llvm.org GIT mirror llvm / 138434e
Update some code.google.com links git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@318115 91177308-0d34-0410-b5e6-96231b3b80d8 Hans Wennborg 1 year, 11 months ago
7 changed file(s) with 11 addition(s) and 11 deletion(s). Raw diff Collapse all Expand all
202202 https://golang.org/doc/effective_go.html
203203
204204 .. _Go Code Review Comments:
205 https://code.google.com/p/go-wiki/wiki/CodeReviewComments
205 https://github.com/golang/go/wiki/CodeReviewComments
206206
207207 Mechanical Source Issues
208208 ========================
3737 // Currently we have only AddressSanitizer instrumentation, but we're
3838 // planning to implement MemorySanitizer for inline assembly too. If
3939 // you're not familiar with AddressSanitizer algorithm, please, read
40 // https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm.
40 // https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
4141 //
4242 // When inline assembly is parsed by an instance of X86AsmParser, all
4343 // instructions are emitted via EmitInstruction method. That's the
88 //
99 // This file is a part of AddressSanitizer, an address sanity checker.
1010 // Details of the algorithm:
11 // http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
11 // https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
1212 //
1313 //===----------------------------------------------------------------------===//
1414
16411641
16421642 // Callbacks put into the CRT initializer/terminator sections
16431643 // should not be instrumented.
1644 // See https://code.google.com/p/address-sanitizer/issues/detail?id=305
1644 // See https://github.com/google/sanitizers/issues/305
16451645 // and http://msdn.microsoft.com/en-US/en-en/library/bb918180(v=vs.120).aspx
16461646 if (Section.startswith(".CRT")) {
16471647 DEBUG(dbgs() << "Ignoring a global initializer callback: " << *G << "\n");
16641664 DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G << "\n");
16651665 return false;
16661666 }
1667 // See http://code.google.com/p/address-sanitizer/issues/detail?id=32
1667 // See https://github.com/google/sanitizers/issues/32
16681668 // Constant CFString instances are compiled in the following way:
16691669 // -- the string buffer is emitted into
16701670 // __TEXT,__cstring,cstring_literals
24952495 bool ChangedStack = FSP.runOnFunction();
24962496
24972497 // We must unpoison the stack before every NoReturn call (throw, _exit, etc).
2498 // See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37
2498 // See e.g. https://github.com/google/sanitizers/issues/37
24992499 for (auto CI : NoReturnCalls) {
25002500 IRBuilder<> IRB(CI);
25012501 IRB.CreateCall(AsanHandleNoReturnFunc, {});
29102910
29112911 void visitLandingPadInst(LandingPadInst &I) {
29122912 // Do nothing.
2913 // See http://code.google.com/p/memory-sanitizer/issues/detail?id=1
2913 // See https://github.com/google/sanitizers/issues/504
29142914 setShadow(&I, getCleanShadow(&I));
29152915 setOrigin(&I, getCleanOrigin());
29162916 }
0 ; RUN: opt < %s -basicaa -gvn -asan -asan-module -S | FileCheck %s
11 ; ASAN conflicts with load widening iff the widened load accesses data out of bounds
22 ; (while the original unwidened loads do not).
3 ; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1
3 ; https://github.com/google/sanitizers/issues/20#issuecomment-136381262
44
55
66 ; 32-bit little endian target.
44
55 ; Test that result origin is directy propagated from the argument,
66 ; and is not affected by all the literal undef operands.
7 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=56
7 ; https://github.com/google/sanitizers/issues/559
88
99 define <4 x i32> @Shuffle(<4 x i32> %x) nounwind uwtable sanitize_memory {
1010 entry:
1919
2020
2121 ; Regression test for origin propagation in "select i1, float, float".
22 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
22 ; https://github.com/google/sanitizers/issues/581
2323
2424 define float @SelectFloat(i1 %b, float %x, float %y) nounwind uwtable sanitize_memory {
2525 entry:
9191 ldflags := llvmConfig(args...)
9292 if runtime.GOOS != "darwin" {
9393 // OS X doesn't like -rpath with cgo. See:
94 // https://code.google.com/p/go/issues/detail?id=7293
94 // https://github.com/golang/go/issues/7293
9595 ldflags = "-Wl,-rpath," + llvmConfig("--libdir") + " " + ldflags
9696 }
9797 return compilerFlags{