or any
other such function which might generate new pseudo registers.
This requirement exists even for subword modes on a RISC machine where
fetching those modes from memory normally requires several insns and some
temporary registers.
During reload a memory reference with an invalid address may be passed as
an operand. Such an address will be replaced with a valid address later in the
reload pass. In this case, nothing may be done with the address except to use
it as it stands. If it is copied, it will not be replaced with a valid address. No
attempt should be made to make such an address into a valid address and no
routine (such as change_address) that will do so may be called. Note that
general_operand will fail when applied to such an address.
The global variable reload_in_progress (which must be explicitly declared if
required) can be used to determine whether such special handling is required.
The variety of operands that have reloads depends on the rest of the machine
description, but typically on a RISC machine these can only be pseudo regis-
ters that did not get hard registers, while on other machines explicit memory
references will get optional reloads.
If a scratch register is required to move an object to or from memory, it can be
allocated using gen_reg_rtx prior to life analysis.
If there are cases which need scratch registers during or after reload, you must
provide an appropriate secondary reload target hook.
The macro can_create_pseudo_p can be used to determine if it is unsafe to
create new pseudo registers. If this variable is nonzero, then it is unsafe to call
gen_reg_rtx to allocate a new pseudo.
The constraints on a ‘movm’ must permit moving any hard register to any other
hard register provided that TARGET_HARD_REGNO_MODE_OK permits mode m in
both registers and TARGET_REGISTER_MOVE_COST applied to their classes returns
a value of 2.
It is obligatory to support floating point ‘movm’ instructions into and out of any
registers that can hold fixed point values, because unions and structures (which
have modes SImode or DImode) can be in those registers and they may have
floating point members.
There may also be a need to support fixed point ‘movm’ instructions in and out
of floating point registers. Unfortunately, I have forgotten why this was so, and
I don’t know whether it is still true. If TARGET_HARD_REGNO_MODE_OK rejects
fixed point values in floating point registers, then the constraints of the fixed
point ‘movm’ instructions must be designed to avoid ever trying to reload into a
floating point register.
‘reload_inm’
‘reload_outm’
These named patterns have been obsoleted by the target hook secondary_
reload.
Like ‘movm’, but used when a scratch register is required to move between
operand 0 and operand 1. Operand 2 describes the scratch register. See the
Chapter 17: Machine Descriptions 413
‘vec_load_lanesmn’
Perform an interleaved load of several vectors from memory operand 1 into
register operand 0. Both operands have mode m. The register operand is
viewed as holding consecutive vectors of mode n, while the memory operand
is a flat array that contains the same number of elements. The operation is
equivalent to:
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n);
for (j = 0; j < GET_MODE_NUNITS (n); j++)
for (i = 0; i < c; i++)
operand0[i][j] = operand1[j * c + i];
For example, ‘vec_load_lanestiv4hi’ loads 8 16-bit values from memory into
a register of mode ‘TI’. The register contains two consecutive vectors of mode
‘V4HI’.
This pattern can only be used if:
TARGET_ARRAY_MODE_SUPPORTED_P (n, c)
is true. GCC assumes that, if a target supports this kind of instruction for
some mode n, it also supports unaligned loads for vectors of mode n.
This pattern is not allowed to FAIL.
‘vec_mask_load_lanesmn’
Like ‘vec_load_lanesmn’, but takes an additional mask operand (operand 2)
that specifies which elements of the destination vectors should be loaded. Other
elements of the destination vectors are set to zero. The operation is equivalent
to:
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n);
for (j = 0; j < GET_MODE_NUNITS (n); j++)
if (operand2[j])
for (i = 0; i < c; i++)
operand0[i][j] = operand1[j * c + i];
else
for (i = 0; i < c; i++)
operand0[i][j] = 0;
This pattern is not allowed to FAIL.
‘vec_store_lanesmn’
Equivalent to ‘vec_load_lanesmn’, with the memory and register operands
reversed. That is, the instruction is equivalent to:
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n);
for (j = 0; j < GET_MODE_NUNITS (n); j++)
for (i = 0; i < c; i++)
operand0[j * c + i] = operand1[i][j];
for a memory operand 0 and register operand 1.
This pattern is not allowed to FAIL.
‘vec_mask_store_lanesmn’
Like ‘vec_store_lanesmn’, but takes an additional mask operand (operand
2) that specifies which elements of the source vectors should be stored. The
operation is equivalent to:
int c = GET_MODE_SIZE (m) / GET_MODE_SIZE (n);
for (j = 0; j < GET_MODE_NUNITS (n); j++)
Chapter 17: Machine Descriptions 415
if (operand2[j])
for (i = 0; i < c; i++)
operand0[j * c + i] = operand1[i][j];
This pattern is not allowed to FAIL.
‘gather_loadmn’
Load several separate memory locations into a vector of mode m. Operand 1
is a scalar base address and operand 2 is a vector of mode n containing offsets
from that base. Operand 0 is a destination vector with the same number of
elements as n. For each element index i:
• extend the offset element i to address width, using zero extension if operand
3 is 1 and sign extension if operand 3 is zero;
• multiply the extended offset by operand 4;
• add the result to the base; and
• load the value at that address into element i of operand 0.
The value of operand 3 does not matter if the offsets are already address width.
‘mask_gather_loadmn’
Like ‘gather_loadmn’, but takes an extra mask operand as operand 5. Bit i of
the mask is set if element i of the result should be loaded from memory and
clear if element i of the result should be set to zero.
‘scatter_storemn’
Store a vector of mode m into several distinct memory locations. Operand 0
is a scalar base address and operand 1 is a vector of mode n containing offsets
from that base. Operand 4 is the vector of values that should be stored, which
has the same number of elements as n. For each element index i:
• extend the offset element i to address width, using zero extension if operand
2 is 1 and sign extension if operand 2 is zero;
• multiply the extended offset by operand 3;
• add the result to the base; and
• store element i of operand 4 to that address.
The value of operand 2 does not matter if the offsets are already address width.
‘mask_scatter_storemn’
Like ‘scatter_storemn’, but takes an extra mask operand as operand 5. Bit i
of the mask is set if element i of the result should be stored to memory.
‘vec_setm’
Set given field in the vector value. Operand 0 is the vector to modify, operand
1 is new value of field and operand 2 specify the field index.
‘vec_extractmn’
Extract given field from the vector value. Operand 1 is the vector, operand
2 specify field index and operand 0 place to store value into. The n mode is
the mode of the field or vector of fields that should be extracted, should be
either element mode of the vector mode m, or a vector mode with the same
element mode and smaller number of elements. If n is a vector mode, the index
is counted in units of that mode.
416 GNU Compiler Collection (GCC) Internals
‘vec_initmn’
Initialize the vector to given values. Operand 0 is the vector to initialize and
operand 1 is parallel containing values for individual fields. The n mode is the
mode of the elements, should be either element mode of the vector mode m, or
a vector mode with the same element mode and smaller number of elements.
‘vec_duplicatem’
Initialize vector output operand 0 so that each element has the value given by
scalar input operand 1. The vector has mode m and the scalar has the mode
appropriate for one element of m.
This pattern only handles duplicates of non-constant inputs. Constant vectors
go through the movm pattern instead.
This pattern is not allowed to FAIL.
‘vec_seriesm’
Initialize vector output operand 0 so that element i is equal to operand 1 plus
i times operand 2. In other words, create a linear series whose base value is
operand 1 and whose step is operand 2.
The vector output has mode m and the scalar inputs have the mode appropriate
for one element of m. This pattern is not used for floating-point vectors, in order
to avoid having to specify the rounding behavior for i > 1.
This pattern is not allowed to FAIL.
while_ultmn
Set operand 0 to a mask that is true while incrementing operand 1 gives a value
that is less than operand 2, for a vector length up to operand 3. Operand 0
has mode n and operands 1 and 2 are scalar integers of mode m. Operand 3
should be omitted when n is a vector mode, and a CONST_INT otherwise. The
operation for vector modes is equivalent to:
operand0[0] = operand1 < operand2;
for (i = 1; i < GET_MODE_NUNITS (n); i++)
operand0[i] = operand0[i - 1] && (operand1 + i < operand2);
And for non-vector modes the operation is equivalent to:
operand0[0] = operand1 < operand2;
for (i = 1; i < operand3; i++)
operand0[i] = operand0[i - 1] && (operand1 + i < operand2);
‘check_raw_ptrsm’
Check whether, given two pointers a and b and a length len, a write of len
bytes at a followed by a read of len bytes at b can be split into interleaved
byte accesses ‘a[0], b[0], a[1], b[1], ...’ without affecting the dependen-
cies between the bytes. Set operand 0 to true if the split is possible and false
otherwise.
Operands 1, 2 and 3 provide the values of a, b and len respectively. Operand
4 is a constant integer that provides the known common alignment of a and b.
All inputs have mode m.
This split is possible if:
a == b || a + len <= b || b + len <= a
Chapter 17: Machine Descriptions 417
You should only define this pattern if the target has a way of accelerating the
test without having to do the individual comparisons.
‘check_war_ptrsm’
Like ‘check_raw_ptrsm’, but with the read and write swapped round. The split
is possible in this case if:
b <= a || a + len <= b
‘vec_cmpmn’
Output a vector comparison. Operand 0 of mode n is the destination for predi-
cate in operand 1 which is a signed vector comparison with operands of mode m
in operands 2 and 3. Predicate is computed by element-wise evaluation of the
vector comparison with a truth value of all-ones and a false value of all-zeros.
‘vec_cmpumn’
Similar to vec_cmpmn but perform unsigned vector comparison.
‘vec_cmpeqmn’
Similar to vec_cmpmn but perform equality or non-equality vector comparison
only. If vec_cmpmn or vec_cmpumn instruction pattern is supported, it will
be preferred over vec_cmpeqmn, so there is no need to define this instruction
pattern if the others are supported.
‘vcondmn’ Output a conditional vector move. Operand 0 is the destination to receive a
combination of operand 1 and operand 2, which are of mode m, dependent on
the outcome of the predicate in operand 3 which is a signed vector comparison
with operands of mode n in operands 4 and 5. The modes m and n should have
the same size. Operand 0 will be set to the value op1 & msk | op2 & ~msk
where msk is computed by element-wise evaluation of the vector comparison
with a truth value of all-ones and a false value of all-zeros.
‘vcondumn’
Similar to vcondmn but performs unsigned vector comparison.
‘vcondeqmn’
Similar to vcondmn but performs equality or non-equality vector comparison
only. If vcondmn or vcondumn instruction pattern is supported, it will be pre-
ferred over vcondeqmn, so there is no need to define this instruction pattern if
the others are supported.
‘vcond_mask_mn’
Similar to vcondmn but operand 3 holds a pre-computed result of vector com-
parison.
‘maskloadmn’
Perform a masked load of vector from memory operand 1 of mode m into register
operand 0. Mask is provided in register operand 2 of mode n.
This pattern is not allowed to FAIL.
‘maskstoremn’
Perform a masked store of vector from register operand 1 of mode m into
memory operand 0. Mask is provided in register operand 2 of mode n.
This pattern is not allowed to FAIL.
418 GNU Compiler Collection (GCC) Internals
‘len_load_m’
Load (operand 2 - operand 3) elements from vector memory operand 1 into
vector register operand 0, setting the other elements of operand 0 to undefined
values. Operands 0 and 1 have mode m, which must be a vector mode. Operand
2 has whichever integer mode the target prefers. Operand 3 conceptually has
mode QI.
Operand 2 can be a variable or a constant amount. Operand 3 specifies a
constant bias: it is either a constant 0 or a constant -1. The predicate on
operand 3 must only accept the bias values that the target actually supports.
GCC handles a bias of 0 more efficiently than a bias of -1.
If (operand 2 - operand 3) exceeds the number of elements in mode m, the
behavior is undefined.
If the target prefers the length to be measured in bytes rather than elements,
it should only implement this pattern for vectors of QI elements.
This pattern is not allowed to FAIL.
‘len_store_m’
Store (operand 2 - operand 3) vector elements from vector register operand 1
into memory operand 0, leaving the other elements of operand 0 unchanged.
Operands 0 and 1 have mode m, which must be a vector mode. Operand 2 has
whichever integer mode the target prefers. Operand 3 conceptually has mode
QI.
Operand 2 can be a variable or a constant amount. Operand 3 specifies a
constant bias: it is either a constant 0 or a constant -1. The predicate on
operand 3 must only accept the bias values that the target actually supports.
GCC handles a bias of 0 more efficiently than a bias of -1.
If (operand 2 - operand 3) exceeds the number of elements in mode m, the
behavior is undefined.
If the target prefers the length to be measured in bytes rather than elements,
it should only implement this pattern for vectors of QI elements.
This pattern is not allowed to FAIL.
‘vec_permm’
Output a (variable) vector permutation. Operand 0 is the destination to receive
elements from operand 1 and operand 2, which are of mode m. Operand 3 is
the selector. It is an integral mode vector of the same width and number of
elements as mode m.
The input elements are numbered from 0 in operand 1 through 2 ∗ N − 1 in
operand 2. The elements of the selector must be computed modulo 2 ∗ N . Note
that if rtx_equal_p(operand1, operand2), this can be implemented with just
operand 1 and selector elements modulo N.
In order to make things easy for a number of targets, if there is no ‘vec_perm’
pattern for mode m, but there is for mode q where q is a vector of QImode of
the same width as m, the middle-end will lower the mode m VEC_PERM_EXPR to
mode q.
Chapter 17: Machine Descriptions 419
‘fnmam4’ Like fmam4 except that the intermediate product is negated before being added
to operand 3. This is represented in the rtl as
(fma:m (neg:m op1) op2 op3)
‘fnmsm4’ Like fmsm4 except that the intermediate product is negated before subtracting
operand 3. This is represented in the rtl as
(fma:m (neg:m op1) op2 (neg:m op3))
‘sminm3’, ‘smaxm3’
Signed minimum and maximum operations. When used with floating point, if
both operands are zeros, or if either operand is NaN, then it is unspecified which
of the two operands is returned as the result.
‘fminm3’, ‘fmaxm3’
IEEE-conformant minimum and maximum operations. If one operand is a quiet
NaN, then the other operand is returned. If both operands are quiet NaN, then a
quiet NaN is returned. In the case when gcc supports signaling NaN (-fsignaling-
nans) an invalid floating point exception is raised and a quiet NaN is returned.
All operands have mode m, which is a scalar or vector floating-point mode.
These patterns are not allowed to FAIL.
‘reduc_smin_scal_m’, ‘reduc_smax_scal_m’
Find the signed minimum/maximum of the elements of a vector. The vector is
operand 1, and operand 0 is the scalar result, with mode equal to the mode of
the elements of the input vector.
‘reduc_umin_scal_m’, ‘reduc_umax_scal_m’
Find the unsigned minimum/maximum of the elements of a vector. The vector
is operand 1, and operand 0 is the scalar result, with mode equal to the mode
of the elements of the input vector.
‘reduc_fmin_scal_m’, ‘reduc_fmax_scal_m’
Find the floating-point minimum/maximum of the elements of a vector, using
the same rules as fminm3 and fmaxm3. Operand 1 is a vector of mode m and
operand 0 is the scalar result, which has mode GET_MODE_INNER (m).
‘reduc_plus_scal_m’
Compute the sum of the elements of a vector. The vector is operand 1, and
operand 0 is the scalar result, with mode equal to the mode of the elements of
the input vector.
‘reduc_and_scal_m’
‘reduc_ior_scal_m’
‘reduc_xor_scal_m’
Compute the bitwise AND/IOR/XOR reduction of the elements of a vector of mode
m. Operand 1 is the vector input and operand 0 is the scalar result. The mode
of the scalar result is the same as one element of m.
extract_last_m
Find the last set bit in mask operand 1 and extract the associated element
of vector operand 2. Store the result in scalar operand 0. Operand 2 has
vector mode m while operand 0 has the mode appropriate for one element of
Chapter 17: Machine Descriptions 421
m. Operand 1 has the usual mask mode for vectors of mode m; see TARGET_
VECTORIZE_GET_MASK_MODE.
fold_extract_last_m
If any bits of mask operand 2 are set, find the last set bit, extract the associated
element from vector operand 3, and store the result in operand 0. Store operand
1 in operand 0 otherwise. Operand 3 has mode m and operands 0 and 1 have
the mode appropriate for one element of m. Operand 2 has the usual mask
mode for vectors of mode m; see TARGET_VECTORIZE_GET_MASK_MODE.
fold_left_plus_m
Take scalar operand 1 and successively add each element from vector operand
2. Store the result in scalar operand 0. The vector has mode m and the scalars
have the mode appropriate for one element of m. The operation is strictly
in-order: there is no reassociation.
mask_fold_left_plus_m
Like ‘fold_left_plus_m’, but takes an additional mask operand (operand 3)
that specifies which elements of the source vector should be added.
‘sdot_prodm’
Compute the sum of the products of two signed elements. Operand 1 and
operand 2 are of the same mode. Their product, which is of a wider mode, is
computed and added to operand 3. Operand 3 is of a mode equal or wider than
the mode of the product. The result is placed in operand 0, which is of the
same mode as operand 3.
Semantically the expressions perform the multiplication in the following signs
sdot<signed op0, signed op1, signed op2, signed op3> ==
op0 = sign-ext (op1) * sign-ext (op2) + op3
...
‘udot_prodm’
Compute the sum of the products of two unsigned elements. Operand 1 and
operand 2 are of the same mode. Their product, which is of a wider mode, is
computed and added to operand 3. Operand 3 is of a mode equal or wider than
the mode of the product. The result is placed in operand 0, which is of the
same mode as operand 3.
Semantically the expressions perform the multiplication in the following signs
udot<unsigned op0, unsigned op1, unsigned op2, unsigned op3> ==
op0 = zero-ext (op1) * zero-ext (op2) + op3
...
‘usdot_prodm’
Compute the sum of the products of elements of different signs. Operand 1
must be unsigned and operand 2 signed. Their product, which is of a wider
mode, is computed and added to operand 3. Operand 3 is of a mode equal or
wider than the mode of the product. The result is placed in operand 0, which
is of the same mode as operand 3.
Semantically the expressions perform the multiplication in the following signs
usdot<signed op0, unsigned op1, signed op2, signed op3> ==
422 GNU Compiler Collection (GCC) Internals
‘ssadm’
‘usadm’ Compute the sum of absolute differences of two signed/unsigned elements.
Operand 1 and operand 2 are of the same mode. Their absolute difference,
which is of a wider mode, is computed and added to operand 3. Operand 3 is
of a mode equal or wider than the mode of the absolute difference. The result
is placed in operand 0, which is of the same mode as operand 3.
‘widen_ssumm3’
‘widen_usumm3’
Operands 0 and 2 are of the same mode, which is wider than the mode of
operand 1. Add operand 1 to operand 2 and place the widened result in operand
0. (This is used express accumulation of elements into an accumulator of a wider
mode.)
‘smulhsm3’
‘umulhsm3’
Signed/unsigned multiply high with scale. This is equivalent to the C code:
narrow op0, op1, op2;
...
op0 = (narrow) (((wide) op1 * (wide) op2) >> (N / 2 - 1));
where the sign of ‘narrow’ determines whether this is a signed or unsigned
operation, and N is the size of ‘wide’ in bits.
‘smulhrsm3’
‘umulhrsm3’
Signed/unsigned multiply high with round and scale. This is equivalent to the
C code:
narrow op0, op1, op2;
...
op0 = (narrow) (((((wide) op1 * (wide) op2) >> (N / 2 - 2)) + 1) >> 1);
where the sign of ‘narrow’ determines whether this is a signed or unsigned
operation, and N is the size of ‘wide’ in bits.
‘sdiv_pow2m3’
‘sdiv_pow2m3’
Signed division by power-of-2 immediate. Equivalent to:
signed op0, op1;
...
op0 = op1 / (1 << imm);
‘vec_shl_insert_m’
Shift the elements in vector input operand 1 left one element (i.e. away from
element 0) and fill the vacated element 0 with the scalar in operand 2. Store
the result in vector output operand 0. Operands 0 and 1 have mode m and
operand 2 has the mode appropriate for one element of m.
‘vec_shl_m’
Whole vector left shift in bits, i.e. away from element 0. Operand 1 is a vector
to be shifted. Operand 2 is an integer shift amount in bits. Operand 0 is where
Chapter 17: Machine Descriptions 423
the resulting shifted vector is stored. The output and input vectors should have
the same modes.
‘vec_shr_m’
Whole vector right shift in bits, i.e. towards element 0. Operand 1 is a vector
to be shifted. Operand 2 is an integer shift amount in bits. Operand 0 is where
the resulting shifted vector is stored. The output and input vectors should have
the same modes.
‘vec_pack_trunc_m’
Narrow (demote) and merge the elements of two vectors. Operands 1 and 2
are vectors of the same mode having N integral or floating point elements of
size S. Operand 0 is the resulting vector in which 2*N elements of size S/2 are
concatenated after narrowing them down using truncation.
‘vec_pack_sbool_trunc_m’
Narrow and merge the elements of two vectors. Operands 1 and 2 are vectors
of the same type having N boolean elements. Operand 0 is the resulting vector
in which 2*N elements are concatenated. The last operand (operand 3) is the
number of elements in the output vector 2*N as a CONST_INT. This instruction
pattern is used when all the vector input and output operands have the same
scalar mode m and thus using vec_pack_trunc_m would be ambiguous.
‘vec_pack_ssat_m’, ‘vec_pack_usat_m’
Narrow (demote) and merge the elements of two vectors. Operands 1 and 2 are
vectors of the same mode having N integral elements of size S. Operand 0 is the
resulting vector in which the elements of the two input vectors are concatenated
after narrowing them down using signed/unsigned saturating arithmetic.
‘vec_pack_sfix_trunc_m’, ‘vec_pack_ufix_trunc_m’
Narrow, convert to signed/unsigned integral type and merge the elements of two
vectors. Operands 1 and 2 are vectors of the same mode having N floating point
elements of size S. Operand 0 is the resulting vector in which 2*N elements of
size S/2 are concatenated.
‘vec_packs_float_m’, ‘vec_packu_float_m’
Narrow, convert to floating point type and merge the elements of two vectors.
Operands 1 and 2 are vectors of the same mode having N signed/unsigned
integral elements of size S. Operand 0 is the resulting vector in which 2*N
elements of size S/2 are concatenated.
‘vec_unpacks_hi_m’, ‘vec_unpacks_lo_m’
Extract and widen (promote) the high/low part of a vector of signed integral or
floating point elements. The input vector (operand 1) has N elements of size S.
Widen (promote) the high/low elements of the vector using signed or floating
point extension and place the resulting N/2 values of size 2*S in the output
vector (operand 0).
‘vec_unpacku_hi_m’, ‘vec_unpacku_lo_m’
Extract and widen (promote) the high/low part of a vector of unsigned inte-
gral elements. The input vector (operand 1) has N elements of size S. Widen
424 GNU Compiler Collection (GCC) Internals
(promote) the high/low elements of the vector using zero extension and place
the resulting N/2 values of size 2*S in the output vector (operand 0).
‘vec_unpacks_sbool_hi_m’, ‘vec_unpacks_sbool_lo_m’
Extract the high/low part of a vector of boolean elements that have scalar
mode m. The input vector (operand 1) has N elements, the output vector
(operand 0) has N/2 elements. The last operand (operand 2) is the number
of elements of the input vector N as a CONST_INT. These patterns are used if
both the input and output vectors have the same scalar mode m and thus using
vec_unpacks_hi_m or vec_unpacks_lo_m would be ambiguous.
‘vec_unpacks_float_hi_m’, ‘vec_unpacks_float_lo_m’
‘vec_unpacku_float_hi_m’, ‘vec_unpacku_float_lo_m’
Extract, convert to floating point type and widen the high/low part of a vector
of signed/unsigned integral elements. The input vector (operand 1) has N
elements of size S. Convert the high/low elements of the vector using floating
point conversion and place the resulting N/2 values of size 2*S in the output
vector (operand 0).
‘vec_unpack_sfix_trunc_hi_m’,
‘vec_unpack_sfix_trunc_lo_m’
‘vec_unpack_ufix_trunc_hi_m’
‘vec_unpack_ufix_trunc_lo_m’
Extract, convert to signed/unsigned integer type and widen the high/low part
of a vector of floating point elements. The input vector (operand 1) has N
elements of size S. Convert the high/low elements of the vector to integers and
place the resulting N/2 values of size 2*S in the output vector (operand 0).
‘vec_widen_umult_hi_m’, ‘vec_widen_umult_lo_m’
‘vec_widen_smult_hi_m’, ‘vec_widen_smult_lo_m’
‘vec_widen_umult_even_m’, ‘vec_widen_umult_odd_m’
‘vec_widen_smult_even_m’, ‘vec_widen_smult_odd_m’
Signed/Unsigned widening multiplication. The two inputs (operands 1 and 2)
are vectors with N signed/unsigned elements of size S. Multiply the high/low or
even/odd elements of the two vectors, and put the N/2 products of size 2*S in
the output vector (operand 0). A target shouldn’t implement even/odd pattern
pair if it is less efficient than lo/hi one.
‘vec_widen_ushiftl_hi_m’, ‘vec_widen_ushiftl_lo_m’
‘vec_widen_sshiftl_hi_m’, ‘vec_widen_sshiftl_lo_m’
Signed/Unsigned widening shift left. The first input (operand 1) is a vector
with N signed/unsigned elements of size S. Operand 2 is a constant. Shift
the high/low elements of operand 1, and put the N/2 results of size 2*S in the
output vector (operand 0).
‘vec_widen_uaddl_hi_m’, ‘vec_widen_uaddl_lo_m’
‘vec_widen_saddl_hi_m’, ‘vec_widen_saddl_lo_m’
Signed/Unsigned widening add long. Operands 1 and 2 are vectors with N
signed/unsigned elements of size S. Add the high/low elements of 1 and 2
together, widen the resulting elements and put the N/2 results of size 2*S in
the output vector (operand 0).
Chapter 17: Machine Descriptions 425
‘vec_widen_usubl_hi_m’, ‘vec_widen_usubl_lo_m’
‘vec_widen_ssubl_hi_m’, ‘vec_widen_ssubl_lo_m’
Signed/Unsigned widening subtract long. Operands 1 and 2 are vectors with N
signed/unsigned elements of size S. Subtract the high/low elements of 2 from 1
and widen the resulting elements. Put the N/2 results of size 2*S in the output
vector (operand 0).
‘vec_addsubm3’
Alternating subtract, add with even lanes doing subtract and odd lanes doing
addition. Operands 1 and 2 and the outout operand are vectors with mode m.
‘vec_fmaddsubm4’
Alternating multiply subtract, add with even lanes doing subtract and odd lanes
doing addition of the third operand to the multiplication result of the first two
operands. Operands 1, 2 and 3 and the outout operand are vectors with mode
m.
‘vec_fmsubaddm4’
Alternating multiply add, subtract with even lanes doing addition and odd
lanes doing subtraction of the third operand to the multiplication result of the
first two operands. Operands 1, 2 and 3 and the outout operand are vectors
with mode m.
These instructions are not allowed to FAIL.
‘mulhisi3’
Multiply operands 1 and 2, which have mode HImode, and store a SImode
product in operand 0.
‘mulqihi3’, ‘mulsidi3’
Similar widening-multiplication instructions of other widths.
‘umulqihi3’, ‘umulhisi3’, ‘umulsidi3’
Similar widening-multiplication instructions that do unsigned multiplication.
‘usmulqihi3’, ‘usmulhisi3’, ‘usmulsidi3’
Similar widening-multiplication instructions that interpret the first operand as
unsigned and the second operand as signed, then do a signed multiplication.
‘smulm3_highpart’
Perform a signed multiplication of operands 1 and 2, which have mode m, and
store the most significant half of the product in operand 0. The least significant
half of the product is discarded. This may be represented in RTL using a smul_
highpart RTX expression.
‘umulm3_highpart’
Similar, but the multiplication is unsigned. This may be represented in RTL
using an umul_highpart RTX expression.
‘maddmn4’ Multiply operands 1 and 2, sign-extend them to mode n, add operand 3, and
store the result in operand 0. Operands 1 and 2 have mode m and operands 0
and 3 have mode n. Both modes must be integer or fixed-point modes and n
must be twice the size of m.
426 GNU Compiler Collection (GCC) Internals
In other words, maddmn4 is like mulmn3 except that it also adds operand 3.
These instructions are not allowed to FAIL.
‘umaddmn4’
Like maddmn4, but zero-extend the multiplication operands instead of sign-
extending them.
‘ssmaddmn4’
Like maddmn4, but all involved operations must be signed-saturating.
‘usmaddmn4’
Like umaddmn4, but all involved operations must be unsigned-saturating.
‘msubmn4’ Multiply operands 1 and 2, sign-extend them to mode n, subtract the result
from operand 3, and store the result in operand 0. Operands 1 and 2 have
mode m and operands 0 and 3 have mode n. Both modes must be integer or
fixed-point modes and n must be twice the size of m.
In other words, msubmn4 is like mulmn3 except that it also subtracts the result
from operand 3.
These instructions are not allowed to FAIL.
‘umsubmn4’
Like msubmn4, but zero-extend the multiplication operands instead of sign-
extending them.
‘ssmsubmn4’
Like msubmn4, but all involved operations must be signed-saturating.
‘usmsubmn4’
Like umsubmn4, but all involved operations must be unsigned-saturating.
‘divmodm4’
Signed division that produces both a quotient and a remainder. Operand 1 is
divided by operand 2 to produce a quotient stored in operand 0 and a remainder
stored in operand 3.
For machines with an instruction that produces both a quotient and a remain-
der, provide a pattern for ‘divmodm4’ but do not provide patterns for ‘divm3’
and ‘modm3’. This allows optimization in the relatively common case when both
the quotient and remainder are computed.
If an instruction that just produces a quotient or just a remainder exists and is
more efficient than the instruction that produces both, write the output routine
of ‘divmodm4’ to call find_reg_note and look for a REG_UNUSED note on the
quotient or remainder and generate the appropriate instruction.
‘udivmodm4’
Similar, but does unsigned division.
‘ashlm3’, ‘ssashlm3’, ‘usashlm3’
Arithmetic-shift operand 1 left by a number of bits specified by operand 2, and
store the result in operand 0. Here m is the mode of operand 0 and operand 1;
operand 2’s mode is specified by the instruction pattern, and the compiler will
Chapter 17: Machine Descriptions 427
convert the operand to that mode before generating the instruction. The shift
or rotate expander or instruction pattern should explicitly specify the mode of
the operand 2, it should never be VOIDmode. The meaning of out-of-range shift
counts can optionally be specified by TARGET_SHIFT_TRUNCATION_MASK. See
[TARGET SHIFT TRUNCATION MASK], page 670. Operand 2 is always a
scalar type.
‘ashrm3’, ‘lshrm3’, ‘rotlm3’, ‘rotrm3’
Other shift and rotate instructions, analogous to the ashlm3 instructions.
Operand 2 is always a scalar type.
‘vashlm3’, ‘vashrm3’, ‘vlshrm3’, ‘vrotlm3’, ‘vrotrm3’
Vector shift and rotate instructions that take vectors as operand 2 instead of a
scalar type.
‘avgm3_floor’
‘uavgm3_floor’
Signed and unsigned average instructions. These instructions add operands 1
and 2 without truncation, divide the result by 2, round towards -Inf, and store
the result in operand 0. This is equivalent to the C code:
narrow op0, op1, op2;
...
op0 = (narrow) (((wide) op1 + (wide) op2) >> 1);
where the sign of ‘narrow’ determines whether this is a signed or unsigned
operation.
‘avgm3_ceil’
‘uavgm3_ceil’
Like ‘avgm3_floor’ and ‘uavgm3_floor’, but round towards +Inf. This is equiv-
alent to the C code:
narrow op0, op1, op2;
...
op0 = (narrow) (((wide) op1 + (wide) op2 + 1) >> 1);
‘bswapm2’ Reverse the order of bytes of operand 1 and store the result in operand 0.
‘negm2’, ‘ssnegm2’, ‘usnegm2’
Negate operand 1 and store the result in operand 0.
‘negvm3’ Like negm2 but takes a code_label as operand 2 and emits code to jump to it
if signed overflow occurs during the negation.
‘absm2’ Store the absolute value of operand 1 into operand 0.
‘sqrtm2’ Store the square root of operand 1 into operand 0. Both operands have mode
m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘rsqrtm2’ Store the reciprocal of the square root of operand 1 into operand 0. Both
operands have mode m, which is a scalar or vector floating-point mode.
On most architectures this pattern is only approximate, so either its C condi-
tion or the TARGET_OPTAB_SUPPORTED_P hook should check for the appropriate
428 GNU Compiler Collection (GCC) Internals
math flags. (Using the C condition is more direct, but using TARGET_OPTAB_
SUPPORTED_P can be useful if a target-specific built-in also uses the ‘rsqrtm2’
pattern.)
This pattern is not allowed to FAIL.
‘fmodm3’ Store the remainder of dividing operand 1 by operand 2 into operand 0, rounded
towards zero to an integer. All operands have mode m, which is a scalar or
vector floating-point mode.
This pattern is not allowed to FAIL.
‘remainderm3’
Store the remainder of dividing operand 1 by operand 2 into operand 0, rounded
to the nearest integer. All operands have mode m, which is a scalar or vector
floating-point mode.
This pattern is not allowed to FAIL.
‘scalbm3’ Raise FLT_RADIX to the power of operand 2, multiply it by operand 1, and store
the result in operand 0. All operands have mode m, which is a scalar or vector
floating-point mode.
This pattern is not allowed to FAIL.
‘ldexpm3’ Raise 2 to the power of operand 2, multiply it by operand 1, and store the
result in operand 0. Operands 0 and 1 have mode m, which is a scalar or vector
floating-point mode. Operand 2’s mode has the same number of elements as m
and each element is wide enough to store an int. The integers are signed.
This pattern is not allowed to FAIL.
‘cosm2’ Store the cosine of operand 1 into operand 0. Both operands have mode m,
which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘sinm2’ Store the sine of operand 1 into operand 0. Both operands have mode m, which
is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘sincosm3’
Store the cosine of operand 2 into operand 0 and the sine of operand 2 into
operand 1. All operands have mode m, which is a scalar or vector floating-
point mode.
Targets that can calculate the sine and cosine simultaneously can implement
this pattern as opposed to implementing individual sinm2 and cosm2 patterns.
The sin and cos built-in functions will then be expanded to the sincosm3
pattern, with one of the output values left unused.
‘tanm2’ Store the tangent of operand 1 into operand 0. Both operands have mode m,
which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘asinm2’ Store the arc sine of operand 1 into operand 0. Both operands have mode m,
which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
Chapter 17: Machine Descriptions 429
‘acosm2’ Store the arc cosine of operand 1 into operand 0. Both operands have mode m,
which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘atanm2’ Store the arc tangent of operand 1 into operand 0. Both operands have mode
m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘fegetroundm’
Store the current machine floating-point rounding mode into operand 0.
Operand 0 has mode m, which is scalar. This pattern is used to implement
the fegetround function from the ISO C99 standard.
‘feclearexceptm’
‘feraiseexceptm’
Clears or raises the supported machine floating-point exceptions represented
by the bits in operand 1. Error status is stored as nonzero value in operand
0. Both operands have mode m, which is a scalar. These patterns are used
to implement the feclearexcept and feraiseexcept functions from the ISO
C99 standard.
‘expm2’ Raise e (the base of natural logarithms) to the power of operand 1 and store the
result in operand 0. Both operands have mode m, which is a scalar or vector
floating-point mode.
This pattern is not allowed to FAIL.
‘expm1m2’ Raise e (the base of natural logarithms) to the power of operand 1, subtract
1, and store the result in operand 0. Both operands have mode m, which is a
scalar or vector floating-point mode.
For inputs close to zero, the pattern is expected to be more accurate than a
separate expm2 and subm3 would be.
This pattern is not allowed to FAIL.
‘exp10m2’ Raise 10 to the power of operand 1 and store the result in operand 0. Both
operands have mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘exp2m2’ Raise 2 to the power of operand 1 and store the result in operand 0. Both
operands have mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘logm2’ Store the natural logarithm of operand 1 into operand 0. Both operands have
mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘log1pm2’ Add 1 to operand 1, compute the natural logarithm, and store the result in
operand 0. Both operands have mode m, which is a scalar or vector floating-
point mode.
For inputs close to zero, the pattern is expected to be more accurate than a
separate addm3 and logm2 would be.
This pattern is not allowed to FAIL.
430 GNU Compiler Collection (GCC) Internals
‘log10m2’ Store the base-10 logarithm of operand 1 into operand 0. Both operands have
mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘log2m2’ Store the base-2 logarithm of operand 1 into operand 0. Both operands have
mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘logbm2’ Store the base-FLT_RADIX logarithm of operand 1 into operand 0. Both
operands have mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘signbitm2’
Store the sign bit of floating-point operand 1 in operand 0. m is either a scalar
or vector mode. When it is a scalar, operand 1 has mode m but operand 0 must
have mode SImode. When m is a vector, operand 1 has the mode m. operand 0’s
mode should be an vector integer mode which has the same number of elements
and the same size as mode m.
This pattern is not allowed to FAIL.
‘significandm2’
Store the significand of floating-point operand 1 in operand 0. Both operands
have mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘powm3’ Store the value of operand 1 raised to the exponent operand 2 into operand 0.
All operands have mode m, which is a scalar or vector floating-point mode.
This pattern is not allowed to FAIL.
‘atan2m3’ Store the arc tangent (inverse tangent) of operand 1 divided by operand 2 into
operand 0, using the signs of both arguments to determine the quadrant of the
result. All operands have mode m, which is a scalar or vector floating-point
mode.
This pattern is not allowed to FAIL.
‘floorm2’ Store the largest integral value not greater than operand 1 in operand 0. Both
operands have mode m, which is a scalar or vector floating-point mode. If
-ffp-int-builtin-inexact is in effect, the “inexact” exception may be raised
for noninteger operands; otherwise, it may not.
This pattern is not allowed to FAIL.
‘btruncm2’
Round operand 1 to an integer, towards zero, and store the result in operand 0.
Both operands have mode m, which is a scalar or vector floating-point mode. If
-ffp-int-builtin-inexact is in effect, the “inexact” exception may be raised
for noninteger operands; otherwise, it may not.
This pattern is not allowed to FAIL.
‘roundm2’ Round operand 1 to the nearest integer, rounding away from zero in the event of
a tie, and store the result in operand 0. Both operands have mode m, which is a
Chapter 17: Machine Descriptions 431
‘cmla_conjm4’
Perform a vector multiply by conjugate and accumulate that is semantically
the same as a multiply and accumulate of complex numbers where the second
multiply arguments is conjugated.
complex TYPE op0[N];
complex TYPE op1[N];
complex TYPE op2[N];
complex TYPE op3[N];
for (int i = 0; i < N; i += 1)
{
op0[i] = op1[i] * conj (op2[i]) + op3[i];
}
In GCC lane ordering the real part of the number must be in the even lanes
with the imaginary part in the odd lanes.
The operation is only supported for vector modes m.
This pattern is not allowed to FAIL.
‘cmlsm4’ Perform a vector multiply and subtract that is semantically the same as a
multiply and subtract of complex numbers.
complex TYPE op0[N];
complex TYPE op1[N];
complex TYPE op2[N];
complex TYPE op3[N];
for (int i = 0; i < N; i += 1)
{
op0[i] = op1[i] * op2[i] - op3[i];
}
In GCC lane ordering the real part of the number must be in the even lanes
with the imaginary part in the odd lanes.
The operation is only supported for vector modes m.
This pattern is not allowed to FAIL.
‘cmls_conjm4’
Perform a vector multiply by conjugate and subtract that is semantically the
same as a multiply and subtract of complex numbers where the second multiply
arguments is conjugated.
complex TYPE op0[N];
complex TYPE op1[N];
complex TYPE op2[N];
complex TYPE op3[N];
for (int i = 0; i < N; i += 1)
{
op0[i] = op1[i] * conj (op2[i]) - op3[i];
}
In GCC lane ordering the real part of the number must be in the even lanes
with the imaginary part in the odd lanes.
The operation is only supported for vector modes m.
This pattern is not allowed to FAIL.
‘cmulm4’ Perform a vector multiply that is semantically the same as multiply of complex
numbers.
complex TYPE op0[N];
434 GNU Compiler Collection (GCC) Internals
The fourth operand is the known shared alignment of the source and destination,
in the form of a const_int rtx. Thus, if the compiler knows that both source
and destination are word-aligned, it may provide the value 4 for this operand.
Optional operands 5 and 6 specify expected alignment and size of block respec-
tively. The expected alignment differs from alignment in operand 4 in a way
that the blocks are not required to be aligned according to it in all cases. This
expected alignment is also in bytes, just like operand 4. Expected size, when
unknown, is set to (const_int -1).
Descriptions of multiple cpymemm patterns can only be beneficial if the pat-
terns for smaller modes have fewer restrictions on their first, second and fourth
operands. Note that the mode m in cpymemm does not impose any restriction
on the mode of individually copied data units in the block.
The cpymemm patterns need not give special consideration to the possibility that
the source and destination strings might overlap. These patterns are used to
do inline expansion of __builtin_memcpy.
‘movmemm’ Block move instruction. The destination and source blocks of memory are the
first two operands, and both are mem:BLKs with an address in mode Pmode.
The number of bytes to copy is the third operand, in mode m. Usually, you
specify Pmode for m. However, if you can generate better code knowing the range
of valid lengths is smaller than those representable in a full Pmode pointer, you
should provide a pattern with a mode corresponding to the range of values you
can handle efficiently (e.g., QImode for values in the range 0–127; note we avoid
numbers that appear negative) and also a pattern with Pmode.
The fourth operand is the known shared alignment of the source and destination,
in the form of a const_int rtx. Thus, if the compiler knows that both source
and destination are word-aligned, it may provide the value 4 for this operand.
Optional operands 5 and 6 specify expected alignment and size of block respec-
tively. The expected alignment differs from alignment in operand 4 in a way
that the blocks are not required to be aligned according to it in all cases. This
expected alignment is also in bytes, just like operand 4. Expected size, when
unknown, is set to (const_int -1).
Descriptions of multiple movmemm patterns can only be beneficial if the pat-
terns for smaller modes have fewer restrictions on their first, second and fourth
operands. Note that the mode m in movmemm does not impose any restriction
on the mode of individually copied data units in the block.
The movmemm patterns must correctly handle the case where the source and
destination strings overlap. These patterns are used to do inline expansion of
__builtin_memmove.
‘movstr’ String copy instruction, with stpcpy semantics. Operand 0 is an output
operand in mode Pmode. The addresses of the destination and source strings
are operands 1 and 2, and both are mem:BLKs with addresses in mode Pmode.
The execution of the expansion of this pattern should store in operand 0 the
address in which the NUL terminator was stored in the destination string.
This pattern has also several optional operands that are same as in setmem.
Chapter 17: Machine Descriptions 437
‘setmemm’ Block set instruction. The destination string is the first operand, given as a
mem:BLK whose address is in mode Pmode. The number of bytes to set is the
second operand, in mode m. The value to initialize the memory with is the
third operand. Targets that only support the clearing of memory should reject
any value that is not the constant 0. See ‘cpymemm’ for a discussion of the choice
of mode.
The fourth operand is the known alignment of the destination, in the form of
a const_int rtx. Thus, if the compiler knows that the destination is word-
aligned, it may provide the value 4 for this operand.
Optional operands 5 and 6 specify expected alignment and size of block re-
spectively. The expected alignment differs from alignment in operand 4 in a
way that the blocks are not required to be aligned according to it in all cases.
This expected alignment is also in bytes, just like operand 4. Expected size,
when unknown, is set to (const_int -1). Operand 7 is the minimal size of the
block and operand 8 is the maximal size of the block (NULL if it cannot be
represented as CONST INT). Operand 9 is the probable maximal size (i.e. we
cannot rely on it for correctness, but it can be used for choosing proper code
sequence for a given size).
The use for multiple setmemm is as for cpymemm.
‘cmpstrnm’
String compare instruction, with five operands. Operand 0 is the output; it
has mode m. The remaining four operands are like the operands of ‘cpymemm’.
The two memory blocks specified are compared byte by byte in lexicographic
order starting at the beginning of each string. The instruction is not allowed to
prefetch more than one byte at a time since either string may end in the first
byte and reading past that may access an invalid page or segment and cause
a fault. The comparison terminates early if the fetched bytes are different or
if they are equal to zero. The effect of the instruction is to store a value in
operand 0 whose sign indicates the result of the comparison.
‘cmpstrm’ String compare instruction, without known maximum length. Operand 0 is the
output; it has mode m. The second and third operand are the blocks of memory
to be compared; both are mem:BLK with an address in mode Pmode.
The fourth operand is the known shared alignment of the source and destination,
in the form of a const_int rtx. Thus, if the compiler knows that both source
and destination are word-aligned, it may provide the value 4 for this operand.
The two memory blocks specified are compared byte by byte in lexicographic
order starting at the beginning of each string. The instruction is not allowed to
prefetch more than one byte at a time since either string may end in the first
byte and reading past that may access an invalid page or segment and cause
a fault. The comparison will terminate when the fetched bytes are different or
if they are equal to zero. The effect of the instruction is to store a value in
operand 0 whose sign indicates the result of the comparison.
‘cmpmemm’ Block compare instruction, with five operands like the operands of ‘cmpstrm’.
The two memory blocks specified are compared byte by byte in lexicographic
order starting at the beginning of each block. Unlike ‘cmpstrm’ the instruction
438 GNU Compiler Collection (GCC) Internals
can prefetch any bytes in the two memory blocks. Also unlike ‘cmpstrm’ the
comparison will not stop if both bytes are zero. The effect of the instruction is
to store a value in operand 0 whose sign indicates the result of the comparison.
‘strlenm’ Compute the length of a string, with three operands. Operand 0 is the result
(of mode m), operand 1 is a mem referring to the first character of the string,
operand 2 is the character to search for (normally zero), and operand 3 is a
constant describing the known alignment of the beginning of the string.
‘rawmemchrm’
Scan memory referred to by operand 1 for the first occurrence of operand 2.
Operand 1 is a mem and operand 2 a const_int of mode m. Operand 0 is the
result, i.e., a pointer to the first occurrence of operand 2 in the memory block
given by operand 1.
‘floatmn2’
Convert signed integer operand 1 (valid for fixed point mode m) to floating
point mode n and store in operand 0 (which has mode n).
‘floatunsmn2’
Convert unsigned integer operand 1 (valid for fixed point mode m) to floating
point mode n and store in operand 0 (which has mode n).
‘fixmn2’ Convert operand 1 (valid for floating point mode m) to fixed point mode n as a
signed number and store in operand 0 (which has mode n). This instruction’s
result is defined only when the value of operand 1 is an integer.
If the machine description defines this pattern, it also needs to define the ftrunc
pattern.
‘fixunsmn2’
Convert operand 1 (valid for floating point mode m) to fixed point mode n as an
unsigned number and store in operand 0 (which has mode n). This instruction’s
result is defined only when the value of operand 1 is an integer.
‘ftruncm2’
Convert operand 1 (valid for floating point mode m) to an integer value, still
represented in floating point mode m, and store it in operand 0 (valid for floating
point mode m).
‘fix_truncmn2’
Like ‘fixmn2’ but works for any floating point value of mode m by converting
the value to an integer.
‘fixuns_truncmn2’
Like ‘fixunsmn2’ but works for any floating point value of mode m by converting
the value to an integer.
‘truncmn2’
Truncate operand 1 (valid for mode m) to mode n and store in operand 0 (which
has mode n). Both modes must be fixed point or both floating point.
‘extendmn2’
Sign-extend operand 1 (valid for mode m) to mode n and store in operand 0
(which has mode n). Both modes must be fixed point or both floating point.
Chapter 17: Machine Descriptions 439
‘zero_extendmn2’
Zero-extend operand 1 (valid for mode m) to mode n and store in operand 0
(which has mode n). Both modes must be fixed point.
‘fractmn2’
Convert operand 1 of mode m to mode n and store in operand 0 (which has mode
n). Mode m and mode n could be fixed-point to fixed-point, signed integer to
fixed-point, fixed-point to signed integer, floating-point to fixed-point, or fixed-
point to floating-point. When overflows or underflows happen, the results are
undefined.
‘satfractmn2’
Convert operand 1 of mode m to mode n and store in operand 0 (which has
mode n). Mode m and mode n could be fixed-point to fixed-point, signed integer
to fixed-point, or floating-point to fixed-point. When overflows or underflows
happen, the instruction saturates the results to the maximum or the minimum.
‘fractunsmn2’
Convert operand 1 of mode m to mode n and store in operand 0 (which has
mode n). Mode m and mode n could be unsigned integer to fixed-point, or
fixed-point to unsigned integer. When overflows or underflows happen, the
results are undefined.
‘satfractunsmn2’
Convert unsigned integer operand 1 of mode m to fixed-point mode n and store
in operand 0 (which has mode n). When overflows or underflows happen, the
instruction saturates the results to the maximum or the minimum.
‘extvm’ Extract a bit-field from register operand 1, sign-extend it, and store it in
operand 0. Operand 2 specifies the width of the field in bits and operand 3 the
starting bit, which counts from the most significant bit if ‘BITS_BIG_ENDIAN’
is true and from the least significant bit otherwise.
Operands 0 and 1 both have mode m. Operands 2 and 3 have a target-specific
mode.
‘extvmisalignm’
Extract a bit-field from memory operand 1, sign extend it, and store it in
operand 0. Operand 2 specifies the width in bits and operand 3 the starting
bit. The starting bit is always somewhere in the first byte of operand 1; it
counts from the most significant bit if ‘BITS_BIG_ENDIAN’ is true and from the
least significant bit otherwise.
Operand 0 has mode m while operand 1 has BLK mode. Operands 2 and 3 have
a target-specific mode.
The instruction must not read beyond the last byte of the bit-field.
‘extzvm’ Like ‘extvm’ except that the bit-field value is zero-extended.
‘extzvmisalignm’
Like ‘extvmisalignm’ except that the bit-field value is zero-extended.
‘insvm’ Insert operand 3 into a bit-field of register operand 0. Operand 1 specifies the
width of the field in bits and operand 2 the starting bit, which counts from the
440 GNU Compiler Collection (GCC) Internals
most significant bit if ‘BITS_BIG_ENDIAN’ is true and from the least significant
bit otherwise.
Operands 0 and 3 both have mode m. Operands 1 and 2 have a target-specific
mode.
‘insvmisalignm’
Insert operand 3 into a bit-field of memory operand 0. Operand 1 specifies
the width of the field in bits and operand 2 the starting bit. The starting bit
is always somewhere in the first byte of operand 0; it counts from the most
significant bit if ‘BITS_BIG_ENDIAN’ is true and from the least significant bit
otherwise.
Operand 3 has mode m while operand 0 has BLK mode. Operands 1 and 2 have
a target-specific mode.
The instruction must not read or write beyond the last byte of the bit-field.
‘extv’ Extract a bit-field from operand 1 (a register or memory operand), where
operand 2 specifies the width in bits and operand 3 the starting bit, and store
it in operand 0. Operand 0 must have mode word_mode. Operand 1 may have
mode byte_mode or word_mode; often word_mode is allowed only for registers.
Operands 2 and 3 must be valid for word_mode.
The RTL generation pass generates this instruction only with constants for
operands 2 and 3 and the constant is never zero for operand 2.
The bit-field value is sign-extended to a full word integer before it is stored in
operand 0.
This pattern is deprecated; please use ‘extvm’ and extvmisalignm instead.
‘extzv’ Like ‘extv’ except that the bit-field value is zero-extended.
This pattern is deprecated; please use ‘extzvm’ and extzvmisalignm instead.
‘insv’ Store operand 3 (which must be valid for word_mode) into a bit-field in operand
0, where operand 1 specifies the width in bits and operand 2 the starting bit.
Operand 0 may have mode byte_mode or word_mode; often word_mode is al-
lowed only for registers. Operands 1 and 2 must be valid for word_mode.
The RTL generation pass generates this instruction only with constants for
operands 1 and 2 and the constant is never zero for operand 1.
This pattern is deprecated; please use ‘insvm’ and insvmisalignm instead.
‘movmodecc’
Conditionally move operand 2 or operand 3 into operand 0 according to the
comparison in operand 1. If the comparison is true, operand 2 is moved into
operand 0, otherwise operand 3 is moved.
The mode of the operands being compared need not be the same as the operands
being moved. Some machines, sparc64 for example, have instructions that
conditionally move an integer value based on the floating point condition codes
and vice versa.
If the machine does not have conditional move instructions, do not define these
patterns.
Chapter 17: Machine Descriptions 441
‘addmodecc’
Similar to ‘movmodecc’ but for conditional addition. Conditionally move
operand 2 or (operands 2 + operand 3) into operand 0 according to the
comparison in operand 1. If the comparison is false, operand 2 is moved into
operand 0, otherwise (operand 2 + operand 3) is moved.
