Failed

lldb-api.functionalities/gdb_remote_client.TestWasm.py (from lldb-api)

Failing for the past 20 builds (Since #951 )
Took 15 sec.

Stacktrace

Script:
--
/usr/local/bin/python /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/dotest.py --arch x86_64 -s /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-traces -S nm -u CXXFLAGS -u CFLAGS --codesign-identity lldb_codesign --server /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/debugserver --arch x86_64 --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex -s=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/test/logs -t --env TERM=vt100 --env LLVM_LIBS_DIR=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib --inferior-env ASAN_OPTIONS=detect_stack_use_after_return=1 --inferior-env DYLD_INSERT_LIBRARIES=/Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/host-compiler/lib/clang/11.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib --build-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex --lldb-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-lldb/lldb-api --clang-module-cache-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/lldb-test-build.noindex/module-cache-clang/lldb-api --executable /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/lldb --compiler /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/clang --dsymutil /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/dsymutil --filecheck /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./bin/FileCheck --lldb-libs-dir /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/lldb-build/./lib /Users/buildslave/jenkins/workspace/lldb-cmake-sanitized/llvm-project/lldb/test/API/functionalities/gdb_remote_client -p TestWasm.py
--
Exit Code: -6

Command Output (stdout):
--
lldb version 11.0.99
  clang revision 78be61871704a451a5d9462d7e96ed6c982746d4
  llvm revision 78be61871704a451a5d9462d7e96ed6c982746d4

--
Command Output (stderr):
--
=================================================================
==4495==ERROR: AddressSanitizer: container-overflow on address 0x615000016184 at pc 0x00010d5c88e3 bp 0x7ffee267d130 sp 0x7ffee267c8f8
READ of size 512 at 0x615000016184 thread T0
    #0 0x10d5c88e2 in __asan_memcpy+0x1b2 (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2)
    #1 0x1180952e5 in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:189
    #2 0x117be9cf9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #3 0x1180ebaff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #4 0x117b7ff8b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #5 0x11891ba6a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #6 0x11891c048 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #7 0x1184125ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #8 0x1180f06a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #9 0x1180f37ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #10 0x11748407e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #11 0x117970f41 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #12 0x10e323226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #13 0x10e3228c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #14 0x10e3b8905 in call_function+0x1de (Python:x86_64+0xaf905)
    #15 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #16 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #17 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #18 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #19 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #25 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #28 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #29 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #30 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #31 0x10e3229d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #32 0x10e3b1905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #33 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #34 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #35 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #36 0x10e3604af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #37 0x10e32272c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #38 0x10e3b8976 in call_function+0x24f (Python:x86_64+0xaf976)
    #39 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #40 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #41 0x10e32288b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #42 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #43 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #44 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #45 0x10e32288b in _PyFunction_FastCallKeywords+0xe0 (Python:x86_64+0x1988b)
    #46 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #47 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #48 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #49 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #50 0x10e3229d4 in PyObject_Call+0x87 (Python:x86_64+0x199d4)
    #51 0x10e3b1905 in _PyEval_EvalFrameDefault+0x1e68 (Python:x86_64+0xa8905)
    #52 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #53 0x10e3224f4 in _PyFunction_FastCallDict+0x1b8 (Python:x86_64+0x194f4)
    #54 0x10e323624 in _PyObject_Call_Prepend+0x95 (Python:x86_64+0x1a624)
    #55 0x10e3604af in slot_tp_call+0x46 (Python:x86_64+0x574af)
    #56 0x10e32272c in _PyObject_FastCallKeywords+0x166 (Python:x86_64+0x1972c)
    #57 0x10e3b8976 in call_function+0x24f (Python:x86_64+0xaf976)
    #58 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #59 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #60 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #61 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #62 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #63 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #64 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #65 0x10e3b92da in _PyEval_EvalCodeWithName+0x72a (Python:x86_64+0xb02da)
    #66 0x10e3afa14 in PyEval_EvalCode+0x29 (Python:x86_64+0xa6a14)
    #67 0x10e3de2aa in run_mod+0x35 (Python:x86_64+0xd52aa)
    #68 0x10e3dd2c5 in PyRun_FileExFlags+0xa3 (Python:x86_64+0xd42c5)
    #69 0x10e3dc9a4 in PyRun_SimpleFileExFlags+0x114 (Python:x86_64+0xd39a4)
    #70 0x10e3f4010 in pymain_main+0x13de (Python:x86_64+0xeb010)
    #71 0x10e3f47b7 in _Py_UnixMain+0x67 (Python:x86_64+0xeb7b7)
    #72 0x7fff76163084 in start+0x0 (libdyld.dylib:x86_64+0x17084)

