Updates:
        Labels: ProjectAddressSanitizer

Comment by [email protected]:
Adding Project:AddressSanitizer as part of GitHub migration.

Affected issues:
issue 1: Upgrade the LLVM code to avoid creating AVX instructions instead of SSE2 instructions
    http://code.google.com/p/address-sanitizer/issues/detail?id=1

  issue 2: Build failed on RHEL 5.6
    http://code.google.com/p/address-sanitizer/issues/detail?id=2

  issue 3: globals are broken if PIC and nonPIC objects are mixed:
    http://code.google.com/p/address-sanitizer/issues/detail?id=3

issue 4: Clang changes behaviour of MemIntrinsic functions before we instrument their arguments
    http://code.google.com/p/address-sanitizer/issues/detail?id=4

  issue 5: ASAN fails to link programs with -O0
    http://code.google.com/p/address-sanitizer/issues/detail?id=5

  issue 6: clang on CentOS
    http://code.google.com/p/address-sanitizer/issues/detail?id=6

  issue 8: implement adaptive redzones
    http://code.google.com/p/address-sanitizer/issues/detail?id=8

  issue 9: Asan logo is no longer relevant
    http://code.google.com/p/address-sanitizer/issues/detail?id=9

  issue 10: Some programs hang because of the replaced CFAllocator
    http://code.google.com/p/address-sanitizer/issues/detail?id=10

  issue 11: ASan instrumentation should work with -O0
    http://code.google.com/p/address-sanitizer/issues/detail?id=11

  issue 13: Clang+ASan incorrectly handles exceptions.
    http://code.google.com/p/address-sanitizer/issues/detail?id=13

  issue 14: warn on missing blacklist, better errmsg
    http://code.google.com/p/address-sanitizer/issues/detail?id=14

  issue 17: Blacklist regexp errors silently lead to blacklist not working
    http://code.google.com/p/address-sanitizer/issues/detail?id=17

issue 18: double-free / invalid-free errors should use Report instead of Printf
    http://code.google.com/p/address-sanitizer/issues/detail?id=18

  issue 19: asan false positives caused by dlcose
    http://code.google.com/p/address-sanitizer/issues/detail?id=19

  issue 20: Issue with -faddress-sanitizer in combination with -Os/-O2
    http://code.google.com/p/address-sanitizer/issues/detail?id=20

  issue 21: ASan unittest (32-bit) fail to link with fresh googletest
    http://code.google.com/p/address-sanitizer/issues/detail?id=21

  issue 22: mach_override may conflict with that in the client programs
    http://code.google.com/p/address-sanitizer/issues/detail?id=22

  issue 23: _Unwind_Backtrace cannot unwind past wrap___cxa_throw on Mac
    http://code.google.com/p/address-sanitizer/issues/detail?id=23

  issue 24: slow asan start-up on Mac 64-bit
    http://code.google.com/p/address-sanitizer/issues/detail?id=24

  issue 25: Add -C option to addr2line to de-mangle names
    http://code.google.com/p/address-sanitizer/issues/detail?id=25

  issue 26: get rid of sysinfo/sysinfo.cc
    http://code.google.com/p/address-sanitizer/issues/detail?id=26

  issue 27: CHECK fails on linux and program doesn't launch
    http://code.google.com/p/address-sanitizer/issues/detail?id=27

  issue 28: clang and clang++ behave differently on a small OOB test
    http://code.google.com/p/address-sanitizer/issues/detail?id=28

  issue 29: Deal with ASLR on Mac OS
    http://code.google.com/p/address-sanitizer/issues/detail?id=29

  issue 30: can't static link against gflags
    http://code.google.com/p/address-sanitizer/issues/detail?id=30

  issue 31: Debugging breakpoints needed
    http://code.google.com/p/address-sanitizer/issues/detail?id=31

  issue 32: Doesn't compile on OSX Lion (10.7)
    http://code.google.com/p/address-sanitizer/issues/detail?id=32

  issue 33: ASan doesn't instrument the +load methods
    http://code.google.com/p/address-sanitizer/issues/detail?id=33

  issue 34: ASan incorrectly wraps memmove on OS X Lion
    http://code.google.com/p/address-sanitizer/issues/detail?id=34

  issue 35: GCD tests are broken on Mac OS 10.6
    http://code.google.com/p/address-sanitizer/issues/detail?id=35

  issue 36: ASan allows incorrect reordering of memory accesses
    http://code.google.com/p/address-sanitizer/issues/detail?id=36

issue 37: ASan doesn't unpoison stack of subprocesses that share the same memory
    http://code.google.com/p/address-sanitizer/issues/detail?id=37

issue 38: crash on programs that link SenTestingKit (Apple's bundled unit testing framework)
    http://code.google.com/p/address-sanitizer/issues/detail?id=38

