/openbmc/linux/lib/ |
H A D | Kconfig.ubsan | 1 # SPDX-License-Identifier: GPL-2.0-only 9 Compile-time instrumentation is used to detect various undefined 11 Documentation/dev-tools/ubsan.rst 27 trade-off. 38 def_bool $(cc-option,-fsanitize=bounds-strict) 40 The -fsanitize=bounds-strict option is only available on GCC, 43 -fsanitize=bounds. 46 def_bool $(cc-option,-fsanitize=array-bounds) 48 Under Clang, the -fsanitize=bounds option is actually composed 49 of two more specific options, -fsanitize=array-bounds and [all …]
|
H A D | Kconfig.kmsan | 1 # SPDX-License-Identifier: GPL-2.0-only 6 # Clang versions <14.0.0 also support -fsanitize=kernel-memory, but not 9 def_bool $(cc-option,-fsanitize=kernel-memory -mllvm -msan-disable-checks=1) 27 See <file:Documentation/dev-tools/kmsan.rst> for more details. 32 # -fsanitize-memory-param-retval is supported only by Clang >= 14. 34 def_bool $(cc-option,-fsanitize=kernel-memory -fsanitize-memory-param-retval) 41 If the compiler supports -fsanitize-memory-param-retval, KMSAN will 48 may potentially report errors in corner cases when non-instrumented
|
H A D | Kconfig.kasan | 1 # SPDX-License-Identifier: GPL-2.0-only 23 def_bool $(cc-option, -fsanitize=kernel-address) 26 def_bool $(cc-option, -fsanitize=kernel-hwaddress) 43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety 44 error detector designed to find out-of-bounds and use-after-free bugs. 46 See Documentation/dev-tools/kasan.rst for details. 53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p… 54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1)) 69 2. Software Tag-Based KASAN (arm64 only, based on software memory 72 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory [all …]
|
H A D | Kconfig.kcsan | 1 # SPDX-License-Identifier: GPL-2.0-only 7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \ 8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1)) 11 <file:Documentation/dev-tools/kcsan.rst>. 21 data-race detector that relies on compile-time instrumentation. 22 KCSAN uses a watchpoint-based sampling approach to detect races. 29 See <file:Documentation/dev-tools/kcsan.rst> for more details. 34 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1))… 35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1)) 37 The compiler instruments plain compound read-write operations [all …]
|
/openbmc/linux/scripts/ |
H A D | Makefile.ubsan | 1 # SPDX-License-Identifier: GPL-2.0 4 ubsan-cflags-$(CONFIG_UBSAN_ALIGNMENT) += -fsanitize=alignment 5 ubsan-cflags-$(CONFIG_UBSAN_BOUNDS_STRICT) += -fsanitize=bounds-strict 6 ubsan-cflags-$(CONFIG_UBSAN_ARRAY_BOUNDS) += -fsanitize=array-bounds 7 ubsan-cflags-$(CONFIG_UBSAN_LOCAL_BOUNDS) += -fsanitize=local-bounds 8 ubsan-cflags-$(CONFIG_UBSAN_SHIFT) += -fsanitize=shift 9 ubsan-cflags-$(CONFIG_UBSAN_DIV_ZERO) += -fsanitize=integer-divide-by-zero 10 ubsan-cflags-$(CONFIG_UBSAN_UNREACHABLE) += -fsanitize=unreachable 11 ubsan-cflags-$(CONFIG_UBSAN_BOOL) += -fsanitize=bool 12 ubsan-cflags-$(CONFIG_UBSAN_ENUM) += -fsanitize=enum [all …]
|
H A D | Makefile.kasan | 1 # SPDX-License-Identifier: GPL-2.0 9 CFLAGS_KASAN_NOSANITIZE := -fno-builtin 14 cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1))) 30 CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address 32 # -fasan-shadow-offset fails without -fsanitize 33 CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \ 34 -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \ 35 $(call cc-option, -fsanitize=kernel-address \ 36 -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET))) 43 $(call cc-param,asan-globals=1) \ [all …]
|
H A D | Makefile.kmsan | 1 # SPDX-License-Identifier: GPL-2.0 2 kmsan-cflags := -fsanitize=kernel-memory 5 kmsan-cflags += -fsanitize-memory-param-retval 8 export CFLAGS_KMSAN := $(kmsan-cflags)
|
