Crash in v8::internal::compiler::AddInputsToFrameStateDescriptor |
||||
Issue descriptionDetailed report: https://cluster-fuzz.appspot.com/testcase?key=5402257116102656 Fuzzer: mbarbella_js_mutation Job Type: windows_asan_d8 Platform Id: windows Crash Type: UNKNOWN READ Crash Address: 0x0000003c Crash State: v8::internal::compiler::AddInputsToFrameStateDescriptor v8::internal::compiler::InstructionSelector::InitializeCallBuffer v8::internal::compiler::InstructionSelector::VisitCall Regressed: https://cluster-fuzz.appspot.com/revisions?job=windows_asan_d8&range=415042:415049 Minimized Testcase (0.09 Kb): Download: https://cluster-fuzz.appspot.com/download/AMIfv97h0XDrB0UknHekR5TuE1ebCrklyTTC7m8r6YhSTxuJ2amr2uiOHUl2Xn9C0eECzdJ1laKtO7YdM2qai9LrHHALKfouLLgogt2S3uepZ5n6vo2GNEcpy7wQaq2N6eMTXJt9HanxUr9m1-YECq1w2K7atp-CSw?testcase_id=5402257116102656 "use strict"; var __v_0 = 0; __v_0 = (async () => { return JSON.stringify() }); __v_0(); Issue manually filed by: mummareddy See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Sep 2 2016
sigurds @ could you please look into this.please feel free to re-assigned back if needed. thanks in advance !
,
Nov 22 2016
Removing EditIssue view restrictions from ClusterFuzz filed bugs. If you believe that this issue should still be restricted, please reapply the label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Dec 22 2016
ClusterFuzz testcase 5402257116102656 is flaky and no longer reproduces, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue. |
||||
►
Sign in to add a comment |
||||
Comment 1 by brajkumar@chromium.org
, Sep 1 2016