ID:2677479
 
Resolved
BYOND Version:513
Operating System:Windows 10 Pro 64-bit
Web Browser:Chrome 89.0.4389.105
Applies to:Dream Daemon
Status: Resolved

This issue has been resolved.
Descriptive Problem Summary:

Deamon crashes after using the call(LibName,FuncName)(Arguments) method. Moreover, it crashes if you call it quickly enough.

Numbered Steps to Reproduce Problem:
1) Examine item with using call(LibName,FuncName)(Arguments)
2) try again quickly
3) ...
4) crash daemon
Code Snippet (if applicable) to Reproduce Problem:
https://github.com/SantaGitHub/Paradise/commit/ afdb9fa58ad28489432a8e7834b281edbcec8199
code in crowbar.dm line #58


DaemonVersion: 513.1542 and try on beta 514.1554
DreamSeaker: similarly

Expected Results:
Not crashing with using call()

Actual Results:
Crashing with using call()

CrashDump
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 19042 MP (12 procs) Free x86 compatible
Product: WinNt, suite: SingleUserTS
19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Debug session time: Fri Apr 30 10:32:11.000 2021 (UTC + 3:00)
System Uptime: not available
Process Uptime: 0 days 0:04:09.000
................................................................
..............................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(5524.224c): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
eax=00000000 ebx=00000000 ecx=33041b97 edx=00000064 esi=00000003 edi=00000003
eip=77882f3c esp=00f876a0 ebp=00f87830 iopl=0 nv up ei pl nz ac pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000216
ntdll!NtWaitForMultipleObjects+0xc:
77882f3c c21400 ret 14h
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************

*** WARNING: Unable to verify checksum for rust_g.dll

KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullClassPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-U9VVHAN

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 10

Key : Analysis.Memory.CommitPeak.Mb
Value: 140

Key : Analysis.System
Value: CreateObject

Key : CLR.Engine
Value: CORECLR

Key : CLR.NOSOS
Value: 1

Key : CLR.Version
Value: 5.0.521.16609

Key : Timeline.Process.Start.DeltaSec
Value: 249


NTGLOBALFLAG: 0
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 0

CONTEXT: (.ecxr)
eax=00000064 ebx=1e40a9ff ecx=33041b97 edx=00000064 esi=79fbc50f edi=00000001
eip=79d8584e esp=00f87fdc ebp=00f87fdc iopl=0 nv up ei pl nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
byondcore!DetectEncoding+0xe:
79d8584e 8a0a mov cl,byte ptr [edx] ds:002b:00000064=??
Resetting default scope

EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 79d8584e (byondcore!DetectEncoding+0x0000000e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000064
Attempt to read from address 00000064
PROCESS_NAME: dreamdaemon.exe
READ_ADDRESS: 00000064
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p. %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000064
ADDITIONAL_DEBUG_TEXT: SOS.DLL is not loaded for managed code. Analysis might be incomplete

