Failed
lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)
Stacktrace
Script: -- /usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py -- Exit Code: -6 Command Output (stdout): -- lldb version 11.0.99 clang revision 7593a480dbce4e26f7dda4aa8f15bffd03acbfdb llvm revision 7593a480dbce4e26f7dda4aa8f15bffd03acbfdb -- Command Output (stderr): -- ================================================================= ==92271==ERROR: AddressSanitizer: container-overflow on address 0x615000016404 at pc 0x000103c3c8e3 bp 0x7ffeec00a130 sp 0x7ffeec0098f8 READ of size 512 at 0x615000016404 thread T0 #0 0x103c3c8e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) #1 0x10c483115 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189 #2 0x10bfd7b29 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298 #3 0x10c4d992f in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402 #4 0x10bf6ddbb in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212 #5 0x10cd0989a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767 #6 0x10cd09e78 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801 #7 0x10c8003fa in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63 #8 0x10c4de4d7 in lldb_private::Process::CompleteAttach() Process.cpp:2930 #9 0x10c4e161f in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015 #10 0x10b871eae in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559 #11 0x10bd5ed71 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799 #12 0x104995226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226) #13 0x1049948c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6) #14 0x104a2a905 in call_function+0x1de (Python:x86_64+0xaf905) #15 0x104a235ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #16 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #17 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #18 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #19 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #20 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #21 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #22 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #23 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #24 0x104a2368c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #25 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #26 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #27 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #28 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #29 0x1049944f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #30 0x104995624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #31 0x1049949d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4) #32 0x104a23905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905) #33 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #34 0x1049944f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #35 0x104995624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #36 0x1049d24af in slot_tp_call+0x46 (Python:x86_64+0x574af) #37 0x10499472c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c) #38 0x104a2a976 in call_function+0x24f (Python:x86_64+0xaf976) #39 0x104a2368c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #40 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #41 0x10499488b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b) #42 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #43 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #44 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #45 0x10499488b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b) #46 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #47 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #48 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #49 0x104995624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #50 0x1049949d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4) #51 0x104a23905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905) #52 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #53 0x1049944f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #54 0x104995624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #55 0x1049d24af in slot_tp_call+0x46 (Python:x86_64+0x574af) #56 0x10499472c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c) #57 0x104a2a976 in call_function+0x24f (Python:x86_64+0xaf976) #58 0x104a2368c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #59 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #60 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #61 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #62 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #63 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #64 0x104a235ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #65 0x104a2b2da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #66 0x104a21a14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14) #67 0x104a502aa in run_mod+0x35 (Python:x86_64+0xd52aa) #68 0x104a4f2c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5) #69 0x104a4e9a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4) #70 0x104a66010 in pymain_main+0x13de (Python:x86_64+0xeb010) #71 0x104a667b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7) #72 0x7fff7ad31084 in start+0x0 (libdyld.dylib:x86_64+0x17084) 0x615000016580 is located 0 bytes to the right of 512-byte region [0x615000016380,0x615000016580) allocated by thread T0 here: #0 0x103c4b60d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d) #1 0x10c6b3580 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253 #2 0x10c6af12f in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481 #3 0x10c6aef7a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20 #4 0x10c4834bd in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228 #5 0x10bfd7b29 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298 #6 0x10c4d992f in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402 #7 0x10bf6ddbb in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212 #8 0x10cd0989a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767 #9 0x10cd09e78 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801 #10 0x10c8003fa in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63 #11 0x10c4de4d7 in lldb_private::Process::CompleteAttach() Process.cpp:2930 #12 0x10c4e161f in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015 #13 0x10b871eae in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559 #14 0x10bd5ed71 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799 #15 0x104995226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226) #16 0x1049948c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6) #17 0x104a2a905 in call_function+0x1de (Python:x86_64+0xaf905) #18 0x104a235ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #19 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #20 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #21 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #22 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #23 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #24 0x104a235d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #25 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #26 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) #27 0x104a2368c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #28 0x104994ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #29 0x104a2a97d in call_function+0x256 (Python:x86_64+0xaf97d) HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0. If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow. SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2 Shadow bytes around the buggy address: 0x1c2a00002c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1c2a00002c80:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002c90: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002ca0: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002cc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x1c2a00002cd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==92271==ABORTING --