Author Topic: Memory Leak plugin-container.exe (Palemon) - Break instruction exception  (Read 7586 times)

0 Members and 1 Guest are viewing this topic.

makinero

  • Guest
plugin-container.exe (play YouTube)
Use ~3 GB RAM Peak

-----------------------------------------------------------------
FAULTING_IP:
+0
00000000`00000000 ??              ???

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 0000000000000000
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  0000000000000000 -- (.cxr 0x0;r)
rax=0000036b346bf000 rbx=00000000003cda10 rcx=000000002e9219f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000001
rip=000000007774c0ea rsp=00000000003cd8d8 rbp=0000000000000001
 r8=000001787bc82780  r9=0000000068160200 r10=0000000000000000
r11=000000006817bec8 r12=0000000000000000 r13=00000000003cd980
r14=0000000000000000 r15=00000000020220f0
iopl=0         nv up ei pl zr na po nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
ntdll!ZwWaitForMultipleObjects+0xa:
00000000`7774c0ea c3              ret

FAULTING_THREAD:  0000000000001404

DEFAULT_BUCKET_ID:  WRONG_SYMBOLS

PROCESS_NAME:  plugin-container.exe

ADDITIONAL_DEBUG_TEXT: 
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.

MODULE_NAME: xul

FAULTING_MODULE: 0000000077700000 ntdll

DEBUG_FLR_IMAGE_TIMESTAMP:  572e6b2e

ERROR_CODE: (NTSTATUS) 0x80000003 - {WYJ

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - Co najmniej jeden z argument w jest nieprawid owy.

APP:  plugin-container.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

PRIMARY_PROBLEM_CLASS:  WRONG_SYMBOLS

BUGCHECK_STR:  APPLICATION_FAULT_WRONG_SYMBOLS

LAST_CONTROL_TRANSFER:  from 000007fefd701430 to 000000007774c0ea

STACK_TEXT: 
00000000`003cd8d8 000007fe`fd701430 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!ZwWaitForMultipleObjects+0xa
00000000`003cd8e0 00000000`776016d3 : 00000000`003cda18 00000000`003cda10 00000000`00000000 00000000`00000401 : KERNELBASE!GetCurrentProcess+0x40
00000000`003cd9e0 00000000`774f8fbd : 00000000`003cdaa0 00000000`ffffffff 00000000`00000000 00000000`0000001c : kernel32!WaitForMultipleObjectsEx+0xb3
00000000`003cda70 00000000`774f62ce : 00000000`0202b240 00000000`00000001 00000000`00000000 00000000`00000000 : user32!GetScrollBarInfo+0x1dd
00000000`003cdb10 000007fe`e9c40c3c : 00000000`22355650 00000000`774eb9cc 00000000`00000000 000007fe`e9c3ad1e : user32!MsgWaitForMultipleObjectsEx+0x2e
00000000`003cdb50 000007fe`e9c40b2e : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : xul!NS_InvokeByIndex+0x1959c
00000000`003cdbc0 000007fe`e9c4031b : 00000000`00000000 00000000`0202b240 00000000`003cddb0 00000000`020671e0 : xul!NS_InvokeByIndex+0x1948e
00000000`003cdc30 000007fe`e9c3a5e9 : 00000000`003cdda0 00000000`00000009 00000000`003cdda0 00000000`00000000 : xul!NS_InvokeByIndex+0x18c7b
00000000`003cdc80 000007fe`e89a2f08 : 000007fe`e89a3a30 00000000`003cddb0 00000000`00000000 00000000`02022390 : xul!NS_InvokeByIndex+0x12f49
00000000`003cdcb0 00000001`3ff11356 : 00000000`0000000c 00000000`020220f0 00000000`0000000c 00000000`02044800 : xul!XRE_InitChildProcess+0xbf8
00000000`003cf850 00000001`3ff116d3 : 00000000`00000000 00000000`00000000 00000000`0000000d 00000000`00000000 : plugin_container+0x1356
00000000`003cf8b0 00000000`775f59bd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : plugin_container+0x16d3
00000000`003cf8e0 00000000`7772a2e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`003cf910 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


STACK_COMMAND:  ~0s; .ecxr ; kb

FOLLOWUP_IP:
xul!NS_InvokeByIndex+1959c
000007fe`e9c40c3c 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  xul!NS_InvokeByIndex+1959c

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  xul.dll

BUCKET_ID:  WRONG_SYMBOLS

FAILURE_BUCKET_ID:  WRONG_SYMBOLS_80000003_xul.dll!NS_InvokeByIndex

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:wrong_symbols_80000003_xul.dll!ns_invokebyindex

FAILURE_ID_HASH:  {3181f414-77a8-db25-cd89-b40d3312fd07}

Followup: MachineOwner
---------

« Last Edit: May 30, 2016, 05:30:20 am by makinero »