Just added 300+ debug statements to every function in my project.

Quickly hit a crash when stopping the project (Usually it silently dies)
eax=004fb722 ebx=00001884 ecx=73dd3f47 edx=00000000 esi=0012e0e0 edi=005ea30c
eip=004fb652 esp=0012e838 ebp=00000000 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
function: byondcore!DungServer__GetHostingFlags
004fb636 f5 cmc
004fb637 7426 jz byondcore!DungServer__GetHostingFlags+0x2a62f (004fb65f)
004fb639 bf0ca35e00 mov edi,0x5ea30c
004fb63e 6a22 push 0x22
004fb640 55 push ebp
004fb641 897e10 mov [esi+0x10],edi
004fb644 66896e0c mov [esi+0xc],bp
004fb648 e843310500 call byondcore!TimeLib__operator=+0x3a40 (0054e790)
004fb64d 8b0e mov ecx,[esi]
004fb64f 83c408 add esp,0x8
FAULT ->004fb652 89410c mov [ecx+0xc],eax ds:0023:73dd3f53=0c458bf8
004fb655 895110 mov [ecx+0x10],edx
004fb658 8b7604 mov esi,[esi+0x4]
004fb65b 3bf5 cmp esi,ebp
004fb65d 75df jnz byondcore!DungServer__GetHostingFlags+0x2a60e (004fb63e)
004fb65f 33f6 xor esi,esi
004fb661 66392deca05e00 cmp [byondcore!`string'+0x11284 (005ea0ec)],bp
004fb668 7619 jbe byondcore!DungServer__GetHostingFlags+0x2a653 (004fb683)
004fb66a 56 push esi
004fb66b e8c021feff call byondcore!DungServer__GetHostingFlags+0xc800 (004dd830)
004fb670 50 push eax

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00000000 00000000 00000000 00000000 00000000 byondcore!DungServer__GetHostingFlags+0x2a622

*----> Raw Stack Dump <----*
000000000012e838 00 00 00 00 1b c2 c2 77 - 88 e8 12 00 99 c4 53 00 .......w......S.
000000000012e848 08 00 d2 01 14 f2 12 00 - 14 f2 12 00 01 00 00 00 ................
000000000012e858 a9 d6 53 00 14 f2 12 00 - 49 37 41 00 10 ee 41 00 ..S.....I7A...A.
000000000012e868 a0 e9 12 00 38 c7 41 00 - ff ff ff ff a7 37 41 00 ....8.A......7A.
000000000012e878 01 00 00 00 e0 23 dd 73 - 10 ee 41 00 11 01 00 00 .....#.s..A.....
000000000012e888 b8 e8 12 00 f2 22 dd 73 - 14 f2 12 00 ec 03 00 00 .....".s........
000000000012e898 00 00 00 00 a0 37 41 00 - 00 00 00 00 0c 00 00 00 .....7A.........
000000000012e8a8 00 00 00 00 14 f2 12 00 - ec 03 00 00 00 00 00 00 ................
000000000012e8b8 dc e8 12 00 11 91 de 73 - ec 03 00 00 00 00 00 00 .......s........
000000000012e8c8 00 00 00 00 00 00 00 00 - ec 03 00 00 14 f2 12 00 ................
000000000012e8d8 00 00 00 00 2c e9 12 00 - 69 30 dd 73 ec 03 00 00 ....,...i0.s....
000000000012e8e8 00 00 00 00 00 00 00 00 - 00 00 00 00 14 f2 12 00 ................
000000000012e8f8 14 f2 12 00 11 01 00 00 - a9 df e5 73 f4 e9 12 00 ...........s....
000000000012e908 8f 04 44 7e 30 88 41 7e - ff ff ff ff 2a 88 41 7e ..D~0.A~....*.A~
000000000012e918 13 a0 42 7e 00 00 00 00 - 36 b0 43 7e 7e 06 01 00 ..B~....6.C~~...
000000000012e928 15 02 00 00 ac e9 12 00 - 58 1b dd 73 00 00 00 00 ........X..s....
000000000012e938 7e 06 01 00 14 f2 12 00 - 14 f2 12 00 58 58 14 00 ~...........XX..
000000000012e948 98 a9 42 7e 36 b0 43 7e - 7e 06 01 00 15 02 00 00 ..B~6.C~~.......
000000000012e958 00 00 00 00 00 00 00 00 - 01 00 00 00 84 e9 12 00 ................
000000000012e968 cb 20 dd 73 36 b0 43 7e - 7e 06 01 00 15 02 00 00 . .s6.C~~.......
Looks like that crash is in a new place so hopefully I can figure that out. I can tell you that CreatePathTo() is almost certainly not involved; if you'll note the offset it's over 15K away, so that's just Dr. Watson's best guess at giving the function a name.
So, my debug spew lead me to the Logout() for the last two crashes. I remarked questionable stuff and narrowed it down to two things with one being the likely cause. This is the last thing called in Logout(). After remarking this, I haven't crashed in last 12+ hours.

    del(src);
Crashed again. This time after many hours and it wasn't near Logout() this time.

