| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/valgrind/valgrind/ |
| H A D | 0001-makefiles-Drop-setting-mcpu-to-cortex-a8-on-arm-arch.patch | 64 # Also force -O0 since -O takes hundreds of MB of memory 66 -v6intARM_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -marm 67 -v6intThumb_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -mthumb 68 +v6intARM_CFLAGS = $(AM_CFLAGS) -g -O0 -marm 69 +v6intThumb_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 71 -v6media_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 -mthumb 72 +v6media_CFLAGS = $(AM_CFLAGS) -g -O0 -mthumb 74 v8crypto_a_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -marm 75 v8crypto_t_CFLAGS = $(AM_CFLAGS) -g -O0 -mfpu=crypto-neon-fp-armv8 -mthumb 76 @@ -65,23 +65,23 @@ v8memory_a_CFLAGS = $(AM_CFLAGS) -g -O0 \ [all …]
|
| H A D | use-appropriate-march-mcpu-mfpu-for-ARM-test-apps.patch | 29 @@ -62,8 +62,10 @@ neon64_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a8 \ 38 -vfpv4_fma_CFLAGS = $(AM_CFLAGS) -g -O0 -mcpu=cortex-a15 -mfpu=vfpv4 -marm 41 +vfpv4_fma_CFLAGS = $(AM_CFLAGS) -g -O0 -march=armv7ve -mcpu=cortex-a15 -mfpu=vfpv4 -marm
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-kernel/systemtap/ |
| H A D | systemtap_git.inc | 20 # entire image as -O0, break with fatal. 22 if bb.utils.contains("SELECTED_OPTIMIZATION", "-O0", "x", "", d) == "x": 23 bb.fatal("systemtap can't be built with -O0, using -O1 -Wno-error or -O1 instead.")
|
| /OK3568_Linux_fs/buildroot/package/assimp/ |
| H A D | assimp.mk | 18 ASSIMP_CXXFLAGS += -mxgot -O0 37 ASSIMP_CXXFLAGS += -O0
|
| /OK3568_Linux_fs/buildroot/package/apitrace/ |
| H A D | apitrace.mk | 29 APITRACE_CFLAGS += -O0 38 APITRACE_CXXFLAGS += -O0
|
| /OK3568_Linux_fs/buildroot/package/proj/ |
| H A D | proj.mk | 18 PROJ_CFLAGS += -O0 19 PROJ_CXXFLAGS += -O0
|
| /OK3568_Linux_fs/kernel/arch/sparc/net/ |
| H A D | bpf_jit_32.h | 23 #define O0 0x08 macro 33 #define r_SKB O0
|
| /OK3568_Linux_fs/buildroot/package/libcorrect/ |
| H A D | 0002-CMakeLists.txt-conditionally-use-fsanitize-address.patch | 24 - set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -g3 -O0 -fsanitize=address") 25 + set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -g3 -O0")
|
| /OK3568_Linux_fs/yocto/meta-qt5/recipes-qt/maliit/maliit-framework-qt5/ |
| H A D | 0001-config.pri-Use-O1-optimization-in-DEBUG-flags.patch | 28 -QMAKE_CXXFLAGS_DEBUG+=-Werror -O0 29 -QMAKE_CFLAGS_DEBUG+=-Werror -O0
|
| /OK3568_Linux_fs/buildroot/package/openblas/ |
| H A D | 0003-Makefile-also-consider-Os-when-determining-LAPACK_NO.patch | 24 -LAPACK_NOOPT := $(filter-out -O0 -O1 -O2 -O3 -Ofast,$(LAPACK_FFLAGS)) 25 +LAPACK_NOOPT := $(filter-out -O0 -O1 -O2 -O3 -Ofast -O -Og -Os,$(LAPACK_FFLAGS))
|
| H A D | 0002-Makefile-fix-support-for-passing-FFLAGS-on-the-make-.patch | 43 -@echo "FFLAGS_NOOPT = -O0 $(LAPACK_NOOPT)" >> $(NETLIB_LAPACK_DIR)/make.inc 44 -@echo "PNOOPT = $(LAPACK_FPFLAGS) -O0" >> $(NETLIB_LAPACK_DIR)/make.inc
|
| /OK3568_Linux_fs/buildroot/package/grpc/ |
