Advertisement
Guest User

Untitled

a guest
Jul 2nd, 2013
345
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.80 KB | None | 0 0
  1. #
  2. # A fatal error has been detected by the Java Runtime Environment:
  3. #
  4. # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x0000000000000000, pid=2796, tid=6720
  5. #
  6. # JRE version: 7.0_03-b05
  7. # Java VM: Java HotSpot(TM) 64-Bit Server VM (22.1-b02 mixed mode windows-amd64 compressed oops)
  8. # Problematic frame:
  9. # C 0x0000000000000000
  10. #
  11. # Failed to write core dump. Minidumps are not enabled by default on client versions of Windows
  12. #
  13. # If you would like to submit a bug report, please visit:
  14. # http://bugreport.sun.com/bugreport/crash.jsp
  15. # The crash happened outside the Java Virtual Machine in native code.
  16. # See problematic frame for where to report the bug.
  17. #
  18.  
  19. --------------- T H R E A D ---------------
  20.  
  21. Current thread (0x0000000002f7b800): JavaThread "main" [_thread_in_native, id=6720, stack(0x0000000003280000,0x0000000003380000)]
  22.  
  23. siginfo: ExceptionCode=0xc0000005, ExceptionInformation=0x0000000000000008 0x0000000000000000
  24.  
  25. Registers:
  26. RAX=0x00000000093e9980, RBX=0x0000000000000000, RCX=0x000000000337dcc8, RDX=0x00000000092f5440
  27. RSP=0x000000000337dc78, RBP=0x000000000337dd59, RSI=0x0000000000000000, RDI=0x00000000092f9990
  28. R8 =0x00000000093e8d90, R9 =0x000007feeff31d10, R10=0x000000000000011d, R11=0x00000000093e9980
  29. R12=0x00000000092f82b0, R13=0x00000000092f5440, R14=0x00000000093e99b8, R15=0x000007feeff31201
  30. RIP=0x0000000000000000, EFLAGS=0x0000000000010246
  31.  
  32. Top of Stack: (sp=0x000000000337dc78)
  33. 0x000000000337dc78: 000007feee7d6da1 0000000000000001
  34. 0x000000000337dc88: 00000000092f82b0 0000000000002000
  35. 0x000000000337dc98: 000007feef722083 0000004000000001
  36. 0x000000000337dca8: 0000000000002000 00000000092f8650
  37. 0x000000000337dcb8: 0000000000000000 0000000000000000
  38. 0x000000000337dcc8: 000007feee7d458a 00000000092f9990
  39. 0x000000000337dcd8: 0000000000000000 00000000092f9990
  40. 0x000000000337dce8: 0000000000000000 000007feee81b0c0
  41. 0x000000000337dcf8: 0000000000000458 fffffffffffffffe
  42. 0x000000000337dd08: 0000000000000000 00000000092f9990
  43. 0x000000000337dd18: 000007feee7d32bf 00000000092f9990
  44. 0x000000000337dd28: 00000000093e9980 0000000000000000
  45. 0x000000000337dd38: 0000000000000002 fffffffffffffffe
  46. 0x000000000337dd48: 0000000000000010 000007feeff312a8
  47. 0x000000000337dd58: 0000000000000000 0000000000000002
  48. 0x000000000337dd68: 000000000337de50 00000000093e8dd0
  49.  
  50. Instructions: (pc=0x0000000000000000)
  51. 0xffffffffffffffe0:
  52.  
  53.  
  54. Register to memory mapping:
  55.  
  56. RAX=0x00000000093e9980 is an unknown value
  57. RBX=0x0000000000000000 is an unknown value
  58. RCX=0x000000000337dcc8 is pointing into the stack for thread: 0x0000000002f7b800
  59. RDX=0x00000000092f5440 is an unknown value
  60. RSP=0x000000000337dc78 is pointing into the stack for thread: 0x0000000002f7b800
  61. RBP=0x000000000337dd59 is pointing into the stack for thread: 0x0000000002f7b800
  62. RSI=0x0000000000000000 is an unknown value
  63. RDI=0x00000000092f9990 is an unknown value
  64. R8 =0x00000000093e8d90 is an unknown value
  65. R9 =0x000007feeff31d10 is an unknown value
  66. R10=0x000000000000011d is an unknown value
  67. R11=0x00000000093e9980 is an unknown value
  68. R12=0x00000000092f82b0 is an unknown value
  69. R13=0x00000000092f5440 is an unknown value
  70. R14=0x00000000093e99b8 is an unknown value
  71. R15=0x000007feeff31201 is an unknown value
  72.  
