treewide: update LLVM Bugzilla links
authorNathan Chancellor <nathan@kernel.org>
Tue, 9 Jan 2024 22:16:31 +0000 (15:16 -0700)
committerAndrew Morton <akpm@linux-foundation.org>
Thu, 22 Feb 2024 23:38:51 +0000 (15:38 -0800)
LLVM moved their issue tracker from their own Bugzilla instance to GitHub
issues.  While all of the links are still valid, they may not necessarily
show the most up to date information around the issues, as all updates
will occur on GitHub, not Bugzilla.

Another complication is that the Bugzilla issue number is not always the
same as the GitHub issue number.  Thankfully, LLVM maintains this mapping
through two shortlinks:

  https://llvm.org/bz<num> -> https://bugs.llvm.org/show_bug.cgi?id=<num>
  https://llvm.org/pr<num> -> https://github.com/llvm/llvm-project/issues/<mapped_num>

Switch all "https://bugs.llvm.org/show_bug.cgi?id=<num>" links to the
"https://llvm.org/pr<num>" shortlink so that the links show the most up to
date information.  Each migrated issue links back to the Bugzilla entry,
so there should be no loss of fidelity of information here.

Link: https://lkml.kernel.org/r/20240109-update-llvm-links-v1-3-eb09b59db071@kernel.org
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Acked-by: Fangrui Song <maskray@google.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Andrii Nakryiko <andrii@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Mykola Lysenko <mykolal@fb.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
16 files changed:
arch/powerpc/Makefile
arch/powerpc/kvm/book3s_hv_nested.c
arch/s390/include/asm/ftrace.h
arch/x86/power/Makefile
crypto/blake2b_generic.c
drivers/firmware/efi/libstub/Makefile
drivers/gpu/drm/amd/amdgpu/sdma_v4_4_2.c
drivers/media/test-drivers/vicodec/codec-fwht.c
drivers/regulator/Kconfig
include/asm-generic/vmlinux.lds.h
lib/Kconfig.kasan
lib/raid6/Makefile
lib/stackinit_kunit.c
mm/slab_common.c
net/bridge/br_multicast.c
security/Kconfig

index 051247027da0bafa728f98e2e858aef0b05d8fdf..457cee9b03ee04a908d0856de193d79479a4ff8a 100644 (file)
@@ -144,11 +144,11 @@ CFLAGS-$(CONFIG_PPC64)    += $(call cc-option,-mno-pointers-to-nested-functions)
 CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mlong-double-128)
 
 # Clang unconditionally reserves r2 on ppc32 and does not support the flag
-# https://bugs.llvm.org/show_bug.cgi?id=39555
+# https://llvm.org/pr39555
 CFLAGS-$(CONFIG_PPC32) := $(call cc-option, -ffixed-r2)
 
 # Clang doesn't support -mmultiple / -mno-multiple
-# https://bugs.llvm.org/show_bug.cgi?id=39556
+# https://llvm.org/pr39556
 CFLAGS-$(CONFIG_PPC32) += $(call cc-option, $(MULTIPLEWORD))
 
 CFLAGS-$(CONFIG_PPC32) += $(call cc-option,-mno-readonly-in-sdata)
index 5c375ec1a3c6084be948ccc41e803f8e6da14dc2..05f5220960c63bfccf930ccb868648fc9361a204 100644 (file)
@@ -55,7 +55,7 @@ void kvmhv_save_hv_regs(struct kvm_vcpu *vcpu, struct hv_guest_state *hr)
        hr->dawrx1 = vcpu->arch.dawrx1;
 }
 
-/* Use noinline_for_stack due to https://bugs.llvm.org/show_bug.cgi?id=49610 */
+/* Use noinline_for_stack due to https://llvm.org/pr49610 */
 static noinline_for_stack void byteswap_pt_regs(struct pt_regs *regs)
 {
        unsigned long *addr = (unsigned long *) regs;
index 5a82b08f03cd3e9602311a04ed06b6e52acde3e2..621f23d5ae30a6a05e39e3bf54df1a3b80011f68 100644 (file)
@@ -9,7 +9,7 @@
 #ifndef __ASSEMBLY__
 
