Looks like that crash is in a new place so hopefully I can figure that out. I can tell you that CreatePathTo() is almost certainly not involved; if you'll note the offset it's over 15K away, so that's just Dr. Watson's best guess at giving the function a name.
|
So, my debug spew lead me to the Logout() for the last two crashes. I remarked questionable stuff and narrowed it down to two things with one being the likely cause. This is the last thing called in Logout(). After remarking this, I haven't crashed in last 12+ hours.
del(src);
|
Crashed again. This time after many hours and it wasn't near Logout() this time.
*----> State Dump for Thread Id 0x1108 <----* eax=00000000 ebx=00000000 ecx=00ce6300 edx=00000004 esi=0012dd84 edi=ffffffff eip=004fcfc9 esp=0012e7dc ebp=0012e880 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - function: byondcore!DungServer__GetHostingFlags 004fcfbb 90 nop 004fcfbc 90 nop 004fcfbd 90 nop 004fcfbe 90 nop 004fcfbf 90 nop 004fcfc0 53 push ebx 004fcfc1 56 push esi 004fcfc2 8b74240c mov esi,[esp+0xc] 004fcfc6 57 push edi 004fcfc7 8b06 mov eax,[esi] FAULT ->004fcfc9 8b7824 mov edi,[eax+0x24] ds:0023:00000024=???????? 004fcfcc 8bcf mov ecx,edi 004fcfce 4f dec edi 004fcfcf 85c9 test ecx,ecx 004fcfd1 7419 jz byondcore!DungServer__GetHostingFlags+0x2bfbc (004fcfec) 004fcfd3 8b16 mov edx,[esi] 004fcfd5 8b4228 mov eax,[edx+0x28] 004fcfd8 8d0cf8 lea ecx,[eax+edi*8] 004fcfdb 51 push ecx 004fcfdc ff15c09e5e00 call dword ptr [byondcore!`string'+0x11058 (005e9ec0)] 004fcfe2 83c404 add esp,0x4 *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0012e880 0051859e 77c35c05 00000004 00000001 byondcore!DungServer__GetHostingFlags+0x2bf99 00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e *----> Raw Stack Dump <----* 000000000012e7dc 00 00 00 00 00 00 00 00 - ff ff ff ff e5 c5 4f 00 ..............O. 000000000012e7ec c8 ba 1d 03 04 00 00 00 - 05 5c c3 77 80 e8 12 00 .........\.w.... 000000000012e7fc 05 5c c3 77 05 5c c3 77 - 04 00 00 00 23 bd 4f 00 .\.w.\.w....#.O. 000000000012e80c 20 b9 4f 00 40 41 4c 00 - 08 00 00 00 08 40 29 03 .O.@AL......@). 000000000012e81c 01 00 00 00 04 00 00 00 - 80 e8 12 00 05 5c c3 77 .............\.w 000000000012e82c 08 40 29 03 04 00 00 00 - 0c e8 12 00 a3 bc 4f 00 .@)...........O. 000000000012e83c ec ec 12 00 bd ff 50 00 - 30 32 43 56 00 00 00 00 ......P.02CV.... 000000000012e84c 5d 00 91 7c de c2 c2 77 - 00 00 3c 00 00 00 00 00 ]..|...w..<..... 000000000012e85c e3 c2 c2 77 08 40 29 03 - 03 00 00 00 1d 00 00 00 ...w.@)......... 000000000012e86c ff ff ff ff 40 41 4c 00 - 20 b9 4f 00 7c e8 12 00 ....@AL. .O.|... 000000000012e87c 09 00 00 00 00 00 00 00 - 9e 85 51 00 05 5c c3 77 ..........Q..\.w 000000000012e88c 04 00 00 00 01 00 00 00 - 04 00 00 00 05 00 00 00 ................ 000000000012e89c 08 40 29 03 80 89 d5 01 - 04 00 00 00 01 00 d5 01 .@)............. 000000000012e8ac e0 bb 51 00 04 00 00 00 - c0 e8 12 00 04 00 00 00 ..Q............. 000000000012e8bc 18 89 d5 01 00 00 00 00 - 03 00 00 00 00 04 00 00 ................ 000000000012e8cc 00 00 00 00 dc e8 12 00 - 00 00 00 00 00 00 00 03 ................ 000000000012e8dc 44 44 00 00 01 00 00 00 - 00 00 00 00 48 c8 4d 00 DD..........H.M. 000000000012e8ec 00 00 00 00 90 c8 4d 00 - 05 00 00 00 00 00 00 00 ......M......... 000000000012e8fc 07 00 00 00 16 00 00 00 - f0 39 ce 00 00 00 00 00 .........9...... 000000000012e90c 00 00 00 00 36 e7 cb 01 - 07 00 00 00 07 00 00 00 ....6........... |
The server consistently crashes with del(src) in Logout().
