diff options
author | Hans Wennborg <hans@hanshq.net> | 2017-11-13 23:47:58 +0000 |
---|---|---|
committer | Hans Wennborg <hans@hanshq.net> | 2017-11-13 23:47:58 +0000 |
commit | 08b34a017a01cb66f55a34bd55f68704c0dd8840 (patch) | |
tree | 181facf35928ac18ed3517c6dbf13e3c7c0a6361 | |
parent | Revert "Update test_debuginfo.pl script to point to new tree location." (diff) | |
download | llvm-project-08b34a017a01cb66f55a34bd55f68704c0dd8840.tar.gz llvm-project-08b34a017a01cb66f55a34bd55f68704c0dd8840.tar.bz2 llvm-project-08b34a017a01cb66f55a34bd55f68704c0dd8840.zip |
Update some code.google.com links
llvm-svn: 318115
7 files changed, 11 insertions, 11 deletions
diff --git a/llvm/docs/CodingStandards.rst b/llvm/docs/CodingStandards.rst index 0de2fc6b1a8b..231c034be19d 100644 --- a/llvm/docs/CodingStandards.rst +++ b/llvm/docs/CodingStandards.rst @@ -203,7 +203,7 @@ this means are `Effective Go`_ and `Go Code Review Comments`_. https://golang.org/doc/effective_go.html .. _Go Code Review Comments: - https://code.google.com/p/go-wiki/wiki/CodeReviewComments + https://github.com/golang/go/wiki/CodeReviewComments Mechanical Source Issues ======================== diff --git a/llvm/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp b/llvm/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp index 58978a2a930b..1c38757b4b03 100644 --- a/llvm/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp +++ b/llvm/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp @@ -38,7 +38,7 @@ // Currently we have only AddressSanitizer instrumentation, but we're // planning to implement MemorySanitizer for inline assembly too. If // you're not familiar with AddressSanitizer algorithm, please, read -// https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm. +// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm // // When inline assembly is parsed by an instance of X86AsmParser, all // instructions are emitted via EmitInstruction method. That's the diff --git a/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp b/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp index 33e0206e6041..d2e15ee649d1 100644 --- a/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp +++ b/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp @@ -9,7 +9,7 @@ // // This file is a part of AddressSanitizer, an address sanity checker. // Details of the algorithm: -// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm +// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm // //===----------------------------------------------------------------------===// @@ -1642,7 +1642,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) { // Callbacks put into the CRT initializer/terminator sections // should not be instrumented. - // See https://code.google.com/p/address-sanitizer/issues/detail?id=305 + // See https://github.com/google/sanitizers/issues/305 // and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx if (Section.startswith(".CRT")) { DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n"); @@ -1665,7 +1665,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) { DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n"); return false; } - // See http://code.google.com/p/address-sanitizer/issues/detail?id=32 + // See https://github.com/google/sanitizers/issues/32 // Constant CFString instances are compiled in the following way: // -- the string buffer is emitted into // __TEXT,__cstring,cstring_literals @@ -2496,7 +2496,7 @@ bool AddressSanitizer::runOnFunction(Function &F) { bool ChangedStack = FSP.runOnFunction(); // We must unpoison the stack before every NoReturn call (throw, _exit, etc). - // See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37 + // See e.g. https://github.com/google/sanitizers/issues/37 for (auto CI : NoReturnCalls) { IRBuilder<> IRB(CI); IRB.CreateCall(AsanHandleNoReturnFunc, {}); diff --git a/llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp b/llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp index c8e772d9d840..424bd7f7880b 100644 --- a/llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp +++ b/llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp @@ -2911,7 +2911,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> { void visitLandingPadInst(LandingPadInst &I) { // Do nothing. - // See http://code.google.com/p/memory-sanitizer/issues/detail?id=1 + // See https://github.com/google/sanitizers/issues/504 setShadow(&I, getCleanShadow(&I)); setOrigin(&I, getCleanOrigin()); } diff --git a/llvm/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll b/llvm/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll index 052d56d21c0a..1d0897f2d0ca 100644 --- a/llvm/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll +++ b/llvm/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll @@ -1,7 +1,7 @@ ; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s ; ASAN conflicts with load widening iff the widened load accesses data out of bounds ; (while the original unwidened loads do not). -; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1 +; https://github.com/google/sanitizers/issues/20#issuecomment-136381262 ; 32-bit little endian target. diff --git a/llvm/test/Instrumentation/MemorySanitizer/missing_origin.ll b/llvm/test/Instrumentation/MemorySanitizer/missing_origin.ll index 08289ab67c66..0a18914d42a7 100644 --- a/llvm/test/Instrumentation/MemorySanitizer/missing_origin.ll +++ b/llvm/test/Instrumentation/MemorySanitizer/missing_origin.ll @@ -5,7 +5,7 @@ target triple = "x86_64-unknown-linux-gnu" ; Test that result origin is directy propagated from the argument, ; and is not affected by all the literal undef operands. -; https://code.google.com/p/memory-sanitizer/issues/detail?id=56 +; https://github.com/google/sanitizers/issues/559 define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory { entry: @@ -20,7 +20,7 @@ entry: ; Regression test for origin propagation in "select i1, float, float". -; https://code.google.com/p/memory-sanitizer/issues/detail?id=78 +; https://github.com/google/sanitizers/issues/581 define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory { entry: diff --git a/llvm/tools/llvm-go/llvm-go.go b/llvm/tools/llvm-go/llvm-go.go index 604509f83b9a..4d65de623462 100644 --- a/llvm/tools/llvm-go/llvm-go.go +++ b/llvm/tools/llvm-go/llvm-go.go @@ -92,7 +92,7 @@ func llvmFlags() compilerFlags { ldflags := llvmConfig(args...) if runtime.GOOS != "darwin" { // OS X doesn't like -rpath with cgo. See: - // https://code.google.com/p/go/issues/detail?id=7293 + // https://github.com/golang/go/issues/7293 ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags } return compilerFlags{ |