Home | History | Annotate | Download | only in bin

Lines Matching refs:superblock

4024 superblock schedulingReschedule instructions before register allocationReschedule instructions after register allocationAppend a second underscore if the name already contains an underscoreAccess data in the same section from shared anchor pointsPerform software pipelining of inner loops during selective scheduling-fsel-sched-pipelining-outer-loopsPerform software pipelining of outer loops during selective scheduling-fsel-sched-reschedule-pipelinedReschedule pipelined regions without pipeliningSchedule instructions using selective scheduling algorithmRun selective scheduling after reloadUse the same size for double as for floatUse the narrowest integer type possible for enumeration typesForce the underlying type for "wchar_t" to be "unsigned short"Show column numbers in diagnostics, when available.  Default onEmit function prologues only before parts of the function that need it, rather than at the top of the function.Framepointer shrinkwrapping optimization.Apply negative sign to zero valuesDisable optimizations observable by IEEE signaling NaNsWhen "signed" or "unsigned" is not given make the bitfield signedDisable floating point optimizations that ignore the IEEE signedness of zeroSpecifies the vectorization cost model for code marked with a simd directiveConvert floating point constants to single precision constantsSupport delete operator with objetc's size as the second parameter.Set the source language versionSplit lifetimes of induction variables when loops are unrolledGenerate discontiguous stack framesSplit wide types into independent registersPut all local arrays on stack.Insert stack checking code into the program.  Same as -fstack-check=specific-fstack-check=[no|generic|specific]	Insert stack checking code into the program-fstack-limit-register=<register>	Trap if the stack goes past <register>-fstack-limit-symbol=<name>	Trap if the stack goes past symbol <name>Use propolice as a stack protection methodUse a stack protection method for every functionUse a smart stack protection method for certain functions-fstack-reuse=[all|named_vars|none] Set stack reuse level for local variables.Output stack usage information on a per-function basisDisplay statistics accumulated during compilationEnable assignability checks for stores into object arraysAssume strict aliasing rules applyPerform transformations based on enum precisionAssume that values of enumeration type are always within the minimum range of that typeTreat signed overflow as undefinedForce bitfield accesses to match their type widthImplement __atomic operations via libcalls to legacy __sync functionsCheck for syntax errors, then stop-ftabstop=<number>	Distance between tab stops for column reportingSet the maximum number of template instantiation notes for a single warning or error-ftemplate-depth=<number>	Specify maximum template instantiation depthCreate data files needed by "gcov"Perform jump threading optimizations-fno-threadsafe-statics	Do not generate thread-safe code for initializing local staticsReport the time taken by each compiler pass-ftls-model=[global-dynamic|local-dynamic|initial-exec|local-exec]	Set the default thread-local storage code generation modelReorder top level functions, variables, and asmsPerform superblock