New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 913821 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Last visit 19 days ago
Closed: Dec 21
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug



Sign in to add a comment

CHECK failure: type == QuicUtils::GetStreamType(id_, session->IsIncomingStream(id_)) (2 vs. 0)1

Project Member Reported by ClusterFuzz, Dec 11

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=5186058108796928

Fuzzer: libFuzzer_net_quic_stream_factory_fuzzer
Fuzz target binary: net_quic_stream_factory_fuzzer
Job Type: libfuzzer_chrome_asan_debug
Platform Id: linux

Crash Type: CHECK failure
Crash Address: 
Crash State:
  type == QuicUtils::GetStreamType(id_, session->IsIncomingStream(id_)) (2 vs. 0)1
  quic::QuicStream::QuicStream
  quic::QuicStream::QuicStream
  
Sanitizer: address (ASAN)

Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=615211:615218

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5186058108796928

Issue filed automatically.

See https://github.com/google/clusterfuzz-tools for more information.
 
Project Member

Comment 1 by ClusterFuzz, Dec 11

Components: Internals>Network
Labels: Test-Predator-Auto-Components
Automatically applying components based on crash stacktrace and information from OWNERS files.

If this is incorrect, please apply the Test-Predator-Wrong-Components label.
Project Member

Comment 2 by ClusterFuzz, Dec 11

Cc: nedwilli...@gmail.com
Labels: ClusterFuzz-Auto-CC
Automatically adding ccs based on OWNERS file / target commit history.

If this is incorrect, please add ClusterFuzz-Wrong label.
Project Member

Comment 3 by ClusterFuzz, Dec 11

Labels: Test-Predator-Auto-Owner
Owner: fayang@chromium.org
Status: Assigned (was: Untriaged)
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/chromium/src/+/32c5a11a4b7afba3eadf5e7c4b497d74ab30b40b (Landing recent QUIC changes until 8:47 PM, Nov 30, 2018 UTC-5).

If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
Project Member

Comment 4 by bugdroid1@chromium.org, Dec 20

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/f9bc7986085e25522083c22f05d573f17b95e398

commit f9bc7986085e25522083c22f05d573f17b95e398
Author: Fan Yang <fayang@chromium.org>
Date: Thu Dec 20 21:51:56 2018

Close QUIC connection if client tries to create a server initiated bidirectional stream in v99.

R=rch@chromium.org

Bug:  913821 
Change-Id: I2ad66cf2740c89fa2aec6ad23614373ccc160866
Reviewed-on: https://chromium-review.googlesource.com/c/1378406
Reviewed-by: Ryan Hamilton <rch@chromium.org>
Commit-Queue: Fan Yang <fayang@chromium.org>
Cr-Commit-Position: refs/heads/master@{#618342}
[modify] https://crrev.com/f9bc7986085e25522083c22f05d573f17b95e398/net/quic/quic_chromium_client_session.cc

Status: Fixed (was: Assigned)
Project Member

Comment 6 by ClusterFuzz, Dec 21

ClusterFuzz has detected this issue as fixed in range 618340:618345.

Detailed report: https://clusterfuzz.com/testcase?key=5186058108796928

Fuzzer: libFuzzer_net_quic_stream_factory_fuzzer
Fuzz target binary: net_quic_stream_factory_fuzzer
Job Type: libfuzzer_chrome_asan_debug
Platform Id: linux

Crash Type: CHECK failure
Crash Address: 
Crash State:
  type == QuicUtils::GetStreamType(id_, session->IsIncomingStream(id_)) (2 vs. 0)1
  quic::QuicStream::QuicStream
  quic::QuicStream::QuicStream
  
Sanitizer: address (ASAN)

Regressed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=615211:615218
Fixed: https://clusterfuzz.com/revisions?job=libfuzzer_chrome_asan_debug&range=618340:618345

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=5186058108796928

See https://github.com/google/clusterfuzz-tools for instructions to reproduce this bug locally.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 7 by ClusterFuzz, Dec 21

Labels: ClusterFuzz-Verified
Status: Verified (was: Fixed)
ClusterFuzz testcase 5186058108796928 is verified as fixed, so closing issue as verified.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.

Sign in to add a comment