1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103
| #
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ffc9ac2f98a, pid=14364, tid=12200
#
# JRE version: Java(TM) SE Runtime Environment (13.0.1+9) (build 13.0.1+9)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (13.0.1+9, mixed mode, sharing, tiered, compressed oops, g1 gc, windows-amd64)
# Problematic frame:
# C [awt.dll+0x8f98a]
#
# No core dump will be written. Minidumps are not enabled by default on client versions of Windows
#
# If you would like to submit a bug report, please visit:
# http://bugreport.java.com/bugreport/crash.jsp
# The crash happened outside the Java Virtual Machine in native code.
# See problematic frame for where to report the bug.
#
--------------- S U M M A R Y ------------
Command Line: -agentlib:jdwp=transport=dt_socket,address=127.0.0.1:63208,suspend=y,server=n -javaagent:C:\Users\user\.IdeaIC2019.3\system\captureAgent\debugger-agent.jar -Dfile.encoding=UTF-8 com.company.Main
Host: Intel(R) Celeron(R) 2957U @ 1.40GHz, 2 cores, 7G, Windows 10 , 64 bit Build 18362 (10.0.18362.329)
Time: Wed Dec 4 22:34:53 2019 ???? (?W?�??) elapsed time: 5 seconds (0d 0h 0m 5s)
--------------- T H R E A D ---------------
Current thread (0x000001ddb054d800): JavaThread "main" [_thread_in_native, id=12200, stack(0x0000002fca800000,0x0000002fca900000)]
Stack: [0x0000002fca800000,0x0000002fca900000], sp=0x0000002fca8fea20, free space=1018k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
C [awt.dll+0x8f98a]
Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
j sun.awt.windows.WComponentPeer._setFont(Ljava/awt/Font;)V+0 java.desktop@13.0.1
j sun.awt.windows.WComponentPeer.setFont(Ljava/awt/Font;)V+7 java.desktop@13.0.1
j sun.awt.windows.WWindowPeer.initialize()V+42 java.desktop@13.0.1
j sun.awt.windows.WFramePeer.initialize()V+1 java.desktop@13.0.1
j sun.awt.windows.WComponentPeer.<init>(Ljava/awt/Component;)V+83 java.desktop@13.0.1
j sun.awt.windows.WCanvasPeer.<init>(Ljava/awt/Component;)V+2 java.desktop@13.0.1
j sun.awt.windows.WPanelPeer.<init>(Ljava/awt/Component;)V+2 java.desktop@13.0.1
j sun.awt.windows.WWindowPeer.<init>(Ljava/awt/Window;)V+2 java.desktop@13.0.1
j sun.awt.windows.WFramePeer.<init>(Ljava/awt/Frame;)V+2 java.desktop@13.0.1
j sun.awt.windows.WToolkit.createFrame(Ljava/awt/Frame;)Ljava/awt/peer/FramePeer;+5 java.desktop@13.0.1
j java.awt.Frame.addNotify()V+20 java.desktop@13.0.1
j java.awt.Window.show()V+8 java.desktop@13.0.1
j java.awt.Component.show(Z)V+5 java.desktop@13.0.1
j java.awt.Component.setVisible(Z)V+2 java.desktop@13.0.1
j java.awt.Window.setVisible(Z)V+2 java.desktop@13.0.1
j com.company.Main.main([Ljava/lang/String;)V+46
v ~StubRoutines::call_stub
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0x0000000000000058
Register to memory mapping:
RIP=0x00007ffc9ac2f98a awt.dll
RAX=0x00007ffc9acab6a0 awt.dll
RBX=0x000001ddb054db10 points into unknown readable memory: 50 e8 b1 65 fc 7f 00 00
RCX=0x000001ddd15f4be0 points into unknown readable memory: a0 b6 ca 9a fc 7f 00 00
RDX=0x0 is NULL
RSP=0x0000002fca8fea20 is pointing into the stack for thread: 0x000001ddb054d800
RBP=0x0 is NULL
RSI=0x000001ddd1619900 is a global jni handle
RDI=0x000001ddd1619908 is a global jni handle
R8 =0x0000000000000042 is an unknown value
R9 =0x0000000800b5df60 is a pointer to class:
java.awt.Font {0x0000000800b5df68}
R10=0x0000000000008000 is an unknown value
R11=0x0000002fca8fea20 is pointing into the stack for thread: 0x000001ddb054d800
R12=0x0 is NULL
R13={method} {0x000001ddd0754310} '_setFont' '(Ljava/awt/Font;)V' in 'sun/awt/windows/WComponentPeer'
R14=0x000001ddd15f4be0 points into unknown readable memory: a0 b6 ca 9a fc 7f 00 00
R15=0x000001ddd16bbd70 points into unknown readable memory: 00 99 61 d1 dd 01 00 00
Registers:
RAX=0x00007ffc9acab6a0, RBX=0x000001ddb054db10, RCX=0x000001ddd15f4be0, RDX=0x0000000000000000
RSP=0x0000002fca8fea20, RBP=0x0000000000000000, RSI=0x000001ddd1619900, RDI=0x000001ddd1619908
R8 =0x0000000000000042, R9 =0x0000000800b5df60, R10=0x0000000000008000, R11=0x0000002fca8fea20
R12=0x0000000000000000, R13=0x000001ddd0754308, R14=0x000001ddd15f4be0, R15=0x000001ddd16bbd70
RIP=0x00007ffc9ac2f98a, EFLAGS=0x0000000000010202
Top of Stack: (sp=0x0000002fca8fea20)
0x0000002fca8fea20: 000001ddd16bbd70 000001ddd15f4be0
0x0000002fca8fea30: 000001ddd16bbd70 000001ddd15f4be0
0x0000002fca8fea40: 000001ddd1619908 00007ffc9ac34895
0x0000002fca8fea50: 000001ddb054db10 000001ddb054db10
0x0000002fca8fea60: 0000000000000000 000001ddd1619900
0x0000002fca8fea70: 000001ddb054d800 0000002fca8febc0
0x0000002fca8fea80: 000001ddd16bbd70 00007ffc9ac6d7db
0x0000002fca8fea90: 00007ffc9acf0018 0000002fca8feb98
0x0000002fca8feaa0: 00007ffc9ac34768 0000000000000000
0x0000002fca8feab0: fffffffffffffffe fffffffffffffffe
0x0000002fca8feac0: 000001ddd1619900 00007ffc9ac35a5c
0x0000002fca8fead0: 000001ddd1619908 0000002fca8febb8
0x0000002fca8feae0: 0000002fca8febb8 00007ffc9acf0018
0x0000002fca8feaf0: fffffffffffffffe 0000000000000000
0x0000002fca8feb00: 000001ddba22cdb8 000001ddba2374f1
0x0000002fca8feb10: 000001ddd0754308 0000000000000000
Instructions: (pc=0x00007ffc9ac2f98a) |
Partager