/openbmc/openbmc/poky/meta/recipes-devtools/valgrind/valgrind/ |
H A D | 0001-makefiles-Drop-setting-mcpu-to-cortex-a8-on-arm-arch.patch | 41 # Also force -O0 since -O takes hundreds of MB of memory 43 -v6intARM_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -marm 44 -v6intThumb_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -mthumb 45 +v6intARM_CFLAGS = $(AM_CFLAGS) -g -O0 -marm 46 +v6intThumb_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 48 -v6media_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -mthumb 49 +v6media_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 51 v8crypto_a_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -marm -march=armv8-a 52 v8crypto_t_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -mthumb -march=armv8-a 53 @@ -74,23 +74,23 @@ v8memory_t_CFLAGS = $(AM_CFLAGS) -g -O0 [all …]
|
H A D | 0001-tests-arm-Use-O-instead-of-O0.patch | 4 Subject: [PATCH] tests/arm: Use -O instead of -O0 8 and for OE/cross-compiling it is fine, -O0 is used 10 and gcc would take less memory compiling with -O0 24 # Also force -O0 since -O takes hundreds of MB of memory 26 v6intARM_CFLAGS = $(AM_CFLAGS) -g -O0 -marm 27 -v6intThumb_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 30 -v6media_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 33 v8crypto_a_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -marm -march=armv8-a 34 v8crypto_t_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -mthumb -march=armv8-a
|
H A D | use-appropriate-march-mcpu-mfpu-for-ARM-test-apps.patch | 27 @@ -87,8 +87,10 @@ neon64_CFLAGS = $(AM_CFLAGS) -g -O0 36 -vfpv4_fma_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a15 -mfpu=vfpv4 -marm 39 +vfpv4_fma_CFLAGS = $(AM_CFLAGS) -g -O0 -march=armv7ve -mcpu=cortex-a15 -mfpu=vfpv4 -marm
|
/openbmc/linux/tools/perf/tests/workloads/ |
H A D | Build | 10 CFLAGS_sqrtloop.o = -g -O0 -fno-inline -U_FORTIFY_SOURCE 11 CFLAGS_leafloop.o = -g -O0 -fno-inline -fno-omit-frame-pointer -U_FORTIFY_SOURCE 12 CFLAGS_brstack.o = -g -O0 -fno-inline -U_FORTIFY_SOURCE 13 CFLAGS_datasym.o = -g -O0 -fno-inline -U_FORTIFY_SOURCE
|
/openbmc/openbmc/poky/meta/recipes-kernel/systemtap/ |
H A D | systemtap_git.inc | 18 # entire image as -O0, break with fatal. 20 if bb.utils.contains("SELECTED_OPTIMIZATION", "-O0", "x", "", d) == "x": 21 bb.fatal("systemtap can't be built with -O0, using -O1 -Wno-error or -O1 instead.")
