Failed

lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)

Failing for the past 17 builds (Since Failed#951 )
Took 16 sec.

Stacktrace

Script:
--
/usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py
--
Exit Code: -6

Command Output (stdout):
--
lldb version 11.0.99
  clang revision 1f984c83a41bb68b8af4998a7f68876d52bff872
  llvm revision 1f984c83a41bb68b8af4998a7f68876d52bff872

--
Command Output (stderr):
--
=================================================================
==44563==ERROR: AddressSanitizer: container-overflow on address 0x615000016184 at pc 0x000109f9b8e3 bp 0x7ffee5ca9130 sp 0x7ffee5ca88f8
READ of size 512 at 0x615000016184 thread T0
    #0 0x109f9b8e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2)
    #1 0x1127decd5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189
    #2 0x1123336e9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #3 0x1128354ef in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #4 0x1122c997b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #5 0x11306545a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #6 0x113065a38 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #7 0x112b5bfba in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #8 0x11283a097 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #9 0x11283d1df in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #10 0x111bcda6e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #11 0x1120ba931 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #12 0x10acf7226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #13 0x10acf68c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #14 0x10ad8c905 in call_function+0x1de (Python:x86_64+0xaf905)
    #15 0x10ad855ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #16 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #17 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #18 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #19 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10ad8568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #25 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #28 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #29 0x10acf64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #30 0x10acf7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #31 0x10acf69d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #32 0x10ad85905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #33 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #34 0x10acf64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #35 0x10acf7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #36 0x10ad344af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #37 0x10acf672c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #38 0x10ad8c976 in call_function+0x24f (Python:x86_64+0xaf976)
    #39 0x10ad8568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #40 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #41 0x10acf688b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #42 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #43 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #44 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #45 0x10acf688b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #46 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #47 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #48 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #49 0x10acf7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #50 0x10acf69d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #51 0x10ad85905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #52 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #53 0x10acf64f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #54 0x10acf7624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #55 0x10ad344af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #56 0x10acf672c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #57 0x10ad8c976 in call_function+0x24f (Python:x86_64+0xaf976)
    #58 0x10ad8568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #59 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #60 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #61 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #62 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #63 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #64 0x10ad855ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #65 0x10ad8d2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #66 0x10ad83a14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14)
    #67 0x10adb22aa in run_mod+0x35 (Python:x86_64+0xd52aa)
    #68 0x10adb12c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5)
    #69 0x10adb09a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4)
    #70 0x10adc8010 in pymain_main+0x13de (Python:x86_64+0xeb010)
    #71 0x10adc87b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7)
    #72 0x7fff59bc7084 in start+0x0 (libdyld.dylib:x86_64+0x17084)

0x615000016300 is located 0 bytes to the right of 512-byte region [0x615000016100,0x615000016300)
allocated by thread T0 here:
    #0 0x109faa60d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d)
    #1 0x112a0f140 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253
    #2 0x112a0acef in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481
    #3 0x112a0ab3a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20
    #4 0x1127df07d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228
    #5 0x1123336e9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #6 0x1128354ef in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #7 0x1122c997b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #8 0x11306545a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #9 0x113065a38 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #10 0x112b5bfba in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #11 0x11283a097 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #12 0x11283d1df in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #13 0x111bcda6e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #14 0x1120ba931 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #15 0x10acf7226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #16 0x10acf68c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #17 0x10ad8c905 in call_function+0x1de (Python:x86_64+0xaf905)
    #18 0x10ad855ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #19 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10ad855d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #25 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10ad8568c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #28 0x10acf6ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #29 0x10ad8c97d in call_function+0x256 (Python:x86_64+0xaf97d)

HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0.
If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow.
SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2
Shadow bytes around the buggy address:
  0x1c2a00002be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1c2a00002c30:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c40: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c50: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  0x1c2a00002c80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==44563==ABORTING

--