Sanitizer CHECK failure in "((0)) != (0)" (0x0, 0x0) |
||||
Issue descriptionDetailed report: https://clusterfuzz.com/testcase?key=6241729121091584 Fuzzer: inferno_flicker Job Type: linux_debug_chrome Platform Id: linux Crash Type: Sanitizer CHECK failure Crash Address: Crash State: "((0)) != (0)" (0x0, 0x0) Sanitizer: address (ASAN) Regressed: https://clusterfuzz.com/revisions?job=linux_debug_chrome&range=524986:524992 Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6241729121091584 Issue filed automatically. See https://github.com/google/clusterfuzz-tools for more information.
,
Mar 20 2018
,
Apr 10 2018
Once I will take a look this issue. But it seems like that this issue was caused by other CLs for now.
,
Apr 30 2018
,
May 7 2018
ClusterFuzz testcase 6241729121091584 is still reproducing on tip-of-tree build (trunk). If this testcase was not reproducible locally or unworkable, ignore this notification and we will file another bug soon with hopefully a better and workable testcase. Otherwise, if this is not intended to be fixed (e.g. this is an intentional crash), please add ClusterFuzz-Ignore label to prevent future bug filing with similar crash stacktrace. |
||||
►
Sign in to add a comment |
||||
Comment 1 by brajkumar@chromium.org
, Mar 20 2018Components: Blink
Labels: M-66 Test-Predator-Wrong
Owner: gyuyoung...@chromium.org
Status: Assigned (was: Untriaged)