Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

treewide: update LLVM Bugzilla links

LLVM moved their issue tracker from their own Bugzilla instance to GitHub
issues. While all of the links are still valid, they may not necessarily
show the most up to date information around the issues, as all updates
will occur on GitHub, not Bugzilla.

Another complication is that the Bugzilla issue number is not always the
same as the GitHub issue number. Thankfully, LLVM maintains this mapping
through two shortlinks:

https://llvm.org/bz<num> -> https://bugs.llvm.org/show_bug.cgi?id=<num>
https://llvm.org/pr<num> -> https://github.com/llvm/llvm-project/issues/<mapped_num>

Switch all "https://bugs.llvm.org/show_bug.cgi?id=<num>" links to the
"https://llvm.org/pr<num>" shortlink so that the links show the most up to
date information. Each migrated issue links back to the Bugzilla entry,
so there should be no loss of fidelity of information here.

Link: https://lkml.kernel.org/r/20240109-update-llvm-links-v1-3-eb09b59db071@kernel.org
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Acked-by: Fangrui Song <maskray@google.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Andrii Nakryiko <andrii@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Mykola Lysenko <mykolal@fb.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>

authored by

Nathan Chancellor and committed by
Andrew Morton
2947a456 fafdea34

+17 -17
+2 -2
arch/powerpc/Makefile
··· 144 144 CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mlong-double-128) 145 145 146 146 # Clang unconditionally reserves r2 on ppc32 and does not support the flag 147 - # https://bugs.llvm.org/show_bug.cgi?id=39555 147 + # https://llvm.org/pr39555 148 148 CFLAGS-$(CONFIG_PPC32) := $(call cc-option, -ffixed-r2) 149 149 150 150 # Clang doesn't support -mmultiple / -mno-multiple 151 - # https://bugs.llvm.org/show_bug.cgi?id=39556 151 + # https://llvm.org/pr39556 152 152 CFLAGS-$(CONFIG_PPC32) += $(call cc-option, $(MULTIPLEWORD)) 153 153 154 154 CFLAGS-$(CONFIG_PPC32) += $(call cc-option,-mno-readonly-in-sdata)
+1 -1
arch/powerpc/kvm/book3s_hv_nested.c
··· 55 55 hr->dawrx1 = vcpu->arch.dawrx1; 56 56 } 57 57 58 - /* Use noinline_for_stack due to https://bugs.llvm.org/show_bug.cgi?id=49610 */ 58 + /* Use noinline_for_stack due to https://llvm.org/pr49610 */ 59 59 static noinline_for_stack void byteswap_pt_regs(struct pt_regs *regs) 60 60 { 61 61 unsigned long *addr = (unsigned long *) regs;
+1 -1
arch/s390/include/asm/ftrace.h
··· 9 9 #ifndef __ASSEMBLY__ 10 10 11 11 #ifdef CONFIG_CC_IS_CLANG 12 - /* https://bugs.llvm.org/show_bug.cgi?id=41424 */ 12 + /* https://llvm.org/pr41424 */ 13 13 #define ftrace_return_address(n) 0UL 14 14 #else 15 15 #define ftrace_return_address(n) __builtin_return_address(n)
+1 -1
arch/x86/power/Makefile
··· 5 5 CFLAGS_cpu.o := -fno-stack-protector 6 6 7 7 # Clang may incorrectly inline functions with stack protector enabled into 8 - # __restore_processor_state(): https://bugs.llvm.org/show_bug.cgi?id=47479 8 + # __restore_processor_state(): https://llvm.org/pr47479 9 9 CFLAGS_REMOVE_cpu.o := $(CC_FLAGS_LTO) 10 10 11 11 obj-$(CONFIG_PM_SLEEP) += cpu.o
+1 -1
crypto/blake2b_generic.c
··· 102 102 ROUND(10); 103 103 ROUND(11); 104 104 #ifdef CONFIG_CC_IS_CLANG 105 - #pragma nounroll /* https://bugs.llvm.org/show_bug.cgi?id=45803 */ 105 + #pragma nounroll /* https://llvm.org/pr45803 */ 106 106 #endif 107 107 for (i = 0; i < 8; ++i) 108 108 S->h[i] = S->h[i] ^ v[i] ^ v[i + 8];
+1 -1
drivers/firmware/efi/libstub/Makefile
··· 105 105 # Even when -mbranch-protection=none is set, Clang will generate a 106 106 # .note.gnu.property for code-less object files (like lib/ctype.c), 107 107 # so work around this by explicitly removing the unwanted section. 108 - # https://bugs.llvm.org/show_bug.cgi?id=46480 108 + # https://llvm.org/pr46480 109 109 STUBCOPY_FLAGS-y += --remove-section=.note.gnu.property 110 110 111 111 STUBCOPY_RELOC-$(CONFIG_X86_32) := R_386_32
+1 -1
drivers/gpu/drm/amd/amdgpu/sdma_v4_4_2.c
