Console log: 'baseservices-exceptions' from job 7cf6074e-8ed0-4545-a3f6-ef2badda9fc5 workitem 644d8be1-89cb-4ef9-a225-33d51edae8bd (windows.10.amd64.open.rt) executed on machine a00KGAC running Windows-2016Server-10.0.14393-SP0 C:\h\w\B3EA0A3E\w\B27B0A0C\e>taskkill.exe /f /im corerun.exe 2>nul C:\h\w\B3EA0A3E\w\B27B0A0C\e>set CORE_ROOT=C:\h\w\B3EA0A3E\p C:\h\w\B3EA0A3E\w\B27B0A0C\e>set _NT_SYMBOL_PATH=C:\h\w\B3EA0A3E\p\PDB C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __TestEnv=C:\h\w\B3EA0A3E\w\B27B0A0C\u\SetStressModes_no_tiered_compilation.cmd C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __TestTimeout=600000 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __TestCollectionTimeoutMins=30 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __CollectDumps=1 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __CrashDumpFolder=C:\cores C:\h\w\B3EA0A3E\w\B27B0A0C\e>set __TestArchitecture=x64 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set ASAN_SAVE_DUMPS=C:\cores\asan.dmp C:\h\w\B3EA0A3E\w\B27B0A0C\e>type C:\h\w\B3EA0A3E\w\B27B0A0C\u\SetStressModes_no_tiered_compilation.cmd set DOTNET_TieredCompilation=0 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set PATH=C:\h\w\B3EA0A3E\p\dotnet-cli;C:\python3\Scripts\;C:\python3\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Debuggers\x64;C:\Program Files\Microsoft SQL Server\160\Tools\Binn\;C:\Users\runner\AppData\Local\Microsoft\WindowsApps C:\h\w\B3EA0A3E\w\B27B0A0C\e>set DOTNET_ROOT=C:\h\w\B3EA0A3E\p\dotnet-cli C:\h\w\B3EA0A3E\w\B27B0A0C\e>set DOTNET_CLI_TELEMETRY_OPTOUT=1 C:\h\w\B3EA0A3E\w\B27B0A0C\e>set DOTNET_CLI_HOME=C:\h\w\B3EA0A3E\w\B27B0A0C\e\.dotnet C:\h\w\B3EA0A3E\w\B27B0A0C\e>set NUGET_PACKAGES=C:\h\w\B3EA0A3E\w\B27B0A0C\e\.nuget C:\h\w\B3EA0A3E\w\B27B0A0C\e>dotnet C:\h\w\B3EA0A3E\p\sos\tools\net6.0\any\dotnet-sos.dll install --architecture x64 Installing SOS to C:\Users\runner\.dotnet\sos Installing over existing installation... Creating installation directory... Copying files from C:\h\w\B3EA0A3E\p\sos\tools\net6.0\any\win-x64 Copying files from C:\h\w\B3EA0A3E\p\sos\tools\net6.0\any\lib Execute '.load C:\Users\runner\.dotnet\sos\sos.dll' to load SOS in your Windows debugger. Cleaning up... SOS install succeeded C:\h\w\B3EA0A3E\w\B27B0A0C\e>set TEST_HARNESS_STRIPE_TO_EXECUTE=.0.1 C:\h\w\B3EA0A3E\w\B27B0A0C\e>call baseservices\exceptions\baseservices-exceptions\baseservices-exceptions.cmd -usewatcher BEGIN EXECUTION "C:\h\w\B3EA0A3E\p\watchdog.exe" 29 "C:\h\w\B3EA0A3E\p\corerun.exe" -p "System.Reflection.Metadata.MetadataUpdater.IsSupported=false" -p "System.Runtime.Serialization.EnableUnsafeBinaryFormatterSerialization=true" baseservices-exceptions.dll 00:42:55.523 Running test: _ExceptionInterop::ExceptionInterop.ThrowNativeExceptionAndCatchInFrame() 00:42:55.675 Passed test: _ExceptionInterop::ExceptionInterop.ThrowNativeExceptionAndCatchInFrame() 00:42:55.766 