Back to build
Raw log | Switch to full mode | Login

[ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [30915:30915:0921/095140.429249:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [30915:30915:0921/095142.210372:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [30915:31013:0921/095143.016865:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [30915:30915:0921/095143.577845:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:41423/extensions/api_test/webstore_private/common.js (41) [30915:31195:0921/095143.689587:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x2f85d6452300, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7f5ff64787c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7f602de29b53 @ 0x7f602ddb3f9d @ 0x7f602ddb3ae3 @ 0x7f602ddb3495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7f601a8e9c39 @ 0x7f601a8ea099 @ 0x7f6022b1679b @ 0x7f6023a9e69a @ 0x7f6023de0d26 @ 0x7f6023dcadc7 @ 0x7f601a8ee8d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x2f85d6452300, user ptr: 0x2f85d6452320, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7f602dd7c11d base::debug::StackTrace::StackTrace() #1 0x7f602da8df3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7f6000037cb0 <unknown> #4 0x7f602ddd2aa4 tcmalloc::Abort() #5 0x7f602ddda9af LogPrintf() #6 0x7f602ddda85b RAW_VLOG() #7 0x7f602de024d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7f602de02228 MallocBlock::CheckForDanglingWrites() #9 0x7f602ddff265 MallocBlock::ProcessFreeQueue() #10 0x7f602de03eb4 MallocBlock::Deallocate() #11 0x7f602ddfbe25 DebugDeallocate() #12 0x7f602de29b53 tc_free #13 0x7f602ddb3f9d (anonymous namespace)::TCFree() #14 0x7f602ddb3ae3 ShimCppDelete #15 0x7f602ddb3495 operator delete() #16 0x7f602dadb627 std::__1::pair<>::~pair() #17 0x7f602dadb4ae std::__1::__vector_base<>::~__vector_base() #18 0x7f602dada385 std::__1::vector<>::~vector() #19 0x7f602dadb385 base::internal::flat_tree<>::Impl::~Impl() #20 0x7f602dadb365 base::internal::flat_tree<>::~flat_tree() #21 0x7f602dada365 base::flat_map<>::~flat_map() #22 0x7f602dd50806 base::Value::InternalCleanup() #23 0x7f602dd50849 base::Value::~Value() #24 0x7f602dadb61e std::__1::pair<>::~pair() #25 0x7f602dadb4ae std::__1::__vector_base<>::~__vector_base() #26 0x7f602dada385 std::__1::vector<>::~vector() #27 0x7f602dadb385 base::internal::flat_tree<>::Impl::~Impl() #28 0x7f602dadb365 base::internal::flat_tree<>::~flat_tree() #29 0x7f602dada365 base::flat_map<>::~flat_map() #30 0x7f602dd50806 base::Value::InternalCleanup() #31 0x7f602dd50849 base::Value::~Value() #32 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #33 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #34 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #35 0x000003a4bdb5 base::Optional<>::~Optional() #36 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #37 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #38 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #39 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #40 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #41 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #42 0x0000043f0875 std::__1::vector<>::~vector() #43 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #44 0x7f602df8bf0c JsonPrefStore::ReportValueChanged() #45 0x7f602dfccf15 WriteablePrefStore::ReportSubValuesChanged() #46 0x7f602dfbc3c9 PrefService::ReportUserPrefChanged() #47 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #48 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #49 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #50 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #51 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #52 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #53 