  73.  
  74. Stack: [0x0000000003280000,0x0000000003380000], sp=0x000000000337dc78, free space=1015k
  75. Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
  76. j org.lwjgl.opencl.CL.ngetFunctionAddress(J)J+0
  77. j org.lwjgl.opencl.CL.getFunctionAddress(Ljava/lang/String;)J+9
  78. j org.lwjgl.opencl.CLCapabilities.<clinit>()V+2
  79. v ~StubRoutines::call_stub
  80. j org.lwjgl.opencl.CL.create()V+272
  81. j com.diablominer.DiabloMiner.DeviceState.GPUHardwareType.<init>(Lcom/diablominer/DiabloMiner/DiabloMiner;)V+1396
  82. j com.diablominer.DiabloMiner.DiabloMiner.execute([Ljava/lang/String;)V+1788
  83. j com.diablominer.DiabloMiner.DiabloMiner.main([Ljava/lang/String;)V+10
  84. v ~StubRoutines::call_stub
  85.  
  86. --------------- P R O C E S S ---------------
  87.  
  88. Java Threads: ( => current thread )
  89. 0x0000000007e1c000 JavaThread "DiabloMiner JSONRPC SendWorkAsync for [http://api.bitcoin.cz]" [_thread_blocked, id=5908, stack(0x00000000084a0000,0x00000000085a0000)]
  90. 0x0000000007eec800 JavaThread "DiabloMiner JSONRPC GetWorkAsync for [http://api.bitcoin.cz]" [_thread_blocked, id=1244, stack(0x0000000008330000,0x0000000008430000)]
  91. 0x0000000006cc8800 JavaThread "Service Thread" daemon [_thread_blocked, id=4396, stack(0x0000000007b20000,0x0000000007c20000)]
  92. 0x0000000006cc5800 JavaThread "C2 CompilerThread1" daemon [_thread_blocked, id=1476, stack(0x0000000007970000,0x0000000007a70000)]
  93. 0x0000000006cc1800 JavaThread "C2 CompilerThread0" daemon [_thread_blocked, id=3896, stack(0x00000000073e0000,0x00000000074e0000)]
  94. 0x0000000006cbe000 JavaThread "Attach Listener" daemon [_thread_blocked, id=7032, stack(0x0000000007080000,0x0000000007180000)]
  95. 0x0000000006cb9000 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=6620, stack(0x0000000007680000,0x0000000007780000)]
  96. 0x0000000002ef4000 JavaThread "Finalizer" daemon [_thread_blocked, id=5024, stack(0x00000000074f0000,0x00000000075f0000)]
  97. 0x0000000002eea000 JavaThread "Reference Handler" daemon [_thread_blocked, id=184, stack(0x00000000072e0000,0x00000000073e0000)]
  98. =>0x0000000002f7b800 JavaThread "main" [_thread_in_native, id=6720, stack(0x0000000003280000,0x0000000003380000)]
  99.  
  100. Other Threads:
  101. 0x0000000002ee5800 VMThread [stack: 0x0000000007190000,0x0000000007290000] [id=7012]
  102. 0x0000000006ce3800 WatcherThread [stack: 0x00000000077e0000,0x00000000078e0000] [id=3800]
  103.  
  104. VM state:not at safepoint (normal execution)
  105.  
  106. VM Mutex/Monitor currently owned by a thread: None
  107.  
  108. Heap
  109. PSYoungGen total 9664K, used 1037K [0x00000000ff560000, 0x00000000ffff0000, 0x0000000100000000)
  110. eden space 8640K, 10% used [0x00000000ff560000,0x00000000ff63fbf0,0x00000000ffdd0000)
  111. from space 1024K, 13% used [0x00000000ffed0000,0x00000000ffef3860,0x00000000fffd0000)
  112. to space 1024K, 0% used [0x00000000ffdd0000,0x00000000ffdd0000,0x00000000ffed0000)
  113. PSOldGen total 21888K, used 2441K [0x00000000fe000000, 0x00000000ff560000, 0x00000000ff560000)
  114. object space 21888K, 11% used [0x00000000fe000000,0x00000000fe262608,0x00000000ff560000)
  115. PSPermGen total 21248K, used 6655K [0x00000000f8e00000, 0x00000000fa2c0000, 0x00000000fe000000)
  116. object space 21248K, 31% used [0x00000000f8e00000,0x00000000f947ffc0,0x00000000fa2c0000)
  117.  