Running test: _ExceptionInterop::ExceptionInterop.ThrowManagedExceptionThroughNativeAndCatchInFrame() 00:42:55.769 Passed test: _ExceptionInterop::ExceptionInterop.ThrowManagedExceptionThroughNativeAndCatchInFrame() Assert failure(PID 8352 [0x000020a0], Thread: 8356 [0x20a4]): ohThrowable CORECLR! PreStubWorker$catch$17 + 0x106 (0x00007ffb`8fb59036) CORECLR! CallSettingFrame_LookupContinuationIndex + 0x20 (0x00007ffb`8fa79b80) CORECLR! _FrameHandler4::CxxCallCatchBlock + 0x1DE (0x00007ffb`8fa779ce) NTDLL! RtlCaptureContext + 0x3C3 (0x00007ffb`c421a4b3) CORECLR! PreStubWorker + 0x64F (0x00007ffb`8f5262ff) CORECLR! ThePreStub + 0x55 (0x00007ffb`8fa34c55) SYSTEM.PRIVATE.CORELIB! + 0x0 (0x00007ffb`8e24cd13) SYSTEM.PRIVATE.CORELIB! + 0x0 (0x00007ffb`8dbf4eaa) SYSTEM.PRIVATE.CORELIB! + 0x0 (0x00007ffb`8dd7393f) SYSTEM.PRIVATE.CORELIB! + 0x0 (0x00007ffb`8dd73f1e) File: D:\a\_work\1\s\src\coreclr\vm\prestub.cpp:1900 Image: C:\h\w\B3EA0A3E\p\corerun.exe App Exit Code: -1073740286 Expected: 100 Actual: -1073740286 END EXECUTION - FAILED FAILED [XUnitLogChecker]: 00:42:59.37: The full run will be done. [XUnitLogChecker]: 00:42:59.37: Item 'baseservices-exceptions' did not finish running. Checking and fixing the log... [XUnitLogChecker]: 00:42:59.38: XUnit log file has been fixed! 1/29 tests run. * 1 tests passed. * 0 tests failed. * 0 tests skipped. [XUnitLogChecker]: 00:42:59.38: Checking for dumps... [XUnitLogChecker]: 00:42:59.38: Reading crash dump 'C:\cores\corerun.exe.8352.dmp'... [XUnitLogChecker]: 00:42:59.38: Stack Trace Found: Invoking: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe -c "$ cdb: Reading initial command '$ .cordll -lp "C:\h\w\B3EA0A3E\p" The call to LoadLibrary(sos) failed, Win32 error 0n2 "The system cannot find the file specified." Please check your debugger configuration and/or network access. CLR DLL status: Loaded DLL C:\h\w\B3EA0A3E\p\mscordaccore.dll 0:000> .load C:\Users\runner\.dotnet\sos\sos.dll 0:000> ~*k . 0 Id: 20a0.20a4 Suspend: 0 Teb: 0000001e`3e3f3000 Unfrozen Child-SP RetAddr Call Site 0000001e`3e571690 00007ffb`8f126a13 KERNELBASE!RaiseFailFastException+0xae 0000001e`3e571c60 00007ffb`8f126283 coreclr!_DbgBreakCheck+0x2d3 0000001e`3e572db0 00007ffb`8f1264c1 coreclr!_DbgBreakCheckNoThrow+0x63 0000001e`3e572e60 00007ffb`8fb59036 coreclr!DbgAssertDialog+0x1d1 0000001e`3e572f70 00007ffb`8fa79b80 coreclr!PreStubWorker$catch$17+0x106 0000001e`3e572fc0 00007ffb`8fa779ce coreclr!_CallSettingFrame_LookupContinuationIndex+0x20 0000001e`3e572ff0 00007ffb`c421a4b3 coreclr!