From cbeaf7f584a6b6bae4b97cb01d9dbf07e4c56d53 Mon Sep 17 00:00:00 2001 From: "svenpanne@chromium.org" Date: Wed, 7 Mar 2012 11:48:36 +0000 Subject: [PATCH] Caught yet another escaped hole. Review URL: https://chromiumcodereview.appspot.com/9592048 git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@10953 ce2b1a6d-e550-0410-aec6-3dcde31c8c00 --- src/runtime.cc | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/src/runtime.cc b/src/runtime.cc index 8c71f21a8f..a96152d8d1 100644 --- a/src/runtime.cc +++ b/src/runtime.cc @@ -10493,9 +10493,10 @@ RUNTIME_FUNCTION(MaybeObject*, Runtime_DebugGetPropertyDetails) { details->set(0, *value); details->set(1, property_details); if (hasJavaScriptAccessors) { + AccessorPair* accessors = AccessorPair::cast(*result_callback_obj); details->set(2, isolate->heap()->ToBoolean(caught_exception)); - details->set(3, AccessorPair::cast(*result_callback_obj)->getter()); - details->set(4, AccessorPair::cast(*result_callback_obj)->setter()); + details->set(3, accessors->SafeGet(ACCESSOR_GETTER)); + details->set(4, accessors->SafeGet(ACCESSOR_SETTER)); } return *isolate->factory()->NewJSArrayWithElements(details);