Author: eugenezelenko Date: Wed Jan 23 12:39:07 2019 New Revision: 351976 URL: http://llvm.org/viewvc/llvm-project?rev=351976&view=rev Log: [Documentation] Use HTTPS whenever possible
Differential revision: https://reviews.llvm.org/D56946 Modified: cfe/trunk/docs/AutomaticReferenceCounting.rst cfe/trunk/docs/ClangFormatStyleOptions.rst cfe/trunk/docs/ControlFlowIntegrity.rst cfe/trunk/docs/ControlFlowIntegrityDesign.rst cfe/trunk/docs/ExternalClangExamples.rst cfe/trunk/docs/HardwareAssistedAddressSanitizerDesign.rst cfe/trunk/docs/HowToSetupToolingForLLVM.rst cfe/trunk/docs/InternalsManual.rst cfe/trunk/docs/IntroductionToTheClangAST.rst cfe/trunk/docs/JSONCompilationDatabase.rst cfe/trunk/docs/LanguageExtensions.rst cfe/trunk/docs/MSVCCompatibility.rst cfe/trunk/docs/PCHInternals.rst cfe/trunk/docs/SafeStack.rst cfe/trunk/docs/SanitizerCoverage.rst cfe/trunk/docs/Toolchain.rst cfe/trunk/docs/UndefinedBehaviorSanitizer.rst cfe/trunk/docs/UsersManual.rst cfe/trunk/docs/analyzer/DesignDiscussions/InitializerLists.rst Modified: cfe/trunk/docs/AutomaticReferenceCounting.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AutomaticReferenceCounting.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/AutomaticReferenceCounting.rst (original) +++ cfe/trunk/docs/AutomaticReferenceCounting.rst Wed Jan 23 12:39:07 2019 @@ -9,7 +9,7 @@ /* * Automatic numbering is described in this article: - * http://dev.opera.com/articles/view/automatic-numbering-with-css-counters/ + * https://dev.opera.com/articles/view/automatic-numbering-with-css-counters/ */ /* * Automatic numbering for the TOC. Modified: cfe/trunk/docs/ClangFormatStyleOptions.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ClangFormatStyleOptions.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/ClangFormatStyleOptions.rst (original) +++ cfe/trunk/docs/ClangFormatStyleOptions.rst Wed Jan 23 12:39:07 2019 @@ -137,13 +137,13 @@ the configuration (without a prefix: ``A <http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml>`_ * ``Chromium`` A style complying with `Chromium's style guide - <http://www.chromium.org/developers/coding-style>`_ + <https://www.chromium.org/developers/coding-style>`_ * ``Mozilla`` A style complying with `Mozilla's style guide <https://developer.mozilla.org/en-US/docs/Developer_Guide/Coding_Style>`_ * ``WebKit`` A style complying with `WebKit's style guide - <http://www.webkit.org/coding/coding-style.html>`_ + <https://www.webkit.org/coding/coding-style.html>`_ .. START_FORMAT_STYLE_OPTIONS @@ -1278,7 +1278,7 @@ the configuration (without a prefix: ``A used for ordering ``#includes``. `POSIX extended - <http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap09.html>`_ + <https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap09.html>`_ regular expressions are supported. These regular expressions are matched against the filename of an include Modified: cfe/trunk/docs/ControlFlowIntegrity.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ControlFlowIntegrity.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/ControlFlowIntegrity.rst (original) +++ cfe/trunk/docs/ControlFlowIntegrity.rst Wed Jan 23 12:39:07 2019 @@ -335,7 +335,7 @@ Please refer to the :doc:`design documen Publications ============ -`Control-Flow Integrity: Principles, Implementations, and Applications <http://research.microsoft.com/pubs/64250/ccs05.pdf>`_. +`Control-Flow Integrity: Principles, Implementations, and Applications <https://research.microsoft.com/pubs/64250/ccs05.pdf>`_. Martin Abadi, Mihai Budiu, Ãlfar Erlingsson, Jay Ligatti. `Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM <http://www.pcc.me.uk/~peter/acad/usenix14.pdf>`_. Modified: cfe/trunk/docs/ControlFlowIntegrityDesign.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ControlFlowIntegrityDesign.