‘cond_addmode’
‘cond_submode’
‘cond_mulmode’
‘cond_divmode’
‘cond_udivmode’
‘cond_modmode’
‘cond_umodmode’
‘cond_andmode’
‘cond_iormode’
‘cond_xormode’
‘cond_sminmode’
‘cond_smaxmode’
‘cond_uminmode’
‘cond_umaxmode’
‘cond_fminmode’
‘cond_fmaxmode’
‘cond_ashlmode’
‘cond_ashrmode’
‘cond_lshrmode’
When operand 1 is true, perform an operation on operands 2 and 3 and store
the result in operand 0, otherwise store operand 4 in operand 0. The operation
works elementwise if the operands are vectors.
The scalar case is equivalent to:
op0 = op1 ? op2 op op3 : op4;
‘cond_fmamode’
‘cond_fmsmode’
‘cond_fnmamode’
‘cond_fnmsmode’
Like ‘cond_addm’, except that the conditional operation takes 3 operands rather
than two. For example, the vector form of ‘cond_fmamode’ is equivalent to:
for (i = 0; i < GET_MODE_NUNITS (m); i++)
op0[i] = op1[i] ? fma (op2[i], op3[i], op4[i]) : op5[i];
‘negmodecc’
Similar to ‘movmodecc’ but for conditional negation. Conditionally move the
negation of operand 2 or the unchanged operand 3 into operand 0 according to
the comparison in operand 1. If the comparison is true, the negation of operand
2 is moved into operand 0, otherwise operand 3 is moved.
‘notmodecc’
Similar to ‘negmodecc’ but for conditional complement. Conditionally move
the bitwise complement of operand 2 or the unchanged operand 3 into operand
0 according to the comparison in operand 1. If the comparison is true, the
complement of operand 2 is moved into operand 0, otherwise operand 3 is
moved.
‘cstoremode4’
Store zero or nonzero in operand 0 according to whether a comparison is true.
Operand 1 is a comparison operator. Operand 2 and operand 3 are the first
and second operand of the comparison, respectively. You specify the mode
that operand 0 must have when you write the match_operand expression. The
compiler automatically sees which mode you have used and supplies an operand
of that mode.
The value stored for a true condition must have 1 as its low bit, or else must
be negative. Otherwise the instruction is not suitable and you should omit it
from the machine description. You describe to the compiler exactly which value
is stored by defining the macro STORE_FLAG_VALUE (see Section 18.31 [Misc],
page 668). If a description cannot be found that can be used for all the possible
comparison operators, you should pick one and use a define_expand to map
all results onto the one you chose.
These operations may FAIL, but should do so only in relatively uncommon
cases; if they would FAIL for common cases involving integer comparisons, it is
best to restrict the predicates to not allow these operands. Likewise if a given
comparison operator will always fail, independent of the operands (for floating-
point modes, the ordered_comparison_operator predicate is often useful in
this case).
If this pattern is omitted, the compiler will generate a conditional branch—for
example, it may copy a constant one to the target and branching around an
assignment of zero to the target—or a libcall. If the predicate for operand
1 only rejects some operators, it will also try reordering the operands and/or
inverting the result value (e.g. by an exclusive OR). These possibilities could
be cheaper or equivalent to the instructions used for the ‘cstoremode4’ pattern
Chapter 17: Machine Descriptions 443
‘untyped_call’
Subroutine call instruction returning a value of any type. Operand 0 is the
function to call; operand 1 is a memory location where the result of calling the
function is to be stored; operand 2 is a parallel expression where each element
is a set expression that indicates the saving of a function return value into the
result block.
This instruction pattern should be defined to support __builtin_apply on
machines where special instructions are needed to call a subroutine with ar-
bitrary arguments or to save the value returned. This instruction pattern is
required on machines that have multiple registers that can hold a return value
(i.e. FUNCTION_VALUE_REGNO_P is true for more than one register).
‘return’ Subroutine return instruction. This instruction pattern name should be defined
only if a single instruction can do all the work of returning from a function.
Like the ‘movm’ patterns, this pattern is also used after the RTL generation
phase. In this case it is to support machines where multiple instructions are
usually needed to return from a function, but some class of functions only re-
quires one instruction to implement a return. Normally, the applicable functions
are those which do not need to save any registers or allocate stack space.
It is valid for this pattern to expand to an instruction using simple_return if
no epilogue is required.
‘simple_return’
Subroutine return instruction. This instruction pattern name should be defined
only if a single instruction can do all the work of returning from a function on a
path where no epilogue is required. This pattern is very similar to the return
instruction pattern, but it is emitted only by the shrink-wrapping optimization
on paths where the function prologue has not been executed, and a function
return should occur without any of the effects of the epilogue. Additional uses
may be introduced on paths where both the prologue and the epilogue have
executed.
For such machines, the condition specified in this pattern should only be true
when reload_completed is nonzero and the function’s epilogue would only be
a single instruction. For machines with register windows, the routine leaf_
function_p may be used to determine if a register window push is required.
Machines that have conditional return instructions should define patterns such
as
(define_insn ""
[(set (pc)
(if_then_else (match_operator
0 "comparison_operator"
[(reg:CC CC_REG) (const_int 0)])
(return)
(pc)))]
"condition"
"...")
where condition would normally be the same condition specified on the named
‘return’ pattern.
Chapter 17: Machine Descriptions 445
‘untyped_return’
Untyped subroutine return instruction. This instruction pattern should be
defined to support __builtin_return on machines where special instructions
are needed to return a value of any type.
Operand 0 is a memory location where the result of calling a function with
__builtin_apply is stored; operand 1 is a parallel expression where each
element is a set expression that indicates the restoring of a function return
value from the result block.
‘nop’ No-op instruction. This instruction pattern name should always be defined to
output a no-op in assembler code. (const_int 0) will do as an RTL pattern.
‘indirect_jump’
An instruction to jump to an address which is operand zero. This pattern name
is mandatory on all machines.
‘casesi’ Instruction to jump through a dispatch table, including bounds checking. This
instruction takes five operands:
1. The index to dispatch on, which has mode SImode.
2. The lower bound for indices in the table, an integer constant.
3. The total range of indices in the table—the largest index minus the smallest
one (both inclusive).
4. A label that precedes the table itself.
5. A label to jump to if the index has a value outside the bounds.
The table is an addr_vec or addr_diff_vec inside of a jump_table_data. The
number of elements in the table is one plus the difference between the upper
bound and the lower bound.
‘tablejump’
Instruction to jump to a variable address. This is a low-level capability which
can be used to implement a dispatch table when there is no ‘casesi’ pattern.
This pattern requires two operands: the address or offset, and a label which
should immediately precede the jump table. If the macro CASE_VECTOR_PC_
RELATIVE evaluates to a nonzero value then the first operand is an offset which
counts from the address of the table; otherwise, it is an absolute address to
jump to. In either case, the first operand has mode Pmode.
The ‘tablejump’ insn is always the last insn before the jump table it uses. Its
assembler code normally has no need to use the second operand, but you should
incorporate it in the RTL pattern so that the jump optimizer will not delete
the table as unreachable code.
‘doloop_end’
Conditional branch instruction that decrements a register and jumps if the
register is nonzero. Operand 0 is the register to decrement and test; operand
1 is the label to jump to if the register is nonzero. See Section 17.13 [Looping
Patterns], page 458.
This optional instruction pattern should be defined for machines with low-
overhead looping instructions as the loop optimizer will try to modify suitable
446 GNU Compiler Collection (GCC) Internals
‘nonlocal_goto’
Emit code to generate a non-local goto, e.g., a jump from one function to a
label in an outer function. This pattern has four arguments, each representing
a value to be used in the jump. The first argument is to be loaded into the
frame pointer, the second is the address to branch to (code to dispatch to the
actual label), the third is the address of a location where the stack is saved, and
the last is the address of the label, to be placed in the location for the incoming
static chain.
On most machines you need not define this pattern, since GCC will already
generate the correct code, which is to load the frame pointer and static chain,
restore the stack (using the ‘restore_stack_nonlocal’ pattern, if defined),
and jump indirectly to the dispatcher. You need only define this pattern if this
code will not work on your machine.
‘nonlocal_goto_receiver’
This pattern, if defined, contains code needed at the target of a nonlocal goto
after the code already generated by GCC. You will not normally need to define
this pattern. A typical reason why you might need this pattern is if some value,
such as a pointer to a global table, must be restored when the frame pointer
is restored. Note that a nonlocal goto only occurs within a unit-of-translation,
so a global table pointer that is shared by all functions of a given module need
not be restored. There are no arguments.
‘exception_receiver’
This pattern, if defined, contains code needed at the site of an exception handler
that isn’t needed at the site of a nonlocal goto. You will not normally need
to define this pattern. A typical reason why you might need this pattern is if
some value, such as a pointer to a global table, must be restored after control
flow is branched to the handler of an exception. There are no arguments.
‘builtin_setjmp_setup’
This pattern, if defined, contains additional code needed to initialize the jmp_
buf. You will not normally need to define this pattern. A typical reason why
you might need this pattern is if some value, such as a pointer to a global table,
must be restored. Though it is preferred that the pointer value be recalculated
if possible (given the address of a label for instance). The single argument is
a pointer to the jmp_buf. Note that the buffer is five words long and that the
first three are normally used by the generic mechanism.
‘builtin_setjmp_receiver’
This pattern, if defined, contains code needed at the site of a built-in setjmp
that isn’t needed at the site of a nonlocal goto. You will not normally need
to define this pattern. A typical reason why you might need this pattern is if
some value, such as a pointer to a global table, must be restored. It takes one
argument, which is the label to which builtin longjmp transferred control; this
pattern may be emitted at a small offset from that label.
Chapter 17: Machine Descriptions 449
‘builtin_longjmp’
This pattern, if defined, performs the entire action of the longjmp. You will not
normally need to define this pattern unless you also define builtin_setjmp_
setup. The single argument is a pointer to the jmp_buf.
‘eh_return’
This pattern, if defined, affects the way __builtin_eh_return, and thence the
call frame exception handling library routines, are built. It is intended to handle
non-trivial actions needed along the abnormal return path.
The address of the exception handler to which the function should return is
passed as operand to this pattern. It will normally need to copied by the
pattern to some special register or memory location. If the pattern needs to
determine the location of the target call frame in order to do so, it may use
EH_RETURN_STACKADJ_RTX, if defined; it will have already been assigned.
If this pattern is not defined, the default action will be to simply copy the return
address to EH_RETURN_HANDLER_RTX. Either that macro or this pattern needs
to be defined if call frame exception handling is to be used.
‘prologue’
This pattern, if defined, emits RTL for entry to a function. The function entry is
responsible for setting up the stack frame, initializing the frame pointer register,
saving callee saved registers, etc.
Using a prologue pattern is generally preferred over defining TARGET_ASM_
FUNCTION_PROLOGUE to emit assembly code for the prologue.
The prologue pattern is particularly useful for targets which perform instruc-
tion scheduling.
‘window_save’
This pattern, if defined, emits RTL for a register window save. It should be
defined if the target machine has register windows but the window events are
decoupled from calls to subroutines. The canonical example is the SPARC
architecture.
‘epilogue’
This pattern emits RTL for exit from a function. The function exit is responsible
for deallocating the stack frame, restoring callee saved registers and emitting
the return instruction.
Using an epilogue pattern is generally preferred over defining TARGET_ASM_
FUNCTION_EPILOGUE to emit assembly code for the epilogue.
The epilogue pattern is particularly useful for targets which perform instruc-
tion scheduling or which have delay slots for their return instruction.
‘sibcall_epilogue’
This pattern, if defined, emits RTL for exit from a function without the final
branch back to the calling function. This pattern will be emitted before any
sibling call (aka tail call) sites.
The sibcall_epilogue pattern must not clobber any arguments used for pa-
rameter passing or any stack slots for arguments passed to the current function.
450 GNU Compiler Collection (GCC) Internals
‘trap’ This pattern, if defined, signals an error, typically by causing some kind of
signal to be raised.
‘ctrapMM4’
Conditional trap instruction. Operand 0 is a piece of RTL which performs a
comparison, and operands 1 and 2 are the arms of the comparison. Operand 3
is the trap code, an integer.
A typical ctrap pattern looks like
(define_insn "ctrapsi4"
[(trap_if (match_operator 0 "trap_operator"
[(match_operand 1 "register_operand")
(match_operand 2 "immediate_operand")])
(match_operand 3 "const_int_operand" "i"))]
""
"...")
‘prefetch’
This pattern, if defined, emits code for a non-faulting data prefetch instruction.
Operand 0 is the address of the memory to prefetch. Operand 1 is a constant
1 if the prefetch is preparing for a write to the memory address, or a constant
0 otherwise. Operand 2 is the expected degree of temporal locality of the data
and is a value between 0 and 3, inclusive; 0 means that the data has no temporal
locality, so it need not be left in the cache after the access; 3 means that the
data has a high degree of temporal locality and should be left in all levels of
cache possible; 1 and 2 mean, respectively, a low or moderate degree of temporal
locality.
Targets that do not support write prefetches or locality hints can ignore the
values of operands 1 and 2.
‘blockage’
This pattern defines a pseudo insn that prevents the instruction scheduler
and other passes from moving instructions and using register equivalences
across the boundary defined by the blockage insn. This needs to be an
UNSPEC VOLATILE pattern or a volatile ASM.
‘memory_blockage’
This pattern, if defined, represents a compiler memory barrier, and will be
placed at points across which RTL passes may not propagate memory accesses.
This instruction needs to read and write volatile BLKmode memory. It does
not need to generate any machine instruction. If this pattern is not defined, the
compiler falls back to emitting an instruction corresponding to asm volatile
("" ::: "memory").
‘memory_barrier’
If the target memory model is not fully synchronous, then this pattern should be
defined to an instruction that orders both loads and stores before the instruction
with respect to loads and stores after the instruction. This pattern has no
operands.
‘speculation_barrier’
If the target can support speculative execution, then this pattern should be
defined to an instruction that will block subsequent execution until any prior
Chapter 17: Machine Descriptions 451
speculation conditions has been resolved. The pattern must also ensure that
the compiler cannot move memory operations past the barrier, so it needs to
be an UNSPEC VOLATILE pattern. The pattern has no operands.
If this pattern is not defined then the default expansion of __builtin_
speculation_safe_value will emit a warning. You can suppress this warning
by defining this pattern with a final condition of 0 (zero), which tells the
compiler that a speculation barrier is not needed for this target.
‘sync_compare_and_swapmode’
This pattern, if defined, emits code for an atomic compare-and-swap operation.
Operand 1 is the memory on which the atomic operation is performed. Operand
2 is the “old” value to be compared against the current contents of the memory
location. Operand 3 is the “new” value to store in the memory if the compare
succeeds. Operand 0 is the result of the operation; it should contain the contents
of the memory before the operation. If the compare succeeds, this should
obviously be a copy of operand 2.
This pattern must show that both operand 0 and operand 1 are modified.
This pattern must issue any memory barrier instructions such that all memory
operations before the atomic operation occur before the atomic operation and all
memory operations after the atomic operation occur after the atomic operation.
For targets where the success or failure of the compare-and-swap operation is
available via the status flags, it is possible to avoid a separate compare opera-
tion and issue the subsequent branch or store-flag operation immediately after
the compare-and-swap. To this end, GCC will look for a MODE_CC set in the
output of sync_compare_and_swapmode; if the machine description includes
such a set, the target should also define special cbranchcc4 and/or cstorecc4
instructions. GCC will then be able to take the destination of the MODE_CC set
and pass it to the cbranchcc4 or cstorecc4 pattern as the first operand of the
comparison (the second will be (const_int 0)).
For targets where the operating system may provide support for this opera-
tion via library calls, the sync_compare_and_swap_optab may be initialized
to a function with the same interface as the __sync_val_compare_and_swap_n
built-in. If the entire set of sync builtins are supported via library calls, the
target can initialize all of the optabs at once with init_sync_libfuncs. For
the purposes of C++11 std::atomic::is_lock_free, it is assumed that these
library calls do not use any kind of interruptable locking.
‘sync_addmode’, ‘sync_submode’
‘sync_iormode’, ‘sync_andmode’
‘sync_xormode’, ‘sync_nandmode’
These patterns emit code for an atomic operation on memory. Operand 0 is the
memory on which the atomic operation is performed. Operand 1 is the second
operand to the binary operator.
This pattern must issue any memory barrier instructions such that all memory
operations before the atomic operation occur before the atomic operation and all
memory operations after the atomic operation occur after the atomic operation.
452 GNU Compiler Collection (GCC) Internals
If these patterns are not defined, the operation will be constructed from a
compare-and-swap operation, if defined.
‘sync_old_addmode’, ‘sync_old_submode’
‘sync_old_iormode’, ‘sync_old_andmode’
‘sync_old_xormode’, ‘sync_old_nandmode’
These patterns emit code for an atomic operation on memory, and return the
value that the memory contained before the operation. Operand 0 is the result
value, operand 1 is the memory on which the atomic operation is performed,
and operand 2 is the second operand to the binary operator.
This pattern must issue any memory barrier instructions such that all memory
operations before the atomic operation occur before the atomic operation and all
memory operations after the atomic operation occur after the atomic operation.
If these patterns are not defined, the operation will be constructed from a
compare-and-swap operation, if defined.
‘sync_new_addmode’, ‘sync_new_submode’
‘sync_new_iormode’, ‘sync_new_andmode’
‘sync_new_xormode’, ‘sync_new_nandmode’
These patterns are like their sync_old_op counterparts, except that they return
the value that exists in the memory location after the operation, rather than
before the operation.
‘sync_lock_test_and_setmode’
This pattern takes two forms, based on the capabilities of the target. In either
case, operand 0 is the result of the operand, operand 1 is the memory on which
the atomic operation is performed, and operand 2 is the value to set in the lock.
In the ideal case, this operation is an atomic exchange operation, in which the
previous value in memory operand is copied into the result operand, and the
value operand is stored in the memory operand.
For less capable targets, any value operand that is not the constant 1 should
be rejected with FAIL. In this case the target may use an atomic test-and-set
bit operation. The result operand should contain 1 if the bit was previously set
and 0 if the bit was previously clear. The true contents of the memory operand
are implementation defined.
This pattern must issue any memory barrier instructions such that the pattern
as a whole acts as an acquire barrier, that is all memory operations after the
pattern do not occur until the lock is acquired.
If this pattern is not defined, the operation will be constructed from a compare-
and-swap operation, if defined.
‘sync_lock_releasemode’
This pattern, if defined, releases a lock set by sync_lock_test_and_setmode.
Operand 0 is the memory that contains the lock; operand 1 is the value to store
in the lock.
If the target doesn’t implement full semantics for sync_lock_test_and_
setmode, any value operand which is not the constant 0 should be rejected
Chapter 17: Machine Descriptions 453
with FAIL, and the true contents of the memory operand are implementation
defined.
This pattern must issue any memory barrier instructions such that the pattern
as a whole acts as a release barrier, that is the lock is released only after all
previous memory operations have completed.
If this pattern is not defined, then a memory_barrier pattern will be emitted,
followed by a store of the value to the memory operand.
‘atomic_compare_and_swapmode’
This pattern, if defined, emits code for an atomic compare-and-swap operation
with memory model semantics. Operand 2 is the memory on which the atomic
operation is performed. Operand 0 is an output operand which is set to true
or false based on whether the operation succeeded. Operand 1 is an output
operand which is set to the contents of the memory before the operation was
attempted. Operand 3 is the value that is expected to be in memory. Operand 4
is the value to put in memory if the expected value is found there. Operand 5 is
set to 1 if this compare and swap is to be treated as a weak operation. Operand
6 is the memory model to be used if the operation is a success. Operand 7 is
the memory model to be used if the operation fails.
If memory referred to in operand 2 contains the value in operand 3, then operand
4 is stored in memory pointed to by operand 2 and fencing based on the memory
model in operand 6 is issued.
If memory referred to in operand 2 does not contain the value in operand 3,
then fencing based on the memory model in operand 7 is issued.
If a target does not support weak compare-and-swap operations, or the port
elects not to implement weak operations, the argument in operand 5 can be
ignored. Note a strong implementation must be provided.
If this pattern is not provided, the __atomic_compare_exchange built-in
functions will utilize the legacy sync_compare_and_swap pattern with an
__ATOMIC_SEQ_CST memory model.
‘atomic_loadmode’
This pattern implements an atomic load operation with memory model seman-
tics. Operand 1 is the memory address being loaded from. Operand 0 is the
result of the load. Operand 2 is the memory model to be used for the load
operation.
If not present, the __atomic_load built-in function will either resort to a normal
load with memory barriers, or a compare-and-swap operation if a normal load
would not be atomic.
‘atomic_storemode’
This pattern implements an atomic store operation with memory model seman-
tics. Operand 0 is the memory address being stored to. Operand 1 is the value
to be written. Operand 2 is the memory model to be used for the operation.
If not present, the __atomic_store built-in function will attempt to perform
a normal store and surround it with any required memory fences. If the store
454 GNU Compiler Collection (GCC) Internals
‘atomic_test_and_set’
This pattern emits code for __builtin_atomic_test_and_set. Operand 0 is
an output operand which is set to true if the previous previous contents of the
byte was "set", and false otherwise. Operand 1 is the QImode memory to be
modified. Operand 2 is the memory model to be used.
The specific value that defines "set" is implementation defined, and is normally
based on what is performed by the native atomic test and set instruction.
‘atomic_bit_test_and_setmode’
‘atomic_bit_test_and_complementmode’
‘atomic_bit_test_and_resetmode’
These patterns emit code for an atomic bitwise operation on memory with mem-
ory model semantics, and return the original value of the specified bit. Operand
0 is an output operand which contains the value of the specified bit from the
memory location before the operation was performed. Operand 1 is the memory
on which the atomic operation is performed. Operand 2 is the bit within the
operand, starting with least significant bit. Operand 3 is the memory model to
be used by the operation. Operand 4 is a flag - it is const1_rtx if operand 0
should contain the original value of the specified bit in the least significant bit
of the operand, and const0_rtx if the bit should be in its original position in
the operand. atomic_bit_test_and_setmode atomically sets the specified bit
after remembering its original value, atomic_bit_test_and_complementmode
inverts the specified bit and atomic_bit_test_and_resetmode clears the spec-
ified bit.
If these patterns are not defined, attempts will be made to use atomic_fetch_
ormode, atomic_fetch_xormode or atomic_fetch_andmode instruction pat-
terns, or their sync counterparts. If none of these are available a compare-and-
swap loop will be used.
‘atomic_add_fetch_cmp_0mode’
‘atomic_sub_fetch_cmp_0mode’
‘atomic_and_fetch_cmp_0mode’
‘atomic_or_fetch_cmp_0mode’
‘atomic_xor_fetch_cmp_0mode’
These patterns emit code for an atomic operation on memory with memory
model semantics if the fetch result is used only in a comparison against zero.
Operand 0 is an output operand which contains a boolean result of comparison
of the value after the operation against zero. Operand 1 is the memory on
which the atomic operation is performed. Operand 2 is the second operand
to the binary operator. Operand 3 is the memory model to be used by the
operation. Operand 4 is an integer holding the comparison code, one of EQ, NE,
LT, GT, LE or GE.
If these patterns are not defined, attempts will be made to use separate atomic
operation and fetch pattern followed by comparison of the result against zero.
‘mem_thread_fence’
This pattern emits code required to implement a thread fence with memory
model semantics. Operand 0 is the memory model to be used.
456 GNU Compiler Collection (GCC) Internals
that an attacker might use to rewrite the stack guard slot after having clobbered
it.
If this pattern is not defined, then the address declaration is expanded first
in the standard way and a stack_protect_test pattern is then generated to
compare the value from that address to the value at the memory in operand 0.
‘stack_protect_test’
This pattern, if defined, compares a ptr_mode value from the valid memory
location in operand 1 with the memory in operand 0 without leaving the value
in a register afterward and branches to operand 2 if the values were equal.
If this pattern is not defined, then a plain compare pattern and conditional
branch pattern is used.
‘clear_cache’
This pattern, if defined, flushes the instruction cache for a region of memory.
The region is bounded to by the Pmode pointers in operand 0 inclusive and
operand 1 exclusive.
If this pattern is not defined, a call to the library function __clear_cache is
used.
‘spaceshipm3’
Initialize output operand 0 with mode of integer type to -1, 0, 1 or 2 if operand
1 with mode m compares less than operand 2, equal to operand 2, greater than
operand 2 or is unordered with operand 2. m should be a scalar floating point
mode.
This pattern is not allowed to FAIL.
instruction that loads special registers to mark the top and end of a loop and to count the
number of loop iterations. This avoids the need for fetching and executing a ‘dbra’-like
instruction and avoids pipeline stalls associated with the jump.
GCC has two special named patterns to support low overhead looping. They are
‘doloop_begin’ and ‘doloop_end’. These are emitted by the loop optimizer for certain
well-behaved loops with a finite number of loop iterations using information collected
during strength reduction.
The ‘doloop_end’ pattern describes the actual looping instruction (or the implicit looping
operation) and the ‘doloop_begin’ pattern is an optional companion pattern that can be
used for initialization needed for some low-overhead looping instructions.
Note that some machines require the actual looping instruction to be emitted at the
top of the loop (e.g., the TMS320C3x/C4x DSPs). Emitting the true RTL for a looping
instruction at the top of the loop can cause problems with flow analysis. So instead, a
dummy doloop insn is emitted at the end of the loop. The machine dependent reorg pass
checks for the presence of this doloop insn and then searches back to the top of the loop,
where it inserts the true looping insn (provided there are no instructions in the loop which
would cause problems). Any additional labels can be emitted at this point. In addition,
if the desired special iteration counter register was not allocated, this machine dependent
reorg pass could emit a traditional compare and jump instruction pair.
For the ‘doloop_end’ pattern, the loop optimizer allocates an additional pseudo register
as an iteration counter. This pseudo register cannot be used within the loop (i.e., general
induction variables cannot be derived from it), however, in many cases the loop induction
variable may become redundant and removed by the flow pass.
The ‘doloop_end’ pattern must have a specific structure to be handled correctly by GCC.
The example below is taken (slightly simplified) from the PDP-11 target:
460 GNU Compiler Collection (GCC) Internals
(define_expand "doloop_end"
[(parallel [(set (pc)
(if_then_else
(ne (match_operand:HI 0 "nonimmediate_operand" "+r,!m")
(const_int 1))
(label_ref (match_operand 1 "" ""))
(pc)))
(set (match_dup 0)
(plus:HI (match_dup 0)
(const_int -1)))])]
""
"{
if (GET_MODE (operands[0]) != HImode)
FAIL;
}")
(define_insn "doloop_end_insn"
[(set (pc)
(if_then_else
(ne (match_operand:HI 0 "nonimmediate_operand" "+r,!m")
(const_int 1))
(label_ref (match_operand 1 "" ""))
(pc)))
(set (match_dup 0)
(plus:HI (match_dup 0)
(const_int -1)))]
""
{
if (which_alternative == 0)
return "sob %0,%l1";
/* emulate sob */
output_asm_insn ("dec %0", operands);
return "bne %l1";
})
The first part of the pattern describes the branch condition. GCC supports three cases
for the way the target machine handles the loop counter:
• Loop terminates when the loop register decrements to zero. This is represented by a
ne comparison of the register (its old value) with constant 1 (as in the example above).
• Loop terminates when the loop register decrements to −1. This is represented by a ne
comparison of the register with constant zero.
• Loop terminates when the loop register decrements to a negative value. This is repre-
sented by a ge comparison of the register with constant zero. For this case, GCC will
attach a REG_NONNEG note to the doloop_end insn if it can determine that the register
will be non-negative.
Since the doloop_end insn is a jump insn that also has an output, the reload pass does
not handle the output operand. Therefore, the constraint must allow for that operand to
be in memory rather than a register. In the example shown above, that is handled (in the
doloop_end_insn pattern) by using a loop instruction sequence that can handle memory
operands when the memory alternative appears.
GCC does not check the mode of the loop register operand when generating the doloop_
end pattern. If the pattern is only valid for some modes but not others, the pattern should
Chapter 17: Machine Descriptions 461
be a define_expand pattern that checks the operand mode in the preparation code, and
issues FAIL if an unsupported mode is found. The example above does this, since the
machine instruction to be used only exists for HImode.
If the doloop_end pattern is a define_expand, there must also be a define_insn or
define_insn_and_split matching the generated pattern. Otherwise, the compiler will fail
during loop optimization.
A define_expand is an RTL expression that looks almost like a define_insn; but, unlike
the latter, a define_expand is used only for RTL generation and it can produce more than
one RTL insn.
A define_expand RTX has four operands:
• The name. Each define_expand must have a name, since the only use for it is to refer
to it by name.
• The RTL template. This is a vector of RTL expressions representing a sequence of
separate instructions. Unlike define_insn, there is no implicit surrounding PARALLEL.
• The condition, a string containing a C expression. This expression is used to express
how the availability of this pattern depends on subclasses of target machine, selected
by command-line options when GCC is run. This is just like the condition of a define_
insn that has a standard name. Therefore, the condition (if present) may not depend
on the data in the insn being matched, but only the target-machine-type flags. The
compiler needs to test these conditions during initialization in order to learn exactly
which named instructions are available in a particular run.
• The preparation statements, a string containing zero or more C statements which are
to be executed before RTL code is generated from the RTL template.
Usually these statements prepare temporary registers for use as internal operands in
the RTL template, but they can also generate RTL insns directly by calling routines
such as emit_insn, etc. Any such insns precede the ones that come from the RTL
template.
• Optionally, a vector containing the values of attributes. See Section 17.19 [Insn At-
tributes], page 475.
Every RTL insn emitted by a define_expand must match some define_insn in the
machine description. Otherwise, the compiler will crash when trying to generate code for
the insn or trying to optimize it.
The RTL template, in addition to controlling generation of RTL insns, also describes
the operands that need to be specified when this pattern is used. In particular, it gives a
predicate for each operand.
A true operand, which needs to be specified in order to generate RTL from the pattern,
should be described with a match_operand in its first occurrence in the RTL template.
This enters information on the operand’s predicate into the tables that record such things.
GCC uses the information to preload the operand into a register if that is required for valid
RTL code. If the operand is referred to more than once, subsequent references should use
match_dup.
The RTL template may also refer to internal “operands” which are temporary registers
or labels used only within the sequence made by the define_expand. Internal operands are
substituted into the RTL template with match_dup, never with match_operand. The values
of the internal operands are not passed in as arguments by the compiler when it requests
use of this pattern. Instead, they are computed within the pattern, in the preparation
statements. These statements compute the values and store them into the appropriate
elements of operands so that match_dup can find them.
There are two special macros defined for use in the preparation statements: DONE and
FAIL. Use them with a following semicolon, as a statement.
464 GNU Compiler Collection (GCC) Internals
DONE Use the DONE macro to end RTL generation for the pattern. The only RTL
insns resulting from the pattern on this occasion will be those already emitted
by explicit calls to emit_insn within the preparation statements; the RTL
template will not be generated.
FAIL Make the pattern fail on this occasion. When a pattern fails, it means that the
pattern was not truly available. The calling routines in the compiler will try
other strategies for code generation using other patterns.
Failure is currently supported only for binary (addition, multiplication, shifting,
etc.) and bit-field (extv, extzv, and insv) operations.
If the preparation falls through (invokes neither DONE nor FAIL), then the define_expand
acts like a define_insn in that the RTL template is used to generate the insn.
The RTL template is not used for matching, only for generating the initial insn list. If
the preparation statement always invokes DONE or FAIL, the RTL template may be reduced
to a simple list of operands, such as this example:
(define_expand "addsi3"
[(match_operand:SI 0 "register_operand" "")
(match_operand:SI 1 "register_operand" "")
(match_operand:SI 2 "register_operand" "")]
""
"
{
handle_add (operands[0], operands[1], operands[2]);
DONE;
}")
Here is an example, the definition of left-shift for the SPUR chip:
(define_expand "ashlsi3"
[(set (match_operand:SI 0 "register_operand" "")
(ashift:SI
(match_operand:SI 1 "register_operand" "")
(match_operand:SI 2 "nonmemory_operand" "")))]
""
"
{
if (GET_CODE (operands[2]) != CONST_INT
|| (unsigned) INTVAL (operands[2]) > 3)
FAIL;
}")
This example uses define_expand so that it can generate an RTL insn for shifting when the
shift-count is in the supported range of 0 to 3 but fail in other cases where machine insns
aren’t available. When it fails, the compiler tries another strategy using different patterns
(such as, a library call).
If the compiler were able to handle nontrivial condition-strings in patterns with names,
then it would be possible to use a define_insn in that case. Here is another case (zero-
extension on the 68000) which makes more use of the power of define_expand:
(define_expand "zero_extendhisi2"
[(set (match_operand:SI 0 "general_operand" "")
(const_int 0))
(set (strict_low_part
(subreg:HI
(match_dup 0)
Chapter 17: Machine Descriptions 465
0))
(match_operand:HI 1 "general_operand" ""))]
""
"operands[1] = make_safe_from (operands[1], operands[0]);")
Here two RTL insns are generated, one to clear the entire output operand and the other to
copy the input operand into its low half. This sequence is incorrect if the input operand
refers to [the old value of] the output operand, so the preparation statement makes sure this
isn’t so. The function make_safe_from copies the operands[1] into a temporary register
if it refers to operands[0]. It does this by emitting another RTL insn.
Finally, a third example shows the use of an internal operand. Zero-extension on the
SPUR chip is done by and-ing the result against a halfword mask. But this mask cannot
be represented by a const_int because the constant value is too large to be legitimate on
this machine. So it must be copied into a register with force_reg and then the register
used in the and.
(define_expand "zero_extendhisi2"
[(set (match_operand:SI 0 "register_operand" "")
(and:SI (subreg:SI
(match_operand:HI 1 "register_operand" "")
0)
(match_dup 2)))]
""
"operands[2]
= force_reg (SImode, GEN_INT (65535)); ")
Note: If the define_expand is used to serve a standard binary or unary arithmetic
operation or a bit-field operation, then the last insn it generates must not be a code_label,
barrier or note. It must be an insn, jump_insn or call_insn. If you don’t need a real
insn at the end, emit an insn to copy the result of the operation into itself. Such an insn
will generate no code, but it can avoid problems in the compiler.
constant in two insns on a RISC machine, the way to split the addition into two insns is
machine-dependent.
The define_split definition tells the compiler how to split a complex insn into several
simpler insns. It looks like this:
(define_split
[insn-pattern]
"condition"
[new-insn-pattern-1
new-insn-pattern-2
...]
"preparation-statements")
insn-pattern is a pattern that needs to be split and condition is the final condition to be
tested, as in a define_insn. When an insn matching insn-pattern and satisfying condition
is found, it is replaced in the insn list with the insns given by new-insn-pattern-1, new-insn-
pattern-2, etc.
The preparation-statements are similar to those statements that are specified for define_
expand (see Section 17.15 [Expander Definitions], page 462) and are executed before the
new RTL is generated to prepare for the generated code or emit some insns whose pattern
is not fixed. Unlike those in define_expand, however, these statements must not generate
any new pseudo-registers. Once reload has completed, they also must not allocate any space
in the stack frame.
There are two special macros defined for use in the preparation statements: DONE and
FAIL. Use them with a following semicolon, as a statement.
DONE Use the DONE macro to end RTL generation for the splitter. The only RTL
insns generated as replacement for the matched input insn will be those already
emitted by explicit calls to emit_insn within the preparation statements; the
replacement pattern is not used.
FAIL Make the define_split fail on this occasion. When a define_split fails, it
means that the splitter was not truly available for the inputs it was given, and
the input insn will not be split.
If the preparation falls through (invokes neither DONE nor FAIL), then the define_split
uses the replacement template.
Patterns are matched against insn-pattern in two different circumstances. If an insn
needs to be split for delay slot scheduling or insn scheduling, the insn is already known
to be valid, which means that it must have been matched by some define_insn and, if
reload_completed is nonzero, is known to satisfy the constraints of that define_insn. In
that case, the new insn patterns must also be insns that are matched by some define_insn
and, if reload_completed is nonzero, must also satisfy the constraints of those definitions.
As an example of this usage of define_split, consider the following example from
a29k.md, which splits a sign_extend from HImode to SImode into a pair of shift insns:
(define_split
[(set (match_operand:SI 0 "gen_reg_operand" "")
(sign_extend:SI (match_operand:HI 1 "gen_reg_operand" "")))]
""
[(set (match_dup 0)
(ashift:SI (match_dup 1)
Chapter 17: Machine Descriptions 467
(const_int 16)))
(set (match_dup 0)
(ashiftrt:SI (match_dup 0)
(const_int 16)))]
"
{ operands[1] = gen_lowpart (SImode, operands[1]); }")
When the combiner phase tries to split an insn pattern, it is always the case that the
pattern is not matched by any define_insn. The combiner pass first tries to split a single
set expression and then the same set expression inside a parallel, but followed by a
clobber of a pseudo-reg to use as a scratch register. In these cases, the combiner expects
exactly one or two new insn patterns to be generated. It will verify that these patterns
match some define_insn definitions, so you need not do this test in the define_split
(of course, there is no point in writing a define_split that will never produce insns that
match).
Here is an example of this use of define_split, taken from rs6000.md:
(define_split
[(set (match_operand:SI 0 "gen_reg_operand" "")
(plus:SI (match_operand:SI 1 "gen_reg_operand" "")
(match_operand:SI 2 "non_add_cint_operand" "")))]
""
[(set (match_dup 0) (plus:SI (match_dup 1) (match_dup 3)))
(set (match_dup 0) (plus:SI (match_dup 0) (match_dup 4)))]
"
{
int low = INTVAL (operands[2]) & 0xffff;
int high = (unsigned) INTVAL (operands[2]) >> 16;
"TARGET_SVE"
"whilelo\t%0.<PRED_ALL:Vetype>, %<w>2, %<w>3"
;; Force the compiler to drop the unused predicate operand, so that we
;; don't have an unnecessary PTRUE.
"&& !CONSTANT_P (operands[1])"
{
operands[1] = CONSTM1_RTX (<MODE>mode);
}
)
The splitter in this case simply replaces operand 1 with the constant value that it is
known to have. The equivalent define_insn_and_split would be:
(define_insn_and_split "*while_ult<GPI:mode><PRED_ALL:mode>_cc"
[(set (reg:CC CC_REGNUM)
(compare:CC
(unspec:SI [(match_operand:PRED_ALL 1)
(unspec:PRED_ALL
[(match_operand:GPI 2 "aarch64_reg_or_zero" "rZ")
(match_operand:GPI 3 "aarch64_reg_or_zero" "rZ")]
UNSPEC_WHILE_LO)]
UNSPEC_PTEST_PTRUE)
(const_int 0)))
(set (match_operand:PRED_ALL 0 "register_operand" "=Upa")
(unspec:PRED_ALL [(match_dup 2)
(match_dup 3)]
UNSPEC_WHILE_LO))]
"TARGET_SVE"
"whilelo\t%0.<PRED_ALL:Vetype>, %<w>2, %<w>3"
;; Force the compiler to drop the unused predicate operand, so that we
;; don't have an unnecessary PTRUE.
"&& !CONSTANT_P (operands[1])"
[(parallel
[(set (reg:CC CC_REGNUM)
(compare:CC
(unspec:SI [(match_dup 1)
(unspec:PRED_ALL [(match_dup 2)
(match_dup 3)]
UNSPEC_WHILE_LO)]
UNSPEC_PTEST_PTRUE)
(const_int 0)))
(set (match_dup 0)
(unspec:PRED_ALL [(match_dup 2)
(match_dup 3)]
UNSPEC_WHILE_LO))])]
{
operands[1] = CONSTM1_RTX (<MODE>mode);
}
)
(include pathname)
Chapter 17: Machine Descriptions 471
For example:
(include "filestuff")
Where pathname is a string that specifies the location of the file, specifies the include file
to be in gcc/config/target/filestuff. The directory gcc/config/target is regarded
as the default directory.
Machine descriptions may be split up into smaller more manageable subsections and
placed into subdirectories.
By specifying:
(include "BOGUS/filestuff")
(include "/u2/BOGUS/filestuff")
Add the directory dir to the head of the list of directories to be searched for header files.
This can be used to override a system machine definition file, substituting your own version,
since these directories are searched before the default machine description file directories.
If you use more than one -I option, the directories are scanned in left-to-right order; the
standard default directory come after.
like the template of a define_insn. Operand numbers in this template are the same ones
used in matching the original sequence of insns.
The result of a defined peephole optimizer does not need to match any of the insn patterns
in the machine description; it does not even have an opportunity to match them. The
peephole optimizer definition itself serves as the insn pattern to control how the insn is
output.
Defined peephole optimizers are run as assembler code is being output, so the insns they
produce are never combined or rearranged in any way.
Here is an example, taken from the 68000 machine description:
(define_peephole
[(set (reg:SI 15) (plus:SI (reg:SI 15) (const_int 4)))
(set (match_operand:DF 0 "register_operand" "=f")
(match_operand:DF 1 "register_operand" "ad"))]
"FP_REG_P (operands[0]) && ! FP_REG_P (operands[1])"
{
rtx xoperands[2];
xoperands[1] = gen_rtx_REG (SImode, REGNO (operands[1]) + 1);
#ifdef MOTOROLA
output_asm_insn ("move.l %1,(sp)", xoperands);
output_asm_insn ("move.l %1,-(sp)", operands);
return "fmove.d (sp)+,%0";
#else
output_asm_insn ("movel %1,sp@", xoperands);
output_asm_insn ("movel %1,sp@-", operands);
return "fmoved sp@+,%0";
#endif
})
The effect of this optimization is to change
jbsr _foobar
addql #4,sp
movel d1,sp@-
movel d0,sp@-
fmoved sp@+,fp0
into
jbsr _foobar
movel d1,sp@
movel d0,sp@-
fmoved sp@+,fp0
insn-pattern-1 and so on look almost like the second operand of define_insn. There
is one important difference: the second operand of define_insn consists of one or more
RTX’s enclosed in square brackets. Usually, there is only one: then the same action can
be written as an element of a define_peephole. But when there are multiple actions in a
define_insn, they are implicitly enclosed in a parallel. Then you must explicitly write
the parallel, and the square brackets within it, in the define_peephole. Thus, if an insn
pattern looks like this,
(define_insn "divmodsi4"
[(set (match_operand:SI 0 "general_operand" "=d")
(div:SI (match_operand:SI 1 "general_operand" "0")
(match_operand:SI 2 "general_operand" "dmsK")))
(set (match_operand:SI 3 "general_operand" "=d")
(mod:SI (match_dup 1) (match_dup 2)))]
474 GNU Compiler Collection (GCC) Internals
"TARGET_68020"
"divsl%.l %2,%3:%0")
then the way to mention this insn in a peephole is as follows:
(define_peephole
[...
(parallel
[(set (match_operand:SI 0 "general_operand" "=d")
(div:SI (match_operand:SI 1 "general_operand" "0")
(match_operand:SI 2 "general_operand" "dmsK")))
(set (match_operand:SI 3 "general_operand" "=d")
(mod:SI (match_dup 1) (match_dup 2)))])
...]
...)
This pattern tries to split a load from its use in the hopes that we’ll be able to schedule
around the memory load latency. It allocates a single SImode register of class GENERAL_REGS
("r") that needs to be live only at the point just before the arithmetic.
A real example requiring extended scratch lifetimes is harder to come by, so here’s a silly
made-up example:
(define_peephole2
[(match_scratch:SI 4 "r")
(set (match_operand:SI 0 "" "") (match_operand:SI 1 "" ""))
(set (match_operand:SI 2 "" "") (match_dup 1))
(match_dup 4)
(set (match_operand:SI 3 "" "") (match_dup 1))]
"/* determine 1 does not overlap 0 and 2 */"
[(set (match_dup 4) (match_dup 1))
(set (match_dup 0) (match_dup 4))
(set (match_dup 2) (match_dup 4))
(set (match_dup 3) (match_dup 4))]
"")
If we had not added the (match_dup 4) in the middle of the input sequence, it might have
been the case that the register we chose at the beginning of the sequence is killed by the
first or second set.
There are two special macros defined for use in the preparation statements: DONE and
FAIL. Use them with a following semicolon, as a statement.
DONE Use the DONE macro to end RTL generation for the peephole. The only RTL
insns generated as replacement for the matched input insn will be those already
emitted by explicit calls to emit_insn within the preparation statements; the
replacement pattern is not used.
FAIL Make the define_peephole2 fail on this occasion. When a define_peephole2
fails, it means that the replacement was not truly available for the particular in-
puts it was given. In that case, GCC may still apply a later define_peephole2
that also matches the given insn pattern. (Note that this is different from
define_split, where FAIL prevents the input insn from being split at all.)
If the preparation falls through (invokes neither DONE nor FAIL), then the define_
peephole2 uses the replacement template.
used to conditionally enable or disable insn alternatives (see Section 17.8.6 [Disable Insn
Alternatives], page 406). The predicable attribute, together with a suitable define_cond_
exec (see Section 17.20 [Conditional Execution], page 491), can be used to automatically
generate conditional variants of instruction patterns. The mnemonic attribute can be used
to check for the instruction mnemonic (see Section 17.19.7 [Mnemonic Attribute], page 483).
The compiler internally uses the names ce_enabled and nonce_enabled, so they should
not be used elsewhere as alternative names.
list-of-values is either a string that specifies a comma-separated list of values that can
be assigned to the attribute, or a null string to indicate that the attribute takes numeric
values.
default is an attribute expression that gives the value of this attribute for insns that
match patterns whose definition does not include an explicit value for this attribute. See
Section 17.19.4 [Attr Example], page 481, for more information on the handling of defaults.
See Section 17.19.6 [Constant Attributes], page 483, for information on attributes that do
not depend on any particular insn.
For each defined attribute, a number of definitions are written to the insn-attr.h file.
For cases where an explicit set of values is specified for an attribute, the following are
defined:
• A ‘#define’ is written for the symbol ‘HAVE_ATTR_name’.
• An enumerated class is defined for ‘attr_name’ with elements of the form
‘upper-name_upper-value’ where the attribute name and value are first converted to
uppercase.
• A function ‘get_attr_name’ is defined that is passed an insn and returns the attribute
value for that insn.
For example, if the following is present in the md file:
(define_attr "type" "branch,fp,load,store,arith" ...)
the following lines will be written to the file insn-attr.h.
#define HAVE_ATTR_type 1
enum attr_type {TYPE_BRANCH, TYPE_FP, TYPE_LOAD,
TYPE_STORE, TYPE_ARITH};
extern enum attr_type get_attr_type ();
If the attribute takes numeric values, no enum type will be defined and the function to
obtain the attribute’s value will return int.
There are attributes which are tied to a specific meaning. These attributes are not free
to use for other purposes:
length The length attribute is used to calculate the length of emitted code
chunks. This is especially important when verifying branch distances. See
Section 17.19.5 [Insn Lengths], page 482.
enabled The enabled attribute can be defined to prevent certain alternatives of an insn
definition from being used during code generation. See Section 17.8.6 [Disable
Insn Alternatives], page 406.
mnemonic The mnemonic attribute can be defined to implement instruction specific checks
in e.g. the pipeline description. See Section 17.19.7 [Mnemonic Attribute],
page 483.
Chapter 17: Machine Descriptions 477
but without duplicating the processor list. The second example defines two separate C
enums (attr_arch and attr_tune) whereas the first defines a single C enum (processor).
mod, abs, neg, and, ior, xor, not, ashift, lshiftrt, and ashiftrt expres-
sions.
const_int and symbol_ref are always valid terms (see Section 17.19.5 [Insn
Lengths], page 482,for additional forms). symbol_ref is a string denoting a C
expression that yields an int when evaluated by the ‘get_attr_...’ routine.
It should normally be a global variable.
(eq_attr name value)
name is a string specifying the name of an attribute.
value is a string that is either a valid value for attribute name, a comma-
separated list of values, or ‘!’ followed by a value or list. If value does not
begin with a ‘!’, this test is true if the value of the name attribute of the
current insn is in the list specified by value. If value begins with a ‘!’, this test
is true if the attribute’s value is not in the specified list.
For example,
(eq_attr "type" "load,store")
is equivalent to
(ior (eq_attr "type" "load") (eq_attr "type" "store"))
If name specifies an attribute of ‘alternative’, it refers to the value of the
compiler variable which_alternative (see Section 17.6 [Output Statement],
page 364) and the values must be small integers. For example,
(eq_attr "alternative" "2,3")
is equivalent to
(ior (eq (symbol_ref "which_alternative") (const_int 2))
(eq (symbol_ref "which_alternative") (const_int 3)))
Note that, for most attributes, an eq_attr test is simplified in cases where the
value of the attribute being tested is known for all insns matching a particular
pattern. This is by far the most common case.
(attr_flag name)
The value of an attr_flag expression is true if the flag specified by name is
true for the insn currently being scheduled.
name is a string specifying one of a fixed set of flags to test. Test the flags
forward and backward to determine the direction of a conditional branch.
This example describes a conditional branch delay slot which can be nullified for
forward branches that are taken (annul-true) or for backward branches which
are not taken (annul-false).
(define_delay (eq_attr "type" "cbranch")
[(eq_attr "in_branch_delay" "true")
(and (eq_attr "in_branch_delay" "true")
(attr_flag "forward"))
(and (eq_attr "in_branch_delay" "true")
(attr_flag "backward"))])
The forward and backward flags are false if the current insn being scheduled
is not a conditional branch.
attr_flag is only used during delay slot scheduling and has no meaning to
other passes of the compiler.
480 GNU Compiler Collection (GCC) Internals
(attr name)
The value of another attribute is returned. This is most useful for numeric
attributes, as eq_attr and attr_flag produce more efficient code for non-
numeric attributes.
The following shows three different ways of representing the same attribute value speci-
fication:
(set_attr "type" "load,store,arith")
(set_attr_alternative "type"
[(const_string "load") (const_string "store")
(const_string "arith")])
(const_string "clobber"))]
(const_string "clobber")))
(define_insn ""
[(set (match_operand:SI 0 "general_operand" "=r,r,m")
(match_operand:SI 1 "general_operand" "r,m,r"))]
""
"@
move %0,%1
load %0,%1
store %0,%1"
[(set_attr "type" "arith,load,store")])
Note that we assume in the above example that arithmetic operations performed on
quantities smaller than a machine word clobber the condition code since they will set the
condition code to a value corresponding to the full-word result.
This macro will normally not be required. A case in which it is required is the
ROMP. On this machine, the size of an addr_vec insn must be increased by
two to compensate for the fact that alignment may be required.
The routine that returns get_attr_length (the value of the length attribute) can be
used by the output routine to determine the form of the branch instruction to be written,
as the example below illustrates.
As an example of the specification of variable-length branches, consider the IBM 360. If
we adopt the convention that a register will be set to the starting address of a function, we
can jump to labels within 4k of the start using a four-byte instruction. Otherwise, we need
a six-byte sequence to load the address from memory and then branch to it.
On such a machine, a pattern for a branch instruction might be specified as follows:
(define_insn "jump"
[(set (pc)
(label_ref (match_operand 0 "" "")))]
""
{
return (get_attr_length (insn) == 4
? "b %l0" : "l r15,=a(%l0); br r15");
}
[(set (attr "length")
(if_then_else (lt (match_dup 0) (const_int 4096))
(const_int 4)
(const_int 6)))])
The default value can be freely chosen as long as it does not collide with any of the
instruction mnemonics. This value will be used whenever the machine description parser is
not able to determine the mnemonic string. This might be the case for output templates
containing more than a single instruction as in "mvcle\t%0,%1,0\;jo\t.-4".
The mnemonic attribute set is not generated automatically if the instruction string is
generated via C code.
An existing mnemonic attribute set in an insn definition will not be overriden by the md
file parser. That way it is possible to manually set the instruction mnemonics for the cases
where the md file parser fails to determine it automatically.
The mnemonic attribute is useful for dealing with instruction specific properties in the
pipeline description without defining additional insn attributes.
(define_attr "ooo_expanded" ""
(cond [(eq_attr "mnemonic" "dlr,dsgr,d,dsgf,stam,dsgfr,dlgr")
(const_int 1)]
(const_int 0)))
Multiple define_delay expressions may be specified. In this case, each such expression
specifies different delay slot requirements and there must be no insn for which tests in two
define_delay expressions are both true.
For example, if we have a machine that requires one delay slot for branches but two for
calls, no delay slot can contain a branch or call insn, and any valid insn in the delay slot
for the branch can be annulled if the branch is true, we might represent this as follows:
(define_delay (eq_attr "type" "branch")
[(eq_attr "type" "!branch,call")
(eq_attr "type" "!branch,call")
(nil)])
a transition from one automaton state to another one. This algorithm is very fast, and
furthermore, its speed is not dependent on processor complexity1 .
The rest of this section describes the directives that constitute an automaton-based pro-
cessor pipeline description. The order of these constructions within the machine description
file is not important.
The following optional construction describes names of automata generated and used
for the pipeline hazards recognition. Sometimes the generated finite state automaton used
by the pipeline hazard recognizer is large. If we use more than one automaton and bind
functional units to the automata, the total size of the automata is usually less than the
size of the single automaton. If there is no one such construction, only one finite state
automaton is generated.
(define_automaton automata-names)
automata-names is a string giving names of the automata. The names are separated by
commas. All the automata should have unique names. The automaton name is used in the
constructions define_cpu_unit and define_query_cpu_unit.