*----> State Dump for Thread Id 0x1108 <----*

eax=00000000 ebx=00000000 ecx=00ce6300 edx=00000004 esi=0012dd84 edi=ffffffff
eip=004fcfc9 esp=0012e7dc ebp=0012e880 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
function: byondcore!DungServer__GetHostingFlags
004fcfbb 90 nop
004fcfbc 90 nop
004fcfbd 90 nop
004fcfbe 90 nop
004fcfbf 90 nop
004fcfc0 53 push ebx
004fcfc1 56 push esi
004fcfc2 8b74240c mov esi,[esp+0xc]
004fcfc6 57 push edi
004fcfc7 8b06 mov eax,[esi]
FAULT ->004fcfc9 8b7824 mov edi,[eax+0x24] ds:0023:00000024=????????
004fcfcc 8bcf mov ecx,edi
004fcfce 4f dec edi
004fcfcf 85c9 test ecx,ecx
004fcfd1 7419 jz byondcore!DungServer__GetHostingFlags+0x2bfbc (004fcfec)
004fcfd3 8b16 mov edx,[esi]
004fcfd5 8b4228 mov eax,[edx+0x28]
004fcfd8 8d0cf8 lea ecx,[eax+edi*8]
004fcfdb 51 push ecx
004fcfdc ff15c09e5e00 call dword ptr [byondcore!`string'+0x11058 (005e9ec0)]
004fcfe2 83c404 add esp,0x4

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0012e880 0051859e 77c35c05 00000004 00000001 byondcore!DungServer__GetHostingFlags+0x2bf99
00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e

*----> Raw Stack Dump <----*
000000000012e7dc 00 00 00 00 00 00 00 00 - ff ff ff ff e5 c5 4f 00 ..............O.
000000000012e7ec c8 ba 1d 03 04 00 00 00 - 05 5c c3 77 80 e8 12 00 .........\.w....
000000000012e7fc 05 5c c3 77 05 5c c3 77 - 04 00 00 00 23 bd 4f 00 .\.w.\.w....#.O.
000000000012e80c 20 b9 4f 00 40 41 4c 00 - 08 00 00 00 08 40 29 03 .O.@AL......@).
000000000012e81c 01 00 00 00 04 00 00 00 - 80 e8 12 00 05 5c c3 77 .............\.w
000000000012e82c 08 40 29 03 04 00 00 00 - 0c e8 12 00 a3 bc 4f 00 .@)...........O.
000000000012e83c ec ec 12 00 bd ff 50 00 - 30 32 43 56 00 00 00 00 ......P.02CV....
000000000012e84c 5d 00 91 7c de c2 c2 77 - 00 00 3c 00 00 00 00 00 ]..|...w..<.....
000000000012e85c e3 c2 c2 77 08 40 29 03 - 03 00 00 00 1d 00 00 00 ...w.@).........
000000000012e86c ff ff ff ff 40 41 4c 00 - 20 b9 4f 00 7c e8 12 00 ....@AL. .O.|...
000000000012e87c 09 00 00 00 00 00 00 00 - 9e 85 51 00 05 5c c3 77 ..........Q..\.w
000000000012e88c 04 00 00 00 01 00 00 00 - 04 00 00 00 05 00 00 00 ................
000000000012e89c 08 40 29 03 80 89 d5 01 - 04 00 00 00 01 00 d5 01 .@).............
000000000012e8ac e0 bb 51 00 04 00 00 00 - c0 e8 12 00 04 00 00 00 ..Q.............
000000000012e8bc 18 89 d5 01 00 00 00 00 - 03 00 00 00 00 04 00 00 ................
000000000012e8cc 00 00 00 00 dc e8 12 00 - 00 00 00 00 00 00 00 03 ................
000000000012e8dc 44 44 00 00 01 00 00 00 - 00 00 00 00 48 c8 4d 00 DD..........H.M.
000000000012e8ec 00 00 00 00 90 c8 4d 00 - 05 00 00 00 00 00 00 00 ......M.........
000000000012e8fc 07 00 00 00 16 00 00 00 - f0 39 ce 00 00 00 00 00 .........9......
000000000012e90c 00 00 00 00 36 e7 cb 01 - 07 00 00 00 07 00 00 00 ....6...........
The server consistently crashes with del(src) in Logout().

I found that without del(src) in Logout(), I have an infinite timer loop the continues to run even though the user is no longer logged in. I started wondering if my infinite loop designs are designed poorly and possibly leading to the random crashes which occur after longer run times.