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/ControlFlowIntegrityDesign.rst (original) +++ cfe/trunk/docs/ControlFlowIntegrityDesign.rst Wed Jan 23 12:39:07 2019 @@ -92,7 +92,7 @@ The compiler relies on co-operation from the bit vectors for the whole program. It currently does this using LLVM's `type metadata`_ mechanism together with link-time optimization. -.. _address point: http://itanium-cxx-abi.github.io/cxx-abi/abi.html#vtable-general +.. _address point: https://itanium-cxx-abi.github.io/cxx-abi/abi.html#vtable-general .. _type metadata: https://llvm.org/docs/TypeMetadata.html .. _ByteArrayBuilder: https://llvm.org/docs/doxygen/html/structllvm_1_1ByteArrayBuilder.html @@ -746,7 +746,7 @@ RCFI does not protect `RET` instructions * embedded into other instructions (e.g. `0f4fc3 cmovg %ebx,%eax`). .. _SafeStack: https://clang.llvm.org/docs/SafeStack.html -.. _RFG: http://xlab.tencent.com/en/2016/11/02/return-flow-guard +.. _RFG: https://xlab.tencent.com/en/2016/11/02/return-flow-guard .. _Intel CET: https://software.intel.com/en-us/blogs/2016/06/09/intel-release-new-technology-specifications-protect-rop-attacks Hardware support Modified: cfe/trunk/docs/ExternalClangExamples.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ExternalClangExamples.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/ExternalClangExamples.rst (original) +++ cfe/trunk/docs/ExternalClangExamples.rst Wed Jan 23 12:39:07 2019 @@ -20,7 +20,7 @@ where Clang is used are: If you know of (or wrote!) a tool or project using Clang, please send an email to Clang's `development discussion mailing list -<http://lists.llvm.org/mailman/listinfo/cfe-dev>`_ to have it added. +<https://lists.llvm.org/mailman/listinfo/cfe-dev>`_ to have it added. (or if you are already a Clang contributor, feel free to directly commit additions). Since the primary purpose of this page is to provide examples that can help developers, generally they must have code available. @@ -33,7 +33,7 @@ List of projects and tools a persistent in-memory database of references, symbolnames, completions etc." -`<http://rprichard.github.com/sourceweb/>`_ +`<https://rprichard.github.com/sourceweb/>`_ "A C/C++ source code indexer and navigator" `<https://github.com/etaoins/qconnectlint>`_ @@ -42,7 +42,7 @@ List of projects and tools `<https://github.com/woboq/woboq_codebrowser>`_ "The Woboq Code Browser is a web-based code browser for C/C++ projects. - Check out `<http://code.woboq.org/>`_ for an example!" + Check out `<https://code.woboq.org/>`_ for an example!" `<https://github.com/mozilla/dxr>`_ "DXR is a source code cross-reference tool that uses static analysis Modified: cfe/trunk/docs/HardwareAssistedAddressSanitizerDesign.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/HardwareAssistedAddressSanitizerDesign.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/HardwareAssistedAddressSanitizerDesign.rst (original) +++ cfe/trunk/docs/HardwareAssistedAddressSanitizerDesign.rst Wed Jan 23 12:39:07 2019 @@ -162,7 +162,7 @@ Related Work * *TODO: add more "related work" links. Suggestions are welcome.* -.. _Watchdog: http://www.cis.upenn.edu/acg/papers/isca12_watchdog.pdf +.. _Watchdog: https://www.cis.upenn.edu/acg/papers/isca12_watchdog.pdf .. _Effective and Efficient Memory Protection Using Dynamic Tainting: https://www.cc.gatech.edu/~orso/papers/clause.doudalis.orso.prvulovic.pdf .. _SPARC ADI: https://lazytyped.blogspot.com/2017/09/getting-started-with-adi.html .. _AddressSanitizer paper: https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf Modified: cfe/trunk/docs/HowToSetupToolingForLLVM.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/HowToSetupToolingForLLVM.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/HowToSetupToolingForLLVM.rst (original) +++ cfe/trunk/docs/HowToSetupToolingForLLVM.rst Wed Jan 23 12:39:07 2019 @@ -23,7 +23,7 @@ Setup Clang Tooling Using CMake and Make ======================================== If you intend to use make to build LLVM, you should have CMake 2.8.6 or -later installed (can be found `here <http://cmake.org>`_). +later installed (can be found `here <https://cmake.org>`_). First, you need to generate Makefiles for LLVM with CMake. You need to make a build directory and run CMake from it: Modified: cfe/trunk/docs/InternalsManual.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/InternalsManual.