Hi togehter.
We have a JVM Crash with a specific Thin Client. When the Crash happen. We get a mdmp file with 260 MB. I have no clue how to open it, or how i can analyse it.
We also get a log file (see Bottom)
Can you help me?
Thanks
Florian
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x5ebf45d5, pid=32376, tid=25268
#
# JRE version: 7.0_25-b32
# Java VM: Java HotSpot(TM) Client VM (23.25-b01 mixed mode, sharing windows-x86 )
# Problematic frame:
# V [jvm.dll+0x1245d5]
#
# Failed to write core dump. Call to MiniDumpWriteDump() failed
#
# If you would like to submit a bug report, please visit:
# http://bugreport.sun.com/bugreport/crash.jsp
#
--------------- T H R E A D ---------------
Current thread (0x056fac00): JavaThread "AWT-Windows" daemon [_thread_in_Java, id=25268, stack(0x02cb0000,0x02db0000)]
siginfo: ExceptionCode=0xc0000005, reading address 0x00000001
Registers:
EAX=0x00000001, EBX=0x02fc0372, ECX=0x02dae348, EDX=0x00000001
ESP=0x02dae20c, EBP=0x02dae270, ESI=0x02dae350, EDI=0x3490cfd8
EIP=0x5ebf45d5, EFLAGS=0x00010202
Top of Stack: (sp=0x02dae20c)
0x02dae20c: 056fac00 5ebf4ae6 00000002 056fac00
0x02dae21c: 056f2470 056fac00 02dae3d4 056fac00
0x02dae22c: 0574f070 3490cfd8 254eeff0 02daf770
0x02dae23c: 02fca6f5 02daf7a0 02dae3d4 056fac00
0x02dae24c: 056d13e0 02b1b098 02b1b0b0 02b1b48c
0x02dae25c: 02daf858 02dae3dc 0000000a 02dae30c
0x02dae26c: 02b1b0a8 02dae2b8 5eca224e 02dae3d4
0x02dae27c: 00dae2e0 02dae348 02fc98c0 5d6a9be5
Instructions: (pc=0x5ebf45d5)
0x5ebf45b5: 7e 29 56 eb 06 8d 9b 00 00 00 00 8b 51 34 80 3c
0x5ebf45c5: 10 00 74 10 8b 51 30 8d 34 82 8b 16 85 d2 74 02
0x5ebf45d5: 8b 12 89 16 40 3b 41 38 7c e1 5e 8b 41 30 c3 cc
0x5ebf45e5: cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 80 79
Register to memory mapping:
EAX=0x00000001 is an unknown value
EBX=StubRoutines::call_stub [0x02fc0372, 0x02fc0422[ (176 bytes)ECX=0x02dae348 is pointing into the stack for thread: 0x056fac00
EDX=0x00000001 is an unknown value
ESP=0x02dae20c is pointing into the stack for thread: 0x056fac00
EBP=0x02dae270 is pointing into the stack for thread: 0x056fac00
ESI=0x02dae350 is pointing into the stack for thread: 0x056fac00
EDI=0x3490cfd8 is an oop
{method}
- klass: {other class}