__FrameHandler4::CxxCallCatchBlock+0x1de 0000001e`3e5730c0 00007ffb`8f5262ff ntdll!RtlCaptureContext+0x3c3 0000001e`3e57aa70 00007ffb`8fa34c55 coreclr!PreStubWorker+0x64f *** WARNING: Unable to verify checksum for System.Private.CoreLib.dll 0000001e`3e57ace0 00007ffb`8e24cd13 coreclr!ThePreStub+0x55 0000001e`3e57ad90 00007ffb`8dbf4eaa System_Private_CoreLib+0x9ecd13 0000001e`3e57add0 00007ffb`8dd7393f System_Private_CoreLib+0x394eaa 0000001e`3e57ae40 00007ffb`8dd73f1e System_Private_CoreLib+0x51393f 0000001e`3e57ae70 00007ffb`8fa33453 System_Private_CoreLib+0x513f1e 0000001e`3e57aeb0 00007ffb`8f5fc092 coreclr!CallDescrWorkerInternal+0x83 0000001e`3e57aef0 00007ffb`8f3c3d53 coreclr!DispatchCallSimple+0x192 0000001e`3e57b020 00007ffb`8f3b4fb9 coreclr!HandleManagedFault+0x3f3 0000001e`3e57ca60 00007ffb`c41d70f0 coreclr!CLRVectoredExceptionHandlerShim+0x2e9 0000001e`3e57cae0 00007ffb`c41a49fb ntdll!RtlInitializeCriticalSection+0x190 0000001e`3e57cb80 00007ffb`c4219fda ntdll!RtlImageNtHeaderEx+0x17b 0000001e`3e57d280 00007ffb`2fff8e3e ntdll!KiUserExceptionDispatcher+0x3a 0000001e`3e57dff0 00007ffb`2fff896a 0x00007ffb`2fff8e3e 0000001e`3e57e0c0 00007ffb`2fffa117 0x00007ffb`2fff896a 0000001e`3e57e1c0 00007ffb`2fff20ec 0x00007ffb`2fffa117 0000001e`3e57e260 00007ffb`8fa33453 0x00007ffb`2fff20ec 0000001e`3e57e340 00007ffb`8f5fbdc0 coreclr!CallDescrWorkerInternal+0x83 0000001e`3e57e380 00007ffb`8f2ce6bd coreclr!MethodDescCallSite::CallTargetWorker+0xa80 (Inline Function) --------`-------- coreclr!MethodDescCallSite::Call_RetArgSlot+0xa0 0000001e`3e57e820 00007ffb`8f2cdef0 coreclr!RunMainInternal+0x3ed 0000001e`3e57ea50 00007ffb`8f2ce007 coreclr!``RunMain'::`21'::__Body::Run'::`5'::__Body::Run+0x80 0000001e`3e57eaa0 00007ffb`8f2ce1eb coreclr!`RunMain'::`21'::__Body::Run+0xb7 0000001e`3e57eb20 00007ffb`8f2c84c3 coreclr!RunMain+0x16b 0000001e`3e57ec00 00007ffb`8f3792b6 coreclr!Assembly::ExecuteMainMethod+0x303 0000001e`3e57f050 00007ffb`8fa5d796 coreclr!CorHost2::ExecuteAssembly+0x6c6 *** WARNING: Unable to verify checksum for corerun.exe 0000001e`3e57f2e0 00007ff6`72882d80 coreclr!coreclr_execute_assembly+0x1e6 0000001e`3e57f3d0 00007ff6`7288762d corerun+0x12d80 0000001e`3e57fc70 00007ff6`72892f39 corerun!GetCurrentClrDetails+0x27d 0000001e`3e57fdb0 00007ff6`72892e52 corerun!GetCurrentClrDetails+0xbb89 0000001e`3e57fe00 00007ff6`72892d0e corerun!GetCurrentClrDetails+0xbaa2 0000001e`3e57fe70 00007ff6`72892fae corerun!GetCurrentClrDetails+0xb95e 0000001e`3e57fea0 00007ffb`c17384d4 corerun!GetCurrentClrDetails+0xbbfe 0000001e`3e57fed0 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3e57ff00 00000000`00000000 ntdll!RtlUserThreadStart+0x21 1 Id: 20a0.20ac Suspend: 0 Teb: 0000001e`3e3f5000 Unfrozen Child-SP RetAddr Call Site 0000001e`3e6ff558 00007ffb`c418ee8e ntdll!NtWaitForWorkViaWorkerFactory+0x14 0000001e`3e6ff560 00007ffb`c17384d4 ntdll!RtlReleaseSRWLockExclusive+0x296e 0000001e`3e6ff960 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3e6ff990 00000000`00000000 ntdll!RtlUserThreadStart+0x21 2 Id: 20a0.20b0 Suspend: 0 Teb: 0000001e`3e3f7000 Unfrozen Child-SP RetAddr Call Site 0000001e`3e87f8c8 00007ffb`c418ee8e ntdll!NtWaitForWorkViaWorkerFactory+0x14 0000001e`3e87f8d0 00007ffb`c17384d4 ntdll!RtlReleaseSRWLockExclusive+0x296e 