Commit 2947a456 authored by Nathan Chancellor's avatar Nathan Chancellor Committed by Andrew Morton

treewide: update LLVM Bugzilla links

LLVM moved their issue tracker from their own Bugzilla instance to GitHub
issues.  While all of the links are still valid, they may not necessarily
show the most up to date information around the issues, as all updates
will occur on GitHub, not Bugzilla.

Another complication is that the Bugzilla issue number is not always the
same as the GitHub issue number.  Thankfully, LLVM maintains this mapping
through two shortlinks:

  https://llvm.org/bz<num> -> https://bugs.llvm.org/show_bug.cgi?id=<num>
  https://llvm.org/pr<num> -> https://github.com/llvm/llvm-project/issues/<mapped_num>

Switch all "https://bugs.llvm.org/show_bug.cgi?id=<num>" links to the
"https://llvm.org/pr<num>" shortlink so that the links show the most up to
date information.  Each migrated issue links back to the Bugzilla entry,
so there should be no loss of fidelity of information here.

Link: https://lkml.kernel.org/r/20240109-update-llvm-links-v1-3-eb09b59db071@kernel.orgSigned-off-by: default avatarNathan Chancellor <nathan@kernel.org>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
Acked-by: default avatarFangrui Song <maskray@google.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Andrii Nakryiko <andrii@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Mykola Lysenko <mykolal@fb.com>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
parent fafdea34
...@@ -144,11 +144,11 @@ CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mno-pointers-to-nested-functions) ...@@ -144,11 +144,11 @@ CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mno-pointers-to-nested-functions)
CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mlong-double-128) CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mlong-double-128)
# Clang unconditionally reserves r2 on ppc32 and does not support the flag # Clang unconditionally reserves r2 on ppc32 and does not support the flag
# https://bugs.llvm.org/show_bug.cgi?id=39555 # https://llvm.org/pr39555
CFLAGS-$(CONFIG_PPC32) := $(call cc-option, -ffixed-r2) CFLAGS-$(CONFIG_PPC32) := $(call cc-option, -ffixed-r2)
# Clang doesn't support -mmultiple / -mno-multiple # Clang doesn't support -mmultiple / -mno-multiple
# https://bugs.llvm.org/show_bug.cgi?id=39556 # https://llvm.org/pr39556
CFLAGS-$(CONFIG_PPC32) += $(call cc-option, $(MULTIPLEWORD)) CFLAGS-$(CONFIG_PPC32) += $(call cc-option, $(MULTIPLEWORD))
CFLAGS-$(CONFIG_PPC32) += $(call cc-option,-mno-readonly-in-sdata) CFLAGS-$(CONFIG_PPC32) += $(call cc-option,-mno-readonly-in-sdata)
......
...@@ -55,7 +55,7 @@ void kvmhv_save_hv_regs(struct kvm_vcpu *vcpu, struct hv_guest_state *hr) ...@@ -55,7 +55,7 @@ void kvmhv_save_hv_regs(struct kvm_vcpu *vcpu, struct hv_guest_state *hr)
hr->dawrx1 = vcpu->arch.dawrx1; hr->dawrx1 = vcpu->arch.dawrx1;
} }
/* Use noinline_for_stack due to https://bugs.llvm.org/show_bug.cgi?id=49610 */ /* Use noinline_for_stack due to https://llvm.org/pr49610 */
static noinline_for_stack void byteswap_pt_regs(struct pt_regs *regs) static noinline_for_stack void byteswap_pt_regs(struct pt_regs *regs)
{ {
unsigned long *addr = (unsigned long *) regs; unsigned long *addr = (unsigned long *) regs;
......
...@@ -9,7 +9,7 @@ ...@@ -9,7 +9,7 @@
#ifndef __ASSEMBLY__ #ifndef __ASSEMBLY__
#ifdef CONFIG_CC_IS_CLANG #ifdef CONFIG_CC_IS_CLANG
/* https://bugs.llvm.org/show_bug.cgi?id=41424 */ /* https://llvm.org/pr41424 */
#define ftrace_return_address(n) 0UL #define ftrace_return_address(n) 0UL
#else #else
#define ftrace_return_address(n) __builtin_return_address(n) #define ftrace_return_address(n) __builtin_return_address(n)
......
...@@ -5,7 +5,7 @@ ...@@ -5,7 +5,7 @@
CFLAGS_cpu.o := -fno-stack-protector CFLAGS_cpu.o := -fno-stack-protector
# Clang may incorrectly inline functions with stack protector enabled into # Clang may incorrectly inline functions with stack protector enabled into
# __restore_processor_state(): https://bugs.llvm.org/show_bug.cgi?id=47479 # __restore_processor_state(): https://llvm.org/pr47479
CFLAGS_REMOVE_cpu.o := $(CC_FLAGS_LTO) CFLAGS_REMOVE_cpu.o := $(CC_FLAGS_LTO)