Each processor functional unit used in the description of instruction reservations should
be described by the following construction.
(define_cpu_unit unit-names [automaton-name])
unit-names is a string giving the names of the functional units separated by commas.
Don’t use name ‘nothing’, it is reserved for other goals.
automaton-name is a string giving the name of the automaton with which the unit is
bound. The automaton should be described in construction define_automaton. You should
give automaton-name, if there is a defined automaton.
The assignment of units to automata are constrained by the uses of the units in insn
reservations. The most important constraint is: if a unit reservation is present on a partic-
ular cycle of an alternative for an insn reservation, then some unit from the same automaton
must be present on the same cycle for the other alternatives of the insn reservation. The
rest of the constraints are mentioned in the description of the subsequent constructions.
The following construction describes CPU functional units analogously to define_cpu_
unit. The reservation of such units can be queried for an automaton state. The instruction
scheduler never queries reservation of functional units for given automaton state. So as
a rule, you don’t need this construction. This construction could be used for future code
generation goals (e.g. to generate VLIW insn templates).
(define_query_cpu_unit unit-names [automaton-name])
unit-names is a string giving names of the functional units separated by commas.
automaton-name is a string giving the name of the automaton with which the unit is
bound.
The following construction is the major one to describe pipeline characteristics of an
instruction.
(define_insn_reservation insn-name default_latency
1
However, the size of the automaton depends on processor complexity. To limit this effect, machine
descriptions can split orthogonal parts of the machine description among several automata: but then,
since each of these must be stepped independently, this does cause a small decrease in the algorithm’s
performance.
Chapter 17: Machine Descriptions 487
condition regexp)
default latency is a number giving latency time of the instruction. There is an important
difference between the old description and the automaton based pipeline description. The
latency time is used for all dependencies when we use the old description. In the automa-
ton based pipeline description, the given latency time is only used for true dependencies.
The cost of anti-dependencies is always zero and the cost of output dependencies is the
difference between latency times of the producing and consuming insns (if the difference is
negative, the cost is considered to be zero). You can always change the default costs for
any description by using the target hook TARGET_SCHED_ADJUST_COST (see Section 18.17
[Scheduling], page 610).
insn-name is a string giving the internal name of the insn. The internal names are
used in constructions define_bypass and in the automaton description file generated for
debugging. The internal name has nothing in common with the names in define_insn. It
is a good practice to use insn classes described in the processor manual.
condition defines what RTL insns are described by this construction. You should re-
member that you will be in trouble if condition for two or more different define_insn_
reservation constructions is TRUE for an insn. In this case what reservation will be used
for the insn is not defined. Such cases are not checked during generation of the pipeline haz-
ards recognizer because in general recognizing that two conditions may have the same value
is quite difficult (especially if the conditions contain symbol_ref). It is also not checked
during the pipeline hazard recognizer work because it would slow down the recognizer con-
siderably.
regexp is a string describing the reservation of the cpu’s functional units by the instruc-
tion. The reservations are described by a regular expression according to the following
syntax:
regexp = regexp "," oneof
| oneof
element = cpu_function_unit_name
| reservation_name
| result_name
| "nothing"
| "(" regexp ")"
• ‘,’ is used for describing the start of the next cycle in the reservation.
• ‘|’ is used for describing a reservation described by the first regular expression or a
reservation described by the second regular expression or etc.
• ‘+’ is used for describing a reservation described by the first regular expression and a
reservation described by the second regular expression and etc.
• ‘*’ is used for convenience and simply means a sequence in which the regular expression
are repeated number times with cycle advancing (see ‘,’).
488 GNU Compiler Collection (GCC) Internals
The second construction (‘presence_set’) means that each functional unit in the first
string cannot be reserved unless at least one of pattern of units whose names are in the
second string is reserved. This is an asymmetric relation. For example, it is useful for
description that VLIW ‘slot1’ is reserved after ‘slot0’ reservation. We could describe it
by the following construction
(presence_set "slot1" "slot0")
Or ‘slot1’ is reserved only after ‘slot0’ and unit ‘b0’ reservation. In this case we could
write
(presence_set "slot1" "slot0 b0")
The third construction (‘final_presence_set’) is analogous to ‘presence_set’. The
difference between them is when checking is done. When an instruction is issued in given
automaton state reflecting all current and planned unit reservations, the automaton state
is changed. The first state is a source state, the second one is a result state. Checking for
‘presence_set’ is done on the source state reservation, checking for ‘final_presence_set’
is done on the result reservation. This construction is useful to describe a reservation which
is actually two subsequent reservations. For example, if we use
(presence_set "slot1" "slot0")
the following insn will be never issued (because ‘slot1’ requires ‘slot0’ which is absent
in the source state).
(define_reservation "insn_and_nop" "slot0 + slot1")
but it can be issued if we use analogous ‘final_presence_set’.
The forth construction (‘absence_set’) means that each functional unit in the first string
can be reserved only if each pattern of units whose names are in the second string is not
reserved. This is an asymmetric relation (actually ‘exclusion_set’ is analogous to this
one but it is symmetric). For example it might be useful in a VLIW description to say that
‘slot0’ cannot be reserved after either ‘slot1’ or ‘slot2’ have been reserved. This can be
described as:
(absence_set "slot0" "slot1, slot2")
Or ‘slot2’ cannot be reserved if ‘slot0’ and unit ‘b0’ are reserved or ‘slot1’ and unit
‘b1’ are reserved. In this case we could write
(absence_set "slot2" "slot0 b0, slot1 b1")
All functional units mentioned in a set should belong to the same automaton.
The last construction (‘final_absence_set’) is analogous to ‘absence_set’ but checking
is done on the result (state) reservation. See comments for ‘final_presence_set’.
You can control the generator of the pipeline hazard recognizer with the following con-
struction.
(automata_option options)
options is a string giving options which affect the generated code. Currently there are
the following options:
• no-minimization makes no minimization of the automaton. This is only worth to do
when we are debugging the description and need to look more accurately at reservations
of states.
• time means printing time statistics about the generation of automata.
490 GNU Compiler Collection (GCC) Internals
• stats means printing statistics about the generated automata such as the number of
DFA states, NDFA states and arcs.
• v means a generation of the file describing the result automata. The file has suffix
‘.dfa’ and can be used for the description verification and debugging.
• w means a generation of warning instead of error for non-critical errors.
• no-comb-vect prevents the automaton generator from generating two data structures
and comparing them for space efficiency. Using a comb vector to represent transitions
may be better, but it can be very expensive to construct. This option is useful if the
build process spends an unacceptably long time in genautomata.
• ndfa makes nondeterministic finite state automata. This affects the treatment of op-
erator ‘|’ in the regular expressions. The usual treatment of the operator is to try the
first alternative and, if the reservation is not possible, the second alternative. The non-
deterministic treatment means trying all alternatives, some of them may be rejected
by reservations in the subsequent insns.
• collapse-ndfa modifies the behavior of the generator when producing an automaton. An
additional state transition to collapse a nondeterministic NDFA state to a deterministic
DFA state is generated. It can be triggered by passing const0_rtx to state transition.
In such an automaton, cycle advance transitions are available only for these collapsed
states. This option is useful for ports that want to use the ndfa option, but also want
to use define_query_cpu_unit to assign units to insns issued in a cycle.
• progress means output of a progress bar showing how many states were generated so
far for automaton being processed. This is useful during debugging a DFA description.
If you see too many generated states, you could interrupt the generator of the pipeline
hazard recognizer and try to figure out a reason for generation of the huge automaton.
As an example, consider a superscalar RISC machine which can issue three insns (two
integer insns and one floating point insn) on the cycle but can finish only two insns. To
describe this, we define the following functional units.
(define_cpu_unit "i0_pipeline, i1_pipeline, f_pipeline")
(define_cpu_unit "port0, port1")
All simple integer insns can be executed in any integer pipeline and their result is ready
in two cycles. The simple integer insns are issued into the first pipeline unless it is reserved,
otherwise they are issued into the second pipeline. Integer division and multiplication insns
can be executed only in the second integer pipeline and their results are ready correspond-
ingly in 9 and 4 cycles. The integer division is not pipelined, i.e. the subsequent integer
division insn cannot be issued until the current division insn finished. Floating point insns
are fully pipelined and their results are ready in 3 cycles. Where the result of a floating point
insn is used by an integer insn, an additional delay of one cycle is incurred. To describe all
of this we could specify
(define_cpu_unit "div")
For each define_insn for which the predicable attribute is true, a new define_insn
pattern will be generated that matches a predicated version of the instruction. For example,
(define_insn "addsi"
[(set (match_operand:SI 0 "register_operand" "r")
(plus:SI (match_operand:SI 1 "register_operand" "r")
(match_operand:SI 2 "register_operand" "r")))]
"test1"
"add %2,%1,%0")
(define_cond_exec
[(ne (match_operand:CC 0 "register_operand" "c")
(const_int 0))]
"test2"
"(%0)")
generates a new pattern
(define_insn ""
[(cond_exec
(ne (match_operand:CC 3 "register_operand" "c") (const_int 0))
(set (match_operand:SI 0 "register_operand" "r")
(plus:SI (match_operand:SI 1 "register_operand" "r")
(match_operand:SI 2 "register_operand" "r"))))]
"(test2) && (test1)"
"(%3) add %2,%1,%0")
[...])
(define_insn "maxsi_clobber"
[(set (match_operand:SI 0 "register_operand" "=r")
(max:SI
(match_operand:SI 1 "register_operand" "r")
(match_operand:SI 2 "register_operand" "r")))
(clobber (reg:CC FLAGS_REG))]
""
"max\t{%2, %1, %0|%0, %1, %2}"
[...])
(define_insn ""
[(match_parallel 0 "load_multiple_operation"
[(set (match_operand:SI 1 "gpc_reg_operand" "=r")
(match_operand:SI 2 "memory_operand" "m"))
(use (reg:SI R_CR))
(clobber (reg:SI R_CR))])]
""
"loadm 0,0,%1,%2")
The constants that are defined with a define constant are also output in the insn-codes.h
header file as #defines.
You can also use the machine description file to define enumerations. Like the constants
defined by define_constant, these enumerations are visible to both the machine description
file and the main C code.
The syntax is as follows:
(define_c_enum "name" [
value0
value1
(value32 32)
value33
496 GNU Compiler Collection (GCC) Internals
...
valuen
])
This definition causes the equivalent of the following C code to appear in
insn-constants.h:
enum name {
value0 = 0,
value1 = 1,
value32 = 32,
value33 = 33,
...
valuen = n
};
#define NUM_cname_VALUES (n + 1)
where cname is the capitalized form of name. It also makes each valuei available in the
machine description file, just as if it had been declared with:
(define_constants [(valuei i)])
Each valuei is usually an upper-case identifier and usually begins with cname.
You can split the enumeration definition into as many statements as you like. The above
example is directly equivalent to:
(define_c_enum "name" [value0])
(define_c_enum "name" [value1])
...
(define_c_enum "name" [valuen])
Splitting the enumeration helps to improve the modularity of each individual .md file.
For example, if a port defines its synchronization instructions in a separate sync.md file,
it is convenient to define all synchronization-specific enumeration values in sync.md rather
than in the main .md file.
Some enumeration names have special significance to GCC:
unspecv If an enumeration called unspecv is defined, GCC will use it when printing out
unspec_volatile expressions. For example:
(define_c_enum "unspecv" [
UNSPECV_BLOCKAGE
])
causes GCC to print ‘(unspec_volatile ... 0)’ as:
(unspec_volatile ... UNSPECV_BLOCKAGE)
unspec If an enumeration called unspec is defined, GCC will use it when printing out
unspec expressions. GCC will also use it when printing out unspec_volatile
expressions unless an unspecv enumeration is also defined. You can therefore
decide whether to keep separate enumerations for volatile and non-volatile ex-
pressions or whether to use the same enumeration for both.
Another way of defining an enumeration is to use define_enum:
(define_enum "name" [
value0
value1
...
valuen
])
Chapter 17: Machine Descriptions 497
where cvaluei is the capitalized form of valuei. However, unlike define_c_enum, the
enumerations defined by define_enum can be used in attribute specifications (see [de-
fine enum attr], page 477).
17.23 Iterators
Ports often need to define similar patterns for more than one machine mode or for more
than one rtx code. GCC provides some simple iterator facilities to make this process easier.
(define_insn "subdi3"
[(set (match_operand:DI 0 "register_operand" "=d")
(minus:DI (match_operand:DI 1 "register_operand" "d")
(match_operand:DI 2 "register_operand" "d")))]
"TARGET_64BIT"
"dsubu\t%0,%1,%2"
[(set_attr "type" "arith")
(set_attr "mode" "DI")])
(define_expand "b<code>"
[(set (pc)
(if_then_else (any_cond:CC (cc0)
(const_int 0))
(label_ref (match_operand 0 ""))
(pc)))]
""
{
gen_conditional_branch (operands, <CODE>);
DONE;
})
(define_expand "bordered"
[(set (pc)
(if_then_else (ordered:CC (cc0)
(const_int 0))
(label_ref (match_operand 0 ""))
(pc)))]
""
{
gen_conditional_branch (operands, ORDERED);
DONE;
})
...
defines a pseudo integer constant name that can be instantiated as inti if condition
condi is true. Each int must have the same rtx format. See Section 14.2 [RTL Classes],
page 272. Int iterators can appear in only those rtx fields that have ’i’, ’n’, ’w’, or ’p’ as
the specifier. This means that each int has to be a constant defined using define constant
or define c enum.
As with mode and code iterators, each pattern that uses name will be expanded n times,
once with all uses of name replaced by int1, once with all uses replaced by int2, and so on.
See Section 17.23.1.1 [Defining Mode Iterators], page 497.
Chapter 17: Machine Descriptions 501
It is possible to define attributes for ints as well as for codes and modes. Attributes are
defined using:
(define_int_attr name [(int1 "value1") ... (intn "valuen")])
Here’s an example of int iterators in action, taken from the ARM port:
(define_int_iterator QABSNEG [UNSPEC_VQABS UNSPEC_VQNEG])
(define_insn "neon_vq<absneg><mode>"
[(set (match_operand:VDQIW 0 "s_register_operand" "=w")
(unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w")
(match_operand:SI 2 "immediate_operand" "i")]
QABSNEG))]
"TARGET_NEON"
"vq<absneg>.<V_s_elem>\t%<V_reg>0, %<V_reg>1"
[(set_attr "type" "neon_vqneg_vqabs")]
)
(define_insn "neon_vqneg<mode>"
[(set (match_operand:VDQIW 0 "s_register_operand" "=w")
(unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w")
(match_operand:SI 2 "immediate_operand" "i")]
UNSPEC_VQNEG))]
"TARGET_NEON"
"vqneg.<V_s_elem>\t%<V_reg>0, %<V_reg>1"
[(set_attr "type" "neon_vqneg_vqabs")]
)
(define_insn "neon_vq<absneg><mode>"
[(set (match_operand:VDQIW 0 "s_register_operand" "=w")
(unspec:VDQIW [(match_operand:VDQIW 1 "s_register_operand" "w")
(match_operand:SI 2 "immediate_operand" "i")]
QABSNEG))]
...
)
A port might need to generate this pattern for a variable ‘QABSNEG’ value and a variable
‘VDQIW’ mode. There are two ways of doing this. The first is to build the rtx for the pattern
directly from C++ code; this is a valid technique and avoids any risk of combinatorial
explosion. The second is to prefix the instruction name with the special character ‘@’,
which tells GCC to generate the four additional functions below. In each case, name is the
name of the instruction without the leading ‘@’ character, without the ‘<...>’ placeholders,
and with any underscore before a ‘<...>’ placeholder removed if keeping it would lead to a
double or trailing underscore.
‘insn_code maybe_code_for_name (i1, i2, ...)’
See whether replacing the first ‘<...>’ placeholder with iterator value i1, the
second with iterator value i2, and so on, gives a valid instruction. Return its
code if so, otherwise return CODE_FOR_nothing.
‘insn_code code_for_name (i1, i2, ...)’
Same, but abort the compiler if the requested instruction does not exist.
‘rtx maybe_gen_name (i1, i2, ..., op0, op1, ...)’
Check for a valid instruction in the same way as maybe_code_for_name. If the
instruction exists, generate an instance of it using the operand values given by
op0, op1, and so on, otherwise return null.
Chapter 17: Machine Descriptions 503
(define_insn "@some_arithmetic_op<mode>"
[(set (match_operand:FLOAT_MODES 0 "register_operand") ...)]
...
)
would produce a single set of functions that handles both INTEGER_MODES and FLOAT_
MODES.
It is also possible for these ‘@’ patterns to have different numbers of operands from each
other. For example, patterns with a binary rtl code might take three operands (one output
and two inputs) while patterns with a ternary rtl code might take four operands (one
output and three inputs). This combination would produce separate ‘maybe_gen_name’
and ‘gen_name’ functions for each operand count, but it would still produce a single
‘maybe_code_for_name’ and a single ‘code_for_name’.
505
#undef TARGET_COMP_TYPE_ATTRIBUTES
#define TARGET_COMP_TYPE_ATTRIBUTES machine_comp_type_attributes
Where a macro should be defined in the .c file in this manner to form part of the targetm
structure, it is documented below as a “Target Hook” with a prototype. Many macros will
change in future from being defined in the .h file to being part of the targetm structure.
Similarly, there is a targetcm variable for hooks that are specific to front ends for C-family
languages, documented as “C Target Hook”. This is declared in c-family/c-target.h,
the initializer TARGETCM_INITIALIZER in c-family/c-target-def.h. If targets initialize
targetcm themselves, they should set target_has_targetcm=yes in config.gcc; otherwise
a default definition is used.
Similarly, there is a targetm_common variable for hooks that are shared between the
compiler driver and the compilers proper, documented as “Common Target Hook”. This
is declared in common/common-target.h, the initializer TARGETM_COMMON_INITIALIZER
in common/common-target-def.h. If targets initialize targetm_common themselves,
they should set target_has_targetm_common=yes in config.gcc; otherwise a default
definition is used.
Similarly, there is a targetdm variable for hooks that are specific to the D language front
end, documented as “D Target Hook”. This is declared in d/d-target.h, the initializer
TARGETDM_INITIALIZER in d/d-target-def.h. If targets initialize targetdm themselves,
506 GNU Compiler Collection (GCC) Internals
CC1PLUS_SPEC [Macro]
A C string constant that tells the GCC driver program options to pass to cc1plus.
It can also specify how to translate options you give to GCC into options for GCC to
pass to the cc1plus.
Do not define this macro if it does not need to do anything. Note that everything
defined in CC1 SPEC is already passed to cc1plus so there is no need to duplicate
the contents of CC1 SPEC in CC1PLUS SPEC.
ASM_SPEC [Macro]
A C string constant that tells the GCC driver program options to pass to the assem-
bler. It can also specify how to translate options you give to GCC into options for
GCC to pass to the assembler. See the file sun3.h for an example of this.
Do not define this macro if it does not need to do anything.
ASM_FINAL_SPEC [Macro]
A C string constant that tells the GCC driver program how to run any programs
which cleanup after the normal assembler. Normally, this is not needed. See the file
mips.h for an example of this.
Do not define this macro if it does not need to do anything.
AS_NEEDS_DASH_FOR_PIPED_INPUT [Macro]
Define this macro, with no value, if the driver should give the assembler an argument
consisting of a single dash, -, to instruct it to read from its standard input (which
will be a pipe connected to the output of the compiler proper). This argument is
given after any -o option specifying the name of the output file.
If you do not define this macro, the assembler is assumed to read its standard input
if given no non-option arguments. If your assembler cannot read standard input at
all, use a ‘%{pipe:%e}’ construct; see mips.h for instance.
LINK_SPEC [Macro]
A C string constant that tells the GCC driver program options to pass to the linker.
It can also specify how to translate options you give to GCC into options for GCC to
pass to the linker.
Do not define this macro if it does not need to do anything.
LIB_SPEC [Macro]
Another C string constant used much like LINK_SPEC. The difference between the
two is that LIB_SPEC is used at the end of the command given to the linker.
If this macro is not defined, a default is provided that loads the standard C library
from the usual place. See gcc.cc.
LIBGCC_SPEC [Macro]
Another C string constant that tells the GCC driver program how and when to place
a reference to libgcc.a into the linker command line. This constant is placed both
before and after the value of LIB_SPEC.
If this macro is not defined, the GCC driver provides a default that passes the string
-lgcc to the linker.
508 GNU Compiler Collection (GCC) Internals
REAL_LIBGCC_SPEC [Macro]
By default, if ENABLE_SHARED_LIBGCC is defined, the LIBGCC_SPEC is not directly
used by the driver program but is instead modified to refer to different versions of
libgcc.a depending on the values of the command line flags -static, -shared,
-static-libgcc, and -shared-libgcc. On targets where these modifications are
inappropriate, define REAL_LIBGCC_SPEC instead. REAL_LIBGCC_SPEC tells the driver
how to place a reference to libgcc on the link command line, but, unlike LIBGCC_
SPEC, it is used unmodified.
USE_LD_AS_NEEDED [Macro]
A macro that controls the modifications to LIBGCC_SPEC mentioned in REAL_LIBGCC_
SPEC. If nonzero, a spec will be generated that uses --as-needed or equivalent options
and the shared libgcc in place of the static exception handler library, when linking
without any of -static, -static-libgcc, or -shared-libgcc.
LINK_EH_SPEC [Macro]
If defined, this C string constant is added to LINK_SPEC. When USE_LD_AS_NEEDED
is zero or undefined, it also affects the modifications to LIBGCC_SPEC mentioned in
REAL_LIBGCC_SPEC.
STARTFILE_SPEC [Macro]
Another C string constant used much like LINK_SPEC. The difference between the
two is that STARTFILE_SPEC is used at the very beginning of the command given to
the linker.
If this macro is not defined, a default is provided that loads the standard C startup
file from the usual place. See gcc.cc.
ENDFILE_SPEC [Macro]
Another C string constant used much like LINK_SPEC. The difference between the
two is that ENDFILE_SPEC is used at the very end of the command given to the linker.
Do not define this macro if it does not need to do anything.
THREAD_MODEL_SPEC [Macro]
GCC -v will print the thread model GCC was configured to use. However, this doesn’t
work on platforms that are multilibbed on thread models, such as AIX 4.3. On such
platforms, define THREAD_MODEL_SPEC such that it evaluates to a string without blanks
that names one of the recognized thread models. %*, the default value of this macro,
will expand to the value of thread_file set in config.gcc.
SYSROOT_SUFFIX_SPEC [Macro]
Define this macro to add a suffix to the target sysroot when GCC is configured with
a sysroot. This will cause GCC to search for usr/lib, et al, within sysroot+suffix.
SYSROOT_HEADERS_SUFFIX_SPEC [Macro]
Define this macro to add a headers suffix to the target sysroot when GCC is configured
with a sysroot. This will cause GCC to pass the updated sysroot+headers suffix to
CPP, causing it to search for usr/include, et al, within sysroot+headers suffix.
Chapter 18: Target Description Macros and Functions 509
EXTRA_SPECS [Macro]
Define this macro to provide additional specifications to put in the specs file that
can be used in various specifications like CC1_SPEC.
The definition should be an initializer for an array of structures, containing a string
constant, that defines the specification name, and a string constant that provides the
specification.
Do not define this macro if it does not need to do anything.
EXTRA_SPECS is useful when an architecture contains several related targets, which
have various ..._SPECS which are similar to each other, and the maintainer would
like one central place to keep these definitions.
For example, the PowerPC System V.4 targets use EXTRA_SPECS to define either _
CALL_SYSV when the System V calling sequence is used or _CALL_AIX when the older
AIX-based calling sequence is used.
The config/rs6000/rs6000.h target file defines:
#define EXTRA_SPECS \
{ "cpp_sysv_default", CPP_SYSV_DEFAULT },
#undef CPP_SYSV_DEFAULT
#define CPP_SYSV_DEFAULT "-D_CALL_SYSV"
while the config/rs6000/eabiaix.h target file defines CPP_SYSV_DEFAULT as:
#undef CPP_SYSV_DEFAULT
#define CPP_SYSV_DEFAULT "-D_CALL_AIX"
LINK_LIBGCC_SPECIAL_1 [Macro]
Define this macro if the driver program should find the library libgcc.a. If you do
not define this macro, the driver program will pass the argument -lgcc to tell the
linker to do the search.
LINK_GCC_C_SEQUENCE_SPEC [Macro]
The sequence in which libgcc and libc are specified to the linker. By default this is
%G %L %G.
POST_LINK_SPEC [Macro]
Define this macro to add additional steps to be executed after linker. The default
value of this macro is empty string.
LINK_COMMAND_SPEC [Macro]
A C string constant giving the complete command line need to execute the linker.
When you do this, you will need to update your port each time a change is made to
the link command line within gcc.cc. Therefore, define this macro only if you need
510 GNU Compiler Collection (GCC) Internals
to completely redefine the command line for invoking the linker and there is no other
way to accomplish the effect you need. Overriding this macro may be avoidable by
overriding LINK_GCC_C_SEQUENCE_SPEC instead.
MULTILIB_DEFAULTS [Macro]
Define this macro as a C expression for the initializer of an array of string to tell the
driver program which options are defaults for this target and thus do not need to be
handled specially when using MULTILIB_OPTIONS.
Do not define this macro if MULTILIB_OPTIONS is not defined in the target makefile
fragment or if none of the options listed in MULTILIB_OPTIONS are set by default. See
Section 20.1 [Target Fragment], page 695.
RELATIVE_PREFIX_NOT_LINKDIR [Macro]
Define this macro to tell gcc that it should only translate a -B prefix into a -L linker
option if the prefix indicates an absolute file name.
MD_EXEC_PREFIX [Macro]
If defined, this macro is an additional prefix to try after STANDARD_EXEC_PREFIX.
MD_EXEC_PREFIX is not searched when the compiler is built as a cross compiler. If
you define MD_EXEC_PREFIX, then be sure to add it to the list of directories used to
find the assembler in configure.ac.
STANDARD_STARTFILE_PREFIX [Macro]
Define this macro as a C string constant if you wish to override the standard choice
of libdir as the default prefix to try when searching for startup files such as crt0.o.
STANDARD_STARTFILE_PREFIX is not searched when the compiler is built as a cross
compiler.
STANDARD_STARTFILE_PREFIX_1 [Macro]
Define this macro as a C string constant if you wish to override the standard choice of
/lib as a prefix to try after the default prefix when searching for startup files such as
crt0.o. STANDARD_STARTFILE_PREFIX_1 is not searched when the compiler is built
as a cross compiler.
STANDARD_STARTFILE_PREFIX_2 [Macro]
Define this macro as a C string constant if you wish to override the standard choice of
/lib as yet another prefix to try after the default prefix when searching for startup files
such as crt0.o. STANDARD_STARTFILE_PREFIX_2 is not searched when the compiler
is built as a cross compiler.
MD_STARTFILE_PREFIX [Macro]
If defined, this macro supplies an additional prefix to try after the standard prefixes.
MD_EXEC_PREFIX is not searched when the compiler is built as a cross compiler.
Chapter 18: Target Description Macros and Functions 511
MD_STARTFILE_PREFIX_1 [Macro]
If defined, this macro supplies yet another prefix to try after the standard prefixes.
It is not searched when the compiler is built as a cross compiler.
INIT_ENVIRONMENT [Macro]
Define this macro as a C string constant if you wish to set environment variables for
programs called by the driver, such as the assembler and loader. The driver passes
the value of this macro to putenv to initialize the necessary environment variables.
LOCAL_INCLUDE_DIR [Macro]
Define this macro as a C string constant if you wish to override the standard choice of
/usr/local/include as the default prefix to try when searching for local header files.
LOCAL_INCLUDE_DIR comes before NATIVE_SYSTEM_HEADER_DIR (set in config.gcc,
normally /usr/include) in the search order.
Cross compilers do not search either /usr/local/include or its replacement.
NATIVE_SYSTEM_HEADER_COMPONENT [Macro]
The “component” corresponding to NATIVE_SYSTEM_HEADER_DIR. See INCLUDE_
DEFAULTS, below, for the description of components. If you do not define this macro,
no component is used.
INCLUDE_DEFAULTS [Macro]
Define this macro if you wish to override the entire default search path for include
files. For a native compiler, the default search path usually consists of GCC_INCLUDE_
DIR, LOCAL_INCLUDE_DIR, GPLUSPLUS_INCLUDE_DIR, and NATIVE_SYSTEM_HEADER_
DIR. In addition, GPLUSPLUS_INCLUDE_DIR and GCC_INCLUDE_DIR are defined au-
tomatically by Makefile, and specify private search areas for GCC. The directory
GPLUSPLUS_INCLUDE_DIR is used only for C++ programs.
The definition should be an initializer for an array of structures. Each array element
should have four elements: the directory name (a string constant), the component
name (also a string constant), a flag for C++-only directories, and a flag showing that
the includes in the directory don’t need to be wrapped in extern ‘C’ when compiling
C++. Mark the end of the array with a null element.
The component name denotes what GNU package the include file is part of, if any,
in all uppercase letters. For example, it might be ‘GCC’ or ‘BINUTILS’. If the package
is part of a vendor-supplied operating system, code the component name as ‘0’.
For example, here is the definition used for VAX/VMS:
#define INCLUDE_DEFAULTS \
{ \
{ "GNU_GXX_INCLUDE:", "G++", 1, 1}, \
{ "GNU_CC_INCLUDE:", "GCC", 0, 0}, \
{ "SYS$SYSROOT:[SYSLIB.]", 0, 0, 0}, \
{ ".", 0, 0, 0}, \
{ 0, 0, 0, 0} \
}
2. The environment variable GCC_EXEC_PREFIX or, if GCC_EXEC_PREFIX is not set and the
compiler has not been installed in the configure-time prefix, the location in which the
compiler has actually been installed.
3. The directories specified by the environment variable COMPILER_PATH.
4. The macro STANDARD_EXEC_PREFIX, if the compiler has been installed in the configured-
time prefix.
5. The location /usr/libexec/gcc/, but only if this is a native compiler.
6. The location /usr/lib/gcc/, but only if this is a native compiler.
7. The macro MD_EXEC_PREFIX, if defined, but only if this is a native compiler.
Here is the order of prefixes tried for startfiles:
1. Any prefixes specified by the user with -B.
2. The environment variable GCC_EXEC_PREFIX or its automatically determined value
based on the installed toolchain location.
3. The directories specified by the environment variable LIBRARY_PATH (or port-specific
name; native only, cross compilers do not use this).
4. The macro STANDARD_EXEC_PREFIX, but only if the toolchain is installed in the config-
ured prefix or this is a native compiler.
5. The location /usr/lib/gcc/, but only if this is a native compiler.
6. The macro MD_EXEC_PREFIX, if defined, but only if this is a native compiler.
7. The macro MD_STARTFILE_PREFIX, if defined, but only if this is a native compiler, or
we have a target system root.
8. The macro MD_STARTFILE_PREFIX_1, if defined, but only if this is a native compiler,
or we have a target system root.
9. The macro STANDARD_STARTFILE_PREFIX, with any sysroot modifications. If this path
is relative it will be prefixed by GCC_EXEC_PREFIX and the machine suffix or STANDARD_
EXEC_PREFIX and the machine suffix.
10. The macro STANDARD_STARTFILE_PREFIX_1, but only if this is a native compiler, or
we have a target system root. The default for this macro is /lib/.
11. The macro STANDARD_STARTFILE_PREFIX_2, but only if this is a native compiler, or
we have a target system root. The default for this macro is /usr/lib/.
TARGET_OS_CPP_BUILTINS () [Macro]
Similarly to TARGET_CPU_CPP_BUILTINS but this macro is optional and is used for
the target operating system instead.
TARGET_OBJFMT_CPP_BUILTINS () [Macro]
Similarly to TARGET_CPU_CPP_BUILTINS but this macro is optional and is used for the
target object format. elfos.h uses this macro to define __ELF__, so you probably do
not need to define it yourself.
C_COMMON_OVERRIDE_OPTIONS [Macro]
This is similar to the TARGET_OPTION_OVERRIDE hook but is only used in the C lan-
guage frontends (C, Objective-C, C++, Objective-C++) and so can be used to alter
option flag variables which only exist in those frontends.
Chapter 18: Target Description Macros and Functions 515
instructions, then this must still be defined, but it doesn’t matter which value it is
defined to. This macro need not be a constant.
This macro does not affect the way structure fields are packed into bytes or words;
that is controlled by BYTES_BIG_ENDIAN.
BYTES_BIG_ENDIAN [Macro]
Define this macro to have the value 1 if the most significant byte in a word has the
lowest number. This macro need not be a constant.
WORDS_BIG_ENDIAN [Macro]
Define this macro to have the value 1 if, in a multiword object, the most significant
word has the lowest number. This applies to both memory locations and registers;
see REG_WORDS_BIG_ENDIAN if the order of words in memory is not the same as the
order in registers. This macro need not be a constant.
REG_WORDS_BIG_ENDIAN [Macro]
On some machines, the order of words in a multiword object differs between registers
in memory. In such a situation, define this macro to describe the order of words in a
register. The macro WORDS_BIG_ENDIAN controls the order of words in memory.
FLOAT_WORDS_BIG_ENDIAN [Macro]
Define this macro to have the value 1 if DFmode, XFmode or TFmode floating point
numbers are stored in memory with the word containing the sign bit at the lowest
address; otherwise define it to have the value 0. This macro need not be a constant.
You need not define this macro if the ordering is the same as for multi-word integers.
BITS_PER_WORD [Macro]
Number of bits in a word. If you do not define this macro, the default is BITS_PER_
UNIT * UNITS_PER_WORD.
MAX_BITS_PER_WORD [Macro]
Maximum number of bits in a word. If this is undefined, the default is BITS_PER_
WORD. Otherwise, it is the constant value that is the largest value that BITS_PER_WORD
can have at run-time.
UNITS_PER_WORD [Macro]
Number of storage units in a word; normally the size of a general-purpose register, a
power of two from 1 or 8.
MIN_UNITS_PER_WORD [Macro]
Minimum number of units in a word. If this is undefined, the default is UNITS_PER_
WORD. Otherwise, it is the constant value that is the smallest value that UNITS_PER_
WORD can have at run-time.
POINTER_SIZE [Macro]
Width of a pointer, in bits. You must specify a value no wider than the width of
Pmode. If it is not equal to the width of Pmode, you must define POINTERS_EXTEND_
UNSIGNED. If you do not specify a value the default is BITS_PER_WORD.
518 GNU Compiler Collection (GCC) Internals
POINTERS_EXTEND_UNSIGNED [Macro]
A C expression that determines how pointers should be extended from ptr_mode to
either Pmode or word_mode. It is greater than zero if pointers should be zero-extended,
zero if they should be sign-extended, and negative if some other sort of conversion is
needed. In the last case, the extension is done by the target’s ptr_extend instruction.
You need not define this macro if the ptr_mode, Pmode and word_mode are all the
same width.
PROMOTE_MODE (m, unsignedp, type) [Macro]
A macro to update m and unsignedp when an object whose type is type and which
has the specified mode and signedness is to be stored in a register. This macro is only
called when type is a scalar type.
On most RISC machines, which only have operations that operate on a full register,
define this macro to set m to word_mode if m is an integer mode narrower than
BITS_PER_WORD. In most cases, only integer modes should be widened because wider-
precision floating-point operations are usually more expensive than their narrower
counterparts.
For most machines, the macro definition does not change unsignedp. However, some
machines, have instructions that preferentially handle either signed or unsigned quan-
tities of certain modes. For example, on the DEC Alpha, 32-bit loads from memory
and 32-bit add instructions sign-extend the result to 64 bits. On such machines, set
unsignedp according to which kind of extension is more efficient.
Do not define this macro if it would never modify m.
enum flt_eval_method TARGET_C_EXCESS_PRECISION (enum [Target Hook]
excess_precision_type type)
Return a value, with the same meaning as the C99 macro FLT_EVAL_
METHOD that describes which excess precision should be applied. type is
either EXCESS_PRECISION_TYPE_IMPLICIT, EXCESS_PRECISION_TYPE_FAST,
EXCESS_PRECISION_TYPE_STANDARD, or EXCESS_PRECISION_TYPE_FLOAT16. For
EXCESS_PRECISION_TYPE_IMPLICIT, the target should return which precision and
range operations will be implictly evaluated in regardless of the excess precision
explicitly added. For EXCESS_PRECISION_TYPE_STANDARD, EXCESS_PRECISION_
TYPE_FLOAT16, and EXCESS_PRECISION_TYPE_FAST, the target should return
the explicit excess precision that should be added depending on the value set
for -fexcess-precision=[standard|fast|16]. Note that unpredictable explicit
excess precision does not make sense, so a target should never return FLT_
EVAL_METHOD_UNPREDICTABLE when type is EXCESS_PRECISION_TYPE_STANDARD,
EXCESS_PRECISION_TYPE_FLOAT16 or EXCESS_PRECISION_TYPE_FAST.
Return a value, with the same meaning as the C99 macro FLT_EVAL_METHOD that describes
which excess precision should be applied.
machine_mode TARGET_PROMOTE_FUNCTION_MODE (const_tree [Target Hook]
type, machine_mode mode, int *punsignedp, const_tree
funtype, int for_return)
Like PROMOTE_MODE, but it is applied to outgoing function arguments or function
return values. The target hook should return the new mode and possibly change
Chapter 18: Target Description Macros and Functions 519
*punsignedp if the promotion should change signedness. This function is called only
for scalar or pointer types.
for return allows to distinguish the promotion of arguments and return values. If it
is 1, a return value is being promoted and TARGET_FUNCTION_VALUE must perform
the same promotions done here. If it is 2, the returned mode should be that of the
register in which an incoming parameter is copied, or the outgoing result is computed;
then the hook should return the same mode as promote_mode, though the signedness
may be different.
type can be NULL when promoting function arguments of libcalls.
The default is to not promote arguments and return values. You can also define
the hook to default_promote_function_mode_always_promote if you would like to
apply the same rules given by PROMOTE_MODE.
PARM_BOUNDARY [Macro]
Normal alignment required for function parameters on the stack, in bits. All stack
parameters receive at least this much alignment regardless of data type. On most
machines, this is the same as the size of an integer.
STACK_BOUNDARY [Macro]
Define this macro to the minimum alignment enforced by hardware for the stack
pointer on this machine. The definition is a C expression for the desired alignment
(measured in bits). This value is used as a default if PREFERRED_STACK_BOUNDARY is
not defined. On most machines, this should be the same as PARM_BOUNDARY.
PREFERRED_STACK_BOUNDARY [Macro]
Define this macro if you wish to preserve a certain alignment for the stack pointer,
greater than what the hardware enforces. The definition is a C expression for the
desired alignment (measured in bits). This macro must evaluate to a value equal to
or larger than STACK_BOUNDARY.
INCOMING_STACK_BOUNDARY [Macro]
Define this macro if the incoming stack boundary may be different from PREFERRED_
STACK_BOUNDARY. This macro must evaluate to a value equal to or larger than STACK_
BOUNDARY.
FUNCTION_BOUNDARY [Macro]
Alignment required for a function entry point, in bits.
BIGGEST_ALIGNMENT [Macro]
Biggest alignment that any data type can require on this machine, in bits. Note that
this is not the biggest alignment that is supported, just the biggest alignment that,
when violated, may cause a fault.
HOST_WIDE_INT TARGET_ABSOLUTE_BIGGEST_ALIGNMENT [Target Hook]
If defined, this target hook specifies the absolute biggest alignment that a type or
variable can have on this machine, otherwise, BIGGEST_ALIGNMENT is used.
MALLOC_ABI_ALIGNMENT [Macro]
Alignment, in bits, a C conformant malloc implementation has to provide. If not
defined, the default value is BITS_PER_WORD.
520 GNU Compiler Collection (GCC) Internals
ATTRIBUTE_ALIGNED_VALUE [Macro]
Alignment used by the __attribute__ ((aligned)) construct. If not defined, the
default value is BIGGEST_ALIGNMENT.
MINIMUM_ATOMIC_ALIGNMENT [Macro]
If defined, the smallest alignment, in bits, that can be given to an object that can
be referenced in one operation, without disturbing any nearby object. Normally, this
is BITS_PER_UNIT, but may be larger on machines that don’t have byte or half-word
store operations.
BIGGEST_FIELD_ALIGNMENT [Macro]
Biggest alignment that any structure or union field can require on this machine,
in bits. If defined, this overrides BIGGEST_ALIGNMENT for structure and union fields
only, unless the field alignment has been set by the __attribute__ ((aligned (n)))
construct.
MAX_STACK_ALIGNMENT [Macro]
Biggest stack alignment guaranteed by the backend. Use this macro to specify the
maximum alignment of a variable on stack.
If not defined, the default value is STACK_BOUNDARY.
MAX_OFILE_ALIGNMENT [Macro]
Biggest alignment supported by the object file format of this machine. Use this macro
to limit the alignment which can be specified using the __attribute__ ((aligned
(n))) construct for functions and objects with static storage duration. The alignment
of automatic objects may exceed the object file format maximum up to the maximum
supported by GCC. If not defined, the default value is BIGGEST_ALIGNMENT.
On systems that use ELF, the default (in config/elfos.h) is the largest supported
32-bit ELF section alignment representable on a 32-bit host e.g. ‘(((uint64_t) 1
<< 28) * 8)’. On 32-bit ELF the largest supported section alignment in bits is
‘(0x80000000 * 8)’, but this is not representable on 32-bit hosts.
If this macro is not defined, then basic-align is used when type is NULL. Otherwise,
LOCAL_ALIGNMENT will be used.
This macro is to set alignment of stack slot to the maximum alignment of all possible
modes which the slot may have.
If the value of this macro has a type, it should be an unsigned type.
EMPTY_FIELD_BOUNDARY [Macro]
Alignment in bits to be given to a structure bit-field that follows an empty field such
as int : 0;.
If PCC_BITFIELD_TYPE_MATTERS is true, it overrides this macro.
STRUCTURE_SIZE_BOUNDARY [Macro]
Number of bits which any structure or union’s size must be a multiple of. Each
structure or union’s size is rounded up to a multiple of this.
If you do not define this macro, the default is the same as BITS_PER_UNIT.
STRICT_ALIGNMENT [Macro]
Define this macro to be the value 1 if instructions will fail to work if given data not
on the nominal alignment. If instructions will merely go slower in that case, define
this macro as 0.
PCC_BITFIELD_TYPE_MATTERS [Macro]
Define this if you wish to imitate the way many other C compilers handle alignment
of bit-fields and the structures that contain them.
The behavior is that the type written for a named bit-field (int, short, or other
integer type) imposes an alignment for the entire structure, as if the structure really
did contain an ordinary field of that type. In addition, the bit-field is placed within
the structure so that it would fit within such a field, not crossing a boundary for it.
Thus, on most machines, a named bit-field whose type is written as int would not
cross a four-byte boundary, and would force four-byte alignment for the whole struc-
ture. (The alignment used may not be four bytes; it is controlled by the other align-
ment parameters.)
Chapter 18: Target Description Macros and Functions 523
An unnamed bit-field will not affect the alignment of the containing structure.
If the macro is defined, its definition should be a C expression; a nonzero value for
the expression enables this behavior.
Note that if this macro is not defined, or its value is zero, some bit-fields may cross
more than one alignment boundary. The compiler can support such references if there
are ‘insv’, ‘extv’, and ‘extzv’ insns that can directly reference memory.
The other known way of making bit-fields work is to define STRUCTURE_SIZE_
BOUNDARY as large as BIGGEST_ALIGNMENT. Then every structure can be accessed
with fullwords.
Unless the machine has bit-field instructions or you define STRUCTURE_SIZE_BOUNDARY
that way, you must define PCC_BITFIELD_TYPE_MATTERS to have a nonzero value.
If your aim is to make GCC use the same conventions for laying out bit-fields as are
used by another compiler, here is how to investigate what the other compiler does.
Compile and run this program:
struct foo1
{
char x;
char :0;
char y;
};
struct foo2
{
char x;
int :0;
char y;
};
main ()
{
printf ("Size of foo1 is %d\n",
sizeof (struct foo1));
printf ("Size of foo2 is %d\n",
sizeof (struct foo2));
exit (0);
}
If this prints 2 and 5, then the compiler’s behavior is what you would get from PCC_
BITFIELD_TYPE_MATTERS.
BITFIELD_NBYTES_LIMITED [Macro]
Like PCC_BITFIELD_TYPE_MATTERS except that its effect is limited to aligning a bit-
field within the structure.
encoding for these types as part of a C++ mangled name. The type argument is the
tree structure representing the type to be mangled. The hook may be applied to trees
which are not target-specific fundamental types; it should return NULL for all such
types, as well as arguments it does not recognize. If the return value is not NULL, it
must point to a statically-allocated string constant.
Target-specific fundamental types might be new fundamental types or qualified ver-
sions of ordinary fundamental types. Encode new fundamental types as ‘u n name’,
where name is the name used for the type in source code, and n is the length of name
in decimal. Encode qualified versions of ordinary types as ‘U n name code’, where
name is the name used for the type qualifier in source code, n is the length of name
as above, and code is the code used to represent the unqualified version of this type.
(See write_builtin_type in cp/mangle.cc for the list of codes.) In both cases the
spaces are for clarity; do not include any spaces in your string.
This hook is applied to types prior to typedef resolution. If the mangled name for a
particular type depends only on that type’s main variant, you can perform typedef
resolution yourself using TYPE_MAIN_VARIANT before mangling.
The default version of this hook always returns NULL, which is appropriate for a target
that does not define any new fundamental types.
INT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type int on the target machine. If you don’t
define this, the default is one word.
SHORT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type short on the target machine. If you
don’t define this, the default is half a word. (If this would be less than one storage
unit, it is rounded up to one unit.)
LONG_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long on the target machine. If you
don’t define this, the default is one word.
Chapter 18: Target Description Macros and Functions 527
ADA_LONG_TYPE_SIZE [Macro]
On some machines, the size used for the Ada equivalent of the type long by a native
Ada compiler differs from that used by C. In that situation, define this macro to be a
C expression to be used for the size of that type. If you don’t define this, the default
is the value of LONG_TYPE_SIZE.
LONG_LONG_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long long on the target machine. If
you don’t define this, the default is two words. If you want to support GNU Ada on
your machine, the value of this macro must be at least 64.
CHAR_TYPE_SIZE [Macro]
A C expression for the size in bits of the type char on the target machine. If you
don’t define this, the default is BITS_PER_UNIT.
BOOL_TYPE_SIZE [Macro]
A C expression for the size in bits of the C++ type bool and C99 type _Bool on the
target machine. If you don’t define this, and you probably shouldn’t, the default is
CHAR_TYPE_SIZE.
FLOAT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type float on the target machine. If you
don’t define this, the default is one word.
DOUBLE_TYPE_SIZE [Macro]
A C expression for the size in bits of the type double on the target machine. If you
don’t define this, the default is two words.
LONG_DOUBLE_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long double on the target machine. If
you don’t define this, the default is two words.
SHORT_FRACT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type short _Fract on the target machine.
If you don’t define this, the default is BITS_PER_UNIT.
FRACT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type _Fract on the target machine. If you
don’t define this, the default is BITS_PER_UNIT * 2.
LONG_FRACT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long _Fract on the target machine. If
you don’t define this, the default is BITS_PER_UNIT * 4.
LONG_LONG_FRACT_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long long _Fract on the target machine.
If you don’t define this, the default is BITS_PER_UNIT * 8.
SHORT_ACCUM_TYPE_SIZE [Macro]
A C expression for the size in bits of the type short _Accum on the target machine.
If you don’t define this, the default is BITS_PER_UNIT * 2.
528 GNU Compiler Collection (GCC) Internals
ACCUM_TYPE_SIZE [Macro]
A C expression for the size in bits of the type _Accum on the target machine. If you
don’t define this, the default is BITS_PER_UNIT * 4.
LONG_ACCUM_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long _Accum on the target machine. If
you don’t define this, the default is BITS_PER_UNIT * 8.
LONG_LONG_ACCUM_TYPE_SIZE [Macro]
A C expression for the size in bits of the type long long _Accum on the target machine.
If you don’t define this, the default is BITS_PER_UNIT * 16.
LIBGCC2_GNU_PREFIX [Macro]
This macro corresponds to the TARGET_LIBFUNC_GNU_PREFIX target hook and should
be defined if that hook is overriden to be true. It causes function names in libgcc
to be changed to use a __gnu_ prefix for their name rather than the default __. A
port which uses this macro should also arrange to use t-gnu-prefix in the libgcc
config.host.
WIDEST_HARDWARE_FP_SIZE [Macro]
A C expression for the size in bits of the widest floating-point format supported by
the hardware. If you define this macro, you must specify a value less than or equal
to the value of LONG_DOUBLE_TYPE_SIZE. If you do not define this macro, the value
of LONG_DOUBLE_TYPE_SIZE is the default.
DEFAULT_SIGNED_CHAR [Macro]
An expression whose value is 1 or 0, according to whether the type char should be
signed or unsigned by default. The user can always override this default with the
options -fsigned-char and -funsigned-char.
bool TARGET_DEFAULT_SHORT_ENUMS (void) [Target Hook]
This target hook should return true if the compiler should give an enum type only
as many bytes as it takes to represent the range of possible values of that type. It
should return false if all enum types should be allocated like int.
The default is to return false.
SIZE_TYPE [Macro]
A C expression for a string describing the name of the data type to use for size values.
The typedef name size_t is defined using the contents of the string.
The string can contain more than one keyword. If so, separate them with spaces,
and write first any length keyword, then unsigned if appropriate, and finally int.
The string must exactly match one of the data type names defined in the function
c_common_nodes_and_builtins in the file c-family/c-common.cc. You may not
omit int or change the order—that would cause the compiler to crash on startup.
If you don’t define this macro, the default is "long unsigned int".
SIZETYPE [Macro]
GCC defines internal types (sizetype, ssizetype, bitsizetype and sbitsizetype)
for expressions dealing with size. This macro is a C expression for a string describing
the name of the data type from which the precision of sizetype is extracted.
Chapter 18: Target Description Macros and Functions 529
PTRDIFF_TYPE [Macro]
A C expression for a string describing the name of the data type to use for the result of
subtracting two pointers. The typedef name ptrdiff_t is defined using the contents
of the string. See SIZE_TYPE above for more information.
If you don’t define this macro, the default is "long int".
WCHAR_TYPE [Macro]
A C expression for a string describing the name of the data type to use for wide
characters. The typedef name wchar_t is defined using the contents of the string.
See SIZE_TYPE above for more information.
If you don’t define this macro, the default is "int".
WCHAR_TYPE_SIZE [Macro]
A C expression for the size in bits of the data type for wide characters. This is used
in cpp, which cannot make use of WCHAR_TYPE.
WINT_TYPE [Macro]
A C expression for a string describing the name of the data type to use for wide
characters passed to printf and returned from getwc. The typedef name wint_t is
defined using the contents of the string. See SIZE_TYPE above for more information.
If you don’t define this macro, the default is "unsigned int".
INTMAX_TYPE [Macro]
A C expression for a string describing the name of the data type that can represent any
value of any standard or extended signed integer type. The typedef name intmax_t is
defined using the contents of the string. See SIZE_TYPE above for more information.
If you don’t define this macro, the default is the first of "int", "long int", or "long
long int" that has as much precision as long long int.
UINTMAX_TYPE [Macro]
A C expression for a string describing the name of the data type that can represent
any value of any standard or extended unsigned integer type. The typedef name
uintmax_t is defined using the contents of the string. See SIZE_TYPE above for more
information.
If you don’t define this macro, the default is the first of "unsigned int", "long
unsigned int", or "long long unsigned int" that has as much precision as long
long unsigned int.
530 GNU Compiler Collection (GCC) Internals
SIG_ATOMIC_TYPE [Macro]
INT8_TYPE [Macro]
INT16_TYPE [Macro]
INT32_TYPE [Macro]
INT64_TYPE [Macro]
UINT8_TYPE [Macro]
UINT16_TYPE [Macro]
UINT32_TYPE [Macro]
UINT64_TYPE [Macro]
INT_LEAST8_TYPE [Macro]
INT_LEAST16_TYPE [Macro]
INT_LEAST32_TYPE [Macro]
INT_LEAST64_TYPE [Macro]
UINT_LEAST8_TYPE [Macro]
UINT_LEAST16_TYPE [Macro]
UINT_LEAST32_TYPE [Macro]
UINT_LEAST64_TYPE [Macro]
INT_FAST8_TYPE [Macro]
INT_FAST16_TYPE [Macro]
INT_FAST32_TYPE [Macro]
INT_FAST64_TYPE [Macro]
UINT_FAST8_TYPE [Macro]
UINT_FAST16_TYPE [Macro]
UINT_FAST32_TYPE [Macro]
UINT_FAST64_TYPE [Macro]
INTPTR_TYPE [Macro]
UINTPTR_TYPE [Macro]
C expressions for the standard types sig_atomic_t, int8_t, int16_t, int32_t,
int64_t, uint8_t, uint16_t, uint32_t, uint64_t, int_least8_t, int_least16_t,
int_least32_t, int_least64_t, uint_least8_t, uint_least16_t, uint_least32_
t, uint_least64_t, int_fast8_t, int_fast16_t, int_fast32_t, int_fast64_t,
uint_fast8_t, uint_fast16_t, uint_fast32_t, uint_fast64_t, intptr_t, and
uintptr_t. See SIZE_TYPE above for more information.