··· 610 610 /* Set ring buffer size in dwords */ 611 611 uint32_t rb_bufsz = order_base_2(ring->ring_size / 4); 612 612 613 - barrier(); /* work around https://bugs.llvm.org/show_bug.cgi?id=42576 */ 613 + barrier(); /* work around https://llvm.org/pr42576 */ 614 614 rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SIZE, rb_bufsz); 615 615 #ifdef __BIG_ENDIAN 616 616 rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SWAP_ENABLE, 1);
+1 -1
drivers/media/test-drivers/vicodec/codec-fwht.c
··· 49 49 50 50 /* 51 51 * noinline_for_stack to work around 52 - * https://bugs.llvm.org/show_bug.cgi?id=38809 52 + * https://llvm.org/pr38809 53 53 */ 54 54 static int noinline_for_stack 55 55 rlc(const s16 *in, __be16 *output, int blocktype)
+1 -1
drivers/regulator/Kconfig
··· 288 288 config REGULATOR_DA903X 289 289 tristate "Dialog Semiconductor DA9030/DA9034 regulators" 290 290 depends on PMIC_DA903X 291 - depends on !CC_IS_CLANG # https://bugs.llvm.org/show_bug.cgi?id=38789 291 + depends on !CC_IS_CLANG # https://llvm.org/pr38789 292 292 help 293 293 Say y here to support the BUCKs and LDOs regulators found on 294 294 Dialog Semiconductor DA9030/DA9034 PMIC.
+1 -1
include/asm-generic/vmlinux.lds.h
··· 984 984 * -fsanitize=thread produce unwanted sections (.eh_frame 985 985 * and .init_array.*), but CONFIG_CONSTRUCTORS wants to 986 986 * keep any .init_array.* sections. 987 - * https://bugs.llvm.org/show_bug.cgi?id=46478 987 + * https://llvm.org/pr46478 988 988 */ 989 989 #ifdef CONFIG_UNWIND_TABLES 990 990 #define DISCARD_EH_FRAME
+1 -1
lib/Kconfig.kasan
··· 158 158 out-of-bounds bugs in stack variables. 159 159 160 160 With Clang, stack instrumentation has a problem that causes excessive 161 - stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus, 161 + stack usage, see https://llvm.org/pr38809. Thus, 162 162 with Clang, this option is deemed unsafe. 163 163 164 164 This option is always disabled when compile-testing with Clang to
+1 -1
lib/raid6/Makefile
··· 21 21 ifdef CONFIG_CC_IS_CLANG 22 22 # clang ppc port does not yet support -maltivec when -msoft-float is 23 23 # enabled. A future release of clang will resolve this 24 - # https://bugs.llvm.org/show_bug.cgi?id=31177 24 + # https://llvm.org/pr31177 25 25 CFLAGS_REMOVE_altivec1.o += -msoft-float 26 26 CFLAGS_REMOVE_altivec2.o += -msoft-float 27 27 CFLAGS_REMOVE_altivec4.o += -msoft-float
+1 -1
lib/stackinit_kunit.c
··· 404 404 * These are expected to fail for most configurations because neither 405 405 * GCC nor Clang have a way to perform initialization of variables in 406 406 * non-code areas (i.e. in a switch statement before the first "case"). 407 - * https://bugs.llvm.org/show_bug.cgi?id=44916 407 + * https://llvm.org/pr44916 408 408 */ 409 409 DEFINE_TEST_DRIVER(switch_1_none, uint64_t, SCALAR, ALWAYS_FAIL); 410 410 DEFINE_TEST_DRIVER(switch_2_none, uint64_t, SCALAR, ALWAYS_FAIL);
+1 -1
mm/slab_common.c
··· 651 651 652 652 struct kmem_cache * 653 653 kmalloc_caches[NR_KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1] __ro_after_init = 654 - { /* initialization for https://bugs.llvm.org/show_bug.cgi?id=42570 */ }; 654 + { /* initialization for https://llvm.org/pr42570 */ }; 655 655 EXPORT_SYMBOL(kmalloc_caches); 656 656 657 657 #ifdef CONFIG_RANDOM_KMALLOC_CACHES
+1 -1
net/bridge/br_multicast.c
··· 5053 5053 free_percpu(br->mcast_stats); 5054 5054 } 5055 5055 5056 - /* noinline for https://bugs.llvm.org/show_bug.cgi?id=45802#c9 */ 5056 + /* noinline for https://llvm.org/pr45802#c9 */ 5057 5057 static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src) 5058 5058 { 5059 5059 dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX];
+1 -1
security/Kconfig
··· 142 142 config FORTIFY_SOURCE 143 143 bool "Harden common str/mem functions against buffer overflows" 144 144 depends on ARCH_HAS_FORTIFY_SOURCE 145 - # https://bugs.llvm.org/show_bug.cgi?id=41459 145 + # https://llvm.org/pr41459 146 146 depends on !CC_IS_CLANG || CLANG_VERSION >= 120001 147 147 # https://github.com/llvm/llvm-project/issues/53645 148 148 depends on !CC_IS_CLANG || !X86_32