Searched refs:enable (Results 1 – 25 of 104) sorted by relevance
12345
/glibc-2.36/nscd/ |
D | nscd.conf | 49 enable-cache passwd yes 59 enable-cache group yes 69 enable-cache hosts yes 78 enable-cache services yes 87 enable-cache netgroup yes
|
/glibc-2.36/ |
D | configure.ac | 186 AS_HELP_STRING([--enable-shared], 191 AS_HELP_STRING([--enable-profile], 208 AS_HELP_STRING([--enable-hardcoded-path-in-tests], 224 AS_HELP_STRING([--enable-bind-now], 236 AS_HELP_STRING([--enable-stack-protector=@<:@yes|no|all|strong@:>@], 242 *) AC_MSG_ERROR([Not a valid argument for --enable-stack-protector: \"$enable_stack_protector\"]);; 248 AS_HELP_STRING([--enable-static-nss], 266 AS_HELP_STRING([--enable-maintainer-mode], 267 …[enable make rules and dependencies not useful (and sometimes confusing) to the casual installer]), 274 AS_HELP_STRING([--enable-kernel=VERSION], [all …]
|
D | INSTALL | 48 if 'CFLAGS' is specified it must enable optimization. For example: 77 '--enable-kernel=VERSION' 117 code of the dynamic linker. These flags can be used to enable 142 '--enable-cet' 143 '--enable-cet=permissive' 145 When the GNU C Library is built with '--enable-cet' or 146 '--enable-cet=permissive', the resulting library is protected with 153 Intel Pentium Pro or newer. With '--enable-cet', it is an error to 155 With '--enable-cet=permissive', CET is disabled when dlopening a 158 NOTE: '--enable-cet' has been tested for i686, x86_64 and x32 on [all …]
|
D | config.make.in | 54 enable-werror = @enable_werror@ 61 enable-timezone-tools = @enable_timezone_tools@
|
D | NEWS | 120 [28860] build: --enable-kernel=5.1.0 build fails because of missing 279 --enable-static-pie, which no longer has any effect on the build 343 * The --enable-static-pie option is no longer available. The glibc build 364 * The audit module interface version LAV_CURRENT is increased to enable 422 --enable-initfini-array 470 [28455] dynamic-link: -Wl,--enable-new-dtags doesn't work 575 C2X, is supported to enable declarations of functions defined in Annex F 785 crash in IFUNC resolver due to stack canary (--enable-stack- 815 [27555] dynamic-link: Static tests fail with --enable-stack- 845 [27872] build: Obsolete configure option --enable-stackguard- [all …]
|
/glibc-2.36/manual/ |
D | install.texi | 72 @code{CFLAGS} is specified it must enable optimization. For example: 104 @item --enable-kernel=@var{version} 142 code of the dynamic linker. These flags can be used to enable early 170 @item --enable-cet 171 @itemx --enable-cet=permissive 173 @theglibc{} is built with @option{--enable-cet} or 174 @option{--enable-cet=permissive}, the resulting library 181 newer. With @option{--enable-cet}, it is an error to dlopen a non CET 183 @option{--enable-cet=permissive}, CET is disabled when dlopening a 186 NOTE: @option{--enable-cet} has been tested for i686, x86_64 and x32 [all …]
|
D | tunables.texi | 44 glibc.elision.enable: 0 (min: 0, max: 1) 270 passed to @code{malloc} for the largest bin size to enable. 354 @deftp Tunable glibc.elision.enable 355 The @code{glibc.elision.enable} tunable enables lock elision if the feature is 485 enable CPU/ARCH feature @code{yyy}, disable CPU/ARCH feature @code{xxx} 494 enable optimizations recommended for cacheable memory. If set to 610 @Theglibc{} startup code will automatically enable memory tagging
|
/glibc-2.36/sysdeps/x86/ |
D | Makefile | 39 ifeq (yes,$(enable-x86-isa-level)) 81 ifneq ($(enable-cet),no) 127 ifneq ($(enable-cet),no) 158 ifeq ($(enable-cet),permissive) 167 ifeq ($(enable-cet),permissive) 197 LDFLAGS-tst-cet-legacy-mod-6c.so = -Wl,--enable-new-dtags,-z,nodelete
|
D | configure.ac | 45 LIBC_CONFIG_VAR([enable-cet], [$enable_cet]) 129 LIBC_CONFIG_VAR([enable-x86-isa-level], [$libc_cv_include_x86_isa_level])
|
D | configure | 70 enable-cet = $enable_cet" 191 enable-x86-isa-level = $libc_cv_include_x86_isa_level"
|
/glibc-2.36/nptl_db/ |
D | td_ta_enable_stats.c | 23 td_ta_enable_stats (const td_thragent_t *ta, int enable) in td_ta_enable_stats() argument
|
/glibc-2.36/sysdeps/powerpc/powerpc64/le/fpu/multiarch/ |
D | Makefile | 192 enable-f128-ifunc-CFLAGS = -D_F128_ENABLE_IFUNC $(no-gnu-attributes-CFLAGS) $(type-float128-CFLAGS) 205 $(foreach f,$(f128-march-routines-p9),$(objpfx)$(f)$(o)): sysdep-CFLAGS += $$(enable-f128-ifunc-CFL…
|
/glibc-2.36/gmon/ |
D | Makefile | 42 ifeq (yes,$(enable-static-pie)) 74 ifeq (yes,$(enable-static-pie))
|
/glibc-2.36/csu/ |
D | Makefile | 74 ifeq (yes,$(enable-static-pie)) 84 ifeq (yes,$(enable-static-pie))
|
/glibc-2.36/sysdeps/unix/sysv/linux/x86/ |
D | elision-conf.c | 101 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
|
D | Makefile | 25 ifneq ($(enable-cet),no)
|
/glibc-2.36/sysdeps/unix/sysv/linux/powerpc/ |
D | elision-conf.c | 108 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
|
/glibc-2.36/sysdeps/unix/sysv/linux/s390/ |
D | elision-conf.c | 107 TUNABLE_GET (enable, int32_t, in __lll_elision_init()
|
/glibc-2.36/scripts/ |
D | pylintrc | 30 #enable= 38 # --enable=similarities". If you want to run only the classes checker, but have 39 # no Warning level messages displayed, use"--disable=all --enable=classes
|
/glibc-2.36/rt/ |
D | Makefile | 103 LDFLAGS-rt.so = -Wl,--enable-new-dtags,-z,nodelete
|
/glibc-2.36/sysdeps/unix/sysv/linux/x86_64/ |
D | Makefile | 18 ifeq (yes,$(enable-x86-isa-level))
|
/glibc-2.36/nptl/ |
D | tst-mutex8.c | 117 if (TUNABLE_GET_FULL (glibc, elision, enable, int32_t, NULL) == 1) in check_type()
|
/glibc-2.36/elf/ |
D | dl-tunables.list | 109 enable {
|
/glibc-2.36/timezone/ |
D | Makefile | 34 ifeq ($(enable-timezone-tools),yes)
|
/glibc-2.36/sysdeps/i386/ |
D | configure.ac | 17 # no such work has been done to enable this. Even with NPTL disabled you still
|
12345