Descriptive Problem Summary:
DreamDaemon keeps crashing if I interact with other BYOND applications while I'm hosting.
Numbered Steps to Reproduce Problem:
Host RC, run another BYOND app on the side.
Expected Results:
No crash
Actual Results:
Crash in BYONDCore. Drwatson isn't providing any details but I do have a .dmp file. I may have disabled that functionality but I forget how we enabled/disabled it.
Does the problem occur:
Seems to happen when I'm interacting with another BYOND application.
When does the problem NOT occur?
Sitting idle. Just started happening after upgrading to the latest BYOND build.
Build: 480.1087
Did the problem NOT occur in any earlier versions?
No, not sure what version I was on. I beleive I was current.
Workarounds:
None yet.
Notes:
- The Resource Center has crashed 10 times in last hour.
- [EDIT] - Simply opening and closing down the world seems to be nuking my world.sav file/process because I keep losing data.
ID:110443
Mar 5 2011, 8:50 pm (Edited on Mar 5 2011, 9:17 pm)
|
|||||||||||||
| |||||||||||||
Mar 5 2011, 11:42 pm
|
|
Please download the latest build, 480.1088 (1087 was the first release). The fix there probably doesn't apply but we want to be on the same page just the same.
|
I did that last night and woke up to a crashed server. I think its crashing when someone tries to log-in as well.
|
I've reverted to 479 and will report any crashes there. It's possible I've introduced a change which has uncovered the crash although I feel it is unlikely.
|
It crashed in 479 so I think it must be a change I made or a corrupted world.sav file.
DreamDaemon also crashes when I shutdown the world. I'll see if I can narrow the problem down. |
Please save all info related to the crash (dmb, rsc, save files etc). We can try to reproduce it with that info. Technically BYOND should never crash even if you feed it bad data.
|
Crashed again. This time there was a lot of activity before the crash and it took a couple hours before it crashed. I also didn't get the typical world_bad_000.txt & world_bad_000.sav files after this crash.
I've saved the world.sav, .dmb, .rsc, but there is a ton of user data and supporting files that go along with this project. |
Resource Center is going to remain down until this issue gets addressed. I can't figure out a workaround and it keeps crashing.
|
I don't know if we can get the crash to recur on our end or not because as you said it needs all the support files and regular user activity, and the last time we worked with this project we never experienced any issues for that exact reason. If you can narrow down which savefile had the issue and what set of circumstances crashed it, that could help.
I strongly suggest trying to get Dr. Watson back up and running properly because the crash info from that should be invaluable. (Of course if it's definitely a savefile issue, it might also be inscrutable. But at least it's something we can trace.) The info on setting that up is here: http://support.microsoft.com/kb/188296 Ultimately without proper crash details we'll have to be able to reproduce this on our end somehow. If there's a savefile that can be confirmed to be corrupt, we might be able to use that. |
For some reason, the watson UI isn't showing the log files so I grabbed them manually. Here is the dreamdaemon and byondcore stack info. I can't upload the full thing to BYOND due to file sizes. The .log is 8mb and the .dmp is 60mb.
In this repro, I found the instances of RC were non-responsive. I started to close the windows and received the MS crash dialog. Application exception occurred: App: I:\Program Files\BYOND\bin\dreamdaemon.exe (pid=3412) When: 9/17/2010 @ 11:55:42.968 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: TSFREAKS User Name: Administrator Terminal Session Id: 0 Number of Processors: 2 Processor Type: x86 Family 6 Model 15 Stepping 13 Windows Version: 5.1 Current Build: 2600 Service Pack: 3 Current Type: Multiprocessor Free Registered Organization: Registered Owner: tsfreaks *----> Task List <----* 0 System Process 4 System 772 smss.exe 848 csrss.exe 880 winlogon.exe 924 services.exe 936 lsass.exe 1112 nvsvc32.exe 1184 svchost.exe 1232 svchost.exe 1480 MsMpEng.exe 1528 svchost.exe 1584 svchost.exe 1924 svchost.exe 232 spoolsv.exe 268 CTAudSvc.exe 292 SCardSvr.exe 460 svchost.exe 588 inetinfo.exe 620 jqs.exe 644 LinksysUpdater.exe 664 MSCamS32.exe 688 sqlservr.exe 816 nSvcIp.exe 116 nSvcLog.exe 1356 nTuneService.exe 1368 java.exe 1416 PnkBstrA.exe 1432 PnkBstrB.exe 1464 PSIService.exe 1760 SeaPort.exe 1844 sqlbrowser.exe 1876 svchost.exe 1976 nSvcAppFlt.exe 264 nmsrvc.exe 1296 wmiprvse.exe 3920 alg.exe 2388 svchost.exe 3352 Explorer.EXE 2412 MSASCui.exe 1348 RUNDLL32.EXE 2928 ctfmon.exe 908 Steam.exe 2908 pstartw.exe 3640 Gbridge.exe 3908 digsby-app.exe 2796 dllhost.exe 3712 msdtc.exe 928 aspell.exe 324 byond.exe 3412 dreamdaemon.exe 5252 firefox.exe 4572 ONENOTE.EXE 2536 wlmail.exe 5216 AcroRd32.exe 5188 plugin-container.exe 4332 wmiprvse.exe 2988 drwtsn32.exe *----> Module List <----* (0000000000330000 - 0000000000376000: I:\Program Files\BYOND\bin\byondext.dll (0000000000380000 - 0000000000391000: I:\WINDOWS\system32\MSVCIRT.dll (0000000000400000 - 0000000000435000: I:\Program Files\BYOND\bin\dreamdaemon.exe (0000000000440000 - 0000000000607000: I:\Program Files\BYOND\bin\byondcore.dll (0000000000ef0000 - 0000000000f13000: I:\WINDOWS\system32\nvappfilter.dll (0000000001260000 - 0000000001525000: I:\WINDOWS\system32\xpsp2res.dll (0000000001f90000 - 0000000001f99000: I:\WINDOWS\system32\Normaliz.dll (0000000001ff0000 - 000000000204b000: I:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll (0000000002770000 - 000000000280b000: I:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8. 