  118. Code Cache [0x0000000003380000, 0x00000000035f0000, 0x0000000006380000)
  119. total_blobs=273 nmethods=37 adapters=189 free_code_cache=48664Kb largest_free_block=49806592
  120.  
  121. Dynamic libraries:
  122. 0x000000013f6f0000 - 0x000000013f723000 C:\Program Files\Java\jre7\launch4j-tmp\DiabloMiner-Windows.exe
  123. 0x00000000777f0000 - 0x0000000077976000 C:\Windows\system32\ntdll.dll
  124. 0x0000000077490000 - 0x00000000775bd000 C:\Windows\system32\kernel32.dll
  125. 0x0000000075490000 - 0x00000000754cf000 C:\Program Files\AVAST Software\Avast\snxhk64.dll
  126. 0x000007fefebc0000 - 0x000007fefecc8000 C:\Windows\system32\ADVAPI32.dll
  127. 0x000007fefe5c0000 - 0x000007fefe703000 C:\Windows\system32\RPCRT4.dll
  128. 0x00000000775c0000 - 0x000000007768d000 C:\Windows\system32\USER32.dll
  129. 0x000007fefe320000 - 0x000007fefe384000 C:\Windows\system32\GDI32.dll
  130. 0x000007fefcb20000 - 0x000007fefcd19000 C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6002.18305_none_1509f852f40ee5cd\COMCTL32.dll
  131. 0x000007fefe7b0000 - 0x000007fefe84c000 C:\Windows\system32\msvcrt.dll
  132. 0x000007fefe8b0000 - 0x000007fefe923000 C:\Windows\system32\SHLWAPI.dll
  133. 0x000007fefe390000 - 0x000007fefe3bd000 C:\Windows\system32\IMM32.DLL
  134. 0x000007fefe930000 - 0x000007fefea32000 C:\Windows\system32\MSCTF.dll
  135. 0x000007fefe5b0000 - 0x000007fefe5bd000 C:\Windows\system32\LPK.DLL
  136. 0x000007fefea40000 - 0x000007fefeada000 C:\Windows\system32\USP10.dll
  137. 0x00000000688e0000 - 0x00000000689b1000 C:\Program Files\Java\jre7\bin\msvcr100.dll
  138. 0x00000000606d0000 - 0x0000000060daa000 C:\Program Files\Java\jre7\bin\server\jvm.dll
  139. 0x000007fefb050000 - 0x000007fefb059000 C:\Windows\system32\WSOCK32.dll
  140. 0x000007fefe2d0000 - 0x000007fefe314000 C:\Windows\system32\WS2_32.dll
  141. 0x000007fefe5a0000 - 0x000007fefe5a7000 C:\Windows\system32\NSI.dll
  142. 0x000007fefc4a0000 - 0x000007fefc4d9000 C:\Windows\system32\WINMM.dll
  143. 0x000007fefe3c0000 - 0x000007fefe598000 C:\Windows\system32\ole32.dll
  144. 0x000007fefeae0000 - 0x000007fefebb3000 C:\Windows\system32\OLEAUT32.dll
  145. 0x000007fefc440000 - 0x000007fefc495000 C:\Windows\system32\OLEACC.dll
  146. 0x0000000077990000 - 0x0000000077999000 C:\Windows\system32\PSAPI.DLL
  147. 0x00000000713e0000 - 0x00000000713ef000 C:\Program Files\Java\jre7\bin\verify.dll
  148. 0x0000000070d90000 - 0x0000000070db8000 C:\Program Files\Java\jre7\bin\java.dll
  149. 0x00000000711f0000 - 0x0000000071205000 C:\Program Files\Java\jre7\bin\zip.dll
  150. 0x00000000711d0000 - 0x00000000711e9000 C:\Program Files\Java\jre7\bin\net.dll
  151. 0x000007fefd5c0000 - 0x000007fefd60f000 C:\Windows\system32\mswsock.dll
  152. 0x000007fefd770000 - 0x000007fefd777000 C:\Windows\System32\wship6.dll
  153. 0x0000000070920000 - 0x0000000070931000 C:\Program Files\Java\jre7\bin\nio.dll
  154. 0x0000000180000000 - 0x0000000180050000 C:\Users\Daniel\Desktop\DiabloMiner\target\libs\natives\lwjgl64.dll