I posted both of my infinite loop designs on the Code Problems forum to solicit some feedback in case I'm doing something wrong.
That's interesting. The spawn() should be deleting properly even when you're deleting the mob.

I would in the meantime recommend trying a while(src) loop with a sleep(). Although sleep() and spawn() use the same system, I believe there may be an internal difference in the way this is handled that could be setting the issue up. I know to sleep() or spawn() a proc we basically make a copy of it, but the spawned version could perhaps be gaining a longer call stack.
I rewrote the function and its still crashing. It's been weeks and my project has been offline pretty much the whole time and development halted and spirits diminished. Can we take proper steps to address this issue now? I can be trusted to handle .pdb files and the rate at which I happen upon crashing issues would almost justify at least some investment in me. What would it take? I would gladly hand over most any project except this one is a significant pain to "share" as you already know.
As I recall the only way we were able to progress on your previous issue was for people to use Microsoft's Application Verifier (it should also be on the XP installation CDs if you have those handy), attach it to a running Dream Daemon process, and turn on full page heap checking. I recommend giving that a try.
With no options selected in Appverifier, I hit a crash. I recall something like this last time, trying to find out what it was but I thought I just needed to uncheck something.


-
-
-
Access violation exception.
6559fa0 - Invalid address causing the exception
771248a4 - Code address executing the invalid access
12d138 - Exception record
12d154 - Context record
-
vrfcore!VfCoreRedirectedStopMessage+81 (d:\avrf\source\base\avrf\avrf30\vrfcore\stopredirect.cpp @ 103)
kernel32!UnhandledExceptionFilter+f9 ( @ 0)
kernel32!ValidateLocale+a0d2 ( @ 0)



I can't run Application Verifier without crashing right when I start hosting any .dmb with "Exceptions", "Handles", and/or "heap" checked.

Don't know what's useful here if anything.


-
-
-
Corrupted heap block.
141000 - Heap handle used in the call.
331c10 - Heap block involved in the operation.
60 - Size of the heap block.
0 - Reserved
-
vrfcore!VfCoreRedirectedStopMessage+81 (d:\avrf\source\base\avrf\avrf30\vrfcore\stopredirect.cpp @ 103)
ntdll!RtlpNtMakeTemporaryKey+38c2 ( @ 0)
ntdll!RtlpNtMakeTemporaryKey+4a4b ( @ 0)
ntdll!RtlpNtMakeTemporaryKey+4c4e ( @ 0)
ntdll!RtlpNtMakeTemporaryKey+7cef ( @ 0)
ntdll!LdrAlternateResourcesEnabled+33bd ( @ 0)
ntdll!RtlpUnWaitCriticalSection+65b ( @ 0)
vfbasics!AVrfpRtlFreeHeap+f8 (d:\avrf\source\base\avrf\vrfcommon\heap.c @ 385)
ole32!ComPs_NdrDllCanUnloadNow+db ( @ 0)
OLEAUT32!VarDecCmp+64c1 ( @ 0)
OLEAUT32!SysFreeString+35 ( @ 0)
nvappfilter!+36a2fad ( @ 0)



Your output there looks very strange, like it's once again not running through Dr. Watson. Can you confirm that? I have also read that running with confused permissions can also trigger some issues in AppVerifier, so be sure you're running as an administrator.

Beyond that all I can suggest is to try to get better output than whatever that is. Dr. Watson should be reporting much more info than that, and should show the crash traced all the way back into the BYOND app. Incidentally when you get that info, it is really crucial for you to specify in any crash details which version you're running.
Another note here: You have another app conflicting with this test. The nvappfilter in your output corresponds to an NVidia firewall which is known to be unstable and have problems with certain programs. There's some information about it here:

http://forums.nvidia.com/index.php?showtopic=21455
http://www.dll-error-fixes.com/ disableremoveuninstall-nvappfilterdll-module/

Based on what I'm seeing I think you're going to have to figure out a way to disable or uninstall their network monitoring in order to get a proper test. I'd look around to make sure you're pulling the right things first, but overall this appears to be in the way. In fact for all I know it could be causing your crashes in the first place.
Ah. I found out how to uninstall the proxy and ran the RC (without appverif) for a while and it still crashed after a few hours.

I just hooked up AppVerif and it works without crashing so I should have some more data tomorrow.