| H A D | grpc.mk | 57 GRPC_CFLAGS += -O0 58 GRPC_CXXFLAGS += -O0
|
| /OK3568_Linux_fs/buildroot/package/jitterentropy-library/ |
| H A D | 0003-Makefile-allow-the-user-to-disable-stack-protector.patch | 26 -CFLAGS +=-Wextra -Wall -pedantic -fPIC -O0 30 +CFLAGS +=-Wextra -Wall -pedantic -fPIC -O0 -fwrapv
|
| /OK3568_Linux_fs/yocto/poky/meta/conf/distro/include/ |
| H A D | security_flags.inc | 12 # -O0 which then results in a compiler warning. 13 OPTLEVEL = "${@bb.utils.filter('SELECTED_OPTIMIZATION', '-O0 -O1 -O2 -O3 -Ofast -Og -Os -Oz -O', d)… 15 lcl_maybe_fortify ?= "${@oe.utils.conditional('OPTLEVEL','-O0','','${OPTLEVEL} -D_FORTIFY_SOURCE=2'…
|
| /OK3568_Linux_fs/external/rkwifibt-app/ |
| H A D | CMakeLists.txt | 28 #add_definitions("-Wall -rdynamic -g -gdwarf -O0 -fpermissive -Wno-unused-variable -Wno-write-strin… 29 add_definitions("-Wall -g -rdynamic -fPIC -gdwarf -O0 -Wno-unused-function -Wno-unused-variable -D_…
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/tm/ |
| H A D | Makefile | 24 $(OUTPUT)/tm-unavailable: CFLAGS += -O0 -pthread -m64 -Wno-error=uninitialized -mvsx 25 $(OUTPUT)/tm-trap: CFLAGS += -O0 -pthread -m64
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/hdf5/files/ |
| H A D | 0001-cross-compiling-support.patch | 40 - set_property(TARGET H5detect PROPERTY LINK_FLAGS "-O0") 56 - set_property(TARGET H5make_libsettings PROPERTY LINK_FLAGS "-O0")
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/suitesparse/suitesparse/ |
| H A D | 0001-Preserve-CXXFLAGS-from-environment-in-Mongoose.patch | 42 SET(CMAKE_CXX_FLAGS_DEBUG "-g -O0 -Wall -fwrapv") 43 SET(CMAKE_C_FLAGS_DEBUG "-g -O0 -Wall")
|
| /OK3568_Linux_fs/u-boot/board/cadence/xtfpga/ |
| H A D | README | 108 This can pose a problem if all the sources are compiled with -O0 118 rebuild incrementally with -O0 so that only the touched sources 119 are recompiled with -O0. To build with -O0, pass it in the KCFLAGS
|
| /OK3568_Linux_fs/device/rockchip/common/linux-kbuild/armhf/linux-kbuild-5.10/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m32 -O0 -fstack-protector - -o - 2…
|
| /OK3568_Linux_fs/device/rockchip/common/linux-kbuild/aarch64/linux-kbuild-4.19/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m32 -O0 -fstack-protector - -o - 2…
|
| /OK3568_Linux_fs/device/rockchip/common/linux-kbuild/aarch64/linux-kbuild-5.10/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m32 -O0 -fstack-protector - -o - 2…
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m32 -O0 -fstack-protector - -o - 2…
|
| /OK3568_Linux_fs/device/rockchip/common/linux-kbuild/armhf/linux-kbuild-4.19/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 4 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -m32 -O0 -fstack-protector - -o - 2…
|
| /OK3568_Linux_fs/device/rockchip/common/linux-kbuild/aarch64/linux-kbuild-4.4/scripts/ |
| H A D | gcc-x86_32-has-stack-protector.sh | 3 echo "int foo(void) { char X[200]; return 3; }" | $* -S -x c -c -O0 -fstack-protector - -o - 2> /de…
|