Update some code.google.com links

llvm-svn: 318115
This commit is contained in:
Hans Wennborg 2017-11-13 23:47:58 +00:00
parent faf04a09f6
commit 08b34a017a
7 changed files with 11 additions and 11 deletions

View File

@ -203,7 +203,7 @@ this means are `Effective Go`_ and `Go Code Review Comments`_.
https://golang.org/doc/effective_go.html https://golang.org/doc/effective_go.html
.. _Go Code Review Comments: .. _Go Code Review Comments:
https://code.google.com/p/go-wiki/wiki/CodeReviewComments https://github.com/golang/go/wiki/CodeReviewComments
Mechanical Source Issues Mechanical Source Issues
======================== ========================

View File

@ -38,7 +38,7 @@
// Currently we have only AddressSanitizer instrumentation, but we're // Currently we have only AddressSanitizer instrumentation, but we're
// planning to implement MemorySanitizer for inline assembly too. If // planning to implement MemorySanitizer for inline assembly too. If
// you're not familiar with AddressSanitizer algorithm, please, read // you're not familiar with AddressSanitizer algorithm, please, read
// https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm. // https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
// //
// When inline assembly is parsed by an instance of X86AsmParser, all // When inline assembly is parsed by an instance of X86AsmParser, all
// instructions are emitted via EmitInstruction method. That's the // instructions are emitted via EmitInstruction method. That's the

View File

@ -9,7 +9,7 @@
// //
// This file is a part of AddressSanitizer, an address sanity checker. // This file is a part of AddressSanitizer, an address sanity checker.
// Details of the algorithm: // Details of the algorithm:
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm // https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
// //
//===----------------------------------------------------------------------===// //===----------------------------------------------------------------------===//
@ -1642,7 +1642,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
// Callbacks put into the CRT initializer/terminator sections // Callbacks put into the CRT initializer/terminator sections
// should not be instrumented. // should not be instrumented.
// See https://code.google.com/p/address-sanitizer/issues/detail?id=305 // See https://github.com/google/sanitizers/issues/305
// and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx // and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx
if (Section.startswith(".CRT")) { if (Section.startswith(".CRT")) {
DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n"); DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n");
@ -1665,7 +1665,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n"); DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n");
return false; return false;
} }
// See http://code.google.com/p/address-sanitizer/issues/detail?id=32 // See https://github.com/google/sanitizers/issues/32
// Constant CFString instances are compiled in the following way: // Constant CFString instances are compiled in the following way:
// -- the string buffer is emitted into // -- the string buffer is emitted into
// __TEXT,__cstring,cstring_literals // __TEXT,__cstring,cstring_literals
@ -2496,7 +2496,7 @@ bool AddressSanitizer::runOnFunction(Function &F) {
bool ChangedStack = FSP.runOnFunction(); bool ChangedStack = FSP.runOnFunction();
// We must unpoison the stack before every NoReturn call (throw, _exit, etc). // We must unpoison the stack before every NoReturn call (throw, _exit, etc).
// See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37 // See e.g. https://github.com/google/sanitizers/issues/37
for (auto CI : NoReturnCalls) { for (auto CI : NoReturnCalls) {
IRBuilder<> IRB(CI); IRBuilder<> IRB(CI);
IRB.CreateCall(AsanHandleNoReturnFunc, {}); IRB.CreateCall(AsanHandleNoReturnFunc, {});

View File

@ -2911,7 +2911,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
void visitLandingPadInst(LandingPadInst &I) { void visitLandingPadInst(LandingPadInst &I) {
// Do nothing. // Do nothing.
// See http://code.google.com/p/memory-sanitizer/issues/detail?id=1 // See https://github.com/google/sanitizers/issues/504
setShadow(&I, getCleanShadow(&I)); setShadow(&I, getCleanShadow(&I));
setOrigin(&I, getCleanOrigin()); setOrigin(&I, getCleanOrigin());
} }

View File

@ -1,7 +1,7 @@
; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s ; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s
; ASAN conflicts with load widening iff the widened load accesses data out of bounds ; ASAN conflicts with load widening iff the widened load accesses data out of bounds
; (while the original unwidened loads do not). ; (while the original unwidened loads do not).
; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1 ; https://github.com/google/sanitizers/issues/20#issuecomment-136381262
; 32-bit little endian target. ; 32-bit little endian target.

View File

@ -5,7 +5,7 @@ target triple = "x86_64-unknown-linux-gnu"
; Test that result origin is directy propagated from the argument, ; Test that result origin is directy propagated from the argument,
; and is not affected by all the literal undef operands. ; and is not affected by all the literal undef operands.
; https://code.google.com/p/memory-sanitizer/issues/detail?id=56 ; https://github.com/google/sanitizers/issues/559
define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory { define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory {
entry: entry:
@ -20,7 +20,7 @@ entry:
; Regression test for origin propagation in "select i1, float, float". ; Regression test for origin propagation in "select i1, float, float".
; https://code.google.com/p/memory-sanitizer/issues/detail?id=78 ; https://github.com/google/sanitizers/issues/581
define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory { define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory {
entry: entry:

View File

@ -92,7 +92,7 @@ func llvmFlags() compilerFlags {
ldflags := llvmConfig(args...) ldflags := llvmConfig(args...)
if runtime.GOOS != "darwin" { if runtime.GOOS != "darwin" {
// OS X doesn't like -rpath with cgo. See: // OS X doesn't like -rpath with cgo. See:
// https://code.google.com/p/go/issues/detail?id=7293 // https://github.com/golang/go/issues/7293
ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags
} }
return compilerFlags{ return compilerFlags{