Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8249183

JVM crash in "AwtFrame::WmSize" method

    Details

    • Subcomponent:
    • Resolved In Build:
      b14
    • OS:
      windows

      Backports

        Description

        FULL PRODUCT VERSION :
        JDK 16

        ADDITIONAL OS VERSION INFORMATION :
        MS Windows 10 OS

        A DESCRIPTION OF THE PROBLEM :
        Minimizing a dialog window, which is instance for example of "javax.swing.JDialog" class, in a Java application from a second non-Java application by calling Win32 API function "::ShowWindow(hwnd, SW_MINIMIZE)", where "hwnd" argument is HWND of the peer window of the Java dialog window, leads to a postponed JVM crash in "AwtFrame::WmSize" C++ method.

        STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
        1. Download and unpack the attached archive "CrashOnMinimizingDialogTest.zip" with the created test case. Go to the directory of the unpacked test case.
        2. <JDK_HOME>\bin\javac CrashOnMinimizingDialogTest.java
        3. <JDK_HOME>\bin\java CrashOnMinimizingDialogTest

        ERROR MESSAGES/STACK TRACES THAT OCCUR :

        ---------- Part of JVM error log from the attached file "hs_err_pid5116.log" ----------

        #
        # A fatal error has been detected by the Java Runtime Environment:
        #
        # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ff81d7f8a46, pid=5116, tid=7940
        #
        # JRE version: Java(TM) SE Runtime Environment (16.0+99) (fastdebug build 16-internal+99-sust)
        # Java VM: Java HotSpot(TM) 64-Bit Server VM (fastdebug 16-internal+99-sust, mixed mode, sharing, tiered, compressed oops, g1 gc, windows-amd64)
        # Problematic frame:
        # V [jvm.dll+0x618a46] JavaCallArguments::verify+0x76
        #
        # Core dump will be written. Default location: C:\Work\Bugs\8249183\hs_err_pid5116.mdmp
        #
        # If you would like to submit a bug report, please visit:
        # https://bugreport.java.com/bugreport/crash.jsp
        #

        --------------- S U M M A R Y ------------

        Command Line: DialogExample

        Host: DESKTOP-O33OQ27, Intel(R) Core(TM) i7-6660U CPU @ 2.40GHz, 2 cores, 5G, Windows 10 , 64 bit Build 16299 (10.0.16299.15)
        Time: Tue Aug 4 12:41:03 2020 GMT Daylight Time elapsed time: 72.008507 seconds (0d 0h 1m 12s)

        --------------- T H R E A D ---------------

        Current thread (0x000002e8c54de440): JavaThread "AWT-Windows" daemon [_thread_in_vm, id=7940, stack(0x000000f06a200000,0x000000f06a300000)]

        Stack: [0x000000f06a200000,0x000000f06a300000], sp=0x000000f06a2fcb90, free space=1010k
        Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
        V [jvm.dll+0x618a46] JavaCallArguments::verify+0x76 (javaCalls.cpp:603)
        V [jvm.dll+0x616e11] JavaCalls::call_helper+0x111 (javaCalls.cpp:354)
        V [jvm.dll+0xa4ec0c] os::os_exception_wrapper+0x2c (os_windows_x86.cpp:114)
        V [jvm.dll+0x616cef] JavaCalls::call+0x6f (javaCalls.cpp:342)
        V [jvm.dll+0x6cc5d2] jni_invoke_nonstatic+0x3b2 (jni.cpp:1037)
        V [jvm.dll+0x6bc992] jni_CallVoidMethodV+0x262 (jni.cpp:1424)
        C [awt.dll+0x68c8c]

        Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
        j sun.awt.windows.WToolkit.eventLoop()V+0 java.desktop@16-internal
        j sun.awt.windows.WToolkit.run()V+50 java.desktop@16-internal
        j java.lang.Thread.run()V+11 java.base@16-internal
        v ~StubRoutines::call_stub

        siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0x0000000000000045


        Register to memory mapping:

