ID:111631
 
Resolved
Dream Seeker had an accidental division by zero during some highly unusual gliding cases.
BYOND Version:479
Operating System:Windows XP Pro
Web Browser:Firefox 3.6.16
Applies to:Dream Seeker
Status: Resolved (481)

This issue has been resolved.
479.1086

Descriptive Problem Summary:
Crash when connected to local host

Numbered Steps to Reproduce Problem:
Host something, connect one client, login with another user, connect second client.

Code Snippet (if applicable) to Reproduce
Application exception occurred:
App: I:\Program Files\BYOND\bin\dreamseeker.exe (pid=4476)
When: 4/5/2011 @ 12:41:01.125
Exception number: c0000094 (divide by zero)

*----> System Information <----*
Computer Name: TSFREAKS
User Name: Administrator
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 6 Model 15 Stepping 13
Windows Version: 5.1
Current Build: 2600
Service Pack: 3
Current Type: Multiprocessor Free
Registered Organization:
Registered Owner: tsfreaks

*----> Task List <----*
0 System Process
4 System
1416 smss.exe
1524 csrss.exe
1548 winlogon.exe
1592 services.exe
1604 lsass.exe
1768 nvsvc32.exe
1860 svchost.exe
1912 svchost.exe
420 MsMpEng.exe
472 svchost.exe
612 svchost.exe
1156 svchost.exe
1288 spoolsv.exe
1340 CTAudSvc.exe
1268 SCardSvr.exe
2016 Explorer.EXE
804 svchost.exe
840 AppleMobileDeviceService.exe
924 MSASCui.exe
968 googletalk.exe
976 jusched.exe
1000 RUNDLL32.EXE
1056 mDNSResponder.exe
1064 ctfmon.exe
1172 byond.exe
1396 Dropbox.exe
116 inetinfo.exe
2252 jqs.exe
2552 LinksysUpdater.exe
2616 McSvHost.exe
2816 mfevtps.exe
2828 MotoHelperService.exe
2852 java.exe
2888 MSCamS32.exe
2948 sqlservr.exe
3012 MotoHelperAgent.exe
3236 nSvcLog.exe
3256 nTuneService.exe
3312 PnkBstrA.exe
3352 PnkBstrB.exe
3388 PSIService.exe
3612 SeaPort.exe
3668 sqlbrowser.exe
3732 svchost.exe
3824 mcshield.exe
3904 mfefire.exe
3944 nmsrvc.exe
2392 iPodService.exe
5428 alg.exe
6036 TSVNCache.exe
3180 wuauclt.exe
5292 steam.exe
5616 WPFFontCache_v0400.exe
4916 wlmail.exe
4592 wlcomm.exe
5636 taskmgr.exe
6124 ONENOTE.EXE
5188 ntvdm.exe
6116 dreamdaemon.exe
6140 dreammaker.exe
4616 dreamseeker.exe
4476 dreamseeker.exe
1152 drwtsn32.exe

*----> Module List <----*
(0000000000330000 - 0000000000376000: I:\Program Files\BYOND\bin\byondext.dll
(0000000000380000 - 0000000000391000: I:\WINDOWS\system32\MSVCIRT.dll
(0000000000400000 - 000000000047d000: I:\Program Files\BYOND\bin\dreamseeker.exe
(0000000000480000 - 0000000000647000: I:\Program Files\BYOND\bin\byondcore.dll
(0000000010000000 - 000000001016b000: I:\Program Files\BYOND\bin\byondwin.dll
(000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll
(000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll
(0000000064000000 - 0000000064025000: I:\Program Files\Bonjour\mdnsNSP.dll
(00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll
(000000006d990000 - 000000006d996000: I:\WINDOWS\system32\d3d8thk.dll
(000000006d9a0000 - 000000006dac8000: I:\WINDOWS\system32\d3d8.dll
(0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll
(0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll
(00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL
(0000000073dd0000 - 0000000073ec1000: I:\WINDOWS\system32\MFC42.DLL
(0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll
(0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll
(00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime
(0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll
(0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll
(0000000076d60000 - 0000000076d79000: I:\WINDOWS\system32\Iphlpapi.dll
(0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll
(0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
(00000000774e0000 - 000000007761e000: I:\WINDOWS\system32\ole32.dll
(0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll
(0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll
(000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0x13fc <----*