If any of these macros evaluates to a null pointer, the corresponding type is not
supported; if GCC is configured to provide <stdint.h> in such a case, the header
provided may not conform to C99, depending on the type in question. The defaults
for all of these macros are null pointers.
TARGET_PTRMEMFUNC_VBIT_LOCATION [Macro]
The C++ compiler represents a pointer-to-member-function with a struct that looks
like:
struct {
union {
void (*fn)();
ptrdiff_t vtable_index;
};
ptrdiff_t delta;
};
Chapter 18: Target Description Macros and Functions 531
The C++ compiler must use one bit to indicate whether the function that will be
called through a pointer-to-member-function is virtual. Normally, we assume that
the low-order bit of a function pointer must always be zero. Then, by ensuring that
the vtable index is odd, we can distinguish which variant of the union is in use. But,
on some platforms function pointers can be odd, and so this doesn’t work. In that
case, we use the low-order bit of the delta field, and shift the remainder of the delta
field to the left.
GCC will automatically make the right selection about where to store this bit using
the FUNCTION_BOUNDARY setting for your platform. However, some platforms such as
ARM/Thumb have FUNCTION_BOUNDARY set such that functions always start at even
addresses, but the lowest bit of pointers to functions indicate whether the function at
that address is in ARM or Thumb mode. If this is the case of your architecture, you
should define this macro to ptrmemfunc_vbit_in_delta.
In general, you should not have to define this macro. On architectures in which
function addresses are always even, according to FUNCTION_BOUNDARY, GCC will au-
tomatically define this macro to ptrmemfunc_vbit_in_pfn.
TARGET_VTABLE_USES_DESCRIPTORS [Macro]
Normally, the C++ compiler uses function pointers in vtables. This macro allows the
target to change to use “function descriptors” instead. Function descriptors are found
on targets for whom a function pointer is actually a small data structure. Normally
the data structure consists of the actual code address plus a data pointer to which
the function’s data is relative.
If vtables are used, the value of this macro should be the number of words that the
function descriptor occupies.
TARGET_VTABLE_ENTRY_ALIGN [Macro]
By default, the vtable entries are void pointers, the so the alignment is the same as
pointer alignment. The value of this macro specifies the alignment of the vtable entry
in bits. It should be defined only when special alignment is necessary. */
TARGET_VTABLE_DATA_ENTRY_DISTANCE [Macro]
There are a few non-descriptor entries in the vtable at offsets below zero. If these
entries must be padded (say, to preserve the alignment specified by TARGET_VTABLE_
ENTRY_ALIGN), set this to the number of words in each data entry.
FIRST_PSEUDO_REGISTER [Macro]
Number of hardware registers known to the compiler. They receive numbers 0 through
FIRST_PSEUDO_REGISTER-1; thus, the first pseudo register’s number really is assigned
the number FIRST_PSEUDO_REGISTER.
FIXED_REGISTERS [Macro]
An initializer that says which registers are used for fixed purposes all throughout the
compiled code and are therefore not available for general allocation. These would
include the stack pointer, the frame pointer (except on machines where that can be
used as a general register when no frame pointer is needed), the program counter
on machines where that is considered one of the addressable registers, and any other
numbered register with a standard use.
This information is expressed as a sequence of numbers, separated by commas and
surrounded by braces. The nth number is 1 if register n is fixed, 0 otherwise.
The table initialized from this macro, and the table initialized by the following one,
may be overridden at run time either automatically, by the actions of the macro
CONDITIONAL_REGISTER_USAGE, or by the user with the command options -ffixed-
reg, -fcall-used-reg and -fcall-saved-reg.
CALL_USED_REGISTERS [Macro]
Like FIXED_REGISTERS but has 1 for each register that is clobbered (in general) by
function calls as well as for fixed registers. This macro therefore identifies the registers
that are not available for general allocation of values that must live across function
calls.
If a register has 0 in CALL_USED_REGISTERS, the compiler automatically saves it on
function entry and restores it on function exit, if the register is used within the
function.
Exactly one of CALL_USED_REGISTERS and CALL_REALLY_USED_REGISTERS must be
defined. Modern ports should define CALL_REALLY_USED_REGISTERS.
CALL_REALLY_USED_REGISTERS [Macro]
Like CALL_USED_REGISTERS except this macro doesn’t require that the entire set of
FIXED_REGISTERS be included. (CALL_USED_REGISTERS must be a superset of FIXED_
REGISTERS).
Exactly one of CALL_USED_REGISTERS and CALL_REALLY_USED_REGISTERS must be
defined. Modern ports should define CALL_REALLY_USED_REGISTERS.
automatically avoid using these registers when the target switches are opposed to
them.)
PC_REGNUM [Macro]
If the program counter has a register number, define this as that register number.
Otherwise, do not define it.
REG_ALLOC_ORDER [Macro]
If defined, an initializer for a vector of integers, containing the numbers of hard
registers in the order in which GCC should prefer to use them (from most preferred
to least).
If this macro is not defined, registers are used lowest numbered first (all else being
equal).
One use of this macro is on machines where the highest numbered registers must
always be saved and the save-multiple-registers instruction supports only sequences of
consecutive registers. On such machines, define REG_ALLOC_ORDER to be an initializer
that lists the highest numbered allocable register first.
ADJUST_REG_ALLOC_ORDER [Macro]
A C statement (sans semicolon) to choose the order in which to allocate hard registers
for pseudo-registers local to a basic block.
Store the desired register order in the array reg_alloc_order. Element 0 should be
the register to allocate first; element 1, the next register; and so on.
The macro body should not assume anything about the contents of reg_alloc_order
before execution of the macro.
On most machines, it is not necessary to define this macro.
Chapter 18: Target Description Macros and Functions 535
HONOR_REG_ALLOC_ORDER [Macro]
Normally, IRA tries to estimate the costs for saving a register in the prologue and
restoring it in the epilogue. This discourages it from using call-saved registers.
If a machine wants to ensure that IRA allocates registers in the order given by
REG ALLOC ORDER even if some call-saved registers appear earlier than call-used
ones, then define this macro as a C expression to nonzero. Default is 0.
If leaf function treatment involves renumbering the registers, then the registers marked
here should be the ones before renumbering—those that GCC would ordinarily allo-
cate. The registers which will actually be used in the assembler code, after renum-
bering, should not be marked with 1 in this vector.
Define this macro only if the target machine offers a way to optimize the treatment
of leaf functions.
STACK_REGS [Macro]
Define this if the machine has any stack-like registers.
STACK_REG_COVER_CLASS [Macro]
This is a cover class containing the stack registers. Define this if the machine has any
stack-like registers.
FIRST_STACK_REG [Macro]
The number of the first stack-like register. This one is the top of the stack.
LAST_STACK_REG [Macro]
The number of the last stack-like register. This one is the bottom of the stack.
Chapter 18: Target Description Macros and Functions 539
N_REG_CLASSES [Macro]
The number of distinct register classes, defined as follows:
#define N_REG_CLASSES (int) LIM_REG_CLASSES
REG_CLASS_NAMES [Macro]
An initializer containing the names of the register classes as C string constants. These
names are used in writing some of the debugging dumps.
REG_CLASS_CONTENTS [Macro]
An initializer containing the contents of the register classes, as integers which are bit
masks. The nth integer specifies the contents of class n. The way the integer mask is
interpreted is that register r is in the class if mask & (1 << r) is 1.
When the machine has more than 32 registers, an integer does not suffice. Then the
integers are replaced by sub-initializers, braced groupings containing several integers.
Each sub-initializer must be suitable as an initializer for the type HARD_REG_SET which
is defined in hard-reg-set.h. In this situation, the first integer in each sub-initializer
corresponds to registers 0 through 31, the second integer to registers 32 through 63,
and so on.
BASE_REG_CLASS [Macro]
A macro whose definition is the name of the class to which a valid base register must
belong. A base register is one used in an address which is the register value plus a
displacement.
INDEX_REG_CLASS [Macro]
A macro whose definition is the name of the class to which a valid index register must
belong. An index register is one used in an address where its value is either multiplied
by a scale factor or added to another register (as well as added to a displacement).
machines, can only be copied to or from general registers, but not memory. Below,
we shall be using the term ’intermediate register’ when a move operation cannot be
performed directly, but has to be done by copying the source into the intermediate
register first, and then copying the intermediate register to the destination. An in-
termediate register always has the same mode as source and destination. Since it
holds the actual value being copied, reload might apply optimizations to re-use an
intermediate register and eliding the copy from the source when it can determine that
the intermediate register still holds the required value.
Another kind of secondary reload is required on some machines which allow copying
all registers to and from memory, but require a scratch register for stores to some
memory locations (e.g., those with symbolic address on the RT, and those with certain
symbolic address on the SPARC when compiling PIC). Scratch registers need not have
the same mode as the value being copied, and usually hold a different value than that
being copied. Special patterns in the md file are needed to describe how the copy
is performed with the help of the scratch register; these patterns also describe the
number, register class(es) and mode(s) of the scratch register(s).
In some cases, both an intermediate and a scratch register are required.
For input reloads, this target hook is called with nonzero in p, and x is an rtx that
needs to be copied to a register of class reload class in reload mode. For output
reloads, this target hook is called with zero in p, and a register of class reload class
needs to be copied to rtx x in reload mode.
If copying a register of reload class from/to x requires an intermediate register, the
hook secondary_reload should return the register class required for this intermediate
register. If no intermediate register is required, it should return NO REGS. If more
than one intermediate register is required, describe the one that is closest in the copy
chain to the reload register.
If scratch registers are needed, you also have to describe how to perform the copy
from/to the reload register to/from this closest intermediate register. Or if no inter-
mediate register is required, but still a scratch register is needed, describe the copy
from/to the reload register to/from the reload operand x.
You do this by setting sri->icode to the instruction code of a pattern in the md
file which performs the move. Operands 0 and 1 are the output and input of this
copy, respectively. Operands from operand 2 onward are for scratch operands. These
scratch operands must have a mode, and a single-register-class output constraint.
When an intermediate register is used, the secondary_reload hook will be called
again to determine how to copy the intermediate register to/from the reload operand
x, so your hook must also have code to handle the register class of the intermediate
operand.
x might be a pseudo-register or a subreg of a pseudo-register, which could either be
in a hard register or in memory. Use true_regnum to find out; it will return −1 if
the pseudo is in memory and the hard register number if it is in a register.
Scratch operands in memory (constraint "=m" / "=&m") are currently not supported.
For the time being, you will have to continue to use TARGET_SECONDARY_MEMORY_
NEEDED for that purpose.
Chapter 18: Target Description Macros and Functions 545
copy_cost also uses this target hook to find out how values are copied. If you want
it to include some extra cost for the need to allocate (a) scratch register(s), set sri-
>extra_cost to the additional cost. Or if two dependent moves are supposed to have a
lower cost than the sum of the individual moves due to expected fortuitous scheduling
and/or special forwarding logic, you can set sri->extra_cost to a negative amount.
SECONDARY_RELOAD_CLASS (class, mode, x) [Macro]
SECONDARY_INPUT_RELOAD_CLASS (class, mode, x) [Macro]
SECONDARY_OUTPUT_RELOAD_CLASS (class, mode, x) [Macro]
These macros are obsolete, new ports should use the target hook TARGET_SECONDARY_
RELOAD instead.
These are obsolete macros, replaced by the TARGET_SECONDARY_RELOAD target hook.
Older ports still define these macros to indicate to the reload phase that it may need
to allocate at least one register for a reload in addition to the register to contain the
data. Specifically, if copying x to a register class in mode requires an intermediate
register, you were supposed to define SECONDARY_INPUT_RELOAD_CLASS to return the
largest register class all of whose registers can be used as intermediate registers or
scratch registers.
If copying a register class in mode to x requires an intermediate or scratch register,
SECONDARY_OUTPUT_RELOAD_CLASS was supposed to be defined to return the largest
register class required. If the requirements for input and output reloads were the same,
the macro SECONDARY_RELOAD_CLASS should have been used instead of defining both
macros identically.
The values returned by these macros are often GENERAL_REGS. Return NO_REGS if no
spare register is needed; i.e., if x can be directly copied to or from a register of class
in mode without requiring a scratch register. Do not define this macro if it would
always return NO_REGS.
If a scratch register is required (either with or without an intermediate register),
you were supposed to define patterns for ‘reload_inm’ or ‘reload_outm’, as required
(see Section 17.9 [Standard Names], page 411. These patterns, which were normally
implemented with a define_expand, should be similar to the ‘movm’ patterns, except
that operand 2 is the scratch register.
These patterns need constraints for the reload register and scratch register that con-
tain a single register class. If the original reload register (whose class is class) can
meet the constraint given in the pattern, the value returned by these macros is used
for the class of the scratch register. Otherwise, two additional reload registers are
required. Their classes are obtained from the constraints in the insn pattern.
x might be a pseudo-register or a subreg of a pseudo-register, which could either be
in a hard register or in memory. Use true_regnum to find out; it will return −1 if
the pseudo is in memory and the hard register number if it is in a register.
These macros should not be used in the case where a particular class of registers
can only be copied to memory and not to another class of registers. In that case,
secondary reload registers are not needed and would not be helpful. Instead, a stack
location must be used to perform the copy and the movm pattern should use memory
as an intermediate storage. This case often occurs between floating-point and general
registers.
546 GNU Compiler Collection (GCC) Internals
Even if storing from a register in mode to would be valid, if both from and raw_reg_
mode for rclass are wider than word_mode, then we must prevent to narrowing the
mode. This happens when the middle-end assumes that it can load or store pieces
of an N -word pseudo, and that the pseudo will eventually be allocated to N word_
mode hard registers. Failure to prevent this kind of mode change will result in the
entire raw_reg_mode being modified instead of the partial value that the middle-end
intended.
548 GNU Compiler Collection (GCC) Internals
can be applied to the anchor to address a value of mode mode. The idea is that the
local anchor could be shared by other accesses to nearby locations.
The hook returns true if it succeeds, storing the offset of the anchor from the base
in offset1 and the offset of the final address from the anchor in offset2. The default
implementation returns false.
reg_class_t TARGET_SPILL_CLASS (reg_class_t, [Target Hook]
machine_mode)
This hook defines a class of registers which could be used for spilling pseudos of the
given mode and class, or NO_REGS if only memory should be used. Not defining this
hook is equivalent to returning NO_REGS for all inputs.
bool TARGET_ADDITIONAL_ALLOCNO_CLASS_P (reg_class_t) [Target Hook]
This hook should return true if given class of registers should be an allocno class in
any way. Usually RA uses only one register class from all classes containing the same
register set. In some complicated cases, you need to have two or more such classes as
allocno ones for RA correct work. Not defining this hook is equivalent to returning
false for all inputs.
scalar_int_mode TARGET_CSTORE_MODE (enum insn_code [Target Hook]
icode)
This hook defines the machine mode to use for the boolean result of conditional
store patterns. The ICODE argument is the instruction code for the cstore being
performed. Not definiting this hook is the same as accepting the mode encoded into
operand 0 of the cstore expander patterns.
int TARGET_COMPUTE_PRESSURE_CLASSES (enum reg_class [Target Hook]
*pressure_classes)
A target hook which lets a backend compute the set of pressure classes to be used
by those optimization passes which take register pressure into account, as opposed
to letting IRA compute them. It returns the number of register classes stored in the
array pressure classes.
FRAME_GROWS_DOWNWARD [Macro]
Define this macro to nonzero value if the addresses of local variable slots are at
negative offsets from the frame pointer.
ARGS_GROW_DOWNWARD [Macro]
Define this macro if successive arguments to a function occupy decreasing addresses
on the stack.
STACK_ALIGNMENT_NEEDED [Macro]
Define to zero to disable final alignment of the stack during reload. The nonzero
default for this macro is suitable for most ports.
On ports where TARGET_STARTING_FRAME_OFFSET is nonzero or where there is a reg-
ister save block following the local block that doesn’t require alignment to STACK_
BOUNDARY, it may be beneficial to disable stack alignment and do it in the backend.
STACK_POINTER_OFFSET [Macro]
Offset from the stack pointer register to the first location at which outgoing arguments
are placed. If not specified, the default value of zero is used. This is the proper value
for most machines.
If ARGS_GROW_DOWNWARD, this is the offset to the location above the first location at
which outgoing arguments are placed.
INITIAL_FRAME_ADDRESS_RTX [Macro]
A C expression whose value is RTL representing the address of the initial stack frame.
This address is passed to RETURN_ADDR_RTX and DYNAMIC_CHAIN_ADDRESS. If you
don’t define this macro, a reasonable default value will be used. Define this macro in
Chapter 18: Target Description Macros and Functions 551
You only need to define this macro if you want to support call frame debugging
information like that provided by DWARF 2.
If this RTL is a REG, you should also define DWARF_FRAME_RETURN_COLUMN to DWARF_
FRAME_REGNUM (REGNO).
DWARF_ALT_FRAME_RETURN_COLUMN [Macro]
A C expression whose value is an integer giving a DWARF 2 column number that
may be used as an alternative return column. The column must not correspond to
any gcc hard register (that is, it must not be in the range of DWARF_FRAME_REGNUM).
This macro can be useful if DWARF_FRAME_RETURN_COLUMN is set to a general register,
but an alternative column needs to be used for signal frames. Some targets have also
used different frame return columns over time.
DWARF_ZERO_REG [Macro]
A C expression whose value is an integer giving a DWARF 2 register number that is
considered to always have the value zero. This should only be defined if the target
has an architected zero register, and someone decided it was a good idea to use that
register number to terminate the stack backtrace. New ports should avoid this.
DWARF_VERSION_DEFAULT [Macro]
A C expression whose value is the default dwarf standard version we’ll honor and ad-
vertise when generating dwarf debug information, in absence of an explicit -gdwarf-
version option on the command line.
void TARGET_DWARF_HANDLE_FRAME_UNSPEC (const char [Target Hook]
*label, rtx pattern, int index)
This target hook allows the backend to emit frame-related insns that contain UN-
SPECs or UNSPEC VOLATILEs. The DWARF 2 call frame debugging info engine
will invoke it on insns of the form
(set (reg) (unspec [...] UNSPEC_INDEX))
and
(set (reg) (unspec_volatile [...] UNSPECV_INDEX)).
to let the backend emit the call frame instructions. label is the CFI label attached to
the insn, pattern is the pattern of the insn and index is UNSPEC_INDEX or UNSPECV_
INDEX.
unsigned int TARGET_DWARF_POLY_INDETERMINATE_VALUE [Target Hook]
(unsigned int i, unsigned int *factor, int *offset)
Express the value of poly_int indeterminate i as a DWARF expression, with i count-
ing from 1. Return the number of a DWARF register R and set ‘*factor’ and
‘*offset’ such that the value of the indeterminate is:
value_of(R) / factor - offset
A target only needs to define this hook if it sets ‘NUM_POLY_INT_COEFFS’ to a value
greater than 1.
INCOMING_FRAME_SP_OFFSET [Macro]
A C expression whose value is an integer giving the offset, in bytes, from the value
of the stack pointer register to the top of the stack frame at the beginning of any
Chapter 18: Target Description Macros and Functions 553
function, before the prologue. The top of the frame is defined to be the value of the
stack pointer in the previous frame, just before the call instruction.
You only need to define this macro if you want to support call frame debugging
information like that provided by DWARF 2.
DEFAULT_INCOMING_FRAME_SP_OFFSET [Macro]
Like INCOMING_FRAME_SP_OFFSET, but must be the same for all functions of the same
ABI, and when using GAS .cfi_* directives must also agree with the default CFI
GAS emits. Define this macro only if INCOMING_FRAME_SP_OFFSET can have different
values between different functions of the same ABI or when INCOMING_FRAME_SP_
OFFSET does not agree with GAS default CFI.
The exception handling library routines communicate with the exception handlers via
a set of agreed upon registers. Ideally these registers should be call-clobbered; it is
possible to use call-saved registers, but may negatively impact code size. The target
must support at least 2 data registers, but should define 4 if there are enough free
registers.
You must define this macro if you want to support call frame exception handling like
that provided by DWARF 2.
EH_RETURN_STACKADJ_RTX [Macro]
A C expression whose value is RTL representing a location in which to store a stack
adjustment to be applied before function return. This is used to unwind the stack to
an exception handler’s call frame. It will be assigned zero on code paths that return
normally.
Typically this is a call-clobbered hard register that is otherwise untouched by the
epilogue, but could also be a stack slot.
Do not define this macro if the stack pointer is saved and restored by the regular
prolog and epilog code in the call frame itself; in this case, the exception handling
library routines will update the stack location to be restored in place. Otherwise, you
must define this macro if you want to support call frame exception handling like that
provided by DWARF 2.
EH_RETURN_HANDLER_RTX [Macro]
A C expression whose value is RTL representing a location in which to store the
address of an exception handler to which we should return. It will not be assigned on
code paths that return normally.
Typically this is the location in the call frame at which the normal return address is
stored. For targets that return by popping an address off the stack, this might be a
memory address just below the target call frame rather than inside the current call
frame. If defined, EH_RETURN_STACKADJ_RTX will have already been assigned, so it
may be used to calculate the location of the target call frame.
Some targets have more complex requirements than storing to an address calculable
during initial code generation. In that case the eh_return instruction pattern should
be used instead.
If you want to support call frame exception handling, you must define either this
macro or the eh_return instruction pattern.
RETURN_ADDR_OFFSET [Macro]
If defined, an integer-valued C expression for which rtl will be generated to add it to
the exception handler address before it is searched in the exception handling tables,
and to subtract it again from the address before using it to return to the exception
handler.
code is 0 for data, 1 for code labels, 2 for function pointers. global is true if the symbol
may be affected by dynamic relocations. The macro should return a combination of
the DW_EH_PE_* defines as found in dwarf2.h.
If this macro is not defined, pointers will not be encoded but represented directly.
ASM_MAYBE_OUTPUT_ENCODED_ADDR_RTX (file, encoding, size, addr, [Macro]
done)
This macro allows the target to emit whatever special magic is required to represent
the encoding chosen by ASM_PREFERRED_EH_DATA_FORMAT. Generic code takes care of
pc-relative and indirect encodings; this must be defined if the target uses text-relative
or data-relative encodings.
This is a C statement that branches to done if the format was handled. encoding is
the format chosen, size is the number of bytes that the format occupies, addr is the
SYMBOL_REF to be emitted.
MD_FALLBACK_FRAME_STATE_FOR (context, fs) [Macro]
This macro allows the target to add CPU and operating system specific code to
the call-frame unwinder for use when there is no unwind data available. The most
common reason to implement this macro is to unwind through signal frames.
This macro is called from uw_frame_state_for in unwind-dw2.c, unwind-
dw2-xtensa.c and unwind-ia64.c. context is an _Unwind_Context; fs is an
_Unwind_FrameState. Examine context->ra for the address of the code being
executed and context->cfa for the stack pointer value. If the frame can be decoded,
the register save addresses should be updated in fs and the macro should evaluate
to _URC_NO_REASON. If the frame cannot be decoded, the macro should evaluate to
_URC_END_OF_STACK.
For proper signal handling in Java this macro is accompanied by MAKE_THROW_FRAME,
defined in libjava/include/*-signal.h headers.
MD_HANDLE_UNWABI (context, fs) [Macro]
This macro allows the target to add operating system specific code to the call-frame
unwinder to handle the IA-64 .unwabi unwinding directive, usually used for signal
or interrupt frames.
This macro is called from uw_update_context in libgcc’s unwind-ia64.c. context is
an _Unwind_Context; fs is an _Unwind_FrameState. Examine fs->unwabi for the
abi and context in the .unwabi directive. If the .unwabi directive can be handled,
the register save addresses should be updated in fs.
TARGET_USES_WEAK_UNWIND_INFO [Macro]
A C expression that evaluates to true if the target requires unwind info to be given
comdat linkage. Define it to be 1 if comdat linkage is necessary. The default is 0.
STACK_CHECK_BUILTIN [Macro]
A nonzero value if stack checking is done by the configuration files in a machine-
dependent manner. You should define this macro if stack checking is required by the
ABI of your machine or if you would like to do stack checking in some more efficient
way than the generic approach. The default value of this macro is zero.
STACK_CHECK_STATIC_BUILTIN [Macro]
A nonzero value if static stack checking is done by the configuration files in a machine-
dependent manner. You should define this macro if you would like to do static stack
checking in some more efficient way than the generic approach. The default value of
this macro is zero.
STACK_CHECK_PROBE_INTERVAL_EXP [Macro]
An integer specifying the interval at which GCC must generate stack probe instruc-
tions, defined as 2 raised to this integer. You will normally define this macro so that
the interval be no larger than the size of the “guard pages” at the end of a stack area.
The default value of 12 (4096-byte interval) is suitable for most systems.
STACK_CHECK_MOVING_SP [Macro]
An integer which is nonzero if GCC should move the stack pointer page by page when
doing probes. This can be necessary on systems where the stack pointer contains the
bottom address of the memory area accessible to the executing thread at any point
in time. In this situation an alternate signal stack is required in order to be able to
recover from a stack overflow. The default value of this macro is zero.
STACK_CHECK_PROTECT [Macro]
The number of bytes of stack needed to recover from a stack overflow, for lan-
guages where such a recovery is supported. The default value of 4KB/8KB with the
setjmp/longjmp-based exception handling mechanism and 8KB/12KB with other ex-
ception handling mechanisms should be adequate for most architectures and operating
systems.
The following macros are relevant only if neither STACK CHECK BUILTIN nor
STACK CHECK STATIC BUILTIN is defined; you can omit them altogether in the
opposite case.
Chapter 18: Target Description Macros and Functions 557
STACK_CHECK_MAX_FRAME_SIZE [Macro]
The maximum size of a stack frame, in bytes. GCC will generate probe instructions
in non-leaf functions to ensure at least this many bytes of stack are available. If a
stack frame is larger than this size, stack checking will not be reliable and GCC will
issue a warning. The default is chosen so that GCC only generates one instruction
on most systems. You should normally not change the default value of this macro.
STACK_CHECK_FIXED_FRAME_SIZE [Macro]
GCC uses this value to generate the above warning message. It represents the amount
of fixed frame used by a function, not including space for any callee-saved registers,
temporaries and user variables. You need only specify an upper bound for this amount
and will normally use the default of four words.
STACK_CHECK_MAX_VAR_SIZE [Macro]
The maximum size, in bytes, of an object that GCC will place in the fixed area of
the stack frame when the user specifies -fstack-check. GCC computed the default
from the values of the above macros and you will normally not need to override that
default.
STACK_POINTER_REGNUM [Macro]
The register number of the stack pointer register, which must also be a fixed register
according to FIXED_REGISTERS. On most machines, the hardware determines which
register this is.
FRAME_POINTER_REGNUM [Macro]
The register number of the frame pointer register, which is used to access automatic
variables in the stack frame. On some machines, the hardware determines which
register this is. On other machines, you can choose any register you wish for this
purpose.
HARD_FRAME_POINTER_REGNUM [Macro]
On some machines the offset between the frame pointer and starting offset of the
automatic variables is not known until after register allocation has been done (for
example, because the saved registers are between these two locations). On those
558 GNU Compiler Collection (GCC) Internals
If the static chain is passed in memory, these macros should not be defined; instead,
the TARGET_STATIC_CHAIN hook should be used.
rtx TARGET_STATIC_CHAIN (const_tree fndecl_or_type, [Target Hook]
bool incoming_p)
This hook replaces the use of STATIC_CHAIN_REGNUM et al for targets that may use
different static chain locations for different nested functions. This may be required if
the target has function attributes that affect the calling conventions of the function
and those calling conventions use different static chain locations.
The default version of this hook uses STATIC_CHAIN_REGNUM et al.
If the static chain is passed in memory, this hook should be used to provide rtx giving
mem expressions that denote where they are stored. Often the mem expression as seen
by the caller will be at an offset from the stack pointer and the mem expression as
seen by the callee will be at an offset from the frame pointer. The variables stack_
pointer_rtx, frame_pointer_rtx, and arg_pointer_rtx will have been initialized
and should be used to refer to those items.
DWARF_FRAME_REGISTERS [Macro]
This macro specifies the maximum number of hard registers that can be saved in a
call frame. This is used to size data structures used in DWARF2 exception handling.
Prior to GCC 3.0, this macro was needed in order to establish a stable exception
handling ABI in the face of adding new hard registers for ISA extensions. In GCC
3.0 and later, the EH ABI is insulated from changes in the number of hard registers.
Nevertheless, this macro can still be used to reduce the runtime memory requirements
of the exception handling routines, which can be substantial if the ISA contains a lot
of registers that are not call-saved.
If this macro is not defined, it defaults to FIRST_PSEUDO_REGISTER.
PRE_GCC3_DWARF_FRAME_REGISTERS [Macro]
This macro is similar to DWARF_FRAME_REGISTERS, but is provided for backward com-
patibility in pre GCC 3.0 compiled code.
If this macro is not defined, it defaults to DWARF_FRAME_REGISTERS.
DWARF_REG_TO_UNWIND_COLUMN (regno) [Macro]
Define this macro if the target’s representation for dwarf registers is different than
the internal representation for unwind column. Given a dwarf register, this macro
should return the internal unwind column number to use instead.
DWARF_FRAME_REGNUM (regno) [Macro]
Define this macro if the target’s representation for dwarf registers used in .eh frame
or .debug frame is different from that used in other debug info sections. Given a GCC
hard register number, this macro should return the .eh frame register number. The
default is DEBUGGER_REGNO (regno).
DWARF2_FRAME_REG_OUT (regno, for_eh) [Macro]
Define this macro to map register numbers held in the call frame info that GCC has
collected using DWARF_FRAME_REGNUM to those that should be output in .debug frame
(for_eh is zero) and .eh frame (for_eh is nonzero). The default is to return regno.
560 GNU Compiler Collection (GCC) Internals
REG_VALUE_IN_UNWIND_CONTEXT [Macro]
Define this macro if the target stores register values as _Unwind_Word type in unwind
context. It should be defined if target register size is larger than the size of void *.
The default is to store register values as void * type.
ASSUME_EXTENDED_UNWIND_CONTEXT [Macro]
Define this macro to be 1 if the target always uses extended unwind context with
version, args size and by value fields. If it is undefined, it will be defined to 1 when
REG_VALUE_IN_UNWIND_CONTEXT is defined and 0 otherwise.
DWARF_LAZY_REGISTER_VALUE (regno, value) [Macro]
Define this macro if the target has pseudo DWARF registers whose values need to
be computed lazily on demand by the unwinder (such as when referenced in a CFA
expression). The macro returns true if regno is such a register and stores its value in
‘*value’ if so.
Note that the elimination of the argument pointer with the stack pointer is specified
first since that is the preferred elimination.
PUSH_ARGS_REVERSED [Macro]
A C expression. If nonzero, function arguments will be evaluated from last to first,
rather than from first to last. If this macro is not defined, it defaults to PUSH_ARGS
on targets where the stack and args grow in opposite directions, and 0 otherwise.
ACCUMULATE_OUTGOING_ARGS [Macro]
A C expression. If nonzero, the maximum amount of space required for outgoing
arguments will be computed and placed into crtl->outgoing_args_size. No space
will be pushed onto the stack for each call; instead, the function prologue should
increase the stack frame size by this amount.
Setting both PUSH_ARGS and ACCUMULATE_OUTGOING_ARGS is not proper.
STACK_PARMS_IN_REG_PARM_AREA [Macro]
Define this macro if REG_PARM_STACK_SPACE is defined, but the stack parameters
don’t skip the area specified by it.
Chapter 18: Target Description Macros and Functions 563
Normally, when a parameter is not passed in registers, it is placed on the stack beyond
the REG_PARM_STACK_SPACE area. Defining this macro suppresses this behavior and
causes the parameter to be passed on the stack in its natural location.
This hook need not do anything if the argument in question was passed on the stack.
The compiler knows how to track the amount of stack space used for arguments
without any special help.
HOST_WIDE_INT TARGET_FUNCTION_ARG_OFFSET (machine_mode [Target Hook]
mode, const_tree type)
This hook returns the number of bytes to add to the offset of an argument of type
type and mode mode when passed in memory. This is needed for the SPU, which
passes char and short arguments in the preferred slot that is in the middle of the
quad word instead of starting at the top. The default implementation returns 0.
pad_direction TARGET_FUNCTION_ARG_PADDING (machine_mode [Target Hook]
mode, const_tree type)
This hook determines whether, and in which direction, to pad out an argument of
mode mode and type type. It returns PAD_UPWARD to insert padding above the argu-
ment, PAD_DOWNWARD to insert padding below the argument, or PAD_NONE to inhibit
padding.
The amount of padding is not controlled by this hook, but by TARGET_FUNCTION_
ARG_ROUND_BOUNDARY. It is always just enough to reach the next multiple of that
boundary.
This hook has a default definition that is right for most systems. For little-endian
machines, the default is to pad upward. For big-endian machines, the default is to
pad downward for an argument of constant size shorter than an int, and upward
otherwise.
PAD_VARARGS_DOWN [Macro]
If defined, a C expression which determines whether the default implementation of
va arg will attempt to pad down before reading the next argument, if that argument
is smaller than its aligned space as controlled by PARM_BOUNDARY. If this macro is not
defined, all such arguments are padded down if BYTES_BIG_ENDIAN is true.
BLOCK_REG_PADDING (mode, type, first) [Macro]
Specify padding for the last element of a block move between registers and memory.
first is nonzero if this is the only element. Defining this macro allows better control of
register function parameters on big-endian machines, without using PARALLEL rtl. In
particular, MUST_PASS_IN_STACK need not test padding and mode of types in registers,
as there is no longer a "wrong" part of a register; For example, a three byte aggregate
may be passed in the high part of a register if so required.
unsigned int TARGET_FUNCTION_ARG_BOUNDARY (machine_mode [Target Hook]
mode, const_tree type)
This hook returns the alignment boundary, in bits, of an argument with the specified
mode and type. The default hook returns PARM_BOUNDARY for all arguments.
unsigned int TARGET_FUNCTION_ARG_ROUND_BOUNDARY [Target Hook]
(machine_mode mode, const_tree type)
Normally, the size of an argument is rounded up to PARM_BOUNDARY, which is the
default value for this hook. You can define this hook to return a different value if an
argument size must be rounded to a larger value.
568 GNU Compiler Collection (GCC) Internals
ANSI/ISO mode, the built-in function without the __builtin_ prefix is not enabled.
The argument FUNC is the enum built_in_function id of the function to be enabled.
first element of the parallel contains the whole return value, callers will use that
element as the canonical location and ignore the others. The m68k port uses this
type of parallel to return pointers in both ‘%a0’ (the canonical location) and ‘%d0’.
If TARGET_PROMOTE_FUNCTION_RETURN returns true, you must apply the same promo-
tion rules specified in PROMOTE_MODE if valtype is a scalar type.
If the precise function being called is known, func is a tree node (FUNCTION_DECL)
for it; otherwise, func is a null pointer. This makes it possible to use a different
value-returning convention for specific functions when all their calls are known.
Some target machines have “register windows” so that the register in which a function
returns its value is not the same as the one in which the caller sees the value. For
such machines, you should return different RTX depending on outgoing.
TARGET_FUNCTION_VALUE is not used for return values with aggregate data types, be-
cause these are returned in another way. See TARGET_STRUCT_VALUE_RTX and related
macros, below.
FUNCTION_VALUE (valtype, func) [Macro]
This macro has been deprecated. Use TARGET_FUNCTION_VALUE for a new target
instead.
LIBCALL_VALUE (mode) [Macro]
A C expression to create an RTX representing the place where a library function
returns a value of mode mode.
Note that “library function” in this context means a compiler support routine, used
to perform arithmetic, whose name is known specially by the compiler and was not
mentioned in the C code being compiled.
rtx TARGET_LIBCALL_VALUE (machine_mode mode, const_rtx [Target Hook]
fun)
Define this hook if the back-end needs to know the name of the libcall function in
order to determine where the result should be returned.
The mode of the result is given by mode and the name of the called library function
is given by fun. The hook should return an RTX representing the place where the
library function result will be returned.
If this hook is not defined, then LIBCALL VALUE will be used.
FUNCTION_VALUE_REGNO_P (regno) [Macro]
A C expression that is nonzero if regno is the number of a hard register in which the
values of called function may come back.
A register whose use for returning values is limited to serving as the second of a pair
(for a value of type double, say) need not be recognized by this macro. So for most
machines, this definition suffices:
#define FUNCTION_VALUE_REGNO_P(N) ((N) == 0)
If the machine has register windows, so that the caller and the called function use
different registers for the return value, this macro should recognize only the caller’s
register numbers.
This macro has been deprecated. Use TARGET_FUNCTION_VALUE_REGNO_P for a new
target instead.
Chapter 18: Target Description Macros and Functions 573
APPLY_RESULT_SIZE [Macro]
Define this macro if ‘untyped_call’ and ‘untyped_return’ need more space than
is implied by FUNCTION_VALUE_REGNO_P for saving and restoring an arbitrary return
value.
systems, it is possible to leave the hook undefined; this causes a default definition to
be used, whose value is the constant 1 for BLKmode values, and 0 otherwise.
Do not use this hook to indicate that structures and unions should always be returned
in memory. You should instead use DEFAULT_PCC_STRUCT_RETURN to indicate this.
DEFAULT_PCC_STRUCT_RETURN [Macro]
Define this macro to be 1 if all structure and union return values must be in memory.
Since this results in slower code, this should be defined only if needed for compatibility
with other compilers or with an ABI. If you define this macro to be 0, then the
conventions used for structure and union return values are decided by the TARGET_
RETURN_IN_MEMORY target hook.
If not defined, this defaults to the value 1.
PCC_STATIC_STRUCT_RETURN [Macro]
Define this macro if the usual system convention on the target machine for returning
structures and unions is for the called function to return the address of a static variable
containing the value.
Do not define this if the usual system convention is for the caller to pass an address
to the subroutine.
This macro has effect in -fpcc-struct-return mode, but it does nothing when you
use -freg-struct-return mode.
On machines where functions may or may not have frame-pointers, the function entry
code must vary accordingly; it must set up the frame pointer if one is wanted, and not
otherwise. To determine whether a frame pointer is in wanted, the macro can refer
to the variable frame_pointer_needed. The variable’s value will be 1 at run time in
a function that needs a frame pointer. See Section 18.9.5 [Elimination], page 560.
The function entry code is responsible for allocating any stack space required for the
function. This stack space consists of the regions listed below. In most cases, these
regions are allocated in the order listed, with the last listed region closest to the top
of the stack (the lowest address if STACK_GROWS_DOWNWARD is defined, and the highest
address if it is not defined). You can use a different order for a machine if doing so is
more convenient or required for compatibility reasons. Except in cases where required
by standard or by a debugger, there is no reason why the stack layout used by GCC
need agree with that used by other compilers for a machine.
profiling using the system’s installed C compiler and look at the assembler code that
results.
Older implementations of mcount expect the address of a counter variable to be loaded
into some register. The name of this variable is ‘LP’ followed by the number labelno,
so you would generate the name using ‘LP%d’ in a fprintf.
PROFILE_HOOK [Macro]
A C statement or compound statement to output to file some assembly code to call
the profiling subroutine mcount even the target does not support profiling.
NO_PROFILE_COUNTERS [Macro]
Define this macro to be an expression with a nonzero value if the mcount subroutine
on your system does not need a counter variable allocated for each function. This is
true for almost all modern implementations. If you define this macro, you must not
use the labelno argument to FUNCTION_PROFILER.
PROFILE_BEFORE_PROLOGUE [Macro]
Define this macro if the code for function profiling should come before the function
prologue. Normally, the profiling code comes after.
The easiest way to categorize the specified data type is to use __builtin_classify_
type together with sizeof and __alignof__.
__builtin_classify_type ignores the value of object, considering only its data type.
It returns an integer describing what kind of type that is—integer, floating, pointer,
structure, and so on.
The file typeclass.h defines an enumeration that you can use to interpret the values
of __builtin_classify_type.
This hook controls how the named argument to TARGET_FUNCTION_ARG is set for
varargs and stdarg functions. If this hook returns true, the named argument is always
true for named arguments, and false for unnamed arguments. If it returns false,
but TARGET_PRETEND_OUTGOING_VARARGS_NAMED returns true, then all arguments
are treated as named. Otherwise, all named arguments except the last are treated as
named.
You need not define this hook if it always returns false.
On some targets, including HPPA and IA-64, function descriptors may be mandated
by the ABI or be otherwise handled in a target-specific way by the back end in its code
generation strategy for indirect calls. GCC also provides its own generic descriptor im-
plementation to support the -fno-trampolines option. In this case runtime detection of
function descriptors at indirect call sites relies on descriptor pointers being tagged with a
bit that is never set in bare function addresses. Since GCC’s generic function descriptors
are not ABI-compliant, this option is typically used only on a per-language basis (notably
by Ada) or when it can otherwise be applied to the whole program.
For languages other than Ada, the -ftrampolines and -fno-trampolines options cur-
rently have no effect, and trampolines are always generated on platforms that need them
for nested functions.
Define the following hook if your backend either implements ABI-specified descriptor
support, or can use GCC’s generic descriptor implementation for nested functions.
int TARGET_CUSTOM_FUNCTION_DESCRIPTORS [Target Hook]
If the target can use GCC’s generic descriptor mechanism for nested functions, define
this hook to a power of 2 representing an unused bit in function pointers which can be
used to differentiate descriptors at run time. This value gives the number of bytes by
which descriptor pointers are misaligned compared to function pointers. For example,
on targets that require functions to be aligned to a 4-byte boundary, a value of either 1
or 2 is appropriate unless the architecture already reserves the bit for another purpose,
such as on ARM.
Define this hook to 0 if the target implements ABI support for function descriptors
in its standard calling sequence, like for example HPPA or IA-64.
Using descriptors for nested functions eliminates the need for trampolines that reside
on the stack and require it to be made executable.
The following macros tell GCC how to generate code to allocate and initialize an exe-
cutable trampoline. You can also use this interface if your back end needs to create ABI-
specified non-executable descriptors; in this case the "trampoline" created is the descriptor
containing data only.
The instructions in an executable trampoline must do two things: load a constant address
into the static chain register, and jump to the real address of the nested function. On CISC
machines such as the m68k, this requires two instructions, a move immediate and a jump.
Then the two addresses exist in the trampoline as word-long immediate operands. On RISC
machines, it is often necessary to load each address into a register in two parts. Then pieces
of each address form separate immediate operands.
The code generated to initialize the trampoline must store the variable parts—the static
chain value and the function address—into the immediate operands of the instructions. On
a CISC machine, this is simply a matter of copying each address to a memory reference at
the proper offset from the start of the trampoline. On a RISC machine, it may be necessary
to take out pieces of the address and store them separately.
void TARGET_ASM_TRAMPOLINE_TEMPLATE (FILE *f) [Target Hook]
This hook is called by assemble_trampoline_template to output, on the stream f,
assembler code for a block of data that contains the constant parts of a trampoline.
This code should not include a label—the label is taken care of automatically.
586 GNU Compiler Collection (GCC) Internals
If you do not define this hook, it means no template is needed for the target. Do not
define this hook on systems where the block move code to copy the trampoline into
place would be larger than the code to generate it on the spot.
TRAMPOLINE_SECTION [Macro]
Return the section into which the trampoline template is to be placed (see Sec-
tion 18.18 [Sections], page 617). The default value is readonly_data_section.
TRAMPOLINE_SIZE [Macro]
A C expression for the size in bytes of the trampoline, as an integer.
TRAMPOLINE_ALIGNMENT [Macro]
Alignment required for trampolines, in bits.
If you don’t define this macro, the value of FUNCTION_ALIGNMENT is used for aligning
trampolines.
Implementing trampolines is difficult on many machines because they have separate in-
struction and data caches. Writing into a stack location fails to clear the memory in the
instruction cache, so when the program jumps to that location, it executes the old contents.
Here are two possible solutions. One is to clear the relevant parts of the instruction cache
whenever a trampoline is set up. The other is to make all trampolines identical, by having
them jump to a standard subroutine. The former technique makes trampoline execution
faster; the latter makes initialization faster.
To clear the instruction cache when a trampoline is initialized, define the following macro.
CLEAR_INSN_CACHE (beg, end) [Macro]
If defined, expands to a C expression clearing the instruction cache in the specified
interval. The definition of this macro would typically be a series of asm statements.
Both beg and end are pointer expressions.
To use a standard subroutine, define the following macro. In addition, you must make
sure that the instructions in a trampoline fill an entire cache line with identical instructions,
or else ensure that the beginning of the trampoline code is always aligned at the same point
in its cache line. Look in m68k.h as a guide.
TRANSFER_FROM_TRAMPOLINE [Macro]
Define this macro if trampolines need a special subroutine to do their work. The
macro should expand to a series of asm statements which will be compiled with GCC.
They go in a library function named __transfer_from_trampoline.
If you need to avoid executing the ordinary prologue code of a compiled C function
when you jump to the subroutine, you can do so by placing a special label of your
own in the assembler code. Use one asm statement to generate an assembler label,
and another to make the label global. Then trampolines can use that label to jump
directly to your special assembler code.
method arguments all at once to the method-lookup library function. This is the usual
setting when targeting Darwin/Mac OS X systems, which have the NeXT runtime
installed.
If the macro is set to 0, the "GNU" Objective-C message sending convention will
be used by default. This convention passes just the object and the selector to the
method-lookup function, which returns a pointer to the method.
In either case, it remains possible to select code-generation for the alternate scheme,
by means of compiler command line switches.
HAVE_PRE_INCREMENT [Macro]
HAVE_PRE_DECREMENT [Macro]
HAVE_POST_INCREMENT [Macro]
HAVE_POST_DECREMENT [Macro]
A C expression that is nonzero if the machine supports pre-increment, pre-decrement,
post-increment, or post-decrement addressing respectively.
HAVE_PRE_MODIFY_DISP [Macro]
HAVE_POST_MODIFY_DISP [Macro]
A C expression that is nonzero if the machine supports pre- or post-address side-effect
generation involving constants other than the size of the memory operand.
HAVE_PRE_MODIFY_REG [Macro]
HAVE_POST_MODIFY_REG [Macro]
A C expression that is nonzero if the machine supports pre- or post-address side-effect
generation involving a register displacement.
MAX_REGS_PER_ADDRESS [Macro]
A number, the maximum number of registers that can appear in a valid memory
address. Note that it is up to you to specify a value equal to the maximum number
that TARGET_LEGITIMATE_ADDRESS_P would ever accept.
590 GNU Compiler Collection (GCC) Internals
a new value. This also applies to parts that you change indirectly by calling push_
reload.
The macro definition may use strict_memory_address_p to test if the address has
become legitimate.
If you want to change only a part of x, one standard way of doing this is to use
copy_rtx. Note, however, that it unshares only a single level of rtl. Thus, if the
part to be changed is not at the top level, you’ll need to replace first the top level.
It is not necessary for this macro to come up with a legitimate address; but often a
machine-dependent strategy can generate better code.
is not available. The return type of the vectorized function shall be of vector type
vec type out and the argument types should be vec type in.
VECT_COMPARE_COSTS
Tells the loop vectorizer to try all the provided modes and pick the one
with the lowest cost. By default the vectorizer will choose the first mode
that works.
The hook does not need to do anything if the vector returned by TARGET_VECTORIZE_
PREFERRED_SIMD_MODE is the only one relevant for autovectorization. The default
implementation adds no modes and returns 0.
integers for accumulating costs for the prologue, body, and epilogue of the loop or
basic block. If loop info is non-NULL, it identifies the loop being vectorized; otherwise
a single block is being vectorized. If costing for scalar is true, it indicates the current
cost model is for the scalar version of a loop or block; otherwise it is for the vector
version.
tree TARGET_VECTORIZE_BUILTIN_GATHER (const_tree [Target Hook]
mem_vectype, const_tree index_type, int scale)
Target builtin that implements vector gather operation. mem vectype is the vector
type of the load and index type is scalar type of the index, scaled by scale. The
default is NULL_TREE which means to not vectorize gather loads.
tree TARGET_VECTORIZE_BUILTIN_SCATTER (const_tree [Target Hook]
vectype, const_tree index_type, int scale)
Target builtin that implements vector scatter operation. vectype is the vector type
of the store and index type is scalar type of the index, scaled by scale. The default
is NULL_TREE which means to not vectorize scatter stores.
int TARGET_SIMD_CLONE_COMPUTE_VECSIZE_AND_SIMDLEN [Target Hook]
(struct cgraph_node *, struct cgraph_simd_clone *, tree, int,
bool)
This hook should set vecsize mangle, vecsize int, vecsize float fields in simd clone
structure pointed by clone info argument and also simdlen field if it was previously 0.
vecsize mangle is a marker for the backend only. vecsize int and vecsize float should
be left zero on targets where the number of lanes is not determined by the bitsize
(in which case simdlen is always used). The hook should return 0 if SIMD clones
shouldn’t be emitted, or number of vecsize mangle variants that should be emitted.
void TARGET_SIMD_CLONE_ADJUST (struct cgraph_node *) [Target Hook]
This hook should add implicit attribute(target("...")) attribute to SIMD clone
node if needed.
int TARGET_SIMD_CLONE_USABLE (struct cgraph_node *) [Target Hook]
This hook should return -1 if SIMD clone node shouldn’t be used in vectorized loops
in current function, or non-negative number if it is usable. In that case, the smaller
the number is, the more desirable it is to use it.
int TARGET_SIMT_VF (void) [Target Hook]
Return number of threads in SIMT thread group on the target.
int TARGET_OMP_DEVICE_KIND_ARCH_ISA (enum [Target Hook]
omp_device_kind_arch_isa trait, const char *name)
Return 1 if trait name is present in the OpenMP context’s device trait set, return 0 if
not present in any OpenMP context in the whole translation unit, or -1 if not present
in the current OpenMP context but might be present in another OpenMP context in
the same TU.
bool TARGET_GOACC_VALIDATE_DIMS (tree decl, int *dims, [Target Hook]
int fn_level, unsigned used)
This hook should check the launch dimensions provided for an OpenACC compute
region, or routine. Defaulted values are represented as -1 and non-constant values as
598 GNU Compiler Collection (GCC) Internals
0. The fn level is negative for the function corresponding to the compute region. For
a routine it is the outermost level at which partitioned execution may be spawned.
The hook should verify non-default values. If DECL is NULL, global defaults are
being validated and unspecified defaults should be filled in. Diagnostics should be
issued as appropriate. Return true, if changes have been made. You must override
this hook to provide dimensions larger than 1.
the code for foo will usually calculate three separate symbolic addresses: those of a, b
and c. On some targets, it would be better to calculate just one symbolic address and access
the three variables relative to it. The equivalent pseudocode would be something like:
int foo (void)
{
register int *xr = &x;
return xr[&a - &x] + xr[&b - &x] + xr[&c - &x];
}
(which isn’t valid C). We refer to shared addresses like x as “section anchors”. Their use
is controlled by -fsection-anchors.
The hooks below describe the target properties that GCC needs to know in order to
make effective use of section anchors. It won’t use section anchors at all unless either
TARGET_MIN_ANCHOR_OFFSET or TARGET_MAX_ANCHOR_OFFSET is set to a nonzero value.
600 GNU Compiler Collection (GCC) Internals
allowed to change the value of op0 since the value might be used in RTXs which
aren’t comparisons. E.g. the implementation is not allowed to swap operands in that
case.
GCC will not assume that the comparison resulting from this macro is valid but will
see if the resulting insn matches a pattern in the md file.
You need not to implement this hook if it would never change the comparison code
or operands.
The default version of this hook checks whether the modes are the same. If they are,
it returns that mode. If they are different, it returns VOIDmode.
unsigned int TARGET_FLAGS_REGNUM [Target Hook]
If the target has a dedicated flags register, and it needs to use the post-reload com-
parison elimination pass, or the delay slot filler pass, then this value should be set
appropriately.
If you do not define this macro, GCC uses a default cost of 4 plus the cost of copying
via a secondary reload register, if one is needed. If your machine requires a secondary
reload register to copy between memory and a register of class but the reload mech-
anism is more complex than copying via an intermediate, define this macro to reflect
the actual cost of the move.
GCC defines the function memory_move_secondary_cost if secondary reloads are
needed. It computes the costs due to copying via a secondary register. If your
machine copies from memory using a secondary register in the conventional way but
the default base value of 4 is not correct for your machine, define this macro to add
some other value to the result of that function. The arguments to that function are
the same as to this macro.
These macros are obsolete, new ports should use the target hook TARGET_MEMORY_
MOVE_COST instead.
Here are additional macros which do not specify precise relative costs, but only that
certain actions are more expensive than GCC would ordinarily expect.
SLOW_BYTE_ACCESS [Macro]
Define this macro as a C expression which is nonzero if accessing less than a word of
memory (i.e. a char or a short) is no faster than accessing a word of memory, i.e.,
Chapter 18: Target Description Macros and Functions 605
if such access require more than one instruction or if there is no difference in cost
between byte and (aligned) word loads.