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/InternalsManual.rst (original) +++ cfe/trunk/docs/InternalsManual.rst Wed Jan 23 12:39:07 2019 @@ -534,7 +534,7 @@ token. This concept maps directly to th ``SourceRange`` and ``CharSourceRange`` --------------------------------------- -.. mostly taken from http://lists.llvm.org/pipermail/cfe-dev/2010-August/010595.html +.. mostly taken from https://lists.llvm.org/pipermail/cfe-dev/2010-August/010595.html Clang represents most source ranges by [first, last], where "first" and "last" each point to the beginning of their respective tokens. For example consider @@ -1364,7 +1364,7 @@ constructed for function bodies (usually can also be instantiated to represent the control-flow of any class that subclasses ``Stmt``, which includes simple expressions. Control-flow graphs are especially useful for performing `flow- or path-sensitive -<http://en.wikipedia.org/wiki/Data_flow_analysis#Sensitivities>`_ program +<https://en.wikipedia.org/wiki/Data_flow_analysis#Sensitivities>`_ program analyses on a given function. Basic Blocks Modified: cfe/trunk/docs/IntroductionToTheClangAST.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/IntroductionToTheClangAST.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/IntroductionToTheClangAST.rst (original) +++ cfe/trunk/docs/IntroductionToTheClangAST.rst Wed Jan 23 12:39:07 2019 @@ -9,7 +9,7 @@ matchers. .. raw:: html - <center><iframe width="560" height="315" src="http://www.youtube.com/embed/VqCkCDFLSsc?vq=hd720" frameborder="0" allowfullscreen></iframe></center> + <center><iframe width="560" height="315" src="https://www.youtube.com/embed/VqCkCDFLSsc?vq=hd720" frameborder="0" allowfullscreen></iframe></center> `Slides <https://llvm.org/devmtg/2013-04/klimek-slides.pdf>`_ Modified: cfe/trunk/docs/JSONCompilationDatabase.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/JSONCompilationDatabase.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/JSONCompilationDatabase.rst (original) +++ cfe/trunk/docs/JSONCompilationDatabase.rst Wed Jan 23 12:39:07 2019 @@ -29,7 +29,7 @@ system is not necessarily the best solut Supported Systems ================= -Currently `CMake <http://cmake.org>`_ (since 2.8.5) supports generation +Currently `CMake <https://cmake.org>`_ (since 2.8.5) supports generation of compilation databases for Unix Makefile builds (Ninja builds in the works) with the option ``CMAKE_EXPORT_COMPILE_COMMANDS``. Modified: cfe/trunk/docs/LanguageExtensions.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/LanguageExtensions.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/LanguageExtensions.rst (original) +++ cfe/trunk/docs/LanguageExtensions.rst Wed Jan 23 12:39:07 2019 @@ -20,7 +20,7 @@ Introduction This document describes the language extensions provided by Clang. In addition to the language extensions listed here, Clang aims to support a broad range of GCC extensions. Please see the `GCC manual -<http://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on +<https://gcc.gnu.org/onlinedocs/gcc/C-Extensions.html>`_ for more information on these extensions. .. _langext-feature_check: @@ -1036,9 +1036,9 @@ the supported set of system headers, cur * The Microsoft standard C++ library Clang supports the `GNU C++ type traits -<http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the +<https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html>`_ and a subset of the `Microsoft Visual C++ Type traits -<http://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_. +<https://msdn.microsoft.com/en-us/library/ms177194(v=VS.100).aspx>`_. Feature detection is supported only for some of the primitives at present. User code should not use these checks because they bear no direct relation to the @@ -1354,7 +1354,7 @@ Objective-C retaining behavior attribute In Objective-C, functions and methods are generally assumed to follow the `Cocoa Memory Management -<http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_ +<https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/MemoryMgmt/Articles/mmRules.html>`_ conventions for ownership of object arguments and return