eax=00000020 ebx=00c20000 ecx=00000020 edx=00000000 esi=00cd9b5e edi=0012ffff
eip=004a6f58 esp=0012ed10 ebp=00000000 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll -
function: byondcore!DebugIO__operator=
004a6f3f 8bc1 mov eax,ecx
004a6f41 99 cdq
004a6f42 f7fd idiv ebp
004a6f44 8b15c0926100 mov edx,[byondcore!`string'+0x458 (006192c0)]
004a6f4a 8be8 mov ebp,eax
004a6f4c 8b442440 mov eax,[esp+0x40]
004a6f50 2be8 sub ebp,eax
004a6f52 8bc1 mov eax,ecx
004a6f54 03ea add ebp,edx
004a6f56 33d2 xor edx,edx
FAULT ->004a6f58 f7f5 div ebp
004a6f5a 660fbec0 movsx ax,al
004a6f5e 663d0400 cmp ax,0x4
004a6f62 668906 mov [esi],ax
004a6f65 7d0a jge byondcore!DebugIO__operator=+0x6761 (004a6f71)
004a6f67 66c7060400 mov word ptr [esi],0x4
004a6f6c e9cd000000 jmp byondcore!DebugIO__operator=+0x682e (004a703e)
004a6f71 663d1000 cmp ax,0x10
004a6f75 7e0a jle byondcore!DebugIO__operator=+0x6771 (004a6f81)
004a6f77 66c7061000 mov word ptr [esi],0x10
004a6f7c e9bd000000 jmp byondcore!DebugIO__operator=+0x682e (004a703e)

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00000000 00000000 00000000 00000000 00000000 byondcore!DebugIO__operator=+0x6748

*----> Raw Stack Dump <----*
000000000012ed10 01 00 00 00 b8 47 d1 00 - 00 00 00 00 01 00 d1 00 .....G..........
000000000012ed20 88 ee 12 01 90 f1 d4 00 - 6a 77 4a 00 0c 00 12 00 ........jwJ.....
000000000012ed30 15 00 12 00 54 9b cd 00 - 56 9b cd 00 58 9b cd 00 ....T...V...X...
000000000012ed40 5a 9b cd 00 5c 9b cd 00 - 20 00 cd 00 8e 9b cd 00 Z...\... .......
000000000012ed50 36 00 00 00 68 9b cd 00 - 01 00 00 00 ff ff 00 00 6...h...........
000000000012ed60 00 00 00 00 b8 47 d1 00 - 25 00 d1 00 01 01 01 00 .....G..%.......
000000000012ed70 0d 00 00 00 34 09 00 00 - 36 23 00 00 01 00 00 00 ....4...6#......
000000000012ed80 15 00 12 00 0c 00 12 00 - 00 00 00 00 00 00 00 00 ................
000000000012ed90 25 00 00 00 c7 33 4a 00 - b8 47 d1 00 50 47 d1 00 %....3J..G..PG..
000000000012eda0 b8 47 d1 00 50 47 d1 00 - ad cf 49 00 b8 47 d1 00 .G..PG....I..G..
000000000012edb0 b8 47 d1 00 50 47 d1 00 - b0 50 5b 00 b8 47 d1 00 .G..PG...P[..G..
000000000012edc0 a8 f8 62 00 50 47 d1 00 - 01 00 00 00 01 00 00 00 ..b.PG..........
000000000012edd0 ed 09 ac 00 04 00 00 00 - 00 00 00 00 92 5c 5b 00 .............\[.
000000000012ede0 50 d8 d0 00 00 00 00 00 - 50 40 5c 00 d8 00 00 00 P.......P@\.....
000000000012edf0 01 00 00 00 50 47 d1 00 - 01 00 00 00 94 ee 12 00 ....PG..........
000000000012ee00 c0 37 41 00 e0 f0 12 00 - 00 00 00 00 e9 37 41 00 .7A..........7A.
000000000012ee10 d8 00 00 00 01 00 00 00 - ae 1f dd 73 d8 00 00 00 ...........s....
000000000012ee20 01 00 00 00 e0 f0 12 00 - e0 f0 12 00 10 58 14 00 .............X..
000000000012ee30 78 1a dd 73 0f 00 00 00 - 00 00 00 00 07 00 00 00 x..s............
000000000012ee40 40 ef 12 00 32 03 08 00 - 00 00 00 00 00 00 00 00 @...2...........