0000001e`3e87fcd0 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3e87fd00 00000000`00000000 ntdll!RtlUserThreadStart+0x21 3 Id: 20a0.20b4 Suspend: 0 Teb: 0000001e`3e3f9000 Unfrozen Child-SP RetAddr Call Site 0000001e`3e9ff898 00007ffb`c418ee8e ntdll!NtWaitForWorkViaWorkerFactory+0x14 0000001e`3e9ff8a0 00007ffb`c17384d4 ntdll!RtlReleaseSRWLockExclusive+0x296e 0000001e`3e9ffca0 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3e9ffcd0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 4 Id: 20a0.20b8 Suspend: 0 Teb: 0000001e`3e3fb000 Unfrozen Child-SP RetAddr Call Site 0000001e`3eb7f4f8 00007ffb`c0e54ddf ntdll!NtWaitForMultipleObjects+0x14 0000001e`3eb7f500 00007ffb`c0e54cde KERNELBASE!WaitForMultipleObjectsEx+0xef 0000001e`3eb7f800 00007ffb`8f1d4789 KERNELBASE!WaitForMultipleObjects+0xe 0000001e`3eb7f840 00007ffb`8f0ba3cc coreclr!ds_ipc_poll+0x179 0000001e`3eb7fad0 00007ffb`8f0cf5cc coreclr!ds_ipc_stream_factory_get_next_available_stream+0x2ac 0000001e`3eb7fbc0 00007ffb`8f0cf8de coreclr!server_loop_tick+0x4c 0000001e`3eb7fc40 00007ffb`c17384d4 coreclr!server_thread+0xae 0000001e`3eb7fc70 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3eb7fca0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 5 Id: 20a0.20bc Suspend: 0 Teb: 0000001e`3e3fd000 Unfrozen Child-SP RetAddr Call Site 0000001e`3ecff758 00007ffb`c0e54ddf ntdll!NtWaitForMultipleObjects+0x14 0000001e`3ecff760 00007ffb`8f1c9ff6 KERNELBASE!WaitForMultipleObjectsEx+0xef 0000001e`3ecffa60 00007ffb`8f1cca00 coreclr!DebuggerRCThread::MainLoop+0x666 0000001e`3ecffca0 00007ffb`8f1ccba9 coreclr!DebuggerRCThread::ThreadProc+0x690 0000001e`3ecffdd0 00007ffb`c17384d4 coreclr!DebuggerRCThread::ThreadProcStatic+0x79 0000001e`3ecffe00 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3ecffe30 00000000`00000000 ntdll!RtlUserThreadStart+0x21 6 Id: 20a0.20c0 Suspend: 0 Teb: 0000001e`3e200000 Unfrozen Child-SP RetAddr Call Site 0000001e`3ee7efa8 00007ffb`c0e54ddf ntdll!NtWaitForMultipleObjects+0x14 0000001e`3ee7efb0 00007ffb`8f69f506 KERNELBASE!WaitForMultipleObjectsEx+0xef 0000001e`3ee7f2b0 00007ffb`8f69e70c coreclr!FinalizerThread::WaitForFinalizerEvent+0xd6 0000001e`3ee7f310 00007ffb`8f579b72 coreclr!FinalizerThread::FinalizerThreadWorker+0x24c 0000001e`3ee7f620 00007ffb`8f579cb6 coreclr!ManagedThreadBase_DispatchInner+0xf2 0000001e`3ee7f6f0 00007ffb`8f57bdb1 coreclr!ManagedThreadBase_DispatchMiddle+0xe6 0000001e`3ee7f870 00007ffb`8f57bea3 coreclr!``ManagedThreadBase_DispatchOuter'::`8'::__Body::Run'::`5'::__Body::Run+0x81 0000001e`3ee7f8c0 00007ffb`8f579deb coreclr!