Failed

lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)

Failing for the past 15 builds (Since #951 )
Took 15 sec.

Stacktrace

Script:
--
/usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py
--
Exit Code: -6

Command Output (stdout):
--
lldb version 11.0.99
  clang revision 14d7b802db4fd0c8124b0a58ad405fb52f44956d
  llvm revision 14d7b802db4fd0c8124b0a58ad405fb52f44956d

--
Command Output (stderr):
--
=================================================================
==83084==ERROR: AddressSanitizer: container-overflow on address 0x615000016404 at pc 0x00010ae718e3 bp 0x7ffee4dd0130 sp 0x7ffee4dcf8f8
READ of size 512 at 0x615000016404 thread T0
    #0 0x10ae718e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2)
    #1 0x11a744fd5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189
    #2 0x11a2999e9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #3 0x11a79b7ef in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #4 0x11a22fc7b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #5 0x11afcb72a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #6 0x11afcbd08 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #7 0x11aac22ba in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #8 0x11a7a0397 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #9 0x11a7a34df in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #10 0x119b33d8e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #11 0x11a020c31 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #12 0x10bbcf226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #13 0x10bbce8c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #14 0x10bc64905 in call_function+0x1de (Python:x86_64+0xaf905)
    #15 0x10bc5d5ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #16 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #17 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #18 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #19 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10bc5d68c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #25 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #28 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #29 0x10bbce4f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #30 0x10bbcf624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #31 0x10bbce9d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #32 0x10bc5d905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #33 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #34 0x10bbce4f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #35 0x10bbcf624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #36 0x10bc0c4af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #37 0x10bbce72c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #38 0x10bc64976 in call_function+0x24f (Python:x86_64+0xaf976)
    #39 0x10bc5d68c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #40 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #41 0x10bbce88b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #42 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #43 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #44 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #45 0x10bbce88b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #46 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #47 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #48 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #49 0x10bbcf624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #50 0x10bbce9d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #51 0x10bc5d905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #52 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #53 0x10bbce4f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #54 0x10bbcf624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #55 0x10bc0c4af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #56 0x10bbce72c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #57 0x10bc64976 in call_function+0x24f (Python:x86_64+0xaf976)
    #58 0x10bc5d68c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #59 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #60 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #61 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #62 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #63 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #64 0x10bc5d5ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #65 0x10bc652da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #66 0x10bc5ba14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14)
    #67 0x10bc8a2aa in run_mod+0x35 (Python:x86_64+0xd52aa)
    #68 0x10bc892c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5)
    #69 0x10bc889a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4)
    #70 0x10bca0010 in pymain_main+0x13de (Python:x86_64+0xeb010)
    #71 0x10bca07b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7)
    #72 0x7fff7d1de084 in start+0x0 (libdyld.dylib:x86_64+0x17084)

0x615000016580 is located 0 bytes to the right of 512-byte region [0x615000016380,0x615000016580)
allocated by thread T0 here:
    #0 0x10ae8060d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d)
    #1 0x11a975440 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253
    #2 0x11a970fef in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481
    #3 0x11a970e3a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20
    #4 0x11a74537d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228
    #5 0x11a2999e9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #6 0x11a79b7ef in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #7 0x11a22fc7b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #8 0x11afcb72a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #9 0x11afcbd08 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #10 0x11aac22ba in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #11 0x11a7a0397 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #12 0x11a7a34df in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #13 0x119b33d8e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #14 0x11a020c31 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #15 0x10bbcf226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #16 0x10bbce8c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #17 0x10bc64905 in call_function+0x1de (Python:x86_64+0xaf905)
    #18 0x10bc5d5ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #19 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10bc5d5d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #25 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10bc5d68c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #28 0x10bbceca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #29 0x10bc6497d in call_function+0x256 (Python:x86_64+0xaf97d)

HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0.
If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow.
SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2
Shadow bytes around the buggy address:
  0x1c2a00002c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1c2a00002c80:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c90: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002ca0: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002cc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  0x1c2a00002cd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==83084==ABORTING

--