forked from OSchip/llvm-project
[ASan] Fix the links to bugs and wikipages.
llvm-svn: 254735
This commit is contained in:
parent
8846017dd4
commit
00bddf6406
|
@ -23,4 +23,4 @@ from the root of your CMake build tree:
|
|||
make check-asan
|
||||
|
||||
For more instructions see:
|
||||
http://code.google.com/p/address-sanitizer/wiki/HowToBuild
|
||||
https://github.com/google/sanitizers/wiki/AddressSanitizerHowToBuild
|
||||
|
|
|
@ -178,7 +178,7 @@ DECLARE_REAL_AND_INTERCEPTOR(void, free, void *)
|
|||
} while (false)
|
||||
#define COMMON_INTERCEPTOR_BLOCK_REAL(name) REAL(name)
|
||||
// Strict init-order checking is dlopen-hostile:
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=178
|
||||
// https://github.com/google/sanitizers/issues/178
|
||||
#define COMMON_INTERCEPTOR_ON_DLOPEN(filename, flag) \
|
||||
if (flags()->strict_init_order) { \
|
||||
StopInitOrderChecking(); \
|
||||
|
|
|
@ -43,7 +43,7 @@ void InitializePlatformInterceptors() {}
|
|||
bool PlatformHasDifferentMemcpyAndMemmove() {
|
||||
// On OS X 10.7 memcpy() and memmove() are both resolved
|
||||
// into memmove$VARIANT$sse42.
|
||||
// See also http://code.google.com/p/address-sanitizer/issues/detail?id=34.
|
||||
// See also https://github.com/google/sanitizers/issues/34.
|
||||
// TODO(glider): need to check dynamically that memcpy() and memmove() are
|
||||
// actually the same function.
|
||||
return GetMacosVersion() == MACOS_VERSION_SNOW_LEOPARD;
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
#include "asan_internal.h"
|
||||
|
||||
// The full explanation of the memory mapping could be found here:
|
||||
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
|
||||
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
|
||||
//
|
||||
// Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000:
|
||||
// || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
using namespace __asan; // NOLINT
|
||||
|
||||
// This code has issues on OSX.
|
||||
// See https://code.google.com/p/address-sanitizer/issues/detail?id=131.
|
||||
// See https://github.com/google/sanitizers/issues/131.
|
||||
|
||||
// Fake std::nothrow_t to avoid including <new>.
|
||||
namespace std {
|
||||
|
|
|
@ -102,7 +102,7 @@ using namespace __asan; // NOLINT
|
|||
// that user program (un)poisons the memory it owns. It poisons memory
|
||||
// conservatively, and unpoisons progressively to make sure asan shadow
|
||||
// mapping invariant is preserved (see detailed mapping description here:
|
||||
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm).
|
||||
// https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm).
|
||||
//
|
||||
// * if user asks to poison region [left, right), the program poisons
|
||||
// at least [left, AlignDown(right)).
|
||||
|
@ -354,7 +354,7 @@ void __sanitizer_annotate_contiguous_container(const void *beg_p,
|
|||
// Make a quick sanity check that we are indeed in this state.
|
||||
//
|
||||
// FIXME: Two of these three checks are disabled until we fix
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=258.
|
||||
// https://github.com/google/sanitizers/issues/258.
|
||||
// if (d1 != d2)
|
||||
// CHECK_EQ(*(u8*)MemToShadow(d1), old_mid - d1);
|
||||
if (a + granularity <= d1)
|
||||
|
|
|
@ -605,7 +605,7 @@ void NOINLINE __asan_handle_no_return() {
|
|||
"stack top: %p; bottom %p; size: %p (%zd)\n"
|
||||
"False positive error reports may follow\n"
|
||||
"For details see "
|
||||
"http://code.google.com/p/address-sanitizer/issues/detail?id=189\n",
|
||||
"https://github.com/google/sanitizers/issues/189\n",
|
||||
top, bottom, top - bottom, top - bottom);
|
||||
return;
|
||||
}
|
||||
|
|
|
@ -12,8 +12,7 @@
|
|||
// This file defines a family of thunks that should be statically linked into
|
||||
// the DLLs that have ASan instrumentation in order to delegate the calls to the
|
||||
// shared runtime that lives in the main binary.
|
||||
// See https://code.google.com/p/address-sanitizer/issues/detail?id=209 for the
|
||||
// details.
|
||||
// See https://github.com/google/sanitizers/issues/209 for the details.
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
// Only compile this code when buidling asan_dll_thunk.lib
|
||||
|
|
|
@ -216,12 +216,12 @@ TEST(AddressSanitizerMac, NSObjectOOB) {
|
|||
|
||||
// Make sure that correct pointer is passed to free() when deallocating a
|
||||
// NSURL object.
|
||||
// See http://code.google.com/p/address-sanitizer/issues/detail?id=70.
|
||||
// See https://github.com/google/sanitizers/issues/70.
|
||||
TEST(AddressSanitizerMac, NSURLDeallocation) {
|
||||
TestNSURLDeallocation();
|
||||
}
|
||||
|
||||
// See http://code.google.com/p/address-sanitizer/issues/detail?id=109.
|
||||
// See https://github.com/google/sanitizers/issues/109.
|
||||
TEST(AddressSanitizerMac, Mstats) {
|
||||
malloc_statistics_t stats1, stats2;
|
||||
malloc_zone_statistics(/*all zones*/NULL, &stats1);
|
||||
|
|
|
@ -610,7 +610,7 @@ NOINLINE void BuiltinLongJmpFunc1(jmp_buf buf) {
|
|||
}
|
||||
|
||||
// Does not work on Power and ARM:
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=185
|
||||
// https://github.com/google/sanitizers/issues/185
|
||||
TEST(AddressSanitizer, BuiltinLongJmpTest) {
|
||||
static jmp_buf buf;
|
||||
if (!__builtin_setjmp((void**)buf)) {
|
||||
|
@ -1156,9 +1156,9 @@ TEST(AddressSanitizer, AttributeNoSanitizeAddressTest) {
|
|||
// The new/delete/etc mismatch checks don't work on Android,
|
||||
// as calls to new/delete go through malloc/free.
|
||||
// OS X support is tracked here:
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=131
|
||||
// https://github.com/google/sanitizers/issues/131
|
||||
// Windows support is tracked here:
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=309
|
||||
// https://github.com/google/sanitizers/issues/309
|
||||
#if !defined(__ANDROID__) && \
|
||||
!defined(__APPLE__) && \
|
||||
!defined(_WIN32)
|
||||
|
@ -1255,7 +1255,7 @@ TEST(AddressSanitizer, DISABLED_DemoTooMuchMemoryTest) {
|
|||
}
|
||||
}
|
||||
|
||||
// http://code.google.com/p/address-sanitizer/issues/detail?id=66
|
||||
// https://github.com/google/sanitizers/issues/66
|
||||
TEST(AddressSanitizer, BufferOverflowAfterManyFrees) {
|
||||
for (int i = 0; i < 1000000; i++) {
|
||||
delete [] (Ident(new char [8644]));
|
||||
|
|
Loading…
Reference in New Issue