Issue Description
Multiple MEM_MAPPED regions with a total size exceeding 1.6 TB are observed in the process’s virtual address space, sharing the same AllocationBase 00007df55f590000 .
These regions alternate between
PAGE_READONLY and PAGE_NOACCESS protections, with no associated files (confirmed via !vadump ).Thread stacks show frequent calls to V8 compilation functions (e.g.,
v8::internal::compiler::CompilationDependencies ) and zlib functions (e.g., Cr_z_adler32 ).Analysis Steps
!address -summaryconfirmed<unknown>memory dominates.!vadumpshowed all suspicious regions share the same AllocationBase without file associations.- Thread stacks indicate memory operations are concentrated in V8 compilation and zlib data processing.
Hypotheses
- Hypothesis 1: V8 JIT compilation leaks optimized code caches (e.g., Isolate/Context lifecycle issues).
- Hypothesis 2: zlib compression/decompression fails to release temporary buffers (e.g., missing
inflateEnd). - Hypothesis 3: Chromium’s shared memory mechanism (e.g.,
base::SharedMemory) leaves mapped regions unclosed.