Build: 479.1086

WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
ChildEBP RetAddr Args to Child
0012e384 100078c9 1000c540 00000013 00000024 ntdll!DbgBreakPoint
0012e3a8 00366262 00000013 00361b5c 00000024 vrfcore!VfCoreRedirectedStopMessage+0x81
0012e3d8 00366af1 00000013 00361b5c 00000024 vfbasics!VerifierStopMessage+0x292
0012e430 00367316 0012e45c 7c97e3e0 02014ff0 vfbasics!AVrfpCheckFirstChanceException+0xc8
0012e444 7c944308 0012e45c 0012e4f4 0012e4f4 vfbasics!AVrfpVectoredExceptionHandler+0x16
0012e464 7c92a83d 0012e4f4 0012e510 0012e0e0 ntdll!RtlDeleteAce+0xc36f
0012e4dc 7c90e48a 0012e4f4 0012e510 0012e4f4 ntdll!wcstol+0xb6
0012e880 023a859e 023a8505 00000001 00000001 ntdll!KiUserExceptionDispatcher+0xe
00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e

*----> Raw Stack Dump <----*
000000000012e180 68 3b 00 10 e4 34 12 10 - 24 00 00 00 f4 e4 12 00 h;...4..$.......
000000000012e190 5c e4 12 00 b8 e1 12 00 - 00 00 00 00 00 00 00 00 \...............
000000000012e1a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012e1b0 00 00 00 00 ff ff ff ff - 00 00 00 00 89 8e 36 02 ..............6.
000000000012e1c0 ec e1 12 02 18 e2 12 00 - 3c e7 12 00 00 00 00 00 ........<.......
000000000012e1d0 18 e2 12 00 03 00 00 00 - 04 00 00 00 00 00 00 00 ................
000000000012e1e0 00 00 00 00 e1 9a 36 02 - 04 00 00 00 48 c8 36 02 ......6.....H.6.
000000000012e1f0 00 00 00 00 90 c8 36 02 - 00 00 00 00 10 e7 12 00 ......6.........
000000000012e200 00 00 00 00 02 00 00 00 - dc e6 12 00 00 00 00 00 ................
000000000012e210 00 00 00 00 b0 2f b5 17 - 02 00 00 00 c7 87 36 02 ...../........6.
000000000012e220 e8 62 4c 12 17 01 00 00 - 06 00 00 00 01 00 00 00 .bL.............
000000000012e230 66 87 36 02 12 00 00 00 - 06 00 00 00 01 00 00 00 f.6.............
000000000012e240 06 00 00 00 b0 2f b5 17 - a4 64 43 02 03 00 00 00 ...../...dC.....
000000000012e250 04 00 00 00 03 00 00 00 - 04 00 00 00 70 e8 12 00 ............p...
000000000012e260 00 00 00 00 00 00 00 00 - d0 e6 12 00 f0 eb 42 02 ..............B.
000000000012e270 e3 c2 c2 77 e3 c2 c2 77 - 3c e7 12 00 1b c2 c2 77 ...w...w<......w
000000000012e280 16 00 00 00 06 00 00 00 - e3 c2 c2 77 00 00 00 00 ...........w....
000000000012e290 74 e2 12 00 78 e2 12 00 - 16 00 00 00 02 00 00 00 t...x...........
000000000012e2a0 bc e2 12 00 9f 08 37 00 - 00 00 00 00 02 00 00 00 ......7.........
000000000012e2b0 c9 b0 38 02 00 00 00 00 - 10 e7 12 00 dc e6 12 00 ..8.............

*----> State Dump for Thread Id 0x3d8 <----*

eax=02b40fc0 ebx=71ac40b4 ecx=01640fdc edx=00001c83 esi=00000304 edi=00000000
eip=7c90e514 esp=04d9fec0 ebp=04d9fed4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp
Hrm, is that the only info from the report? I looked at the only address I have to go on there and while it does provide a new lead, it's not a direct place where memory could have been written beyond its bounds and therefore not the site of the actual bug. Usually a single crash in Dr. Watson has a lot more info than that, including several state dumps.
(49c.13e0): C++ EH exception - code e06d7363 (first chance)
(49c.13e0): Stack overflow - code c00000fd (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000003 ebx=00000001 ecx=7ffdf000 edx=02a15000 esi=02a11000 edi=00000080
eip=7c96aacd esp=00032e90 ebp=0003302c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
ntdll!RtlpNtMakeTemporaryKey+0x23d1:
7c96aacd 56 push esi
0:000> k
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0003302c 7c96be50 ntdll!RtlpNtMakeTemporaryKey+0x23d1
000330bc 7c96c9e5 ntdll!RtlpNtMakeTemporaryKey+0x3754
00033118 7c96fb16 ntdll!RtlpNtMakeTemporaryKey+0x42e9
0003319c 7c94b244 ntdll!RtlpNtMakeTemporaryKey+0x741a
000333cc 7c919c0c ntdll!LdrAlternateResourcesEnabled+0x2b05
00033600 0036fd2c ntdll!RtlpUnWaitCriticalSection+0xad
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\MSVCRT.dll -
00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap+0xb1 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 234]
000336b0 77c2c3e7 MSVCRT!free+0x1ae
000336bc 77c2c42e MSVCRT!free+0x1cc
000336cc 77c2c454 MSVCRT!malloc+0x27
00033718 00370814 MSVCRT!realloc+0x1d
*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
00033738 023d0a18 vfbasics!AVrfp_realloc+0x92 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 1051]
00000000 00000000 byondcore!BagItem::~BagItem+0xaa8
0:000> kp
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0003302c 7c96be50 ntdll!RtlpNtMakeTemporaryKey+0x23d1
000330bc 7c96c9e5 ntdll!RtlpNtMakeTemporaryKey+0x3754
00033118 7c96fb16 ntdll!RtlpNtMakeTemporaryKey+0x42e9
0003319c 7c94b244 ntdll!RtlpNtMakeTemporaryKey+0x741a
000333cc 7c919c0c ntdll!LdrAlternateResourcesEnabled+0x2b05
00033600 0036fd2c ntdll!RtlpUnWaitCriticalSection+0xad
00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap(void * HeapHandle = 0x02a10000, unsigned long Flags = 0, unsigned long Size = 0x80)+0xb1 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 234]
000336b0 77c2c3e7 MSVCRT!free+0x1ae
000336bc 77c2c42e MSVCRT!free+0x1cc
000336cc 77c2c454 MSVCRT!malloc+0x27
00033718 00370814 MSVCRT!realloc+0x1d
00033738 023d0a18 vfbasics!AVrfp_realloc(void * Address = 0x00000000, unsigned long Size = 0x80)+0x92 [d:\avrf\source\base\avrf\vrfcommon\heap.c @ 1051]
00000000 00000000 byondcore!BagItem::~BagItem+0xaa8
I've only been copying a part of the watson .log file. If you want it all, I can do that.
Realized I forgot to symfix before getting the callstack.

