Project

General

Profile

Bug #15852 ยป ruby_freeing_active_critsec.TXT

 

Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

CommandLine: C:\Ruby26-x64\bin\ruby.exe -x "C:\Ruby26-x64\bin\irb.cmd"
Starting directory: C:\Users\Lucius Riccio

************* Path validation summary **************
Response Time (ms) Location
Deferred symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
ModLoad: 00000000`00400000 00000000`00410000 image00000000`00400000
ModLoad: 00007ff9`8d870000 00007ff9`8da51000 ntdll.dll
ModLoad: 00007ff9`5d3c0000 00007ff9`5d430000 C:\WINDOWS\System32\verifier.dll
Page heap: pid 0x4458: page heap enabled with flags 0x183.
AVRF: ruby.exe: pid 0x4458: flags 0x81643027: application verifier enabled
ModLoad: 00007ff9`84d10000 00007ff9`84d4e000 C:\WINDOWS\SYSTEM32\vrfcore.dll
ModLoad: 00007ff9`83600000 00007ff9`8366f000 C:\WINDOWS\SYSTEM32\vfbasics.dll
ModLoad: 00007ff9`8b120000 00007ff9`8b1d1000 C:\WINDOWS\System32\KERNEL32.DLL
ModLoad: 00007ff9`8a560000 00007ff9`8a7d3000 C:\WINDOWS\System32\KERNELBASE.dll
ModLoad: 00007ff9`8d7a0000 00007ff9`8d83e000 C:\WINDOWS\System32\msvcrt.dll
ModLoad: 00000000`6a440000 00000000`6a77f000 C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll
ModLoad: 00007ff9`8d6d0000 00007ff9`8d771000 C:\WINDOWS\System32\ADVAPI32.dll
ModLoad: 00000000`6acc0000 00000000`6ad45000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libgmp-10.dll
ModLoad: 00007ff9`8d670000 00007ff9`8d6cb000 C:\WINDOWS\System32\sechost.dll
ModLoad: 00007ff9`8b350000 00007ff9`8b474000 C:\WINDOWS\System32\RPCRT4.dll
ModLoad: 00007ff9`8d780000 00007ff9`8d79d000 C:\WINDOWS\System32\imagehlp.dll
ModLoad: 00007ff9`8a910000 00007ff9`8aa08000 C:\WINDOWS\System32\ucrtbase.dll
ModLoad: 00007ff9`8c010000 00007ff9`8d450000 C:\WINDOWS\System32\SHELL32.dll
ModLoad: 00007ff9`88e20000 00007ff9`88e58000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL
ModLoad: 00007ff9`89e00000 00007ff9`89e49000 C:\WINDOWS\System32\cfgmgr32.dll
ModLoad: 00007ff9`8bcf0000 00007ff9`8bd99000 C:\WINDOWS\System32\shcore.dll
ModLoad: 00007ff9`8adf0000 00007ff9`8b112000 C:\WINDOWS\System32\combase.dll
ModLoad: 00007ff9`8a7e0000 00007ff9`8a85a000 C:\WINDOWS\System32\bcryptPrimitives.dll
ModLoad: 00007ff9`89e50000 00007ff9`8a55d000 C:\WINDOWS\System32\windows.storage.dll
ModLoad: 00007ff9`8bc90000 00007ff9`8bce1000 C:\WINDOWS\System32\shlwapi.dll
ModLoad: 00007ff9`8d640000 00007ff9`8d668000 C:\WINDOWS\System32\GDI32.dll
ModLoad: 00007ff9`89c40000 00007ff9`89dd2000 C:\WINDOWS\System32\gdi32full.dll
ModLoad: 00007ff9`8ac60000 00007ff9`8acff000 C:\WINDOWS\System32\msvcp_win.dll
