[llvm-bugs] Issue 3695 in oss-fuzz: llvm/llvm-isel-fuzzer--aarch64-gisel: Direct-leak in llvm::MDTuple::getImpl
monor… via monorail via llvm-bugs
llvm-bugs at lists.llvm.org
Wed Nov 15 00:35:45 PST 2017
Comment #3 on issue 3695 by
monor... at clusterfuzz-external.iam.gserviceaccount.com:
llvm/llvm-isel-fuzzer--aarch64-gisel: Direct-leak in llvm::MDTuple::getImpl
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3695#c3
ClusterFuzz has detected this issue as fixed in range
201711140614:201711141648.
Detailed report: https://oss-fuzz.com/testcase?key=5260607780552704
Project: llvm
Fuzzer: libFuzzer_llvm_llvm-isel-fuzzer--aarch64-gisel
Fuzz target binary: llvm-isel-fuzzer--aarch64-gisel
Job Type: libfuzzer_asan_llvm
Platform Id: linux
Crash Type: Direct-leak
Crash Address:
Crash State:
llvm::MDTuple::getImpl
BitcodeReaderMetadataList::getMetadataFwdRef
llvm::MetadataLoader::MetadataLoaderImpl::getMetadataFwdRefOrLoad
Sanitizer: address (ASAN)
Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201710160455:201710190451
Fixed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201711140614:201711141648
Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5260607780552704
See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for
more information.
If you suspect that the result above is incorrect, try re-doing that job on
the test case report page.
--
You received this message because:
1. You were specifically CC'd on the issue
You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings
Reply to this email to add a comment.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20171115/cf01193c/attachment.html>
More information about the llvm-bugs
mailing list