Failed

lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)

Failing for the past 16 builds (Since Failed#951 )
Took 15 sec.

Stacktrace

Script:
--
/usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py
--
Exit Code: -6

Command Output (stdout):
--
lldb version 11.0.99
  clang revision 6085593c128e91fd7db998c5441ebe120c7e4f04
  llvm revision 6085593c128e91fd7db998c5441ebe120c7e4f04

--
Command Output (stderr):
--
=================================================================
==5440==ERROR: AddressSanitizer: container-overflow on address 0x615000016184 at pc 0x000101f5c8e3 bp 0x7ffeedce9130 sp 0x7ffeedce88f8
READ of size 512 at 0x615000016184 thread T0
    #0 0x101f5c8e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2)
    #1 0x10be814e5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189
    #2 0x10b9d5ef9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #3 0x10bed7cff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #4 0x10b96c18b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #5 0x10c707c3a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #6 0x10c708218 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #7 0x10c1fe7ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #8 0x10bedc8a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #9 0x10bedf9ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #10 0x10b27029e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #11 0x10b75d141 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #12 0x102cb7226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #13 0x102cb68c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #14 0x102d4c905 in call_function+0x1de (Python:x86_64+0xaf905)
    #15 0x102d455ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #16 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #17 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #18 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #19 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x102d4568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #25 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #28 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #29 0x102cb64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #30 0x102cb7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #31 0x102cb69d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #32 0x102d45905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #33 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #34 0x102cb64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #35 0x102cb7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #36 0x102cf44af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #37 0x102cb672c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #38 0x102d4c976 in call_function+0x24f (Python:x86_64+0xaf976)
    #39 0x102d4568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #40 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #41 0x102cb688b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #42 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #43 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #44 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #45 0x102cb688b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #46 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #47 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #48 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #49 0x102cb7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #50 0x102cb69d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #51 0x102d45905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #52 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #53 0x102cb64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #54 0x102cb7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #55 0x102cf44af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #56 0x102cb672c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #57 0x102d4c976 in call_function+0x24f (Python:x86_64+0xaf976)
    #58 0x102d4568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #59 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #60 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #61 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #62 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #63 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #64 0x102d455ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #65 0x102d4d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #66 0x102d43a14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14)
    #67 0x102d722aa in run_mod+0x35 (Python:x86_64+0xd52aa)
    #68 0x102d712c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5)
    #69 0x102d709a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4)
    #70 0x102d88010 in pymain_main+0x13de (Python:x86_64+0xeb010)
    #71 0x102d887b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7)
    #72 0x7fff63d3b084 in start+0x0 (libdyld.dylib:x86_64+0x17084)

0x615000016300 is located 0 bytes to the right of 512-byte region [0x615000016100,0x615000016300)
allocated by thread T0 here:
    #0 0x101f6b60d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d)
    #1 0x10c0b1950 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253
    #2 0x10c0ad4ff in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481
    #3 0x10c0ad34a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20
    #4 0x10be8188d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228
    #5 0x10b9d5ef9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #6 0x10bed7cff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #7 0x10b96c18b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #8 0x10c707c3a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #9 0x10c708218 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #10 0x10c1fe7ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #11 0x10bedc8a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #12 0x10bedf9ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #13 0x10b27029e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #14 0x10b75d141 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #15 0x102cb7226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #16 0x102cb68c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #17 0x102d4c905 in call_function+0x1de (Python:x86_64+0xaf905)
    #18 0x102d455ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #19 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x102d455d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #25 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x102d4568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #28 0x102cb6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #29 0x102d4c97d in call_function+0x256 (Python:x86_64+0xaf97d)

HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0.
If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow.
SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2
Shadow bytes around the buggy address:
  0x1c2a00002be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1c2a00002c30:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c40: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c50: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  0x1c2a00002c80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==5440==ABORTING

--