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
00f87fdc 79d0e526 00000064 00000001 00000001 byondcore!DetectEncoding+0xe
00f88018 79d0e4c2 00000064 ffffffff 00000000 byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0x22456
00f88030 79c6d163 00000064 ffffffff 00000006 byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0x223f2
00f88060 79c7e851 00f88006 0001065e 00f88006 byondcore!DungServer::ThreadNetMsg+0x10a33
00f88d90 79c8acdb 00f89ca0 79c8acdb 00f88dd8 byondcore!DungServer::ThreadNetMsg+0x22121
00f88e68 79c6ce89 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f88eb4 79c6c05c 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x10759
00f88ef8 79c7de45 330407ab 00000001 00000000 byondcore!DungServer::ThreadNetMsg+0xf92c
00f89c10 79c8acdb 00f8ab10 79c8acdb 00f89c58 byondcore!DungServer::ThreadNetMsg+0x21715
00f89ce8 79c6ce89 00000103 0000015b 00000001 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f89d34 79c6c0dd 00000103 0000015b 00000001 byondcore!DungServer::ThreadNetMsg+0x10759
00f89d78 79c7dee6 3304312b 00000001 00000000 byondcore!DungServer::ThreadNetMsg+0xf9ad
00f8aa90 79c8acdb 00f8b990 79c8acdb 00f8aad8 byondcore!DungServer::ThreadNetMsg+0x217b6
00f8ab68 79c6ce89 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f8abb4 79c6c05c 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x10759
00f8abf8 79c7dee6 330422ab 00000001 00000000 byondcore!DungServer::ThreadNetMsg+0xf92c
00f8b910 79c8acdb 00f8c840 79c8acdb 00f8b958 byondcore!DungServer::ThreadNetMsg+0x217b6
00f8b9e8 79c6ce89 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f8ba34 79c6c05c 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x10759
00f8ba78 79c7dee6 33045c2b 00000002 00000000 byondcore!DungServer::ThreadNetMsg+0xf92c
00f8c790 79c8acdb 00f8d6a4 79c8acdb 00f8c7d8 byondcore!DungServer::ThreadNetMsg+0x217b6
00f8c868 79c6ce89 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f8c8b4 79c6c05c 00000103 0000015b 00000002 byondcore!DungServer::ThreadNetMsg+0x10759
00f8c8f8 79c7dee6 33044dab 00000003 00000000 byondcore!DungServer::ThreadNetMsg+0xf92c
00f8d610 79c8acdb 00000003 2bf49954 79c8acdb byondcore!DungServer::ThreadNetMsg+0x217b6
00f8d6ec 79c6ce89 00000103 0000015b 00000012 byondcore!DungServer::ThreadNetMsg+0x2e5ab
00f8d738 79c6cc75 00000103 0000015b 00000012 byondcore!DungServer::ThreadNetMsg+0x10759
00f8d778 79c70865 00000103 0000015b 00000012 byondcore!DungServer::ThreadNetMsg+0x10545
00f8d894 79c6cd24 00000103 0000015b 00000016 byondcore!DungServer::ThreadNetMsg+0x14135
00f8d8e0 79c6cc75 00000103 0000015b 01000016 byondcore!DungServer::ThreadNetMsg+0x105f4
00f8d920 79cfb4cc 00000103 0000015b 00000016 byondcore!DungServer::ThreadNetMsg+0x10545
00f8d9cc 79cf5d36 00000000 00f8da88 00f8da28 byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0xf3fc
00f8daac 79cfc244 08ed1068 00000000 330444af byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0x9c66
00f8df14 79d0103c 08ed1068 00000000 08ed0f80 byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0x10174
00f8df28 79ce0952 08ed1068 00000000 00000003 byondcore!PixBitsSharedBuffer::~PixBitsSharedBuffer+0x14f6c
00f8df44 79da1bb5 08ed1068 00000002 08ed0f80 byondcore!DMTextPrinter::SetCanvasColor+0x96d2
00f8df6c 79da05f5 353164d0 00000578 00f8dfa4 byondcore!IconContext::Save+0xe25
00f8df7c 79db3091 00000578 00000001 08ed0f80 byondcore!ByondHttpServerLink::WriteBuffer+0x1075
00f8dfa4 00d5a3e5 00000578 00000001 00f8e084 byondcore!SocketLib::Event_io+0x1f1
00f8dfb4 7a2bac41 00000578 00000001 7d51f355 dreamdaemon+0x1a3e5
00f8e084 7a2ba901 000007e8 00000578 00000001 mfc120u!CWnd::OnWndMsg+0x31d
00f8e0a4 7a2b8f33 000007e8 00000578 00000001 mfc120u!CWnd::WindowProc+0x22
00f8e114 7a2b9155 00f8e3b0 002b0e5e 000007e8 mfc120u!AfxCallWndProc+0x99
00f8e134 7a1b7e8e 002b0e5e 000007e8 00000578 mfc120u!AfxWndProc+0x34
00f8e170 75c5eebb 002b0e5e 000007e8 00000578 mfc120u!AfxWndProcBase+0x34
00f8e19c 75c55e7a 7a1b7e5a 002b0e5e 000007e8 user32!_InternalCallWinProc+0x2b
00f8e280 75c53bea 7a1b7e5a 00000000 000007e8 user32!UserCallWinProcCheckWow+0x33a
00f8e2f4 75c539b0 000006e8 00f8e334 7a2a86f2 user32!DispatchMessageWorker+0x22a
00f8e300 7a2a86f2 01363650 00000000 00f8e3b0 user32!DispatchMessageW+0x10
00f8e310 7a2bd7d4 00000004 00f8e3b0 00000001 mfc120u!AfxInternalPumpMessage+0x3e
00f8e334 7a260773 00000004 00000000 00f8e3b0 mfc120u!CWnd::RunModalLoop+0xc6
00f8e34c 7a2609f6 00d7b87c 00000000 00d40000 mfc120u!CWnd::CreateRunDlgIndirect+0x3e
00f8e3a0 00d560d2 1bb5aad0 00d6ee40 00d651d8 mfc120u!CDialog::DoModal+0x109
00f8fbe0 7a2cbdc4 00000000 00000020 00000001 dreamdaemon+0x160d2
00f8fbf4 00d5cded 00d40000 00000000 013210d4 mfc120u!AfxWinMain+0x47
00f8fc40 7726fa29 00b61000 7726fa10 00f8fcac dreamdaemon+0x1cded
00f8fc50 77877a4e 00b61000 4269aea5 00000000 kernel32!BaseThreadInitThunk+0x19
00f8fcac 77877a1e ffffffff 7789890e 00000000 ntdll!__RtlUserThreadStart+0x2f
00f8fcbc 00000000 00d5ce6b 00b61000 00000000 ntdll!_RtlUserThreadStart+0x1b

SYMBOL_NAME: byondcore!DetectEncoding+e
MODULE_NAME: byondcore
IMAGE_NAME: byondcore.dll
STACK_COMMAND: ~0s ; .ecxr ; kb
FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_NOSOS_c0000005_byondcore.dll!DetectEncod ing
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x86
OSNAME: Windows 10
FAILURE_ID_HASH: {185ba2d7-53e5-a967-e79f-0340912c60a3}
Followup: MachineOwner
---------


I fixed it.
Rebuild .dll
Lummox JR resolved issue