`ManagedThreadBase_DispatchOuter'::`8'::__Body::Run+0x93 0000001e`3ee7f920 00007ffb`8f579570 coreclr!ManagedThreadBase_DispatchOuter+0xeb 0000001e`3ee7f9b0 00007ffb`8f69e05e coreclr!ManagedThreadBase::KickOff+0x100 0000001e`3ee7fa90 00007ffb`c17384d4 coreclr!FinalizerThread::FinalizerThreadStart+0x1de 0000001e`3ee7fac0 00007ffb`c41c1d41 kernel32!BaseThreadInitThunk+0x14 0000001e`3ee7faf0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 0:000> !clrstack -f -all OS Thread Id: 0x20c0 Child SP IP Call Site 0000001E3EE7EFA8 00007FFBC4216F24 ntdll!NtWaitForMultipleObjects + 20 0000001E3EE7EFB0 00007FFBC0E54DDF KERNELBASE!WaitForMultipleObjectsEx + 239 0000001E3EE7F2B0 00007FFB8F69F506 coreclr!FinalizerThread::WaitForFinalizerEvent + 214 0000001E3EE7F310 00007FFB8F69E70C coreclr!FinalizerThread::FinalizerThreadWorker + 588 0000001E3EE7F620 00007FFB8F579B72 coreclr!ManagedThreadBase_DispatchInner + 242 0000001E3EE7F6F0 00007FFB8F579CB6 coreclr!ManagedThreadBase_DispatchMiddle + 230 0000001E3EE7F870 00007FFB8F57BDB1 coreclr!``ManagedThreadBase_DispatchOuter'::`8'::__Body::Run'::`5'::__Body::Run + 129 0000001E3EE7F8C0 00007FFB8F57BEA3 coreclr!`ManagedThreadBase_DispatchOuter'::`8'::__Body::Run + 147 0000001E3EE7F920 00007FFB8F579DEB coreclr!ManagedThreadBase_DispatchOuter + 235 0000001E3EE7F978 [DebuggerU2MCatchHandlerFrame: 0000001e3ee7f978] 0000001E3EE7F9B0 00007FFB8F579570 coreclr!ManagedThreadBase::KickOff + 256 0000001E3EE7FA90 00007FFB8F69E05E coreclr!FinalizerThread::FinalizerThreadStart + 478 0000001E3EE7FAC0 00007FFBC17384D4 kernel32!BaseThreadInitThunk + 20 0000001E3EE7FAF0 00007FFBC41C1D41 ntdll!RtlUserThreadStart + 33 OS Thread Id: 0x20a4 Child SP IP Call Site 0000001E3E571690 00007FFBC0EDA0BE KERNELBASE!RaiseFailFastException + 174 0000001E3E571C60 00007FFB8F126A13 coreclr!_DbgBreakCheck + 723 0000001E3E572DB0 00007FFB8F126283 coreclr!_DbgBreakCheckNoThrow + 99 0000001E3E572E60 00007FFB8F1264C1 coreclr!DbgAssertDialog + 465 0000001E3E572F70 00007FFB8FB59036 coreclr!PreStubWorker$catch$17 + 262 0000001E3E572FC0 00007FFB8FA79B80 coreclr!_CallSettingFrame_LookupContinuationIndex + 32 0000001E3E572FF0 00007FFB8FA779CE coreclr!__FrameHandler4::CxxCallCatchBlock + 478 0000001E3E5730C0 00007FFBC421A4B3 ntdll!RtlCaptureContext + 963 0000001E3E57AA70 00007FFB8F5262FF coreclr!PreStubWorker + 1615 0000001E3E57AC00 [PrestubMethodFrame: 0000001e3e57ac00] System.Private.CoreLib.dll!System.RuntimeType+IGenericCacheEntry`1[[System.__Canon, System.Private.CoreLib]].Replace(System.RuntimeType, System.__Canon) 0000001E3E57ACE0 00007FFB8FA34C55 coreclr!ThePreStub + 85 0000001E3E57AD90 00007FFB8E24CD13 System.Private.CoreLib.dll!System.Enum.g__InitializeEnumInfo|5_0[[System.UInt32, System.Private.CoreLib]](System.RuntimeType, Boolean) + 51 0000001E3E57ADD0 00007FFB8DBF4EAA System.Private.CoreLib.dll!System.Enum.ToString() + 234 0000001E3E57AE40 00007FFB8DD7393F System.Private.CoreLib.dll!System.Runtime.EH.FallbackFailFast(System.Runtime.RhFailFastReason, System.Object) + 31 0000001E3E57AE70 00007FFB8DD73F1E System.Private.CoreLib.dll!System.Runtime.EH.RhThrowHwEx(UInt32, ExInfo ByRef) + 190 0000001E3E57AEB0 00007FFB8FA33453 coreclr!CallDescrWorkerInternal + 131 0000001E3E57AEF0 00007FFB8F5FC092 