0:000> k
ChildEBP RetAddr
0003302c 7c96be50 ntdll!RtlpDphVmLimitCanUsePageHeap+0xb
000330bc 7c96c9e5 ntdll!RtlpDphShouldAllocateInPageHeap+0x37
00033118 7c96fb16 ntdll!RtlpDebugPageHeapAllocate+0xac
0003319c 7c94b244 ntdll!RtlDebugAllocateHeap+0x2d
000333cc 7c919c0c ntdll!RtlAllocateHeapSlowly+0x44
00033600 0036fd2c ntdll!RtlAllocateHeap+0xe64
00033670 77c2c3c9 vfbasics!AVrfpRtlAllocateHeap+0xb1
000336b0 77c2c3e7 MSVCRT!_heap_alloc+0xe0
000336bc 77c2c42e MSVCRT!_nh_malloc+0x13
000336cc 77c2c454 MSVCRT!malloc+0x27
00033718 00370814 MSVCRT!realloc+0x1d
*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
00033738 023d0a18 vfbasics!AVrfp_realloc+0x92
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 byondcore!BagItem::~BagItem+0xaa8
You should have a different date for the different crashes, so the full info from the most recent would be helpful. I took a look at what you have so far and while I see there is a realloc() call, that shouldn't be crashing. The fact that it is strikes me as very weird. I think the critical part here is that it mentions the exception is a stack overflow. If I have the full text of the most recent crash I can take a better look, or you can email that to me.

Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.



Application exception occurred:
App: I:\Program Files\BYOND\bin\dreamdaemon.exe (pid=2448)
When: 3/31/2011 @ 21:30:57.600
Exception number: 80000003 (hardcoded breakpoint)

*----> System Information <----*
Computer Name: TSFREAKS
User Name: Administrator
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 6 Model 15 Stepping 13
Windows Version: 5.1
Current Build: 2600
Service Pack: 3
Current Type: Multiprocessor Free
Registered Organization:
Registered Owner: tsfreaks

*----> Task List <----*
0 System Process
4 System
1376 smss.exe
1532 csrss.exe
1560 winlogon.exe
1604 services.exe
1616 lsass.exe
1780 nvsvc32.exe
1872 svchost.exe
1924 svchost.exe
428 MsMpEng.exe
484 svchost.exe
608 svchost.exe
1040 svchost.exe
1296 spoolsv.exe
1364 CTAudSvc.exe
116 SCardSvr.exe
2032 Explorer.EXE
304 svchost.exe
344 AppleMobileDeviceService.exe
552 mDNSResponder.exe
956 jqs.exe
1004 LinksysUpdater.exe
1052 McSvHost.exe
1732 mfevtps.exe
1976 MotoHelperService.exe
336 MSASCui.exe
392 MSCamS32.exe
652 googletalk.exe
568 java.exe
600 jusched.exe
668 iTunesHelper.exe
756 sqlservr.exe
780 ctfmon.exe
812 MotoHelperAgent.exe
788 byond.exe
1172 nSvcLog.exe
1472 Dropbox.exe
1516 nTuneService.exe
1684 PnkBstrA.exe
2068 PnkBstrB.exe
2156 PSIService.exe
2368 SeaPort.exe
2512 sqlbrowser.exe
2544 svchost.exe
2640 mcshield.exe
2848 mfefire.exe
2892 nmsrvc.exe
1084 iPodService.exe
2700 alg.exe
3920 TSVNCache.exe
6444 eclipse.exe
5740 adb.exe
5892 steam.exe
2448 dreamdaemon.exe
2136 dreamseeker.exe
7664 WPFFontCache_v0400.exe
5688 inetinfo.exe
7612 firefox.exe
4648 plugin-container.exe
1752 googletalkplugin.exe
7704 mcagent.exe
7828 wmiprvse.exe
3252 drwtsn32.exe

