Back to build
Raw log | Switch to full mode | Login

[ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [7755:7755:0921/095109.921960:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [7755:7755:0921/095111.322381:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [7755:7869:0921/095112.105565:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [7755:7755:0921/095112.515399:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:38273/extensions/api_test/webstore_private/common.js (41) [7755:8035:0921/095112.650516:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x345a3a29ae00, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7fdfb418a7c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7fdfebb3bb53 @ 0x7fdfebac5f9d @ 0x7fdfebac5ae3 @ 0x7fdfebac5495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7fdfd85fbc39 @ 0x7fdfd85fc099 @ 0x7fdfe082879b @ 0x7fdfe17b069a @ 0x7fdfe1af2d26 @ 0x7fdfe1adcdc7 @ 0x7fdfd86008d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x345a3a29ae00, user ptr: 0x345a3a29ae20, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7fdfeba8e11d base::debug::StackTrace::StackTrace() #1 0x7fdfeb79ff3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7fdfbdd49cb0 <unknown> #4 0x7fdfebae4aa4 tcmalloc::Abort() #5 0x7fdfebaec9af LogPrintf() #6 0x7fdfebaec85b RAW_VLOG() #7 0x7fdfebb144d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7fdfebb14228 MallocBlock::CheckForDanglingWrites() #9 0x7fdfebb11265 MallocBlock::ProcessFreeQueue() #10 0x7fdfebb15eb4 MallocBlock::Deallocate() #11 0x7fdfebb0de25 DebugDeallocate() #12 0x7fdfebb3bb53 tc_free #13 0x7fdfebac5f9d (anonymous namespace)::TCFree() #14 0x7fdfebac5ae3 ShimCppDelete #15 0x7fdfebac5495 operator delete() #16 0x7fdfbfb690aa std::__1::basic_string<>::~basic_string() #17 0x7fdfeb7ed635 std::__1::pair<>::~pair() #18 0x7fdfeb7ed4ae std::__1::__vector_base<>::~__vector_base() #19 0x7fdfeb7ec385 std::__1::vector<>::~vector() #20 0x7fdfeb7ed385 base::internal::flat_tree<>::Impl::~Impl() #21 0x7fdfeb7ed365 base::internal::flat_tree<>::~flat_tree() #22 0x7fdfeb7ec365 base::flat_map<>::~flat_map() #23 0x7fdfeba62806 base::Value::InternalCleanup() #24 0x7fdfeba62849 base::Value::~Value() #25 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #26 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #27 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #28 0x000003a4bdb5 base::Optional<>::~Optional() #29 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #30 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #31 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #32 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #33 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #34 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #35 0x0000043f0875 std::__1::vector<>::~vector() #36 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #37 0x7fdfebc9df0c JsonPrefStore::ReportValueChanged() #38 0x7fdfebcdef15 WriteablePrefStore::ReportSubValuesChanged() #39 0x7fdfebcce3c9 PrefService::ReportUserPrefChanged() #40 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #41 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #42 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #43 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #44 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #45 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #46 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #47 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #48 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #49 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #50 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #51 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #52 0x7fdfeb750fde _ZNO4base12OnceCallbackIFvvEE3RunEv #53 0x7fdfeb7a13ba base::debug::TaskAnnotator::RunTask() #54 0x7fdfeb82fa28 base::MessageLoop::RunTask() #55 0x7fdfeb82fd2b base::MessageLoop::DeferOrRunPendingTask() #56 0x7fdfeb830174 base::MessageLoop::DoWork() #57 0x7fdfebadda9b base::MessagePumpLibevent::Run() #58 0x7fdfeb82f1fe base::MessageLoop::Run() #59 0x7fdfeb8d6cd2 base::RunLoop::Run() #60 0x00000811658e content::RunThisRunLoop() #61 0x00000d9faee1 extensions::ResultCatcher::GetNextResult() [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [11007:11007:0921/100514.365780:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [11007:11007:0921/100515.256928:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [11007:11024:0921/100515.819291:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [11007:11007:0921/100516.073124:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:38162/extensions/api_test/webstore_private/common.js (41) [11007:11077:0921/100516.168993:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x18b9e5e9de80, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7f7a308097c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7f7a681bab53 @ 0x7f7a68144f9d @ 0x7f7a68144ae3 @ 0x7f7a68144495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7f7a54c7ac39 @ 0x7f7a54c7b099 @ 0x7f7a5cea779b @ 0x7f7a5de2f69a @ 0x7f7a5e171d26 @ 0x7f7a5e15bdc7 @ 0x7f7a54c7f8d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x18b9e5e9de80, user ptr: 0x18b9e5e9dea0, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7f7a6810d11d base::debug::StackTrace::StackTrace() #1 0x7f7a67e1ef3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7f7a3a3c8cb0 <unknown> #4 0x7f7a68163aa4 tcmalloc::Abort() #5 0x7f7a6816b9af LogPrintf() #6 0x7f7a6816b85b RAW_VLOG() #7 0x7f7a681934d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7f7a68193228 MallocBlock::CheckForDanglingWrites() #9 0x7f7a68190265 MallocBlock::ProcessFreeQueue() #10 0x7f7a68194eb4 MallocBlock::Deallocate() #11 0x7f7a6818ce25 DebugDeallocate() #12 0x7f7a681bab53 tc_free #13 0x7f7a68144f9d (anonymous namespace)::TCFree() #14 0x7f7a68144ae3 ShimCppDelete #15 0x7f7a68144495 operator delete() #16 0x7f7a67e6c627 std::__1::pair<>::~pair() #17 0x7f7a67e6c4ae std::__1::__vector_base<>::~__vector_base() #18 0x7f7a67e6b385 std::__1::vector<>::~vector() #19 0x7f7a67e6c385 base::internal::flat_tree<>::Impl::~Impl() #20 0x7f7a67e6c365 base::internal::flat_tree<>::~flat_tree() #21 0x7f7a67e6b365 base::flat_map<>::~flat_map() #22 0x7f7a680e1806 base::Value::InternalCleanup() #23 0x7f7a680e1849 base::Value::~Value() #24 0x7f7a67e6c61e std::__1::pair<>::~pair() #25 0x7f7a67e6c4ae std::__1::__vector_base<>::~__vector_base() #26 0x7f7a67e6b385 std::__1::vector<>::~vector() #27 0x7f7a67e6c385 base::internal::flat_tree<>::Impl::~Impl() #28 0x7f7a67e6c365 base::internal::flat_tree<>::~flat_tree() #29 0x7f7a67e6b365 base::flat_map<>::~flat_map() #30 0x7f7a680e1806 base::Value::InternalCleanup() #31 0x7f7a680e1849 base::Value::~Value() #32 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #33 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #34 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #35 0x000003a4bdb5 base::Optional<>::~Optional() #36 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #37 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #38 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #39 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #40 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #41 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #42 0x0000043f0875 std::__1::vector<>::~vector() #43 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #44 0x7f7a6831cf0c JsonPrefStore::ReportValueChanged() #45 0x7f7a6835df15 WriteablePrefStore::ReportSubValuesChanged() #46 0x7f7a6834d3c9 PrefService::ReportUserPrefChanged() #47 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #48 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #49 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #50 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #51 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #52 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #53 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #54 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #55 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #56 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #57 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #58 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #59 0x7f7a67dcffde _ZNO4base12OnceCallbackIFvvEE3RunEv #60 0x7f7a67e203ba base::debug::TaskAnnotator::RunTask() #61 0x7f7a67eaea28 base::MessageLoop::RunTask() [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [11949:11949:0921/100613.111305:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [11949:11949:0921/100614.007522:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [11949:11965:0921/100614.566186:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [11949:11949:0921/100614.858630:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:36647/extensions/api_test/webstore_private/common.js (41) [11949:12019:0921/100614.912873:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x2a12acb07c00, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7f328d0277c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7f32c49d8b53 @ 0x7f32c4962f9d @ 0x7f32c4962ae3 @ 0x7f32c4962495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7f32b1498c39 @ 0x7f32b1499099 @ 0x7f32b96c579b @ 0x7f32ba64d69a @ 0x7f32ba98fd26 @ 0x7f32ba979dc7 @ 0x7f32b149d8d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x2a12acb07c00, user ptr: 0x2a12acb07c20, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7f32c492b11d base::debug::StackTrace::StackTrace() #1 0x7f32c463cf3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7f3296be6cb0 <unknown> #4 0x7f32c4981aa4 tcmalloc::Abort() #5 0x7f32c49899af LogPrintf() #6 0x7f32c498985b RAW_VLOG() #7 0x7f32c49b14d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7f32c49b1228 MallocBlock::CheckForDanglingWrites() #9 0x7f32c49ae265 MallocBlock::ProcessFreeQueue() #10 0x7f32c49b2eb4 MallocBlock::Deallocate() #11 0x7f32c49aae25 DebugDeallocate() #12 0x7f32c49d8b53 tc_free #13 0x7f32c4962f9d (anonymous namespace)::TCFree() #14 0x7f32c4962ae3 ShimCppDelete #15 0x7f32c4962495 operator delete() #16 0x7f32c4783610 base::SequenceCheckerImpl::DetachFromSequence() #17 0x7f32c47dc5c9 base::AtomicFlag::AtomicFlag() #18 0x7f32c46c734f base::internal::WeakReference::Flag::Flag() #19 0x7f32c46c7817 base::internal::WeakReferenceOwner::GetRef() #20 0x7f329577d09b base::SupportsWeakPtr<>::AsWeakPtr() #21 0x7f329577cf1b base::ObserverList<>::Iter::Iter() #22 0x7f329577b536 base::ObserverList<>::begin() #23 0x7f3295778d28 cc::ElementAnimations::AnimationsPreserveAxisAlignment() #24 0x7f329576a590 cc::AnimationHost::AnimationsPreserveAxisAlignment() #25 0x7f32b69368e1 cc::(anonymous namespace)::AnimationsPreserveAxisAlignment<>() #26 0x7f32b6933d2b cc::(anonymous namespace)::PropertyTreeBuilderContext<>::AddEffectNodeIfNeeded() #27 0x7f32b6933428 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #28 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #29 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #30 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #31 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #32 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #33 0x7f32b6933672 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTreesInternal() #34 0x7f32b6930bf7 cc::(anonymous namespace)::PropertyTreeBuilderContext<>::BuildPropertyTrees() #35 0x7f32b693047e cc::PropertyTreeBuilder::BuildPropertyTrees() #36 0x7f32b684cdbd cc::LayerTreeHost::DoUpdateLayers() #37 0x7f32b684c651 cc::LayerTreeHost::UpdateLayers() #38 0x7f32b6962920 cc::SingleThreadProxy::DoPainting() #39 0x7f32b69640ab cc::SingleThreadProxy::BeginMainFrame() #40 0x7f32b69660af _ZN4base8internal13FunctorTraitsIMN2cc17SingleThreadProxyEFvRKN3viz14BeginFrameArgsEEvE6InvokeIS9_NS_7WeakPtrIS3_EEJS5_EEEvT_OT0_DpOT1_ #41 0x7f32b6966015 _ZN4base8internal12InvokeHelperILb1EvE8MakeItSoIMN2cc17SingleThreadProxyEFvRKN3viz14BeginFrameArgsEENS_7WeakPtrIS5_EEJS7_EEEvOT_OT0_DpOT1_ #42 0x7f32b6965f8d _ZN4base8internal7InvokerINS0_9BindStateIMN2cc17SingleThreadProxyEFvRKN3viz14BeginFrameArgsEEJNS_7WeakPtrIS4_EES6_EEEFvvEE7RunImplISA_NSt3__15tupleIJSC_S6_EEEJLm0ELm1EEEEvOT_OT0_NSH_16integer_sequenceImJXspT1_EEEE #43 0x7f32b6965e99 _ZN4base8internal7InvokerINS0_9BindStateIMN2cc17SingleThreadProxyEFvRKN3viz14BeginFrameArgsEEJNS_7WeakPtrIS4_EES6_EEEFvvEE7RunOnceEPNS0_13BindStateBaseE #44 0x7f32c45edfde _ZNO4base12OnceCallbackIFvvEE3RunEv #45 0x7f32c463e3ba base::debug::TaskAnnotator::RunTask() #46 0x7f32c46cca28 base::MessageLoop::RunTask() #47 0x7f32c46ccd2b base::MessageLoop::DeferOrRunPendingTask() #48 0x7f32c46cd174 base::MessageLoop::DoWork() #49 0x7f32c497aa9b base::MessagePumpLibevent::Run() #50 0x7f32c46cc1fe base::MessageLoop::Run() #51 0x7f32c4773cd2 base::RunLoop::Run() #52 0x00000811658e content::RunThisRunLoop() #53 0x00000d9faee1 extensions::ResultCatcher::GetNextResult() #54 0x0000024b95d9 extensions::ExtensionApiTest::RunExtensionTestImpl() #55 0x0000024ba0c1 extensions::ExtensionApiTest::RunExtensionSubtestWithArgAndFlags() #56 0x0000024b9f2f extensions::ExtensionApiTest::RunExtensionSubtest() #57 0x0000024ba232 extensions::ExtensionApiTest::RunPageTest() #58 0x000002375e48 extensions::ExtensionWebstorePrivateApiTest::RunInstallTest() #59 0x000002370ea0 extensions::ExtensionWebstorePrivateApiTest_IncorrectManifest1_Test::RunTestOnMainThread() #60 