CHECK failure: pc_->Mask(ExceptionMask) == HLT in simulator-arm64.cc |
||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5413426947162112 Fuzzer: mbarbella_js_mutation Job Type: linux_asan_d8_v8_arm64_dbg Platform Id: linux Crash Type: CHECK failure Crash Address: Crash State: pc_->Mask(ExceptionMask) == HLT in simulator-arm64.cc v8::internal::Simulator::VisitException ExecuteInstruction Sanitizer: address (ASAN) Regressed: V8: 45422:45423 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5413426947162112 Issue filed automatically. See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information.
,
May 23 2017
CF points to d53bffb26a66c558760626d2fddc498db8b35068. PTAL.
,
May 24 2017
Applying security view restrictions to all v8 CHECK/DCHECK failures. (CHECKs aren't security, but we have no way to distinguish these right now).
,
May 25 2017
,
May 29 2017
This is a harmless assertion violation, where the assertion is too strict. It does not affect release builds. Fix is on the way: https://chromium-review.googlesource.com/c/517102/.
,
May 29 2017
Issue 726401 has been merged into this issue.
,
May 31 2017
ClusterFuzz has detected this issue as fixed in range 45607:45608. Detailed report: https://clusterfuzz.com/testcase?key=5413426947162112 Fuzzer: mbarbella_js_mutation Job Type: linux_asan_d8_v8_arm64_dbg Platform Id: linux Crash Type: CHECK failure Crash Address: Crash State: pc_->Mask(ExceptionMask) == HLT in simulator-arm64.cc v8::internal::Simulator::VisitException ExecuteInstruction Sanitizer: address (ASAN) Regressed: V8: 45422:45423 Fixed: V8: 45607:45608 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5413426947162112 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
May 31 2017
ClusterFuzz has detected this issue as fixed in range 45607:45608. Detailed report: https://clusterfuzz.com/testcase?key=6048784999251968 Fuzzer: mbarbella_js_mutation Job Type: linux_asan_d8_v8_arm64_dbg Platform Id: linux Crash Type: CHECK failure Crash Address: Crash State: pc_->Mask(ExceptionMask) == HLT in simulator-arm64.cc v8::internal::Simulator::VisitException ExecuteInstruction Sanitizer: address (ASAN) Regressed: V8: 45422:45423 Fixed: V8: 45607:45608 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6048784999251968 See https://dev.chromium.org/Home/chromium-security/bugs/reproducing-clusterfuzz-bugs for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
May 31 2017
ClusterFuzz testcase 5232292120494080 is verified as fixed, so closing issue. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
May 31 2017
The following revision refers to this bug: https://chromium.googlesource.com/v8/v8.git/+/ec411b5de29799fa11118f225c5eef58746c32d3 commit ec411b5de29799fa11118f225c5eef58746c32d3 Author: Tobias Tebbi <tebbi@chromium.org> Date: Wed May 31 08:28:20 2017 [builtins] Fix assertion in %TypedArray%.prototype.map The assertion was too strict, not matching the check in JSTypedArray::Create. Delete the TODO because the code does not actually rely on the assertion for safety: EmitElementStore always performs a length check. Drive-by-fix: KeyedAccessStoreMode::STANDARD_STORE is equally safe and does one comparison less. Bug: chromium:724889 Change-Id: I988a4eb6ad36d35143a008f7289b075f5c05e7ed Reviewed-on: https://chromium-review.googlesource.com/517102 Reviewed-by: Daniel Clifford <danno@chromium.org> Commit-Queue: Tobias Tebbi <tebbi@chromium.org> Cr-Commit-Position: refs/heads/master@{#45617} [modify] https://crrev.com/ec411b5de29799fa11118f225c5eef58746c32d3/src/builtins/builtins-array-gen.cc |
||||||
►
Sign in to add a comment |
||||||
Comment 1 by ClusterFuzz
, May 23 2017