When a process does not respond or it terminates abnormally, you need to analyze stack traces to determine the root cause of the problem. If you want to analyze the stack traces of a process, you can attach a debugger to that process. If a Java process does not respond in an attempt to generate Java thread dumps under Windows, you can investigate core dumps to examine the data that is pertinent to the process (such as stack frames and register information) in question.
A core dump is a file that contains the memory snapshot of a running process and its process information. If a process terminates unexpectedly or does not respond in a timely manner, core dumps that are taken at the time of the incident can be very useful. That is, the core dumps enable you to determine the root cause of the incident by examining all registers, stack frames, and the memory map of the process.
You can also perform an exception analysis from a core dump with a debugger. To obtain a debugger for Windows:
- Navigate to this Microsoft page and search for WinDbg.
- Download and install the Debugging Tools for Windows (WinDbg) for your version of the operating system.
Attach the Debugger to a Running Process
Before you use the debugger, you first need to determine the process identifier of the process in question or obtain a core dump for that process in order to access the stack frames. Then you can attach the debugger to your running process in one of two ways. The first method is to start the debugger with a process identifier by submitting the following command:
windbg -p process-ID
The second method for attaching the debugger is as follows:
- Start the debugger by executing the windbg command, as shown in this example:
- Select File ► Attach to a Process, as shown below:
- Select a process.
- Click OK to invoke a WinDbg window similar to the following, which indicates that the debugger is now attached to your process:
List All of the Threads and Examine the Stack Frames for Your Process
To list all of the threads and examine the stack frames:
- Run the list-threads command (~). Here is an example of the submitted command and the thread list that is generated by the command:
0:187> ~
0 Id: 99c.9a0 Suspend: 1 Teb: 000007ff`fffde000 Unfrozen
1 Id: 99c.9c8 Suspend: 1 Teb: 000007ff`fffdc000 Unfrozen
2 Id: 99c.9d8 Suspend: 1 Teb: 000007ff`fffda000 Unfrozen
3 Id: 99c.9dc Suspend: 1 Teb: 000007ff`fffd6000 Unfrozen
4 Id: 99c.9e4 Suspend: 1 Teb: 000007ff`fffd4000 Unfrozen
5 Id: 99c.9f4 Suspend: 1 Teb: 000007ff`fffae000 Unfrozen
6 Id: 99c.a14 Suspend: 1 Teb: 000007ff`fffac000 Unfrozen
7 Id: 99c.a18 Suspend: 1 Teb: 000007ff`fffaa000 Unfrozen
. . .more thread lines. . .
- Run the dump verbose-stack command (~*kv) against all of the threads to
display the frame stacks of those threads, as shown in the following example:
0:187> ~*kv
0 Id: 99c.9a0 Suspend: 1 Teb: 000007ff`fffde000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`001ef628 00000000`76efc0b0 : 00000001`3f25bc18 00000001`3f241f50 00000000`00000000 00000000`76eec1ed : ntdll!NtWaitForSingleObject+0xa
00000000`001ef630 00000001`3f245ac5 : 00000000`00000078 00000001`3f241f50 00000001`00000000 00000000`00000078 : kernel32!WaitForSingleObjectEx+0xa0
00000000`001ef6f0 00000001`3f243844 : 00000000`00040000 00000000`001ef7c0 00000000`00d9ae88 00000000`00000000 : java+0x5ac5
00000000`001ef740 00000001`3f244da9 : 00000000`00d9ae88 00000000`00040000 00000000`00000002 00000000`00000000 : java+0x3844
00000000`001ef7d0 00000001`3f243c23 : 00000000`00d9af10 00000000`001ef920 00000000`00000001 00000000`001ef668 : java+0x4da9
00000000`001ef820 00000001`3f241132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x3c23