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #54 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #55 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #56 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #57 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #58 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #59 0x7f602da3efde _ZNO4base12OnceCallbackIFvvEE3RunEv #60 0x7f602da8f3ba base::debug::TaskAnnotator::RunTask() #61 0x7f602db1da28 base::MessageLoop::RunTask() [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [1586:1586:0921/100605.218074:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [1586:1586:0921/100606.165898:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [1586:1601:0921/100606.651586:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [1586:1586:0921/100606.902751:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:45646/extensions/api_test/webstore_private/common.js (41) [1586:1663:0921/100607.000111:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x34568df66400, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7ff82357e7c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7ff85af2fb53 @ 0x7ff85aeb9f9d @ 0x7ff85aeb9ae3 @ 0x7ff85aeb9495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7ff8479efc39 @ 0x7ff8479f0099 @ 0x7ff84fc1c79b @ 0x7ff850ba469a @ 0x7ff850ee6d26 @ 0x7ff850ed0dc7 @ 0x7ff8479f48d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x34568df66400, user ptr: 0x34568df66420, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7ff85ae8211d base::debug::StackTrace::StackTrace() #1 0x7ff85ab93f3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7ff82d13dcb0 <unknown> #4 0x7ff85aed8aa4 tcmalloc::Abort() #5 0x7ff85aee09af LogPrintf() #6 0x7ff85aee085b RAW_VLOG() #7 0x7ff85af084d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7ff85af08228 MallocBlock::CheckForDanglingWrites() #9 0x7ff85af05265 MallocBlock::ProcessFreeQueue() #10 0x7ff85af09eb4 MallocBlock::Deallocate() #11 0x7ff85af01e25 DebugDeallocate() #12 0x7ff85af2fb53 tc_free #13 0x7ff85aeb9f9d (anonymous namespace)::TCFree() #14 0x7ff85aeb9ae3 ShimCppDelete #15 0x7ff85aeb9495 operator delete() #16 0x7ff85abe1627 std::__1::pair<>::~pair() #17 0x7ff85abe14ae std::__1::__vector_base<>::~__vector_base() #18 0x7ff85abe0385 std::__1::vector<>::~vector() #19 0x7ff85abe1385 base::internal::flat_tree<>::Impl::~Impl() #20 0x7ff85abe1365 base::internal::flat_tree<>::~flat_tree() #21 0x7ff85abe0365 base::flat_map<>::~flat_map() #22 0x7ff85ae56806 base::Value::InternalCleanup() #23 0x7ff85ae56849 base::Value::~Value() #24 0x7ff85abe161e std::__1::pair<>::~pair() #25 0x7ff85abe14ae std::__1::__vector_base<>::~__vector_base() #26 0x7ff85abe0385 std::__1::vector<>::~vector() #27 0x7ff85abe1385 base::internal::flat_tree<>::Impl::~Impl() #28 0x7ff85abe1365 base::internal::flat_tree<>::~flat_tree() #29 0x7ff85abe0365 base::flat_map<>::~flat_map() #30 0x7ff85ae56806 base::Value::InternalCleanup() #31 0x7ff85ae56849 base::Value::~Value() #32 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #33 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #34 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #35 0x000003a4bdb5 base::Optional<>::~Optional() #36 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #37 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #38 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #39 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #40 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #41 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #42 0x0000043f0875 std::__1::vector<>::~vector() #43 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #44 0x7ff85b091f0c JsonPrefStore::ReportValueChanged() #45 0x7ff85b0d2f15 WriteablePrefStore::ReportSubValuesChanged() #46 