ModLoad: 00007ff9`8bda0000 00007ff9`8bf30000 C:\WINDOWS\System32\USER32.dll
ModLoad: 00007ff9`89de0000 00007ff9`89e00000 C:\WINDOWS\System32\win32u.dll
ModLoad: 00007ff9`89be0000 00007ff9`89bf1000 C:\WINDOWS\System32\kernel.appcore.dll
ModLoad: 00007ff9`89c20000 00007ff9`89c3f000 C:\WINDOWS\System32\profapi.dll
ModLoad: 00007ff9`89b90000 00007ff9`89bdc000 C:\WINDOWS\System32\powrprof.dll
ModLoad: 00007ff9`89b80000 00007ff9`89b8a000 C:\WINDOWS\System32\FLTLIB.DLL
ModLoad: 00007ff9`8b280000 00007ff9`8b2ec000 C:\WINDOWS\System32\WS2_32.dll
(4458.3ca4): Break instruction exception - code 80000003 (first chance)
ntdll!LdrpDoDebuggerBreak+0x30:
00007ff9`8d93c93c cc int 3
0:000> g
ModLoad: 00007ff9`8b680000 00007ff9`8b6ad000 C:\WINDOWS\System32\IMM32.DLL
ModLoad: 00007ff9`898a0000 00007ff9`898b7000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll
ModLoad: 00007ff9`88c80000 00007ff9`88cb3000 C:\WINDOWS\system32\rsaenh.dll
ModLoad: 00007ff9`896a0000 00007ff9`896c5000 C:\WINDOWS\SYSTEM32\bcrypt.dll
ModLoad: 00007ff9`892a0000 00007ff9`892ab000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll
ModLoad: 00000000`6f280000 00000000`6f28e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\encdb.so
ModLoad: 00000000`68080000 00000000`6808e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\transdb.so
ModLoad: 00000000`6d0c0000 00000000`6d0cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_1252.so
ModLoad: 00000000`6d9c0000 00000000`6d9d2000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\stringio.so
ModLoad: 00000000`63d80000 00000000`63d99000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\fiddle.so
ModLoad: 00000000`6b740000 00000000`6b750000 C:\Ruby26-x64\bin\ruby_builtin_dlls\libffi-6.dll
ModLoad: 00000000`6e6c0000 00000000`6e6cd000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\utf_16le.so
ModLoad: 00000000`6a400000 00000000`6a40f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\utf_16_32.so
ModLoad: 00000000`65900000 00000000`6590f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\euc_jp.so
ModLoad: 00000000`64700000 00000000`6470f000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_31j.so
ModLoad: 00000000`6d100000 00000000`6d10e000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\etc.so
ModLoad: 00000000`6a340000 00000000`6a365000 C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\single_byte.so
(4458.3ca4): Invalid handle - code c0000008 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
ntdll!KiRaiseUserExceptionDispatcher+0x3a:
00007ff9`8d90e78a 8b8424c0000000 mov eax,dword ptr [rsp+0C0h] ss:00000000`0060c920=c0000008
0:000> gh