00000000`001efc20 00000001`3f249e5b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x1132
00000000`001efca0 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x9e5b
00000000`001efce0 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`001efd10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
1 Id: 99c.9c8 Suspend: 1 Teb: 000007ff`fffdc000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0118fa28 00000000`76efc0b0 : 00000007`60575cc8 00000007`60575d30 00000000`01584008 00000000`00d7f800 : ntdll!NtWaitForSingleObject+0xa
00000000`0118fa30 00000000`7300294d : 00000000`00000090 00000000`00d7f800 00000000`00000000 00000000`00000090 : kernel32!WaitForSingleObjectEx+0xa0
00000000`0118faf0 00000000`72fa0bb9 : 00000000`01584a00 00000000`01582880 00000000`01582880 00000000`72fa032d : jvm!JVM_FindSignal+0x286d
00000000`0118fb20 00000000`72fa1031 : 00000000`00d7f800 00000000`01582880 00000000`00000000 00000000`00000001 : jvm!JVM_ResolveClass+0x1dc69
00000000`0118fb60 00000000`72fc8715 : 00000000`0a68ec00 00000000`01582880 00000000`0118fca8 00000000`00000001 : jvm!JVM_ResolveClass+0x1e0e1
00000000`0118fba0 00000000`72eebd9f : 00000000`00d7f800 00000000`00d7f800 00000000`0118fca8 00000000`00d7f800 : jvm!JVM_ResolveClass+0x457c5
00000000`0118fc00 00000001`3f242385 : 00000000`01584f28 00000000`00d7f9d8 00000000`00000001 00000000`01584f38 : jvm!JNI_CreateJavaVM+0x1ef
00000000`0118fc50 00000001`3f24c30b : 00000000`00000002 00000000`00000001 00000000`00d7f9d8 00000000`7344b2e0 : java+0x2385
00000000`0118fcf0 00000001`3f24c39f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0xc30b
00000000`0118fd20 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0xc39f
00000000`0118fd50 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0118fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
2 Id: 99c.9d8 Suspend: 1 Teb: 000007ff`fffda000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0493f538 00000000`76efc0b0 : 00000000`01589340 00000000`01589330 00000000`000009d8 00000000`0e56be10 : ntdll!NtWaitForSingleObject+0xa
00000000`0493f540 00000000`7300294d : 00000000`000000ac 00000000`73159982 00000000`00000000 00000000`000000ac : kernel32!WaitForSingleObjectEx+0xa0
00000000`0493f600 00000000`72fa0bb9 : 00000000`0158f400 00000000`01583900 00000000`01583900 00000000`72fa032d : jvm!JVM_FindSignal+0x286d
00000000`0493f630 00000000`72fa0fb1 : 00000000`01589000 00000000`01583900 00000000`00000000 00000000`00d7af50 : jvm!JVM_ResolveClass+0x1dc69
00000000`0493f670 00000000`72ff43ab : 00000000`00000076 00000000`00000076 00000000`01583900 00000000`00000076 : jvm!JVM_ResolveClass+0x1e061
00000000`0493f6b0 00000000`730063be : 00000000`01589000 00000000`0493f900 00000000`00000000 00000000`00000000 : jvm!JVM_ResolveClass+0x7145b
00000000`0493f6e0 00000000`73c51d7b : 00000000`01589000 00000000`0158f640 00000000`00000000 00000000`00000000 : jvm!JVM_FindSignal+0x62de
00000000`0493f920 00000000`73c51e17 : 00000000`73ce1ac0 00000000`0158f640 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0x43
00000000`0493f950 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0xdf
00000000`0493f980 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0493f9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
3 Id: 99c.9dc Suspend: 1 Teb: 000007ff`fffd6000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0480f4e8 00000000`76efc0b0 : 00000000`00000003 00000000`00000000 00000000`015902e0 00000007`65cf6888 : ntdll!NtWaitForSingleObject+0xa
00000000`0480f4f0 00000000`7300294d : 00000000`000000cc 00000000`73159982 00000000`00000000 00000000`000000cc : kernel32!WaitForSingleObjectEx+0xa0