0x0000080833ee content::BrowserTestBase::ProxyRunTestOnMainThreadLoop() #61 0x000000aeeabd _ZN4base8internal13FunctorTraitsIM25RenderViewContextMenuBaseFvvEvE6InvokeIS4_P21RenderViewContextMenuJEEEvT_OT0_DpOT1_ [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [12908:12908:0921/100711.624658:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [12908:12908:0921/100712.458492:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [12908:12927:0921/100713.018217:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [12908:12908:0921/100713.262456:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:41318/extensions/api_test/webstore_private/common.js (41) [12908:12978:0921/100713.351652:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x2e049079c600, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7fab019467c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7fab392f7b53 @ 0x7fab39281f9d @ 0x7fab39281ae3 @ 0x7fab39281495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7fab25db7c39 @ 0x7fab25db8099 @ 0x7fab2dfe479b @ 0x7fab2ef6c69a @ 0x7fab2f2aed26 @ 0x7fab2f298dc7 @ 0x7fab25dbc8d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x2e049079c600, user ptr: 0x2e049079c620, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7fab3924a11d base::debug::StackTrace::StackTrace() #1 0x7fab38f5bf3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7fab0b505cb0 <unknown> #4 0x7fab392a0aa4 tcmalloc::Abort() #5 0x7fab392a89af LogPrintf() #6 0x7fab392a885b RAW_VLOG() #7 0x7fab392d04d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7fab392d0228 MallocBlock::CheckForDanglingWrites() #9 0x7fab392cd265 MallocBlock::ProcessFreeQueue() #10 0x7fab392d1eb4 MallocBlock::Deallocate() #11 0x7fab392c9e25 DebugDeallocate() #12 0x7fab392f7b53 tc_free #13 0x7fab39281f9d (anonymous namespace)::TCFree() #14 0x7fab39281ae3 ShimCppDelete #15 0x7fab39281495 operator delete() #16 0x7fab38fa9627 std::__1::pair<>::~pair() #17 0x7fab38fa94ae std::__1::__vector_base<>::~__vector_base() #18 0x7fab38fa8385 std::__1::vector<>::~vector() #19 0x7fab38fa9385 base::internal::flat_tree<>::Impl::~Impl() #20 0x7fab38fa9365 base::internal::flat_tree<>::~flat_tree() #21 0x7fab38fa8365 base::flat_map<>::~flat_map() #22 0x7fab3921e806 base::Value::InternalCleanup() #23 0x7fab3921e849 base::Value::~Value() #24 0x7fab38fa961e std::__1::pair<>::~pair() #25 0x7fab38fa94ae std::__1::__vector_base<>::~__vector_base() #26 0x7fab38fa8385 std::__1::vector<>::~vector() #27 0x7fab38fa9385 base::internal::flat_tree<>::Impl::~Impl() #28 0x7fab38fa9365 base::internal::flat_tree<>::~flat_tree() #29 0x7fab38fa8365 base::flat_map<>::~flat_map() #30 0x7fab3921e806 base::Value::InternalCleanup() #31 0x7fab3921e849 base::Value::~Value() #32 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #33 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #34 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #35 0x000003a4bdb5 base::Optional<>::~Optional() #36 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #37 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #38 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #39 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #40 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #41 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #42 0x0000043f0875 std::__1::vector<>::~vector() #43 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #44 0x7fab39459f0c JsonPrefStore::ReportValueChanged() #45 0x7fab3949af15 WriteablePrefStore::ReportSubValuesChanged() #46 0x7fab3948a3c9 PrefService::ReportUserPrefChanged() #47 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #48 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #49 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #50 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #51 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #52 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #53 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #54 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #55 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #56 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #57 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #58 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #59 0x7fab38f0cfde _ZNO4base12OnceCallbackIFvvEE3RunEv #60 0x7fab38f5d3ba base::debug::TaskAnnotator::RunTask() #61 0x7fab38feba28 base::MessageLoop::RunTask()