=======================================
VERIFIER STOP 0000000000000202: pid 0x4458: Freeing heap block containing an active critical section.

0000000007C34E70 : Critical section address. Run !cs -s <address> to get more information.
000000000076E2E0 : Critical section initialization stack trace. Run dps <address> to dump the stack trace.
0000000007C34DE0 : Heap block address.
0000000000000220 : Heap block size.


=======================================
This verifier stop is continuable.
After debugging it use `go' to continue.

=======================================

(4458.3ca4): Break instruction exception - code 80000003 (first chance)
vrfcore!VerifierStopMessageEx+0x7d9:
00007ff9`84d12639 cc int 3
*** WARNING: Unable to verify timestamp for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll -
*** WARNING: Unable to verify timestamp for image00000000`00400000
*** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
0:000> !cs -s 0000000007C34E70
-----------------------------------------
Critical section = 0x0000000007c34e70 (+0x7C34E70)
DebugInfo = 0x000000000a66bfd0
NOT LOCKED
LockSemaphore = 0x0
SpinCount = 0x00000000020007d0


Stack trace for DebugInfo = 0x000000000a66bfd0:

0x00007ff98d92b815: ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542E5
0x00007ff98360576c: vfbasics!AVrfpInitializeCriticalSectionCommon+0x11C
0x000000006a6088a2: x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7D2
0x000000006a4f5861: x64_msvcrt_ruby260!rb_call_inits+0xD1
0x000000006a4ccd71: x64_msvcrt_ruby260!ruby_setup+0x171
0x000000006a4ccdd9: x64_msvcrt_ruby260!ruby_init+0x9
0x0000000000402d71: image00000000_00400000+0x2D71
0x00000000004013a5: image00000000_00400000+0x13A5
0x000000000040150b: image00000000_00400000+0x150B
0x00007ff98b134034: KERNEL32!BaseThreadInitThunk+0x14
0x00007ff98d8e3691: ntdll!RtlUserThreadStart+0x21
0:000> dps 000000000076E2E0
00000000`0076e2e0 00000000`006827c0
00000000`0076e2e8 000b00af`00005801
00000000`0076e2f0 00007ff9`8d92b815 ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542e5
00000000`0076e2f8 00007ff9`8360576c vfbasics!AVrfpInitializeCriticalSectionCommon+0x11c
00000000`0076e300 00000000`6a6088a2 x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7d2
00000000`0076e308 00000000`6a4f5861 x64_msvcrt_ruby260!rb_call_inits+0xd1
00000000`0076e310 00000000`6a4ccd71 x64_msvcrt_ruby260!ruby_setup+0x171
00000000`0076e318 00000000`6a4ccdd9 x64_msvcrt_ruby260!ruby_init+0x9
00000000`0076e320 00000000`00402d71 image00000000_00400000+0x2d71
00000000`0076e328 00000000`004013a5 image00000000_00400000+0x13a5
00000000`0076e330 00000000`0040150b image00000000_00400000+0x150b
00000000`0076e338 00007ff9`8b134034 KERNEL32!BaseThreadInitThunk+0x14
00000000`0076e340 00007ff9`8d8e3691 ntdll!RtlUserThreadStart+0x21
00000000`0076e348 00000000`00000000
00000000`0076e350 00000000`00000000
00000000`0076e358 000f0000`00007801
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************

APPLICATION_VERIFIER_LOCKS_LOCK_IN_FREED_HEAP (202)
Freeing heap block containing an active critical section.
This stop is generated if a heap allocation contains a critical section,
the allocation is freed and the critical section has not been deleted.
To debug this stop use the following debugger commands:
$ !cs -s parameter1 - dump information about this critical section.
$ ln parameter1 - to show symbols near the address of the critical section.
This should help identify the leaked critical section.
$ dps parameter2 - to dump the stack trace for this critical section initialization.
$ parameter3 and parameter4 might help understand where this heap block was
allocated (the size of the allocation is probably significant).
Arguments:
Arg1: 0000000007c34e70, Critical section address. Run !cs -s <address> to get more information.
Arg2: 000000000076e2e0, Critical section initialization stack trace. Run dps <address> to dump the stack trace.
Arg3: 0000000007c34de0, Heap block address.
Arg4: 0000000000000220, Heap block size.
GetUrlPageData2 (WinHttp) failed: 12002.

KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

Timeline: !analyze.Start
Name: <blank>
Time: 2019-05-15T20:33:58.750Z
Diff: 750 mSec

Timeline: Dump.Current
Name: <blank>
Time: 2019-05-15T20:33:58.0Z
Diff: 0 mSec

Timeline: Process.Start
Name: <blank>
Time: 2019-05-15T20:27:32.0Z
Diff: 386000 mSec

Timeline: OS.Boot
Name: <blank>
Time: 2019-05-09T19:48:18.0Z
Diff: 521140000 mSec