00000000`0480f5b0 00000000`72fa0bb9 : 00000000`01590e00 00000000`01583900 00000000`01583900 00000000`00000000 : jvm!JVM_FindSignal+0x286d
00000000`0480f5e0 00000000`72fa0fb1 : 00000000`01590000 00000000`01583900 00000000`00000000 00000000`01583900 : jvm!JVM_ResolveClass+0x1dc69
00000000`0480f620 00000000`72ff43ab : 00000000`00000076 00000000`00000076 00000000`01583900 00000000`00000076 : jvm!JVM_ResolveClass+0x1e061
00000000`0480f660 00000000`730063be : 00000000`01590000 00000000`0480f9b0 00000000`00000000 00000000`00000000 : jvm!JVM_ResolveClass+0x7145b
00000000`0480f690 00000000`73c51d7b : 00000000`01590000 00000000`01591100 00000000`00000000 00000000`00000000 : jvm!JVM_FindSignal+0x62de
00000000`0480f9d0 00000000`73c51e17 : 00000000`73ce1ac0 00000000`01591100 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0x43
00000000`0480fa00 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0xdf
00000000`0480fa30 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0480fa60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
4 Id: 99c.9e4 Suspend: 1 Teb: 000007ff`fffd4000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0a57f8f8 00000000`76efc0b0 : 00000000`00d703a8 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtWaitForSingleObject+0xa
00000000`0a57f900 00000000`7300287a : 00000000`000000e4 00000000`730fc618 00000007`00000000 00000000`000000e4 : kernel32!WaitForSingleObjectEx+0xa0
00000000`0a57f9c0 00000000`72fa0bc0 : 00000000`015f1800 00000000`015f2800 00000000`00000000 00000000`00d78ae0 : jvm!JVM_FindSignal+0x279a
00000000`0a57f9f0 00000000`72fa0fb1 : 00000000`015f1800 00000000`00d78ae0 00000000`00000000 00000000`015f1800 : jvm!JVM_ResolveClass+0x1dc70
00000000`0a57fa30 00000000`73112d27 : 00000000`00d78ae0 00000000`00d78ae0 00000000`0a57fd70 00000000`015f1800 : jvm!JVM_ResolveClass+0x1e061
00000000`0a57fa70 00000000`73112f0e : 00000000`00d78ae0 00000000`00000003 00000000`015f1800 00000000`015f1800 : jvm!JVM_FindSignal+0x112c47
00000000`0a57faa0 00000000`730063be : 00000000`015f1800 00000000`00000000 00000000`00d70538 00000000`00d74678 : jvm!JVM_FindSignal+0x112e2e
00000000`0a57fad0 00000000`73c51d7b : 00000000`015f1800 00000000`015f2a80 00000000`00000000 00000000`00000000 : jvm!JVM_FindSignal+0x62de
00000000`0a57fd90 00000000`73c51e17 : 00000000`73ce1ac0 00000000`015f2a80 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0x43
00000000`0a57fdc0 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0xdf
00000000`0a57fdf0 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0a57fe20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
5 Id: 99c.9f4 Suspend: 1 Teb: 000007ff`fffae000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0a93f708 00000000`76efc0b0 : 00000000`00000000 00000000`00000000 00000000`00d7dc48 00000000`76efc0b0 : ntdll!NtWaitForSingleObject+0xa
00000000`0a93f710 00000000`7300287a : 00000000`00000100 00000000`0a693300 00000000`00000000 00000000`00000100 : kernel32!WaitForSingleObjectEx+0xa0
00000000`0a93f7d0 00000000`72fa0bc0 : 00000000`0a692800 00000000`0a693300 00000000`00000000 00000000`01582900 : jvm!JVM_FindSignal+0x279a
00000000`0a93f800 00000000`72fa0fb1 : 00000000`0a692800 00000000`01582900 00000000`00000000 00000000`00000000 : jvm!JVM_ResolveClass+0x1dc70
00000000`0a93f840 00000000`72fcde45 : 00000000`01582900 00000000`01582900 00000000`0a93fd90 00000000`00000000 : jvm!JVM_ResolveClass+0x1e061
00000000`0a93f880 00000000`72fce53e : 00000000`0a93fd90 00000000`01582b80 00000000`00000000 00000000`0a692800 : jvm!JVM_ResolveClass+0x4aef5
00000000`0a93f990 00000000`730063be : 00000000`0a692800 00000000`0000002d 00000000`00000000 00000000`00000094 : jvm!JVM_ResolveClass+0x4b5ee
00000000`0a93f9f0 00000000`73c51d7b : 00000000`0a692800 00000000`0a6960f0 00000000`00000000 00000000`00000000 : jvm!JVM_FindSignal+0x62de
00000000`0a93fdb0 00000000`73c51e17 : 00000000`73ce1ac0 00000000`0a6960f0 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0x43
00000000`0a93fde0 00000000`76eebe3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr100!endthreadex+0xdf
00000000`0a93fe10 00000000`77176a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0a93fe40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
6 Id: 99c.a14 Suspend: 1 Teb: 000007ff`fffac000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`014df298 00000000`76efc0b0 : 00000000`0a69d000 00000000`0a69dc20 00000000`0ad31888 00000000`ecd0dc16 : ntdll!NtWaitForSingleObject+0xa
00000000`014df2a0 00000000`7300294d : 00000000`00000110 00000000`0a6a57c8 00000000`00000000 00000000`00000110 : kernel32!WaitForSingleObjectEx+0xa0
00000000`014df360 00000000`72fa56a9 : 00000000`0a69d000 00000000`00000000 00000000`00000000 00000000`72fa5edb : jvm!JVM_FindSignal+0x286d
00000000`014df390 00000000`72fc09f7 : 00000000`00000002 00000000`00000000 00000000`0a69ac01 00000000`0a699e90 : jvm!JVM_ResolveClass+0x22759
00000000`014df440 00000000`72f2302e : 00000000`0a69dba8 00000000`0a69dba8 00000000`0a69ac70 00000000`0a6a720a : jvm!JVM_ResolveClass+0x3daa7
00000000`014df480 00000000`01721015 : 00000000`014df550 00000000`0ad31888 00000000`00000000 00000007`65bd3988 : jvm!JVM_MonitorWait+0x13e
00000000`014df4f0 00000000`014df550 : 00000000`0ad31888 00000000`00000000 00000007`65bd3988 00000007`6e3a4860 : 0x1721015
00000000`014df4f8 00000000`0ad31888 : 00000000`00000000 00000007`65bd3988 00000007`6e3a4860 00000007`65bd3988 : 0x14df550
00000000`014df500 00000000`00000000 : 00000007`65bd3988 00000007`6e3a4860 00000007`65bd3988 00000007`6e5cda00 : 0xad31888
7 Id: 99c.a18 Suspend: 1 Teb: 000007ff`fffaa000 Unfrozen
Child-SP RetAddr : Args to Child : Call Site
00000000`0a42ef78 00000000`76efc0b0 : 00000000`0a42f0e8 00000000`0a69e9d8 00000000`732f5f08 00000000`0a5c4190 : ntdll!NtWaitForSingleObject+0xa
00000000`0a42ef80 00000000`7300294d : 00000000`0000012c 00000000`0a6a7208 00000000`00000000 00000000`0000012c : kernel32!WaitForSingleObjectEx+0xa0
00000000`0a42f040 00000000`72fa56a9 : 00000000`0a69e800 00000000`00000000 00000000`00000000 00000000`0a42f1d0 : jvm!JVM_FindSignal+0x286d
00000000`0a42f070 00000000`72fc09f7 : 00000000`00000002 00000000`00000000 00000000`0a69ad01 00000000`0a69a150 : jvm!JVM_ResolveClass+0x22759
00000000`0a42f120 00000000`72f2302e : 00000000`0a69f1f8 00000000`0a69f1f8 00000000`0a69adc0 00000000`73d9241b : jvm!JVM_ResolveClass+0x3daa7
00000000`0a42f160 00000000`01721015 : 00000000`0a42f230 00000000`0a69e800 00000000`00000000 00000000`0a69e800 : jvm!JVM_MonitorWait+0x13e
00000000`0a42f1d0 00000000`0a42f230 : 00000000`0a69e800 00000000`00000000 00000000`0a69e800 00000007`6e5cda00 : 0x1721015
00000000`0a42f1d8 00000000`0a69e800 : 00000000`00000000 00000000`0a69e800 00000007`6e5cda00 00000000`00000000 : 0xa42f230
00000000`0a42f1e0 00000000`00000000 : 00000000`0a69e800 00000007`6e5cda00 00000000`00000000 00000007`6e77ccc8 : 0xa69e800
. . .more frame-stack lines. . .
Examine All of the Registers
To inspect all of the registers for your process, submit the dump-registers command (r), as shown in this example:
0:187> r
rax=000007ffffe42000 rbx=0000000000000000 rcx=000007fffffd8000
rdx=0000000077220000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000077196060 rsp=000000001785f758 rbp=0000000000000000
r8=0000000000000000 r9=0000000077220000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000244
ntdll!DbgBreakPoint:
00000000`77196060 cc int 3
Generate a Core Dump
To generate a core dump:
- Run Task Manager by submitting the taskmgr command.
