Skip to Main Content

Java HotSpot Virtual Machine

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

How can i analyze mdmp Files

2788717Nov 5 2014 — edited Nov 7 2014

Hi togehter.

We have a JVM Crash with a specific Thin Client. When the Crash happen. We get a mdmp file with 260 MB. I have no clue how to open it, or how i can analyse it.

We also get a log file (see Bottom)

Can you help me?

Thanks

Florian

# A fatal error has been detected by the Java Runtime Environment:

#

#  EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x5ebf45d5, pid=32376, tid=25268

#

# JRE version: 7.0_25-b32

# Java VM: Java HotSpot(TM) Client VM (23.25-b01 mixed mode, sharing windows-x86 )

# Problematic frame:

# V  [jvm.dll+0x1245d5]

#

# Failed to write core dump. Call to MiniDumpWriteDump() failed

#

# If you would like to submit a bug report, please visit:

#   http://bugreport.sun.com/bugreport/crash.jsp

#

---------------  T H R E A D  ---------------

Current thread (0x056fac00):  JavaThread "AWT-Windows" daemon [_thread_in_Java, id=25268, stack(0x02cb0000,0x02db0000)]

siginfo: ExceptionCode=0xc0000005, reading address 0x00000001

Registers:

EAX=0x00000001, EBX=0x02fc0372, ECX=0x02dae348, EDX=0x00000001

ESP=0x02dae20c, EBP=0x02dae270, ESI=0x02dae350, EDI=0x3490cfd8

EIP=0x5ebf45d5, EFLAGS=0x00010202

Top of Stack: (sp=0x02dae20c)

0x02dae20c:   056fac00 5ebf4ae6 00000002 056fac00

0x02dae21c:   056f2470 056fac00 02dae3d4 056fac00

0x02dae22c:   0574f070 3490cfd8 254eeff0 02daf770

0x02dae23c:   02fca6f5 02daf7a0 02dae3d4 056fac00

0x02dae24c:   056d13e0 02b1b098 02b1b0b0 02b1b48c

0x02dae25c:   02daf858 02dae3dc 0000000a 02dae30c

0x02dae26c:   02b1b0a8 02dae2b8 5eca224e 02dae3d4

0x02dae27c:   00dae2e0 02dae348 02fc98c0 5d6a9be5

Instructions: (pc=0x5ebf45d5)

0x5ebf45b5:   7e 29 56 eb 06 8d 9b 00 00 00 00 8b 51 34 80 3c

0x5ebf45c5:   10 00 74 10 8b 51 30 8d 34 82 8b 16 85 d2 74 02

0x5ebf45d5:   8b 12 89 16 40 3b 41 38 7c e1 5e 8b 41 30 c3 cc

0x5ebf45e5:   cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 80 79

Register to memory mapping:

EAX=0x00000001 is an unknown value

EBX=StubRoutines::call_stub [0x02fc0372, 0x02fc0422[ (176 bytes)ECX=0x02dae348 is pointing into the stack for thread: 0x056fac00

EDX=0x00000001 is an unknown value

ESP=0x02dae20c is pointing into the stack for thread: 0x056fac00

EBP=0x02dae270 is pointing into the stack for thread: 0x056fac00

ESI=0x02dae350 is pointing into the stack for thread: 0x056fac00

EDI=0x3490cfd8 is an oop

{method}

- klass: {other class}

Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Dec 5 2014
Added on Nov 5 2014
2 comments
2,658 views