JDK-6398063 : VM crash ( 1.4.2_06) in WinTel Plaform under load.Scenario is not fixed.
  • Type: Bug
  • Component: hotspot
  • Sub-Component: runtime
  • Affected Version: 1.4.2_07
  • Priority: P1
  • Status: Closed
  • Resolution: Cannot Reproduce
  • OS: windows_2003
  • CPU: x86
  • Submitted: 2006-03-14
  • Updated: 2011-01-27
  • Resolved: 2006-04-26
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
Other
1.4.2_07Resolved
Related Reports
Relates :  
Description
We have deployed our application on Pramati Server which has two node instance. One of instance is exposed to internet and were are facing the VM crash for the same. This issue has occured twice in 2 days.
Pramati and in turn Nucleus SW has submitted this issue on bugs.sun.com and their internal review id is : 659235.
This a show stpper for the EOD procesing at ICICI Bank for Loan management Application.
Please help.

Regards,
Mandar.
===============


ERROR MESSAGES/STACK TRACES THAT OCCUR :
Unexpected Signal : EXCEPTION_GUARD_PAGE (0x80000001) occurred at PC=0x80F2D8A
Function=[Unknown.]
Library=D:\j2sdk1.4.2_07\jre\bin\server\jvm.dll

NOTE: We are unable to locate the function name symbol for the error
      just occurred. Please refer to release documentation for possible
      reason and solutions.


Current Java thread:
	at java.net.SocketInputStream.socketRead0(Native Method)
	at java.net.SocketInputStream.read(SocketInputStream.java:129)
	at java.io.BufferedInputStream.read1(BufferedInputStream.java:220)
	at java.io.BufferedInputStream.read(BufferedInputStream.java:277)
	- locked <0x2ce6e750> (a com.pramati.web.util.ByteArrayBufferedInputStream)
	at com.pramati.web.util.ByteArrayBufferedInputStream.read(ByteArrayBufferedInputStream.java:156)
	- locked <0x2ce6e750> (a com.pramati.web.util.ByteArrayBufferedInputStream)
	at com.pramati.web.util.PramatiServletInputStream.close(PramatiServletInputStream.java:74)
	at com.pramati.web.interceptors.SessionInterceptor.clearSocketInputStream(SessionInterceptor.java:211)
	at com.pramati.web.interceptors.SessionInterceptor.postProcess(SessionInterceptor.java:86)
	at com.pramati.web.interceptors.core.DefaultInterceptor.process(DefaultInterceptor.java:51)
	at com.pramati.web.interceptors.core.InterceptorChainImpl.processNext(InterceptorChainImpl.java:48)
	at com.pramati.web.interceptors.core.DefaultInterceptor.process(DefaultInterceptor.java:49)
	at com.pramati.web.interceptors.core.InterceptorChainImpl.processNext(InterceptorChainImpl.java:48)
	at com.pramati.web.interceptors.core.DefaultProcessContainer.process(DefaultProcessContainer.java:92)
	at com.pramati.web.core.WorkerThread.processConnection(WorkerThread.java:248)
	at com.pramati.web.core.WorkerThread.processConnection(WorkerThread.java:222)
	at com.pramati.web.core.WorkerThread.run(WorkerThread.java:98)

