I am seeing several .mdmp files being generated when batch script runs (.bat extension) . This .bat file has our custom tool's .exe statement and that could be causing the issue.
Below are some logs from the hs_err_pid8128.log that gets generated along with the .mdmp
This is just few lines from the log file. Not sure if i can attach full file here. Any suggestions to stop these mdmp files from generating will be great.
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_UNCAUGHT_CXX_EXCEPTION (0xe06d7363) at pc=0x754b5ef8, pid=12140, tid=8536
#
# JRE version: Java(TM) SE Runtime Environment (8.0_77-b03) (build 1.8.0_77-b03)
# Java VM: Java HotSpot(TM) Client VM (25.77-b03 mixed mode windows-x86 )
# Problematic frame:
# C [KERNELBASE.dll+0x15ef8]
#
# Core dump written. Default location: D:\Jobs\Scripts\PulseScripts\hs_err_pid12140.mdmp
#
# If you would like to submit a bug report, please visit:
# http://bugreport.java.com/bugreport/crash.jsp
# The crash happened outside the Java Virtual Machine in native code.
# See problematic frame for where to report the bug.
--------------- T H R E A D ---------------
Current thread (0x33850c00): JavaThread "Thread-0" [_thread_in_native, id=8536, stack(0x345c0000,0x346c0000)]
siginfo: ExceptionCode=0xe06d7363, ExceptionInformation=0x19930520 0x346bed7c 0x744af0fc
Registers:
EAX=0x346be368, EBX=0x33439af0, ECX=0x00000003, EDX=0x00000000
ESP=0x346be368, EBP=0x346be3c0, ESI=0x744ad700, EDI=0x346bf018
EIP=0x754b5ef8, EFLAGS=0x00000212
Top of Stack: (sp=0x346be368)
0x346be368: e06d7363 00000001 00000000 754b5ef8
0x346be378: 00000003 19930520 346bed7c 744af0fc
0x346be388: 346bed7c 00000010 346bed8c 00000000
0x346be398: 346be3c4 346be3c8 346be3d0 00000064
0x346be3a8: 57c213aa 346bed7c 346bed7c 346bed7c
0x346be3b8: 0f6bed7c 5630430c 346be3f8 748587ed
0x346be3c8: e06d7363 00000001 00000003 346be3ec
0x346be3d8: e06d7363 00000001 00000000 00000000
Instructions: (pc=0x754b5ef8)
0x754b5ed8: e0 01 c7 44 24 0c b0 5e 4b 75 89 44 24 04 85 c9
0x754b5ee8: 75 1f 21 4c 24 10 8d 04 24 50 ff 15 2c 63 56 75
0x754b5ef8: 8b 4c 24 54 33 cc e8 b1 8d ff ff 8b e5 5d c2 10
0x754b5f08: 00 8b 45 10 83 f8 0f 77 18 89 44 24 10 c1 e0 02
Register to memory mapping:
EAX=0x346be368 is pointing into the stack for thread: 0x33850c00
EBX={method} {0x33439af4} 'create' '()J' in 'com/microstrategy/utils/registry/RegistryBridgeImpl'
ECX=0x00000003 is an unknown value
EDX=0x00000000 is an unknown value
ESP=0x346be368 is pointing into the stack for thread: 0x33850c00
EBP=0x346be3c0 is pointing into the stack for thread: 0x33850c00
ESI=0x744ad700 is an unknown value
EDI=0x346bf018 is pointing into the stack for thread: 0x33850c00
User contributions licensed under CC BY-SA 3.0