Updates:
Labels: ProjectAddressSanitizer
Comment by [email protected]:
(No comment was entered for this change.)
Affected issues:
issue 7: No redzones for weak symbols
http://code.google.com/p/address-sanitizer/issues/detail?id=7
issue 12: need to instrument thread-local globals
http://code.google.com/p/address-sanitizer/issues/detail?id=12
issue 16: symbolize stack traces using code from lldb
http://code.google.com/p/address-sanitizer/issues/detail?id=16
issue 73: Detect Use after destruction (but before free)
http://code.google.com/p/address-sanitizer/issues/detail?id=73
issue 78: asan needs more libc interceptors.
http://code.google.com/p/address-sanitizer/issues/detail?id=78
issue 79: ASan should print thread names.
http://code.google.com/p/address-sanitizer/issues/detail?id=79
issue 83: use @llvm.lifetime.start/end for more precise stack
use-after-scope detection
http://code.google.com/p/address-sanitizer/issues/detail?id=83
issue 88: A simple ObjC program crashes in objc_msgSend
http://code.google.com/p/address-sanitizer/issues/detail?id=88
issue 89: ASan needs to keep track of all the libraries loaded during the
process lifetime
http://code.google.com/p/address-sanitizer/issues/detail?id=89
issue 92: On mac asan_symbolize script does not symbolicate frames coming
from a dynamic library
http://code.google.com/p/address-sanitizer/issues/detail?id=92
issue 97: dr asan inlined strlen false positive in libfontconfig.so
http://code.google.com/p/address-sanitizer/issues/detail?id=97
issue 100: find unaligned partially OOB accesses
http://code.google.com/p/address-sanitizer/issues/detail?id=100
issue 112: MemsetWildAddressTest fails on Android
http://code.google.com/p/address-sanitizer/issues/detail?id=112
issue 114: When printing report on SEGV, disassemble the faulty
instruction and print accesses READ-or-WRITE and size
http://code.google.com/p/address-sanitizer/issues/detail?id=114
issue 116: Infinite recursion in the dynamic runtime on 10.8
http://code.google.com/p/address-sanitizer/issues/detail?id=116
issue 130: Make it possible for the users to disable checks in some
library wrappers
http://code.google.com/p/address-sanitizer/issues/detail?id=130
issue 131: asan should check malloc/delete or new/free mismatch
http://code.google.com/p/address-sanitizer/issues/detail?id=131
issue 137: consider using _Unwind unwinder instead of fast fp-based
unwinder as an option
http://code.google.com/p/address-sanitizer/issues/detail?id=137
issue 138: asan should support variable-sized alloca
http://code.google.com/p/address-sanitizer/issues/detail?id=138
issue 140: Custom unwinders for interpreted/jitted languages
http://code.google.com/p/address-sanitizer/issues/detail?id=140
issue 141: chrome, content_shell and DumpRenderTree fail to start on arm
linux because stack unwinding during malloc recording crashes
http://code.google.com/p/address-sanitizer/issues/detail?id=141
issue 142: introduce the Task concept
http://code.google.com/p/address-sanitizer/issues/detail?id=142
issue 147: asan false positive with -static-libstdc++ and exceptions
http://code.google.com/p/address-sanitizer/issues/detail?id=147
issue 148: failing to intercept strdup
http://code.google.com/p/address-sanitizer/issues/detail?id=148
issue 164: 400.perlbench is slower than 3x with asan
http://code.google.com/p/address-sanitizer/issues/detail?id=164
issue 165: Allocator [v2] works badly on 32-bit archs?