Dynamic libraries:
0x00400000 - 0x0040B000 	D:\j2sdk1.4.2_07\bin\java.exe
0x7C800000 - 0x7C8C0000 	C:\WINDOWS\system32\ntdll.dll
0x77E40000 - 0x77F42000 	C:\WINDOWS\system32\kernel32.dll
0x77F50000 - 0x77FEC000 	C:\WINDOWS\system32\ADVAPI32.dll
0x77C50000 - 0x77CEF000 	C:\WINDOWS\system32\RPCRT4.dll
0x77BA0000 - 0x77BFA000 	C:\WINDOWS\system32\MSVCRT.dll
0x08000000 - 0x082AE000 	D:\j2sdk1.4.2_07\jre\bin\server\jvm.dll
0x77380000 - 0x77412000 	C:\WINDOWS\system32\USER32.dll
0x77C00000 - 0x77C48000 	C:\WINDOWS\system32\GDI32.dll
0x76AA0000 - 0x76ACD000 	C:\WINDOWS\system32\WINMM.dll
0x71BC0000 - 0x71BC8000 	C:\WINDOWS\system32\rdpsnd.dll
0x771F0000 - 0x77201000 	C:\WINDOWS\system32\WINSTA.dll
0x71C40000 - 0x71C98000 	C:\WINDOWS\system32\NETAPI32.dll
0x76B70000 - 0x76B7B000 	C:\WINDOWS\system32\PSAPI.DLL
0x10000000 - 0x10007000 	D:\j2sdk1.4.2_07\jre\bin\hpi.dll
0x00380000 - 0x0038E000 	D:\j2sdk1.4.2_07\jre\bin\verify.dll
0x00390000 - 0x003A9000 	D:\j2sdk1.4.2_07\jre\bin\java.dll
0x003C0000 - 0x003CD000 	D:\j2sdk1.4.2_07\jre\bin\zip.dll
0x003F0000 - 0x003FF000 	D:\j2sdk1.4.2_07\jre\bin\net.dll
0x71C00000 - 0x71C17000 	C:\WINDOWS\system32\WS2_32.dll
0x71BF0000 - 0x71BF8000 	C:\WINDOWS\system32\WS2HELP.dll
0x71B20000 - 0x71B61000 	C:\WINDOWS\System32\mswsock.dll
0x76ED0000 - 0x76EF9000 	C:\WINDOWS\system32\DNSAPI.dll
0x76F70000 - 0x76F77000 	C:\WINDOWS\System32\winrnr.dll
0x76F10000 - 0x76F3E000 	C:\WINDOWS\system32\WLDAP32.dll
0x76F80000 - 0x76F85000 	C:\WINDOWS\system32\rasadhlp.dll
0x03FF0000 - 0x04049000 	C:\WINDOWS\system32\hnetcfg.dll
0x71AE0000 - 0x71AE8000 	C:\WINDOWS\System32\wshtcpip.dll
0x053D0000 - 0x053D6000 	D:\j2sdk1.4.2_07\jre\bin\ioser12.dll
0x053E0000 - 0x053E5000 	D:\j2sdk1.4.2_07\jre\bin\rmi.dll
0x76C10000 - 0x76C39000 	C:\WINDOWS\system32\imagehlp.dll
0x6D580000 - 0x6D628000 	C:\WINDOWS\system32\dbghelp.dll
0x77B90000 - 0x77B98000 	C:\WINDOWS\system32\VERSION.dll

Heap at VM Abort:
Heap
 def new generation   total 118016K, used 77682K [0x10010000, 0x18010000, 0x18010000)
  eden space 104960K,  61% used [0x10010000, 0x13f2c9f0, 0x16690000)
  from space 13056K, 100% used [0x16690000, 0x17350000, 0x17350000)
  to   space 13056K,   0% used [0x17350000, 0x17350000, 0x18010000)
 tenured generation   total 1048576K, used 372806K [0x18010000, 0x58010000, 0x58010000)
   the space 1048576K,  35% used [0x18010000, 0x2ec21998, 0x2ec21a00, 0x58010000)
 compacting perm gen  total 102400K, used 47606K [0x58010000, 0x5e410000, 0x60010000)
   the space 102400K,  46% used [0x58010000, 0x5ae8d988, 0x5ae8da00, 0x5e410000)

Local Time = Tue Feb 28 12:00:16 2006
Elapsed Time = 27371
#
# HotSpot Virtual Machine Error : EXCEPTION_GUARD_PAGE
# Error ID : 4F530E43505002EF
# Please report this error at
# http://java.sun.com/cgi-bin/bugreport.cgi
#
# Java VM: Java HotSpot(TM) Server VM (1.4.2_07-b05 mixed mode)
#


REPRODUCIBILITY :
This bug can be reproduced occasionally.