!v->IsParameter() in src/wasm/asm-wasm-builder.cc |
||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5256224933412864 Fuzzer: mbarbella_js_mutation Job Type: linux_asan_d8_v8_arm64_dbg Platform Id: linux Crash Type: CHECK failure Crash Address: Crash State: !v->IsParameter() in src/wasm/asm-wasm-builder.cc Regressed: V8: r36291:36292 Minimized Testcase (0.33 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv96iIQh0KuW1Qw7cigMFjlXcEbha_i_dqWeS1htKQaSOX_uH0rhEyy8iu39vCduVqYuUuPBVCdTuvB8-7SxuBgwB1pN2nd4JWyvtt4ZW9H0HW5ioX55U8P9yZWlhs5_lT4EOGzSd3pxHLd8tonRAGrgTJtY8FQ function __f_41(stdlib, __v_35) { "use asm"; __v_35 = __v_35; function __f_21(int_val, double_val) { int_val = int_val|0; double_val = +double_val; } return {__f_21:__f_21}; } function __f_10() { } var module = Wasm.instantiateModuleFromAsm(__f_41.toString()); ( { })(); (function __f_54() { })(); Filer: ishell See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Jun 20 2016
Aseem, please look into this one and see if you can repo + understand. Thanks!
,
Jun 20 2016
Issue 617614 has been merged into this issue.
,
Jun 20 2016
,
Jun 30 2016
This error is legitimate. The ffi can not be modified inside the module. However, the error occurs only in Debug mode. The typer should catch in release build.
,
Jul 11 2016
,
Jul 11 2016
ClusterFuzz has detected this issue as fixed in range 37652:37653. Detailed report: https://cluster-fuzz.appspot.com/testcase?key=5256224933412864 Fuzzer: mbarbella_js_mutation Job Type: linux_asan_d8_v8_arm64_dbg Platform Id: linux Crash Type: CHECK failure Crash Address: Crash State: !v->IsParameter() in asm-wasm-builder.cc Regressed: V8: r36291:36292 Fixed: V8: r37652:37653 Minimized Testcase (0.33 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv96q7VrfNvlDMHIi3C4EZvAgE7lXJxhe1Osaw7xDVdhoFiLivV7fIIK5z9AnejF1Qxwza8loo1OhJLVY0l9T45Kah8urtzwskwPvwsV7tecE3aUugzmICCDkBWeypc10XtgpNA6mhNc6ecaGldnu2N0JIK1Ryg?testcase_id=5256224933412864 (function () { })(); function __f_41(stdlib, __v_35) { "use asm"; __v_35 = __v_35; function __f_21(int_val, double_val) { int_val = int_val|0; double_val = +double_val; } return {__f_21:__f_21}; } function __f_10() { } var module = Wasm.instantiateModuleFromAsm(__f_41.toString()); ( { })(); See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
||||
►
Sign in to add a comment |
||||
Comment 1 by ishell@chromium.org
, May 23 2016Owner: titzer@chromium.org
Status: Assigned (was: Available)