Skip to Main Content

Java SE (Java Platform, Standard Edition)

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

JAVA access_violation error

3175240Feb 29 2016

Hi,

A customer of ours got a JAVA access_violation error.

After analyzing the HDMP file, i can see a HEAP_CORRUPTION exception.

Any suggestion how can i get to the root cause on this?

Customer is running JAVA update 16.0.71.

Below is copied from WinDbg when running !analyze.

DUMP_CLASS: 2

DUMP_QUALIFIER: 400

CONTEXT:  (.ecxr)

rax=0000000000000140 rbx=000000004d12a1b0 rcx=0000000000000000

rdx=0000000003387a10 rsi=0000000000000000 rdi=0000000001286650

rip=00000000770e5a6a rsp=00000000015efa60 rbp=0000000003387a70

r8=000000004d12a1e0  r9=0000000001286650 r10=0000000000000000

r11=0073002b00020013 r12=0000000003387a10 r13=00000000000000d0

r14=000000000062d320 r15=000000004d12a1b0

iopl=0         nv up ei pl nz na pe nc

cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202

ntdll!RtlpFreeUserBlock+0x3a:

00000000`770e5a6a 488b5940        mov     rbx,qword ptr [rcx+40h] ds:00000000`00000040=????????????????

Resetting default scope

FAULTING_IP:

ntdll!RtlpFreeUserBlock+3a

00000000`770e5a6a 488b5940        mov     rbx,qword ptr [rcx+40h]

EXCEPTION_RECORD:  (.exr -1)

ExceptionAddress: 00000000770e5a6a (ntdll!RtlpFreeUserBlock+0x000000000000003a)

   ExceptionCode: c0000005 (Access violation)

  ExceptionFlags: 00000000

NumberParameters: 2

   Parameter[0]: 0000000000000000

   Parameter[1]: 0000000000000040

Attempt to read from address 0000000000000040

DEFAULT_BUCKET_ID:  HEAP_CORRUPTION

PROCESS_NAME:  java.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000040

READ_ADDRESS:  0000000000000040

FOLLOWUP_IP:

ntdll!RtlpFreeUserBlock+3a

00000000`770e5a6a 488b5940        mov     rbx,qword ptr [rcx+40h]

WATSON_BKT_PROCSTAMP:  53107007

WATSON_BKT_PROCVER:  0.0.0.0

WATSON_BKT_MODULE:  ntdll.dll

WATSON_BKT_MODSTAMP:  5507b864

WATSON_BKT_MODOFFSET:  25a6a

WATSON_BKT_MODVER:  6.1.7601.18798

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  6.1.7601.18847 (win7sp1_gdr.150508-1512)

MODLIST_WITH_TSCHKSUM_HASH:  b8d6aa9fbea5831175e07c15d3190cf18fc830ba

MODLIST_SHA1_HASH:  7f12028981cd32cded737395ac589fa6ebc33f43

NTGLOBALFLAG:  400

APPLICATION_VERIFIER_FLAGS:  0

PRODUCT_TYPE:  3

SUITE_MASK:  274

DUMP_FLAGS:  d96

DUMP_TYPE:  0

APP:  java.exe

ANALYSIS_SESSION_HOST:  IL-300639

ANALYSIS_SESSION_TIME:  02-29-2016 12:21:24.0223

ANALYSIS_VERSION: 10.0.10586.567 amd64fre

THREAD_ATTRIBUTES:

ADDITIONAL_DEBUG_TEXT:  Enable Pageheap/AutoVerifer ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]

LAST_CONTROL_TRANSFER:  from 0000000077111166 to 00000000770e5a6a

FAULTING_THREAD:  00001f84

THREAD_SHA1_HASH_MOD_FUNC:  5dd833cf7de02040888f991bc5f6de98bd679bbe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  025e7a7c518664e653c5342f93bca66305737d1e

OS_LOCALE:  JPN

PROBLEM_CLASSES:

HEAP_CORRUPTION

    Tid    [0x1f84]

    Frame  [0x01]: ntdll!RtlFreeHeap

HEAP_CORRUPTION

    Tid    [0x1f84]

    Frame  [0x01]: ntdll!RtlFreeHeap

NULL_CLASS_PTR_READ

    Tid    [0x1f84]

    Frame  [0x00]: ntdll!RtlpFreeUserBlock

BUGCHECK_STR:  HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ

STACK_TEXT: 

00000000`00000000 00000000`00000000 heap_corruption!heap_corruption+0x0

THREAD_SHA1_HASH_MOD:  ca4e26064d24ef7512d2e94de5a93c38dbe82fe9

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  heap_corruption!heap_corruption

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: heap_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  ** Pseudo Context ** ; kb

FAILURE_BUCKET_ID:  HEAP_CORRUPTION_c0000005_heap_corruption!heap_corruption

BUCKET_ID:  X64_HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ_heap_corruption!heap_corruption

PRIMARY_PROBLEM_CLASS:  X64_HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ_heap_corruption!heap_corruption

BUCKET_ID_OFFSET:  0

BUCKET_ID_MODULE_STR:  heap_corruption

IMAGE_NAME:  heap_corruption

BUCKET_ID_MODTIMEDATESTAMP:  0

BUCKET_ID_MODCHECKSUM:  0

BUCKET_ID_MODVER_STR: 

BUCKET_ID_PREFIX_STR:  X64_

FAILURE_PROBLEM_CLASS:  HEAP_CORRUPTION

FAILURE_EXCEPTION_CODE:  c0000005

FAILURE_IMAGE_NAME:  heap_corruption

FAILURE_FUNCTION_NAME:  heap_corruption

BUCKET_ID_FUNCTION_STR:  heap_corruption

FAILURE_SYMBOL_NAME:  heap_corruption!heap_corruption

WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/java.exe/0.0.0.0/53107007/ntdll.dll/6.1.7601.18798/5507b864/c0000005/00025a6a.htm?Retriage=1

TARGET_TIME:  2016-01-23T00:40:05.000Z

OSBUILD:  7601

OSSERVICEPACK:  18847

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 Server (Service Pack 1) Enterprise TerminalServer SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-05-09 06:24:32

BUILDDATESTAMP_STR:  150508-1512

BUILDLAB_STR:  win7sp1_gdr

BUILDOSVER_STR:  6.1.7601.18847

ANALYSIS_SESSION_ELAPSED_TIME: 1cab

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:heap_corruption_c0000005_heap_corruption!heap_corruption

FAILURE_ID_HASH:  {bc3c2f6a-a6b5-6b17-b904-78ea927f7380}

Followup:     MachineOwner

---------

Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Mar 28 2016
Added on Feb 29 2016
0 comments
573 views