Home
last modified time | relevance | path

Searched +full:clang +full:- +full:system (Results 1 – 25 of 89) sorted by relevance

1234

/linux/samples/bpf/
H A DREADME.rst4 This directory contains a test stubs, verifier test-suite and examples
7 Note that the XDP-specific samples have been removed from this directory and
8 moved to the xdp-tools repository: https://github.com/xdp-project/xdp-tools
11 in xdp-tools.
17 * clang
24 command: ``llc --version``
27 -----------------------
32 make -C tools clean
33 make -C samples/bpf clean
42 --------------
[all …]
/linux/tools/testing/selftests/bpf/
H A DREADME.rst7 __ /Documentation/bpf/bpf_devel_QA.rst#q-how-to-run-bpf-selftests
10 BPF CI System
13 BPF employs a continuous integration (CI) system to check patch submission in an
14 automated fashion. The system runs selftests for each patch in a series. Results
21 The CI system executes tests on multiple architectures. It uses a kernel
31 trampoline support on IBM's s390x architecture. For cases like this, an in-tree
45 This last entry helps identify tests that can be re-enabled once such support is
54 would be run post-submit in the CI used by the Maintainers, with the exception
57 This script uses the in-tree kernel configuration and downloads a VM userspace
58 image from the system used by the CI. It builds the kernel (without overwriting
[all …]
/linux/security/
H A DKconfig.hardening1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool $(cc-option,-ftrivial-auto-var-init=pattern)
10 def_bool $(cc-option,-ftrivial-auto-var-init=zero)
13 # Clang 16 and later warn about using the -enable flag, but it
15 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi…
47 bool "pattern-init everything (strongest)"
59 non-NULL values, buffer sizes and indices are very big. The
60 pattern is situation-specific; Clang on 64-bit uses 0xAA
62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF
67 bool "zero-init everything (strongest and safest)"
[all …]
/linux/samples/hid/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
9 tprogs-y += hid_mouse
10 tprogs-y += hid_surface_dial
21 hid_mouse-objs := hid_mouse.o
22 hid_surface_dial-objs := hid_surface_dial.o
25 always-y := $(tprogs-y)
28 # Strip all except -D__LINUX_ARM_ARCH__ option needed to handle linux
30 ARM_ARCH_SELECTOR := $(filter -D__LINUX_ARM_ARCH__%, $(KBUILD_CFLAGS))
36 TPROGS_CFLAGS += -D__SANE_USERSPACE_TYPES__
38 BPF_EXTRA_CFLAGS += -I$(srctree)/arch/mips/include/asm/mach-loongson64
[all …]
/linux/Documentation/bpf/
H A Ds390.rst8 IBM Z are mainframe computers, which are descendants of IBM System/360 from
12 2. One-time setup
19 * Clang with BPF support
27 --variant=minbase \
28 --include=sudo \
30 ./s390-toolchain
31 sudo mount --rbind /dev ./s390-toolchain/dev
32 sudo mount --rbind /proc ./s390-toolchain/proc
33 sudo mount --rbind /sys ./s390-toolchain/sys
34 sudo chroot ./s390-toolchain
[all …]
/linux/tools/testing/selftests/net/
H A Dbpf.mk1 # SPDX-License-Identifier: GPL-2.0
3 CLANG ?= clang
9 CCINCLUDE += -I$(selfdir)/bpf
10 CCINCLUDE += -I$(top_srcdir)/usr/include/
11 CCINCLUDE += -I$(SCRATCH_DIR)/include
18 $(Q)mkdir -p $@
20 # Get Clang's default includes on this system, as opposed to those seen by
21 # '--target=bpf'. This fixes "missing" files on some architectures/distros,
24 # Use '-idirafter': Don't interfere with include mechanics except where the
27 $(shell $(1) $(2) -v -E - </dev/null 2>&1 \
[all …]
/linux/lib/
H A DKconfig.kmsan1 # SPDX-License-Identifier: GPL-2.0-only
6 # Clang versions <14.0.0 also support -fsanitize=kernel-memory, but not
9 def_bool $(cc-option,-fsanitize=kernel-memory -mllvm -msan-disable-checks=1)
21 instrumentation provided by Clang and thus requires Clang to build.
25 the whole system down.
27 See <file:Documentation/dev-tools/kmsan.rst> for more details.
32 # -fsanitize-memory-param-retval is supported only by Clang >= 14.
34 def_bool $(cc-option,-fsanitize=kernel-memory -fsanitize-memory-param-retval)
41 If the compiler supports -fsanitize-memory-param-retval, KMSAN will
48 may potentially report errors in corner cases when non-instrumented
H A DKconfig.ubsan1 # SPDX-License-Identifier: GPL-2.0-only
10 Compile-time instrumentation is used to detect various undefined
12 Documentation/dev-tools/ubsan.rst
27 the system. For some system builders this is an acceptable
28 trade-off.
