Skip to content

Commit 08b34a0

Browse files
committed
Update some code.google.com links
llvm-svn: 318115
1 parent faf04a0 commit 08b34a0

File tree

7 files changed

+11
-11
lines changed

7 files changed

+11
-11
lines changed

llvm/docs/CodingStandards.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ this means are `Effective Go`_ and `Go Code Review Comments`_.
203203
https://golang.org/doc/effective_go.html
204204

205205
.. _Go Code Review Comments:
206-
https://code.google.com/p/go-wiki/wiki/CodeReviewComments
206+
https://github.com/golang/go/wiki/CodeReviewComments
207207

208208
Mechanical Source Issues
209209
========================

llvm/lib/Target/X86/AsmParser/X86AsmInstrumentation.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@
3838
// Currently we have only AddressSanitizer instrumentation, but we're
3939
// planning to implement MemorySanitizer for inline assembly too. If
4040
// you're not familiar with AddressSanitizer algorithm, please, read
41-
// https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm.
41+
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
4242
//
4343
// When inline assembly is parsed by an instance of X86AsmParser, all
4444
// instructions are emitted via EmitInstruction method. That's the

llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
//
1010
// This file is a part of AddressSanitizer, an address sanity checker.
1111
// Details of the algorithm:
12-
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
12+
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
1313
//
1414
//===----------------------------------------------------------------------===//
1515

@@ -1642,7 +1642,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
16421642

16431643
// Callbacks put into the CRT initializer/terminator sections
16441644
// should not be instrumented.
1645-
// See https://code.google.com/p/address-sanitizer/issues/detail?id=305
1645+
// See https://github.com/google/sanitizers/issues/305
16461646
// and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx
16471647
if (Section.startswith(".CRT")) {
16481648
DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n");
@@ -1665,7 +1665,7 @@ bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
16651665
DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n");
16661666
return false;
16671667
}
1668-
// See http://code.google.com/p/address-sanitizer/issues/detail?id=32
1668+
// See https://github.com/google/sanitizers/issues/32
16691669
// Constant CFString instances are compiled in the following way:
16701670
// -- the string buffer is emitted into
16711671
// __TEXT,__cstring,cstring_literals
@@ -2496,7 +2496,7 @@ bool AddressSanitizer::runOnFunction(Function &F) {
24962496
bool ChangedStack = FSP.runOnFunction();
24972497

24982498
// We must unpoison the stack before every NoReturn call (throw, _exit, etc).
2499-
// See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37
2499+
// See e.g. https://github.com/google/sanitizers/issues/37
25002500
for (auto CI : NoReturnCalls) {
25012501
IRBuilder<> IRB(CI);
25022502
IRB.CreateCall(AsanHandleNoReturnFunc, {});

llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2911,7 +2911,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
29112911

29122912
void visitLandingPadInst(LandingPadInst &I) {
29132913
// Do nothing.
2914-
// See http://code.google.com/p/memory-sanitizer/issues/detail?id=1
2914+
// See https://github.com/google/sanitizers/issues/504
29152915
setShadow(&I, getCleanShadow(&I));
29162916
setOrigin(&I, getCleanOrigin());
29172917
}

llvm/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s
22
; ASAN conflicts with load widening iff the widened load accesses data out of bounds
33
; (while the original unwidened loads do not).
4-
; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1
4+
; https://github.com/google/sanitizers/issues/20#issuecomment-136381262
55

66

77
; 32-bit little endian target.

llvm/test/Instrumentation/MemorySanitizer/missing_origin.ll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ target triple = "x86_64-unknown-linux-gnu"
55

66
; Test that result origin is directy propagated from the argument,
77
; and is not affected by all the literal undef operands.
8-
; https://code.google.com/p/memory-sanitizer/issues/detail?id=56
8+
; https://github.com/google/sanitizers/issues/559
99

1010
define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory {
1111
entry:
@@ -20,7 +20,7 @@ entry:
2020

2121

2222
; Regression test for origin propagation in "select i1, float, float".
23-
; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
23+
; https://github.com/google/sanitizers/issues/581
2424

2525
define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory {
2626
entry:

llvm/tools/llvm-go/llvm-go.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ func llvmFlags() compilerFlags {
9292
ldflags := llvmConfig(args...)
9393
if runtime.GOOS != "darwin" {
9494
// OS X doesn't like -rpath with cgo. See:
95-
// https://code.google.com/p/go/issues/detail?id=7293
95+
// https://github.com/golang/go/issues/7293
9696
ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags
9797
}
9898
return compilerFlags{

0 commit comments

Comments
 (0)