Jump to content

diamondev

Members
  • Posts

    1
  • Joined

  • Last visited

About diamondev

  • Birthday 02/25/1999

diamondev's Achievements

Dirt

Dirt (1/9)

0

Reputation

  1. Launcher Version: 3.1 Operating System: windows 7 Java Version: Java SE Runtime Environment 7 Antivirus Program: avg free 2013 Description of Problem: my freind kind of screwed my launcher by hitting me then i crashed and now my launcher stays on at the "Checking launcher version" thing plz help Error Messages: Error Log: # # A fatal error has been detected by the Java Runtime Environment: # # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x000007fee8aa6220, pid=6944, tid=5300 # # JRE version: 7.0_09-b05 # Java VM: Java HotSpot 64-Bit Server VM (23.5-b02 mixed mode windows-amd64 compressed oops) # Problematic frame: # C [OpenAL64.dll+0x6220] alSourcei+0x144 # # Failed to write core dump. Minidumps are not enabled by default on client versions of Windows # # If you would like to submit a bug report, please visit: # http://bugreport.sun.com/bugreport/crash.jsp # The crash happened outside the Java Virtual Machine in native code. # See problematic frame for where to report the bug. # --------------- T H R E A D --------------- Current thread (0x000000000dac3000): JavaThread "Thread-18" [_thread_in_native, id=5300, stack(0x0000000016530000,0x0000000016630000)] siginfo: ExceptionCode=0xc0000005, writing address 0xffffffff815b2460 Registers: RAX=0x0000000014eef8c0, RBX=0xffffffff815b2440, RCX=0x000000000ab90000, RDX=0x0000000000000088 RSP=0x000000001662efb0, RBP=0x000000000ab9c450, RSI=0x00000000ffffffff, RDI=0x0000000000000005 R8 =0x0000000014eef8b0, R9 =0x0000000014eef8c0, R10=0x0000000002b7237c, R11=0x000000000ab9c450 R12=0x000000000ab96fe0, R13=0x00000000bd559190, R14=0x000000001662f090, R15=0x000000000dac3000 RIP=0x000007fee8aa6220, EFLAGS=0x0000000000010246 Top of Stack: (sp=0x000000001662efb0) 0x000000001662efb0: ffffffff815b2440 00000000ffffffff 0x000000001662efc0: 00000000bd412af8 000000001662f028 0x000000001662efd0: 0000000000000000 0000000002b723a8 0x000000001662efe0: 00000000bd559190 000000001662f060 0x000000001662eff0: 0000000000000013 0000000000000005 0x000000001662f000: 00000000815b2440 0000000000000000 0x000000001662f010: 00000000c200d7e0 00000000ed3fd9d8 0x000000001662f020: 000000001662f020 0000000000000000 0x000000001662f030: 000000001662f090 00000000bd55bf18 0x000000001662f040: 0000000000000000 00000000bd559190 0x000000001662f050: 0000000000000000 000000001662f080 0x000000001662f060: 000000001662f0d8 0000000002b661f8 0x000000001662f070: 00000000c1c6d488 0000000002b6f1d8 0x000000001662f080: 00000000815b2440 0000000000001009 0x000000001662f090: 000000000ab9c450 000000001662f098 0x000000001662f0a0: 00000000bd542cc7 000000001662f0f0 Instructions: (pc=0x000007fee8aa6220) 0x000007fee8aa6200: a1 00 00 83 60 08 00 48 83 60 10 00 89 18 c7 40 0x000007fee8aa6210: 04 01 00 00 00 48 89 45 68 c7 45 70 01 00 00 00 0x000007fee8aa6220: ff 43 20 eb 0a c7 85 74 01 00 00 30 10 00 00 89 0x000007fee8aa6230: 5d 54 e9 c5 01 00 00 b9 03 a0 00 00 e9 b6 01 00 Register to memory mapping: RAX=0x0000000014eef8c0 is an unknown value RBX=0xffffffff815b2440 is an unknown value RCX=0x000000000ab90000 is an unknown value RDX=0x0000000000000088 is an unknown value RSP=0x000000001662efb0 is pointing into the stack for thread: 0x000000000dac3000 RBP=0x000000000ab9c450 is an unknown value RSI=0x00000000ffffffff is an unallocated location in the heap RDI=0x0000000000000005 is an unknown value R8 =0x0000000014eef8b0 is an unknown value R9 =0x0000000014eef8c0 is an unknown value R10=0x0000000002b7237c is an Interpreter codelet method entry point (kind = native) [0x0000000002b72100, 0x0000000002b72980] 2176 bytes R11=0x000000000ab9c450 is an unknown value R12=0x000000000ab96fe0 is an unknown value R13=0x00000000bd559190 is an oop {method} - klass: {other class} R14=0x000000001662f090 is pointing into the stack for thread: 0x000000000dac3000 R15=0x000000000dac3000 is a thread
×
×
  • Create New...