0x7ff85b0c23c9 PrefService::ReportUserPrefChanged() #47 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #48 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #49 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #50 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #51 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #52 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #53 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #54 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #55 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #56 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #57 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #58 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #59 0x7ff85ab44fde _ZNO4base12OnceCallbackIFvvEE3RunEv #60 0x7ff85ab953ba base::debug::TaskAnnotator::RunTask() #61 0x7ff85ac23a28 base::MessageLoop::RunTask() [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [2634:2634:0921/100658.541580:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [2634:2634:0921/100659.409723:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [2634:2650:0921/100659.967975:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [2634:2634:0921/100700.213475:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:46351/extensions/api_test/webstore_private/common.js (41) [2634:2708:0921/100700.312094:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x71ddbeecb00, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7f936a5277c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7f93a1ed8b53 @ 0x7f93a1e62f9d @ 0x7f93a1e62ae3 @ 0x7f93a1e62495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7f938e998c39 @ 0x7f938e999099 @ 0x7f9396bc579b @ 0x7f9397b4d69a @ 0x7f9397e8fd26 @ 0x7f9397e79dc7 @ 0x7f938e99d8d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x71ddbeecb00, user ptr: 0x71ddbeecb20, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7f93a1e2b11d base::debug::StackTrace::StackTrace() #1 0x7f93a1b3cf3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7f93740e6cb0 <unknown> #4 0x7f93a1e81aa4 tcmalloc::Abort() #5 0x7f93a1e899af LogPrintf() #6 0x7f93a1e8985b RAW_VLOG() #7 0x7f93a1eb14d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7f93a1eb1228 MallocBlock::CheckForDanglingWrites() #9 0x7f93a1eae265 MallocBlock::ProcessFreeQueue() #10 0x7f93a1eb2eb4 MallocBlock::Deallocate() #11 0x7f93a1eaae25 DebugDeallocate() #12 0x7f93a1ed8b53 tc_free #13 0x7f93a1e62f9d (anonymous namespace)::TCFree() #14 0x7f93a1e62ae3 ShimCppDelete #15 0x7f93a1e62495 operator delete() #16 0x7f93a1b8a814 std::__1::__vector_base<>::~__vector_base() #17 0x7f93a1b893a5 std::__1::vector<>::~vector() #18 0x7f93a1dff81e base::Value::InternalCleanup() #19 0x7f93a1dff849 base::Value::~Value() #20 0x7f93a1b8a61e std::__1::pair<>::~pair() #21 0x7f93a1b8a4ae std::__1::__vector_base<>::~__vector_base() #22 0x7f93a1b89385 std::__1::vector<>::~vector() #23 0x7f93a1b8a385 base::internal::flat_tree<>::Impl::~Impl() #24 0x7f93a1b8a365 base::internal::flat_tree<>::~flat_tree() #25 0x7f93a1b89365 base::flat_map<>::~flat_map() #26 0x7f93a1dff806 base::Value::InternalCleanup() #27 0x7f93a1dff849 base::Value::~Value() #28 0x7f93a1b8a61e std::__1::pair<>::~pair() #29 0x7f93a1b8a4ae std::__1::__vector_base<>::~__vector_base() #30 0x7f93a1b89385 std::__1::vector<>::~vector() #31 0x7f93a1b8a385 base::internal::flat_tree<>::Impl::~Impl() #32 0x7f93a1b8a365 base::internal::flat_tree<>::~flat_tree() #33 0x7f93a1b89365 base::flat_map<>::~flat_map() #34 0x7f93a1dff806 base::Value::InternalCleanup() #35 0x7f93a1dff849 base::Value::~Value() #36 0x7f93a1b8a61e std::__1::pair<>::~pair() #37 0x7f93a1b8a4ae std::__1::__vector_base<>::~__vector_base() #38 0x7f93a1b89385 std::__1::vector<>::~vector() #39 0x7f93a1b8a385 