I found that without del(src) in Logout(), I have an infinite timer loop the continues to run even though the user is no longer logged in. I started wondering if my infinite loop designs are designed poorly and possibly leading to the random crashes which occur after longer run times. I posted both of my infinite loop designs on the Code Problems forum to solicit some feedback in case I'm doing something wrong. |
That's interesting. The spawn() should be deleting properly even when you're deleting the mob.
I would in the meantime recommend trying a while(src) loop with a sleep(). Although sleep() and spawn() use the same system, I believe there may be an internal difference in the way this is handled that could be setting the issue up. I know to sleep() or spawn() a proc we basically make a copy of it, but the spawned version could perhaps be gaining a longer call stack. |
I rewrote the function and its still crashing. It's been weeks and my project has been offline pretty much the whole time and development halted and spirits diminished. Can we take proper steps to address this issue now? I can be trusted to handle .pdb files and the rate at which I happen upon crashing issues would almost justify at least some investment in me. What would it take? I would gladly hand over most any project except this one is a significant pain to "share" as you already know.
|
As I recall the only way we were able to progress on your previous issue was for people to use Microsoft's Application Verifier (it should also be on the XP installation CDs if you have those handy), attach it to a running Dream Daemon process, and turn on full page heap checking. I recommend giving that a try.
|
With no options selected in Appverifier, I hit a crash. I recall something like this last time, trying to find out what it was but I thought I just needed to uncheck something.
- - - Access violation exception. 6559fa0 - Invalid address causing the exception 771248a4 - Code address executing the invalid access 12d138 - Exception record 12d154 - Context record - vrfcore!VfCoreRedirectedStopMessage+81 (d:\avrf\source\base\avrf\avrf30\vrfcore\stopredirect.cpp @ 103) kernel32!UnhandledExceptionFilter+f9 ( @ 0) kernel32!ValidateLocale+a0d2 ( @ 0) |
I can't run Application Verifier without crashing right when I start hosting any .dmb with "Exceptions", "Handles", and/or "heap" checked.
Don't know what's useful here if anything. - - - Corrupted heap block. 141000 - Heap handle used in the call. 331c10 - Heap block involved in the operation. 60 - Size of the heap block. 0 - Reserved - vrfcore!VfCoreRedirectedStopMessage+81 (d:\avrf\source\base\avrf\avrf30\vrfcore\stopredirect.cpp @ 103) ntdll!RtlpNtMakeTemporaryKey+38c2 ( @ 0) ntdll!RtlpNtMakeTemporaryKey+4a4b ( @ 0) ntdll!RtlpNtMakeTemporaryKey+4c4e ( @ 0) ntdll!RtlpNtMakeTemporaryKey+7cef ( @ 0) ntdll!LdrAlternateResourcesEnabled+33bd ( @ 0) ntdll!RtlpUnWaitCriticalSection+65b ( @ 0) vfbasics!AVrfpRtlFreeHeap+f8 (d:\avrf\source\base\avrf\vrfcommon\heap.c @ 385) ole32!ComPs_NdrDllCanUnloadNow+db ( @ 0) OLEAUT32!VarDecCmp+64c1 ( @ 0) OLEAUT32!SysFreeString+35 ( @ 0) nvappfilter!+36a2fad ( @ 0) |
Your output there looks very strange, like it's once again not running through Dr. Watson. Can you confirm that? I have also read that running with confused permissions can also trigger some issues in AppVerifier, so be sure you're running as an administrator.
Beyond that all I can suggest is to try to get better output than whatever that is. Dr. Watson should be reporting much more info than that, and should show the crash traced all the way back into the BYOND app. Incidentally when you get that info, it is really crucial for you to specify in any crash details which version you're running. |
Another note here: You have another app conflicting with this test. The nvappfilter in your output corresponds to an NVidia firewall which is known to be unstable and have problems with certain programs. There's some information about it here:
http://forums.nvidia.com/index.php?showtopic=21455 http://www.dll-error-fixes.com/ disableremoveuninstall-nvappfilterdll-module/ Based on what I'm seeing I think you're going to have to figure out a way to disable or uninstall their network monitoring in order to get a proper test. I'd look around to make sure you're pulling the right things first, but overall this appears to be in the way. In fact for all I know it could be causing your crashes in the first place. |
Ah. I found out how to uninstall the proxy and ran the RC (without appverif) for a while and it still crashed after a few hours.