http://code.google.com/p/address-sanitizer/issues/detail?id=165
issue 166: ignore or warn on setrlimit(RLIMIT_AS)
http://code.google.com/p/address-sanitizer/issues/detail?id=166
issue 177: stack depot grows uncontrollably on chrome
http://code.google.com/p/address-sanitizer/issues/detail?id=177
issue 181: Find destruction-order problems in ASan
http://code.google.com/p/address-sanitizer/issues/detail?id=181
issue 185: BuiltinLongJmpTest fails on PowerPC
http://code.google.com/p/address-sanitizer/issues/detail?id=185
issue 186: strict_init_order=false mode of init-order checking doesn't
work on Darwin
http://code.google.com/p/address-sanitizer/issues/detail?id=186
issue 189: support swapcontext
http://code.google.com/p/address-sanitizer/issues/detail?id=189
issue 190: asan_symbolize.py should fall back to non-symbolized output if
no debug info is available
http://code.google.com/p/address-sanitizer/issues/detail?id=190
issue 191: Show stacks for unpoison & poison
http://code.google.com/p/address-sanitizer/issues/detail?id=191
issue 192: Handle assembly in sanitizer tools
http://code.google.com/p/address-sanitizer/issues/detail?id=192
issue 194: Global constructors in asan and msan runtime
http://code.google.com/p/address-sanitizer/issues/detail?id=194
issue 201: Let OSX users run uninstrumented executable with preloaded
ASan runtime
http://code.google.com/p/address-sanitizer/issues/detail?id=201
issue 204: NS_IsMainThread hits "heap-buffer-overflow read of size 4"
that is "located 0 bytes inside of 4-byte region"
http://code.google.com/p/address-sanitizer/issues/detail?id=204
issue 210: Use statically allocated shadow on 32-bit OSX
http://code.google.com/p/address-sanitizer/issues/detail?id=210
issue 212: report circular dependencies in leaked circular references
http://code.google.com/p/address-sanitizer/issues/detail?id=212
issue 213: LeakSanitizer spends a lot of time in StackDepotGet()
http://code.google.com/p/address-sanitizer/issues/detail?id=213
issue 215: Find init-order-fiasco caused by template instantiations
http://code.google.com/p/address-sanitizer/issues/detail?id=215
issue 216: Should be able to detect stack use-after-return bugs for
stacks of threads that have ended
http://code.google.com/p/address-sanitizer/issues/detail?id=216
issue 219: can we get rid of force_interface_symbols now?
http://code.google.com/p/address-sanitizer/issues/detail?id=219
issue 226: Revisit memcpy()/memmove() handling on OSX after we drop
support for 10.8
http://code.google.com/p/address-sanitizer/issues/detail?id=226
issue 231: implement memory tracing for heap objects
http://code.google.com/p/address-sanitizer/issues/detail?id=231
issue 236: Prohibit building with -fsanitize=address on OSX 10.6 and
before
http://code.google.com/p/address-sanitizer/issues/detail?id=236
issue 241: provide more information for unnamed temps
http://code.google.com/p/address-sanitizer/issues/detail?id=241
issue 244: Support pthread_setname_np
http://code.google.com/p/address-sanitizer/issues/detail?id=244
issue 246: Porting to a new target (AArch64)
http://code.google.com/p/address-sanitizer/issues/detail?id=246
issue 247: Support source fortification
http://code.google.com/p/address-sanitizer/issues/detail?id=247
issue 248: Intercept iconv on OSX
http://code.google.com/p/address-sanitizer/issues/detail?id=248
issue 249: Bad choice of aliased symbol name in symbolizer
http://code.google.com/p/address-sanitizer/issues/detail?id=249
issue 250: shmctl interceptor does not work in 32-bit mode
http://code.google.com/p/address-sanitizer/issues/detail?id=250
issue 252: DRASan fails to identify a thread
http://code.google.com/p/address-sanitizer/issues/detail?id=252
issue 253: Correctly handle the symbolizer pipe on fork()
http://code.google.com/p/address-sanitizer/issues/detail?id=253
issue 258: false negatives with throw/longjmp
http://code.google.com/p/address-sanitizer/issues/detail?id=258
issue 260: ASan breaks dead stripping
(-ffunction-sections/-Wl,-gc-section on Linux, -dead_strip on OSX)
http://code.google.com/p/address-sanitizer/issues/detail?id=260
issue 261: pthread_get_stacksize_np() returns incorrect value on Mac OS X
10.9
http://code.google.com/p/address-sanitizer/issues/detail?id=261
issue 262: Detect stack overflow in SEGV handler
http://code.google.com/p/address-sanitizer/issues/detail?id=262
issue 263: Android libc closes stdout/stdin/stderr before atexit()
handlers
http://code.google.com/p/address-sanitizer/issues/detail?id=263
issue 265: Miscalculation of ByteMap kSize1 for small mmap ranges on
iOS/AArch64
http://code.google.com/p/address-sanitizer/issues/detail?id=265
issue 269: comparison and difference on unrelated pointers
http://code.google.com/p/address-sanitizer/issues/detail?id=269