- Right-click the process for which you want to create a core dump and select Create Dump File.
Open a Core Dump
To open a core dump, select File ► Open Crash Dump and select a core dump from the list that appears.
A WinDbg window similar to the following should appear. From there, you can examine your process.
Perform an Exception Analysis on a Core Dump
To perform an exception analysis, run the !analyze -v command, as shown in the following example:
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
FAULTING_IP:
+0
00000000`00000000 ?? ???
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: 0000000000000000 -- (.cxr 0x0;r)
rax=00000000002ff5c0 rbx=0000000000000000 rcx=0000000000010001
rdx=0000000000000000 rsi=00000000ffffffff rdi=0000000000000080
rip=00000000775bbb7a rsp=00000000002ff4a8 rbp=000000013f712048
r8=0000000000000000 r9=0000000000000000 r10=000000000046b122
r11=0000000000000000 r12=0000000000000000 r13=0000000001ff2490
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
ntdll!ZwWaitForSingleObject+0xa:
00000000`775bbb7a c3 ret
FAULTING_THREAD: 000000000000244c
DEFAULT_BUCKET_ID: STATUS_BREAKPOINT
PROCESS_NAME: java.exe
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
APP: java.exe
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
PRIMARY_PROBLEM_CLASS: STATUS_BREAKPOINT
BUGCHECK_STR: APPLICATION_FAULT_STATUS_BREAKPOINT
LAST_CONTROL_TRANSFER: from 000007fefd3510ac to 00000000775bbb7a
STACK_TEXT:
00000000`002ff4a8 000007fe`fd3510ac : 00000000`00000000 00000000`01f57ec0 00000001`3f7382a0 00000000`01ff29a0 : ntdll!ZwWaitForSingleObject+0xa
00000000`002ff4b0 00000001`3f715e8d : 00000000`00000080 00000001`3f712048 00000000`00000000 00000000`00000080 : KERNELBASE!WaitForSingleObjectEx+0x79
00000000`002ff550 00000001`3f7139a4 : 00000000`00000000 00000000`002ff620 00000000`01ff24a8 00000000`00000000 : java+0x5e8d
00000000`002ff5a0 00000001`3f715131 : 00000000`01ff24a8 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x39a4
00000000`002ff630 00000001`3f713ec8 : 00000000`01ff7140 00000000`002ff780 00000000`00000000 00000000`002ff4c8 : java+0x5131
00000000`002ff680 00000001`3f711132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x3ec8
00000000`002ffaa0 00000001`3f71a79b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0x1132
00000000`002ffb20 00000000`774659bd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : java+0xa79b
00000000`002ffb60 00000000`7759a2e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`002ffb90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
STACK_COMMAND: ~0s; .ecxr ; kb
FOLLOWUP_IP:
java+5e8d
00000001`3f715e8d 488d542468 lea rdx,[rsp+68h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: java+5e8d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: java
IMAGE_NAME: java.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 554287ba
FAILURE_BUCKET_ID: STATUS_BREAKPOINT_80000003_java.exe!Unknown
BUCKET_ID: X64_APPLICATION_FAULT_STATUS_BREAKPOINT_java+5e8d
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:status_breakpoint_80000003_java.exe!unknown
FAILURE_ID_HASH: {96dac2a2-574f-d1f1-2e1c-5d98b5844711}
Followup: MachineOwner
Disclaimer of Warranty
This instruction is provided to you "as is" without any warranties, express or implied, including but not limited to implied warranties or merchantability and/or fitness for a particular purpose. The Institute and its licensor(s) disclaim any liability connected with the use of the
instruction. The Institute offers no technical support for the instruction.
Limitation of Liability
The Institute and its licensor(s) are not liable for (a) incidental, consequential, special, or direct damages of any sort, whether arising in tort, contract or otherwise, even if the Institute has been informed of the possibility of such damages, or (b) any claim by any other party. Some
jurisdictions do not allow the exclusion or limitation of liability for incidental or consequential damages, so this limitation and exclusion may not apply to you.
Operating System and Release Information
SAS System | SAS Web Application Server | Microsoft® Windows® for x64 | | |
*
For software releases that are not yet generally available, the Fixed
Release is the software release in which the problem is planned to be
fixed.