I just hooked up AppVerif and it works without crashing so I should have some more data tomorrow. |
Build: 479.1086
WARNING: Stack unwind information not available. Following frames may be wrong. *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - ChildEBP RetAddr Args to Child 0012e384 100078c9 1000c540 00000013 00000024 ntdll!DbgBreakPoint 0012e3a8 00366262 00000013 00361b5c 00000024 vrfcore!VfCoreRedirectedStopMessage+0x81 0012e3d8 00366af1 00000013 00361b5c 00000024 vfbasics!VerifierStopMessage+0x292 0012e430 00367316 0012e45c 7c97e3e0 02014ff0 vfbasics!AVrfpCheckFirstChanceException+0xc8 0012e444 7c944308 0012e45c 0012e4f4 0012e4f4 vfbasics!AVrfpVectoredExceptionHandler+0x16 0012e464 7c92a83d 0012e4f4 0012e510 0012e0e0 ntdll!RtlDeleteAce+0xc36f 0012e4dc 7c90e48a 0012e4f4 0012e510 0012e4f4 ntdll!wcstol+0xb6 0012e880 023a859e 023a8505 00000001 00000001 ntdll!KiUserExceptionDispatcher+0xe 00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e *----> Raw Stack Dump <----* 000000000012e180 68 3b 00 10 e4 34 12 10 - 24 00 00 00 f4 e4 12 00 h;...4..$....... 000000000012e190 5c e4 12 00 b8 e1 12 00 - 00 00 00 00 00 00 00 00 \............... 000000000012e1a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000012e1b0 00 00 00 00 ff ff ff ff - 00 00 00 00 89 8e 36 02 ..............6. 000000000012e1c0 ec e1 12 02 18 e2 12 00 - 3c e7 12 00 00 00 00 00 ........<....... 000000000012e1d0 18 e2 12 00 03 00 00 00 - 04 00 00 00 00 00 00 00 ................ 000000000012e1e0 00 00 00 00 e1 9a 36 02 - 04 00 00 00 48 c8 36 02 ......6.....H.6. 000000000012e1f0 00 00 00 00 90 c8 36 02 - 00 00 00 00 10 e7 12 00 ......6......... 000000000012e200 00 00 00 00 02 00 00 00 - dc e6 12 00 00 00 00 00 ................ 000000000012e210 00 00 00 00 b0 2f b5 17 - 02 00 00 00 c7 87 36 02 ...../........6. 000000000012e220 e8 62 4c 12 17 01 00 00 - 06 00 00 00 01 00 00 00 .bL............. 000000000012e230 66 87 36 02 12 00 00 00 - 06 00 00 00 01 00 00 00 f.6............. 000000000012e240 06 00 00 00 b0 2f b5 17 - a4 64 43 02 03 00 00 00 ...../...dC..... 000000000012e250 04 00 00 00 03 00 00 00 - 04 00 00 00 70 e8 12 00 ............p... 000000000012e260 00 00 00 00 00 00 00 00 - d0 e6 12 00 f0 eb 42 02 ..............B. 000000000012e270 e3 c2 c2 77 e3 c2 c2 77 - 3c e7 12 00 1b c2 c2 77 ...w...w<......w 000000000012e280 16 00 00 00 06 00 00 00 - e3 c2 c2 77 00 00 00 00 ...........w.... 000000000012e290 74 e2 12 00 78 e2 12 00 - 16 00 00 00 02 00 00 00 t...x........... 000000000012e2a0 bc e2 12 00 9f 08 37 00 - 00 00 00 00 02 00 00 00 ......7......... 000000000012e2b0 c9 b0 38 02 00 00 00 00 - 10 e7 12 00 dc e6 12 00 ..8............. *----> State Dump for Thread Id 0x3d8 <----* eax=02b40fc0 ebx=71ac40b4 ecx=01640fdc edx=00001c83 esi=00000304 edi=00000000 eip=7c90e514 esp=04d9fec0 ebp=04d9fed4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp |
Hrm, is that the only info from the report? I looked at the only address I have to go on there and while it does provide a new lead, it's not a direct place where memory could have been written beyond its bounds and therefore not the site of the actual bug. Usually a single crash in Dr. Watson has a lot more info than that, including several state dumps.