*----> Module List <----*
(0000000000360000 - 000000000039c000: I:\WINDOWS\System32\vfbasics.dll
(0000000000400000 - 0000000000435000: I:\Program Files\BYOND\bin\dreamdaemon.exe
(0000000002160000 - 00000000022cb000: I:\Program Files\BYOND\bin\byondwin.dll
(00000000022d0000 - 0000000002497000: I:\Program Files\BYOND\bin\byondcore.dll
(00000000024a0000 - 00000000024e6000: I:\Program Files\BYOND\bin\byondext.dll
(00000000024f0000 - 0000000002501000: I:\WINDOWS\system32\MSVCIRT.dll
(0000000010000000 - 0000000010029000: I:\WINDOWS\System32\vrfcore.dll
(000000005ad10000 - 000000005ad59000: I:\WINDOWS\System32\verifier.dll
(000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll
(000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll
(0000000064000000 - 0000000064025000: I:\Program Files\Bonjour\mdnsNSP.dll
(00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll
(0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll
(00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL
(0000000073dd0000 - 0000000073ec1000: I:\WINDOWS\system32\MFC42.DLL
(0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll
(0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll
(00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime
(0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll
(0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll
(0000000076d60000 - 0000000076d79000: I:\WINDOWS\system32\Iphlpapi.dll
(0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll
(0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
(00000000774e0000 - 000000007761e000: I:\WINDOWS\system32\ole32.dll
(0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll
(0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll
(000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0x1750 <----*

eax=1000e848 ebx=1000d088 ecx=00000001 edx=000001ca esi=00000000 edi=1000e848
eip=7c90120e esp=0012e180 ebp=0012e384 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\ntdll.dll -
function: ntdll!DbgBreakPoint
7c9011e6 64a118000000 mov eax,fs:[00000018]
7c9011ec 803d94e0977c00 cmp byte ptr [ntdll!fltused+0x4c (7c97e094)],0x0
7c9011f3 8b7508 mov esi,[ebp+0x8]
7c9011f6 8945fc mov [ebp-0x4],eax
7c9011f9 0f85f7ec0000 jne ntdll!RtlInitUnicodeStringEx+0x61 (7c90fef6)
7c9011ff f6461010 test byte ptr [esi+0x10],0x10
7c901203 0f84edec0000 je ntdll!RtlInitUnicodeStringEx+0x61 (7c90fef6)
7c901209 5e pop esi
7c90120a c9 leave
7c90120b c20400 ret 0x4
FAULT ->ntdll!DbgBreakPoint:
7c90120e cc int 3
7c90120f c3 ret
7c901210 8bff mov edi,edi
ntdll!DbgUserBreakPoint:
7c901212 cc int 3
7c901213 c3 ret
7c901214 8bff mov edi,edi
7c901216 8b442404 mov eax,[esp+0x4]
7c90121a cc int 3
7c90121b c20400 ret 0x4
ntdll!NtCurrentTeb:

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
ChildEBP RetAddr Args to Child
0012e384 100078c9 1000c540 00000013 00000024 ntdll!DbgBreakPoint
0012e3a8 00366262 00000013 00361b5c 00000024 vrfcore!VfCoreRedirectedStopMessage+0x81
0012e3d8 00366af1 00000013 00361b5c 00000024 vfbasics!VerifierStopMessage+0x292
0012e430 00367316 0012e45c 7c97e3e0 01feeff0 vfbasics!AVrfpCheckFirstChanceException+0xc8
0012e444 7c944308 0012e45c 0012e4f4 0012e4f4 vfbasics!AVrfpVectoredExceptionHandler+0x16
0012e464 7c92a83d 0012e4f4 0012e510 0012e0e0 ntdll!RtlDeleteAce+0xc36f
0012e4dc 7c90e48a 0012e4f4 0012e510 0012e4f4 ntdll!wcstol+0xb6
0012e880 023a859e 023a8505 00000001 00000003 ntdll!KiUserExceptionDispatcher+0xe
00000000 00000000 00000000 00000000 00000000 byondcore!ServerMedalAction+0x1640e

*----> Raw Stack Dump <----*
000000000012e180 68 3b 00 10 e4 34 12 10 - 24 00 00 00 f4 e4 12 00 h;...4..$.......
000000000012e190 5c e4 12 00 b8 e1 12 00 - 00 00 00 00 00 00 00 00 \...............
000000000012e1a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012e1b0 00 00 00 00 ff ff ff ff - 00 00 00 00 89 8e 36 02 ..............6.
000000000012e1c0 ec e1 12 02 18 e2 12 00 - 3c e7 12 00 00 00 00 00 ........<.......
000000000012e1d0 18 e2 12 00 03 00 00 00 - 07 00 00 00 00 00 00 00 ................
000000000012e1e0 00 00 00 00 e1 9a 36 02 - 07 00 00 00 48 c8 36 02 ......6.....H.6.
000000000012e1f0 00 00 00 00 90 c8 36 02 - 00 00 00 00 10 e7 12 00 ......6.........
000000000012e200 00 00 00 00 02 00 00 00 - dc e6 12 00 00 00 00 00 ................
000000000012e210 00 00 00 00 b0 6f 41 07 - 02 00 00 00 c7 87 36 02 .....oA.......6.
000000000012e220 e8 02 db 0b 17 01 00 00 - 06 00 00 00 01 00 00 00 ................
000000000012e230 66 87 36 02 12 00 00 00 - 06 00 00 00 01 00 00 00 f.6.............
000000000012e240 06 00 00 00 b0 6f 41 07 - a4 64 43 02 03 00 00 00 .....oA..dC.....
000000000012e250 07 00 00 00 03 00 00 00 - 07 00 00 00 70 e8 12 00 ............p...
000000000012e260 00 00 00 00 00 00 00 00 - d0 e6 12 00 f0 eb 42 02 ..............B.
000000000012e270 e3 c2 c2 77 e3 c2 c2 77 - 3c e7 12 00 1b c2 c2 77 ...w...w<......w
000000000012e280 16 00 00 00 06 00 00 00 - e3 c2 c2 77 00 00 00 00 ...........w....
000000000012e290 74 e2 12 00 78 e2 12 00 - 16 00 00 00 02 00 00 00 t...x...........
000000000012e2a0 bc e2 12 00 9f 08 37 00 - 00 00 00 00 02 00 00 00 ......7.........
000000000012e2b0 c9 b0 38 02 00 00 00 00 - 10 e7 12 00 dc e6 12 00 ..8.............

*----> State Dump for Thread Id 0x1050 <----*

eax=c0c0c0c0 ebx=71ac40b4 ecx=00000004 edx=00000011 esi=0000000c edi=00000000
eip=7c90e514 esp=04d9fec0 ebp=04d9fed4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\WS2_32.dll -
ChildEBP RetAddr Args to Child
04d9fed4 7c8025db 0000000c 00000000 00000000 ntdll!KiFastSystemCallRet
04d9ff38 7c802542 0000000c ffffffff 00000000 kernel32!WaitForSingleObjectEx+0x8b
04d9ff4c 003710ed 0000000c ffffffff 02b68fc0 kernel32!WaitForSingleObject+0x12
04d9ff60 71abd18c 0000000c ffffffff 7c969fa2 vfbasics!AVrfpWaitForSingleObject+0x9f
04d9ff7c 003742f7 0000000c 04ee9440 7c969fa2 WS2_32!getnameinfo+0xb03
04d9ffb4 7c80b729 03258fe0 7c969fa2 0341b000 vfbasics!AVrfpStandardThreadFunction+0x2f
04d9ffec 00000000 003742c8 03258fe0 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
0000000004d9fec0 5a df 90 7c 79 13 37 00 - 0c 00 00 00 00 00 00 00 Z..|y.7.........
0000000004d9fed0 00 00 00 00 38 ff d9 04 - db 25 80 7c 0c 00 00 00 ....8....%.|....
0000000004d9fee0 00 00 00 00 00 00 00 00 - e8 2f b9 02 30 25 80 7c ........./..0%.|
0000000004d9fef0 b4 40 ac 71 14 00 00 00 - 01 00 00 00 00 00 00 00 [email protected]............
0000000004d9ff00 00 00 00 00 10 00 00 00 - 00 00 00 00 18 ff 36 00 ..............6.
0000000004d9ff10 00 e0 fd 7f 00 c0 fd 7f - 00 00 00 00 01 00 00 00 ................
0000000004d9ff20 e8 fe d9 04 3a 00 00 00 - a4 ff d9 04 d8 9a 83 7c ....:..........|
0000000004d9ff30 08 26 80 7c 00 00 00 00 - 4c ff d9 04 42 25 80 7c .&.|....L...B%.|
0000000004d9ff40 0c 00 00 00 ff ff ff ff - 00 00 00 00 60 ff d9 04 ............`...
0000000004d9ff50 ed 10 37 00 0c 00 00 00 - ff ff ff ff c0 8f b6 02 ..7.............
0000000004d9ff60 7c ff d9 04 8c d1 ab 71 - 0c 00 00 00 ff ff ff ff |......q........
0000000004d9ff70 a2 9f 96 7c e0 8f 25 03 - e0 8f 25 03 b4 ff d9 04 ...|..%...%.....
0000000004d9ff80 f7 42 37 00 0c 00 00 00 - 40 94 ee 04 a2 9f 96 7c .B7.....@......|
0000000004d9ff90 00 b0 41 03 e0 8f 25 03 - 00 00 00 00 88 ff d9 04 ..A...%.........
0000000004d9ffa0 00 00 00 00 dc ff d9 04 - b0 46 37 00 04 3b 00 00 .........F7..;..
0000000004d9ffb0 00 00 00 00 ec ff d9 04 - 29 b7 80 7c e0 8f 25 03 ........)..|..%.
0000000004d9ffc0 a2 9f 96 7c 00 b0 41 03 - e0 8f 25 03 00 c0 fd 7f ...|..A...%.....
0000000004d9ffd0 00 16 9b 8b c0 ff d9 04 - 28 a6 d3 89 ff ff ff ff ........(.......
0000000004d9ffe0 d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00 ...|0..|........
0000000004d9fff0 00 00 00 00 c8 42 37 00 - e0 8f 25 03 00 00 00 00 .....B7...%.....