obj-$(CONFIG_PM_SLEEP) += cpu.o obj-$(CONFIG_PM_SLEEP) += cpu.o
......
...@@ -102,7 +102,7 @@ static void blake2b_compress_one_generic(struct blake2b_state *S, ...@@ -102,7 +102,7 @@ static void blake2b_compress_one_generic(struct blake2b_state *S,
ROUND(10); ROUND(10);
ROUND(11); ROUND(11);
#ifdef CONFIG_CC_IS_CLANG #ifdef CONFIG_CC_IS_CLANG
#pragma nounroll /* https://bugs.llvm.org/show_bug.cgi?id=45803 */ #pragma nounroll /* https://llvm.org/pr45803 */
#endif #endif
for (i = 0; i < 8; ++i) for (i = 0; i < 8; ++i)
S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; S->h[i] = S->h[i] ^ v[i] ^ v[i + 8];
......
...@@ -105,7 +105,7 @@ lib-y := $(patsubst %.o,%.stub.o,$(lib-y)) ...@@ -105,7 +105,7 @@ lib-y := $(patsubst %.o,%.stub.o,$(lib-y))
# Even when -mbranch-protection=none is set, Clang will generate a # Even when -mbranch-protection=none is set, Clang will generate a
# .note.gnu.property for code-less object files (like lib/ctype.c), # .note.gnu.property for code-less object files (like lib/ctype.c),
# so work around this by explicitly removing the unwanted section. # so work around this by explicitly removing the unwanted section.
# https://bugs.llvm.org/show_bug.cgi?id=46480 # https://llvm.org/pr46480
STUBCOPY_FLAGS-y += --remove-section=.note.gnu.property STUBCOPY_FLAGS-y += --remove-section=.note.gnu.property
STUBCOPY_RELOC-$(CONFIG_X86_32) := R_386_32 STUBCOPY_RELOC-$(CONFIG_X86_32) := R_386_32
......
...@@ -610,7 +610,7 @@ static uint32_t sdma_v4_4_2_rb_cntl(struct amdgpu_ring *ring, uint32_t rb_cntl) ...@@ -610,7 +610,7 @@ static uint32_t sdma_v4_4_2_rb_cntl(struct amdgpu_ring *ring, uint32_t rb_cntl)
/* Set ring buffer size in dwords */ /* Set ring buffer size in dwords */
uint32_t rb_bufsz = order_base_2(ring->ring_size / 4); uint32_t rb_bufsz = order_base_2(ring->ring_size / 4);
barrier(); /* work around https://bugs.llvm.org/show_bug.cgi?id=42576 */ barrier(); /* work around https://llvm.org/pr42576 */
rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SIZE, rb_bufsz); rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SIZE, rb_bufsz);
#ifdef __BIG_ENDIAN #ifdef __BIG_ENDIAN
rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SWAP_ENABLE, 1); rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SWAP_ENABLE, 1);
......
...@@ -49,7 +49,7 @@ static const uint8_t zigzag[64] = { ...@@ -49,7 +49,7 @@ static const uint8_t zigzag[64] = {
/* /*
* noinline_for_stack to work around * noinline_for_stack to work around
* https://bugs.llvm.org/show_bug.cgi?id=38809 * https://llvm.org/pr38809
*/ */
static int noinline_for_stack static int noinline_for_stack
rlc(const s16 *in, __be16 *output, int blocktype) rlc(const s16 *in, __be16 *output, int blocktype)
......
...@@ -288,7 +288,7 @@ config REGULATOR_CROS_EC ...@@ -288,7 +288,7 @@ config REGULATOR_CROS_EC
config REGULATOR_DA903X config REGULATOR_DA903X
tristate "Dialog Semiconductor DA9030/DA9034 regulators" tristate "Dialog Semiconductor DA9030/DA9034 regulators"
depends on PMIC_DA903X depends on PMIC_DA903X
depends on !CC_IS_CLANG # https://bugs.llvm.org/show_bug.cgi?id=38789 depends on !CC_IS_CLANG # https://llvm.org/pr38789
help help
Say y here to support the BUCKs and LDOs regulators found on Say y here to support the BUCKs and LDOs regulators found on
Dialog Semiconductor DA9030/DA9034 PMIC. Dialog Semiconductor DA9030/DA9034 PMIC.
......
...@@ -984,7 +984,7 @@ ...@@ -984,7 +984,7 @@
* -fsanitize=thread produce unwanted sections (.eh_frame * -fsanitize=thread produce unwanted sections (.eh_frame
* and .init_array.*), but CONFIG_CONSTRUCTORS wants to * and .init_array.*), but CONFIG_CONSTRUCTORS wants to
* keep any .init_array.* sections. * keep any .init_array.* sections.
* https://bugs.llvm.org/show_bug.cgi?id=46478 * https://llvm.org/pr46478
*/ */
#ifdef CONFIG_UNWIND_TABLES #ifdef CONFIG_UNWIND_TABLES
#define DISCARD_EH_FRAME #define DISCARD_EH_FRAME
......
...@@ -158,7 +158,7 @@ config KASAN_STACK ...@@ -158,7 +158,7 @@ config KASAN_STACK
out-of-bounds bugs in stack variables. out-of-bounds bugs in stack variables.
With Clang, stack instrumentation has a problem that causes excessive With Clang, stack instrumentation has a problem that causes excessive
stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus, stack usage, see https://llvm.org/pr38809. Thus,
with Clang, this option is deemed unsafe. with Clang, this option is deemed unsafe.
This option is always disabled when compile-testing with Clang to This option is always disabled when compile-testing with Clang to
......
...@@ -21,7 +21,7 @@ altivec_flags += -isystem $(shell $(CC) -print-file-name=include) ...@@ -21,7 +21,7 @@ altivec_flags += -isystem $(shell $(CC) -print-file-name=include)
ifdef CONFIG_CC_IS_CLANG ifdef CONFIG_CC_IS_CLANG
# clang ppc port does not yet support -maltivec when -msoft-float is # clang ppc port does not yet support -maltivec when -msoft-float is
# enabled. A future release of clang will resolve this # enabled. A future release of clang will resolve this
# https://bugs.llvm.org/show_bug.cgi?id=31177 # https://llvm.org/pr31177
CFLAGS_REMOVE_altivec1.o += -msoft-float CFLAGS_REMOVE_altivec1.o += -msoft-float
CFLAGS_REMOVE_altivec2.o += -msoft-float CFLAGS_REMOVE_altivec2.o += -msoft-float
CFLAGS_REMOVE_altivec4.o += -msoft-float CFLAGS_REMOVE_altivec4.o += -msoft-float
......
...@@ -404,7 +404,7 @@ static noinline int leaf_switch_2_none(unsigned long sp, bool fill, ...@@ -404,7 +404,7 @@ static noinline int leaf_switch_2_none(unsigned long sp, bool fill,
* These are expected to fail for most configurations because neither * These are expected to fail for most configurations because neither
* GCC nor Clang have a way to perform initialization of variables in * GCC nor Clang have a way to perform initialization of variables in
* non-code areas (i.e. in a switch statement before the first "case"). * non-code areas (i.e. in a switch statement before the first "case").
* https://bugs.llvm.org/show_bug.cgi?id=44916 * https://llvm.org/pr44916
*/ */
DEFINE_TEST_DRIVER(switch_1_none, uint64_t, SCALAR, ALWAYS_FAIL); DEFINE_TEST_DRIVER(switch_1_none, uint64_t, SCALAR, ALWAYS_FAIL);
DEFINE_TEST_DRIVER(switch_2_none, uint64_t, SCALAR, ALWAYS_FAIL); DEFINE_TEST_DRIVER(switch_2_none, uint64_t, SCALAR, ALWAYS_FAIL);
......
...@@ -651,7 +651,7 @@ static struct kmem_cache *__init create_kmalloc_cache(const char *name, ...@@ -651,7 +651,7 @@ static struct kmem_cache *__init create_kmalloc_cache(const char *name,
struct kmem_cache * struct kmem_cache *
kmalloc_caches[NR_KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1] __ro_after_init = kmalloc_caches[NR_KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1] __ro_after_init =
{ /* initialization for https://bugs.llvm.org/show_bug.cgi?id=42570 */ }; { /* initialization for https://llvm.org/pr42570 */ };
EXPORT_SYMBOL(kmalloc_caches); EXPORT_SYMBOL(kmalloc_caches);
#ifdef CONFIG_RANDOM_KMALLOC_CACHES #ifdef CONFIG_RANDOM_KMALLOC_CACHES
......
...@@ -5053,7 +5053,7 @@ void br_multicast_uninit_stats(struct net_bridge *br) ...@@ -5053,7 +5053,7 @@ void br_multicast_uninit_stats(struct net_bridge *br)
free_percpu(br->mcast_stats); free_percpu(br->mcast_stats);
} }
/* noinline for https://bugs.llvm.org/show_bug.cgi?id=45802#c9 */ /* noinline for https://llvm.org/pr45802#c9 */
static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src) static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src)
{ {
dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX]; dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX];
......
...@@ -142,7 +142,7 @@ config HARDENED_USERCOPY ...@@ -142,7 +142,7 @@ config HARDENED_USERCOPY
config FORTIFY_SOURCE config FORTIFY_SOURCE
bool "Harden common str/mem functions against buffer overflows" bool "Harden common str/mem functions against buffer overflows"
depends on ARCH_HAS_FORTIFY_SOURCE depends on ARCH_HAS_FORTIFY_SOURCE
# https://bugs.llvm.org/show_bug.cgi?id=41459 # https://llvm.org/pr41459
depends on !CC_IS_CLANG || CLANG_VERSION >= 120001 depends on !CC_IS_CLANG || CLANG_VERSION >= 120001
# https://github.com/llvm/llvm-project/issues/53645 # https://github.com/llvm/llvm-project/issues/53645
depends on !CC_IS_CLANG || !X86_32 depends on !CC_IS_CLANG || !X86_32
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment