mirror of
https://github.com/RPCS3/llvm.git
synced 2024-11-27 05:30:29 +00:00
Update some code.google.com links
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@318115 91177308-0d34-0410-b5e6-96231b3b80d8
This commit is contained in:
parent
89cd192690
commit
138434e367
@ -203,7 +203,7 @@ this means are `Effective Go`_ and `Go Code Review Comments`_.
|
||||
https://golang.org/doc/effective_go.html
|
||||
|
||||
.. _Go Code Review Comments:
|
||||
https://code.google.com/p/go-wiki/wiki/CodeReviewComments
|
||||
https://github.com/golang/go/wiki/CodeReviewComments
|
||||
|
||||
Mechanical Source Issues
|
||||
========================
|
||||
|
@ -38,7 +38,7 @@
|
||||
// Currently we have only AddressSanitizer instrumentation, but we're
|
||||
// planning to implement MemorySanitizer for inline assembly too. If
|
||||
// you're not familiar with AddressSanitizer algorithm, please, read
|
||||
// https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm.
|
||||
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
|
||||
//
|
||||
// When inline assembly is parsed by an instance of X86AsmParser, all
|
||||
// instructions are emitted via EmitInstruction method. That's the
|
||||
|
@ -9,7 +9,7 @@
|
||||
//
|
||||
// This file is a part of AddressSanitizer, an address sanity checker.
|
||||
// Details of the algorithm:
|
||||
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
|
||||
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
|
||||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
@ -1642,7 +1642,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
|
||||
|
||||
// Callbacks put into the CRT initializer/terminator sections
|
||||
// should not be instrumented.
|
||||
// See https://code.google.com/p/address-sanitizer/issues/detail?id=305
|
||||
// See https://github.com/google/sanitizers/issues/305
|
||||
// and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx
|
||||
if (Section.startswith(".CRT")) {
|
||||
DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n");
|
||||
@ -1665,7 +1665,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
|
||||
DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n");
|
||||
return false;
|
||||
}
|
||||
// See http://code.google.com/p/address-sanitizer/issues/detail?id=32
|
||||
// See https://github.com/google/sanitizers/issues/32
|
||||
// Constant CFString instances are compiled in the following way:
|
||||
// -- the string buffer is emitted into
|
||||
// __TEXT,__cstring,cstring_literals
|
||||
@ -2496,7 +2496,7 @@ bool AddressSanitizer::runOnFunction(Function &F) {
|
||||
bool ChangedStack = FSP.runOnFunction();
|
||||
|
||||
// We must unpoison the stack before every NoReturn call (throw, _exit, etc).
|
||||
// See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37
|
||||
// See e.g. https://github.com/google/sanitizers/issues/37
|
||||
for (auto CI : NoReturnCalls) {
|
||||
IRBuilder<> IRB(CI);
|
||||
IRB.CreateCall(AsanHandleNoReturnFunc, {});
|
||||
|
@ -2911,7 +2911,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
|
||||
|
||||
void visitLandingPadInst(LandingPadInst &I) {
|
||||
// Do nothing.
|
||||
// See http://code.google.com/p/memory-sanitizer/issues/detail?id=1
|
||||
// See https://github.com/google/sanitizers/issues/504
|
||||
setShadow(&I, getCleanShadow(&I));
|
||||
setOrigin(&I, getCleanOrigin());
|
||||
}
|
||||
|
@ -1,7 +1,7 @@
|
||||
; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s
|
||||
; ASAN conflicts with load widening iff the widened load accesses data out of bounds
|
||||
; (while the original unwidened loads do not).
|
||||
; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1
|
||||
; https://github.com/google/sanitizers/issues/20#issuecomment-136381262
|
||||
|
||||
|
||||
; 32-bit little endian target.
|
||||
|
@ -5,7 +5,7 @@ target triple = "x86_64-unknown-linux-gnu"
|
||||
|
||||
; Test that result origin is directy propagated from the argument,
|
||||
; and is not affected by all the literal undef operands.
|
||||
; https://code.google.com/p/memory-sanitizer/issues/detail?id=56
|
||||
; https://github.com/google/sanitizers/issues/559
|
||||
|
||||
define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory {
|
||||
entry:
|
||||
@ -20,7 +20,7 @@ entry:
|
||||
|
||||
|
||||
; Regression test for origin propagation in "select i1, float, float".
|
||||
; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
|
||||
; https://github.com/google/sanitizers/issues/581
|
||||
|
||||
define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory {
|
||||
entry:
|
||||
|
@ -92,7 +92,7 @@ func llvmFlags() compilerFlags {
|
||||
ldflags := llvmConfig(args...)
|
||||
if runtime.GOOS != "darwin" {
|
||||
// OS X doesn't like -rpath with cgo. See:
|
||||
// https://code.google.com/p/go/issues/detail?id=7293
|
||||
// https://github.com/golang/go/issues/7293
|
||||
ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags
|
||||
}
|
||||
return compilerFlags{
|
||||
|
Loading…
Reference in New Issue
Block a user