Hi,
A customer of ours got a JAVA access_violation error.
After analyzing the HDMP file, i can see a HEAP_CORRUPTION exception.
Any suggestion how can i get to the root cause on this?
Customer is running JAVA update 16.0.71.
Below is copied from WinDbg when running !analyze.
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
CONTEXT: (.ecxr)
rax=0000000000000140 rbx=000000004d12a1b0 rcx=0000000000000000
rdx=0000000003387a10 rsi=0000000000000000 rdi=0000000001286650
rip=00000000770e5a6a rsp=00000000015efa60 rbp=0000000003387a70
r8=000000004d12a1e0 r9=0000000001286650 r10=0000000000000000
r11=0073002b00020013 r12=0000000003387a10 r13=00000000000000d0
r14=000000000062d320 r15=000000004d12a1b0
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
ntdll!RtlpFreeUserBlock+0x3a:
00000000`770e5a6a 488b5940 mov rbx,qword ptr [rcx+40h] ds:00000000`00000040=????????????????
Resetting default scope
FAULTING_IP:
ntdll!RtlpFreeUserBlock+3a
00000000`770e5a6a 488b5940 mov rbx,qword ptr [rcx+40h]
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00000000770e5a6a (ntdll!RtlpFreeUserBlock+0x000000000000003a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040
DEFAULT_BUCKET_ID: HEAP_CORRUPTION
PROCESS_NAME: java.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000040
READ_ADDRESS: 0000000000000040
FOLLOWUP_IP:
ntdll!RtlpFreeUserBlock+3a
00000000`770e5a6a 488b5940 mov rbx,qword ptr [rcx+40h]
WATSON_BKT_PROCSTAMP: 53107007
WATSON_BKT_PROCVER: 0.0.0.0
WATSON_BKT_MODULE: ntdll.dll
WATSON_BKT_MODSTAMP: 5507b864
WATSON_BKT_MODOFFSET: 25a6a
WATSON_BKT_MODVER: 6.1.7601.18798
MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
BUILD_VERSION_STRING: 6.1.7601.18847 (win7sp1_gdr.150508-1512)
MODLIST_WITH_TSCHKSUM_HASH: b8d6aa9fbea5831175e07c15d3190cf18fc830ba
MODLIST_SHA1_HASH: 7f12028981cd32cded737395ac589fa6ebc33f43
NTGLOBALFLAG: 400
APPLICATION_VERIFIER_FLAGS: 0
PRODUCT_TYPE: 3
SUITE_MASK: 274
DUMP_FLAGS: d96
DUMP_TYPE: 0
APP: java.exe
ANALYSIS_SESSION_HOST: IL-300639
ANALYSIS_SESSION_TIME: 02-29-2016 12:21:24.0223
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
THREAD_ATTRIBUTES:
ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]
LAST_CONTROL_TRANSFER: from 0000000077111166 to 00000000770e5a6a
FAULTING_THREAD: 00001f84
THREAD_SHA1_HASH_MOD_FUNC: 5dd833cf7de02040888f991bc5f6de98bd679bbe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 025e7a7c518664e653c5342f93bca66305737d1e
OS_LOCALE: JPN
PROBLEM_CLASSES:
HEAP_CORRUPTION
Tid [0x1f84]
Frame [0x01]: ntdll!RtlFreeHeap
HEAP_CORRUPTION
Tid [0x1f84]
Frame [0x01]: ntdll!RtlFreeHeap
NULL_CLASS_PTR_READ
Tid [0x1f84]
Frame [0x00]: ntdll!RtlpFreeUserBlock
BUGCHECK_STR: HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ
STACK_TEXT:
00000000`00000000 00000000`00000000 heap_corruption!heap_corruption+0x0
THREAD_SHA1_HASH_MOD: ca4e26064d24ef7512d2e94de5a93c38dbe82fe9
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: heap_corruption!heap_corruption
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: heap_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: ** Pseudo Context ** ; kb
FAILURE_BUCKET_ID: HEAP_CORRUPTION_c0000005_heap_corruption!heap_corruption
BUCKET_ID: X64_HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ_heap_corruption!heap_corruption
PRIMARY_PROBLEM_CLASS: X64_HEAP_CORRUPTION_HEAP_CORRUPTION_NULL_CLASS_PTR_READ_heap_corruption!heap_corruption
BUCKET_ID_OFFSET: 0
BUCKET_ID_MODULE_STR: heap_corruption
IMAGE_NAME: heap_corruption
BUCKET_ID_MODTIMEDATESTAMP: 0
BUCKET_ID_MODCHECKSUM: 0
BUCKET_ID_MODVER_STR:
BUCKET_ID_PREFIX_STR: X64_
FAILURE_PROBLEM_CLASS: HEAP_CORRUPTION
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: heap_corruption
FAILURE_FUNCTION_NAME: heap_corruption
BUCKET_ID_FUNCTION_STR: heap_corruption
FAILURE_SYMBOL_NAME: heap_corruption!heap_corruption
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/java.exe/0.0.0.0/53107007/ntdll.dll/6.1.7601.18798/5507b864/c0000005/00025a6a.htm?Retriage=1
TARGET_TIME: 2016-01-23T00:40:05.000Z
OSBUILD: 7601
OSSERVICEPACK: 18847
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 Server (Service Pack 1) Enterprise TerminalServer SingleUserTS
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-05-09 06:24:32
BUILDDATESTAMP_STR: 150508-1512
BUILDLAB_STR: win7sp1_gdr
BUILDOSVER_STR: 6.1.7601.18847
ANALYSIS_SESSION_ELAPSED_TIME: 1cab
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:heap_corruption_c0000005_heap_corruption!heap_corruption
FAILURE_ID_HASH: {bc3c2f6a-a6b5-6b17-b904-78ea927f7380}
Followup: MachineOwner
---------