issue 271: cannot use ASAN w/shared-library code (JVM, JNI)
http://code.google.com/p/address-sanitizer/issues/detail?id=271
issue 272: Attempting double-free on IOS with SDL
http://code.google.com/p/address-sanitizer/issues/detail?id=272
issue 273: remove the limit of the number of ever existed threads in asan
http://code.google.com/p/address-sanitizer/issues/detail?id=273
issue 275: asan_symbolize.py does not work with Python3
http://code.google.com/p/address-sanitizer/issues/detail?id=275
issue 280: Assembly instrumentation: blacklist support
http://code.google.com/p/address-sanitizer/issues/detail?id=280
issue 281: Assembly instrumentation reports have non-unwindable stacks
http://code.google.com/p/address-sanitizer/issues/detail?id=281
issue 282: Assembly instrumentation: handle more instructions
http://code.google.com/p/address-sanitizer/issues/detail?id=282
issue 286: __sanitizer_sanitize functions should setup GOT pointer on i386
http://code.google.com/p/address-sanitizer/issues/detail?id=286
issue 287: Building on Snow Leopard without IOS support
http://code.google.com/p/address-sanitizer/issues/detail?id=287
issue 291: CoverSan mode
http://code.google.com/p/address-sanitizer/issues/detail?id=291
issue 295: make operator new more standard compliant
http://code.google.com/p/address-sanitizer/issues/detail?id=295
issue 298: all sanitizers need to intercept setenv/getenv
http://code.google.com/p/address-sanitizer/issues/detail?id=298
issue 299: asan should report line number for definitions of globals
http://code.google.com/p/address-sanitizer/issues/detail?id=299
issue 303: FB10/LLVM/CLANG3.5: Shadow memory range interleaves with an
existing memory mapping. ASan cannot proceed correctly. ABORTING.
http://code.google.com/p/address-sanitizer/issues/detail?id=303
issue 304: make unaligned pointers handling in LSan more useful
http://code.google.com/p/address-sanitizer/issues/detail?id=304
issue 307: Asm instrumentation does not preserve flags
http://code.google.com/p/address-sanitizer/issues/detail?id=307
issue 309: Enable malloc/delete/new/free mismatch checks on Windows
http://code.google.com/p/address-sanitizer/issues/detail?id=309
issue 310: Stack UAR flags not working on Chromium Mac build
http://code.google.com/p/address-sanitizer/issues/detail?id=310
issue 311: ASAN coverage missing DTORs and inline functions
http://code.google.com/p/address-sanitizer/issues/detail?id=311
issue 313: [libsanitizer] Fallback to llvm-symbolizer in PATH
http://code.google.com/p/address-sanitizer/issues/detail?id=313
issue 314: Left OOB accesses on new[]-allocated arrays with array cookies
are not detected
http://code.google.com/p/address-sanitizer/issues/detail?id=314
issue 315: LSan should be more helpful when unable to attach to threads
http://code.google.com/p/address-sanitizer/issues/detail?id=315
issue 316: Investigate lit test failures on Android
http://code.google.com/p/address-sanitizer/issues/detail?id=316
issue 318: support dlclose
http://code.google.com/p/address-sanitizer/issues/detail?id=318
issue 320: Unable to use asan_device_setup.sh on android
http://code.google.com/p/address-sanitizer/issues/detail?id=320
issue 321: CHECK failed: ... "((trace)) != (0)" (0x0, 0x0)
http://code.google.com/p/address-sanitizer/issues/detail?id=321
issue 322: Expose __sanitizer_symbolize_pc()
http://code.google.com/p/address-sanitizer/issues/detail?id=322
issue 324: Asan support for Chrome on Android
http://code.google.com/p/address-sanitizer/issues/detail?id=324
issue 325: Leak of size 0 reported as leak of size 1
http://code.google.com/p/address-sanitizer/issues/detail?id=325
issue 326: Android L regressions
http://code.google.com/p/address-sanitizer/issues/detail?id=326
issue 328: AddressSanitizer should support -MTd/-MDd runtimes
http://code.google.com/p/address-sanitizer/issues/detail?id=328
issue 329: Unable to sanitize system_server on android
http://code.google.com/p/address-sanitizer/issues/detail?id=329
issue 330: Support re-exec of sanitized executable with preloading
libasan on Linux and Android
http://code.google.com/p/address-sanitizer/issues/detail?id=330
issue 331: Problem with opendir / fstatfs in Firefox on Mac OSX
http://code.google.com/p/address-sanitizer/issues/detail?id=331
issue 332: [Windows] Revisit how the RTL handles multi-module apps
http://code.google.com/p/address-sanitizer/issues/detail?id=332
issue 333: Incomplete ASAN trace for heap use-after-free on a temporary
http://code.google.com/p/address-sanitizer/issues/detail?id=333
--
You received this message because you are listed in the owner
or CC fields of these issues, or because you starred them.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.