values. However, there are exceptions, and so Clang provides attributes to allow these exceptions to be documented. This are used by ARC and the @@ -2218,7 +2218,7 @@ C++ Coroutines support builtins guaranteed. Clang provides experimental builtins to support C++ Coroutines as defined by -http://wg21.link/P0057. The following four are intended to be used by the +https://wg21.link/P0057. The following four are intended to be used by the standard library to implement `std::experimental::coroutine_handle` type. **Syntax**: @@ -2296,10 +2296,10 @@ Clang supports GCC's ``gnu`` attribute n are accepted with the ``__attribute__((foo))`` syntax are also accepted as ``[[gnu::foo]]``. This only extends to attributes which are specified by GCC (see the list of `GCC function attributes -<http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable -attributes <http://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and +<https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html>`_, `GCC variable +attributes <https://gcc.gnu.org/onlinedocs/gcc/Variable-Attributes.html>`_, and `GCC type attributes -<http://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC +<https://gcc.gnu.org/onlinedocs/gcc/Type-Attributes.html>`_). As with the GCC implementation, these attributes must appertain to the *declarator-id* in a declaration, which means they must go either at the start of the declaration or immediately after the name being declared. Modified: cfe/trunk/docs/MSVCCompatibility.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/MSVCCompatibility.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/MSVCCompatibility.rst (original) +++ cfe/trunk/docs/MSVCCompatibility.rst Wed Jan 23 12:39:07 2019 @@ -68,8 +68,8 @@ The status of major ABI-impacting C++ fe base class`_. Clang does not yet support this. .. _#pragma pointers_to_members: - http://msdn.microsoft.com/en-us/library/83cch5a6.aspx -.. _/vm: http://msdn.microsoft.com/en-us/library/yad46a6z.aspx + https://msdn.microsoft.com/en-us/library/83cch5a6.aspx +.. _/vm: https://msdn.microsoft.com/en-us/library/yad46a6z.aspx .. _pointer to a member of a virtual base class: https://llvm.org/PR15713 * Debug info: :good:`Mostly complete`. Clang emits relatively complete CodeView Modified: cfe/trunk/docs/PCHInternals.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/PCHInternals.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/PCHInternals.rst (original) +++ cfe/trunk/docs/PCHInternals.rst Wed Jan 23 12:39:07 2019 @@ -332,7 +332,7 @@ expression is stored as a separate recor size). Within the AST file, the subexpressions of an expression are stored, in reverse order, prior to the expression that owns those expression, using a form of `Reverse Polish Notation -<http://en.wikipedia.org/wiki/Reverse_Polish_notation>`_. For example, an +<https://en.wikipedia.org/wiki/Reverse_Polish_notation>`_. For example, an expression ``3 - 4 + 5`` would be represented as follows: +-----------------------+ Modified: cfe/trunk/docs/SafeStack.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/SafeStack.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/SafeStack.rst (original) +++ cfe/trunk/docs/SafeStack.rst Wed Jan 23 12:39:07 2019 @@ -18,14 +18,14 @@ buffer overflows on the unsafe stack can on the safe stack. SafeStack is a part of the `Code-Pointer Integrity (CPI) Project -<http://dslab.epfl.ch/proj/cpi/>`_. +<https://dslab.epfl.ch/proj/cpi/>`_. Performance ----------- The performance overhead of the SafeStack instrumentation is less than 0.1% on average across a variety of benchmarks (see the `Code-Pointer Integrity -<http://dslab.epfl.ch/pubs/cpi.pdf>`__ paper for details). This is mainly +<https://dslab.epfl.ch/pubs/cpi.pdf>`_ paper for details). This is mainly because most small functions do not have any variables that require the unsafe stack and, hence, do not need unsafe stack frames to be created. The cost of creating unsafe stack frames for large functions is amortized by the cost of @@ -84,9 +84,9 @@ Known security limitations A complete protection against control-flow hijack attacks requires combining SafeStack with another mechanism that enforces the integrity of code pointers that are stored on the heap or the unsafe stack, such as `CPI -<http://dslab.epfl.ch/proj/cpi/>`_, or a forward-edge control flow integrity +<https://dslab.epfl.ch/proj/cpi/>`_, or a forward-edge control flow integrity mechanism that enforces correct calling conventions at indirect call sites, -such as `IFCC <http://research.google.com/pubs/archive/42808.pdf>`_ with arity +such as `IFCC <https://research.google.com/pubs/archive/42808.pdf>`_ with arity checks. Clang has control-flow integrity protection scheme for :doc:`C++ virtual calls <ControlFlowIntegrity>`, but not non-virtual indirect calls. With SafeStack alone, an attacker can overwrite a function pointer on the heap or @@ -106,7 +106,7 @@ prevented by adjusting such functions to storing it in the heap (as already done e.g., by ``setjmp``/``longjmp`` implementation in glibc), or store it in a safe region instead. -The `CPI paper <http://dslab.epfl.ch/pubs/cpi.pdf>`_ describes two alternative, +The `CPI paper <https://dslab.epfl.ch/pubs/cpi.pdf>`_ describes two alternative, stronger safe stack protection mechanisms, that rely on software fault isolation, or hardware segmentation (as available on x86-32 and some x86-64 CPUs). @@ -186,14 +186,14 @@ Deprecated: This builtin function is an Design ====== -Please refer to the `Code-Pointer Integrity <http://dslab.epfl.ch/proj/cpi/>`__ +Please refer to the `Code-Pointer Integrity <https://dslab.epfl.ch/proj/cpi/>`_ project page for more information about the design of the SafeStack and its related technologies. setjmp and exception handling ----------------------------- -The `OSDI'14 paper <http://dslab.epfl.ch/pubs/cpi.pdf>`_ mentions that +The `OSDI'14 paper <https://dslab.epfl.ch/pubs/cpi.pdf>`_ mentions that on Linux the instrumentation pass finds calls to setjmp or functions that may throw an exception, and inserts required instrumentation at their call sites. Specifically, the instrumentation pass saves the shadow stack pointer @@ -204,7 +204,7 @@ in the function ``SafeStack::createStack Publications ------------ -`Code-Pointer Integrity <http://dslab.epfl.ch/pubs/cpi.pdf>`__. +`Code-Pointer Integrity <https://dslab.epfl.ch/pubs/cpi.pdf>`_. Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song. USENIX Symposium on Operating Systems Design and Implementation (`OSDI <https://www.usenix.org/conference/osdi14>`_), Broomfield, CO, October 2014 Modified: cfe/trunk/docs/SanitizerCoverage.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/SanitizerCoverage.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/SanitizerCoverage.rst (original) +++ cfe/trunk/docs/SanitizerCoverage.rst Wed Jan 23 12:39:07 2019 @@ -222,9 +222,9 @@ It contains 3 basic blocks, let's name t If blocks A, B, and C are all covered we know for certain that the edges A=>B and B=>C were executed, but we still don't know if the edge A=>C was executed. Such edges of control flow graph are called -`critical <http://en.wikipedia.org/wiki/Control_flow_graph#Special_edges>`_. The -edge-level coverage simply splits all critical -edges by introducing new dummy blocks and then instruments those blocks: +`critical <https://en.wikipedia.org/wiki/Control_flow_graph#Special_edges>`_. +The edge-level coverage simply splits all critical edges by introducing new +dummy blocks and then instruments those blocks: .. code-block:: none Modified: cfe/trunk/docs/Toolchain.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/Toolchain.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/Toolchain.rst (original) +++ cfe/trunk/docs/Toolchain.rst Wed Jan 23 12:39:07 2019 @@ -117,7 +117,7 @@ Clang can be configured to use one of se * GNU ld * GNU gold -* LLVM's `lld <http://lld.llvm.org>`_ +* LLVM's `lld <https://lld.llvm.org>`_ * MSVC's link.exe Link-time optimization is natively supported by lld, and supported via @@ -164,7 +164,7 @@ other targets, compiler-rt is used by de compiler-rt (LLVM) ^^^^^^^^^^^^^^^^^^ -`LLVM's compiler runtime library <http://compiler-rt.llvm.org/>`_ provides a +`LLVM's compiler runtime library <https://compiler-rt.llvm.org/>`_ provides a complete set of runtime library functions containing all functions that Clang will implicitly call, in ``libclang_rt.builtins.