coreclr!DispatchCallSimple + 402 0000001E3E57B020 00007FFB8F3C3D53 coreclr!HandleManagedFault + 1011 0000001E3E57B150 [FaultingExceptionFrame: 0000001e3e57b150] 0000001E3E57CA60 00007FFB8F3B4FB9 coreclr!CLRVectoredExceptionHandlerShim + 745 0000001E3E57CAE0 00007FFBC41D70F0 ntdll!RtlInitializeCriticalSection + 400 0000001E3E57CB80 00007FFBC41A49FB ntdll!RtlImageNtHeaderEx + 379 0000001E3E57D280 00007FFBC4219FDA ntdll!KiUserExceptionDispatcher + 58 0000001E3E57DFF0 00007FFB2FFF8E3E XUnitWrapperLibrary.dll!XUnitWrapperLibrary.TestSummary+TestResult.ToXmlString() + 638 0000001E3E57E0C0 00007FFB2FFF896A XUnitWrapperLibrary.dll!XUnitWrapperLibrary.TestSummary.ReportPassedTest(System.String, System.String, System.String, System.TimeSpan, System.String, System.IO.TextWriter, System.IO.StreamWriter, System.IO.StreamWriter) + 778 0000001E3E57E1C0 00007FFB2FFFA117 baseservices-exceptions.dll!Program.<
$>g__TestExecutor2|0_3(System.IO.StreamWriter, System.IO.StreamWriter, <>c__DisplayClass0_0 ByRef) + 679 0000001E3E57E260 00007FFB2FFF20EC baseservices-exceptions.dll!Program.
$(System.String[]) + 1116 0000001E3E57E340 00007FFB8FA33453 coreclr!CallDescrWorkerInternal + 131 0000001E3E57E380 00007FFB8F5FBDC0 coreclr!MethodDescCallSite::CallTargetWorker + 2688 0000001E3E57E820 00007FFB8F2CE6BD coreclr!RunMainInternal + 1005 0000001E3E57EA50 00007FFB8F2CDEF0 coreclr!``RunMain'::`21'::__Body::Run'::`5'::__Body::Run + 128 0000001E3E57EAA0 00007FFB8F2CE007 coreclr!`RunMain'::`21'::__Body::Run + 183 0000001E3E57EB20 00007FFB8F2CE1EB coreclr!RunMain + 363 0000001E3E57EC00 00007FFB8F2C84C3 coreclr!Assembly::ExecuteMainMethod + 771 0000001E3E57F050 00007FFB8F3792B6 coreclr!CorHost2::ExecuteAssembly + 1734 0000001E3E57F2E0 00007FFB8FA5D796 coreclr!coreclr_execute_assembly + 486 0000001E3E57F3D0 00007FF672882D80 corerun + 77184 0000001E3E57FC70 00007FF67288762D corerun!GetCurrentClrDetails + 637 0000001E3E57FDB0 00007FF672892F39 corerun!GetCurrentClrDetails + 48009 0000001E3E57FE00 00007FF672892E52 corerun!GetCurrentClrDetails + 47778 0000001E3E57FE70 00007FF672892D0E corerun!GetCurrentClrDetails + 47454 0000001E3E57FEA0 00007FF672892FAE corerun!GetCurrentClrDetails + 48126 0000001E3E57FED0 00007FFBC17384D4 kernel32!BaseThreadInitThunk + 20 0000001E3E57FF00 00007FFBC41C1D41 ntdll!RtlUserThreadStart + 33 0:000> q quit: NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\atlmfc.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\concurrency.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\cpp_rest.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\stl.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\Windows.Data.Json.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\Windows.Devices.Geolocation.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\Windows.Devices.Sensors.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\Windows.Media.