/linux/samples/bpf/ |
H A D | README.rst | 4 This directory contains a test stubs, verifier test-suite and examples 7 Note that the XDP-specific samples have been removed from this directory and 8 moved to the xdp-tools repository: https://github.com/xdp-project/xdp-tools 11 in xdp-tools. 17 * clang 24 command: ``llc --version`` 27 ----------------------- 32 make -C tools clean 33 make -C samples/bpf clean 42 -------------- [all …]
|
/linux/tools/testing/selftests/bpf/ |
H A D | README.rst | 7 __ /Documentation/bpf/bpf_devel_QA.rst#q-how-to-run-bpf-selftests 10 BPF CI System 13 BPF employs a continuous integration (CI) system to check patch submission in an 14 automated fashion. The system runs selftests for each patch in a series. Results 21 The CI system executes tests on multiple architectures. It uses a kernel 31 trampoline support on IBM's s390x architecture. For cases like this, an in-tree 45 This last entry helps identify tests that can be re-enabled once such support is 54 would be run post-submit in the CI used by the Maintainers, with the exception 57 This script uses the in-tree kernel configuration and downloads a VM userspace 58 image from the system used by the CI. It builds the kernel (without overwriting [all …]
|
/linux/security/ |
H A D | Kconfig.hardening | 1 # SPDX-License-Identifier: GPL-2.0-only 7 def_bool $(cc-option,-ftrivial-auto-var-init=pattern) 10 def_bool $(cc-option,-ftrivial-auto-var-init=zero) 13 # Clang 16 and later warn about using the -enable flag, but it 15 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi… 47 bool "pattern-init everything (strongest)" 59 non-NULL values, buffer sizes and indices are very big. The 60 pattern is situation-specific; Clang on 64-bit uses 0xAA 62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF 67 bool "zero-init everything (strongest and safest)" [all …]
|
/linux/samples/hid/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 9 tprogs-y += hid_mouse 10 tprogs-y += hid_surface_dial 21 hid_mouse-objs := hid_mouse.o 22 hid_surface_dial-objs := hid_surface_dial.o 25 always-y := $(tprogs-y) 28 # Strip all except -D__LINUX_ARM_ARCH__ option needed to handle linux 30 ARM_ARCH_SELECTOR := $(filter -D__LINUX_ARM_ARCH__%, $(KBUILD_CFLAGS)) 36 TPROGS_CFLAGS += -D__SANE_USERSPACE_TYPES__ 38 BPF_EXTRA_CFLAGS += -I$(srctree)/arch/mips/include/asm/mach-loongson64 [all …]
|
/linux/Documentation/bpf/ |
H A D | s390.rst | 8 IBM Z are mainframe computers, which are descendants of IBM System/360 from 12 2. One-time setup 19 * Clang with BPF support 27 --variant=minbase \ 28 --include=sudo \ 30 ./s390-toolchain 31 sudo mount --rbind /dev ./s390-toolchain/dev 32 sudo mount --rbind /proc ./s390-toolchain/proc 33 sudo mount --rbind /sys ./s390-toolchain/sys 34 sudo chroot ./s390-toolchain [all …]
|
/linux/tools/testing/selftests/net/ |
H A D | bpf.mk | 1 # SPDX-License-Identifier: GPL-2.0 3 CLANG ?= clang 9 CCINCLUDE += -I$(selfdir)/bpf 10 CCINCLUDE += -I$(top_srcdir)/usr/include/ 11 CCINCLUDE += -I$(SCRATCH_DIR)/include 18 $(Q)mkdir -p $@ 20 # Get Clang's default includes on this system, as opposed to those seen by 21 # '--target=bpf'. This fixes "missing" files on some architectures/distros, 24 # Use '-idirafter': Don't interfere with include mechanics except where the 27 $(shell $(1) $(2) -v -E - </dev/null 2>&1 \ [all …]
|
/linux/lib/ |
H A D | Kconfig.kmsan | 1 # SPDX-License-Identifier: GPL-2.0-only 6 # Clang versions <14.0.0 also support -fsanitize=kernel-memory, but not 9 def_bool $(cc-option,-fsanitize=kernel-memory -mllvm -msan-disable-checks=1) 21 instrumentation provided by Clang and thus requires Clang to build. 25 the whole system down. 27 See <file:Documentation/dev-tools/kmsan.rst> for more details. 32 # -fsanitize-memory-param-retval is supported only by Clang >= 14. 34 def_bool $(cc-option,-fsanitize=kernel-memory -fsanitize-memory-param-retval) 41 If the compiler supports -fsanitize-memory-param-retval, KMSAN will 48 may potentially report errors in corner cases when non-instrumented
|
H A D | Kconfig.ubsan | 1 # SPDX-License-Identifier: GPL-2.0-only 10 Compile-time instrumentation is used to detect various undefined 12 Documentation/dev-tools/ubsan.rst 27 the system. For some system builders this is an acceptable 28 trade-off. 39 def_bool $(cc-option,-fsanitize=bounds-strict) 41 The -fsanitize=bounds-strict option is only available on GCC, 43 of flexible arrays, which is comparable to Clang's regular 44 -fsanitize=bounds. 47 def_bool $(cc-option,-fsanitize=array-bounds) [all …]
|
H A D | Kconfig.kasan | 1 # SPDX-License-Identifier: GPL-2.0-only 23 def_bool $(cc-option, -fsanitize=kernel-address) 26 def_bool $(cc-option, -fsanitize=kernel-hwaddress) 43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety 44 error detector designed to find out-of-bounds and use-after-free bugs. 46 See Documentation/dev-tools/kasan.rst for details. 53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p… 54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1)) 69 2. Software Tag-Based KASAN (arm64 only, based on software memory 72 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory [all …]
