Updates:
        Labels: ProjectAddressSanitizer

Comment by ramosian.gli...@gmail.com:
Adding Project:AddressSanitizer as part of GitHub migration.

Affected issues:
  issue 334: ASan doesn't print stats after an LSan report
    http://code.google.com/p/address-sanitizer/issues/detail?id=334

issue 335: ASan with online symbolizer sometimes produces mangled function names
    http://code.google.com/p/address-sanitizer/issues/detail?id=335

  issue 339: ASAN and interaction with GNU Smalltalk JIT
    http://code.google.com/p/address-sanitizer/issues/detail?id=339

issue 340: FAIL: c-c++-common/asan/misalign-[12].c after r213807 on x86_64-apple-darwin13 with -m32
    http://code.google.com/p/address-sanitizer/issues/detail?id=340

  issue 341: Remove the (A|M|T|L)SAN_SYMBOLIZER_PATH env variables
    http://code.google.com/p/address-sanitizer/issues/detail?id=341

issue 342: Segfault in instrumented programs that use GNU indirect functions.
    http://code.google.com/p/address-sanitizer/issues/detail?id=342

  issue 343: asan_symbolize.py sometimes omits newlines in stack traces
    http://code.google.com/p/address-sanitizer/issues/detail?id=343

issue 345: Use Linux madvise(MADV_DONTDUMP) to exclude ASan shadow regions from core dumps
    http://code.google.com/p/address-sanitizer/issues/detail?id=345

  issue 346: moar string interceptors: strstr, strcasestr, strcspn, strpbrk
    http://code.google.com/p/address-sanitizer/issues/detail?id=346

  issue 348: asan does not always detect access beyond mmaped page
    http://code.google.com/p/address-sanitizer/issues/detail?id=348

  issue 349: [AArch64] Fix kernel_old_Xid_t type
    http://code.google.com/p/address-sanitizer/issues/detail?id=349

  issue 350: LLVM sanitizer-bootstrap bot failing
    http://code.google.com/p/address-sanitizer/issues/detail?id=350

  issue 351: adb randomly hangs on sanitizer-x86_64-linux bot
    http://code.google.com/p/address-sanitizer/issues/detail?id=351

  issue 352: False negative related to atomic operations
    http://code.google.com/p/address-sanitizer/issues/detail?id=352

  issue 353: Assembly instrumentation fails on Android-x86
    http://code.google.com/p/address-sanitizer/issues/detail?id=353

  issue 354: Handle memory accesses in intrinsics
    http://code.google.com/p/address-sanitizer/issues/detail?id=354

  issue 356: can not mask function in closed source library
    http://code.google.com/p/address-sanitizer/issues/detail?id=356

issue 359: Address sanitizer uses a larger stack size than sysconf(_SC_THREAD_STACK_MIN)
    http://code.google.com/p/address-sanitizer/issues/detail?id=359

  issue 361: CHECK failed (assert() tls + stack) on Linux in 32bit threaded
    http://code.google.com/p/address-sanitizer/issues/detail?id=361

  issue 362: Container-overflow false positive with uninstrumented code
    http://code.google.com/p/address-sanitizer/issues/detail?id=362

issue 365: On OS X when not re-execing, ASan overwrites already used memory
    http://code.google.com/p/address-sanitizer/issues/detail?id=365

  issue 370: Kernel compilation error when using KSAN
    http://code.google.com/p/address-sanitizer/issues/detail?id=370

  issue 371: Asan should check for overlapping strings in sprintf
    http://code.google.com/p/address-sanitizer/issues/detail?id=371

  issue 372: 2to3 dies on Clang 3.5's asan_symbolize.py
    http://code.google.com/p/address-sanitizer/issues/detail?id=372

  issue 373: LeakSanitizer fails to detect an "obvious" leak
    http://code.google.com/p/address-sanitizer/issues/detail?id=373

  issue 374: AddressSanitizer does not catch "obvious" bugs
    http://code.google.com/p/address-sanitizer/issues/detail?id=374

  issue 375: On OS X, stacktraces are broken after a report is printed
    http://code.google.com/p/address-sanitizer/issues/detail?id=375

issue 376: Missing unwind directives internal_clone may cause segfaults in slow unwinder
    http://code.google.com/p/address-sanitizer/issues/detail?id=376

  issue 377: unknown-crash with annotate_contiguous_container
    http://code.google.com/p/address-sanitizer/issues/detail?id=377

  issue 379: Leak sanitizer support for Android on arm64
    http://code.google.com/p/address-sanitizer/issues/detail?id=379

  issue 380: link error when LDFLAGS has -Wl,--no-undefined
    http://code.google.com/p/address-sanitizer/issues/detail?id=380

  issue 381: intercept strtod and friends
    http://code.google.com/p/address-sanitizer/issues/detail?id=381

issue 382: main thread's pthread destructors don't run before leak checker, when in gdb
    http://code.google.com/p/address-sanitizer/issues/detail?id=382

  issue 383: No redzone created before first global
    http://code.google.com/p/address-sanitizer/issues/detail?id=383

  issue 384: Avoid remounting system partition on Android
    http://code.google.com/p/address-sanitizer/issues/detail?id=384

issue 390: Compiling with AddressSanitizer using gcc ≥4.9 breaks printng some variables in gdb on Linux
    http://code.google.com/p/address-sanitizer/issues/detail?id=390

issue 391: AddressSanitizer: while reporting a bug found another one. Ignoring.
    http://code.google.com/p/address-sanitizer/issues/detail?id=391

  issue 392: [android] system property access from native code is going away
    http://code.google.com/p/address-sanitizer/issues/detail?id=392

  issue 393: Link libasan with -z interpose on Linux
    http://code.google.com/p/address-sanitizer/issues/detail?id=393

  issue 396: Support Android in asan_symbolize
    http://code.google.com/p/address-sanitizer/issues/detail?id=396

issue 398: Crash on ODR between instrumented and non-instrumented libraries
    http://code.google.com/p/address-sanitizer/issues/detail?id=398

  issue 400: Improve wild-free detection
    http://code.google.com/p/address-sanitizer/issues/detail?id=400

  issue 402: -fsanitize=address should probably imply -Bsymbolic
    http://code.google.com/p/address-sanitizer/issues/detail?id=402



--
You received this message because you are listed in the owner
or CC fields of these issues, or because you starred them.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to address-sanitizer+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to