H A D | Makefile.kcov | 1 # SPDX-License-Identifier: GPL-2.0-only 2 kcov-flags-$(CONFIG_CC_HAS_SANCOV_TRACE_PC) += -fsanitize-coverage=trace-pc 3 kcov-flags-$(CONFIG_KCOV_ENABLE_COMPARISONS) += -fsanitize-coverage=trace-cmp 4 kcov-flags-$(CONFIG_GCC_PLUGIN_SANCOV) += -fplugin=$(objtree)/scripts/gcc-plugins/sancov_plugin.so 6 export CFLAGS_KCOV := $(kcov-flags-y)
|
/openbmc/witherspoon-pfault-analysis/ |
H A D | elog-errors.hpp | 2 // See elog-gen.py for more details 5 #include <phosphor-logging/elog.hpp> 6 #include <phosphor-logging/log.hpp> 162 * We can't use -fsanitize=undefined if we declare a 163 * 'static constexpr auto str' member, so don't. Instead, open-code the 174 * We can't use -fsanitize=undefined if we declare a 175 * 'static constexpr auto str' member, so don't. Instead, open-code the 188 * We can't use -fsanitize=undefined if we declare a 189 * 'static constexpr auto str' member, so don't. Instead, open-code the 239 * We can't use -fsanitize=undefined if we declare a [all …]
|
/openbmc/linux/tools/testing/memblock/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 5 CFLAGS += -I. -I../../include -Wall -O2 -fsanitize=address \ 6 -fsanitize=undefined -D CONFIG_PHYS_ADDR_T_64BIT 7 LDFLAGS += -fsanitize=address -fsanitize=undefined 16 CFLAGS += -m32 17 LDFLAGS += -m32 30 @mkdir -p linux 31 test -L linux/memblock.h || ln -s ../../../../include/linux/memblock.h linux/memblock.h 32 test -L asm/asm.h || ln -s ../../../arch/x86/include/asm/asm.h asm/asm.h 33 test -L asm/cmpxchg.h || ln -s ../../../arch/x86/include/asm/cmpxchg.h asm/cmpxchg.h [all …]
|
/openbmc/openpower-host-ipmi-oem/ |
H A D | elog-errors.hpp | 2 // See elog-gen.py for more details 5 #include <phosphor-logging/elog.hpp> 6 #include <phosphor-logging/log.hpp> 60 * We can't use -fsanitize=undefined if we declare a 61 * 'static constexpr auto str' member, so don't. Instead, open-code the 105 * We can't use -fsanitize=undefined if we declare a 106 * 'static constexpr auto str' member, so don't. Instead, open-code the 152 * We can't use -fsanitize=undefined if we declare a 153 * 'static constexpr auto str' member, so don't. Instead, open-code the 166 * We can't use -fsanitize=undefined if we declare a [all …]
|
/openbmc/linux/tools/testing/scatterlist/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0-only 2 CFLAGS += -I. -I../../include -g -O2 -Wall -fsanitize=address 3 LDFLAGS += -fsanitize=address -fsanitize=undefined 8 CFLAGS += -m32 9 LDFLAGS += -m32 21 @sed -e 's/^static //' -e 's/__always_inline //' -e 's/inline //' < $< > $@ 26 @mkdir -p linux 27 @mkdir -p asm
|
/openbmc/linux/tools/testing/radix-tree/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 CFLAGS += -I. -I../../include -I../../../lib -g -Og -Wall \ 4 -D_LGPL_SOURCE -fsanitize=address -fsanitize=undefined 5 LDFLAGS += -fsanitize=address -fsanitize=undefined 6 LDLIBS+= -lpthread -lurcu 7 TARGETS = main idr-test multiorder xarray maple 8 CORE_OFILES := xarray.o radix-tree.o idr.o linux.o test.o find_bit.o bitmap.o \ 11 regression4.o tag_check.o multiorder.o idr-test.o iteration_check.o \ 19 CFLAGS += -m32 20 LDFLAGS += -m32 [all …]
|
/openbmc/phosphor-mboxd/ |
H A D | bootstrap.sh | 3 set -eu 5 AUTOCONF_FILES="Makefile.in aclocal.m4 ar-lib autom4te.cache compile \ 6 config.guess config.h.in config.sub configure depcomp install-sh \ 7 ltmain.sh missing *libtool test-driver" 11 if [ $# -gt 0 ]; 19 AX_CODE_COVERAGE_PATH="$(aclocal --print-ac-dir)"/ax_code_coverage.m4 20 if [ ! -e ${AX_CODE_COVERAGE_PATH} ]; 25 LCOV_VERSION=$(lcov --version | tr ' ' '\n' | tail -1) 27 # Ubuntu Zesty ships with lcov v1.13, but Zesty's autoconf-archive 31 # sed-patch ax_code_coverage.m4 as it's GPLv3, and this is an Apache v2 [all …]
|
/openbmc/hiomapd/ |
H A D | bootstrap.sh | 3 set -eu 5 AUTOCONF_FILES="Makefile.in aclocal.m4 ar-lib autom4te.cache compile \ 6 config.guess config.h.in config.sub configure depcomp install-sh \ 7 ltmain.sh missing *libtool test-driver" 11 if [ $# -gt 0 ]; 19 AX_CODE_COVERAGE_PATH="$(aclocal --print-ac-dir)"/ax_code_coverage.m4 20 if [ ! -e "${AX_CODE_COVERAGE_PATH}" ]; 25 LCOV_VERSION=$(lcov --version | tr ' ' '\n' | tail -1) 27 # Ubuntu Zesty ships with lcov v1.13, but Zesty's autoconf-archive 31 # sed-patch ax_code_coverage.m4 as it's GPLv3, and this is an Apache v2 [all …]
