[llvm] r318115 - Update some code.google.com links

Hans Wennborg via llvm-commits llvm-commits at lists.llvm.org
Mon Nov 13 15:47:58 PST 2017


Author: hans
Date: Mon Nov 13 15:47:58 2017
New Revision: 318115

URL: http://llvm.org/viewvc/llvm-project?rev=318115&view=rev
Log:
Update some code.google.com links

Modified:
    llvm/trunk/docs/CodingStandards.rst
    llvm/trunk/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp
    llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp
    llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp
    llvm/trunk/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll
    llvm/trunk/test/Instrumentation/MemorySanitizer/missing_origin.ll
    llvm/trunk/tools/llvm-go/llvm-go.go

Modified: llvm/trunk/docs/CodingStandards.rst
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/docs/CodingStandards.rst?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/docs/CodingStandards.rst (original)
+++ llvm/trunk/docs/CodingStandards.rst Mon Nov 13 15:47:58 2017
@@ -203,7 +203,7 @@ this means are `Effective Go`_ and `Go C
   https://golang.org/doc/effective_go.html
 
 .. _Go Code Review Comments:
-  https://code.google.com/p/go-wiki/wiki/CodeReviewComments
+  https://github.com/golang/go/wiki/CodeReviewComments
 
 Mechanical Source Issues
 ========================

Modified: llvm/trunk/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp (original)
+++ llvm/trunk/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp Mon Nov 13 15:47:58 2017
@@ -38,7 +38,7 @@
 // Currently we have only AddressSanitizer instrumentation, but we're
 // planning to implement MemorySanitizer for inline assembly too. If
 // you're not familiar with AddressSanitizer algorithm, please, read
-// https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm.
+// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
 //
 // When inline assembly is parsed by an instance of X86AsmParser, all
 // instructions are emitted via EmitInstruction method. That's the

Modified: llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp (original)
+++ llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp Mon Nov 13 15:47:58 2017
@@ -9,7 +9,7 @@
 //
 // This file is a part of AddressSanitizer, an address sanity checker.
 // Details of the algorithm:
-//  http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
+//  https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
 //
 //===----------------------------------------------------------------------===//
 
@@ -1642,7 +1642,7 @@ bool AddressSanitizerModule::ShouldInstr
 
     // Callbacks put into the CRT initializer/terminator sections
     // should not be instrumented.
-    // See https://code.google.com/p/address-sanitizer/issues/detail?id=305
+    // See https://github.com/google/sanitizers/issues/305
     // and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx
     if (Section.startswith(".CRT")) {
       DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n");
@@ -1665,7 +1665,7 @@ bool AddressSanitizerModule::ShouldInstr
         DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n");
         return false;
       }
-      // See http://code.google.com/p/address-sanitizer/issues/detail?id=32
+      // See https://github.com/google/sanitizers/issues/32
       // Constant CFString instances are compiled in the following way:
       //  -- the string buffer is emitted into
       //     __TEXT,__cstring,cstring_literals
@@ -2496,7 +2496,7 @@ bool AddressSanitizer::runOnFunction(Fun
   bool ChangedStack = FSP.runOnFunction();
 
   // We must unpoison the stack before every NoReturn call (throw, _exit, etc).
-  // See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37
+  // See e.g. https://github.com/google/sanitizers/issues/37
   for (auto CI : NoReturnCalls) {
     IRBuilder<> IRB(CI);
     IRB.CreateCall(AsanHandleNoReturnFunc, {});

Modified: llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp (original)
+++ llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp Mon Nov 13 15:47:58 2017
@@ -2911,7 +2911,7 @@ struct MemorySanitizerVisitor : public I
 
   void visitLandingPadInst(LandingPadInst &I) {
     // Do nothing.
-    // See http://code.google.com/p/memory-sanitizer/issues/detail?id=1
+    // See https://github.com/google/sanitizers/issues/504
     setShadow(&I, getCleanShadow(&I));
     setOrigin(&I, getCleanOrigin());
   }

Modified: llvm/trunk/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll (original)
+++ llvm/trunk/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll Mon Nov 13 15:47:58 2017
@@ -1,7 +1,7 @@
 ; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s
 ; ASAN conflicts with load widening iff the widened load accesses data out of bounds
 ; (while the original unwidened loads do not).
-; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1
+; https://github.com/google/sanitizers/issues/20#issuecomment-136381262
 
 
 ; 32-bit little endian target.

Modified: llvm/trunk/test/Instrumentation/MemorySanitizer/missing_origin.ll
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/test/Instrumentation/MemorySanitizer/missing_origin.ll?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/test/Instrumentation/MemorySanitizer/missing_origin.ll (original)
+++ llvm/trunk/test/Instrumentation/MemorySanitizer/missing_origin.ll Mon Nov 13 15:47:58 2017
@@ -5,7 +5,7 @@ target triple = "x86_64-unknown-linux-gn
 
 ; Test that result origin is directy propagated from the argument,
 ; and is not affected by all the literal undef operands.
-; https://code.google.com/p/memory-sanitizer/issues/detail?id=56
+; https://github.com/google/sanitizers/issues/559
 
 define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory {
 entry:
@@ -20,7 +20,7 @@ entry:
 
 
 ; Regression test for origin propagation in "select i1, float, float".
-; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
+; https://github.com/google/sanitizers/issues/581
 
 define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory {
 entry:

Modified: llvm/trunk/tools/llvm-go/llvm-go.go
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/tools/llvm-go/llvm-go.go?rev=318115&r1=318114&r2=318115&view=diff
==============================================================================
--- llvm/trunk/tools/llvm-go/llvm-go.go (original)
+++ llvm/trunk/tools/llvm-go/llvm-go.go Mon Nov 13 15:47:58 2017
@@ -92,7 +92,7 @@ func llvmFlags() compilerFlags {
 	ldflags := llvmConfig(args...)
 	if runtime.GOOS != "darwin" {
 		// OS X doesn't like -rpath with cgo. See:
-		// https://code.google.com/p/go/issues/detail?id=7293
+		// https://github.com/golang/go/issues/7293
 		ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags
 	}
 	return compilerFlags{




More information about the llvm-commits mailing list