base::internal::flat_tree<>::Impl::~Impl() #40 0x7f93a1b8a365 base::internal::flat_tree<>::~flat_tree() #41 0x7f93a1b89365 base::flat_map<>::~flat_map() #42 0x7f93a1dff806 base::Value::InternalCleanup() #43 0x7f93a1dff849 base::Value::~Value() #44 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #45 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #46 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #47 0x000003a4bdb5 base::Optional<>::~Optional() #48 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #49 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #50 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #51 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #52 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #53 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #54 0x0000043f0875 std::__1::vector<>::~vector() #55 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #56 0x7f93a203af0c JsonPrefStore::ReportValueChanged() #57 0x7f93a207bf15 WriteablePrefStore::ReportSubValuesChanged() #58 0x7f93a206b3c9 PrefService::ReportUserPrefChanged() #59 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #60 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #61 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() [ RUN ] ExtensionWebstorePrivateApiTest.IncorrectManifest1 [3530:3530:0921/100753.356030:WARNING:user_policy_manager_factory_chromeos.cc(208)] No policy loaded for known non-enterprise user [3530:3530:0921/100754.231049:ERROR:gpu_interface_provider.cc(87)] Not implemented reached in virtual void content::GpuInterfaceProvider::RegisterOzoneGpuInterfaces(service_manager::BinderRegistry *) [3530:3552:0921/100754.698374:WARNING:simple_synchronous_entry.cc(1252)] Could not open platform files for entry. [3530:3530:0921/100754.964715:INFO:CONSOLE(41)] "Synchronous XMLHttpRequest on the main thread is deprecated because of its detrimental effects to the end user's experience. For more help, check https://xhr.spec.whatwg.org/.", source: http://www.example.com:35848/extensions/api_test/webstore_private/common.js (41) [3530:3601:0921/100755.072055:WARNING:embedded_test_server.cc(239)] Request not handled. Returning 404: /favicon.ico Found a corrupted memory buffer in MallocBlock (may be offset from user ptr): buffer index: 0, buffer ptr: 0x3986a258b600, size of buffer: 112 Buffer byte 88 is 0x00 (should be 0xcd). Buffer byte 89 is 0x00 (should be 0xcd). Buffer byte 90 is 0x00 (should be 0xcd). Buffer byte 91 is 0x00 (should be 0xcd). Buffer byte 92 is 0x00 (should be 0xcd). Buffer byte 93 is 0x00 (should be 0xcd). Buffer byte 94 is 0x00 (should be 0xcd). Buffer byte 95 is 0x00 (should be 0xcd). Deleted by thread 0x7f541981e7c0 *** WARNING: Cannot convert addresses to symbols in output below. *** Reason: Cannot find 'pprof' (is PPROF_PATH set correctly?) *** If you cannot fix this, try running pprof directly. @ 0x7f54511cfb53 @ 0x7f5451159f9d @ 0x7f5451159ae3 @ 0x7f5451159495 @ 0x6fdec82 @ 0x7b02aa7 @ 0x6fe665c @ 0x7f543dc8fc39 @ 0x7f543dc90099 @ 0x7f5445ebc79b @ 0x7f5446e4469a @ 0x7f5447186d26 @ 0x7f5447170dc7 @ 0x7f543dc948d9 @ 0xa12fa9a @ 0x4b90fb1 Memory was written to after being freed. MallocBlock: 0x3986a258b600, user ptr: 0x3986a258b620, size: 112. If you can't find the source of the error, try using ASan (http://code.google.com/p/address-sanitizer/), Valgrind, or Purify, or study the output of the deleter's stack printed above. BrowserTestBase received signal: Segmentation fault. Backtrace: #0 0x7f545112211d base::debug::StackTrace::StackTrace() #1 0x7f5450e33f3c base::debug::StackTrace::StackTrace() #2 0x000008084bc4 content::(anonymous namespace)::DumpStackTraceSignalHandler() #3 0x7f54233ddcb0 <unknown> #4 0x7f5451178aa4 tcmalloc::Abort() #5 0x7f54511809af LogPrintf() #6 