<arch>.a``. @@ -222,7 +222,7 @@ Unwind library The unwind library provides a family of ``_Unwind_*`` functions implementing the language-neutral stack unwinding portion of the Itanium C++ ABI -(`Level I <http://itanium-cxx-abi.github.io/cxx-abi/abi-eh.html#base-abi>`_). +(`Level I <https://itanium-cxx-abi.github.io/cxx-abi/abi-eh.html#base-abi>`_). It is a dependency of the C++ ABI library, and sometimes is a dependency of other runtimes. @@ -254,7 +254,7 @@ libunwind (nongnu.org) ^^^^^^^^^^^^^^^^^^^^^^ This is another implementation of the libunwind specification. -See `libunwind (nongnu.org) <http://www.nongnu.org/libunwind>`_. +See `libunwind (nongnu.org) <https://www.nongnu.org/libunwind>`_. libunwind (PathScale) ^^^^^^^^^^^^^^^^^^^^^ @@ -279,7 +279,7 @@ C standard library ------------------ Clang supports a wide variety of -`C standard library <http://en.cppreference.com/w/c>`_ +`C standard library <https://en.cppreference.com/w/c>`_ implementations. C++ ABI library @@ -288,9 +288,9 @@ C++ ABI library The C++ ABI library provides an implementation of the library portion of the Itanium C++ ABI, covering both the `support functionality in the main Itanium C++ ABI document -<http://itanium-cxx-abi.github.io/cxx-abi/abi.html>`_ and +<https://itanium-cxx-abi.github.io/cxx-abi/abi.html>`_ and `Level II of the exception handling support -<http://itanium-cxx-abi.github.io/cxx-abi/abi-eh.html#cxx-abi>`_. +<https://itanium-cxx-abi.github.io/cxx-abi/abi-eh.html#cxx-abi>`_. References to the functions and objects in this library are implicitly generated by Clang when compiling C++ code. @@ -306,7 +306,7 @@ available: libc++abi (LLVM) ^^^^^^^^^^^^^^^^ -`libc++abi <http://libcxxabi.llvm.org/>`_ is LLVM's implementation of this +`libc++abi <https://libcxxabi.llvm.org/>`_ is LLVM's implementation of this specification. libsupc++ (GNU) @@ -332,12 +332,12 @@ C++ standard library -------------------- Clang supports use of either LLVM's libc++ or GCC's libstdc++ implementation -of the `C++ standard library <http://en.cppreference.com/w/cpp>`_. +of the `C++ standard library <https://en.cppreference.com/w/cpp>`_. libc++ (LLVM) ^^^^^^^^^^^^^ -`libc++ <http://libcxx.llvm.org/>`_ is LLVM's implementation of the C++ +`libc++ <https://libcxx.llvm.org/>`_ is LLVM's implementation of the C++ standard library, aimed at being a complete implementation of the C++ standards from C++11 onwards. Modified: cfe/trunk/docs/UndefinedBehaviorSanitizer.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UndefinedBehaviorSanitizer.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/UndefinedBehaviorSanitizer.rst (original) +++ cfe/trunk/docs/UndefinedBehaviorSanitizer.rst Wed Jan 23 12:39:07 2019 @@ -338,4 +338,4 @@ More Information <http://blog.llvm.org/2011/05/what-every-c-programmer-should-know.html>`_ * From John Regehr's *Embedded in Academia* blog: `A Guide to Undefined Behavior in C and C++ - <http://blog.regehr.org/archives/213>`_ + <https://blog.regehr.org/archives/213>`_ Modified: cfe/trunk/docs/UsersManual.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UsersManual.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/UsersManual.rst (original) +++ cfe/trunk/docs/UsersManual.rst Wed Jan 23 12:39:07 2019 @@ -15,8 +15,8 @@ programming languages, aiming to be the these languages. Clang builds on the LLVM optimizer and code generator, allowing it to provide high-quality optimization and code generation support for many targets. For more general information, please see the -`Clang Web Site <http://clang.llvm.org>`_ or the `LLVM Web -Site <http://llvm.org>`_. +`Clang Web Site <https://clang.llvm.org>`_ or the `LLVM Web +Site <https://llvm.org>`_. This document describes important notes about using Clang as a compiler for an end-user, documenting the supported features, command line @@ -994,7 +994,7 @@ information. Precompiled Headers ------------------- -`Precompiled