0.50727.4053_x-ww_e6967989\MSVCR80.dll (0000000002960000 - 00000000036f7000: I:\WINDOWS\system32\nvcpl.dll (0000000003880000 - 0000000003897000: I:\WINDOWS\system32\odbcint.dll (0000000007160000 - 00000000071a6000: I:\WINDOWS\system32\Audiodev.dll (0000000010000000 - 000000001016b000: I:\Program Files\BYOND\bin\byondwin.dll (0000000010930000 - 0000000010979000: I:\WINDOWS\system32\PortableDeviceApi.dll (0000000011c70000 - 0000000011caa000: I:\WINDOWS\system32\WMASF.DLL (0000000015110000 - 000000001536d000: I:\WINDOWS\system32\WMVCore.DLL (0000000016210000 - 000000001648e000: I:\WINDOWS\system32\wpdshext.dll (000000003d930000 - 000000003da16000: I:\WINDOWS\system32\WININET.dll (000000003dfd0000 - 000000003e1b8000: I:\WINDOWS\system32\iertutil.dll (000000003e1c0000 - 000000003ec54000: I:\WINDOWS\system32\ieframe.dll (000000004ec50000 - 000000004edfb000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144cc f1df_1.0.6001.22319_x-ww_f0b4c2df\gdiplus.dll (00000000593f0000 - 0000000059482000: I:\WINDOWS\system32\wiashext.dll (000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll (000000005b860000 - 000000005b8b5000: I:\WINDOWS\system32\NETAPI32.dll (000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll (00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll (0000000071800000 - 0000000071888000: I:\WINDOWS\system32\shdoclc.dll (0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll (0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll (0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll (0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll (0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll (0000000071b20000 - 0000000071b32000: I:\WINDOWS\system32\MPR.dll (0000000071bf0000 - 0000000071c03000: I:\WINDOWS\system32\SAMLIB.dll (0000000071c10000 - 0000000071c1e000: I:\WINDOWS\System32\ntlanman.dll (0000000071c80000 - 0000000071c87000: I:\WINDOWS\System32\NETRAP.dll (0000000071c90000 - 0000000071cd0000: I:\WINDOWS\System32\NETUI1.dll (0000000071cd0000 - 0000000071ce7000: I:\WINDOWS\System32\NETUI0.dll (0000000071d40000 - 0000000071d5b000: I:\WINDOWS\system32\actxprxy.dll (0000000072410000 - 000000007242a000: I:\WINDOWS\system32\mydocs.dll (0000000073000000 - 0000000073026000: I:\WINDOWS\system32\WINSPOOL.DRV (00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL (0000000073380000 - 00000000733d7000: I:\WINDOWS\system32\zipfldr.dll (0000000073ba0000 - 0000000073bb3000: I:\WINDOWS\system32\sti.dll (0000000073d70000 - 0000000073d83000: I:\WINDOWS\system32\shgina.dll (0000000073dd0000 - 0000000073ece000: I:\WINDOWS\system32\MFC42.DLL (0000000074320000 - 000000007435d000: I:\WINDOWS\system32\ODBC32.dll (0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll (0000000074ae0000 - 0000000074ae7000: I:\WINDOWS\system32\CFGMGR32.dll (0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll (00000000754d0000 - 0000000075550000: I:\WINDOWS\system32\CRYPTUI.dll (00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime (0000000075970000 - 0000000075a68000: I:\WINDOWS\system32\MSGINA.dll (0000000075f60000 - 0000000075f67000: I:\WINDOWS\System32\drprov.dll (0000000075f70000 - 0000000075f7a000: I:\WINDOWS\System32\davclnt.dll (0000000075f80000 - 000000007607d000: I:\WINDOWS\system32\browseui.dll (0000000076360000 - 0000000076370000: I:\WINDOWS\system32\WINSTA.dll (0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll (0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL (00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll (0000000076600000 - 000000007661d000: I:\WINDOWS\System32\CSCDLL.dll (0000000076990000 - 00000000769b5000: I:\WINDOWS\system32\ntshrui.dll (00000000769c0000 - 0000000076a74000: I:\WINDOWS\system32\USERENV.dll (0000000076b20000 - 0000000076b31000: I:\WINDOWS\system32\ATL.DLL (0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll (0000000076bf0000 - 0000000076bfb000: I:\WINDOWS\system32\PSAPI.DLL (0000000076c30000 - 0000000076c5e000: I:\WINDOWS\system32\WINTRUST.dll (0000000076c90000 - 0000000076cb8000: I:\WINDOWS\system32\IMAGEHLP.dll (0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll (0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll (0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll (0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll (0000000076fd0000 - 000000007704f000: I:\WINDOWS\system32\CLBCATQ.DLL (0000000077050000 - 0000000077115000: I:\WINDOWS\system32\COMRes.dll (0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll (00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll (00000000774e0000 - 000000007761d000: I:\WINDOWS\system32\ole32.dll (0000000077690000 - 00000000776b1000: I:\WINDOWS\system32\NTMARTA.DLL (0000000077920000 - 0000000077a13000: I:\WINDOWS\system32\SETUPAPI.dll (0000000077a20000 - 0000000077a74000: I:\WINDOWS\System32\cscui.dll (0000000077a80000 - 0000000077b15000: I:\WINDOWS\system32\CRYPT32.dll (0000000077b20000 - 0000000077b32000: I:\WINDOWS\system32\MSASN1.dll (0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll (0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll (0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll (0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll (0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll (0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll (0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll (0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll (0000000078130000 - 0000000078263000: I:\WINDOWS\system32\urlmon.dll (000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll (000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll (000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll (000000007e290000 - 000000007e401000: I:\WINDOWS\system32\shdocvw.dll (000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll (000000007e720000 - 000000007e7d0000: I:\WINDOWS\system32\SXS.DLL *----> State Dump for Thread Id 0x12e8 <----* eax=fffffff8 ebx=003c0000 ecx=01a50098 edx=0000037f esi=01a50000 edi=0000000c eip=7c911c83 esp=0012e130 ebp=0012e138 iopl=0 nv up ei ng nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000282 *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\ntdll.dll - function: ntdll!RtlInitializeCriticalSection 7c911c71 0cb9 or al,0xb9 7c911c73 3911 cmp [ecx],edx 7c911c75 5b pop ebx 7c911c76 752b jnz ntdll!RtlInitializeCriticalSection+0x686 (7c911ca3) 7c911c78 8b16 mov edx,[esi] 7c911c7a 4a dec edx 7c911c7b 3bfa cmp edi,edx 7c911c7d 73c5 jnb ntdll!RtlInitializeCriticalSection+0x627 (7c911c44) 7c911c7f 85c0 test eax,eax 7c911c81 7408 jz ntdll!RtlInitializeCriticalSection+0x66e (7c911c8b) FAULT ->7c911c83 0fb710 movzx edx,word ptr [eax] ds:0023:fffffff8=???? 