linux
zz
linux | zz | |
---|---|---|
9 | 10 | |
240 | 1,604 | |
0.8% | - | |
0.0 | 1.9 | |
9 months ago | almost 2 years ago | |
C | Rust | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linux
-
Committing to Rust for Kernel Code
> Torvalds answered that, while he used to find problems in the LLVM Clang compiler, now he's more likely to find problems with GCC instead; he now builds with Clang.
https://github.com/ClangBuiltLinux/linux/issues is our bug tracker for known issues (a few are tracked in llvm's issue tracker). Bug reporters and future kernel hackers wanted!
As I mentioned on mastodon, there's lots of bugs still to be fixed everywhere, but even if we don't fix them, providing competition in the toolchain space has been worth it to users.
-
ISO C became unusable for operating systems development
Linux builds on clang after a decade of dedicated effort to make it happen, and that is with clang overall being comparatively similar to gcc (e.g clang implements many gcc extensions): https://github.com/ClangBuiltLinux/linux/wiki/Project-histor...
-
What (not how) to contribute to the kernel
We got plenty of bugs for building the kernel with LLVM, if you're looking for tasks, pick one!
-
Intel C/C++ compilers complete adoption of LLVM
There's an semi-official github[0] for this.
AFAICT from the issue, Clang and binutils/LLVM tools work fine with no patches for the mainstream archs and when not trying to be super-fancy with custom flags. The more non-mainstream one goes with arch or flags the more likely one will run into something.
[0] https://github.com/ClangBuiltLinux/linux/issues
- Is linux insecure?
-
Kernel 5.12.0 clang LTO
If you have any reproducible issues please file them here: https://github.com/ClangBuiltLinux/linux/issues
-
Looking for advice on learning kernel development
See if you can build your distro's config. make LLVM=1 localmodconfig olddefconfig bzImage. Any warnings? Any warnings not in the issue tracker? If not, pick one from the issue tracker and see if you can reproduce it. Note: lots of issues are tagged by target ISA, so you'll need to get familiar with cross compiling (setting ARCH= and CROSS_COMPILE=.
-
Why Apple Chose Clang
It's a pipeline; clang starts, hands off to LLVM.
For a compilation to object file from source code, the vast majority of time for most translation units is spent in the front end of the pipeline, not the middle, or backend.
See also my first plot: https://github.com/ClangBuiltLinux/linux/issues/1086#issueco...
zz
- A "logical" compiler
-
Is it possible to have a superset of the C programming languages standard that is as safe as Rust?
There is this: https://github.com/zetzit/zz
-
ISO C became unusable for operating systems development
You're right that you can't define a safe subset of C without making it practical. MISRA C defines a C subset intended to help avoid C's footguns, but it still isn't actually a safe language. There are alternative approaches though:
1. Compile a safe language to C (whether a new language or an existing one)
2. Formal analysis of C, or of some practical subset of C, to prove the absence of undefined behaviour
Work has been done on both approaches.
ZZ compiles to C. [0] Dafny can compile to C++, but it seems that's not its primary target. [1][2]
There are several projects on formal analysis of C. [3][4][5][6]
[0] https://github.com/zetzit/zz
[1] https://github.com/dafny-lang/dafny
[2] https://dafny-lang.github.io/dafny/
[3] https://frama-c.com/
[4] https://www.microsoft.com/en-us/research/project/vcc-a-verif...
[5] https://www.eschertech.com/products/ecv.php
[6] https://trust-in-soft.com/
-
Foundations of Dawn: The Untyped Concatenative Calculus
Formal methods have been used successfully for decades; it's not just a pipe dream. Perfect software should ideally be something like ultra-low-defect software, though (that's the term the AdaCore folks use).
There are also other projects that aim to make formal software development much easier [0][1] and of course there's SPARK Ada.
[0] https://github.com/zetzit/zz
[1] https://github.com/dafny-lang/dafny
- ZetZ: A zymbolic verifier and tranzpiler to bare metal C Resources
-
Programming in Z3 by learning to think like a compiler
This post reminds me that I've been wanting to try out ZetZ[0]. It incorporates Z3 into a high-level programming language, and seems to do a lot of what the post talks about automatically.
[0] https://github.com/zetzit/zz
-
Grids in Rust, part 2: const generics
I still want to try the ZZ language (https://github.com/zetzit/zz) someday. It compiles to C, and uses a SMT solver to prove that you don't index out-of-bounds at compile time. But I don't like how it lacks generics, uses C idioms, and compiles to C.
-
Another technique to manage memory
The zz language uses a SMT solver to check for program soundness... I haven't tried it, but that's got to be more flexible and resource-hungry.
-
We are building a new systems programming language
Especially the fact that it outputs C code. So interop is seamless.
https://github.com/zetzit/zz
For any systems language, interop with C is the litmus test.
With that in mind, this new language should not require 15,000 lines of standard library. A type-safe wrapper for libc should be enough...
-
Does such a language already exist ("Rust--")?
You might find ZetZ interesting!
What are some alternatives?
wasi-sdk - WASI-enabled WebAssembly C/C++ toolchain
TinyGo - Go compiler for small places. Microcontrollers, WebAssembly (WASM/WASI), and command-line tools. Based on LLVM.
checkedc - Checked C is an extension to C that lets programmers write C code that is guaranteed by the compiler to be type-safe. The goal is to let people easily make their existing C code type-safe and eliminate entire classes of errors. Checked C does not address use-after-free errors. This repo has a wiki for Checked C, sample code, the specification, and test code.
tilck - A Tiny Linux-Compatible Kernel
angr - A powerful and user-friendly binary analysis platform!
gentooLTO - A Gentoo Portage configuration for building with -O3, Graphite, and LTO optimizations
CrossHair - An analysis tool for Python that blurs the line between testing and type systems.
freebsd-ports - FreeBSD ports tree (read-only mirror)
micro-mitten - You might not need your garbage collector
gcc
alive2 - Automatic verification of LLVM optimizations