|
(49c.13e0): C++ EH exception - code e06d7363 (first chance)
(49c.13e0): Stack overflow - code c00000fd (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=00000003 ebx=00000001 ecx=7ffdf000 edx=02a15000 esi=02a11000 edi=00000080 eip=7c96aacd esp=00032e90 ebp=0003302c iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206 ntdll!RtlpNtMakeTemporaryKey+0x23d1: 7c96aacd 56 push esi 0:000> k ChildEBP RetAddr WARNING: Stack unwind information not available. Following frames may be wrong. 0003302c 7c96be50 ntdll!RtlpNtMakeTemporaryKey+0x23d1 000330bc 7c96c9e5 ntdll!RtlpNtMakeTemporaryKey+0x3754 00033118 7c96fb16 ntdll!RtlpNtMakeTemporaryKey+0x42e9 0003319c 7c94b244 ntdll!RtlpNtMakeTemporaryKey+0x741a 000333cc 7c919c0c ntdll!LdrAlternateResourcesEnabled+0x2b05 00033600 0036fd2c ntdll!RtlpUnWaitCriticalSection+0xad *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\MSVCRT.dll - 00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap+0xb1 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 234] 000336b0 77c2c3e7 MSVCRT!free+0x1ae 000336bc 77c2c42e MSVCRT!free+0x1cc 000336cc 77c2c454 MSVCRT!malloc+0x27 00033718 00370814 MSVCRT!realloc+0x1d *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - 00033738 023d0a18 vfbasics!AVrfp_realloc+0x92 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 1051] 00000000 00000000 byondcore!BagItem::~BagItem+0xaa8 0:000> kp ChildEBP RetAddr WARNING: Stack unwind information not available. Following frames may be wrong. 0003302c 7c96be50 ntdll!RtlpNtMakeTemporaryKey+0x23d1 000330bc 7c96c9e5 ntdll!RtlpNtMakeTemporaryKey+0x3754 00033118 7c96fb16 ntdll!RtlpNtMakeTemporaryKey+0x42e9 0003319c 7c94b244 ntdll!RtlpNtMakeTemporaryKey+0x741a 000333cc 7c919c0c ntdll!LdrAlternateResourcesEnabled+0x2b05 00033600 0036fd2c ntdll!RtlpUnWaitCriticalSection+0xad 00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap(void * HeapHandle = 0x02a10000, unsigned long Flags = 0, unsigned long Size = 0x80)+0xb1 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 234] 000336b0 77c2c3e7 MSVCRT!free+0x1ae 000336bc 77c2c42e MSVCRT!free+0x1cc 000336cc 77c2c454 MSVCRT!malloc+0x27 00033718 00370814 MSVCRT!realloc+0x1d 00033738 023d0a18 vfbasics!AVrfp_realloc(void * Address = 0x00000000, unsigned long Size = 0x80)+0x92 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 1051] 00000000 00000000 byondcore!BagItem::~BagItem+0xaa8 |
I've only been copying a part of the watson .log file. If you want it all, I can do that.
|
Realized I forgot to symfix before getting the callstack.
0:000> k ChildEBP RetAddr 0003302c 7c96be50 ntdll!RtlpDphVmLimitCanUsePageHeap+0xb 000330bc 7c96c9e5 ntdll!RtlpDphShouldAllocateInPageHeap+0x37 00033118 7c96fb16 ntdll!RtlpDebugPageHeapAllocate+0xac 0003319c 7c94b244 ntdll!RtlDebugAllocateHeap+0x2d 000333cc 7c919c0c ntdll!RtlAllocateHeapSlowly+0x44 00033600 0036fd2c ntdll!RtlAllocateHeap+0xe64 00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap+0xb1 000336b0 77c2c3e7 MSVCRT!_heap_alloc+0xe0 000336bc 77c2c42e MSVCRT!_nh_malloc+0x13 000336cc 77c2c454 MSVCRT!malloc+0x27 00033718 00370814 MSVCRT!realloc+0x1d *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - 00033738 023d0a18 vfbasics!AVrfp_realloc+0x92 WARNING: Stack unwind information not available. Following frames may be wrong. 00000000 00000000 byondcore!BagItem::~BagItem+0xaa8 |
You should have a different date for the different crashes, so the full info from the most recent would be helpful. I took a look at what you have so far and while I see there is a realloc() call, that shouldn't be crashing. The fact that it is strikes me as very weird. I think the critical part here is that it mentions the exception is a stack overflow. If I have the full text of the most recent crash I can take a better look, or you can email that to me.
|