 #ifdef CONFIG_CC_IS_CLANG
-/* https://bugs.llvm.org/show_bug.cgi?id=41424 */
+/* https://llvm.org/pr41424 */
 #define ftrace_return_address(n) 0UL
 #else
 #define ftrace_return_address(n) __builtin_return_address(n)
index 379777572bc9fe665b845e829fbe86f5cd9c853b..e0cd7afd53022ad7fde7a177a6dda9d99087472a 100644 (file)
@@ -5,7 +5,7 @@
 CFLAGS_cpu.o   := -fno-stack-protector
 
 # Clang may incorrectly inline functions with stack protector enabled into
-# __restore_processor_state(): https://bugs.llvm.org/show_bug.cgi?id=47479
+# __restore_processor_state(): https://llvm.org/pr47479
 CFLAGS_REMOVE_cpu.o := $(CC_FLAGS_LTO)
 
 obj-$(CONFIG_PM_SLEEP)         += cpu.o
index 6704c03558896729cd40cf0c91b9c73d6182fe84..32e380b714b6ccc1a2b0aa1074f0311e9245fe37 100644 (file)
@@ -102,7 +102,7 @@ static void blake2b_compress_one_generic(struct blake2b_state *S,
        ROUND(10);
        ROUND(11);
 #ifdef CONFIG_CC_IS_CLANG
-#pragma nounroll /* https://bugs.llvm.org/show_bug.cgi?id=45803 */
+#pragma nounroll /* https://llvm.org/pr45803 */
 #endif
        for (i = 0; i < 8; ++i)
                S->h[i] = S->h[i] ^ v[i] ^ v[i + 8];
index 73f4810f6db38ecc933f9a6ac2bed5ae57709148..31eb1e287ce161a60da72da1b4ca30c683dec051 100644 (file)
@@ -105,7 +105,7 @@ lib-y                               := $(patsubst %.o,%.stub.o,$(lib-y))
 # Even when -mbranch-protection=none is set, Clang will generate a
 # .note.gnu.property for code-less object files (like lib/ctype.c),
 # so work around this by explicitly removing the unwanted section.
-# https://bugs.llvm.org/show_bug.cgi?id=46480
+# https://llvm.org/pr46480
 STUBCOPY_FLAGS-y               += --remove-section=.note.gnu.property
 
 STUBCOPY_RELOC-$(CONFIG_X86_32)        := R_386_32
index 2d688dca26bedba5018bd41c76fb09a65a38cd66..78a2773b74f2f0a6d20c4b447c94cd3f67c8a5d6 100644 (file)
@@ -610,7 +610,7 @@ static uint32_t sdma_v4_4_2_rb_cntl(struct amdgpu_ring *ring, uint32_t rb_cntl)
        /* Set ring buffer size in dwords */
        uint32_t rb_bufsz = order_base_2(ring->ring_size / 4);
 
-       barrier(); /* work around https://bugs.llvm.org/show_bug.cgi?id=42576 */
+       barrier(); /* work around https://llvm.org/pr42576 */
        rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SIZE, rb_bufsz);
 #ifdef __BIG_ENDIAN
        rb_cntl = REG_SET_FIELD(rb_cntl, SDMA_GFX_RB_CNTL, RB_SWAP_ENABLE, 1);
index 1ce682e1b85c32d3020031b7daef995160c8e34f..fd75457d03b202bd150c4d9218c480aa9c204464 100644 (file)
@@ -49,7 +49,7 @@ static const uint8_t zigzag[64] = {
 
 /*
  * noinline_for_stack to work around
- * https://bugs.llvm.org/show_bug.cgi?id=38809
+ * https://llvm.org/pr38809
  */
 static int noinline_for_stack
 rlc(const s16 *in, __be16 *output, int blocktype)
index 550145f82726e95dd856d12a4f7d660f61a14500..7db0a29b5b8dcd04dd71b328e364688083640311 100644 (file)
@@ -288,7 +288,7 @@ config REGULATOR_CROS_EC
 config REGULATOR_DA903X
        tristate "Dialog Semiconductor DA9030/DA9034 regulators"
        depends on PMIC_DA903X
-       depends on !CC_IS_CLANG # https://bugs.llvm.org/show_bug.cgi?id=38789
+       depends on !CC_IS_CLANG # https://llvm.org/pr38789
        help
          Say y here to support the BUCKs and LDOs regulators found on
          Dialog Semiconductor DA9030/DA9034 PMIC.
index 5dd3a61d673d4f9492da2162d15944e0faa636a9..f7749d0f2562f11fd8ca4112e0e7d99e79305780 100644 (file)
  * -fsanitize=thread produce unwanted sections (.eh_frame
  * and .init_array.*), but CONFIG_CONSTRUCTORS wants to
  * keep any .init_array.* sections.
- * https://bugs.llvm.org/show_bug.cgi?id=46478
+ * https://llvm.org/pr46478
  */
 #ifdef CONFIG_UNWIND_TABLES
 #define DISCARD_EH_FRAME
index e6eda054ab275ffa7b886c2eb4e49e97705f6b54..98016e137b7f09f82b168f840565e8121b28ce87 100644 (file)
@@ -158,7 +158,7 @@ config KASAN_STACK
          out-of-bounds bugs in stack variables.
 