0x615000016300 is located 0 bytes to the right of 512-byte region [0x615000016100,0x615000016300)
allocated by thread T0 here:
    #0 0x10d5d760d in wrap__Znwm+0x7d (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5060d)
    #1 0x1182c5750 in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::__vallocate(unsigned long) new:253
    #2 0x1182c12ff in std::__1::vector<unsigned char, std::__1::allocator<unsigned char> >::assign(unsigned long, unsigned char const&) vector:1481
    #3 0x1182c114a in lldb_private::DataBufferHeap::DataBufferHeap(unsigned long long, unsigned char) DataBufferHeap.cpp:20
    #4 0x11809568d in lldb_private::MemoryCache::Read(unsigned long long, void*, unsigned long, lldb_private::Status&) Memory.cpp:228
    #5 0x117be9cf9 in lldb_private::Module::GetMemoryObjectFile(std::__1::shared_ptr<lldb_private::Process> const&, unsigned long long, lldb_private::Status&, unsigned long) Module.cpp:298
    #6 0x1180ebaff in lldb_private::Process::ReadModuleFromMemory(lldb_private::FileSpec const&, unsigned long long, unsigned long) Process.cpp:2402
    #7 0x117b7ff8b in lldb_private::DynamicLoader::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) DynamicLoader.cpp:212
    #8 0x11891ba6a in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModuleAtAddress(lldb_private::FileSpec const&, unsigned long long, unsigned long long, bool) ProcessGDBRemote.cpp:4767
    #9 0x11891c048 in lldb_private::process_gdb_remote::ProcessGDBRemote::LoadModules() ProcessGDBRemote.cpp:4801
    #10 0x1184125ca in lldb_private::wasm::DynamicLoaderWasmDYLD::DidAttach() DynamicLoaderWasmDYLD.cpp:63
    #11 0x1180f06a7 in lldb_private::Process::CompleteAttach() Process.cpp:2930
    #12 0x1180f37ef in lldb_private::Process::ConnectRemote(lldb_private::Stream*, llvm::StringRef) Process.cpp:3015
    #13 0x11748407e in lldb::SBTarget::ConnectRemote(lldb::SBListener&, char const*, char const*, lldb::SBError&) SBTarget.cpp:559
    #14 0x117970f41 in _wrap_SBTarget_ConnectRemote(_object*, _object*) LLDBWrapPython.cpp:52799
    #15 0x10e323226 in _PyMethodDef_RawFastCallKeywords+0xeb (Python:x86_64+0x1a226)
    #16 0x10e3228c6 in _PyCFunction_FastCallKeywords+0x2b (Python:x86_64+0x198c6)
    #17 0x10e3b8905 in call_function+0x1de (Python:x86_64+0xaf905)
    #18 0x10e3b15ee in _PyEval_EvalFrameDefault+0x1b51 (Python:x86_64+0xa85ee)
    #19 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #20 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #21 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #22 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #23 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #24 0x10e3b15d5 in _PyEval_EvalFrameDefault+0x1b38 (Python:x86_64+0xa85d5)
    #25 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #26 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)
    #27 0x10e3b168c in _PyEval_EvalFrameDefault+0x1bef (Python:x86_64+0xa868c)
    #28 0x10e322ca1 in function_code_fastcall+0x6f (Python:x86_64+0x19ca1)
    #29 0x10e3b897d in call_function+0x256 (Python:x86_64+0xaf97d)

HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0.
If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow.
SUMMARY: AddressSanitizer: container-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x418e2) in __asan_memcpy+0x1b2
Shadow bytes around the buggy address:
  0x1c2a00002be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1c2a00002c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1c2a00002c30:[04]fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c40: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c50: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  0x1c2a00002c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x1c2a00002c70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  0x1c2a00002c80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==4495==ABORTING

--