*----> State Dump for Thread Id 0x7b4 <----*

eax=00000000 ebx=71ac40b4 ecx=00000000 edx=71ac40b4 esi=000000a8 edi=00000000
eip=7c90e514 esp=00f3ff20 ebp=00f3ff84 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\WS2_32.dll -
ChildEBP RetAddr Args to Child
00f3ff84 7c802542 000000a8 ffffffff 00000000 ntdll!KiFastSystemCallRet
00f3ff98 71abd18c 000000a8 ffffffff 0012e7b0 kernel32!WaitForSingleObject+0x12
00f3ffb4 7c80b729 000000a8 0012e7b0 7c90e920 WS2_32!getnameinfo+0xb03
00f3ffec 00000000 71abd161 00b36980 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
0000000000f3ff20 5a df 90 7c db 25 80 7c - a8 00 00 00 00 00 00 00 Z..|.%.|........
0000000000f3ff30 00 00 00 00 80 69 b3 00 - a0 69 b3 00 b4 40 ac 71 .....i...i...@.q
0000000000f3ff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f3ff50 10 00 00 00 30 00 00 00 - 7c ff f3 00 00 f0 fd 7f ....0...|.......
0000000000f3ff60 00 d0 fd 7f 00 00 00 00 - 01 00 00 00 34 ff f3 00 ............4...
0000000000f3ff70 20 e9 90 7c dc ff f3 00 - d8 9a 83 7c 08 26 80 7c ..|.......|.&.|
0000000000f3ff80 00 00 00 00 98 ff f3 00 - 42 25 80 7c a8 00 00 00 ........B%.|....
0000000000f3ff90 ff ff ff ff 00 00 00 00 - b4 ff f3 00 8c d1 ab 71 ...............q
0000000000f3ffa0 a8 00 00 00 ff ff ff ff - b0 e7 12 00 20 e9 90 7c ............ ..|
0000000000f3ffb0 80 69 b3 00 ec ff f3 00 - 29 b7 80 7c a8 00 00 00 .i......)..|....
0000000000f3ffc0 b0 e7 12 00 20 e9 90 7c - 80 69 b3 00 00 d0 fd 7f .... ..|.i......
0000000000f3ffd0 00 16 97 8b c0 ff f3 00 - 00 a3 a1 89 ff ff ff ff ................
0000000000f3ffe0 d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00 ...|0..|........
0000000000f3fff0 00 00 00 00 61 d1 ab 71 - 80 69 b3 00 00 00 00 00 ....a..q.i......
0000000000f40000 c8 00 00 00 3a 01 00 00 - ff ee ff ee 02 10 00 00 ....:...........
0000000000f40010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. ..
0000000000f40020 00 02 00 00 00 20 00 00 - bb 00 00 00 ff ef fd 7f ..... ..........
0000000000f40030 07 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f40040 00 00 00 00 98 05 f4 00 - 0f 00 00 00 f8 ff ff ff ................
0000000000f40050 50 00 f4 00 50 00 f4 00 - 40 06 f4 00 00 00 00 00 P...P...@.......

*----> State Dump for Thread Id 0x1708 <----*

eax=71a87900 ebx=c0000000 ecx=00000009 edx=00f429c0 esi=00000000 edi=71a8793c
eip=7c90e514 esp=0115ff7c ebp=0115ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0115ffb4 7c80b729 71a67b03 0012eb28 7c90e920 ntdll!KiFastSystemCallRet
0115ffec 00000000 71a5d2c6 00156c30 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
000000000115ff7c 4a da 90 7c 20 d3 a5 71 - 20 01 00 00 bc ff 15 01 J..| ..q .......
000000000115ff8c b0 ff 15 01 a4 ff 15 01 - 68 d3 a5 71 28 eb 12 00 ........h..q(...
000000000115ff9c 20 e9 90 7c 30 6c 15 00 - 00 00 00 00 1c 00 00 00 ..|0l..........
000000000115ffac 00 00 a5 71 40 26 f4 00 - ec ff 15 01 29 b7 80 7c ...q@&......)..|
000000000115ffbc 03 7b a6 71 28 eb 12 00 - 20 e9 90 7c 30 6c 15 00 .{.q(... ..|0l..
000000000115ffcc 00 c0 fd 7f 00 f6 96 8b - c0 ff 15 01 00 a3 a1 89 ................
000000000115ffdc ff ff ff ff d8 9a 83 7c - 30 b7 80 7c 00 00 00 00 .......|0..|....
000000000115ffec 00 00 00 00 00 00 00 00 - c6 d2 a5 71 30 6c 15 00 ...........q0l..
000000000115fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000116009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011600ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

Does the problem occur:
First and only time reproing this issue and it was on an example game.

I was logged in as guest2349234 (something like that) after I dismissed the crash reporting dialog. DreamSeeker was still functional after this crash and I was able to login with a new user and continue my testing.
I was able to find the spot where this issue came up, though reproducing it on a reliable basis is likely impossible. I put in sanity checks for division by zero in these places which should fix the issue.