Back to build
Raw log | Switch to full mode | Login

Test 'RenderWidgetHostViewAuraTest.ForwardMouseEvent' completed with the following status(es): 'CRASH','SUCCESS' Test 'RenderWidgetHostViewAuraTest.ForwardMouseEvent' had the following logs when run: ================================================================================ [ RUN ] RenderWidgetHostViewAuraTest.ForwardMouseEvent ================================================================= ==7396==ERROR: AddressSanitizer: access-violation on unknown address 0x000000000000 (pc 0x7ffbcb620cde bp 0x000000000001 sp 0x00c6186fd000 T0) ==7396==The signal is caused by a READ memory access. ==7396==Hint: address points to the zero page. ==7396==*** WARNING: Failed to initialize DbgHelp! *** ==7396==*** Most likely this means that the app is already *** ==7396==*** using DbgHelp, possibly with incompatible flags. *** ==7396==*** Due to technical reasons, symbolization might crash *** ==7396==*** or produce wrong results. *** #0 0x7ffbcb620cdd in TF_GetThreadFlags+0x243d (C:\Windows\System32\msctf.dll+0x180010cdd) #1 0x7ffbcb4e2dee in EnableScrollBar+0x14e (C:\Windows\System32\USER32.dll+0x180022dee) #2 0x7ffbcde590a3 in KiUserCallbackDispatcher+0x23 (C:\Windows\SYSTEM32\ntdll.dll+0x1800a90a3) #3 0x7ffbca2d1163 in NtUserMessageCall+0x13 (C:\Windows\System32\win32u.dll+0x180001163) #4 0x7ffbcb4c9ea9 in GetWindowTextW+0x799 (C:\Windows\System32\USER32.dll+0x180009ea9) #5 0x7ffbcb4c9bbb in GetWindowTextW+0x4ab (C:\Windows\System32\USER32.dll+0x180009bbb) #6 0x7ff71cd2bcd8 in gfx::WindowImpl::OnWndProc C:\b\s\w\ir\cache\builder\src\ui\gfx\win\window_impl.cc:271 #7 0x7ff71cd2a8bd in base::win::WrappedWindowProc<&gfx::WindowImpl::WndProc> C:\b\s\w\ir\cache\builder\src\base\win\wrapped_window_proc.h:75 #8 0x7ffbcb4cbc4f in CallWindowProcW+0x4cf (C:\Windows\System32\USER32.dll+0x18000bc4f) #9 0x7ffbcb4cb94b in CallWindowProcW+0x1cb (C:\Windows\System32\USER32.dll+0x18000b94b) #10 0x7ffbcb4e11f2 in GetTopWindow+0x152 (C:\Windows\System32\USER32.dll+0x1800211f2) #11 0x7ffbcde590a3 in KiUserCallbackDispatcher+0x23 (C:\Windows\SYSTEM32\ntdll.dll+0x1800a90a3) #12 0x7ffbca2d1aa3 in NtUserSetFocus+0x13 (C:\Windows\System32\win32u.dll+0x180001aa3) #13 0x7ff7167fd5ab in content::RenderWidgetHostViewEventHandler::SetKeyboardFocus C:\b\s\w\ir\cache\builder\src\content\browser\renderer_host\render_widget_host_view_event_handler.cc:878 #14 0x7ff7167fde88 in content::RenderWidgetHostViewEventHandler::OnMouseEvent C:\b\s\w\ir\cache\builder\src\content\browser\renderer_host\render_widget_host_view_event_handler.cc:396 #15 0x7ff7162fc6ee in content::RenderWidgetHostViewAura::OnMouseEvent C:\b\s\w\ir\cache\builder\src\content\browser\renderer_host\render_widget_host_view_aura.cc:1748 #16 0x7ff711933202 in content::RenderWidgetHostViewAuraTest_ForwardMouseEvent_Test::TestBody C:\b\s\w\ir\cache\builder\src\content\browser\renderer_host\render_widget_host_view_aura_unittest.cc:5606 #17 0x7ff714f0d367 in testing::Test::Run C:\b\s\w\ir\cache\builder\src\third_party\googletest\src\googletest\src\gtest.cc:2499 #18 0x7ff714f0f07e in testing::TestInfo::Run C:\b\s\w\ir\cache\builder\src\third_party\googletest\src\googletest\src\gtest.cc:2675 #19 0x7ff714f1031a in testing::TestSuite::Run C:\b\s\w\ir\cache\builder\src\third_party\googletest\src\googletest\src\gtest.cc:2805 #20 0x7ff714f2d7d3 in testing::internal::UnitTestImpl::RunAllTests C:\b\s\w\ir\cache\builder\src\third_party\googletest\src\googletest\src\gtest.cc:5243 #21 0x7ff714f2cda8 in testing::UnitTest::Run C:\b\s\w\ir\cache\builder\src\third_party\googletest\src\googletest\src\gtest.cc:4845 #22 0x7ff7238f324b in base::TestSuite::Run C:\b\s\w\ir\cache\builder\src\base\test\test_suite.cc:316 #23 0x7ff7238eb739 in content::UnitTestTestSuite::Run C:\b\s\w\ir\cache\builder\src\content\public\test\unittest_test_suite.cc:82 #24 0x7ff7238ebe5c in base::`anonymous namespace'::LaunchUnitTestsInternal C:\b\s\w\ir\cache\builder\src\base\test\launcher\unit_test_launcher.cc:225 #25 0x7ff7238eb9cf in base::LaunchUnitTests C:\b\s\w\ir\cache\builder\src\base\test\launcher\unit_test_launcher.cc:575 #26 0x7ff7238ea4f1 in main C:\b\s\w\ir\cache\builder\src\content\test\run_all_unittests.cc:14 #27 0x7ff723904ec3 in __scrt_common_main_seh d:\agent\_work\2\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl:288 #28 0x7ffbcd772773 in BaseThreadInitThunk+0x13 (C:\Windows\System32\KERNEL32.DLL+0x180012773) #29 0x7ffbcde20d50 in RtlUserThreadStart+0x20 (C:\Windows\SYSTEM32\ntdll.dll+0x180070d50) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: access-violation (C:\Windows\System32\msctf.dll+0x180010cdd) in TF_GetThreadFlags+0x243d ==7396==ABORTING [ RUN ] RenderWidgetHostViewAuraTest.ForwardMouseEvent [ OK ] RenderWidgetHostViewAuraTest.ForwardMouseEvent (63 ms) ================================================================================