headers <http://en.wikipedia.org/wiki/Precompiled_header>`__ +`Precompiled headers <https://en.wikipedia.org/wiki/Precompiled_header>`_ are a general approach employed by many compilers to reduce compilation time. The underlying motivation of the approach is that it is common for the same (and often large) header files to be included by multiple @@ -1482,7 +1482,7 @@ usual build cycle when using sample prof 3. Convert the collected profile data to LLVM's sample profile format. This is currently supported via the AutoFDO converter ``create_llvm_prof``. - It is available at http://github.com/google/autofdo. Once built and + It is available at https://github.com/google/autofdo. Once built and installed, you can convert the ``perf.data`` file to LLVM using the command: @@ -1521,12 +1521,12 @@ read by the backend. LLVM supports three 2. Binary encoding. This uses a more efficient encoding that yields smaller profile files. This is the format generated by the ``create_llvm_prof`` tool - in http://github.com/google/autofdo. + in https://github.com/google/autofdo. 3. GCC encoding. This is based on the gcov format, which is accepted by GCC. It is only interesting in environments where GCC and Clang co-exist. This encoding is only generated by the ``create_gcov`` tool in - http://github.com/google/autofdo. It can be read by LLVM and + https://github.com/google/autofdo. It can be read by LLVM and ``llvm-profdata``, but it cannot be generated by either. If you are using Linux Perf to generate sampling profiles, you can use the @@ -1831,9 +1831,9 @@ The profile remapping file is a text fil where ``fragmentkind`` is one of ``name``, ``type``, or ``encoding``, indicating whether the following mangled name fragments are -<`name <http://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.name>`_>s, -<`type <http://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.type>`_>s, or -<`encoding <http://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.encoding>`_>s, +<`name <https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.name>`_>s, +<`type <https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.type>`_>s, or +<`encoding <https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangle.encoding>`_>s, respectively. Blank lines and lines starting with ``#`` are ignored. @@ -2829,7 +2829,7 @@ compatibility with the Visual C++ compil To enable clang-cl to find system headers, libraries, and the linker when run from the command-line, it should be executed inside a Visual Studio Native Tools Command Prompt or a regular Command Prompt where the environment has been set -up using e.g. `vcvarsall.bat <http://msdn.microsoft.com/en-us/library/f2ccy3wt.aspx>`_. +up using e.g. `vcvarsall.bat <https://msdn.microsoft.com/en-us/library/f2ccy3wt.aspx>`_. clang-cl can also be used from inside Visual Studio by selecting the LLVM Platform Toolset. The toolset is not part of the installer, but may be installed Modified: cfe/trunk/docs/analyzer/DesignDiscussions/InitializerLists.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/analyzer/DesignDiscussions/InitializerLists.rst?rev=351976&r1=351975&r2=351976&view=diff ============================================================================== --- cfe/trunk/docs/analyzer/DesignDiscussions/InitializerLists.rst (original) +++ cfe/trunk/docs/analyzer/DesignDiscussions/InitializerLists.rst Wed Jan 23 12:39:07 2019 @@ -145,7 +145,7 @@ value in different moments of time, but actual metadata value. So we'd be escaping more stuff than necessary. If only we had "ghost fields" -(http://lists.llvm.org/pipermail/cfe-dev/2016-May/049000.html), it would have +(https://lists.llvm.org/pipermail/cfe-dev/2016-May/049000.html), it would have been much easier, because the ghost field would only contain the actual metadata, and the Store would always know about it. This example adds to my belief that ghost fields are exactly what we need for most C++ checkers. _______________________________________________ cfe-commits mailing list cfe-commits@lists.llvm.org https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits