--------------- S U M M A R Y ------------ Command Line: Crash Host: shade-desktop, AMD Ryzen Threadripper 3970X 32-Core Processor, 64 cores, 125G, Ubuntu 20.04.1 LTS Time: Sun Sep 27 11:37:21 2020 CEST elapsed time: 0.119082 seconds (0d 0h 0m 0s) --------------- T H R E A D --------------- Current thread (0x00007f53b4027800): JavaThread "main" [_thread_in_vm, id=635940, stack(0x00007f53ba438000,0x00007f53ba539000)] Stack: [0x00007f53ba438000,0x00007f53ba539000], sp=0x00007f53ba537660, free space=1021k Native frames: (J=compiled Java code, A=aot compiled Java code, j=interpreted, Vv=VM code, C=native code) V [libjvm.so+0x19131ea] Unsafe_GetInt+0x41a j jdk.internal.misc.Unsafe.getInt(Ljava/lang/Object;J)I+0 java.base@16-internal j jdk.internal.misc.Unsafe.getInt(J)I+3 java.base@16-internal j sun.misc.Unsafe.getInt(J)I+4 jdk.unsupported@16-internal j Crash.main([Ljava/lang/String;)V+24 v ~StubRoutines::call_stub V [libjvm.so+0xd6c4ea] JavaCalls::call_helper(JavaValue*, methodHandle const&, JavaCallArguments*, Thread*)+0x62a V [libjvm.so+0xe98605] jni_invoke_static(JNIEnv_*, JavaValue*, _jobject*, JNICallType, _jmethodID*, JNI_ArgumentPusher*, Thread*) [clone .isra.0] [clone .constprop.1]+0x3e5 V [libjvm.so+0xe9e091] jni_CallStaticVoidMethod+0x211 C [libjli.so+0x523e] JavaMain+0xc2e C [libjli.so+0x80bd] ThreadJavaMain+0xd Java frames: (J=compiled Java code, j=interpreted, Vv=VM code) j jdk.internal.misc.Unsafe.getInt(Ljava/lang/Object;J)I+0 java.base@16-internal j jdk.internal.misc.Unsafe.getInt(J)I+3 java.base@16-internal j sun.misc.Unsafe.getInt(J)I+4 jdk.unsupported@16-internal j Crash.main([Ljava/lang/String;)V+24 v ~StubRoutines::call_stub siginfo: si_signo: 11 (SIGSEGV), si_code: 1 (SEGV_MAPERR), si_addr: 0xffffffffdeadbeef Register to memory mapping: RAX=0x00007f53b4027800 is a thread RBX=0x00007f53bc6bacfa: <offset 0x0000000002032cfa> in /home/shade/trunks/jdk/build/linux-x86_64-server-fastdebug/images/jdk/lib/server/libjvm.so at 0x00007f53ba688000 RCX=0x0 is NULL RDX=0x0 is NULL RSP=0x00007f53ba537660 is pointing into the stack for thread: 0x00007f53b4027800 RBP=0x00007f53ba537740 is pointing into the stack for thread: 0x00007f53b4027800 RSI=0x0 is NULL RDI=0x00007f53ba537618 is pointing into the stack for thread: 0x00007f53b4027800 R8 =0x000055ea37ad6000 points into unknown readable memory: 0x0000000000000002 | 02 00 00 00 00 00 00 00 R9 =0x000055ea37ad6000 points into unknown readable memory: 0x0000000000000002 | 02 00 00 00 00 00 00 00 R10=0x00007f539c4dfe4a is at code_begin+1546 in an Interpreter codelet method entry point (kind = native) [0x00007f539c4df840, 0x00007f539c4e0700] 3776 bytes R11=0x0000000000000008 is an unknown value R12=0x00007f53b4027800 is a thread R13=0x00007f53ba537697 is pointing into the stack for thread: 0x00007f53b4027800 R14=0x0 is NULL R15=0x00007f53ba5376d0 is pointing into the stack for thread: 0x00007f53b4027800
from Hacker News https://ift.tt/3cBfUf6
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.