When this macro is not defined, the compiler will access a field by finding the smallest
containing object; when it is defined, a fullword load will be used if alignment permits.
Unless bytes accesses are faster than word accesses, using word accesses is preferable
since it may eliminate subsequent memory access if subsequent accesses occur to other
fields in the same word of the structure, but to different bytes.
The parameter speed p is true if the code is currently being optimized for speed
rather than size.
Returning true for higher values of size can improve code generation for speed if the
target does not provide an implementation of the cpymem or setmem standard names,
if the cpymem or setmem implementation would be more expensive than a sequence
of insns, or if the overhead of a library call would dominate that of the body of the
memory operation.
Returning true for higher values of size may also cause an increase in code size, for
example where the number of insns emitted to perform a move would be greater than
that of a library call.
MOVE_MAX_PIECES [Macro]
A C expression used by move_by_pieces to determine the largest unit a load or store
used to copy memory is. Defaults to MOVE_MAX.
STORE_MAX_PIECES [Macro]
A C expression used by store_by_pieces to determine the largest unit a store used
to memory is. Defaults to MOVE_MAX_PIECES, or two times the size of HOST_WIDE_INT,
whichever is smaller.
COMPARE_MAX_PIECES [Macro]
A C expression used by compare_by_pieces to determine the largest unit a load or
store used to compare memory is. Defaults to MOVE_MAX_PIECES.
NO_FUNCTION_CSE [Macro]
Define this macro to be true if it is as good or better to call a constant function
address than to call an address kept in a register.
LOGICAL_OP_NON_SHORT_CIRCUIT [Macro]
Define this macro if a non-short-circuit operation produced by ‘fold_range_test ()’
is optimal. This macro defaults to true if BRANCH_COST is greater than or equal to
the value 2.
608 GNU Compiler Collection (GCC) Internals
register. On machines where the cost of the addressing mode containing the sum is
no higher than that of a simple indirect reference, this will produce an additional
instruction and possibly require an additional register. Proper specification of this
macro eliminates this overhead for such machines.
This hook is never called with an invalid address.
On machines where an address involving more than one register is as cheap as an
address computation involving only one register, defining TARGET_ADDRESS_COST to
reflect this can cause two registers to be live over a region of code where only one
would have been if TARGET_ADDRESS_COST were not defined in that manner. This
effect should be considered in the definition of this macro. Equivalent costs should
probably only be given to addresses with different numbers of registers on machines
with lots of registers.
int TARGET_INSN_COST (rtx_insn *insn, bool speed) [Target Hook]
This target hook describes the relative costs of RTL instructions.
In implementing this hook, you can use the construct COSTS_N_INSNS (n) to specify
a cost equal to n fast instructions.
When optimizing for code size, i.e. when speed is false, this target hook should be used
to estimate the relative size cost of an expression, again relative to COSTS_N_INSNS.
unsigned int TARGET_MAX_NOCE_IFCVT_SEQ_COST (edge e) [Target Hook]
This hook returns a value in the same units as TARGET_RTX_COSTS, giving the max-
imum acceptable cost for a sequence generated by the RTL if-conversion pass when
conditional execution is not available. The RTL if-conversion pass attempts to con-
vert conditional operations that would require a branch to a series of unconditional
operations and movmodecc insns. This hook returns the maximum cost of the uncon-
ditional instructions and the movmodecc insns. RTL if-conversion is cancelled if the
cost of the converted sequence is greater than the value returned by this hook.
e is the edge between the basic block containing the conditional branch to the basic
block which would be executed if the condition were true.
The default implementation of this hook uses the max-rtl-if-conversion-
[un]predictable parameters if they are set, and uses a multiple of BRANCH_COST
otherwise.
bool TARGET_NOCE_CONVERSION_PROFITABLE_P (rtx_insn [Target Hook]
*seq, struct noce_if_info *if_info)
This hook returns true if the instruction sequence seq is a good candidate as a
replacement for the if-convertible sequence described in if_info.
bool TARGET_NEW_ADDRESS_PROFITABLE_P (rtx memref, [Target Hook]
rtx_insn * insn, rtx new_addr)
Return true if it is profitable to replace the address in memref with new addr. This
allows targets to prevent the scheduler from undoing address optimizations. The
instruction containing the memref is insn. The default implementation returns true.
bool TARGET_NO_SPECULATION_IN_DELAY_SLOTS_P (void) [Target Hook]
This predicate controls the use of the eager delay slot filler to disallow speculatively
executed instructions being placed in delay slots. Targets such as certain MIPS archi-
610 GNU Compiler Collection (GCC) Internals
tectures possess both branches with and without delay slots. As the eager delay slot
filler can decrease performance, disabling it is beneficial when ordinary branches are
available. Use of delay slot branches filled using the basic filler is often still desirable
as the delay slot can hide a pipeline bubble.
HOST_WIDE_INT TARGET_ESTIMATED_POLY_VALUE (poly_int64 [Target Hook]
val, poly_value_estimate_kind kind)
Return an estimate of the runtime value of val, for use in things like cost calculations
or profiling frequencies. kind is used to ask for the minimum, maximum, and likely
estimates of the value through the POLY_VALUE_MIN, POLY_VALUE_MAX and POLY_
VALUE_LIKELY values. The default implementation returns the lowest possible value
of val.
you could use the hook to modify them too. See also see Section 17.19.9 [Processor
pipeline description], page 485.
analysis of dependencies. This hook can use backward and forward dependencies of
the insn scheduler because they are already calculated.
scheduled according to the two priorities. All priorities calculated should be between
0 (exclusive) and max pri (inclusive). To avoid false dependencies, fusion pri of in-
structions which need to be scheduled together should be smaller than fusion pri of
irrelevant instructions.
Given below example:
ldr r10, [r1, 4]
add r4, r4, r10
ldr r15, [r2, 8]
sub r5, r5, r15
ldr r11, [r1, 0]
add r4, r4, r11
ldr r16, [r2, 12]
sub r5, r5, r16
On targets like ARM/AArch64, the two pairs of consecutive loads should be merged.
Since peephole2 pass can’t help in this case unless consecutive loads are actually next
to each other in instruction flow. That’s where this scheduling fusion pass works.
This hook calculates priority for each instruction based on its fustion type, like:
ldr r10, [r1, 4] ; fusion_pri=99, pri=96
add r4, r4, r10 ; fusion_pri=100, pri=100
ldr r15, [r2, 8] ; fusion_pri=98, pri=92
sub r5, r5, r15 ; fusion_pri=100, pri=100
ldr r11, [r1, 0] ; fusion_pri=99, pri=100
add r4, r4, r11 ; fusion_pri=100, pri=100
ldr r16, [r2, 12] ; fusion_pri=98, pri=88
sub r5, r5, r16 ; fusion_pri=100, pri=100
Scheduling fusion pass then sorts all ready to issue instructions according to the
priorities. As a result, instructions of same fusion type will be pushed together in
instruction flow, like:
ldr r11, [r1, 0]
ldr r10, [r1, 4]
ldr r15, [r2, 8]
ldr r16, [r2, 12]
add r4, r4, r10
sub r5, r5, r15
add r4, r4, r11
sub r5, r5, r16
Now peephole2 pass can simply merge the two pairs of loads.
Since scheduling fusion pass relies on peephole2 to do real fusion work, it is only
enabled by default when peephole2 is in effect.
This is firstly introduced on ARM/AArch64 targets, please refer to the hook imple-
mentation for how different fusion types are supported.
void TARGET_EXPAND_DIVMOD_LIBFUNC (rtx libfunc, [Target Hook]
machine_mode mode, rtx op0, rtx op1, rtx *quot, rtx *rem)
Define this hook for enabling divmod transform if the port does not have hardware
divmod insn but defines target-specific divmod libfuncs.
the data section, which holds initialized writable data; and the bss section, which holds
uninitialized data. Some systems have other kinds of sections.
varasm.cc provides several well-known sections, such as text_section, data_section
and bss_section. The normal way of controlling a foo_section variable is to define the
associated FOO_SECTION_ASM_OP macro, as described below. The macros are only read once,
when varasm.cc initializes itself, so their values must be run-time constants. They may
however depend on command-line flags.
Note: Some run-time files, such crtstuff.c, also make use of the FOO_SECTION_ASM_OP
macros, and expect them to be string literals.
Some assemblers require a different string to be written every time a section is selected. If
your assembler falls into this category, you should define the TARGET_ASM_INIT_SECTIONS
hook and use get_unnamed_section to set up the sections.
You must always create a text_section, either by defining TEXT_SECTION_ASM_OP or
by initializing text_section in TARGET_ASM_INIT_SECTIONS. The same is true of data_
section and DATA_SECTION_ASM_OP. If you do not create a distinct readonly_data_
section, the default is to reuse text_section.
All the other varasm.cc sections are optional, and are null if the target does not provide
them.
TEXT_SECTION_ASM_OP [Macro]
A C expression whose value is a string, including spacing, containing the assembler
operation that should precede instructions and read-only data. Normally "\t.text"
is right.
HOT_TEXT_SECTION_NAME [Macro]
If defined, a C string constant for the name of the section containing most frequently
executed functions of the program. If not defined, GCC will provide a default defini-
tion if the target supports named sections.
UNLIKELY_EXECUTED_TEXT_SECTION_NAME [Macro]
If defined, a C string constant for the name of the section containing unlikely executed
functions in the program.
DATA_SECTION_ASM_OP [Macro]
A C expression whose value is a string, including spacing, containing the assem-
bler operation to identify the following data as writable initialized data. Normally
"\t.data" is right.
SDATA_SECTION_ASM_OP [Macro]
If defined, a C expression whose value is a string, including spacing, containing the
assembler operation to identify the following data as initialized, writable small data.
READONLY_DATA_SECTION_ASM_OP [Macro]
A C expression whose value is a string, including spacing, containing the assembler
operation to identify the following data as read-only initialized data.
BSS_SECTION_ASM_OP [Macro]
If defined, a C expression whose value is a string, including spacing, containing the
assembler operation to identify the following data as uninitialized global data. If not
Chapter 18: Target Description Macros and Functions 619
functions from the init and fini sections. By default, this macro uses a simple function
call. Some ports need hand-crafted assembly code to avoid dependencies on registers
initialized in the function prologue or to ensure that constant pools don’t end up too
far way in the text section.
TARGET_LIBGCC_SDATA_SECTION [Macro]
If defined, a string which names the section into which small variables defined in
crtstuff and libgcc should go. This is useful when the target has options for optimizing
access to small data, and you want the crtstuff and libgcc routines to be conservative
in what they expect of your application yet liberal in what your application expects.
For example, for targets with a .sdata section (like MIPS), you could compile crtstuff
with -G 0 so that it doesn’t require small data support from your application, but use
this macro to put small data into .sdata so that your application can access these
variables whether it uses small data or not.
FORCE_CODE_SECTION_ALIGN [Macro]
If defined, an ASM statement that aligns a code section to some arbitrary boundary.
This is used to force all fragments of the .init and .fini sections to have to same
alignment and thus prevent the linker from having to add any padding.
JUMP_TABLES_IN_TEXT_SECTION [Macro]
Define this macro to be an expression with a nonzero value if jump tables (for
tablejump insns) should be output in the text section, along with the assembler
instructions. Otherwise, the readonly data section is used.
This macro is irrelevant if there is no separate readonly data section.
void TARGET_ASM_INIT_SECTIONS (void) [Target Hook]
Define this hook if you need to do something special to set up the varasm.cc sections,
or if your target has some special sections of its own that you need to create.
GCC calls this hook after processing the command line, but before writing any as-
sembly code, and before calling any of the section-returning hooks described below.
int TARGET_ASM_RELOC_RW_MASK (void) [Target Hook]
Return a mask describing how relocations should be treated when selecting sections.
Bit 1 should be set if global relocations should be placed in a read-write section; bit
0 should be set if local relocations should be placed in a read-write section.
The default version of this function returns 3 when -fpic is in effect, and 0 other-
wise. The hook is typically redefined when the target cannot support (some kinds of)
dynamic relocations in read-only sections even in executables.
bool TARGET_ASM_GENERATE_PIC_ADDR_DIFF_VEC (void) [Target Hook]
Return true to generate ADDR DIF VEC table or false to generate ADDR VEC
table for jumps in case of -fPIC.
The default version of this function returns true if flag pic equals true and false
otherwise
section * TARGET_ASM_SELECT_SECTION (tree exp, int [Target Hook]
reloc, unsigned HOST_WIDE_INT align)
Return the section into which exp should be placed. You can assume that exp is
either a VAR_DECL node or a constant of some sort. reloc indicates whether the
Chapter 18: Target Description Macros and Functions 621
initial value of exp requires link-time relocations. Bit 0 is set when variable contains
local relocations only, while bit 1 is set for global relocations. align is the constant
alignment in bits.
The default version of this function takes care of putting read-only variables in
readonly_data_section.
See also USE SELECT SECTION FOR FUNCTIONS.
USE_SELECT_SECTION_FOR_FUNCTIONS [Macro]
Define this macro if you wish TARGET ASM SELECT SECTION to be called for
FUNCTION_DECLs as well as for variables and constants.
In the case of a FUNCTION_DECL, reloc will be zero if the function has been determined
to be likely to be called, and nonzero if it is unlikely to be called.
PIC_OFFSET_TABLE_REGNUM [Macro]
The register number of the register used to address a table of static data addresses
in memory. In some cases this register is defined by a processor’s “application binary
interface” (ABI). When this macro is defined, RTL is generated for this register once,
as with the stack pointer and frame pointer registers. If this macro is not defined, it
is up to the machine-dependent files to allocate such a register (if necessary). Note
that this register must be fixed when in use (e.g. when flag_pic is true).
PIC_OFFSET_TABLE_REG_CALL_CLOBBERED [Macro]
A C expression that is nonzero if the register defined by PIC_OFFSET_TABLE_REGNUM
is clobbered by calls. If not defined, the default is zero. Do not define this macro if
PIC_OFFSET_TABLE_REGNUM is not defined.
ASM_COMMENT_START [Macro]
A C string constant describing how to begin a comment in the target assembler
language. The compiler assumes that the comment will end at the end of the line.
ASM_APP_ON [Macro]
A C string constant for text to be output before each asm statement or group of
consecutive ones. Normally this is "#APP", which is a comment that has no effect on
most assemblers but tells the GNU assembler that it must check the lines that follow
for all valid assembler constructs.
ASM_APP_OFF [Macro]
A C string constant for text to be output after each asm statement or group of con-
secutive ones. Normally this is "#NO_APP", which tells the GNU assembler to resume
making the time-saving assumptions that are valid for ordinary compiler output.
ASM_OUTPUT_SOURCE_FILENAME (stream, name) [Macro]
A C statement to output COFF information or DWARF debugging information which
indicates that filename name is the current source file to the stdio stream stream.
This macro need not be defined if the standard form of output for the file format in
use is appropriate.
void TARGET_ASM_OUTPUT_SOURCE_FILENAME (FILE *file, [Target Hook]
const char *name)
Output DWARF debugging information which indicates that filename name is the
current source file to the stdio stream file.
This target hook need not be defined if the standard form of output for the file format
in use is appropriate.
void TARGET_ASM_OUTPUT_IDENT (const char *name) [Target Hook]
Output a string based on name, suitable for the ‘#ident’ directive, or the equivalent
directive or pragma in non-C-family languages. If this hook is not defined, nothing is
output for the ‘#ident’ directive.
OUTPUT_QUOTED_STRING (stream, string) [Macro]
A C statement to output the string string to the stdio stream stream. If you do not
call the function output_quoted_string in your config files, GCC will only call it
to output filenames to the assembler source. So you can use it to canonicalize the
format of the filename using this macro.
void TARGET_ASM_NAMED_SECTION (const char *name, [Target Hook]
unsigned int flags, tree decl)
Output assembly directives to switch to section name. The section should have at-
tributes as specified by flags, which is a bit mask of the SECTION_* flags defined in
output.h. If decl is non-NULL, it is the VAR_DECL or FUNCTION_DECL with which
this section is associated.
bool TARGET_ASM_ELF_FLAGS_NUMERIC (unsigned int flags, [Target Hook]
unsigned int *num)
This hook can be used to encode ELF section flags for which no letter code has been
defined in the assembler. It is called by default_asm_named_section whenever the
626 GNU Compiler Collection (GCC) Internals
section flags need to be emitted in the assembler output. If the hook returns true,
then the numerical value for ELF section flags should be calculated from flags and
saved in *num; the value is printed out instead of the normal sequence of letter codes.
If the hook is not defined, or if it returns false, then num is ignored and the traditional
letter sequence is emitted.
If target hook fails to recognize a pattern, it must return false, so that a standard
error message is printed. If it prints an error message itself, by calling, for example,
output_operand_lossage, it may just return true.
CONSTANT_POOL_BEFORE_FUNCTION [Macro]
You may define this macro as a C expression. You should define the expression to
have a nonzero value if GCC should output the constant pool for a function before
the code for the function, or a zero value if GCC should output the constant pool
after the function. If you do not define this macro, the usual case, GCC will output
the constant pool before the function.
These macros are provided by real.h for writing the definitions of ASM_OUTPUT_DOUBLE
and the like:
that size may be zero, for instance if a struct with no other member than a zero-
length array is defined. In this case, the backend must output a symbol definition
that allocates at least one byte, both so that the address of the resulting object does
not compare equal to any other, and because some object formats cannot even express
the concept of a zero-sized common symbol, as that is how they represent an ordinary
undefined external.
Use the expression assemble_name (stream, name) to output the name itself; before
and after that, output the additional assembler syntax for defining the name, and a
newline.
This macro controls how the assembler definitions of uninitialized common global
variables are output.
Use the expression assemble_name (stream, name) to output the name itself; before
and after that, output the additional assembler syntax for defining the name, and a
newline.
This macro controls how the assembler definitions of uninitialized static variables are
output.
ASM_OUTPUT_ALIGNED_LOCAL (stream, name, size, alignment) [Macro]
Like ASM_OUTPUT_LOCAL except takes the required alignment as a separate, explicit
argument. If you define this macro, it is used in place of ASM_OUTPUT_LOCAL, and
gives you more flexibility in handling the required alignment of the variable. The
alignment is specified as the number of bits.
ASM_OUTPUT_ALIGNED_DECL_LOCAL (stream, decl, name, size, [Macro]
alignment)
Like ASM_OUTPUT_ALIGNED_LOCAL except that decl of the variable to be output, if
there is one, or NULL_TREE if there is no corresponding variable. If you define
this macro, GCC will use it in place of both ASM_OUTPUT_LOCAL and ASM_OUTPUT_
ALIGNED_LOCAL. Define this macro when you need to see the variable’s decl in order
to chose what to output.
Define this macro only if it is correct to use the default definitions of ASM_OUTPUT_
SIZE_DIRECTIVE and ASM_OUTPUT_MEASURED_SIZE for your system. If you need your
own custom definitions of those macros, or if you do not need explicit symbol sizes at
all, do not define this macro.
NO_DOLLAR_IN_LABEL [Macro]
Define this macro if the assembler does not accept the character ‘$’ in label names.
By default constructors and destructors in G++ have ‘$’ in the identifiers. If this
macro is defined, ‘.’ is used instead.
NO_DOT_IN_LABEL [Macro]
Define this macro if the assembler does not accept the character ‘.’ in label names.
By default constructors and destructors in G++ have names that use ‘.’. If this macro
is defined, these names are rewritten to avoid ‘.’.
TYPE_ASM_OP [Macro]
A C string containing the appropriate assembler directive to specify the type of
a symbol, without any arguments. On systems that use ELF, the default (in
config/elfos.h) is ‘"\t.type\t"’; on other systems, the default is not to define
this macro.
Define this macro only if it is correct to use the default definition of ASM_OUTPUT_
TYPE_DIRECTIVE for your system. If you need your own custom definition of this
macro, or if you do not need explicit symbol types at all, do not define this macro.
TYPE_OPERAND_FMT [Macro]
A C string which specifies (using printf syntax) the format of the second operand to
TYPE_ASM_OP. On systems that use ELF, the default (in config/elfos.h) is ‘"@%s"’;
on other systems, the default is not to define this macro.
Define this macro only if it is correct to use the default definition of ASM_OUTPUT_
TYPE_DIRECTIVE for your system. If you need your own custom definition of this
macro, or if you do not need explicit symbol types at all, do not define this macro.
Chapter 18: Target Description Macros and Functions 633
This macro must output the label definition (perhaps using ASM_OUTPUT_LABEL). The
argument decl is the VAR_DECL tree node representing the variable.
If this macro is not defined, then the variable name is defined in the usual manner as
a label (by means of ASM_OUTPUT_LABEL).
You may wish to use ASM_OUTPUT_TYPE_DIRECTIVE and/or ASM_OUTPUT_SIZE_
DIRECTIVE in the definition of this macro.
SUPPORTS_WEAK [Macro]
A preprocessor constant expression which evaluates to true if the target supports
weak symbols.
If you don’t define this macro, defaults.h provides a default definition. If either ASM_
WEAKEN_LABEL or ASM_WEAKEN_DECL is defined, the default definition is ‘1’; otherwise,
it is ‘0’.
TARGET_SUPPORTS_WEAK [Macro]
A C expression which evaluates to true if the target supports weak symbols.
If you don’t define this macro, defaults.h provides a default definition. The default
definition is ‘(SUPPORTS_WEAK)’. Define this macro if you want to control weak symbol
support with a compiler flag such as -melf.
SUPPORTS_ONE_ONLY [Macro]
A C expression which evaluates to true if the target supports one-only semantics.
636 GNU Compiler Collection (GCC) Internals
If you don’t define this macro, varasm.cc provides a default definition. If MAKE_
DECL_ONE_ONLY is defined, the default definition is ‘1’; otherwise, it is ‘0’. Define
this macro if you want to control one-only symbol support with a compiler flag, or
if setting the DECL_ONE_ONLY flag is enough to mark a declaration to be emitted as
one-only.
TARGET_WEAK_NOT_IN_ARCHIVE_TOC [Macro]
A C expression that evaluates to true if the target’s linker expects that weak symbols
do not appear in a static archive’s table of contents. The default is 0.
Leaving weak symbols out of an archive’s table of contents means that, if a symbol
will only have a definition in one translation unit and will have undefined references
from other translation units, that symbol should not be weak. Defining this macro to
be nonzero will thus have the effect that certain symbols that would normally be weak
(explicit template instantiations, and vtables for polymorphic classes with noninline
key methods) will instead be nonweak.
The C++ ABI requires this macro to be zero. Define this macro for targets where full
C++ ABI compliance is impossible and where linker restrictions require weak symbols
to be left out of a static archive’s table of contents.
this way. If the string doesn’t start with ‘*’, then ASM_OUTPUT_LABELREF gets to
output the string, and may change it. (Of course, ASM_OUTPUT_LABELREF is also part
of your machine description, so you should know what it does on your machine.)
that defines an initialization function also puts a word in the constructor section to point to
that function. The linker accumulates all these words into one contiguous ‘.ctors’ section.
Termination functions are handled similarly.
This method will be chosen as the default by target-def.h if TARGET_ASM_NAMED_
SECTION is defined. A target that does not support arbitrary sections, but does support
special designated constructor and destructor sections may define CTORS_SECTION_ASM_OP
and DTORS_SECTION_ASM_OP to achieve the same effect.
When arbitrary sections are available, there are two variants, depending upon how the
code in crtstuff.c is called. On systems that support a .init section which is executed
at program startup, parts of crtstuff.c are compiled into that section. The program is
linked by the gcc driver like this:
ld -o output_file crti.o crtbegin.o ... -lgcc crtend.o crtn.o
The prologue of a function (__init) appears in the .init section of crti.o; the epilogue
appears in crtn.o. Likewise for the function __fini in the .fini section. Normally these
files are provided by the operating system or by the GNU C library, but are provided by
GCC for a few targets.
The objects crtbegin.o and crtend.o are (for most targets) compiled from crtstuff.c.
They contain, among other things, code fragments within the .init and .fini sections that
branch to routines in the .text section. The linker will pull all parts of a section together,
which results in a complete __init function that invokes the routines we need at startup.
To use this variant, you must define the INIT_SECTION_ASM_OP macro properly.
If no init section is available, when GCC compiles any function called main (or more
accurately, any function designated as a program entry point by the language front end
calling expand_main_function), it inserts a procedure call to __main as the first executable
code after the function prologue. The __main function is defined in libgcc2.c and runs
the global constructors.
In file formats that don’t support arbitrary sections, there are again two variants. In
the simplest variant, the GNU linker (GNU ld) and an ‘a.out’ format must be used. In
this case, TARGET_ASM_CONSTRUCTOR is defined to produce a .stabs entry of type ‘N_SETT’,
referencing the name __CTOR_LIST__, and with the address of the void function containing
the initialization code as its value. The GNU linker recognizes this as a request to add the
value to a set; the values are accumulated, and are eventually placed in the executable as
a vector in the format described above, with a leading (ignored) count and a trailing zero
element. TARGET_ASM_DESTRUCTOR is handled similarly. Since no init section is available,
the absence of INIT_SECTION_ASM_OP causes the compilation of main to call __main as
above, starting the initialization process.
The last variant uses neither arbitrary sections nor the GNU linker. This is preferable
when you want to do dynamic linking and when using file formats which the GNU linker
does not support, such as ‘ECOFF’. In this case, TARGET_HAVE_CTORS_DTORS is false,
initialization and termination functions are recognized simply by their names. This requires
an extra program in the linkage step, called collect2. This program pretends to be the
linker, for use with GCC; it does its job by running the ordinary linker, but also arranges to
include the vectors of initialization and termination functions. These functions are called
via __main as described above. In order to use this method, use_collect2 must be defined
in the target in config.gcc.
Chapter 18: Target Description Macros and Functions 641
INIT_SECTION_ASM_OP [Macro]
If defined, a C string constant, including spacing, for the assembler operation to
identify the following data as initialization code. If not defined, GCC will assume
such a section does not exist. When you are using special sections for initialization
and termination functions, this macro also controls how crtstuff.c and libgcc2.c
arrange to run the initialization functions.
HAS_INIT_SECTION [Macro]
If defined, main will not call __main as described above. This macro should be defined
for systems that control start-up code on a symbol-by-symbol basis, such as OSF/1,
and should not be defined explicitly for systems that support INIT_SECTION_ASM_OP.
LD_INIT_SWITCH [Macro]
If defined, a C string constant for a switch that tells the linker that the following
symbol is an initialization routine.
LD_FINI_SWITCH [Macro]
If defined, a C string constant for a switch that tells the linker that the following
symbol is a finalization routine.
INVOKE__main [Macro]
If defined, main will call __main despite the presence of INIT_SECTION_ASM_OP. This
macro should be defined for systems where the init section is not actually run auto-
matically, but is still useful for collecting the lists of constructors and destructors.
SUPPORTS_INIT_PRIORITY [Macro]
If nonzero, the C++ init_priority attribute is supported and the compiler should
emit instructions to control the order of initialization of objects. If zero, the compiler
will issue an error message upon encountering an init_priority attribute.
642 GNU Compiler Collection (GCC) Internals
OBJECT_FORMAT_COFF [Macro]
Define this macro if the system uses COFF (Common Object File Format) object files,
so that collect2 can assume this format and scan object files directly for dynamic
constructor/destructor functions.
This macro is effective only in a native compiler; collect2 as part of a cross compiler
always uses nm for the target machine.
REAL_NM_FILE_NAME [Macro]
Define this macro as a C string constant containing the file name to use to execute
nm. The default is to search the path normally for nm.
NM_FLAGS [Macro]
collect2 calls nm to scan object files for static constructors and destructors and LTO
info. By default, -n is passed. Define NM_FLAGS to a C string constant if other options
are needed to get the same output format as GNU nm -n produces.
Chapter 18: Target Description Macros and Functions 643
If your system supports shared libraries and has a program to list the dynamic depen-
dencies of a given library or executable, you can define these macros to enable support for
running initialization and termination functions in shared libraries:
LDD_SUFFIX [Macro]
Define this macro to a C string constant containing the name of the program which
lists dynamic dependencies, like ldd under SunOS 4.
SHLIB_SUFFIX [Macro]
Define this macro to a C string constant containing the default shared library exten-
sion of the target (e.g., ‘".so"’). collect2 strips version information after this suffix
when generating global constructor and destructor names. This define is only needed
on targets that use collect2 to process constructors and destructors.
REGISTER_NAMES [Macro]
A C initializer containing the assembler’s names for the machine registers, each one
as a C string constant. This is what translates register numbers in the compiler into
assembler language.
ADDITIONAL_REGISTER_NAMES [Macro]
If defined, a C initializer for an array of structures containing a name and a register
number. This macro defines additional names for hard registers, thus allowing the
asm option in declarations to refer to registers using alternate names.
OVERLAPPING_REGISTER_NAMES [Macro]
If defined, a C initializer for an array of structures containing a name, a register
number and a count of the number of consecutive machine registers the name over-
laps. This macro defines additional names for hard registers, thus allowing the asm
option in declarations to refer to registers using alternate names. Unlike ADDITIONAL_
REGISTER_NAMES, this macro should be used when the register name implies multiple
underlying registers.
This macro should be used when it is important that a clobber in an asm statement
clobbers all the underlying values implied by the register name. For example, on
ARM, clobbering the double-precision VFP register “d0” implies clobbering both
single-precision registers “s0” and “s1”.
operand. If the specification was just ‘%digit’ then code is 0; if the specification was
‘%ltr digit’ then code is the ASCII code for ltr.
If x is a register, this macro should print the register’s name. The names can be
found in an array reg_names whose type is char *[]. reg_names is initialized from
REGISTER_NAMES.
When the machine description has a specification ‘%punct’ (a ‘%’ followed by a punc-
tuation character), this macro is called with a null pointer for x and the punctuation
character for code.
PRINT_OPERAND_PUNCT_VALID_P (code) [Macro]
A C expression which evaluates to true if code is a valid punctuation character for
use in the PRINT_OPERAND macro. If PRINT_OPERAND_PUNCT_VALID_P is not defined,
it means that no punctuation characters (except for the standard one, ‘%’) are used
in this way.
PRINT_OPERAND_ADDRESS (stream, x) [Macro]
A C compound statement to output to stdio stream stream the assembler syntax for
an instruction operand that is a memory reference whose address is x. x is an RTL
expression.
On some machines, the syntax for a symbolic address depends on the section that
the address refers to. On these machines, define the hook TARGET_ENCODE_SECTION_
INFO to store the information into the symbol_ref, and then check for it here. See
Section 18.20 [Assembler Format], page 623.
DBR_OUTPUT_SEQEND (file) [Macro]
A C statement, to be executed after all slot-filler instructions have been output. If
necessary, call dbr_sequence_length to determine the number of slots filled in a
sequence (zero if not currently outputting a sequence), to decide how many no-ops to
output, or whatever.
Don’t define this macro if it has nothing to do, but it is helpful in reading assembly
output if the extent of the delay sequence is made explicit (e.g. with white space).
Note that output routines for instructions with delay slots must be prepared to deal with
not being output as part of a sequence (i.e. when the scheduling pass is not run, or when
no slot fillers could be found.) The variable final_sequence is null when not processing a
sequence, otherwise it contains the sequence rtx being output.
REGISTER_PREFIX [Macro]
LOCAL_LABEL_PREFIX [Macro]
USER_LABEL_PREFIX [Macro]
IMMEDIATE_PREFIX [Macro]
If defined, C string expressions to be used for the ‘%R’, ‘%L’, ‘%U’, and ‘%I’ options of
asm_fprintf (see final.cc). These are useful when a single md file must support
multiple assembler formats. In that case, the various tm.h files can define these
macros differently.
ASM_FPRINTF_EXTENSIONS (file, argptr, format) [Macro]
If defined this macro should expand to a series of case statements which will be
parsed inside the switch statement of the asm_fprintf function. This allows targets
646 GNU Compiler Collection (GCC) Internals
to define extra printf formats which may useful when generating their assembler
statements. Note that uppercase letters are reserved for future generic extensions
to asm fprintf, and so are not available to target specific code. The output file is
given by the parameter file. The varargs input pointer is argptr and the rest of the
format string, starting the character after the one that is being switched upon, is
pointed to by format.
ASSEMBLER_DIALECT [Macro]
If your target supports multiple dialects of assembler language (such as different
opcodes), define this macro as a C expression that gives the numeric index of the
assembler language dialect to use, with zero as the first variant.
If this macro is defined, you may use constructs of the form
‘{option0|option1|option2...}’
in the output templates of patterns (see Section 17.5 [Output Template], page 363) or
in the first argument of asm_fprintf. This construct outputs ‘option0’, ‘option1’,
‘option2’, etc., if the value of ASSEMBLER_DIALECT is zero, one, two, etc. Any spe-
cial characters within these strings retain their usual meaning. If there are fewer
alternatives within the braces than the value of ASSEMBLER_DIALECT, the construct
outputs nothing. If it’s needed to print curly braces or ‘|’ character in assembler
output directly, ‘%{’, ‘%}’ and ‘%|’ can be used.
If you do not define this macro, the characters ‘{’, ‘|’ and ‘}’ do not have any special
meaning when used in templates or operands to asm_fprintf.
Define the macros REGISTER_PREFIX, LOCAL_LABEL_PREFIX, USER_LABEL_PREFIX
and IMMEDIATE_PREFIX if you can express the variations in assembler language syntax
with that mechanism. Define ASSEMBLER_DIALECT and use the ‘{option0|option1}’
syntax if the syntax variant are larger and involve such things as different opcodes
or operand order.
value, rel)
You must provide this macro on machines where the addresses in a dispatch table
are relative to the table’s own address. If defined, GCC will also use this macro on
all machines when producing PIC. body is the body of the ADDR_DIFF_VEC; it is
provided so that the mode and flags can be read.
ASM_OUTPUT_ADDR_VEC_ELT (stream, value) [Macro]
This macro should be provided on machines where the addresses in a dispatch table
are absolute.
The definition should be a C statement to output to the stdio stream stream an
assembler pseudo-instruction to generate a reference to a label. value is the number
of an internal label whose definition is output using (*targetm.asm_out.internal_
label). For example,
fprintf (stream, "\t.word L%d\n", value)
EH_FRAME_SECTION_NAME [Macro]
If defined, a C string constant for the name of the section containing exception han-
dling frame unwind information. If not defined, GCC will provide a default definition
if the target supports named sections. crtstuff.c uses this macro to switch to the
appropriate section.
You should define this symbol if your target supports DWARF 2 frame unwind infor-
mation and the default definition does not work.
Chapter 18: Target Description Macros and Functions 649
EH_FRAME_THROUGH_COLLECT2 [Macro]
If defined, DWARF 2 frame unwind information will identified by specially named
labels. The collect2 process will locate these labels and generate code to register the
frames.
This might be necessary, for instance, if the system linker will not place the eh frames
in-between the sentinals from crtstuff.c, or if the system linker does garbage col-
lection and sections cannot be marked as not to be collected.
EH_TABLES_CAN_BE_READ_ONLY [Macro]
Define this macro to 1 if your target is such that no frame unwind information en-
coding used with non-PIC code will ever require a runtime relocation, but the linker
may not support merging read-only and read-write sections into a single read-write
section.
MASK_RETURN_ADDR [Macro]
An rtx used to mask the return address found via RETURN_ADDR_RTX, so that it does
not contain any extraneous set bits in it.
DWARF2_UNWIND_INFO [Macro]
Define this macro to 0 if your target supports DWARF 2 frame unwind information,
but it does not yet work with exception handling. Otherwise, if your target supports
this information (if it defines INCOMING_RETURN_ADDR_RTX and OBJECT_FORMAT_ELF),
GCC will provide a default definition of 1.
DONT_USE_BUILTIN_SETJMP [Macro]
Define this macro to 1 if the setjmp/longjmp-based scheme should use the
setjmp/longjmp functions from the C library instead of the __builtin_setjmp/__
builtin_longjmp machinery.
JMP_BUF_SIZE [Macro]
This macro has no effect unless DONT_USE_BUILTIN_SETJMP is also defined. Define this
macro if the default size of jmp_buf buffer for the setjmp/longjmp-based exception
handling mechanism is not large enough, or if it is much too large. The default size
is FIRST_PSEUDO_REGISTER * sizeof(void *).
DWARF_CIE_DATA_ALIGNMENT [Macro]
This macro need only be defined if the target might save registers in the function
prologue at an offset to the stack pointer that is not aligned to UNITS_PER_WORD. The
definition should be the negative minimum alignment if STACK_GROWS_DOWNWARD is
true, and the positive minimum alignment otherwise. See Section 18.21.2 [DWARF],
page 653. Only applicable if the target supports DWARF 2 frame unwind information.
bool TARGET_TERMINATE_DW2_EH_FRAME_INFO [Target Hook]
Contains the value true if the target should add a zero word onto the end of a Dwarf-2
frame info section when used for exception handling. Default value is false if EH_
FRAME_SECTION_NAME is defined, and true otherwise.
rtx TARGET_DWARF_REGISTER_SPAN (rtx reg) [Target Hook]
Given a register, this hook should return a parallel of registers to represent where to
find the register pieces. Define this hook if the register and its mode are represented
in Dwarf in non-contiguous locations, or if the register should be represented in more
than one register in Dwarf. Otherwise, this hook should return NULL_RTX. If not
defined, the default is to return NULL_RTX.
machine_mode TARGET_DWARF_FRAME_REG_MODE (int regno) [Target Hook]
Given a register, this hook should return the mode which the corresponding Dwarf
frame register should have. This is normally used to return a smaller mode than the
raw mode to prevent call clobbered parts of a register altering the frame register size
void TARGET_INIT_DWARF_REG_SIZES_EXTRA (tree address) [Target Hook]
If some registers are represented in Dwarf-2 unwind information in multiple pieces,
define this hook to fill in information about the sizes of those pieces in the table used
by the unwinder at runtime. It will be called by expand_builtin_init_dwarf_reg_
sizes after filling in a single size corresponding to each hard register; address is the
address of the table.
bool TARGET_ASM_TTYPE (rtx sym) [Target Hook]
This hook is used to output a reference from a frame unwinding table to the type info
object identified by sym. It should return true if the reference was output. Returning
false will cause the reference to be output using the normal Dwarf2 routines.
bool TARGET_ARM_EABI_UNWINDER [Target Hook]
This flag should be set to true on targets that use an ARM EABI based unwinding
library, and false on other targets. This effects the format of unwinding tables, and
how the unwinder in entered after running a cleanup. The default is false.
Chapter 18: Target Description Macros and Functions 651
The value of this macro only affects the default debugging output; the user can always
get a specific type of output by using -gdwarf-2, or -gvms.
DEFAULT_GDB_EXTENSIONS [Macro]
Define this macro to control whether GCC should by default generate GDB’s extended
version of debugging information. If you don’t define the macro, the default is 1:
always generate the extended information if there is any occasion to.
REAL_VALUE_TYPE [Macro]
The C data type to be used to hold a floating point value in the target machine’s
format. Typically this is a struct containing an array of HOST_WIDE_INT, but all
code should treat it as an opaque quantity.
HOST_WIDE_INT REAL_VALUE_FIX (REAL_VALUE_TYPE x) [Macro]
Truncates x to a signed integer, rounding toward zero.
unsigned HOST_WIDE_INT REAL_VALUE_UNSIGNED_FIX [Macro]
(REAL_VALUE_TYPE x)
Truncates x to an unsigned integer, rounding toward zero. If x is negative, returns
zero.
REAL_VALUE_TYPE REAL_VALUE_ATOF (const char *string, [Macro]
machine_mode mode)
Converts string into a floating point number in the target machine’s representation
for mode mode. This routine can handle both decimal and hexadecimal floating point
constants, using the syntax defined by the C language for both.
int REAL_VALUE_NEGATIVE (REAL_VALUE_TYPE x) [Macro]
Returns 1 if x is negative (including negative zero), 0 otherwise.
int REAL_VALUE_ISINF (REAL_VALUE_TYPE x) [Macro]
Determines whether x represents infinity (positive or negative).
int REAL_VALUE_ISNAN (REAL_VALUE_TYPE x) [Macro]
Determines whether x represents a “NaN” (not-a-number).
REAL_VALUE_TYPE REAL_VALUE_NEGATE (REAL_VALUE_TYPE x) [Macro]
Returns the negative of the floating point value x.
REAL_VALUE_TYPE REAL_VALUE_ABS (REAL_VALUE_TYPE x) [Macro]
Returns the absolute value of x.
NUM_MODES_FOR_MODE_SWITCHING [Macro]
If you define OPTIMIZE_MODE_SWITCHING, you have to define this as initializer for
an array of integers. Each initializer element N refers to an entity that needs mode
switching, and specifies the number of different modes that might need to be set
for this entity. The position of the initializer in the initializer—starting counting
at zero—determines the integer that is used to refer to the mode-switched entity in
question. In macros that take mode arguments / yield a mode result, modes are
represented as numbers 0 . . . N − 1. N is used to specify that no mode switch is
needed / supplied.
d = cp0count + 3;
(“c0r1” is the default name of register 1 in coprocessor 0; alternate names may be
added as described below, or the default names may be overridden entirely in SUBTARGET_
CONDITIONAL_REGISTER_USAGE.)
Chapter 18: Target Description Macros and Functions 663
HAS_LONG_COND_BRANCH [Macro]
Define this boolean macro to indicate whether or not your architecture has conditional
branches that can span all of memory. It is used in conjunction with an optimization
that partitions hot and cold basic blocks into separate sections of the executable. If
this macro is set to false, gcc will convert any conditional branches that attempt to
cross between sections into unconditional branches or indirect jumps.
HAS_LONG_UNCOND_BRANCH [Macro]
Define this boolean macro to indicate whether or not your architecture has uncon-
ditional branches that can span all of memory. It is used in conjunction with an
optimization that partitions hot and cold basic blocks into separate sections of the
executable. If this macro is set to false, gcc will convert any unconditional branches
that attempt to cross between sections into indirect jumps.
CASE_VECTOR_MODE [Macro]
An alias for a machine mode name. This is the machine mode that elements of a
jump-table should have.
CASE_VECTOR_PC_RELATIVE [Macro]
Define this macro to be a C expression to indicate when jump-tables should contain
relative addresses. You need not define this macro if jump-tables never contain relative
addresses, or jump-tables should contain relative addresses only when -fPIC or -fPIC
is in effect.
Chapter 18: Target Description Macros and Functions 669
WORD_REGISTER_OPERATIONS [Macro]
Define this macro to 1 if operations between registers with integral mode smaller
than a word are always performed on the entire register. To be more explicit, if you
start with a pair of word_mode registers with known values and you do a subword,
for example QImode, addition on the low part of the registers, then the compiler may
consider that the result has a known value in word_mode too if the macro is defined
to 1. Most RISC machines have this property and most CISC machines do not.
SHORT_IMMEDIATES_SIGN_EXTEND [Macro]
Define this macro to 1 if loading short immediate values into registers sign extends.
670 GNU Compiler Collection (GCC) Internals
is true. This description must apply to all the ‘cstoremode4’ patterns and all the
comparison operators whose results have a MODE_INT mode.
A value of 1 or −1 means that the instruction implementing the comparison operator
returns exactly 1 or −1 when the comparison is true and 0 when the comparison is
false. Otherwise, the value indicates which bits of the result are guaranteed to be 1
when the comparison is true. This value is interpreted in the mode of the comparison
operation, which is given by the mode of the first operand in the ‘cstoremode4’
pattern. Either the low bit or the sign bit of STORE_FLAG_VALUE be on. Presently,
only those bits are used by the compiler.
If STORE_FLAG_VALUE is neither 1 or −1, the compiler will generate code that depends
only on the specified bits. It can also replace comparison operators with equivalent
operations if they cause the required bits to be set, even if the remaining bits are
undefined. For example, on a machine whose comparison operators return an SImode
value and where STORE_FLAG_VALUE is defined as ‘0x80000000’, saying that just the
sign bit is relevant, the expression
(ne:SI (and:SI x (const_int power-of-2)) (const_int 0))
can be converted to
(ashift:SI x (const_int n))
where n is the appropriate shift count to move the bit being tested into the sign bit.
There is no way to describe a machine that always sets the low-order bit for a true
value, but does not guarantee the value of any other bits, but we do not know of
any machine that has such an instruction. If you are trying to port GCC to such a
machine, include an instruction to perform a logical-and of the result with 1 in the
pattern for the comparison operators and let us know at gcc@gcc.gnu.org.
Often, a machine will have multiple instructions that obtain a value from a comparison
(or the condition codes). Here are rules to guide the choice of value for STORE_FLAG_
VALUE, and hence the instructions to be used:
• Use the shortest sequence that yields a valid definition for STORE_FLAG_VALUE. It
is more efficient for the compiler to “normalize” the value (convert it to, e.g., 1 or
0) than for the comparison operators to do so because there may be opportunities
to combine the normalization with other operations.
• For equal-length sequences, use a value of 1 or −1, with −1 being slightly pre-
ferred on machines with expensive jumps and 1 preferred on other machines.
• As a second choice, choose a value of ‘0x80000001’ if instructions exist that set
both the sign and low-order bits but do not define the others.
• Otherwise, use a value of ‘0x80000000’.
Many machines can produce both the value chosen for STORE_FLAG_VALUE and its
negation in the same number of instructions. On those machines, you should also
define a pattern for those cases, e.g., one matching
(set A (neg:m (ne:m B C)))
Some machines can also perform and or plus operations on condition code values
with less instructions than the corresponding ‘cstoremode4’ insn followed by and or
plus. On those machines, define the appropriate patterns. Use the names incscc
and decscc, respectively, for the patterns which perform plus or minus operations on
Chapter 18: Target Description Macros and Functions 673
condition code values. See rs6000.md for some examples. The GNU Superoptimizer
can be used to find such instruction sequences on other machines.
If this macro is not defined, the default value, 1, is used. You need not define STORE_
FLAG_VALUE if the machine has no store-flag instructions, or if the value generated by
these instructions is 1.
Pmode [Macro]
An alias for the machine mode for pointers. On most machines, define this to be the
integer mode corresponding to the width of a hardware pointer; SImode on 32-bit
machine or DImode on 64-bit machines. On some machines you must define this to
be one of the partial integer modes, such as PSImode.
The width of Pmode must be at least as large as the value of POINTER_SIZE. If it
is not equal, you must define the macro POINTERS_EXTEND_UNSIGNED to specify how
pointers are extended to Pmode.
674 GNU Compiler Collection (GCC) Internals
FUNCTION_MODE [Macro]
An alias for the machine mode used for memory references to functions being called,
in call RTL expressions. On most CISC machines, where an instruction can begin
at any byte address, this should be QImode. On most RISC machines, where all
instructions have fixed size and alignment, this should be a mode with the same size
and alignment as the machine instruction words - typically SImode or HImode.
STDC_0_IN_SYSTEM_HEADERS [Macro]
In normal operation, the preprocessor expands __STDC__ to the constant 1, to signify
that GCC conforms to ISO Standard C. On some hosts, like Solaris, the system
compiler uses a different convention, where __STDC__ is normally 0, but is 1 if the
user specifies strict conformance to the C Standard.
Defining STDC_0_IN_SYSTEM_HEADERS makes GNU CPP follows the host convention
when processing system header files, but when processing user files __STDC__ will
always expand to 1.
SYSTEM_IMPLICIT_EXTERN_C [Macro]
Define this macro if the system header files do not support C++. This macro handles
system header files by pretending that system header files are enclosed in ‘extern
"C" {...}’.
REGISTER_TARGET_PRAGMAS () [Macro]
Define this macro if you want to implement any target-specific pragmas. If defined, it
is a C expression which makes a series of calls to c_register_pragma or c_register_
pragma_with_expansion for each pragma. The macro may also do any setup required
for the pragmas.
The primary reason to define this macro is to provide compatibility with other compil-
ers for the same target. In general, we discourage definition of target-specific pragmas
for GCC.
If the pragma can be implemented by attributes then you should consider defining
the target hook ‘TARGET_INSERT_ATTRIBUTES’ as well.
Chapter 18: Target Description Macros and Functions 675
Preprocessor macros that appear on pragma lines are not expanded. All ‘#pragma’
directives that do not match any registered pragma are silently ignored, unless the
user specifies -Wunknown-pragmas.
HANDLE_PRAGMA_PACK_WITH_EXPANSION [Macro]
Define this macro if macros should be expanded in the arguments of ‘#pragma pack’.
TARGET_DEFAULT_PACK_STRUCT [Macro]
If your target requires a structure packing default other than 0 (meaning the machine
default), define this macro to the necessary value (in bytes). This must be a value
that would also be valid to use with ‘#pragma pack()’ (that is, a small power of two).
DOLLARS_IN_IDENTIFIERS [Macro]
Define this macro to control use of the character ‘$’ in identifier names for the C
family of languages. 0 means ‘$’ is not allowed by default; 1 means it is allowed. 1 is
the default; there is no need to define this macro in that case.
jump_insn is really a function call and hence has this behavior, you should define
this macro.
You need not define this macro if it would always return zero.
INSN_REFERENCES_ARE_DELAYED (insn) [Macro]
Define this macro as a C expression that is nonzero if it is safe for the delay slot
scheduler to place instructions in the delay slot of insn, even if they appear to set or
clobber a resource referenced in insn. insn is always a jump_insn or an insn. On
machines where some insn or jump_insn is really a function call and its operands are
registers whose use is actually in the subroutine it calls, you should define this macro.
Doing so allows the delay slot scheduler to move instructions which copy arguments
into the argument registers into the delay slot of insn.
You need not define this macro if it would always return zero.
MULTIPLE_SYMBOL_SPACES [Macro]
Define this macro as a C expression that is nonzero if, in some cases, global symbols
from one translation unit may not be bound to undefined symbols in another transla-
tion unit without user intervention. For instance, under Microsoft Windows symbols
must be explicitly imported from shared libraries (DLLs).
You need not define this macro if it would always evaluate to zero.
rtx_insn * TARGET_MD_ASM_ADJUST (vec<rtx>& outputs, [Target Hook]
vec<rtx>& inputs, vec<machine_mode>& input_modes, vec<const
char *>& constraints, vec<rtx>& clobbers, HARD_REG_SET&
clobbered_regs, location_t loc)
This target hook may add clobbers to clobbers and clobbered regs for any hard regs
the port wishes to automatically clobber for an asm. The outputs and inputs may be
inspected to avoid clobbering a register that is already used by the asm. loc is the
source location of the asm.
It may modify the outputs, inputs, input modes, and constraints as necessary for
other pre-processing. In this case the return value is a sequence of insns to emit after
the asm. Note that changes to inputs must be accompanied by the corresponding
changes to input modes.
MATH_LIBRARY [Macro]
Define this macro as a C string constant for the linker argument to link in the system
math library, minus the initial ‘"-l"’, or ‘""’ if the target does not have a separate
math library.
You need only define this macro if the default of ‘"m"’ is wrong.
LIBRARY_PATH_ENV [Macro]
Define this macro as a C string constant for the environment variable that specifies
where the linker should look for libraries.
You need only define this macro if the default of ‘"LIBRARY_PATH"’ is wrong.
TARGET_POSIX_IO [Macro]
Define this macro if the target supports the following POSIX file functions, access,
mkdir and file locking with fcntl / F SETLKW. Defining TARGET_POSIX_IO will
Chapter 18: Target Description Macros and Functions 677
enable the test coverage code to use file locking when exiting a program, which avoids
race conditions if the program has forked. It will also create directories at run-time
for cross-profiling.
MAX_CONDITIONAL_EXECUTE [Macro]
A C expression for the maximum number of instructions to execute via conditional
execution instructions instead of a branch. A value of BRANCH_COST+1 is the default.
IFCVT_MODIFY_TESTS (ce_info, true_expr, false_expr) [Macro]
Used if the target needs to perform machine-dependent modifications on the condi-
tionals used for turning basic blocks into conditionally executed code. ce info points
to a data structure, struct ce_if_block, which contains information about the cur-
rently processed blocks. true expr and false expr are the tests that are used for
converting the then-block and the else-block, respectively. Set either true expr or
false expr to a null pointer if the tests cannot be converted.
IFCVT_MODIFY_MULTIPLE_TESTS (ce_info, bb, true_expr, [Macro]
false_expr)
Like IFCVT_MODIFY_TESTS, but used when converting more complicated if-statements
into conditions combined by and and or operations. bb contains the basic block that
contains the test that is currently being processed and about to be turned into a
condition.
IFCVT_MODIFY_INSN (ce_info, pattern, insn) [Macro]
A C expression to modify the PATTERN of an INSN that is to be converted to
conditional execution format. ce info points to a data structure, struct ce_if_
block, which contains information about the currently processed blocks.
IFCVT_MODIFY_FINAL (ce_info) [Macro]
A C expression to perform any final machine dependent modifications in converting
code to conditional execution. The involved basic blocks can be found in the struct
ce_if_block structure that is pointed to by ce info.
IFCVT_MODIFY_CANCEL (ce_info) [Macro]
A C expression to cancel any machine dependent modifications in converting code to
conditional execution. The involved basic blocks can be found in the struct ce_if_
block structure that is pointed to by ce info.