39 def_bool $(cc-option,-fsanitize=bounds-strict)
41 The -fsanitize=bounds-strict option is only available on GCC,
43 of flexible arrays, which is comparable to Clang's regular
44 -fsanitize=bounds.
47 def_bool $(cc-option,-fsanitize=array-bounds)
[all …]
H A DKconfig.kasan1 # SPDX-License-Identifier: GPL-2.0-only
23 def_bool $(cc-option, -fsanitize=kernel-address)
26 def_bool $(cc-option, -fsanitize=kernel-hwaddress)
43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety
44 error detector designed to find out-of-bounds and use-after-free bugs.
46 See Documentation/dev-tools/kasan.rst for details.
53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p…
54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1))
69 2. Software Tag-Based KASAN (arm64 only, based on software memory
72 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory
[all …]
/linux/arch/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
22 # IOMMUs not handled by dma-iommu. Drivers must never select this symbol.
29 menu "General architecture-dependent options"
34 Select if the architecture can check permissions at sub-page
89 for kernel debugging, non-intrusive instrumentation and testing.
98 makes certain almost-always-true or almost-always-false branch
101 Certain performance-sensitive kernel code, such as trace points,
115 ( On 32-bit x86, the necessary options added to the compiler
122 Boot time self-test of the branch patching code.
128 Boot time self-test of the call patching code.
[all …]
/linux/tools/sched_ext/
H A DREADME.md11 Some of the examples are performant, production-ready schedulers. That is, for
29 1. clang >= 16.0.0
31 The schedulers are BPF programs, and therefore must be compiled with clang. gcc
47 non-trivial ones.
79 This is a large, auto-generated header file that contains all of the types
81 [BTF](https://docs.kernel.org/bpf/btf.html) (i.e. with the BTF-related Kconfig
108 bpf_printk("Task %s enabled in example scheduler", p->comm);
119 The scheduler build system will generate this vmlinux.h file as part of the
129 4. `/boot/vmlinux-$(uname -r)`
137 ### Aside on CO-RE
[all …]
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
12 else ifneq ($(filter -%,$(LLVM)),)
16 CLANG_TARGET_FLAGS_arm := arm-linux-gnueabi
17 CLANG_TARGET_FLAGS_arm64 := aarch64-linux-gnu
18 CLANG_TARGET_FLAGS_hexagon := hexagon-linux-musl
19 CLANG_TARGET_FLAGS_m68k := m68k-linux-gnu
20 CLANG_TARGET_FLAGS_mips := mipsel-linux-gnu
21 CLANG_TARGET_FLAGS_powerpc := powerpc64le-linux-gnu
22 CLANG_TARGET_FLAGS_riscv := riscv64-linux-gnu
23 CLANG_TARGET_FLAGS_s390 := s390x-linux-gnu
[all …]
/linux/Documentation/
H A DChanges32 GNU C 8.1 gcc --version
33 Clang/LLVM (optional) 13.0.1 clang --version
34 Rust (optional) 1.78.0 rustc --version
35 bindgen (optional) 0.65.1 bindgen --version
36 GNU make 4.0 make --version
37 bash 4.2 bash --version
38 binutils 2.30 ld -v
39 flex 2.5.35 flex --version
40 bison 2.0 bison --version
41 pahole 1.16 pahole --version
[all …]
/linux/include/uapi/linux/
H A Dlandlock.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
3 * Landlock - User space API
5 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
6 * Copyright © 2018-2020 ANSSI
7 * Copyright © 2021-2025 Microsoft Corporation
16 * struct landlock_ruleset_attr - Ruleset definition.
67 /* clang-format off */
70 /* clang-format on */
98 * flag, so users can be notified of unauthorized access attempts via system
118 * with a @ruleset_fd value of -1 to mute subdomain logs without creating a
[all …]
/linux/include/linux/
H A Dcompiler-version.h1 /* SPDX-License-Identifier: GPL-2.0-only */
4 #error "Please do not include <linux/compiler-version.h>. This is done by the build system."