|
/openbmc/linux/tools/testing/selftests/fchmodat2/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0-or-later 3 CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined -static-libasan $(KHDR_INCLUDES)
|
/openbmc/linux/tools/testing/selftests/openat2/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0-or-later 3 CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined -static-libasan
|
/openbmc/linux/tools/net/ynl/lib/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 4 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow 6 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan 19 rm -f *.o *.d *~ 22 rm -f *.a 25 $(COMPILE.c) -MMD -c -o $@ $<
|
/openbmc/linux/tools/net/ynl/samples/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 6 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow \ 7 -I../lib/ -I../generated/ -idirafter $(UAPI_PATH) 9 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan 12 LDLIBS=-lmnl ../lib/ynl.a ../generated/protos.a 24 rm -f *.o *.d *~ 27 rm -f $(BINS)
|
/openbmc/phosphor-power/ |
H A D | elog-errors.hpp | 2 // See elog-gen.py for more details 5 #include <phosphor-logging/elog.hpp> 6 #include <phosphor-logging/log.hpp> 1457 * We can't use -fsanitize=undefined if we declare a 1458 * 'static constexpr auto str' member, so don't. Instead, open-code the 1469 * We can't use -fsanitize=undefined if we declare a 1470 * 'static constexpr auto str' member, so don't. Instead, open-code the 1483 * We can't use -fsanitize=undefined if we declare a 1484 * 'static constexpr auto str' member, so don't. Instead, open-code the 1534 * We can't use -fsanitize=undefined if we declare a [all …]
|
/openbmc/linux/tools/net/ynl/generated/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 4 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow \ 5 -I../lib/ -idirafter $(UAPI_PATH) 7 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan 12 YNL_GEN_ARG_ethtool:=--user-header linux/ethtool_netlink.h \ 13 --exclude-op stats-get 15 TOOL:=../ynl-gen-c.py 18 SRCS=$(patsubst %,%-user.c,${GENS}) 19 HDRS=$(patsubst %,%-user.h,${GENS}) 20 OBJS=$(patsubst %,%-user.o,${GENS}) [all …]
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | Build.txt | 6 - libperf library (static) 7 - perf builtin commands 8 - traceevent library (static) 9 - GTK ui library 13 - Makefile 15 Makefile.perf with a -j option to do parallel builds. 17 - Makefile.perf 21 - tools/build/Makefile.build 24 - tools/build/Build.include 27 - Build makefiles [all …]
|
/openbmc/qemu/tests/tsan/ |
H A D | ignore.tsan | 3 # "--extra-cflags=-fsanitize-blacklist=<src path>/tests/tsan/ignore.tsan"
|
/openbmc/qemu/ |
H A D | meson.build | 10 meson.add_postconf_script(find_program('scripts/symlink-install-tree.py')) 23 config_host = keyval.load(meson.current_build_dir() / 'config-host.mak') 30 tmpdir = meson.current_build_dir() / 'meson-private/temp' 61 have_linux_user = have_linux_user or target.endswith('linux-user') 62 have_bsd_user = have_bsd_user or target.endswith('bsd-user') 63 have_system = have_system or target.endswith('-softmmu') 107 …dgen.version() + ' is unsupported. You can install a new version with "cargo install bindgen-cli"') 114 message('To use Rust you can install a new version with "cargo install bindgen-cli"') 132 # instead. QEMU --enable-modules depends on this because the SystemTap 135 add_global_arguments('-DSTAP_SDT_V2', [all …]
|
/openbmc/qemu/tests/docker/ |
H A D | test-clang | 1 #!/bin/bash -e 12 # the top-level directory. 20 OPTS="--cxx=clang++ --cc=clang --host-cc=clang" 21 OPTS="$OPTS --extra-cflags=-fsanitize=undefined \ 22 --extra-cflags=-fno-sanitize=float-divide-by-zero"
|