        RIP=0x00007ff81d7f8a46 jvm.dll::JavaCallArguments::verify + 0x76
        RAX=0x0000000000000011 is an unknown value
        RBX=0x000000f06a2fce90 is pointing into the stack for thread: 0x000002e8c54de440
        RCX=0x000000f06a2fcf00 is pointing into the stack for thread: 0x000002e8c54de440
        RDX=0x0000000800c23a68 is a pointer to class:
        java.awt.peer.ContainerPeer {0x0000000800c23a70}
         - instance size: 2
         - klass size: 65
         - access: public interface abstract
         - state: linked
         - name: 'java/awt/peer/ContainerPeer'
         - super: 'java/lang/Object'
         - sub:
         - nof implementors: 2
         - arrays: NULL
         - methods: Array<T>(0x000002e8c4cdb518)
         - method ordering: Array<T>(0x0000000800b268d0)
         - default_methods: Array<T>(0x0000000000000000)
         - local interfaces: Array<T>(0x000002e8c4cdb4e8)
         - trans. interfaces: Array<T>(0x000002e8c4cdb4e8)
         - constants: constant pool [16] {0x000002e8c4cdb400} for 'java/awt/peer/ContainerPeer' cache=0x000002e8c4d03160
         - class loader data: loader data: 0x000002e8a7c4c700 of 'bootstrap'
         - unsafe anonymous host class: NULL
         - source file: 'ContainerPeer.java'
         - class annotations: Array<T>(0x0000000000000000)
         - class type annotations: Array<T>(0x0000000000000000)
         - field annotations: Array<T>(0x0000000000000000)
         - field type annotations: Array<T>(0x0000000000000000)
         - inner classes: Array<T>(0x00000008005cf2e0)
         - nest members: Array<T>(0x00000008005cf2e0)
         - permitted subclasses: Array<T>(0x00000008005cf2e0)
         - java mirror: a 'java/lang/Class'{0x00000000a5c79c38} = 'java/awt/peer/ContainerPeer'
         - vtable length 5 (start addr: 0x0000000800c23c40)
         - itable length 0 (start addr: 0x0000000800c23c68)
         - ---- static fields (0 words):
         - ---- non-static fields (0 words):
         - non-static oop maps:
        RSP=0x000000f06a2fcb90 is pointing into the stack for thread: 0x000002e8c54de440
        RBP=0x000000f06a2fcc49 is pointing into the stack for thread: 0x000002e8c54de440
        RSI=0x000000f06a2fcf00 is pointing into the stack for thread: 0x000002e8c54de440
        RDI=0x000000f06a2fce90 is pointing into the stack for thread: 0x000002e8c54de440
        R8 =0x000000000000000e is an unknown value
        R9 =0x000002e8c54de440 is a thread
        R10=0x80e0e0fefcfefefe is an unknown value
        R11=0x000000f06a2fce58 is pointing into the stack for thread: 0x000002e8c54de440
        R12=0x000000f06a2fd058 is pointing into the stack for thread: 0x000002e8c54de440
        R13=0x000002e8c54de7c8 points into unknown readable memory: 0x00007ff81e2d2f60 | 60 2f 2d 1e f8 7f 00 00
        R14=0x000000f06a2fd058 is pointing into the stack for thread: 0x000002e8c54de440
        R15=0x000000f06a2fcf00 is pointing into the stack for thread: 0x000002e8c54de440


        Registers:
        RAX=0x0000000000000011, RBX=0x000000f06a2fce90, RCX=0x000000f06a2fcf00, RDX=0x0000000800c23a68
        RSP=0x000000f06a2fcb90, RBP=0x000000f06a2fcc49, RSI=0x000000f06a2fcf00, RDI=0x000000f06a2fce90
        R8 =0x000000000000000e, R9 =0x000002e8c54de440, R10=0x80e0e0fefcfefefe, R11=0x000000f06a2fce58
        R12=0x000000f06a2fd058, R13=0x000002e8c54de7c8, R14=0x000000f06a2fd058, R15=0x000000f06a2fcf00
        RIP=0x00007ff81d7f8a46, EFLAGS=0x0000000000010202

        Top of Stack: (sp=0x000000f06a2fcb90)
        0x000000f06a2fcb90: 0000000000000000 00007ff847631c1e
        0x000000f06a2fcba0: 000002e8c85d2ed1 0000000000000000
        0x000000f06a2fcbb0: 000002e8c85d2ed1 000002e8c85d2f88
        0x000000f06a2fcbc0: 0000000000000000 00007ff84762bbae
        0x000000f06a2fcbd0: 0000000000000000 00007ff847631b59
        0x000000f06a2fcbe0: 0000000000000000 00007ff84726af62
        0x000000f06a2fcbf0: 0000000000000000 000000f06a2fcc50
        0x000000f06a2fcc00: 0000000000000020 0000000000000000
        0x000000f06a2fcc10: 000000f06a2fcc40 000000f06a2fcc28
        0x000000f06a2fcc20: 000002e8c85d40da 000002e8001c001a
        0x000000f06a2fcc30: 000002e8c85d40da 000000007ffe0384
        0x000000f06a2fcc40: 0000014300000050 0000000000000000
        0x000000f06a2fcc50: 000000000000f060 0000000000000000
        0x000000f06a2fcc60: 00001f941f6efdec 0000000000000000
        0x000000f06a2fcc70: 0000000000000002 000000f06a2fd058
        0x000000f06a2fcc80: 000002e8c54de7c8 000000f06a2fd058

          Attachments

            Issue Links

              Activity

                People

                • Assignee:
                  alitvinov Anton Litvinov
                  Reporter:
                  shadowbug Shadow Bug
                • Votes:
                  0 Vote for this issue
                  Watchers:
                  6 Start watching this issue

                  Dates

                  • Created:
                    Updated:
                    Resolved: