Failed

lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)

Failing for the past 1 build (Since Failed#951 )
Took 18 sec.

Stacktrace

Script:
--
/usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py
--
Exit Code: -6

Command Output (stdout):
--
lldb version 11.0.99
  clang revision c74026daf36a2b8a21ccae8736772269c6467a6f
  llvm revision c74026daf36a2b8a21ccae8736772269c6467a6f

--
Command Output (stderr):
--
=================================================================
==41249==ERROR: AddressSanitizer: container-overflow on address 0x615000016e04 at pc 0x00010c0bb8d3 bp 0x7ffee3b86130 sp 0x7ffee3b858f8
READ of size 512 at 0x615000016e04 thread T0
    #0 0x10c0bb8d2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418d2)
    #1 0x114c5cbf5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189
    #2 0x1147ada39 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #3 0x114cba4df in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #4 0x114743b1b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #5 0x1154ed92a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #6 0x1154edf08 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #7 0x114fe193a in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #8 0x114cbf087 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #9 0x114cc21cf in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #10 0x1140483de in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #11 0x114535331 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #12 0x10ce18226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #13 0x10ce178c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #14 0x10cead905 in call_function+0x1de (Python:x86_64+0xaf905)
    #15 0x10cea65ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #16 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #17 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #18 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #19 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10cea668c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #25 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #28 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #29 0x10ce174f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #30 0x10ce18624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #31 0x10ce179d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #32 0x10cea6905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #33 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #34 0x10ce174f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #35 0x10ce18624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #36 0x10ce554af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #37 0x10ce1772c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #38 0x10cead976 in call_function+0x24f (Python:x86_64+0xaf976)
    #39 0x10cea668c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #40 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #41 0x10ce1788b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #42 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #43 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #44 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #45 0x10ce1788b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #46 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #47 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #48 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #49 0x10ce18624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #50 0x10ce179d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #51 0x10cea6905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #52 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #53 0x10ce174f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #54 0x10ce18624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #55 0x10ce554af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #56 0x10ce1772c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #57 0x10cead976 in call_function+0x24f (Python:x86_64+0xaf976)
    #58 0x10cea668c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #59 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #60 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #61 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #62 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #63 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #64 0x10cea65ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #65 0x10ceae2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #66 0x10cea4a14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14)
    #67 0x10ced32aa in run_mod+0x35 (Python:x86_64+0xd52aa)
    #68 0x10ced22c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5)
    #69 0x10ced19a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4)
    #70 0x10cee9010 in pymain_main+0x13de (Python:x86_64+0xeb010)
    #71 0x10cee97b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7)
    #72 0x7fff7e349084 in start+0x0 (libdyld.dylib:x86_64+0x17084)

0x615000016f80 is located 0 bytes to the right of 512-byte region [0x615000016d80,0x615000016f80)
allocated by thread T0 here:
    #0 0x10c0ca5fd in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x505fd)
    #1 0x114e94890 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253
    #2 0x114e9046f in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481
    #3 0x114e902ba in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20
    #4 0x114c5cf9d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228
    #5 0x1147ada39 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #6 0x114cba4df in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #7 0x114743b1b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #8 0x1154ed92a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #9 0x1154edf08 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #10 0x114fe193a in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #11 0x114cbf087 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #12 0x114cc21cf in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #13 0x1140483de in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #14 0x114535331 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #15 0x10ce18226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #16 0x10ce178c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #17 0x10cead905 in call_function+0x1de (Python:x86_64+0xaf905)
    #18 0x10cea65ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #19 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10cea65d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #25 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10cea668c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #28 0x10ce17ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #29 0x10cead97d in call_function+0x256 (Python:x86_64+0xaf97d)

HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0.
If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow.
SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418d2) in __asan_memcpy+0x1b2
Shadow bytes around the buggy address:
  0x1c2a00002d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1c2a00002dc0:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002dd0: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002de0: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002df0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002e00: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  0x1c2a00002e10: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==41249==ABORTING

--