Home
last modified time | relevance | path

Searched refs:enable (Results 1 – 25 of 104) sorted by relevance

12345

/glibc-2.36/nscd/
Dnscd.conf49 enable-cache passwd yes
59 enable-cache group yes
69 enable-cache hosts yes
78 enable-cache services yes
87 enable-cache netgroup yes
/glibc-2.36/
Dconfigure.ac186 AS_HELP_STRING([--enable-shared],
191 AS_HELP_STRING([--enable-profile],
208 AS_HELP_STRING([--enable-hardcoded-path-in-tests],
224 AS_HELP_STRING([--enable-bind-now],
236 AS_HELP_STRING([--enable-stack-protector=@<:@yes|no|all|strong@:>@],
242 *) AC_MSG_ERROR([Not a valid argument for --enable-stack-protector: \"$enable_stack_protector\"]);;
248 AS_HELP_STRING([--enable-static-nss],
266 AS_HELP_STRING([--enable-maintainer-mode],
267 …[enable make rules and dependencies not useful (and sometimes confusing) to the casual installer]),
274 AS_HELP_STRING([--enable-kernel=VERSION],
[all …]
DINSTALL48 if 'CFLAGS' is specified it must enable optimization. For example:
77 '--enable-kernel=VERSION'
117 code of the dynamic linker. These flags can be used to enable
142 '--enable-cet'
143 '--enable-cet=permissive'
145 When the GNU C Library is built with '--enable-cet' or
146 '--enable-cet=permissive', the resulting library is protected with
153 Intel Pentium Pro or newer. With '--enable-cet', it is an error to
155 With '--enable-cet=permissive', CET is disabled when dlopening a
158 NOTE: '--enable-cet' has been tested for i686, x86_64 and x32 on
[all …]
Dconfig.make.in54 enable-werror = @enable_werror@
61 enable-timezone-tools = @enable_timezone_tools@
DNEWS120 [28860] build: --enable-kernel=5.1.0 build fails because of missing
279 --enable-static-pie, which no longer has any effect on the build
343 * The --enable-static-pie option is no longer available. The glibc build
364 * The audit module interface version LAV_CURRENT is increased to enable
422 --enable-initfini-array
470 [28455] dynamic-link: -Wl,--enable-new-dtags doesn't work
575 C2X, is supported to enable declarations of functions defined in Annex F
785 crash in IFUNC resolver due to stack canary (--enable-stack-
815 [27555] dynamic-link: Static tests fail with --enable-stack-
845 [27872] build: Obsolete configure option --enable-stackguard-
[all …]
/glibc-2.36/manual/
Dinstall.texi72 @code{CFLAGS} is specified it must enable optimization. For example:
104 @item --enable-kernel=@var{version}
142 code of the dynamic linker. These flags can be used to enable early
170 @item --enable-cet
171 @itemx --enable-cet=permissive
173 @theglibc{} is built with @option{--enable-cet} or
174 @option{--enable-cet=permissive}, the resulting library
181 newer. With @option{--enable-cet}, it is an error to dlopen a non CET
183 @option{--enable-cet=permissive}, CET is disabled when dlopening a
186 NOTE: @option{--enable-cet} has been tested for i686, x86_64 and x32
[all …]
Dtunables.texi44 glibc.elision.enable: 0 (min: 0, max: 1)
270 passed to @code{malloc} for the largest bin size to enable.
354 @deftp Tunable glibc.elision.enable
355 The @code{glibc.elision.enable} tunable enables lock elision if the feature is
485 enable CPU/ARCH feature @code{yyy}, disable CPU/ARCH feature @code{xxx}
494 enable optimizations recommended for cacheable memory. If set to
610 @Theglibc{} startup code will automatically enable memory tagging
/glibc-2.36/sysdeps/x86/
DMakefile39 ifeq (yes,$(enable-x86-isa-level))
81 ifneq ($(enable-cet),no)
127 ifneq ($(enable-cet),no)
158 ifeq ($(enable-cet),permissive)
167 ifeq ($(enable-cet),permissive)
197 LDFLAGS-tst-cet-legacy-mod-6c.so = -Wl,--enable-new-dtags,-z,nodelete
Dconfigure.ac45 LIBC_CONFIG_VAR([enable-cet], [$enable_cet])
129 LIBC_CONFIG_VAR([enable-x86-isa-level], [$libc_cv_include_x86_isa_level])
Dconfigure70 enable-cet = $enable_cet"
191 enable-x86-isa-level = $libc_cv_include_x86_isa_level"
/glibc-2.36/nptl_db/
Dtd_ta_enable_stats.c23 td_ta_enable_stats (const td_thragent_t *ta, int enable) in td_ta_enable_stats() argument
/glibc-2.36/sysdeps/powerpc/powerpc64/le/fpu/multiarch/
DMakefile192 enable-f128-ifunc-CFLAGS = -D_F128_ENABLE_IFUNC $(no-gnu-attributes-CFLAGS) $(type-float128-CFLAGS)
205 $(foreach f,$(f128-march-routines-p9),$(objpfx)$(f)$(o)): sysdep-CFLAGS += $$(enable-f128-ifunc-CFL…
/glibc-2.36/gmon/
DMakefile42 ifeq (yes,$(enable-static-pie))
74 ifeq (yes,$(enable-static-pie))
/glibc-2.36/csu/
DMakefile74 ifeq (yes,$(enable-static-pie))
84 ifeq (yes,$(enable-static-pie))
/glibc-2.36/sysdeps/unix/sysv/linux/x86/
Delision-conf.c101 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
DMakefile25 ifneq ($(enable-cet),no)
/glibc-2.36/sysdeps/unix/sysv/linux/powerpc/
Delision-conf.c108 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
/glibc-2.36/sysdeps/unix/sysv/linux/s390/
Delision-conf.c107 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
/glibc-2.36/scripts/
Dpylintrc30 #enable=
38 # --enable=similarities". If you want to run only the classes checker, but have
39 # no Warning level messages displayed, use"--disable=all --enable=classes
/glibc-2.36/rt/
DMakefile103 LDFLAGS-rt.so = -Wl,--enable-new-dtags,-z,nodelete
/glibc-2.36/sysdeps/unix/sysv/linux/x86_64/
DMakefile18 ifeq (yes,$(enable-x86-isa-level))
/glibc-2.36/nptl/
Dtst-mutex8.c117 if (TUNABLE_GET_FULL (glibc, elision, enable, int32_t, NULL) == 1) in check_type()
/glibc-2.36/elf/
Ddl-tunables.list109 enable {
/glibc-2.36/timezone/
DMakefile34 ifeq ($(enable-timezone-tools),yes)
/glibc-2.36/sysdeps/i386/
Dconfigure.ac17 # no such work has been done to enable this. Even with NPTL disabled you still

12345