*----> State Dump for Thread Id 0x1480 <----*

eax=05232fd0 ebx=c0000000 ecx=00000002 edx=04e4cfc0 esi=00000000 edi=71a8793c
eip=7c90e514 esp=0567ff1c ebp=0567ff44 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\System32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0567ff44 71a5d320 00000250 0567ff84 0567ff78 ntdll!KiFastSystemCallRet
0567ff7c 003742f7 71a67b03 05509440 7c969fa2 mswsock!WSPStartup+0x1085
0567ffb4 7c80b729 05230fe0 7c969fa2 054ae000 vfbasics!AVrfpStandardThreadFunction+0x2f
0567ffec 00000000 003742c8 05230fe0 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
000000000567ff1c 4a da 90 7c cb 82 36 00 - 50 02 00 00 84 ff 67 05 J..|..6.P.....g.
000000000567ff2c 40 ff 67 05 6c ff 67 05 - 68 d3 a5 71 02 01 00 00 @.g.l.g.h..q....
000000000567ff3c 00 00 00 00 00 00 00 00 - 7c ff 67 05 20 d3 a5 71 ........|.g. ..q
000000000567ff4c 50 02 00 00 84 ff 67 05 - 78 ff 67 05 6c ff 67 05 P.....g.x.g.l.g.
000000000567ff5c 68 d3 a5 71 a2 9f 96 7c - e0 0f 23 05 e0 0f 23 05 h..q...|..#...#.
000000000567ff6c 00 00 00 00 1c 00 00 00 - 00 00 a5 71 00 00 00 00 ...........q....
000000000567ff7c b4 ff 67 05 f7 42 37 00 - 03 7b a6 71 40 94 50 05 ..g..B7..{[email protected].
000000000567ff8c a2 9f 96 7c 00 e0 4a 05 - e0 0f 23 05 00 00 00 00 ...|..J...#.....
000000000567ff9c 88 ff 67 05 00 00 00 00 - dc ff 67 05 b0 46 37 00 ..g.......g..F7.
000000000567ffac 04 3b 00 00 00 00 00 00 - ec ff 67 05 29 b7 80 7c .;........g.)..|
000000000567ffbc e0 0f 23 05 a2 9f 96 7c - 00 e0 4a 05 e0 0f 23 05 ..#....|..J...#.
000000000567ffcc 00 b0 fd 7f 00 16 9b 8b - c0 ff 67 05 90 a2 49 89 ..........g...I.
000000000567ffdc ff ff ff ff d8 9a 83 7c - 30 b7 80 7c 00 00 00 00 .......|0..|....
000000000567ffec 00 00 00 00 00 00 00 00 - c8 42 37 00 e0 0f 23 05 .........B7...#.
000000000567fffc 00 00 00 00 08 00 00 00 - 00 20 00 00 00 00 00 00 ......... ......
000000000568000c ff ff ff ff 40 1f 00 00 - 01 00 00 00 00 00 00 00 ....@...........
000000000568001c 00 00 00 00 00 00 00 00 - 00 00 00 00 58 00 00 00 ............X...
000000000568002c 58 00 00 00 a0 e1 db 57 - 25 de d2 11 af dd 00 10 X......W%.......
000000000568003c 5a 27 99 b5 03 00 00 00 - 01 00 00 00 00 00 00 00 Z'..............
000000000568004c 50 17 00 00 90 09 00 00 - b9 04 00 00 d6 c9 c6 1d P...............

Page: 1 2 3