16 /* Additional tree-wide dependencies start here. */
24 #include <generated/gcc-plugins.h>
29 * Clang), the entire tree needs to be rebuilt since the randomization of
37 * If any external changes affect Clang's integer wrapping sanitizer
43 #include <generated/integer-wrap.h>
/linux/tools/scripts/
H A DMakefile.include1 # SPDX-License-Identifier: GPL-2.0
4 $(if $(shell cd $(PWD); test -d $(O) || echo $(O)),$(error O=$(O) does not exist),)
23 EXTRA_WARNINGS := -Wbad-function-cast
24 EXTRA_WARNINGS += -Wdeclaration-after-statement
25 EXTRA_WARNINGS += -Wformat-security
26 EXTRA_WARNINGS += -Wformat-y2k
27 EXTRA_WARNINGS += -Winit-self
28 EXTRA_WARNINGS += -Wmissing-declarations
29 EXTRA_WARNINGS += -Wmissing-prototypes
30 EXTRA_WARNINGS += -Wnested-externs
[all …]
/linux/tools/testing/selftests/
H A Dlib.mk1 # This mimics the top-level Makefile. We do it explicitly here so that this
6 else ifneq ($(filter -%,$(LLVM)),)
10 CLANG := $(LLVM_PREFIX)clang$(LLVM_SUFFIX)
12 CLANG_TARGET_FLAGS_arm := arm-linux-gnueabi
13 CLANG_TARGET_FLAGS_arm64 := aarch64-linux-gnu
14 CLANG_TARGET_FLAGS_hexagon := hexagon-linux-musl
15 CLANG_TARGET_FLAGS_i386 := i386-linux-gnu
16 CLANG_TARGET_FLAGS_m68k := m68k-linux-gnu
17 CLANG_TARGET_FLAGS_mips := mipsel-linux-gnu
18 CLANG_TARGET_FLAGS_powerpc := powerpc64le-linux-gnu
[all …]
/linux/tools/sched_ext/include/bpf-compat/gnu/
H A Dstubs.h2 * Dummy gnu/stubs.h. clang can end up including /usr/include/gnu/stubs.h when
4 * turn includes stubs-64.h or stubs-32.h depending on whether __x86_64__ is
6 * stubs-32.h is selected. However, the file is not there if the system doesn't
10 * search paths before the system one when building BPF.
/linux/drivers/gpu/drm/ci/
H A Dkunit.yml1 .kunit-packages: &kunit-packages
2 - apt-get update -qq
4 …# In mesa-ci containers, LLVM_VERSION is defined as a container-level property and is currently se…
5- apt-get install -y --no-install-recommends clang-${LLVM_VERSION} lld-${LLVM_VERSION} llvm-${LLVM…
7 .kunit-base:
13 - drivers/gpu/drm/ci/kunit.sh
17 - .build:arm32
18 - .kunit-base
20 - *kunit-packages
21 - apt-get install -y --no-install-recommends qemu-system-arm
[all …]
/linux/
H A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
7 # NOTE! Please use 'git ls-files -i -c --exclude-per-directory=.gitignore'
57 dtbs-list
61 # Top-level generic files
64 /modules-only.symvers
70 /vmlinux-gdb.py
72 /System.map
80 # RPM spec file (make rpm-pkg)
85 # Debian directory (make deb-pkg)
90 # Snap directory (make snap-pkg)
[all …]
/linux/Documentation/translations/it_IT/process/
H A Dchanges.rst1 .. include:: ../disclaimer-ita.rst
35 GNU C 8.1 gcc --version
36 Clang/LLVM (optional) 13.0.0 clang --version
37 Rust (opzionale) 1.78.0 rustc --version
38 bindgen (opzionale) 0.65.1 bindgen --version
39 GNU make 4.0 make --version
40 bash 4.2 bash --version
41 binutils 2.30 ld -v
42 flex 2.5.35 flex --version
43 bison 2.0 bison --version
[all …]
/linux/tools/testing/selftests/hid/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
8 TEST_PROGS := hid-core.sh
9 TEST_PROGS += hid-apple.sh
10 TEST_PROGS += hid-gamepad.sh
11 TEST_PROGS += hid-ite.sh
12 TEST_PROGS += hid-keyboard.sh
13 TEST_PROGS += hid-mouse.sh
14 TEST_PROGS += hid-multitouch.sh
15 TEST_PROGS += hid-sony.sh
16 TEST_PROGS += hid-tablet.sh
[all …]
/linux/arch/arm64/include/asm/
H A Dneon-intrinsics.h1 /* SPDX-License-Identifier: GPL-2.0-only */
9 #include <asm-generic/int-ll64.h>
13 * So by redefining these macros to the former, we can force gcc-stdint.h
28 * genksyms chokes on the ARM NEON instrinsics system header, but we
37 #pragma clang diagnostic ignored "-Wincompatible-pointer-types"
/linux/Documentation/arch/x86/x86_64/
H A Dfsgs.rst1 .. SPDX-License-Identifier: GPL-2.0
10 Segment-register:Byte-address
12 The segment base address is added to the Byte-address to compute the
14 instances of data with the identical Byte-address, i.e. the same code. The
15 selection of a particular instance is purely based on the base-address in
18 In 32-bit mode the CPU provides 6 segments, which also support segment
21 In 64-bit mode the CS/SS/DS/ES segments are ignored and the base address is
23 still functional in 64-bit mode.
26 ------------------------------
38 applications. GCC and Clang support GS based addressing via address space
[all …]
/linux/samples/landlock/
H A Dsandboxer.c1 // SPDX-License-Identifier: BSD-3-Clause
4 * user-defined file system and network access control policies.
6 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
99 return -1; in parse_path()
107 /* clang-format off */
116 /* clang-format on */
125 .parent_fd = -1, in populate_ruleset_fs()
239 if (!(ruleset_attr->scoped & in check_ruleset_scope()
270 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope()
272 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_SIGNAL; in check_ruleset_scope()
[all …]

1234