Hello,
User has updated NVidia drivers and our Java based program crashes upon startup with ACCESS_VIOLATION in nvidia driver.
Any chances you could provide debug symbols for this dll or point us towards the right direction?
We have unconfirmed info that switching the Nvidia Control Panel to the 3D App Visual Global Settings makes the issue go away.
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ffe53408899, pid=4228, tid=21472
#
# JRE version: OpenJDK Runtime Environment (12.0.2+10) (build 12.0.2+10)
# Java VM: OpenJDK 64-Bit Server VM (12.0.2+10, mixed mode, sharing, tiered, compressed oops, g1 gc, windows-amd64)
# Problematic frame:
# C [nvoglv64.dll+0xc38899]
#
# No core dump will be written. Minidumps are not enabled by default on client versions of Windows
(...)
Host: Intel(R) Xeon(R) Gold 6136 CPU @ 3.00GHz, 24 cores, 127G, Windows 10 , 64 bit Build 19041 (10.0.19041.3155)
Time: Mon Jul 24 09:44:30 2023 Central Daylight Time elapsed time: 1 seconds (0d 0h 0m 1s)
(...)
Dynamic libraries:
(...)
0x00007ffe527d0000 - 0x00007ffe55025000 C:\Windows\System32\DriverStore\FileRepository\nvdw.inf_amd64_9afbe48098da8a0d\nvoglv64.dll
(...)
--------------- T H R E A D ---------------
Current thread (0x000001df2a01f000): JavaThread "main" [_thread_in_native, id=21472, stack(0x000000c4fcd00000,0x000000c4fce00000)]
Stack: [0x000000c4fcd00000,0x000000c4fce00000], sp=0x000000c4fcdfc360, free space=1008k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
C [nvoglv64.dll+0xc38899]
Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
j java.lang.ClassLoader$NativeLibrary.load0(Ljava/lang/String;Z)Z+0 java.base@12.0.2
j java.lang.ClassLoader$NativeLibrary.load()Z+53 java.base@12.0.2
j java.lang.ClassLoader$NativeLibrary.loadLibrary(Ljava/lang/Class;Ljava/lang/String;Z)Z+216 java.base@12.0.2
j java.lang.ClassLoader.loadLibrary0(Ljava/lang/Class;Ljava/io/File;)Z+46 java.base@12.0.2
j java.lang.ClassLoader.loadLibrary(Ljava/lang/Class;Ljava/lang/String;Z)V+228 java.base@12.0.2
j java.lang.Runtime.loadLibrary0(Ljava/lang/Class;Ljava/lang/String;)V+54 java.base@12.0.2
j java.lang.System.loadLibrary(Ljava/lang/String;)V+7 java.base@12.0.2
j sun.security.ec.SunEC$1.run()Ljava/lang/Void;+2 jdk.crypto.ec@12.0.2
j sun.security.ec.SunEC$1.run()Ljava/lang/Object;+1 jdk.crypto.ec@12.0.2
J 1204 c1 java.security.AccessController.doPrivileged(Ljava/security/PrivilegedAction;)Ljava/lang/Object; java.base@12.0.2 (9 bytes) @ 0x000001df32f8aeec [0x000001df32f8ad80+0x000000000000016c]
j sun.security.ec.SunEC.<clinit>()V+11 jdk.crypto.ec@12.0.2
v ~StubRoutines::call_stub
j jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance0(Ljava/lang/reflect/Constructor;[Ljava/lang/Object;)Ljava/lang/Object;+0 java.base@12.0.2
j jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance([Ljava/lang/Object;)Ljava/lang/Object;+85 java.base@12.0.2
j jdk.internal.reflect.DelegatingConstructorAccessorImpl.newInstance([Ljava/lang/Object;)Ljava/lang/Object;+5 java.base@12.0.2
j java.lang.reflect.Constructor.newInstanceWithCaller([Ljava/lang/Object;ZLjava/lang/Class;)Ljava/lang/Object;+65 java.base@12.0.2
j java.lang.reflect.Constructor.newInstance([Ljava/lang/Object;)Ljava/lang/Object;+30 java.base@12.0.2
j java.util.ServiceLoader$ProviderImpl.newInstance()Ljava/lang/Object;+19 java.base@12.0.2
j java.util.ServiceLoader$ProviderImpl.get()Ljava/lang/Object;+13 java.base@12.0.2
j java.util.ServiceLoader$3.next()Ljava/lang/Object;+58 java.base@12.0.2
j sun.security.jca.ProviderConfig$ProviderLoader.load(Ljava/lang/String;)Ljava/security/Provider;+54 java.base@12.0.2
j sun.security.jca.ProviderConfig$3.run()Ljava/security/Provider;+44 java.base@12.0.2
j sun.security.jca.ProviderConfig$3.run()Ljava/lang/Object;+1 java.base@12.0.2
J 1204 c1 java.security.AccessController.doPrivileged(Ljava/security/PrivilegedAction;)Ljava/lang/Object; java.base@12.0.2 (9 bytes) @ 0x000001df32f8aeec [0x000001df32f8ad80+0x000000000000016c]
j sun.security.jca.ProviderConfig.doLoadProvider()Ljava/security/Provider;+8 java.base@12.0.2
j sun.security.jca.ProviderConfig.getProvider()Ljava/security/Provider;+270 java.base@12.0.2
j sun.security.jca.ProviderList.getProvider(I)Ljava/security/Provider;+6 java.base@12.0.2
j sun.security.jca.ProviderList.getIndex(Ljava/lang/String;)I+13 java.base@12.0.2
j sun.security.jca.ProviderList.getProviderConfig(Ljava/lang/String;)Lsun/security/jca/ProviderConfig;+2 java.base@12.0.2
j sun.security.jca.ProviderList.getProvider(Ljava/lang/String;)Ljava/security/Provider;+2 java.base@12.0.2
j java.security.Security.getProvider(Ljava/lang/String;)Ljava/security/Provider;+4 java.base@12.0.2
j com.dugeo.util.dek.<clinit>()V+192
v ~StubRoutines::call_stub
j com.dugeo.util.dmz.da()Lcom/dugeo/util/dmz;+90
j com.dugeo.util.daqb.<init>(Ljava/lang/String;)V+15
j com.dugeo.util.daqb.da(Ljava/lang/String;)Lcom/dugeo/util/daqb;+11
j com.dugeo.experimental.viewer.InsightMain.main([Ljava/lang/String;)V+30
v ~StubRoutines::call_stub
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff
Register to memory mapping:
RIP=0x00007ffe53408899 nvoglv64.dll
RAX=0xffffffffffffffff is an unknown value
RBX=0x0 is NULL
RCX=0x000001df5e55f840 points into unknown readable memory: 04 00 ea 00 12 a0 28 4c
RDX=0x616c2f6176616a4c is an unknown value
RSP=0x000000c4fcdfc360 is pointing into the stack for thread: 0x000001df2a01f000
RBP=0x0 is NULL
RSI=0x000001df5e55f840 points into unknown readable memory: 04 00 ea 00 12 a0 28 4c
RDI=0x616c2f6176616a4c is an unknown value
R8 =0x0000000000000001 is an unknown value
R9 =0x0 is NULL
R10=0x000000c4fe8fd2a0 is pointing into the stack for thread: 0x000001df60d19800
R11=0x000000c4fcdfc210 is pointing into the stack for thread: 0x000001df2a01f000
R12=0x0000000000000001 is an unknown value
R13=0x000000c4fcdfd001 is pointing into the stack for thread: 0x000001df2a01f000
R14=0x636170612f67726f is an unknown value
R15=0xffffffffffffffff is an unknown value
Registers:
RAX=0xffffffffffffffff, RBX=0x0000000000000000, RCX=0x000001df5e55f840, RDX=0x616c2f6176616a4c
RSP=0x000000c4fcdfc360, RBP=0x0000000000000000, RSI=0x000001df5e55f840, RDI=0x616c2f6176616a4c
R8 =0x0000000000000001, R9 =0x0000000000000000, R10=0x000000c4fe8fd2a0, R11=0x000000c4fcdfc210
R12=0x0000000000000001, R13=0x000000c4fcdfd001, R14=0x636170612f67726f, R15=0xffffffffffffffff
RIP=0x00007ffe53408899, EFLAGS=0x0000000000010202
Top of Stack: (sp=0x000000c4fcdfc360)
0x000000c4fcdfc360: 000001df5fd1e030 0000000100000056
0x000000c4fcdfc370: 0000000000000bc0 00007ffeb1560000
0x000000c4fcdfc380: 0000000000000000 00007ffed4070000
0x000000c4fcdfc390: 00007ffeb16784b0 00007ffed4b91010
0x000000c4fcdfc3a0: 00007ffed4b914e0 00007ffed4b910f0
0x000000c4fcdfc3b0: 00007ffed4091710 00007ffeb1678360
0x000000c4fcdfc3c0: 6c642e63656e7573 642e74786500006c
0x000000c4fcdfc3d0: 6c6c642e74006c6c 0000000000000000
0x000000c4fcdfc3e0: 000001df5ff86f10 00007ffed5f1fce8
0x000000c4fcdfc3f0: 0000000000000001 0000000000000030
0x000000c4fcdfc400: 000000c4fcdfd080 00007ffed4095660
0x000000c4fcdfc410: 0000000000000008 0000000000000000
0x000000c4fcdfc420: 000001df60f74918 00007ffed36e3723
0x000000c4fcdfc430: 0000000000000000 0000000000000000
0x000000c4fcdfc440: 00007ffeb9610000 00007ffed36b0000
0x000000c4fcdfc450: 0000000000000000 0000000000000000
Instructions: (pc=0x00007ffe53408899)
0x00007ffe53408799: 30 74 0f e8 3f e2 0b 00 40 0f b6 c7 48 83 c4 20
0x00007ffe534087a9: 5f c3 8b 05 8f 0e a7 01 85 c0 7e 4e 8b 05 85 0e
0x00007ffe534087b9: a7 01 ff c8 80 3d dc 0e a7 01 00 89 05 76 0e a7
0x00007ffe534087c9: 01 74 21 83 05 b1 0e a7 01 ff 75 2e 48 8d 0d e4
0x00007ffe534087d9: 0e a7 01 c7 05 e2 0e a7 01 00 00 00 00 e8 35 ce
0x00007ffe534087e9: ac ff eb 16 83 05 90 0e a7 01 ff 75 0d 0f ae f8
0x00007ffe534087f9: c7 05 7d 0e a7 01 00 00 00 00 0f b6 05 06 0e a7
0x00007ffe53408809: 01 84 c0 75 0e 8b 05 f0 0d a7 01 ff c8 89 05 e8
0x00007ffe53408819: 0d a7 01 40 0f b6 c7 48 83 c4 20 5f c3 cc cc cc
0x00007ffe53408829: cc cc cc cc cc cc cc 45 33 c9 45 8d 41 01 e9 04
0x00007ffe53408839: 00 00 00 cc cc cc cc 48 89 5c 24 18 55 56 57 41
0x00007ffe53408849: 54 41 55 41 56 41 57 48 81 ec 70 01 00 00 45 33
0x00007ffe53408859: f6 45 8b e0 41 8b de 44 89 b4 24 b0 01 00 00 41
0x00007ffe53408869: 8b ee 4c 89 74 24 20 48 8b fa 48 8b f1 41 b5 01
0x00007ffe53408879: ff 15 d9 8f f7 00 4c 8b f8 48 85 f6 74 66 4c 8b
0x00007ffe53408889: 76 08 4d 85 f6 74 5d 48 85 ff 0f 84 80 01 00 00
0x00007ffe53408899: 48 8b 17 4c 8d 44 24 20 8d 4d 04 ff 15 be 89 f7
0x00007ffe534088a9: 00 85 c0 74 38 48 8b 4c 24 20 49 3b ce 75 28 41
0x00007ffe534088b9: b8 04 01 00 00 48 8d 54 24 60 ff 15 97 89 f7 00
0x00007ffe534088c9: 48 8b 56 10 48 8d 4c 24 60 e8 b5 09 4c 00 85 c0
0x00007ffe534088d9: 74 12 48 8b 4c 24 20 ff 15 2a 90 f7 00 32 c0 e9
0x00007ffe534088e9: 7d 01 00 00 48 85 ff 0f 84 23 01 00 00 48 8b 37
0x00007ffe534088f9: 48 3b f3 72 0d 48 8d 46 08 48 3b c5 0f 86 b7 00
0x00007ffe53408909: 00 00 44 8b b4 24 b0 01 00 00 48 85 db 74 31 2b
0x00007ffe53408919: eb 4c 8d 8c 24 b8 01 00 00 48 63 ed 45 8b c6 48
0x00007ffe53408929: 8b d5 48 8b cb ff 15 d4 88 f7 00 41 f6 c6 f0 74
0x00007ffe53408939: 0f 4c 8b c5 48 8b d3 49 8b cf ff 15 8f 88 f7 00
0x00007ffe53408949: 48 8b de 48 8d 46 08 48 81 e3 00 f0 ff ff 48 8d
0x00007ffe53408959: ab 00 10 00 00 48 3b c5 76 06 48 8b de 48 8b e8
0x00007ffe53408969: 41 b8 30 00 00 00 48 8d 54 24 28 48 8b cb ff 15
0x00007ffe53408979: b3 8e f7 00 8b 44 24 4c 83 e8 10 74 15 83 e8 10
0x00007ffe53408989: 74 10 83 e8 20 74 0b 41 b8 04 00 00 00 83 f8 40
Stack slot to memory mapping:
stack at sp + 0 slots: 0x000001df5fd1e030 points into unknown readable memory: 60 7b b2 5f df 01 00 00
stack at sp + 1 slots: 0x0000000100000056 is an unknown value
stack at sp + 2 slots: 0x0000000000000bc0 is an unknown value
stack at sp + 3 slots: 0x00007ffeb1560000 DBGHELP.DLL
stack at sp + 4 slots: 0x0 is NULL
stack at sp + 5 slots: 0x00007ffed4070000 KERNEL32.DLL
stack at sp + 6 slots: 0x00007ffeb16784b0 DBGHELP.DLL
stack at sp + 7 slots: 0x00007ffed4b91010 PSAPI.DLL