IFCVT_MACHDEP_INIT (ce_info) [Macro]
A C expression to initialize any machine specific data for if-conversion of the if-block
in the struct ce_if_block structure that is pointed to by ce info.
void TARGET_MACHINE_DEPENDENT_REORG (void) [Target Hook]
If non-null, this hook performs a target-specific pass over the instruction stream.
The compiler will run it at all optimization levels, just before the point at which it
normally does delayed-branch scheduling.
The exact purpose of the hook varies from target to target. Some use it to do trans-
formations that are necessary for correctness, such as laying out in-function constant
pools or avoiding hardware hazards. Others use it as an opportunity to do some
machine-dependent optimizations.
678 GNU Compiler Collection (GCC) Internals
You need not implement the hook if it has nothing to do. The default definition is
null.
about the hook being invoked recursively, or when the back end is in a partially-
initialized state. cfun might be NULL to indicate processing at top level, outside of
any function scope.
TARGET_OBJECT_SUFFIX [Macro]
Define this macro to be a C string representing the suffix for object files on your
target machine. If you do not define this macro, GCC will use ‘.o’ as the suffix for
object files.
TARGET_EXECUTABLE_SUFFIX [Macro]
Define this macro to be a C string representing the suffix to be automatically added
to executable files on your target machine. If you do not define this macro, GCC will
use the null string as the suffix for executable files.
COLLECT_EXPORT_LIST [Macro]
If defined, collect2 will scan the individual object files specified on its command line
and create an export list for the linker. Define this macro for systems like AIX, where
the linker discards object files that are not referenced from main and uses export lists.
prep seq and the compare insns are saved in gen seq. They will be emitted when all
the compares in the conditional comparision are generated without error. The prev
expression is the result of a prior call to gen_ccmp_first or gen_ccmp_next. It may
return NULL if the combination of prev and this comparison is not supported, other-
wise the result must be appropriate for passing to gen_ccmp_next or cbranch_optab.
code is the rtx_code of the compare for op0 and op1. bit code is AND or IOR, which
is the op on the compares.
POWI_MAX_MULTS [Macro]
If defined, this macro is interpreted as a signed integer C expression that specifies
the maximum number of floating point multiplications that should be emitted when
expanding exponentiation by an integer constant inline. When this value is defined,
exponentiation requiring more than this number of multiplications is implemented by
calling the system library’s pow, powf or powl routines. The default value places no
upper bound on the multiplication count.
TARGET_FORMAT_TYPES [Macro]
If defined, this macro is the name of a global variable containing target-specific format
checking information for the -Wformat option. The default is to have no target-specific
format checks.
TARGET_N_FORMAT_TYPES [Macro]
If defined, this macro is the number of entries in TARGET_FORMAT_TYPES.
TARGET_OVERRIDES_FORMAT_ATTRIBUTES [Macro]
If defined, this macro is the name of a global variable containing target-specific for-
mat overrides for the -Wformat option. The default is to have no target-specific
format overrides. If defined, TARGET_FORMAT_TYPES and TARGET_OVERRIDES_FORMAT_
ATTRIBUTES_COUNT must be defined, too.
TARGET_OVERRIDES_FORMAT_ATTRIBUTES_COUNT [Macro]
If defined, this macro specifies the number of entries in TARGET_OVERRIDES_FORMAT_
ATTRIBUTES.
TARGET_OVERRIDES_FORMAT_INIT [Macro]
If defined, this macro specifies the optional initialization routine for target specific
customizations of the system printf and scanf formatter settings.
OBJC_JBLEN [Macro]
This macro determines the size of the objective C jump buffer for the NeXT runtime.
By default, OBJC JBLEN is defined to an innocuous value.
LIBGCC2_UNWIND_ATTRIBUTE [Macro]
Define this macro if any target-specific attributes need to be attached to the functions
in libgcc that provide low-level support for call stack unwinding. It is used in
declarations in unwind-generic.h and the associated definitions of those functions.
19 Host Configuration
Most details about the machine and system on which the compiler is actually running are
detected by the configure script. Some things are impossible for configure to detect;
these are described in two ways, either by macros defined in a file named xm-machine.h or
by hook functions in the file specified by the out host hook obj variable in config.gcc.
(The intention is that very few hosts will need a header file but nearly every fully supported
host will need to override some hooks.)
If you need to define only a few macros, and they have simple definitions, consider using
the xm_defines variable in your config.gcc entry instead of creating a host configuration
header. See Section 6.3.2.2 [System Config], page 67.
DUMPFILE_FORMAT
Define this macro to be a C string representing the format to use for constructing
the index part of debugging dump file names. The resultant string must fit in
fifteen bytes. The full filename will be the concatenation of: the prefix of the
assembler file name, the string resulting from applying this format to an index
number, and a string unique to each dump file kind, e.g. ‘rtl’.
If you do not define this macro, GCC will use ‘.%02d.’. You should define this
macro if using the default will create an invalid file name.
DELETE_IF_ORDINARY
Define this macro to be a C statement (sans semicolon) that performs host-
dependent removal of ordinary temp files in the compilation driver.
If you do not define this macro, GCC will use the default version. You should
define this macro if the default version does not reliably remove the temp file
as, for example, on VMS which allows multiple versions of a file.
HOST_LACKS_INODE_NUMBERS
Define this macro if the host filesystem does not report meaningful inode num-
bers in struct stat.
HOST_LONG_LONG_FORMAT
If defined, the string used to indicate an argument of type long long to func-
tions like printf. The default value is "ll".
HOST_LONG_FORMAT
If defined, the string used to indicate an argument of type long to functions
like printf. The default value is "l".
HOST_PTR_PRINTF
If defined, the string used to indicate an argument of type void * to functions
like printf. The default value is "%p".
In addition, if configure generates an incorrect definition of any of the macros in auto-
host.h, you can override that definition in a host configuration header. If you need to do
this, first see if it is possible to fix configure.
695
20 Makefile Fragments
When you configure GCC using the configure script, it will construct the file Makefile
from the template file Makefile.in. When it does this, it can incorporate makefile frag-
ments from the config directory. These are used to set Makefile parameters that are not
amenable to being calculated by autoconf. The list of fragments to incorporate is set by
config.gcc (and occasionally config.build and config.host); See Section 6.3.2.2 [Sys-
tem Config], page 67.
Fragments are named either t-target or x-host, depending on whether they are relevant
to configuring GCC to produce code for a particular target, or to configuring GCC to run on
a particular host. Here target and host are mnemonics which usually have some relationship
to the canonical system name, but no formal connection.
If these files do not exist, it means nothing needs to be added for a given target or host.
Most targets need a few t-target fragments, but needing x-host fragments is rare.
MULTILIB_REQUIRED
Sometimes when there are only a few combinations are required, it would be a
big effort to come up with a MULTILIB_EXCEPTIONS list to cover all undesired
ones. In such a case, just listing all the required combinations in MULTILIB_
REQUIRED would be more straightforward.
The way to specify the entries in MULTILIB_REQUIRED is same with the way
used for MULTILIB_EXCEPTIONS, only this time what are required will be spec-
ified. Suppose there are multiple sets of MULTILIB_OPTIONS and only two com-
binations are required, one for ARMv7-M and one for ARMv7-R with hard
floating-point ABI and FPU, the MULTILIB_REQUIRED can be set to:
MULTILIB_REQUIRED = mthumb/march=armv7-m
MULTILIB_REQUIRED += march=armv7-r/mfloat-abi=hard/mfpu=vfpv3-d16
Chapter 20: Makefile Fragments 697
libraries and crt files twice; the first time it will add multilib to each directory
in the search path, the second it will not.
For configurations that support both multilib and multiarch, MULTILIB_
OSDIRNAMES also encodes the multiarch name, thus subsuming
MULTIARCH_DIRNAME. The multiarch name is appended to each directory
name, separated by a colon (e.g. ‘../lib32:i386-linux-gnu’).
Each multiarch subdirectory will be searched before the corresponding OS mul-
tilib directory, for example ‘/lib/i386-linux-gnu’ before ‘/lib/../lib32’.
The multiarch name will also be used to modify the system header search path,
as explained for MULTIARCH_DIRNAME.
MULTIARCH_DIRNAME
This variable specifies the multiarch name for configurations that are multiarch-
enabled but not multilibbed configurations.
The multiarch name is used to augment the search path for libraries, crt
files and system header files with additional locations. The compiler will
add a multiarch subdirectory of the form prefix/multiarch before each
directory in the library and crt search path. It will also add two directories
LOCAL_INCLUDE_DIR/multiarch and NATIVE_SYSTEM_HEADER_DIR/multiarch)
to the system header search path, respectively before LOCAL_INCLUDE_DIR and
NATIVE_SYSTEM_HEADER_DIR.
MULTIARCH_DIRNAME is not used for configurations that support both multi-
lib and multiarch. In that case, multiarch names are encoded in MULTILIB_
OSDIRNAMES instead.
More documentation about multiarch can be found at https://wiki.debian.
org/Multiarch.
SPECS Unfortunately, setting MULTILIB_EXTRA_OPTS is not enough, since it does not
affect the build of target libraries, at least not the build of the default multilib.
One possible work-around is to use DRIVER_SELF_SPECS to bring options from
the specs file as if they had been passed in the compiler driver command
line. However, you don’t want to be adding these options after the toolchain is
installed, so you can instead tweak the specs file that will be used during the
toolchain build, while you still install the original, built-in specs. The trick is
to set SPECS to some other filename (say specs.install), that will then be
created out of the built-in specs, and introduce a Makefile rule to generate the
specs file that’s going to be used at build time out of your specs.install.
T_CFLAGS These are extra flags to pass to the C compiler. They are used both when build-
ing GCC, and when compiling things with the just-built GCC. This variable is
deprecated and should not be used.
21 collect2
GCC uses a utility called collect2 on nearly all systems to arrange to call various initial-
ization functions at start time.
The program collect2 works by linking the program once and looking through the linker
output file for symbols with particular names indicating they are constructor functions. If
it finds any, it creates a new temporary ‘.c’ file containing a table of them, compiles it, and
links the program a second time including that file.
The actual calls to the constructors are carried out by a subroutine called __main, which
is called (automatically) at the beginning of the body of main (provided main was compiled
with GNU CC). Calling __main is necessary, even when compiling C code, to allow linking
C and C++ object code together. (If you use -nostdlib, you get an unresolved reference to
__main, since it’s defined in the standard GCC library. Include -lgcc at the end of your
compiler command line to resolve this reference.)
The program collect2 is installed as ld in the directory where the passes of the compiler
are installed. When collect2 needs to find the real ld, it tries the following file names:
• a hard coded linker file name, if GCC was configured with the --with-ld option.
• real-ld in the directories listed in the compiler’s search directories.
• real-ld in the directories listed in the environment variable PATH.
• The file specified in the REAL_LD_FILE_NAME configuration macro, if specified.
• ld in the compiler’s search directories, except that collect2 will not execute itself
recursively.
• ld in PATH.
“The compiler’s search directories” means all the directories where gcc searches for passes
of the compiler. This includes directories that you specify with -B.
Cross-compilers search a little differently:
• real-ld in the compiler’s search directories.
• target-real-ld in PATH.
• The file specified in the REAL_LD_FILE_NAME configuration macro, if specified.
• ld in the compiler’s search directories.
• target-ld in PATH.
collect2 explicitly avoids running ld using the file name under which collect2 itself
was invoked. In fact, it remembers up a list of such names—in case one copy of collect2
finds another copy (or version) of collect2 installed as ld in a second place in the search
path.
collect2 searches for the utilities nm and strip using the same algorithm as above for
ld.
701
If you have a class or structure using any of the above constructs, you need to mark that
class as GTY ((user)) and provide your own marking routines (see section Section 23.3
[User GC], page 709, for details).
It is always valid to include function definitions inside classes. Those are always ignored
by gengtype, as it only cares about data members.
In this case, the length option is used to override the specified array length
(which should usually be 1). The parameter of the option is a fragment of C
code that calculates the length.
The second case is when a structure or a global variable contains a pointer to
an array, like this:
struct gimple_omp_for_iter * GTY((length ("%h.collapse"))) iter;
In this case, iter has been allocated by writing something like
x->iter = ggc_alloc_cleared_vec_gimple_omp_for_iter (collapse);
and the collapse provides the length of the field.
This second use of length also works on global variables, like:
static GTY((length("reg_known_value_size"))) rtx *reg_known_value;
Note that the length option is only meant for use with arrays of non-atomic
objects, that is, objects that contain pointers pointing to other GTY-managed
objects. For other GC-allocated arrays and strings you should use atomic or
string_length.
string_length ("expression")
In order to simplify production of PCH, a structure member that is a plain array
of bytes (an optionally const and/or unsigned char *) is treated specially
by the infrastructure. Even if such an array has not been allocated in GC-
controlled memory, it will still be written properly into a PCH. The machinery
responsible for this needs to know the length of the data; by default, the length
is determined by calling strlen on the pointer. The string_length option
specifies an alternate way to determine the length, such as by inspecting another
struct member:
struct GTY(()) non_terminated_string {
size_t sz;
const char * GTY((string_length ("%h.sz"))) data;
};
skip
If skip is applied to a field, the type machinery will ignore it. This is somewhat
dangerous; the only safe use is in a union when one field really isn’t ever used.
callback
callback should be applied to fields with pointer to function type and causes
the field to be ignored similarly to skip, except when writing PCH and the
field is non-NULL it will remember the field’s address for relocation purposes if
the process writing PCH has different load base from a process reading PCH.
for_user
Use this to mark types that need to be marked by user gc routines, but are not
refered to in a template argument. So if you have some user gc type T1 and a
non user gc type T2 you can give T2 the for user option so that the marking
functions for T1 can call non mangled functions to mark T2.
desc ("expression")
tag ("constant")
default
706 GNU Compiler Collection (GCC) Internals
The type machinery needs to be told which field of a union is currently active.
This is done by giving each field a constant tag value, and then specifying a
discriminator using desc. The value of the expression given by desc is compared
against each tag value, each of which should be different. If no tag is matched,
the field marked with default is used if there is one, otherwise no field in the
union will be marked.
In the desc option, the “current structure” is the union that it discriminates.
Use %1 to mean the structure containing it. There are no escapes available to
the tag option, since it is a constant.
For example,
struct GTY(()) tree_binding
{
struct tree_common common;
union tree_binding_u {
tree GTY ((tag ("0"))) scope;
struct cp_binding_level * GTY ((tag ("1"))) level;
} GTY ((desc ("BINDING_HAS_LEVEL_P ((tree)&%0)"))) xscope;
tree value;
};
In this example, the value of BINDING HAS LEVEL P when applied to a
struct tree_binding * is presumed to be 0 or 1. If 1, the type mechanism
will treat the field level as being present and if 0, will treat the field scope as
being present.
The desc and tag options can also be used for inheritance to denote which
subclass an instance is. See Section 23.2 [Inheritance and GTY], page 708, for
more information.
cache
When the cache option is applied to a global variable gt cleare cache is called
on that variable between the mark and sweep phases of garbage collection. The
gt clear cache function is free to mark blocks as used, or to clear pointers in
the variable.
deletable
deletable, when applied to a global variable, indicates that when garbage
collection runs, there’s no need to mark anything pointed to by this variable,
it can just be set to NULL instead. This is used to keep a list of free structures
around for re-use.
maybe_undef
When applied to a field, maybe_undef indicates that it’s OK if the structure
that this fields points to is never defined, so long as this field is always NULL.
This is used to avoid requiring backends to define certain optional structures.
It doesn’t work with language frontends.
nested_ptr (type, "to expression", "from expression")
The type machinery expects all pointers to point to the start of an object.
Sometimes for abstraction purposes it’s convenient to have a pointer which
points inside an object. So long as it’s possible to convert the original object
to and from the pointer, such pointers can still be used. type is the type of the
Chapter 23: Memory Management and Type Information 707
original object, the to expression returns the pointer given the original object,
and the from expression returns the original object given the pointer. The
pointer will be available using the %h escape.
chain_next ("expression")
chain_prev ("expression")
chain_circular ("expression")
It’s helpful for the type machinery to know if objects are often chained together
in long lists; this lets it generate code that uses less stack space by iterating
along the list instead of recursing down it. chain_next is an expression for the
next item in the list, chain_prev is an expression for the previous item. For
singly linked lists, use only chain_next; for doubly linked lists, use both. The
machinery requires that taking the next item of the previous item gives the
original item. chain_circular is similar to chain_next, but can be used for
circular single linked lists.
atomic
The atomic option can only be used with pointers. It informs the GC machinery
that the memory that the pointer points to does not contain any pointers, and
hence it should be treated by the GC and PCH machinery as an “atomic”
block of memory that does not need to be examined when scanning memory for
pointers. In particular, the machinery will not scan that memory for pointers
to mark them as reachable (when marking pointers for GC) or to relocate them
(when writing a PCH file).
The atomic option differs from the skip option. atomic keeps the memory
under Garbage Collection, but makes the GC ignore the contents of the mem-
ory. skip is more drastic in that it causes the pointer and the memory to be
completely ignored by the Garbage Collector. So, memory marked as atomic
is automatically freed when no longer reachable, while memory marked as skip
is not.
708 GNU Compiler Collection (GCC) Internals
The atomic option must be used with great care, because all sorts of problem
can occur if used incorrectly, that is, if the memory the pointer points to does
actually contain a pointer.
Here is an example of how to use it:
struct GTY(()) my_struct {
int number_of_elements;
unsigned int * GTY ((atomic)) elements;
};
In this case, elements is a pointer under GC, and the memory it points to needs
to be allocated using the Garbage Collector, and will be freed automatically by
the Garbage Collector when it is no longer referenced. But the memory that
the pointer points to is an array of unsigned int elements, and the GC must
not try to scan it to find pointers to mark or relocate, which is why it is marked
with the atomic option.
Note that, currently, global variables cannot be marked with atomic; only fields
of a struct can. This is a known limitation. It would be useful to be able to
mark global pointers with atomic to make the PCH machinery aware of them
so that they are saved and restored correctly to PCH files.
special ("name")
The special option is used to mark types that have to be dealt with by
special case machinery. The parameter is the name of the special case. See
gengtype.cc for further details. Avoid adding new special cases unless there
is no other alternative.
user
The user option indicates that the code to mark structure fields is completely
handled by user-provided routines. See section Section 23.3 [User GC], page 709,
for details on what functions need to be provided.
If your class hierarchy does not fit in this pattern, you must use Section 23.3 [User GC],
page 709, instead.
The base class and its discriminator must be identified using the “desc” option. Each
concrete subclass must use the “tag” option to identify which value of the discriminator it
corresponds to.
Chapter 23: Memory Management and Type Information 709
Every class in the hierarchy must have a GTY(()) marker, as gengtype will only attempt
to parse classes that have such a marker1 .
class GTY((desc("%h.kind"), tag("0"))) example_base
{
public:
int kind;
tree a;
};
The generated marking routines for the above will contain a “switch” on “kind”, visiting
all appropriate fields. For example, if kind is 2, it will cast to “some other subclass” and
visit fields a, b, and c.
1
Classes lacking such a marker will not be identified as being part of the hierarchy, and so the marking
routines will not handle them, leading to a assertion failure within the marking routines due to an unknown
tag value (assuming that assertions are enabled).
710 GNU Compiler Collection (GCC) Internals
In general, each marker M should call M for every pointer field in the structure. Fields
that are not allocated in GC or are not pointers must be ignored.
For embedded lists (e.g., structures with a next or prev pointer), the marker must follow
the chain and mark every element in it.
Note that the rules for the pointer walker gt_pch_nx (my_struct *, gt_pointer_
operator, void *) are slightly different. In this case, the operation op must be applied to
the address of every pointer field.
template<typename T>
void gt_pch_nx (TP<T> *tp)
{
extern void gt_pch_nx (T&);
template<typename T>
void gt_pch_nx (TP<T *> *tp, gt_pointer_operator op, void *cookie)
{
/* For every field 'fld' of 'tp' with type 'T *', call the given
pointer operator. */
op (&(tp->fld), NULL, cookie);
}
template<typename T>
void gt_pch_nx (TP<T> *tp, gt_pointer_operator, void *cookie)
{
extern void gt_pch_nx (T *, gt_pointer_operator, void *);
/* For every field 'fld' of 'tp' with type 'T', call the pointer
walker for all the fields of T. */
gt_pch_nx (&(tp->fld), op, cookie);
}
Support for user-defined types is currently limited. The following restrictions apply:
1. Type TP and all the argument types T must be marked with GTY.
Chapter 23: Memory Management and Type Information 711
For language frontends, there is another file that needs to be included somewhere. It
will be called gtype-lang.h, where lang is the name of the subdirectory the language is
contained in.
Plugins can add additional root tables. Run the gengtype utility in plugin mode as
gengtype -P pluginout.h source-dir file-list plugin*.c with your plugin files plu-
gin*.c using GTY to generate the pluginout.h file. The GCC build tree is needed to be
present in that mode.
24 Plugins
GCC plugins are loadable modules that provide extra features to the compiler. Like GCC
itself they can be distributed in source and binary forms.
GCC plugins provide developers with a rich subset of the GCC API to allow them to
extend GCC as they see fit. Whether it is writing an additional optimization pass, trans-
forming code, or analyzing information, plugins can be quite useful.
int
plugin_init (struct plugin_name_args *plugin_info,
struct plugin_gcc_version *version)
{
if (!plugin_default_version_check (version, &gcc_version))
return 1;
}
but you can also check the individual fields if you want a less strict check.
Chapter 24: Plugins 715
In addition, plugins can also look up the enumerator of a named event, and / or generate
new events dynamically, by calling the function get_named_event_id.
To register a callback, the plugin calls register_callback with the arguments:
• char *name: Plugin name.
• int event: The event code.
• plugin_callback_func callback: The function that handles event.
• void *user_data: Pointer to plugin-specific data.
For the PLUGIN PASS MANAGER SETUP, PLUGIN INFO, and PLU-
GIN REGISTER GGC ROOTS pseudo-events the callback should be null, and the
user_data is specific.
When the PLUGIN PRAGMAS event is triggered (with a null pointer as data from
GCC), plugins may register their own pragmas. Notice that pragmas are not available from
lto1, so plugins used with -flto option to GCC during link-time optimization cannot use
pragmas and do not even see functions like c_register_pragma or pragma_lex.
The PLUGIN INCLUDE FILE event, with a const char* file path as GCC data, is
triggered for processing of #include or #line directives.
The PLUGIN FINISH event is the last time that plugins can call GCC functions, notably
emit diagnostics with warning, error etc.
struct register_pass_info
{
struct opt_pass *pass; /* New pass provided by the plugin. */
const char *reference_pass_name; /* Name of the reference pass for hooking
up the new pass. */
int ref_pass_instance_number; /* Insert the pass at the specified
instance number of the reference pass. */
/* Do it for every instance if it is 0. */
enum pass_positioning_ops pos_op; /* how to insert the new pass. */
};
...
...
...
}
/* Attribute definition */
static struct attribute_spec user_attr =
{ "user", 1, 1, false, false, false, false, handle_user_attribute, NULL };
The PLUGIN PRAGMAS callback is called once during pragmas registration. Use
the c_register_pragma, c_register_pragma_with_data, c_register_pragma_with_
expansion, c_register_pragma_with_expansion_and_data functions to register
custom pragmas and their handlers (which often want to call pragma_lex) from
c-family/c-pragma.h.
/* Plugin callback called during pragmas registration. Registered with
register_callback (plugin_name, PLUGIN_PRAGMAS,
register_my_pragma, NULL);
*/
static void
register_my_pragma (void *event_data, void *data)
{
warning (0, G_("Callback to register pragmas"));
c_register_pragma ("GCCPLUGIN", "sayhello", handle_pragma_sayhello);
}
It is suggested to pass "GCCPLUGIN" (or a short name identifying your plugin) as the
“space” argument of your pragma.
Pragmas registered with c_register_pragma_with_expansion or c_register_pragma_
with_expansion_and_data support preprocessor expansions. For example:
#define NUMBER 10
#pragma GCCPLUGIN foothreshold (NUMBER)
about which function this pass is executed for. Note that this event will only be invoked
if the gate check (if applicable, modified by PLUGIN OVERRIDE GATE) succeeds.
You can use other hooks, like PLUGIN_ALL_PASSES_START, PLUGIN_ALL_PASSES_END,
PLUGIN_ALL_IPA_PASSES_START, PLUGIN_ALL_IPA_PASSES_END, PLUGIN_EARLY_GIMPLE_
PASSES_START, and/or PLUGIN_EARLY_GIMPLE_PASSES_END to manipulate global state in
your plugin(s) in order to get context for the pass execution.
plugin.so: $(PLUGIN_SOURCE_FILES)
$(HOST_GCC) -shared $(CXXFLAGS) $^ -o $@
720 GNU Compiler Collection (GCC) Internals
A single source file plugin may be built with g++ -I`gcc -print-file-
name=plugin`/include -fPIC -shared -fno-rtti -O2 plugin.cc -o plugin.so, using
backquote shell syntax to query the plugin directory.
Plugin support on Windows/MinGW has a number of limitations and additional require-
ments. When building a plugin on Windows we have to link an import library for the
corresponding backend executable, for example, cc1.exe, cc1plus.exe, etc., in order to
gain access to the symbols provided by GCC. This means that on Windows a plugin is
language-specific, for example, for C, C++, etc. If you wish to use your plugin with mul-
tiple languages, then you will need to build multiple plugin libraries and either instruct
your users on how to load the correct version or provide a compiler wrapper that does this
automatically.
Additionally, on Windows the plugin library has to export the plugin_is_GPL_
compatible and plugin_init symbols. If you do not wish to modify the source code
of your plugin, then you can use the -Wl,--export-all-symbols option or provide a
suitable DEF file. Alternatively, you can export just these two symbols by decorating
them with __declspec(dllexport), for example:
#ifdef _WIN32
__declspec(dllexport)
#endif
int plugin_is_GPL_compatible;
#ifdef _WIN32
__declspec(dllexport)
#endif
int plugin_init (plugin_name_args *, plugin_gcc_version *)
The import libraries are installed into the plugin directory and their names are derived
by appending the .a extension to the backend executable names, for example, cc1.exe.a,
cc1plus.exe.a, etc. The following command line shows how to build the single source file
plugin on Windows to be used with the C++ compiler:
g++ -I`gcc -print-file-name=plugin`/include -shared -Wl,--export-all-symbols \
-o plugin.dll plugin.cc `gcc -print-file-name=plugin`/cc1plus.exe.a
When a plugin needs to use gengtype, be sure that both gengtype and gtype.state
have the same version as the GCC for which the plugin is built.
721
The implementation of the inter-procedural passes are shared between LTO, WHOPR
and classic non-LTO compilation.
• During the traditional file-by-file mode every pass executes its own Generate summary,
Execute, and Transform stages within the single execution context of the compiler.
• In LTO compilation mode, every pass uses Generate summary and Write summary
stages at compilation time, while the Read summary, Execute, and Transform stages
are executed at link time.
• In WHOPR mode all stages are used.
To simplify development, the GCC pass manager differentiates between normal inter-
procedural passes (see Section 9.4.2 [Regular IPA passes], page 140), small inter-procedural
passes (see Section 9.4.1 [Small IPA passes], page 139) and late inter-procedural passes
(see Section 9.4.3 [Late IPA passes], page 142). A small or late IPA pass (SIMPLE_IPA_
PASS) does everything at once and thus cannot be executed during WPA in WHOPR
mode. It defines only the Execute stage and during this stage it accesses and modifies the
function bodies. Such passes are useful for optimization at LGEN or LTRANS time and are
used, for example, to implement early optimization before writing object files. The simple
inter-procedural passes can also be used for easier prototyping and development of a new
inter-procedural pass.
It is also possible to redirect any edge of the callgraph from a function to its virtual clone.
This implies updating of the call site to adjust for the new function signature.
Most of the transformations performed by inter-procedural optimizations can be repre-
sented via virtual clones. For instance, a constant propagation pass can produce a virtual
clone of the function which replaces one of its arguments by a constant. The inliner can
represent its decisions by producing a clone of a function whose body will be later integrated
into a given function.
Using virtual clones, the program can be easily updated during the Execute stage, solving
most of pass interactions problems that would otherwise occur during Transform.
Virtual clones are later materialized in the LTRANS stage and turned into real functions.
Passes executed after the virtual clone were introduced also perform their Transform stage
on new functions, so for a pass there is no significant difference between operating on a real
function or a virtual clone introduced before its Execute stage.
Optimization passes then work on virtual clones introduced before their Execute stage
as if they were real functions. The only difference is that clones are not visible during the
Generate Summary stage.
To keep function summaries updated, the callgraph interface allows an optimizer to regis-
ter a callback that is called every time a new clone is introduced as well as when the actual
function or variable is generated or when a function or variable is removed. These hooks
are registered in the Generate summary stage and allow the pass to keep its information
intact until the Execute stage. The same hooks can also be registered during the Execute
stage to keep the optimization summaries updated for the Transform stage.
To make the situation even more difficult, many applications organize themselves as a set
of shared libraries, and the default ELF visibility rules allow one to overwrite any externally
visible symbol with a different symbol at runtime. This basically disables any optimizations
across such functions and variables, because the compiler cannot be sure that the function
body it is seeing is the same function body that will be used at runtime. Any function
or variable not declared static in the sources degrades the quality of inter-procedural
optimization.
To avoid this problem the compiler must assume that it sees the whole program when
doing link-time optimization. Strictly speaking, the whole program is rarely visible even at
link-time. Standard system libraries are usually linked dynamically or not provided with
the link-time information. In GCC, the whole program option (-fwhole-program) asserts
that every function and variable defined in the current compilation unit is static, except
for function main (note: at link time, the current unit is the union of all objects compiled
with LTO). Since some functions and variables need to be referenced externally, for example
by another DSO or from an assembler file, GCC also provides the function and variable
attribute externally_visible which can be used to disable the effect of -fwhole-program
on a specific symbol.
The whole program mode assumptions are slightly more complex in C++, where inline
functions in headers are put into COMDAT sections. COMDAT function and variables can
be defined by multiple object files and their bodies are unified at link-time and dynamic
link-time. COMDAT functions are changed to local only when their address is not taken
and thus un-sharing them with a library is not harmful. COMDAT variables always remain
externally visible, however for readonly variables it is assumed that their initializers cannot
be overwritten by a different value.
GCC provides the function and variable attribute visibility that can be used to specify
the visibility of externally visible symbols (or alternatively an -fdefault-visibility com-
mand line option). ELF defines the default, protected, hidden and internal visibilities.
The most commonly used is visibility is hidden. It specifies that the symbol cannot
be referenced from outside of the current shared library. Unfortunately, this information
cannot be used directly by the link-time optimization in the compiler since the whole shared
library also might contain non-LTO objects and those are not visible to the compiler.
GCC solves this problem using linker plugins. A linker plugin is an interface to the linker
that allows an external program to claim the ownership of a given object file. The linker
then performs the linking procedure by querying the plugin about the symbol table of the
claimed objects and once the linking decisions are complete, the plugin is allowed to provide
the final object file before the actual linking is made. The linker plugin obtains the symbol
resolution information which specifies which symbols provided by the claimed objects are
bound from the rest of a binary being linked.
GCC is designed to be independent of the rest of the toolchain and aims to support linkers
without plugin support. For this reason it does not use the linker plugin by default. Instead,
the object files are examined by collect2 before being passed to the linker and objects
found to have LTO sections are passed to lto1 first. This mode does not work for library
archives. The decision on what object files from the archive are needed depends on the actual
linking and thus GCC would have to implement the linker itself. The resolution information
is missing too and thus GCC needs to make an educated guess based on -fwhole-program.
728 GNU Compiler Collection (GCC) Internals
Without the linker plugin GCC also assumes that symbols are declared hidden and not
referred by non-LTO code by default.
Here @0 captures the first operand of the trunc mod expression which is also predicated
with integer_zerop. Expression operands may be either expressions, predicates or cap-
tures. Captures can be unconstrained or capture expressions or predicates.
This example introduces an optional operand of simplify, the if-expression. This condition
is evaluated after the expression matched in the IL and is required to evaluate to true to
enable the replacement expression in the second operand position. The expression operand
of the if is a standard C expression which may contain references to captures. The if has
an optional third operand which may contain the replacement expression that is enabled
when the condition evaluates to false.
A if expression can be used to specify a common condition for multiple simplify patterns,
avoiding the need to repeat that multiple times:
(if (!TYPE_SATURATING (type)
&& !FLOAT_TYPE_P (type) && !FIXED_POINT_TYPE_P (type))
(simplify
(minus (plus @0 @1) @0)
@1)
(simplify
(minus (minus @0 @1) @0)
(negate @1)))
Note that ifs in outer position do not have the optional else clause but instead have
multiple then clauses.
Ifs can be nested.
There exists a switch expression which can be used to chain conditions avoiding nesting
ifs too much:
(simplify
(simple_comparison @0 REAL_CST@1)
(switch
/* a CMP (-0) -> a CMP 0 */
(if (REAL_VALUE_MINUS_ZERO (TREE_REAL_CST (@1)))
(cmp @0 { build_real (TREE_TYPE (@1), dconst0); }))
/* x != NaN is always true, other ops are always false. */
(if (REAL_VALUE_ISNAN (TREE_REAL_CST (@1))
&& ! HONOR_SNANS (@1))
{ constant_boolean_node (cmp == NE_EXPR, type); })))
Is equal to
(simplify
(simple_comparison @0 REAL_CST@1)
(switch
/* a CMP (-0) -> a CMP 0 */
(if (REAL_VALUE_MINUS_ZERO (TREE_REAL_CST (@1)))
(cmp @0 { build_real (TREE_TYPE (@1), dconst0); })
/* x != NaN is always true, other ops are always false. */
(if (REAL_VALUE_ISNAN (TREE_REAL_CST (@1))
&& ! HONOR_SNANS (@1))
{ constant_boolean_node (cmp == NE_EXPR, type); }))))
which has the second if in the else operand of the first. The switch expression takes
if expressions as operands (which may not have else clauses) and as a last operand a
replacement expression which should be enabled by default if no other condition evaluated
to true.
Captures can also be used for capturing results of sub-expressions.
#if GIMPLE
732 GNU Compiler Collection (GCC) Internals
(simplify
(pointer_plus (addr@2 @0) INTEGER_CST_P@1)
(if (is_gimple_min_invariant (@2)))
{
poly_int64 off;
tree base = get_addr_base_and_unit_offset (@0, &off);
off += tree_to_uhwi (@1);
/* Now with that we should be able to simply write
(addr (mem_ref (addr @base) (plus @off @1))) */
build1 (ADDR_EXPR, type,
build2 (MEM_REF, TREE_TYPE (TREE_TYPE (@2)),
build_fold_addr_expr (base),
build_int_cst (ptr_type_node, off)));
})
#endif
In the above example, @2 captures the result of the expression (addr @0). For the out-
ermost expression only its type can be captured, and the keyword type is reserved for this
purpose. The above example also gives a way to conditionalize patterns to only apply to
GIMPLE or GENERIC by means of using the pre-defined preprocessor macros GIMPLE and
GENERIC and using preprocessor directives.
(simplify
(bit_and:c integral_op_p@0 (bit_ior:c (bit_not @0) @1))
(bit_and @1 @0))
Here we introduce flags on match expressions. The flag used above, c, denotes that the
expression should be also matched commutated. Thus the above match expression is really
the following four match expressions:
(bit_and integral_op_p@0 (bit_ior (bit_not @0) @1))
(bit_and (bit_ior (bit_not @0) @1) integral_op_p@0)
(bit_and integral_op_p@0 (bit_ior @1 (bit_not @0)))
(bit_and (bit_ior @1 (bit_not @0)) integral_op_p@0)
Usual canonicalizations you know from GENERIC expressions are applied before match-
ing, so for example constant operands always come second in commutative expressions.
The second supported flag is s which tells the code generator to fail the pattern if the
expression marked with s does have more than one use and the simplification results in an
expression with more than one operator. For example in
(simplify
(pointer_plus (pointer_plus:s @0 @1) @3)
(pointer_plus @0 (plus @1 @3)))
this avoids the association if (pointer_plus @0 @1) is used outside of the matched ex-
pression and thus it would stay live and not trivially removed by dead code elimination.
Now consider ((x + 3) + -3) with the temporary holding (x + 3) used elsewhere. This
simplifies down to x which is desirable and thus flagging with s does not prevent the trans-
form. Now consider ((x + 3) + 1) which simplifies to (x + 4). Despite being flagged with
s the simplification will be performed. The simplification of ((x + a) + 1) to (x + (a + 1))
will not performed in this case though.
More features exist to avoid too much repetition.
(for op (plus pointer_plus minus bit_ior bit_xor)
(simplify
(op @0 integer_zerop)
@0))
Chapter 26: Match and Simplify 733
A for expression can be used to repeat a pattern for each operator specified, substituting
op. for can be nested and a for can have multiple operators to iterate.
(for opa (plus minus)
opb (minus plus)
(for opc (plus minus)
(simplify...
In this example the pattern will be repeated four times with opa, opb, opc being plus,
minus, plus; plus, minus, minus; minus, plus, plus; minus, plus, minus.
To avoid repeating operator lists in for you can name them via
(define_operator_list pmm plus minus mult)
and use them in for operator lists where they get expanded.
(for opa (pmm trunc_div)
(simplify...
So this example iterates over plus, minus, mult and trunc_div.
Using operator lists can also remove the need to explicitly write a for. All operator list
uses that appear in a simplify or match pattern in operator positions will implicitly be
added to a new for. For example
(define_operator_list SQRT BUILT_IN_SQRTF BUILT_IN_SQRT BUILT_IN_SQRTL)
(define_operator_list POW BUILT_IN_POWF BUILT_IN_POW BUILT_IN_POWL)
(simplify
(SQRT (POW @0 @1))
(POW (abs @0) (mult @1 { built_real (TREE_TYPE (@1), dconsthalf); })))
is the same as
(for SQRT (BUILT_IN_SQRTF BUILT_IN_SQRT BUILT_IN_SQRTL)
POW (BUILT_IN_POWF BUILT_IN_POW BUILT_IN_POWL)
(simplify
(SQRT (POW @0 @1))
(POW (abs @0) (mult @1 { built_real (TREE_TYPE (@1), dconsthalf); }))))
fors and operator lists can include the special identifier null that matches nothing and
can never be generated. This can be used to pad an operator list so that it has a standard
form, even if there isn’t a suitable operator for every form.
Another building block are with expressions in the result expression which nest the
generated code in a new C block followed by its argument:
(simplify
(convert (mult @0 @1))
(with { tree utype = unsigned_type_for (type); }
(convert (mult (convert:utype @0) (convert:utype @1)))))
This allows code nested in the with to refer to the declared variables. In the above case
we use the feature to specify the type of a generated expression with the :type syntax
where type needs to be an identifier that refers to the desired type. Usually the types of
the generated result expressions are determined from the context, but sometimes like in the
above case it is required that you specify them explicitly.
Another modifier for generated expressions is ! which tells the machinery to only consider
the simplification in case the marked expression simplified to a simple operand. Consider
for example
(simplify
(plus (vec_cond:s @0 @1 @2) @3)
(vec_cond @0 (plus! @1 @3) (plus! @2 @3)))
734 GNU Compiler Collection (GCC) Internals
which moves the outer plus operation to the inner arms of the vec_cond expression but
only if the actual plus operations both simplify. Note that on GENERIC a simple operand
means that the result satisfies !EXPR_P which can be limiting if the operation itself simplifies
but the remaining operand is an (unrelated) expression.
As intermediate conversions are often optional there is a way to avoid the need to repeat
patterns both with and without such conversions. Namely you can mark a conversion as
being optional with a ?:
(simplify
(eq (convert@0 @1) (convert? @2))
(eq @1 (convert @2)))
which will match both (eq (convert @1) (convert @2)) and (eq (convert @1) @2).
The optional converts are supposed to be all either present or not, thus (eq (convert?
@1) (convert? @2)) will result in two patterns only. If you want to match all four combi-
nations you have access to two additional conditional converts as in (eq (convert1? @1)
(convert2? @2)).
The support for ? marking extends to all unary operations including predicates you
declare yourself with match.
Predicates available from the GCC middle-end need to be made available explicitly via
define_predicates:
(define_predicates
integer_onep integer_zerop integer_all_onesp)
You can also define predicates using the pattern matching language and the match form:
(match negate_expr_p
INTEGER_CST
(if (TYPE_OVERFLOW_WRAPS (type)
|| may_negate_without_overflow_p (t))))
(match negate_expr_p
(negate @0))
This shows that for match expressions there is t available which captures the outermost
expression (something not possible in the simplify context). As you can see match has
an identifier as first operand which is how you refer to the predicate in patterns. Multiple
match for the same identifier add additional cases where the predicate matches.
Predicates can also match an expression in which case you need to provide a template
specifying the identifier and where to get its operands from:
(match (logical_inverted_value @0)
(eq @0 integer_zerop))
(match (logical_inverted_value @0)
(bit_not truth_valued_p@0))
You can use the above predicate like
(simplify
(bit_and @0 (logical_inverted_value @0))
{ build_zero_cst (type); })
Which will match a bitwise and of an operand with its logical inverted value.
735
27 Static Analyzer
statements in a supernode into one exploded edge to minimize the size of the exploded
graph. This can be suppressed via -fanalyzer-fine-grained. The fine-grained approach
seems to make things simpler and more debuggable that other approaches I tried, in that
each point is responsible for one thing.
Program points in the analysis also have a "call string" identifying the stack of callsites
below them, so that paths in the exploded graph correspond to interprocedurally valid paths:
we always return to the correct call site, propagating state information accordingly. We
avoid infinite recursion by stopping the analysis if a callsite appears more than analyzer-
max-recursion-depth in a callstring (defaulting to 2).
27.1.2 Graphs
Nodes and edges in the exploded graph are called “exploded nodes” and “exploded edges”
and often referred to in the code as enodes and eedges (especially when distinguishing
them from the snodes and sedges in the supergraph).
Each graph numbers its nodes, giving unique identifiers - supernodes are referred to
throughout dumps in the form ‘SN': index’ and exploded nodes in the form ‘EN: index’
(e.g. ‘SN: 2’ and ‘EN:29’).
The supergraph can be seen using -fdump-analyzer-supergraph-graph.
The exploded graph can be seen using -fdump-analyzer-exploded-graph and other
dump options. Exploded nodes are color-coded in the .dot output based on state-machine
states to make it easier to see state changes at a glance.
1:A
/ \
/ \
/ \
2:B 3:C
| |
4:D 5:D (2 exploded nodes for D)
/ \ / \
Chapter 27: Static Analyzer 737
if (condition)
free (ptr);
...etc
then we end up with an exploded graph that looks like this:
if (condition)
/ T \ F
--------- ----------
/ \
ptr = malloc (size) ptr = local_buf
| |
copy of copy of
"do things with 'ptr'" "do things with 'ptr'"
with ptr: heap-allocated with ptr: stack-allocated
| |
if (condition) if (condition)
| known to be T | known to be F
free (ptr); |
\ /
738 GNU Compiler Collection (GCC) Internals
-----------------------------
| ('ptr' is pruned, so states can be merged)
etc
where some duplication has occurred, but only for the places where the the different
paths are worth exploringly separately.
Merging can be disabled via -fno-analyzer-state-merge.
this pointer has the unchecked state for the malloc state machine indicating it hasn’t yet
been checked against NULL since the allocation call.
Having built the checker_path, we prune it to try to eliminate events that aren’t relevant,
to minimize how much the user has to read.
After pruning, we notify each event in the path of its ID and record the IDs of interesting
events, allowing for events to refer to other events in their descriptions. The pending_
diagnostic class has various vfuncs to support emitting more precise descriptions, so that
e.g.
• a deref-of-unchecked-malloc diagnostic might use:
returning possibly-NULL pointer to 'make_obj' from 'allocator'
for a return_event to make it clearer how the unchecked value moves from callee back
to caller
• a double-free diagnostic might use:
second 'free' here; first 'free' was at (3)
and a use-after-free might use
use after 'free' here; memory was freed at (2)
27.1.6 Limitations
• Only for C so far
• The implementation of call summaries is currently very simplistic.
• Lack of function pointer analysis
• The constraint-handling code assumes reflexivity in some places (that values are equal
to themselves), which is not the case for NaN. As a simple workaround, constraints on
floating-point values are currently ignored.
• There are various other limitations in the region model (grep for TODO/xfail in the
testsuite).
• The constraint manager’s implementation of transitivity is currently too expensive to
enable by default and so must be manually enabled via -fanalyzer-transitivity).
• The checkers are currently hardcoded and don’t allow for user extensibility (e.g. adding
allocate/release pairs).
• Although the analyzer’s test suite has a proof-of-concept test case for LTO, LTO sup-
port hasn’t had extensive testing. There are various lang-specific things in the analyzer
that assume C rather than LTO. For example, SSA names are printed to the user in
“raw” form, rather than printing the underlying variable name.
where:
• ./xgcc -B. is the usual way to invoke a self-built GCC from within the BUILDDIR/gcc
subdirectory.
• -S so that the driver (./xgcc) invokes cc1, but doesn’t bother running the assembler
or linker (since the analyzer runs inside cc1).
• -fanalyzer enables the analyzer, obviously.
• -wrapper gdb,--args invokes cc1 under the debugger so that I can debug cc1 and
set breakpoints and step through things.
• -fdump-analyzer-stderr so that the logging interface is enabled and goes to stderr,
which often gives valuable context into what’s happening when stepping through the
analyzer
• -fanalyzer-fine-grained which splits the effect of every statement into its own ex-
ploded node, rather than the default (which tries to combine successive stmts to reduce
the size of the exploded graph). This makes it easier to see exactly where a particular
change happens.
• -fdump-ipa-analyzer=stderr which dumps the GIMPLE IR seen by the analyzer
pass to stderr
Other useful options:
• -fdump-analyzer-exploded-graph which dumps a SRC.eg.dot GraphViz file that I
can look at (with python-xdot)
• -fdump-analyzer-exploded-nodes-2 which dumps a SRC.eg.txt file containing the
full exploded_graph.
Assuming that you have the python support scripts for gdb installed, you can use:
(gdb) break-on-saved-diagnostic
to put a breakpoint at the place where a diagnostic is saved during exploded_graph
exploration, to see where a particular diagnostic is being saved, and:
(gdb) break-on-diagnostic
to put a breakpoint at the place where diagnostics are actually emitted.
__analyzer_describe
The analyzer handles:
__analyzer_describe (0, expr);
by emitting a warning describing the 2nd argument (which can be of any type),
at a verbosity level given by the 1st argument. This is for use when debugging,
and may be of use in DejaGnu tests.
__analyzer_dump
__analyzer_dump ();
will dump the copious information about the analyzer’s state each time it
reaches the call in its traversal of the source.
__analyzer_dump_capacity
extern void __analyzer_dump_capacity (const void *ptr);
will emit a warning describing the capacity of the base region of the region
pointed to by the 1st argument.
__analyzer_dump_escaped
extern void __analyzer_dump_escaped (void);
will emit a warning giving the number of decls that have escaped on this analysis
path, followed by a comma-separated list of their names, in alphabetical order.
__analyzer_dump_path
__analyzer_dump_path ();
will emit a placeholder “note” diagnostic with a path to that call site, if the
analyzer finds a feasible path to it. This can be useful for writing DejaGnu
tests for constraint-tracking and feasibility checking.
__analyzer_dump_exploded_nodes
For every callsite to __analyzer_dump_exploded_nodes the analyzer will emit
a warning after it finished the analysis containing information on all of the
exploded nodes at that program point.
__analyzer_dump_exploded_nodes (0);
will output the number of “processed” nodes, and the IDs of both “processed”
and “merger” nodes, such as:
warning: 2 processed enodes: [EN: 56, EN: 58] merger(s): [EN: 54-55, EN: 57, EN: 59]
With a non-zero argument
__analyzer_dump_exploded_nodes (1);
it will also dump all of the states within the “processed” nodes.
__analyzer_dump_named_constant
When the analyzer sees a call to __analyzer_dump_named_constant it will
emit a warning describing what is known about the value of a given named
constant, for parts of the analyzer that interact with target headers.
For example:
__analyzer_dump_named_constant ("O_RDONLY");
might lead to the analyzer emitting the warning:
warning: named constant 'O_RDONLY' has value '1'
Chapter 27: Static Analyzer 743
__analyzer_dump_region_model
__analyzer_dump_region_model ();
will dump the region model’s state to stderr.
__analyzer_dump_state
__analyzer_dump_state ("malloc", ptr);
will emit a warning describing the state of the 2nd argument (which can be
of any type) with respect to the state machine with a name matching the 1st
argument (which must be a string literal). This is for use when debugging, and
may be of use in DejaGnu tests.
__analyzer_eval
__analyzer_eval (expr);
will emit a warning with text "TRUE", FALSE" or "UNKNOWN" based on
the truthfulness of the argument. This is useful for writing DejaGnu tests.
__analyzer_get_unknown_ptr
__analyzer_get_unknown_ptr ();
will obtain an unknown void *.
A good diagnostic provides pertinent information to allow the user to easily answer the
above questions.
| caret
start
Tokens coming out of libcpp have locations of the form caret == start, such as for foo
here:
a = foo && bar;
^~~
| |
| finish
caret == start
Compound expressions should be reported using the location of the expression as a whole,
rather than just of one token within it.
For example, in -Wformat, rather than underlining just the first token of a bad argument:
printf("hello %i %s", (long)0, "world");
~^ ~
%li
the whole of the expression should be underlined, so that the user can easily identify what
is being referred to:
printf("hello %i %s", (long)0, "world");
~^ ~~~~~~~
%li
Avoid using the input_location global, and the diagnostic functions that implicitly use
it—use error_at and warning_at rather than error and warning, and provide the most
appropriate location_t value available at that phase of the compilation. It’s possible to
supply secondary location_t values via rich_location.
For example, in the example of imprecise wording above, generating the diagnostic using
warning:
// BAD: implicitly uses input_location
warning (OPT_Wattributes, "%qE attribute ignored", name);
leads to:
// BAD: uses input_location
demo.c:1:1: warning: 'noinline' attribute ignored [-Wattributes]
1 | int foo __attribute__((noinline));
| ^~~
which thus happened to use the location of the int token, rather than that of the at-
tribute. Using warning_at with the location of the attribute, providing the location of the
declaration in question as a secondary location, and adding a note:
auto_diagnostic_group d;
gcc_rich_location richloc (attrib_loc);
richloc.add_range (decl_loc);
if (warning_at (OPT_Wattributes, &richloc,
"attribute %qE on variable %qE was ignored", name))
inform (attrib_loc, "attribute %qE is only applicable to functions");
would lead to:
// OK: use location of attribute, with a secondary location
demo.c:1:24: warning: attribute 'noinline' on variable 'foo' was
ignored [-Wattributes]
1 | int foo __attribute__((noinline));
| ~~~ ~~~~~~~~~~~~~~~^~~~~~~~~
demo.c:1:24: note: attribute 'noinline' is only applicable to functions
Chapter 28: User Experience Guidelines 749
28.1.11 Quoting
Text should be quoted by either using the ‘q’ modifier in a directive such as ‘%qE’, or by
enclosing the quoted text in a pair of ‘%<’ and ‘%>’ directives, and never by using explicit
quote characters. The directives handle the appropriate quote characters for each language
and apply the correct color or highlighting.
The following elements should be quoted in GCC diagnostics:
• Language keywords.
• Tokens.
• Boolean, numerical, character, and string constants that appear in the source code.
• Identifiers, including function, macro, type, and variable names.
Other elements such as numbers that do not refer to numeric constants that appear in
the source code should not be quoted. For example, in the message:
argument %d of %qE must be a pointer type
since the argument number does not refer to a numerical constant in the source code it
should not be quoted.
750 GNU Compiler Collection (GCC) Internals
int fn ()
{
return std::move (CONFIGURY_GLOBAL /* some comment */);
}
The above implementation erroneously strips out the macro and the comment in the fix-it
hint:
return std::move (CONFIGURY_GLOBAL /* some comment */);
~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
global_a
and thus this resulting code:
return global_a;
It’s better to do deletions in terms of deletions; deleting the std::move ( and the trailing
close-paren, leading to this:
return std::move (CONFIGURY_GLOBAL /* some comment */);
752 GNU Compiler Collection (GCC) Internals
~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CONFIGURY_GLOBAL /* some comment */
and thus this result:
return CONFIGURY_GLOBAL /* some comment */;
Unfortunately, the pertinent location_t values are not always available.
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of
works.
The licenses for most software and other practical works are designed to take away your
freedom to share and change the works. By contrast, the GNU General Public License is
intended to guarantee your freedom to share and change all versions of a program–to make
sure it remains free software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to any other work
released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute copies
of free software (and charge for them if you wish), that you receive source code or can get
it if you want it, that you can change the software or use pieces of it in new free programs,
and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking
you to surrender the rights. Therefore, you have certain responsibilities if you distribute
copies of the software, or if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you
must pass on to the recipients the same freedoms that you received. You must make sure
that they, too, receive or can get the source code. And you must show them these terms so
they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright
on the software, and (2) offer you this License giving you legal permission to copy, distribute
and/or modify it.