7c911c86 3b5508 cmp edx,[ebp+0x8] 7c911c89 74bd jz ntdll!RtlInitializeCriticalSection+0x62b (7c911c48) 7c911c8b 832100 and dword ptr [ecx],0x0 7c911c8e 8b4e60 mov ecx,[esi+0x60] 7c911c91 8bc7 mov eax,edi 7c911c93 c1e803 shr eax,0x3 7c911c96 03c1 add eax,ecx 7c911c98 8bcf mov ecx,edi 7c911c9a 83e107 and ecx,0x7 7c911c9d b201 mov dl,0x1 *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\MSVCRT.dll - *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - ChildEBP RetAddr Args to Child 0012e138 7c911d65 0000008c 0185d0f0 ffffffff ntdll!RtlInitializeCriticalSection+0x666 0012e368 77c2c3c9 003c0000 00000000 0000042c ntdll!RtlInitializeCriticalSection+0x748 0012e3a8 77c2c3e7 0000042c 0012e3c4 77c29cd4 MSVCRT!free+0x1ae 0012e3b4 77c29cd4 0000042c 00000001 0012e878 MSVCRT!free+0x1cc 0012e3c4 0058212f 0000042c 00d3bc98 0012e878 MSVCRT!operator new+0xf 0012e878 00001f54 000021c0 00000000 01925774 byondcore!CreatePathTo+0x102cf *----> Raw Stack Dump <----* 000000000012e130 87 00 00 00 f0 d0 85 01 - 68 e3 12 00 65 1d 91 7c ........h...e..| 000000000012e140 8c 00 00 00 f0 d0 85 01 - ff ff ff ff 2c 04 00 00 ............,... 000000000012e150 00 00 00 00 d0 84 b8 71 - 67 42 23 9b 0a 77 c0 80 .......qgB#..w.. 000000000012e160 30 00 87 01 12 ae 31 f8 - 76 0e ec d5 d7 d1 b7 9f 0.....1.v....... 000000000012e170 2e be 2c 6c 23 ed ae fe - 01 ae 77 a5 ef 31 c5 9f ..,l#.....w..1.. 000000000012e180 29 5c 64 34 c5 35 0a a2 - 00 00 a5 01 79 bb cf c0 )\d4.5......y... 000000000012e190 2c 20 53 50 f7 3d 8c 73 - 46 96 16 1c 27 98 d6 3a , SP.=.sF...'..: 000000000012e1a0 1d bc a9 14 5b b5 3c 21 - 1a 55 8e 08 71 13 2e 4c ....[.<!.U..q..L 000000000012e1b0 aa 9c bb 40 b9 bf b4 f3 - 70 57 92 01 c6 f8 7b 0b [email protected]....{. 000000000012e1c0 53 87 8f ea 55 9c a9 00 - 49 bf 43 bb 6c ab 40 36 S...U...I.C.l.@6 000000000012e1d0 77 0f cc 96 00 00 a5 01 - 38 79 92 01 1d 72 10 ad w.......8y...r.. 000000000012e1e0 7b 83 6d 98 98 28 d5 00 - b1 32 e4 2e 40 79 92 01 {.m..(...2..@y.. 000000000012e1f0 4c 9a fe c8 00 00 3c 00 - 68 57 92 01 02 05 00 00 L.....<.hW...... 000000000012e200 24 e2 12 00 c0 18 91 7c - 00 00 3c 00 68 57 92 01 $......|..<.hW.. 000000000012e210 68 57 92 01 00 00 3c 00 - 00 00 85 01 00 00 85 01 hW....<......... 000000000012e220 00 00 a5 02 6c e2 12 00 - 6d 1a 91 7c 02 05 00 00 ....l...m..|.... 000000000012e230 68 57 92 00 00 00 00 00 - 00 00 3c 00 68 57 92 01 hW........<.hW.. 000000000012e240 00 00 00 00 78 0f 00 00 - 00 70 92 01 68 e2 12 00 ....x....p..h... 000000000012e250 00 00 85 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000012e260 13 01 00 00 00 00 00 00 - ef 01 00 00 3c e3 12 00 ............<... *----> State Dump for Thread Id 0x1764 <----* eax=76f2307c ebx=71ac40b4 ecx=00000000 edx=00174d38 esi=000000a0 edi=00000000 eip=7c90e514 esp=00eaff20 ebp=00eaff84 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp |
That crash trace is from September. It might be helpful still but it would be even more helpful if you had a newer one. Can you tell me which version that was running on at the time?
|
Heh, sorry. Forgot that log file contained all traces vs the last one. Here you go.
Application exception occurred: App: I:\Program Files\BYOND\bin\dreamdaemon.exe (pid=1704) When: 3/9/2011 @ 07:49:13.328 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: TSFREAKS User Name: Administrator Terminal Session Id: 0 Number of Processors: 2 Processor Type: x86 Family 6 Model 15 Stepping 13 Windows Version: 5.1 Current Build: 2600 Service Pack: 3 Current Type: Multiprocessor Free Registered Organization: Registered Owner: tsfreaks *----> Task List <----* 0 System Process 4 System 1388 smss.exe 1524 csrss.exe 1552 winlogon.exe 1596 services.exe 1608 lsass.exe 1772 nvsvc32.exe 1864 svchost.exe 1916 svchost.exe 428 MsMpEng.exe 480 svchost.exe 600 svchost.exe 1124 svchost.exe 1296 spoolsv.exe 1356 CTAudSvc.exe 1368 SCardSvr.exe 112 Explorer.EXE 292 svchost.exe 328 AppleMobileDeviceService.exe 356 mDNSResponder.exe 544 inetinfo.exe 800 LinksysUpdater.exe 832 McSvHost.exe 1984 mfevtps.exe 2004 MSCamS32.exe 380 sqlservr.exe 440 MSASCui.exe 624 googletalk.exe 656 jusched.exe 704 iTunesHelper.exe 736 ctfmon.exe 1180 nSvcIp.exe 1496 nSvcLog.exe 2156 nTuneService.exe 2264 PnkBstrA.exe 2284 byond.exe 2300 PnkBstrB.exe 2336 PSIService.exe 2544 SeaPort.exe 2672 sqlbrowser.exe 2700 svchost.exe 2804 mcshield.exe 2916 mfefire.exe 2948 nmsrvc.exe 3288 nSvcAppFlt.exe 3528 wmiprvse.exe 3560 Dropbox.exe 3832 Koopy.exe 3284 java.exe 1192 iPodService.exe 4380 alg.exe 5736 TSVNCache.exe 5752 steam.exe 1832 wuauclt.exe 1704 dreamdaemon.exe 4256 dreamseeker.exe 1748 mcagent.exe 5612 wmiprvse.exe 1440 mpfalert.exe 5888 drwtsn32.exe *----> Module List <----* (0000000000330000 - 0000000000376000: I:\Program Files\BYOND\bin\byondext.dll (0000000000380000 - 0000000000391000: I:\WINDOWS\system32\MSVCIRT.dll (0000000000400000 - 0000000000435000: I:\Program Files\BYOND\bin\dreamdaemon.exe (0000000000440000 - 0000000000607000: I:\Program Files\BYOND\bin\byondcore.dll (0000000000f20000 - 0000000000f43000: I:\WINDOWS\system32\nvappfilter.dll (0000000001290000 - 0000000001555000: I:\WINDOWS\system32\xpsp2res.dll (0000000010000000 - 000000001016b000: I:\Program Files\BYOND\bin\byondwin.dll (000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll (000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll (0000000064000000 - 0000000064025000: I:\Program Files\Bonjour\mdnsNSP.dll (00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll (0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll (0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll (0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll (0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll (0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll (00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL (0000000073dd0000 - 0000000073ec1000: I:\WINDOWS\system32\MFC42.DLL (0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll (0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll (00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime (0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll (0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL (00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll (0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll (0000000076bf0000 - 0000000076bfb000: I:\WINDOWS\system32\PSAPI.DLL (0000000076d60000 - 0000000076d79000: I:\WINDOWS\system32\Iphlpapi.dll (0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll (0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll (0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll (0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll (0000000076fd0000 - 000000007704f000: I:\WINDOWS\system32\CLBCATQ.DLL (0000000077050000 - 0000000077115000: I:\WINDOWS\system32\COMRes.dll (0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll (00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll (00000000774e0000 - 000000007761e000: I:\WINDOWS\system32\ole32.dll (0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll (0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll (0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll (0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll (0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll (0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll (0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll (0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll (000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll (000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll (000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll (000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll (000000007e720000 - 000000007e7d0000: I:\WINDOWS\system32\SXS.DLL *----> State Dump for Thread Id 0x178c <----* eax=0012e003 ebx=00000000 ecx=03231e57 edx=0012e710 esi=03d4e856 edi=0012e710 eip=004fbfe0 esp=0012e0a0 ebp=00000001 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - function: byondcore!DungServer__GetHostingFlags 004fbfcc 0485 add al,0x85 004fbfce c9 leave 004fbfcf 7508 jnz byondcore!DungServer__GetHostingFlags+0x2afa9 (004fbfd9) 004fbfd1 eb04 jmp byondcore!DungServer__GetHostingFlags+0x2afa7 (004fbfd7) 004fbfd3 3bf7 cmp esi,edi 004fbfd5 7502 jnz byondcore!DungServer__GetHostingFlags+0x2afa9 (004fbfd9) 004fbfd7 b301 mov bl,0x1 004fbfd9 8b7614 mov esi,[esi+0x14] 004fbfdc 85f6 test esi,esi 004fbfde 740d jz byondcore!DungServer__GetHostingFlags+0x2afbd (004fbfed) FAULT ->004fbfe0 8b4604 mov eax,[esi+0x4] ds:0023:03d4e85a=???????? 004fbfe3 85c0 test eax,eax 004fbfe5 7406 jz byondcore!DungServer__GetHostingFlags+0x2afbd (004fbfed) 004fbfe7 8b30 mov esi,[eax] 004fbfe9 85f6 test esi,esi 004fbfeb 75a7 jnz byondcore!DungServer__GetHostingFlags+0x2af64 (004fbf94) 004fbfed 5f pop edi 004fbfee 5e pop esi 004fbfef 8ac3 mov al,bl 004fbff1 5d pop ebp 004fbff2 5b pop ebx *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 00000001 00000000 00000000 00000000 00000000 byondcore!DungServer__GetHostingFlags+0x2afb0 *----> Raw Stack Dump <----* 000000000012e0a0 f8 1d 3d 02 00 00 00 00 - 01 00 00 00 03 00 00 00 ..=............. 000000000012e0b0 2e bf 4f 00 10 e7 12 00 - 03 00 00 00 01 00 00 00 ..O............. 000000000012e0c0 00 00 00 00 01 00 00 00 - 03 00 00 00 54 e1 12 00 ............T... 000000000012e0d0 03 00 00 00 af be 4f 00 - 03 00 00 00 01 00 00 00 ......O......... 000000000012e0e0 e2 bc 4f 00 03 00 00 00 - 01 00 00 00 01 00 00 00 ..O............. 000000000012e0f0 16 00 00 00 ff ff 00 00 - 54 e1 12 00 03 00 00 00 ........T....... 000000000012e100 01 00 00 00 01 00 00 00 - e0 e0 12 00 a3 bc 4f 00 ..............O. 000000000012e110 9c e1 12 00 17 98 4d 00 - 30 32 43 56 00 00 00 00 ......M.02CV.... 000000000012e120 00 00 3c 00 00 00 00 00 - e3 c2 c2 77 01 00 00 00 ..<........w.... 000000000012e130 16 00 00 00 ff ff 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000012e140 9c 07 87 01 40 41 4c 00 - 20 c2 4f 00 00 00 00 00 ....@AL. .O..... 000000000012e150 00 00 00 00 01 00 00 00 - 43 54 53 00 03 00 00 00 ........CTS..... 000000000012e160 01 00 00 00 16 00 00 00 - 18 1d ed 01 04 00 00 00 ................ 000000000012e170 01 00 00 00 03 00 00 00 - 34 6a 5a 00 00 00 00 00 ........4jZ..... 000000000012e180 00 00 00 00 00 00 00 00 - 00 00 00 00 00 e2 12 00 ................ 000000000012e190 00 00 00 00 00 00 00 00 - 00 00 00 00 20 e2 12 00 ............ ... 000000000012e1a0 68 0e 5a 00 00 00 00 00 - 17 98 4d 00 01 00 00 00 h.Z.......M..... 000000000012e1b0 03 00 00 00 01 00 00 00 - 04 00 00 00 16 00 00 00 ................ 000000000012e1c0 ec e1 12 02 00 00 00 00 - 00 00 00 00 04 00 00 00 ................ 000000000012e1d0 18 1d ed 01 16 00 00 00 - c7 87 4d 00 70 bd da 00 ..........M.p... *----> State Dump for Thread Id 0x1150 <----* eax=00eafd24 ebx=71ac40b4 ecx=00000000 edx=00000000 esi=000000a0 edi=00000000 eip=7c90e514 esp=00eaff20 ebp=00eaff84 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 |
I was able to figure out that that trace was from version 479, and trace it to the point of the crash. The bad news is that crash point only tells me that something is blowing the proc chain.
I have a hunch that this may be related to the Shapeshifter crash issue. Is your project sending any files via world.Export() or doing anything that asks you for permission to access a file? |
I never get asked about permissions due to hosting fully trusted but yes, I have a number of file i/o operations.
I have one instance of world.Export() which is frequently used to determine if a file is available for download and if it is, I link the user to it. |
Doing some more local testing to help get the RC back online. This showed up in the directory where I save my world.sav file.
//Orphan savefile buffer 'm_sLastLogin' found on Tue Mar 15 19:36:38 2011 m_sLastLogin = "10/9/2010" //End of exported data. Do you need anything else? I'm hosting again to see if I can't learn anything. |
Are more of these helpful?
Microsoft (R) DrWtsn32 Copyright (C) 1985-2001 Microsoft Corp. All rights reserved. Application exception occurred: App: I:\Program Files\BYOND\bin\dreamdaemon.exe (pid=6060) When: 3/16/2011 @ 07:37:49.734 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: TSFREAKS User Name: Administrator Terminal Session Id: 0 Number of Processors: 2 Processor Type: x86 Family 6 Model 15 Stepping 13 Windows Version: 5.1 Current Build: 2600 Service Pack: 3 Current Type: Multiprocessor Free Registered Organization: Registered Owner: tsfreaks *----> Task List <----* 0 System Process 4 System 1468 smss.exe 1524 csrss.exe 1552 winlogon.exe 1596 services.exe 1608 lsass.exe 1780 nvsvc32.exe 1868 svchost.exe 1916 svchost.exe 432 MsMpEng.exe 480 svchost.exe 604 svchost.exe 980 svchost.exe 1304 spoolsv.exe 1356 CTAudSvc.exe 1372 SCardSvr.exe 1456 svchost.exe 1504 AppleMobileDeviceService.exe 1528 mDNSResponder.exe 1968 inetinfo.exe 1992 LinksysUpdater.exe 2032 McSvHost.exe 764 mfevtps.exe 900 MSCamS32.exe 936 sqlservr.exe 1004 java.exe 1016 nSvcIp.exe 1072 nSvcLog.exe 912 nTuneService.exe 148 PnkBstrA.exe 272 PnkBstrB.exe 276 PSIService.exe 772 SeaPort.exe 732 sqlbrowser.exe 736 svchost.exe 1068 mcshield.exe 2140 mfefire.exe 2180 nmsrvc.exe 2404 nSvcAppFlt.exe 2828 alg.exe 224 Explorer.EXE 3624 TSVNCache.exe 1736 ctfmon.exe 1732 MSASCui.exe 2204 googletalk.exe 2016 jusched.exe 2792 iTunesHelper.exe 3892 byond.exe 3792 Dropbox.exe 2628 iPodService.exe 5188 steam.exe 3356 WPFFontCache_v0400.exe 5024 MotoHelperService.exe 2500 MotoHelperAgent.exe 800 wmiprvse.exe 6060 dreamdaemon.exe 4640 dreamseeker.exe 3348 jqs.exe 5456 cmd.exe 2416 java.exe 3436 adb.exe 3296 AdobeARM.exe 1828 eclipse.exe 4328 firefox.exe 2676 plugin-container.exe 3116 mcagent.exe 4472 wmiprvse.exe 4612 drwtsn32.exe *----> Module List <----* (0000000000330000 - 0000000000376000: I:\Program Files\BYOND\bin\byondext.dll (0000000000380000 - 0000000000391000: I:\WINDOWS\system32\MSVCIRT.dll (0000000000400000 - 0000000000435000: I:\Program Files\BYOND\bin\dreamdaemon.exe (0000000000440000 - 0000000000607000: I:\Program Files\BYOND\bin\byondcore.dll (0000000000f20000 - 0000000000f43000: I:\WINDOWS\system32\nvappfilter.dll (0000000001290000 - 0000000001555000: I:\WINDOWS\system32\xpsp2res.dll (0000000010000000 - 000000001016b000: I:\Program Files\BYOND\bin\byondwin.dll (000000005ad70000 - 000000005ada8000: I:\WINDOWS\system32\uxtheme.dll (000000005d090000 - 000000005d12a000: I:\WINDOWS\system32\COMCTL32.dll (0000000064000000 - 0000000064025000: I:\Program Files\Bonjour\mdnsNSP.dll (00000000662b0000 - 0000000066308000: I:\WINDOWS\system32\hnetcfg.dll (0000000071a50000 - 0000000071a8f000: I:\WINDOWS\System32\mswsock.dll (0000000071a90000 - 0000000071a98000: I:\WINDOWS\System32\wshtcpip.dll (0000000071aa0000 - 0000000071aa8000: I:\WINDOWS\system32\WS2HELP.dll (0000000071ab0000 - 0000000071ac7000: I:\WINDOWS\system32\WS2_32.dll (0000000071ad0000 - 0000000071ad9000: I:\WINDOWS\system32\WSOCK32.dll (00000000732e0000 - 00000000732e5000: I:\WINDOWS\system32\RICHED32.DLL (0000000073dd0000 - 0000000073ec1000: I:\WINDOWS\system32\MFC42.DLL (0000000074720000 - 000000007476c000: I:\WINDOWS\system32\MSCTF.dll (0000000074e30000 - 0000000074e9d000: I:\WINDOWS\system32\RICHED20.dll (00000000755c0000 - 00000000755ee000: I:\WINDOWS\system32\msctfime.ime (0000000076380000 - 0000000076385000: I:\WINDOWS\system32\MSIMG32.dll (0000000076390000 - 00000000763ad000: I:\WINDOWS\system32\IMM32.DLL (00000000763b0000 - 00000000763f9000: I:\WINDOWS\system32\comdlg32.dll (0000000076b40000 - 0000000076b6d000: I:\WINDOWS\system32\WINMM.dll (0000000076bf0000 - 0000000076bfb000: I:\WINDOWS\system32\PSAPI.DLL (0000000076d60000 - 0000000076d79000: I:\WINDOWS\system32\Iphlpapi.dll (0000000076f20000 - 0000000076f47000: I:\WINDOWS\system32\DNSAPI.dll (0000000076f60000 - 0000000076f8c000: I:\WINDOWS\system32\WLDAP32.dll (0000000076fb0000 - 0000000076fb8000: I:\WINDOWS\System32\winrnr.dll (0000000076fc0000 - 0000000076fc6000: I:\WINDOWS\system32\rasadhlp.dll (0000000076fd0000 - 000000007704f000: I:\WINDOWS\system32\CLBCATQ.DLL (0000000077050000 - 0000000077115000: I:\WINDOWS\system32\COMRes.dll (0000000077120000 - 00000000771ab000: I:\WINDOWS\system32\OLEAUT32.dll (00000000773d0000 - 00000000774d3000: I:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll (00000000774e0000 - 000000007761e000: I:\WINDOWS\system32\ole32.dll (0000000077b40000 - 0000000077b62000: I:\WINDOWS\system32\Apphelp.dll (0000000077c00000 - 0000000077c08000: I:\WINDOWS\system32\VERSION.dll (0000000077c10000 - 0000000077c68000: I:\WINDOWS\system32\MSVCRT.dll (0000000077dd0000 - 0000000077e6b000: I:\WINDOWS\system32\ADVAPI32.dll (0000000077e70000 - 0000000077f03000: I:\WINDOWS\system32\RPCRT4.dll (0000000077f10000 - 0000000077f59000: I:\WINDOWS\system32\GDI32.dll (0000000077f60000 - 0000000077fd6000: I:\WINDOWS\system32\SHLWAPI.dll (0000000077fe0000 - 0000000077ff1000: I:\WINDOWS\system32\Secur32.dll (000000007c800000 - 000000007c8f6000: I:\WINDOWS\system32\kernel32.dll (000000007c900000 - 000000007c9b2000: I:\WINDOWS\system32\ntdll.dll (000000007c9c0000 - 000000007d1d7000: I:\WINDOWS\system32\SHELL32.dll (000000007e410000 - 000000007e4a1000: I:\WINDOWS\system32\USER32.dll (000000007e720000 - 000000007e7d0000: I:\WINDOWS\system32\SXS.DLL *----> State Dump for Thread Id 0x1488 <----* eax=0012e003 ebx=00000000 ecx=0012db12 edx=0012e1c8 esi=eceb5b00 edi=0012e1c8 eip=004fbfe0 esp=0012db58 ebp=00000003 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286 *** WARNING: Unable to verify checksum for I:\Program Files\BYOND\bin\byondcore.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\Program Files\BYOND\bin\byondcore.dll - function: byondcore!DungServer__GetHostingFlags 004fbfcc 0485 add al,0x85 004fbfce c9 leave 004fbfcf 7508 jnz byondcore!DungServer__GetHostingFlags+0x2afa9 (004fbfd9) 004fbfd1 eb04 jmp byondcore!DungServer__GetHostingFlags+0x2afa7 (004fbfd7) 004fbfd3 3bf7 cmp esi,edi 004fbfd5 7502 jnz byondcore!DungServer__GetHostingFlags+0x2afa9 (004fbfd9) 004fbfd7 b301 mov bl,0x1 004fbfd9 8b7614 mov esi,[esi+0x14] 004fbfdc 85f6 test esi,esi 004fbfde 740d jz byondcore!DungServer__GetHostingFlags+0x2afbd (004fbfed) FAULT ->004fbfe0 8b4604 mov eax,[esi+0x4] ds:0023:eceb5b04=???????? 004fbfe3 85c0 test eax,eax 004fbfe5 7406 jz byondcore!DungServer__GetHostingFlags+0x2afbd (004fbfed) 004fbfe7 8b30 mov esi,[eax] 004fbfe9 85f6 test esi,esi 004fbfeb 75a7 jnz byondcore!DungServer__GetHostingFlags+0x2af64 (004fbf94) 004fbfed 5f pop edi 004fbfee 5e pop esi 004fbfef 8ac3 mov al,bl 004fbff1 5d pop ebp 004fbff2 5b pop ebx *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 00000003 00000000 00000000 00000000 00000000 byondcore!DungServer__GetHostingFlags+0x2afb0 *----> Raw Stack Dump <----* 000000000012db58 80 8e d0 02 00 00 00 00 - 03 00 00 00 03 00 00 00 ................ 000000000012db68 2e bf 4f 00 c8 e1 12 00 - 03 00 00 00 03 00 00 00 ..O............. 000000000012db78 00 00 00 00 03 00 00 00 - 03 00 00 00 0c dc 12 00 ................ 000000000012db88 03 00 00 00 af be 4f 00 - 03 00 00 00 03 00 00 00 ......O......... 000000000012db98 e2 bc 4f 00 03 00 00 00 - 03 00 00 00 03 00 00 00 ..O............. 000000000012dba8 05 00 00 00 ff ff 00 00 - 0c dc 12 00 03 00 00 00 ................ 000000000012dbb8 03 00 00 00 03 00 00 00 - 98 db 12 00 a3 bc 4f 00 ..............O. 000000000012dbc8 54 dc 12 00 17 98 4d 00 - 30 32 43 56 00 00 00 00 T.....M.02CV.... 000000000012dbd8 00 00 3c 00 00 00 00 00 - e3 c2 c2 77 03 00 00 00 ..<........w.... 000000000012dbe8 05 00 00 00 ff ff 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000012dbf8 90 2b 87 01 40 41 4c 00 - 20 c2 4f 00 00 00 00 00 .+..@AL. .O..... 000000000012dc08 00 00 00 00 03 00 00 00 - 43 54 53 00 03 00 00 00 ........CTS..... 000000000012dc18 03 00 00 00 05 00 00 00 - 90 30 d3 01 04 00 00 00 .........0...... 000000000012dc28 01 00 00 00 03 00 00 00 - 34 6a 5a 00 00 00 00 00 ........4jZ..... 000000000012dc38 00 00 00 00 00 00 00 00 - 00 00 00 00 b8 dc 12 00 ................ 000000000012dc48 00 00 00 00 00 00 00 00 - 00 00 00 00 d8 dc 12 00 ................ 000000000012dc58 68 0e 5a 00 00 00 00 00 - 17 98 4d 00 03 00 00 00 h.Z.......M..... 000000000012dc68 03 00 00 00 03 00 00 00 - 04 00 00 00 16 00 00 00 ................ 000000000012dc78 a4 dc 12 02 00 00 00 00 - 00 00 00 00 04 00 00 00 ................ 000000000012dc88 90 30 d3 01 16 00 00 00 - c7 87 4d 00 68 de da 00 .0........M.h... *----> State Dump for Thread Id 0x10f8 <----* eax=00af8157 ebx=71ac40b4 ecx=0000002e edx=00af8155 esi=000000a0 edi=00000000 eip=7c90e514 esp=00eaff20 ebp=00eaff84 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\ntdll.dll - function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\kernel32.dll - WARNING: Stack unwind information not available. Following frames may be wrong. *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\WS2_32.dll - ChildEBP RetAddr Args to Child 00eaff84 7c802542 000000a0 ffffffff 00000000 ntdll!KiFastSystemCallRet 00eaff98 71abd18c 000000a0 ffffffff 0012e6d4 kernel32!WaitForSingleObject+0x12 00eaffb4 7c80b729 000000a0 0012e6d4 7c90e920 WS2_32!getnameinfo+0xb03 00eaffec 00000000 71abd161 00af77c0 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 0000000000eaff20 5a df 90 7c db 25 80 7c - a0 00 00 00 00 00 00 00 Z..|.%.|........ 0000000000eaff30 00 00 00 00 c0 77 af 00 - 28 81 af 00 b4 40 ac 71 .....w..([email protected] 0000000000eaff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000eaff50 10 00 00 00 48 00 00 00 - 7c ff ea 00 00 e0 fd 7f ....H...|....... 0000000000eaff60 00 c0 fd 7f 00 00 00 00 - 20 03 00 00 34 ff ea 00 ........ ...4... 0000000000eaff70 20 e9 90 7c dc ff ea 00 - d8 9a 83 7c 08 26 80 7c ..|.......|.&.| 0000000000eaff80 00 00 00 00 98 ff ea 00 - 42 25 80 7c a0 00 00 00 ........B%.|.... 0000000000eaff90 ff ff ff ff 00 00 00 00 - b4 ff ea 00 8c d1 ab 71 ...............q 0000000000eaffa0 a0 00 00 00 ff ff ff ff - d4 e6 12 00 20 e9 90 7c ............ ..| 0000000000eaffb0 c0 77 af 00 ec ff ea 00 - 29 b7 80 7c a0 00 00 00 .w......)..|.... 0000000000eaffc0 d4 e6 12 00 20 e9 90 7c - c0 77 af 00 00 c0 fd 7f .... ..|.w...... 0000000000eaffd0 00 16 97 8b c0 ff ea 00 - 50 ac 59 89 ff ff ff ff ........P.Y..... 0000000000eaffe0 d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00 ...|0..|........ 0000000000eafff0 00 00 00 00 61 d1 ab 71 - c0 77 af 00 00 00 00 00 ....a..q.w...... 0000000000eb0000 c8 00 00 00 2f 01 00 00 - ff ee ff ee 02 10 00 00 ..../........... 0000000000eb0010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. .. 0000000000eb0020 00 02 00 00 00 20 00 00 - df 01 00 00 ff ef fd 7f ..... .......... 0000000000eb0030 07 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0000000000eb0040 00 00 00 00 98 05 eb 00 - 0f 00 00 00 f8 ff ff ff ................ 0000000000eb0050 50 00 eb 00 50 00 eb 00 - 40 06 eb 00 00 00 00 00 P...P...@....... *----> State Dump for Thread Id 0xa40 <----* eax=71aa2af1 ebx=0015ddd8 ecx=71ac1c36 edx=71ac1c0a esi=7c90d20e edi=71ab4a83 eip=7c90e514 esp=0107fe88 ebp=0107ffb4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0107ffb4 7c80b729 0015ddd8 71ab4a83 71ac0f22 ntdll!KiFastSystemCallRet 0107ffec 00000000 71aa2af1 0015ddd8 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 000000000107fe88 1a d2 90 7c 67 2b aa 71 - 01 00 00 00 9c fe 07 01 ...|g+.q........ 000000000107fe98 22 0f ac 71 00 00 00 00 - 00 00 00 80 28 fc f4 a3 "..q........(... 000000000107fea8 27 74 6e 80 49 3a 5c 57 - 49 4e 44 4f 57 53 5c 73 'tn.I:\WINDOWS\s 000000000107feb8 79 73 74 65 6d 33 32 5c - 57 53 32 48 45 4c 50 2e ystem32\WS2HELP. 000000000107fec8 64 6c 6c 00 e0 fb f4 a3 - fd f1 53 80 00 b0 7b 89 dll.......S...{. 000000000107fed8 ff 00 00 00 ff 00 00 00 - 00 00 00 00 00 00 00 00 ................ 000000000107fee8 00 00 00 00 81 38 55 80 - ff ff ff ff 40 85 33 b8 [email protected]. 000000000107fef8 00 00 00 00 10 74 6e 80 - 94 dc d5 88 28 fc f4 a3 .....tn.....(... 000000000107ff08 00 00 00 00 27 74 6e 80 - 08 00 00 00 46 02 00 00 ....'tn.....F... 000000000107ff18 72 38 50 80 68 db d5 88 - f8 da d5 88 78 b0 4f 80 r8P.h.......x.O. 000000000107ff28 64 dc d5 88 f8 da d5 88 - 2c db d5 88 01 00 00 00 d.......,....... 000000000107ff38 f2 43 64 80 78 9c d7 89 - f8 da d5 88 00 b0 fd 7f .Cd.x........... 000000000107ff48 88 fc f4 a3 8c 2f 50 80 - 00 00 00 00 05 00 00 00 ...../P......... 000000000107ff58 00 00 00 00 00 00 00 00 - 00 00 00 00 c4 f8 4f 80 ..............O. 000000000107ff68 60 fc f4 a3 2c db d5 88 - 80 f9 4f 80 27 74 6e 80 `...,.....O.'tn. 000000000107ff78 f8 da d5 88 50 fd f4 a3 - 00 00 00 00 e0 db d5 88 ....P........... 000000000107ff88 01 fc f4 a3 00 00 00 00 - 78 9c d7 89 64 2f 50 80 ........x...d/P. 000000000107ff98 00 00 00 00 00 00 00 00 - 00 00 00 00 74 2f 50 80 ............t/P. 000000000107ffa8 a0 fc f4 a3 f2 7e 6e 80 - e2 f9 00 00 ec ff 07 01 .....~n......... 000000000107ffb8 29 b7 80 7c d8 dd 15 00 - 83 4a ab 71 22 0f ac 71 )..|.....J.q"..q *----> State Dump for Thread Id 0xf70 <----* eax=00000102 ebx=c0000000 ecx=0117ff7c edx=7c90e514 esi=00000102 edi=71a8793c eip=7c90e514 esp=0117ff7c ebp=0117ffb4 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0117ffb4 7c80b729 71a67b03 0012ea7c 7c90e920 ntdll!KiFastSystemCallRet 0117ffec 00000000 71a5d2c6 001591b8 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 000000000117ff7c 4a da 90 7c 20 d3 a5 71 - 18 01 00 00 bc ff 17 01 J..| ..q........ 000000000117ff8c b0 ff 17 01 a4 ff 17 01 - 68 d3 a5 71 7c ea 12 00 ........h..q|... 000000000117ff9c 20 e9 90 7c b8 91 15 00 - 00 00 00 00 1c 00 00 00 ..|............ 000000000117ffac 00 00 a5 71 48 2c eb 00 - ec ff 17 01 29 b7 80 7c ...qH,......)..| 000000000117ffbc 03 7b a6 71 7c ea 12 00 - 20 e9 90 7c b8 91 15 00 .{.q|... ..|.... 000000000117ffcc 00 a0 fd 7f 00 16 97 8b - c0 ff 17 01 78 e6 c3 89 ............x... 000000000117ffdc ff ff ff ff d8 9a 83 7c - 30 b7 80 7c 00 00 00 00 .......|0..|.... 000000000117ffec 00 00 00 00 00 00 00 00 - c6 d2 a5 71 b8 91 15 00 ...........q.... 000000000117fffc 00 00 00 00 3d 00 3a 00 - 3a 00 3d 00 3a 00 3a 00 ....=.:.:.=.:.:. 000000000118000c 5c 00 00 00 3d 00 49 00 - 3a 00 3d 00 49 00 3a 00 \...=.I.:.=.I.:. 000000000118001c 5c 00 44 00 61 00 64 00 - 5c 00 50 00 72 00 6f 00 \.D.a.d.\.P.r.o. 000000000118002c 6a 00 65 00 63 00 74 00 - 73 00 5c 00 42 00 59 00 j.e.c.t.s.\.B.Y. 000000000118003c 4f 00 4e 00 44 00 5c 00 - 41 00 70 00 70 00 6c 00 O.N.D.\.A.p.p.l. 000000000118004c 69 00 63 00 61 00 74 00 - 69 00 6f 00 6e 00 73 00 i.c.a.t.i.o.n.s. 000000000118005c 5c 00 50 00 6f 00 70 00 - 4c 00 61 00 76 00 61 00 \.P.o.p.L.a.v.a. 000000000118006c 5c 00 52 00 65 00 73 00 - 6f 00 75 00 72 00 63 00 \.R.e.s.o.u.r.c. 000000000118007c 65 00 20 00 43 00 65 00 - 6e 00 74 00 65 00 72 00 e. .C.e.n.t.e.r. 000000000118008c 5c 00 6c 00 69 00 76 00 - 65 00 00 00 41 00 4c 00 \.l.i.v.e...A.L. 000000000118009c 4c 00 55 00 53 00 45 00 - 52 00 53 00 50 00 52 00 L.U.S.E.R.S.P.R. 00000000011800ac 4f 00 46 00 49 00 4c 00 - 45 00 3d 00 49 00 3a 00 O.F.I.L.E.