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\windows.natvis' NatVis script unloaded from 'C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers\winrt.natvis' [XUnitLogChecker]: 00:43:02.41: Finished! C:\h\scripts\helix-scripts\azure\__init__.py:5: UserWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html. The pkg_resources package is slated for removal as early as 2025-11-30. Refrain from using this package or pin to Setuptools<81. import pkg_resources 2026-01-12T00:43:03.204Z INFO run.py managed_identity(151) __init__ ManagedIdentityCredential will use IMDS with client_id: 3423231b-6b9e-4177-8817-76276b647404 2026-01-12T00:43:03.205Z INFO run.py azure_utils(32) get_credential_and_access_token VMSSManagedIdentity VmssMIClientIdForUpload Auth type will be used 2026-01-12T00:43:03.210Z INFO run.py _universal(511) on_request Request URL: 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=REDACTED&resource=REDACTED&client_id=REDACTED' Request method: 'GET' Request headers: 'Metadata': 'REDACTED' 'User-Agent': 'azsdk-python-identity/1.25.1 Python/3.13.7 (Windows-2016Server-10.0.14393-SP0)' No body was attached to the request 2026-01-12T00:43:03.225Z INFO run.py _universal(554) on_response Response status: 200 Response headers: 'Content-Type': 'application/json; charset=utf-8' 'Server': 'IMDS/150.870.65.1854' 'x-ms-request-id': '0990c7ed-de73-45e8-8fc3-81193b22d842' 'Date': 'Mon, 12 Jan 2026 00:43:02 GMT' 'Content-Length': '2320' 2026-01-12T00:43:03.225Z INFO run.py msal_managed_identity_client(165) _get_token_base ImdsCredential.get_token succeeded 2026-01-12T00:43:03.225Z INFO run.py decorators(24) wrapper ManagedIdentityCredential.get_token succeeded 2026-01-12T00:43:03.226Z INFO run.py azure_utils(64) get_credential_and_access_token Credentials are valid 2026-01-12T00:43:03.227Z INFO run.py msal_managed_identity_client(165) _get_token_base ImdsCredential.get_token_info succeeded 2026-01-12T00:43:03.227Z INFO run.py decorators(24) wrapper ManagedIdentityCredential.get_token_info succeeded 2026-01-12T00:43:03.603Z INFO run.py run(48) main Beginning reading of test results. 2026-01-12T00:43:03.603Z INFO run.py __init__(42) read_results Searching 'C:\h\w\B3EA0A3E\w\B27B0A0C\e' for test results files 2026-01-12T00:43:03.604Z INFO run.py __init__(48) read_results Found results file C:\h\w\B3EA0A3E\w\B27B0A0C\e\baseservices\exceptions\baseservices-exceptions\baseservices-exceptions.testResults.xml with format xunit 2026-01-12T00:43:03.606Z INFO run.py __init__(42) read_results Searching 'C:\h\w\B3EA0A3E\w\B27B0A0C\uploads' for test results files 2026-01-12T00:43:03.607Z INFO run.py packing_test_reporter(30) report_results Packing 1 test reports to 'C:\h\w\B3EA0A3E\w\B27B0A0C\e\__test_report.json' 2026-01-12T00:43:03.607Z INFO run.py packing_test_reporter(33) report_results Packed 1968 bytes ['baseservices-exceptions' END OF WORK ITEM LOG: Command exited with 1]