Failed
lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)
Stacktrace
Script: -- /usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py -- Exit Code: -6 Command Output (stdout): -- lldb version 11.0.99 clang revision 78be61871704a451a5d9462d7e96ed6c982746d4 llvm revision 78be61871704a451a5d9462d7e96ed6c982746d4 -- Command Output (stderr): -- ================================================================= ==4495==ERROR: AddressSanitizer: container-overflow on address 0x615000016184 at pc 0x00010d5c88e3 bp 0x7ffee267d130 sp 0x7ffee267c8f8 READ of size 512 at 0x615000016184 thread T0 #0 0x10d5c88e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) #1 0x1180952e5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189 #2 0x117be9cf9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298 #3 0x1180ebaff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402 #4 0x117b7ff8b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212 #5 0x11891ba6a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767 #6 0x11891c048 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801 #7 0x1184125ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63 #8 0x1180f06a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930 #9 0x1180f37ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015 #10 0x11748407e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559 #11 0x117970f41 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799 #12 0x10e323226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226) #13 0x10e3228c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6) #14 0x10e3b8905 in call_function+0x1de (Python:x86_64+0xaf905) #15 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #16 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #17 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #18 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #19 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #20 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #21 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #22 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #23 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #24 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #25 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #26 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #27 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #28 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #29 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #30 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #31 0x10e3229d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4) #32 0x10e3b1905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905) #33 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #34 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #35 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #36 0x10e3604af in slot_tp_call+0x46 (Python:x86_64+0x574af) #37 0x10e32272c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c) #38 0x10e3b8976 in call_function+0x24f (Python:x86_64+0xaf976) #39 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #40 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #41 0x10e32288b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b) #42 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #43 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #44 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #45 0x10e32288b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b) #46 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #47 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #48 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #49 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #50 0x10e3229d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4) #51 0x10e3b1905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905) #52 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #53 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4) #54 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624) #55 0x10e3604af in slot_tp_call+0x46 (Python:x86_64+0x574af) #56 0x10e32272c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c) #57 0x10e3b8976 in call_function+0x24f (Python:x86_64+0xaf976) #58 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #59 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #60 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #61 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #62 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #63 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #64 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #65 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da) #66 0x10e3afa14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14) #67 0x10e3de2aa in run_mod+0x35 (Python:x86_64+0xd52aa) #68 0x10e3dd2c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5) #69 0x10e3dc9a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4) #70 0x10e3f4010 in pymain_main+0x13de (Python:x86_64+0xeb010) #71 0x10e3f47b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7) #72 0x7fff76163084 in start+0x0 (libdyld.dylib:x86_64+0x17084) 0x615000016300 is located 0 bytes to the right of 512-byte region [0x615000016100,0x615000016300) allocated by thread T0 here: #0 0x10d5d760d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d) #1 0x1182c5750 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253 #2 0x1182c12ff in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481 #3 0x1182c114a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20 #4 0x11809568d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228 #5 0x117be9cf9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298 #6 0x1180ebaff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402 #7 0x117b7ff8b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212 #8 0x11891ba6a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767 #9 0x11891c048 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801 #10 0x1184125ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63 #11 0x1180f06a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930 #12 0x1180f37ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015 #13 0x11748407e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559 #14 0x117970f41 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799 #15 0x10e323226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226) #16 0x10e3228c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6) #17 0x10e3b8905 in call_function+0x1de (Python:x86_64+0xaf905) #18 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee) #19 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #20 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #21 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #22 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #23 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #24 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5) #25 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #26 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) #27 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c) #28 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1) #29 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d) HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0. If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow. SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2 Shadow bytes around the buggy address: 0x1c2a00002be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1c2a00002c30:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002c40: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002c50: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002c70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x1c2a00002c80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4495==ABORTING --