0x7f545118085b RAW_VLOG() #7 0x7f54511a84d9 MallocBlock::CheckForCorruptedBuffer() #8 0x7f54511a8228 MallocBlock::CheckForDanglingWrites() #9 0x7f54511a5265 MallocBlock::ProcessFreeQueue() #10 0x7f54511a9eb4 MallocBlock::Deallocate() #11 0x7f54511a1e25 DebugDeallocate() #12 0x7f54511cfb53 tc_free #13 0x7f5451159f9d (anonymous namespace)::TCFree() #14 0x7f5451159ae3 ShimCppDelete #15 0x7f5451159495 operator delete() #16 0x7f5450e81627 std::__1::pair<>::~pair() #17 0x7f5450e814ae std::__1::__vector_base<>::~__vector_base() #18 0x7f5450e80385 std::__1::vector<>::~vector() #19 0x7f5450e81385 base::internal::flat_tree<>::Impl::~Impl() #20 0x7f5450e81365 base::internal::flat_tree<>::~flat_tree() #21 0x7f5450e80365 base::flat_map<>::~flat_map() #22 0x7f54510f6806 base::Value::InternalCleanup() #23 0x7f54510f6849 base::Value::~Value() #24 0x7f5450e8161e std::__1::pair<>::~pair() #25 0x7f5450e814ae std::__1::__vector_base<>::~__vector_base() #26 0x7f5450e80385 std::__1::vector<>::~vector() #27 0x7f5450e81385 base::internal::flat_tree<>::Impl::~Impl() #28 0x7f5450e81365 base::internal::flat_tree<>::~flat_tree() #29 0x7f5450e80365 base::flat_map<>::~flat_map() #30 0x7f54510f6806 base::Value::InternalCleanup() #31 0x7f54510f6849 base::Value::~Value() #32 0x000003a4bf7d base::internal::OptionalStorageBase<>::~OptionalStorageBase() #33 0x000003a4bf45 base::internal::OptionalStorage<>::~OptionalStorage() #34 0x000003a4bf25 base::internal::OptionalBase<>::~OptionalBase() #35 0x000003a4bdb5 base::Optional<>::~Optional() #36 0x00000440dd26 prefs::mojom::PrefUpdateValue::DestroyActive() #37 0x00000440dc89 prefs::mojom::PrefUpdateValue::~PrefUpdateValue() #38 0x0000043f0843 mojo::StructPtr<>::~StructPtr() #39 0x00000440c933 prefs::mojom::PrefUpdate::~PrefUpdate() #40 0x0000043f2833 mojo::StructPtr<>::~StructPtr() #41 0x0000043f26ce std::__1::__vector_base<>::~__vector_base() #42 0x0000043f0875 std::__1::vector<>::~vector() #43 0x0000055e0763 prefs::PersistentPrefStoreImpl::OnPrefValueChanged() #44 0x7f5451331f0c JsonPrefStore::ReportValueChanged() #45 0x7f5451372f15 WriteablePrefStore::ReportSubValuesChanged() #46 0x7f54513623c9 PrefService::ReportUserPrefChanged() #47 0x00000440b863 prefs::ScopedDictionaryPrefUpdate::~ScopedDictionaryPrefUpdate() #48 0x000004b614dd extensions::(anonymous namespace)::ScopedExtensionPrefUpdate::~ScopedExtensionPrefUpdate() #49 0x000004b6135b extensions::ExtensionPrefs::UpdateExtensionPref() #50 0x000004afc810 extensions::EventRouter::SetRegisteredEvents() #51 0x000004af9396 extensions::EventRouter::RemoveLazyEventListenerImpl() #52 0x000004af9020 extensions::EventRouter::RemoveLazyEventListener() #53 0x000004afee2b extensions::EventRouter::DispatchEventWithLazyListener() #54 0x0000050772fd extensions::RuntimeEventRouter::DispatchOnInstalledEvent() #55 0x000005082375 _ZN4base8internal13FunctorTraitsIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS5_11char_traitsIcEENS5_9allocatorIcEEEERKNS_7VersionEbEvE6InvokeIRKSI_JRKS4_SD_SG_RKbEEEvOT_DpOT0_ #56 0x0000050822ed _ZN4base8internal12InvokeHelperILb0EvE8MakeItSoIRKPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS7_11char_traitsIcEENS7_9allocatorIcEEEERKNS_7VersionEbEJRKS6_SF_SI_RKbEEEvOT_DpOT0_ #57 0x000005082282 _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE7RunImplIRKSJ_RKNS6_5tupleIJS5_SC_SF_bEEEJLm0ELm1ELm2ELm3EEEEvOT_OT0_NS6_16integer_sequenceImJXspT1_EEEE #58 0x0000050820cc _ZN4base8internal7InvokerINS0_9BindStateIPFvPN7content14BrowserContextERKNSt3__112basic_stringIcNS6_11char_traitsIcEENS6_9allocatorIcEEEERKNS_7VersionEbEJS5_SC_SF_bEEEFvvEE3RunEPNS0_13BindStateBaseE #59 0x7f5450de4fde _ZNO4base12OnceCallbackIFvvEE3RunEv #60 0x7f5450e353ba base::debug::TaskAnnotator::RunTask() #61 0x7f5450ec3a28 base::MessageLoop::RunTask()