|
/openbmc/openbmc/poky/meta/recipes-support/libgcrypt/files/ |
H A D | 0002-libgcrypt-fix-building-error-with-O2-in-sysroot-path.patch | 45 -o_flag_munging = sed -e 's/[[:blank:]]-O\([1-9sgz][1-9sgz]*\)/ -O0 /' -e 's/[[:blank:]]-Ofast/ -O0… 46 …ag_munging = sed -e 's/[[:blank:]]-O\([1-9sgz][1-9sgz]*\)/ -O0 /g' -e 's/[[:blank:]]-Ofast/ -O0 /g'
|
/openbmc/linux/arch/sparc/net/ |
H A D | bpf_jit_32.h | 23 #define O0 0x08 macro 33 #define r_SKB O0
|
H A D | bpf_jit_64.h | 12 #define O0 0x08 macro
|
/openbmc/openbmc/poky/meta/conf/distro/include/ |
H A D | security_flags.inc | 12 # -O0 which then results in a compiler warning. 13 OPTLEVEL = "${@bb.utils.filter('SELECTED_OPTIMIZATION', '-O0 -O1 -O2 -O3 -Ofast -Og -Os -Oz -O', d)… 15 lcl_maybe_fortify ?= "${@oe.utils.conditional('OPTLEVEL','-O0','','${OPTLEVEL} -D_FORTIFY_SOURCE=2'…
|
/openbmc/linux/tools/testing/selftests/powerpc/tm/ |
H A D | Makefile | 24 $(OUTPUT)/tm-unavailable: CFLAGS += -O0 -pthread -m64 -Wno-error=uninitialized -mvsx 25 $(OUTPUT)/tm-trap: CFLAGS += -O0 -pthread -m64
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/suitesparse/suitesparse/ |
H A D | 0001-Preserve-CXXFLAGS-from-environment-in-Mongoose.patch | 44 SET(CMAKE_CXX_FLAGS_DEBUG "-g -O0 -Wall -fwrapv") 45 SET(CMAKE_C_FLAGS_DEBUG "-g -O0 -Wall")
|
/openbmc/u-boot/board/cadence/xtfpga/ |
H A D | README | 108 This can pose a problem if all the sources are compiled with -O0 118 rebuild incrementally with -O0 so that only the touched sources 119 are recompiled with -O0. To build with -O0, pass it in the KCFLAGS
|
/openbmc/linux/tools/testing/selftests/x86/ |
H A D | check_cc.sh | 10 if [ -n "$CC" ] && $CC -o /dev/null "$TESTPROG" -O0 "$@" 2>/dev/null; then
|
/openbmc/linux/scripts/ |
H A D | gcc-x86_64-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -m64 -O0 -mcmodel=kernel -fno-PIE -fst…
|
H A D | gcc-x86_32-has-stack-protector.sh | 8 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -m32 -O0 -fstack-protector -mstack-pro…
|
/openbmc/qemu/tests/tcg/minilib/ |
H A D | Makefile.target | 15 MINILIB_CFLAGS+=-nostdlib -fno-stack-protector -ggdb -O0
|
/openbmc/linux/drivers/scsi/lpfc/ |
H A D | Makefile | 25 ccflags-$(GCOV) += -O0
|
/openbmc/linux/arch/arm/boot/dts/st/ |
H A D | ste-href-family-pinctrl.dtsi | 130 "GPIO168_C22"; /* O0 */ 156 "GPIO168_C22"; /* O0 */
|
/openbmc/qemu/tests/tcg/i386/ |
H A D | Makefile.softmmu-target | 18 CFLAGS+=-nostdlib -ggdb -O0 $(MINILIB_INC)
|
/openbmc/qemu/tests/tcg/x86_64/ |
H A D | Makefile.softmmu-target | 18 CFLAGS+=-nostdlib -ggdb -O0 $(MINILIB_INC)
|
/openbmc/openbmc/poky/meta/recipes-support/boost/ |
H A D | boost-build-native_1.86.0.bb | 27 # The build is either release mode (pre-stripped) or debug (-O0).
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/bitwise/files/ |
H A D | 0001-makefile.am-Fix-build-when-build-dir-is-not-same-as-.patch | 21 MAYBE_DEBUG=-g -O0
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/arptables/arptables/ |
H A D | arptables-arpt-get-target-fix.patch | 6 include/linux/netfilter_arp/arp_tables.h, once GCC uses -O0, the
|
/openbmc/openbmc/meta-openembedded/meta-filesystems/recipes-filesystems/unionfs-fuse/files/ |
H A D | 0001-support-cross-compiling.patch | 29 SET(CMAKE_C_FLAGS_DEBUG "-O0 -g -DDEBUG")
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/openthread/ot-br-posix/ |
H A D | 0001-cmake-Disable-nonnull-compare-warning-on-gcc.patch | 35 target_compile_options(otbr-config INTERFACE -g -O0 --coverage)
|