issue 39: Need to check that the shadow memory does not overlap with existing mappings
    http://code.google.com/p/address-sanitizer/issues/detail?id=39

  issue 40: Use portable macros for printing sizes, offsets, and addresses
    http://code.google.com/p/address-sanitizer/issues/detail?id=40

  issue 41: debug info problems
    http://code.google.com/p/address-sanitizer/issues/detail?id=41

  issue 42: __asan_handle_no_return undefined in lib for i386
    http://code.google.com/p/address-sanitizer/issues/detail?id=42

  issue 43: ASan requires /MTd linking on Windows
    http://code.google.com/p/address-sanitizer/issues/detail?id=43

  issue 44: AsanStackTrace::FastUnwindStack reads wild addresses
    http://code.google.com/p/address-sanitizer/issues/detail?id=44

  issue 45: compilation hangs with -faddress-sanitizer
    http://code.google.com/p/address-sanitizer/issues/detail?id=45

  issue 46: asan fails to unwind from memcmp
    http://code.google.com/p/address-sanitizer/issues/detail?id=46

  issue 47: RFC: ForkSanitizer
    http://code.google.com/p/address-sanitizer/issues/detail?id=47

  issue 48: [Windows] Clang doesn't give us debug info
    http://code.google.com/p/address-sanitizer/issues/detail?id=48

  issue 49: [Windows] Reports on global OOB accesses are not well tested yet
    http://code.google.com/p/address-sanitizer/issues/detail?id=49

  issue 50: To analyze: 464.h264ref OOBs under ASan on Windows
    http://code.google.com/p/address-sanitizer/issues/detail?id=50

issue 51: AddressSanitizerInterface.GetOwnershipStressTest is very slow on Mac
    http://code.google.com/p/address-sanitizer/issues/detail?id=51

  issue 52: [Windows] Can't create more than ~23K threads under ASan
    http://code.google.com/p/address-sanitizer/issues/detail?id=52

  issue 53: libxpc is corrupting ASan flags on Mac OS 10.7
    http://code.google.com/p/address-sanitizer/issues/detail?id=53

  issue 54: mach_override should check it hasn't wrapped the function yet
    http://code.google.com/p/address-sanitizer/issues/detail?id=54

  issue 55: [Windows] Clang++ support
    http://code.google.com/p/address-sanitizer/issues/detail?id=55

  issue 56: [Windows] Clang++ support
    http://code.google.com/p/address-sanitizer/issues/detail?id=56

  issue 57: CHECK failure on racy double-free
    http://code.google.com/p/address-sanitizer/issues/detail?id=57

  issue 58: asan crashes in jni
    http://code.google.com/p/address-sanitizer/issues/detail?id=58

  issue 59: Need to build the runtime library with -ffreestanding
    http://code.google.com/p/address-sanitizer/issues/detail?id=59

  issue 60: ASan should detect stack overflows
    http://code.google.com/p/address-sanitizer/issues/detail?id=60

  issue 61: Clang can't build NaCl decoder with -O1 and ASan enabled
    http://code.google.com/p/address-sanitizer/issues/detail?id=61

  issue 62: Slightly inefficient instrumentation of 1-byte accesses:
    http://code.google.com/p/address-sanitizer/issues/detail?id=62

  issue 63: ASan doesn't play well with vmmap on OS X 10.7
    http://code.google.com/p/address-sanitizer/issues/detail?id=63

issue 64: We need to use library interposition instead of mach_override on Mac OS.
    http://code.google.com/p/address-sanitizer/issues/detail?id=64

issue 65: Need to agree on the behavior of SEGV handlers in ASan, Chromium and NaCl
    http://code.google.com/p/address-sanitizer/issues/detail?id=65

  issue 66: "heap-use-after-free" is printed for buffer overflow bugs.
    http://code.google.com/p/address-sanitizer/issues/detail?id=66

issue 67: Assertion failed: (isa<X>(Val) && "cast<Ty>() argument of incompatible type!")
    http://code.google.com/p/address-sanitizer/issues/detail?id=67

  issue 68: quadratic compile time due to llvm::SpillPlacement::addLinks
    http://code.google.com/p/address-sanitizer/issues/detail?id=68

  issue 69: quadratic build time due to llvm::SpillPlacement::addLinks
    http://code.google.com/p/address-sanitizer/issues/detail?id=69

  issue 70: [OSX] Sometimes malloc is replaced but free is not
    http://code.google.com/p/address-sanitizer/issues/detail?id=70

issue 71: Unable to detect the Dangling pointer reference for the stacked variables...
    http://code.google.com/p/address-sanitizer/issues/detail?id=71

  issue 72: Sort out the dl_iterate_phdr code on Linux.
    http://code.google.com/p/address-sanitizer/issues/detail?id=72

