Stack-overflow in v8::internal::CheckObjectType |
||||||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=5784274577129472 Fuzzer: ochang_js_fuzzer Job Type: linux_asan_d8_dbg Platform Id: linux Crash Type: Stack-overflow Crash Address: 0x7fffae141fd8 Crash State: v8::internal::CheckObjectType Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=linux_asan_d8_dbg&range=46672:46673 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5784274577129472 Issue filed automatically. See https://github.com/google/clusterfuzz-tools for more information.
,
Oct 30 2017
This seems to be an infinite recursion without a Javascript stack-check. Here is a minimal repro:
var o = {};
var proxy = new Proxy(() => {}, o);
o.apply = proxy;
Function.prototype.call.call(proxy);
,
Oct 31 2017
Automatically applying components based on crash stacktrace and information from OWNERS files. If this is incorrect, please apply the Test-Predator-Wrong-Components label.
,
Nov 2 2017
The following revision refers to this bug: https://chromium.googlesource.com/v8/v8.git/+/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa commit 1e77461d62d40fc6a6576f62849e1cdb90ef6ffa Author: Yang Guo <yangguo@chromium.org> Date: Thu Nov 02 07:29:34 2017 Perform stack check on Proxy call trap. Proxy's call trap can be used to cause recursion. R=bmeurer@chromium.org, tebbi@chromium.org Bug: chromium:779344 Change-Id: I19c989f618f7230028ebe18c3415bc3f4bd72b93 Reviewed-on: https://chromium-review.googlesource.com/743782 Reviewed-by: Benedikt Meurer <bmeurer@chromium.org> Commit-Queue: Yang Guo <yangguo@chromium.org> Cr-Commit-Position: refs/heads/master@{#49069} [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/builtins/builtins-proxy-gen.cc [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/code-stub-assembler.cc [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/code-stub-assembler.h [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/interpreter/interpreter-assembler.cc [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/interpreter/interpreter-assembler.h [modify] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/src/interpreter/interpreter-generator.cc [add] https://crrev.com/1e77461d62d40fc6a6576f62849e1cdb90ef6ffa/test/mjsunit/regress/regress-crbug-779344.js
,
Nov 2 2017
,
Nov 3 2017
ClusterFuzz has detected this issue as fixed in range 49068:49069. Detailed report: https://clusterfuzz.com/testcase?key=5784274577129472 Fuzzer: ochang_js_fuzzer Job Type: linux_asan_d8_dbg Platform Id: linux Crash Type: Stack-overflow Crash Address: 0x7fffae141fd8 Crash State: v8::internal::CheckObjectType Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=linux_asan_d8_dbg&range=46672:46673 Fixed: https://clusterfuzz.com/revisions?job=linux_asan_d8_dbg&range=49068:49069 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5784274577129472 See https://github.com/google/clusterfuzz-tools for more information. If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
,
Nov 3 2017
ClusterFuzz testcase 5784274577129472 is verified as fixed, so closing issue as verified. If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
,
Nov 7 2017
,
Nov 7 2017
,
Nov 7 2017
|
||||||||
►
Sign in to add a comment |
||||||||
Comment 1 by yangguo@chromium.org
, Oct 30 2017Status: Assigned (was: Untriaged)