For the developers’ and authors’ protection, the GPL clearly explains that there is no
warranty for this free software. For both users’ and authors’ sake, the GPL requires that
modified versions be marked as changed, so that their problems will not be attributed
erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the
software inside them, although the manufacturer can do so. This is fundamentally incom-
patible with the aim of protecting users’ freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to use, which is pre-
cisely where it is most unacceptable. Therefore, we have designed this version of the GPL
to prohibit the practice for those products. If such problems arise substantially in other
domains, we stand ready to extend this provision to those domains in future versions of the
GPL, as needed to protect the freedom of users.
758 GNU Compiler Collection (GCC) Internals
Finally, every program is threatened constantly by software patents. States should not
allow patents to restrict development and use of software on general-purpose computers, but
in those that do, we wish to avoid the special danger that patents applied to a free program
could make it effectively proprietary. To prevent this, the GPL assures that patents cannot
be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
The “System Libraries” of an executable work include anything, other than the work as
a whole, that (a) is included in the normal form of packaging a Major Component, but
which is not part of that Major Component, and (b) serves only to enable use of the
work with that Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A “Major Component”,
in this context, means a major essential component (kernel, window system, and so
on) of the specific operating system (if any) on which the executable work runs, or a
compiler used to produce the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code
needed to generate, install, and (for an executable work) run the object code and to
modify the work, including scripts to control those activities. However, it does not
include the work’s System Libraries, or general-purpose tools or generally available
free programs which are used unmodified in performing those activities but which are
not part of the work. For example, Corresponding Source includes interface definition
files associated with source files for the work, and the source code for shared libraries
and dynamically linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those subprograms
and other parts of the work.
The Corresponding Source need not include anything that users can regenerate auto-
matically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the
Program, and are irrevocable provided the stated conditions are met. This License ex-
plicitly affirms your unlimited permission to run the unmodified Program. The output
from running a covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your rights of fair use
or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without
conditions so long as your license otherwise remains in force. You may convey covered
works to others for the sole purpose of having them make modifications exclusively
for you, or provide you with facilities for running those works, provided that you
comply with the terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for you must do
so exclusively on your behalf, under your direction and control, on terms that prohibit
them from making any copies of your copyrighted material outside their relationship
with you.
Conveying under any other circumstances is permitted solely under the conditions
stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under
any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty
adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention
of such measures.
760 GNU Compiler Collection (GCC) Internals
When you convey a covered work, you waive any legal power to forbid circumvention of
technological measures to the extent such circumvention is effected by exercising rights
under this License with respect to the covered work, and you disclaim any intention
to limit operation or modification of the work as a means of enforcing, against the
work’s users, your or third parties’ legal rights to forbid circumvention of technological
measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program’s source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice; keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code; keep intact all
notices of the absence of any warranty; and give all recipients a copy of this License
along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer
support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from
the Program, in the form of source code under the terms of section 4, provided that
you also meet all of these conditions:
a. The work must carry prominent notices stating that you modified it, and giving a
relevant date.
b. The work must carry prominent notices stating that it is released under this Li-
cense and any conditions added under section 7. This requirement modifies the
requirement in section 4 to “keep intact all notices”.
c. You must license the entire work, as a whole, under this License to anyone who
comes into possession of a copy. This License will therefore apply, along with any
applicable section 7 additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no permission to license
the work in any other way, but it does not invalidate such permission if you have
separately received it.
d. If the work has interactive user interfaces, each must display Appropriate Legal
Notices; however, if the Program has interactive interfaces that do not display
Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which
are not by their nature extensions of the covered work, and which are not combined
with it such as to form a larger program, in or on a volume of a storage or distribution
medium, is called an “aggregate” if the compilation and its resulting copyright are
not used to limit the access or legal rights of the compilation’s users beyond what the
individual works permit. Inclusion of a covered work in an aggregate does not cause
this License to apply to the other parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and
5, provided that you also convey the machine-readable Corresponding Source under
the terms of this License, in one of these ways:
GNU General Public License 761
a. Convey the object code in, or embodied in, a physical product (including a phys-
ical distribution medium), accompanied by the Corresponding Source fixed on a
durable physical medium customarily used for software interchange.
b. Convey the object code in, or embodied in, a physical product (including a physi-
cal distribution medium), accompanied by a written offer, valid for at least three
years and valid for as long as you offer spare parts or customer support for that
product model, to give anyone who possesses the object code either (1) a copy of
the Corresponding Source for all the software in the product that is covered by this
License, on a durable physical medium customarily used for software interchange,
for a price no more than your reasonable cost of physically performing this con-
veying of source, or (2) access to copy the Corresponding Source from a network
server at no charge.
c. Convey individual copies of the object code with a copy of the written offer to
provide the Corresponding Source. This alternative is allowed only occasionally
and noncommercially, and only if you received the object code with such an offer,
in accord with subsection 6b.
d. Convey the object code by offering access from a designated place (gratis or for
a charge), and offer equivalent access to the Corresponding Source in the same
way through the same place at no further charge. You need not require recipients
to copy the Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source may be on
a different server (operated by you or a third party) that supports equivalent
copying facilities, provided you maintain clear directions next to the object code
saying where to find the Corresponding Source. Regardless of what server hosts
the Corresponding Source, you remain obligated to ensure that it is available for
as long as needed to satisfy these requirements.
e. Convey the object code using peer-to-peer transmission, provided you inform other
peers where the object code and Corresponding Source of the work are being offered
to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Cor-
responding Source as a System Library, need not be included in conveying the object
code work.
A “User Product” is either (1) a “consumer product”, which means any tangible per-
sonal property which is normally used for personal, family, or household purposes, or
(2) anything designed or sold for incorporation into a dwelling. In determining whether
a product is a consumer product, doubtful cases shall be resolved in favor of coverage.
For a particular product received by a particular user, “normally used” refers to a
typical or common use of that class of product, regardless of the status of the par-
ticular user or of the way in which the particular user actually uses, or expects or is
expected to use, the product. A product is a consumer product regardless of whether
the product has substantial commercial, industrial or non-consumer uses, unless such
uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, autho-
rization keys, or other information required to install and execute modified versions of a
covered work in that User Product from a modified version of its Corresponding Source.
762 GNU Compiler Collection (GCC) Internals
The information must suffice to ensure that the continued functioning of the modified
object code is in no case prevented or interfered with solely because modification has
been made.
If you convey an object code work under this section in, or with, or specifically for
use in, a User Product, and the conveying occurs as part of a transaction in which
the right of possession and use of the User Product is transferred to the recipient in
perpetuity or for a fixed term (regardless of how the transaction is characterized),
the Corresponding Source conveyed under this section must be accompanied by the
Installation Information. But this requirement does not apply if neither you nor any
third party retains the ability to install modified object code on the User Product (for
example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement
to continue to provide support service, warranty, or updates for a work that has been
modified or installed by the recipient, or for the User Product in which it has been
modified or installed. Access to a network may be denied when the modification itself
materially and adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with
this section must be in a format that is publicly documented (and with an implementa-
tion available to the public in source code form), and must require no special password
or key for unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by mak-
ing exceptions from one or more of its conditions. Additional permissions that are
applicable to the entire Program shall be treated as though they were included in this
License, to the extent that they are valid under applicable law. If additional permis-
sions apply only to part of the Program, that part may be used separately under those
permissions, but the entire Program remains governed by this License without regard
to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any
additional permissions from that copy, or from any part of it. (Additional permissions
may be written to require their own removal in certain cases when you modify the
work.) You may place additional permissions on material, added by you to a covered
work, for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered
work, you may (if authorized by the copyright holders of that material) supplement
the terms of this License with terms:
a. Disclaiming warranty or limiting liability differently from the terms of sections 15
and 16 of this License; or
b. Requiring preservation of specified reasonable legal notices or author attributions
in that material or in the Appropriate Legal Notices displayed by works containing
it; or
c. Prohibiting misrepresentation of the origin of that material, or requiring that mod-
ified versions of such material be marked in reasonable ways as different from the
original version; or
GNU General Public License 763
d. Limiting the use for publicity purposes of names of licensors or authors of the
material; or
e. Declining to grant rights under trademark law for use of some trade names, trade-
marks, or service marks; or
f. Requiring indemnification of licensors and authors of that material by anyone who
conveys the material (or modified versions of it) with contractual assumptions
of liability to the recipient, for any liability that these contractual assumptions
directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within
the meaning of section 10. If the Program as you received it, or any part of it, con-
tains a notice stating that it is governed by this License along with a term that is a
further restriction, you may remove that term. If a license document contains a further
restriction but permits relicensing or conveying under this License, you may add to a
covered work material governed by the terms of that license document, provided that
the further restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the
relevant source files, a statement of the additional terms that apply to those files, or a
notice indicating where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a sep-
arately written license, or stated as exceptions; the above requirements apply either
way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided un-
der this License. Any attempt otherwise to propagate or modify it is void, and will
automatically terminate your rights under this License (including any patent licenses
granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular
copyright holder is reinstated (a) provisionally, unless and until the copyright holder
explicitly and finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means prior to 60 days
after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if
the copyright holder notifies you of the violation by some reasonable means, this is the
first time you have received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after your receipt of the
notice.
Termination of your rights under this section does not terminate the licenses of parties
who have received copies or rights from you under this License. If your rights have
been terminated and not permanently reinstated, you do not qualify to receive new
licenses for the same material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the
Program. Ancillary propagation of a covered work occurring solely as a consequence of
using peer-to-peer transmission to receive a copy likewise does not require acceptance.
764 GNU Compiler Collection (GCC) Internals
However, nothing other than this License grants you permission to propagate or modify
any covered work. These actions infringe copyright if you do not accept this License.
Therefore, by modifying or propagating a covered work, you indicate your acceptance
of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license
from the original licensors, to run, modify and propagate that work, subject to this
License. You are not responsible for enforcing compliance by third parties with this
License.
An “entity transaction” is a transaction transferring control of an organization, or
substantially all assets of one, or subdividing an organization, or merging organizations.
If propagation of a covered work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever licenses to the work
the party’s predecessor in interest had or could give under the previous paragraph, plus
a right to possession of the Corresponding Source of the work from the predecessor in
interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or
affirmed under this License. For example, you may not impose a license fee, royalty, or
other charge for exercise of rights granted under this License, and you may not initiate
litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent
claim is infringed by making, using, selling, offering for sale, or importing the Program
or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the
Program or a work on which the Program is based. The work thus licensed is called
the contributor’s “contributor version”.
A contributor’s “essential patent claims” are all patent claims owned or controlled by
the contributor, whether already acquired or hereafter acquired, that would be infringed
by some manner, permitted by this License, of making, using, or selling its contributor
version, but do not include claims that would be infringed only as a consequence of
further modification of the contributor version. For purposes of this definition, “con-
trol” includes the right to grant patent sublicenses in a manner consistent with the
requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license
under the contributor’s essential patent claims, to make, use, sell, offer for sale, import
and otherwise run, modify and propagate the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or com-
mitment, however denominated, not to enforce a patent (such as an express permission
to practice a patent or covenant not to sue for patent infringement). To “grant” such
a patent license to a party means to make such an agreement or commitment not to
enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corre-
sponding Source of the work is not available for anyone to copy, free of charge and under
the terms of this License, through a publicly available network server or other readily
accessible means, then you must either (1) cause the Corresponding Source to be so
GNU General Public License 765
available, or (2) arrange to deprive yourself of the benefit of the patent license for this
particular work, or (3) arrange, in a manner consistent with the requirements of this
License, to extend the patent license to downstream recipients. “Knowingly relying”
means you have actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient’s use of the covered work in a country,
would infringe one or more identifiable patents in that country that you have reason
to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey,
or propagate by procuring conveyance of, a covered work, and grant a patent license
to some of the parties receiving the covered work authorizing them to use, propagate,
modify or convey a specific copy of the covered work, then the patent license you grant
is automatically extended to all recipients of the covered work and works based on it.
A patent license is “discriminatory” if it does not include within the scope of its cover-
age, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the
rights that are specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is in the business of
distributing software, under which you make payment to the third party based on the
extent of your activity of conveying the work, and under which the third party grants,
to any of the parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work conveyed by you (or
copies made from those copies), or (b) primarily for and in connection with specific
products or compilations that contain the covered work, unless you entered into that
arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or
other defenses to infringement that may otherwise be available to you under applicable
patent law.
12. No Surrender of Others’ Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that
contradict the conditions of this License, they do not excuse you from the conditions
of this License. If you cannot convey a covered work so as to satisfy simultaneously
your obligations under this License and any other pertinent obligations, then as a
consequence you may not convey it at all. For example, if you agree to terms that
obligate you to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this License would
be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or
combine any covered work with a work licensed under version 3 of the GNU Affero
General Public License into a single combined work, and to convey the resulting work.
The terms of this License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License, section 13,
concerning interaction through a network will apply to the combination as such.
14. Revised Versions of this License.
766 GNU Compiler Collection (GCC) Internals
The Free Software Foundation may publish revised and/or new versions of the GNU
General Public License from time to time. Such new versions will be similar in spirit
to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that
a certain numbered version of the GNU General Public License “or any later version”
applies to it, you have the option of following the terms and conditions either of that
numbered version or of any later version published by the Free Software Foundation.
If the Program does not specify a version number of the GNU General Public License,
you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU
General Public License can be used, that proxy’s public statement of acceptance of a
version permanently authorizes you to choose that version for the Program.
Later license versions may give you additional or different permissions. However, no
additional obligations are imposed on any author or copyright holder as a result of your
choosing to follow a later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PER-
MITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE
THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EX-
PRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFEC-
TIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO
MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, IN-
CIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUS-
TAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR
OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAM-
AGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given
local legal effect according to their terms, reviewing courts shall apply local law that
most closely approximates an absolute waiver of all civil liability in connection with
the Program, unless a warranty or assumption of liability accompanies a copy of the
Program in return for a fee.
GNU General Public License 767
You should have received a copy of the GNU General Public License
along with this program. If not, see https://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it
starts in an interactive mode:
program Copyright (C) year name of author
This program comes with ABSOLUTELY NO WARRANTY; for details type ‘show w’.
This is free software, and you are welcome to redistribute it
under certain conditions; type ‘show c’ for details.
The hypothetical commands ‘show w’ and ‘show c’ should show the appropriate parts of
the General Public License. Of course, your program’s commands might be different; for a
GUI interface, you would use an “about box”.
You should also get your employer (if you work as a programmer) or school, if any, to
sign a “copyright disclaimer” for the program, if necessary. For more information on this,
and how to apply and follow the GNU GPL, see https://www.gnu.org/licenses/.
The GNU General Public License does not permit incorporating your program into pro-
prietary programs. If your program is a subroutine library, you may consider it more useful
to permit linking proprietary applications with the library. If this is what you want to do,
use the GNU Lesser General Public License instead of this License. But first, please read
https://www.gnu.org/licenses/why-not-lgpl.html.
769
under this License. If a section does not fit the above definition of Secondary then it is
not allowed to be designated as Invariant. The Document may contain zero Invariant
Sections. If the Document does not identify any Invariant Sections then there are none.
The “Cover Texts” are certain short passages of text that are listed, as Front-Cover
Texts or Back-Cover Texts, in the notice that says that the Document is released under
this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may
be at most 25 words.
A “Transparent” copy of the Document means a machine-readable copy, represented
in a format whose specification is available to the general public, that is suitable for
revising the document straightforwardly with generic text editors or (for images com-
posed of pixels) generic paint programs or (for drawings) some widely available drawing
editor, and that is suitable for input to text formatters or for automatic translation to
a variety of formats suitable for input to text formatters. A copy made in an otherwise
Transparent file format whose markup, or absence of markup, has been arranged to
thwart or discourage subsequent modification by readers is not Transparent. An image
format is not Transparent if used for any substantial amount of text. A copy that is
not “Transparent” is called “Opaque”.
Examples of suitable formats for Transparent copies include plain ascii without
markup, Texinfo input format, LaTEX input format, SGML or XML using a publicly
available DTD, and standard-conforming simple HTML, PostScript or PDF designed
for human modification. Examples of transparent image formats include PNG, XCF
and JPG. Opaque formats include proprietary formats that can be read and edited
only by proprietary word processors, SGML or XML for which the DTD and/or
processing tools are not generally available, and the machine-generated HTML,
PostScript or PDF produced by some word processors for output purposes only.
The “Title Page” means, for a printed book, the title page itself, plus such following
pages as are needed to hold, legibly, the material this License requires to appear in the
title page. For works in formats which do not have any title page as such, “Title Page”
means the text near the most prominent appearance of the work’s title, preceding the
beginning of the body of the text.
The “publisher” means any person or entity that distributes copies of the Document
to the public.
A section “Entitled XYZ” means a named subunit of the Document whose title either
is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in
another language. (Here XYZ stands for a specific section name mentioned below, such
as “Acknowledgements”, “Dedications”, “Endorsements”, or “History”.) To “Preserve
the Title” of such a section when you modify the Document means that it remains a
section “Entitled XYZ” according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that
this License applies to the Document. These Warranty Disclaimers are considered to
be included by reference in this License, but only as regards disclaiming warranties:
any other implication that these Warranty Disclaimers may have is void and has no
effect on the meaning of this License.
2. VERBATIM COPYING
GNU Free Documentation License 771
You may copy and distribute the Document in any medium, either commercially or
noncommercially, provided that this License, the copyright notices, and the license
notice saying this License applies to the Document are reproduced in all copies, and
that you add no other conditions whatsoever to those of this License. You may not use
technical measures to obstruct or control the reading or further copying of the copies
you make or distribute. However, you may accept compensation in exchange for copies.
If you distribute a large enough number of copies you must also follow the conditions
in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly
display copies.
3. COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of
the Document, numbering more than 100, and the Document’s license notice requires
Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all
these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on
the back cover. Both covers must also clearly and legibly identify you as the publisher
of these copies. The front cover must present the full title with all words of the title
equally prominent and visible. You may add other material on the covers in addition.
Copying with changes limited to the covers, as long as they preserve the title of the
Document and satisfy these conditions, can be treated as verbatim copying in other
respects.
If the required texts for either cover are too voluminous to fit legibly, you should put
the first ones listed (as many as fit reasonably) on the actual cover, and continue the
rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100,
you must either include a machine-readable Transparent copy along with each Opaque
copy, or state in or with each Opaque copy a computer-network location from which
the general network-using public has access to download using public-standard network
protocols a complete Transparent copy of the Document, free of added material. If
you use the latter option, you must take reasonably prudent steps, when you begin
distribution of Opaque copies in quantity, to ensure that this Transparent copy will
remain thus accessible at the stated location until at least one year after the last time
you distribute an Opaque copy (directly or through your agents or retailers) of that
edition to the public.
It is requested, but not required, that you contact the authors of the Document well
before redistributing any large number of copies, to give them a chance to provide you
with an updated version of the Document.
4. MODIFICATIONS
You may copy and distribute a Modified Version of the Document under the conditions
of sections 2 and 3 above, provided that you release the Modified Version under precisely
this License, with the Modified Version filling the role of the Document, thus licensing
distribution and modification of the Modified Version to whoever possesses a copy of
it. In addition, you must do these things in the Modified Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the
Document, and from those of previous versions (which should, if there were any,
772 GNU Compiler Collection (GCC) Internals
be listed in the History section of the Document). You may use the same title as
a previous version if the original publisher of that version gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for
authorship of the modifications in the Modified Version, together with at least five
of the principal authors of the Document (all of its principal authors, if it has fewer
than five), unless they release you from this requirement.
C. State on the Title page the name of the publisher of the Modified Version, as the
publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the other
copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the public
permission to use the Modified Version under the terms of this License, in the form
shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover
Texts given in the Document’s license notice.
H. Include an unaltered copy of this License.
I. Preserve the section Entitled “History”, Preserve its Title, and add to it an item
stating at least the title, year, new authors, and publisher of the Modified Version
as given on the Title Page. If there is no section Entitled “History” in the Docu-
ment, create one stating the title, year, authors, and publisher of the Document
as given on its Title Page, then add an item describing the Modified Version as
stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to
a Transparent copy of the Document, and likewise the network locations given in
the Document for previous versions it was based on. These may be placed in the
“History” section. You may omit a network location for a work that was published
at least four years before the Document itself, or if the original publisher of the
version it refers to gives permission.
K. For any section Entitled “Acknowledgements” or “Dedications”, Preserve the Title
of the section, and preserve in the section all the substance and tone of each of the
contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and
in their titles. Section numbers or the equivalent are not considered part of the
section titles.
M. Delete any section Entitled “Endorsements”. Such a section may not be included
in the Modified Version.
N. Do not retitle any existing section to be Entitled “Endorsements” or to conflict in
title with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify
as Secondary Sections and contain no material copied from the Document, you may at
your option designate some or all of these sections as invariant. To do this, add their
GNU Free Documentation License 773
titles to the list of Invariant Sections in the Modified Version’s license notice. These
titles must be distinct from any other section titles.
You may add a section Entitled “Endorsements”, provided it contains nothing but
endorsements of your Modified Version by various parties—for example, statements of
peer review or that the text has been approved by an organization as the authoritative
definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up
to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified
Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be
added by (or through arrangements made by) any one entity. If the Document already
includes a cover text for the same cover, previously added by you or by arrangement
made by the same entity you are acting on behalf of, you may not add another; but
you may replace the old one, on explicit permission from the previous publisher that
added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission
to use their names for publicity for or to assert or imply endorsement of any Modified
Version.
5. COMBINING DOCUMENTS
You may combine the Document with other documents released under this License,
under the terms defined in section 4 above for modified versions, provided that you
include in the combination all of the Invariant Sections of all of the original documents,
unmodified, and list them all as Invariant Sections of your combined work in its license
notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical
Invariant Sections may be replaced with a single copy. If there are multiple Invariant
Sections with the same name but different contents, make the title of each such section
unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment
to the section titles in the list of Invariant Sections in the license notice of the combined
work.
In the combination, you must combine any sections Entitled “History” in the vari-
ous original documents, forming one section Entitled “History”; likewise combine any
sections Entitled “Acknowledgements”, and any sections Entitled “Dedications”. You
must delete all sections Entitled “Endorsements.”
6. COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released
under this License, and replace the individual copies of this License in the various
documents with a single copy that is included in the collection, provided that you
follow the rules of this License for verbatim copying of each of the documents in all
other respects.
You may extract a single document from such a collection, and distribute it individu-
ally under this License, provided you insert a copy of this License into the extracted
document, and follow this License in all other respects regarding verbatim copying of
that document.
774 GNU Compiler Collection (GCC) Internals
Contributors to GCC
The GCC project would like to thank its many contributors. Without them the project
would not have been nearly as successful as it has been. Any omissions in this list are
accidental. Feel free to contact jlaw@ventanamicro.com or gerald@pfeifer.com if you
have been left out or some of your contributions are not listed. Please keep this list in
alphabetical order.
• Analog Devices helped implement the support for complex data types and iterators.
• John David Anglin for threading-related fixes and improvements to libstdc++-v3, and
the HP-UX port.
• James van Artsdalen wrote the code that makes efficient use of the Intel 80387 register
stack.
• Abramo and Roberto Bagnara for the SysV68 Motorola 3300 Delta Series port.
• Alasdair Baird for various bug fixes.
• Giovanni Bajo for analyzing lots of complicated C++ problem reports.
• Peter Barada for his work to improve code generation for new ColdFire cores.
• Gerald Baumgartner added the signature extension to the C++ front end.
• Godmar Back for his Java improvements and encouragement.
• Scott Bambrough for help porting the Java compiler.
• Wolfgang Bangerth for processing tons of bug reports.
• Jon Beniston for his Microsoft Windows port of Java and port to Lattice Mico32.
• Daniel Berlin for better DWARF 2 support, faster/better optimizations, improved alias
analysis, plus migrating GCC to Bugzilla.
• Geoff Berry for his Java object serialization work and various patches.
• David Binderman tests weekly snapshots of GCC trunk against Fedora Rawhide for
several architectures.
• Laurynas Biveinis for memory management work and DJGPP port fixes.
• Uros Bizjak for the implementation of x87 math built-in functions and for various
middle end and i386 back end improvements and bug fixes.
• Eric Blake for helping to make GCJ and libgcj conform to the specifications.
• Janne Blomqvist for contributions to GNU Fortran.
• Hans-J. Boehm for his garbage collector, IA-64 libffi port, and other Java work.
• Segher Boessenkool for helping maintain the PowerPC port and the instruction com-
biner plus various contributions to the middle end.
• Neil Booth for work on cpplib, lang hooks, debug hooks and other miscellaneous clean-
ups.
• Steven Bosscher for integrating the GNU Fortran front end into GCC and for con-
tributing to the tree-ssa branch.
• Eric Botcazou for fixing middle- and backend bugs left and right.
• Per Bothner for his direction via the steering committee and various improvements
to the infrastructure for supporting new languages. Chill front end implementation.
778 GNU Compiler Collection (GCC) Internals
Initial implementations of cpplib, fix-header, config.guess, libio, and past C++ library
(libg++) maintainer. Dreaming up, designing and implementing much of GCJ.
• Devon Bowen helped port GCC to the Tahoe.
• Don Bowman for mips-vxworks contributions.
• James Bowman for the FT32 port.
• Dave Brolley for work on cpplib and Chill.
• Paul Brook for work on the ARM architecture and maintaining GNU Fortran.
• Robert Brown implemented the support for Encore 32000 systems.
• Christian Bruel for improvements to local store elimination.
• Herman A.J. ten Brugge for various fixes.
• Joerg Brunsmann for Java compiler hacking and help with the GCJ FAQ.
• Joe Buck for his direction via the steering committee from its creation to 2013.
• Iain Buclaw for the D frontend.
• Craig Burley for leadership of the G77 Fortran effort.
• Tobias Burnus for contributions to GNU Fortran.
• Stephan Buys for contributing Doxygen notes for libstdc++.
• Paolo Carlini for libstdc++ work: lots of efficiency improvements to the C++ strings,
streambufs and formatted I/O, hard detective work on the frustrating localization
issues, and keeping up with the problem reports.
• John Carr for his alias work, SPARC hacking, infrastructure improvements, previous
contributions to the steering committee, loop optimizations, etc.
• Stephane Carrez for 68HC11 and 68HC12 ports.
• Steve Chamberlain for support for the Renesas SH and H8 processors and the PicoJava
processor, and for GCJ config fixes.
• Glenn Chambers for help with the GCJ FAQ.
• John-Marc Chandonia for various libgcj patches.
• Denis Chertykov for contributing and maintaining the AVR port, the first GCC port
for an 8-bit architecture.
• Kito Cheng for his work on the RISC-V port, including bringing up the test suite and
maintenance.
• Scott Christley for his Objective-C contributions.
• Eric Christopher for his Java porting help and clean-ups.
• Branko Cibej for more warning contributions.
• The GNU Classpath project for all of their merged runtime code.
• Nick Clifton for arm, mcore, fr30, v850, m32r, msp430 rx work, --help, and other
random hacking.
• Michael Cook for libstdc++ cleanup patches to reduce warnings.
• R. Kelley Cook for making GCC buildable from a read-only directory as well as other
miscellaneous build process and documentation clean-ups.
• Ralf Corsepius for SH testing and minor bug fixing.
Contributors to GCC 779
• Ben Elliston for his work to move the Objective-C runtime into its own subdirectory
and for his work on autoconf.
• Revital Eres for work on the PowerPC 750CL port.
• Marc Espie for OpenBSD support.
• Doug Evans for much of the global optimization framework, arc, m32r, and SPARC
work.
• Christopher Faylor for his work on the Cygwin port and for caring and feeding the
gcc.gnu.org box and saving its users tons of spam.
• Fred Fish for BeOS support and Ada fixes.
• Ivan Fontes Garcia for the Portuguese translation of the GCJ FAQ.
• Peter Gerwinski for various bug fixes and the Pascal front end.
• Kaveh R. Ghazi for his direction via the steering committee, amazing work to make
‘-W -Wall -W* -Werror’ useful, and testing GCC on a plethora of platforms. Kaveh
extends his gratitude to the CAIP Center at Rutgers University for providing him with
computing resources to work on Free Software from the late 1980s to 2010.
• John Gilmore for a donation to the FSF earmarked improving GNU Java.
• Judy Goldberg for c++ contributions.
• Torbjorn Granlund for various fixes and the c-torture testsuite, multiply- and divide-
by-constant optimization, improved long long support, improved leaf function register
allocation, and his direction via the steering committee.
• Jonny Grant for improvements to collect2's --help documentation.
• Anthony Green for his -Os contributions, the moxie port, and Java front end work.
• Stu Grossman for gdb hacking, allowing GCJ developers to debug Java code.
• Michael K. Gschwind contributed the port to the PDP-11.
• Richard Biener for his ongoing middle-end contributions and bug fixes and for release
management.
• Ron Guilmette implemented the protoize and unprotoize tools, the support for
DWARF 1 symbolic debugging information, and much of the support for System V
Release 4. He has also worked heavily on the Intel 386 and 860 support.
• Sumanth Gundapaneni for contributing the CR16 port.
• Mostafa Hagog for Swing Modulo Scheduling (SMS) and post reload GCSE.
• Bruno Haible for improvements in the runtime overhead for EH, new warnings and
assorted bug fixes.
• Andrew Haley for his amazing Java compiler and library efforts.
• Chris Hanson assisted in making GCC work on HP-UX for the 9000 series 300.
• Michael Hayes for various thankless work he’s done trying to get the c30/c40 ports
functional. Lots of loop and unroll improvements and fixes.
• Dara Hazeghi for wading through myriads of target-specific bug reports.
• Kate Hedstrom for staking the G77 folks with an initial testsuite.
• Richard Henderson for his ongoing SPARC, alpha, ia32, and ia64 work, loop opts, and
generally fixing lots of old problems we’ve ignored for years, flow rewrite and lots of
further stuff, including reviewing tons of patches.
Contributors to GCC 781
• Aldy Hernandez for working on the PowerPC port, SIMD support, and various fixes.
• Nobuyuki Hikichi of Software Research Associates, Tokyo, contributed the support for
the Sony NEWS machine.
• Kazu Hirata for caring and feeding the Renesas H8/300 port and various fixes.
• Katherine Holcomb for work on GNU Fortran.
• Manfred Hollstein for his ongoing work to keep the m88k alive, lots of testing and bug
fixing, particularly of GCC configury code.
• Steve Holmgren for MachTen patches.
• Mat Hostetter for work on the TILE-Gx and TILEPro ports.
• Jan Hubicka for his x86 port improvements.
• Falk Hueffner for working on C and optimization bug reports.
• Bernardo Innocenti for his m68k work, including merging of ColdFire improvements
and uClinux support.
• Christian Iseli for various bug fixes.
• Kamil Iskra for general m68k hacking.
• Lee Iverson for random fixes and MIPS testing.
• Balaji V. Iyer for Cilk+ development and merging.
• Andreas Jaeger for testing and benchmarking of GCC and various bug fixes.
• Martin Jambor for his work on inter-procedural optimizations, the switch conversion
pass, and scalar replacement of aggregates.
• Jakub Jelinek for his SPARC work and sibling call optimizations as well as lots of bug
fixes and test cases, and for improving the Java build system.
• Janis Johnson for ia64 testing and fixes, her quality improvement sidetracks, and web
page maintenance.
• Kean Johnston for SCO OpenServer support and various fixes.
• Tim Josling for the sample language treelang based originally on Richard Kenner’s
“toy” language.
• Nicolai Josuttis for additional libstdc++ documentation.
• Klaus Kaempf for his ongoing work to make alpha-vms a viable target.
• Steven G. Kargl for work on GNU Fortran.
• David Kashtan of SRI adapted GCC to VMS.
• Ryszard Kabatek for many, many libstdc++ bug fixes and optimizations of strings,
especially member functions, and for auto ptr fixes.
• Geoffrey Keating for his ongoing work to make the PPC work for GNU/Linux and his
automatic regression tester.
• Brendan Kehoe for his ongoing work with G++ and for a lot of early work in just about
every part of libstdc++.
• Oliver M. Kellogg of Deutsche Aerospace contributed the port to the MIL-STD-1750A.
• Richard Kenner of the New York University Ultracomputer Research Laboratory wrote
the machine descriptions for the AMD 29000, the DEC Alpha, the IBM RT PC, and
the IBM RS/6000 as well as the support for instruction attributes. He also made
782 GNU Compiler Collection (GCC) Internals
• Martin von Löwis for internal consistency checking infrastructure, various C++ improve-
ments including namespace support, and tons of assistance with libstdc++/compiler
merges.
• H.J. Lu for his previous contributions to the steering committee, many x86 bug reports,
prototype patches, and keeping the GNU/Linux ports working.
• Greg McGary for random fixes and (someday) bounded pointers.
• Andrew MacLeod for his ongoing work in building a real EH system, various code
generation improvements, work on the global optimizer, etc.
• Vladimir Makarov for hacking some ugly i960 problems, PowerPC hacking improve-
ments to compile-time performance, overall knowledge and direction in the area of
instruction scheduling, design and implementation of the automaton based instruction
scheduler and design and implementation of the integrated and local register allocators.
• David Malcolm for his work on improving GCC diagnostics, JIT, self-tests and unit
testing.
• Bob Manson for his behind the scenes work on dejagnu.
• Jose E. Marchesi for contributing the eBPF backend and his ongoing work maintaining
it.
• John Marino for contributing the DragonFly BSD port.
• Philip Martin for lots of libstdc++ string and vector iterator fixes and improvements,
and string clean up and testsuites.
• Michael Matz for his work on dominance tree discovery, the x86-64 port, link-time
optimization framework and general optimization improvements.
• All of the Mauve project contributors for Java test code.
• Bryce McKinlay for numerous GCJ and libgcj fixes and improvements.
• Adam Megacz for his work on the Microsoft Windows port of GCJ.
• Michael Meissner for LRS framework, ia32, m32r, v850, m88k, MIPS, powerpc, haifa,
ECOFF debug support, and other assorted hacking.
• Jason Merrill for his direction via the steering committee and leading the G++ effort.
• Martin Michlmayr for testing GCC on several architectures using the entire Debian
archive.
• David Miller for his direction via the steering committee, lots of SPARC work, im-
provements in jump.cc and interfacing with the Linux kernel developers.
• Gary Miller ported GCC to Charles River Data Systems machines.
• Alfred Minarik for libstdc++ string and ios bug fixes, and turning the entire libstdc++
testsuite namespace-compatible.
• Mark Mitchell for his direction via the steering committee, mountains of C++ work,
load/store hoisting out of loops, alias analysis improvements, ISO C restrict support,
and serving as release manager from 2000 to 2011.
• Alan Modra for various GNU/Linux bits and testing.
• Toon Moene for his direction via the steering committee, Fortran maintenance, and his
ongoing work to make us make Fortran run fast.
784 GNU Compiler Collection (GCC) Internals
• Jason Molenda for major help in the care and feeding of all the services on the
gcc.gnu.org (formerly egcs.cygnus.com) machine—mail, web services, ftp services, etc
etc. Doing all this work on scrap paper and the backs of envelopes would have been. . .
difficult.
• Catherine Moore for fixing various ugly problems we have sent her way, including the
haifa bug which was killing the Alpha & PowerPC Linux kernels.
• Mike Moreton for his various Java patches.
• David Mosberger-Tang for various Alpha improvements, and for the initial IA-64 port.
• Stephen Moshier contributed the floating point emulator that assists in cross-
compilation and permits support for floating point numbers wider than 64 bits and
for ISO C99 support.
• Bill Moyer for his behind the scenes work on various issues.
• Philippe De Muyter for his work on the m68k port.
• Joseph S. Myers for his work on the PDP-11 port, format checking and ISO C99
support, and continuous emphasis on (and contributions to) documentation.
• Nathan Myers for his work on libstdc++-v3: architecture and authorship through the
first three snapshots, including implementation of locale infrastructure, string, shadow
C headers, and the initial project documentation (DESIGN, CHECKLIST, and so
forth). Later, more work on MT-safe string and shadow headers.
• Felix Natter for documentation on porting libstdc++.
• Nathanael Nerode for cleaning up the configuration/build process.
• NeXT, Inc. donated the front end that supports the Objective-C language.
• Hans-Peter Nilsson for the CRIS and MMIX ports, improvements to the search engine
setup, various documentation fixes and other small fixes.
• Geoff Noer for his work on getting cygwin native builds working.
• Vegard Nossum for running automated regression testing of GCC and reporting nu-
merous bugs.
• Diego Novillo for his work on Tree SSA, OpenMP, SPEC performance tracking web
pages, GIMPLE tuples, and assorted fixes.
• David O’Brien for the FreeBSD/alpha, FreeBSD/AMD x86-64, FreeBSD/ARM,
FreeBSD/PowerPC, and FreeBSD/SPARC64 ports and related infrastructure
improvements.
• Alexandre Oliva for various build infrastructure improvements, scripts and amazing
testing work, including keeping libtool issues sane and happy.
• Stefan Olsson for work on mt alloc.
• Melissa O’Neill for various NeXT fixes.
• Rainer Orth for random MIPS work, including improvements to GCC’s o32 ABI sup-
port, improvements to dejagnu’s MIPS support, Java configuration clean-ups and port-
ing work, and maintaining the IRIX, Solaris 2, and Tru64 UNIX ports.
• Steven Pemberton for his contribution of enquire which allowed GCC to determine
various properties of the floating point unit and generate float.h in older versions of
GCC.
Contributors to GCC 785
• Richard Stallman, for writing the original GCC and launching the GNU project.
• Jan Stein of the Chalmers Computer Society provided support for Genix, as well as
part of the 32000 machine description.
• Gerhard Steinmetz for running automated regression testing of GCC and reporting
numerous bugs.
• Nigel Stephens for various mips16 related fixes/improvements.
• Jonathan Stone wrote the machine description for the Pyramid computer.
• Graham Stott for various infrastructure improvements.
• John Stracke for his Java HTTP protocol fixes.
• Mike Stump for his Elxsi port, G++ contributions over the years and more recently his
vxworks contributions
• Jeff Sturm for Java porting help, bug fixes, and encouragement.
• Zhendong Su for running automated regression testing of GCC and reporting numerous
bugs.
• Chengnian Sun for running automated regression testing of GCC and reporting numer-
ous bugs.
• Shigeya Suzuki for this fixes for the bsdi platforms.
• Ian Lance Taylor for the Go frontend, the initial mips16 and mips64 support, general
configury hacking, fixincludes, etc.
• Holger Teutsch provided the support for the Clipper CPU.
• Gary Thomas for his ongoing work to make the PPC work for GNU/Linux.
• Paul Thomas for contributions to GNU Fortran.
• Philipp Thomas for random bug fixes throughout the compiler
• Jason Thorpe for thread support in libstdc++ on NetBSD.
• Kresten Krab Thorup wrote the run time support for the Objective-C language and
the fantastic Java bytecode interpreter.
• Michael Tiemann for random bug fixes, the first instruction scheduler, initial C++
support, function integration, NS32k, SPARC and M88k machine description work,
delay slot scheduling.
• Andreas Tobler for his work porting libgcj to Darwin.
• Teemu Torma for thread safe exception handling support.
• Leonard Tower wrote parts of the parser, RTL generator, and RTL definitions, and of
the VAX machine description.
• Daniel Towner and Hariharan Sandanagobalane contributed and maintain the picoChip
port.
• Tom Tromey for internationalization support and for his many Java contributions and
libgcj maintainership.
• Lassi Tuura for improvements to config.guess to determine HP processor types.
• Petter Urkedal for libstdc++ CXXFLAGS, math, and algorithms fixes.
• Andy Vaught for the design and initial implementation of the GNU Fortran front end.
788 GNU Compiler Collection (GCC) Internals
• Brent Verner for work with the libstdc++ cshadow files and their associated configure
steps.
• Todd Vierling for contributions for NetBSD ports.
• Andrew Waterman for contributing the RISC-V port, as well as maintaining it.
• Jonathan Wakely for contributing libstdc++ Doxygen notes and XHTML guidance and
maintaining libstdc++.
• Dean Wakerley for converting the install documentation from HTML to texinfo in time
for GCC 3.0.
• Krister Walfridsson for random bug fixes.
• Feng Wang for contributions to GNU Fortran.
• Stephen M. Webb for time and effort on making libstdc++ shadow files work with the
tricky Solaris 8+ headers, and for pushing the build-time header tree. Also, for starting
and driving the <regex> effort.
• John Wehle for various improvements for the x86 code generator, related infrastructure
improvements to help x86 code generation, value range propagation and other work,
WE32k port.
• Ulrich Weigand for work on the s390 port.
• Janus Weil for contributions to GNU Fortran.
• Zack Weinberg for major work on cpplib and various other bug fixes.
• Matt Welsh for help with Linux Threads support in GCJ.
• Urban Widmark for help fixing java.io.
• Mark Wielaard for new Java library code and his work integrating with Classpath.
• Dale Wiles helped port GCC to the Tahoe.
• Bob Wilson from Tensilica, Inc. for the Xtensa port.
• Jim Wilson for his direction via the steering committee, tackling hard problems in
various places that nobody else wanted to work on, strength reduction and other loop
optimizations.
• Paul Woegerer and Tal Agmon for the CRX port.
• Carlo Wood for various fixes.
• Tom Wood for work on the m88k port.
• Chung-Ju Wu for his work on the Andes NDS32 port.
• Canqun Yang for work on GNU Fortran.
• Masanobu Yuhara of Fujitsu Laboratories implemented the machine description for the
Tron architecture (specifically, the Gmicro).
• Kevin Zachmann helped port GCC to the Tahoe.
• Ayal Zaks for Swing Modulo Scheduling (SMS).
• Qirun Zhang for running automated regression testing of GCC and reporting numerous
bugs.
• Xiaoqiang Zhang for work on GNU Fortran.
• Gilles Zunino for help porting Java to Irix.
Contributors to GCC 789
The following people are recognized for their contributions to GNAT, the Ada front end
of GCC:
• Bernard Banner
• Romain Berrendonner
• Geert Bosch
• Emmanuel Briot
• Joel Brobecker
• Ben Brosgol
• Vincent Celier
• Arnaud Charlet
• Chien Chieng
• Cyrille Comar
• Cyrille Crozes
• Robert Dewar
• Gary Dismukes
• Robert Duff
• Ed Falis
• Ramon Fernandez
• Sam Figueroa
• Vasiliy Fofanov
• Michael Friess
• Franco Gasperoni
• Ted Giering
• Matthew Gingell
• Laurent Guerby
• Jerome Guitton
• Olivier Hainque
• Jerome Hugues
• Hristian Kirtchev
• Jerome Lambourg
• Bruno Leclerc
• Albert Lee
• Sean McNeil
• Javier Miranda
• Laurent Nana
• Pascal Obry
• Dong-Ik Oh
• Laurent Pautet
• Brett Porter
790 GNU Compiler Collection (GCC) Internals
• Thomas Quinot
• Nicolas Roche
• Pat Rogers
• Jose Ruiz
• Douglas Rupp
• Sergey Rybin
• Gail Schenker
• Ed Schonberg
• Nicolas Setton
• Samuel Tardieu
The following people are recognized for their contributions of new features, bug reports,
testing and integration of classpath/libgcj for GCC version 4.1:
• Lillian Angel for JTree implementation and lots Free Swing additions and bug fixes.
• Wolfgang Baer for GapContent bug fixes.
• Anthony Balkissoon for JList, Free Swing 1.5 updates and mouse event fixes, lots of
Free Swing work including JTable editing.
• Stuart Ballard for RMI constant fixes.
• Goffredo Baroncelli for HTTPURLConnection fixes.
• Gary Benson for MessageFormat fixes.
• Daniel Bonniot for Serialization fixes.
• Chris Burdess for lots of gnu.xml and http protocol fixes, StAX and DOM xml:id support.
• Ka-Hing Cheung for TreePath and TreeSelection fixes.
• Archie Cobbs for build fixes, VM interface updates, URLClassLoader updates.
• Kelley Cook for build fixes.
• Martin Cordova for Suggestions for better SocketTimeoutException.
• David Daney for BitSet bug fixes, HttpURLConnection rewrite and improvements.
• Thomas Fitzsimmons for lots of upgrades to the gtk+ AWT and Cairo 2D support.
Lots of imageio framework additions, lots of AWT and Free Swing bug fixes.
• Jeroen Frijters for ClassLoader and nio cleanups, serialization fixes, better Proxy
support, bug fixes and IKVM integration.
• Santiago Gala for AccessControlContext fixes.
• Nicolas Geoffray for VMClassLoader and AccessController improvements.
• David Gilbert for basic and metal icon and plaf support and lots of documenting,
Lots of Free Swing and metal theme additions. MetalIconFactory implementation.
• Anthony Green for MIDI framework, ALSA and DSSI providers.
• Andrew Haley for Serialization and URLClassLoader fixes, gcj build speedups.
• Kim Ho for JFileChooser implementation.
• Andrew John Hughes for Locale and net fixes, URI RFC2986 updates, Serialization
fixes, Properties XML support and generic branch work, VMIntegration guide update.
Contributors to GCC 791
• Mark Wielaard for bug fixes, packaging and release management, Clipboard imple-
mentation, system call interrupts and network timeouts and GdkPixpufDecoder fixes.
In addition to the above, all of which also contributed time and energy in testing GCC,
we would like to thank the following for their contributions to testing:
• Michael Abd-El-Malek
• Thomas Arend
• Bonzo Armstrong
• Steven Ashe
• Chris Baldwin
• David Billinghurst
• Jim Blandy
• Stephane Bortzmeyer
• Horst von Brand
• Frank Braun
• Rodney Brown
• Sidney Cadot
• Bradford Castalia
• Robert Clark
• Jonathan Corbet
• Ralph Doncaster
• Richard Emberson
• Levente Farkas
• Graham Fawcett
• Mark Fernyhough
• Robert A. French
• Jörgen Freyh
• Mark K. Gardner
• Charles-Antoine Gauthier
• Yung Shing Gene
• David Gilbert
• Simon Gornall
• Fred Gray
• John Griffin
• Patrik Hagglund
• Phil Hargett
• Amancio Hasty
• Takafumi Hayashi
• Bryan W. Headley
• Kevin B. Hendricks
Contributors to GCC 793
• Joep Jansen
• Christian Joensson
• Michel Kern
• David Kidd
• Tobias Kuipers
• Anand Krishnaswamy
• A. O. V. Le Blanc
• llewelly
• Damon Love
• Brad Lucier
• Matthias Klose
• Martin Knoblauch
• Rick Lutowski
• Jesse Macnish
• Stefan Morrell
• Anon A. Mous
• Matthias Mueller
• Pekka Nikander
• Rick Niles
• Jon Olson
• Magnus Persson
• Chris Pollard
• Richard Polton
• Derk Reefman
• David Rees
• Paul Reilly
• Tom Reilly
• Torsten Rueger
• Danny Sadinoff
• Marc Schifer
• Erik Schnetter
• Wayne K. Schroll
• David Schuler
• Vin Shelton
• Tim Souder
• Adam Sulmicki
• Bill Thorson
• George Talbot
• Pedro A. M. Vazquez
794 GNU Compiler Collection (GCC) Internals
• Gregory Warnes
• Ian Watson
• David E. Young
• And many others
And finally we’d like to thank everyone who uses the compiler, provides feedback and
generally reminds us why we’re doing this work in the first place.
795
Option Index
GCC’s command line options are indexed here without any initial ‘-’ or ‘--’. Where an
option has both positive and negative forms (such as -foption and -fno-option), relevant
entries in the manual are indexed under the most appropriate form; it may sometimes be
useful to look up both forms.
F fwpa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728
fltrans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728
fltrans-output-list . . . . . . . . . . . . . . . . . . . . . . . . 728 M
fresolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728 msoft-float . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
797
Concept Index
! *gimple_build_resx . . . . . . . . . . . . . . . . . . . . . . . . . . 250
‘!’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 *gimple_build_return . . . . . . . . . . . . . . . . . . . . . . . 250
*gimple_build_switch . . . . . . . . . . . . . . . . . . . . . . . 251
*gimple_build_try . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
#
‘#’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
# in template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
#pragma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
+
‘+’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
$
‘$’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 –
-fsection-anchors . . . . . . . . . . . . . . . . . . . . . . 277, 599
%
‘%’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
% in GTY option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704 /
‘%’ in template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 ‘/c’ in RTL dump ............................ 281
‘/f’ in RTL dump ............................ 281
‘/i’ in RTL dump ............................ 282
& ‘/j’ in RTL dump ............................ 282
‘&’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 ‘/s’ in RTL dump ............................ 282
‘/u’ in RTL dump ............................ 282
‘/v’ in RTL dump ............................ 283
(
(gimple_stmt_iterator . . . . . . . . . . . . . . . . . . . . . . 729
(nil) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
<
‘<’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
*
‘*’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
* in template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 =
*gimple_build_asm_vec . . . . . . . . . . . . . . . . . . . . . . 235
*gimple_build_assign . . . . . . . . . . . . . . . . . . . . . . . 236 ‘=’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
*gimple_build_bind . . . . . . . . . . . . . . . . . . . . . . . . . . 237
*gimple_build_call . . . . . . . . . . . . . . . . . . . . . . . . . . 238
*gimple_build_call_from_tree . . . . . . . . . . . . . . 238 >
*gimple_build_call_vec . . . . . . . . . . . . . . . . . . . . . 238
*gimple_build_catch . . . . . . . . . . . . . . . . . . . . . . . . 240 ‘>’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
*gimple_build_cond . . . . . . . . . . . . . . . . . . . . . . . . . . 240
*gimple_build_cond_from_tree . . . . . . . . . . . . . . 240
*gimple_build_debug_bind . . . . . . . . . . . . . . . . . . . 241 ?
*gimple_build_eh_filter . . . . . . . . . . . . . . . . . . . . 243
*gimple_build_goto . . . . . . . . . . . . . . . . . . . . . . . . . . 243 ‘?’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
*gimple_build_label . . . . . . . . . . . . . . . . . . . . . . . . 243
*gimple_build_omp_atomic_load . . . . . . . . . . . . . 244
*gimple_build_omp_atomic_store . . . . . . . . . . . . 244
*gimple_build_omp_continue . . . . . . . . . . . . . . . . 244
^
*gimple_build_omp_critical . . . . . . . . . . . . . . . . 245 ‘^’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
*gimple_build_omp_for . . . . . . . . . . . . . . . . . . . . . . 245
*gimple_build_omp_parallel . . . . . . . . . . . . . . . . 247
*gimple_build_omp_sections . . . . . . . . . . . . . . . . 249
*gimple_build_omp_single . . . . . . . . . . . . . . . . . . . 249
798 GNU Compiler Collection (GCC) Internals
__bid_divdd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__absvdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __bid_divsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__absvsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __bid_divtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__addda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_eqdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__adddf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __bid_eqsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__adddq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_eqtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__addha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendddtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__addhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendddtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendddxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extenddfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addsf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __bid_extenddftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__addta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addtf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __bid_extendsdtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__adduda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsdtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsdxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__adduha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__adduhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__adduqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendsftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__addusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendtftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__addusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_extendxftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__adduta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 __bid_fixdddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__addvdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __bid_fixddsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__addvsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __bid_fixsddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__addxf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __bid_fixsdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixtddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashldi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_fixtdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashldq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixunsdddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixunsddsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixunssddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixunssdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_fixunstddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_fixunstdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatdidd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatdisd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashlti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_floatditd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashluda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatsidd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashludq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatsisd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashluha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatsitd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__ashluhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatunsdidd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashluqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatunsdisd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashlusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatunsditd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashlusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __bid_floatunssidd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashluta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_floatunssisd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashrda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_floatunssitd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__ashrdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_gedd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrdq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_gesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_getd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_gtdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_gtsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_gttd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_ledd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_lesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __bid_letd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__ashrti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __bid_ltdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__bid_adddd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __bid_ltsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__bid_addsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __bid_lttd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
__bid_addtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __bid_muldd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Concept Index 799
__bid_mulsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __cmputa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__bid_multd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __CTOR_LIST__ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
__bid_nedd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __ctzdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__bid_negdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __ctzsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__bid_negsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __ctzti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__bid_negtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __divda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_nesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __divdc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__bid_netd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __divdf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__bid_subdd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __divdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
__bid_subsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __divdq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_subtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __divha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_truncdddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_truncddsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __divqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_truncddsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_truncdfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divsc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__bid_truncsdsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divsf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__bid_trunctddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __divsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
__bid_trunctddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_trunctdsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __divta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__bid_trunctdsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divtc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__bid_trunctdtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __divtf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__bid_trunctdxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
__bid_trunctfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divxc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__bid_trunctfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __divxf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__bid_truncxfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __dpd_adddd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
__bid_truncxfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __dpd_addsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
__bid_unorddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __dpd_addtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
__bid_unordsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __dpd_divdd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__bid_unordtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __dpd_divsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__bswapdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __dpd_divtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__bswapsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __dpd_eqdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__builtin_classify_type . . . . . . . . . . . . . . . . . . . . 582 __dpd_eqsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__builtin_next_arg . . . . . . . . . . . . . . . . . . . . . . . . . . 582 __dpd_eqtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
__builtin_saveregs . . . . . . . . . . . . . . . . . . . . . . . . . . 582 __dpd_extendddtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__clear_cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 __dpd_extendddtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__clzdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __dpd_extendddxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__clzsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __dpd_extenddfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__clzti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __dpd_extenddftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__cmpda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__cmpdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __dpd_extendsddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmpdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 __dpd_extendsdtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__cmpdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsdtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmpha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsdxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmphq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__cmpqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmpsa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendsftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
__cmpsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __dpd_extendtftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmpsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_extendxftd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
__cmpta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixdddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmptf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __dpd_fixddsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 __dpd_fixsddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpuda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixsdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixtddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpuha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixtdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpuhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixunsdddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpuqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixunsddsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpusa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixunssddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
__cmpusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __dpd_fixunssdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
800 GNU Compiler Collection (GCC) Internals
__dpd_fixunstddi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __eqsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__dpd_fixunstdsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __eqtf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__dpd_floatdidd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __extenddftf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatdisd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __extenddfxf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatditd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __extendsfdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatsidd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __extendsftf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatsisd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __extendsfxf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatsitd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 __ffsdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__dpd_floatunsdidd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __ffsti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__dpd_floatunsdisd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __fixdfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatunsditd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __fixdfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatunssidd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __fixdfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatunssisd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __fixsfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_floatunssitd . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __fixsfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_gedd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixsfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_gesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixtfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_getd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixtfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_gtdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixtfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_gtsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunsdfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_gttd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunsdfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_ledd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunsdfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_lesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunssfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_letd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunssfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_ltdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunssfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_ltsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunstfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_lttd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunstfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_muldd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __fixunstfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_mulsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __fixunsxfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_multd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __fixunsxfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_nedd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __fixunsxfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_negdd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __fixxfdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_negsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __fixxfsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_negtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __fixxfti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__dpd_nesd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __floatdidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_netd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 __floatdisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_subdd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __floatditf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_subsd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __floatdixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_subtd3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 __floatsidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncdddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatsisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncddsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __floatsitf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncddsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatsixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncdfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floattidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncsdsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floattisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __floattitf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctddf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floattixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctdsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 __floatundidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctdsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatundisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctdtf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatunditf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctdxf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatundixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatunsidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_trunctfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatunsisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncxfdd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatunsitf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_truncxfsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 __floatunsixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
__dpd_unorddd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __floatuntidf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__dpd_unordsd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __floatuntisf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__dpd_unordtd2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 __floatuntitf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__DTOR_LIST__ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639 __floatuntixf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__eqdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __fractdadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Concept Index 801
__fractdadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractdquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractdauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fracthada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fracthadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fracthadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fracthadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fracthauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdfuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __fracthausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractdiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
__fractdisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
__fractdita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
__fractdiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fracthiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fracthiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 __fracthiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractdqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fracthqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
__fractdqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fracthqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
__fractdqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fracthqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
802 GNU Compiler Collection (GCC) Internals
__fracthqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
__fracthqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
__fracthqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fracthquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractqida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractqidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
__fractqiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __fractsfusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsfusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsfuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
__fractqqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 __fractsiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
__fractqquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractqqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractqqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractqquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractsqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
__fractsada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 __fractsqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Concept Index 803
__fractsqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractudaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 __fractudahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractsquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 __fractudausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fracttada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fracttadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fracttadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractudqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 __fractudqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractudqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractudquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fractuhadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 __fractuhadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fracttiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
__fracttiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 __fractuhata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractudada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __fractuhati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractudadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __fractuhauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractudadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __fractuhaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
804 GNU Compiler Collection (GCC) Internals
__fractuhauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 __fractunshida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 __fractunshidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 __fractunshiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 __fractunshihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 __fractunshiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractuhqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractuhqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractuhqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 __fractunshqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractuhqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractuhquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunshqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractuhqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractuhquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __fractunsqisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsqisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsqita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsqiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsqiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsqiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunsqiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunsdisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsqqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunsqqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunsqqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunsqqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
__fractunsdiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractunssida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunsdqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunsdqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunsdqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunsdqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunsdqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunshadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunshahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunshaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunshasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
__fractunshati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunssiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Concept Index 805
__fractunssiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsusaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsusasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsusati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunssiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsusqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 __fractunsusqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsusqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsusqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsusqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
__fractunssqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsutadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunssqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsutahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunstadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsutaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunstahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsutasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunstaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractunsutati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
__fractunstasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractuqqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractuqqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunstiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __fractuqquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunsudadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 __fractuqquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunsudahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 __fractuqqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunsudaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 __fractuqqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunsudasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 __fractuqquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
__fractunsudati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 __fractusada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsudqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractunsudqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractunsudqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsudqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsudqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractunsuhqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractunsuhqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuhqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
__fractunsuhqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuqqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuqqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractusauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuqqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 __fractusauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuqqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsuqqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsusadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
__fractunsusahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 __fractusqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
806 GNU Compiler Collection (GCC) Internals
__fractusqdf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 __lshruhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__fractusqdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 __lshruqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__fractusqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __lshrusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__fractusqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __lshrusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__fractusqhi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __lshruta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__fractusqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __ltdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractusqqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __ltsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractusqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __lttf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractusqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __main . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
__fractusqsf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 __moddi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractusqsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __modsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractusqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __modti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractusqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __morestack_current_segment . . . . . . . . . . . . . . . . 60
__fractusqti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 __morestack_initial_sp . . . . . . . . . . . . . . . . . . . . . . 60
__fractusquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __morestack_segments . . . . . . . . . . . . . . . . . . . . . . . . 60
__fractusqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __mulda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractusquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __muldc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractusquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __muldf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
__fractusquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __muldi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractusqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __muldq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
__fractusquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 __mulha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
__fractutadf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
__fractutadi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __mulsc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractutaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __mulsf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
__fractutahi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractutahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __mulsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
__fractutaqi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __multa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __multc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__fractutasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __multf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
__fractutasf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __multi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__fractutasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __muluda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 __muludq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __muluha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __muluhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __muluqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
__fractutaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __muluta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__fractutauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulvdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__fractutausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulvsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__fractutausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 __mulxc3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
__gedf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __mulxf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
__gesf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __nedf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__getf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __negda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__gtdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __negdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__gtsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __negdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__gttf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __negdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__ledf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __negha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__lesf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __neghq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__letf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __negqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__lshrdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __negsa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__lshrsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __negsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__lshrti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 __negsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__lshruda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __negta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__lshrudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __negtf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__lshruha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __negti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Concept Index 807
__neguda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__neguha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__neguhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__neguqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negusa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__neguta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __satfractdiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negvdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __satfractdiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negvsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 __satfractdiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__negxf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 __satfractdiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__nesf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __satfractdiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__netf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 __satfractdqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__paritydi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__paritysi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__parityti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__popcountdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__popcountsi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__popcountti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __satfractdqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__powidf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __satfractdquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__powisf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __satfractdqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__powitf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __satfractdquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__powixf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 __satfractdquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractdquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractdqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractdqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractdquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracthauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdfda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdfdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdfha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractdfhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractdfqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractdfuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdfusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdfusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdfuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfracthiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfracthiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfracthiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfracthiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractdihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfracthiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
808 GNU Compiler Collection (GCC) Internals
__satfracthqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfracthqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfracthqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfracthqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfracthquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsfuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfractqida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsfuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfractqidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsfusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfractqiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsfusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfractqihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsfuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
__satfractqiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 __satfractsiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
__satfractqqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqqsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractqquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractqqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsqudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractqqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractqquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 __satfractsquhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractsada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractsquqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
__satfractsadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractsqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractsaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractsqusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractsahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractsquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
__satfractsaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttada2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsata2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttaha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttasa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
__satfractsauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfracttauda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Concept Index 809
__satfracttaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractuhasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttauha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractuhasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractuhata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractuhauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttausa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractuhaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 __satfractuhauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttauta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractuhauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttida . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfracttihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 __satfractuhqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfracttiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfracttiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfracttiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfracttiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 __satfractuhqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractudada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractuhqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfractudadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractuhquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractudaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdida . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdita . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 __satfractunsdiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunsdiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunsdiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunsdiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
__satfractudqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunshida . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunshidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunshiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunshihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 __satfractunshiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshita . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractudquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractuhada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractuhadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractuhaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractuhahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunshiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
__satfractuhaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 __satfractunsqida . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
810 GNU Compiler Collection (GCC) Internals
__satfractunsqidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractuqquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfractunsqiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractuqqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfractunsqihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __satfractuqqusq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfractunsqiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 __satfractuqquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
__satfractunsqisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqita . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
__satfractunsqiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunsqiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunsqiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunsqiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunssida . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunssidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunssiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunssihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusauta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunssiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 __satfractusqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssita . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunssiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractusquhq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunstida . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractusquqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunstidq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractusqusa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunstiha . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractusquta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
__satfractunstihq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractutada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractutadq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunstisa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutaha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunstisq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 __satfractutahq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunstita . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutaqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunstiuda . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutasa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiudq . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutasq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
__satfractunstiuha . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiuhq . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutauda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiuqq . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutaudq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiusa . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutauha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiusq . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutauhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractunstiuta . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 __satfractutauqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractuqqda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractutausa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractuqqdq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __satfractutausq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
__satfractuqqha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __splitstack_find . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
__satfractuqqhq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__satfractuqqqq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssadddq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
__satfractuqqsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__satfractuqqsq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
__satfractuqqta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
__satfractuqquda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__satfractuqqudq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
__satfractuqquha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 __ssaddta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Concept Index 811
__ssashlda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __subvdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__ssashldq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __subvsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__ssashlha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __subxf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
__ssashlhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __truncdfsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__ssashlsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __trunctfdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__ssashlsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __trunctfsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__ssashlta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 __truncxfdf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__ssdivda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __truncxfsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
__ssdivdq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __ucmpdi2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__ssdivha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __ucmpti2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
__ssdivhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __udivdi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssdivqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __udivmoddi4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssdivsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __udivmodti4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssdivsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 __udivsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssdivta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 __udivti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssmulda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivuda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmuldq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivuha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivuhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivuqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssmulta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 __udivuta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__ssnegda2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __umoddi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssnegdq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __umodsi3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssnegha2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __umodti3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
__ssneghq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __unorddf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__ssnegqq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __unordsf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__ssnegsa2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __unordtf2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
__ssnegsq2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __usadduda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__ssnegta2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 __usaddudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usadduha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubdq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usadduhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usadduqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usaddusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usaddusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usadduta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
__sssubsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usashluda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__sssubta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usashludq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__subda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usashluha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__subdf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __usashluhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__subdq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usashluqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__subha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usashlusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__subhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usashlusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
__subqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usashluta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
__subsa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usdivuda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subsf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __usdivudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subsq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usdivuha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usdivuhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subtf3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 __usdivuqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subuda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usdivusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subudq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usdivusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subuha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usdivuta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
__subuhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usmuluda3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
__subuqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usmuludq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__subusa3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usmuluha3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__subusq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 __usmuluhq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
__subuta3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 __usmuluqq3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
812 GNU Compiler Collection (GCC) Internals
atomic_test_and_set instruction pattern . . . . . 454 BLKmode, and function return values . . . . . . . . . . . 325
atomic_xor_fetch_cmp_0mode BLOCK_FOR_INSN, gimple_bb . . . . . . . . . . . . . . . . . . 343
instruction pattern . . . . . . . . . . . . . . . . . . . . . . . . . 455 BLOCK_REG_PADDING . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
atomic_xor_fetchmode instruction pattern . . . . 454 blockage instruction pattern . . . . . . . . . . . . . . . . . . 450
atomic_xormode instruction pattern . . . . . . . . . . . 454 Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
attr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479, 480 BND32mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
attr_flag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 BND64mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
attribute expressions . . . . . . . . . . . . . . . . . . . . . . . . . . 477 bool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
attribute specifications . . . . . . . . . . . . . . . . . . . . . . . . 481 BOOL_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
attribute specifications example . . . . . . . . . . . . . . . 481 BOOLEAN_TYPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
ATTRIBUTE_ALIGNED_VALUE . . . . . . . . . . . . . . . . . . . . 520 branch prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 BRANCH_COST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
attributes, defining. . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 break_out_memory_refs . . . . . . . . . . . . . . . . . . . . . . 591
attributes, target-specific. . . . . . . . . . . . . . . . . . . . . . 658 BREAK_STMT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
autoincrement addressing, availability . . . . . . . . . . . 3 BSS_SECTION_ASM_OP . . . . . . . . . . . . . . . . . . . . . . . . . . 618
autoincrement/decrement addressing . . . . . . . . . . 371 bswap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
automata_option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 bswapm2 instruction pattern . . . . . . . . . . . . . . . . . . . 427
automaton based pipeline description . . . . . 485, 486 BTF_DEBUGGING_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . 655
automaton based scheduler. . . . . . . . . . . . . . . . . . . . 485 btruncm2 instruction pattern . . . . . . . . . . . . . . . . . . 430
avgm3_ceil instruction pattern . . . . . . . . . . . . . . . 427 build0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
avgm3_floor instruction pattern . . . . . . . . . . . . . . 427 build1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
AVOID_CCMODE_COPIES . . . . . . . . . . . . . . . . . . . . . . . . 537 build2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
build3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
build4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
B build5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
backslash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 build6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
barrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 builtin_longjmp instruction pattern . . . . . . . . . . 448
barrier and ‘/f’. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 builtin_setjmp_receiver
barrier and ‘/v’. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 instruction pattern . . . . . . . . . . . . . . . . . . . . . . . . . 448
BASE_REG_CLASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 builtin_setjmp_setup instruction pattern . . . . 448
basic block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 byte_mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
basic blocks, RTL SSA . . . . . . . . . . . . . . . . . . . . . . . . 327 BYTES_BIG_ENDIAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
Basic Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 BYTES_BIG_ENDIAN, effect on subreg. . . . . . . . . . . 297
basic-block.h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
basic_block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327, 337
BASIC_BLOCK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 C
bb_seq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 c_register_pragma . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
BB_HEAD, BB_END . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 c_register_pragma_with_expansion . . . . . . . . . 675
BIGGEST_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 C statements for assembler output . . . . . . . . . . . . 364
BIGGEST_FIELD_ALIGNMENT . . . . . . . . . . . . . . . . . . . . 520 C_COMMON_OVERRIDE_OPTIONS. . . . . . . . . . . . . . . . . . 514
BImode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
BIND_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 cadd270m3 instruction pattern. . . . . . . . . . . . . . . . . 432
BINFO_TYPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 cadd90m3 instruction pattern . . . . . . . . . . . . . . . . . . 432
bit-fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281, 310
BIT_AND_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 call instruction pattern . . . . . . . . . . . . . . . . . . . . . . 443
BIT_IOR_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 call usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
BIT_NOT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 call, in call_insn . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
BIT_XOR_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 call, in mem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
BITFIELD_NBYTES_LIMITED . . . . . . . . . . . . . . . . . . . . 523 call-clobbered register . . . . . . . . . . . . . . . . . . . . 532, 533
BITS_BIG_ENDIAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 call-saved register . . . . . . . . . . . . . . . . . . . . . . . . 532, 533
BITS_BIG_ENDIAN, effect on sign_extract . . . . . 305 call-used register . . . . . . . . . . . . . . . . . . . . . . . . . 532, 533
BITS_PER_UNIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 call_insn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
BITS_PER_WORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517 call_insn and ‘/c’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
bitwise complement . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 call_insn and ‘/f’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
bitwise exclusive-or . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 call_insn and ‘/i’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
bitwise inclusive-or. . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 call_insn and ‘/j’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
bitwise logical-and . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 call_insn and ‘/s’. . . . . . . . . . . . . . . . . . . . . . . 278, 280
BLKmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 call_insn and ‘/u’. . . . . . . . . . . . . . . . . . . . . . . 278, 279
Concept Index 815
ei_start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 F
ELIMINABLE_REGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560 ‘F’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
ELSE_CLAUSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 FAIL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464, 466, 475
Embedded C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 fall-thru . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Empty Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 false positive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
EMPTY_CLASS_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 FATAL_EXIT_CODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
EMPTY_FIELD_BOUNDARY . . . . . . . . . . . . . . . . . . . . . . . 522 FDL, GNU Free Documentation License . . . . . . 769
Emulated TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661 features, optional, in system conventions . . . . . . 513
enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 feclearexceptm instruction pattern . . . . . . . . . . . 429
ENDFILE_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 fegetroundm instruction pattern . . . . . . . . . . . . . . 429
endianness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 feraiseexceptm instruction pattern . . . . . . . . . . . 429
entry_value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 ffs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
ENTRY_BLOCK_PTR, EXIT_BLOCK_PTR . . . . . . . . . . . 337 ffsm2 instruction pattern . . . . . . . . . . . . . . . . . . . . . 434
enum reg_class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 FIELD_DECL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
ENUMERAL_TYPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 file_end_indicate_exec_stack . . . . . . . . . . . . . . 624
enumerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 files and passes of the compiler . . . . . . . . . . . . . . . . 137
epilogue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 files, generated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
epilogue instruction pattern . . . . . . . . . . . . . . . . . . 449 final_absence_set . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
EPILOGUE_USES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 final_presence_set . . . . . . . . . . . . . . . . . . . . . . . . . . 488
eq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 final_sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
eq and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478 FINAL_PRESCAN_INSN . . . . . . . . . . . . . . . . . . . . . . . . . . 644
eq_attr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 FIND_BASE_TERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
EQ_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 FINI_ARRAY_SECTION_ASM_OP. . . . . . . . . . . . . . . . . . 619
equal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 FINI_SECTION_ASM_OP . . . . . . . . . . . . . . . . . . . . . . . . 619
errno, implicit usage. . . . . . . . . . . . . . . . . . . . . . . . . . 588 finite state automaton minimization . . . . . . . . . . . 489
EXACT_DIV_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 FIRST_PARM_OFFSET . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
examining SSA NAMEs . . . . . . . . . . . . . . . . . . . . . . 267 FIRST_PARM_OFFSET and virtual registers . . . . . . 295
exception handling . . . . . . . . . . . . . . . . . . . . . . . 340, 553 FIRST_PSEUDO_REGISTER . . . . . . . . . . . . . . . . . . . . . . 532
exception_receiver instruction pattern . . . . . . 448 FIRST_STACK_REG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
exclamation point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 FIRST_VIRTUAL_REGISTER . . . . . . . . . . . . . . . . . . . . . 295
exclusion_set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488 fix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
exclusive-or, bitwise . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 fix-it hints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
EXIT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 fix_truncmn2 instruction pattern . . . . . . . . . . . . . 438
EXIT_IGNORE_STACK . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 FIX_TRUNC_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
exp10m2 instruction pattern . . . . . . . . . . . . . . . . . . . 429 fixed register. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
exp2m2 instruction pattern . . . . . . . . . . . . . . . . . . . . 429 fixed-point fractional library . . . . . . . . . . . . . . . . . . . 20
expander definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 462 fixed_regs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
expm1m2 instruction pattern . . . . . . . . . . . . . . . . . . . 429 fixed_size_mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
expm2 instruction pattern . . . . . . . . . . . . . . . . . . . . . 429 FIXED_CONVERT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . 187
expr_list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 FIXED_CST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
EXPR_FILENAME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 FIXED_POINT_TYPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
EXPR_LINENO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 FIXED_REGISTERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
EXPR_STMT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 fixmn2 instruction pattern . . . . . . . . . . . . . . . . . . . . 438
EXPR_STMT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 fixuns_truncmn2 instruction pattern . . . . . . . . . . 438
expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 fixunsmn2 instruction pattern. . . . . . . . . . . . . . . . . 438
expression codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 flags in RTL expression . . . . . . . . . . . . . . . . . . . . . . . 278
extended basic blocks, RTL SSA . . . . . . . . . . . . . . 327 float. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
extendmn2 instruction pattern. . . . . . . . . . . . . . . . . 438 float_extend . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
extensible constraints . . . . . . . . . . . . . . . . . . . . . . . . . 373 float_truncate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
EXTRA_SPECS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 FLOAT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
extract_last_m instruction pattern . . . . . . . . . . . 420 FLOAT_LIB_COMPARE_RETURNS_BOOL . . . . . . . . . . . . 588
extv instruction pattern . . . . . . . . . . . . . . . . . . . . . . 440 FLOAT_STORE_FLAG_VALUE . . . . . . . . . . . . . . . . . . . . . 673
extvm instruction pattern . . . . . . . . . . . . . . . . . . . . . 439 FLOAT_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
extvmisalignm instruction pattern . . . . . . . . . . . . 439 FLOAT_WORDS_BIG_ENDIAN . . . . . . . . . . . . . . . . . . . . . 517
extzv instruction pattern . . . . . . . . . . . . . . . . . . . . . 440 FLOAT_WORDS_BIG_ENDIAN, (lack of)
extzvm instruction pattern . . . . . . . . . . . . . . . . . . . . 439 effect on subreg . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
extzvmisalignm instruction pattern . . . . . . . . . . . 439 floating point and cross compilation . . . . . . . . . . . 655
floatmn2 instruction pattern . . . . . . . . . . . . . . . . . . 438
820 GNU Compiler Collection (GCC) Internals
H I
‘H’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 ‘i’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
HAmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 ‘I’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
HANDLE_PRAGMA_PACK_WITH_EXPANSION . . . . . . . . 675 identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
HANDLER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 IDENTIFIER_LENGTH . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
HANDLER_BODY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 IDENTIFIER_NODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
HANDLER_PARMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 IDENTIFIER_OPNAME_P . . . . . . . . . . . . . . . . . . . . . . . . 173
hard registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 IDENTIFIER_POINTER . . . . . . . . . . . . . . . . . . . . . . . . . . 173
HARD_FRAME_POINTER_IS_ARG_POINTER . . . . . . . . 558 IDENTIFIER_TYPENAME_P . . . . . . . . . . . . . . . . . . . . . . 173
HARD_FRAME_POINTER_IS_FRAME_POINTER . . . . . . 558 IEEE 754-2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
if_then_else . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
HARD_FRAME_POINTER_REGNUM. . . . . . . . . . . . . . . . . . 557
if_then_else and attributes . . . . . . . . . . . . . . . . . . 477
HARD_REGNO_CALLER_SAVE_MODE . . . . . . . . . . . . . . . 575
if_then_else usage . . . . . . . . . . . . . . . . . . . . . . . . . . 309
HARD_REGNO_NREGS_HAS_PADDING . . . . . . . . . . . . . . 535
IF_COND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
HARD_REGNO_NREGS_WITH_PADDING . . . . . . . . . . . . . 535 IF_STMT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
HARD_REGNO_RENAME_OK . . . . . . . . . . . . . . . . . . . . . . . 537 IFCVT_MACHDEP_INIT . . . . . . . . . . . . . . . . . . . . . . . . . . 677
HAS_INIT_SECTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 IFCVT_MODIFY_CANCEL . . . . . . . . . . . . . . . . . . . . . . . . 677
HAS_LONG_COND_BRANCH . . . . . . . . . . . . . . . . . . . . . . . 668 IFCVT_MODIFY_FINAL . . . . . . . . . . . . . . . . . . . . . . . . . . 677
HAS_LONG_UNCOND_BRANCH . . . . . . . . . . . . . . . . . . . . . 668 IFCVT_MODIFY_INSN . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
HAVE_DOS_BASED_FILE_SYSTEM . . . . . . . . . . . . . . . . 692 IFCVT_MODIFY_MULTIPLE_TESTS . . . . . . . . . . . . . . . 677
HAVE_POST_DECREMENT . . . . . . . . . . . . . . . . . . . . . . . . 589 IFCVT_MODIFY_TESTS . . . . . . . . . . . . . . . . . . . . . . . . . . 677
HAVE_POST_INCREMENT . . . . . . . . . . . . . . . . . . . . . . . . 589 IMAGPART_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
HAVE_POST_MODIFY_DISP . . . . . . . . . . . . . . . . . . . . . . 589 Immediate Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
HAVE_POST_MODIFY_REG . . . . . . . . . . . . . . . . . . . . . . . 589 immediate_operand . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
HAVE_PRE_DECREMENT . . . . . . . . . . . . . . . . . . . . . . . . . . 589 IMMEDIATE_PREFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
HAVE_PRE_INCREMENT . . . . . . . . . . . . . . . . . . . . . . . . . . 589 in_struct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
HAVE_PRE_MODIFY_DISP . . . . . . . . . . . . . . . . . . . . . . . 589 in_struct, in code_label and note . . . . . . . . . . . 278
HAVE_PRE_MODIFY_REG . . . . . . . . . . . . . . . . . . . . . . . . 589 in_struct, in insn and jump_insn
HCmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 and call_insn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
HFmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 in_struct, in insn, call_insn, jump_insn
high . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 and jump_table_data . . . . . . . . . . . . . . . . . . . . . . 280
high-part multiplication . . . . . . . . . . . . . . . . . . . . . . . 301 in_struct, in subreg . . . . . . . . . . . . . . . . . . . . . . . . . 281
HImode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 include . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
HImode, in insn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 INCLUDE_DEFAULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
HONOR_REG_ALLOC_ORDER . . . . . . . . . . . . . . . . . . . . . . 535 inclusive-or, bitwise . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
host configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 INCOMING_FRAME_SP_OFFSET . . . . . . . . . . . . . . . . . . . 552
host functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 INCOMING_REG_PARM_STACK_SPACE . . . . . . . . . . . . . 562
INCOMING_REGNO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
host hooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
INCOMING_RETURN_ADDR_RTX . . . . . . . . . . . . . . . . . . . 551
host makefile fragment . . . . . . . . . . . . . . . . . . . . . . . . 698
INCOMING_STACK_BOUNDARY . . . . . . . . . . . . . . . . . . . . 519
HOST_BIT_BUCKET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
INDEX_REG_CLASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
HOST_EXECUTABLE_SUFFIX . . . . . . . . . . . . . . . . . . . . . 692
indirect_jump instruction pattern . . . . . . . . . . . . 445
HOST_HOOKS_EXTRA_SIGNALS . . . . . . . . . . . . . . . . . . . 691 indirect_operand . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
HOST_HOOKS_GT_PCH_ALLOC_GRANULARITY . . . . . . 691 INDIRECT_REF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
HOST_HOOKS_GT_PCH_GET_ADDRESS . . . . . . . . . . . . . 691 init_machine_status . . . . . . . . . . . . . . . . . . . . . . . . 516
HOST_HOOKS_GT_PCH_USE_ADDRESS . . . . . . . . . . . . . 691 init_one_libfunc . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
HOST_LACKS_INODE_NUMBERS . . . . . . . . . . . . . . . . . . . 693 INIT_ARRAY_SECTION_ASM_OP. . . . . . . . . . . . . . . . . . 619
HOST_LONG_FORMAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694 INIT_CUMULATIVE_ARGS . . . . . . . . . . . . . . . . . . . . . . . 566
HOST_LONG_LONG_FORMAT . . . . . . . . . . . . . . . . . . . . . . 694 INIT_CUMULATIVE_INCOMING_ARGS . . . . . . . . . . . . . 566
HOST_OBJECT_SUFFIX . . . . . . . . . . . . . . . . . . . . . . . . . . 692 INIT_CUMULATIVE_LIBCALL_ARGS . . . . . . . . . . . . . . 566
HOST_PTR_PRINTF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694 INIT_ENVIRONMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
HOT_TEXT_SECTION_NAME . . . . . . . . . . . . . . . . . . . . . . 618 INIT_EXPANDERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
HQmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 INIT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
INIT_SECTION_ASM_OP . . . . . . . . . . . . . . . . . . . . 619, 641
INITIAL_ELIMINATION_OFFSET . . . . . . . . . . . . . . . . 561
INITIAL_FRAME_ADDRESS_RTX. . . . . . . . . . . . . . . . . . 550
initialization routines . . . . . . . . . . . . . . . . . . . . . . . . . 639
inlining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Concept Index 825
L LINK_COMMAND_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
label_ref . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 LINK_EH_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
label_ref and ‘/v’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 LINK_GCC_C_SEQUENCE_SPEC . . . . . . . . . . . . . . . . . . . 509
label_ref, RTL sharing . . . . . . . . . . . . . . . . . . . . . . 335 LINK_LIBGCC_SPECIAL_1 . . . . . . . . . . . . . . . . . . . . . . 509
LABEL_ALIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 LINK_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
LABEL_ALIGN_AFTER_BARRIER. . . . . . . . . . . . . . . . . . 651 list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
LABEL_ALT_ENTRY_P . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Liveness representation . . . . . . . . . . . . . . . . . . . . . . . 345
LABEL_ALTERNATE_NAME . . . . . . . . . . . . . . . . . . . . . . . 341 lo_sum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
LABEL_DECL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 load address instruction . . . . . . . . . . . . . . . . . . . . . . . 373
LABEL_KIND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 load_multiple instruction pattern . . . . . . . . . . . . 413
LABEL_NUSES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 LOAD_EXTEND_OP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
LABEL_PRESERVE_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Local Register Allocator (LRA) . . . . . . . . . . . . . . . 152
LABEL_REF_NONLOCAL_P . . . . . . . . . . . . . . . . . . . . . . . 278 LOCAL_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
lang_hooks.gimplify_expr . . . . . . . . . . . . . . . . . . . 138 LOCAL_CLASS_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
lang_hooks.parse_file . . . . . . . . . . . . . . . . . . . . . . 137 LOCAL_DECL_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . 522
language-dependent trees . . . . . . . . . . . . . . . . . . . . . 207 LOCAL_INCLUDE_DIR . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
language-independent intermediate LOCAL_LABEL_PREFIX . . . . . . . . . . . . . . . . . . . . . . . . . . 645
representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 LOCAL_REGNO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
large return values . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 location information . . . . . . . . . . . . . . . . . . . . . . . . . . 747
LAST_STACK_REG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 log10m2 instruction pattern . . . . . . . . . . . . . . . . . . . 429
LAST_VIRTUAL_REGISTER . . . . . . . . . . . . . . . . . . . . . . 295 log1pm2 instruction pattern . . . . . . . . . . . . . . . . . . . 429
late IPA passes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 log2m2 instruction pattern . . . . . . . . . . . . . . . . . . . . 430
lceilmn2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 logbm2 instruction pattern . . . . . . . . . . . . . . . . . . . . 430
LCSSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Logical Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
LD_FINI_SWITCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 logical-and, bitwise . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
LOGICAL_OP_NON_SHORT_CIRCUIT . . . . . . . . . . . . . . 607
LD_INIT_SWITCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
logm2 instruction pattern . . . . . . . . . . . . . . . . . . . . . 429
LDD_SUFFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
LONG_ACCUM_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . 528
ldexpm3 instruction pattern . . . . . . . . . . . . . . . . . . . 428
LONG_DOUBLE_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . 527
le . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
LONG_FRACT_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . 527
le and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
LONG_LONG_ACCUM_TYPE_SIZE. . . . . . . . . . . . . . . . . . 528
LE_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
LONG_LONG_FRACT_TYPE_SIZE. . . . . . . . . . . . . . . . . . 527
leaf functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
LONG_LONG_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . 527
leaf_function_p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
LONG_TYPE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
LEAF_REG_REMAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
longjmp and automatic variables . . . . . . . . . . . . . . . . 5
LEAF_REGISTERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
Loop analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
left rotate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Loop manipulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
left shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Loop querying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
LEGITIMATE_PIC_OPERAND_P . . . . . . . . . . . . . . . . . . . 623
Loop representation . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
LEGITIMIZE_RELOAD_ADDRESS. . . . . . . . . . . . . . . . . . 591
Loop-closed SSA form . . . . . . . . . . . . . . . . . . . . . . . . 350
len_load_m instruction pattern . . . . . . . . . . . . . . . 417
LOOP_ALIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
len_store_m instruction pattern . . . . . . . . . . . . . . 418
LOOP_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
looping instruction patterns . . . . . . . . . . . . . . . . . . . 458
less than . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
lowering, language-dependent
less than or equal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
intermediate representation . . . . . . . . . . . . . . . . . 137
leu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
lrintmn2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
leu and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
lroundmn2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
lfloormn2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
LSHIFT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
LIB_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
lshiftrt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
LIB2FUNCS_EXTRA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
lshiftrt and attributes . . . . . . . . . . . . . . . . . . . . . . 478
LIBCALL_VALUE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
lshrm3 instruction pattern . . . . . . . . . . . . . . . . . . . . 427
libgcc.a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
lt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
LIBGCC_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
lt and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
LIBGCC2_CFLAGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
LT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
LIBGCC2_GNU_PREFIX . . . . . . . . . . . . . . . . . . . . . . . . . . 528
LTGT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
LIBGCC2_UNWIND_ATTRIBUTE . . . . . . . . . . . . . . . . . . . 685
lto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
library subroutine names . . . . . . . . . . . . . . . . . . . . . . 587
ltrans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
LIBRARY_PATH_ENV . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
ltu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
LIMIT_RELOAD_CLASS . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Concept Index 827
M MD_FALLBACK_FRAME_STATE_FOR . . . . . . . . . . . . . . . 555
‘m’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 MD_HANDLE_UNWABI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
MACH_DEP_SECTION_ASM_FLAG. . . . . . . . . . . . . . . . . . 619 MD_STARTFILE_PREFIX . . . . . . . . . . . . . . . . . . . . . . . . 510
machine attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658 MD_STARTFILE_PREFIX_1 . . . . . . . . . . . . . . . . . . . . . . 511
machine description macros . . . . . . . . . . . . . . . . . . . 505 mem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
machine descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . 357 mem and ‘/c’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
machine mode conversions . . . . . . . . . . . . . . . . . . . . 306 mem and ‘/f’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
machine mode wrapper classes . . . . . . . . . . . . . . . . 287 mem and ‘/j’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
machine modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 mem and ‘/u’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
machine specific constraints . . . . . . . . . . . . . . . . . . . 377 mem and ‘/v’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
machine-independent predicates . . . . . . . . . . . . . . . 366 mem, RTL sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
machine_mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 mem_thread_fence instruction pattern . . . . . . . . 455
macros, target description . . . . . . . . . . . . . . . . . . . . . 505 MEM_ADDR_SPACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
maddmn4 instruction pattern . . . . . . . . . . . . . . . . . . . 425 MEM_ALIAS_SET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
make_safe_from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 MEM_ALIGN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
MAKE_DECL_ONE_ONLY . . . . . . . . . . . . . . . . . . . . . . . . . . 635 MEM_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
makefile fragment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 MEM_KEEP_ALIAS_SET_P . . . . . . . . . . . . . . . . . . . . . . . 278
makefile targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 MEM_NOTRAP_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
MALLOC_ABI_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . 519 MEM_OFFSET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Manipulating GIMPLE statements . . . . . . . . . . . . 232 MEM_OFFSET_KNOWN_P . . . . . . . . . . . . . . . . . . . . . . . . . . 276
marking roots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711 MEM_POINTER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
mask_fold_left_plus_m instruction pattern . . . 421 MEM_READONLY_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
mask_gather_loadmn instruction pattern . . . . . . 415 MEM_REF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
mask_scatter_storemn instruction pattern . . . . 415 MEM_SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
MASK_RETURN_ADDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649 MEM_SIZE_KNOWN_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
maskloadmn instruction pattern . . . . . . . . . . . . . . . 417 MEM_VOLATILE_P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
maskstoremn instruction pattern . . . . . . . . . . . . . . 417 memory model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Match and Simplify . . . . . . . . . . . . . . . . . . . . . . . . . . . 729 memory reference, nonoffsettable . . . . . . . . . . . . . . 374
match_dup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360, 474 memory references in constraints . . . . . . . . . . . . . . 371
match_dup and attributes . . . . . . . . . . . . . . . . . . . . . 482 memory_barrier instruction pattern . . . . . . . . . . . 450
match_op_dup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 memory_blockage instruction pattern . . . . . . . . . . 450
match_operand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 memory_operand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
match_operand and attributes . . . . . . . . . . . . . . . . . 478 MEMORY_MOVE_COST . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
match_operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 METHOD_TYPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
match_par_dup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 MIN_UNITS_PER_WORD . . . . . . . . . . . . . . . . . . . . . . . . . . 517
match_parallel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 MINIMUM_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
match_scratch . . . . . . . . . . . . . . . . . . . . . . . . . . . 360, 474 MINIMUM_ATOMIC_ALIGNMENT . . . . . . . . . . . . . . . . . . . 520
match_test and attributes . . . . . . . . . . . . . . . . . . . . 478 minm3 instruction pattern . . . . . . . . . . . . . . . . . . . . . 420
matching constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 minus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
matching operands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 minus and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 478
math library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 minus, canonicalization of . . . . . . . . . . . . . . . . . . . . . 461
math, in RTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 MINUS_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
MATH_LIBRARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676 MIPS coprocessor-definition macros . . . . . . . . . . . 662
matherr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588 miscellaneous register hooks . . . . . . . . . . . . . . . . . . . 582
MAX_BITS_PER_WORD . . . . . . . . . . . . . . . . . . . . . . . . . . . 517 mnemonic attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
MAX_BITSIZE_MODE_ANY_INT . . . . . . . . . . . . . . . . . . . 290 mod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
MAX_BITSIZE_MODE_ANY_MODE. . . . . . . . . . . . . . . . . . 290 mod and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
MAX_CONDITIONAL_EXECUTE . . . . . . . . . . . . . . . . . . . . 677 mode classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
MAX_FIXED_MODE_SIZE . . . . . . . . . . . . . . . . . . . . . . . . 524 mode iterators in .md files . . . . . . . . . . . . . . . . . . . . . 497
MAX_MOVE_MAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 mode switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
MAX_OFILE_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . 520 MODE_ACCUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
MAX_REGS_PER_ADDRESS . . . . . . . . . . . . . . . . . . . . . . . 589 MODE_BASE_REG_CLASS . . . . . . . . . . . . . . . . . . . . . . . . 540
MAX_STACK_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . 520 MODE_BASE_REG_REG_CLASS . . . . . . . . . . . . . . . . . . . . 540
maxm3 instruction pattern . . . . . . . . . . . . . . . . . . . . . 420 MODE_CC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287, 601
may_trap_p, tree_could_trap_p . . . . . . . . . . . . . 340 MODE_CODE_BASE_REG_CLASS . . . . . . . . . . . . . . . . . . . 541
maybe_undef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706 MODE_COMPLEX_FLOAT . . . . . . . . . . . . . . . . . . . . . . . . . . 287
mcount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578 MODE_COMPLEX_INT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
MD_EXEC_PREFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510 MODE_DECIMAL_FLOAT . . . . . . . . . . . . . . . . . . . . . . . . . . 286
828 GNU Compiler Collection (GCC) Internals
MODE_FLOAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 N
MODE_FRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 ‘n’ in constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
MODE_INT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 N_REG_CLASSES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
MODE_OPAQUE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
MODE_PARTIAL_INT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 named address spaces . . . . . . . . . . . . . . . . . . . . . . . . . 666
MODE_POINTER_BOUNDS . . . . . . . . . . . . . . . . . . . . . . . . 287 named patterns and conditions . . . . . . . . . . . . . . . . 358
MODE_RANDOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 names, pattern. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
MODE_UACCUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 namespace, scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
MODE_UFRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 NAMESPACE_DECL . . . . . . . . . . . . . . . . . . . . . . . . . 178, 210
modifiers in constraints . . . . . . . . . . . . . . . . . . . . . . . 376 NATIVE_SYSTEM_HEADER_COMPONENT . . . . . . . . . . . . 511
MODIFY_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 ne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
modm3 instruction pattern . . . . . . . . . . . . . . . . . . . . . 419 ne and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
modulo scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 NE_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
MOVE_MAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 nearbyintm2 instruction pattern . . . . . . . . . . . . . . 431
MOVE_MAX_PIECES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 neg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
neg and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
MOVE_RATIO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
neg, canonicalization of . . . . . . . . . . . . . . . . . . . . . . . 461
movm instruction pattern . . . . . . . . . . . . . . . . . . . . . . 411
NEGATE_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
movmemm instruction pattern . . . . . . . . . . . . . . . . . . . 436 negation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
movmisalignm instruction pattern . . . . . . . . . . . . . 413 negation with signed saturation . . . . . . . . . . . . . . . 301
movmodecc instruction pattern. . . . . . . . . . . . . . . . . 440 negation with unsigned saturation . . . . . . . . . . . . . 301
movstr instruction pattern . . . . . . . . . . . . . . . . . . . . 436 negm2 instruction pattern . . . . . . . . . . . . . . . . . . . . . 427
movstrictm instruction pattern . . . . . . . . . . . . . . . 413 negmodecc instruction pattern. . . . . . . . . . . . . . . . . 442
msubmn4 instruction pattern . . . . . . . . . . . . . . . . . . . 426 negvm3 instruction pattern . . . . . . . . . . . . . . . . . . . . 427
mulhisi3 instruction pattern . . . . . . . . . . . . . . . . . . 425 nested functions, support for . . . . . . . . . . . . . . . . . . 584
mulm3 instruction pattern . . . . . . . . . . . . . . . . . . . . . 419 nested_ptr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
mulqihi3 instruction pattern . . . . . . . . . . . . . . . . . . 425 next_bb, prev_bb,
mulsidi3 instruction pattern . . . . . . . . . . . . . . . . . . 425 FOR_EACH_BB, FOR_ALL_BB . . . . . . . . . . . . . . . . . . 337
mult . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 NEXT_INSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
mult and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . 478 NEXT_OBJC_RUNTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
mult, canonicalization of . . . . . . . . . . . . . . . . . 461, 462 nil . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
MULT_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 NM_FLAGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
MULT_HIGHPART_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . 187 NO_DOLLAR_IN_LABEL . . . . . . . . . . . . . . . . . . . . . . . . . . 632
MULTIARCH_DIRNAME . . . . . . . . . . . . . . . . . . . . . . . . . . . 698 NO_DOT_IN_LABEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
NO_FUNCTION_CSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
MULTILIB_DEFAULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
NO_PROFILE_COUNTERS . . . . . . . . . . . . . . . . . . . . . . . . 579
MULTILIB_DIRNAMES . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
NO_REGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
MULTILIB_EXCEPTIONS . . . . . . . . . . . . . . . . . . . . . . . . 696
NON_LVALUE_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
MULTILIB_EXTRA_OPTS . . . . . . . . . . . . . . . . . . . . . . . . 697 nondeterministic finite state automaton . . . . . . . 489
MULTILIB_MATCHES . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 nonimmediate_operand . . . . . . . . . . . . . . . . . . . . . . . 368
MULTILIB_OPTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 nonlocal goto handler . . . . . . . . . . . . . . . . . . . . . . . . . 341
MULTILIB_OSDIRNAMES . . . . . . . . . . . . . . . . . . . . . . . . 697 nonlocal_goto instruction pattern . . . . . . . . . . . . 447
MULTILIB_REQUIRED . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 nonlocal_goto_receiver
MULTILIB_REUSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697 instruction pattern . . . . . . . . . . . . . . . . . . . . . . . . . 448
multiple alternative constraints . . . . . . . . . . . . . . . 375 nonmemory_operand . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
MULTIPLE_SYMBOL_SPACES . . . . . . . . . . . . . . . . . . . . . 676 nonoffsettable memory reference . . . . . . . . . . . . . . 374
multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 nop instruction pattern . . . . . . . . . . . . . . . . . . . . . . . 445
multiplication high part . . . . . . . . . . . . . . . . . . . . . . . 301 NOP_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
multiplication with signed saturation . . . . . . . . . . 301 normal predicates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
multiplication with unsigned saturation . . . . . . . 301 not . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
mulvm4 instruction pattern . . . . . . . . . . . . . . . . . . . . 419 not and attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
not equal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
not, canonicalization of . . . . . . . . . . . . . . . . . . . . . . . 461
note . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
note and ‘/i’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
note and ‘/v’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
NOTE_INSN_BASIC_BLOCK . . . . . . . . . . . . . . . . . . . . . . 338
NOTE_INSN_BEGIN_STMT . . . . . . . . . . . . . . . . . . . . . . . 319
Concept Index 829
TARGET_SHRINK_WRAP_ TARGET_VECTORIZE_
DISQUALIFY_COMPONENTS . . . . . . . . . . . . . . . . . . . . 580 AUTOVECTORIZE_VECTOR_MODES . . . . . . . . . . . . . . 595
TARGET_SHRINK_WRAP_EMIT_ TARGET_VECTORIZE_BUILTIN_GATHER . . . . . . . . . . . 597
EPILOGUE_COMPONENTS . . . . . . . . . . . . . . . . . . . . . . 581 TARGET_VECTORIZE_BUILTIN_MASK_FOR_LOAD . . . 593
TARGET_SHRINK_WRAP_EMIT_ TARGET_VECTORIZE_BUILTIN_MD_
PROLOGUE_COMPONENTS . . . . . . . . . . . . . . . . . . . . . . 580 VECTORIZED_FUNCTION . . . . . . . . . . . . . . . . . . . . . . 595
TARGET_SHRINK_WRAP_GET_ TARGET_VECTORIZE_BUILTIN_SCATTER . . . . . . . . . 597
SEPARATE_COMPONENTS . . . . . . . . . . . . . . . . . . . . . . 580 TARGET_VECTORIZE_BUILTIN_
TARGET_SHRINK_WRAP_SET_ VECTORIZATION_COST . . . . . . . . . . . . . . . . . . . . . . . 594
HANDLED_COMPONENTS . . . . . . . . . . . . . . . . . . . . . . . 581 TARGET_VECTORIZE_BUILTIN_
TARGET_SIMD_CLONE_ADJUST . . . . . . . . . . . . . . . . . . . 597 VECTORIZED_FUNCTION . . . . . . . . . . . . . . . . . . . . . . 594
TARGET_SIMD_CLONE_COMPUTE_ TARGET_VECTORIZE_CREATE_COSTS . . . . . . . . . . . . . 596
VECSIZE_AND_SIMDLEN . . . . . . . . . . . . . . . . . . . . . . 597 TARGET_VECTORIZE_EMPTY_
TARGET_SIMD_CLONE_USABLE . . . . . . . . . . . . . . . . . . . 597 MASK_IS_EXPENSIVE . . . . . . . . . . . . . . . . . . . . . . . . 596
TARGET_SIMT_VF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597 TARGET_VECTORIZE_GET_MASK_MODE . . . . . . . . . . . . 596
TARGET_SLOW_UNALIGNED_ACCESS . . . . . . . . . . . . . . 605 TARGET_VECTORIZE_PREFERRED_DIV_AS_
TARGET_SMALL_REGISTER_ SHIFTS_OVER_MULT . . . . . . . . . . . . . . . . . . . . . . . . . . 594
CLASSES_FOR_MODE_P . . . . . . . . . . . . . . . . . . . . . . . 571 TARGET_VECTORIZE_PREFERRED_SIMD_MODE . . . . . 595
TARGET_SPECULATION_SAFE_VALUE . . . . . . . . . . . . . 688 TARGET_VECTORIZE_PREFERRED_
TARGET_SPILL_CLASS . . . . . . . . . . . . . . . . . . . . . . . . . . 549 VECTOR_ALIGNMENT . . . . . . . . . . . . . . . . . . . . . . . . . . 594
TARGET_SPLIT_COMPLEX_ARG . . . . . . . . . . . . . . . . . . . 568 TARGET_VECTORIZE_RELATED_MODE . . . . . . . . . . . . . 596
TARGET_STACK_CLASH_PROTECTION_ TARGET_VECTORIZE_SPLIT_REDUCTION . . . . . . . . . 595
ALLOCA_PROBE_RANGE . . . . . . . . . . . . . . . . . . . . . . . 557 TARGET_VECTORIZE_SUPPORT_
TARGET_STACK_PROTECT_FAIL. . . . . . . . . . . . . . . . . . 581 VECTOR_MISALIGNMENT . . . . . . . . . . . . . . . . . . . . . . 595
TARGET_STACK_PROTECT_GUARD . . . . . . . . . . . . . . . . 581 TARGET_VECTORIZE_VEC_PERM_CONST . . . . . . . . . . . 594
TARGET_STACK_PROTECT_RUNTIME_ENABLED_P . . . 581 TARGET_VECTORIZE_VECTOR_
TARGET_STARTING_FRAME_OFFSET . . . . . . . . . . . . . . 550 ALIGNMENT_REACHABLE . . . . . . . . . . . . . . . . . . . . . . 594
TARGET_STARTING_FRAME_OFFSET and TARGET_VERIFY_TYPE_CONTEXT . . . . . . . . . . . . . . . . 685
virtual registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 TARGET_VTABLE_DATA_ENTRY_DISTANCE . . . . . . . . 531
TARGET_STATIC_CHAIN . . . . . . . . . . . . . . . . . . . . . . . . 559 TARGET_VTABLE_ENTRY_ALIGN. . . . . . . . . . . . . . . . . . 531
TARGET_STATIC_RTX_ALIGNMENT . . . . . . . . . . . . . . . 520 TARGET_VTABLE_USES_DESCRIPTORS . . . . . . . . . . . . 531
TARGET_STRICT_ARGUMENT_NAMING . . . . . . . . . . . . . 583 TARGET_WANT_DEBUG_PUB_SECTIONS . . . . . . . . . . . . 654
TARGET_STRING_OBJECT_REF_TYPE_P . . . . . . . . . . . 514 TARGET_WARN_FUNC_RETURN . . . . . . . . . . . . . . . . . . . . 580
TARGET_STRIP_NAME_ENCODING . . . . . . . . . . . . . . . . 622 TARGET_WARN_PARAMETER_PASSING_ABI . . . . . . . . 575
TARGET_STRUCT_VALUE_RTX . . . . . . . . . . . . . . . . . . . . 574 TARGET_WEAK_NOT_IN_ARCHIVE_TOC . . . . . . . . . . . . 636
TARGET_SUPPORTS_SPLIT_STACK . . . . . . . . . . . . . . . 581 TARGET_ZERO_CALL_USED_REGS . . . . . . . . . . . . . . . . 685
TARGET_SUPPORTS_WEAK . . . . . . . . . . . . . . . . . . . . . . . 635 targetm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
TARGET_SUPPORTS_WIDE_INT . . . . . . . . . . . . . . . . . . . 687 targets, makefile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
TARGET_TERMINATE_DW2_EH_FRAME_INFO . . . . . . . 650 tbranch_opmode3 instruction pattern . . . . . . . . . . 443
TARGET_TRAMPOLINE_ADJUST_ADDRESS . . . . . . . . . 586 TCmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
TARGET_TRAMPOLINE_INIT . . . . . . . . . . . . . . . . . . . . . 586 TDmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
TARGET_TRANSLATE_MODE_ATTRIBUTE . . . . . . . . . . . 569 TEMPLATE_DECL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
TARGET_TRULY_NOOP_TRUNCATION . . . . . . . . . . . . . . 671 Temporaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
TARGET_UNSPEC_MAY_TRAP_P . . . . . . . . . . . . . . . . . . . 681 termination routines . . . . . . . . . . . . . . . . . . . . . . . . . . 639
TARGET_UNWIND_TABLES_DEFAULT . . . . . . . . . . . . . . 649 testing constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
TARGET_UNWIND_WORD_MODE . . . . . . . . . . . . . . . . . . . . 525 TEXT_SECTION_ASM_OP . . . . . . . . . . . . . . . . . . . . . . . . 618
TARGET_UPDATE_IPA_FN_TARGET_INFO . . . . . . . . . 661 TFmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
TARGET_UPDATE_STACK_BOUNDARY . . . . . . . . . . . . . . 685 The Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
TARGET_USE_ANCHORS_FOR_SYMBOL_P . . . . . . . . . . . 600 THEN_CLAUSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
TARGET_USE_BLOCKS_FOR_CONSTANT_P . . . . . . . . . 593 THREAD_MODEL_SPEC . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
TARGET_USE_BLOCKS_FOR_DECL_P . . . . . . . . . . . . . . 593 THROW_EXPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
TARGET_USE_BY_PIECES_INFRASTRUCTURE_P . . . . 605 THUNK_DECL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
TARGET_USE_PSEUDO_PIC_REG. . . . . . . . . . . . . . . . . . 565 THUNK_DELTA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
TARGET_USES_WEAK_UNWIND_INFO . . . . . . . . . . . . . . 555 TImode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
TARGET_VALID_DLLIMPORT_ATTRIBUTE_P . . . . . . . 659 TImode, in insn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
TARGET_VALID_POINTER_MODE. . . . . . . . . . . . . . . . . . 568 TLS_COMMON_ASM_OP . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
TARGET_VECTOR_ALIGNMENT . . . . . . . . . . . . . . . . . . . . 521 TLS_SECTION_ASM_FLAG . . . . . . . . . . . . . . . . . . . . . . . 619
TARGET_VECTOR_MODE_SUPPORTED_P . . . . . . . . . . . . 569 tm.h macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Concept Index 841