  155. 0x000007fef5fc0000 - 0x000007fef60f1000 C:\Windows\system32\OPENGL32.dll
  156. 0x000007fefc840000 - 0x000007fefc86d000 C:\Windows\system32\GLU32.dll
  157. 0x000007fef68d0000 - 0x000007fef69bf000 C:\Windows\system32\DDRAW.dll
  158. 0x000007fefc5e0000 - 0x000007fefc5e8000 C:\Windows\system32\DCIMAN32.dll
  159. 0x000007fefecd0000 - 0x000007fefeeac000 C:\Windows\system32\SETUPAPI.dll
  160. 0x000007fefb190000 - 0x000007fefb1a1000 C:\Windows\system32\dwmapi.dll
  161. 0x000007fefd780000 - 0x000007fefd78b000 C:\Windows\system32\VERSION.dll
  162. 0x000007fef8ce0000 - 0x000007fef8cf3000 C:\Program Files (x86)\AMD APP\bin\x86_64\OpenCL.dll
  163. 0x000007feee7d0000 - 0x000007fef0783000 C:\Program Files (x86)\AMD APP\bin\x86_64\amdocl64.dll
  164. 0x000007fef8f40000 - 0x000007fef9053000 C:\Windows\system32\dbghelp.dll
  165. 0x000007fefc3a0000 - 0x000007fefc3ae000 C:\Windows\system32\atig6txx.dll
  166. 0x000007fefd020000 - 0x000007fefd059000 C:\Windows\system32\WINTRUST.dll
  167. 0x000007fefd960000 - 0x000007fefda98000 C:\Windows\system32\CRYPT32.dll
  168. 0x000007fefdb10000 - 0x000007fefdb29000 C:\Windows\system32\MSASN1.dll
  169. 0x000007fefe090000 - 0x000007fefe0b6000 C:\Windows\system32\USERENV.dll
  170. 0x000007fefe070000 - 0x000007fefe08c000 C:\Windows\system32\Secur32.dll
  171. 0x000007fefe2b0000 - 0x000007fefe2c8000 C:\Windows\system32\imagehlp.dll
  172.  
  173. VM Arguments:
  174. jvm_args: -Xmx32m -Djava.library.path=target\libs\natives
  175. java_command: com.diablominer.DiabloMiner.DiabloMiner -u LordFawful.worker1 -p k8zVwq5X -o http://api.bitcoin.cz -r 8332
  176. Launcher Type: SUN_STANDARD
  177.  
  178. Environment Variables:
  179. PATH=C:\Program Files (x86)\AMD APP\bin\x86_64;C:\Program Files (x86)\AMD APP\bin\x86;C:\Users\Daniel\Documents\AMD APP\bin\x86_64;C:\Users\Daniel\Documents\AMD APP\bin\x86;C:\WinAVR-20100110\bin;C:\WinAVR-20100110\utils\bin;C:\Python32;C:\Python32\DLLs;C:\Python32\Lib;C:\Python32\Lib\lib-tk;C:\Program Files\Common Files\Microsoft Shared\Windows Live;C:\Program Files (x86)\Common Files\Hackety Hack\0.r1529\..;C:\Program Files (x86)\CMake 2.8\bin;C:\Python33;C:\Program Files\Java\jre7\bin
  180. USERNAME=Daniel
  181. OS=Windows_NT
  182. PROCESSOR_IDENTIFIER=AMD64 Family 16 Model 4 Stepping 2, AuthenticAMD
  183.  
  184.  
  185.  
  186. --------------- S Y S T E M ---------------
  187.  
  188. OS: Windows Vista , 64 bit Build 6002 Service Pack 2
  189.  
  190. CPU:total 4 (4 cores per cpu, 1 threads per core) family 16 model 4 stepping 2, cmov, cx8, fxsr, mmx, sse, sse2, sse3, popcnt, mmxext, 3dnowpref, lzcnt, sse4a
  191.  
  192. Memory: 4k page, physical 4191536k(976968k free), swap 8617056k(4091376k free)
  193.  
  194. vm_info: Java HotSpot(TM) 64-Bit Server VM (22.1-b02) for windows-amd64 JRE (1.7.0_03-b05), built on Feb 3 2012 20:43:56 by "java_re" with unknown MS VC++:1600
  195.  
  196. time: Tue Jul 02 20:03:59 2013
  197. elapsed time: 3 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement