V8 correctness failure in configs: x64,ignition:x64,ignition_asm |
||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6286367870156800 Fuzzer: foozzie_js_mutation Job Type: v8_foozzie Platform Id: linux Crash Type: V8 correctness failure Crash Address: Crash State: configs: x64,ignition:x64,ignition_asm sources: a74 Sanitizer: address (ASAN) Regressed: V8: 44685:44686 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6286367870156800 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
Apr 26 2017
The following revision refers to this bug: https://chromium.googlesource.com/v8/v8.git/+/8952aef167e73ceafc05bea4d2f8ff8cf7b6a2dd commit 8952aef167e73ceafc05bea4d2f8ff8cf7b6a2dd Author: Michael Starzinger <mstarzinger@chromium.org> Date: Wed Apr 26 14:53:09 2017 [asm.js] Fix numeric literal negation in multiplication. R=clemensh@chromium.org TEST=mjsunit/asm/int32-mul BUG= chromium:715482 Change-Id: I525e901fd6ade101999694a53d5147b6e4ccc2e5 Reviewed-on: https://chromium-review.googlesource.com/488024 Reviewed-by: Clemens Hammacher <clemensh@chromium.org> Commit-Queue: Michael Starzinger <mstarzinger@chromium.org> Cr-Commit-Position: refs/heads/master@{#44892} [modify] https://crrev.com/8952aef167e73ceafc05bea4d2f8ff8cf7b6a2dd/src/asmjs/asm-parser.cc [modify] https://crrev.com/8952aef167e73ceafc05bea4d2f8ff8cf7b6a2dd/src/asmjs/asm-parser.h [modify] https://crrev.com/8952aef167e73ceafc05bea4d2f8ff8cf7b6a2dd/test/mjsunit/asm/int32-mul.js
,
Apr 26 2017
,
Apr 27 2017
ClusterFuzz has detected this issue as fixed in range 44891:44892. Detailed report: https://clusterfuzz.com/testcase?key=6286367870156800 Fuzzer: foozzie_js_mutation Job Type: v8_foozzie Platform Id: linux Crash Type: V8 correctness failure Crash Address: Crash State: configs: x64,ignition:x64,ignition_asm sources: a74 Sanitizer: address (ASAN) Regressed: V8: 44685:44686 Fixed: V8: 44891:44892 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6286367870156800 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page. |
||
►
Sign in to add a comment |
||
Comment 1 by mstarzinger@chromium.org
, Apr 26 2017Owner: mstarzinger@chromium.org
Status: Assigned (was: Untriaged)
This is mine. Something bogus in the following expression: function Module() { "use asm"; function f() { return (0 | 0xffffffff) * -1 | 0xffff; } return { f:f }; } var m = Module(); print(m.f());