Solved

HotSpot Virtual Machine Error, Internal Error

Posted on 2004-09-26
4
779 Views
Last Modified: 2013-11-15
I'm using weblogic5.1(sp13). I got following error. Pls. help..
#
# HotSpot Virtual Machine Error, Internal Error
# Please report this error at
# http://java.sun.com/cgi-bin/bugreport.cgi
#
# Java VM: Java HotSpot(TM) Client VM (1.4.2_04-b05 mixed mode)
#
# Error ID: 43113F32554E54494D45110E4350500308
#
# Problematic Thread: prio=5 tid=0x54632988 nid=0x26cc4 runnable
#
 
Heap at VM Abort:
Heap
 def new generation   total 36352K, used 20484K [0x10010000, 0x12780000, 0x14ed0
000)
  eden space 32320K,  50% used [0x10010000, 0x11021208, 0x11fa0000)
  from space 4032K, 100% used [0x12390000, 0x12780000, 0x12780000)
  to   space 4032K,   0% used [0x11fa0000, 0x11fa0000, 0x12390000)
 tenured generation   total 483968K, used 187364K [0x14ed0000, 0x32770000, 0x500
10000)
   the space 483968K,  38% used [0x14ed0000, 0x205c90e8, 0x205c9200, 0x32770000)
 
 compacting perm gen  total 23552K, used 23526K [0x50010000, 0x51710000, 0x54010
000)
   the space 23552K,  99% used [0x50010000, 0x51709960, 0x51709a00, 0x51710000)
 
D:\weblogic>goto finish
 
D:\weblogic>ENDLOCAL
0
Comment
Question by:prishan
4 Comments
 
LVL 4

Accepted Solution

by:
DaveyEss earned 125 total points
Comment Utility
At the end of the error log, it says that you have used 99% of the compacted permanent generation memory.  That is probably why your app is crashing.  Try increasing the amount of memory available for this using the switch below when you start the app server.

-XX:MaxPermSize=xxm
0
 
LVL 13

Assisted Solution

by:Webstorm
Webstorm earned 125 total points
Comment Utility
Hi prishan,

These kind of internal error is not a normal case. This error is generally caused by a bug in a native library / in the JVM. What you can do is :
    - trying to use another VM type than HotSport (if you have one)
    - download a more recent version of the JVM and hope this error is corrected
    - report it to Sun as explained in the message ( http://java.sun.com/cgi-bin/bugreport.cgi ).

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Whether you've completed a degree in computer sciences or you're a self-taught programmer, writing your first lines of code in the real world is always a challenge. Here are some of the most common pitfalls for new programmers.
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now