          With Clang, stack instrumentation has a problem that causes excessive
-         stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus,
+         stack usage, see https://llvm.org/pr38809. Thus,
          with Clang, this option is deemed unsafe.
 
          This option is always disabled when compile-testing with Clang to
index 1c5420ff254e8475f786437544a954ac1a87ea5a..385a94aa0b999b434e07287658363d0c518b734a 100644 (file)
@@ -21,7 +21,7 @@ altivec_flags += -isystem $(shell $(CC) -print-file-name=include)
 ifdef CONFIG_CC_IS_CLANG
 # clang ppc port does not yet support -maltivec when -msoft-float is
 # enabled. A future release of clang will resolve this
-# https://bugs.llvm.org/show_bug.cgi?id=31177
+# https://llvm.org/pr31177
 CFLAGS_REMOVE_altivec1.o  += -msoft-float
 CFLAGS_REMOVE_altivec2.o  += -msoft-float
 CFLAGS_REMOVE_altivec4.o  += -msoft-float
index 05947a2feb93c0fe41441c5252eb3b0d67fad9fd..7a10e1d1725817808c18d34ced45e232f10beae0 100644 (file)
@@ -404,7 +404,7 @@ static noinline int leaf_switch_2_none(unsigned long sp, bool fill,
  * These are expected to fail for most configurations because neither
  * GCC nor Clang have a way to perform initialization of variables in
  * non-code areas (i.e. in a switch statement before the first "case").
- * https://bugs.llvm.org/show_bug.cgi?id=44916
+ * https://llvm.org/pr44916
  */
 DEFINE_TEST_DRIVER(switch_1_none, uint64_t, SCALAR, ALWAYS_FAIL);
 DEFINE_TEST_DRIVER(switch_2_none, uint64_t, SCALAR, ALWAYS_FAIL);
index 238293b1dbe14b7603a1808eb29a00e65402407b..954af676d79ee848c3cdd5101d97d5590fd10506 100644 (file)
@@ -651,7 +651,7 @@ static struct kmem_cache *__init create_kmalloc_cache(const char *name,
 
 struct kmem_cache *
 kmalloc_caches[NR_KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1] __ro_after_init =
-{ /* initialization for https://bugs.llvm.org/show_bug.cgi?id=42570 */ };
+{ /* initialization for https://llvm.org/pr42570 */ };
 EXPORT_SYMBOL(kmalloc_caches);
 
 #ifdef CONFIG_RANDOM_KMALLOC_CACHES
index 2d7b7324295885e7a5ee70dd63b5dffd9a9a8968..9a1cb5079a7a0758b241f8425ea4153045e72d07 100644 (file)
@@ -5053,7 +5053,7 @@ void br_multicast_uninit_stats(struct net_bridge *br)
        free_percpu(br->mcast_stats);
 }
 
-/* noinline for https://bugs.llvm.org/show_bug.cgi?id=45802#c9 */
+/* noinline for https://llvm.org/pr45802#c9 */
 static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src)
 {
        dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX];
index 52c9af08ad35d3d31995337d4643b26c015f75ca..606a87c29a01703fa33956b02e043450f80d2568 100644 (file)
@@ -142,7 +142,7 @@ config HARDENED_USERCOPY
 config FORTIFY_SOURCE
        bool "Harden common str/mem functions against buffer overflows"
        depends on ARCH_HAS_FORTIFY_SOURCE
-       # https://bugs.llvm.org/show_bug.cgi?id=41459
+       # https://llvm.org/pr41459
        depends on !CC_IS_CLANG || CLANG_VERSION >= 120001
        # https://github.com/llvm/llvm-project/issues/53645
        depends on !CC_IS_CLANG || !X86_32