  issue 74: asan should instrument rmw and cmpxchg
    http://code.google.com/p/address-sanitizer/issues/detail?id=74

  issue 75: asan should instrument calls via pointer
    http://code.google.com/p/address-sanitizer/issues/detail?id=75

  issue 76: std:size_t => std::size_t
    http://code.google.com/p/address-sanitizer/issues/detail?id=76

issue 77: AddressSanitizerInterface.GetOwnershipStressTest affects the run-time of other tests
    http://code.google.com/p/address-sanitizer/issues/detail?id=77

issue 80: Hybrid tools need to be able to identify compiler instrumented code
    http://code.google.com/p/address-sanitizer/issues/detail?id=80

  issue 81: CFAllocatorSetDefault is per-thread
    http://code.google.com/p/address-sanitizer/issues/detail?id=81

  issue 82: AddrIsAlignedByGranularity CHECK fails
    http://code.google.com/p/address-sanitizer/issues/detail?id=82

  issue 84: Non support for OSX Leopard (10.5)
    http://code.google.com/p/address-sanitizer/issues/detail?id=84

  issue 85: ASAN build binaries on fedora-17 x86_64 segfault
    http://code.google.com/p/address-sanitizer/issues/detail?id=85

issue 86: AddressSanitizerInterface.GetAllocatedSizeAndOwnershipTest is flaky
    http://code.google.com/p/address-sanitizer/issues/detail?id=86

  issue 87: CFRelease(kCFAllocatorSystemDefault) fails within __asan_init()
    http://code.google.com/p/address-sanitizer/issues/detail?id=87

  issue 90: ASan does not play well with the seccomp sandbox on Linux
    http://code.google.com/p/address-sanitizer/issues/detail?id=90

  issue 91: Symbolicated trace is sometimes off by one on Mac
    http://code.google.com/p/address-sanitizer/issues/detail?id=91

issue 93: Investigate occasional "WTF? should_instrument_==false in event_basic_block, module=`/lib/ld-2.11.1.so`" messages when running DRT on "full DRASan"
    http://code.google.com/p/address-sanitizer/issues/detail?id=93

issue 94: asan_interceptors.cc: strncmp does not call ENSURE_ASAN_INITED();
    http://code.google.com/p/address-sanitizer/issues/detail?id=94

  issue 95: Trouble to compile Firefox/ASan on Mountain Lion
    http://code.google.com/p/address-sanitizer/issues/detail?id=95

  issue 96: AddressSanitizer.StrCatOOBTest fails on Mountain Lion
    http://code.google.com/p/address-sanitizer/issues/detail?id=96

issue 98: -faddress-sanitizer causes program with large stack variable to segfault
    http://code.google.com/p/address-sanitizer/issues/detail?id=98

  issue 99: mz_free is called for non-allocated memory in Chromium tests
    http://code.google.com/p/address-sanitizer/issues/detail?id=99

  issue 101: find unaligned partially OOB accesses
    http://code.google.com/p/address-sanitizer/issues/detail?id=101

  issue 102: [Windows] malloc_uaf_crash is unstable on bot
    http://code.google.com/p/address-sanitizer/issues/detail?id=102

  issue 103: dispatch_sync() does not serialize when using asan
    http://code.google.com/p/address-sanitizer/issues/detail?id=103

  issue 104: Support RTL linked to both .exe and .dll
    http://code.google.com/p/address-sanitizer/issues/detail?id=104

  issue 105: -faddress-sanitizer doesn't work when used on ninja
    http://code.google.com/p/address-sanitizer/issues/detail?id=105

issue 106: ASan doesn't play well with the seccomp-bpf sandbox (check failed: proc_self_maps_buff_len_)
    http://code.google.com/p/address-sanitizer/issues/detail?id=106

  issue 107: ReserveShadowMemoryRange failed
    http://code.google.com/p/address-sanitizer/issues/detail?id=107

issue 108: asan should intercept printf family of functions and report unaddressable accesses to params
    http://code.google.com/p/address-sanitizer/issues/detail?id=108

  issue 109: mstats() crashes under ASan
    http://code.google.com/p/address-sanitizer/issues/detail?id=109

  issue 110: Slow compilation of ASan unittests in CMake debug build
    http://code.google.com/p/address-sanitizer/issues/detail?id=110

issue 111: error: undefined reference to '__asan_report_load4' (firefox 3.6 / ubuntu / 32bit
    http://code.google.com/p/address-sanitizer/issues/detail?id=111

  issue 113: Chrome base_unittests do not work with the dynamic runtime
    http://code.google.com/p/address-sanitizer/issues/detail?id=113



--
You received this message because you are listed in the owner
or CC fields of these issues, or because you starred them.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to