DUMP_CLASS: 2

DUMP_QUALIFIER: 0

FAULTING_IP:
vrfcore!VerifierStopMessageEx+7d9
00007ff9`84d12639 cc int 3

EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ff984d12639 (vrfcore!VerifierStopMessageEx+0x00000000000007d9)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000000

FAULTING_THREAD: 00003ca4

BUGCHECK_STR: BREAKPOINT_AVRF

DEFAULT_BUCKET_ID: BREAKPOINT_AVRF

CRITICAL_SECTION: 0000000007c34e70 -- (!cs -s 0000000007c34e70)

ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

EXCEPTION_CODE_STR: 80000003

EXCEPTION_PARAMETER1: 0000000000000000

WATSON_BKT_PROCSTAMP: 0

WATSON_BKT_PROCVER: 2.6.3.62

PROCESS_VER_PRODUCT: Ruby interpreter 2.6.3p62 [x64-mingw32]

WATSON_BKT_MODULE: vrfcore.dll

WATSON_BKT_MODSTAMP: ee620e2b

WATSON_BKT_MODOFFSET: 2639

WATSON_BKT_MODVER: 10.0.17763.132

MODULE_VER_PRODUCT: Microsoft? Windows? Operating System

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

MODLIST_WITH_TSCHKSUM_HASH: 3a36178f0f980aa2bf2cd013708689f05e511817

MODLIST_SHA1_HASH: c1a0e368887b68e0efa0bcc0e64665bc2c5a9609

NTGLOBALFLAG: 2000100

PROCESS_BAM_CURRENT_THROTTLED: 0

PROCESS_BAM_PREVIOUS_THROTTLED: 0

APPLICATION_VERIFIER_FLAGS: 81643027

PRODUCT_TYPE: 1

SUITE_MASK: 272

DUMP_TYPE: fe

APPLICATION_VERIFIER_LOADED: 1

PROCESS_NAME: unknown

ANALYSIS_SESSION_HOST: PK1Y1FE-LJR14

ANALYSIS_SESSION_TIME: 05-15-2019 16:33:58.0750

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

THREAD_ATTRIBUTES:
OS_LOCALE: ENU

PRIMARY_PROBLEM_CLASS: BREAKPOINT

PROBLEM_CLASSES:

ID: [0n321]
Type: [@APPLICATION_FAULT_STRING]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Omit
Data: Add
String: [BREAKPOINT]
PID: [Unspecified]
TID: [Unspecified]
Frame: [0]

ID: [0n98]
Type: [AVRF]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x4458]
TID: [0x3ca4]
Frame: [0] : vrfcore!VerifierStopMessageEx

LAST_CONTROL_TRANSFER: from 00007ff9836050d6 to 00007ff984d12639

STACK_TEXT:
00000000`0060f5b0 00007ff9`836050d6 : 00000000`01001002 00000000`07a60000 00000000`07a61000 00007ff9`5d3c26dd : vrfcore!VerifierStopMessageEx+0x7d9
00000000`0060f910 00007ff9`836037a0 : 00000000`00000220 00000000`00000000 00000000`00000000 00000000`00003ca4 : vfbasics!AVrfpFreeMemLockChecks+0xf2
00000000`0060f970 00007ff9`83618948 : 00000000`07c34de0 00000000`07c42de0 00000000`00000220 00000000`07a60000 : vfbasics!AVrfpFreeMemNotify+0x38
00000000`0060f9a0 00007ff9`8d7b98bc : 00000000`07a60000 00007ff9`00000000 00000000`07c34de0 00000000`6a4e7b21 : vfbasics!AVrfpRtlFreeHeap+0x98
00000000`0060fa50 00007ff9`836198fd : 00000000`07c34de0 00000000`07c42de0 00000000`07c42de0 00007ff9`8d7b98a0 : msvcrt!free+0x1c
00000000`0060fa80 00000000`6a4e7b21 : 00000000`07c34de0 00000000`07c34de0 00000000`07c42de0 00000000`07c34de0 : vfbasics!AVrfp_free+0x4d
00000000`0060fab0 00000000`6a64be53 : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : x64_msvcrt_ruby260!ruby_xfree+0x31
00000000`0060faf0 00000000`6a4cd41e : 00000000`6a4cd4a0 00000000`00000001 00000000`07c34de0 00000000`07c34de0 : x64_msvcrt_ruby260!ruby_vm_destruct+0x73
00000000`0060fb60 00000000`6a4cd6b0 : 00000000`00000000 00000000`07afcfe0 00000000`07afefe0 00000000`00000002 : x64_msvcrt_ruby260!ruby_cleanup+0x3ae
00000000`0060fde0 00000000`00402d87 : 00000000`00000003 00000000`07b22fa0 00000000`07ac9d20 00000000`07afcfe0 : x64_msvcrt_ruby260!ruby_run_node+0x60
00000000`0060fe20 00000000`004013a5 : 00000000`00000003 00000000`07b22fa0 00000000`00407970 00000000`00000000 : image00000000_00400000+0x2d87
00000000`0060fe60 00000000`0040150b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x13a5
00000000`0060ff30 00007ff9`8b134034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x150b
00000000`0060ff60 00007ff9`8d8e3691 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
00000000`0060ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


STACK_COMMAND: ~0s ; .cxr ; kb

THREAD_SHA1_HASH_MOD_FUNC: ac94edf8183e983e3bc2f2d4f9dd6e62e1bd719f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e013a3e3e0f370daf1a25eb9dcf9d08d23027b02

THREAD_SHA1_HASH_MOD: 3462ddc2570f74745c8bf62168ed52450c98a119

FOLLOWUP_IP:
x64_msvcrt_ruby260!ruby_vm_destruct+73
00000000`6a64be53 488d8320020000 lea rax,[rbx+220h]

FAULT_INSTR_CODE: 20838d48

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: x64_msvcrt_ruby260!ruby_vm_destruct+73

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: x64_msvcrt_ruby260

IMAGE_NAME: x64-msvcrt-ruby260.dll

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: BREAKPOINT_AVRF_x64_msvcrt_ruby260!ruby_vm_destruct+73

FAILURE_EXCEPTION_CODE: 80000003

FAILURE_IMAGE_NAME: x64-msvcrt-ruby260.dll

BUCKET_ID_IMAGE_STR: x64-msvcrt-ruby260.dll

FAILURE_MODULE_NAME: x64_msvcrt_ruby260

BUCKET_ID_MODULE_STR: x64_msvcrt_ruby260

FAILURE_FUNCTION_NAME: ruby_vm_destruct

BUCKET_ID_FUNCTION_STR: ruby_vm_destruct

BUCKET_ID_OFFSET: 73

BUCKET_ID_MODTIMEDATESTAMP: 0

BUCKET_ID_MODCHECKSUM: 334137

BUCKET_ID_MODVER_STR: 2.6.3.62

BUCKET_ID_PREFIX_STR: BREAKPOINT_AVRF_

FAILURE_PROBLEM_CLASS: BREAKPOINT

FAILURE_SYMBOL_NAME: x64-msvcrt-ruby260.dll!ruby_vm_destruct

FAILURE_BUCKET_ID: BREAKPOINT_AVRF_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct

WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/unknown/2.6.3.62/ 0/vrfcore.dll/10.0.17763.132/ee620e2b/80000003/00002639.htm?Retriage=1

TARGET_TIME: 2019-05-15T20:34:03.000Z

OSBUILD: 17134

OSSERVICEPACK: 706

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt SingleUserTS

USER_LCID: 0

OSBUILD_TIMESTAMP: 2031-08-18 15:21:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 63b7

ANALYSIS_SOURCE: UM

FAILURE_ID_HASH_STRING: um:breakpoint_avrf_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct

FAILURE_ID_HASH: {b0223792-0bdb-1b78-fe77-f4d1ecf49007}

Followup: MachineOwner
---------

    (1-1/1)