Microsoft (R) DrWtsn32 Copyright (C) 1985-2001 Microsoft Corp. All rights reserved. Application exception occurred: App: I:\Program Files\BYOND\bin\dreamdaemon.exe (pid=2448) When: 3/31/2011 @ 21:30:57.600 Exception number: 80000003 (hardcoded breakpoint) *----> System Information <----* Computer Name: TSFREAKS User Name: Administrator Terminal Session Id: 0 Number of Processors: 2 Processor Type: x86 Family 6 Model 15 Stepping 13 Windows Version: 5.1 Current Build: 2600 Service Pack: 3 Current Type: Multiprocessor Free Registered Organization: Registered Owner: tsfreaks *----> Task List <----* 0 System Process 4 System 1376 smss.exe 1532 csrss.exe 1560 winlogon.exe 1604 services.exe 1616 lsass.exe 1780 nvsvc32.exe 1872 svchost.exe 1924 svchost.exe 428 MsMpEng.exe 484 svchost.exe 608 svchost.exe 1040 svchost.exe 1296 spoolsv.exe 1364 CTAudSvc.exe 116 SCardSvr.exe 2032 Explorer.EXE 304 svchost.exe 344 AppleMobileDeviceService.exe 552 mDNSResponder.exe 956 jqs.exe 1004 LinksysUpdater.exe 1052 McSvHost.exe 1732 mfevtps.exe 1976 MotoHelperService.exe 336 MSASCui.exe 392 MSCamS32.exe 652 googletalk.exe 568 java.exe 600 jusched.exe 668 iTunesHelper.exe 756 sqlservr.exe 780 ctfmon.exe 812 MotoHelperAgent.exe 788 byond.exe 1172 nSvcLog.exe 1472 Dropbox.exe 1516 nTuneService.exe 1684 PnkBstrA.exe 2068 PnkBstrB.exe 2156 PSIService.exe 2368 SeaPort.exe 2512 sqlbrowser.exe 2544 svchost.exe 2640 mcshield.exe 2848 mfefire.exe 2892 nmsrvc.exe 1084 iPodService.exe 2700 alg.exe 3920 TSVNCache.exe 6444 eclipse.exe 5740 adb.exe 5892 steam.exe 2448 dreamdaemon.exe 2136 dreamseeker.exe 7664 WPFFontCache_v0400.exe 5688 inetinfo.exe 7612 firefox.exe 4648 plugin-container.exe 1752 googletalkplugin.exe 7704 mcagent.exe 7828 wmiprvse.exe 3252 drwtsn32.exe *----> Module List <----* (0000000000360000 - 000000000039c000: I:\WINDOWS\System32\vfbasics.dll (0000000000400000 - 0000000000435000: I:\Program Files\BYOND\bin\dreamdaemon.exe (0000000002160000 - 00000000022cb000: I:\Program Files\BYOND\bin\byondwin.dll (00000000022d0000 - 0000000002497000: I:\Program Files\BYOND\bin\byondcore.dll (00000000024a0000 - 00000000024e6000: I:\Program Files\BYOND\bin\byondext.dll (00000000024f0000 - 0000000002501000: I:\WINDOWS\system32\MSVCIRT.dll (0000000010000000 - 0000000010029000: I:\WINDOWS\System32\vrfcore.dll (000000005ad10000 - 000000005ad59000: I:\WINDOWS\System32\verifier.dll (000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll (000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll (0000000064000000 - 0000000064025000: I:\Program Files\Bonjour\mdnsNSP.dll (00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll (0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll (0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll (0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll (0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll (0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll (00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL (0000000073dd0000 - 0000000073ec1000: I:\WINDOWS\system32\MFC42.DLL (0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll (0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll (00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime (0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll (0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL (00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll (0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll (0000000076d60000 - 0000000076d79000: I:\WINDOWS\system32\Iphlpapi.dll (0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll (0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll (0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll (0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll (0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll (00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll (00000000774e0000 - 000000007761e000: I:\WINDOWS\system32\ole32.dll (0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll (0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll (0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll (0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll (0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll (0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll (0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll (0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll (000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll (000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll (000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll (000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll *----> State Dump for Thread Id 0x1750 <----* eax=1000e848 ebx=1000d088 ecx=00000001 edx=000001ca esi=00000000 edi=1000e848 eip=7c90120e esp=0012e180 ebp=0012e384 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\ntdll.dll - function: ntdll!DbgBreakPoint 7c9011e6 64a118000000 mov eax,fs:[00000018] 7c9011ec 803d94e0977c00 cmp byte ptr [ntdll!fltused+0x4c (7c97e094)],0x0 7c9011f3 8b7508 mov esi,[ebp+0x8] 7c9011f6 8945fc mov [ebp-0x4],eax 7c9011f9 0f85f7ec0000 jne ntdll!RtlInitUnicodeStringEx+0x61 (7c90fef6) 7c9011ff f6461010 test byte ptr [esi+0x10],0x10 7c901203 0f84edec0000 je ntdll!RtlInitUnicodeStringEx+0x61 (7c90fef6) 7c901209 5e pop esi 7c90120a c9 leave 7c90120b c20400 ret 0x4 FAULT ->ntdll!DbgBreakPoint: 7c90120e cc int 3 7c90120f c3 ret 7c901210 8bff mov edi,edi ntdll!DbgUserBreakPoint: 7c901212 cc int 3 7c901213 c3 ret 7c901214 8bff mov edi,edi 7c901216 8b442404 mov eax,[esp+0x4] 7c90121a cc int 3 7c90121b c20400 ret 0x4 ntdll!NtCurrentTeb: *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - ChildEBP RetAddr Args to Child 0012e384 100078c9 1000c540 00000013 00000024 ntdll!DbgBreakPoint 0012e3a8 00366262 00000013 00361b5c 00000024 vrfcore!VfCoreRedirectedStopMessage+0x81 0012e3d8 00366af1 00000013 00361b5c 00000024 vfbasics!VerifierStopMessage+0x292 0012e430 00367316 0012e45c 7c97e3e0 01feeff0 vfbasics!AVrfpCheckFirstChanceException+0xc8 0012e444 7c944308 0012e45c 0012e4f4 0012e4f4 vfbasics!AVrfpVectoredExceptionHandler+0x16 0012e464 7c92a83d 0012e4f4 0012e510 0012e0e0 ntdll!RtlDeleteAce+0xc36f 0012e4dc 7c90e48a 0012e4f4 0012e510 0012e4f4 ntdll!wcstol+0xb6 0012e880 023a859e 023a8505 00000001 00000003 ntdll!KiUserExceptionDispatcher+0xe 00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e *----> Raw Stack Dump <----* 000000000012e180 68 3b 00 10 e4 34 12 10 - 24 00 00 00 f4 e4 12 00 h;...4..$....... 000000000012e190 5c e4 12 00 b8 e1 12 00 - 00 00 00 00 00 00 00 00 \............... 000000000012e1a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000012e1b0 00 00 00 00 ff ff ff ff - 00 00 00 00 89 8e 36 02 ..............6. 000000000012e1c0 ec e1 12 02 18 e2 12 00 - 3c e7 12 00 00 00 00 00 ........<....... 000000000012e1d0 18 e2 12 00 03 00 00 00 - 07 00 00 00 00 00 00 00 ................ 000000000012e1e0 00 00 00 00 e1 9a 36 02 - 07 00 00 00 48 c8 36 02 ......6.....H.6. 000000000012e1f0 00 00 00 00 90 c8 36 02 - 00 00 00 00 10 e7 12 00 ......6......... 000000000012e200 00 00 00 00 02 00 00 00 - dc e6 12 00 00 00 00 00 ................ 000000000012e210 00 00 00 00 b0 6f 41 07 - 02 00 00 00 c7 87 36 02 .....oA.......6. 000000000012e220 e8 02 db 0b 17 01 00 00 - 06 00 00 00 01 00 00 00 ................ 000000000012e230 66 87 36 02 12 00 00 00 - 06 00 00 00 01 00 00 00 f.6............. 000000000012e240 06 00 00 00 b0 6f 41 07 - a4 64 43 02 03 00 00 00 .....oA..dC..... 000000000012e250 07 00 00 00 03 00 00 00 - 07 00 00 00 70 e8 12 00 ............p... 000000000012e260 00 00 00 00 00 00 00 00 - d0 e6 12 00 f0 eb 42 02 ..............B. 000000000012e270 e3 c2 c2 77 e3 c2 c2 77 - 3c e7 12 00 1b c2 c2 77 ...w...w<......w 000000000012e280 16 00 00 00 06 00 00 00 - e3 c2 c2 77 00 00 00 00 ...........w.... 000000000012e290 74 e2 12 00 78 e2 12 00 - 16 00 00 00 02 00 00 00 t...x........... 000000000012e2a0 bc e2 12 00 9f 08 37 00 - 00 00 00 00 02 00 00 00 ......7......... 000000000012e2b0 c9 b0 38 02 00 00 00 00 - 10 e7 12 00 dc e6 12 00 ..8............. *----> State Dump for Thread Id 0x1050 <----* eax=c0c0c0c0 ebx=71ac40b4 ecx=00000004 edx=00000011 esi=0000000c edi=00000000 eip=7c90e514 esp=04d9fec0 ebp=04d9fed4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\kernel32.dll - WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\WS2_32.dll - ChildEBP RetAddr Args to Child 04d9fed4 7c8025db 0000000c 00000000 00000000 ntdll!KiFastSystemCallRet 04d9ff38 7c802542 0000000c ffffffff 00000000 kernel32!WaitForSingleObjectEx+0x8b 04d9ff4c 003710ed 0000000c ffffffff 02b68fc0 kernel32!WaitForSingleObject+0x12 04d9ff60 71abd18c 0000000c ffffffff 7c969fa2 vfbasics!AVrfpWaitForSingleObject+0x9f 04d9ff7c 003742f7 0000000c 04ee9440 7c969fa2 WS2_32!getnameinfo+0xb03 04d9ffb4 7c80b729 03258fe0 7c969fa2 0341b000 vfbasics!AVrfpStandardThreadFunction+0x2f 04d9ffec 00000000 003742c8 03258fe0 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 0000000004d9fec0 5a df 90 7c 79 13 37 00 - 0c 00 00 00 00 00 00 00 Z..|y.7......... 0000000004d9fed0 00 00 00 00 38 ff d9 04 - db 25 80 7c 0c 00 00 00 ....8....%.|.... 0000000004d9fee0 00 00 00 00 00 00 00 00 - e8 2f b9 02 30 25 80 7c ........./..0%.| 0000000004d9fef0 b4 40 ac 71 14 00 00 00 - 01 00 00 00 00 00 00 00 [email protected]............ 0000000004d9ff00 00 00 00 00 10 00 00 00 - 00 00 00 00 18 ff 36 00 ..............6. 0000000004d9ff10 00 e0 fd 7f 00 c0 fd 7f - 00 00 00 00 01 00 00 00 ................ 0000000004d9ff20 e8 fe d9 04 3a 00 00 00 - a4 ff d9 04 d8 9a 83 7c ....:..........| 0000000004d9ff30 08 26 80 7c 00 00 00 00 - 4c ff d9 04 42 25 80 7c .&.|....L...B%.| 0000000004d9ff40 0c 00 00 00 ff ff ff ff - 00 00 00 00 60 ff d9 04 ............`... 0000000004d9ff50 ed 10 37 00 0c 00 00 00 - ff ff ff ff c0 8f b6 02 ..7............. 0000000004d9ff60 7c ff d9 04 8c d1 ab 71 - 0c 00 00 00 ff ff ff ff |......q........ 0000000004d9ff70 a2 9f 96 7c e0 8f 25 03 - e0 8f 25 03 b4 ff d9 04 ...|..%...%..... 0000000004d9ff80 f7 42 37 00 0c 00 00 00 - 40 94 ee 04 a2 9f 96 7c .B7.....@......| 0000000004d9ff90 00 b0 41 03 e0 8f 25 03 - 00 00 00 00 88 ff d9 04 ..A...%......... 0000000004d9ffa0 00 00 00 00 dc ff d9 04 - b0 46 37 00 04 3b 00 00 .........F7..;.. 0000000004d9ffb0 00 00 00 00 ec ff d9 04 - 29 b7 80 7c e0 8f 25 03 ........)..|..%. 0000000004d9ffc0 a2 9f 96 7c 00 b0 41 03 - e0 8f 25 03 00 c0 fd 7f ...|..A...%..... 0000000004d9ffd0 00 16 9b 8b c0 ff d9 04 - 28 a6 d3 89 ff ff ff ff ........(....... 0000000004d9ffe0 d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00 ...|0..|........ 0000000004d9fff0 00 00 00 00 c8 42 37 00 - e0 8f 25 03 00 00 00 00 .....B7...%..... *----> State Dump for Thread Id 0x1480 <----* eax=05232fd0 ebx=c0000000 ecx=00000002 edx=04e4cfc0 esi=00000000 edi=71a8793c eip=7c90e514 esp=0567ff1c ebp=0567ff44 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\System32\mswsock.dll - WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0567ff44 71a5d320 00000250 0567ff84 0567ff78 ntdll!KiFastSystemCallRet 0567ff7c 003742f7 71a67b03 05509440 7c969fa2 mswsock!WSPStartup+0x1085 0567ffb4 7c80b729 05230fe0 7c969fa2 054ae000 vfbasics!AVrfpStandardThreadFunction+0x2f 0567ffec 00000000 003742c8 05230fe0 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 000000000567ff1c 4a da 90 7c cb 82 36 00 - 50 02 00 00 84 ff 67 05 J..|..6.P.....g. 000000000567ff2c 40 ff 67 05 6c ff 67 05 - 68 d3 a5 71 02 01 00 00 @.g.l.g.h..q.... 000000000567ff3c 00 00 00 00 00 00 00 00 - 7c ff 67 05 20 d3 a5 71 ........|.g. ..q 000000000567ff4c 50 02 00 00 84 ff 67 05 - 78 ff 67 05 6c ff 67 05 P.....g.x.g.l.g. 000000000567ff5c 68 d3 a5 71 a2 9f 96 7c - e0 0f 23 05 e0 0f 23 05 h..q...|..#...#. 000000000567ff6c 00 00 00 00 1c 00 00 00 - 00 00 a5 71 00 00 00 00 ...........q.... 000000000567ff7c b4 ff 67 05 f7 42 37 00 - 03 7b a6 71 40 94 50 05 ..g..B7..{[email protected]. 000000000567ff8c a2 9f 96 7c 00 e0 4a 05 - e0 0f 23 05 00 00 00 00 ...|..J...#..... 000000000567ff9c 88 ff 67 05 00 00 00 00 - dc ff 67 05 b0 46 37 00 ..g.......g..F7. 000000000567ffac 04 3b 00 00 00 00 00 00 - ec ff 67 05 29 b7 80 7c .;........g.)..| 000000000567ffbc e0 0f 23 05 a2 9f 96 7c - 00 e0 4a 05 e0 0f 23 05 ..#....|..J...#. 000000000567ffcc 00 b0 fd 7f 00 16 9b 8b - c0 ff 67 05 90 a2 49 89 ..........g...I. 000000000567ffdc ff ff ff ff d8 9a 83 7c - 30 b7 80 7c 00 00 00 00 .......|0..|.... 000000000567ffec 00 00 00 00 00 00 00 00 - c8 42 37 00 e0 0f 23 05 .........B7...#. 000000000567fffc 00 00 00 00 08 00 00 00 - 00 20 00 00 00 00 00 00 ......... ...... 000000000568000c ff ff ff ff 40 1f 00 00 - 01 00 00 00 00 00 00 00 ....@........... 000000000568001c 00 00 00 00 00 00 00 00 - 00 00 00 00 58 00 00 00 ............X... 000000000568002c 58 00 00 00 a0 e1 db 57 - 25 de d2 11 af dd 00 10 X......W%....... 000000000568003c 5a 27 99 b5 03 00 00 00 - 01 00 00 00 00 00 00 00 Z'.............. 000000000568004c 50 17 00 00 90 09 00 00 - b9 04 00 00 d6 c9 c6 1d P............... |
Quickly hit a crash when stopping the project (Usually it silently dies)
eax=004fb722 ebx=00001884 ecx=73dd3f47 edx=00000000 esi=0012e0e0 edi=005ea30c
eip=004fb652 esp=0012e838 ebp=00000000 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
function: byondcore!DungServer__GetHostingFlags
004fb636 f5 cmc
004fb637 7426 jz byondcore!DungServer__GetHostingFlags+0x2a62f (004fb65f)
004fb639 bf0ca35e00 mov edi,0x5ea30c
004fb63e 6a22 push 0x22
004fb640 55 push ebp
004fb641 897e10 mov [esi+0x10],edi
004fb644 66896e0c mov [esi+0xc],bp
004fb648 e843310500 call byondcore!TimeLib__operator=+0x3a40 (0054e790)
004fb64d 8b0e mov ecx,[esi]
004fb64f 83c408 add esp,0x8
FAULT ->004fb652 89410c mov [ecx+0xc],eax ds:0023:73dd3f53=0c458bf8
004fb655 895110 mov [ecx+0x10],edx
004fb658 8b7604 mov esi,[esi+0x4]
004fb65b 3bf5 cmp esi,ebp
004fb65d 75df jnz byondcore!DungServer__GetHostingFlags+0x2a60e (004fb63e)
004fb65f 33f6 xor esi,esi
004fb661 66392deca05e00 cmp [byondcore!`string'+0x11284 (005ea0ec)],bp
004fb668 7619 jbe byondcore!DungServer__GetHostingFlags+0x2a653 (004fb683)
004fb66a 56 push esi
004fb66b e8c021feff call byondcore!DungServer__GetHostingFlags+0xc800 (004dd830)
004fb670 50 push eax
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00000000 00000000 00000000 00000000 00000000 byondcore!DungServer__GetHostingFlags+0x2a622
*----> Raw Stack Dump <----*
000000000012e838 00 00 00 00 1b c2 c2 77 - 88 e8 12 00 99 c4 53 00 .......w......S.
000000000012e848 08 00 d2 01 14 f2 12 00 - 14 f2 12 00 01 00 00 00 ................
000000000012e858 a9 d6 53 00 14 f2 12 00 - 49 37 41 00 10 ee 41 00 ..S.....I7A...A.
000000000012e868 a0 e9 12 00 38 c7 41 00 - ff ff ff ff a7 37 41 00 ....8.A......7A.
000000000012e878 01 00 00 00 e0 23 dd 73 - 10 ee 41 00 11 01 00 00 .....#.s..A.....
000000000012e888 b8 e8 12 00 f2 22 dd 73 - 14 f2 12 00 ec 03 00 00 .....".s........
000000000012e898 00 00 00 00 a0 37 41 00 - 00 00 00 00 0c 00 00 00 .....7A.........
000000000012e8a8 00 00 00 00 14 f2 12 00 - ec 03 00 00 00 00 00 00 ................
000000000012e8b8 dc e8 12 00 11 91 de 73 - ec 03 00 00 00 00 00 00 .......s........
000000000012e8c8 00 00 00 00 00 00 00 00 - ec 03 00 00 14 f2 12 00 ................
000000000012e8d8 00 00 00 00 2c e9 12 00 - 69 30 dd 73 ec 03 00 00 ....,...i0.s....
000000000012e8e8 00 00 00 00 00 00 00 00 - 00 00 00 00 14 f2 12 00 ................
000000000012e8f8 14 f2 12 00 11 01 00 00 - a9 df e5 73 f4 e9 12 00 ...........s....
000000000012e908 8f 04 44 7e 30 88 41 7e - ff ff ff ff 2a 88 41 7e ..D~0.A~....*.A~
000000000012e918 13 a0 42 7e 00 00 00 00 - 36 b0 43 7e 7e 06 01 00 ..B~....6.C~~...
000000000012e928 15 02 00 00 ac e9 12 00 - 58 1b dd 73 00 00 00 00 ........X..s....
000000000012e938 7e 06 01 00 14 f2 12 00 - 14 f2 12 00 58 58 14 00 ~...........XX..
000000000012e948 98 a9 42 7e 36 b0 43 7e - 7e 06 01 00 15 02 00 00 ..B~6.C~~.......
000000000012e958 00 00 00 00 00 00 00 00 - 01 00 00 00 84 e9 12 00 ................
000000000012e968 cb 20 dd 73 36 b0 43 7e - 7e 06 01 00 15 02 00 00 . .s6.C~~.......