|
/linux/arch/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 22 # IOMMUs not handled by dma-iommu. Drivers must never select this symbol. 29 menu "General architecture-dependent options" 34 Select if the architecture can check permissions at sub-page 89 for kernel debugging, non-intrusive instrumentation and testing. 98 makes certain almost-always-true or almost-always-false branch 101 Certain performance-sensitive kernel code, such as trace points, 115 ( On 32-bit x86, the necessary options added to the compiler 122 Boot time self-test of the branch patching code. 128 Boot time self-test of the call patching code. [all …]
|
/linux/tools/sched_ext/ |
H A D | README.md | 11 Some of the examples are performant, production-ready schedulers. That is, for 29 1. clang >= 16.0.0 31 The schedulers are BPF programs, and therefore must be compiled with clang. gcc 47 non-trivial ones. 79 This is a large, auto-generated header file that contains all of the types 81 [BTF](https://docs.kernel.org/bpf/btf.html) (i.e. with the BTF-related Kconfig 108 bpf_printk("Task %s enabled in example scheduler", p->comm); 119 The scheduler build system will generate this vmlinux.h file as part of the 129 4. `/boot/vmlinux-$(uname -r)` 137 ### Aside on CO-RE [all …]
|
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 12 else ifneq ($(filter -%,$(LLVM)),) 16 CLANG_TARGET_FLAGS_arm := arm-linux-gnueabi 17 CLANG_TARGET_FLAGS_arm64 := aarch64-linux-gnu 18 CLANG_TARGET_FLAGS_hexagon := hexagon-linux-musl 19 CLANG_TARGET_FLAGS_m68k := m68k-linux-gnu 20 CLANG_TARGET_FLAGS_mips := mipsel-linux-gnu 21 CLANG_TARGET_FLAGS_powerpc := powerpc64le-linux-gnu 22 CLANG_TARGET_FLAGS_riscv := riscv64-linux-gnu 23 CLANG_TARGET_FLAGS_s390 := s390x-linux-gnu [all …]
|
/linux/Documentation/ |
H A D | Changes | 32 GNU C 8.1 gcc --version 33 Clang/LLVM (optional) 13.0.1 clang --version 34 Rust (optional) 1.78.0 rustc --version 35 bindgen (optional) 0.65.1 bindgen --version 36 GNU make 4.0 make --version 37 bash 4.2 bash --version 38 binutils 2.30 ld -v 39 flex 2.5.35 flex --version 40 bison 2.0 bison --version 41 pahole 1.16 pahole --version [all …]
|
/linux/include/uapi/linux/ |
H A D | landlock.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 3 * Landlock - User space API 5 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> 6 * Copyright © 2018-2020 ANSSI 7 * Copyright © 2021-2025 Microsoft Corporation 16 * struct landlock_ruleset_attr - Ruleset definition. 67 /* clang-format off */ 70 /* clang-format on */ 98 * flag, so users can be notified of unauthorized access attempts via system 118 * with a @ruleset_fd value of -1 to mute subdomain logs without creating a [all …]
|
/linux/include/linux/ |
H A D | compiler-version.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 #error "Please do not include <linux/compiler-version.h>. This is done by the build system." 16 /* Additional tree-wide dependencies start here. */ 24 #include <generated/gcc-plugins.h> 29 * Clang), the entire tree needs to be rebuilt since the randomization of 37 * If any external changes affect Clang's integer wrapping sanitizer 43 #include <generated/integer-wrap.h>
|
/linux/tools/scripts/ |
H A D | Makefile.include | 1 # SPDX-License-Identifier: GPL-2.0 4 $(if $(shell cd $(PWD); test -d $(O) || echo $(O)),$(error O=$(O) does not exist),) 23 EXTRA_WARNINGS := -Wbad-function-cast 24 EXTRA_WARNINGS += -Wdeclaration-after-statement 25 EXTRA_WARNINGS += -Wformat-security 26 EXTRA_WARNINGS += -Wformat-y2k 27 EXTRA_WARNINGS += -Winit-self 28 EXTRA_WARNINGS += -Wmissing-declarations 29 EXTRA_WARNINGS += -Wmissing-prototypes 30 EXTRA_WARNINGS += -Wnested-externs [all …]
|
/linux/tools/testing/selftests/ |
H A D | lib.mk | 1 # This mimics the top-level Makefile. We do it explicitly here so that this 6 else ifneq ($(filter -%,$(LLVM)),) 10 CLANG := $(LLVM_PREFIX)clang$(LLVM_SUFFIX) 12 CLANG_TARGET_FLAGS_arm := arm-linux-gnueabi 13 CLANG_TARGET_FLAGS_arm64 := aarch64-linux-gnu 14 CLANG_TARGET_FLAGS_hexagon := hexagon-linux-musl 15 CLANG_TARGET_FLAGS_i386 := i386-linux-gnu 16 CLANG_TARGET_FLAGS_m68k := m68k-linux-gnu 17 CLANG_TARGET_FLAGS_mips := mipsel-linux-gnu 18 CLANG_TARGET_FLAGS_powerpc := powerpc64le-linux-gnu [all …]
|
/linux/tools/sched_ext/include/bpf-compat/gnu/ |
H A D | stubs.h | 2 * Dummy gnu/stubs.h. clang can end up including /usr/include/gnu/stubs.h when 4 * turn includes stubs-64.h or stubs-32.h depending on whether __x86_64__ is 6 * stubs-32.h is selected. However, the file is not there if the system doesn't 10 * search paths before the system one when building BPF.
|
/linux/drivers/gpu/drm/ci/ |
H A D | kunit.yml | 1 .kunit-packages: &kunit-packages 2 - apt-get update -qq 4 …# In mesa-ci containers, LLVM_VERSION is defined as a container-level property and is currently se… 5 …- apt-get install -y --no-install-recommends clang-${LLVM_VERSION} lld-${LLVM_VERSION} llvm-${LLVM… 7 .kunit-base: 13 - drivers/gpu/drm/ci/kunit.sh 17 - .build:arm32 18 - .kunit-base 20 - *kunit-packages 21 - apt-get install -y --no-install-recommends qemu-system-arm [all …]
|
/linux/ |
H A D | .gitignore | 1 # SPDX-License-Identifier: GPL-2.0-only 7 # NOTE! Please use 'git ls-files -i -c --exclude-per-directory=.gitignore' 57 dtbs-list 61 # Top-level generic files 64 /modules-only.symvers 70 /vmlinux-gdb.py 72 /System.map 80 # RPM spec file (make rpm-pkg) 85 # Debian directory (make deb-pkg) 90 # Snap directory (make snap-pkg) [all …]
|
/linux/Documentation/translations/it_IT/process/ |
H A D | changes.rst | 1 .. include:: ../disclaimer-ita.rst 35 GNU C 8.1 gcc --version 36 Clang/LLVM (optional) 13.0.0 clang --version 37 Rust (opzionale) 1.78.0 rustc --version 38 bindgen (opzionale) 0.65.1 bindgen --version 39 GNU make 4.0 make --version 40 bash 4.2 bash --version 41 binutils 2.30 ld -v 42 flex 2.5.35 flex --version 43 bison 2.0 bison --version [all …]
|
/linux/tools/testing/selftests/hid/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 8 TEST_PROGS := hid-core.sh 9 TEST_PROGS += hid-apple.sh 10 TEST_PROGS += hid-gamepad.sh 11 TEST_PROGS += hid-ite.sh 12 TEST_PROGS += hid-keyboard.sh 13 TEST_PROGS += hid-mouse.sh 14 TEST_PROGS += hid-multitouch.sh 15 TEST_PROGS += hid-sony.sh 16 TEST_PROGS += hid-tablet.sh [all …]
|
/linux/arch/arm64/include/asm/ |
H A D | neon-intrinsics.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 9 #include <asm-generic/int-ll64.h> 13 * So by redefining these macros to the former, we can force gcc-stdint.h 28 * genksyms chokes on the ARM NEON instrinsics system header, but we 37 #pragma clang diagnostic ignored "-Wincompatible-pointer-types"
|
/linux/Documentation/arch/x86/x86_64/ |
H A D | fsgs.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 Segment-register:Byte-address 12 The segment base address is added to the Byte-address to compute the 14 instances of data with the identical Byte-address, i.e. the same code. The 15 selection of a particular instance is purely based on the base-address in 18 In 32-bit mode the CPU provides 6 segments, which also support segment 21 In 64-bit mode the CS/SS/DS/ES segments are ignored and the base address is 23 still functional in 64-bit mode. 26 ------------------------------ 38 applications. GCC and Clang support GS based addressing via address space [all …]
|
/linux/samples/landlock/ |
H A D | sandboxer.c | 1 // SPDX-License-Identifier: BSD-3-Clause 4 * user-defined file system and network access control policies. 6 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> 99 return -1; in parse_path() 107 /* clang-format off */ 116 /* clang-format on */ 125 .parent_fd = -1, in populate_ruleset_fs() 239 if (!(ruleset_attr->scoped & in check_ruleset_scope() 270 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope() 272 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_SIGNAL; in check_ruleset_scope() [all …]
|