=.I.:. *----> State Dump for Thread Id 0x1248 <----* eax=00175b98 ebx=00000000 ecx=00175ca8 edx=1afb47fa esi=00166b80 edi=00166bbc eip=7c90e514 esp=0165fe18 ebp=0165ff80 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: ntdll!KiFastSystemCallRet 7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528) 7c90e4ff 8b0424 mov eax,[esp] 7c90e502 8be5 mov esp,ebp 7c90e504 5d pop ebp 7c90e505 c3 ret 7c90e506 8da42400000000 lea esp,[esp] 7c90e50d 8d4900 lea ecx,[ecx] ntdll!KiFastSystemCall: 7c90e510 8bd4 mov edx,esp 7c90e512 0f34 sysenter ntdll!KiFastSystemCallRet: 7c90e514 c3 ret 7c90e515 8da42400000000 lea esp,[esp] 7c90e51c 8d642400 lea esp,[esp] ntdll!KiIntSystemCall: 7c90e520 8d542408 lea edx,[esp+0x8] 7c90e524 cd2e int 2e 7c90e526 c3 ret 7c90e527 90 nop ntdll!RtlRaiseException: 7c90e528 55 push ebp 7c90e529 8bec mov ebp,esp *----> Stack Back Trace <----* *** ERROR: Symbol file could not be found. Defaulted to export symbols for I:\WINDOWS\system32\RPCRT4.dll - WARNING: Stack unwind information not available. Following frames may be wrong. ChildEBP RetAddr Args to Child 0165ff80 77e76caf 0165ffa8 77e76ad1 00166b80 ntdll!KiFastSystemCallRet 0165ff88 77e76ad1 00166b80 00167528 0012c364 RPCRT4!I_RpcBCacheFree+0x61c 0165ffa8 77e76c97 00158480 0165ffec 7c80b729 RPCRT4!I_RpcBCacheFree+0x43e 0165ffb4 7c80b729 0015b028 00167528 0012c364 RPCRT4!I_RpcBCacheFree+0x604 0165ffec 00000000 77e76c7d 0015b028 00000000 kernel32!GetModuleFileNameA+0x1ba *----> Raw Stack Dump <----* 000000000165fe18 aa da 90 7c e3 65 e7 77 - d8 01 00 00 74 ff 65 01 ...|.e.w....t.e. 000000000165fe28 00 00 00 00 50 a3 17 00 - 00 00 00 00 ff ff ff 03 ....P........... 000000000165fe38 ff ff ff 03 7c 62 c0 82 - 00 00 00 00 fc 3c 88 c0 ....|b.......<.. 000000000165fe48 30 35 37 89 40 f5 df ff - 02 00 00 00 00 00 4f 80 [email protected]. 000000000165fe58 94 3b 11 9f c0 fe 3f c0 - 00 70 fd 7f 00 00 00 00 .;....?..p...... 000000000165fe68 b8 fe 3f 02 01 00 00 00 - cb 38 52 80 00 70 fd 7f ..?......8R..p.. 000000000165fe78 69 8f 7f b5 88 36 c7 8a - 5b bc 7f b5 60 b2 80 b5 i....6..[...`... 000000000165fe88 ff ff ff 00 a0 c9 8b 8a - 08 00 00 00 2a 40 52 80 ............*@R. 000000000165fe98 94 3b 11 9f 00 00 00 00 - 00 00 00 00 00 00 00 00 .;.............. 000000000165fea8 40 33 38 89 38 33 37 89 - 01 34 37 89 00 00 00 00 @38.837..47..... 000000000165feb8 b8 fe 3f c0 f8 b6 95 89 - 00 00 00 00 60 3c 11 9f ..?.........`<.. 000000000165fec8 00 00 04 00 df 0e 00 00 - 04 34 37 89 ff ff ed 00 .........47..... 000000000165fed8 d8 3b 11 9f d8 3b 11 9f - aa d7 e9 b7 d0 3b 11 9f .;...;.......;.. 000000000165fee8 d9 d7 e9 b7 ec 3b 11 9f - ec 3b 11 9f aa d7 e9 b7 .....;...;...... 000000000165fef8 e4 3b 11 9f d9 d7 e9 b7 - 04 00 00 00 00 00 00 00 .;.............. 000000000165ff08 00 3c 11 00 00 3c 11 9f - 70 4b e8 b7 58 9e 92 8b .<...<..pK..X... 000000000165ff18 38 85 33 b8 34 59 54 80 - 00 81 b5 89 b4 b1 4f 80 8.3.4YT.......O. 000000000165ff28 cc 82 b5 89 80 ff 65 01 - 85 d1 e7 77 48 ff 65 01 ......e....wH.e. 000000000165ff38 95 d1 e7 77 e0 10 90 7c - f8 d9 15 00 28 b0 15 00 ...w...|....(... 000000000165ff48 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]...... |
Updated repro steps which result in a corrupt world.sav file and DreamDaemon shutting down when I stop the world.
1. Start hosting world in assumed good state 2. Wait a minute 3. Stop world Note: DreamDaemon process unexpedadly ends 4. Start DreamDaemon 5. Start hosting world. Note: World appears to start normally until you notice in-game values are wrong. When you look at the world directory, it now contains a world_lost.txt file and it always has a different Orphan value found. Here's the last one. //Orphan savefile buffer 'm_listOfEarnedAchievements' found on Sat Mar 19 16:54:00 2011 m_listOfEarnedAchievements = list() //End of exported data. I think that as people log on and off, they are corrupting the world.sav file and when someone logs in after them, it causes DreamDaemon to crash. Do you have an update? Do you need more information? Are you reading my posts? |
Looks like the problem might be related to saving the world when it gets shut down. This has worked up until recently and maybe it has to do with timing and size.
By remarking out the world save call, the DreamDaemon isn't shutting down when I stop the world and my world.sav file isn't getting corrupted. I will start working on a different save system. world |
Problem not fixed. A new unique player joined and it crashed.
Looking at callstack... I see CreatePathTo so I will be looking into what a new player does that might cause this. If you can point me to any DM functions which utilize this problem function, please let me know. 0012e850 0057631e 01f24d28 00000000 00000000 MSVCRT!fseek+0x14 77c1f2bc 08c08300 ccccccc3 56e8cccc 830001ac byondcore!CreatePathTo+0x3dae |